]> git.ipfire.org Git - thirdparty/strongswan.git/blame - programs/charon/charon/sa/states/ike_auth_requested.h
- import of strongswan-2.7.0
[thirdparty/strongswan.git] / programs / charon / charon / sa / states / ike_auth_requested.h
CommitLineData
c7dd2a7b
MW
1/**
2 * @file ike_auth_requested.h
3 *
df3c59d0 4 * @brief Interface of ike_auth_requested_t.
c7dd2a7b
MW
5 *
6 */
7
8/*
9 * Copyright (C) 2005 Jan Hutter, Martin Willi
10 * Hochschule fuer Technik Rapperswil
11 *
12 * This program is free software; you can redistribute it and/or modify it
13 * under the terms of the GNU General Public License as published by the
14 * Free Software Foundation; either version 2 of the License, or (at your
15 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
16 *
17 * This program is distributed in the hope that it will be useful, but
18 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
19 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
20 * for more details.
21 */
22
23#ifndef IKE_AUTH_REQUESTED_H_
24#define IKE_AUTH_REQUESTED_H_
25
26#include <sa/states/state.h>
27#include <sa/ike_sa.h>
28
5796aa16
MW
29
30typedef struct ike_auth_requested_t ike_auth_requested_t;
31
c7dd2a7b
MW
32/**
33 * @brief This class represents an IKE_SA, which has requested an IKE_AUTH.
df3c59d0 34 *
016dfc72 35 * The state accpets IKE_AUTH responses. It proves the authenticity
9affa65c
JH
36 * and sets up the first child sa. After that, it changes IKE_SA state to
37 * IKE_SA_ESTABLISHED.
38 *
39 * @ Constructors:
40 * - ike_auth_requested_create()
016dfc72 41 *
283dbcc5
MW
42 * @todo handle certificate payloads
43 *
df3c59d0 44 * @ingroup states
c7dd2a7b 45 */
5796aa16 46struct ike_auth_requested_t {
c7dd2a7b 47 /**
9affa65c 48 * The state_t interface.
c7dd2a7b
MW
49 */
50 state_t state_interface;
51
52};
53
54/**
55 * Constructor of class ike_auth_requested_t
56 *
9affa65c
JH
57 * @param ike_sa assigned ike_sa object
58 * @param sent_nonce Sent nonce value in IKE_SA_INIT request
59 * @param received_nonce Received nonce value in IKE_SA_INIT response
283dbcc5 60 * @param ike_sa_init_reply_data binary representation of IKE_SA_INIT reply
30b5b412 61 * @param child_sa opened but not completed child_sa
9affa65c 62 * @return created ike_auth_requested_t object
df3c59d0
MW
63 *
64 * @ingroup states
c7dd2a7b 65 */
9affa65c
JH
66ike_auth_requested_t *ike_auth_requested_create(protected_ike_sa_t *ike_sa,
67 chunk_t sent_nonce,
68 chunk_t received_nonce,
30b5b412
MW
69 chunk_t ike_sa_init_reply_data,
70 child_sa_t *child_sa);
c7dd2a7b
MW
71
72#endif /*IKE_AUTH_REQUESTED_H_*/