summaryrefslogtreecommitdiff
path: root/sbin/isakmpd/sa.c
AgeCommit message (Collapse)Author
2002-11-21-Wshadow nits.Hakan Olsson
2002-09-08Fix -pedantic errors.Hakan Olsson
2002-06-10The dlopen() stuff goes away.Hakan Olsson
2002-06-09rm trailing whitespaceTodd T. Fries
2002-06-07typoHakan Olsson
2002-06-07Add 'ikecfg' as a valid Flags= value.Hakan Olsson
2002-06-06styleHakan Olsson
2002-06-06Style, and a few additional format/type mods.Hakan Olsson
2002-06-01size_t must be cast to (unsigned long) and printed using %luTheo de Raadt
2002-05-28Proper types in format strings. From <greg@nest.cx>Hakan Olsson
2002-05-23One last sprintf -> snprintf, requested by deraadt.Hakan Olsson
2002-03-17Move SA_FILE definition to sa.h.Angelos D. Keromytis
2002-03-17Add 'T' and 'S' commands (for tearing-down and reporting all Phase 2Angelos D. Keromytis
SAs), from bdallen@nps.navy.mil
2002-01-25no static for sa_dump, explicit log cls/levelHakan Olsson
2001-11-21%qd -> %llu in a couple of other placesHakan Olsson
2001-11-21Have sa_dump() also print SA lifetimes (for /var/run/isakmpd.report).Hakan Olsson
2001-10-26Change to use sysdep_sa_len() function.Hakan Olsson
2001-08-15Some more style...Hakan Olsson
2001-07-05Add prototypes and some other various cleanup.Hakan Olsson
2001-07-01StyleNiklas Hallqvist
2001-06-29Change get_src/get_dst API as we get the length with sa_len.Hakan Olsson
2001-06-29A few more direct sa_len usages.Hakan Olsson
2001-06-07Correctly initialize the policy_id field on SA structures, such thatAngelos D. Keromytis
failed SAs don't cause the default policy context to be free'ed (and thus cause no end of trouble in establishing further Phase 1 SAs)
2001-05-31Appropriately release the cert and key fields in the SA structure on free.Angelos D. Keromytis
2001-04-24Correct SA refcounting. Fixes a bug where isakmpd could die when a peer wasNiklas Hallqvist
discovered to have rebooted, and old now invalid SAs had to be garbage- collected.
2001-04-09More style fixes...Hakan Olsson
2001-03-06Print the name of the marked SA (if available).Angelos D. Keromytis
2001-02-24Make DES a feature, so isakmpd can compile on Linux (most of the fixedAngelos D. Keromytis
by newsham@lava.net)
2001-01-27(c) 2001Niklas Hallqvist
2001-01-26Pedantic style policeNiklas Hallqvist
2001-01-22Fix memory leak on exchange free.Angelos D. Keromytis
2001-01-14Handling of Phase 1 DELETE and Phase 2 INVALID_SPI messagesAngelos D. Keromytis
(newsham@lava.net)
2000-12-12Merge with EOM 1.112Niklas Hallqvist
author: niklas style author: angelos Don't limit Phase 1 SA establishment -- while this does limit resource consumption, it's neither foolproof nor entirely correct (it introduces some synchronization problems).
2000-10-16Merge with EOM 1.110Niklas Hallqvist
author: provos better referencing. okay niklas@ author: niklas Allow new and old style configuration simultaneously
2000-08-03Merge with EOM 1.108Niklas Hallqvist
author: niklas remove unnecessary include
2000-08-03Merge with EOM 1.107Niklas Hallqvist
author: provos provide transport dependent ID decoding; hope indentation is right now ;) author: provos make a DOI specific decode_ids, but have isakmp doi decode point to ipsec. author: provos introduce ipsec_decode_ids, also decodes FQDN and USER_FQDN now. new ipsec_clone_id to copy IDs to phase 2 SAs for better status reports. okay angelos@
2000-06-08Merge with EOM 1.104Niklas Hallqvist
author: angelos Allow exchange of KeyNote credentials over IKE. Multiple credentials may be passed in a single CERT payload. KeyNote is used if a directory named as the local ID we use in an exchange exists in the KeyNote directory (default: /etc/isakmpd/keynote/). Note that asymmetric credentials are possible (use KeyNote in one direction and X509 in the other); such authentication is envisioned to be the most common: the clients will use KeyNote credentials to authenticate and authorize with a server, whilst the server will just provide an X509 certificate proving its binding to the IP address or ID. Totally asymmetric authentication (e.g., shared key in one direction, RSA in the other) is not supported by the IKE protocol. author: angelos Cleanup.
2000-05-02Merge with EOM 1.102Niklas Hallqvist
author: provos fix arguments in debug message for sa_setup_expirations
2000-04-07conf.c: Merge with EOM 1.22Niklas Hallqvist
gmp_util.c: Merge with EOM 1.5 gmp_util.h: Merge with EOM 1.3 math_mp.h: Merge with EOM 1.2 sa.c: Merge with EOM 1.101 ui.c: Merge with EOM 1.40 author: niklas (c) 2000
2000-04-07conf.c: Merge with EOM 1.21Niklas Hallqvist
isakmpd.c: Merge with EOM 1.46 sa.c: Merge with EOM 1.100 ui.c: Merge with EOM 1.39 author: niklas error message style
2000-02-25regress/crypto/Makefile: Merge with EOM 1.5Niklas Hallqvist
regress/dh/Makefile: Merge with EOM 1.7 regress/group/Makefile: Merge with EOM 1.9 regress/prf/Makefile: Merge with EOM 1.4 regress/rsakeygen/Makefile: Merge with EOM 1.8 regress/x509/Makefile: Merge with EOM 1.10 Makefile: Merge with EOM 1.62 attribute.c: Merge with EOM 1.10 sa.c: Merge with EOM 1.99 conf.c: Merge with EOM 1.20 crypto.c: Merge with EOM 1.28 isakmpd.c: Merge with EOM 1.45 connection.c: Merge with EOM 1.19 doi.h: Merge with EOM 1.28 field.c: Merge with EOM 1.11 exchange.c: Merge with EOM 1.116 ike_auth.c: Merge with EOM 1.44 pf_key_v2.c: Merge with EOM 1.37 ike_phase_1.c: Merge with EOM 1.22 ipsec.c: Merge with EOM 1.118 isakmp_doi.c: Merge with EOM 1.40 log.c: Merge with EOM 1.26 log.h: Merge with EOM 1.18 math_group.c: Merge with EOM 1.23 message.c: Merge with EOM 1.144 pf_encap.c: Merge with EOM 1.70 policy.c: Merge with EOM 1.18 timer.c: Merge with EOM 1.13 transport.c: Merge with EOM 1.41 udp.c: Merge with EOM 1.47 ui.c: Merge with EOM 1.37 x509.c: Merge with EOM 1.36 author: niklas Made debug logging a compile time selectable feature
2000-02-01apps/certpatch/certpatch.8: Merge with EOM 1.4Niklas Hallqvist
apps/certpatch/certpatch.c: Merge with EOM 1.6 exchange.c: Merge with EOM 1.114 ike_quick_mode.c: Merge with EOM 1.110 ike_phase_1.c: Merge with EOM 1.16 ike_auth.c: Merge with EOM 1.41 ike_aggressive.c: Merge with EOM 1.4 libcrypto.c: Merge with EOM 1.10 libcrypto.h: Merge with EOM 1.10 isakmpd.8: Merge with EOM 1.19 isakmpd.c: Merge with EOM 1.42 ipsec.h: Merge with EOM 1.40 init.c: Merge with EOM 1.22 message.c: Merge with EOM 1.143 message.h: Merge with EOM 1.49 sa.c: Merge with EOM 1.98 sa.h: Merge with EOM 1.54 policy.c: Merge with EOM 1.14 pf_key_v2.c: Merge with EOM 1.36 x509.c: Merge with EOM 1.32 x509.h: Merge with EOM 1.9 udp.c: Merge with EOM 1.46 author: niklas Angelos copyrights
1999-08-26ike_phase_1.c: Merge with EOM 1.8Niklas Hallqvist
message.c: Merge with EOM 1.135 message.h: Merge with EOM 1.48 sa.c: Merge with EOM 1.97 sa.h: Merge with EOM 1.53 author: angelos Complete policy work; tested for the shared-key case. Documentation needed.
1999-07-07Merge with EOM 1.96Niklas Hallqvist
author: ho We no longer use flag "Stayalive"
1999-06-02Merge with EOM 1.95Niklas Hallqvist
author: niklas Some extra error checking, documentation and style wrt connections author: ho New flag author: niklas SA expiration randomization is really only good on the soft timeout, early hard expires may break more if we have a situation where our peer only wants to act as initiator, and trusts the negotiated lifetime.
1999-05-14Merge with EOM 1.92Niklas Hallqvist
author: ho seconds should have initial value
1999-05-06Merge with EOM 1.91Niklas Hallqvist
author: niklas Do not decrease SA lifetime if we cannot act as initiator
1999-05-01TO-DO: Merge with EOM 1.36Niklas Hallqvist
sa.c: Merge with EOM 1.90 message.c: Merge with EOM 1.131 message.h: Merge with EOM 1.47 author: niklas Send DELETE payloads in informational exchanges
1999-04-30Merge with EOM 1.89Niklas Hallqvist
author: niklas Do not put multiple expirations on a single SA
1999-04-27sa.c: Merge with EOM 1.88Niklas Hallqvist
sa.h: Merge with EOM 1.51 author: niklas Handle leftover payloads, esp INITIAL CONTACT notifications. Factor out SA expiration setting. Add commentary. author: ho Keep track of trailing retransmissions by keeping exchanges around longer. Removed references to sa->last_sent_in_setup, use last_sent and last_received in exchange instead. Free setup exchanges by expiration only. author: ho Backout last change. (Go with exchange directly instead of sa->msg) author: ho Handle phase 2 late retransmissions.