summaryrefslogtreecommitdiffstats
path: root/sys/netinet6
Commit message (Collapse)AuthorAgeFilesLines
* rtfree() must be called in lock context.ume2003-10-181-0/+1
| | | | Reported by: jhay
* nuke duplicate function and unused function.ume2003-10-173-45/+5
| | | | Obtained from: KAME
* revert wrongly dropped null check by previous commit.ume2003-10-171-0/+2
|
* - add dom_if{attach,detach} framework.ume2003-10-1714-287/+253
| | | | | | - transition to use ifp->if_afdata. Obtained from: KAME
* fix horribly botched MFp4 mergesam2003-10-161-7/+7
|
* pfil hooks can modify packet contents so check if the destinationsam2003-10-161-1/+11
| | | | | | | | address has been changed when PFIL_HOOKS is enabled and, if it has, arrange for the proper action by ip*_forward. Submitted by: Pyun YongHyeon Supported by: FreeBSD Foundation
* MFp4: correct locking issues in nd6_lookupsam2003-10-141-1/+4
| | | | Supported by: FreeBSD Foundation
* use BF_ecb_encrypt().ume2003-10-131-22/+6
| | | | Obtained from: KAME
* - support AES counter mode for ESP.ume2003-10-136-15/+526
| | | | | | | | - use size_t as return type of schedlen(), as there's no error check needed. - clear key schedule buffer before freeing. Obtained from: KAME
* support AES XCBC MAC for AH.ume2003-10-132-0/+230
| | | | Obtained from: KAME
* - support AES XCBC MAC for AHume2003-10-131-0/+7
| | | | | | - correct SADB_X_AALG_RIPEMD160HMAC to 8 Obtained from: KAME
* include opencrypto/rmd160.hume2003-10-121-1/+1
|
* remove unused variable.ume2003-10-121-4/+1
| | | | Obtained from: KAME
* - avoid hardcoded values.ume2003-10-122-41/+29
| | | | | | | | | | | - correct signedness mixups. - log fix. - preparation for 64bit sequence number. introduce SA id (unique ID for SA - SPI is useless as duplicated SPI is allowed) - no need to malloc/free cksum buffer. Obtained from: KAME
* - always check for optlen overrun.ume2003-10-121-4/+11
| | | | | | | - panic if NULL is passed to ah_sumsiz (as we never do it, and callers do not properly check negative returns). Obtained from: KAME
* - correct signedness mixups.ume2003-10-123-80/+79
| | | | | | - avoid assuming result buffer size Obtained from: KAME
* avoid hardcoding MD5 result length (16)ume2003-10-121-3/+4
| | | | Obtained from: KAME
* - RIPEMD160 supportume2003-10-123-206/+188
| | | | | | - pass size arg to ah->result (avoid assuming result buffer size) Obtained from: KAME
* fixed an endian bug on fragment header scanningume2003-10-101-1/+2
| | | | Obtained from: KAME
* nuke SCOPEDROUTING. Though it was there for a long time,ume2003-10-108-59/+0
| | | | it was never enabled.
* switch cast128 implementation to implementation by Steve Reid;ume2003-10-101-10/+4
| | | | | | smaller footprint. Obtained from: KAME
* - typo. found by markus@openbsdume2003-10-091-4/+2
| | | | | | | - correct signedness mixup in pointer passing. - drop meaningless variable. Obtained from: KAME
* - typo in commentume2003-10-0910-289/+225
| | | | | | | | - style - ANSIfy (there is no functional change.) Obtained from: KAME
* - fix typo in comments.ume2003-10-0821-637/+402
| | | | | | | | | | - style. - NULL is not 0. - some variables were renamed. - nuke unused logic. (there is no functional change.) Obtained from: KAME
* must lock route when the caller provided a route but notsam2003-10-071-2/+4
| | | | | | | an interface; otherwise the subsequent unlock blows up Suffered by: Marcel Moolenaar <marcel@xcllnt.net> Supported by: FreeBSD Foundation
* indentume2003-10-071-1/+1
|
* style and indent. no functional change.ume2003-10-071-40/+34
| | | | Obtained from: KAME
* - fix typo in comment.ume2003-10-079-321/+277
| | | | | | - style. Obtained from: KAME
* nuke unused CTL_IPV6PROTO_NAMES macro.ume2003-10-071-47/+0
|
* return(code) -> return (code)ume2003-10-0622-408/+403
| | | | (reduce diffs against KAME)
* Locking for updates to routing table entries. Each rtentry gets a mutexsam2003-10-049-77/+99
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | that covers updates to the contents. Note this is separate from holding a reference and/or locking the routing table itself. Other/related changes: o rtredirect loses the final parameter by which an rtentry reference may be returned; this was never used and added unwarranted complexity for locking. o minor style cleanups to routing code (e.g. ansi-fy function decls) o remove the logic to bump the refcnt on the parent of cloned routes, we assume the parent will remain as long as the clone; doing this avoids a circularity in locking during delete o convert some timeouts to MPSAFE callouts Notes: 1. rt_mtx in struct rtentry is guarded by #ifdef _KERNEL as user-level applications cannot/do-no know about mutex's. Doing this requires that the mutex be the last element in the structure. A better solution is to introduce an externalized version of struct rtentry but this is a major task because of the intertwining of rtentry and other data structures that are visible to user applications. 2. There are known LOR's that are expected to go away with forthcoming work to eliminate many held references. If not these will be resolved prior to release. 3. ATM changes are untested. Sponsored by: FreeBSD Foundation Obtained from: BSD/OS (partly)
* add randomtab for ip6_randomflowlabel().ume2003-10-011-0/+11
| | | | Obtained from: KAME
* randomize IPv6 flowlabel when RANDOM_IP_ID is defined.ume2003-10-015-4/+20
| | | | Obtained from: KAME
* use arc4random()ume2003-10-012-14/+3
|
* - include opt_random_ip_id.hume2003-10-013-1/+7
| | | | - we don't need to obtain microtime when using ip6_randomid.
* we don't need ip6_id when RANDOM_IP_ID is defined.ume2003-10-013-0/+6
|
* include opt_random_ip_id.hume2003-10-011-0/+2
|
* Don't compiled ip6_randomid() in if RANDOM_IP_ID is not defined.ume2003-10-012-0/+6
|
* Obey RANDOM_IP_ID.ume2003-10-011-0/+5
| | | | Requested by: sam
* randomize IPv6 fragment ID.ume2003-10-013-1/+250
| | | | Obtained from: KAME
* Correct pfil_run_hooks return handling: if the return value is non-zerosam2003-09-302-9/+8
| | | | | | | | | then the mbuf has been consumed by a hook; otherwise beware of a null mbuf return (gack). In particular the bridge was doing the wrong thing. While in the ipv6 code make it's handling of pfil_run_hooks identical to netbsd. Pointed out by: Pyun YongHyeon <yongari@kt-is.co.kr>
* o update PFIL_HOOKS support to current API used by netbsdsam2003-09-235-68/+35
| | | | | | | | | | | o revamp IPv4+IPv6+bridge usage to match API changes o remove pfil_head instances from protosw entries (no longer used) o add locking o bump FreeBSD version for 3rd party modules Heavy lifting by: "Max Laier" <max@love2party.net> Supported by: FreeBSD Foundation Obtained from: NetBSD (bits of pfil.h and pfil.c)
* Enable IPv6 for Token Ring.mdodd2003-09-143-0/+7
|
* The in6_ifattach() routine contains the following code:wpaul2003-09-131-2/+4
| | | | | | | | | | | | | | | | | | | | | | | in6_pcbpurgeif0(LIST_FIRST(udbinfo.listhead), ifp); in6_pcbpurgeif0(LIST_FIRST(ripcbinfo.listhead), ifp); The problem here is that udbinfo.listhead and ripcbinfo.listhead are not initialized during the device probe/attach phase of the kernel boot process. So if, for example, a network driver calls ether_ifattach() in its foo_attach() routine and then decides that something is wrong and calls ether_ifdetach() to reverse the process, we will panic trying to dereference the uninitialized list head pointers. (Though the same sequence of events performed after the kernel has come up works file, i.e. doing kldload if_foo from multiuser.) Change this to: if (udbinfo.listhead != NULL) in6_pcbpurgeif0(LIST_FIRST(udbinfo.listhead), ifp); if (ripcbinfo.listhead != NULL) in6_pcbpurgeif0(LIST_FIRST(ripcbinfo.listhead), ifp); to avoid the NULL pointer dereferences.
* Fix a bunch of off-by-one errors in the range checking code.ru2003-09-111-1/+1
|
* introduced a flag bit "ND6_IFF_ACCEPT_RTADV" in the nd_ifinfo structure toume2003-08-053-1/+14
| | | | | | | | | | | control whether to accept RAs per-interface basis. the new stuff ensures the backward compatibility; - the kernel does not accept RAs on any interfaces by default. - since the default value of the flag bit is on, the kernel accepts RAs on all interfaces when net.inet6.ip6.accept_rtadv is 1. Obtained from: KAME MFC after: 1 week
* Cleanup useless break.ume2003-07-291-3/+0
| | | | Submitted by: JINMEI Tatuya <jinmei@isl.rdc.toshiba.co.jp>
* ip6fw does not handle ESP correctlyume2003-07-271-0/+1
| | | | | | PR: kern/54874 Submitted by: JINMEI Tatuya <jinmei@shuttle.wide.toshiba.co.jp> MFC after: 1 week
* Do not attempt to access to inp_socket fields if the socket is in the TIME_WAITcognet2003-06-171-13/+38
| | | | | | state, as inp_socket will then be NULL. This fixes a panic that occurs when one tries to bind a port that was previously binded with remaining TIME_WAIT sockets.
* Add definitions for IN6ADDR_LINKLOCAL_ALLMDNS_INIT and INADDR_ALLMDNS_GROUP.mdodd2003-04-291-0/+3
|
OpenPOWER on IntegriCloud