memcpy(this->server_random, random.ptr, sizeof(this->server_random));
- DBG1(DBG_IKE, "received TLS version: %N", tls_version_names, version);
if (version < this->tls->get_version(this->tls))
{
this->tls->set_version(this->tls, version);
}
-
suite = cipher;
- DBG1(DBG_IKE, "received TLS cipher suite: %N", tls_cipher_suite_names, suite);
if (!this->crypto->select_cipher_suite(this->crypto, &suite, 1))
{
- DBG1(DBG_IKE, "received TLS cipher suite inacceptable");
+ DBG1(DBG_IKE, "received TLS cipher suite %N inacceptable",
+ tls_cipher_suite_names, suite);
return FAILED;
}
+ DBG1(DBG_IKE, "negotiated TLS version %N with suite %N",
+ tls_version_names, version, tls_cipher_suite_names, suite);
this->state = STATE_HELLO_RECEIVED;
return NEED_MORE;
}
CERT_X509, KEY_ANY, id, TRUE);
if (cert)
{
- DBG1(DBG_IKE, "received cert request for '%Y", id);
+ DBG1(DBG_IKE, "received TLS cert request for '%Y", id);
this->peer_auth->add(this->peer_auth, AUTH_RULE_CA_CERT, cert);
}
else
{
- DBG1(DBG_IKE, "received cert request for unknown CA '%Y'", id);
+ DBG1(DBG_IKE, "received TLS cert request for unknown CA '%Y'", id);
}
id->destroy(id);
}
/* TLS version */
version = this->tls->get_version(this->tls);
- DBG1(DBG_IKE, "sending TLS version: %N", tls_version_names, version);
writer->write_uint16(writer, version);
writer->write_data(writer, chunk_from_thing(this->client_random));
memcpy(this->client_random, random.ptr, sizeof(this->client_random));
- DBG1(DBG_IKE, "received TLS version: %N", tls_version_names, version);
if (version < this->tls->get_version(this->tls))
{
this->tls->set_version(this->tls, version);
this->suite = this->crypto->select_cipher_suite(this->crypto, suites, count);
if (!this->suite)
{
- DBG1(DBG_IKE, "received cipher suite inacceptable");
+ DBG1(DBG_IKE, "received cipher suites inacceptable");
return FAILED;
}
+ DBG1(DBG_IKE, "negotiated TLS version %N with suite %N",
+ tls_version_names, version, tls_cipher_suite_names, this->suite);
this->state = STATE_HELLO_RECEIVED;
return NEED_MORE;
}
/* TLS version */
version = this->tls->get_version(this->tls);
- DBG1(DBG_IKE, "sending TLS version: %N", tls_version_names, version);
writer->write_uint16(writer, version);
writer->write_data(writer, chunk_from_thing(this->server_random));
writer->write_data8(writer, chunk_empty);
/* add selected TLS cipher suite */
- DBG1(DBG_IKE, "sending TLS cipher suite: %N", tls_cipher_suite_names,
- this->suite);
+ DBG2(DBG_IKE, "sending TLS cipher suite: %N",
+ tls_cipher_suite_names, this->suite);
writer->write_uint16(writer, this->suite);
/* NULL compression only */
if (x509->get_flags(x509) & X509_CA)
{
id = cert->get_subject(cert);
+ DBG1(DBG_IKE, "sending TLS cert request for '%Y'", id);
authorities->write_data16(authorities, id->get_encoding(id));
}
}