blob: 69e5969593459370f595ca325bb5d7b85a84273a (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
|
/*
* Copyright (C) 2011 Martin Willi
* Copyright (C) 2011 revosec AG
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
/**
* @defgroup hybrid_authenticator hybrid_authenticator
* @{ @ingroup authenticators_v1
*/
#ifndef HYBRID_AUTHENTICATOR_H_
#define HYBRID_AUTHENTICATOR_H_
typedef struct hybrid_authenticator_t hybrid_authenticator_t;
#include <sa/authenticator.h>
/**
* Implementation of authenticator_t using IKEv1 hybrid authentication.
*/
struct hybrid_authenticator_t {
/**
* Implemented authenticator_t interface.
*/
authenticator_t authenticator;
};
/**
* Create an authenticator to build hybrid signatures.
*
* @param ike_sa associated IKE_SA
* @param initiator TRUE if we are the IKE_SA initiator
* @param dh diffie hellman key exchange
* @param dh_value others public diffie hellman value
* @param sa_payload generated SA payload data, without payload header
* @param id_payload encoded ID payload of peer to authenticate or verify
* without payload header (gets owned)
* @return hybrid authenticator
*/
hybrid_authenticator_t *hybrid_authenticator_create(ike_sa_t *ike_sa,
bool initiator, diffie_hellman_t *dh,
chunk_t dh_value, chunk_t sa_payload,
chunk_t id_payload);
#endif /** HYBRID_AUTHENTICATOR_H_ @}*/
|