- 07 Sep, 2022 1 commit
-
-
Julien Muchembled authored
src-prefix is about the 'from' option in ip-route. When the action value matches exactly the source prefix of the route to install, the latter is cleared at install. Otherwise, the route is not installed at all. The purpose is mainly to provide a fallback for routers without support of source-specific routes: only one route is kept, to a router that will be able to route correctly. TODO: man page
-
- 02 Sep, 2022 1 commit
-
-
Julien Muchembled authored
Commit a62b7c9b was broken in that 2 nodes with same id/hmac settings could not communicate when 1 of the 2 has no_hmac_verify.
-
- 31 Oct, 2019 4 commits
-
-
Julien Muchembled authored
-
Julien Muchembled authored
-
Cédric Le Ninivin authored
To be pushed upstream. Co-authored-by: Julien Muchembled <jm@nexedi.com>
-
Cédric Le Ninivin authored
TODO: documentation To be pushed upstream. Co-authored-by: Julien Muchembled <jm@nexedi.com>
-
- 20 Aug, 2019 1 commit
-
-
Juliusz Chroboczek authored
-
- 19 Aug, 2019 1 commit
-
-
Dave Taht authored
-
- 18 Aug, 2019 1 commit
-
-
Juliusz Chroboczek authored
This would cause an assertion failure whenever we sent a Unicast Hello. Thanks to Dave Taht.
-
- 10 Aug, 2019 7 commits
-
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
We used to accept packets signed by any key.
-
Etienne MARAIS authored
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
This was completely wrong.
-
Juliusz Chroboczek authored
Also rename DIGEST_LEN to MAX_DIGEST_LEN.
-
Juliusz Chroboczek authored
-
- 07 Aug, 2019 1 commit
-
-
Christof Schulze authored
* clarify code flow, only checking for future state once * clarify error messages when MTU is guessed by including the MTU value
-
- 05 Aug, 2019 12 commits
-
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Etienne MARAIS authored
Flag to allow empty or wrong hmac in the packet trailer.
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
Known issues: - we create a neighbour entry before the first successful challenge; - we compute HMAC for each HMAC TLV rather than just once; - we only support sending one HMAC TLV; - we don't support key rotation. Co-authored-by: Clara Do <clarado_perso@yahoo.fr> Co-authored-by: Weronika Kolodziejak <weronika.kolodziejak@gmail.com>
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
- 04 Aug, 2019 1 commit
-
-
Juliusz Chroboczek authored
As suggested by Christof Schulze.
-
- 26 Jul, 2019 9 commits
-
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
It's a minor optimisation, but it makes me happy.
-
Juliusz Chroboczek authored
If no Hello has been buffered yet, insert an unscheduled Hello. This only works if rfc6126-compatible is false.
-
Juliusz Chroboczek authored
This just implements the sending functions, it doesn't actually do anything with them yet.
-
Juliusz Chroboczek authored
This fixes the case where a neighbour only sends unscheduled Hellos.
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
Incorrect message size when neighbour is not link-local.
-
Juliusz Chroboczek authored
Now that we have sub-TLVs and crypto keys, the previous value is no longer suitable.
-
- 25 Jul, 2019 1 commit
-
-
Christof Schulze authored
-