| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
| |
| |
| |
| | |
This listener gets informed about IKE authorization rounds and will be
used to call ike_isa_auth on a given ISA.
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
Return FALSE if peers try to use other algorithm combinations.
|
| |
| |
| |
| | |
Get PSK signed AUTH octets from TKM in initiator case.
|
| |
| |
| |
| |
| | |
Introduce static aead_create_from_keys function to initialize AEAD
transforms from key chunks.
|
| | |
|
| |
| |
| |
| |
| |
| |
| | |
Create and initialize AEAD transforms with keys derived by the TKM.
Return these transforms in the get_aead function.
IKE keys used by charon are derived by TKM now.
|
| |
| |
| |
| |
| | |
Extract encryption and integrity algorithms from proposal and check them
before deriving IKE keys.
|
| | |
|
| |
| |
| |
| | |
This function converts a given chunk to a variable-length byte sequence.
|
| |
| |
| |
| |
| | |
This function converts a given TKM variable-length byte sequence to
chunk.
|
| | |
|
| | |
|
| |
| |
| |
| |
| | |
To derive IKE keys using TKM the nonce context id of the local nonce is needed.
Get the id for a given chunk using the chunk map.
|
| | |
|
| |
| |
| |
| |
| | |
This data structure allows to store mappings of chunks to ids. This will
be used to map nonces to their corresponding nonce context ids.
|
| | |
|
| |
| |
| |
| |
| | |
This way we don't need to manually initialize the slot status; free
slots are now indicated by 0 though.
|
| |
| |
| |
| |
| |
| | |
Forward incoming calls to default ikev2 keymat instance. This is needed
to make a stepwise migration to TKM keymat possible. It will be removed
once the corresponding parts are implemented in the TKM.
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| | |
Instead of storing the acquired context ids in a linked list, use an
array of booleans for the job. A boolean value of true in the array
designates an available context id.
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The tkm_diffie_hellman_t plugin acquires a DH context from the Trusted
Key Manager and uses it to get a DH public value and the calculated
shared secret. Proper context handling is still missing though, the
plugin currently uses context ID 1.
The get_shared_secret function will be removed as soon as the TKM
specific keymat is ready.
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Analogous to charon-nm the charon-tkm daemon is a specialized charon
instance used in combination with the trusted key manager (TKM) written
in Ada.
The charon-tkm is basically a copy of the charon-nm code which will
register it's own TKM specific plugins.
The daemon binary is built using the gprbuild utility. This is needed
because it uses the tkm-rpc Ada library and consequently the Ada
runtime. gprbuild takes care of the complete binding and linker steps
required to properly initialize the Ada runtime.
|
| |
| |
| |
| |
| |
| |
| |
| | |
A daemon can be specified using the '--daemon' command line parameter. This
tells starter to invoke a daemon other than 'charon'.
Additionally the ipsec script uses the environment variable DAEMON_NAME to tell
the starter which daemon to use.
|
|/
|
|
|
|
|
|
|
|
|
|
| |
This configure option enables check-based unit testing. Check is a unit
test framework for C [1].
The unit tests can be executed by issuing the following command in the
toplevel build directory:
make check
[1] - http://check.sourceforge.net/
|
|
|
|
| |
This allows to e.g. load Cisco-specific attributes that contain FQDNs.
|
| |
|
|
|
|
| |
certain time frame
|
|
|
|
|
|
|
| |
This simplifies capturing traffic with Wireshark on the host as each of
the guest's interfaces is clearly identified.
The three bridges were previously numbered starting from 0, this scheme
is restored here.
|
|
|
|
|
| |
The previously used pc-1.1 is not yet available on e.g. Ubuntu 12.04.
With 'pc' the most current supported version of that type is used.
|
| |
|
|
|
|
| |
It has to be selected explicitly with rightauth2=xauth-noauth.
|
|
|
|
|
|
|
|
| |
This XAuth backend does not do any authentication of client credentials
but simply sends a successful XAuth status to the client, thereby
concluding the XAuth exchange. This can be useful to fallback to basic
RSA authentication with clients that can not be configured without XAuth
authentication.
|
|
|
|
|
| |
Fixes a segfault when receiving an invalid IKE SPI, where we don't have an
IKE_SA for the raised alert.
|
| |
|
|
|
|
|
|
| |
But not all of them can be used with IKEv1.
Fixes #314.
|