aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorReto Buerki <reet@codelabs.ch>2012-08-31 12:58:00 +0200
committerTobias Brunner <tobias@strongswan.org>2013-03-19 15:23:47 +0100
commit9df5645623aa19959eaa7648f15caff6387f8fd0 (patch)
tree3c5e75cbf1331138b8d867c38570dfebb242841f /src
parent071e792a85f2128f07d2cbf1c1c9ab7531131c1f (diff)
downloadstrongswan-9df5645623aa19959eaa7648f15caff6387f8fd0.tar.bz2
strongswan-9df5645623aa19959eaa7648f15caff6387f8fd0.tar.xz
listener: Register message hook
Use the message hook to save the AUTHENTICATION payload of an incoming IKE_AUTH message. The AUTH payload will be passed on to the TKM ike_isa_auth operation in the authorize hook.
Diffstat (limited to 'src')
-rw-r--r--src/charon-tkm/src/tkm/tkm_listener.c42
1 files changed, 42 insertions, 0 deletions
diff --git a/src/charon-tkm/src/tkm/tkm_listener.c b/src/charon-tkm/src/tkm/tkm_listener.c
index ee8fb4925..536ba78b2 100644
--- a/src/charon-tkm/src/tkm/tkm_listener.c
+++ b/src/charon-tkm/src/tkm/tkm_listener.c
@@ -15,6 +15,8 @@
*/
#include <daemon.h>
+#include <encoding/payloads/auth_payload.h>
+#include <utils/chunk.h>
#include <tkm/types.h>
#include "tkm_listener.h"
@@ -47,10 +49,49 @@ METHOD(listener_t, authorize, bool,
const isa_id_type isa_id = keymat->get_isa_id(keymat);
DBG1(DBG_IKE, "TKM authorize listener called for ISA context %llu", isa_id);
+ const chunk_t * const auth = keymat->get_auth_payload(keymat);
+ if (!auth->ptr)
+ {
+ DBG1(DBG_IKE, "no AUTHENTICATION data available");
+ *success = FALSE;
+ }
+
+ DBG1(DBG_IKE, "TKM based authentication successful"
+ " for ISA context %llu", isa_id);
*success = TRUE;
return TRUE;
}
+METHOD(listener_t, message, bool,
+ private_tkm_listener_t *this, ike_sa_t *ike_sa,
+ message_t *message, bool incoming, bool plain)
+{
+ if (!incoming || !plain || message->get_exchange_type(message) != IKE_AUTH)
+ {
+ return TRUE;
+ }
+
+ tkm_keymat_t * const keymat = (tkm_keymat_t*)ike_sa->get_keymat(ike_sa);
+ const isa_id_type isa_id = keymat->get_isa_id(keymat);
+ DBG1(DBG_IKE, "saving AUTHENTICATION payload for authorize hook"
+ " (ISA context %llu)", isa_id);
+
+ auth_payload_t * const auth_payload =
+ (auth_payload_t*)message->get_payload(message, AUTHENTICATION);
+ if (auth_payload)
+ {
+ const chunk_t auth_data = auth_payload->get_data(auth_payload);
+ keymat->set_auth_payload(keymat, &auth_data);
+ }
+ else
+ {
+ DBG1(DBG_IKE, "unable to extract AUTHENTICATION payload, authorize will"
+ " fail");
+ }
+
+ return TRUE;
+}
+
METHOD(tkm_listener_t, destroy, void,
private_tkm_listener_t *this)
{
@@ -68,6 +109,7 @@ tkm_listener_t *tkm_listener_create()
.public = {
.listener = {
.authorize = _authorize,
+ .message = _message,
},
.destroy = _destroy,
},