-/* $OpenBSD: ikev2.c,v 1.100 2014/04/10 16:08:02 reyk Exp $ */
+/* $OpenBSD: ikev2.c,v 1.101 2014/04/28 11:21:02 reyk Exp $ */
/*
* Copyright (c) 2010-2013 Reyk Floeter <reyk@openbsd.org>
__func__);
break;
}
-
+
sa_stateflags(sa, IKED_REQ_CERT);
if (ikev2_ike_auth(env, sa, NULL) != 0)
-/* $OpenBSD: ikev2_pld.c,v 1.39 2014/04/10 16:08:02 reyk Exp $ */
+/* $OpenBSD: ikev2_pld.c,v 1.40 2014/04/28 11:21:02 reyk Exp $ */
/*
* Copyright (c) 2010-2013 Reyk Floeter <reyk@openbsd.org>
}
if (total < xfrm_length) {
log_debug("%s: malformed payload: too long for payload size "
- "(%zu < %zu)", __func__, total, xfrm_length);
+ "(%zu < %zu)", __func__, total, xfrm_length);
return (-1);
}
if (!ikev2_msg_frompeer(msg))
goto done;
- if (msg->msg_parent->msg_response) {
+ if (msg->msg_parent->msg_response) {
ret = 0;
goto done;
}
{
struct ocsp_connect *oc = arg;
int error, send_fd = -1;
- socklen_t len;
+ socklen_t len;
len = sizeof(error);
if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
ocsp_validate_cert(struct iked *env, struct iked_static_id *id,
void *data, size_t len, struct iked_sahdr sh, u_int8_t type)
{
- struct iked_ocsp_entry *ioe;
- struct iked_ocsp *ocsp;
+ struct iked_ocsp_entry *ioe;
+ struct iked_ocsp *ocsp;
BIO *rawcert = NULL, *bissuer = NULL;
X509 *cert = NULL, *issuer = NULL;