AM_CONDITIONAL(USE_VENDORID, test x$vendor_id = xtrue)
AC_ARG_ENABLE(
+ [xauth-vid],
+ AS_HELP_STRING([--disable-xauth-vid],[disable the sending of the XAUTH vendor ID (default is NO).]),
+ [if test x$enableval = xyes; then
+ xauth_vid=true
+ else
+ xauth_vid=false
+ fi],
+ xauth_vid=true
+)
+AM_CONDITIONAL(USE_XAUTH_VID, test x$xauth_vid = xtrue)
+
+AC_ARG_ENABLE(
[uml],
AS_HELP_STRING([--enable-uml],[build the UML test framework (default is NO).]),
[if test x$enableval = xyes; then
#endif /* !VENDORID */
/*
+ * are we sending an XAUTH VID?
+ */
+#ifdef XAUTH_VID
+#define SEND_XAUTH_VID 1
+#else /* !XAUTH_VID */
+#define SEND_XAUTH_VID 0
+#endif /* !XAUTH_VID */
+
+/*
* are we sending a Cisco Unity VID?
*/
#ifdef CISCO_QUIRKS
vids_to_send++;
if (c->spd.this.cert.type == CERT_PGP)
vids_to_send++;
- /* always send XAUTH Vendor ID */
+ if (SEND_XAUTH_VID)
vids_to_send++;
/* always send DPD Vendor ID */
vids_to_send++;
}
/* Announce our ability to do eXtended AUTHentication to the peer */
- if (!out_vendorid(vids_to_send-- ? ISAKMP_NEXT_VID : ISAKMP_NEXT_NONE
- , &rbody, VID_MISC_XAUTH))
+ if (SEND_XAUTH_VID)
{
- reset_cur_state();
- return STF_INTERNAL_ERROR;
+ if (!out_vendorid(vids_to_send-- ? ISAKMP_NEXT_VID : ISAKMP_NEXT_NONE
+ , &rbody, VID_MISC_XAUTH))
+ {
+ reset_cur_state();
+ return STF_INTERNAL_ERROR;
+ }
}
/* Announce our ability to do Dead Peer Detection to the peer */
vids_to_send++;
if (md->openpgp)
vids_to_send++;
- /* always send XAUTH Vendor ID */
+ if (SEND_XAUTH_VID)
vids_to_send++;
/* always send DPD Vendor ID */
vids_to_send++;
}
/* Announce our ability to do eXtended AUTHentication to the peer */
- if (!out_vendorid(vids_to_send-- ? ISAKMP_NEXT_VID : ISAKMP_NEXT_NONE
- , &md->rbody, VID_MISC_XAUTH))
+ if (SEND_XAUTH_VID)
{
- return STF_INTERNAL_ERROR;
+ if (!out_vendorid(vids_to_send-- ? ISAKMP_NEXT_VID : ISAKMP_NEXT_NONE
+ , &md->rbody, VID_MISC_XAUTH))
+ {
+ return STF_INTERNAL_ERROR;
+ }
}
/* Announce our ability to do Dead Peer Detection to the peer */