lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <cover.1285749610.git.arno@natisbad.org> Date: Wed, 29 Sep 2010 11:05:24 +0200 From: Arnaud Ebalard <arno@...isbad.org> To: "David S. Miller" <davem@...emloft.net>, Eric Dumazet <eric.dumazet@...il.com>, Herbert Xu <herbert@...dor.apana.org.au>, Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org> Cc: netdev@...r.kernel.org Subject: [PATCHv3 net-next-2.6 0/5] XFRM,IPv6: Removal of RH2/HAO from IPsec-protected MIPv6 traffic Hi, This an updated version of the patches. For reference, introduction of the feature is here http://thread.gmane.org/gmane.linux.network/172941 This version 3 now also builds with ipv6 modular. To do that, a helper (input_addr_check()) has been added to struct xfrm_state_afinfo. To avoid the penalty of xfrm_state_get/put_afinfo() calls from xfrm_input(), I spent some time in the sources and came up with the idea of accessing it safely as follows: x = xfrm_state_lookup(net, skb->mark, NULL, spi, nexthdr, family); if (x == NULL || x->outer_mode->afinfo->input_addr_check(skb, x)) { ... Tell me if I missed something. Comments welcome. Cheers, a+ -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists