summaryrefslogtreecommitdiffstats
path: root/net/xfrm/xfrm_input.c
Commit message (Expand)AuthorAgeFilesLines
...
| * xfrm: Prepare the GRO codepath for hardware offloading.Steffen Klassert2017-04-141-25/+25
| * xfrm: Add an IPsec hardware offloading APISteffen Klassert2017-04-141-2/+39
* | xfrm: fix GRO for !CONFIG_NETFILTERSabrina Dubroca2017-04-271-1/+1
|/
* esp: Add a software GRO codepathSteffen Klassert2017-02-151-5/+26
* xfrm: Extend the sec_path for IPsec offloadingSteffen Klassert2017-02-151-0/+2
* xfrm: Export xfrm_parse_spi.Steffen Klassert2017-02-151-0/+1
* xfrm: Add a secpath_set helper.Steffen Klassert2017-02-151-12/+22
* xfrm: input: constify xfrm_input_afinfoFlorian Westphal2017-02-091-20/+11
* xfrm: Add a dummy network device for napi.Steffen Klassert2017-01-301-1/+11
* net/xfrm_input: fix possible NULL deref of tunnel.ip6->parms.i_keyAlexey Kodanev2016-08-111-7/+7
* xfrm: Fix crash observed during device unregistration and decryptionsubashab@codeaurora.org2016-03-241-0/+3
* xfrm: Increment statistic counter on inner mode errorSteffen Klassert2015-10-231-1/+3
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2015-06-011-1/+16
|\
| * xfrm: Override skb->mark with tunnel->parm.i_key in xfrm_inputAlexander Duyck2015-05-281-1/+16
* | xfrm: slightly optimise xfrm_inputLi RongQing2015-04-241-5/+5
* | xfrm: fix the return code when xfrm_*_register_afinfo failedLi RongQing2015-04-231-1/+1
|/
* xfrm: fix xfrm_input/xfrm_tunnel_check oopsAlexey Dobriyan2015-04-071-5/+5
* xfrm: Introduce xfrm_input_afinfo to access the the callbacks properlySteffen Klassert2014-03-141-0/+75
* xfrm: Add xfrm_tunnel_skb_cb to the skb common bufferSteffen Klassert2014-02-251-0/+5
* xfrm4: Add IPsec protocol multiplexerSteffen Klassert2014-02-251-6/+11
* xfrm: checkpatch errors with foo * barWeilong Chen2014-01-021-3/+3
* xfrm: add LINUX_MIB_XFRMACQUIREERROR statistic counterFan Du2013-06-061-0/+5
* xfrm: Workaround incompatibility of ESN and async cryptoSteffen Klassert2012-09-041-1/+1
* xfrm: Perform a replay check after return from async codepathsSteffen Klassert2011-09-211-0/+5
* xfrm: Move the test on replay window size into the replay check functionsSteffen Klassert2011-03-281-1/+1
* xfrm: Force a dst refcount before entering the xfrm type handlersSteffen Klassert2011-03-271-0/+2
* xfrm: Add support for IPsec extended sequence numbersSteffen Klassert2011-03-131-0/+4
* xfrm: Move IPsec replay detection functions to a separate fileSteffen Klassert2011-03-131-3/+2
* xfrm: Use separate low and high order bits of the sequence numbers in xfrm_sk...Steffen Klassert2011-03-131-2/+2
* xfrm: SA lookups signature with markJamal Hadi Salim2010-02-221-1/+1
* net: skb->dst accessorsEric Dumazet2009-06-031-2/+1
* Revert "xfrm: Accept ESP packets regardless of UDP encapsulation mode"David S. Miller2008-12-181-0/+5
* xfrm: Accept ESP packets regardless of UDP encapsulation modeMartin Willi2008-12-041-5/+0
* netns xfrm: per-netns MIBsAlexey Dobriyan2008-11-251-11/+11
* netns xfrm: xfrm_input() fixupAlexey Dobriyan2008-11-251-1/+2
* netns xfrm: state lookup in netnsAlexey Dobriyan2008-11-251-1/+1
* [IPSEC]: Fix inter address family IPsec tunnel handling.Kazunori MIYAZAWA2008-03-241-3/+19
* [IPSEC]: Fix bogus usage of u64 on input sequence numberHerbert Xu2008-02-121-2/+2
* [XFRM]: Fix statistics.Masahide NAKAMURA2008-01-311-2/+2
* [XFRM]: Remove unused exports.Adrian Bunk2008-01-311-1/+0
* [IPSEC]: Move all calls to xfrm_audit_state_icvfail to xfrm_inputHerbert Xu2008-01-281-1/+4
* [XFRM]: RFC4303 compliant auditingPaul Moore2008-01-281-1/+2
* [XFRM]: Support to increment packet dropping statistics.Masahide NAKAMURA2008-01-281-10/+31
* [IPSEC]: Add xfrm_input_state helperHerbert Xu2008-01-281-1/+1
* [IPSEC]: Use the correct family for input state lookupHerbert Xu2008-01-281-1/+4
* [IPSEC]: Add async resume support on inputHerbert Xu2008-01-281-5/+33
* [IPSEC]: Remove nhoff from xfrm_inputHerbert Xu2008-01-281-3/+2
* [IPSEC]: Move state lock into x->type->inputHerbert Xu2008-01-281-0/+4
* [IPSEC]: Move integrity stat collection into xfrm_inputHerbert Xu2008-01-281-1/+4
* [IPSEC]: Store xfrm states in security path directlyHerbert Xu2008-01-281-27/+15