Added a fist hook to fill up IKE_AUTH messages with dummy certificates (1.1.1/1.2.1)
authorMartin Willi <martin@revosec.ch>
Tue, 2 Nov 2010 11:14:03 +0000 (12:14 +0100)
committerMartin Willi <martin@revosec.ch>
Wed, 5 Jan 2011 15:45:41 +0000 (16:45 +0100)
src/conftest/Makefile.am
src/conftest/hooks/ike_auth_fill.c [new file with mode: 0644]

index a841201..b8b6aaf 100644 (file)
@@ -2,8 +2,8 @@ ipsec_PROGRAMS = conftest
 
 AM_CFLAGS = -rdynamic
 
-conftest_SOURCES = conftest.c conftest.h config.c config.h hooks/hook.h \
-       actions.c actions.h
+conftest_SOURCES = conftest.c conftest.h config.c config.h actions.c actions.h \
+       hooks/hook.h hooks/ike_auth_fill.c
 
 INCLUDES = \
        -I$(top_srcdir)/src/libstrongswan \
diff --git a/src/conftest/hooks/ike_auth_fill.c b/src/conftest/hooks/ike_auth_fill.c
new file mode 100644 (file)
index 0000000..7f3ff08
--- /dev/null
@@ -0,0 +1,144 @@
+/*
+ * Copyright (C) 2010 Martin Willi
+ * Copyright (C) 2010 revosec AG
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * for more details.
+ */
+
+#include "hook.h"
+
+#include <time.h>
+#include <netinet/udp.h>
+
+#include <encoding/payloads/cert_payload.h>
+#include <encoding/payloads/encryption_payload.h>
+
+typedef struct private_ike_auth_fill_t private_ike_auth_fill_t;
+
+/**
+ * Private data of an ike_auth_fill_t object.
+ */
+struct private_ike_auth_fill_t {
+
+       /**
+        * Implements the hook_t interface.
+        */
+       hook_t hook;
+
+       /**
+        * Alter requests or responses?
+        */
+       bool req;
+
+       /**
+        * ID of message to alter.
+        */
+       int id;
+
+       /**
+        * Number of bytes to fill IKE_AUTH up
+        */
+       int bytes;
+};
+
+/** size of non ESP-Marker */
+#define NON_ESP_MARKER_LEN 4
+
+/**
+ * Calculate packet size on wire (without ethernet/IP header)
+ */
+static size_t calculate_wire_size(message_t *message, ike_sa_t *ike_sa)
+{
+       enumerator_t *enumerator;
+       payload_t *payload;
+       size_t size = 0;
+
+       enumerator = message->create_payload_enumerator(message);
+       while (enumerator->enumerate(enumerator, &payload))
+       {
+               size += payload->get_length(payload);
+       }
+       enumerator->destroy(enumerator);
+
+       if (message->get_exchange_type(message) != IKE_SA_INIT)
+       {
+               keymat_t *keymat;
+               aead_t *aead;
+               size_t  bs;
+
+               keymat = ike_sa->get_keymat(ike_sa);
+               aead = keymat->get_aead(keymat, FALSE);
+               if (aead)
+               {
+                       bs = aead->get_block_size(aead);
+                       size += ENCRYPTION_PAYLOAD_HEADER_LENGTH + NON_ESP_MARKER_LEN +
+                               aead->get_icv_size(aead) + aead->get_iv_size(aead) +
+                               (bs - (size % bs));
+               }
+       }
+       return sizeof(struct udphdr) + IKE_HEADER_LENGTH + size;
+}
+
+METHOD(listener_t, message, bool,
+       private_ike_auth_fill_t *this, ike_sa_t *ike_sa, message_t *message,
+       bool incoming)
+{
+       if (!incoming &&
+               message->get_request(message) == this->req &&
+               message->get_message_id(message) == this->id)
+       {
+               cert_payload_t *pld;
+               size_t size, diff;
+               chunk_t data;
+
+               size = calculate_wire_size(message, ike_sa);
+               if (size < this->bytes - CERT_PAYLOAD_HEADER_LENGTH)
+               {
+                       diff = this->bytes - size - CERT_PAYLOAD_HEADER_LENGTH;
+                       data = chunk_alloc(diff);
+                       memset(data.ptr, 0x12, data.len);
+                       pld = cert_payload_create_custom(201, data);
+                       message->add_payload(message, &pld->payload_interface);
+               }
+       }
+       return TRUE;
+}
+
+METHOD(hook_t, destroy, void,
+       private_ike_auth_fill_t *this)
+{
+       free(this);
+}
+
+/**
+ * Create the IKE_AUTH fill hook
+ */
+hook_t *ike_auth_fill_hook_create(void)
+{
+       private_ike_auth_fill_t *this;
+
+       INIT(this,
+               .hook = {
+                       .listener = {
+                               .message = _message,
+                       },
+                       .destroy = _destroy,
+               },
+               .req = conftest->test->get_bool(conftest->test,
+                                                                               "hooks.ike_auth_fill.request", TRUE),
+               .id = conftest->test->get_int(conftest->test,
+                                                                               "hooks.ike_auth_fill.id", 1),
+               .bytes = conftest->test->get_int(conftest->test,
+                                                                               "hooks.ike_auth_fill.bytes", 0),
+       );
+
+       return &this->hook;
+}