aboutsummaryrefslogtreecommitdiffstats
path: root/src/libcharon/sa/ikev2/keymat_v2.c
diff options
context:
space:
mode:
authorMartin Willi <martin@revosec.ch>2012-07-06 10:47:20 +0200
committerMartin Willi <martin@revosec.ch>2012-07-16 14:53:34 +0200
commit2baae8e3ea121a706b911f9dad3f1078ccf4905f (patch)
treef7d2bc0827a4c6cc9598cc90cd6a0942e425d7b3 /src/libcharon/sa/ikev2/keymat_v2.c
parentbc4748832395a5db4b71cb38d37f75de0d6e9416 (diff)
downloadstrongswan-2baae8e3ea121a706b911f9dad3f1078ccf4905f.tar.bz2
strongswan-2baae8e3ea121a706b911f9dad3f1078ccf4905f.tar.xz
Add a return value to keymat_v2_t.get_psk_sig()
Diffstat (limited to 'src/libcharon/sa/ikev2/keymat_v2.c')
-rw-r--r--src/libcharon/sa/ikev2/keymat_v2.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/src/libcharon/sa/ikev2/keymat_v2.c b/src/libcharon/sa/ikev2/keymat_v2.c
index 3e36b098f..86bc85967 100644
--- a/src/libcharon/sa/ikev2/keymat_v2.c
+++ b/src/libcharon/sa/ikev2/keymat_v2.c
@@ -606,11 +606,11 @@ METHOD(keymat_v2_t, get_auth_octets, chunk_t,
#define IKEV2_KEY_PAD "Key Pad for IKEv2"
#define IKEV2_KEY_PAD_LENGTH 17
-METHOD(keymat_v2_t, get_psk_sig, chunk_t,
- private_keymat_v2_t *this, bool verify, chunk_t ike_sa_init,
- chunk_t nonce, chunk_t secret, identification_t *id, char reserved[3])
+METHOD(keymat_v2_t, get_psk_sig, bool,
+ private_keymat_v2_t *this, bool verify, chunk_t ike_sa_init, chunk_t nonce,
+ chunk_t secret, identification_t *id, char reserved[3], chunk_t *sig)
{
- chunk_t key_pad, key, sig, octets;
+ chunk_t key_pad, key, octets;
if (!secret.len)
{ /* EAP uses SK_p if no MSK has been established */
@@ -622,14 +622,14 @@ METHOD(keymat_v2_t, get_psk_sig, chunk_t,
this->prf->set_key(this->prf, secret);
this->prf->allocate_bytes(this->prf, key_pad, &key);
this->prf->set_key(this->prf, key);
- this->prf->allocate_bytes(this->prf, octets, &sig);
+ this->prf->allocate_bytes(this->prf, octets, sig);
DBG4(DBG_IKE, "secret %B", &secret);
DBG4(DBG_IKE, "prf(secret, keypad) %B", &key);
- DBG3(DBG_IKE, "AUTH = prf(prf(secret, keypad), octets) %B", &sig);
+ DBG3(DBG_IKE, "AUTH = prf(prf(secret, keypad), octets) %B", sig);
chunk_free(&octets);
chunk_free(&key);
- return sig;
+ return TRUE;
}
METHOD(keymat_t, destroy, void,