linux/net/xfrm
Herbert Xu b2aa5e9d43 [IPSEC]: Store xfrm states in security path directly
As it is xfrm_input first collects a list of xfrm states on the stack
before storing them in the packet's security path just before it
returns.  For async crypto, this construction presents an obstacle
since we may need to leave the loop after each transform.

In fact, it's much easier to just skip the stack completely and always
store to the security path.  This is proven by the fact that this
patch actually shrinks the code.

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-01-28 14:53:50 -08:00
..
Kconfig [PFKEYV2]: CONFIG_NET_KEY_MIGRATE option 2007-02-08 13:15:05 -08:00
Makefile [IPSEC]: Move common output code to xfrm_output 2007-10-10 16:54:53 -07:00
xfrm_algo.c cleanup asm/scatterlist.h includes 2007-11-02 08:47:06 +01:00
xfrm_hash.c [IPSEC]: Don't warn if high-order hash resize fails 2007-05-14 02:19:11 -07:00
xfrm_hash.h [XFRM] STATE: Use destination address for src hash. 2006-10-04 00:31:02 -07:00
xfrm_input.c [IPSEC]: Store xfrm states in security path directly 2008-01-28 14:53:50 -08:00
xfrm_output.c [IPSEC]: Add async resume support on output 2008-01-28 14:53:49 -08:00
xfrm_policy.c [IPSEC]: Merge common code into xfrm_bundle_create 2008-01-28 14:53:43 -08:00
xfrm_state.c [NET]: Convert init_timer into setup_timer 2008-01-28 14:53:35 -08:00
xfrm_user.c [XFRM]: xfrm_algo_clone() allocates too much memory 2008-01-08 23:39:06 -08:00