Module Name: src Committed By: tteras Date: Wed Nov 17 10:40:41 UTC 2010
Modified Files: src/crypto/dist/ipsec-tools/src/racoon: handler.c handler.h isakmp.c isakmp_inf.c Log Message: Fix my previous patch to not call purge_remote() twice. Change the place where purge_remote() is called. This fixes also a possible crash from the same patch since ph1->remote can be NULL (when we are responder and config is not yet selected). To generate a diff of this commit: cvs rdiff -u -r1.33 -r1.34 src/crypto/dist/ipsec-tools/src/racoon/handler.c cvs rdiff -u -r1.24 -r1.25 src/crypto/dist/ipsec-tools/src/racoon/handler.h cvs rdiff -u -r1.65 -r1.66 src/crypto/dist/ipsec-tools/src/racoon/isakmp.c cvs rdiff -u -r1.43 -r1.44 \ src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/crypto/dist/ipsec-tools/src/racoon/handler.c diff -u src/crypto/dist/ipsec-tools/src/racoon/handler.c:1.33 src/crypto/dist/ipsec-tools/src/racoon/handler.c:1.34 --- src/crypto/dist/ipsec-tools/src/racoon/handler.c:1.33 Thu Oct 21 06:04:33 2010 +++ src/crypto/dist/ipsec-tools/src/racoon/handler.c Wed Nov 17 10:40:41 2010 @@ -1,4 +1,4 @@ -/* $NetBSD: handler.c,v 1.33 2010/10/21 06:04:33 tteras Exp $ */ +/* $NetBSD: handler.c,v 1.34 2010/11/17 10:40:41 tteras Exp $ */ /* Id: handler.c,v 1.28 2006/05/26 12:17:29 manubsd Exp */ @@ -514,6 +514,22 @@ LIST_INIT(&ph1tree); } +int +ph1_rekey_enabled(iph1) + struct ph1handle *iph1; +{ + if (iph1->rmconf == NULL) + return 0; + if (iph1->rmconf->rekey == REKEY_FORCE) + return 1; +#ifdef ENABLE_DPD + if (iph1->rmconf->rekey == REKEY_ON && iph1->dpd_support && + iph1->rmconf->dpd_interval) + return 1; +#endif + return 0; +} + /* %%% management phase 2 handler */ int Index: src/crypto/dist/ipsec-tools/src/racoon/handler.h diff -u src/crypto/dist/ipsec-tools/src/racoon/handler.h:1.24 src/crypto/dist/ipsec-tools/src/racoon/handler.h:1.25 --- src/crypto/dist/ipsec-tools/src/racoon/handler.h:1.24 Fri Nov 12 09:09:47 2010 +++ src/crypto/dist/ipsec-tools/src/racoon/handler.h Wed Nov 17 10:40:41 2010 @@ -1,4 +1,4 @@ -/* $NetBSD: handler.h,v 1.24 2010/11/12 09:09:47 tteras Exp $ */ +/* $NetBSD: handler.h,v 1.25 2010/11/17 10:40:41 tteras Exp $ */ /* Id: handler.h,v 1.19 2006/02/25 08:25:12 manubsd Exp */ @@ -493,6 +493,7 @@ extern int resolveph1rmconf __P((struct ph1handle *)); extern void flushph1 __P((void)); extern void initph1tree __P((void)); +extern int ph1_rekey_enabled __P((struct ph1handle *)); extern int enumph2 __P((struct ph2selector *ph2sel, int (* enum_func)(struct ph2handle *iph2, void *arg), Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp.c diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.65 src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.66 --- src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.65 Fri Nov 12 10:36:37 2010 +++ src/crypto/dist/ipsec-tools/src/racoon/isakmp.c Wed Nov 17 10:40:41 2010 @@ -1,4 +1,4 @@ -/* $NetBSD: isakmp.c,v 1.65 2010/11/12 10:36:37 tteras Exp $ */ +/* $NetBSD: isakmp.c,v 1.66 2010/11/17 10:40:41 tteras Exp $ */ /* Id: isakmp.c,v 1.74 2006/05/07 21:32:59 manubsd Exp */ @@ -766,20 +766,6 @@ return 0; } -static int -ph1_rekey_enabled(iph1) - struct ph1handle *iph1; -{ - if (iph1->rmconf->rekey == REKEY_FORCE) - return 1; -#ifdef ENABLE_DPD - if (iph1->rmconf->rekey == REKEY_ON && iph1->dpd_support && - iph1->rmconf->dpd_interval) - return 1; -#endif - return 0; -} - /* * main function of phase 1. */ @@ -2081,11 +2067,9 @@ src, dst, isakmp_pindex(&iph1->index, 0)); evt_phase1(iph1, EVT_PHASE1_DOWN, NULL); - - if (new_iph1 == NULL && ph1_rekey_enabled(iph1)) { - purge_remote(iph1); + if (new_iph1 == NULL && ph1_rekey_enabled(iph1)) script_hook(iph1, SCRIPT_PHASE1_DEAD); - } + racoon_free(src); racoon_free(dst); @@ -3521,7 +3505,7 @@ } } - /* make source address in spidx */ + /* make source address in spidx */ if (iph2->id_p != NULL && (_XIDT(iph2->id_p) == IPSECDOI_ID_IPV4_ADDR || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c:1.43 src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c:1.44 --- src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c:1.43 Fri Nov 12 09:09:47 2010 +++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c Wed Nov 17 10:40:41 2010 @@ -1,4 +1,4 @@ -/* $NetBSD: isakmp_inf.c,v 1.43 2010/11/12 09:09:47 tteras Exp $ */ +/* $NetBSD: isakmp_inf.c,v 1.44 2010/11/17 10:40:41 tteras Exp $ */ /* Id: isakmp_inf.c,v 1.44 2006/05/06 20:45:52 manubsd Exp */ @@ -516,10 +516,12 @@ sched_cancel(&del_ph1->scr); /* - * Do not delete IPsec SAs when receiving an IKE delete notification. - * Just delete the IKE SA. + * Delete also IPsec-SAs if rekeying is enabled. */ - isakmp_ph1expire(del_ph1); + if (ph1_rekey_enabled(del_ph1)) + purge_remote(del_ph1); + else + isakmp_ph1expire(del_ph1); } break;