Re: [PATCH V2 ipsec-next 0/2] xfrm: bug fixes when processing multiple transforms

2018-09-05 Thread Steffen Klassert
On Mon, Sep 03, 2018 at 04:36:51AM -0700, Sowmini Varadhan wrote:
> This series contains bug fixes that were encountered when I set
> up a libreswan tunnel using the config below, which will set up
> an IPsec policy involving 2 tmpls.
> 
> type=transport
> compress=yes
> esp=aes_gcm_c-128-null # offloaded to Niantic
> auto=start
> 
> The non-offload test case uses  esp=aes_gcm_c-256-null.
> 
> Each patch has a technical description of the contents of the fix.
> 
> V2: added Fixes tag so that it can be backported to the stable trees.
> 
> Sowmini Varadhan (2):
>   xfrm: reset transport header back to network header after all input
> transforms ahave been applied
>   xfrm: reset crypto_done when iterating over multiple input xfrms

All applied to the ipsec tree, thanks a lot Sowmini!


[PATCH V2 ipsec-next 0/2] xfrm: bug fixes when processing multiple transforms

2018-09-03 Thread Sowmini Varadhan
This series contains bug fixes that were encountered when I set
up a libreswan tunnel using the config below, which will set up
an IPsec policy involving 2 tmpls.

type=transport
compress=yes
esp=aes_gcm_c-128-null # offloaded to Niantic
auto=start

The non-offload test case uses  esp=aes_gcm_c-256-null.

Each patch has a technical description of the contents of the fix.

V2: added Fixes tag so that it can be backported to the stable trees.

Sowmini Varadhan (2):
  xfrm: reset transport header back to network header after all input
transforms ahave been applied
  xfrm: reset crypto_done when iterating over multiple input xfrms

 net/ipv4/xfrm4_input.c  |1 +
 net/ipv4/xfrm4_mode_transport.c |4 +---
 net/ipv6/xfrm6_input.c  |1 +
 net/ipv6/xfrm6_mode_transport.c |4 +---
 net/xfrm/xfrm_input.c   |1 +
 5 files changed, 5 insertions(+), 6 deletions(-)