summaryrefslogtreecommitdiff
path: root/net/xfrm/xfrm_user.c
AgeCommit message (Expand)AuthorFilesLines
2012-04-02xfrm_user: Stop using NLA_PUT*().David S. Miller1-43/+62
2012-02-26netlink: add netlink_dump_control structure for netlink_dump_start()Pablo Neira Ayuso1-2/+7
2012-01-15Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds1-1/+1
2012-01-13net: reintroduce missing rcu_assign_pointer() callsEric Dumazet1-1/+1
2012-01-06security: remove the security_netlink_recv hook as it is equivalent to capable()Eric Paris1-1/+1
2011-12-12net: use IS_ENABLED(CONFIG_IPV6)Eric Dumazet1-6/+6
2011-08-02rcu: convert uses of rcu_assign_pointer(x, NULL) to RCU_INIT_POINTERStephen Hemminger1-2/+2
2011-06-10rtnetlink: Compute and store minimum ifinfo dump sizeGreg Rose1-1/+2
2011-04-26xfrm: Check for the new replay implementation if an esn state is insertedSteffen Klassert1-0/+3
2011-03-31Fix common misspellingsLucas De Marchi1-3/+3
2011-03-29xfrm: Restrict extended sequence numbers to espSteffen Klassert1-0/+3
2011-03-29xfrm: Check for esn buffer len in xfrm_new_aeSteffen Klassert1-0/+21
2011-03-22xfrm: Fix initialize repl field of struct xfrm_stateWei Yongjun1-1/+1
2011-03-14xfrm: Add user interface for esn and big anti-replay windowsSteffen Klassert1-14/+85
2011-03-14xfrm: Move IPsec replay detection functions to a separate fileSteffen Klassert1-1/+3
2011-03-03netlink: kill loginuid/sessionid/sid members from struct netlink_skb_parmsPatrick McHardy1-24/+32
2011-02-28xfrm: Pass name as const to xfrm_*_get_byname().David S. Miller1-1/+1
2011-02-24xfrm: Const'ify pointer args to km_migrate() and implementations.David S. Miller1-12/+12
2011-02-24xfrm: Pass km_event pointers around as const when possible.David S. Miller1-12/+12
2011-01-20Revert "netlink: test for all flags of the NLM_F_DUMP composite"David S. Miller1-1/+1
2011-01-12xfrm: check trunc_len in XFRMA_ALG_AUTH_TRUNCNicolas Dichtel1-1/+3
2011-01-10netlink: test for all flags of the NLM_F_DUMP compositeJan Engelhardt1-1/+1
2010-12-11xfrm: Add Traffic Flow Confidentiality padding XFRM attributeMartin Willi1-2/+17
2010-09-02xfrm_user: avoid a warning with some compilerNicolas Dichtel1-1/+1
2010-08-15xfrm: Use GFP_ATOMIC in xfrm_compile_policyHerbert Xu1-1/+1
2010-05-18xfrm: add severity to printkstephen hemminger1-5/+7
2010-04-02xfrm: remove policy lock when accessing policy->walk.deadTimo Teräs1-5/+1
2010-04-02xfrm_user: verify policy direction at XFRM_MSG_POLEXPIRE handlerTimo Teräs1-0/+4
2010-02-23xfrm: Allow user space manipulation of SPD markJamal Hadi Salim1-6/+25
2010-02-23xfrm: Allow user space config of SAD markJamal Hadi Salim1-15/+57
2010-02-23xfrm: SP lookups signature with markJamal Hadi Salim1-5/+5
2010-02-23xfrm: SA lookups signature with markJamal Hadi Salim1-7/+10
2010-02-20xfrm: Flushing empty SPD generates false eventsJamal Hadi Salim1-1/+5
2010-02-20xfrm: Flushing empty SAD generates false eventsJamal Hadi Salim1-1/+4
2010-02-18xfrm: Revert false event eliding commits.David S. Miller1-2/+2
2010-02-16xfrm: Flushing empty SPD generates false eventsjamal1-1/+1
2010-02-16xfrm: Flushing empty SAD generates false eventsjamal1-1/+1
2010-02-13xfrm: validate attributesjamal1-0/+4
2010-01-24netns xfrm: fix "ip xfrm state|policy count" misreportAlexey Dobriyan1-6/+8
2009-12-03net: Allow xfrm_user_net_exit to batch efficiently.Eric W. Biederman1-8/+10
2009-11-26xfrm: Store aalg in xfrm_state with a user specified truncation lengthMartin Willi1-8/+121
2009-01-20Revert "xfrm: For 32/64 compatability wrt. xfrm_usersa_info"David S. Miller1-9/+2
2009-01-15xfrm: For 32/64 compatability wrt. xfrm_usersa_infoDavid S. Miller1-2/+9
2008-12-15xfrm: join error pathsIlpo Järvinen1-10/+12
2008-11-26netns xfrm: per-netns sysctlsAlexey Dobriyan1-2/+2
2008-11-26netns xfrm: KM reporting in netnsAlexey Dobriyan1-3/+2
2008-11-26netns xfrm: pass netns with KM notificationsAlexey Dobriyan1-2/+4
2008-11-26netns xfrm: xfrm_user module in netnsAlexey Dobriyan1-31/+45
2008-11-26netns xfrm: per-netns NETLINK_XFRM socketAlexey Dobriyan1-35/+73
2008-11-26netns xfrm: policy walking in netnsAlexey Dobriyan1-1/+1