summaryrefslogtreecommitdiffstats
path: root/sys/netipsec
Commit message (Expand)AuthorAgeFilesLines
* Add sysctls to if_enc(4) to control whether the firewalls orbz2007-11-285-7/+72
* Adjust a comment that suggest that we might consider a panic.bz2007-11-281-1/+3
* Move the priv check before the malloc call for so_pcb.bz2007-11-161-6/+6
* Add a missing priv check in key_attach to prevent non-su usersbz2007-11-121-0/+7
* Fix for an infinite loop in processing ESP, IPv6 packets.gnn2007-09-121-4/+17
* Remove the now-unused NET_{LOCK,UNLOCK,ASSERT}_GIANT() macros, whichrwatson2007-08-063-30/+0
* Replace hard coded options by their defined PFIL_{IN,OUT} names.bz2007-07-193-3/+6
* Commit the change from FAST_IPSEC to IPSEC. The FAST_IPSECgnn2007-07-031-2/+2
* Commit IPv6 support for FAST_IPSEC to the tree.gnn2007-07-019-114/+64
* 'spi' and the return value of ntohl are unsigned. Remove the extra >=0bz2007-06-161-1/+6
* In case of failure we can directly return ENOBUFS becausebz2007-06-161-10/+3
* Add a missing return so that we drop out in case of an error andbz2007-06-151-3/+2
* With the current code 'src' is never NULL. Nevertheless move the check forbz2007-06-151-1/+3
* Looking at {ah,esp}_input_cb it seems we might be able to end upbz2007-06-151-1/+1
* s,#,*, in a multi-line comment. This is C.bz2007-06-151-1/+1
* Though we are only called for the three security protocols we canbz2007-06-151-0/+4
* Eliminate now-unused SUSER_ALLOWJAIL arguments to priv_check_cred(); inrwatson2007-06-121-3/+1
* In ipsec6_output_tunnel() make sure that the SA contents do not change.bz2007-05-291-1/+8
* fix typo: s,applyed,applied,gbz2007-05-291-2/+2
* Implement ICMPv6 support in ipsec6_get_ulp().bz2007-05-291-0/+10
* Add missingbz2007-05-291-0/+1
* Integrate the Camellia Block Cipher. For more information see RFC 4132gnn2007-05-091-0/+3
* Update comment regarding how we check privilege on FreeBSD: we now userwatson2007-04-101-1/+2
* add include now required for crypto flagssam2007-03-221-0/+2
* Overhaul driver/subsystem api's:sam2007-03-211-1/+1
* s,#if INET6,#ifdef INET6,bz2006-12-142-2/+2
* MFp4: 92972, 98913 + one more changebz2006-12-122-3/+15
* Add priv.h include required to build FAST_IPSEC, which is not present inrwatson2006-11-071-0/+1
* Sweep kernel replacing suser(9) calls with priv(9) calls, assigningrwatson2006-11-061-1/+3
* Fix build breakage from previous commit which confused key_abort and key_close.gnn2006-07-221-1/+1
* Change semantics of socket close and detach. Add a new protocol switchrwatson2006-07-211-0/+12
* - Use suser_cred(9) instead of directly comparing cr_uid.pjd2006-06-271-2/+3
* Add a pseudo interface for packet filtering IPSec connections before or afterthompsa2006-06-264-0/+35
* Change '#if INET' and '#if INET6' to '#ifdef INET' and '#ifdef INET6'.pjd2006-06-042-3/+3
* Extend the notdef #ifdef to cover the packet copy as there is no point in doi...gnn2006-06-041-8/+4
* Prevent disappearing SAD entries by implementing MPsafe refcounting.pjd2006-05-201-20/+33
* - The authsize field from auth_hash structure was removed.pjd2006-05-172-10/+11
* Hide net.inet.ipsec.test_{replay,integrity} sysctls under #ifdef REGRESSION.pjd2006-04-104-0/+12
* Introduce two new sysctls:pjd2006-04-094-2/+54
* Be consistent with the rest of the code.pjd2006-04-091-1/+1
* Remove unused variables s and error in key_detach. The previousdd2006-04-041-1/+0
* Remove unintended DEBUG flag setting.gnn2006-04-041-1/+0
* Chance protocol switch method pru_detach() so that it returns voidrwatson2006-04-011-12/+8
* Change protocol switch pru_abort() API so that it returns void ratherrwatson2006-04-011-6/+3
* Fix more stack corruptions on amd64.bz2006-03-302-19/+11
* First steps towards IPSec cleanup.gnn2006-03-257-105/+257
* Allow to use fast_ipsec(4) on debug.mpsafenet=0 and INVARIANTS-enabledpjd2006-03-233-11/+44
* Add missing code needed for the detection of IPSec packet replays. [1]cperciva2006-03-221-0/+17
* promote fast ipsec's m_clone routine for public use; it is renamedsam2006-03-155-153/+3
* Fix stack corruptions on amd64.bz2006-01-212-15/+3
OpenPOWER on IntegriCloud