- globals packed in a daemon
[strongswan.git] / Source / charon / sa / states / ike_sa_init_requested.c
1 /**
2 * @file ike_sa_init_requested.c
3 *
4 * @brief Implementation of ike_sa_init_requested_t.
5 *
6 */
7
8 /*
9 * Copyright (C) 2005 Jan Hutter, Martin Willi
10 * Hochschule fuer Technik Rapperswil
11 *
12 * This program is free software; you can redistribute it and/or modify it
13 * under the terms of the GNU General Public License as published by the
14 * Free Software Foundation; either version 2 of the License, or (at your
15 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
16 *
17 * This program is distributed in the hope that it will be useful, but
18 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
19 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
20 * for more details.
21 */
22
23 #include "ike_sa_init_requested.h"
24
25 #include <daemon.h>
26 #include <utils/allocator.h>
27 #include <encoding/payloads/sa_payload.h>
28 #include <encoding/payloads/ke_payload.h>
29 #include <encoding/payloads/nonce_payload.h>
30 #include <transforms/diffie_hellman.h>
31
32
33 typedef struct private_ike_sa_init_requested_t private_ike_sa_init_requested_t;
34
35 /**
36 * Private data of a ike_sa_init_requested_t object.
37 *
38 */
39 struct private_ike_sa_init_requested_t {
40 /**
41 * methods of the state_t interface
42 */
43 ike_sa_init_requested_t public;
44
45 /**
46 * Assigned IKE_SA
47 */
48 protected_ike_sa_t *ike_sa;
49
50 /**
51 * Diffie Hellman object used to compute shared secret
52 */
53 diffie_hellman_t *diffie_hellman;
54
55 /**
56 * Shared secret of successful exchange
57 */
58 chunk_t shared_secret;
59
60 /**
61 * Sent nonce value
62 */
63 chunk_t sent_nonce;
64
65 /**
66 * Received nonce
67 */
68 chunk_t received_nonce;
69
70 /**
71 * DH group priority used to get dh_group_number from configuration manager.
72 *
73 * Currently uused but usable if informational messages of unsupported dh group number are processed.
74 */
75 u_int16_t dh_group_priority;
76
77 /**
78 * Logger used to log data
79 *
80 * Is logger of ike_sa!
81 */
82 logger_t *logger;
83 };
84
85 /**
86 * Implements state_t.get_state
87 */
88 static status_t process_message(private_ike_sa_init_requested_t *this, message_t *message)
89 {
90 status_t status;
91 iterator_t *payloads;
92 exchange_type_t exchange_type;
93 u_int64_t responder_spi;
94 ike_sa_id_t *ike_sa_id;
95
96
97 exchange_type = message->get_exchange_type(message);
98 if (exchange_type != IKE_SA_INIT)
99 {
100 this->logger->log(this->logger, ERROR | MORE, "Message of type %s not supported in state ike_sa_init_requested",mapping_find(exchange_type_m,exchange_type));
101 return FAILED;
102 }
103
104 if (message->get_request(message))
105 {
106 this->logger->log(this->logger, ERROR | MORE, "Only responses of type IKE_SA_INIT supported in state ike_sa_init_requested");
107 return FAILED;
108 }
109
110 /* parse incoming message */
111 status = message->parse_body(message, NULL, NULL);
112 if (status != SUCCESS)
113 {
114 this->logger->log(this->logger, ERROR | MORE, "Could not parse body");
115 return status;
116 }
117
118 responder_spi = message->get_responder_spi(message);
119 ike_sa_id = this->ike_sa->public.get_id(&(this->ike_sa->public));
120 ike_sa_id->set_responder_spi(ike_sa_id,responder_spi);
121
122 /* iterate over incoming payloads */
123 payloads = message->get_payload_iterator(message);
124 while (payloads->has_next(payloads))
125 {
126 payload_t *payload;
127 payloads->current(payloads, (void**)&payload);
128
129 this->logger->log(this->logger, CONTROL|MORE, "Processing payload %s", mapping_find(payload_type_m, payload->get_type(payload)));
130 switch (payload->get_type(payload))
131 {
132 case SECURITY_ASSOCIATION:
133 {
134 sa_payload_t *sa_payload = (sa_payload_t*)payload;
135 iterator_t *suggested_proposals;
136 proposal_substructure_t *suggested_proposal;
137 bool valid;
138
139
140 /* get the list of suggested proposals */
141 suggested_proposals = sa_payload->create_proposal_substructure_iterator(sa_payload, TRUE);
142
143
144 /* now let the configuration-manager check the selected proposals*/
145 this->logger->log(this->logger, CONTROL | MOST, "Check suggested proposals");
146 status = charon->configuration_manager->check_selected_proposals_for_host(charon->configuration_manager,
147 this->ike_sa->get_other_host(this->ike_sa), suggested_proposals,&valid);
148 if (status != SUCCESS)
149 {
150 this->logger->log(this->logger, ERROR | MORE, "Could not check suggested proposals!");
151 suggested_proposals->destroy(suggested_proposals);
152 payloads->destroy(payloads);
153 return status;
154 }
155
156 if (!valid)
157 {
158 this->logger->log(this->logger, ERROR | MORE, "Suggested proposals not accepted!");
159 payloads->destroy(payloads);
160 return status;
161 }
162
163
164 /* let the ike_sa create their own transforms from proposal informations */
165 suggested_proposals->reset(suggested_proposals);
166 /* TODO check for true*/
167 suggested_proposals->has_next(suggested_proposals);
168 status = suggested_proposals->current(suggested_proposals,(void **)&suggested_proposal);
169 suggested_proposals->destroy(suggested_proposals);
170 if (status != SUCCESS)
171 {
172 this->logger->log(this->logger, ERROR | MORE, "Could not get first proposal");
173 payloads->destroy(payloads);
174 return status;
175 }
176
177 status = this->ike_sa->create_transforms_from_proposal(this->ike_sa,suggested_proposal);
178 if (status != SUCCESS)
179 {
180 this->logger->log(this->logger, ERROR | MORE, "Transform objects could not be created from selected proposal");
181 payloads->destroy(payloads);
182 return status;
183 }
184
185
186 /* ok, we have what we need for sa_payload */
187 break;
188 }
189 case KEY_EXCHANGE:
190 {
191 ke_payload_t *ke_payload = (ke_payload_t*)payload;
192
193 this->diffie_hellman->set_other_public_value(this->diffie_hellman, ke_payload->get_key_exchange_data(ke_payload));
194
195 /* shared secret is computed AFTER processing of all payloads... */
196 break;
197 }
198 case NONCE:
199 {
200 nonce_payload_t *nonce_payload = (nonce_payload_t*)payload;
201
202 allocator_free(this->received_nonce.ptr);
203 this->received_nonce = CHUNK_INITIALIZER;
204
205 nonce_payload->get_nonce(nonce_payload, &(this->received_nonce));
206 break;
207 }
208 default:
209 {
210 this->logger->log(this->logger, ERROR, "Payload type not supported!!!!");
211 payloads->destroy(payloads);
212 return FAILED;
213 }
214
215 }
216
217 }
218 payloads->destroy(payloads);
219
220 allocator_free(this->shared_secret.ptr);
221 this->shared_secret = CHUNK_INITIALIZER;
222
223 /* store shared secret */
224 this->logger->log(this->logger, CONTROL | MOST, "Retrieve shared secret and store it");
225 status = this->diffie_hellman->get_shared_secret(this->diffie_hellman, &(this->shared_secret));
226 this->logger->log_chunk(this->logger, PRIVATE, "Shared secret", &this->shared_secret);
227
228 this->ike_sa->compute_secrets(this->ike_sa,this->shared_secret,this->sent_nonce, this->received_nonce);
229
230 /****************************
231 *
232 * TODO
233 *
234 * Send IKE_SA_AUTH request
235 *
236 * Make state change
237 *
238 ****************************/
239
240
241 /* set up the reply */
242 // status = this->ike_sa->build_message(this->ike_sa, IKE_SA_INIT, FALSE, &response);
243 // if (status != SUCCESS)
244 // {
245 // return status;
246 // }
247
248 // response->destroy(response);
249
250
251 return SUCCESS;
252 }
253
254 /**
255 * Implements state_t.get_state
256 */
257 static ike_sa_state_t get_state(private_ike_sa_init_requested_t *this)
258 {
259 return IKE_SA_INIT_REQUESTED;
260 }
261
262 /**
263 * Implements state_t.get_state
264 */
265 static void destroy(private_ike_sa_init_requested_t *this)
266 {
267 this->logger->log(this->logger, CONTROL | MORE, "Going to destroy state of type ike_sa_init_requested_t");
268
269 this->logger->log(this->logger, CONTROL | MOST, "Destroy diffie hellman object");
270 this->diffie_hellman->destroy(this->diffie_hellman);
271
272 allocator_free(this->sent_nonce.ptr);
273 allocator_free(this->received_nonce.ptr);
274 allocator_free(this->shared_secret.ptr);
275 allocator_free(this);
276 }
277
278 /*
279 * Described in header.
280 */
281 ike_sa_init_requested_t *ike_sa_init_requested_create(protected_ike_sa_t *ike_sa,u_int16_t dh_group_priority, diffie_hellman_t *diffie_hellman, chunk_t sent_nonce)
282 {
283 private_ike_sa_init_requested_t *this = allocator_alloc_thing(private_ike_sa_init_requested_t);
284
285 /* interface functions */
286 this->public.state_interface.process_message = (status_t (*) (state_t *,message_t *)) process_message;
287 this->public.state_interface.get_state = (ike_sa_state_t (*) (state_t *)) get_state;
288 this->public.state_interface.destroy = (void (*) (state_t *)) destroy;
289
290 /* private data */
291 this->ike_sa = ike_sa;
292 this->received_nonce = CHUNK_INITIALIZER;
293 this->shared_secret = CHUNK_INITIALIZER;
294 this->logger = this->ike_sa->get_logger(this->ike_sa);
295 this->diffie_hellman = diffie_hellman;
296 this->sent_nonce = sent_nonce;
297 this->dh_group_priority = dh_group_priority;
298
299 return &(this->public);
300 }