This is mostly a mechanical diff replacing ibuf_release with ibuf_free.
ibuf_release() just calls ibuf_free() now so this indirection is no longer
needed.

-- 
:wq Claudio

Index: ca.c
===================================================================
RCS file: /cvs/src/sbin/iked/ca.c,v
retrieving revision 1.91
diff -u -p -r1.91 ca.c
--- ca.c        5 Mar 2023 22:17:22 -0000       1.91
+++ ca.c        23 May 2023 12:45:30 -0000
@@ -132,13 +132,13 @@ ca_shutdown(void)
        struct iked             *env = iked_env;
        struct ca_store         *store;
 
-       ibuf_release(env->sc_certreq);
+       ibuf_free(env->sc_certreq);
        if ((store = env->sc_priv) == NULL)
                return;
        X509_STORE_free(store->ca_cas);
        X509_STORE_free(store->ca_certs);
-       ibuf_release(store->ca_pubkey.id_buf);
-       ibuf_release(store->ca_privkey.id_buf);
+       ibuf_free(store->ca_pubkey.id_buf);
+       ibuf_free(store->ca_privkey.id_buf);
        free(store);
 }
 
@@ -171,7 +171,7 @@ ca_getkey(struct privsep *ps, struct ike
            ibuf_length(key->id_buf));
 
        /* clear old key and copy new one */
-       ibuf_release(id->id_buf);
+       ibuf_free(id->id_buf);
        memcpy(id, key, sizeof(*id));
 }
 
@@ -348,7 +348,7 @@ ca_setscert(struct iked *env, struct ike
        iovcnt++;
 
        ret = proc_composev(&env->sc_ps, PROC_IKEV2, IMSG_SCERT, iov, iovcnt);
-       ibuf_release(buf);
+       ibuf_free(buf);
        return (ret);
 }
 
@@ -401,7 +401,7 @@ ca_setreq(struct iked *env, struct iked_
 
        ret = 0;
  done:
-       ibuf_release(id.id_buf);
+       ibuf_free(id.id_buf);
        return (ret);
 }
 
@@ -757,7 +757,7 @@ ca_getreq(struct iked *env, struct imsg 
 
        ca_setcert(env, &sh, NULL, type,
            ibuf_data(buf), ibuf_size(buf), PROC_IKEV2);
-       ibuf_release(buf);
+       ibuf_free(buf);
 
        return (0);
 }
@@ -816,9 +816,9 @@ ca_getauth(struct iked *env, struct imsg
 
        ret = ca_setauth(env, &sa, sa.sa_localauth.id_buf, PROC_IKEV2);
 
-       ibuf_release(sa.sa_localauth.id_buf);
+       ibuf_free(sa.sa_localauth.id_buf);
        sa.sa_localauth.id_buf = NULL;
-       ibuf_release(authmsg);
+       ibuf_free(authmsg);
 
        return (ret);
 }
@@ -899,7 +899,7 @@ ca_reload(struct iked *env)
        /*
         * Save CAs signatures for the IKEv2 CERTREQ
         */
-       ibuf_release(env->sc_certreq);
+       ibuf_free(env->sc_certreq);
        if ((env->sc_certreq = ibuf_new(NULL, 0)) == NULL)
                return (-1);
 
@@ -922,7 +922,7 @@ ca_reload(struct iked *env)
                OPENSSL_free(subj_name);
 
                if (ibuf_add(env->sc_certreq, md, len) != 0) {
-                       ibuf_release(env->sc_certreq);
+                       ibuf_free(env->sc_certreq);
                        env->sc_certreq = NULL;
                        return (-1);
                }
@@ -1267,7 +1267,7 @@ ca_pubkey_serialize(EVP_PKEY *key, struc
        case EVP_PKEY_RSA:
                id->id_type = 0;
                id->id_offset = 0;
-               ibuf_release(id->id_buf);
+               ibuf_free(id->id_buf);
                id->id_buf = NULL;
 
                if ((rsa = EVP_PKEY_get0_RSA(key)) == NULL)
@@ -1279,7 +1279,7 @@ ca_pubkey_serialize(EVP_PKEY *key, struc
 
                d = ibuf_data(id->id_buf);
                if (i2d_RSAPublicKey(rsa, &d) != len) {
-                       ibuf_release(id->id_buf);
+                       ibuf_free(id->id_buf);
                        id->id_buf = NULL;
                        goto done;
                }
@@ -1289,7 +1289,7 @@ ca_pubkey_serialize(EVP_PKEY *key, struc
        case EVP_PKEY_EC:
                id->id_type = 0;
                id->id_offset = 0;
-               ibuf_release(id->id_buf);
+               ibuf_free(id->id_buf);
                id->id_buf = NULL;
 
                if ((ec = EVP_PKEY_get0_EC_KEY(key)) == NULL)
@@ -1301,7 +1301,7 @@ ca_pubkey_serialize(EVP_PKEY *key, struc
 
                d = ibuf_data(id->id_buf);
                if (i2d_EC_PUBKEY(ec, &d) != len) {
-                       ibuf_release(id->id_buf);
+                       ibuf_free(id->id_buf);
                        id->id_buf = NULL;
                        goto done;
                }
@@ -1336,7 +1336,7 @@ ca_privkey_serialize(EVP_PKEY *key, stru
        case EVP_PKEY_RSA:
                id->id_type = 0;
                id->id_offset = 0;
-               ibuf_release(id->id_buf);
+               ibuf_free(id->id_buf);
                id->id_buf = NULL;
 
                if ((rsa = EVP_PKEY_get0_RSA(key)) == NULL)
@@ -1348,7 +1348,7 @@ ca_privkey_serialize(EVP_PKEY *key, stru
 
                d = ibuf_data(id->id_buf);
                if (i2d_RSAPrivateKey(rsa, &d) != len) {
-                       ibuf_release(id->id_buf);
+                       ibuf_free(id->id_buf);
                        id->id_buf = NULL;
                        goto done;
                }
@@ -1358,7 +1358,7 @@ ca_privkey_serialize(EVP_PKEY *key, stru
        case EVP_PKEY_EC:
                id->id_type = 0;
                id->id_offset = 0;
-               ibuf_release(id->id_buf);
+               ibuf_free(id->id_buf);
                id->id_buf = NULL;
 
                if ((ec = EVP_PKEY_get0_EC_KEY(key)) == NULL)
@@ -1370,7 +1370,7 @@ ca_privkey_serialize(EVP_PKEY *key, stru
 
                d = ibuf_data(id->id_buf);
                if (i2d_ECPrivateKey(ec, &d) != len) {
-                       ibuf_release(id->id_buf);
+                       ibuf_free(id->id_buf);
                        id->id_buf = NULL;
                        goto done;
                }
@@ -1680,7 +1680,7 @@ ca_validate_pubkey(struct iked *env, str
        if (ret != 0)
                ca_sslerror(__func__);
  done:
-       ibuf_release(idp.id_buf);
+       ibuf_free(idp.id_buf);
        EVP_PKEY_free(localkey);
        RSA_free(localrsa);
        if (len > 0)
@@ -1901,7 +1901,7 @@ ca_x509_subjectaltname_do(X509 *cert, in
                                }
                                ikev2_print_id(&sanid, idstr, sizeof(idstr));
                                log_info("%s: altname: %s", logmsg, idstr);
-                               ibuf_release(sanid.id_buf);
+                               ibuf_free(sanid.id_buf);
                                sanid.id_buf = NULL;
                        }
                        /* Compare length and data */
@@ -1916,7 +1916,7 @@ ca_x509_subjectaltname_do(X509 *cert, in
                        }
                        /* Get first ID */
                        if (mode == MODE_ALT_GET) {
-                               ibuf_release(retid->id_buf);
+                               ibuf_free(retid->id_buf);
                                if ((retid->id_buf = ibuf_new(data, len)) == 
NULL) {
                                        log_debug("%s: failed to get id buffer",
                                            __func__);
Index: config.c
===================================================================
RCS file: /cvs/src/sbin/iked/config.c,v
retrieving revision 1.91
diff -u -p -r1.91 config.c
--- config.c    3 Dec 2022 22:34:35 -0000       1.91
+++ config.c    23 May 2023 12:45:31 -0000
@@ -82,12 +82,12 @@ config_free_kex(struct iked_kex *kex)
        if (kex == NULL)
                return;
 
-       ibuf_release(kex->kex_inonce);
-       ibuf_release(kex->kex_rnonce);
+       ibuf_free(kex->kex_inonce);
+       ibuf_free(kex->kex_rnonce);
 
        group_free(kex->kex_dhgroup);
-       ibuf_release(kex->kex_dhiexchange);
-       ibuf_release(kex->kex_dhrexchange);
+       ibuf_free(kex->kex_dhiexchange);
+       ibuf_free(kex->kex_dhrexchange);
 
        free(kex);
 }
@@ -140,42 +140,42 @@ config_free_sa(struct iked *env, struct 
        ikev2_msg_flushqueue(env, &sa->sa_requests);
        ikev2_msg_flushqueue(env, &sa->sa_responses);
 
-       ibuf_release(sa->sa_inonce);
-       ibuf_release(sa->sa_rnonce);
+       ibuf_free(sa->sa_inonce);
+       ibuf_free(sa->sa_rnonce);
 
        group_free(sa->sa_dhgroup);
-       ibuf_release(sa->sa_dhiexchange);
-       ibuf_release(sa->sa_dhrexchange);
+       ibuf_free(sa->sa_dhiexchange);
+       ibuf_free(sa->sa_dhrexchange);
 
-       ibuf_release(sa->sa_simult);
+       ibuf_free(sa->sa_simult);
 
        hash_free(sa->sa_prf);
        hash_free(sa->sa_integr);
        cipher_free(sa->sa_encr);
 
-       ibuf_release(sa->sa_key_d);
-       ibuf_release(sa->sa_key_iauth);
-       ibuf_release(sa->sa_key_rauth);
-       ibuf_release(sa->sa_key_iencr);
-       ibuf_release(sa->sa_key_rencr);
-       ibuf_release(sa->sa_key_iprf);
-       ibuf_release(sa->sa_key_rprf);
-
-       ibuf_release(sa->sa_1stmsg);
-       ibuf_release(sa->sa_2ndmsg);
-
-       ibuf_release(sa->sa_iid.id_buf);
-       ibuf_release(sa->sa_rid.id_buf);
-       ibuf_release(sa->sa_icert.id_buf);
-       ibuf_release(sa->sa_rcert.id_buf);
+       ibuf_free(sa->sa_key_d);
+       ibuf_free(sa->sa_key_iauth);
+       ibuf_free(sa->sa_key_rauth);
+       ibuf_free(sa->sa_key_iencr);
+       ibuf_free(sa->sa_key_rencr);
+       ibuf_free(sa->sa_key_iprf);
+       ibuf_free(sa->sa_key_rprf);
+
+       ibuf_free(sa->sa_1stmsg);
+       ibuf_free(sa->sa_2ndmsg);
+
+       ibuf_free(sa->sa_iid.id_buf);
+       ibuf_free(sa->sa_rid.id_buf);
+       ibuf_free(sa->sa_icert.id_buf);
+       ibuf_free(sa->sa_rcert.id_buf);
        for (i = 0; i < IKED_SCERT_MAX; i++)
-               ibuf_release(sa->sa_scert[i].id_buf);
-       ibuf_release(sa->sa_localauth.id_buf);
-       ibuf_release(sa->sa_peerauth.id_buf);
+               ibuf_free(sa->sa_scert[i].id_buf);
+       ibuf_free(sa->sa_localauth.id_buf);
+       ibuf_free(sa->sa_peerauth.id_buf);
 
-       ibuf_release(sa->sa_eap.id_buf);
+       ibuf_free(sa->sa_eap.id_buf);
        free(sa->sa_eapid);
-       ibuf_release(sa->sa_eapmsk);
+       ibuf_free(sa->sa_eapmsk);
 
        free(sa->sa_cp_addr);
        free(sa->sa_cp_addr6);
@@ -1064,8 +1064,8 @@ config_setkeys(struct iked *env)
        if (fp != NULL)
                fclose(fp);
 
-       ibuf_release(pubkey.id_buf);
-       ibuf_release(privkey.id_buf);
+       ibuf_free(pubkey.id_buf);
+       ibuf_free(privkey.id_buf);
        EVP_PKEY_free(key);
 
        return (ret);
Index: crypto.c
===================================================================
RCS file: /cvs/src/sbin/iked/crypto.c,v
retrieving revision 1.42
diff -u -p -r1.42 crypto.c
--- crypto.c    30 Mar 2023 17:20:53 -0000      1.42
+++ crypto.c    23 May 2023 12:45:31 -0000
@@ -306,7 +306,7 @@ hash_new(uint8_t type, uint16_t id)
 struct ibuf *
 hash_setkey(struct iked_hash *hash, void *key, size_t keylen)
 {
-       ibuf_release(hash->hash_key);
+       ibuf_free(hash->hash_key);
        if ((hash->hash_key = ibuf_new(key, keylen)) == NULL) {
                log_debug("%s: alloc hash key", __func__);
                return (NULL);
@@ -320,7 +320,7 @@ hash_free(struct iked_hash *hash)
        if (hash == NULL)
                return;
        HMAC_CTX_free(hash->hash_ctx);
-       ibuf_release(hash->hash_key);
+       ibuf_free(hash->hash_key);
        free(hash);
 }
 
@@ -487,7 +487,7 @@ cipher_new(uint8_t type, uint16_t id, ui
 struct ibuf *
 cipher_setkey(struct iked_cipher *encr, const void *key, size_t keylen)
 {
-       ibuf_release(encr->encr_key);
+       ibuf_free(encr->encr_key);
        if ((encr->encr_key = ibuf_new(key, keylen)) == NULL) {
                log_debug("%s: alloc cipher key", __func__);
                return (NULL);
@@ -498,7 +498,7 @@ cipher_setkey(struct iked_cipher *encr, 
 struct ibuf *
 cipher_setiv(struct iked_cipher *encr, const void *iv, size_t len)
 {
-       ibuf_release(encr->encr_iv);
+       ibuf_free(encr->encr_iv);
        encr->encr_iv = NULL;
        if (iv != NULL) {
                if (len < encr->encr_ivlength) {
@@ -551,8 +551,8 @@ cipher_free(struct iked_cipher *encr)
        if (encr == NULL)
                return;
        EVP_CIPHER_CTX_free(encr->encr_ctx);
-       ibuf_release(encr->encr_iv);
-       ibuf_release(encr->encr_key);
+       ibuf_free(encr->encr_iv);
+       ibuf_free(encr->encr_key);
        free(encr);
 }
 
@@ -767,7 +767,7 @@ dsa_free(struct iked_dsa *dsa)
                EVP_PKEY_free(dsa->dsa_key);
        }
 
-       ibuf_release(dsa->dsa_keydata);
+       ibuf_free(dsa->dsa_keydata);
        free(dsa);
 }
 
@@ -780,7 +780,7 @@ dsa_setkey(struct iked_dsa *dsa, void *k
        EC_KEY          *ec = NULL;
        EVP_PKEY        *pkey = NULL;
 
-       ibuf_release(dsa->dsa_keydata);
+       ibuf_free(dsa->dsa_keydata);
        if ((dsa->dsa_keydata = ibuf_new(key, keylen)) == NULL) {
                log_debug("%s: alloc signature key", __func__);
                return (NULL);
@@ -855,7 +855,7 @@ dsa_setkey(struct iked_dsa *dsa, void *k
        EVP_PKEY_free(pkey);
        X509_free(cert);
        BIO_free(rawcert);
-       ibuf_release(dsa->dsa_keydata);
+       ibuf_free(dsa->dsa_keydata);
        dsa->dsa_keydata = NULL;
        return (NULL);
 }
Index: eap.c
===================================================================
RCS file: /cvs/src/sbin/iked/eap.c,v
retrieving revision 1.22
diff -u -p -r1.22 eap.c
--- eap.c       3 Dec 2022 21:02:27 -0000       1.22
+++ eap.c       23 May 2023 12:45:32 -0000
@@ -176,7 +176,7 @@ eap_identity_request(struct iked *env, s
        ret = ikev2_msg_send_encrypt(env, sa, &e,
            IKEV2_EXCHANGE_IKE_AUTH, firstpayload, 1);
  done:
-       ibuf_release(e);
+       ibuf_free(e);
        return (ret);
 }
 
@@ -230,7 +230,7 @@ eap_challenge_request(struct iked *env, 
        ret = ikev2_send_ike_e(env, sa, e,
            IKEV2_PAYLOAD_EAP, IKEV2_EXCHANGE_IKE_AUTH, 1);
  done:
-       ibuf_release(e);
+       ibuf_free(e);
        return (ret);
 }
 
@@ -253,7 +253,7 @@ eap_message_send(struct iked *env, struc
        ret = ikev2_send_ike_e(env, sa, e,
            IKEV2_PAYLOAD_EAP, IKEV2_EXCHANGE_IKE_AUTH, 1);
  done:
-       ibuf_release(e);
+       ibuf_free(e);
        return (ret);
 }
 
@@ -300,7 +300,7 @@ eap_mschap_challenge(struct iked *env, s
        ret = ikev2_send_ike_e(env, sa, eapmsg,
            IKEV2_PAYLOAD_EAP, IKEV2_EXCHANGE_IKE_AUTH, 1);
  done:
-       ibuf_release(eapmsg);
+       ibuf_free(eapmsg);
        return (ret);
 }
 
@@ -327,7 +327,7 @@ eap_mschap_success(struct iked *env, str
        ret = ikev2_send_ike_e(env, sa, eapmsg,
            IKEV2_PAYLOAD_EAP, IKEV2_EXCHANGE_IKE_AUTH, 1);
  done:
-       ibuf_release(eapmsg);
+       ibuf_free(eapmsg);
        return (ret);
 }
 
Index: iked.h
===================================================================
RCS file: /cvs/src/sbin/iked/iked.h,v
retrieving revision 1.211
diff -u -p -r1.211 iked.h
--- iked.h      23 May 2023 12:43:26 -0000      1.211
+++ iked.h      23 May 2023 12:45:33 -0000
@@ -1268,7 +1268,6 @@ struct ibuf *
 struct ibuf *
         ibuf_static(void);
 int     ibuf_cat(struct ibuf *, struct ibuf *);
-void    ibuf_release(struct ibuf *);
 size_t  ibuf_length(struct ibuf *);
 int     ibuf_setsize(struct ibuf *, size_t);
 uint8_t *
Index: ikev2.c
===================================================================
RCS file: /cvs/src/sbin/iked/ikev2.c,v
retrieving revision 1.365
diff -u -p -r1.365 ikev2.c
--- ikev2.c     10 Mar 2023 19:26:06 -0000      1.365
+++ ikev2.c     23 May 2023 12:45:40 -0000
@@ -222,7 +222,7 @@ ikev2_shutdown(void)
 {
        struct iked             *env = iked_env;
 
-       ibuf_release(env->sc_certreq);
+       ibuf_free(env->sc_certreq);
        env->sc_certreq = NULL;
        config_doreset(env, RESET_ALL);
 }
@@ -324,7 +324,7 @@ ikev2_dispatch_cert(int fd, struct privs
                memcpy(&type, ptr, sizeof(type));
                ptr += sizeof(type);
 
-               ibuf_release(env->sc_certreq);
+               ibuf_free(env->sc_certreq);
                env->sc_certreqtype = type;
                env->sc_certreq = ibuf_new(ptr,
                    IMSG_DATA_SIZE(imsg) - sizeof(type));
@@ -349,7 +349,7 @@ ikev2_dispatch_cert(int fd, struct privs
 
                id->id_type = type;
                id->id_offset = 0;
-               ibuf_release(id->id_buf);
+               ibuf_free(id->id_buf);
                id->id_buf = NULL;
 
                if (len > 0 && (id->id_buf = ibuf_new(ptr, len)) == NULL) {
@@ -402,7 +402,7 @@ ikev2_dispatch_cert(int fd, struct privs
 
                id->id_type = type;
                id->id_offset = 0;
-               ibuf_release(id->id_buf);
+               ibuf_free(id->id_buf);
                id->id_buf = NULL;
 
                if (len <= 0 || (id->id_buf = ibuf_new(ptr, len)) == NULL) {
@@ -451,7 +451,7 @@ ikev2_dispatch_cert(int fd, struct privs
 
                id->id_type = type;
                id->id_offset = 0;
-               ibuf_release(id->id_buf);
+               ibuf_free(id->id_buf);
                id->id_buf = NULL;
 
                if (len <= 0 || (id->id_buf = ibuf_new(ptr, len)) == NULL) {
@@ -479,7 +479,7 @@ ikev2_dispatch_cert(int fd, struct privs
                id = &sa->sa_localauth;
                id->id_type = type;
                id->id_offset = 0;
-               ibuf_release(id->id_buf);
+               ibuf_free(id->id_buf);
                id->id_buf = NULL;
 
                if (type != IKEV2_AUTH_NONE) {
@@ -900,7 +900,7 @@ ikev2_auth_verify(struct iked *env, stru
            ibuf_data(sa->sa_peerauth.id_buf),
            ibuf_length(sa->sa_peerauth.id_buf),
            authmsg);
-       ibuf_release(authmsg);
+       ibuf_free(authmsg);
        if (ret != 0) {
                log_info("%s: ikev2_msg_authverify failed",
                    SPI_SA(sa, __func__));
@@ -919,7 +919,7 @@ ikev2_auth_verify(struct iked *env, stru
 
                /* XXX 2nd AUTH for EAP messages */
                ret = ikev2_msg_authsign(env, sa, &ikeauth, authmsg);
-               ibuf_release(authmsg);
+               ibuf_free(authmsg);
                if (ret != 0) {
                        ikev2_send_auth_failed(env, sa);
                        explicit_bzero(&ikeauth, sizeof(ikeauth));
@@ -1044,7 +1044,7 @@ ikev2_ike_auth_recv(struct iked *env, st
                        }
 
                        ca_setauth(env, sa, authmsg, PROC_CERT);
-                       ibuf_release(authmsg);
+                       ibuf_free(authmsg);
                }
        }
 
@@ -1502,7 +1502,7 @@ ikev2_init_ike_sa_peer(struct iked *env,
 
        (void)ikev2_pld_parse(env, hdr, &req, 0);
 
-       ibuf_release(sa->sa_1stmsg);
+       ibuf_free(sa->sa_1stmsg);
        if ((sa->sa_1stmsg = ibuf_dup(buf)) == NULL) {
                log_debug("%s: failed to copy 1st message", __func__);
                goto done;
@@ -1550,10 +1550,10 @@ ikev2_init_auth(struct iked *env, struct
 
        if (ca_setauth(env, sa, authmsg, PROC_CERT) == -1) {
                log_info("%s: failed to get cert", SPI_SA(sa, __func__));
-               ibuf_release(authmsg);
+               ibuf_free(authmsg);
                return (-1);
        }
-       ibuf_release(authmsg);
+       ibuf_free(authmsg);
 
        return (ikev2_init_ike_auth(env, sa));
 }
@@ -1702,7 +1702,7 @@ ikev2_init_ike_auth(struct iked *env, st
            IKEV2_EXCHANGE_IKE_AUTH, firstpayload, 0);
 
  done:
-       ibuf_release(e);
+       ibuf_free(e);
 
        return (ret);
 }
@@ -1815,7 +1815,7 @@ ikev2_policy2id(struct iked_static_id *p
        case IKEV2_ID_IPV4:
                if (inet_pton(AF_INET, (char *)polid->id_data, &in4) != 1 ||
                    ibuf_add(id->id_buf, &in4, sizeof(in4)) != 0) {
-                       ibuf_release(id->id_buf);
+                       ibuf_free(id->id_buf);
                        id->id_buf = NULL;
                        return (-1);
                }
@@ -1823,7 +1823,7 @@ ikev2_policy2id(struct iked_static_id *p
        case IKEV2_ID_IPV6:
                if (inet_pton(AF_INET6, (char *)polid->id_data, &in6) != 1 ||
                    ibuf_add(id->id_buf, &in6, sizeof(in6)) != 0) {
-                       ibuf_release(id->id_buf);
+                       ibuf_free(id->id_buf);
                        id->id_buf = NULL;
                        return (-1);
                }
@@ -1836,7 +1836,7 @@ ikev2_policy2id(struct iked_static_id *p
                    (i2d_X509_NAME(name, &p)) < 0) {
                        if (name)
                                X509_NAME_free(name);
-                       ibuf_release(id->id_buf);
+                       ibuf_free(id->id_buf);
                        id->id_buf = NULL;
                        return (-1);
                }
@@ -1845,7 +1845,7 @@ ikev2_policy2id(struct iked_static_id *p
        default:
                if (ibuf_add(id->id_buf,
                    polid->id_data, polid->id_length) != 0) {
-                       ibuf_release(id->id_buf);
+                       ibuf_free(id->id_buf);
                        id->id_buf = NULL;
                        return (-1);
                }
@@ -2876,7 +2876,7 @@ ikev2_resp_informational(struct iked *en
                sa_state(env, sa, IKEV2_STATE_CLOSED);
        }
  done:
-       ibuf_release(buf);
+       ibuf_free(buf);
        return (ret);
 }
 
@@ -3156,7 +3156,7 @@ ikev2_handle_delete(struct iked *env, st
  done:
        free(localspi);
        free(peersas);
-       ibuf_release(spibuf);
+       ibuf_free(spibuf);
 
        return (ret);
 }
@@ -3429,7 +3429,7 @@ ikev2_resp_ike_sa_init(struct iked *env,
 
        (void)ikev2_pld_parse(env, hdr, &resp, 0);
 
-       ibuf_release(sa->sa_2ndmsg);
+       ibuf_free(sa->sa_2ndmsg);
        if ((sa->sa_2ndmsg = ibuf_dup(buf)) == NULL) {
                log_debug("%s: failed to copy 2nd message", __func__);
                goto done;
@@ -3481,7 +3481,7 @@ ikev2_send_auth_failed(struct iked *env,
        if (exchange == IKEV2_EXCHANGE_INFORMATIONAL)
                sa->sa_stateflags |= IKED_REQ_INF;
  done:
-       ibuf_release(buf);
+       ibuf_free(buf);
 
        /* cleanup SA after timeout */
        sa_state(env, sa, IKEV2_STATE_CLOSING);
@@ -3615,7 +3615,7 @@ ikev2_send_error(struct iked *env, struc
        ret = ikev2_send_ike_e(env, sa, buf, IKEV2_PAYLOAD_NOTIFY,
            exchange, 1);
  done:
-       ibuf_release(buf);
+       ibuf_free(buf);
        return (ret);
 }
 
@@ -3722,7 +3722,7 @@ ikev2_handle_certreq(struct iked* env, s
                            ibuf_length(cr->cr_data),
                            PROC_CERT);
 
-                       ibuf_release(cr->cr_data);
+                       ibuf_free(cr->cr_data);
                        SIMPLEQ_REMOVE_HEAD(&msg->msg_certreqs, cr_entry);
                        free(cr);
                }
@@ -3991,7 +3991,7 @@ ikev2_resp_ike_auth(struct iked *env, st
  done:
        if (ret)
                ikev2_childsa_delete(env, sa, 0, 0, NULL, 1);
-       ibuf_release(e);
+       ibuf_free(e);
        return (ret);
 }
 
@@ -4023,7 +4023,7 @@ ikev2_send_ike_e(struct iked *env, struc
            response);
 
  done:
-       ibuf_release(e);
+       ibuf_free(e);
 
        return (ret);
 }
@@ -4087,7 +4087,7 @@ ikev2_send_create_child_sa(struct iked *
                return (-1);
        }
 
-       ibuf_release(sa->sa_simult);
+       ibuf_free(sa->sa_simult);
        sa->sa_simult = NULL;
        sa->sa_rekeyspi = 0;    /* clear rekey spi */
        initiator = sa->sa_hdr.sh_initiator ? 1 : 0;
@@ -4106,7 +4106,7 @@ ikev2_send_create_child_sa(struct iked *
                goto done;
 
        /* Update initiator nonce */
-       ibuf_release(sa->sa_inonce);
+       ibuf_free(sa->sa_inonce);
        sa->sa_inonce = nonce;
 
        if ((e = ibuf_static()) == NULL)
@@ -4229,7 +4229,7 @@ ikev2_send_create_child_sa(struct iked *
        }
 
 done:
-       ibuf_release(e);
+       ibuf_free(e);
        return (ret);
 }
 
@@ -4336,7 +4336,7 @@ done:
                ikev2_ike_sa_setreason(nsa, "failed to send CREATE_CHILD_SA");
                sa_free(env, nsa);
        }
-       ibuf_release(e);
+       ibuf_free(e);
 
        if (ret == 0)
                log_debug("%s: create child SA sent", __func__);
@@ -4523,7 +4523,7 @@ ikev2_init_create_child_sa(struct iked *
                    SPI_SA(sa, __func__));
                return (-1);
        }
-       ibuf_release(sa->sa_rnonce);
+       ibuf_free(sa->sa_rnonce);
        sa->sa_rnonce = msg->msg_nonce;
        msg->msg_nonce = NULL;
 
@@ -4588,7 +4588,7 @@ done:
                ikev2_childsa_delete(env, sa, csa->csa_saproto,
                    csa->csa_peerspi, NULL, 0);
        }
-       ibuf_release(buf);
+       ibuf_free(buf);
        return (ret);
 }
 
@@ -4660,10 +4660,10 @@ ikev2_ikesa_enable(struct iked *env, str
        }
 
        /* Preserve ID information */
-       ibuf_release(nsa->sa_iid.id_buf);
-       ibuf_release(nsa->sa_rid.id_buf);
-       ibuf_release(nsa->sa_icert.id_buf);
-       ibuf_release(nsa->sa_rcert.id_buf);
+       ibuf_free(nsa->sa_iid.id_buf);
+       ibuf_free(nsa->sa_rid.id_buf);
+       ibuf_free(nsa->sa_icert.id_buf);
+       ibuf_free(nsa->sa_rcert.id_buf);
        if (sa->sa_hdr.sh_initiator == nsa->sa_hdr.sh_initiator) {
                nsa->sa_iid = sa->sa_iid;
                nsa->sa_rid = sa->sa_rid;
@@ -4768,7 +4768,7 @@ ikev2_ikesa_delete(struct iked *env, str
                sa->sa_stateflags |= IKED_REQ_INF;
                log_info("%s: sent delete, closing SA", SPI_SA(sa, __func__));
 done:
-               ibuf_release(buf);
+               ibuf_free(buf);
                sa_state(env, sa, IKEV2_STATE_CLOSED);
        } else {
                sa_state(env, sa, IKEV2_STATE_CLOSING);
@@ -4968,7 +4968,7 @@ ikev2_resp_create_child_sa(struct iked *
                        log_debug("%s: initiator didn't send nonce", __func__);
                        goto fail;
                }
-               ibuf_release(kex->kex_inonce);
+               ibuf_free(kex->kex_inonce);
                kex->kex_inonce = msg->msg_nonce;
                msg->msg_nonce = NULL;
 
@@ -4977,7 +4977,7 @@ ikev2_resp_create_child_sa(struct iked *
                        goto fail;
 
                /* Update responder's nonce */
-               ibuf_release(kex->kex_rnonce);
+               ibuf_free(kex->kex_rnonce);
                kex->kex_rnonce = nonce;
 
                if (ikev2_childsa_negotiate(env, sa, kex, &proposals, 0, pfs)) {
@@ -4991,7 +4991,7 @@ ikev2_resp_create_child_sa(struct iked *
                            SPI_SA(sa, __func__),
                            print_spi(rekey->spi, rekey->spi_size),
                            print_spi(sa->sa_rekeyspi, rekey->spi_size));
-                       ibuf_release(sa->sa_simult);
+                       ibuf_free(sa->sa_simult);
                        if (ikev2_nonce_cmp(kex->kex_inonce, nonce) < 0)
                                sa->sa_simult = ibuf_dup(kex->kex_inonce);
                        else
@@ -5088,7 +5088,7 @@ ikev2_resp_create_child_sa(struct iked *
  done:
        if (ret && protoid != IKEV2_SAPROTO_IKE)
                ikev2_childsa_delete(env, sa, 0, 0, NULL, 1);
-       ibuf_release(e);
+       ibuf_free(e);
        config_free_proposals(&proposals, 0);
        config_free_kex(kextmp);
        return (ret);
@@ -5339,7 +5339,7 @@ ikev2_send_informational(struct iked *en
        ret = ikev2_msg_send(env, &resp);
 
  done:
-       ibuf_release(e);
+       ibuf_free(e);
        ikev2_msg_cleanup(env, &resp);
 
        return (ret);
@@ -5520,7 +5520,7 @@ ikev2_sa_initiator(struct iked *env, str
        if (ikev2_sa_negotiate_common(env, sa, msg) != 0)
                return (-1);
 
-       ibuf_release(sa->sa_2ndmsg);
+       ibuf_free(sa->sa_2ndmsg);
        if ((sa->sa_2ndmsg = ibuf_dup(msg->msg_data)) == NULL) {
                log_info("%s: failed to copy 2nd message",
                    SPI_SA(sa, __func__));
@@ -5609,7 +5609,7 @@ ikev2_sa_responder(struct iked *env, str
 
        sa_state(env, sa, IKEV2_STATE_SA_INIT);
 
-       ibuf_release(sa->sa_1stmsg);
+       ibuf_free(sa->sa_1stmsg);
        if ((sa->sa_1stmsg = ibuf_dup(msg->msg_data)) == NULL) {
                log_debug("%s: failed to copy 1st message", __func__);
                return (-1);
@@ -5847,11 +5847,11 @@ ikev2_sa_keys(struct iked *env, struct i
        ret = 0;
 
  done:
-       ibuf_release(ninr);
-       ibuf_release(dhsecret);
-       ibuf_release(skeyseed);
-       ibuf_release(s);
-       ibuf_release(t);
+       ibuf_free(ninr);
+       ibuf_free(dhsecret);
+       ibuf_free(skeyseed);
+       ibuf_free(s);
+       ibuf_free(t);
 
        return (ret);
 }
@@ -5859,8 +5859,8 @@ ikev2_sa_keys(struct iked *env, struct i
 void
 ikev2_sa_cleanup_dh(struct iked_sa *sa)
 {
-       ibuf_release(sa->sa_dhiexchange);
-       ibuf_release(sa->sa_dhrexchange);
+       ibuf_free(sa->sa_dhiexchange);
+       ibuf_free(sa->sa_dhrexchange);
        group_free(sa->sa_dhgroup);
        sa->sa_dhiexchange = NULL;
        sa->sa_dhrexchange = NULL;
@@ -5901,7 +5901,7 @@ ikev2_prfplus(struct iked_hash *prf, str
        for (i = 0; i < rlen; i++) {
                if (t1 != NULL) {
                        t2 = ibuf_new(t1->buf, ibuf_length(t1));
-                       ibuf_release(t1);
+                       ibuf_free(t1);
                } else
                        t2 = ibuf_new(NULL, 0);
                t1 = ibuf_new(NULL, hash_keylength(prf));
@@ -5917,7 +5917,7 @@ ikev2_prfplus(struct iked_hash *prf, str
                if (hashlen != hash_length(prf))
                        fatalx("ikev2_prfplus: hash length mismatch");
 
-               ibuf_release(t2);
+               ibuf_free(t2);
                ibuf_add(t, t1->buf, ibuf_length(t1));
 
                log_debug("%s: T%d with %zu bytes", __func__,
@@ -5928,13 +5928,13 @@ ikev2_prfplus(struct iked_hash *prf, str
        log_debug("%s: Tn with %zu bytes", __func__, ibuf_length(t));
        print_hex(t->buf, 0, ibuf_length(t));
 
-       ibuf_release(t1);
+       ibuf_free(t1);
 
        return (t);
 
  fail:
-       ibuf_release(t1);
-       ibuf_release(t);
+       ibuf_free(t1);
+       ibuf_free(t);
 
        return (NULL);
 }
@@ -6076,7 +6076,7 @@ ikev2_childsa_delete_proposed(struct ike
        sa->sa_stateflags |= IKED_REQ_INF;
        ret = 0;
  done:
-       ibuf_release(buf);
+       ibuf_free(buf);
 
        return (ret);
 }
@@ -6397,9 +6397,9 @@ ikev2_childsa_negotiate(struct iked *env
        ret = 0;
  done:
        sa->sa_use_transport_mode = 0;          /* reset state after use */
-       ibuf_release(dhsecret);
-       ibuf_release(keymat);
-       ibuf_release(seed);
+       ibuf_free(dhsecret);
+       ibuf_free(keymat);
+       ibuf_free(seed);
        childsa_free(csa);
        childsa_free(csb);
        childsa_free(csa2);
@@ -6586,8 +6586,8 @@ ikev2_childsa_enable(struct iked *env, s
 
        ret = 0;
  done:
-       ibuf_release(spibuf);
-       ibuf_release(flowbuf);
+       ibuf_free(spibuf);
+       ibuf_free(flowbuf);
        return (ret);
 }
 
@@ -6865,7 +6865,7 @@ ikev2_child_sa_drop(struct iked *env, st
        sa->sa_stateflags |= IKED_REQ_INF;
 
 done:
-       ibuf_release(buf);
+       ibuf_free(buf);
        return (0);
 }
 
@@ -6888,7 +6888,7 @@ ikev2_print_static_id(struct iked_static
        }
        ret = 0;
  done:
-       ibuf_release(idp.id_buf);
+       ibuf_free(idp.id_buf);
        return (ret);
 }
 
Index: ikev2_msg.c
===================================================================
RCS file: /cvs/src/sbin/iked/ikev2_msg.c,v
retrieving revision 1.90
diff -u -p -r1.90 ikev2_msg.c
--- ikev2_msg.c 6 Dec 2022 09:07:33 -0000       1.90
+++ ikev2_msg.c 23 May 2023 12:45:41 -0000
@@ -191,15 +191,15 @@ ikev2_msg_cleanup(struct iked *env, stru
        struct iked_certreq     *cr;
 
        if (msg == msg->msg_parent) {
-               ibuf_release(msg->msg_nonce);
-               ibuf_release(msg->msg_ke);
-               ibuf_release(msg->msg_auth.id_buf);
-               ibuf_release(msg->msg_peerid.id_buf);
-               ibuf_release(msg->msg_localid.id_buf);
-               ibuf_release(msg->msg_cert.id_buf);
-               ibuf_release(msg->msg_cookie);
-               ibuf_release(msg->msg_cookie2);
-               ibuf_release(msg->msg_del_buf);
+               ibuf_free(msg->msg_nonce);
+               ibuf_free(msg->msg_ke);
+               ibuf_free(msg->msg_auth.id_buf);
+               ibuf_free(msg->msg_peerid.id_buf);
+               ibuf_free(msg->msg_localid.id_buf);
+               ibuf_free(msg->msg_cert.id_buf);
+               ibuf_free(msg->msg_cookie);
+               ibuf_free(msg->msg_cookie2);
+               ibuf_free(msg->msg_del_buf);
                free(msg->msg_eap.eam_user);
                free(msg->msg_cp_addr);
                free(msg->msg_cp_addr6);
@@ -221,14 +221,14 @@ ikev2_msg_cleanup(struct iked *env, stru
 
                config_free_proposals(&msg->msg_proposals, 0);
                while ((cr = SIMPLEQ_FIRST(&msg->msg_certreqs))) {
-                       ibuf_release(cr->cr_data);
+                       ibuf_free(cr->cr_data);
                        SIMPLEQ_REMOVE_HEAD(&msg->msg_certreqs, cr_entry);
                        free(cr);
                }
        }
 
        if (msg->msg_data != NULL) {
-               ibuf_release(msg->msg_data);
+               ibuf_free(msg->msg_data);
                msg->msg_data = NULL;
        }
 }
@@ -478,13 +478,13 @@ ikev2_msg_encrypt(struct iked *env, stru
            __func__, len + sizeof(pad), pad, ibuf_size(dst));
        print_hex(ibuf_data(dst), 0, ibuf_size(dst));
 
-       ibuf_release(src);
-       ibuf_release(out);
+       ibuf_free(src);
+       ibuf_free(out);
        return (dst);
  done:
-       ibuf_release(src);
-       ibuf_release(out);
-       ibuf_release(dst);
+       ibuf_free(src);
+       ibuf_free(out);
+       ibuf_free(dst);
        return (NULL);
 }
 
@@ -548,7 +548,7 @@ ikev2_msg_integr(struct iked *env, struc
 
        ret = 0;
  done:
-       ibuf_release(tmp);
+       ibuf_free(tmp);
 
        return (ret);
 }
@@ -623,7 +623,7 @@ ikev2_msg_decrypt(struct iked *env, stru
                log_debug("%s: integrity check succeeded", __func__);
                print_hex(tmp->buf, 0, tmplen);
 
-               ibuf_release(tmp);
+               ibuf_free(tmp);
                tmp = NULL;
        }
 
@@ -691,12 +691,12 @@ ikev2_msg_decrypt(struct iked *env, stru
        if (ibuf_setsize(out, outlen - pad - 1) != 0)
                goto done;
 
-       ibuf_release(src);
+       ibuf_free(src);
        return (out);
  done:
-       ibuf_release(tmp);
-       ibuf_release(out);
-       ibuf_release(src);
+       ibuf_free(tmp);
+       ibuf_free(out);
+       ibuf_free(src);
        return (NULL);
 }
 
@@ -906,14 +906,14 @@ ikev2_send_encrypted_fragments(struct ik
                firstpayload = 0;
 
                ikev2_msg_cleanup(env, &resp);
-               ibuf_release(e);
+               ibuf_free(e);
                e = NULL;
        }
 
        return 0;
 done:
        ikev2_msg_cleanup(env, &resp);
-       ibuf_release(e);
+       ibuf_free(e);
        ikestat_inc(env, ikes_frag_send_failures);
        return ret;
 }
@@ -977,7 +977,7 @@ ikev2_msg_auth(struct iked *env, struct 
        return (authmsg);
 
  fail:
-       ibuf_release(authmsg);
+       ibuf_free(authmsg);
        return (NULL);
 }
 
@@ -1109,7 +1109,7 @@ ikev2_msg_authsign(struct iked *env, str
                goto done;
        }
 
-       ibuf_release(sa->sa_localauth.id_buf);
+       ibuf_free(sa->sa_localauth.id_buf);
        sa->sa_localauth.id_buf = NULL;
 
        if ((buf = ibuf_new(NULL, dsa_length(dsa))) == NULL) {
@@ -1120,14 +1120,14 @@ ikev2_msg_authsign(struct iked *env, str
        if ((siglen = dsa_sign_final(dsa,
            ibuf_data(buf), ibuf_size(buf))) < 0) {
                log_debug("%s: failed to create auth signature", __func__);
-               ibuf_release(buf);
+               ibuf_free(buf);
                goto done;
        }
 
        if (ibuf_setsize(buf, siglen) < 0) {
                log_debug("%s: failed to set auth signature size to %zd",
                    __func__, siglen);
-               ibuf_release(buf);
+               ibuf_free(buf);
                goto done;
        }
 
Index: ikev2_pld.c
===================================================================
RCS file: /cvs/src/sbin/iked/ikev2_pld.c,v
retrieving revision 1.127
diff -u -p -r1.127 ikev2_pld.c
--- ikev2_pld.c 6 Dec 2022 09:07:33 -0000       1.127
+++ ikev2_pld.c 23 May 2023 12:45:43 -0000
@@ -748,7 +748,7 @@ ikev2_pld_id(struct iked *env, struct ik
                return (-1);
 
        if (ikev2_print_id(&idb, idstr, sizeof(idstr)) == -1) {
-               ibuf_release(idb.id_buf);
+               ibuf_free(idb.id_buf);
                log_debug("%s: malformed id", __func__);
                return (-1);
        }
@@ -756,7 +756,7 @@ ikev2_pld_id(struct iked *env, struct ik
        log_debug("%s: id %s length %zu", __func__, idstr, len);
 
        if (!ikev2_msg_frompeer(msg)) {
-               ibuf_release(idb.id_buf);
+               ibuf_free(idb.id_buf);
                return (0);
        }
 
@@ -766,13 +766,13 @@ ikev2_pld_id(struct iked *env, struct ik
        else if (!sa->sa_hdr.sh_initiator && payload == IKEV2_PAYLOAD_IDr)
                idp = &msg->msg_parent->msg_localid;
        else {
-               ibuf_release(idb.id_buf);
+               ibuf_free(idb.id_buf);
                log_debug("%s: unexpected id payload", __func__);
                return (0);
        }
 
        if (idp->id_type) {
-               ibuf_release(idb.id_buf);
+               ibuf_free(idb.id_buf);
                log_debug("%s: duplicate id payload", __func__);
                return (-1);
        }
@@ -964,7 +964,7 @@ ikev2_pld_auth(struct iked *env, struct 
                return (-1);
        }
 
-       ibuf_release(idp->id_buf);
+       ibuf_free(idp->id_buf);
        idp->id_type = auth.auth_method;
        idp->id_offset = 0;
        if ((idp->id_buf = ibuf_new(buf, len)) == NULL)
@@ -1279,7 +1279,7 @@ ikev2_pld_notify(struct iked *env, struc
                            " notification: %zu", __func__, left);
                        return (0);
                }
-               ibuf_release(msg->msg_cookie2); /* should not happen */
+               ibuf_free(msg->msg_cookie2);    /* should not happen */
                if ((msg->msg_cookie2 = ibuf_new(buf, left)) == NULL) {
                        log_debug("%s: failed to get peer cookie2", __func__);
                        return (-1);
@@ -1300,7 +1300,7 @@ ikev2_pld_notify(struct iked *env, struc
                log_debug("%s: received cookie, len %zu", __func__, left);
                print_hex(buf, 0, left);
 
-               ibuf_release(msg->msg_cookie);
+               ibuf_free(msg->msg_cookie);
                if ((msg->msg_cookie = ibuf_new(buf, left)) == NULL) {
                        log_debug("%s: failed to get peer cookie", __func__);
                        return (-1);
@@ -1710,12 +1710,12 @@ ikev2_pld_ef(struct iked *env, struct ik
 done:
        if (!processed)
                ikestat_inc(env, ikes_frag_rcvd_drop);
-       ibuf_release(e);
+       ibuf_free(e);
        return (ret);
 dropall:
        ikestat_add(env, ikes_frag_rcvd_drop, sa_frag->frag_count + 1);
        config_free_fragments(sa_frag);
-       ibuf_release(e);
+       ibuf_free(e);
        return -1;
 }
 
@@ -1782,7 +1782,7 @@ done:
        else
                ikestat_add(env, ikes_frag_reass_drop, sa_frag->frag_total);
        config_free_fragments(sa_frag);
-       ibuf_release(e);
+       ibuf_free(e);
 
        return (ret);
 }
@@ -1837,7 +1837,7 @@ ikev2_pld_e(struct iked *env, struct ike
            pld->pld_nextpayload);
 
  done:
-       ibuf_release(e);
+       ibuf_free(e);
 
        return (ret);
 }
Index: imsg_util.c
===================================================================
RCS file: /cvs/src/sbin/iked/imsg_util.c,v
retrieving revision 1.14
diff -u -p -r1.14 imsg_util.c
--- imsg_util.c 23 May 2023 12:43:26 -0000      1.14
+++ imsg_util.c 23 May 2023 12:45:43 -0000
@@ -81,12 +81,6 @@ ibuf_advance(struct ibuf *buf, size_t le
        return ibuf_reserve(buf, len);
 }
 
-void
-ibuf_release(struct ibuf *buf)
-{
-       ibuf_free(buf);
-}
-
 size_t
 ibuf_length(struct ibuf *buf)
 {
@@ -166,7 +160,7 @@ ibuf_prepend(struct ibuf *buf, void *dat
        if ((new = ibuf_new(data, len)) == NULL)
                return (-1);
        if (ibuf_cat(new, buf) == -1) {
-               ibuf_release(new);
+               ibuf_free(new);
                return (-1);
        }
        free(buf->buf);
Index: policy.c
===================================================================
RCS file: /cvs/src/sbin/iked/policy.c,v
retrieving revision 1.93
diff -u -p -r1.93 policy.c
--- policy.c    8 Feb 2023 19:59:10 -0000       1.93
+++ policy.c    23 May 2023 12:45:46 -0000
@@ -784,8 +784,8 @@ childsa_free(struct iked_childsa *csa)
                csb->csa_bundled = NULL;
        if ((csb = csa->csa_peersa) != NULL)
                csb->csa_peersa = NULL;
-       ibuf_release(csa->csa_encrkey);
-       ibuf_release(csa->csa_integrkey);
+       ibuf_free(csa->csa_encrkey);
+       ibuf_free(csa->csa_integrkey);
        free(csa);
 }
 

Reply via email to