- 30 May, 2021 22 commits
-
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Antonin Décimo authored
Introduced by 3b3813fad09eb694a508789394679b6d3378d472.
-
Antonin Décimo authored
It wasn't consistent with the naming of other option. The option is phrased positively to match the Information Model (babel-mac-verify). Thanks to Julien Muchembled for finding a bug in a previous version of this commit.
-
Antonin Décimo authored
-
Julien Muchembled authored
Nodes with default mac-verify would not accept packets from nodes with non-default mac-verify. Co-authored-by: Julien Muchembled <jm@jmuchemb.eu> Co-authored-by: Antonin Décimo <antonin.decimo@gmail.com>
-
Antonin Décimo authored
Don’t call `start_message()` since it may cause an infinite loop.
-
Antonin Décimo authored
The exact narration is implemented, with all the specified optimisations. - neighbour creation is delayed; - if multiple PCs are found, only the first one is processed, the remaining ones are be silently ignored; - a node ignores all challenge requests contained in a packet except the last one; - and it ignores a challenge request in the case where it is contained in a packet with an Index that matches the one in the Neighbour Table and a PC that is smaller or equal to the one contained in the Neighbour Table.
-
Antonin Décimo authored
s/crypto seqno/pc/g s/challenge response/challenge reply/g s/challenge req/challenge request/g
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Antonin Décimo authored
Macros starting with __ are reserved for the implementation, it should not appear in code.
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Juliusz Chroboczek authored
-
- 20 May, 2021 16 commits
-
-
Juliusz Chroboczek authored
We used to accept packets signed by any key.
-
Etienne MARAIS authored
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
This was completely wrong.
-
Juliusz Chroboczek authored
Also rename DIGEST_LEN to MAX_DIGEST_LEN.
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
Antonin Décimo authored
-
Antonin Décimo authored
-
Etienne MARAIS authored
Flag to allow empty or wrong hmac in the packet trailer.
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
Known issues: - we create a neighbour entry before the first successful challenge; - we compute HMAC for each HMAC TLV rather than just once; - we only support sending one HMAC TLV; - we don't support key rotation. Co-authored-by: Clara Do <clarado_perso@yahoo.fr> Co-authored-by: Weronika Kolodziejak <weronika.kolodziejak@gmail.com>
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
Juliusz Chroboczek authored
-
- 25 Apr, 2021 1 commit
-
-
Juliusz Chroboczek authored
-
- 24 Apr, 2021 1 commit
-
-
Antonin Décimo authored
This is triggered when flushing an interface. 4 bytes in 1 blocks are definitely lost in loss record 1 of 6 at 0x483A77F: malloc (vg_replace_malloc.c:307) by 0x11155E: check_interface_ipv4 (interface.c:161) by 0x110FCD: interface_updown (interface.c:460) by 0x1116E2: check_interfaces (interface.c:550) by 0x10AFAA: main (babeld.c:546)
-