Module Name: src Committed By: ozaki-r Date: Wed Apr 19 03:39:14 UTC 2017
Modified Files: src/sys/netipsec: ipsec.c ipsec.h ipsec_input.c ipsec_mbuf.c ipsec_output.c ipsec_private.h key.c keysock.c xform_ah.c xform_esp.c xform_ipcomp.c xform_ipip.c xform_tcp.c Removed Files: src/sys/netipsec: ipsec_osdep.h Log Message: Retire ipsec_osdep.h We don't need to care other OSes (FreeBSD) anymore. Some macros are alive in ipsec_private.h. To generate a diff of this commit: cvs rdiff -u -r1.74 -r1.75 src/sys/netipsec/ipsec.c cvs rdiff -u -r1.40 -r1.41 src/sys/netipsec/ipsec.h \ src/sys/netipsec/ipsec_input.c cvs rdiff -u -r1.14 -r1.15 src/sys/netipsec/ipsec_mbuf.c cvs rdiff -u -r1.26 -r0 src/sys/netipsec/ipsec_osdep.h cvs rdiff -u -r1.44 -r1.45 src/sys/netipsec/ipsec_output.c cvs rdiff -u -r1.3 -r1.4 src/sys/netipsec/ipsec_private.h cvs rdiff -u -r1.108 -r1.109 src/sys/netipsec/key.c cvs rdiff -u -r1.50 -r1.51 src/sys/netipsec/keysock.c cvs rdiff -u -r1.52 -r1.53 src/sys/netipsec/xform_ah.c cvs rdiff -u -r1.53 -r1.54 src/sys/netipsec/xform_esp.c cvs rdiff -u -r1.36 -r1.37 src/sys/netipsec/xform_ipcomp.c cvs rdiff -u -r1.47 -r1.48 src/sys/netipsec/xform_ipip.c cvs rdiff -u -r1.10 -r1.11 src/sys/netipsec/xform_tcp.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/netipsec/ipsec.c diff -u src/sys/netipsec/ipsec.c:1.74 src/sys/netipsec/ipsec.c:1.75 --- src/sys/netipsec/ipsec.c:1.74 Wed Apr 19 03:28:19 2017 +++ src/sys/netipsec/ipsec.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec.c,v 1.74 2017/04/19 03:28:19 ozaki-r Exp $ */ +/* $NetBSD: ipsec.c,v 1.75 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $ */ /* $KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.74 2017/04/19 03:28:19 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.75 2017/04/19 03:39:14 ozaki-r Exp $"); /* * IPsec controller part. @@ -101,8 +101,6 @@ __KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1. #include <netipsec/xform.h> -#include <netipsec/ipsec_osdep.h> - #include <net/net_osdep.h> int ipsec_used = 0; @@ -155,7 +153,7 @@ static int ipsec_invalpcbcache (struct i int crypto_support = 0; static struct secpolicy *ipsec_getpolicybysock(struct mbuf *, u_int, - PCB_T *, int *); + struct inpcb_hdr *, int *); #ifdef __FreeBSD__ /* net.inet.ipsec */ @@ -463,7 +461,8 @@ ipsec_getpolicy(const struct tdb_ident * * NOTE: IPv6 mapped address concern is implemented here. */ static struct secpolicy * -ipsec_getpolicybysock(struct mbuf *m, u_int dir, PCB_T *inp, int *error) +ipsec_getpolicybysock(struct mbuf *m, u_int dir, struct inpcb_hdr *inp, + int *error) { struct inpcbpolicy *pcbsp = NULL; struct secpolicy *currsp = NULL; /* policy on socket */ @@ -476,10 +475,10 @@ ipsec_getpolicybysock(struct mbuf *m, u_ KASSERTMSG(dir == IPSEC_DIR_INBOUND || dir == IPSEC_DIR_OUTBOUND, "invalid direction %u", dir); - KASSERT(PCB_SOCKET(inp) != NULL); + KASSERT(inp->inph_socket != NULL); /* XXX FIXME inpcb/in6pcb vs socket*/ - af = PCB_FAMILY(inp); + af = inp->inph_af; KASSERTMSG(af == AF_INET || af == AF_INET6, "unexpected protocol family %u", af); @@ -495,7 +494,7 @@ ipsec_getpolicybysock(struct mbuf *m, u_ switch (af) { case AF_INET: { - struct inpcb *in4p = PCB_TO_IN4PCB(inp); + struct inpcb *in4p = (struct inpcb *)inp; /* set spidx in pcb */ *error = ipsec4_setspidx_inpcb(m, in4p); pcbsp = in4p->inp_sp; @@ -504,7 +503,7 @@ ipsec_getpolicybysock(struct mbuf *m, u_ #if defined(INET6) case AF_INET6: { - struct in6pcb *in6p = PCB_TO_IN6PCB(inp); + struct in6pcb *in6p = (struct in6pcb *)inp; /* set spidx in pcb */ *error = ipsec6_setspidx_in6pcb(m, in6p); pcbsp = in6p->in6p_sp; @@ -644,7 +643,7 @@ ipsec4_checkpolicy(struct mbuf *m, u_int if (inp == NULL || inp->inp_socket == NULL) { sp = ipsec_getpolicybyaddr(m, dir, flag, error); } else - sp = ipsec_getpolicybysock(m, dir, IN4PCB_TO_PCB(inp), error); + sp = ipsec_getpolicybysock(m, dir, (struct inpcb_hdr *)inp, error); if (sp == NULL) { KASSERTMSG(*error != 0, "getpolicy failed w/o error"); IPSEC_STATINC(IPSEC_STAT_OUT_INVAL); @@ -889,7 +888,7 @@ ipsec6_checkpolicy(struct mbuf *m, u_int if (in6p == NULL || in6p->in6p_socket == NULL) { sp = ipsec_getpolicybyaddr(m, dir, flag, error); } else - sp = ipsec_getpolicybysock(m, dir, IN6PCB_TO_PCB(in6p), error); + sp = ipsec_getpolicybysock(m, dir, (struct inpcb_hdr *)in6p, error); if (sp == NULL) { KASSERTMSG(*error != 0, "getpolicy failed w/o error"); IPSEC_STATINC(IPSEC_STAT_OUT_INVAL); @@ -1071,7 +1070,7 @@ ipsec4_get_ulp(struct mbuf *m, struct se /* NB: ip_input() flips it into host endian XXX need more checking */ if (m->m_len >= sizeof(struct ip)) { struct ip *ip = mtod(m, struct ip *); - if (ip->ip_off & IP_OFF_CONVERT(IP_MF | IP_OFFMASK)) + if (ip->ip_off & htons(IP_MF | IP_OFFMASK)) goto done; off = ip->ip_hl << 2; nxt = ip->ip_p; @@ -1079,7 +1078,7 @@ ipsec4_get_ulp(struct mbuf *m, struct se struct ip ih; m_copydata(m, 0, sizeof (struct ip), &ih); - if (ih.ip_off & IP_OFF_CONVERT(IP_MF | IP_OFFMASK)) + if (ih.ip_off & htons(IP_MF | IP_OFFMASK)) goto done; off = ih.ip_hl << 2; nxt = ih.ip_p; @@ -1856,7 +1855,7 @@ ipsec4_in_reject(struct mbuf *m, struct sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_INBOUND, IP_FORWARDING, &error); else sp = ipsec_getpolicybysock(m, IPSEC_DIR_INBOUND, - IN4PCB_TO_PCB(inp), &error); + (struct inpcb_hdr *)inp, &error); if (sp != NULL) { result = ipsec_in_reject(sp, m); @@ -1896,7 +1895,7 @@ ipsec6_in_reject(struct mbuf *m, struct sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_INBOUND, IP_FORWARDING, &error); else sp = ipsec_getpolicybysock(m, IPSEC_DIR_INBOUND, - IN6PCB_TO_PCB(in6p), + (struct inpcb_hdr *)in6p, &error); if (sp != NULL) { @@ -1994,7 +1993,7 @@ ipsec4_hdrsiz(struct mbuf *m, u_int dir, sp = ipsec_getpolicybyaddr(m, dir, IP_FORWARDING, &error); else sp = ipsec_getpolicybysock(m, dir, - IN4PCB_TO_PCB(inp), &error); + (struct inpcb_hdr *)inp, &error); if (sp != NULL) { size = ipsec_hdrsiz(sp); @@ -2029,7 +2028,7 @@ ipsec6_hdrsiz(struct mbuf *m, u_int dir, sp = ipsec_getpolicybyaddr(m, dir, IP_FORWARDING, &error); else sp = ipsec_getpolicybysock(m, dir, - IN6PCB_TO_PCB(in6p), + (struct inpcb_hdr *)in6p, &error); if (sp == NULL) Index: src/sys/netipsec/ipsec.h diff -u src/sys/netipsec/ipsec.h:1.40 src/sys/netipsec/ipsec.h:1.41 --- src/sys/netipsec/ipsec.h:1.40 Tue Apr 18 05:25:32 2017 +++ src/sys/netipsec/ipsec.h Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec.h,v 1.40 2017/04/18 05:25:32 ozaki-r Exp $ */ +/* $NetBSD: ipsec.h,v 1.41 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec.h,v 1.2.4.2 2004/02/14 22:23:23 bms Exp $ */ /* $KAME: ipsec.h,v 1.53 2001/11/20 08:32:38 itojun Exp $ */ @@ -48,7 +48,6 @@ #ifdef _KERNEL #include <netipsec/keydb.h> -#include <netipsec/ipsec_osdep.h> /* * Security Policy Index @@ -361,12 +360,12 @@ const char *ipsec_strerror (void); #ifdef _KERNEL /* External declarations of per-file init functions */ -INITFN void ah_attach(void); -INITFN void esp_attach(void); -INITFN void ipcomp_attach(void); -INITFN void ipe4_attach(void); -INITFN void ipe4_attach(void); -INITFN void tcpsignature_attach(void); +void ah_attach(void); +void esp_attach(void); +void ipcomp_attach(void); +void ipe4_attach(void); +void ipe4_attach(void); +void tcpsignature_attach(void); void ipsec_attach(void); Index: src/sys/netipsec/ipsec_input.c diff -u src/sys/netipsec/ipsec_input.c:1.40 src/sys/netipsec/ipsec_input.c:1.41 --- src/sys/netipsec/ipsec_input.c:1.40 Tue Apr 18 05:26:42 2017 +++ src/sys/netipsec/ipsec_input.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec_input.c,v 1.40 2017/04/18 05:26:42 ozaki-r Exp $ */ +/* $NetBSD: ipsec_input.c,v 1.41 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec_input.c,v 1.2.4.2 2003/03/28 20:32:53 sam Exp $ */ /* $OpenBSD: ipsec_input.c,v 1.63 2003/02/20 18:35:43 deraadt Exp $ */ @@ -39,7 +39,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.40 2017/04/18 05:26:42 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.41 2017/04/19 03:39:14 ozaki-r Exp $"); /* * IPsec input processing. @@ -96,8 +96,6 @@ __KERNEL_RCSID(0, "$NetBSD: ipsec_input. #include <netipsec/xform.h> #include <netinet6/ip6protosw.h> -#include <netipsec/ipsec_osdep.h> - #include <net/net_osdep.h> #define IPSEC_ISTAT(p, x, y, z) \ Index: src/sys/netipsec/ipsec_mbuf.c diff -u src/sys/netipsec/ipsec_mbuf.c:1.14 src/sys/netipsec/ipsec_mbuf.c:1.15 --- src/sys/netipsec/ipsec_mbuf.c:1.14 Tue Apr 18 05:26:42 2017 +++ src/sys/netipsec/ipsec_mbuf.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec_mbuf.c,v 1.14 2017/04/18 05:26:42 ozaki-r Exp $ */ +/* $NetBSD: ipsec_mbuf.c,v 1.15 2017/04/19 03:39:14 ozaki-r Exp $ */ /*- * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting * All rights reserved. @@ -28,7 +28,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec_mbuf.c,v 1.14 2017/04/18 05:26:42 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec_mbuf.c,v 1.15 2017/04/19 03:39:14 ozaki-r Exp $"); /* * IPsec-specific mbuf routines. @@ -46,7 +46,6 @@ __KERNEL_RCSID(0, "$NetBSD: ipsec_mbuf.c #include <netipsec/ipsec_var.h> #include <netipsec/ipsec_private.h> -#include <netipsec/ipsec_osdep.h> #include <net/net_osdep.h> /* Index: src/sys/netipsec/ipsec_output.c diff -u src/sys/netipsec/ipsec_output.c:1.44 src/sys/netipsec/ipsec_output.c:1.45 --- src/sys/netipsec/ipsec_output.c:1.44 Tue Apr 18 05:26:42 2017 +++ src/sys/netipsec/ipsec_output.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec_output.c,v 1.44 2017/04/18 05:26:42 ozaki-r Exp $ */ +/* $NetBSD: ipsec_output.c,v 1.45 2017/04/19 03:39:14 ozaki-r Exp $ */ /*- * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting @@ -29,7 +29,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.44 2017/04/18 05:26:42 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.45 2017/04/19 03:39:14 ozaki-r Exp $"); /* * IPsec output processing. @@ -82,7 +82,6 @@ __KERNEL_RCSID(0, "$NetBSD: ipsec_output #include <netipsec/key.h> #include <netipsec/keydb.h> #include <netipsec/key_debug.h> -#include <netipsec/ipsec_osdep.h> #include <net/net_osdep.h> /* ovbcopy() in ipsec6_encapsulate() */ @@ -563,7 +562,7 @@ ipsec4_process_packet( goto bad; } ip = mtod(m, struct ip *); - ip->ip_off |= IP_OFF_CONVERT(IP_DF); + ip->ip_off |= htons(IP_DF); } } } Index: src/sys/netipsec/ipsec_private.h diff -u src/sys/netipsec/ipsec_private.h:1.3 src/sys/netipsec/ipsec_private.h:1.4 --- src/sys/netipsec/ipsec_private.h:1.3 Mon Apr 28 20:24:10 2008 +++ src/sys/netipsec/ipsec_private.h Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec_private.h,v 1.3 2008/04/28 20:24:10 martin Exp $ */ +/* $NetBSD: ipsec_private.h,v 1.4 2017/04/19 03:39:14 ozaki-r Exp $ */ /*- * Copyright (c) 2008 The NetBSD Foundation, Inc. @@ -67,6 +67,18 @@ extern percpu_t *pfkeystat_percpu; #define PFKEY_STAT_PUTREF() _NET_STAT_PUTREF(pfkeystat_percpu) #define PFKEY_STATINC(x) _NET_STATINC(pfkeystat_percpu, x) #define PFKEY_STATADD(x, v) _NET_STATADD(pfkeystat_percpu, x, v) + +/* + * Remainings of ipsec_osdep.h + */ +#define IPSEC_SPLASSERT_SOFTNET(msg) do {} while (0) + +/* XXX wrong, but close enough for restricted ipsec usage. */ +#define M_EXT_WRITABLE(m) (!M_READONLY(m)) + +/* superuser opened socket? */ +#define IPSEC_PRIVILEGED_SO(so) ((so)->so_uidinfo->ui_uid == 0) + #endif /* _KERNEL */ #endif /* !_NETIPSEC_IPSEC_PRIVATE_H_ */ Index: src/sys/netipsec/key.c diff -u src/sys/netipsec/key.c:1.108 src/sys/netipsec/key.c:1.109 --- src/sys/netipsec/key.c:1.108 Tue Apr 18 05:26:42 2017 +++ src/sys/netipsec/key.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: key.c,v 1.108 2017/04/18 05:26:42 ozaki-r Exp $ */ +/* $NetBSD: key.c,v 1.109 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $ */ /* $KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.108 2017/04/18 05:26:42 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.109 2017/04/19 03:39:14 ozaki-r Exp $"); /* * This code is referd to RFC 2367 @@ -103,7 +103,6 @@ __KERNEL_RCSID(0, "$NetBSD: key.c,v 1.10 #include <netipsec/ipsec_private.h> #include <netipsec/xform.h> -#include <netipsec/ipsec_osdep.h> #include <netipsec/ipcomp.h> Index: src/sys/netipsec/keysock.c diff -u src/sys/netipsec/keysock.c:1.50 src/sys/netipsec/keysock.c:1.51 --- src/sys/netipsec/keysock.c:1.50 Fri Jun 10 13:27:16 2016 +++ src/sys/netipsec/keysock.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: keysock.c,v 1.50 2016/06/10 13:27:16 ozaki-r Exp $ */ +/* $NetBSD: keysock.c,v 1.51 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/keysock.c,v 1.3.2.1 2003/01/24 05:11:36 sam Exp $ */ /* $KAME: keysock.c,v 1.25 2001/08/13 20:07:41 itojun Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: keysock.c,v 1.50 2016/06/10 13:27:16 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: keysock.c,v 1.51 2017/04/19 03:39:14 ozaki-r Exp $"); /* This code has derived from sys/net/rtsock.c on FreeBSD2.2.5 */ @@ -58,7 +58,6 @@ __KERNEL_RCSID(0, "$NetBSD: keysock.c,v #include <netipsec/keysock.h> #include <netipsec/key_debug.h> -#include <netipsec/ipsec_osdep.h> #include <netipsec/ipsec_private.h> struct key_cb { @@ -341,7 +340,7 @@ key_sendup_mbuf(struct socket *so, struc PFKEY_STATINC(PFKEY_STAT_IN_MSGTYPE + msg->sadb_msg_type); } - LIST_FOREACH(rp, &rawcb_list, rcb_list) + LIST_FOREACH(rp, &rawcb, rcb_list) { struct socket * kso = rp->rcb_socket; if (rp->rcb_proto.sp_family != PF_KEY) Index: src/sys/netipsec/xform_ah.c diff -u src/sys/netipsec/xform_ah.c:1.52 src/sys/netipsec/xform_ah.c:1.53 --- src/sys/netipsec/xform_ah.c:1.52 Tue Apr 18 05:26:42 2017 +++ src/sys/netipsec/xform_ah.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: xform_ah.c,v 1.52 2017/04/18 05:26:42 ozaki-r Exp $ */ +/* $NetBSD: xform_ah.c,v 1.53 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/xform_ah.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $ */ /* $OpenBSD: ip_ah.c,v 1.63 2001/06/26 06:18:58 angelos Exp $ */ /* @@ -39,7 +39,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.52 2017/04/18 05:26:42 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.53 2017/04/19 03:39:14 ozaki-r Exp $"); #if defined(_KERNEL_OPT) #include "opt_inet.h" @@ -78,7 +78,6 @@ __KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v #include <netipsec/key.h> #include <netipsec/key_debug.h> -#include <netipsec/ipsec_osdep.h> #include <opencrypto/cryptodev.h> @@ -319,12 +318,12 @@ ah_massage_headers(struct mbuf **m0, int ip->ip_len = htons(inlen); if (alg == CRYPTO_MD5_KPDK || alg == CRYPTO_SHA1_KPDK) - ip->ip_off &= IP_OFF_CONVERT(IP_DF); + ip->ip_off &= htons(IP_DF); else ip->ip_off = 0; } else { if (alg == CRYPTO_MD5_KPDK || alg == CRYPTO_SHA1_KPDK) - ip->ip_off &= IP_OFF_CONVERT(IP_DF); + ip->ip_off &= htons(IP_DF); else ip->ip_off = 0; } @@ -1292,7 +1291,7 @@ static struct xformsw ah_xformsw = { NULL, }; -INITFN void +void ah_attach(void) { ahstat_percpu = percpu_alloc(sizeof(uint64_t) * AH_NSTATS); Index: src/sys/netipsec/xform_esp.c diff -u src/sys/netipsec/xform_esp.c:1.53 src/sys/netipsec/xform_esp.c:1.54 --- src/sys/netipsec/xform_esp.c:1.53 Tue Apr 18 05:26:42 2017 +++ src/sys/netipsec/xform_esp.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: xform_esp.c,v 1.53 2017/04/18 05:26:42 ozaki-r Exp $ */ +/* $NetBSD: xform_esp.c,v 1.54 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/xform_esp.c,v 1.2.2.1 2003/01/24 05:11:36 sam Exp $ */ /* $OpenBSD: ip_esp.c,v 1.69 2001/06/26 06:18:59 angelos Exp $ */ @@ -39,7 +39,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.53 2017/04/18 05:26:42 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.54 2017/04/19 03:39:14 ozaki-r Exp $"); #if defined(_KERNEL_OPT) #include "opt_inet.h" @@ -52,9 +52,9 @@ __KERNEL_RCSID(0, "$NetBSD: xform_esp.c, #include <sys/socket.h> #include <sys/syslog.h> #include <sys/kernel.h> -/*#include <sys/random.h>*/ #include <sys/sysctl.h> #include <sys/socketvar.h> /* for softnet_lock */ +#include <sys/cprng.h> #include <net/if.h> @@ -81,8 +81,6 @@ __KERNEL_RCSID(0, "$NetBSD: xform_esp.c, #include <netipsec/key.h> #include <netipsec/key_debug.h> -#include <netipsec/ipsec_osdep.h> - #include <opencrypto/cryptodev.h> #include <opencrypto/xform.h> @@ -848,7 +846,7 @@ esp_output( */ switch (sav->flags & SADB_X_EXT_PMASK) { case SADB_X_EXT_PRAND: - (void) read_random(pad, padding - 2); + (void) cprng_fast(pad, padding - 2); break; case SADB_X_EXT_PZERO: memset(pad, 0, padding - 2); @@ -1059,7 +1057,7 @@ static struct xformsw esp_xformsw = { NULL, }; -INITFN void +void esp_attach(void) { Index: src/sys/netipsec/xform_ipcomp.c diff -u src/sys/netipsec/xform_ipcomp.c:1.36 src/sys/netipsec/xform_ipcomp.c:1.37 --- src/sys/netipsec/xform_ipcomp.c:1.36 Tue Apr 18 05:26:42 2017 +++ src/sys/netipsec/xform_ipcomp.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: xform_ipcomp.c,v 1.36 2017/04/18 05:26:42 ozaki-r Exp $ */ +/* $NetBSD: xform_ipcomp.c,v 1.37 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/xform_ipcomp.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $ */ /* $OpenBSD: ip_ipcomp.c,v 1.1 2001/07/05 12:08:52 jjbg Exp $ */ @@ -30,7 +30,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.36 2017/04/18 05:26:42 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.37 2017/04/19 03:39:14 ozaki-r Exp $"); /* IP payload compression protocol (IPComp), see RFC 2393 */ #if defined(_KERNEL_OPT) @@ -67,8 +67,6 @@ __KERNEL_RCSID(0, "$NetBSD: xform_ipcomp #include <netipsec/key.h> #include <netipsec/key_debug.h> -#include <netipsec/ipsec_osdep.h> - #include <opencrypto/cryptodev.h> #include <opencrypto/deflate.h> #include <opencrypto/xform.h> @@ -662,7 +660,7 @@ static struct xformsw ipcomp_xformsw = { NULL, }; -INITFN void +void ipcomp_attach(void) { ipcompstat_percpu = percpu_alloc(sizeof(uint64_t) * IPCOMP_NSTATS); Index: src/sys/netipsec/xform_ipip.c diff -u src/sys/netipsec/xform_ipip.c:1.47 src/sys/netipsec/xform_ipip.c:1.48 --- src/sys/netipsec/xform_ipip.c:1.47 Tue Apr 18 05:26:42 2017 +++ src/sys/netipsec/xform_ipip.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: xform_ipip.c,v 1.47 2017/04/18 05:26:42 ozaki-r Exp $ */ +/* $NetBSD: xform_ipip.c,v 1.48 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/xform_ipip.c,v 1.3.2.1 2003/01/24 05:11:36 sam Exp $ */ /* $OpenBSD: ip_ipip.c,v 1.25 2002/06/10 18:04:55 itojun Exp $ */ @@ -39,7 +39,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.47 2017/04/18 05:26:42 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.48 2017/04/19 03:39:14 ozaki-r Exp $"); /* * IP-inside-IP processing @@ -87,7 +87,6 @@ __KERNEL_RCSID(0, "$NetBSD: xform_ipip.c #include <netipsec/key.h> #include <netipsec/key_debug.h> -#include <netipsec/ipsec_osdep.h> typedef void pr_in_input_t (struct mbuf *m, ...); @@ -477,7 +476,7 @@ ipip_output( m_copydata(m, sizeof(struct ip) + offsetof(struct ip, ip_off), sizeof(uint16_t), &ipo->ip_off); - ipo->ip_off &= ~ IP_OFF_CONVERT(IP_DF | IP_MF | IP_OFFMASK); + ipo->ip_off &= ~ htons(IP_DF | IP_MF | IP_OFFMASK); } #ifdef INET6 else if (tp == (IPV6_VERSION >> 4)) { @@ -693,7 +692,7 @@ ipe4_encapcheck(struct mbuf *m, return ((m->m_flags & M_IPSEC) != 0 ? 1 : 0); } -INITFN void +void ipe4_attach(void) { @@ -717,8 +716,3 @@ ipe4_attach(void) #endif encap_lock_exit(); } - -#ifdef SYSINIT -SYSINIT(ipe4_xform_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_MIDDLE, ipe4_attach, NULL); -#endif - Index: src/sys/netipsec/xform_tcp.c diff -u src/sys/netipsec/xform_tcp.c:1.10 src/sys/netipsec/xform_tcp.c:1.11 --- src/sys/netipsec/xform_tcp.c:1.10 Tue Apr 18 05:25:32 2017 +++ src/sys/netipsec/xform_tcp.c Wed Apr 19 03:39:14 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: xform_tcp.c,v 1.10 2017/04/18 05:25:32 ozaki-r Exp $ */ +/* $NetBSD: xform_tcp.c,v 1.11 2017/04/19 03:39:14 ozaki-r Exp $ */ /* $FreeBSD: sys/netipsec/xform_tcp.c,v 1.1.2.1 2004/02/14 22:24:09 bms Exp $ */ /* @@ -31,7 +31,7 @@ /* TCP MD5 Signature Option (RFC2385) */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: xform_tcp.c,v 1.10 2017/04/18 05:25:32 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: xform_tcp.c,v 1.11 2017/04/19 03:39:14 ozaki-r Exp $"); #if defined(_KERNEL_OPT) #include "opt_inet.h" @@ -166,7 +166,7 @@ static struct xformsw tcpsignature_xform NULL }; -INITFN void +void tcpsignature_attach(void) {