summaryrefslogtreecommitdiffstats
path: root/sys/netinet/ip_input.c
Commit message (Expand)AuthorAgeFilesLines
* Fix handling of packets which matched an "ipfw fwd" rule on the input side.luigi2002-08-031-0/+13
* When preserving the IP header in extra mbuf in the IP forwardingrwatson2002-08-021-0/+7
* Introduce support for Mandatory Access Control and extensiblerwatson2002-07-311-0/+17
* Warning fixes for 64 bits platforms. With this last fix,mux2002-06-271-1/+1
* Move some global variables in more appropriate places.luigi2002-06-231-3/+28
* fix bad indentation and whitespace resulting from cut&pasteluigi2002-06-231-7/+6
* Remove (almost all) global variables that were used to holdluigi2002-06-221-123/+101
* Back out my lats commit of locking down a socket, it conflicts with hsu's work.tanimura2002-05-311-4/+1
* - Change the newly turned INVARIANTS #ifdef blocks (they were changed fromarr2002-05-211-4/+3
* - Turn a #ifdef DIAGNOSTIC to #ifdef INVARIANTS as the code from this linearr2002-05-201-1/+1
* Lock down a socket, milestone 1.tanimura2002-05-201-1/+4
* s/demon/daemon/dd2002-05-121-1/+1
* Cleanup the interface to ip_fw_chk, two of the input argumentsluigi2002-05-091-12/+4
* Change callers of mtx_init() to pass in an appropriate lock type name. Injhb2002-04-041-1/+1
* Remove __P.alfred2002-03-191-7/+7
* Enforce inbound IPsec SPDjedgar2002-02-261-1/+11
* o Move NTOHL() and associated macros into <sys/param.h>. These aremike2002-02-181-8/+8
* The ipfw(8) 'tee' action simply hasn't worked on incoming packets forcjc2002-01-261-0/+3
* Initialise the intrq_present fields at runtime, not link time. This allowsmsmith2002-01-081-1/+1
* Don't reveal a router in the IPSTEALTH mode through IP options.yar2001-12-291-4/+41
* Fix ipfw fwd so that it acts as the docs sayjulian2001-12-281-5/+13
* minor style and whitespace fixes.jlemon2001-12-141-11/+12
* - Make ip_rtaddr() global, and use it to look up the correct sourceru2001-11-301-16/+17
* MFS: sync the ipfw/dummynet/bridge code with the one recently mergedluigi2001-11-041-5/+4
* Don't use the ip_timestamp structure to access timestamp options, as thejlemon2001-10-251-29/+22
* Make it so dummynet and bridge can be loaded as modules.ps2001-10-051-16/+6
* Add a hash table that contains the list of internet addresses, and usejlemon2001-09-291-17/+30
* Centralize satosin(), sintosa() and ifatoia() macros in <netinet/in.h>jlemon2001-09-291-3/+1
* Two main changes here:luigi2001-09-271-2/+2
* Make faith loadable, unloadable, and clonable.brooks2001-09-251-7/+3
* Wrap array accesses in macros, which also happen to be lvalues:jlemon2001-09-061-2/+2
* Patches from Keiichi SHIMA <keiichi@iij.ad.jp>julian2001-09-031-9/+7
* When net.inet.tcp.icmp_may_rst is enabled, report ECONNREFUSED not ENETRESETjesper2001-08-271-1/+1
* Add netstat(1) knob to reset net.inet.{ip|icmp|tcp|udp|igmp}.stats.ru2001-06-231-1/+1
* Sync with recent KAME.ume2001-06-111-13/+53
* Make the default value of net.inet.ip.maxfragpackets andjesper2001-06-101-2/+3
* Prevent denial of service using bogus fragmented IPv4 packets.jesper2001-06-031-0/+31
* Add ``options RANDOM_IP_ID'' which randomizes the ID field of IP packets.kris2001-06-011-0/+3
* Back out jesper's 2001/05/31 14:58:11 PDT commit. It does not compile.obrien2001-06-011-31/+0
* Prevent denial of service using bogus fragmented IPv4 packets.jesper2001-05-311-0/+31
* Invalidate cached forwarding route (ipforward_rt) whenever a new routeru2001-03-191-1/+1
* Make sure the cached forwarding route (ipforward_rt) is still up beforeru2001-03-181-19/+7
* <sys/queue.h> makeover.phk2001-03-161-33/+34
* It was possible for ip_forward() to supply to icmp_error()iedowse2001-03-081-7/+14
* Modify the comments to more closely resemble the English language.truckman2001-03-051-5/+4
* Move the loopback net check closer to the beginning of ip_input() so thattruckman2001-03-051-14/+26
* Disable interface checking for packets subject to "ipfw fwd".truckman2001-03-041-3/+4
* Disable interface checking when IP forwarding is engaged so that packetstruckman2001-03-041-10/+45
* Add a new sysctl net.inet.ip.check_interface, which will verify thatjlemon2001-03-021-1/+5
* When iterating over our list of interface addresses in order to determinejlemon2001-02-271-14/+18
OpenPOWER on IntegriCloud