Module Name: src Committed By: christos Date: Wed Jun 5 19:01:26 UTC 2013
Modified Files: src/sys/kern: init_main.c src/sys/netinet: in_pcb.c in_proto.c ip_icmp.c ip_input.c ip_mroute.c ip_output.c raw_ip.c tcp_input.c tcp_output.c tcp_subr.c udp_usrreq.c src/sys/netinet6: icmp6.c in6_pcb.c in6_proto.c ip6_forward.c ip6_input.c ip6_output.c raw_ip6.c src/sys/netipsec: files.netipsec key.c xform_ipip.c Log Message: IPSEC has not come in two speeds for a long time now (IPSEC == kame, FAST_IPSEC). Make everything refer to IPSEC to avoid confusion. To generate a diff of this commit: cvs rdiff -u -r1.448 -r1.449 src/sys/kern/init_main.c cvs rdiff -u -r1.144 -r1.145 src/sys/netinet/in_pcb.c cvs rdiff -u -r1.105 -r1.106 src/sys/netinet/in_proto.c cvs rdiff -u -r1.130 -r1.131 src/sys/netinet/ip_icmp.c cvs rdiff -u -r1.303 -r1.304 src/sys/netinet/ip_input.c cvs rdiff -u -r1.126 -r1.127 src/sys/netinet/ip_mroute.c cvs rdiff -u -r1.219 -r1.220 src/sys/netinet/ip_output.c cvs rdiff -u -r1.115 -r1.116 src/sys/netinet/raw_ip.c cvs rdiff -u -r1.325 -r1.326 src/sys/netinet/tcp_input.c cvs rdiff -u -r1.174 -r1.175 src/sys/netinet/tcp_output.c cvs rdiff -u -r1.249 -r1.250 src/sys/netinet/tcp_subr.c cvs rdiff -u -r1.189 -r1.190 src/sys/netinet/udp_usrreq.c cvs rdiff -u -r1.161 -r1.162 src/sys/netinet6/icmp6.c cvs rdiff -u -r1.122 -r1.123 src/sys/netinet6/in6_pcb.c cvs rdiff -u -r1.98 -r1.99 src/sys/netinet6/in6_proto.c cvs rdiff -u -r1.70 -r1.71 src/sys/netinet6/ip6_forward.c cvs rdiff -u -r1.141 -r1.142 src/sys/netinet6/ip6_input.c cvs rdiff -u -r1.152 -r1.153 src/sys/netinet6/ip6_output.c cvs rdiff -u -r1.110 -r1.111 src/sys/netinet6/raw_ip6.c cvs rdiff -u -r1.11 -r1.12 src/sys/netipsec/files.netipsec cvs rdiff -u -r1.80 -r1.81 src/sys/netipsec/key.c cvs rdiff -u -r1.28 -r1.29 src/sys/netipsec/xform_ipip.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/kern/init_main.c diff -u src/sys/kern/init_main.c:1.448 src/sys/kern/init_main.c:1.449 --- src/sys/kern/init_main.c:1.448 Mon Mar 18 09:36:21 2013 +++ src/sys/kern/init_main.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: init_main.c,v 1.448 2013/03/18 13:36:21 para Exp $ */ +/* $NetBSD: init_main.c,v 1.449 2013/06/05 19:01:26 christos Exp $ */ /*- * Copyright (c) 2008, 2009 The NetBSD Foundation, Inc. @@ -97,7 +97,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: init_main.c,v 1.448 2013/03/18 13:36:21 para Exp $"); +__KERNEL_RCSID(0, "$NetBSD: init_main.c,v 1.449 2013/06/05 19:01:26 christos Exp $"); #include "opt_ddb.h" #include "opt_ipsec.h" @@ -171,7 +171,7 @@ __KERNEL_RCSID(0, "$NetBSD: init_main.c, #include <sys/ksyms.h> #include <sys/uidinfo.h> #include <sys/kprintf.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #endif #ifdef SYSVSHM @@ -550,7 +550,7 @@ main(void) pax_init(); #endif /* PAX_MPROTECT || PAX_SEGVGUARD || PAX_ASLR */ -#ifdef FAST_IPSEC +#ifdef IPSEC /* Attach network crypto subsystem */ ipsec_attach(); #endif Index: src/sys/netinet/in_pcb.c diff -u src/sys/netinet/in_pcb.c:1.144 src/sys/netinet/in_pcb.c:1.145 --- src/sys/netinet/in_pcb.c:1.144 Fri Apr 12 17:30:40 2013 +++ src/sys/netinet/in_pcb.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: in_pcb.c,v 1.144 2013/04/12 21:30:40 christos Exp $ */ +/* $NetBSD: in_pcb.c,v 1.145 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -93,7 +93,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: in_pcb.c,v 1.144 2013/04/12 21:30:40 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: in_pcb.c,v 1.145 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_ipsec.h" @@ -132,7 +132,7 @@ __KERNEL_RCSID(0, "$NetBSD: in_pcb.c,v 1 #include <netinet6/in6_pcb.h> #endif -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/key.h> #endif /* IPSEC */ @@ -191,7 +191,7 @@ in_pcballoc(struct socket *so, void *v) struct inpcbtable *table = v; struct inpcb *inp; int s; -#if defined(FAST_IPSEC) +#if defined(IPSEC) int error; #endif @@ -207,7 +207,7 @@ in_pcballoc(struct socket *so, void *v) inp->inp_errormtu = -1; inp->inp_portalgo = PORTALGO_DEFAULT; inp->inp_bindportonsend = false; -#if defined(FAST_IPSEC) +#if defined(IPSEC) error = ipsec_init_pcbpolicy(so, &inp->inp_sp); if (error != 0) { s = splnet(); @@ -556,7 +556,7 @@ in_pcbconnect(void *v, struct mbuf *nam, } in_pcbstate(inp, INP_CONNECTED); -#if defined(FAST_IPSEC) +#if defined(IPSEC) if (inp->inp_socket->so_type == SOCK_STREAM) ipsec_pcbconn(inp->inp_sp); #endif @@ -574,7 +574,7 @@ in_pcbdisconnect(void *v) inp->inp_faddr = zeroin_addr; inp->inp_fport = 0; in_pcbstate(inp, INP_BOUND); -#if defined(FAST_IPSEC) +#if defined(IPSEC) ipsec_pcbdisconn(inp->inp_sp); #endif if (inp->inp_socket->so_state & SS_NOFDREF) @@ -591,7 +591,7 @@ in_pcbdetach(void *v) if (inp->inp_af != AF_INET) return; -#if defined(FAST_IPSEC) +#if defined(IPSEC) ipsec4_delete_pcbpolicy(inp); #endif /*IPSEC*/ so->so_pcb = 0; Index: src/sys/netinet/in_proto.c diff -u src/sys/netinet/in_proto.c:1.105 src/sys/netinet/in_proto.c:1.106 --- src/sys/netinet/in_proto.c:1.105 Fri Mar 1 21:42:22 2013 +++ src/sys/netinet/in_proto.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: in_proto.c,v 1.105 2013/03/02 02:42:22 christos Exp $ */ +/* $NetBSD: in_proto.c,v 1.106 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -61,7 +61,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: in_proto.c,v 1.105 2013/03/02 02:42:22 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: in_proto.c,v 1.106 2013/06/05 19:01:26 christos Exp $"); #include "opt_mrouting.h" #include "opt_inet.h" @@ -114,10 +114,10 @@ __KERNEL_RCSID(0, "$NetBSD: in_proto.c,v * TCP/IP protocol family: IP, ICMP, UDP, TCP. */ -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/key.h> -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #include "carp.h" #if NCARP > 0 @@ -163,7 +163,7 @@ PR_WRAP_CTLOUTPUT(tcp_ctloutput) #define udp_ctloutput udp_ctloutput_wrapper #define tcp_ctloutput tcp_ctloutput_wrapper -#if defined(FAST_IPSEC) +#if defined(IPSEC) PR_WRAP_CTLINPUT(ah4_ctlinput) #define ah4_ctlinput ah4_ctlinput_wrapper @@ -231,7 +231,7 @@ const struct protosw inetsw[] = { .pr_init = ipflow_poolinit, }, #endif /* GATEWAY */ -#ifdef FAST_IPSEC +#ifdef IPSEC { .pr_type = SOCK_RAW, .pr_domain = &inetdomain, .pr_protocol = IPPROTO_AH, @@ -252,7 +252,7 @@ const struct protosw inetsw[] = { .pr_flags = PR_ATOMIC|PR_ADDR, .pr_input = ipsec4_common_input, }, -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ { .pr_type = SOCK_RAW, .pr_domain = &inetdomain, .pr_protocol = IPPROTO_IPV4, Index: src/sys/netinet/ip_icmp.c diff -u src/sys/netinet/ip_icmp.c:1.130 src/sys/netinet/ip_icmp.c:1.131 --- src/sys/netinet/ip_icmp.c:1.130 Mon Mar 25 14:43:30 2013 +++ src/sys/netinet/ip_icmp.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: ip_icmp.c,v 1.130 2013/03/25 18:43:30 christos Exp $ */ +/* $NetBSD: ip_icmp.c,v 1.131 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -94,7 +94,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip_icmp.c,v 1.130 2013/03/25 18:43:30 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip_icmp.c,v 1.131 2013/06/05 19:01:26 christos Exp $"); #include "opt_ipsec.h" @@ -123,10 +123,10 @@ __KERNEL_RCSID(0, "$NetBSD: ip_icmp.c,v #include <netinet/icmp_var.h> #include <netinet/icmp_private.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/key.h> -#endif /* FAST_IPSEC*/ +#endif /* IPSEC*/ /* * ICMP routines: error generation, receive packet processing, and @@ -640,7 +640,7 @@ reflect: rtfree(rt); pfctlinput(PRC_REDIRECT_HOST, sintosa(&icmpsrc)); -#if defined(FAST_IPSEC) +#if defined(IPSEC) key_sa_routechange((struct sockaddr *)&icmpsrc); #endif break; Index: src/sys/netinet/ip_input.c diff -u src/sys/netinet/ip_input.c:1.303 src/sys/netinet/ip_input.c:1.304 --- src/sys/netinet/ip_input.c:1.303 Wed Nov 28 21:07:20 2012 +++ src/sys/netinet/ip_input.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: ip_input.c,v 1.303 2012/11/29 02:07:20 christos Exp $ */ +/* $NetBSD: ip_input.c,v 1.304 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -91,7 +91,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip_input.c,v 1.303 2012/11/29 02:07:20 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip_input.c,v 1.304 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_compat_netbsd.h" @@ -141,10 +141,10 @@ __KERNEL_RCSID(0, "$NetBSD: ip_input.c,v #endif #include <netinet/portalgo.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/key.h> -#endif /* FAST_IPSEC*/ +#endif /* IPSEC*/ #ifndef IPFORWARDING #ifdef GATEWAY @@ -405,12 +405,12 @@ ip_input(struct mbuf *m) int downmatch; int checkif; int srcrt = 0; -#ifdef FAST_IPSEC +#ifdef IPSEC struct m_tag *mtag; struct tdb_ident *tdbi; struct secpolicy *sp; int error, s; -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ MCLAIM(m, &ip_rx_mowner); KASSERT((m->m_flags & M_PKTHDR) != 0); @@ -550,7 +550,7 @@ ip_input(struct mbuf *m) * let ipfilter look at packet on the wire, * not the decapsulated packet. */ -#if defined(FAST_IPSEC) +#if defined(IPSEC) if (!ipsec_indone(m)) #else if (1) @@ -732,7 +732,7 @@ ip_input(struct mbuf *m) IP_STATINC(IP_STAT_CANTFORWARD); return; } -#ifdef FAST_IPSEC +#ifdef IPSEC mtag = m_tag_find(m, PACKET_TAG_IPSEC_IN_DONE, NULL); s = splsoftnet(); if (mtag != NULL) { @@ -779,7 +779,7 @@ ip_input(struct mbuf *m) } splx(s); } -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ ip_forward(m, srcrt); } @@ -809,7 +809,7 @@ ours: hlen = ip->ip_hl << 2; } -#ifdef FAST_IPSEC +#ifdef IPSEC /* * enforce IPsec policy checking if we are seeing last header. * note that we do not visit this with protocols with pcb layer @@ -846,7 +846,7 @@ DPRINTF(("ip_input: no SP, packet discar if (error) goto bad; } -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ /* * Switch out to protocol's input routine. @@ -1423,7 +1423,7 @@ ip_forward(struct mbuf *m, int srcrt) if ((rt = rtcache_validate(&ipforward_rt)) != NULL) destmtu = rt->rt_ifp->if_mtu; -#if defined(FAST_IPSEC) +#if defined(IPSEC) { /* * If the packet is routed over IPsec tunnel, tell the @@ -1468,7 +1468,7 @@ ip_forward(struct mbuf *m, int srcrt) KEY_FREESP(&sp); } } -#endif /*defined(FAST_IPSEC)*/ +#endif /*defined(IPSEC)*/ IP_STATINC(IP_STAT_CANTFRAG); break; Index: src/sys/netinet/ip_mroute.c diff -u src/sys/netinet/ip_mroute.c:1.126 src/sys/netinet/ip_mroute.c:1.127 --- src/sys/netinet/ip_mroute.c:1.126 Sun Sep 23 23:05:53 2012 +++ src/sys/netinet/ip_mroute.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: ip_mroute.c,v 1.126 2012/09/24 03:05:53 msaitoh Exp $ */ +/* $NetBSD: ip_mroute.c,v 1.127 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (c) 1992, 1993 @@ -93,7 +93,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip_mroute.c,v 1.126 2012/09/24 03:05:53 msaitoh Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip_mroute.c,v 1.127 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_ipsec.h" @@ -137,7 +137,7 @@ __KERNEL_RCSID(0, "$NetBSD: ip_mroute.c, #endif #include <netinet/ip_encap.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/key.h> #endif Index: src/sys/netinet/ip_output.c diff -u src/sys/netinet/ip_output.c:1.219 src/sys/netinet/ip_output.c:1.220 --- src/sys/netinet/ip_output.c:1.219 Tue Jun 4 18:47:37 2013 +++ src/sys/netinet/ip_output.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: ip_output.c,v 1.219 2013/06/04 22:47:37 christos Exp $ */ +/* $NetBSD: ip_output.c,v 1.220 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -91,7 +91,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip_output.c,v 1.219 2013/06/04 22:47:37 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip_output.c,v 1.220 2013/06/05 19:01:26 christos Exp $"); #include "opt_pfil_hooks.h" #include "opt_inet.h" @@ -107,7 +107,7 @@ __KERNEL_RCSID(0, "$NetBSD: ip_output.c, #include <sys/socket.h> #include <sys/socketvar.h> #include <sys/kauth.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <sys/domain.h> #endif #include <sys/systm.h> @@ -132,11 +132,11 @@ __KERNEL_RCSID(0, "$NetBSD: ip_output.c, #include <netinet/ip_mroute.h> #endif -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/key.h> #include <netipsec/xform.h> -#endif /* FAST_IPSEC*/ +#endif /* IPSEC*/ static struct mbuf *ip_insertoptions(struct mbuf *, struct mbuf *, int *); @@ -178,7 +178,7 @@ ip_output(struct mbuf *m0, ...) struct socket *so; va_list ap; int natt_frag = 0; -#ifdef FAST_IPSEC +#ifdef IPSEC struct inpcb *inp; struct secpolicy *sp = NULL; int s; @@ -205,12 +205,12 @@ ip_output(struct mbuf *m0, ...) va_end(ap); MCLAIM(m, &ip_tx_mowner); -#ifdef FAST_IPSEC +#ifdef IPSEC if (so != NULL && so->so_proto->pr_domain->dom_family == AF_INET) inp = (struct inpcb *)so->so_pcb; else inp = NULL; -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #ifdef DIAGNOSTIC if ((m->m_flags & M_PKTHDR) == 0) @@ -487,7 +487,7 @@ sendit: (rt->rt_rmx.rmx_locks & RTV_MTU) == 0) ip->ip_off |= htons(IP_DF); -#ifdef FAST_IPSEC +#ifdef IPSEC /* * Check the security policy (SP) for the packet and, if * required, do IPsec-related processing. There are two @@ -575,7 +575,7 @@ sendit: } } spd_done: -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #ifdef PFIL_HOOKS /* @@ -734,10 +734,10 @@ spd_done: done: rtcache_free(&iproute); -#ifdef FAST_IPSEC +#ifdef IPSEC if (sp != NULL) KEY_FREESP(&sp); -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ return (error); bad: @@ -1023,7 +1023,7 @@ ip_ctloutput(int op, struct socket *so, struct inpcb *inp = sotoinpcb(so); int optval = 0; int error = 0; -#if defined(FAST_IPSEC) +#if defined(IPSEC) struct lwp *l = curlwp; /*XXX*/ #endif @@ -1139,7 +1139,7 @@ ip_ctloutput(int op, struct socket *so, (struct inpcb_hdr *)inp, optval); break; -#if defined(FAST_IPSEC) +#if defined(IPSEC) case IP_IPSEC_POLICY: error = ipsec4_set_policy(inp, sopt->sopt_name, sopt->sopt_data, sopt->sopt_size, l->l_cred); @@ -1221,7 +1221,7 @@ ip_ctloutput(int op, struct socket *so, error = sockopt_setint(sopt, optval); break; -#if 0 /* defined(FAST_IPSEC) */ +#if 0 /* defined(IPSEC) */ case IP_IPSEC_POLICY: { struct mbuf *m = NULL; Index: src/sys/netinet/raw_ip.c diff -u src/sys/netinet/raw_ip.c:1.115 src/sys/netinet/raw_ip.c:1.116 --- src/sys/netinet/raw_ip.c:1.115 Tue Feb 5 12:30:02 2013 +++ src/sys/netinet/raw_ip.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: raw_ip.c,v 1.115 2013/02/05 17:30:02 joerg Exp $ */ +/* $NetBSD: raw_ip.c,v 1.116 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -61,7 +61,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: raw_ip.c,v 1.115 2013/02/05 17:30:02 joerg Exp $"); +__KERNEL_RCSID(0, "$NetBSD: raw_ip.c,v 1.116 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_compat_netbsd.h" @@ -94,11 +94,11 @@ __KERNEL_RCSID(0, "$NetBSD: raw_ip.c,v 1 #include <netinet/in_proto.h> #include <netinet/in_var.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/ipsec_var.h> #include <netipsec/ipsec_private.h> -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #ifdef COMPAT_50 #include <compat/sys/socket.h> @@ -203,7 +203,7 @@ rip_input(struct mbuf *m, ...) continue; if (last == NULL) ; -#if defined(FAST_IPSEC) +#if defined(IPSEC) /* check AH/ESP integrity. */ else if (ipsec4_in_reject_so(m, last->inp_socket)) { IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); @@ -217,7 +217,7 @@ rip_input(struct mbuf *m, ...) } last = inp; } -#if defined(FAST_IPSEC) +#if defined(IPSEC) /* check AH/ESP integrity. */ if (last != NULL && ipsec4_in_reject_so(m, last->inp_socket)) { m_freem(m); Index: src/sys/netinet/tcp_input.c diff -u src/sys/netinet/tcp_input.c:1.325 src/sys/netinet/tcp_input.c:1.326 --- src/sys/netinet/tcp_input.c:1.325 Fri Jun 22 11:09:36 2012 +++ src/sys/netinet/tcp_input.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: tcp_input.c,v 1.325 2012/06/22 15:09:36 christos Exp $ */ +/* $NetBSD: tcp_input.c,v 1.326 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -148,7 +148,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: tcp_input.c,v 1.325 2012/06/22 15:09:36 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: tcp_input.c,v 1.326 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_ipsec.h" @@ -223,7 +223,7 @@ __KERNEL_RCSID(0, "$NetBSD: tcp_input.c, #endif #endif /* INET6 */ -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/ipsec_var.h> #include <netipsec/ipsec_private.h> @@ -231,7 +231,7 @@ __KERNEL_RCSID(0, "$NetBSD: tcp_input.c, #ifdef INET6 #include <netipsec/ipsec6.h> #endif -#endif /* FAST_IPSEC*/ +#endif /* IPSEC*/ #include <netinet/tcp_vtw.h> @@ -1448,7 +1448,7 @@ findpcb: tcp_fields_to_host(th); goto dropwithreset_ratelim; } -#if defined(FAST_IPSEC) +#if defined(IPSEC) if (inp && (inp->inp_socket->so_options & SO_ACCEPTCONN) == 0 && ipsec4_in_reject(m, inp)) { IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); @@ -1491,7 +1491,7 @@ findpcb: tcp_fields_to_host(th); goto dropwithreset_ratelim; } -#if defined(FAST_IPSEC) +#if defined(IPSEC) if (in6p && (in6p->in6p_socket->so_options & SO_ACCEPTCONN) == 0 && ipsec6_in_reject(m, in6p)) { @@ -1800,7 +1800,7 @@ findpcb: } #endif -#if defined(FAST_IPSEC) +#if defined(IPSEC) switch (af) { #ifdef INET case AF_INET: @@ -3135,7 +3135,7 @@ struct secasvar * tcp_signature_getsav(struct mbuf *m, struct tcphdr *th) { struct secasvar *sav; -#ifdef FAST_IPSEC +#ifdef IPSEC union sockaddr_union dst; #endif struct ip *ip; @@ -3155,7 +3155,7 @@ tcp_signature_getsav(struct mbuf *m, str return (NULL); } -#ifdef FAST_IPSEC +#ifdef IPSEC /* Extract the destination from the IP header in the mbuf. */ memset(&dst, 0, sizeof(union sockaddr_union)); if (ip !=NULL) { @@ -3405,11 +3405,7 @@ tcp_dooptions(struct tcpcb *tp, const u_ if ((sigp ? TF_SIGNATURE : 0) ^ (tp->t_flags & TF_SIGNATURE)) { if (sav == NULL) return (-1); -#ifdef FAST_IPSEC KEY_FREESAV(&sav); -#else - key_freesav(sav); -#endif return (-1); } @@ -3421,11 +3417,7 @@ tcp_dooptions(struct tcpcb *tp, const u_ tcp_fields_to_host(th); if (sav == NULL) return (-1); -#ifdef FAST_IPSEC - KEY_FREESAV(&sav); -#else - key_freesav(sav); -#endif + KEY_FREESAV(sav); return (-1); } tcp_fields_to_host(th); @@ -3434,21 +3426,13 @@ tcp_dooptions(struct tcpcb *tp, const u_ TCP_STATINC(TCP_STAT_BADSIG); if (sav == NULL) return (-1); -#ifdef FAST_IPSEC - KEY_FREESAV(&sav); -#else - key_freesav(sav); -#endif + KEY_FREESAV(sav); return (-1); } else TCP_STATINC(TCP_STAT_GOODSIG); key_sa_recordxfer(sav, m); -#ifdef FAST_IPSEC KEY_FREESAV(&sav); -#else - key_freesav(sav); -#endif } #endif @@ -4060,7 +4044,7 @@ syn_cache_get(struct sockaddr *src, stru } #endif -#if defined(FAST_IPSEC) +#if defined(IPSEC) /* * we make a copy of policy, instead of sharing the policy, * for better behavior in terms of SA lookup and dead SA removal. @@ -4764,11 +4748,7 @@ syn_cache_respond(struct syn_cache *sc, (void)tcp_signature(m, th, hlen, sav, sigp); key_sa_recordxfer(sav, m); -#ifdef FAST_IPSEC KEY_FREESAV(&sav); -#else - key_freesav(sav); -#endif } #endif Index: src/sys/netinet/tcp_output.c diff -u src/sys/netinet/tcp_output.c:1.174 src/sys/netinet/tcp_output.c:1.175 --- src/sys/netinet/tcp_output.c:1.174 Thu Mar 22 16:34:39 2012 +++ src/sys/netinet/tcp_output.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: tcp_output.c,v 1.174 2012/03/22 20:34:39 drochner Exp $ */ +/* $NetBSD: tcp_output.c,v 1.175 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -135,7 +135,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: tcp_output.c,v 1.174 2012/03/22 20:34:39 drochner Exp $"); +__KERNEL_RCSID(0, "$NetBSD: tcp_output.c,v 1.175 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_ipsec.h" @@ -175,13 +175,13 @@ __KERNEL_RCSID(0, "$NetBSD: tcp_output.c #include <netinet6/nd6.h> #endif -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/key.h> #ifdef INET6 #include <netipsec/ipsec6.h> #endif -#endif /* FAST_IPSEC*/ +#endif /* IPSEC*/ #include <netinet/tcp.h> #define TCPOUTFLAGS @@ -350,7 +350,7 @@ tcp_segsize(struct tcpcb *tp, int *txseg */ #ifdef INET if (inp) { -#if defined(FAST_IPSEC) +#if defined(IPSEC) if (! IPSEC_PCB_SKIP_IPSEC(inp->inp_sp, IPSEC_DIR_OUTBOUND)) optlen += ipsec4_hdrsiz_tcp(tp); #endif @@ -360,7 +360,7 @@ tcp_segsize(struct tcpcb *tp, int *txseg #ifdef INET6 #ifdef INET if (in6p && tp->t_family == AF_INET) { -#if defined(FAST_IPSEC) +#if defined(IPSEC) if (! IPSEC_PCB_SKIP_IPSEC(in6p->in6p_sp, IPSEC_DIR_OUTBOUND)) optlen += ipsec4_hdrsiz_tcp(tp); #endif @@ -368,7 +368,7 @@ tcp_segsize(struct tcpcb *tp, int *txseg } else #endif if (in6p && tp->t_family == AF_INET6) { -#if defined(FAST_IPSEC) +#if defined(IPSEC) if (! IPSEC_PCB_SKIP_IPSEC(in6p->in6p_sp, IPSEC_DIR_OUTBOUND)) optlen += ipsec6_hdrsiz_tcp(tp); #endif @@ -626,7 +626,7 @@ tcp_output(struct tcpcb *tp) has_tso4 = has_tso6 = false; #if defined(INET) has_tso4 = tp->t_inpcb != NULL && -#if defined(FAST_IPSEC) +#if defined(IPSEC) IPSEC_PCB_SKIP_IPSEC(tp->t_inpcb->inp_sp, IPSEC_DIR_OUTBOUND) && #endif @@ -635,7 +635,7 @@ tcp_output(struct tcpcb *tp) #endif /* defined(INET) */ #if defined(INET6) has_tso6 = tp->t_in6pcb != NULL && -#if defined(FAST_IPSEC) +#if defined(IPSEC) IPSEC_PCB_SKIP_IPSEC(tp->t_in6pcb->in6p_sp, IPSEC_DIR_OUTBOUND) && #endif @@ -1427,11 +1427,7 @@ send: tcp_signature(m, th, (char *)th - mtod(m, char *), sav, sigp); key_sa_recordxfer(sav, m); -#ifdef FAST_IPSEC KEY_FREESAV(&sav); -#else - key_freesav(sav); -#endif } #endif Index: src/sys/netinet/tcp_subr.c diff -u src/sys/netinet/tcp_subr.c:1.249 src/sys/netinet/tcp_subr.c:1.250 --- src/sys/netinet/tcp_subr.c:1.249 Tue Apr 9 20:16:03 2013 +++ src/sys/netinet/tcp_subr.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: tcp_subr.c,v 1.249 2013/04/10 00:16:03 christos Exp $ */ +/* $NetBSD: tcp_subr.c,v 1.250 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -91,7 +91,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: tcp_subr.c,v 1.249 2013/04/10 00:16:03 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: tcp_subr.c,v 1.250 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_ipsec.h" @@ -146,14 +146,14 @@ __KERNEL_RCSID(0, "$NetBSD: tcp_subr.c,v #include <netinet/tcp_congctl.h> #include <netinet/tcpip.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/xform.h> #ifdef INET6 #include <netipsec/ipsec6.h> #endif #include <netipsec/key.h> -#endif /* FAST_IPSEC*/ +#endif /* IPSEC*/ struct inpcbtable tcbtable; /* head of queue of active tcpcb's */ @@ -2320,7 +2320,7 @@ tcp_new_iss1(void *laddr, void *faddr, u return (tcp_iss); } -#if defined(FAST_IPSEC) +#if defined(IPSEC) /* compute ESP/AH header size for TCP, including outer IP header. */ size_t ipsec4_hdrsiz_tcp(struct tcpcb *tp) Index: src/sys/netinet/udp_usrreq.c diff -u src/sys/netinet/udp_usrreq.c:1.189 src/sys/netinet/udp_usrreq.c:1.190 --- src/sys/netinet/udp_usrreq.c:1.189 Tue Jun 4 20:48:32 2013 +++ src/sys/netinet/udp_usrreq.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: udp_usrreq.c,v 1.189 2013/06/05 00:48:32 christos Exp $ */ +/* $NetBSD: udp_usrreq.c,v 1.190 2013/06/05 19:01:26 christos Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -61,7 +61,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: udp_usrreq.c,v 1.189 2013/06/05 00:48:32 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: udp_usrreq.c,v 1.190 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_compat_netbsd.h" @@ -118,7 +118,7 @@ __KERNEL_RCSID(0, "$NetBSD: udp_usrreq.c #include <net/if_faith.h> #endif -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/ipsec_var.h> #include <netipsec/ipsec_private.h> @@ -126,7 +126,7 @@ __KERNEL_RCSID(0, "$NetBSD: udp_usrreq.c #ifdef INET6 #include <netipsec/ipsec6.h> #endif -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #ifdef COMPAT_50 #include <compat/sys/socket.h> @@ -148,7 +148,7 @@ struct inpcbtable udbtable; percpu_t *udpstat_percpu; #ifdef INET -#ifdef FAST_IPSEC +#ifdef IPSEC static int udp4_espinudp (struct mbuf **, int, struct sockaddr *, struct socket *); #endif @@ -634,7 +634,7 @@ udp4_sendup(struct mbuf *m, int off /* o return; } -#if defined(FAST_IPSEC) +#if defined(IPSEC) /* check AH/ESP integrity. */ if (so != NULL && ipsec4_in_reject_so(m, so)) { IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); @@ -684,7 +684,7 @@ udp6_sendup(struct mbuf *m, int off /* o return; in6p = sotoin6pcb(so); -#if defined(FAST_IPSEC) +#if defined(IPSEC) /* check AH/ESP integrity. */ if (so != NULL && ipsec6_in_reject_so(m, so)) { IPSEC6_STATINC(IPSEC_STAT_IN_POLVIO); @@ -812,7 +812,7 @@ udp4_realinput(struct sockaddr_in *src, return rcvcnt; } -#ifdef FAST_IPSEC +#ifdef IPSEC /* Handle ESP over UDP */ if (inp->inp_flags & INP_ESPINUDP_ALL) { struct sockaddr *sa = (struct sockaddr *)src; @@ -1443,7 +1443,7 @@ udp_statinc(u_int stat) UDP_STATINC(stat); } -#if defined(INET) && defined(FAST_IPSEC) +#if defined(INET) && defined(IPSEC) /* * Returns: * 1 if the packet was processed @@ -1567,7 +1567,7 @@ udp4_espinudp(struct mbuf **mp, int off, ((u_int16_t *)(tag + 1))[1] = dport; m_tag_prepend(m, tag); -#ifdef FAST_IPSEC +#ifdef IPSEC ipsec4_common_input(m, iphdrlen, IPPROTO_ESP); #else esp4_input(m, iphdrlen); Index: src/sys/netinet6/icmp6.c diff -u src/sys/netinet6/icmp6.c:1.161 src/sys/netinet6/icmp6.c:1.162 --- src/sys/netinet6/icmp6.c:1.161 Fri Jun 22 23:14:03 2012 +++ src/sys/netinet6/icmp6.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: icmp6.c,v 1.161 2012/06/23 03:14:03 christos Exp $ */ +/* $NetBSD: icmp6.c,v 1.162 2013/06/05 19:01:26 christos Exp $ */ /* $KAME: icmp6.c,v 1.217 2001/06/20 15:03:29 jinmei Exp $ */ /* @@ -62,7 +62,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: icmp6.c,v 1.161 2012/06/23 03:14:03 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: icmp6.c,v 1.162 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_ipsec.h" @@ -99,7 +99,7 @@ __KERNEL_RCSID(0, "$NetBSD: icmp6.c,v 1. #include <netinet6/ip6protosw.h> #include <netinet6/scope6_var.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/key.h> #endif @@ -2316,7 +2316,7 @@ icmp6_redirect_input(struct mbuf *m, int sockaddr_in6_init(&sdst, &reddst6, 0, 0, 0); pfctlinput(PRC_REDIRECT_HOST, (struct sockaddr *)&sdst); -#if defined(FAST_IPSEC) +#if defined(IPSEC) key_sa_routechange((struct sockaddr *)&sdst); #endif } Index: src/sys/netinet6/in6_pcb.c diff -u src/sys/netinet6/in6_pcb.c:1.122 src/sys/netinet6/in6_pcb.c:1.123 --- src/sys/netinet6/in6_pcb.c:1.122 Fri Apr 12 17:30:40 2013 +++ src/sys/netinet6/in6_pcb.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: in6_pcb.c,v 1.122 2013/04/12 21:30:40 christos Exp $ */ +/* $NetBSD: in6_pcb.c,v 1.123 2013/06/05 19:01:26 christos Exp $ */ /* $KAME: in6_pcb.c,v 1.84 2001/02/08 18:02:08 itojun Exp $ */ /* @@ -62,7 +62,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: in6_pcb.c,v 1.122 2013/04/12 21:30:40 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: in6_pcb.c,v 1.123 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_ipsec.h" @@ -99,11 +99,11 @@ __KERNEL_RCSID(0, "$NetBSD: in6_pcb.c,v #include "faith.h" -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/ipsec6.h> #include <netipsec/key.h> -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #include <netinet/tcp_vtw.h> @@ -157,7 +157,7 @@ in6_pcballoc(struct socket *so, void *v) struct inpcbtable *table = v; struct in6pcb *in6p; int s; -#if defined(FAST_IPSEC) +#if defined(IPSEC) int error; #endif @@ -174,7 +174,7 @@ in6_pcballoc(struct socket *so, void *v) in6p->in6p_icmp6filt = NULL; in6p->in6p_portalgo = PORTALGO_DEFAULT; in6p->in6p_bindportonsend = false; -#if defined(FAST_IPSEC) +#if defined(IPSEC) error = ipsec_init_pcbpolicy(so, &in6p->in6p_sp); if (error != 0) { s = splnet(); @@ -566,7 +566,7 @@ in6_pcbconnect(void *v, struct mbuf *nam if (ip6_auto_flowlabel) in6p->in6p_flowinfo |= (htonl(ip6_randomflowlabel()) & IPV6_FLOWLABEL_MASK); -#if defined(FAST_IPSEC) +#if defined(IPSEC) if (in6p->in6p_socket->so_type == SOCK_STREAM) ipsec_pcbconn(in6p->in6p_sp); #endif @@ -580,7 +580,7 @@ in6_pcbdisconnect(struct in6pcb *in6p) in6p->in6p_fport = 0; in6_pcbstate(in6p, IN6P_BOUND); in6p->in6p_flowinfo &= ~IPV6_FLOWLABEL_MASK; -#if defined(FAST_IPSEC) +#if defined(IPSEC) ipsec_pcbdisconn(in6p->in6p_sp); #endif if (in6p->in6p_socket->so_state & SS_NOFDREF) @@ -596,7 +596,7 @@ in6_pcbdetach(struct in6pcb *in6p) if (in6p->in6p_af != AF_INET6) return; -#if defined(FAST_IPSEC) +#if defined(IPSEC) ipsec6_delete_pcbpolicy(in6p); #endif /* IPSEC */ so->so_pcb = 0; Index: src/sys/netinet6/in6_proto.c diff -u src/sys/netinet6/in6_proto.c:1.98 src/sys/netinet6/in6_proto.c:1.99 --- src/sys/netinet6/in6_proto.c:1.98 Fri Mar 1 13:25:58 2013 +++ src/sys/netinet6/in6_proto.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: in6_proto.c,v 1.98 2013/03/01 18:25:58 joerg Exp $ */ +/* $NetBSD: in6_proto.c,v 1.99 2013/06/05 19:01:26 christos Exp $ */ /* $KAME: in6_proto.c,v 1.66 2000/10/10 15:35:47 itojun Exp $ */ /* @@ -62,7 +62,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: in6_proto.c,v 1.98 2013/03/01 18:25:58 joerg Exp $"); +__KERNEL_RCSID(0, "$NetBSD: in6_proto.c,v 1.99 2013/06/05 19:01:26 christos Exp $"); #include "opt_gateway.h" #include "opt_inet.h" @@ -106,11 +106,11 @@ __KERNEL_RCSID(0, "$NetBSD: in6_proto.c, #include <netinet6/nd6.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/ipsec6.h> #include <netipsec/key.h> -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #include "carp.h" @@ -163,13 +163,13 @@ PR_WRAP_CTLOUTPUT(icmp6_ctloutput) #define udp6_ctloutput udp6_ctloutput_wrapper #define icmp6_ctloutput icmp6_ctloutput_wrapper -#if defined(FAST_IPSEC) +#if defined(IPSEC) PR_WRAP_CTLINPUT(ah6_ctlinput) #define ah6_ctlinput ah6_ctlinput_wrapper #endif -#if defined(FAST_IPSEC) +#if defined(IPSEC) PR_WRAP_CTLINPUT(esp6_ctlinput) #define esp6_ctlinput esp6_ctlinput_wrapper @@ -254,7 +254,7 @@ const struct ip6protosw inet6sw[] = { .pr_flags = PR_ATOMIC|PR_ADDR, .pr_input = frag6_input, }, -#ifdef FAST_IPSEC +#ifdef IPSEC { .pr_type = SOCK_RAW, .pr_domain = &inet6domain, .pr_protocol = IPPROTO_AH, @@ -275,7 +275,7 @@ const struct ip6protosw inet6sw[] = { .pr_flags = PR_ATOMIC|PR_ADDR, .pr_input = ipsec6_common_input, }, -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #ifdef INET { .pr_type = SOCK_RAW, .pr_domain = &inet6domain, Index: src/sys/netinet6/ip6_forward.c diff -u src/sys/netinet6/ip6_forward.c:1.70 src/sys/netinet6/ip6_forward.c:1.71 --- src/sys/netinet6/ip6_forward.c:1.70 Thu Mar 22 16:34:40 2012 +++ src/sys/netinet6/ip6_forward.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: ip6_forward.c,v 1.70 2012/03/22 20:34:40 drochner Exp $ */ +/* $NetBSD: ip6_forward.c,v 1.71 2013/06/05 19:01:26 christos Exp $ */ /* $KAME: ip6_forward.c,v 1.109 2002/09/11 08:10:17 sakane Exp $ */ /* @@ -31,7 +31,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip6_forward.c,v 1.70 2012/03/22 20:34:40 drochner Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip6_forward.c,v 1.71 2013/06/05 19:01:26 christos Exp $"); #include "opt_gateway.h" #include "opt_ipsec.h" @@ -62,12 +62,12 @@ __KERNEL_RCSID(0, "$NetBSD: ip6_forward. #include <netinet/icmp6.h> #include <netinet6/nd6.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/ipsec6.h> #include <netipsec/key.h> #include <netipsec/xform.h> -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #ifdef PFIL_HOOKS #include <net/pfil.h> @@ -105,10 +105,10 @@ ip6_forward(struct mbuf *m, int srcrt) struct ifnet *origifp; /* maybe unnecessary */ u_int32_t inzone, outzone; struct in6_addr src_in6, dst_in6; -#ifdef FAST_IPSEC - struct secpolicy *sp = NULL; - int needipsec = 0; - int s; +#ifdef IPSEC + struct secpolicy *sp = NULL; + int needipsec = 0; + int s; #endif /* @@ -160,7 +160,7 @@ ip6_forward(struct mbuf *m, int srcrt) */ mcopy = m_copy(m, 0, imin(m->m_pkthdr.len, ICMPV6_PLD_MAXLEN)); -#ifdef FAST_IPSEC +#ifdef IPSEC /* Check the security policy (SP) for the packet */ sp = ipsec6_check_policy(m,NULL,0,&needipsec,&error); @@ -175,7 +175,7 @@ ip6_forward(struct mbuf *m, int srcrt) error = 0; goto freecopy; } -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ if (srcrt) { union { @@ -261,22 +261,20 @@ ip6_forward(struct mbuf *m, int srcrt) m_freem(m); return; } -#ifdef FAST_IPSEC - /* - * If we need to encapsulate the packet, do it here - * ipsec6_proces_packet will send the packet using ip6_output - */ +#ifdef IPSEC + /* + * If we need to encapsulate the packet, do it here + * ipsec6_proces_packet will send the packet using ip6_output + */ if (needipsec) { s = splsoftnet(); error = ipsec6_process_packet(m,sp->req); splx(s); if (mcopy) goto freecopy; - } + } #endif - - /* * Destination scope check: if a packet is going to break the scope * zone of packet's destination address, discard it. This case should Index: src/sys/netinet6/ip6_input.c diff -u src/sys/netinet6/ip6_input.c:1.141 src/sys/netinet6/ip6_input.c:1.142 --- src/sys/netinet6/ip6_input.c:1.141 Wed Nov 28 21:07:20 2012 +++ src/sys/netinet6/ip6_input.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: ip6_input.c,v 1.141 2012/11/29 02:07:20 christos Exp $ */ +/* $NetBSD: ip6_input.c,v 1.142 2013/06/05 19:01:26 christos Exp $ */ /* $KAME: ip6_input.c,v 1.188 2001/03/29 05:34:31 itojun Exp $ */ /* @@ -62,7 +62,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip6_input.c,v 1.141 2012/11/29 02:07:20 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip6_input.c,v 1.142 2013/06/05 19:01:26 christos Exp $"); #include "opt_gateway.h" #include "opt_inet.h" @@ -113,11 +113,11 @@ __KERNEL_RCSID(0, "$NetBSD: ip6_input.c, #include <netinet6/in6_ifattach.h> #include <netinet6/nd6.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/ipsec6.h> #include <netipsec/key.h> -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ #ifdef COMPAT_50 #include <compat/sys/time.h> @@ -269,7 +269,7 @@ ip6_input(struct mbuf *m) struct sockaddr dst; struct sockaddr_in6 dst6; } u; -#ifdef FAST_IPSEC +#ifdef IPSEC struct m_tag *mtag; struct tdb_ident *tdbi; struct secpolicy *sp; @@ -357,7 +357,7 @@ ip6_input(struct mbuf *m) * let ipfilter look at packet on the wire, * not the decapsulated packet. */ -#if defined(FAST_IPSEC) +#if defined(IPSEC) if (!ipsec_indone(m)) #else if (1) @@ -766,7 +766,7 @@ ip6_input(struct mbuf *m) } } -#ifdef FAST_IPSEC +#ifdef IPSEC /* * enforce IPsec policy checking if we are seeing last header. * note that we do not visit this with protocols with pcb layer @@ -803,7 +803,7 @@ ip6_input(struct mbuf *m) if (error) goto bad; } -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ nxt = (*inet6sw[ip6_protox[nxt]].pr_input)(&m, &off, nxt); Index: src/sys/netinet6/ip6_output.c diff -u src/sys/netinet6/ip6_output.c:1.152 src/sys/netinet6/ip6_output.c:1.153 --- src/sys/netinet6/ip6_output.c:1.152 Mon Mar 18 15:31:39 2013 +++ src/sys/netinet6/ip6_output.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: ip6_output.c,v 1.152 2013/03/18 19:31:39 gdt Exp $ */ +/* $NetBSD: ip6_output.c,v 1.153 2013/06/05 19:01:26 christos Exp $ */ /* $KAME: ip6_output.c,v 1.172 2001/03/25 09:55:56 itojun Exp $ */ /* @@ -62,7 +62,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip6_output.c,v 1.152 2013/03/18 19:31:39 gdt Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip6_output.c,v 1.153 2013/06/05 19:01:26 christos Exp $"); #include "opt_inet.h" #include "opt_inet6.h" @@ -100,7 +100,7 @@ __KERNEL_RCSID(0, "$NetBSD: ip6_output.c #include <netinet6/ip6protosw.h> #include <netinet6/scope6_var.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/ipsec6.h> #include <netipsec/key.h> @@ -184,7 +184,7 @@ ip6_output( struct route *ro_pmtu = NULL; int hdrsplit = 0; int needipsec = 0; -#ifdef FAST_IPSEC +#ifdef IPSEC struct secpolicy *sp = NULL; int s; #endif @@ -245,7 +245,7 @@ ip6_output( /* NOTE: we don't add AH/ESP length here. do that later. */ if (exthdrs.ip6e_dest2) optlen += exthdrs.ip6e_dest2->m_len; -#ifdef FAST_IPSEC +#ifdef IPSEC /* Check the security policy (SP) for the packet */ sp = ipsec6_check_policy(m,so,flags,&needipsec,&error); @@ -260,7 +260,7 @@ ip6_output( error = 0; goto freehdrs; } -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ if (needipsec && @@ -467,7 +467,7 @@ ip6_output( ip6->ip6_hlim = ip6_defmcasthlim; } -#ifdef FAST_IPSEC +#ifdef IPSEC if (needipsec) { s = splsoftnet(); error = ipsec6_process_packet(m,sp->req); @@ -483,7 +483,7 @@ ip6_output( splx(s); goto done; } -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ @@ -976,10 +976,10 @@ sendorfree: done: rtcache_free(&ip6route); -#ifdef FAST_IPSEC +#ifdef IPSEC if (sp != NULL) KEY_FREESP(&sp); -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ return (error); @@ -1652,7 +1652,7 @@ else \ (struct inpcb_hdr *)in6p, optval); break; -#if defined(FAST_IPSEC) +#if defined(IPSEC) case IPV6_IPSEC_POLICY: error = ipsec6_set_policy(in6p, optname, sopt->sopt_data, sopt->sopt_size, kauth_cred_get()); @@ -1841,7 +1841,7 @@ else \ error = sockopt_setint(sopt, optval); break; -#if defined(FAST_IPSEC) +#if defined(IPSEC) case IPV6_IPSEC_POLICY: { struct mbuf *m = NULL; Index: src/sys/netinet6/raw_ip6.c diff -u src/sys/netinet6/raw_ip6.c:1.110 src/sys/netinet6/raw_ip6.c:1.111 --- src/sys/netinet6/raw_ip6.c:1.110 Thu Mar 22 16:34:41 2012 +++ src/sys/netinet6/raw_ip6.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: raw_ip6.c,v 1.110 2012/03/22 20:34:41 drochner Exp $ */ +/* $NetBSD: raw_ip6.c,v 1.111 2013/06/05 19:01:26 christos Exp $ */ /* $KAME: raw_ip6.c,v 1.82 2001/07/23 18:57:56 jinmei Exp $ */ /* @@ -62,7 +62,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: raw_ip6.c,v 1.110 2012/03/22 20:34:41 drochner Exp $"); +__KERNEL_RCSID(0, "$NetBSD: raw_ip6.c,v 1.111 2013/06/05 19:01:26 christos Exp $"); #include "opt_ipsec.h" @@ -97,7 +97,7 @@ __KERNEL_RCSID(0, "$NetBSD: raw_ip6.c,v #include <netinet6/scope6_var.h> #include <netinet6/raw_ip6.h> -#ifdef FAST_IPSEC +#ifdef IPSEC #include <netipsec/ipsec.h> #include <netipsec/ipsec_var.h> #include <netipsec/ipsec_private.h> @@ -201,12 +201,12 @@ rip6_input(struct mbuf **mp, int *offp, if (last) { struct mbuf *n; -#ifdef FAST_IPSEC +#ifdef IPSEC /* * Check AH/ESP integrity */ if (!ipsec6_in_reject(m,last)) -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ if ((n = m_copy(m, 0, (int)M_COPYALL)) != NULL) { if (last->in6p_flags & IN6P_CONTROLOPTS) ip6_savecontrol(last, &opts, ip6, n); @@ -226,7 +226,7 @@ rip6_input(struct mbuf **mp, int *offp, } last = in6p; } -#ifdef FAST_IPSEC +#ifdef IPSEC if (last && ipsec6_in_reject(m, last)) { m_freem(m); /* @@ -239,7 +239,7 @@ rip6_input(struct mbuf **mp, int *offp, IP6_STATDEC(IP6_STAT_DELIVERED); /* do not inject data into pcb */ } else -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ if (last) { if (last->in6p_flags & IN6P_CONTROLOPTS) ip6_savecontrol(last, &opts, ip6, m); Index: src/sys/netipsec/files.netipsec diff -u src/sys/netipsec/files.netipsec:1.11 src/sys/netipsec/files.netipsec:1.12 --- src/sys/netipsec/files.netipsec:1.11 Tue Jun 4 18:47:37 2013 +++ src/sys/netipsec/files.netipsec Wed Jun 5 15:01:26 2013 @@ -1,22 +1,21 @@ -# $Id: files.netipsec,v 1.11 2013/06/04 22:47:37 christos Exp $ +# $Id: files.netipsec,v 1.12 2013/06/05 19:01:26 christos Exp $ # # -defflag opt_ipsec.h FAST_IPSEC: opencrypto -defflag opt_ipsec.h IPSEC: FAST_IPSEC +defflag opt_ipsec.h IPSEC: opencrypto defflag opt_ipsec.h IPSEC_DEBUG -file netipsec/ipsec.c fast_ipsec needs-flag -file netipsec/ipsec_input.c fast_ipsec -file netipsec/ipsec_mbuf.c fast_ipsec -file netipsec/ipsec_output.c fast_ipsec -file netipsec/xform_ah.c fast_ipsec -file netipsec/xform_esp.c fast_ipsec -file netipsec/xform_ipcomp.c fast_ipsec -file netipsec/xform_ipip.c fast_ipsec -file netipsec/ipsec_netbsd.c fast_ipsec +file netipsec/ipsec.c ipsec needs-flag +file netipsec/ipsec_input.c ipsec +file netipsec/ipsec_mbuf.c ipsec +file netipsec/ipsec_output.c ipsec +file netipsec/xform_ah.c ipsec +file netipsec/xform_esp.c ipsec +file netipsec/xform_ipcomp.c ipsec +file netipsec/xform_ipip.c ipsec +file netipsec/ipsec_netbsd.c ipsec -file netipsec/key.c fast_ipsec -file netipsec/key_debug.c fast_ipsec -file netipsec/keysock.c fast_ipsec +file netipsec/key.c ipsec +file netipsec/key_debug.c ipsec +file netipsec/keysock.c ipsec -file netipsec/xform_tcp.c fast_ipsec & tcp_signature +file netipsec/xform_tcp.c ipsec & tcp_signature Index: src/sys/netipsec/key.c diff -u src/sys/netipsec/key.c:1.80 src/sys/netipsec/key.c:1.81 --- src/sys/netipsec/key.c:1.80 Tue Jun 4 18:47:37 2013 +++ src/sys/netipsec/key.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: key.c,v 1.80 2013/06/04 22:47:37 christos Exp $ */ +/* $NetBSD: key.c,v 1.81 2013/06/05 19:01:26 christos Exp $ */ /* $FreeBSD: src/sys/netipsec/key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $ */ /* $KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.80 2013/06/04 22:47:37 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.81 2013/06/05 19:01:26 christos Exp $"); /* * This code is referd to RFC 2367 @@ -8179,7 +8179,7 @@ sysctl_net_key_dumpsp(SYSCTLFN_ARGS) } /* - * Create sysctl tree for native FAST_IPSEC key knobs, originally + * Create sysctl tree for native IPSEC key knobs, originally * under name "net.keyv2" * with MIB number { CTL_NET, PF_KEY_V2. }. * However, sysctl(8) never checked for nodes under { CTL_NET, PF_KEY_V2 }; * and in any case the part of our sysctl namespace used for dumping the @@ -8187,16 +8187,16 @@ sysctl_net_key_dumpsp(SYSCTLFN_ARGS) * namespace, for API reasons. * * Pending a consensus on the right way to fix this, add a level of - * indirection in how we number the `native' FAST_IPSEC key nodes; + * indirection in how we number the `native' IPSEC key nodes; * and (as requested by Andrew Brown) move registration of the * KAME-compatible names to a separate function. */ #if 0 -# define FAST_IPSEC_PFKEY PF_KEY_V2 -# define FAST_IPSEC_PFKEY_NAME "keyv2" +# define IPSEC_PFKEY PF_KEY_V2 +# define IPSEC_PFKEY_NAME "keyv2" #else -# define FAST_IPSEC_PFKEY PF_KEY -# define FAST_IPSEC_PFKEY_NAME "key" +# define IPSEC_PFKEY PF_KEY +# define IPSEC_PFKEY_NAME "key" #endif static int @@ -8216,55 +8216,55 @@ SYSCTL_SETUP(sysctl_net_keyv2_setup, "sy CTL_NET, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT, - CTLTYPE_NODE, FAST_IPSEC_PFKEY_NAME, NULL, + CTLTYPE_NODE, IPSEC_PFKEY_NAME, NULL, NULL, 0, NULL, 0, - CTL_NET, FAST_IPSEC_PFKEY, CTL_EOL); + CTL_NET, IPSEC_PFKEY, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "debug", NULL, NULL, 0, &key_debug_level, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_DEBUG_LEVEL, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_DEBUG_LEVEL, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "spi_try", NULL, NULL, 0, &key_spi_trycnt, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_SPI_TRY, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_SPI_TRY, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "spi_min_value", NULL, NULL, 0, &key_spi_minval, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_SPI_MIN_VALUE, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_SPI_MIN_VALUE, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "spi_max_value", NULL, NULL, 0, &key_spi_maxval, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_SPI_MAX_VALUE, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_SPI_MAX_VALUE, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "random_int", NULL, NULL, 0, &key_int_random, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_RANDOM_INT, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_RANDOM_INT, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "larval_lifetime", NULL, NULL, 0, &key_larval_lifetime, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_LARVAL_LIFETIME, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_LARVAL_LIFETIME, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "blockacq_count", NULL, NULL, 0, &key_blockacq_count, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_BLOCKACQ_COUNT, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_BLOCKACQ_COUNT, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "blockacq_lifetime", NULL, NULL, 0, &key_blockacq_lifetime, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_BLOCKACQ_LIFETIME, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_BLOCKACQ_LIFETIME, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "esp_keymin", NULL, NULL, 0, &ipsec_esp_keymin, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_ESP_KEYMIN, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_ESP_KEYMIN, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "prefered_oldsa", NULL, @@ -8274,26 +8274,26 @@ SYSCTL_SETUP(sysctl_net_keyv2_setup, "sy CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "esp_auth", NULL, NULL, 0, &ipsec_esp_auth, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_ESP_AUTH, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_ESP_AUTH, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT|CTLFLAG_READWRITE, CTLTYPE_INT, "ah_keymin", NULL, NULL, 0, &ipsec_ah_keymin, 0, - CTL_NET, FAST_IPSEC_PFKEY, KEYCTL_AH_KEYMIN, CTL_EOL); + CTL_NET, IPSEC_PFKEY, KEYCTL_AH_KEYMIN, CTL_EOL); sysctl_createv(clog, 0, NULL, NULL, CTLFLAG_PERMANENT, CTLTYPE_STRUCT, "stats", SYSCTL_DESCR("PF_KEY statistics"), sysctl_net_key_stats, 0, NULL, 0, - CTL_NET, FAST_IPSEC_PFKEY, CTL_CREATE, CTL_EOL); + CTL_NET, IPSEC_PFKEY, CTL_CREATE, CTL_EOL); } /* * Register sysctl names used by setkey(8). For historical reasons, * and to share a single API, these names appear under { CTL_NET, PF_KEY } - * for both FAST_IPSEC and KAME IPSEC. + * for both IPSEC and KAME IPSEC. */ -SYSCTL_SETUP(sysctl_net_key_compat_setup, "sysctl net.key subtree setup for FAST_IPSEC") +SYSCTL_SETUP(sysctl_net_key_compat_setup, "sysctl net.key subtree setup for IPSEC") { /* Make sure net.key exists before we register nodes underneath it. */ Index: src/sys/netipsec/xform_ipip.c diff -u src/sys/netipsec/xform_ipip.c:1.28 src/sys/netipsec/xform_ipip.c:1.29 --- src/sys/netipsec/xform_ipip.c:1.28 Sun Jul 17 16:54:54 2011 +++ src/sys/netipsec/xform_ipip.c Wed Jun 5 15:01:26 2013 @@ -1,4 +1,4 @@ -/* $NetBSD: xform_ipip.c,v 1.28 2011/07/17 20:54:54 joerg Exp $ */ +/* $NetBSD: xform_ipip.c,v 1.29 2013/06/05 19:01:26 christos Exp $ */ /* $FreeBSD: src/sys/netipsec/xform_ipip.c,v 1.3.2.1 2003/01/24 05:11:36 sam Exp $ */ /* $OpenBSD: ip_ipip.c,v 1.25 2002/06/10 18:04:55 itojun Exp $ */ @@ -39,7 +39,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.28 2011/07/17 20:54:54 joerg Exp $"); +__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.29 2013/06/05 19:01:26 christos Exp $"); /* * IP-inside-IP processing @@ -650,7 +650,7 @@ bad: return (error); } -#ifdef FAST_IPSEC +#ifdef IPSEC static int ipe4_init(struct secasvar *sav, const struct xformsw *xsp) { @@ -733,7 +733,7 @@ static struct ip6protosw ipe4_protosw6 = }; #endif -#endif /* FAST_IPSEC */ +#endif /* IPSEC */ /* * Check the encapsulated packet to see if we want it