aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorAndreas Steffen <andreas.steffen@strongswan.org>2006-09-25 06:11:09 +0000
committerAndreas Steffen <andreas.steffen@strongswan.org>2006-09-25 06:11:09 +0000
commitb826069dbb9209137ffce76c51dba802b33a43f4 (patch)
tree7b307dc28d5aaee0599e380bcebe5c24ad4efe4e /src
parentd756cd1bd648487d7f9a365b3e8890ac5dc86d01 (diff)
downloadstrongswan-b826069dbb9209137ffce76c51dba802b33a43f4.tar.bz2
strongswan-b826069dbb9209137ffce76c51dba802b33a43f4.tar.xz
moved auth_method to policy
Diffstat (limited to 'src')
-rw-r--r--src/charon/sa/transactions/ike_auth.c12
1 files changed, 7 insertions, 5 deletions
diff --git a/src/charon/sa/transactions/ike_auth.c b/src/charon/sa/transactions/ike_auth.c
index e32dc3c72..fae29426e 100644
--- a/src/charon/sa/transactions/ike_auth.c
+++ b/src/charon/sa/transactions/ike_auth.c
@@ -262,7 +262,7 @@ static status_t get_request(private_ike_auth_t *this, message_t **result)
}
/* build certificate payload. TODO: Handle certreq from init_ike_sa. */
- if (this->connection->get_auth_method(this->connection) == RSA_DIGITAL_SIGNATURE
+ if (this->policy->get_auth_method(this->policy) == RSA_DIGITAL_SIGNATURE
&& this->connection->get_cert_policy(this->connection) != CERT_NEVER_SEND)
{
cert_payload_t *cert_payload;
@@ -296,7 +296,7 @@ static status_t get_request(private_ike_auth_t *this, message_t **result)
auth_method_t auth_method;
status_t status;
- auth_method = this->connection->get_auth_method(this->connection);
+ auth_method = this->policy->get_auth_method(this->policy);
authenticator = authenticator_create(this->ike_sa, auth_method);
status = authenticator->compute_auth_data(authenticator,
&auth_payload,
@@ -328,6 +328,7 @@ static status_t get_request(private_ike_auth_t *this, message_t **result)
this->child_sa = child_sa_create(this->reqid, me, other, my_id, other_id,
soft_lifetime, hard_lifetime,
this->policy->get_updown(this->policy),
+ this->policy->get_hostaccess(this->policy),
enable_natt);
this->child_sa->set_name(this->child_sa, this->policy->get_name(this->policy));
if (this->child_sa->alloc(this->child_sa, proposal_list) != SUCCESS)
@@ -711,7 +712,7 @@ static status_t get_response(private_ike_auth_t *this, message_t *request,
response->add_payload(response, (payload_t*)idr_response);
}
- if (this->connection->get_auth_method(this->connection) == RSA_DIGITAL_SIGNATURE
+ if (this->policy->get_auth_method(this->policy) == RSA_DIGITAL_SIGNATURE
&& this->connection->get_cert_policy(this->connection) != CERT_NEVER_SEND)
{ /* build certificate payload */
x509_t *cert;
@@ -741,7 +742,7 @@ static status_t get_response(private_ike_auth_t *this, message_t *request,
auth_method_t auth_method;
status_t status;
- auth_method = this->connection->get_auth_method(this->connection);
+ auth_method = this->policy->get_auth_method(this->policy);
authenticator = authenticator_create(this->ike_sa, auth_method);
status = authenticator->verify_auth_data(authenticator, auth_request,
this->init_request,
@@ -813,6 +814,7 @@ static status_t get_response(private_ike_auth_t *this, message_t *request,
this->child_sa = child_sa_create(this->reqid, me, other, my_id, other_id,
soft_lifetime, hard_lifetime,
this->policy->get_updown(this->policy),
+ this->policy->get_hostaccess(this->policy),
use_natt);
this->child_sa->set_name(this->child_sa, this->policy->get_name(this->policy));
if (install_child_sa(this, FALSE) != SUCCESS)
@@ -957,7 +959,7 @@ static status_t conclude(private_ike_auth_t *this, message_t *response,
identification_t *my_id;
status_t status;
- auth_method = this->connection->get_auth_method(this->connection);
+ auth_method = this->policy->get_auth_method(this->policy);
authenticator = authenticator_create(this->ike_sa, auth_method);
my_id = this->policy->get_my_id(this->policy);