summaryrefslogtreecommitdiffstats
path: root/net/xfrm/xfrm_user.c
AgeCommit message (Expand)AuthorFilesLines
2009-12-03net: Allow xfrm_user_net_exit to batch efficiently.Eric W. Biederman1-8/+10
2009-11-25xfrm: Store aalg in xfrm_state with a user specified truncation lengthMartin Willi1-8/+121
2009-01-20Revert "xfrm: For 32/64 compatability wrt. xfrm_usersa_info"David S. Miller1-9/+2
2009-01-14xfrm: For 32/64 compatability wrt. xfrm_usersa_infoDavid S. Miller1-2/+9
2008-12-14xfrm: join error pathsIlpo Järvinen1-10/+12
2008-11-25netns xfrm: per-netns sysctlsAlexey Dobriyan1-2/+2
2008-11-25netns xfrm: KM reporting in netnsAlexey Dobriyan1-3/+2
2008-11-25netns xfrm: pass netns with KM notificationsAlexey Dobriyan1-2/+4
2008-11-25netns xfrm: xfrm_user module in netnsAlexey Dobriyan1-31/+45
2008-11-25netns xfrm: per-netns NETLINK_XFRM socketAlexey Dobriyan1-35/+73
2008-11-25netns xfrm: policy walking in netnsAlexey Dobriyan1-1/+1
2008-11-25netns xfrm: finding policy in netnsAlexey Dobriyan1-4/+4
2008-11-25netns xfrm: policy flushing in netnsAlexey Dobriyan1-1/+1
2008-11-25netns xfrm: state walking in netnsAlexey Dobriyan1-1/+1
2008-11-25netns xfrm: finding states in netnsAlexey Dobriyan1-2/+2
2008-11-25netns xfrm: state lookup in netnsAlexey Dobriyan1-6/+6
2008-11-25netns xfrm: state flush in netnsAlexey Dobriyan1-1/+1
2008-11-25netns xfrm: add struct xfrm_policy::xp_netAlexey Dobriyan1-2/+2
2008-11-25netns xfrm: add struct xfrm_state::xs_netAlexey Dobriyan1-2/+2
2008-11-06Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller1-1/+1
2008-11-03XFRM: copy_to_user_kmaddress() reports local address twiceArnaud Ebalard1-1/+1
2008-10-28xfrm: Notify changes in UDP encapsulation via netlinkMartin Willi1-0/+52
2008-10-05xfrm: MIGRATE enhancements (draft-ebalard-mext-pfkey-enhanced-migrate)Arnaud Ebalard1-12/+45
2008-10-01ipsec: Put dumpers on the dump listHerbert Xu1-2/+2
2008-07-10xfrm: Add a XFRM_STATE_AF_UNSPEC flag to xfrm_usersa_infoSteffen Klassert1-2/+1
2008-05-21xfrm_user: Remove zero length key checks.David S. Miller1-11/+0
2008-04-28Audit: collect sessionid in netlink messagesEric Paris1-13/+28
2008-04-22[IPSEC]: Fix catch-22 with algorithm IDs above 31Herbert Xu1-0/+2
2008-04-14[XFRM]: Compilation warnings in xfrm_user.c.Denis V. Lunev1-4/+4
2008-04-14Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller1-1/+1
2008-04-12LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore1-16/+17
2008-04-09[XFRM]: xfrm_user: fix selector family initializationPatrick McHardy1-1/+1
2008-03-27Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/davem/...David S. Miller1-5/+2
2008-03-24[IPSEC]: Fix inter address family IPsec tunnel handling.Kazunori MIYAZAWA1-5/+2
2008-02-28[XFRM]: Speed up xfrm_policy and xfrm_state walkingTimo Teras1-28/+43
2008-02-14[XFRM]: Avoid bogus BUG() when throwing new policy away.YOSHIFUJI Hideaki1-0/+1
2008-01-31[IPSEC]: Add support for combined mode algorithmsHerbert Xu1-3/+68
2008-01-28[NETNS]: Consolidate kernel netlink socket destruction.Denis V. Lunev1-1/+1
2008-01-28[XFRM] xfrm_policy_destroy: Rename and relative fixes.WANG Cong1-1/+1
2008-01-28[IPSEC]: Make x->lastused an unsigned longHerbert Xu1-2/+2
2008-01-08[XFRM]: xfrm_algo_clone() allocates too much memoryEric Dumazet1-11/+6
2007-11-26[IPSEC]: Temporarily remove locks around copying of non-atomic fieldsHerbert Xu1-2/+0
2007-10-10[NET]: make netlink user -> kernel interface synchroniousDenis V. Lunev1-9/+4
2007-10-10[IPSEC]: Lock state when copying non-atomic fields to user-spaceHerbert Xu1-6/+8
2007-10-10[XFRM] user: Move attribute copying code into copy_to_user_state_extraHerbert Xu1-29/+47
2007-10-10[IPSEC]: Move common code into xfrm_alloc_spiHerbert Xu1-9/+4
2007-10-10[NETLINK]: Avoid pointer in netlink_run_queueHerbert Xu1-1/+1
2007-10-10[NET]: Support multiple network namespaces with netlinkEric W. Biederman1-1/+1
2007-10-10[XFRM]: xfrm audit callsJoy Latten1-13/+13
2007-10-10[XFRM] netlink: Inline attach_encap_tmpl(), attach_sec_ctx(), and attach_one_...Thomas Graf1-49/+17