<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/include/linux/jhash.h, branch v2.6.27.8</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.27.8</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.27.8'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2007-04-26T05:25:52Z</updated>
<entry>
<title>[JHASH]: Use const in jhash2</title>
<updated>2007-04-26T05:25:52Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2007-03-14T23:42:29Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=8e87e014ec881ce353e1f43340157f519b5d9f30'/>
<id>urn:sha1:8e87e014ec881ce353e1f43340157f519b5d9f30</id>
<content type='text'>
Use const to avoid forcing users to cast const data.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[JHASH]: Make key arg const in jhash().</title>
<updated>2004-02-26T03:50:43Z</updated>
<author>
<name>Simon Horman</name>
<email>horms@verge.net.au</email>
</author>
<published>2004-02-26T03:50:43Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d46067dc2a2545bd715f39e82981bbd631492ac2'/>
<id>urn:sha1:d46067dc2a2545bd715f39e82981bbd631492ac2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[NET]: Cosmetic cleanups of jhash code.</title>
<updated>2003-05-03T03:01:33Z</updated>
<author>
<name>James Morris</name>
<email>jmorris@intercode.com.au</email>
</author>
<published>2003-05-03T03:01:33Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=df5432ba285560e807afdf607643a7fadbf3727a'/>
<id>urn:sha1:df5432ba285560e807afdf607643a7fadbf3727a</id>
<content type='text'>
- Consistent naming (i.e. jhash_xxx)
- Reduces the 2&amp;1 word variants to call jhash_3words()
- Replaces __inline__ with inline.
</content>
</entry>
<entry>
<title>[NET]: Fix hashing exploits in ipv4 routing, IP conntrack, and TCP synq.</title>
<updated>2003-05-02T17:43:27Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@nuts.ninka.net</email>
</author>
<published>2003-05-02T17:43:27Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=8b1309d93d3b3bd413567a76dbe0ba0a23814dd6'/>
<id>urn:sha1:8b1309d93d3b3bd413567a76dbe0ba0a23814dd6</id>
<content type='text'>
Several hash table implementations in the networking were
remotely exploitable.  Remote attackers could launch attacks
whereby, using carefully choosen forged source addresses, make
every routing cache entry get hashed into the same hash chain.

Netfilter's IP conntrack module and the TCP syn-queue implementation
had identical vulnerabilities and have been fixed too.

The choosen solution to the problem involved using Bob's Jenkins
hash along with a randomly choosen input.  For the ipv4 routing
cache we take things one step further and periodically choose a
new random secret.  By default this happens every 10 minutes, but
this is configurable by the user via sysctl knobs.
</content>
</entry>
</feed>
