int32_t key_renegotiate_time; /* If we see traffic (or a keepalive)
after this time, initiate a new
key exchange */
- bool_t keepalive; /* Send keepalives to detect peer failure (not yet
- implemented) */
uint8_t *setupsig; /* Expected signature of incoming MSG1 packets */
int32_t setupsiglen; /* Allows us to discard packets quickly if
/* We must forget about the current session. */
delete_key(st,"request from peer",LOG_SEC);
return True;
- break;
case LABEL_MSG9:
/* Deliver to netlink layer */
st->netlink->deliver(st->netlink->st,msg0);
return True;
- break;
default:
slog(st,LOG_SEC,"incoming encrypted message of type %08x "
"(unknown)",type);
buf_prepend_uint32(&st->buffer,LABEL_MSG0);
buf_prepend_uint32(&st->buffer,st->index);
buf_prepend_uint32(&st->buffer,st->remote_session_id);
+ dump_packet(st,&st->buffer,&st->peer,False);
st->comm->sendmsg(st->comm->st,&st->buffer,&st->peer);
BUF_FREE(&st->buffer);
return True;
slog(st,LOG_STATE,"entering state WAIT");
st->timeout=st->now+st->wait_timeout;
st->state=SITE_WAIT;
- st->peer_valid=False;
set_link_quality(st);
BUF_FREE(&st->buffer); /* will have had an outgoing packet in it */
/* XXX Erase keys etc. */
cfgfatal(loc,"site",
"renegotiate-time must be less than key-lifetime\n");
}
- st->keepalive=dict_read_bool(dict,"keepalive",False,"site",loc,False);
st->log_events=string_list_to_word(dict_lookup(dict,"log-events"),
log_event_table,"site");