1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49
|
/* IKEv2 CERTREQ payload, for libreswan
*
* Copyright (C) 2022 Andrew Cagney
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
#ifndef IKEV2_CERTREQ_H
#define IKEV2_CERTREQ_H
#include <stdbool.h>
#include "demux.h" /* HACK to expose pbs_out macro */
struct ike_sa;
struct msg_digest;
struct pbs_out;
struct state;
/*
* CERTREQ payloads are sent in the message just prior to the CERT:
*
* + in the IKE_SA_INIT response so that the initiator knows to
* include its certificate in the IKE_AUTH request; except, at this
* point, the responder has no clue who the initiator is
*
* + in the IKE_AUTH request so that the responder knows to include
* the certificate in its IKE_AUTH response; hopefully the initiator
* knows which responder they are expecting
*
* Returning FALSE here indicates STF_INTERNAL_ERROR.
*/
bool need_v2CERTREQ_in_IKE_AUTH_request(const struct ike_sa *ike);
bool need_v2CERTREQ_in_IKE_SA_INIT_response(const struct ike_sa *ike);
stf_status emit_v2CERTREQ(const struct ike_sa *ike, struct pbs_out *outpbs);
void process_v2CERTREQ_payload(struct ike_sa *ike, struct msg_digest *md);
#endif
|