diff options
author | Theo de Raadt <deraadt@cvs.openbsd.org> | 2004-04-15 18:39:31 +0000 |
---|---|---|
committer | Theo de Raadt <deraadt@cvs.openbsd.org> | 2004-04-15 18:39:31 +0000 |
commit | b1ac98abf9e700f03d5aa5f97c06dab605d6da06 (patch) | |
tree | c08a9624b4a539b85c5650bcf09528d13eb2d039 /sbin/isakmpd/ike_aggressive.c | |
parent | aeca45bc7d867b71e9600c7108674fae5db8ff9c (diff) |
partial move to KNF. More to come. This has happened because there
are a raft of source code auditors who are willing to help improve this
code only if this is done, and hey, isakmpd does need our standard
auditing process. ok ho hshoexer
Diffstat (limited to 'sbin/isakmpd/ike_aggressive.c')
-rw-r--r-- | sbin/isakmpd/ike_aggressive.c | 122 |
1 files changed, 61 insertions, 61 deletions
diff --git a/sbin/isakmpd/ike_aggressive.c b/sbin/isakmpd/ike_aggressive.c index 6dbc34580b6..a7d58fc3b9e 100644 --- a/sbin/isakmpd/ike_aggressive.c +++ b/sbin/isakmpd/ike_aggressive.c @@ -1,5 +1,5 @@ -/* $OpenBSD: ike_aggressive.c,v 1.5 2003/06/04 07:31:16 ho Exp $ */ -/* $EOM: ike_aggressive.c,v 1.4 2000/01/31 22:33:45 niklas Exp $ */ +/* $OpenBSD: ike_aggressive.c,v 1.6 2004/04/15 18:39:25 deraadt Exp $ */ +/* $EOM: ike_aggressive.c,v 1.4 2000/01/31 22:33:45 niklas Exp $ */ /* * Copyright (c) 1999 Niklas Hallqvist. All rights reserved. @@ -59,69 +59,69 @@ #include "transport.h" #include "util.h" -static int initiator_recv_SA_KE_NONCE_ID_AUTH (struct message *); -static int initiator_send_SA_KE_NONCE_ID (struct message *); -static int initiator_send_AUTH (struct message *); -static int responder_recv_SA_KE_NONCE_ID (struct message *); -static int responder_send_SA_KE_NONCE_ID_AUTH (struct message *); +static int initiator_recv_SA_KE_NONCE_ID_AUTH(struct message *); +static int initiator_send_SA_KE_NONCE_ID(struct message *); +static int initiator_send_AUTH(struct message *); +static int responder_recv_SA_KE_NONCE_ID(struct message *); +static int responder_send_SA_KE_NONCE_ID_AUTH(struct message *); -int (*ike_aggressive_initiator[]) (struct message *) = { - initiator_send_SA_KE_NONCE_ID, - initiator_recv_SA_KE_NONCE_ID_AUTH, - initiator_send_AUTH +int (*ike_aggressive_initiator[]) (struct message *) = { + initiator_send_SA_KE_NONCE_ID, + initiator_recv_SA_KE_NONCE_ID_AUTH, + initiator_send_AUTH }; -int (*ike_aggressive_responder[]) (struct message *) = { - responder_recv_SA_KE_NONCE_ID, - responder_send_SA_KE_NONCE_ID_AUTH, - ike_phase_1_recv_AUTH +int (*ike_aggressive_responder[]) (struct message *) = { + responder_recv_SA_KE_NONCE_ID, + responder_send_SA_KE_NONCE_ID_AUTH, + ike_phase_1_recv_AUTH }; /* Offer a set of transforms to the responder in the MSG message. */ static int -initiator_send_SA_KE_NONCE_ID (struct message *msg) +initiator_send_SA_KE_NONCE_ID(struct message * msg) { - if (ike_phase_1_initiator_send_SA (msg)) - return -1; + if (ike_phase_1_initiator_send_SA(msg)) + return -1; - if (ike_phase_1_initiator_send_KE_NONCE (msg)) - return -1; + if (ike_phase_1_initiator_send_KE_NONCE(msg)) + return -1; - return ike_phase_1_send_ID (msg); + return ike_phase_1_send_ID(msg); } /* Figure out what transform the responder chose. */ static int -initiator_recv_SA_KE_NONCE_ID_AUTH (struct message *msg) +initiator_recv_SA_KE_NONCE_ID_AUTH(struct message * msg) { - if (ike_phase_1_initiator_recv_SA (msg)) - return -1; + if (ike_phase_1_initiator_recv_SA(msg)) + return -1; - if (ike_phase_1_initiator_recv_KE_NONCE (msg)) - return -1; + if (ike_phase_1_initiator_recv_KE_NONCE(msg)) + return -1; - return ike_phase_1_recv_ID_AUTH (msg); + return ike_phase_1_recv_ID_AUTH(msg); } static int -initiator_send_AUTH (struct message *msg) +initiator_send_AUTH(struct message * msg) { - msg->exchange->flags |= EXCHANGE_FLAG_ENCRYPT; - - if (ike_phase_1_send_AUTH (msg)) - return -1; - - /* - * RFC 2407 4.6.3 says that, among others, INITIAL-CONTACT MUST NOT - * be sent in Aggressive Mode. This leaves us with the choice of - * doing it in an informational exchange of its own with no delivery - * guarantee or in the first Quick Mode, or not at all. - * draft-jenkins-ipsec-rekeying-01.txt has some text that requires - * INITIAL-CONTACT in phase 1, thus contradicting what we learned - * above. I will bring this up in the IPsec list. For now we don't - * do INITIAL-CONTACT at all when using aggressive mode. - */ - return 0; + msg->exchange->flags |= EXCHANGE_FLAG_ENCRYPT; + + if (ike_phase_1_send_AUTH(msg)) + return -1; + + /* + * RFC 2407 4.6.3 says that, among others, INITIAL-CONTACT MUST NOT + * be sent in Aggressive Mode. This leaves us with the choice of + * doing it in an informational exchange of its own with no delivery + * guarantee or in the first Quick Mode, or not at all. + * draft-jenkins-ipsec-rekeying-01.txt has some text that requires + * INITIAL-CONTACT in phase 1, thus contradicting what we learned + * above. I will bring this up in the IPsec list. For now we don't + * do INITIAL-CONTACT at all when using aggressive mode. + */ + return 0; } /* @@ -129,15 +129,15 @@ initiator_send_AUTH (struct message *msg) * handle. Also accept initiator's public DH value, nonce and ID. */ static int -responder_recv_SA_KE_NONCE_ID (struct message *msg) +responder_recv_SA_KE_NONCE_ID(struct message * msg) { - if (ike_phase_1_responder_recv_SA (msg)) - return -1; + if (ike_phase_1_responder_recv_SA(msg)) + return -1; - if (ike_phase_1_recv_ID (msg)) - return -1; + if (ike_phase_1_recv_ID(msg)) + return -1; - return ike_phase_1_recv_KE_NONCE (msg); + return ike_phase_1_recv_KE_NONCE(msg); } /* @@ -145,19 +145,19 @@ responder_recv_SA_KE_NONCE_ID (struct message *msg) * to the initiator. */ static int -responder_send_SA_KE_NONCE_ID_AUTH (struct message *msg) +responder_send_SA_KE_NONCE_ID_AUTH(struct message * msg) { - /* Add the SA payload with the transform that was chosen. */ - if (ike_phase_1_responder_send_SA (msg)) - return -1; + /* Add the SA payload with the transform that was chosen. */ + if (ike_phase_1_responder_send_SA(msg)) + return -1; - /* XXX Should we really just use the initiator's nonce size? */ - if (ike_phase_1_send_KE_NONCE (msg, msg->exchange->nonce_i_len)) - return -1; + /* XXX Should we really just use the initiator's nonce size? */ + if (ike_phase_1_send_KE_NONCE(msg, msg->exchange->nonce_i_len)) + return -1; - if (ike_phase_1_post_exchange_KE_NONCE (msg)) - return -1; + if (ike_phase_1_post_exchange_KE_NONCE(msg)) + return -1; - return ike_phase_1_responder_send_ID_AUTH (msg); - return -1; + return ike_phase_1_responder_send_ID_AUTH(msg); + return -1; } |