Module Name: src
Committed By: christos
Date: Sat Mar 8 16:39:09 UTC 2025
Modified Files:
src/crypto/dist/ipsec-tools/src/racoon: admin.c admin.h algorithm.c
algorithm.h backupsa.c cfparse.y cftoken.l crypto_openssl.c
getcertsbyname.c grabmyaddr.c handler.c ipsec_doi.c isakmp.c
isakmp_cfg.c isakmp_cfg.h isakmp_frag.c isakmp_var.h localconf.c
misc.c misc.h oakley.c plainrsa-gen.c plog.c plog.h privsep.c
prsa_par.y remoteconf.c remoteconf.h schedule.h sockmisc.c
strnames.c strnames.h vendorid.c
Log Message:
more cleanups (const related, format strings)
To generate a diff of this commit:
cvs rdiff -u -r1.42 -r1.43 src/crypto/dist/ipsec-tools/src/racoon/admin.c
cvs rdiff -u -r1.9 -r1.10 src/crypto/dist/ipsec-tools/src/racoon/admin.h \
src/crypto/dist/ipsec-tools/src/racoon/prsa_par.y \
src/crypto/dist/ipsec-tools/src/racoon/schedule.h
cvs rdiff -u -r1.11 -r1.12 src/crypto/dist/ipsec-tools/src/racoon/algorithm.c \
src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c \
src/crypto/dist/ipsec-tools/src/racoon/localconf.c
cvs rdiff -u -r1.7 -r1.8 src/crypto/dist/ipsec-tools/src/racoon/algorithm.h \
src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.h \
src/crypto/dist/ipsec-tools/src/racoon/misc.c \
src/crypto/dist/ipsec-tools/src/racoon/misc.h \
src/crypto/dist/ipsec-tools/src/racoon/plainrsa-gen.c
cvs rdiff -u -r1.12 -r1.13 src/crypto/dist/ipsec-tools/src/racoon/backupsa.c \
src/crypto/dist/ipsec-tools/src/racoon/strnames.c
cvs rdiff -u -r1.54 -r1.55 src/crypto/dist/ipsec-tools/src/racoon/cfparse.y
cvs rdiff -u -r1.29 -r1.30 src/crypto/dist/ipsec-tools/src/racoon/cftoken.l \
src/crypto/dist/ipsec-tools/src/racoon/oakley.c
cvs rdiff -u -r1.30 -r1.31 \
src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.c \
src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.c
cvs rdiff -u -r1.5 -r1.6 \
src/crypto/dist/ipsec-tools/src/racoon/getcertsbyname.c \
src/crypto/dist/ipsec-tools/src/racoon/strnames.h
cvs rdiff -u -r1.41 -r1.42 \
src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c
cvs rdiff -u -r1.43 -r1.44 src/crypto/dist/ipsec-tools/src/racoon/handler.c
cvs rdiff -u -r1.53 -r1.54 src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c
cvs rdiff -u -r1.80 -r1.81 src/crypto/dist/ipsec-tools/src/racoon/isakmp.c
cvs rdiff -u -r1.19 -r1.20 \
src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h
cvs rdiff -u -r1.8 -r1.9 src/crypto/dist/ipsec-tools/src/racoon/plog.c
cvs rdiff -u -r1.6 -r1.7 src/crypto/dist/ipsec-tools/src/racoon/plog.h
cvs rdiff -u -r1.27 -r1.28 src/crypto/dist/ipsec-tools/src/racoon/privsep.c
cvs rdiff -u -r1.31 -r1.32 \
src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c
cvs rdiff -u -r1.17 -r1.18 \
src/crypto/dist/ipsec-tools/src/racoon/remoteconf.h
cvs rdiff -u -r1.20 -r1.21 src/crypto/dist/ipsec-tools/src/racoon/sockmisc.c
cvs rdiff -u -r1.10 -r1.11 src/crypto/dist/ipsec-tools/src/racoon/vendorid.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/crypto/dist/ipsec-tools/src/racoon/admin.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/admin.c:1.42 src/crypto/dist/ipsec-tools/src/racoon/admin.c:1.43
--- src/crypto/dist/ipsec-tools/src/racoon/admin.c:1.42 Fri Mar 7 10:55:28 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/admin.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: admin.c,v 1.42 2025/03/07 15:55:28 christos Exp $ */
+/* $NetBSD: admin.c,v 1.43 2025/03/08 16:39:08 christos Exp $ */
/* Id: admin.c,v 1.25 2006/04/06 14:31:04 manubsd Exp */
@@ -87,7 +87,7 @@
#include "gcmalloc.h"
#ifdef ENABLE_ADMINPORT
-char *adminsock_path = ADMINSOCK_PATH;
+const char *adminsock_path = ADMINSOCK_PATH;
uid_t adminsock_owner = 0;
gid_t adminsock_group = 0;
mode_t adminsock_mode = 0600;
@@ -128,7 +128,7 @@ admin_handler(void *ctx __unused, int fd
}
/* sanity check */
- if (len < sizeof(com)) {
+ if (len < (ssize_t)sizeof(com)) {
plog(LLV_ERROR, LOCATION, NULL,
"invalid header length of admin command\n");
goto end;
@@ -757,7 +757,7 @@ admin_init(void)
}
int
-admin_close()
+admin_close(void)
{
unmonitor_fd(lcconf->sock_admin);
close(lcconf->sock_admin);
Index: src/crypto/dist/ipsec-tools/src/racoon/admin.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/admin.h:1.9 src/crypto/dist/ipsec-tools/src/racoon/admin.h:1.10
--- src/crypto/dist/ipsec-tools/src/racoon/admin.h:1.9 Fri Mar 7 10:55:28 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/admin.h Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: admin.h,v 1.9 2025/03/07 15:55:28 christos Exp $ */
+/* $NetBSD: admin.h,v 1.10 2025/03/08 16:39:08 christos Exp $ */
/* Id: admin.h,v 1.11 2005/06/19 22:37:47 manubsd Exp */
@@ -36,7 +36,7 @@
#define ADMINSOCK_PATH ADMINPORTDIR "/racoon.sock"
-extern char *adminsock_path;
+extern const char *adminsock_path;
extern uid_t adminsock_owner;
extern gid_t adminsock_group;
extern mode_t adminsock_mode;
Index: src/crypto/dist/ipsec-tools/src/racoon/prsa_par.y
diff -u src/crypto/dist/ipsec-tools/src/racoon/prsa_par.y:1.9 src/crypto/dist/ipsec-tools/src/racoon/prsa_par.y:1.10
--- src/crypto/dist/ipsec-tools/src/racoon/prsa_par.y:1.9 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/prsa_par.y Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: prsa_par.y,v 1.9 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: prsa_par.y,v 1.10 2025/03/08 16:39:08 christos Exp $ */
/* Id: prsa_par.y,v 1.3 2004/11/08 12:04:23 ludvigm Exp */
@@ -113,7 +113,7 @@ prsaerror(const char *s, ...)
va_end(ap);
}
-void
+static void
prsawarning(const char *s, ...)
{
char fmt[512];
Index: src/crypto/dist/ipsec-tools/src/racoon/schedule.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/schedule.h:1.9 src/crypto/dist/ipsec-tools/src/racoon/schedule.h:1.10
--- src/crypto/dist/ipsec-tools/src/racoon/schedule.h:1.9 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/schedule.h Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: schedule.h,v 1.9 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: schedule.h,v 1.10 2025/03/08 16:39:08 christos Exp $ */
/* Id: schedule.h,v 1.5 2006/05/03 21:53:42 vanhu Exp */
@@ -61,7 +61,7 @@
#ifndef container_of
#define container_of(ptr, type, member) ({ \
const typeof( ((type *)0)->member ) *__mptr = (ptr); \
- (type *)( (char *)__mptr - offsetof(type,member) );})
+ (type *)( (char *)(intptr_t)__mptr - offsetof(type,member) );})
#endif
@@ -75,7 +75,7 @@ struct sched {
long id; /* for debug */
};
-#define SCHED_INITIALIZER() { NULL, }
+#define SCHED_INITIALIZER() { .func = NULL, }
struct scheddump {
time_t xtime;
Index: src/crypto/dist/ipsec-tools/src/racoon/algorithm.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/algorithm.c:1.11 src/crypto/dist/ipsec-tools/src/racoon/algorithm.c:1.12
--- src/crypto/dist/ipsec-tools/src/racoon/algorithm.c:1.11 Fri Mar 7 10:55:28 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/algorithm.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: algorithm.c,v 1.11 2025/03/07 15:55:28 christos Exp $ */
+/* $NetBSD: algorithm.c,v 1.12 2025/03/08 16:39:08 christos Exp $ */
/* Id: algorithm.c,v 1.15 2006/05/23 20:23:09 manubsd Exp */
@@ -301,9 +301,8 @@ static struct dh_algorithm *alg_oakley_d
static struct hash_algorithm *
alg_oakley_hashdef(int doi)
{
- int i;
- for (i = 0; i < ARRAYLEN(oakley_hashdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_hashdef); i++)
if (doi == oakley_hashdef[i].doi) {
plog(LLV_DEBUG, LOCATION, NULL, "hash(%s)\n",
oakley_hashdef[i].name);
@@ -327,9 +326,9 @@ alg_oakley_hashdef_ok(int doi)
int
alg_oakley_hashdef_doi(int type)
{
- int i, res = -1;
+ int res = -1;
- for (i = 0; i < ARRAYLEN(oakley_hashdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_hashdef); i++)
if (type == oakley_hashdef[i].type) {
res = oakley_hashdef[i].doi;
break;
@@ -377,9 +376,8 @@ alg_oakley_hashdef_one(int doi, vchar_t
static struct hmac_algorithm *
alg_oakley_hmacdef(int doi)
{
- int i;
- for (i = 0; i < ARRAYLEN(oakley_hmacdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_hmacdef); i++)
if (doi == oakley_hmacdef[i].doi) {
plog(LLV_DEBUG, LOCATION, NULL, "hmac(%s)\n",
oakley_hmacdef[i].name);
@@ -391,9 +389,9 @@ alg_oakley_hmacdef(int doi)
int
alg_oakley_hmacdef_doi(int type)
{
- int i, res = -1;
+ int res = -1;
- for (i = 0; i < ARRAYLEN(oakley_hmacdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_hmacdef); i++)
if (type == oakley_hmacdef[i].type) {
res = oakley_hmacdef[i].doi;
break;
@@ -433,9 +431,8 @@ alg_oakley_hmacdef_one(int doi, vchar_t
static struct enc_algorithm *
alg_oakley_encdef(int doi)
{
- int i;
- for (i = 0; i < ARRAYLEN(oakley_encdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_encdef); i++)
if (doi == oakley_encdef[i].doi) {
plog(LLV_DEBUG, LOCATION, NULL, "encryption(%s)\n",
oakley_encdef[i].name);
@@ -459,9 +456,9 @@ alg_oakley_encdef_ok(int doi)
int
alg_oakley_encdef_doi(int type)
{
- int i, res = -1;
+ int res = -1;
- for (i = 0; i < ARRAYLEN(oakley_encdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_encdef); i++)
if (type == oakley_encdef[i].type) {
res = oakley_encdef[i].doi;
break;
@@ -563,9 +560,8 @@ alg_oakley_encdef_encrypt(int doi, vchar
static struct enc_algorithm *
alg_ipsec_encdef(int doi)
{
- int i;
- for (i = 0; i < ARRAYLEN(ipsec_encdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(ipsec_encdef); i++)
if (doi == ipsec_encdef[i].doi) {
plog(LLV_DEBUG, LOCATION, NULL, "encryption(%s)\n",
ipsec_encdef[i].name);
@@ -577,9 +573,9 @@ alg_ipsec_encdef(int doi)
int
alg_ipsec_encdef_doi(int type)
{
- int i, res = -1;
+ int res = -1;
- for (i = 0; i < ARRAYLEN(ipsec_encdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(ipsec_encdef); i++)
if (type == ipsec_encdef[i].type) {
res = ipsec_encdef[i].doi;
break;
@@ -603,9 +599,8 @@ alg_ipsec_encdef_keylen(int doi, int len
static struct hmac_algorithm *
alg_ipsec_hmacdef(int doi)
{
- int i;
- for (i = 0; i < ARRAYLEN(ipsec_hmacdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(ipsec_hmacdef); i++)
if (doi == ipsec_hmacdef[i].doi) {
plog(LLV_DEBUG, LOCATION, NULL, "hmac(%s)\n",
ipsec_hmacdef[i].name);
@@ -617,9 +612,9 @@ alg_ipsec_hmacdef(int doi)
int
alg_ipsec_hmacdef_doi(int type)
{
- int i, res = -1;
+ int res = -1;
- for (i = 0; i < ARRAYLEN(ipsec_hmacdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(ipsec_hmacdef); i++)
if (type == ipsec_hmacdef[i].type) {
res = ipsec_hmacdef[i].doi;
break;
@@ -643,9 +638,9 @@ alg_ipsec_hmacdef_hashlen(int doi)
int
alg_ipsec_compdef_doi(int type)
{
- int i, res = -1;
+ int res = -1;
- for (i = 0; i < ARRAYLEN(ipsec_compdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(ipsec_compdef); i++)
if (type == ipsec_compdef[i].type) {
res = ipsec_compdef[i].doi;
break;
@@ -657,9 +652,8 @@ alg_ipsec_compdef_doi(int type)
static struct dh_algorithm *
alg_oakley_dhdef(int doi)
{
- int i;
- for (i = 0; i < ARRAYLEN(oakley_dhdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_dhdef); i++)
if (doi == oakley_dhdef[i].doi) {
plog(LLV_DEBUG, LOCATION, NULL, "hmac(%s)\n",
oakley_dhdef[i].name);
@@ -683,9 +677,9 @@ alg_oakley_dhdef_ok(int doi)
int
alg_oakley_dhdef_doi(int type)
{
- int i, res = -1;
+ int res = -1;
- for (i = 0; i < ARRAYLEN(oakley_dhdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_dhdef); i++)
if (type == oakley_dhdef[i].type) {
res = oakley_dhdef[i].doi;
break;
@@ -720,9 +714,9 @@ alg_oakley_dhdef_name(int doi)
int
alg_oakley_authdef_doi(int type)
{
- int i, res = -1;
+ int res = -1;
- for (i = 0; i < ARRAYLEN(oakley_authdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_authdef); i++)
if (type == oakley_authdef[i].type) {
res = oakley_authdef[i].doi;
break;
@@ -733,9 +727,8 @@ alg_oakley_authdef_doi(int type)
const char *
alg_oakley_authdef_name(int doi)
{
- int i;
- for (i = 0; i < ARRAYLEN(oakley_authdef); i++)
+ for (size_t i = 0; i < ARRAYLEN(oakley_authdef); i++)
if (doi == oakley_authdef[i].doi) {
return oakley_authdef[i].name;
}
Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c:1.11 src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c:1.12
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c:1.11 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: isakmp_frag.c,v 1.11 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: isakmp_frag.c,v 1.12 2025/03/08 16:39:08 christos Exp $ */
/* Id: isakmp_frag.c,v 1.4 2004/11/13 17:31:36 manubsd Exp */
@@ -315,7 +315,7 @@ isakmp_frag_extract(struct ph1handle *ip
return 0;
out:
- plog(LLV_ERROR, LOCATION, NULL, m);
+ plog(LLV_ERROR, LOCATION, NULL, "%s", m);
racoon_free(item);
vfree(buf);
return -1;
Index: src/crypto/dist/ipsec-tools/src/racoon/localconf.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/localconf.c:1.11 src/crypto/dist/ipsec-tools/src/racoon/localconf.c:1.12
--- src/crypto/dist/ipsec-tools/src/racoon/localconf.c:1.11 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/localconf.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: localconf.c,v 1.11 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: localconf.c,v 1.12 2025/03/08 16:39:08 christos Exp $ */
/* $KAME: localconf.c,v 1.33 2001/08/09 07:32:19 sakane Exp $ */
@@ -80,7 +80,7 @@ initlcconf()
}
setdefault();
- lcconf->racoon_conf = LC_DEFAULT_CF;
+ lcconf->racoon_conf = __UNCONST(LC_DEFAULT_CF);
}
void
@@ -232,8 +232,8 @@ getpsk(const char *str, const int len)
continue;
/* search the end of 1st string. */
- for (p = buf; *p != '\0' && !isspace((int)*p); p++)
- ;
+ for (p = buf; *p != '\0' && !isspace((unsigned char)*p); p++)
+ continue;
if (*p == '\0')
continue; /* no 2nd parameter */
*p = '\0';
Index: src/crypto/dist/ipsec-tools/src/racoon/algorithm.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/algorithm.h:1.7 src/crypto/dist/ipsec-tools/src/racoon/algorithm.h:1.8
--- src/crypto/dist/ipsec-tools/src/racoon/algorithm.h:1.7 Fri Mar 7 10:55:28 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/algorithm.h Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: algorithm.h,v 1.7 2025/03/07 15:55:28 christos Exp $ */
+/* $NetBSD: algorithm.h,v 1.8 2025/03/08 16:39:08 christos Exp $ */
/* Id: algorithm.h,v 1.10 2005/04/09 16:25:23 manubsd Exp */
@@ -128,7 +128,7 @@ enum algtype {
};
struct hmac_algorithm {
- char *name;
+ const char *name;
int type;
int doi;
caddr_t (*init)(vchar_t *);
@@ -139,7 +139,7 @@ struct hmac_algorithm {
};
struct hash_algorithm {
- char *name;
+ const char *name;
int type;
int doi;
caddr_t (*init)(void);
@@ -150,7 +150,7 @@ struct hash_algorithm {
};
struct enc_algorithm {
- char *name;
+ const char *name;
int type;
int doi;
int blocklen;
@@ -162,7 +162,7 @@ struct enc_algorithm {
/* dh group */
struct dh_algorithm {
- char *name;
+ const char *name;
int type;
int doi;
struct dhgroup *dhgroup;
@@ -170,7 +170,7 @@ struct dh_algorithm {
/* ipcomp, auth meth, dh group */
struct misc_algorithm {
- char *name;
+ const char *name;
int type;
int doi;
};
Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.h:1.7 src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.h:1.8
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.h:1.7 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.h Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: isakmp_cfg.h,v 1.7 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: isakmp_cfg.h,v 1.8 2025/03/08 16:39:08 christos Exp $ */
/* $KAME$ */
@@ -196,8 +196,8 @@ void isakmp_cfg_rmstate(struct ph1handle
struct isakmp_cfg_state *isakmp_cfg_mkstate(void);
vchar_t *isakmp_cfg_copy(struct ph1handle *, struct isakmp_data *);
vchar_t *isakmp_cfg_short(struct ph1handle *, struct isakmp_data *, int);
-vchar_t *isakmp_cfg_varlen(struct ph1handle *, struct isakmp_data *, char *, size_t);
-vchar_t *isakmp_cfg_string(struct ph1handle *, struct isakmp_data *, char *);
+vchar_t *isakmp_cfg_varlen(struct ph1handle *, struct isakmp_data *, const char *, size_t);
+vchar_t *isakmp_cfg_string(struct ph1handle *, struct isakmp_data *, const char *);
int isakmp_cfg_getconfig(struct ph1handle *);
int isakmp_cfg_setenv(struct ph1handle *, char ***, int *);
Index: src/crypto/dist/ipsec-tools/src/racoon/misc.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/misc.c:1.7 src/crypto/dist/ipsec-tools/src/racoon/misc.c:1.8
--- src/crypto/dist/ipsec-tools/src/racoon/misc.c:1.7 Sat May 19 16:40:40 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/misc.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: misc.c,v 1.7 2018/05/19 20:40:40 maxv Exp $ */
+/* $NetBSD: misc.c,v 1.8 2025/03/08 16:39:08 christos Exp $ */
/* $KAME: misc.c,v 1.23 2001/08/16 14:37:29 itojun Exp $ */
@@ -68,7 +68,7 @@ racoon_hexdump(void *buf0, size_t len)
return 0;
}
-char *
+const char *
bit2str(int n, int bl)
{
#define MAXBITLEN 128
Index: src/crypto/dist/ipsec-tools/src/racoon/misc.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/misc.h:1.7 src/crypto/dist/ipsec-tools/src/racoon/misc.h:1.8
--- src/crypto/dist/ipsec-tools/src/racoon/misc.h:1.7 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/misc.h Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: misc.h,v 1.7 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: misc.h,v 1.8 2025/03/08 16:39:08 christos Exp $ */
/* Id: misc.h,v 1.9 2006/04/06 14:00:06 manubsd Exp */
@@ -43,7 +43,7 @@
#endif
extern int racoon_hexdump(void *, size_t);
-extern char *bit2str(int, int);
+extern const char *bit2str(int, int);
extern void *get_newbuf(void *, size_t);
extern const char *debug_location(const char *, int, const char *);
extern int getfsize(char *);
Index: src/crypto/dist/ipsec-tools/src/racoon/plainrsa-gen.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/plainrsa-gen.c:1.7 src/crypto/dist/ipsec-tools/src/racoon/plainrsa-gen.c:1.8
--- src/crypto/dist/ipsec-tools/src/racoon/plainrsa-gen.c:1.7 Sun Jan 23 09:35:45 2022
+++ src/crypto/dist/ipsec-tools/src/racoon/plainrsa-gen.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: plainrsa-gen.c,v 1.7 2022/01/23 14:35:45 christos Exp $ */
+/* $NetBSD: plainrsa-gen.c,v 1.8 2025/03/08 16:39:08 christos Exp $ */
/* Id: plainrsa-gen.c,v 1.6 2005/04/21 09:08:40 monas Exp */
/*
@@ -65,8 +65,8 @@
#define DEFAULT_PUBEXP RSA_F4
-void
-usage (char *argv0)
+static void
+usage(char *argv0)
{
fprintf(stderr, "Plain RSA key generator, part of %s\n", TOP_PACKAGE_STRING);
fprintf(stderr, "By Michal Ludvig (http://www.logix.cz/michal)\n");
@@ -74,7 +74,7 @@ usage (char *argv0)
fprintf(stderr, "Usage: %s [options]\n", argv0);
fprintf(stderr, "\n");
fprintf(stderr, " -b bits Generate <bits> long RSA key (default=1024)\n");
- fprintf(stderr, " -e pubexp Public exponent to use (default=%#x)\n", DEFAULT_PUBEXP);
+ fprintf(stderr, " -e pubexp Public exponent to use (default=%#lx)\n", DEFAULT_PUBEXP);
fprintf(stderr, " -f filename Filename to store the key to (default=stdout)\n");
fprintf(stderr, " -i filename Input source for format conversion\n");
fprintf(stderr, " -h Help\n");
@@ -86,12 +86,11 @@ usage (char *argv0)
/*
* See RFC 2065, section 3.5 for details about the output format.
*/
-vchar_t *
+static vchar_t *
mix_b64_pubkey(const RSA *key)
{
char *binbuf;
long binlen, ret;
- vchar_t *res;
binlen = 1 + BN_num_bytes(RSA_get0_e(key)) + BN_num_bytes(RSA_get0_n(key));
binbuf = malloc(binlen);
@@ -107,20 +106,18 @@ mix_b64_pubkey(const RSA *key)
return base64_encode(binbuf, binlen);
}
-char *
+static char *
lowercase(char *input)
{
- char *ptr = input;
- while (*ptr) {
+ for (char *ptr = input; *ptr; ptr++) {
if (*ptr >= 'A' && *ptr <= 'F')
*ptr -= 'A' - 'a';
- *ptr++;
}
return input;
}
-int
+static int
print_rsa_key(FILE *fp, const RSA *key)
{
vchar_t *pubkey64 = NULL;
@@ -149,7 +146,7 @@ print_rsa_key(FILE *fp, const RSA *key)
return 0;
}
-int
+static int
print_public_rsa_key(FILE *fp, const RSA *key)
{
vchar_t *pubkey64 = NULL;
@@ -166,11 +163,11 @@ print_public_rsa_key(FILE *fp, const RSA
return 0;
}
-int
+static int
convert_rsa_key(FILE *fpout, FILE *fpin)
{
int ret;
- RSA *key = NULL;
+ RSA *key;
key = PEM_read_RSAPrivateKey(fpin, NULL, NULL, NULL);
if (key) {
@@ -201,7 +198,7 @@ convert_rsa_key(FILE *fpout, FILE *fpin)
return -1;
}
-int
+static int
gen_rsa_key(FILE *fp, size_t bits, unsigned long exp)
{
int ret;
@@ -229,7 +226,6 @@ main (int argc, char *argv[])
FILE *fp = stdout, *fpin = NULL;
size_t bits = 1024;
unsigned int pubexp = DEFAULT_PUBEXP;
- struct stat st;
extern char *optarg;
extern int optind;
int c, fd = -1, fdin = -1;
Index: src/crypto/dist/ipsec-tools/src/racoon/backupsa.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/backupsa.c:1.12 src/crypto/dist/ipsec-tools/src/racoon/backupsa.c:1.13
--- src/crypto/dist/ipsec-tools/src/racoon/backupsa.c:1.12 Fri Mar 7 10:55:28 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/backupsa.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: backupsa.c,v 1.12 2025/03/07 15:55:28 christos Exp $ */
+/* $NetBSD: backupsa.c,v 1.13 2025/03/08 16:39:08 christos Exp $ */
/* $KAME: backupsa.c,v 1.16 2001/12/31 20:13:40 thorpej Exp $ */
@@ -77,8 +77,8 @@
* e_type e_keylen a_type a_keylen flags \
* l_alloc l_bytes l_addtime l_usetime seq keymat
*/
-static char *format = "%b %d %T %Y"; /* time format */
-static char *strmon[12] = {
+#define FORMAT "%b %d %T %Y" /* time format */
+static const char *strmon[12] = {
"Jan", "Feb", "Mar", "Apr", "May", "Jun",
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
};
@@ -104,7 +104,7 @@ backupsa_to_file(struct pfkey_send_sa_ar
t = time(NULL);
tm = localtime(&t);
- l = strftime(p, len, format, tm);
+ l = strftime(p, len, FORMAT, tm);
p += l;
len -= l;
if (len < 0)
@@ -193,7 +193,7 @@ err:
}
int
-backupsa_from_file()
+backupsa_from_file(void)
{
FILE *fp;
char buf[512];
@@ -334,7 +334,7 @@ next:
}
int
-backupsa_clean()
+backupsa_clean(void)
{
FILE *fp;
@@ -356,12 +356,12 @@ backupsa_clean()
/*
* convert fixed string into the tm structure.
* The fixed string is like 'Nov 24 18:22:48 1986'.
- * static char *format = "%b %d %T %Y";
*/
static char *
str2tmx(char *p, struct tm *tm)
{
- int i, len;
+ int len;
+ size_t i;
/* Month */
for (i = 0; i < sizeof(strmon)/sizeof(strmon[0]); i++) {
Index: src/crypto/dist/ipsec-tools/src/racoon/strnames.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/strnames.c:1.12 src/crypto/dist/ipsec-tools/src/racoon/strnames.c:1.13
--- src/crypto/dist/ipsec-tools/src/racoon/strnames.c:1.12 Fri Mar 7 10:55:30 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/strnames.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: strnames.c,v 1.12 2025/03/07 15:55:30 christos Exp $ */
+/* $NetBSD: strnames.c,v 1.13 2025/03/08 16:39:08 christos Exp $ */
/* $KAME: strnames.c,v 1.25 2003/11/13 10:53:26 itojun Exp $ */
@@ -68,11 +68,11 @@
struct ksmap {
int key;
- char *str;
- char *(*f)(int);
+ const char *str;
+ const char *(*f)(int);
};
-char *
+const char *
num2str(int n)
{
static char buf[20];
@@ -83,7 +83,7 @@ num2str(int n)
}
/* isakmp.h */
-char *
+const char *
s_isakmp_state(int t, int d, int s)
{
switch (t) {
@@ -211,7 +211,7 @@ static struct ksmap name_isakmp_certtype
{ ISAKMP_CERT_X509ATTR, "X.509 Certificate Attribute", NULL },
};
-char *
+const char *
s_isakmp_certtype(int k)
{
int i;
@@ -234,7 +234,7 @@ static struct ksmap name_isakmp_etype[]
{ ISAKMP_ETYPE_ACKINFO, "Acknowledged Informational", NULL },
};
-char *
+const char *
s_isakmp_etype(int k)
{
int i;
@@ -287,7 +287,7 @@ static struct ksmap name_isakmp_notify_m
{ ISAKMP_LOG_RETRY_LIMIT_REACHED, "RETRY-LIMIT-REACHED", NULL },
};
-char *
+const char *
s_isakmp_notify_msg(int k)
{
int i;
@@ -322,7 +322,7 @@ static struct ksmap name_isakmp_nptype[]
{ ISAKMP_NPTYPE_FRAG, "ike frag", NULL },
};
-char *
+const char *
s_isakmp_nptype(int k)
{
int i;
@@ -373,7 +373,7 @@ static struct ksmap name_isakmp_cfg_type
{ UNITY_DDNS_HOSTNAME, "UNITY_DDNS_HOSTNAME", NULL },
};
-char *
+const char *
s_isakmp_cfg_type(int k)
{
int i;
@@ -391,7 +391,7 @@ static struct ksmap name_isakmp_cfg_ptyp
{ ISAKMP_CFG_REPLY, "mode config REPLY", NULL },
};
-char *
+const char *
s_isakmp_cfg_ptype(int k)
{
int i;
@@ -411,7 +411,7 @@ static struct ksmap name_ipsecdoi_proto[
{ IPSECDOI_PROTO_IPCOMP, "IPCOMP", s_ipsecdoi_trns_ipcomp },
};
-char *
+const char *
s_ipsecdoi_proto(int k)
{
int i;
@@ -425,7 +425,7 @@ static struct ksmap name_ipsecdoi_trns_i
{ IPSECDOI_KEY_IKE, "IKE", NULL },
};
-char *
+const char *
s_ipsecdoi_trns_isakmp(int k)
{
int i;
@@ -444,7 +444,7 @@ static struct ksmap name_ipsecdoi_trns_a
{ IPSECDOI_AH_SHA512, "SHA512", NULL },
};
-char *
+const char *
s_ipsecdoi_trns_ah(int k)
{
int i;
@@ -472,7 +472,7 @@ static struct ksmap name_ipsecdoi_trns_e
{ IPSECDOI_ESP_CAMELLIA, "CAMELLIA", NULL },
};
-char *
+const char *
s_ipsecdoi_trns_esp(int k)
{
int i;
@@ -488,7 +488,7 @@ static struct ksmap name_ipsecdoi_trns_i
{ IPSECDOI_IPCOMP_LZS, "LZS", NULL},
};
-char *
+const char *
s_ipsecdoi_trns_ipcomp(int k)
{
int i;
@@ -498,7 +498,7 @@ s_ipsecdoi_trns_ipcomp(int k)
return num2str(k);
}
-char *
+const char *
s_ipsecdoi_trns(int proto, int trns)
{
int i;
@@ -521,7 +521,7 @@ static struct ksmap name_attr_ipsec[] =
{ IPSECDOI_ATTR_COMP_PRIVALG, "Compression Private Algorithm", NULL },
};
-char *
+const char *
s_ipsecdoi_attr(int k)
{
int i;
@@ -536,7 +536,7 @@ static struct ksmap name_attr_ipsec_ltyp
{ IPSECDOI_ATTR_SA_LD_TYPE_KB, "kilobytes", NULL },
};
-char *
+const char *
s_ipsecdoi_ltype(int k)
{
int i;
@@ -556,7 +556,7 @@ static struct ksmap name_attr_ipsec_encm
{ IPSECDOI_ATTR_ENC_MODE_UDPTRNS_DRAFT, "UDP-Transport", NULL },
};
-char *
+const char *
s_ipsecdoi_encmode(int k)
{
int i;
@@ -577,7 +577,7 @@ static struct ksmap name_attr_ipsec_auth
{ IPSECDOI_ATTR_AUTH_NONE, "non_auth", NULL },
};
-char *
+const char *
s_ipsecdoi_auth(int k)
{
int i;
@@ -587,7 +587,7 @@ s_ipsecdoi_auth(int k)
return num2str(k);
}
-char *
+const char *
s_ipsecdoi_attr_v(int type, int val)
{
int i;
@@ -612,7 +612,7 @@ static struct ksmap name_ipsecdoi_ident[
{ IPSECDOI_ID_KEY_ID, "KEY_ID", NULL },
};
-char *
+const char *
s_ipsecdoi_ident(int k)
{
int i;
@@ -644,7 +644,7 @@ static struct ksmap name_oakley_attr[] =
{ OAKLEY_ATTR_GSS_ID, "GSS-API endpoint name",NULL },
};
-char *
+const char *
s_oakley_attr(int k)
{
int i;
@@ -664,7 +664,7 @@ static struct ksmap name_attr_isakmp_enc
{ OAKLEY_ATTR_ENC_ALG_AES, "AES-CBC", NULL },
};
-char *
+const char *
s_attr_isakmp_enc(int k)
{
int i;
@@ -683,7 +683,7 @@ static struct ksmap name_attr_isakmp_has
{ OAKLEY_ATTR_HASH_ALG_SHA2_512,"SHA512", NULL },
};
-char *
+const char *
s_attr_isakmp_hash(int k)
{
int i;
@@ -716,7 +716,7 @@ static struct ksmap name_attr_isakmp_met
#endif
};
-char *
+const char *
s_oakley_attr_method(int k)
{
int i;
@@ -739,7 +739,7 @@ static struct ksmap name_attr_isakmp_des
{ OAKLEY_ATTR_GRP_DESC_MODP8192, "8192-bit MODP group", NULL },
};
-char *
+const char *
s_attr_isakmp_desc(int k)
{
int i;
@@ -755,7 +755,7 @@ static struct ksmap name_attr_isakmp_gro
{ OAKLEY_ATTR_GRP_TYPE_EC2N, "EC2N", NULL },
};
-char *
+const char *
s_attr_isakmp_group(int k)
{
int i;
@@ -770,7 +770,7 @@ static struct ksmap name_attr_isakmp_lty
{ OAKLEY_ATTR_SA_LD_TYPE_KB, "kilobytes", NULL },
};
-char *
+const char *
s_attr_isakmp_ltype(int k)
{
int i;
@@ -780,7 +780,7 @@ s_attr_isakmp_ltype(int k)
return num2str(k);
}
-char *
+const char *
s_oakley_attr_v(int type, int val)
{
int i;
@@ -797,7 +797,7 @@ static struct ksmap name_ipsec_level[] =
{ IPSEC_LEVEL_UNIQUE, "unique", NULL },
};
-char *
+const char *
s_ipsec_level(int k)
{
int i;
@@ -817,7 +817,7 @@ static struct ksmap name_algclass[] = {
{ algclass_isakmp_ameth, "isakmp auth method", s_oakley_attr_method },
};
-char *
+const char *
s_algclass(int k)
{
int i;
@@ -827,7 +827,7 @@ s_algclass(int k)
return num2str(k);
}
-char *
+const char *
s_algtype(int class, int n)
{
int i;
@@ -870,7 +870,7 @@ static struct ksmap name_pfkey_type[] =
#endif
};
-char *
+const char *
s_pfkey_type(int k)
{
int i;
@@ -891,7 +891,7 @@ static struct ksmap name_pfkey_satype[]
{ SADB_X_SATYPE_IPCOMP, "IPCOMP", NULL },
};
-char *
+const char *
s_pfkey_satype(int k)
{
int i;
@@ -909,7 +909,7 @@ static struct ksmap name_direction[] = {
#endif
};
-char *
+const char *
s_direction(int k)
{
int i;
@@ -919,7 +919,7 @@ s_direction(int k)
return num2str(k);
}
-char *
+const char *
s_proto(int k)
{
switch (k) {
@@ -938,7 +938,7 @@ s_proto(int k)
return num2str(k);
}
-char *
+const char *
s_doi(int k)
{
switch (k) {
@@ -949,8 +949,8 @@ s_doi(int k)
}
}
-char *
-s_etype (int k)
+const char *
+s_etype(int k)
{
switch (k) {
case ISAKMP_ETYPE_NONE:
@@ -976,8 +976,8 @@ s_etype (int k)
}
}
-char *
-s_idtype (int k)
+const char *
+s_idtype(int k)
{
switch (k) {
case IDTYPE_FQDN:
@@ -995,8 +995,8 @@ s_idtype (int k)
}
}
-char *
-s_switch (int k)
+const char *
+s_switch(int k)
{
switch (k) {
case FALSE:
Index: src/crypto/dist/ipsec-tools/src/racoon/cfparse.y
diff -u src/crypto/dist/ipsec-tools/src/racoon/cfparse.y:1.54 src/crypto/dist/ipsec-tools/src/racoon/cfparse.y:1.55
--- src/crypto/dist/ipsec-tools/src/racoon/cfparse.y:1.54 Fri Mar 7 10:55:28 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/cfparse.y Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: cfparse.y,v 1.54 2025/03/07 15:55:28 christos Exp $ */
+/* $NetBSD: cfparse.y,v 1.55 2025/03/08 16:39:08 christos Exp $ */
/* Id: cfparse.y,v 1.66 2006/08/22 18:17:17 manubsd Exp */
@@ -244,11 +244,21 @@ static int process_rmconf(void)
}
/* some frequently used warning texts */
+#ifndef ENABLE_HYBRID
static const char error_message_hybrid_config_not_configured[] = "racoon not configured with --enable-hybrid\n";
+#endif
+#ifndef HAVE_LIBLDAP
static const char error_message_ldap_config_not_configured[] = "racoon not configured with --with-libldap\n";
+#endif
+#ifndef ENABLE_ADMINPORT
static const char error_message_admin_port_not_compiled_in[] = "admin port support not compiled in\n";
+#endif
+#ifndef ENABLE_NATT
static const char error_message_natt_not_compiled_in[] = "NAT-T support not compiled in\n";
+#endif
+#ifndef ENABLE_DPD
static const char error_message_dpd_not_compiled_in[] = "DPD support not compiled in\n";
+#endif
/* macros for aborting the parsing with freeing up allocated memory */
#define ABORT_CLEANUP {delrmconf(cur_rmconf); delsainfo(cur_sainfo); YYABORT;}
@@ -1546,7 +1556,7 @@ sainfo_id
return -1;
}
$$ = ipsecdoi_sockaddr2id(saddr,
- $3 == ~0 ? (sizeof(struct in_addr) << 3): $3,
+ $3 == ~0u ? (sizeof(struct in_addr) << 3): $3,
$5);
break;
#ifdef INET6
@@ -1557,7 +1567,7 @@ sainfo_id
return -1;
}
$$ = ipsecdoi_sockaddr2id(saddr,
- $3 == ~0 ? (sizeof(struct in6_addr) << 3): $3,
+ $3 == ~0u ? (sizeof(struct in6_addr) << 3): $3,
$5);
break;
#endif
@@ -2429,7 +2439,7 @@ dh_group_num
: ALGORITHMTYPE
{
$$ = algtype2doi(algclass_isakmp_dh, $1);
- if ($$ == -1) {
+ if ($$ == (unsigned)-1) {
yyerror("must be DH group\n");
ABORT();
}
@@ -2605,7 +2615,7 @@ unittype_byte
%%
static struct secprotospec *
-newspspec()
+newspspec(void)
{
struct secprotospec *new;
@@ -2631,9 +2641,7 @@ newspspec()
* insert into head of list.
*/
static void
-insspspec(rmconf, spspec)
- struct remoteconf *rmconf;
- struct secprotospec *spspec;
+insspspec(struct remoteconf *rmconf, struct secprotospec *spspec)
{
if (rmconf->spspec != NULL)
rmconf->spspec->prev = spspec;
@@ -2675,8 +2683,7 @@ dupspspec(struct secprotospec *spspec)
* copy the whole list
*/
void
-dupspspec_list(dst, src)
- struct remoteconf *dst, *src;
+dupspspec_list(struct remoteconf *dst, struct remoteconf *src)
{
struct secprotospec *p, *new, *last;
@@ -2700,8 +2707,7 @@ dupspspec_list(dst, src)
* delete the whole list
*/
void
-flushspspec(rmconf)
- struct remoteconf *rmconf;
+flushspspec(struct remoteconf *rmconf)
{
struct secprotospec *p;
@@ -2722,8 +2728,7 @@ flushspspec(rmconf)
/* set final acceptable proposal */
static int
-set_isakmp_proposal(rmconf)
- struct remoteconf *rmconf;
+set_isakmp_proposal(struct remoteconf *rmconf)
{
struct secprotospec *s;
int prop_no = 1;
@@ -2804,7 +2809,7 @@ set_isakmp_proposal(rmconf)
}
static void
-clean_tmpalgtype()
+clean_tmpalgtype(void)
{
int i;
for (i = 0; i < MAXALGCLASS; i++)
@@ -2812,17 +2817,9 @@ clean_tmpalgtype()
}
static int
-expand_isakmpspec(prop_no, trns_no, types,
- class, last, lifetime, lifebyte, encklen, vendorid, gssid,
- rmconf)
- int prop_no, trns_no;
- int *types, class, last;
- time_t lifetime;
- int lifebyte;
- int encklen;
- int vendorid;
- char *gssid;
- struct remoteconf *rmconf;
+expand_isakmpspec(int prop_no, int trns_no, int *types, int class, int last,
+ time_t lifetime, int lifebyte, int encklen, int vendorid, char *gssid,
+ struct remoteconf *rmconf)
{
struct isakmpsa *new;
@@ -2909,8 +2906,7 @@ expand_isakmpspec(prop_no, trns_no, type
* That is defined RFC2407.
*/
static int
-fix_lifebyte(t)
- unsigned long t;
+fix_lifebyte(unsigned long t)
{
if (t < 1024) {
yyerror("byte size should be more than 1024B.");
@@ -2922,7 +2918,7 @@ fix_lifebyte(t)
#endif
int
-cfparse()
+cfparse(void)
{
int error;
@@ -2964,7 +2960,7 @@ cfparse()
}
int
-cfreparse()
+cfreparse(void)
{
flushph2();
flushph1();
@@ -2976,11 +2972,7 @@ cfreparse()
#ifdef ENABLE_ADMINPORT
static void
-adminsock_conf(path, owner, group, mode_dec)
- vchar_t *path;
- vchar_t *owner;
- vchar_t *group;
- int mode_dec;
+adminsock_conf(vchar_t *path, vchar_t *owner, vchar_t *group, int mode_dec)
{
struct passwd *pw = NULL;
struct group *gr = NULL;
Index: src/crypto/dist/ipsec-tools/src/racoon/cftoken.l
diff -u src/crypto/dist/ipsec-tools/src/racoon/cftoken.l:1.29 src/crypto/dist/ipsec-tools/src/racoon/cftoken.l:1.30
--- src/crypto/dist/ipsec-tools/src/racoon/cftoken.l:1.29 Wed Nov 25 13:11:00 2020
+++ src/crypto/dist/ipsec-tools/src/racoon/cftoken.l Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: cftoken.l,v 1.29 2020/11/25 18:11:00 bouyer Exp $ */
+/* $NetBSD: cftoken.l,v 1.30 2025/03/08 16:39:08 christos Exp $ */
/* Id: cftoken.l,v 1.53 2006/08/22 18:17:17 manubsd Exp */
@@ -99,7 +99,7 @@ static struct include_stack {
YY_BUFFER_STATE prevstate;
int lineno;
glob_t matches;
- int matchon;
+ size_t matchon;
} incstack[MAX_INCLUDE_DEPTH];
static int incstackp = 0;
@@ -718,8 +718,7 @@ yywarn(const char *s, ...)
}
int
-yycf_switch_buffer(path)
- char *path;
+yycf_switch_buffer(char *path)
{
char *filepath = NULL;
@@ -760,8 +759,7 @@ yycf_switch_buffer(path)
}
int
-yycf_set_buffer(path)
- char *path;
+yycf_set_buffer(char *path)
{
yyin = fopen(path, "r");
if (yyin == NULL) {
@@ -787,7 +785,7 @@ yycf_set_buffer(path)
}
void
-yycf_init_buffer()
+yycf_init_buffer(void)
{
int i;
@@ -797,7 +795,7 @@ yycf_init_buffer()
}
void
-yycf_clean_buffer()
+yycf_clean_buffer(void)
{
int i;
Index: src/crypto/dist/ipsec-tools/src/racoon/oakley.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/oakley.c:1.29 src/crypto/dist/ipsec-tools/src/racoon/oakley.c:1.30
--- src/crypto/dist/ipsec-tools/src/racoon/oakley.c:1.29 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/oakley.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: oakley.c,v 1.29 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: oakley.c,v 1.30 2025/03/08 16:39:08 christos Exp $ */
/* Id: oakley.c,v 1.32 2006/05/26 12:19:46 manubsd Exp */
@@ -1322,6 +1322,7 @@ oakley_validate_auth(struct ph1handle *i
case OAKLEY_ATTR_AUTH_METHOD_XAUTH_DSSSIG_I:
case OAKLEY_ATTR_AUTH_METHOD_XAUTH_DSSSIG_R:
no_verify_needed = 0;
+ __attribute__((__fallthrough__));
/*FALLTHROUGH*/
#endif
case OAKLEY_ATTR_AUTH_METHOD_DSSSIG:
Index: src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.c:1.30 src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.c:1.31
--- src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.c:1.30 Fri Mar 7 10:55:28 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: crypto_openssl.c,v 1.30 2025/03/07 15:55:28 christos Exp $ */
+/* $NetBSD: crypto_openssl.c,v 1.31 2025/03/08 16:39:08 christos Exp $ */
/* Id: crypto_openssl.c,v 1.47 2006/05/06 20:42:09 manubsd Exp */
@@ -2400,7 +2400,7 @@ base64_encode(char *in, long inlen)
bio = BIO_push(b64, bio);
BIO_write(bio, in, inlen);
- BIO_flush(bio);
+ (void)BIO_flush(bio);
plen = BIO_get_mem_data(bio, &ptr);
res = vmalloc(plen+1);
@@ -2420,7 +2420,7 @@ out:
static RSA *
binbuf_pubkey2rsa(vchar_t *binbuf)
{
- BIGNUM *exp, *mod;
+ BIGNUM *exp = NULL, *mod;
RSA *rsa_pub = NULL;
if (binbuf->v[0] > binbuf->l - 1) {
Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.c:1.30 src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.c:1.31
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.c:1.30 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_cfg.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: isakmp_cfg.c,v 1.30 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: isakmp_cfg.c,v 1.31 2025/03/08 16:39:08 christos Exp $ */
/* Id: isakmp_cfg.c,v 1.55 2006/08/22 18:17:17 manubsd Exp */
@@ -962,7 +962,7 @@ isakmp_cfg_short(struct ph1handle *iph1
/*ARGSUSED*/
vchar_t *
isakmp_cfg_varlen(struct ph1handle *iph1 __unused, struct isakmp_data *attr,
- char *string, size_t len)
+ const char *string, size_t len)
{
vchar_t *buffer;
struct isakmp_data *new;
@@ -989,7 +989,7 @@ isakmp_cfg_varlen(struct ph1handle *iph1
vchar_t *
isakmp_cfg_string(struct ph1handle *iph1, struct isakmp_data *attr,
- char *string)
+ const char *string)
{
size_t len = strlen(string);
return isakmp_cfg_varlen(iph1, attr, string, len);
@@ -1771,7 +1771,7 @@ isakmp_cfg_iplist_to_str(char *dest, int
else
l = sizeof(struct in_addr);
memcpy(&tmp, addr, l);
- addr += l;
+ addr = (char *)addr + l;
if((uint32_t)tmp.addr4.s_addr == 0)
break;
@@ -2013,7 +2013,7 @@ isakmp_cfg_resize_pool(int size)
if (isakmp_cfg_config.port_pool[i].used) {
plog(LLV_ERROR, LOCATION, NULL,
"resize pool from %zu to %d impossible "
- "port %d is in use\n",
+ "port %zu is in use\n",
isakmp_cfg_config.pool_size, size, i);
size = i;
break;
Index: src/crypto/dist/ipsec-tools/src/racoon/getcertsbyname.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/getcertsbyname.c:1.5 src/crypto/dist/ipsec-tools/src/racoon/getcertsbyname.c:1.6
--- src/crypto/dist/ipsec-tools/src/racoon/getcertsbyname.c:1.5 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/getcertsbyname.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: getcertsbyname.c,v 1.5 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: getcertsbyname.c,v 1.6 2025/03/08 16:39:08 christos Exp $ */
/* $KAME: getcertsbyname.c,v 1.7 2001/11/16 04:12:59 sakane Exp $ */
@@ -265,6 +265,7 @@ getcertsbyname(char *name, struct certin
cp += len;
GETSHORT(qtype, cp); /* QTYPE */
GETSHORT(qclass, cp); /* QCLASS */
+ (void)qclass;
/* answer section */
while (ancount-- && cp < eom) {
Index: src/crypto/dist/ipsec-tools/src/racoon/strnames.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/strnames.h:1.5 src/crypto/dist/ipsec-tools/src/racoon/strnames.h:1.6
--- src/crypto/dist/ipsec-tools/src/racoon/strnames.h:1.5 Fri Mar 7 10:55:30 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/strnames.h Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: strnames.h,v 1.5 2025/03/07 15:55:30 christos Exp $ */
+/* $NetBSD: strnames.h,v 1.6 2025/03/08 16:39:08 christos Exp $ */
/* Id: strnames.h,v 1.7 2005/04/18 10:04:26 manubsd Exp */
@@ -34,47 +34,47 @@
#ifndef _STRNAMES_H
#define _STRNAMES_H
-extern char *num2str(int n);
+extern const char *num2str(int n);
-extern char *s_isakmp_state(int, int, int);
-extern char *s_isakmp_certtype(int);
-extern char *s_isakmp_etype(int);
-extern char *s_isakmp_notify_msg(int);
-extern char *s_isakmp_nptype(int);
-extern char *s_ipsecdoi_proto(int);
-extern char *s_ipsecdoi_trns_isakmp(int);
-extern char *s_ipsecdoi_trns_ah(int);
-extern char *s_ipsecdoi_trns_esp(int);
-extern char *s_ipsecdoi_trns_ipcomp(int);
-extern char *s_ipsecdoi_trns(int, int);
-extern char *s_ipsecdoi_attr(int);
-extern char *s_ipsecdoi_ltype(int);
-extern char *s_ipsecdoi_encmode(int);
-extern char *s_ipsecdoi_auth(int);
-extern char *s_ipsecdoi_attr_v(int, int);
-extern char *s_ipsecdoi_ident(int);
-extern char *s_oakley_attr(int);
-extern char *s_attr_isakmp_enc(int);
-extern char *s_attr_isakmp_hash(int);
-extern char *s_oakley_attr_method(int);
-extern char *s_attr_isakmp_desc(int);
-extern char *s_attr_isakmp_group(int);
-extern char *s_attr_isakmp_ltype(int);
-extern char *s_oakley_attr_v(int, int);
-extern char *s_ipsec_level(int);
-extern char *s_algclass(int);
-extern char *s_algtype(int, int);
-extern char *s_pfkey_type(int);
-extern char *s_pfkey_satype(int);
-extern char *s_direction(int);
-extern char *s_proto(int);
-extern char *s_doi(int);
-extern char *s_etype(int);
-extern char *s_idtype(int);
-extern char *s_switch(int);
+extern const char *s_isakmp_state(int, int, int);
+extern const char *s_isakmp_certtype(int);
+extern const char *s_isakmp_etype(int);
+extern const char *s_isakmp_notify_msg(int);
+extern const char *s_isakmp_nptype(int);
+extern const char *s_ipsecdoi_proto(int);
+extern const char *s_ipsecdoi_trns_isakmp(int);
+extern const char *s_ipsecdoi_trns_ah(int);
+extern const char *s_ipsecdoi_trns_esp(int);
+extern const char *s_ipsecdoi_trns_ipcomp(int);
+extern const char *s_ipsecdoi_trns(int, int);
+extern const char *s_ipsecdoi_attr(int);
+extern const char *s_ipsecdoi_ltype(int);
+extern const char *s_ipsecdoi_encmode(int);
+extern const char *s_ipsecdoi_auth(int);
+extern const char *s_ipsecdoi_attr_v(int, int);
+extern const char *s_ipsecdoi_ident(int);
+extern const char *s_oakley_attr(int);
+extern const char *s_attr_isakmp_enc(int);
+extern const char *s_attr_isakmp_hash(int);
+extern const char *s_oakley_attr_method(int);
+extern const char *s_attr_isakmp_desc(int);
+extern const char *s_attr_isakmp_group(int);
+extern const char *s_attr_isakmp_ltype(int);
+extern const char *s_oakley_attr_v(int, int);
+extern const char *s_ipsec_level(int);
+extern const char *s_algclass(int);
+extern const char *s_algtype(int, int);
+extern const char *s_pfkey_type(int);
+extern const char *s_pfkey_satype(int);
+extern const char *s_direction(int);
+extern const char *s_proto(int);
+extern const char *s_doi(int);
+extern const char *s_etype(int);
+extern const char *s_idtype(int);
+extern const char *s_switch(int);
#ifdef ENABLE_HYBRID
-extern char *s_isakmp_cfg_type(int);
-extern char *s_isakmp_cfg_ptype(int);
+extern const char *s_isakmp_cfg_type(int);
+extern const char *s_isakmp_cfg_ptype(int);
#endif
#endif /* _STRNAMES_H */
Index: src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c:1.41 src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c:1.42
--- src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c:1.41 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: grabmyaddr.c,v 1.41 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: grabmyaddr.c,v 1.42 2025/03/08 16:39:08 christos Exp $ */
/*
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
* Copyright (C) 2008 Timo Teras <[email protected]>.
@@ -797,7 +797,7 @@ kernel_receive(void *ctx __unused, int f
if (rtm->rtm_msglen != len) {
plog(LLV_WARNING, LOCATION, NULL,
- "kernel_receive: rtm->rtm_msglen %d, len %d, type %d\n",
+ "kernel_receive: rtm->rtm_msglen %d, len %zd, type %d\n",
rtm->rtm_msglen, len, rtm->rtm_type);
return FALSE;
}
Index: src/crypto/dist/ipsec-tools/src/racoon/handler.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/handler.c:1.43 src/crypto/dist/ipsec-tools/src/racoon/handler.c:1.44
--- src/crypto/dist/ipsec-tools/src/racoon/handler.c:1.43 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/handler.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: handler.c,v 1.43 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: handler.c,v 1.44 2025/03/08 16:39:08 christos Exp $ */
/* Id: handler.c,v 1.28 2006/05/26 12:17:29 manubsd Exp */
@@ -1186,7 +1186,7 @@ exclude_cfg_addr(const struct sockaddr *
if ((p->mode_cfg != NULL) &&
(p->mode_cfg->flags & ISAKMP_CFG_GOT_ADDR4) &&
(addr->sa_family == AF_INET)) {
- sin = (struct sockaddr_in *)addr;
+ sin = (const struct sockaddr_in *)addr;
if (sin->sin_addr.s_addr == p->mode_cfg->addr4.s_addr)
return 0;
}
Index: src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c:1.53 src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c:1.54
--- src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c:1.53 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: ipsec_doi.c,v 1.53 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: ipsec_doi.c,v 1.54 2025/03/08 16:39:08 christos Exp $ */
/* Id: ipsec_doi.c,v 1.55 2006/08/17 09:20:41 vanhu Exp */
@@ -2799,7 +2799,7 @@ setph1attr(struct isakmpsa *sa, caddr_t
goto gssid_done;
}
odst = dst;
- rv = iconv(cd, (__iconv_const char **)&src,
+ rv = iconv(cd, (__iconv_const char **)(intptr_t)&src,
&srcleft, &dst, &dstleft);
if (rv != 0) {
if (rv == (size_t)-1) {
@@ -4452,11 +4452,11 @@ ipsecdoi_t2satrns(struct isakmp_pl_t *t,
switch (type) {
case IPSECDOI_ATTR_SA_LD_TYPE:
{
- int type = ntohs(d->lorv);
- switch (type) {
+ int xtype = ntohs(d->lorv);
+ switch (xtype) {
case IPSECDOI_ATTR_SA_LD_TYPE_SEC:
case IPSECDOI_ATTR_SA_LD_TYPE_KB:
- life_t = type;
+ life_t = xtype;
break;
default:
plog(LLV_WARNING, LOCATION, NULL,
Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.80 src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.81
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.80 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: isakmp.c,v 1.80 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: isakmp.c,v 1.81 2025/03/08 16:39:08 christos Exp $ */
/* Id: isakmp.c,v 1.74 2006/05/07 21:32:59 manubsd Exp */
@@ -272,8 +272,8 @@ isakmp_handler(void *ctx __unused, int s
/* check isakmp header length, as well as sanity of header length */
if (len < sizeof(isakmp) || ntohl(isakmp.len) < sizeof(isakmp)) {
plog(LLV_ERROR, LOCATION, (struct sockaddr *)&remote,
- "packet shorter than isakmp header size (%u, %u, %zu)\n",
- len, ntohl(isakmp.len), sizeof(isakmp));
+ "packet shorter than isakmp header size (%zu, %u, %zu)\n",
+ len, ntohl(isakmp.len), sizeof(isakmp));
/* dummy receive */
if ((len = recvfrom(so_isakmp, (char *)&isakmp, sizeof(isakmp),
0, (struct sockaddr *)&remote, &remote_len)) < 0) {
@@ -325,7 +325,7 @@ isakmp_handler(void *ctx __unused, int s
if ((buf = vmalloc(len - extralen)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
- "failed to allocate reading buffer (%u Bytes)\n",
+ "failed to allocate reading buffer (%zu Bytes)\n",
(len - extralen));
goto end;
}
@@ -336,14 +336,14 @@ isakmp_handler(void *ctx __unused, int s
if (len != buf->l) {
plog(LLV_ERROR, LOCATION, (struct sockaddr *)&remote,
- "received invalid length (%d != %zu), why ?\n",
+ "received invalid length (%zd != %zu), why ?\n",
len, buf->l);
goto end;
}
plog(LLV_DEBUG, LOCATION, NULL, "===\n");
plog(LLV_DEBUG, LOCATION, NULL,
- "%d bytes message received %s\n",
+ "%zd bytes message received %s\n",
len, saddr2str_fromto("from %s to %s",
(struct sockaddr *)&remote,
(struct sockaddr *)&local));
@@ -1662,7 +1662,7 @@ isakmp_open(struct sockaddr *addr, int u
pktinfo = IPV6_RECVDSTADDR;
#endif
if (setsockopt(fd, IPPROTO_IPV6, pktinfo,
- (const void *) &yes, sizeof(yes)) < 0) {
+ &yes, sizeof(yes)) < 0) {
plog(LLV_ERROR, LOCATION, NULL,
"setsockopt IPV6_RECVDSTADDR (%d):%s\n",
pktinfo, strerror(errno));
@@ -1671,7 +1671,7 @@ isakmp_open(struct sockaddr *addr, int u
#ifdef IPV6_USE_MIN_MTU
if (setsockopt(fd, IPPROTO_IPV6, IPV6_USE_MIN_MTU,
- (void *) &yes, sizeof(yes)) < 0) {
+ &yes, sizeof(yes)) < 0) {
plog(LLV_ERROR, LOCATION, NULL,
"setsockopt IPV6_USE_MIN_MTU (%s)\n",
strerror(errno));
@@ -1688,7 +1688,7 @@ isakmp_open(struct sockaddr *addr, int u
#else
SO_REUSEPORT,
#endif
- (void *) &yes, sizeof(yes)) < 0) {
+ &yes, sizeof(yes)) < 0) {
plog(LLV_ERROR, LOCATION, NULL,
"failed to set REUSE flag on %s (%s).\n",
saddr2str(addr), strerror(errno));
@@ -3095,7 +3095,7 @@ out:
}
int
-script_env_append(char ***envp, int *envc, char *name, char *value)
+script_env_append(char ***envp, int *envc, const char *name, char *value)
{
char *envitem;
char **newenvp;
@@ -3132,7 +3132,7 @@ script_exec(char *script, int name, char
char *argv[] = { NULL, NULL, NULL };
argv[0] = script;
- argv[1] = script_names[name];
+ argv[1] = __UNCONST(script_names[name]);
argv[2] = NULL;
switch (fork()) {
Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h:1.19 src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h:1.20
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h:1.19 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: isakmp_var.h,v 1.19 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: isakmp_var.h,v 1.20 2025/03/08 16:39:08 christos Exp $ */
/* Id: isakmp_var.h,v 1.12 2005/05/07 14:45:31 manubsd Exp */
@@ -129,7 +129,7 @@ extern int copy_ph1addresses( struct ph1
extern void log_ph1established(const struct ph1handle *);
extern void script_hook(struct ph1handle *, int);
-extern int script_env_append(char ***, int *, char *, char *);
+extern int script_env_append(char ***, int *, const char *, char *);
extern int script_exec(char *, int, char * const *);
void purge_remote(struct ph1handle *);
Index: src/crypto/dist/ipsec-tools/src/racoon/plog.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/plog.c:1.8 src/crypto/dist/ipsec-tools/src/racoon/plog.c:1.9
--- src/crypto/dist/ipsec-tools/src/racoon/plog.c:1.8 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/plog.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: plog.c,v 1.8 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: plog.c,v 1.9 2025/03/08 16:39:08 christos Exp $ */
/* Id: plog.c,v 1.11 2006/06/20 09:57:31 vanhu Exp */
@@ -82,7 +82,7 @@ static char *logfile = NULL;
static char *plog_common(int, const char *, const char *, struct sockaddr *);
static struct plogtags {
- char *name;
+ const char *name;
int priority;
} ptab[] = {
{ "(not defined)", 0, },
@@ -200,7 +200,7 @@ plogv(int pri, const char *func, struct
}
void
-plogdump(int pri, void *data, size_t len)
+plogdump(int pri, const void *data, size_t len)
{
caddr_t buf;
size_t buflen;
@@ -225,7 +225,7 @@ plogdump(int pri, void *data, size_t len
if (j % 4 == 0)
buf[i++] = ' ';
snprintf(&buf[i], buflen - i, "%02x",
- ((unsigned char *)data)[j] & 0xff);
+ ((const unsigned char *)data)[j] & 0xff);
i += 2;
j++;
}
Index: src/crypto/dist/ipsec-tools/src/racoon/plog.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/plog.h:1.6 src/crypto/dist/ipsec-tools/src/racoon/plog.h:1.7
--- src/crypto/dist/ipsec-tools/src/racoon/plog.h:1.6 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/plog.h Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: plog.h,v 1.6 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: plog.h,v 1.7 2025/03/08 16:39:08 christos Exp $ */
/* Id: plog.h,v 1.7 2006/06/20 09:57:31 vanhu Exp */
@@ -73,7 +73,7 @@ extern void _plog(int, const char *, str
__attribute__ ((__format__ (__printf__, 4, 5)));
extern void plogv(int, const char *, struct sockaddr *,
const char *, va_list);
-extern void plogdump(int, void *, size_t);
+extern void plogdump(int, const void *, size_t);
extern void ploginit(void);
extern void plogset(char *);
Index: src/crypto/dist/ipsec-tools/src/racoon/privsep.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/privsep.c:1.27 src/crypto/dist/ipsec-tools/src/racoon/privsep.c:1.28
--- src/crypto/dist/ipsec-tools/src/racoon/privsep.c:1.27 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/privsep.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: privsep.c,v 1.27 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: privsep.c,v 1.28 2025/03/08 16:39:08 christos Exp $ */
/* Id: privsep.c,v 1.15 2005/08/08 11:23:44 vanhu Exp */
@@ -73,7 +73,7 @@ static int privsep_sock[2] = { -1, -1 };
static int privsep_recv(int, struct privsep_com_msg **, size_t *);
static int privsep_send(int, struct privsep_com_msg *, size_t);
-static int safety_check(struct privsep_com_msg *, int i);
+static int safety_check(struct privsep_com_msg *, int);
static int port_check(int);
static int unsafe_env(char *const *);
static int unknown_name(int);
@@ -416,7 +416,7 @@ privsep_init(void)
char **envp = NULL;
int envc = 0;
int count = 0;
- int i;
+ int j;
/*
* First count the bufs, and make sure strings
@@ -474,8 +474,8 @@ privsep_init(void)
}
memcpy((char *)&name, bufs[count++], sizeof(name));
- for (i = 0; combuf->bufs.buflen[count]; count++)
- envp[i++] = bufs[count];
+ for (j = 0; combuf->bufs.buflen[count]; count++)
+ envp[j++] = bufs[count];
count++; /* void */
@@ -1446,8 +1446,8 @@ static int
unsafe_env(char *const *envp)
{
char *const *e;
- char *const *be;
- char *const bad_env[] = { "PATH=", "LD_LIBRARY_PATH=", "IFS=", NULL };
+ const char *const *be;
+ const char *const bad_env[] = { "PATH=", "LD_LIBRARY_PATH=", "IFS=", NULL };
for (e = envp; *e; e++) {
for (be = bad_env; *be; be++) {
@@ -1553,7 +1553,7 @@ send_fd(int s, int fd)
struct iovec iov;
int *fdptr;
- iov.iov_base = " ";
+ iov.iov_base = __UNCONST(" ");
iov.iov_len = 1;
if (sizeof(cmsbuf) < CMSG_SPACE(sizeof(fd))) {
Index: src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c:1.31 src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c:1.32
--- src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c:1.31 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: remoteconf.c,v 1.31 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: remoteconf.c,v 1.32 2025/03/08 16:39:08 christos Exp $ */
/* Id: remoteconf.c,v 1.38 2006/05/06 15:52:44 manubsd Exp */
@@ -86,7 +86,7 @@ static remoteconf_tailq_head_t rmtree, r
/*
* Script hook names and script hook paths
*/
-char *script_names[SCRIPT_MAX + 1] = {
+const char *script_names[SCRIPT_MAX + 1] = {
"phase1_up", "phase1_down", "phase1_dead" };
/*%%%*/
Index: src/crypto/dist/ipsec-tools/src/racoon/remoteconf.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/remoteconf.h:1.17 src/crypto/dist/ipsec-tools/src/racoon/remoteconf.h:1.18
--- src/crypto/dist/ipsec-tools/src/racoon/remoteconf.h:1.17 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/remoteconf.h Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: remoteconf.h,v 1.17 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: remoteconf.h,v 1.18 2025/03/08 16:39:08 christos Exp $ */
/* Id: remoteconf.h,v 1.26 2006/05/06 15:52:44 manubsd Exp */
@@ -82,7 +82,7 @@ struct rmconf_cert {
#define SCRIPT_PHASE1_DOWN 1
#define SCRIPT_PHASE1_DEAD 2
#define SCRIPT_MAX 2
-extern char *script_names[SCRIPT_MAX + 1];
+extern const char *script_names[SCRIPT_MAX + 1];
struct remoteconf {
char *name; /* remote configuration name */
Index: src/crypto/dist/ipsec-tools/src/racoon/sockmisc.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/sockmisc.c:1.20 src/crypto/dist/ipsec-tools/src/racoon/sockmisc.c:1.21
--- src/crypto/dist/ipsec-tools/src/racoon/sockmisc.c:1.20 Fri Mar 7 10:55:29 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/sockmisc.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: sockmisc.c,v 1.20 2025/03/07 15:55:29 christos Exp $ */
+/* $NetBSD: sockmisc.c,v 1.21 2025/03/08 16:39:08 christos Exp $ */
/* Id: sockmisc.c,v 1.24 2006/05/07 21:32:59 manubsd Exp */
@@ -88,7 +88,7 @@ const int niflags = 0;
int
cmpsaddr(const struct sockaddr *addr1, const struct sockaddr *addr2)
{
- caddr_t sa1, sa2;
+ const void *sa1, *sa2;
u_short port1 = IPSEC_PORT_ANY;
u_short port2 = IPSEC_PORT_ANY;
@@ -106,23 +106,23 @@ cmpsaddr(const struct sockaddr *addr1, c
case AF_UNSPEC:
break;
case AF_INET:
- sa1 = (caddr_t)&((struct sockaddr_in *)addr1)->sin_addr;
- sa2 = (caddr_t)&((struct sockaddr_in *)addr2)->sin_addr;
- port1 = ((struct sockaddr_in *)addr1)->sin_port;
- port2 = ((struct sockaddr_in *)addr2)->sin_port;
+ sa1 = &((const struct sockaddr_in *)addr1)->sin_addr;
+ sa2 = &((const struct sockaddr_in *)addr2)->sin_addr;
+ port1 = ((const struct sockaddr_in *)addr1)->sin_port;
+ port2 = ((const struct sockaddr_in *)addr2)->sin_port;
if (memcmp(sa1, sa2, sizeof(struct in_addr)) != 0)
return CMPSADDR_MISMATCH;
break;
#ifdef INET6
case AF_INET6:
- sa1 = (caddr_t)&((struct sockaddr_in6 *)addr1)->sin6_addr;
- sa2 = (caddr_t)&((struct sockaddr_in6 *)addr2)->sin6_addr;
- port1 = ((struct sockaddr_in6 *)addr1)->sin6_port;
- port2 = ((struct sockaddr_in6 *)addr2)->sin6_port;
+ sa1 = &((const struct sockaddr_in6 *)addr1)->sin6_addr;
+ sa2 = &((const struct sockaddr_in6 *)addr2)->sin6_addr;
+ port1 = ((const struct sockaddr_in6 *)addr1)->sin6_port;
+ port2 = ((const struct sockaddr_in6 *)addr2)->sin6_port;
if (memcmp(sa1, sa2, sizeof(struct in6_addr)) != 0)
return CMPSADDR_MISMATCH;
- if (((struct sockaddr_in6 *)addr1)->sin6_scope_id !=
- ((struct sockaddr_in6 *)addr2)->sin6_scope_id)
+ if (((const struct sockaddr_in6 *)addr1)->sin6_scope_id !=
+ ((const struct sockaddr_in6 *)addr2)->sin6_scope_id)
return CMPSADDR_MISMATCH;
break;
#endif
@@ -392,7 +392,7 @@ sendfromto(int s, const void *buf, size_
memset(&m, 0, sizeof(m));
m.msg_name = (caddr_t)&dst6;
m.msg_namelen = sizeof(dst6);
- iov[0].iov_base = (char *)buf;
+ iov[0].iov_base = __UNCONST(buf);
iov[0].iov_len = buflen;
m.msg_iov = iov;
m.msg_iovlen = 1;
@@ -426,11 +426,11 @@ sendfromto(int s, const void *buf, size_
return -1;
}
plog(LLV_DEBUG, LOCATION, NULL,
- "%d times of %d bytes message will be sent "
+ "%d times of %zd bytes message will be sent "
"to %s\n",
i + 1, len, saddr2str(dst));
}
- plogdump(LLV_DEBUG, (char *)buf, buflen);
+ plogdump(LLV_DEBUG, buf, buflen);
return len;
}
@@ -565,11 +565,11 @@ sendfromto(int s, const void *buf, size_
return len;
}
plog(LLV_DEBUG, LOCATION, NULL,
- "%d times of %d bytes message will be sent "
+ "%d times of %zd bytes message will be sent "
"to %s\n",
i + 1, len, saddr2str(dst));
}
- plogdump(LLV_DEBUG, (char *)buf, buflen);
+ plogdump(LLV_DEBUG, buf, buflen);
if (needclose)
close(sendsock);
@@ -584,7 +584,7 @@ setsockopt_bypass(int so, int family)
{
int level;
char *buf;
- char *policy;
+ const char *policy;
switch (family) {
case AF_INET:
@@ -929,10 +929,10 @@ extract_port (const struct sockaddr *add
case AF_UNSPEC:
break;
case AF_INET:
- port = ((struct sockaddr_in *)addr)->sin_port;
+ port = ((const struct sockaddr_in *)addr)->sin_port;
break;
case AF_INET6:
- port = ((struct sockaddr_in6 *)addr)->sin6_port;
+ port = ((const struct sockaddr_in6 *)addr)->sin6_port;
break;
default:
plog(LLV_ERROR, LOCATION, NULL, "unknown AF: %u\n", addr->sa_family);
Index: src/crypto/dist/ipsec-tools/src/racoon/vendorid.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/vendorid.c:1.10 src/crypto/dist/ipsec-tools/src/racoon/vendorid.c:1.11
--- src/crypto/dist/ipsec-tools/src/racoon/vendorid.c:1.10 Fri Mar 7 10:55:30 2025
+++ src/crypto/dist/ipsec-tools/src/racoon/vendorid.c Sat Mar 8 11:39:08 2025
@@ -1,4 +1,4 @@
-/* $NetBSD: vendorid.c,v 1.10 2025/03/07 15:55:30 christos Exp $ */
+/* $NetBSD: vendorid.c,v 1.11 2025/03/08 16:39:08 christos Exp $ */
/* Id: vendorid.c,v 1.10 2006/02/22 16:10:21 vanhu Exp */
@@ -65,28 +65,28 @@
#endif
static struct vendor_id all_vendor_ids[] = {
-{ VENDORID_IPSEC_TOOLS, "IPSec-Tools" },
-{ VENDORID_GSSAPI_LONG, "A GSS-API Authentication Method for IKE" },
-{ VENDORID_GSSAPI , "GSSAPI" },
-{ VENDORID_MS_NT5 , "MS NT5 ISAKMPOAKLEY" },
-{ VENDORID_NATT_00 , "draft-ietf-ipsec-nat-t-ike-00" },
-{ VENDORID_NATT_01 , "draft-ietf-ipsec-nat-t-ike-01" },
-{ VENDORID_NATT_02 , "draft-ietf-ipsec-nat-t-ike-02" },
-{ VENDORID_NATT_02_N , "draft-ietf-ipsec-nat-t-ike-02\n" },
-{ VENDORID_NATT_03 , "draft-ietf-ipsec-nat-t-ike-03" },
-{ VENDORID_NATT_04 , "draft-ietf-ipsec-nat-t-ike-04" },
-{ VENDORID_NATT_05 , "draft-ietf-ipsec-nat-t-ike-05" },
-{ VENDORID_NATT_06 , "draft-ietf-ipsec-nat-t-ike-06" },
-{ VENDORID_NATT_07 , "draft-ietf-ipsec-nat-t-ike-07" },
-{ VENDORID_NATT_08 , "draft-ietf-ipsec-nat-t-ike-08" },
-{ VENDORID_NATT_RFC , "RFC 3947" },
-{ VENDORID_XAUTH , "draft-ietf-ipsra-isakmp-xauth-06.txt" },
-{ VENDORID_UNITY , "CISCO-UNITY" },
-{ VENDORID_FRAG , "FRAGMENTATION" },
+{ VENDORID_IPSEC_TOOLS, "IPSec-Tools", NULL },
+{ VENDORID_GSSAPI_LONG, "A GSS-API Authentication Method for IKE", NULL },
+{ VENDORID_GSSAPI , "GSSAPI", NULL },
+{ VENDORID_MS_NT5 , "MS NT5 ISAKMPOAKLEY", NULL },
+{ VENDORID_NATT_00 , "draft-ietf-ipsec-nat-t-ike-00", NULL },
+{ VENDORID_NATT_01 , "draft-ietf-ipsec-nat-t-ike-01", NULL },
+{ VENDORID_NATT_02 , "draft-ietf-ipsec-nat-t-ike-02", NULL },
+{ VENDORID_NATT_02_N , "draft-ietf-ipsec-nat-t-ike-02\n", NULL },
+{ VENDORID_NATT_03 , "draft-ietf-ipsec-nat-t-ike-03", NULL },
+{ VENDORID_NATT_04 , "draft-ietf-ipsec-nat-t-ike-04", NULL },
+{ VENDORID_NATT_05 , "draft-ietf-ipsec-nat-t-ike-05", NULL },
+{ VENDORID_NATT_06 , "draft-ietf-ipsec-nat-t-ike-06", NULL },
+{ VENDORID_NATT_07 , "draft-ietf-ipsec-nat-t-ike-07", NULL },
+{ VENDORID_NATT_08 , "draft-ietf-ipsec-nat-t-ike-08", NULL },
+{ VENDORID_NATT_RFC , "RFC 3947", NULL },
+{ VENDORID_XAUTH , "draft-ietf-ipsra-isakmp-xauth-06.txt", NULL },
+{ VENDORID_UNITY , "CISCO-UNITY", NULL },
+{ VENDORID_FRAG , "FRAGMENTATION", NULL },
/* Just a readable string for DPD ... */
-{ VENDORID_DPD , "DPD" },
+{ VENDORID_DPD , "DPD", NULL },
/* Other known Vendor IDs */
-{ VENDORID_KAME , "KAME/racoon" },
+{ VENDORID_KAME , "KAME/racoon", NULL },
};
#define NUMVENDORIDS (sizeof(all_vendor_ids)/sizeof(all_vendor_ids[0]))
@@ -162,7 +162,7 @@ compute_vendorids (void)
continue;
}
- vid.v = (char *) all_vendor_ids[i].string;
+ vid.v = (char *)(intptr_t)all_vendor_ids[i].string;
vid.l = strlen(vid.v);
all_vendor_ids[i].hash = eay_md5_one(&vid);