[PATCH v2] store length of ESP encryption and HMAC keys so that they can be manipulated separately for both Juniper and GP
David Woodhouse
dwmw2 at infradead.org
Sun May 14 21:00:21 PDT 2017
On Sun, 2017-05-14 at 17:06 -0700, Daniel Lenski wrote:
>
> + if (data[0] == ENC_AES_128_CBC) {
> enctype = "AES-128";
> - else if (data[0] == 0x05)
> + vpninfo->enc_key_len = 16;
> + } else if (data[0] == ENC_AES_256_CBC) {
Applies now. Doesn't build.
oncp.c: In function ‘process_attr’:
oncp.c:305:18: error: ‘ENC_AES_128_CBC’ undeclared (first use in this
function)
if (data[0] == ENC_AES_128_CBC) {
^
oncp.c:305:18: note: each undeclared identifier is reported only once
for each function it appears in
oncp.c:308:25: error: ‘ENC_AES_256_CBC’ undeclared (first use in this
function)
} else if (data[0] == ENC_AES_256_CBC) {
^
oncp.c:324:18: error: ‘HMAC_MD5’ undeclared (first use in this
function)
if (data[0] == HMAC_MD5) {
^
oncp.c:327:25: error: ‘HMAC_SHA1’ undeclared (first use in this
function)
} else if (data[0] == HMAC_SHA1) {
^
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 4938 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/openconnect-devel/attachments/20170514/c55b040a/attachment.bin>
More information about the openconnect-devel
mailing list