History log of /openbsd-current/sbin/isakmpd/policy.h
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# 1.18 21-May-2024 jsg

remove prototypes with no matching function and externs with no var
partly checked by millert@


Revision tags: OPENBSD_4_2_BASE OPENBSD_4_3_BASE OPENBSD_4_4_BASE OPENBSD_4_5_BASE OPENBSD_4_6_BASE OPENBSD_4_7_BASE OPENBSD_4_8_BASE OPENBSD_4_9_BASE OPENBSD_5_0_BASE OPENBSD_5_1_BASE OPENBSD_5_2_BASE OPENBSD_5_3_BASE OPENBSD_5_4_BASE OPENBSD_5_5_BASE OPENBSD_5_6_BASE OPENBSD_5_7_BASE OPENBSD_5_8_BASE OPENBSD_5_9_BASE OPENBSD_6_0_BASE OPENBSD_6_1_BASE OPENBSD_6_2_BASE OPENBSD_6_3_BASE OPENBSD_6_4_BASE OPENBSD_6_5_BASE OPENBSD_6_6_BASE OPENBSD_6_7_BASE OPENBSD_6_8_BASE OPENBSD_6_9_BASE OPENBSD_7_0_BASE OPENBSD_7_1_BASE OPENBSD_7_2_BASE OPENBSD_7_3_BASE OPENBSD_7_4_BASE OPENBSD_7_5_BASE
# 1.17 05-Aug-2007 tom

Allow key exchange with RSA signature authentication to work with
Cisco IOS and other initiators that only send their certs in response
to CERT_REQUEST.

With input and help from cloder@, Stuart Henderson, mpf@, and several
others who did lots of testing - thanks to all.

ok hshoexer@


Revision tags: OPENBSD_3_8_BASE OPENBSD_3_9_BASE OPENBSD_4_0_BASE OPENBSD_4_1_BASE
# 1.16 05-Apr-2005 cloder

Now that X509 is de-featurized, no need for USE_X509 in regress tests.
Start compiling the X509 regress test again, for the first time since
2002 when DLOPEN stuff was removed. Kill remnants of DLOPEN defines
left around in other Makefiles. Allow isakmpd to compile if USE_KEYNOTE
is not defined.


Revision tags: OPENBSD_3_6_BASE OPENBSD_3_7_BASE
# 1.15 25-Jun-2004 hshoexer

Keynote policy checking can now be disabled by "-K" switch and config tag
"Use-Keynote". Default is to use keynote.

ok henning@ ho@


# 1.14 28-Apr-2004 hshoexer

remove unused variable and shorten names of two other. Removed some spaces
while around.

ok ho@ markus@


# 1.13 15-Apr-2004 deraadt

partial move to KNF. More to come. This has happened because there
are a raft of source code auditors who are willing to help improve this
code only if this is done, and hey, isakmpd does need our standard
auditing process. ok ho hshoexer


Revision tags: OPENBSD_3_4_BASE OPENBSD_3_5_BASE
# 1.12 04-Jun-2003 ho

Remove the rest of clauses 3 and 4. Approved by Niklas Hallqvist, Angelos
D. Keromytis and Niels Provos.


# 1.11 14-May-2003 ho

Policy file default defined twice, kill the local copy.


Revision tags: OPENBSD_3_2_BASE OPENBSD_3_3_BASE
# 1.10 10-Jun-2002 ho

The dlopen() stuff goes away.


Revision tags: OPENBSD_3_0_BASE OPENBSD_3_1_BASE
# 1.9 15-Aug-2001 ho

Some more style...


# 1.8 31-May-2001 angelos

Routines for handling KeyNote cert representation.


Revision tags: OPENBSD_2_8_BASE OPENBSD_2_9_BASE
# 1.7 07-Oct-2000 niklas

cert.c: Merge with EOM 1.18
cert.h: Merge with EOM 1.8
libcrypto.c: Merge with EOM 1.14
policy.h: Merge with EOM 1.12
x509.h: Merge with EOM 1.11

author: niklas
Multiple subject name matching, makes certificate interop with PGPnet at least
partly working. Added some error checking.


# 1.6 08-Jun-2000 niklas

Merge with EOM 1.11

author: angelos
Different policy/Keynote sessions per Phase 1 SA.

author: angelos
Allow exchange of KeyNote credentials over IKE. Multiple credentials
may be passed in a single CERT payload. KeyNote is used if a
directory named as the local ID we use in an exchange exists in the
KeyNote directory (default: /etc/isakmpd/keynote/). Note that
asymmetric credentials are possible (use KeyNote in one direction and
X509 in the other); such authentication is envisioned to be the most
common: the clients will use KeyNote credentials to authenticate and
authorize with a server, whilst the server will just provide an X509
certificate proving its binding to the IP address or ID.

Totally asymmetric authentication (e.g., shared key in one direction,
RSA in the other) is not supported by the IKE protocol.

author: angelos
A few more definitions.

author: angelos
Some more support for KeyNote credential exchange (not yet done).


Revision tags: OPENBSD_2_7_BASE
# 1.5 02-May-2000 niklas

Merge with EOM 1.7

author: angelos
Move POLICY_FILE_DEFAULT definition to the .h file.


# 1.4 07-Apr-2000 niklas

Merge with EOM 1.6

author: niklas
Hmm keynote does not exist in a dynamically linked version


# 1.3 20-Feb-2000 niklas

Merge with EOM 1.5

author: niklas
Allow isakmpd builders to remove optional parts and save bytes.


Revision tags: OPENBSD_2_6_BASE
# 1.2 26-Aug-1999 niklas

Merge with EOM 1.4

author: niklas
typo

author: niklas
Support dynamic loading of libkeynote too. Build isakmpd static by default.
Stylistic cleanup of keynote policy code. Correct some libcrypto calls.


# 1.1 07-Jul-1999 niklas

policy.h: Merge with EOM 1.2
policy.c: Merge with EOM 1.2

author: niklas
Remove $EOM$ from Eom repository version

author: niklas
New file, for keynote policy handling. By angelos@openbsd.org


Revision tags: OPENBSD_4_2_BASE OPENBSD_4_3_BASE OPENBSD_4_4_BASE OPENBSD_4_5_BASE OPENBSD_4_6_BASE OPENBSD_4_7_BASE OPENBSD_4_8_BASE OPENBSD_4_9_BASE OPENBSD_5_0_BASE OPENBSD_5_1_BASE OPENBSD_5_2_BASE OPENBSD_5_3_BASE OPENBSD_5_4_BASE OPENBSD_5_5_BASE OPENBSD_5_6_BASE OPENBSD_5_7_BASE OPENBSD_5_8_BASE OPENBSD_5_9_BASE OPENBSD_6_0_BASE OPENBSD_6_1_BASE OPENBSD_6_2_BASE
# 1.17 05-Aug-2007 tom

Allow key exchange with RSA signature authentication to work with
Cisco IOS and other initiators that only send their certs in response
to CERT_REQUEST.

With input and help from cloder@, Stuart Henderson, mpf@, and several
others who did lots of testing - thanks to all.

ok hshoexer@


Revision tags: OPENBSD_3_8_BASE OPENBSD_3_9_BASE OPENBSD_4_0_BASE OPENBSD_4_1_BASE
# 1.16 05-Apr-2005 cloder

Now that X509 is de-featurized, no need for USE_X509 in regress tests.
Start compiling the X509 regress test again, for the first time since
2002 when DLOPEN stuff was removed. Kill remnants of DLOPEN defines
left around in other Makefiles. Allow isakmpd to compile if USE_KEYNOTE
is not defined.


Revision tags: OPENBSD_3_6_BASE OPENBSD_3_7_BASE
# 1.15 25-Jun-2004 hshoexer

Keynote policy checking can now be disabled by "-K" switch and config tag
"Use-Keynote". Default is to use keynote.

ok henning@ ho@


# 1.14 28-Apr-2004 hshoexer

remove unused variable and shorten names of two other. Removed some spaces
while around.

ok ho@ markus@


# 1.13 15-Apr-2004 deraadt

partial move to KNF. More to come. This has happened because there
are a raft of source code auditors who are willing to help improve this
code only if this is done, and hey, isakmpd does need our standard
auditing process. ok ho hshoexer


Revision tags: OPENBSD_3_4_BASE OPENBSD_3_5_BASE
# 1.12 04-Jun-2003 ho

Remove the rest of clauses 3 and 4. Approved by Niklas Hallqvist, Angelos
D. Keromytis and Niels Provos.


# 1.11 14-May-2003 ho

Policy file default defined twice, kill the local copy.


Revision tags: OPENBSD_3_2_BASE OPENBSD_3_3_BASE
# 1.10 10-Jun-2002 ho

The dlopen() stuff goes away.


Revision tags: OPENBSD_3_0_BASE OPENBSD_3_1_BASE
# 1.9 15-Aug-2001 ho

Some more style...


# 1.8 31-May-2001 angelos

Routines for handling KeyNote cert representation.


Revision tags: OPENBSD_2_8_BASE OPENBSD_2_9_BASE
# 1.7 07-Oct-2000 niklas

cert.c: Merge with EOM 1.18
cert.h: Merge with EOM 1.8
libcrypto.c: Merge with EOM 1.14
policy.h: Merge with EOM 1.12
x509.h: Merge with EOM 1.11

author: niklas
Multiple subject name matching, makes certificate interop with PGPnet at least
partly working. Added some error checking.


# 1.6 08-Jun-2000 niklas

Merge with EOM 1.11

author: angelos
Different policy/Keynote sessions per Phase 1 SA.

author: angelos
Allow exchange of KeyNote credentials over IKE. Multiple credentials
may be passed in a single CERT payload. KeyNote is used if a
directory named as the local ID we use in an exchange exists in the
KeyNote directory (default: /etc/isakmpd/keynote/). Note that
asymmetric credentials are possible (use KeyNote in one direction and
X509 in the other); such authentication is envisioned to be the most
common: the clients will use KeyNote credentials to authenticate and
authorize with a server, whilst the server will just provide an X509
certificate proving its binding to the IP address or ID.

Totally asymmetric authentication (e.g., shared key in one direction,
RSA in the other) is not supported by the IKE protocol.

author: angelos
A few more definitions.

author: angelos
Some more support for KeyNote credential exchange (not yet done).


Revision tags: OPENBSD_2_7_BASE
# 1.5 02-May-2000 niklas

Merge with EOM 1.7

author: angelos
Move POLICY_FILE_DEFAULT definition to the .h file.


# 1.4 07-Apr-2000 niklas

Merge with EOM 1.6

author: niklas
Hmm keynote does not exist in a dynamically linked version


# 1.3 20-Feb-2000 niklas

Merge with EOM 1.5

author: niklas
Allow isakmpd builders to remove optional parts and save bytes.


Revision tags: OPENBSD_2_6_BASE
# 1.2 26-Aug-1999 niklas

Merge with EOM 1.4

author: niklas
typo

author: niklas
Support dynamic loading of libkeynote too. Build isakmpd static by default.
Stylistic cleanup of keynote policy code. Correct some libcrypto calls.


# 1.1 07-Jul-1999 niklas

policy.h: Merge with EOM 1.2
policy.c: Merge with EOM 1.2

author: niklas
Remove $EOM$ from Eom repository version

author: niklas
New file, for keynote policy handling. By angelos@openbsd.org