51069772035c2d9e0c690735a6134583cc53a026
[strongswan.git] / Source / charon / sa / states / ike_sa_init_requested.c
1 /**
2 * @file ike_sa_init_requested.c
3 *
4 * @brief State of a IKE_SA after requesting an IKE_SA_INIT
5 *
6 */
7
8 /*
9 * Copyright (C) 2005 Jan Hutter, Martin Willi
10 * Hochschule fuer Technik Rapperswil
11 *
12 * This program is free software; you can redistribute it and/or modify it
13 * under the terms of the GNU General Public License as published by the
14 * Free Software Foundation; either version 2 of the License, or (at your
15 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
16 *
17 * This program is distributed in the hope that it will be useful, but
18 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
19 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
20 * for more details.
21 */
22
23 #include "ike_sa_init_requested.h"
24
25 #include <globals.h>
26 #include <utils/allocator.h>
27 #include <encoding/payloads/sa_payload.h>
28 #include <encoding/payloads/ke_payload.h>
29 #include <encoding/payloads/nonce_payload.h>
30 #include <transforms/diffie_hellman.h>
31
32
33 typedef struct private_ike_sa_init_requested_t private_ike_sa_init_requested_t;
34
35 /**
36 * Private data of a ike_sa_init_requested_t object.
37 *
38 */
39 struct private_ike_sa_init_requested_t {
40 /**
41 * methods of the state_t interface
42 */
43 ike_sa_init_requested_t public;
44
45 /**
46 * Assigned IKE_SA
47 */
48 protected_ike_sa_t *ike_sa;
49
50 /**
51 * Diffie Hellman object used to compute shared secret
52 */
53 diffie_hellman_t *diffie_hellman;
54
55 /**
56 * Shared secret of successful exchange
57 */
58 chunk_t shared_secret;
59
60 /**
61 * Sent nonce value
62 */
63 chunk_t sent_nonce;
64
65 /**
66 * Received nonce
67 */
68 chunk_t received_nonce;
69
70 /**
71 * DH group priority used to get dh_group_number from configuration manager.
72 *
73 * Currently uused but usable if informational messages of unsupported dh group number are processed.
74 */
75 u_int16_t dh_group_priority;
76
77 /**
78 * Logger used to log data
79 *
80 * Is logger of ike_sa!
81 */
82 logger_t *logger;
83 };
84
85 /**
86 * Implements state_t.get_state
87 */
88 static status_t process_message(private_ike_sa_init_requested_t *this, message_t *message)
89 {
90 status_t status;
91 iterator_t *payloads;
92 exchange_type_t exchange_type;
93 u_int64_t responder_spi;
94 ike_sa_id_t *ike_sa_id;
95
96
97 exchange_type = message->get_exchange_type(message);
98 if (exchange_type != IKE_SA_INIT)
99 {
100 this->logger->log(this->logger, ERROR | MORE, "Message of type %s not supported in state ike_sa_init_requested",mapping_find(exchange_type_m,exchange_type));
101 return FAILED;
102 }
103
104 if (message->get_request(message))
105 {
106 this->logger->log(this->logger, ERROR | MORE, "Only responses of type IKE_SA_INIT supported in state ike_sa_init_requested");
107 return FAILED;
108 }
109
110 /* parse incoming message */
111 status = message->parse_body(message);
112 if (status != SUCCESS)
113 {
114 this->logger->log(this->logger, ERROR | MORE, "Could not parse body");
115 return status;
116 }
117
118 responder_spi = message->get_responder_spi(message);
119 ike_sa_id = this->ike_sa->public.get_id(&(this->ike_sa->public));
120 ike_sa_id->set_responder_spi(ike_sa_id,responder_spi);
121
122 /* iterate over incoming payloads */
123 status = message->get_payload_iterator(message, &payloads);
124 if (status != SUCCESS)
125 {
126 this->logger->log(this->logger, ERROR, "Could not create payload interator");
127 return status;
128 }
129 while (payloads->has_next(payloads))
130 {
131 payload_t *payload;
132 payloads->current(payloads, (void**)&payload);
133
134 this->logger->log(this->logger, CONTROL|MORE, "Processing payload %s", mapping_find(payload_type_m, payload->get_type(payload)));
135 switch (payload->get_type(payload))
136 {
137 case SECURITY_ASSOCIATION:
138 {
139 sa_payload_t *sa_payload = (sa_payload_t*)payload;
140 iterator_t *suggested_proposals;
141 encryption_algorithm_t encryption_algorithm = ENCR_UNDEFINED;
142 pseudo_random_function_t pseudo_random_function = PRF_UNDEFINED;
143 integrity_algorithm_t integrity_algorithm = AUTH_UNDEFINED;
144 prf_t *prf;
145
146
147 /* get the list of suggested proposals */
148 status = sa_payload->create_proposal_substructure_iterator(sa_payload, &suggested_proposals, TRUE);
149 if (status != SUCCESS)
150 {
151 this->logger->log(this->logger, ERROR, "Fatal errror: Could not create iterator on suggested proposals");
152 payloads->destroy(payloads);
153 return status;
154 }
155
156 /* now let the configuration-manager return the transforms for the given proposal*/
157 this->logger->log(this->logger, CONTROL | MOST, "Get transforms for suggested proposal");
158 status = global_configuration_manager->get_transforms_for_host_and_proposals(global_configuration_manager,
159 this->ike_sa->get_other_host(this->ike_sa), suggested_proposals, &encryption_algorithm,&pseudo_random_function,&integrity_algorithm);
160 if (status != SUCCESS)
161 {
162 this->logger->log(this->logger, ERROR | MORE, "Suggested proposals not supported!");
163 suggested_proposals->destroy(suggested_proposals);
164 payloads->destroy(payloads);
165 return status;
166 }
167 suggested_proposals->destroy(suggested_proposals);
168
169 prf = prf_create(pseudo_random_function);
170 if (prf == NULL)
171 {
172 this->logger->log(this->logger, ERROR | MORE, "PRF type not supported");
173 payloads->destroy(payloads);
174 return FAILED;
175 }
176 this->ike_sa->set_prf(this->ike_sa,prf);
177
178
179 /* ok, we have what we need for sa_payload */
180 break;
181 }
182 case KEY_EXCHANGE:
183 {
184 ke_payload_t *ke_payload = (ke_payload_t*)payload;
185
186 status = this->diffie_hellman->set_other_public_value(this->diffie_hellman, ke_payload->get_key_exchange_data(ke_payload));
187 if (status != SUCCESS)
188 {
189 this->logger->log(this->logger, ERROR, "Could not set other public value for DH exchange. Status %s",mapping_find(status_m,status));
190 payloads->destroy(payloads);
191 return OUT_OF_RES;
192 }
193
194 /* shared secret is computed AFTER processing of all payloads... */
195 break;
196 }
197 case NONCE:
198 {
199 nonce_payload_t *nonce_payload = (nonce_payload_t*)payload;
200
201 if (this->received_nonce.ptr != NULL)
202 {
203 this->logger->log(this->logger, CONTROL | MOST, "Destroy existing received nonce");
204 allocator_free(this->received_nonce.ptr);
205 this->received_nonce.ptr = NULL;
206 this->received_nonce.len = 0;
207 }
208
209 status = nonce_payload->get_nonce(nonce_payload, &(this->received_nonce));
210 if (status != SUCCESS)
211 {
212 this->logger->log(this->logger, ERROR, "Fatal error: Could not get received nonce");
213 payloads->destroy(payloads);
214 return OUT_OF_RES;
215 }
216
217 break;
218 }
219 default:
220 {
221 this->logger->log(this->logger, ERROR, "Fatal errror: Payload type not supported!!!!");
222 payloads->destroy(payloads);
223 return FAILED;
224 }
225
226 }
227
228 }
229 payloads->destroy(payloads);
230
231 if (this->shared_secret.ptr != NULL)
232 {
233 this->logger->log(this->logger, CONTROL | MOST, "Destroy existing shared_secret");
234 allocator_free(this->shared_secret.ptr);
235 this->shared_secret.ptr = NULL;
236 this->shared_secret.len = 0;
237 }
238
239
240 /* store shared secret */
241 this->logger->log(this->logger, CONTROL | MOST, "Retrieve shared secret and store it");
242 status = this->diffie_hellman->get_shared_secret(this->diffie_hellman, &(this->shared_secret));
243 this->logger->log_chunk(this->logger, PRIVATE, "Shared secret", &this->shared_secret);
244
245 status = this->ike_sa->compute_secrets(this->ike_sa,this->shared_secret,this->sent_nonce, this->received_nonce);
246 if (status != SUCCESS)
247 {
248 /* secrets could not be computed */
249 this->logger->log(this->logger, ERROR | MORE, "Secrets could not be computed!");
250 return status;
251 }
252
253
254
255
256 /****************************
257 *
258 * TODO
259 *
260 * Send IKE_SA_AUTH request
261 *
262 * Make state change
263 *
264 ****************************/
265
266
267 /* set up the reply */
268 // status = this->ike_sa->build_message(this->ike_sa, IKE_SA_INIT, FALSE, &response);
269 // if (status != SUCCESS)
270 // {
271 // return status;
272 // }
273
274 // response->destroy(response);
275
276
277
278 return SUCCESS;
279 }
280
281 /**
282 * Implements state_t.get_state
283 */
284 static ike_sa_state_t get_state(private_ike_sa_init_requested_t *this)
285 {
286 return IKE_SA_INIT_REQUESTED;
287 }
288
289 /**
290 * Implements state_t.get_state
291 */
292 static status_t destroy(private_ike_sa_init_requested_t *this)
293 {
294 this->logger->log(this->logger, CONTROL | MORE, "Going to destroy state of type ike_sa_init_requested_t");
295
296 this->logger->log(this->logger, CONTROL | MOST, "Destroy diffie hellman object");
297 this->diffie_hellman->destroy(this->diffie_hellman);
298 if (this->sent_nonce.ptr != NULL)
299 {
300 this->logger->log(this->logger, CONTROL | MOST, "Destroy sent nonce");
301 allocator_free(this->sent_nonce.ptr);
302 }
303 if (this->received_nonce.ptr != NULL)
304 {
305 this->logger->log(this->logger, CONTROL | MOST, "Destroy received nonce");
306 allocator_free(this->received_nonce.ptr);
307 }
308
309 if (this->shared_secret.ptr != NULL)
310 {
311 this->logger->log(this->logger, CONTROL | MOST, "Destroy shared secret");
312 allocator_free(this->shared_secret.ptr);
313 }
314
315 allocator_free(this);
316 return SUCCESS;
317 }
318
319 /*
320 * Described in header.
321 */
322 ike_sa_init_requested_t *ike_sa_init_requested_create(protected_ike_sa_t *ike_sa,u_int16_t dh_group_priority, diffie_hellman_t *diffie_hellman, chunk_t sent_nonce)
323 {
324 private_ike_sa_init_requested_t *this = allocator_alloc_thing(private_ike_sa_init_requested_t);
325
326 if (this == NULL)
327 {
328 return NULL;
329 }
330
331 /* interface functions */
332 this->public.state_interface.process_message = (status_t (*) (state_t *,message_t *)) process_message;
333 this->public.state_interface.get_state = (ike_sa_state_t (*) (state_t *)) get_state;
334 this->public.state_interface.destroy = (status_t (*) (state_t *)) destroy;
335
336 /* private data */
337 this->ike_sa = ike_sa;
338 this->received_nonce.ptr = NULL;
339 this->received_nonce.len = 0;
340 this->shared_secret.ptr = NULL;
341 this->shared_secret.len = 0;
342 this->logger = this->ike_sa->get_logger(this->ike_sa);
343 this->diffie_hellman = diffie_hellman;
344 this->sent_nonce = sent_nonce;
345 this->dh_group_priority = dh_group_priority;
346
347 return &(this->public);
348 }