christos
e4e2331f07
fixed uninitialized variable
2003-10-25 08:27:12 +00:00
itojun
e6d129819b
update m_pkthdr.len
2003-10-13 08:55:59 +00:00
itojun
ec5e739b46
extra blank line
2003-09-23 00:03:05 +00:00
itojun
cd71ebe2f7
mark security policy that should persist in the system "persistent".
...
this should prevent recently-reported kernel panic when "spdflush" is issued.
2003-09-22 04:47:43 +00:00
itojun
17dc15d92a
unifdef -UFAST_IPSEC
2003-09-20 05:12:45 +00:00
itojun
782cbb14c5
2^n hash table is better in the kernel. advise by perry@netbsd
2003-09-14 07:30:32 +00:00
itojun
d669285a77
use prime number to hash SPI
2003-09-14 03:11:31 +00:00
itojun
72bcf50f26
no need for netipsec/key*, they are almost identical to netkey/key*
2003-09-12 11:09:32 +00:00
itojun
6371ddf557
make it possible to SADB_DUMP via sysctl. request by mrg
2003-09-12 07:38:10 +00:00
itojun
49fa1efdc6
remove #define for bsdi
2003-09-12 00:27:59 +00:00
itojun
14756c7d6d
kill unneeded variable
2003-09-12 00:10:25 +00:00
itojun
c1ae398301
correct hashed SPI lookup. reported by Greg Troxel
2003-09-09 21:58:26 +00:00
itojun
8ca90bd4e4
add /kern/ipsecsa and /kern/ipsecsp, which can be inspected by setkey(8).
...
it allows easier access to ipsecsa/sp. it works around problem where
setkey -D does not work with large number of ipsec SAs due to socket buffer
size.
2003-09-08 06:51:53 +00:00
itojun
bc1d89af4f
splsoftnet in key_setspi
2003-09-08 01:55:09 +00:00
itojun
fdbe07d467
revisit spihash logic
2003-09-07 20:41:27 +00:00
itojun
800fe5d178
- prepare for RFC2401bis 64bit sequence number (no behavior change yet)
...
- use hash for SPI-based SAD entry lookup (should be faster, i hope)
- cleanup keydb.c and key.c. key.c is responsible for refcounting secasvar,
keydb.c is responsible for alloc/free.
2003-09-07 15:59:36 +00:00
itojun
52f8075c5a
allow userland to specify SPD ID. more readable debugging messages.
2003-08-22 06:22:21 +00:00
itojun
80e0659dae
KNF
2003-08-22 06:21:09 +00:00
itojun
616adf38ee
backout; committed by mistake
2003-08-22 05:48:27 +00:00
itojun
190b098134
do not quit from key_sendup() even if writes to non-target socket fails.
...
from SEIL team
2003-08-22 05:46:37 +00:00
itojun
8453a28003
fixed that the kernel crashed when key_spdacquire() was called
...
because key_spdacquire() had been implemented imcopletely.
sync w/kame
2003-07-25 09:04:48 +00:00
itojun
da7d7203a8
fix comments, style
2003-07-22 11:12:15 +00:00
itojun
8f4ef7c537
clear enc/auth key before freeing
2003-07-22 11:01:09 +00:00
itojun
0d84200c22
clear scheduled key before freeing, for safety
2003-07-22 08:54:27 +00:00
fvdl
d5aece61d6
Back out the lwp/ktrace changes. They contained a lot of colateral damage,
...
and need to be examined and discussed more.
2003-06-29 22:28:00 +00:00
simonb
d1c5820781
malloc() returns "void *", we don't need to cast the return value.
2003-06-28 14:33:39 +00:00
darrenr
960df3c8d1
Pass lwp pointers throughtout the kernel, as required, so that the lwpid can
...
be inserted into ktrace records. The general change has been to replace
"struct proc *" with "struct lwp *" in various function prototypes, pass
the lwp through and use l_proc to get the process pointer when needed.
Bump the kernel rev up to 1.6V
2003-06-28 14:20:43 +00:00
itojun
7a78321a15
tighten sanity check on ipsec policy. sync w/kame
2003-06-16 08:11:03 +00:00
thorpej
b193480908
Add extensible malloc types, adapted from FreeBSD. This turns
...
malloc types into a structure, a pointer to which is passed around,
instead of an int constant. Allow the limit to be adjusted when the
malloc type is defined, or with a function call, as suggested by
Jonathan Stone.
2003-02-01 06:23:35 +00:00
itojun
177ed24b8b
allocate route_in6 in struct secashead, to avoid mistakenly overrun
...
the end of secashead. Fixes PR18751.
2003-01-08 05:46:49 +00:00
itojun
a02a0a383e
don't permit port spec on tunnel mode policy. sync w/kame.
2002-12-09 03:20:45 +00:00
lukem
0635de35a3
Remove KDIR=, since SYS_INCLUDE=symlinks and KDIR are not supported any more.
2002-11-26 23:30:07 +00:00
perry
4f27ab21b8
/*CONTCOND*/ while (0)'ed macros
2002-11-02 07:30:55 +00:00
dan
73aa8b3b5b
warn about the arc4 generator if no NRND, but still use it
2002-10-07 00:40:15 +00:00
tls
0f95ec4fd5
ESP output was drawing down the entropy pool at a ferocious rate, a
...
particular problem on hosts with only wireless interfaces that are
definitely not safe to use as entropy sources.
Add arc4randbytes() which hands out bytes from the same source used
by arc4random(). This is intended to be a _temporary_ interface
until we can design and implement a better general PRNG interface
that is decoupled from the entropy-pool implementation.
Modify key_randomfill() (used only for initialization vectors on
SA creation and via key_sa_stir_iv(), which does not "stir",
despite its name) to use arc4randbytes() instead of pulling bits
directly from the entropy pool. It is my hope that this change
will pose minimal integration problems for the KAME folks as the
random-pool interface is *already* different between each BSD
variant; this just simplifies the NetBSD case and solves a
fairly serious problem.
Note that it is generally considered acceptable cryptographic
practice to use a fast stream cipher to generate IVs for encryption
with stronger block ciphers. For example, the use of "non-Approved"
PRNGs to generate IVs for "Approved" block ciphers is explicitly
sanctioned by FIPS 140-2.
2002-10-06 08:51:44 +00:00
itojun
61da54e3c0
port spec is not permitted to tunnel mode policy, as we don't reassemble
...
fragments. perform more strict check against af match for tunnels. sync w/kame
2002-10-04 05:45:22 +00:00
provos
0f09ed48a5
remove trailing \n in panic(). approved perry.
2002-09-27 15:35:29 +00:00
itojun
01965cd2e0
fix signed/unsigned pointer mixup
2002-09-23 13:43:42 +00:00
itojun
9401012487
KNF - return is not a function. sync w/kame.
2002-09-11 02:46:42 +00:00
itojun
6dedde045a
correct signedness mixup in pointer passing. sync w/kame
2002-09-11 02:41:19 +00:00
itojun
88122ef746
should return error code from key_senderror(). sync w/kame
2002-08-20 08:17:02 +00:00
itojun
ccc183b4d1
fixed that the incorrect time was set to sadb_comb_{hard|soft}_usetime.
...
sync w/kame
2002-08-20 06:20:26 +00:00
itojun
2169d69bcf
correct %d/%u mismatch. sync w/kame
2002-06-27 14:39:45 +00:00
itojun
c1808f02bf
cache pcb policy as much as possible. in fact, if policy is not
...
IPSEC_POLICY_IPSEC we don't need to compare spidx. sync w/kame
2002-06-14 14:47:24 +00:00
itojun
dc96111483
deep-copy pcb policy if it is an ipsec policy. assign ID field to all
...
SPD entries. make it possible for racoon to grab SPD entry on pcb
(racoon side needs some changes). sync w/kame
2002-06-12 17:56:45 +00:00
itojun
cc8fe8c179
make function static
2002-06-12 03:46:16 +00:00
itojun
bad1f500a7
remove unused functions
2002-06-12 03:37:14 +00:00
itojun
3489976392
do not copy policy-on-socket at all. avoid copying packet header value to
...
struct spindex. should reduce memory usage per socket/pcb, and should speedup
ipsec processing. sync w/kame
2002-06-12 01:47:34 +00:00
itojun
fa53d749ff
share policy-on-pcb for listening socket. sync w/kame
...
todo: share even more, avoid frequent updates of spidx
2002-06-11 19:39:59 +00:00
itojun
52d0ba15c8
reduce unneeded #ifdef
2002-05-30 05:51:21 +00:00