[PATCH v2] store length of ESP encryption and HMAC keys so that they can be manipulated separately for both Juniper and GP

David Woodhouse dwmw2 at infradead.org
Sun May 14 21:00:21 PDT 2017


On Sun, 2017-05-14 at 17:06 -0700, Daniel Lenski wrote:
> 
> +               if (data[0] == ENC_AES_128_CBC) {
>                         enctype = "AES-128";
> -               else if (data[0] == 0x05)
> +                       vpninfo->enc_key_len = 16;
> +               } else if (data[0] == ENC_AES_256_CBC) {

Applies now. Doesn't build.

oncp.c: In function ‘process_attr’:
oncp.c:305:18: error: ‘ENC_AES_128_CBC’ undeclared (first use in this
function)
   if (data[0] == ENC_AES_128_CBC) {
                  ^
oncp.c:305:18: note: each undeclared identifier is reported only once
for each function it appears in
oncp.c:308:25: error: ‘ENC_AES_256_CBC’ undeclared (first use in this
function)
   } else if (data[0] == ENC_AES_256_CBC) {
                         ^
oncp.c:324:18: error: ‘HMAC_MD5’ undeclared (first use in this
function)
   if (data[0] == HMAC_MD5) {
                  ^
oncp.c:327:25: error: ‘HMAC_SHA1’ undeclared (first use in this
function)
   } else if (data[0] == HMAC_SHA1) {
                         ^
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 4938 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/openconnect-devel/attachments/20170514/c55b040a/attachment.bin>


More information about the openconnect-devel mailing list