[PATCH ipsec] xfrm: Ignore socket policies when rebuilding hash tables

2016-07-29 Thread Tobias Brunner
and sets thresholds seemingly before installing any socket policies. Fixes: 53c2e285f970 ("xfrm: Do not hash socket policies") Signed-off-by: Tobias Brunner <tob...@strongswan.org> --- net/xfrm/xfrm_policy.c | 4 1 file changed, 4 insertions(+) diff --git a/net/xfrm/xfrm_

[PATCH v2 net] macsec: Fix header length if SCI is added if explicitly disabled

2016-10-24 Thread Tobias Brunner
Signed-off-by: Tobias Brunner <tob...@strongswan.org> --- drivers/net/macsec.c | 26 ++ 1 file changed, 18 insertions(+), 8 deletions(-) diff --git a/drivers/net/macsec.c b/drivers/net/macsec.c index 3ea47f28e143..d2e61e002926 100644 --- a/drivers/net/macsec.c +++ b/driv

Re: [PATCH net] macsec: Fix header length if SCI is added if explicitily disabled

2016-10-24 Thread Tobias Brunner
> [snip] >> @@ -440,12 +448,12 @@ static void macsec_fill_sectag(struct >> macsec_eth_header *h, >> const struct macsec_secy *secy, u32 pn) >> { >> const struct macsec_tx_sc *tx_sc = >tx_sc; >> +bool sci_present = send_sci(secy); > > You're already computing

[PATCH net] macsec: Fix header length if SCI is added if explicitily disabled

2016-10-21 Thread Tobias Brunner
in the packet, while the SC flag in the TCI field of the Security Tag was still set, resulting in invalid MACsec frames. Signed-off-by: Tobias Brunner <tob...@strongswan.org> --- drivers/net/macsec.c | 22 -- 1 file changed, 16 insertions(+), 6 deletions(-) diff --git a/d

[PATCH net 1/2] esp4: Fix integrity verification when ESN are used

2016-11-29 Thread Tobias Brunner
When handling inbound packets, the two halves of the sequence number stored on the skb are already in network order. Fixes: 7021b2e1cddd ("esp4: Switch to new AEAD interface") Signed-off-by: Tobias Brunner <tob...@strongswan.org> --- net/ipv4/esp4.c | 2 +- 1 file changed, 1

[PATCH net 2/2] esp6: Fix integrity verification when ESN are used

2016-11-29 Thread Tobias Brunner
When handling inbound packets, the two halves of the sequence number stored on the skb are already in network order. Fixes: 000ae7b2690e ("esp6: Switch to new AEAD interface") Signed-off-by: Tobias Brunner <tob...@strongswan.org> --- net/ipv6/esp6.c | 2 +- 1 file changed, 1

[PATCH net-next] ipv6: Reinject IPv6 packets if IPsec policy matches after SNAT

2017-12-21 Thread Tobias Brunner
If SNAT modifies the source address the resulting packet might match an IPsec policy, reinject the packet if that's the case. The exact same thing is already done for IPv4. Signed-off-by: Tobias Brunner <tob...@strongswan.org> --- net/ipv6/ip6_output.c | 8 1 file changed, 8 inse