0dc2e22978c9f754e171574e727d8dfa226d3781 |
|
25-Jul-2015 |
Zhang Shengju <zhangshengju@cmss.chinamobile.com> |
xfrm: remove duplicated include Remove dupldated include for <linux/xfrm.h>, since it's already included by 'xfrm.h'. Signed-off-by: Zhang Shengju <zhangshengju@cmss.chinamobile.com>
/external/iproute2/ip/xfrm_state.c
|
c079e121a73af5eb49e003b13607e8a690331df6 |
|
27-May-2015 |
Stephen Hemminger <shemming@brocade.com> |
libnetlink: add size argument to rtnl_talk There have been several instances where response from kernel has overrun the stack buffer from the caller. Avoid future problems by passing a size argument. Also drop the unused peer and group arguments to rtnl_talk.
/external/iproute2/ip/xfrm_state.c
|
782cf01dc01a7af01928bb12f60683f2bfe25a96 |
|
15-Apr-2015 |
Nicolas Dichtel <nicolas.dichtel@6wind.com> |
ipxfrm: wrong nl msg sent on deleteall cmd XFRM netlink family is independent from the route netlink family. It's wrong to call rtnl_wilddump_request(), because it will add a 'struct ifinfomsg' into the header and the kernel will complain (at least for xfrm state): netlink: 24 bytes leftover after parsing attributes in process `ip'. Reported-by: Gregory Hoggarth <Gregory.Hoggarth@alliedtelesis.co.nz> Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
/external/iproute2/ip/xfrm_state.c
|
0151b56d102961c1418aea3ee53428d4ca2669c9 |
|
20-Oct-2014 |
dingzhi <zhi.ding@6wind.com> |
xfrm: add support of ESN and anti-replay window This patch allows to configure ESN and anti-replay window. Signed-off-by: dingzhi <zhi.ding@6wind.com> Signed-off-by: Adrien Mazarguil <adrien.mazarguil@6wind.com> Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
/external/iproute2/ip/xfrm_state.c
|
f687d73c96b9fa2e20fcbb71faa75fb2f611e679 |
|
21-Mar-2014 |
Nicolas Dichtel <nicolas.dichtel@6wind.com> |
ipxfrm: allow to setup filter when dumping SA It's now possible to filter SA directly into the kernel by specifying XFRMA_PROTO and/or XFRMA_ADDRESS_FILTER. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
/external/iproute2/ip/xfrm_state.c
|
4806867a6cc2950293229e66efe88061323ca0cf |
|
17-Feb-2014 |
Stephen Hemminger <stephen@networkplumber.org> |
kill spaces before tabs
/external/iproute2/ip/xfrm_state.c
|
0612519e011812276ade512d4a7f8113497f64ed |
|
17-Feb-2014 |
Stephen Hemminger <stephen@networkplumber.org> |
Remove trailing whitespace
/external/iproute2/ip/xfrm_state.c
|
4d98ab00de90bac916f526c83c68012d7159f712 |
|
07-Dec-2013 |
Stephen Hemminger <stephen@networkplumber.org> |
Fix FSF address in file headers
/external/iproute2/ip/xfrm_state.c
|
b557416532f3db745cb9cceaaf343b4bc5b57003 |
|
08-Oct-2013 |
Christophe Gouault <christophe.gouault@6wind.com> |
xfrm: enable to set non-wildcard mark 0 on SAs and SPs ip xfrm considers that the user-defined mark is "any" as soon as (mark.v & mark.m == 0), which prevents from specifying non-wildcard marks that include the value 0 (typically 0/0xffffffff). Yet, matching exactly mark 0 is useful for instance to separate vti policies from global policies. Always configure the user mark if mark.m != 0. Signed-off-by: Christophe Gouault <christophe.gouault@6wind.com>
/external/iproute2/ip/xfrm_state.c
|
99500b56d94dfa735a3d088fdbdde6c0c2638e78 |
|
01-Oct-2013 |
Fan Du <fan.du@windriver.com> |
xfrm: use memcpy to suppress gcc phony buffer overflow warning. This bug is reported from below link: https://bugzilla.redhat.com/show_bug.cgi?id=982761 An simplified command from its original reproducing method in bugzilla: ip xfrm state add src 10.0.0.2 dst 10.0.0.1 proto ah spi 0x12345678 auth md5 12 will cause below spew from gcc. Reported-by: Sohny Thomas <sthomas@linux.vnet.ibm.com>
/external/iproute2/ip/xfrm_state.c
|
dc8867d0ff6202559c05a8fb8f7c16829360af28 |
|
17-May-2013 |
Nicolas Dichtel <nicolas.dichtel@6wind.com> |
ip/xfrm: all to set flag XFRM_SA_XFLAG_DONT_ENCAP_DSCP For the display part, we print extra-flags only if show_stats is set, like for standard flags. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
/external/iproute2/ip/xfrm_state.c
|
e8740e42ece716b1dcce89a573fba413846af468 |
|
25-Mar-2013 |
David Ward <david.ward@ll.mit.edu> |
ip/xfrm: Improve error strings Quotation marks are now used only to indicate literal text on the command line. Signed-off-by: David Ward <david.ward@ll.mit.edu>
/external/iproute2/ip/xfrm_state.c
|
29665f92c79aea7cb408c7704d6f9227bbc8de8d |
|
25-Mar-2013 |
David Ward <david.ward@ll.mit.edu> |
ip/xfrm: Improve usage text and documentation Change ALGO-KEY to ALGO-KEYMAT to make it more obvious that the keying material might need to contain more than just the key (such as a salt or nonce value). List the algorithm names that currently exist in the kernel. Indicate that for IPComp, the Compression Parameter Index (CPI) is used as the SPI. Group the list of mode values by transform protocol. Signed-off-by: David Ward <david.ward@ll.mit.edu>
/external/iproute2/ip/xfrm_state.c
|
f3b9aa3df848e6ce7f61a54f0f05aef3bdff24ca |
|
25-Mar-2013 |
David Ward <david.ward@ll.mit.edu> |
ip/xfrm: Command syntax should not expect a key for compression Compression algorithms do not use a key. Signed-off-by: David Ward <david.ward@ll.mit.edu>
/external/iproute2/ip/xfrm_state.c
|
6128fdfd5c4861c9b7d79d375f88c1986ec53375 |
|
25-Mar-2013 |
David Ward <david.ward@ll.mit.edu> |
ip/xfrm: Improve transform protocol-specific parameter checking Ensure that only algorithms and modes supported by the transform protocol are specified (so that errors are more obvious). Signed-off-by: David Ward <david.ward@ll.mit.edu>
/external/iproute2/ip/xfrm_state.c
|
ec839527f2647f365e84e6f571ce13d90b7c6adf |
|
25-Mar-2013 |
David Ward <david.ward@ll.mit.edu> |
ip/xfrm: Do not allow redundant algorithm combinations to be specified AEAD algorithms perform both encryption and authentication; they are not combined with separate encryption or authentication algorithms. Signed-off-by: David Ward <david.ward@ll.mit.edu>
/external/iproute2/ip/xfrm_state.c
|
1d26e1fefd379deffd76469deea8f1bb8c0fc2dd |
|
25-Mar-2013 |
David Ward <david.ward@ll.mit.edu> |
ip/xfrm: Extend SPI validity checking A Security Policy Index (SPI) is not used with Mobile IPv6. IPComp uses a smaller 16-bit Compression Parameter Index (CPI) which is passed as the SPI value. Perform checks whenever specifying an ID. Signed-off-by: David Ward <david.ward@ll.mit.edu>
/external/iproute2/ip/xfrm_state.c
|
0c5982fd7f209604cd8be5d41d2e8b0527a3f279 |
|
20-Mar-2013 |
Thomas Egerer <hakke_007@gmx.de> |
ip xfrm state: Allow different selector family My previous commit introduced a patch to allow for states with different ip address families for selector and id. The must have somehow been a mixup of the patch I tested and the one I send, so the patch sent breaks the iproute2 build. This patch fixes this. My apologies. Signed-off-by: Thomas Egerer <hakke_007@gmx.de>
/external/iproute2/ip/xfrm_state.c
|
23d5b0d5510242dc9622c3c63cfed01695dd94d0 |
|
17-Mar-2013 |
Thomas Egerer <hakke_007@gmx.de> |
ip xfrm state: Allow different selector family Do not enforce the selector of a state to have the same address family as the id. This makes it possible to configure inter family states. Signed-off-by: Thomas Egerer <hakke_007@gmx.de>
/external/iproute2/ip/xfrm_state.c
|
d1f28cf181a6f77f230d90267eef0ecfbcb25f30 |
|
12-Feb-2013 |
Stephen Hemminger <stephen@networkplumber.org> |
ip: make local functions static
/external/iproute2/ip/xfrm_state.c
|
cd70f3f522e04b4d2fa80ae10292379bf223a53b |
|
28-Dec-2011 |
Stephen Hemminger <shemminger@vyatta.com> |
libnetlink: remove unused junk callback Both rtnl_talk and rtnl_dump had a callback for handling portions of netlink message that do not match the correct pid or seq. But this callback was never used by any part of iproute2 so remove it.
/external/iproute2/ip/xfrm_state.c
|
cbec0219132afd1749e1b8852b8b3729988af841 |
|
11-Jun-2011 |
David Ward <david.ward@ll.mit.edu> |
xfrm: Update documentation The ip(8) man page and the "ip xfrm [ XFRM-OBJECT ] help" command output are updated to include missing options, fix errors, and improve grammar. There are no functional changes made. The documentation for the ip command has many different meanings for the same formatting symbols (which really needs to be fixed). This patch makes consistent use of brackets [ ] to indicate optional parameters, pipes | to mean "OR", braces { } to group things together, and dashes - instead of underscores _ inside of parameter names. The parameters are listed in the order in which they are parsed in the source code. There are several parameters and options that are still not mentioned or need to be described more thoroughly in the "COMMAND SYNTAX" section of the ip(8) man page. I would appreciate help from the developers with this. Signed-off-by: David Ward <david.ward@ll.mit.edu>
/external/iproute2/ip/xfrm_state.c
|
98f5519cd9db9d1ca58c49af27698101c8fff373 |
|
01-Feb-2011 |
Nicolas Dichtel <nicolas.dichtel@6wind.com> |
iproute2: add support of flag XFRM_STATE_ALIGN4 Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
/external/iproute2/ip/xfrm_state.c
|
f323f2a32c3b9c29fb91c812472b7fd663f9ae73 |
|
11-Jan-2011 |
Nicolas Dichtel <nicolas.dichtel@6wind.com> |
iproute2: allow to specify truncation bits on auth algo Hi, here is a patch against iproute2 to allow user to set a state with a specific auth length. Example: $ ip xfrm state add src 10.16.0.72 dst 10.16.0.121 proto ah spi 0x10000000 auth-trunc "sha256" "azertyuiopqsdfghjklmwxcvbn123456" 96 mode tunnel $ ip xfrm state src 10.16.0.72 dst 10.16.0.121 proto ah spi 0x10000000 reqid 0 mode tunnel replay-window 0 auth-trunc hmac(sha256) 0x617a6572747975696f707173646667686a6b6c6d77786376626e313233343536 96 sel src 0.0.0.0/0 dst 0.0.0.0/0 Regards, Nicolas >From 522ed7348cdf3b6f501af2a5a5d989de1696565a Mon Sep 17 00:00:00 2001 From: Nicolas Dichtel <nicolas.dichtel@6wind.com> Date: Thu, 23 Dec 2010 06:48:12 -0500 Subject: [PATCH] iproute2: allow to specify truncation bits on auth algo Attribute XFRMA_ALG_AUTH_TRUNC can be used to specify truncation bits, so we add a new algo type: auth-trunc. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
/external/iproute2/ip/xfrm_state.c
|
0c7a594541df84d3497681a8ecc09b05c1449dd0 |
|
03-Feb-2011 |
Joy Latten <jml@austin.ibm.com> |
xfrm security context support Adds security context support to ip xfrm state. Signed-off-by: Joy Latten <latten@austin.ibm.com>
/external/iproute2/ip/xfrm_state.c
|
c90cda94006ed9d4a53750bd036adbfe1ae7069d |
|
23-Feb-2010 |
Jamal Hadi Salim <hadi@cyberus.ca> |
xfrm: add support for SA by mark Add support for SA manipulation by mark Signed-off-by: Jamal Hadi Salim <hadi@cyberus.ca>
/external/iproute2/ip/xfrm_state.c
|
15bb82c6fb9ae401f48eb7f03179ee6669496bf0 |
|
11-Jan-2010 |
Alex Badea <abadea@ixiacom.com> |
ip xfrm state: parse and print "icmp" and "af-unspec" flags Convert to/from XFRM_STATE_ICMP and XFRM_STATE_AF_UNSPEC state flags. Signed-off-by: Alex Badea <abadea@ixiacom.com>
/external/iproute2/ip/xfrm_state.c
|
1758a81f49d1360c930393d2042221f567dc52b5 |
|
18-Sep-2008 |
Herbert Xu <herbert@gondor.apana.org.au> |
ip: xfrm: Add AEAD support This patch allows the user to create/manage AEAD algorithms with the ip xfrm command. AEAD algorithms are also known as combined- mode algorithms. They provide the functionality of encryption algorithms as well as authentication algorithms. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
/external/iproute2/ip/xfrm_state.c
|
de95ae7ca7d6a290eaab2c137b74f19c78a9a1fe |
|
23-Apr-2008 |
Herbert Xu <herbert@gondor.apana.org.au> |
xfrm: Allow replay setting Hi Stephen: [IP] xfrm: Allow replay setting For certain applications there is a requirement to start the sequence number from a point other than the default. As it is the kernel provides an interface to do that but it isn't available through the ip(8) command. Since we're encouraging people to migrate over to ip(8) for manual keying, it is useful to have this ability there. This patch adds support for setting replay sequence numbers through ip(8). Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Thanks, -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt --
/external/iproute2/ip/xfrm_state.c
|
9414cd6d380c3a9317b6912c14e571fb5b5a4f62 |
|
08-Mar-2008 |
Stephen Hemminger <stephen.hemminger@vyatta.com> |
revert earlier mistake ALGO_NAME is okay Revert "I found out when I was writing manual page, that options ALGO_NAME and" This reverts commit 8a1485bb21bf84a7932ca849e29300853e647afc.
/external/iproute2/ip/xfrm_state.c
|
8a1485bb21bf84a7932ca849e29300853e647afc |
|
22-Feb-2008 |
Marcela Maslanova <mmaslano@redhat.com> |
I found out when I was writing manual page, that options ALGO_NAME and ALGO_KEY aren't used. If it's a bug or should it be remove it, as I did?
/external/iproute2/ip/xfrm_state.c
|
f31a37f79d1f33d4d0d6a18f3768bfee27e8b6cc |
|
01-Feb-2008 |
Stephen Hemminger <stephen.hemminger@vyatta.com> |
fix problem caused by rtnl_send checks Some usages of rtnl_send could cause errors (ie flush requests) others do a listen afterwards. Signed-off-by: Stephen Hemminger <stephen.hemminger@vyatta.com>
/external/iproute2/ip/xfrm_state.c
|
efe69c1b7220e6c89bc5ccbeceeadf7c9e09768b |
|
24-Aug-2007 |
Masahide NAKAMURA <nakam@linux-ipv6.org> |
ip: xfrm: Fix flush message. Fix xfrm state or policy flush message. And minor updates are included: o Use static buffer to show unknown value as string. o Show policy type (ptype) only when kernel specified it. o Clean-up xfrm_monitor. Signed-off-by: Masahide NAKAMURA <nakam@linux-ipv6.org> Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org>
/external/iproute2/ip/xfrm_state.c
|
c1fa2253241f3cddac3519700549f98d7840b864 |
|
24-Aug-2007 |
Masahide NAKAMURA <nakam@linux-ipv6.org> |
ip: xfrm: Fix policy and state flags. o Support policy flag with string format. Note that kernel defines only one name "localok" for the flag and it has not had any effect currently. o Support state flag value XFRM_STATE_NOPMTUDISC. o Fix to show detailed flags value when "-s" option is used. o Fix minor typo. Signed-off-by: Masahide NAKAMURA <nakam@linux-ipv6.org> Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org>
/external/iproute2/ip/xfrm_state.c
|
ed01e3906854516188a5d57a31eab2e5e9ba673f |
|
24-Aug-2007 |
Masahide NAKAMURA <nakam@linux-ipv6.org> |
ip: xfrm: Clean-up for internal mask to filter. Remove unused or redundant usage for xfrm_filter. Signed-off-by: Masahide NAKAMURA <nakam@linux-ipv6.org> Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org>
/external/iproute2/ip/xfrm_state.c
|
bdf9e86d727156ca68fefd243afa29ad4f29f4bf |
|
20-Jun-2007 |
Stephen Hemminger <shemminger@linux-foundation.org> |
fix last change Need to use correct XFRMA_ constants. Get rid of bogus casts. Fix case where no attribute returned. Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org>
/external/iproute2/ip/xfrm_state.c
|
0bb4a4c20c9deeac26f7239d83c8747c4dfb4d89 |
|
04-May-2007 |
jamal <hadi@cyberus.ca> |
see SAD info Stephen, Use this patch instead of the one i sent yesterday. As before, you will need to pull include/linux/xfrm.h from net-2.6 once Dave applies the kernel patch. cheers, jamal [XFRM] see SAD info i.e instead of something like ip xfrm state ls | grep -i src | wc -l do: ip xfrm state count And you get the count; you can also pass -s to the command line and get the hash info. Signed-off-by: Jamal Hadi Salim <hadi@cyberus.ca> Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org>
/external/iproute2/ip/xfrm_state.c
|
ae665a522bd46bea44c5ea84c89c8b1731954170 |
|
05-Dec-2006 |
Stephen Hemminger <shemminger@osdl.org> |
Remove trailing whitespace Go through source files and remove all trailing whitespace Signed-off-by: Stephen Hemminger <shemminger@osdl.org>
/external/iproute2/ip/xfrm_state.c
|
7ea4f5d33d27b23a3127b0b6ec46d0b4821d9431 |
|
05-Dec-2006 |
Masahide NAKAMURA <nakam@linux-ipv6.org> |
XFRM: Mobile IPv6 route optimization support. To support Mobile IPv6 RO, the following extension is included: o Use XFRM_MODE_XXX macro instead of magic number o New attribute option for all state: source address for deleting or getting message o New attribute options for RO: care-of address, last-used timestamp and wild-receive flag Note: Flush command like `ip xfrm state flush` is to remove all XFRM state. It has been effected for IPsec SAD but with this patch it flushes both IPsec SAD and Mobile IPv6 RO states. To make only IPsec SA flush, it is recommanded to specify each XFRM protocol like below: `ip x s f proto esp ; ip x s f proto ah ; ip x s f proto comp` Signed-off-by: Masahide NAKAMURA <nakam@linux-ipv6.org> Signed-off-by: Stephen Hemminger <shemminger@osdl.org>
/external/iproute2/ip/xfrm_state.c
|
34e099e24fd3c9070b68c1286a201834c0f4ae03 |
|
19-Oct-2006 |
Stephen Hemminger <shemminger@osdl.org> |
SA and SP in IPSec BEET mode. Patch which allows for setting SA and SP also for new IPSec mode BEET, beside tunnel and transport, according to the latest changes in the kernel you can find at the following link: Signed-off-by: Diego Beltrami <diego.beltrami@gmail.com> Signed-off-by: Miika Komu <miika@iki.fi> Signed-off-by: Stephen Hemminger <shemminger@osdl.org>
/external/iproute2/ip/xfrm_state.c
|
af1b6a41d4c7ed8aab98cfdcdafd55ec6c638b07 |
|
11-Aug-2006 |
Andy Gay <andy@andynet.net> |
Fix struct alignment with cris architecture [IPROUTE]: Fix struct alignment with cris architecture gcc for the cris arch does not pad structures to the next multiple of 4 bytes, as the i386 gcc does. This causes errors like this when displaying xfrm policies: # ip x p !!!Deficit 3, rta_len=300 src 192.168.251.32/29 dst 192.168.251.32/29 dir in priority 0 !!!Deficit 3, rta_len=180 src 0.0.0.0/0 dst 192.168.251.32/29 dir in priority 2208 .... Similar errors are seen from ip x s. This patch fixes the errors when printing. I'm not sure whether we should worry about other uses of the affected structs, I've not seen any other bad effects from this though, so hopefully this is enough. (Thanks to Herbert Xu for pointing out that NLMSG_SPACE is the correct macro to use here.) Tested against 2.6.17.6 kernel on i386, and 2.6.16.1 kernel on cris. Signed-off-by: Andy Gay <andy@andynet.net> Signed-off-by: Stephen Hemminger <shemminger@osdl.org>
/external/iproute2/ip/xfrm_state.c
|
669ae748d6ae3a476090f7dc48dd0fa6d246f77e |
|
07-Nov-2005 |
shemminger <shemminger> |
Minor fixes from Masahide for XFRM dynamic keying
/external/iproute2/ip/xfrm_state.c
|
c595c790a08366db90654c01aba02a1bd97d73e2 |
|
02-Nov-2005 |
shemminger <shemminger> |
Fix XFRM bugs introduced by batching code. Re-introduces the SA and policy add/del events
/external/iproute2/ip/xfrm_state.c
|
737f15f6da0ed7512220f6fa5244a39777de4e0d |
|
09-Jul-2005 |
shemminger <shemminger> |
Thomas's ematch fixes for lex. Fix more GCC signedness warnings.
/external/iproute2/ip/xfrm_state.c
|
9bec1a436335457f3067a17de6ddb913bd95a184 |
|
07-Jun-2005 |
shemminger <shemminger> |
Masahide NAKAMURA <nakam@linux-ipv6.org> It fixes flush feature for IPsec(ip xfrm). Jamal gave me comment about it. I've tested it on 2.6.11.7. Please find the log below, check code and pull it: bk://bk.skbuff.net:38000/iproute2-xfrm-flush ChangeSet@1.182, 2005-04-13 21:19:44+09:00, nakam@linux-ipv6.org [ip] add "deleteall" command for xfrm; "flush" uses kernel's flush interface and "deleteall" uses legacy iproute2's flush feature like getting-and-deleting-for-each.
/external/iproute2/ip/xfrm_state.c
|
90f93024a0818dc691138d8401721e797004b042 |
|
07-Jun-2005 |
shemminger <shemminger> |
Monitor time patch from Masahide NAKAMURA
/external/iproute2/ip/xfrm_state.c
|
fb7399b2baf9018c896985c3d669422a33ce5b38 |
|
22-Mar-2005 |
linux-ipv6.org!nakam <linux-ipv6.org!nakam> |
allocspi feature support. support to specify sequence number. split printing state info function for xfrm common use. (Logical change 1.175)
/external/iproute2/ip/xfrm_state.c
|
5cf576d928c515ce8dea2500154a291477ce38ba |
|
10-Mar-2005 |
osdl.net!shemminger <osdl.net!shemminger> |
Add Esp-in-udp encapsulation (Logical change 1.152)
/external/iproute2/ip/xfrm_state.c
|
2534613eeba36f2a59a7876dbe1b291c76fcb4da |
|
18-Jan-2005 |
12!tgraf <12!tgraf> |
Switch to parse_rtattr and use XFRMA_MAX directly instead of a easly forgetable magic define (Logical change 1.129)
/external/iproute2/ip/xfrm_state.c
|
eaa34ee35d6b801cabb96aafce2ca410e3f5b31d |
|
18-Jan-2005 |
net[shemminger]!shemminger <net[shemminger]!shemminger> |
Import patch iproute2.117 (Logical change 1.119)
/external/iproute2/ip/xfrm_state.c
|
50772dc51ac02239958e1ebcdb21277fcdf133a7 |
|
07-Dec-2004 |
osdl.net!shemminger <osdl.net!shemminger> |
Add ip rule flush capabilty and fix all the prototype changes because of that code rewrites the nlmsghdr. (Logical change 1.106)
/external/iproute2/ip/xfrm_state.c
|
c70b36d231afba1700d6bb4ca1181fd9bb76c77b |
|
28-Sep-2004 |
org[shemminger]!nakam <org[shemminger]!nakam> |
[iproute2] XFRM: support ICMP/ICMPv6's type and code (Logical change 1.85)
/external/iproute2/ip/xfrm_state.c
|
29aa4dd76c0c1877d50b2d643eb081d5477ceadf |
|
28-Sep-2004 |
org[shemminger]!nakam <org[shemminger]!nakam> |
[iproute2] XFRM: fixing protocol (Logical change 1.84)
/external/iproute2/ip/xfrm_state.c
|
bd641cd661527469a9d15c0fa09f19d017c2299f |
|
28-Sep-2004 |
org[shemminger]!nakam <org[shemminger]!nakam> |
[iproute2] XFRM: using flush message type (Logical change 1.83)
/external/iproute2/ip/xfrm_state.c
|
54f7328aecfb8421b0e9ca180324aed135e780de |
|
28-Sep-2004 |
org[shemminger]!nakam <org[shemminger]!nakam> |
[iproute2] XFRM: fixing IPsec algorithm key (Logical change 1.82)
/external/iproute2/ip/xfrm_state.c
|
6dc9f016347441fbf94cf851c054b0f45ba32c1c |
|
31-Aug-2004 |
osdl.net!shemminger <osdl.net!shemminger> |
make all filtering handles take const args. (Logical change 1.77)
/external/iproute2/ip/xfrm_state.c
|
7809c61688c4a30799a07c727616887e5c885ab8 |
|
12-Aug-2004 |
net[shemminger]!shemminger <net[shemminger]!shemminger> |
Import patch xrfm-msg.patch (Logical change 1.64)
/external/iproute2/ip/xfrm_state.c
|
9e566a46f24fd89e104dea064d5233ab614f490b |
|
30-Jul-2004 |
net[shemminger]!shemminger <net[shemminger]!shemminger> |
Import patch iproute-xfrm.3 2004/07/14 00:35:49-07:00 net[shemminger]!shemminger Import patch iproute-xfrm.2 (Logical change 1.58)
/external/iproute2/ip/xfrm_state.c
|
c7699875bee00fbcd057fc62c30d6560b044e007 |
|
07-Jul-2004 |
net[shemminger]!shemminger <net[shemminger]!shemminger> |
Import patch ipxfrm-20040707_2.diff (Logical change 1.53)
/external/iproute2/ip/xfrm_state.c
|
7798b5237ef2b710c87f7f052d134d2180ffbd5c |
|
07-Jul-2004 |
net[shemminger]!shemminger <net[shemminger]!shemminger> |
Initial revision
/external/iproute2/ip/xfrm_state.c
|