aboutsummaryrefslogtreecommitdiffstats
path: root/Source/charon
diff options
context:
space:
mode:
authorJan Hutter <jhutter@hsr.ch>2005-12-03 16:02:06 +0000
committerJan Hutter <jhutter@hsr.ch>2005-12-03 16:02:06 +0000
commitaebb38a093d034e44d5ecf9773ff2903ed4a1d1e (patch)
tree5b2fb87b38f2862ec3021f0b4fb2078176a14f36 /Source/charon
parent8d68033e5cf37ea91eb160e7b8e1c2d171a356f7 (diff)
downloadstrongswan-aebb38a093d034e44d5ecf9773ff2903ed4a1d1e.tar.bz2
strongswan-aebb38a093d034e44d5ecf9773ff2903ed4a1d1e.tar.xz
- preshared secrets are now retrieved over configuration_manager
Diffstat (limited to 'Source/charon')
-rw-r--r--Source/charon/config/configuration_manager.c97
-rw-r--r--Source/charon/config/configuration_manager.h17
-rw-r--r--Source/charon/sa/authenticator.c142
-rw-r--r--Source/charon/sa/authenticator.h4
-rw-r--r--Source/charon/sa/ike_sa.c10
-rw-r--r--Source/charon/sa/ike_sa.h10
-rw-r--r--Source/charon/sa/states/ike_auth_requested.c2
-rw-r--r--Source/charon/sa/states/ike_sa_init_requested.c2
-rw-r--r--Source/charon/sa/states/ike_sa_init_responded.c4
-rw-r--r--Source/charon/utils/logger_manager.c10
10 files changed, 230 insertions, 68 deletions
diff --git a/Source/charon/config/configuration_manager.c b/Source/charon/config/configuration_manager.c
index 3669facb2..725d53450 100644
--- a/Source/charon/config/configuration_manager.c
+++ b/Source/charon/config/configuration_manager.c
@@ -30,6 +30,26 @@
#include <daemon.h>
#include <utils/allocator.h>
+
+typedef struct preshared_secret_entry_t preshared_secret_entry_t;
+
+/**
+ * An preshared secret entry combines an identifier with a
+ * preshared secret.
+ */
+struct preshared_secret_entry_t {
+
+ /**
+ * Identification.
+ */
+ identification_t *identification;
+
+ /**
+ * Preshared secret as chunk
+ */
+ chunk_t preshared_secret;
+};
+
typedef struct configuration_entry_t configuration_entry_t;
/* A configuration entry combines a configuration name with a init and sa
@@ -117,7 +137,11 @@ struct private_configuration_manager_t {
* Holding all init_configs.
*/
linked_list_t *sa_configs;
-
+
+ /**
+ * Holding all preshared secrets.
+ */
+ linked_list_t *preshared_secrets;
/**
* Assigned logger object.
@@ -136,7 +160,7 @@ struct private_configuration_manager_t {
u_int32_t first_retransmit_timeout;
/**
- * Load default configuration
+ * Adds a new IKE_SA configuration
*
*
* @param this calling object
@@ -147,6 +171,17 @@ struct private_configuration_manager_t {
void (*add_new_configuration) (private_configuration_manager_t *this, char *name, init_config_t *init_config, sa_config_t *sa_config);
/**
+ * Adds a new IKE_SA configuration
+ *
+ *
+ * @param this calling object
+ * @param type type of identification
+ * @param id_string identification as string
+ * @param preshared_secret preshared secret as string
+ */
+ void (*add_new_preshared_secret) (private_configuration_manager_t *this,id_type_t type, char *id_string, char *preshared_secret);
+
+ /**
* Load default configuration
*
*
@@ -242,6 +277,9 @@ static void load_default_config (private_configuration_manager_t *this)
this->add_new_configuration(this,"pinflb30",init_config2,sa_config2);
this->add_new_configuration(this,"localhost",init_config3,sa_config3);
+ this->add_new_preshared_secret(this,ID_IPV4_ADDR, "152.96.193.130","das ist ein sicheres wort");
+ this->add_new_preshared_secret(this,ID_IPV4_ADDR, "152.96.193.131","das ist ein sicheres wort");
+ this->add_new_preshared_secret(this,ID_IPV4_ADDR, "127.0.0.1","das ist ein sicheres wort");
}
/**
@@ -474,6 +512,48 @@ static void add_new_configuration (private_configuration_manager_t *this, char *
this->configurations->insert_first(this->configurations,configuration_entry_create(name,init_config,sa_config));
}
+/**
+ * Implementation of private_configuration_manager_t.add_new_preshared_secret.
+ */
+static void add_new_preshared_secret (private_configuration_manager_t *this,id_type_t type, char *id_string, char *preshared_secret)
+{
+ preshared_secret_entry_t *entry = allocator_alloc_thing(preshared_secret_entry_t);
+
+ entry->identification = identification_create_from_string(type,id_string);
+ entry->preshared_secret.len = strlen(preshared_secret);
+ entry->preshared_secret.ptr = allocator_alloc(entry->preshared_secret.len);
+ memcpy(entry->preshared_secret.ptr,preshared_secret,entry->preshared_secret.len);
+
+ this->preshared_secrets->insert_last(this->preshared_secrets,entry);
+}
+
+
+/**
+ * Implementation of configuration_manager_t.get_shared_secret.
+ */
+static status_t get_shared_secret(private_configuration_manager_t *this, identification_t *identification, chunk_t *preshared_secret)
+{
+ iterator_t *iterator;
+
+ iterator = this->preshared_secrets->create_iterator(this->preshared_secrets,TRUE);
+ while (iterator->has_next(iterator))
+ {
+ preshared_secret_entry_t *entry;
+ iterator->current(iterator,(void **) &entry);
+ if (entry->identification->equals(entry->identification,identification))
+ {
+ *preshared_secret = entry->preshared_secret;
+ iterator->destroy(iterator);
+ return SUCCESS;
+ }
+ }
+ iterator->destroy(iterator);
+ return NOT_FOUND;
+}
+
+/**
+ * Implementation of configuration_manager_t.destroy.
+ */
static status_t get_retransmit_timeout (private_configuration_manager_t *this, u_int32_t retransmit_count, u_int32_t *timeout)
{
if ((retransmit_count > this->max_retransmit_count) && (this->max_retransmit_count != 0))
@@ -523,6 +603,16 @@ static void destroy(private_configuration_manager_t *this)
}
this->init_configs->destroy(this->init_configs);
+ while (this->preshared_secrets->get_count(this->preshared_secrets) > 0)
+ {
+ preshared_secret_entry_t *entry;
+ this->preshared_secrets->remove_first(this->preshared_secrets,(void **) &entry);
+ entry->identification->destroy(entry->identification);
+ allocator_free_chunk(&(entry->preshared_secret));
+ allocator_free(entry);
+ }
+ this->preshared_secrets->destroy(this->preshared_secrets);
+
this->logger->log(this->logger,CONTROL | MOST, "Destroy assigned logger");
charon->logger_manager->destroy_logger(charon->logger_manager,this->logger);
allocator_free(this);
@@ -542,16 +632,19 @@ configuration_manager_t *configuration_manager_create(u_int32_t first_retransmit
this->public.get_sa_config_for_name =(status_t (*) (configuration_manager_t *, char *, sa_config_t **)) get_sa_config_for_name;
this->public.get_sa_config_for_init_config_and_id =(status_t (*) (configuration_manager_t *, init_config_t *, identification_t *, identification_t *,sa_config_t **)) get_sa_config_for_init_config_and_id;
this->public.get_retransmit_timeout = (status_t (*) (configuration_manager_t *, u_int32_t retransmit_count, u_int32_t *timeout))get_retransmit_timeout;
+ this->public.get_shared_secret = (status_t (*) (configuration_manager_t *, identification_t *, chunk_t *))get_shared_secret;
/* private functions */
this->load_default_config = load_default_config;
this->add_new_configuration = add_new_configuration;
+ this->add_new_preshared_secret = add_new_preshared_secret;
/* private variables */
this->logger = charon->logger_manager->create_logger(charon->logger_manager,CONFIGURATION_MANAGER,NULL);
this->configurations = linked_list_create();
this->sa_configs = linked_list_create();
this->init_configs = linked_list_create();
+ this->preshared_secrets = linked_list_create();
this->max_retransmit_count = max_retransmit_count;
this->first_retransmit_timeout = first_retransmit_timeout;
diff --git a/Source/charon/config/configuration_manager.h b/Source/charon/config/configuration_manager.h
index bc6c6e81f..fe01615a2 100644
--- a/Source/charon/config/configuration_manager.h
+++ b/Source/charon/config/configuration_manager.h
@@ -114,10 +114,25 @@ struct configuration_manager_t {
* @param[out] timeout the new retransmit timeout in milliseconds
*
* @return
- * - FAILED if the message should not be resent again
+ * - FAILED, if the message should not be resent again
* - SUCCESS
*/
status_t (*get_retransmit_timeout) (configuration_manager_t *this, u_int32_t retransmit_count, u_int32_t *timeout);
+
+ /**
+ * Get the preshared secret of a specific ID.
+ *
+ * The preshared secret gets not cloned.
+ *
+ * @param this calling object
+ * @param identification identification_t object identifiying the ID.
+ * @param[out] preshared_secret the preshared secret will be written there
+ *
+ * @return
+ * - NOT_FOUND if no preshared secrets is configured for specific id
+ * - SUCCESS
+ */
+ status_t (*get_shared_secret) (configuration_manager_t *this, identification_t *identification, chunk_t *preshared_secret);
/**
* Destroys configuration manager
diff --git a/Source/charon/sa/authenticator.c b/Source/charon/sa/authenticator.c
index 978106b1f..8efbb70d4 100644
--- a/Source/charon/sa/authenticator.c
+++ b/Source/charon/sa/authenticator.c
@@ -23,6 +23,17 @@
#include "authenticator.h"
#include <utils/allocator.h>
+#include <daemon.h>
+
+/**
+ * Key pad for the AUTH method SHARED_KEY_MESSAGE_INTEGRITY_CODE.
+ */
+#define IKE_V2_KEY_PAD "Key Pad for IKEv2"
+
+/**
+ * Length of key pad in bytes.
+ */
+#define IKE_V2_KEY_PAD_LEN 17
typedef struct private_authenticator_t private_authenticator_t;
@@ -37,9 +48,14 @@ struct private_authenticator_t {
authenticator_t public;
/**
- * IKE_SA.
+ * Assigned IKE_SA. Needed to get prf function.
*/
protected_ike_sa_t *ike_sa;
+
+ /**
+ * PRF function. Taken from the IKE_SA.
+ */
+ prf_t *prf;
/**
* A logger for.
@@ -51,45 +67,49 @@ struct private_authenticator_t {
/**
* TODO
*/
- chunk_t (*allocate_octets) (private_authenticator_t *this,chunk_t last_message, chunk_t other_nonce,id_payload_t *my_id);
+ chunk_t (*allocate_octets) (private_authenticator_t *this,chunk_t last_message, chunk_t other_nonce,id_payload_t *my_id, bool initiator);
- chunk_t (*allocate_auth_data_with_preshared_secret) (private_authenticator_t *this,chunk_t octets,chunk_t preshared_secret);
+ chunk_t (*allocate_auth_data_with_preshared_secret) (private_authenticator_t *this,chunk_t last_message, chunk_t nonce,id_payload_t *id_payload, bool initiator,chunk_t preshared_secret);
};
/**
* Implementation of authenticator_t.private_authenticator_t.
*/
-static chunk_t allocate_octets(private_authenticator_t *this,chunk_t last_message, chunk_t other_nonce,id_payload_t *my_id)
+static chunk_t allocate_octets(private_authenticator_t *this,chunk_t last_message, chunk_t other_nonce,id_payload_t *my_id, bool initiator)
{
chunk_t id_chunk = my_id->get_data(my_id);
u_int8_t id_with_header[4 + id_chunk.len];
- chunk_t id_with_header_chunk;
- chunk_t octets;
+ chunk_t id_with_header_chunk = {ptr:id_with_header, len: sizeof(id_with_header) };
u_int8_t *current_pos;
- prf_t *prf;
+ chunk_t octets;
id_with_header[0] = my_id->get_id_type(my_id);
+ /* TODO
+ * Reserved bytes are not in any case zero
+ */
id_with_header[1] = 0x00;
id_with_header[2] = 0x00;
id_with_header[3] = 0x00;
memcpy(id_with_header + 4,id_chunk.ptr,id_chunk.len);
- id_with_header_chunk.ptr = id_with_header;
- id_with_header_chunk.len = sizeof(id_with_header);
-
- prf = this->ike_sa->get_prf(this->ike_sa);
-
- prf->set_key(prf,this->ike_sa->get_key_pr(this->ike_sa));
+ if (initiator)
+ {
+ this->prf->set_key(this->prf,this->ike_sa->get_key_pi(this->ike_sa));
+ }
+ else
+ {
+ this->prf->set_key(this->prf,this->ike_sa->get_key_pr(this->ike_sa));
+ }
/* 4 bytes are id type and reserved fields of id payload */
- octets.len = last_message.len + other_nonce.len + prf->get_block_size(prf);
+ octets.len = last_message.len + other_nonce.len + this->prf->get_block_size(this->prf);
octets.ptr = allocator_alloc(octets.len);
current_pos = octets.ptr;
memcpy(current_pos,last_message.ptr,last_message.len);
current_pos += last_message.len;
memcpy(current_pos,other_nonce.ptr,other_nonce.len);
current_pos += other_nonce.len;
- prf->get_bytes(prf,id_with_header_chunk,current_pos);
+ this->prf->get_bytes(this->prf,id_with_header_chunk,current_pos);
this->logger->log_chunk(this->logger,RAW | MOST, "Octets (Mesage + Nonce + prf(Sk_px,Idx)",&octets);
return octets;
@@ -98,46 +118,53 @@ static chunk_t allocate_octets(private_authenticator_t *this,chunk_t last_messag
/**
* Implementation of authenticator_t.allocate_auth_data_with_preshared_secret.
*/
-static chunk_t allocate_auth_data_with_preshared_secret (private_authenticator_t *this,chunk_t octets,chunk_t preshared_secret)
+static chunk_t allocate_auth_data_with_preshared_secret (private_authenticator_t *this,chunk_t last_message, chunk_t nonce,id_payload_t *id_payload, bool initiator,chunk_t preshared_secret)
{
- prf_t *prf = this->ike_sa->get_prf(this->ike_sa);
- chunk_t auth_data;
- chunk_t key_pad;
- chunk_t key;
+ chunk_t key_pad = {ptr: IKE_V2_KEY_PAD, len:IKE_V2_KEY_PAD_LEN};
+ u_int8_t key_buffer[this->prf->get_block_size(this->prf)];
+ chunk_t key = {ptr: key_buffer, len: sizeof(key_buffer)};
+ chunk_t auth_data;
+
+ chunk_t octets = this->allocate_octets(this,last_message,nonce,id_payload,initiator);
- key_pad.ptr = "Key Pad for IKEv2";
- key_pad.len = strlen(key_pad.ptr);
-
- prf->set_key(prf,preshared_secret);
- prf->allocate_bytes(prf,key_pad,&key);
- prf->set_key(prf,key);
- allocator_free_chunk(&key);
- prf->allocate_bytes(prf,octets,&auth_data);
- this->logger->log_chunk(this->logger,RAW | MORE, "Authenticated data",&auth_data);
-
+ /*
+ * AUTH = prf(prf(Shared Secret,"Key Pad for IKEv2"), <msg octets>)
+ */
+
+ this->prf->set_key(this->prf,preshared_secret);
+ this->prf->get_bytes(this->prf,key_pad,key_buffer);
+ this->prf->set_key(this->prf,key);
+ this->prf->allocate_bytes(this->prf,octets,&auth_data);
+ allocator_free_chunk(&octets);
+ this->logger->log_chunk(this->logger,RAW | MOST, "Authenticated data",&auth_data);
+
return auth_data;
}
-
/**
* Implementation of authenticator_t.private_authenticator_t.
*/
-static status_t verify_auth_data (private_authenticator_t *this,auth_payload_t *auth_payload, chunk_t last_received_packet,chunk_t my_nonce,id_payload_t *other_id_payload,bool *verified)
+static status_t verify_auth_data (private_authenticator_t *this,auth_payload_t *auth_payload, chunk_t last_received_packet,chunk_t my_nonce,id_payload_t *other_id_payload,bool initiator,bool *verified)
{
switch(auth_payload->get_auth_method(auth_payload))
{
case SHARED_KEY_MESSAGE_INTEGRITY_CODE:
{
- chunk_t preshared_secret;
- chunk_t auth_data = auth_payload->get_data(auth_payload);
- preshared_secret.ptr = "secret";
- preshared_secret.len = strlen(preshared_secret.ptr);
+ identification_t *other_id =other_id_payload->get_identification(other_id_payload);
+ chunk_t auth_data = auth_payload->get_data(auth_payload);
+ chunk_t preshared_secret;
+ status_t status;
+
+ status = charon->configuration_manager->get_shared_secret(charon->configuration_manager,other_id,&preshared_secret);
+ other_id->destroy(other_id);
+ if (status != SUCCESS)
+ {
+ return status;
+ }
- chunk_t octets = this->allocate_octets(this,last_received_packet,my_nonce,other_id_payload);
- chunk_t my_auth_data = this->allocate_auth_data_with_preshared_secret(this,octets,preshared_secret);
- allocator_free_chunk(&octets);
+ chunk_t my_auth_data = this->allocate_auth_data_with_preshared_secret(this,last_received_packet,my_nonce,other_id_payload,initiator,preshared_secret);
if (auth_data.len != my_auth_data.len)
{
@@ -166,38 +193,42 @@ static status_t verify_auth_data (private_authenticator_t *this,auth_payload_t *
/**
* Implementation of authenticator_t.compute_auth_data.
*/
-static status_t compute_auth_data (private_authenticator_t *this,auth_payload_t **auth_payload, chunk_t last_sent_packet,chunk_t other_nonce,id_payload_t *my_id_payload)
+static status_t compute_auth_data (private_authenticator_t *this,auth_payload_t **auth_payload, chunk_t last_sent_packet,chunk_t other_nonce,id_payload_t *my_id_payload,bool initiator)
{
+ sa_config_t *sa_config = this->ike_sa->get_sa_config(this->ike_sa);
+
-/* switch(auth_method)
+ switch(sa_config->get_auth_method(sa_config))
{
case SHARED_KEY_MESSAGE_INTEGRITY_CODE:
- {*/
-
+ {
+ identification_t *my_id =my_id_payload->get_identification(my_id_payload);
chunk_t preshared_secret;
+ status_t status;
- preshared_secret.ptr = "secret";
- preshared_secret.len = strlen(preshared_secret.ptr);
-
- chunk_t octets = this->allocate_octets(this,last_sent_packet,other_nonce,my_id_payload);
- chunk_t auth_data = this->allocate_auth_data_with_preshared_secret(this,octets,preshared_secret);
- allocator_free_chunk(&octets);
+ status = charon->configuration_manager->get_shared_secret(charon->configuration_manager,my_id,&preshared_secret);
+
+ my_id->destroy(my_id);
+ if (status != SUCCESS)
+ {
+ return status;
+ }
+
+ chunk_t auth_data = this->allocate_auth_data_with_preshared_secret(this,last_sent_packet,other_nonce,my_id_payload,initiator,preshared_secret);
*auth_payload = auth_payload_create();
(*auth_payload)->set_auth_method((*auth_payload),SHARED_KEY_MESSAGE_INTEGRITY_CODE);
(*auth_payload)->set_data((*auth_payload),auth_data);
allocator_free_chunk(&auth_data);
- allocator_free_chunk(&octets);
-
return SUCCESS;
-/* }
+ }
default:
{
return NOT_SUPPORTED;
}
- }*/
+ }
}
/**
@@ -217,8 +248,8 @@ authenticator_t *authenticator_create(protected_ike_sa_t *ike_sa)
/* Public functions */
this->public.destroy = (void(*)(authenticator_t*))destroy;
- this->public.verify_auth_data = (status_t (*) (authenticator_t *,auth_payload_t *, chunk_t ,chunk_t ,id_payload_t *,bool *)) verify_auth_data;
- this->public.compute_auth_data = (status_t (*) (authenticator_t *,auth_payload_t **, chunk_t ,chunk_t ,id_payload_t *)) compute_auth_data;
+ this->public.verify_auth_data = (status_t (*) (authenticator_t *,auth_payload_t *, chunk_t ,chunk_t ,id_payload_t *,bool,bool *)) verify_auth_data;
+ this->public.compute_auth_data = (status_t (*) (authenticator_t *,auth_payload_t **, chunk_t ,chunk_t ,id_payload_t *,bool)) compute_auth_data;
/* private functions */
this->allocate_octets = allocate_octets;
@@ -226,6 +257,7 @@ authenticator_t *authenticator_create(protected_ike_sa_t *ike_sa)
/* private data */
this->ike_sa = ike_sa;
+ this->prf = this->ike_sa->get_prf(this->ike_sa);
this->logger = this->ike_sa->get_logger(this->ike_sa);
return &(this->public);
diff --git a/Source/charon/sa/authenticator.h b/Source/charon/sa/authenticator.h
index 06cb96d2d..28b9db136 100644
--- a/Source/charon/sa/authenticator.h
+++ b/Source/charon/sa/authenticator.h
@@ -52,7 +52,7 @@ struct authenticator_t {
* @return
* - NOT_SUPPORTED if auth_method is not supported
*/
- status_t (*verify_auth_data) (authenticator_t *this,auth_payload_t *auth_payload, chunk_t last_received_packet,chunk_t my_nonce,id_payload_t *other_id_payload,bool *verified);
+ status_t (*verify_auth_data) (authenticator_t *this,auth_payload_t *auth_payload, chunk_t last_received_packet,chunk_t my_nonce,id_payload_t *other_id_payload, bool initiator,bool *verified);
/**
* @brief Verifying of given authentication data.
@@ -62,7 +62,7 @@ struct authenticator_t {
* @return
* - NOT_SUPPORTED if auth_method is not supported
*/
- status_t (*compute_auth_data) (authenticator_t *this,auth_payload_t **auth_payload, chunk_t last_sent_packet,chunk_t other_nonce,id_payload_t *my_id_payload);
+ status_t (*compute_auth_data) (authenticator_t *this,auth_payload_t **auth_payload, chunk_t last_sent_packet,chunk_t other_nonce,id_payload_t *my_id_payload, bool initiator);
/**
* @brief Destroys a authenticator_t object.
*
diff --git a/Source/charon/sa/ike_sa.c b/Source/charon/sa/ike_sa.c
index 1c18e3c74..2c45e5be0 100644
--- a/Source/charon/sa/ike_sa.c
+++ b/Source/charon/sa/ike_sa.c
@@ -567,6 +567,15 @@ static chunk_t get_key_pr (private_ike_sa_t *this)
return this->secrets.pr_key;
}
+
+/**
+ * Implementation of protected_ike_sa_t.get_key_pi.
+ */
+static chunk_t get_key_pi (private_ike_sa_t *this)
+{
+ return this->secrets.pi_key;
+}
+
/**
* Implementation of protected_ike_sa_t.set_prf.
*/
@@ -940,6 +949,7 @@ ike_sa_t * ike_sa_create(ike_sa_id_t *ike_sa_id)
this->protected.compute_secrets = (void (*) (protected_ike_sa_t *,chunk_t ,chunk_t , chunk_t )) compute_secrets;
this->protected.get_prf = (prf_t *(*) (protected_ike_sa_t *)) get_prf;
this->protected.get_key_pr = (chunk_t (*) (protected_ike_sa_t *)) get_key_pr;
+ this->protected.get_key_pi = (chunk_t (*) (protected_ike_sa_t *)) get_key_pi;
this->protected.get_logger = (logger_t *(*) (protected_ike_sa_t *)) get_logger;
this->protected.set_init_config = (void (*) (protected_ike_sa_t *,init_config_t *)) set_init_config;
this->protected.get_init_config = (init_config_t *(*) (protected_ike_sa_t *)) get_init_config;
diff --git a/Source/charon/sa/ike_sa.h b/Source/charon/sa/ike_sa.h
index 9402bf1d2..ffc9bd2f4 100644
--- a/Source/charon/sa/ike_sa.h
+++ b/Source/charon/sa/ike_sa.h
@@ -358,6 +358,16 @@ struct protected_ike_sa_t {
* @return SK_pr key
*/
chunk_t (*get_key_pr) (protected_ike_sa_t *this);
+
+ /**
+ * Gets the Shared key SK_pi.
+ *
+ * Returned value is not cloned!
+ *
+ * @param this calling object
+ * @return SK_pr key
+ */
+ chunk_t (*get_key_pi) (protected_ike_sa_t *this);
/**
* Resets message id counters and does destroy stored received and sent messages.
diff --git a/Source/charon/sa/states/ike_auth_requested.c b/Source/charon/sa/states/ike_auth_requested.c
index 33c050e41..041185ca2 100644
--- a/Source/charon/sa/states/ike_auth_requested.c
+++ b/Source/charon/sa/states/ike_auth_requested.c
@@ -353,7 +353,7 @@ static status_t process_auth_payload(private_ike_auth_requested_t *this, auth_pa
/* TODO VERIFY auth here */
authenticator = authenticator_create(this->ike_sa);
- status = authenticator->verify_auth_data(authenticator,auth_payload,this->ike_sa_init_reply_data,this->sent_nonce,other_id_payload,&verified);
+ status = authenticator->verify_auth_data(authenticator,auth_payload,this->ike_sa_init_reply_data,this->sent_nonce,other_id_payload,FALSE,&verified);
authenticator->destroy(authenticator);
if (status != SUCCESS)
{
diff --git a/Source/charon/sa/states/ike_sa_init_requested.c b/Source/charon/sa/states/ike_sa_init_requested.c
index 1013eaedc..967aebb2b 100644
--- a/Source/charon/sa/states/ike_sa_init_requested.c
+++ b/Source/charon/sa/states/ike_sa_init_requested.c
@@ -506,7 +506,7 @@ static status_t build_auth_payload (private_ike_sa_init_requested_t *this, paylo
status_t status;
authenticator = authenticator_create(this->ike_sa);
- status = authenticator->compute_auth_data(authenticator,&auth_payload,this->ike_sa_init_request_data,this->received_nonce,my_id_payload);
+ status = authenticator->compute_auth_data(authenticator,&auth_payload,this->ike_sa_init_request_data,this->received_nonce,my_id_payload,TRUE);
authenticator->destroy(authenticator);
if (status != SUCCESS)
diff --git a/Source/charon/sa/states/ike_sa_init_responded.c b/Source/charon/sa/states/ike_sa_init_responded.c
index 31d41cbf4..1dd16f669 100644
--- a/Source/charon/sa/states/ike_sa_init_responded.c
+++ b/Source/charon/sa/states/ike_sa_init_responded.c
@@ -356,7 +356,7 @@ static status_t build_auth_payload(private_ike_sa_init_responded_t *this, auth_p
authenticator = authenticator_create(this->ike_sa);
- status = authenticator->verify_auth_data(authenticator,auth_request, this->ike_sa_init_request_data,this->sent_nonce,other_id_payload,&verified);
+ status = authenticator->verify_auth_data(authenticator,auth_request, this->ike_sa_init_request_data,this->sent_nonce,other_id_payload,TRUE,&verified);
if (status != SUCCESS)
{
@@ -371,7 +371,7 @@ static status_t build_auth_payload(private_ike_sa_init_responded_t *this, auth_p
return FAILED;
}
- status = authenticator->compute_auth_data(authenticator,&auth_reply, this->ike_sa_init_response_data,this->received_nonce,my_id_payload);
+ status = authenticator->compute_auth_data(authenticator,&auth_reply, this->ike_sa_init_response_data,this->received_nonce,my_id_payload,FALSE);
authenticator->destroy(authenticator);
if (status != SUCCESS)
{
diff --git a/Source/charon/utils/logger_manager.c b/Source/charon/utils/logger_manager.c
index 631f8f112..91f83a7f4 100644
--- a/Source/charon/utils/logger_manager.c
+++ b/Source/charon/utils/logger_manager.c
@@ -148,12 +148,12 @@ static logger_t *create_logger(private_logger_manager_t *this, logger_context_t
case IKE_SA:
logger_level |= FULL;
case IKE_SA_MANAGER:
- case MESSAGE:
- case ENCRYPTION_PAYLOAD:
case WORKER:
case CONFIGURATION_MANAGER:
logger_level |= ALL;
- case PARSER:
+ case MESSAGE:
+ case ENCRYPTION_PAYLOAD:
+
case GENERATOR:
case THREAD_POOL:
case SCHEDULER:
@@ -161,8 +161,10 @@ static logger_t *create_logger(private_logger_manager_t *this, logger_context_t
case RECEIVER:
case SOCKET:
case DAEMON:
+ logger_level |= CONTROL;
+ case PARSER:
log_thread_ids = FALSE;
- logger_level |= ERROR|CONTROL;
+ logger_level |= ERROR;
break;
}