Age | Commit message (Collapse) | Author | |
---|---|---|---|
2004-11-10 | "not reached" does not help LINT use NOTREACHED instead and use it only in | Claudio Jeker | |
places where needed. OK henning@ | |||
2004-05-28 | detect absence of PF_KEY interface and/or the TCP_MD5SIG setsockopts | Henning Brauer | |
at runtime and disable said subsystems if so. helps the guys porting bgpd to $otherBSD, and is actually the right thing to do. claudio ok | |||
2004-05-06 | actually reset p->auth_established to 0 in pfkey_[md5sig|ipsec]_remove | Henning Brauer | |
2004-05-06 | we need a seperate field for the md5 key len, can't use strlen, noticed | Henning Brauer | |
by markus some time ago | |||
2004-04-28 | support for AH flows and SAs | Markus Friedl | |
2004-04-28 | do not give up on ESRCH, someone might have mucked with ipsecadm behind | Henning Brauer | |
our back, markus ok | |||
2004-04-28 | make this at least compile | Henning Brauer | |
2004-04-28 | make sure send and reply are in sync; ok henning | Markus Friedl | |
2004-04-28 | keep track of which ipsec/md5 SAs we inserted - ESRCH on blind removal | Henning Brauer | |
otherwise, markus ok | |||
2004-04-28 | don't load SAs into the kernel if IKE is used. | Markus Friedl | |
2004-04-28 | prefix the auth related defines by AUTH_, we had a name clash, markus ok | Henning Brauer | |
2004-04-27 | rename the ipsec struct to auth, move all tcpmd5 related fields in there, and | Henning Brauer | |
add a generic "method" field that expresses what method (none/md5sig/ipsec manual/ipsec ike) is in use markus ok | |||
2004-04-27 | two missing breaks, repairs tcpmd5, with markus | Henning Brauer | |
2004-04-27 | restrict the ipsec flows to BGP only; ok henning | Markus Friedl | |
2004-04-27 | crud stripping; henning ok | Theo de Raadt | |
2004-04-26 | load ipsec SAs into the kernel and enable them. | Markus Friedl | |
2004-03-31 | allow empty (wildcard) sockaddr for src or dst | Henning Brauer | |
2004-03-15 | use switch instead of if { } else if { } else { } | Henning Brauer | |
2004-01-30 | missing free() in an error path that should be unreachable | Henning Brauer | |
From: Patrick Latifi <pat@eyeo.org> | |||
2004-01-28 | implement | Henning Brauer | |
tcp md5sig password so that the key can be given in ascii, what unfortunately limits the key space (cisco/juniper compat...) we keep the ability to specify the key in hex whithout these limits. help & ok markus | |||
2004-01-28 | -rename pfkey_setkey to pfkey_sa_add | Henning Brauer | |
-implement pfkey_sa_remove -use it in pfkey_auth_remove we now properly remove the SAs we added on bgpd shutdown ok markus | |||
2004-01-28 | fix pfkey_reply() logic: | Henning Brauer | |
we always need to read the full message or we find old crap next time much more difficult to find than it sounds here... with & ok markus | |||
2004-01-28 | missing free and fix memset misuse; From: Patrick Latifi <pat@eyeo.org> | Henning Brauer | |
tho i fixed that using bzero instead | |||
2004-01-28 | we need a pfkey_init the gets us a PF_KEY socket before we drop privs | Henning Brauer | |
eases other code quite a bit in exchange... | |||
2004-01-28 | -struct peer_auth to store the SPIs, linked into struct peer | Henning Brauer | |
-add pfkey_auth_establish(), which sets up flows for both directions and stores the SPIs in above struct -add (yet dummy) pfkey_auth_remove() with markus, ok claudio markus | |||
2004-01-28 | initial support for SADB_DELETE; ok hshoexer | Markus Friedl | |
2004-01-28 | pfkey_setkey: sockaddr -> bgpd_addr; ok claudio | Markus Friedl | |
2004-01-27 | missing return() | Henning Brauer | |
2004-01-27 | use SADB_GETSPI/UPDATE for setting tcpmd5 keys; ok henning | Markus Friedl | |
2004-01-26 | when we error out in send_sa_msg() close the file descriptor. | Henning Brauer | |
from Patrick Latifi <pat@eyeo.org> | |||
2004-01-26 | first cut at tcpmd5 setup seupport from within bgpd. works so far. | Henning Brauer | |
with help from hshoexer@ and markus@ ok claudio@ hshoexer@ markus@ |