-/* $OpenBSD: iked.c,v 1.68 2024/02/13 12:25:11 tobhe Exp $ */
+/* $OpenBSD: iked.c,v 1.69 2024/02/15 19:04:12 tobhe Exp $ */
/*
* Copyright (c) 2019 Tobias Heider <tobias.heider@stusta.de>
ps = &env->sc_ps;
ps->ps_env = env;
- TAILQ_INIT(&ps->ps_rcsocks);
if (strlcpy(env->sc_conffile, conffile, PATH_MAX) >= PATH_MAX)
errx(1, "config file exceeds PATH_MAX");
-/* $OpenBSD: iked.h,v 1.226 2024/01/24 10:09:07 tobhe Exp $ */
+/* $OpenBSD: iked.h,v 1.227 2024/02/15 19:04:12 tobhe Exp $ */
/*
* Copyright (c) 2019 Tobias Heider <tobias.heider@stusta.de>
int cs_fd;
int cs_restricted;
void *cs_env;
-
- TAILQ_ENTRY(control_sock) cs_entry;
};
-TAILQ_HEAD(control_socks, control_sock);
struct ctl_conn {
TAILQ_ENTRY(ctl_conn) entry;
int ps_noaction;
struct control_sock ps_csock;
- struct control_socks ps_rcsocks;
unsigned int ps_instances[PROC_MAX];
unsigned int ps_ninstances;
-/* $OpenBSD: proc.c,v 1.40 2024/01/17 08:25:02 claudio Exp $ */
+/* $OpenBSD: proc.c,v 1.41 2024/02/15 19:04:12 tobhe Exp $ */
/*
* Copyright (c) 2010 - 2016 Reyk Floeter <reyk@openbsd.org>
{
struct passwd *pw;
const char *root;
- struct control_sock *rcs;
log_procinit(p->p_title);
if (p->p_id == PROC_CONTROL && ps->ps_instance == 0) {
if (control_init(ps, &ps->ps_csock) == -1)
fatalx("%s: control_init", __func__);
- TAILQ_FOREACH(rcs, &ps->ps_rcsocks, cs_entry)
- if (control_init(ps, rcs) == -1)
- fatalx("%s: control_init", __func__);
}
/* Use non-standard user */
if (p->p_id == PROC_CONTROL && ps->ps_instance == 0) {
if (control_listen(&ps->ps_csock) == -1)
fatalx("%s: control_listen", __func__);
- TAILQ_FOREACH(rcs, &ps->ps_rcsocks, cs_entry)
- if (control_listen(rcs) == -1)
- fatalx("%s: control_listen", __func__);
}
#if DEBUG