<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/netkey, branch release/5.2.1</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F5.2.1</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F5.2.1'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2004-01-27T16:06:22Z</updated>
<entry>
<title>MFC 1.65: avoid duplicate free.</title>
<updated>2004-01-27T16:06:22Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2004-01-27T16:06:22Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=feb160a56fff5eeb6f3104e308bb742369dbc4c8'/>
<id>urn:sha1:feb160a56fff5eeb6f3104e308bb742369dbc4c8</id>
<content type='text'>
Approved by:	re (scott)
</content>
</entry>
<entry>
<title>MFC 1.64: invalidate secpolicy pcb cache on key_timehandler.</title>
<updated>2004-01-27T16:04:52Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2004-01-27T16:04:52Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=31ed7881ff5cb1d61d4074c98d6ed0838a7500ce'/>
<id>urn:sha1:31ed7881ff5cb1d61d4074c98d6ed0838a7500ce</id>
<content type='text'>
Approved by:	re (scott)
</content>
</entry>
<entry>
<title>MFC 1.63: add missing key_freesp()s.</title>
<updated>2004-01-27T16:03:30Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2004-01-27T16:03:30Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0db9ecbc9ac0a430424b1c1a72e1c9dfa8fa22e9'/>
<id>urn:sha1:0db9ecbc9ac0a430424b1c1a72e1c9dfa8fa22e9</id>
<content type='text'>
Approved by:	re (scott)
</content>
</entry>
<entry>
<title>MFC 1.62: don't touch after free.</title>
<updated>2004-01-27T16:01:52Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2004-01-27T16:01:52Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0b783ecd8b16574f488aa32b9a23a6ce7a62dbda'/>
<id>urn:sha1:0b783ecd8b16574f488aa32b9a23a6ce7a62dbda</id>
<content type='text'>
Approved by:	re (scott)
</content>
</entry>
<entry>
<title>missing splx.</title>
<updated>2003-11-28T14:34:42Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2003-11-28T14:34:42Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=dd8b0111cb37d1d383194ea4b113500d93376545'/>
<id>urn:sha1:dd8b0111cb37d1d383194ea4b113500d93376545</id>
<content type='text'>
this is a NOOP change, and primarily merged for consistency with
-STABLE.

Approved by:	re (rwatson)
</content>
</entry>
<entry>
<title>Introduce a MAC label reference in 'struct inpcb', which caches</title>
<updated>2003-11-18T00:39:07Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-11-18T00:39:07Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a557af222b70694470f63e2a0f1bf58c9dcc73fd'/>
<id>urn:sha1:a557af222b70694470f63e2a0f1bf58c9dcc73fd</id>
<content type='text'>
the   MAC label referenced from 'struct socket' in the IPv4 and
IPv6-based protocols.  This permits MAC labels to be checked during
network delivery operations without dereferencing inp-&gt;inp_socket
to get to so-&gt;so_label, which will eventually avoid our having to
grab the socket lock during delivery at the network layer.

This change introduces 'struct inpcb' as a labeled object to the
MAC Framework, along with the normal circus of entry points:
initialization, creation from socket, destruction, as well as a
delivery access control check.

For most policies, the inpcb label will simply be a cache of the
socket label, so a new protocol switch method is introduced,
pr_sosetlabel() to notify protocols that the socket layer label
has been updated so that the cache can be updated while holding
appropriate locks.  Most protocols implement this using
pru_sosetlabel_null(), but IPv4/IPv6 protocols using inpcbs use
the the worker function in_pcbsosetlabel(), which calls into the
MAC Framework to perform a cache update.

Biba, LOMAC, and MLS implement these entry points, as do the stub
policy, and test policy.

Reviewed by:	sam, bms
Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title>add sysctl MIB net.key.esp_auth which was wrongly dropped</title>
<updated>2003-11-13T12:26:55Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2003-11-13T12:26:55Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=313ab6b4d58772413b9a648118d96fc125043702'/>
<id>urn:sha1:313ab6b4d58772413b9a648118d96fc125043702</id>
<content type='text'>
during recent KAME merge.
</content>
</entry>
<entry>
<title>ipsec_esp_auth is unused when IPSEC_ESP is not defined.</title>
<updated>2003-11-11T17:25:45Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2003-11-11T17:25:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=331bf4e6f77b419433c7b7500273aa11e141e5b2'/>
<id>urn:sha1:331bf4e6f77b419433c7b7500273aa11e141e5b2</id>
<content type='text'>
Reported by:	Andre Oppermann &lt;oppermann@pipeline.ch&gt;
</content>
</entry>
<entry>
<title>- cleanup SP refcnt issue.</title>
<updated>2003-11-04T16:02:05Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2003-11-04T16:02:05Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0f9ade718da4248226297bed41f3e9e372fd5f4d'/>
<id>urn:sha1:0f9ade718da4248226297bed41f3e9e372fd5f4d</id>
<content type='text'>
- share policy-on-socket for listening socket.
- don't copy policy-on-socket at all.  secpolicy no longer contain
  spidx, which saves a lot of memory.
- deep-copy pcb policy if it is an ipsec policy.  assign ID field to
  all SPD entries.  make it possible for racoon to grab SPD entry on
  pcb.
- fixed the order of searching SA table for packets.
- fixed to get a security association header.  a mode is always needed
  to compare them.
- fixed that the incorrect time was set to
  sadb_comb_{hard|soft}_usetime.
- disallow port spec for tunnel mode policy (as we don't reassemble).
- an user can define a policy-id.
- clear enc/auth key before freeing.
- fixed that the kernel crashed when key_spdacquire() was called
  because key_spdacquire() had been implemented imcopletely.
- preparation for 64bit sequence number.
- maintain ordered list of SA, based on SA id.
- cleanup secasvar management; refcnt is key.c responsibility;
  alloc/free is keydb.c responsibility.
- cleanup, avoid double-loop.
- use hash for spi-based lookup.
- mark persistent SP "persistent".
  XXX in theory refcnt should do the right thing, however, we have
  "spdflush" which would touch all SPs.  another solution would be to
  de-register persistent SPs from sptree.
- u_short -&gt; u_int16_t
- reduce kernel stack usage by auto variable secasindex.
- clarify function name confusion.  ipsec_*_policy -&gt;
  ipsec_*_pcbpolicy.
- avoid variable name confusion.
  (struct inpcbpolicy *)pcb_sp, spp (struct secpolicy **), sp (struct
  secpolicy *)
- count number of ipsec encapsulations on ipsec4_output, so that we
  can tell ip_output() how to handle the packet further.
- When the value of the ul_proto is ICMP or ICMPV6, the port field in
  "src" of the spidx specifies ICMP type, and the port field in "dst"
  of the spidx specifies ICMP code.
- avoid from applying IPsec transport mode to the packets when the
  kernel forwards the packets.

Tested by:	nork
Obtained from:	KAME
</content>
</entry>
<entry>
<title>correct %d/%u mismatch.</title>
<updated>2003-11-02T12:28:04Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2003-11-02T12:28:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=2dc334e089e30fae4adb186266fe10b38d2e6a34'/>
<id>urn:sha1:2dc334e089e30fae4adb186266fe10b38d2e6a34</id>
<content type='text'>
Obtained from:	KAME
</content>
</entry>
</feed>
