summaryrefslogtreecommitdiffstats
path: root/sys/netinet6/esp_input.c
Commit message (Collapse)AuthorAgeFilesLines
* - m_cat() may free the mbuf on 2nd arg, so m_pkthdr manipulation hasume2003-11-151-8/+6
| | | | | | | | to happen before the call to m_cat(). - correct signedness mixups. - remove variable that is only assigned too but not referenced. Obtained from: KAME
* correct stat to increment.ume2003-10-311-1/+1
| | | | Obtained from: KAME
* add ECN support in layer-3.ume2003-10-291-2/+8
| | | | | | | | | - implement the tunnel egress rule in ip_ecn_egress() in ip_ecn.c. make ip{,6}_ecn_egress() return integer to tell the caller that this packet should be dropped. - handle ECN at fragment reassembly in ip_input.c and frag6.c. Obtained from: KAME
* more strict sanity check for ESP tailsuz2003-10-221-1/+1
| | | | Obtained from: KAME
* - fix typo in comment.ume2003-10-071-11/+3
| | | | | | - style. Obtained from: KAME
* Update netisr handling; Each SWI now registers its queue, and all queuejlemon2003-03-041-4/+2
| | | | | | | | | | drain routines are done by swi_net, which allows for better queue control at some future point. Packets may also be directly dispatched to a netisr instead of queued, this may be of interest at some installations, but currently defaults to off. Reviewed by: hsu, silby, jayanth, sam Sponsored by: DARPA, NAI Labs
* Back out M_* changes, per decision of the TRB.imp2003-02-191-3/+3
| | | | Approved by: trb
* Remove M_TRYWAIT/M_WAITOK/M_WAIT. Callers should use 0.alfred2003-01-211-3/+3
| | | | Merge M_NOWAIT/M_DONTWAIT into a single flag M_NOWAIT.
* don't reference a pkthdr after M_MOVE_PKTHDR has "remove it"; insteadsam2003-01-061-6/+4
| | | | | | reference the pkthdr now in the destination of the move Sponsored by: Vernier Networks
* Correct mbuf packet header propagation. Previously, packet headerssam2002-12-301-2/+1
| | | | | | | | | | | | | | | | | | | | | | were sometimes propagated using M_COPY_PKTHDR which actually did something between a "move" and a "copy" operation. This is replaced by M_MOVE_PKTHDR (which copies the pkthdr contents and "removes" it from the source mbuf) and m_dup_pkthdr which copies the packet header contents including any m_tag chain. This corrects numerous problems whereby mbuf tags could be lost during packet manipulations. These changes also introduce arguments to m_tag_copy and m_tag_copy_chain to specify if the tag copy work should potentially block. This introduces an incompatibility with openbsd which we may want to revisit. Note that move/dup of packet headers does not handle target mbufs that have a cluster bound to them. We may want to support this; for now we watch for it with an assert. Finally, M_COPYFLAGS was updated to include M_FIRSTFRAG|M_LASTFRAG. Supported by: Vernier Networks Reviewed by: Robert Watson <rwatson@FreeBSD.org>
* check packet length before fetching ESP crypto checksum.ume2002-08-241-0/+8
| | | | | Obtained from: KAME MFC after: 2 days
* fixed to make mbuf chain.ume2002-07-181-1/+1
| | | | | Obtained from: KAME MFC after: 1 week
* just merged cosmetic changes from KAME to ease sync between KAME and FreeBSD.suz2002-04-191-26/+10
| | | | | | | (based on freebsd4-snap-20020128) Reviewed by: ume MFC after: 1 week
* Corrected arguments to key_allocsa called fromume2002-03-251-4/+6
| | | | | | | | {esp6, ah6}_ctlinput. Previous ones were uninitialized auto variables, which were completely bogus. Obtained from: KAME MFC after: 1 week
* Fix another boatload of warnings (missing include) and a cosmeticpeter2002-02-281-0/+2
| | | | -Wuninitialized warning.
* Patches from KAME to remove usage of Varargs in existingjulian2001-09-071-13/+4
| | | | | | | IPV4 code. For now they will still have some in the developing stuff (IPv6) Submitted by: Keiichi SHIMA / <keiichi@iij.ad.jp> Obtained from: KAME
* Patches from Keiichi SHIMA <keiichi@iij.ad.jp>julian2001-09-031-4/+3
| | | | | | to make ip use the standard protosw structure again. Obtained from: Well, KAME I guess.
* Sync with recent KAME.ume2001-06-111-36/+228
| | | | | | | | | | | | | | | | | | This work was based on kame-20010528-freebsd43-snap.tgz and some critical problem after the snap was out were fixed. There are many many changes since last KAME merge. TODO: - The definitions of SADB_* in sys/net/pfkeyv2.h are still different from RFC2407/IANA assignment because of binary compatibility issue. It should be fixed under 5-CURRENT. - ip6po_m member of struct ip6_pktopts is no longer used. But, it is still there because of binary compatibility issue. It should be removed under 5-CURRENT. Reviewed by: itojun Obtained from: KAME MFC after: 3 weeks
* Lock down the network interface queues. The queue mutex must be obtainedjlemon2000-11-251-11/+4
| | | | | | | | | | | | | | before adding/removing packets from the queue. Also, the if_obytes and if_omcasts fields should only be manipulated under protection of the mutex. IF_ENQUEUE, IF_PREPEND, and IF_DEQUEUE perform all necessary locking on the queue. An IF_LOCK macro is provided, as well as the old (mutex-less) versions of the macros in the form _IF_ENQUEUE, _IF_QFULL, for code which needs them, but their use is discouraged. Two new macros are introduced: IF_DRAIN() to drain a queue, and IF_HANDOFF, which takes care of locking/enqueue, and also statistics updating/start if necessary.
* add missing splx(), when outgoing interface queue is full on tunnelleditojun2000-08-161-0/+2
| | | | IPsec packet output. KAME PR 280.
* sync with kame tree as of july00. tons of bug fixes/improvements.itojun2000-07-041-391/+222
| | | | | | | API changes: - additional IPv6 ioctls - IPsec PF_KEY API was changed, it is mandatory to upgrade setkey(8). (also syntax change)
* Remove unneeded #include <sys/kernel.h>phk2000-04-291-1/+0
|
* Remove ~25 unneeded #include <sys/conf.h>phk2000-04-191-1/+0
| | | | Remove ~60 unneeded #include <sys/malloc.h>
* IPSEC support in the kernel.shin1999-12-221-0/+984
pr_input() routines prototype is also changed to support IPSEC and IPV6 chained protocol headers. Reviewed by: freebsd-arch, cvs-committers Obtained from: KAME project
OpenPOWER on IntegriCloud