summaryrefslogtreecommitdiff
path: root/sys/netinet/ip_ipsp.h
AgeCommit message (Collapse)Author
2006-11-24add support to tag ipsec traffic belonging to specific IKE-initiatedReyk Floeter
phase 2 traffic. this allows policy-based filtering of encrypted and unencrypted ipsec traffic with pf(4). see ipsec.conf(5) and isakmpd.conf(5) for details and examples. this is work in progress and still needs some testing and feedback, but it is safe to put it in now. ok hshoexer@
2006-06-30htonq() is not used, at allTheo de Raadt
2006-04-27use underscore variants of _BYTE_ORDER macros which are always definedTed Unangst
ok deraadt millert
2006-01-13Path MTU discovery for NAT-T.Marco Pfatschbacher
OK markus@, "looks good" hshoexer@
2005-11-24Remove kernfs, okay deraadt@.Pedro Martelletto
2005-05-28Add SA replay counter synchronization to pfsync(4). Required for IPsecHakan Olsson
failover gateways. ok mcbride@, "looks good" hshoexer@
2005-05-27wrap some commentsHans-Joerg Hoexer
2004-11-19Plug memory leak. Found by pat@. Thanks!Hans-Joerg Hoexer
ok myself markus@
2004-04-14simpler ipsp_aux_match() API; ok henning, hshoexerMarkus Friedl
2004-01-22add gettdbbysrcdst(), just like gettdb(), but compares tdb_src as well; ok ↵Markus Friedl
mcbride@
2003-12-10de-register. deraadt okJun-ichiro itojun Hagino
2003-12-02UDP encapsulation for ESP in transport mode (draft-ietf-ipsec-udp-encaps-XX.txt)Markus Friedl
ok deraadt@
2003-07-24hmac-sha2-{256,384,512} support in AH/ESP auth. markus okJun-ichiro itojun Hagino
2003-05-06string cleaning; tedu okTheo de Raadt
2002-06-09whitespaceJun-ichiro itojun Hagino
2002-05-31New fields in policy and TDB.Angelos D. Keromytis
2002-03-14First round of __P removal in sysTodd C. Miller
2001-08-19Pass the interface (if any) to ipip_input(), so it can be used inAngelos D. Keromytis
BPF. Closes PR 2000.
2001-07-05StyleAngelos D. Keromytis
2001-07-05IPComp itself (include files). angelos@ ok.Jean-Jacques Bernard-Gundol
2001-06-27When determining whether there's a pending acquire wrt a policy, lookAngelos D. Keromytis
at the acquires associated with the policy only.
2001-06-27Also link acquire state to the relevant IPsec policy.Angelos D. Keromytis
2001-06-27Don't cache packets that hit policies -- we'll do that at the PCB forAngelos D. Keromytis
local packets.
2001-06-26Use pool(9) for IPsec policy structures.Angelos D. Keromytis
2001-06-26Keep the PFKEY sequence number at the TDB, plus a little bit of KNFAngelos D. Keromytis
2001-06-26KNFAngelos D. Keromytis
2001-06-25damn greeks desperate for commits...Bob Beck
2001-06-25KNFAngelos D. Keromytis
2001-06-25Copyright.Angelos D. Keromytis
2001-06-24use new timeouts for spd expirations (hmm cvs did not pick up the file); ho@ okMichael Shalayeff
2001-06-24path mtu discovery for ipsec. on receiving a need fragment icmp matchNiels Provos
against active tdb and store the ipsec header size corrected mtu
2001-06-24remove whitespaceNiels Provos
2001-06-08IPSP_POLICY_STATIC flag.Angelos D. Keromytis
2001-06-07Simplify SPD logic (and correct some input cases).Angelos D. Keromytis
2001-06-01ipsp_parse_headers() goes down a list of IPv4/IPv6/AH/ESP headers andAngelos D. Keromytis
creates a tag for each of the ESP/AH headers. This will be used by IPsec-aware NIC device drivers that need to notify IPsec that crypto processing has already been done. There is an excessive amount of m_copydata() calls used by this routine, but there's no way around it that I can think of.
2001-06-01The IPsec-aware NIC cards don't pass the ICV for later verificationAngelos D. Keromytis
by the stack; that means, if we have a tag it means the ICV was successfully verified and we don't need to do anything else. As well, we don't need any other status information from the NIC.
2001-05-31Structure for NIC IPsec processing status reports.Angelos D. Keromytis
2001-05-30IPSP_IDENTITY_MBOX -> IPSP_IDENTITY_FQDN, and print type of creds/authAngelos D. Keromytis
in kernfs
2001-05-30Forgot to update ipsec_output_done()Angelos D. Keromytis
2001-05-30With the tags, we don't need to abuse the IPsec API to do socket keying.Angelos D. Keromytis
2001-05-30Keep track of remote authentication material (like public key) as well.Angelos D. Keromytis
2001-05-30Fields to store local auth information in policy and TDB.Angelos D. Keromytis
2001-05-29Fields on TDB for last used and last SKIPCRYPTO status change.Angelos D. Keromytis
2001-05-29Add ipsp_skipcrypto_{mark,unmark}()Angelos D. Keromytis
2001-05-27Remove ipsp_copy_ident() prototype.Angelos D. Keromytis
2001-05-27Change prototype of ipsp_common_input_cb() to also accept a packet tagAngelos D. Keromytis
as the last argument.
2001-05-21SKIPCRYPTO flagAngelos D. Keromytis
2001-05-21Cosmetic.Angelos D. Keromytis
2001-05-21Use int16_t for the type and length of ipsec_ref objects.Angelos D. Keromytis
2001-05-21Use a reference-counted structure for IPsec IDs and credentials, so weAngelos D. Keromytis
can cheaply keep copies of them at the PCB. ok deraadt@