summaryrefslogtreecommitdiff
path: root/src/libcharon/sa/tasks/ike_cert_pre.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/libcharon/sa/tasks/ike_cert_pre.c')
-rw-r--r--src/libcharon/sa/tasks/ike_cert_pre.c33
1 files changed, 33 insertions, 0 deletions
diff --git a/src/libcharon/sa/tasks/ike_cert_pre.c b/src/libcharon/sa/tasks/ike_cert_pre.c
index 1c0c54727..8da8d549a 100644
--- a/src/libcharon/sa/tasks/ike_cert_pre.c
+++ b/src/libcharon/sa/tasks/ike_cert_pre.c
@@ -76,6 +76,10 @@ static void process_certreqs(private_ike_cert_pre_t *this, message_t *message)
{
certreq_payload_t *certreq = (certreq_payload_t*)payload;
enumerator_t *enumerator;
+<<<<<<< HEAD
+=======
+ u_int unknown = 0;
+>>>>>>> upstream/4.5.1
chunk_t keyid;
this->ike_sa->set_condition(this->ike_sa, COND_CERTREQ_SEEN, TRUE);
@@ -103,12 +107,26 @@ static void process_certreqs(private_ike_cert_pre_t *this, message_t *message)
}
else
{
+<<<<<<< HEAD
DBG1(DBG_IKE, "received cert request for unknown ca "
"with keyid %Y", id);
+=======
+ DBG2(DBG_IKE, "received cert request for unknown ca "
+ "with keyid %Y", id);
+ unknown++;
+>>>>>>> upstream/4.5.1
}
id->destroy(id);
}
enumerator->destroy(enumerator);
+<<<<<<< HEAD
+=======
+ if (unknown)
+ {
+ DBG1(DBG_IKE, "received %u cert requests for an unknown ca",
+ unknown);
+ }
+>>>>>>> upstream/4.5.1
break;
}
case NOTIFY:
@@ -253,11 +271,26 @@ static void process_certs(private_ike_cert_pre_t *this, message_t *message)
}
break;
}
+<<<<<<< HEAD
+=======
+ case ENC_CRL:
+ cert = cert_payload->get_cert(cert_payload);
+ if (cert)
+ {
+ DBG1(DBG_IKE, "received CRL \"%Y\"",
+ cert->get_subject(cert));
+ auth->add(auth, AUTH_HELPER_REVOCATION_CERT, cert);
+ }
+ break;
+>>>>>>> upstream/4.5.1
case ENC_PKCS7_WRAPPED_X509:
case ENC_PGP:
case ENC_DNS_SIGNED_KEY:
case ENC_KERBEROS_TOKEN:
+<<<<<<< HEAD
case ENC_CRL:
+=======
+>>>>>>> upstream/4.5.1
case ENC_ARL:
case ENC_SPKI:
case ENC_X509_ATTRIBUTE: