"secure password method",
"NULL authentication",
"digital signature");
-ENUM_NEXT(auth_method_names, AUTH_BLISS, AUTH_BLISS, AUTH_DS,
- "BLISS signature");
-ENUM_NEXT(auth_method_names, AUTH_XAUTH_INIT_PSK, AUTH_HYBRID_RESP_RSA, AUTH_BLISS,
+ENUM_NEXT(auth_method_names, AUTH_XAUTH_INIT_PSK, AUTH_HYBRID_RESP_RSA, AUTH_DS,
"XAuthInitPSK",
"XAuthRespPSK",
"XAuthInitRSA",
case AUTH_ECDSA_384:
case AUTH_ECDSA_521:
case AUTH_DS:
- case AUTH_BLISS:
return (authenticator_t*)pubkey_authenticator_create_verifier(ike_sa,
sent_nonce, received_init, reserved);
case AUTH_PSK:
return status;
}
break;
- case KEY_BLISS:
- /* we currently use SHA512 only */
- scheme = SIGN_BLISS_WITH_SHA512;
- auth_method = AUTH_BLISS;
- break;
default:
DBG1(DBG_IKE, "private key of type %N not supported",
key_type_names, private->get_type(private));
case AUTH_ECDSA_521:
scheme = SIGN_ECDSA_521;
break;
- case AUTH_BLISS:
- key_type = KEY_BLISS;
- scheme = SIGN_BLISS_WITH_SHA512;
- break;
case AUTH_DS:
if (parse_signature_auth_data(&auth_data, &key_type, &scheme))
{