aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorReto Buerki <reet@codelabs.ch>2012-08-30 11:25:14 +0200
committerTobias Brunner <tobias@strongswan.org>2013-03-19 15:23:46 +0100
commite7a497c30761a7e949ea928401a785eecd6db31b (patch)
treeaad718d2508ab1f720d734bbeddb6f04157e093c /src
parent51fdbd042901635280f98d4ee96231b2890f7feb (diff)
downloadstrongswan-e7a497c30761a7e949ea928401a785eecd6db31b.tar.bz2
strongswan-e7a497c30761a7e949ea928401a785eecd6db31b.tar.xz
keymat: Check for aes256-sha512 in derive_ike_keys
Return FALSE if peers try to use other algorithm combinations.
Diffstat (limited to 'src')
-rw-r--r--src/charon-tkm/src/tkm/tkm_keymat.c8
1 files changed, 8 insertions, 0 deletions
diff --git a/src/charon-tkm/src/tkm/tkm_keymat.c b/src/charon-tkm/src/tkm/tkm_keymat.c
index 0c71967e3..43e0c1f02 100644
--- a/src/charon-tkm/src/tkm/tkm_keymat.c
+++ b/src/charon-tkm/src/tkm/tkm_keymat.c
@@ -179,6 +179,14 @@ METHOD(tkm_keymat_t, derive_ike_keys, bool,
INTEGRITY_ALGORITHM);
return FALSE;
}
+ if (!(enc_alg == ENCR_AES_CBC && key_size == 256 &&
+ int_alg == AUTH_HMAC_SHA2_512_256))
+ {
+ DBG1(DBG_IKE, "the TKM only supports aes256-sha512 at the moment, please"
+ " update your configuration");
+ return FALSE;
+ }
+
DBG2(DBG_IKE, "using %N for encryption, %N for integrity",
encryption_algorithm_names, enc_alg,
integrity_algorithm_names, int_alg);