LOCAL_SRC_FILES += $(call add_plugin, kernel-netlink)
-# build libcharon --------------------------------------------------------------
+# build libhydra ---------------------------------------------------------------
LOCAL_C_INCLUDES += \
$(libvstr_PATH) \
}
mtu = lib->settings->get_int(lib->settings,
- "charon.plugins.kernel-klips.ipsec_dev_mtu", 0);
+ "%s.plugins.kernel-klips.ipsec_dev_mtu", 0,
+ hydra->daemon);
if (mtu <= 0)
{
/* guess MTU as physical MTU - ESP overhead [- NAT-T overhead]
* longer period than configured as hard limit, we wouldn't be able
* to rekey the SA and just receive the hard expire and thus delete
* the SA.
- * To avoid this behavior and to make charon behave as with the
+ * To avoid this behavior and to make the daemon behave as with the
* other kernel plugins, we implement the expiration of SAs
* ourselves. */
break;
rng->get_bytes(rng, sizeof(spi_gen), (void*)&spi_gen);
rng->destroy(rng);
- /* charon's SPIs lie within the range from 0xc0000000 to 0xcFFFFFFF */
+ /* allocated SPIs lie within the range from 0xc0000000 to 0xcFFFFFFF */
spi_gen = 0xc0000000 | (spi_gen & 0x0FFFFFFF);
*spi = htonl(spi_gen);
static void init_ipsec_devices(private_kernel_klips_ipsec_t *this)
{
int i, count = lib->settings->get_int(lib->settings,
- "charon.plugins.kernel-klips.ipsec_dev_count",
- DEFAULT_IPSEC_DEV_COUNT);
+ "%s.plugins.kernel-klips.ipsec_dev_count",
+ DEFAULT_IPSEC_DEV_COUNT, hydra->daemon);
for (i = 0; i < count; ++i)
{
.mutex = mutex_create(MUTEX_TYPE_DEFAULT),
.mutex_pfkey = mutex_create(MUTEX_TYPE_DEFAULT),
.install_routes = lib->settings->get_bool(lib->settings,
- "charon.install_routes", TRUE),
+ "%s.install_routes", TRUE,
+ hydra->daemon),
);
/* initialize ipsec devices */
(hashtable_equals_t)policy_equals, 32),
.mutex = mutex_create(MUTEX_TYPE_DEFAULT),
.install_routes = lib->settings->get_bool(lib->settings,
- "charon.install_routes", TRUE),
+ "%s.install_routes", TRUE,
+ hydra->daemon),
);
/* disable lifetimes for allocated SPIs in kernel */
this->condvar = condvar_create(CONDVAR_TYPE_DEFAULT);
timerclear(&this->last_roam);
this->routing_table = lib->settings->get_int(lib->settings,
- "charon.routing_table", ROUTING_TABLE);
+ "%s.routing_table", ROUTING_TABLE, hydra->daemon);
this->routing_table_prio = lib->settings->get_int(lib->settings,
- "charon.routing_table_prio", ROUTING_TABLE_PRIO);
+ "%s.routing_table_prio", ROUTING_TABLE_PRIO, hydra->daemon);
this->process_route = lib->settings->get_bool(lib->settings,
- "charon.process_route", TRUE);
+ "%s.process_route", TRUE, hydra->daemon);
this->install_virtual_ip = lib->settings->get_bool(lib->settings,
- "charon.install_virtual_ip", TRUE);
+ "%s.install_virtual_ip", TRUE, hydra->daemon);
this->rt_exclude = linked_list_create();
exclude = lib->settings->get_str(lib->settings,
- "charon.ignore_routing_tables", NULL);
+ "%s.ignore_routing_tables", NULL, hydra->daemon);
if (exclude)
{
char *token;
.mutex = mutex_create(MUTEX_TYPE_DEFAULT),
.mutex_pfkey = mutex_create(MUTEX_TYPE_DEFAULT),
.install_routes = lib->settings->get_bool(lib->settings,
- "charon.install_routes", TRUE),
+ "%s.install_routes", TRUE,
+ hydra->daemon),
);
/* create a PF_KEY socket to communicate with the kernel */