summaryrefslogtreecommitdiff
path: root/sys/netinet
AgeCommit message (Collapse)Author
2001-06-14limited broadcast 255.255.255.255 was not recognized correctly, reportedNiels Provos
by crh@ubiqx.mn.org, fix from NetBSD; okay angelos@
2001-06-13Use blocksize, not ivmaskAngelos D. Keromytis
2001-06-12IPsec-related socket options; these can be set/removed/retrieved, butAngelos D. Keromytis
are not taken into consideration in anything just yet.
2001-06-12IPsec setsockopts.Angelos D. Keromytis
2001-06-09Inclusion protection.Angelos D. Keromytis
2001-06-09Protect from multiple inclusion.Angelos D. Keromytis
2001-06-09Less aggressive include cleanup, so it won't piss of Theo again (one hopes)Angelos D. Keromytis
2001-06-08it is nice if the kernel compilesTheo de Raadt
2001-06-08IPSP_POLICY_STATIC flag.Angelos D. Keromytis
2001-06-08Update packet counters correctly.Artur Grabowski
From Robert J. Wozny <speedy@atman.pl>
2001-06-08Cut down on include files.Angelos D. Keromytis
2001-06-08Trim include files.Angelos D. Keromytis
2001-06-07Simplify SPD logic (and correct some input cases).Angelos D. Keromytis
2001-06-05Allow boot -c to change number of gre devices. -moj ok angelos@Mats O Jansson
2001-06-05That DPRINTF() is not needed.Angelos D. Keromytis
2001-06-05Add a few DPRINTF()'sAngelos D. Keromytis
2001-06-05That debug message was just too chatty, even as a debug message :-)Angelos D. Keromytis
2001-06-05Clear acquires only if TDB was established correctly.Angelos D. Keromytis
2001-06-05Correct credential matching logic.Angelos D. Keromytis
2001-06-05repair copyright notices for NRL & cmetz; cmetzTheo de Raadt
2001-06-04use faster arc4random() for small amounts fo data, some spaces; niels okMichael Shalayeff
2001-06-04use a faster arc4random() for random spi generation; angelos@ okMichael Shalayeff
2001-06-04use faster arc4random() in tcp_rndiss_next; niels okMichael Shalayeff
2001-06-01use pool allocation for ip fragement queue, from netbsd,Niels Provos
okay angelos@, itojun@
2001-06-01Merge two m_copydata() calls into one, and (hopefully) correct theAngelos D. Keromytis
self-describing padding verification.
2001-06-01ipsp_parse_headers() goes down a list of IPv4/IPv6/AH/ESP headers andAngelos D. Keromytis
creates a tag for each of the ESP/AH headers. This will be used by IPsec-aware NIC device drivers that need to notify IPsec that crypto processing has already been done. There is an excessive amount of m_copydata() calls used by this routine, but there's no way around it that I can think of.
2001-06-01The IPsec-aware NIC cards don't pass the ICV for later verificationAngelos D. Keromytis
by the stack; that means, if we have a tag it means the ICV was successfully verified and we don't need to do anything else. As well, we don't need any other status information from the NIC.
2001-05-31Structure for NIC IPsec processing status reports.Angelos D. Keromytis
2001-05-31Match IPSEC output prototypes.Angelos D. Keromytis
2001-05-31Two fixes from Stevens via davidg@freebsd, bug report byNiels Provos
armin@wolfermann.org - set the persist timer so that connections in CLOSING state timeout - honor keep-alive timer in CLOSING state. Fixes the problem in simulaneous close situation where connections would never leave the CLOSING state and stay arround indefinitly.
2001-05-30IPSP_IDENTITY_MBOX -> IPSP_IDENTITY_FQDN, and print type of creds/authAngelos D. Keromytis
in kernfs
2001-05-30No need for last argument in ipip_output()Angelos D. Keromytis
2001-05-30Update to match prototypes.Angelos D. Keromytis
2001-05-30Forgot to update ipsec_output_done()Angelos D. Keromytis
2001-05-30Match prototype.Angelos D. Keromytis
2001-05-30Update to match prototype.Angelos D. Keromytis
2001-05-30With the tags, we don't need to abuse the IPsec API to do socket keying.Angelos D. Keromytis
2001-05-30Handle TDBF_SKIPCRYPTO on output, and PACKET_TAG_IPSEC_IN_CRYPTO_DONEAngelos D. Keromytis
on input.
2001-05-30Free remote authentication material on TDB free.Angelos D. Keromytis
2001-05-30Keep track of remote authentication material (like public key) as well.Angelos D. Keromytis
2001-05-30Correctly free information attached to the policy.Angelos D. Keromytis
2001-05-30Free local auth on TDB free.Angelos D. Keromytis
2001-05-30Fields to store local auth information in policy and TDB.Angelos D. Keromytis
2001-05-30Remove ipf. Darren Reed has interpreted his (old, new, whichever)Theo de Raadt
licence in a way that makes ipf not free according to the rules we established over 5 years ago, at www.openbsd.org/goals.html (and those same basic rules govern the other *BSD projects too). Specifically, Darren says that modified versions are not permitted. But software which OpenBSD uses and redistributes must be free to all (be they people or companies), for any purpose they wish to use it, including modification, use, peeing on, or even integration into baby mulching machines or atomic bombs to be dropped on Australia. Furthermore, we know of a number of companies using ipf with modification like us, who are now in the same situation, and we hope that some of them will work with us to fill this gap that now exists in OpenBSD (temporarily, we hope).
2001-05-30Remove ipf. Darren Reed has interpreted his (old, new, whichever)Theo de Raadt
licence in a way that makes ipf not free according to the rules we established over 5 years ago, at www.openbsd.org/goals.html (and those same basic rules govern the other *BSD projects too). Specifically, Darren says that modified versions are not permitted. But software which OpenBSD uses and redistributes must be free to all (be they people or companies), for any purpose they wish to use it, including modification, use, peeing on, or even integration into baby mulching machines or atomic bombs to be dropped on Australia. Furthermore, we know of a number of companies using ipf with modification like us, who are now in the same situation, and we hope that some of them will work with us to fill this gap that now exists in OpenBSD (temporarily, we hope).
2001-05-29Record last use time for SAs.Angelos D. Keromytis
2001-05-29Keep track of when a TDB was last marked/unmared as SKIPCRYPTO, andAngelos D. Keromytis
print the relevant information on KERNFS.
2001-05-29Fields on TDB for last used and last SKIPCRYPTO status change.Angelos D. Keromytis
2001-05-29Make sure packets that need crypto processing on the NIC don't escapeAngelos D. Keromytis
(because of routing changes etc.)
2001-05-29Add ipsp_skipcrypto_{mark,unmark}()Angelos D. Keromytis