diff options
author | Jan Hutter <jhutter@hsr.ch> | 2005-12-01 12:18:20 +0000 |
---|---|---|
committer | Jan Hutter <jhutter@hsr.ch> | 2005-12-01 12:18:20 +0000 |
commit | 343acebe859146bc7ae9af539d8a55ba666820ad (patch) | |
tree | 95e4517257cfd44c60f574bf62f1f4400f420e90 | |
parent | 47cf33820d58f4eb803587ca6b6d31ab09f95457 (diff) | |
download | strongswan-343acebe859146bc7ae9af539d8a55ba666820ad.tar.bz2 strongswan-343acebe859146bc7ae9af539d8a55ba666820ad.tar.xz |
- implemented functionality to generate sa payload from
child_proposal_t's and vice versa...
-rw-r--r-- | Source/charon/encoding/payloads/sa_payload.c | 383 | ||||
-rw-r--r-- | Source/charon/encoding/payloads/sa_payload.h | 29 | ||||
-rw-r--r-- | Source/charon/encoding/payloads/transform_substructure.c | 4 | ||||
-rw-r--r-- | Source/charon/encoding/payloads/transform_substructure.h | 2 | ||||
-rw-r--r-- | Source/charon/testcases/generator_test.c | 136 | ||||
-rw-r--r-- | Source/charon/testcases/parser_test.c | 138 | ||||
-rw-r--r-- | Source/charon/testcases/testcases.c | 4 |
7 files changed, 688 insertions, 8 deletions
diff --git a/Source/charon/encoding/payloads/sa_payload.c b/Source/charon/encoding/payloads/sa_payload.c index d2aecf875..d2bfc9c17 100644 --- a/Source/charon/encoding/payloads/sa_payload.c +++ b/Source/charon/encoding/payloads/sa_payload.c @@ -394,6 +394,298 @@ static status_t get_ike_proposals (private_sa_payload_t *this,ike_proposal_t ** } /** + * Implementation of sa_payload_t.get_child_proposals. + */ +static status_t get_child_proposals (private_sa_payload_t *this,child_proposal_t ** proposals, size_t *proposal_count) +{ + int found_child_proposals = 0; + int found_suites = 1; + int current_suite_number = 0; + + iterator_t *iterator; + child_proposal_t *tmp_proposals; + + iterator = this->proposals->create_iterator(this->proposals,TRUE); + + /* first find out the number of child proposals and check their number of transforms and + * if the SPI is 4 byte long!*/ + current_suite_number = 1; + while (iterator->has_next(iterator)) + { + proposal_substructure_t *current_proposal; + iterator->current(iterator,(void **)&(current_proposal)); + if ((current_proposal->get_protocol_id(current_proposal) == AH) || + (current_proposal->get_protocol_id(current_proposal) == ESP)) + { + if (current_proposal->get_spi_size(current_proposal) != 4) + { + iterator->destroy(iterator); + return FAILED; + } + if (current_proposal->get_proposal_number(current_proposal) == (current_suite_number + 1)) + { + found_suites++; + current_suite_number = current_proposal->get_proposal_number(current_proposal); + } + found_child_proposals++; + } + } + iterator->reset(iterator); + + if (found_child_proposals == 0) + { + iterator->destroy(iterator); + return NOT_FOUND; + } + + /* allocate memory to hold each proposal as child_proposal_t */ + + tmp_proposals = allocator_alloc(found_child_proposals * sizeof(child_proposal_t)); + + current_suite_number = 1; + tmp_proposals[current_suite_number - 1].ah.extended_sequence_numbers = NO_EXT_SEQ_NUMBERS; + tmp_proposals[current_suite_number - 1].ah.diffie_hellman_group = MODP_UNDEFINED; + + tmp_proposals[current_suite_number - 1].esp.integrity_algorithm = AUTH_UNDEFINED; + tmp_proposals[current_suite_number - 1].esp.diffie_hellman_group = MODP_UNDEFINED; + tmp_proposals[current_suite_number - 1].esp.extended_sequence_numbers = NO_EXT_SEQ_NUMBERS; + + /* create from each proposal_substructure a child_proposal_t data area*/ + while (iterator->has_next(iterator)) + { + proposal_substructure_t *current_proposal; + iterator->current(iterator,(void **)&(current_proposal)); + + if (current_proposal->get_proposal_number(current_proposal) == (current_suite_number + 1)) + { + current_suite_number++; + if (current_suite_number > found_suites) + { + /* inconsistent situation */ + return FAILED; + } + tmp_proposals[current_suite_number - 1].ah.extended_sequence_numbers = NO_EXT_SEQ_NUMBERS; + tmp_proposals[current_suite_number - 1].ah.diffie_hellman_group = MODP_UNDEFINED; + + tmp_proposals[current_suite_number - 1].esp.integrity_algorithm = AUTH_UNDEFINED; + tmp_proposals[current_suite_number - 1].esp.diffie_hellman_group = MODP_UNDEFINED; + tmp_proposals[current_suite_number - 1].esp.extended_sequence_numbers = NO_EXT_SEQ_NUMBERS; + } + + if (current_proposal->get_protocol_id(current_proposal) == AH) + { + bool integrity_algorithm_found = FALSE; + bool diffie_hellman_group_found = FALSE; + bool extended_sequence_numbers_found = FALSE; + iterator_t *transforms; + status_t status; + + chunk_t spi; + + tmp_proposals[current_suite_number - 1].ah.is_set = TRUE; + + spi = current_proposal->get_spi(current_proposal); + memcpy(tmp_proposals[current_suite_number - 1].ah.spi,spi.ptr,min(spi.len,4)); + + transforms = current_proposal->create_transform_substructure_iterator(current_proposal,TRUE); + while (transforms->has_next(transforms)) + { + transform_substructure_t *current_transform; + transforms->current(transforms,(void **)&(current_transform)); + + switch (current_transform->get_transform_type(current_transform)) + { + case INTEGRITY_ALGORITHM: + { + u_int16_t key_size; + + if (integrity_algorithm_found) + { + transforms->destroy(transforms); + iterator->destroy(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + tmp_proposals[current_suite_number - 1].ah.integrity_algorithm = current_transform->get_transform_id(current_transform); + status = current_transform->get_key_length(current_transform,&key_size); + tmp_proposals[current_suite_number - 1].ah.integrity_algorithm_key_size = key_size; + if (status == SUCCESS) + { + integrity_algorithm_found = TRUE; + } + break; + } + case EXTENDED_SEQUENCE_NUMBERS: + { + if (extended_sequence_numbers_found) + { + transforms->destroy(transforms); + iterator->destroy(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + tmp_proposals[current_suite_number - 1].ah.extended_sequence_numbers = current_transform->get_transform_id(current_transform); + extended_sequence_numbers_found = TRUE; + break; + } + case DIFFIE_HELLMAN_GROUP: + { + if (diffie_hellman_group_found) + { + transforms->destroy(transforms); + iterator->destroy(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + tmp_proposals[current_suite_number - 1].ah.diffie_hellman_group = current_transform->get_transform_id(current_transform); + diffie_hellman_group_found = TRUE; + break; + } + default: + { + /* not a transform of an child proposal. return here */ + transforms->destroy(transforms); + iterator->destroy(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + } + + } + transforms->destroy(transforms); + + if (!integrity_algorithm_found) + { + /* one of needed transforms could not be found */ + iterator->reset(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + } + else if (current_proposal->get_protocol_id(current_proposal) == ESP) + { + bool encryption_algorithm_found = FALSE; + bool integrity_algorithm_found = FALSE; + bool diffie_hellman_group_found = FALSE; + bool extended_sequence_numbers_found = FALSE; + iterator_t *transforms; + status_t status; + chunk_t spi; + + spi = current_proposal->get_spi(current_proposal); + memcpy(tmp_proposals[current_suite_number - 1].esp.spi,spi.ptr,min(spi.len,4)); + tmp_proposals[current_suite_number - 1].esp.is_set = TRUE; + + + transforms = current_proposal->create_transform_substructure_iterator(current_proposal,TRUE); + while (transforms->has_next(transforms)) + { + transform_substructure_t *current_transform; + transforms->current(transforms,(void **)&(current_transform)); + + switch (current_transform->get_transform_type(current_transform)) + { + case ENCRYPTION_ALGORITHM: + { + u_int16_t key_size; + + if (encryption_algorithm_found) + { + transforms->destroy(transforms); + iterator->destroy(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + tmp_proposals[current_suite_number - 1].esp.encryption_algorithm = current_transform->get_transform_id(current_transform); + status = current_transform->get_key_length(current_transform,&key_size); + tmp_proposals[current_suite_number - 1].esp.encryption_algorithm_key_size = key_size; + if (status == SUCCESS) + { + encryption_algorithm_found = TRUE; + } + break; + } + case INTEGRITY_ALGORITHM: + { + u_int16_t key_size; + + if (integrity_algorithm_found) + { + transforms->destroy(transforms); + iterator->destroy(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + tmp_proposals[current_suite_number - 1].esp.integrity_algorithm = current_transform->get_transform_id(current_transform); + status = current_transform->get_key_length(current_transform,&key_size); + tmp_proposals[current_suite_number - 1].esp.integrity_algorithm_key_size = key_size; + if (status == SUCCESS) + { + integrity_algorithm_found = TRUE; + } + break; + } + case EXTENDED_SEQUENCE_NUMBERS: + { + if (extended_sequence_numbers_found) + { + transforms->destroy(transforms); + iterator->destroy(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + tmp_proposals[current_suite_number - 1].esp.extended_sequence_numbers = current_transform->get_transform_id(current_transform); + extended_sequence_numbers_found = TRUE; + break; + } + case DIFFIE_HELLMAN_GROUP: + { + if (diffie_hellman_group_found) + { + transforms->destroy(transforms); + iterator->destroy(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + tmp_proposals[current_suite_number - 1].esp.diffie_hellman_group = current_transform->get_transform_id(current_transform); + diffie_hellman_group_found = TRUE; + break; + } + default: + { + /* not a transform of an child proposal. return here */ + transforms->destroy(transforms); + iterator->destroy(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + } + + } + transforms->destroy(transforms); + + + if (!encryption_algorithm_found) + { + /* one of needed transforms could not be found */ + iterator->reset(iterator); + allocator_free(tmp_proposals); + return FAILED; + } + + } + } + + iterator->destroy(iterator); + + *proposals = tmp_proposals; + *proposal_count = found_suites; + + return SUCCESS; +} + + +/** * Implementation of private_sa_payload_t.compute_length. */ static void compute_length (private_sa_payload_t *this) @@ -432,6 +724,7 @@ sa_payload_t *sa_payload_create() this->public.create_proposal_substructure_iterator = (iterator_t* (*) (sa_payload_t *,bool)) create_proposal_substructure_iterator; this->public.add_proposal_substructure = (void (*) (sa_payload_t *,proposal_substructure_t *)) add_proposal_substructure; this->public.get_ike_proposals = (status_t (*) (sa_payload_t *, ike_proposal_t **, size_t *)) get_ike_proposals; + this->public.get_child_proposals = (status_t (*) (sa_payload_t *, child_proposal_t **, size_t *)) get_child_proposals; this->public.destroy = (void (*) (sa_payload_t *)) destroy; /* private functions */ @@ -486,3 +779,93 @@ sa_payload_t *sa_payload_create_from_ike_proposals(ike_proposal_t *proposals, si return sa_payload; } + +/* + * Described in header. + */ +sa_payload_t *sa_payload_create_from_child_proposals(child_proposal_t *proposals, size_t proposal_count) +{ + int i; + sa_payload_t *sa_payload= sa_payload_create(); + + for (i = 0; i < proposal_count; i++) + { + /* first the AH part is created */ + if (proposals[i].ah.is_set) + { + transform_substructure_t *integrity_algorithm; + proposal_substructure_t *proposal_substructure; + chunk_t spi; + + proposal_substructure = proposal_substructure_create(); + proposal_substructure->set_protocol_id(proposal_substructure,AH); + proposal_substructure->set_proposal_number(proposal_substructure,(i + 1)); + spi.ptr = proposals[i].ah.spi; + spi.len = 4; + proposal_substructure->set_spi(proposal_substructure,spi); + + integrity_algorithm = transform_substructure_create_type(INTEGRITY_ALGORITHM,proposals[i].ah.integrity_algorithm,proposals[i].ah.integrity_algorithm_key_size); + proposal_substructure->add_transform_substructure(proposal_substructure,integrity_algorithm); + if (proposals[i].ah.diffie_hellman_group != MODP_UNDEFINED) + { + transform_substructure_t *diffie_hellman_group; + diffie_hellman_group = transform_substructure_create_type(DIFFIE_HELLMAN_GROUP,proposals[i].ah.diffie_hellman_group,0); + proposal_substructure->add_transform_substructure(proposal_substructure,diffie_hellman_group); + + } + if (proposals[i].ah.extended_sequence_numbers == EXT_SEQ_NUMBERS) + { + transform_substructure_t *extended_sequence_numbers; + extended_sequence_numbers = transform_substructure_create_type(EXTENDED_SEQUENCE_NUMBERS,proposals[i].ah.extended_sequence_numbers,0); + proposal_substructure->add_transform_substructure(proposal_substructure,extended_sequence_numbers); + } + + sa_payload->add_proposal_substructure(sa_payload,proposal_substructure); + } + + /* then the ESP part is created */ + if (proposals[i].esp.is_set) + { + transform_substructure_t *encryption_algorithm; + proposal_substructure_t *proposal_substructure; + chunk_t spi; + + proposal_substructure = proposal_substructure_create(); + proposal_substructure->set_protocol_id(proposal_substructure,ESP); + proposal_substructure->set_proposal_number(proposal_substructure,(i + 1)); + spi.ptr = proposals[i].esp.spi; + spi.len = 4; + proposal_substructure->set_spi(proposal_substructure,spi); + + encryption_algorithm = transform_substructure_create_type(ENCRYPTION_ALGORITHM,proposals[i].esp.encryption_algorithm,proposals[i].esp.encryption_algorithm_key_size); + proposal_substructure->add_transform_substructure(proposal_substructure,encryption_algorithm); + + if (proposals[i].esp.integrity_algorithm != AUTH_UNDEFINED) + { + transform_substructure_t *integrity_algorithm; + integrity_algorithm = transform_substructure_create_type(INTEGRITY_ALGORITHM,proposals[i].esp.integrity_algorithm,proposals[i].esp.integrity_algorithm_key_size); + proposal_substructure->add_transform_substructure(proposal_substructure,integrity_algorithm); + + } + + if (proposals[i].esp.diffie_hellman_group != MODP_UNDEFINED) + { + transform_substructure_t *diffie_hellman_group; + diffie_hellman_group = transform_substructure_create_type(DIFFIE_HELLMAN_GROUP,proposals[i].esp.diffie_hellman_group,0); + proposal_substructure->add_transform_substructure(proposal_substructure,diffie_hellman_group); + + } + if (proposals[i].esp.extended_sequence_numbers == EXT_SEQ_NUMBERS) + { + transform_substructure_t *extended_sequence_numbers; + extended_sequence_numbers = transform_substructure_create_type(EXTENDED_SEQUENCE_NUMBERS,proposals[i].esp.extended_sequence_numbers,0); + proposal_substructure->add_transform_substructure(proposal_substructure,extended_sequence_numbers); + } + + sa_payload->add_proposal_substructure(sa_payload,proposal_substructure); + } + + } + + return sa_payload; +} diff --git a/Source/charon/encoding/payloads/sa_payload.h b/Source/charon/encoding/payloads/sa_payload.h index ad450b356..fff214255 100644 --- a/Source/charon/encoding/payloads/sa_payload.h +++ b/Source/charon/encoding/payloads/sa_payload.h @@ -28,6 +28,7 @@ #include <encoding/payloads/proposal_substructure.h> #include <utils/linked_list.h> #include <config/init_config.h> +#include <config/sa_config.h> /** * Critical flag must not be set. @@ -98,7 +99,19 @@ struct sa_payload_t { * - FAILED if a proposal does not contain all needed transforms * for a IKE_PROPOSAL */ - status_t (*get_ike_proposals) (sa_payload_t *this, ike_proposal_t **proposals, size_t *proposal_count); + status_t (*get_ike_proposals) (sa_payload_t *this, ike_proposal_t **proposals, size_t *proposal_count); + + /** + * Creates an array of child_proposal_t's in this SA payload. + * + * @param proposals the pointer to the first entry of child_proposal_t's is set + * @param proposal_count the number of found proposals is written at this location + * @return + * - SUCCESS if child proposals could be found + * - NOT_FOUND if no child proposal could be found + * - FAILED if a proposal does not contain all needed transforms + */ + status_t (*get_child_proposals) (sa_payload_t *this, child_proposal_t **proposals, size_t *proposal_count); /** * @brief Destroys an sa_payload_t object. @@ -128,4 +141,18 @@ sa_payload_t *sa_payload_create(); */ sa_payload_t *sa_payload_create_from_ike_proposals(ike_proposal_t *proposals, size_t proposal_count); +/** + * @brief Creates a sa_payload_t object from array of child_proposal_t's. + * + * @warning for proposals where AH and ESP is not set, an empty proposal is created. + * + * + * @return created sa_payload_t object + * @param proposals pointer to first proposal in array of type child_proposal_t + * @param proposal_count number of child_proposal_t's in array + * + * @ingroup payloads + */ +sa_payload_t *sa_payload_create_from_child_proposals(child_proposal_t *proposals, size_t proposal_count); + #endif /*SA_PAYLOAD_H_*/ diff --git a/Source/charon/encoding/payloads/transform_substructure.c b/Source/charon/encoding/payloads/transform_substructure.c index 99af36c8d..c519c6777 100644 --- a/Source/charon/encoding/payloads/transform_substructure.c +++ b/Source/charon/encoding/payloads/transform_substructure.c @@ -89,7 +89,7 @@ mapping_t transform_type_m[] = { {PSEUDO_RANDOM_FUNCTION, "PSEUDO_RANDOM_FUNCTION"}, {INTEGRITY_ALGORITHM, "INTEGRITY_ALGORITHM"}, {DIFFIE_HELLMAN_GROUP, "DIFFIE_HELLMAN_GROUP"}, - {EXTENDED_SEQUENCE_NUNBERS, "EXTENDED_SEQUENCE_NUNBERS"}, + {EXTENDED_SEQUENCE_NUMBERS, "EXTENDED_SEQUENCE_NUMBERS"}, {MAPPING_END, NULL} }; @@ -207,7 +207,7 @@ static status_t verify(private_transform_substructure_t *this) break; } - case EXTENDED_SEQUENCE_NUNBERS: + case EXTENDED_SEQUENCE_NUMBERS: { if ((this->transform_id != NO_EXT_SEQ_NUMBERS) && (this->transform_id != EXT_SEQ_NUMBERS)) { diff --git a/Source/charon/encoding/payloads/transform_substructure.h b/Source/charon/encoding/payloads/transform_substructure.h index 6671dbc7b..b108f6312 100644 --- a/Source/charon/encoding/payloads/transform_substructure.h +++ b/Source/charon/encoding/payloads/transform_substructure.h @@ -62,7 +62,7 @@ enum transform_type_t { PSEUDO_RANDOM_FUNCTION = 2, INTEGRITY_ALGORITHM = 3, DIFFIE_HELLMAN_GROUP = 4, - EXTENDED_SEQUENCE_NUNBERS = 5 + EXTENDED_SEQUENCE_NUMBERS = 5 }; /** diff --git a/Source/charon/testcases/generator_test.c b/Source/charon/testcases/generator_test.c index 1df430a82..a2ae01565 100644 --- a/Source/charon/testcases/generator_test.c +++ b/Source/charon/testcases/generator_test.c @@ -418,6 +418,8 @@ void test_generator_with_sa_payload(tester_t *tester) transform_substructure_t *transform1, *transform2; proposal_substructure_t *proposal1, *proposal2; ike_proposal_t *ike_proposals; + size_t child_proposal_count; + child_proposal_t *child_proposals; size_t ike_proposal_count; sa_payload_t *sa_payload; ike_header_t *ike_header; @@ -566,7 +568,7 @@ void test_generator_with_sa_payload(tester_t *tester) sa_payload->destroy(sa_payload); generator->destroy(generator); - + /* --------------------------- */ /* test with automatic created proposals */ generator = generator_create(); @@ -638,6 +640,138 @@ void test_generator_with_sa_payload(tester_t *tester) allocator_free(ike_proposals); allocator_free_chunk(&generated_data); generator->destroy(generator); + + + /* --------------------------- */ + /* test with automatic created child proposals */ + + generator = generator_create(); + tester->assert_true(tester,(generator != NULL), "generator create check"); + + + child_proposal_count = 2; + child_proposals = allocator_alloc(child_proposal_count * (sizeof(child_proposal_t))); + + child_proposals[0].ah.is_set = TRUE; + child_proposals[0].ah.integrity_algorithm = AUTH_HMAC_MD5_96; + child_proposals[0].ah.integrity_algorithm_key_size = 20; + child_proposals[0].ah.diffie_hellman_group = MODP_2048_BIT; + child_proposals[0].ah.extended_sequence_numbers = EXT_SEQ_NUMBERS; + child_proposals[0].ah.spi[0] = 1; + child_proposals[0].ah.spi[1] = 1; + child_proposals[0].ah.spi[2] = 1; + child_proposals[0].ah.spi[3] = 1; + + child_proposals[0].esp.is_set = TRUE; + child_proposals[0].esp.diffie_hellman_group = MODP_1024_BIT; + child_proposals[0].esp.encryption_algorithm = ENCR_AES_CBC; + child_proposals[0].esp.encryption_algorithm_key_size = 32; + child_proposals[0].esp.integrity_algorithm = AUTH_UNDEFINED; + child_proposals[0].esp.spi[0] = 2; + child_proposals[0].esp.spi[1] = 2; + child_proposals[0].esp.spi[2] = 2; + child_proposals[0].esp.spi[3] = 2; + + child_proposals[1].ah.is_set = TRUE; + child_proposals[1].ah.integrity_algorithm = AUTH_HMAC_MD5_96; + child_proposals[1].ah.integrity_algorithm_key_size = 20; + child_proposals[1].ah.diffie_hellman_group = MODP_2048_BIT; + child_proposals[1].ah.extended_sequence_numbers = EXT_SEQ_NUMBERS; + child_proposals[1].ah.spi[0] = 1; + child_proposals[1].ah.spi[1] = 1; + child_proposals[1].ah.spi[2] = 1; + child_proposals[1].ah.spi[3] = 1; + + child_proposals[1].esp.is_set = TRUE; + child_proposals[1].esp.diffie_hellman_group = MODP_1024_BIT; + child_proposals[1].esp.encryption_algorithm = ENCR_AES_CBC; + child_proposals[1].esp.encryption_algorithm_key_size = 32; + child_proposals[1].esp.integrity_algorithm = AUTH_HMAC_MD5_96; + child_proposals[1].esp.integrity_algorithm_key_size = 20; + child_proposals[1].esp.spi[0] = 2; + child_proposals[1].esp.spi[1] = 2; + child_proposals[1].esp.spi[2] = 2; + child_proposals[1].esp.spi[3] = 2; + + + sa_payload = sa_payload_create_from_child_proposals(child_proposals,child_proposal_count); + tester->assert_true(tester,(sa_payload != NULL), "sa_payload create check"); + + generator->generate_payload(generator,(payload_t *)sa_payload); + generator->write_to_chunk(generator,&generated_data); + logger->log_chunk(logger,RAW,"generated",&generated_data); + + u_int8_t expected_generation3[] = { + 0x00,0x00,0x00,0xA0, /* payload header*/ + + /* suite 1 */ + 0x02,0x00,0x00,0x28, /* a proposal */ + 0x01,0x02,0x04,0x03, + 0x01,0x01,0x01,0x01, + 0x03,0x00,0x00,0x0C, /* transform 1 */ + 0x03,0x00,0x00,0x01, + 0x80,0x0E,0x00,0x14, /* keylength attribute with 20 bytes length */ + + 0x03,0x00,0x00,0x08, /* transform 2 */ + 0x04,0x00,0x00,0x0E, + + 0x00,0x00,0x00,0x08, /* transform 3 */ + 0x05,0x00,0x00,0x01, + + + 0x02,0x00,0x00,0x20, /* a proposal */ + 0x01,0x03,0x04,0x02, + 0x02,0x02,0x02,0x02, + + 0x03,0x00,0x00,0x0C, /* transform 1 */ + 0x01,0x00,0x00,0x0C, + 0x80,0x0E,0x00,0x20, /* keylength attribute with 32 bytes length */ + + 0x00,0x00,0x00,0x08, /* transform 2 */ + 0x04,0x00,0x00,0x02, + + /* suite 2 */ + 0x02,0x00,0x00,0x28, /* a proposal */ + 0x02,0x02,0x04,0x03, + 0x01,0x01,0x01,0x01, + 0x03,0x00,0x00,0x0C, /* transform 1 */ + 0x03,0x00,0x00,0x01, + 0x80,0x0E,0x00,0x14, /* keylength attribute with 20 bytes length */ + + 0x03,0x00,0x00,0x08, /* transform 2 */ + 0x04,0x00,0x00,0x0E, + + 0x00,0x00,0x00,0x08, /* transform 3 */ + 0x05,0x00,0x00,0x01, + + + 0x00,0x00,0x00,0x2C, /* a proposal */ + 0x02,0x03,0x04,0x03, + 0x02,0x02,0x02,0x02, + + 0x03,0x00,0x00,0x0C, /* transform 1 */ + 0x01,0x00,0x00,0x0C, + 0x80,0x0E,0x00,0x20, /* keylength attribute with 32 bytes length */ + + 0x03,0x00,0x00,0x0C, /* transform 2 */ + 0x03,0x00,0x00,0x01, + 0x80,0x0E,0x00,0x14, /* keylength attribute with 20 bytes length */ + + 0x00,0x00,0x00,0x08, /* transform 3 */ + 0x04,0x00,0x00,0x02, + + }; + + + logger->log_bytes(logger,RAW,"expected",expected_generation3,sizeof(expected_generation3)); + + tester->assert_true(tester,(memcmp(expected_generation3,generated_data.ptr,sizeof(expected_generation3)) == 0), "compare generated data"); + + sa_payload->destroy(sa_payload); + allocator_free(child_proposals); + allocator_free_chunk(&generated_data); + generator->destroy(generator); + charon->logger_manager->destroy_logger(charon->logger_manager,logger); diff --git a/Source/charon/testcases/parser_test.c b/Source/charon/testcases/parser_test.c index b873306d8..81e26d9b5 100644 --- a/Source/charon/testcases/parser_test.c +++ b/Source/charon/testcases/parser_test.c @@ -96,10 +96,12 @@ void test_parser_with_sa_payload(tester_t *tester) parser_t *parser; sa_payload_t *sa_payload; status_t status; - chunk_t sa_chunk, sa_chunk2; + chunk_t sa_chunk, sa_chunk2, sa_chunk3; iterator_t *proposals, *transforms, *attributes; ike_proposal_t *ike_proposals; size_t ike_proposal_count; + child_proposal_t *child_proposals; + size_t child_proposal_count; /* first test generic parsing functionality */ @@ -262,6 +264,140 @@ void test_parser_with_sa_payload(tester_t *tester) { allocator_free(ike_proposals); } + sa_payload->destroy(sa_payload); + + /* now test SA functionality after parsing an SA payload with child sa proposals*/ + u_int8_t sa_bytes3[] = { + 0x00,0x00,0x00,0xA0, /* payload header*/ + + /* suite 1 */ + 0x02,0x00,0x00,0x28, /* a proposal */ + 0x01,0x02,0x04,0x03, + 0x01,0x01,0x01,0x01, + 0x03,0x00,0x00,0x0C, /* transform 1 */ + 0x03,0x00,0x00,0x01, + 0x80,0x0E,0x00,0x14, /* keylength attribute with 20 bytes length */ + + 0x03,0x00,0x00,0x08, /* transform 2 */ + 0x04,0x00,0x00,0x0E, + + 0x00,0x00,0x00,0x08, /* transform 3 */ + 0x05,0x00,0x00,0x01, + + + 0x02,0x00,0x00,0x20, /* a proposal */ + 0x01,0x03,0x04,0x02, + 0x02,0x02,0x02,0x02, + + 0x03,0x00,0x00,0x0C, /* transform 1 */ + 0x01,0x00,0x00,0x0C, + 0x80,0x0E,0x00,0x20, /* keylength attribute with 32 bytes length */ + + 0x00,0x00,0x00,0x08, /* transform 2 */ + 0x04,0x00,0x00,0x02, + + /* suite 2 */ + 0x02,0x00,0x00,0x28, /* a proposal */ + 0x02,0x02,0x04,0x03, + 0x01,0x01,0x01,0x01, + 0x03,0x00,0x00,0x0C, /* transform 1 */ + 0x03,0x00,0x00,0x01, + 0x80,0x0E,0x00,0x14, /* keylength attribute with 20 bytes length */ + + 0x03,0x00,0x00,0x08, /* transform 2 */ + 0x04,0x00,0x00,0x0E, + + 0x00,0x00,0x00,0x08, /* transform 3 */ + 0x05,0x00,0x00,0x01, + + + 0x00,0x00,0x00,0x2C, /* a proposal */ + 0x02,0x03,0x04,0x03, + 0x02,0x02,0x02,0x02, + + 0x03,0x00,0x00,0x0C, /* transform 1 */ + 0x01,0x00,0x00,0x0C, + 0x80,0x0E,0x00,0x20, /* keylength attribute with 32 bytes length */ + + 0x03,0x00,0x00,0x0C, /* transform 2 */ + 0x03,0x00,0x00,0x01, + 0x80,0x0E,0x00,0x14, /* keylength attribute with 20 bytes length */ + + 0x00,0x00,0x00,0x08, /* transform 3 */ + 0x04,0x00,0x00,0x02, + }; + + sa_chunk3.ptr = sa_bytes3; + sa_chunk3.len = sizeof(sa_bytes3); + + parser = parser_create(sa_chunk3); + tester->assert_true(tester,(parser != NULL), "parser create check"); + status = parser->parse_payload(parser, SECURITY_ASSOCIATION, (payload_t**)&sa_payload); + tester->assert_true(tester,(status == SUCCESS),"parse_payload call check"); + parser->destroy(parser); + + if (status != SUCCESS) + { + return; + } + + status = sa_payload->payload_interface.verify(&(sa_payload->payload_interface)); + tester->assert_true(tester,(status == SUCCESS),"verify call check"); + + status = sa_payload->get_ike_proposals (sa_payload, &ike_proposals, &ike_proposal_count); + tester->assert_false(tester,(status == SUCCESS),"get ike proposals call check"); + + status = sa_payload->get_child_proposals (sa_payload, &child_proposals, &child_proposal_count); + tester->assert_true(tester,(status == SUCCESS),"get child proposals call check"); + + + tester->assert_true(tester,(child_proposal_count == 2),"child proposal count check"); + tester->assert_true(tester,(child_proposals[0].ah.is_set == TRUE),"is ah set check"); + tester->assert_true(tester,(child_proposals[0].ah.integrity_algorithm == AUTH_HMAC_MD5_96),"integrity_algorithm check"); + tester->assert_true(tester,(child_proposals[0].ah.integrity_algorithm_key_size == 20),"integrity_algorithm_key_size check"); + tester->assert_true(tester,(child_proposals[0].ah.diffie_hellman_group == MODP_2048_BIT),"diffie_hellman_group check"); + tester->assert_true(tester,(child_proposals[0].ah.extended_sequence_numbers == EXT_SEQ_NUMBERS),"extended_sequence_numbers check"); + tester->assert_true(tester,(child_proposals[0].ah.spi[0] == 1),"spi check"); + tester->assert_true(tester,(child_proposals[0].ah.spi[1] == 1),"spi check"); + tester->assert_true(tester,(child_proposals[0].ah.spi[2] == 1),"spi check"); + tester->assert_true(tester,(child_proposals[0].ah.spi[3] == 1),"spi check"); + + tester->assert_true(tester,(child_proposals[0].esp.is_set == TRUE),"is ah set check"); + tester->assert_true(tester,(child_proposals[0].esp.encryption_algorithm == ENCR_AES_CBC),"integrity_algorithm check"); + tester->assert_true(tester,(child_proposals[0].esp.encryption_algorithm_key_size == 32),"integrity_algorithm_key_size check"); + tester->assert_true(tester,(child_proposals[0].esp.diffie_hellman_group == MODP_1024_BIT),"diffie_hellman_group check"); + tester->assert_true(tester,(child_proposals[0].esp.integrity_algorithm == AUTH_UNDEFINED),"integrity_algorithm check"); + tester->assert_true(tester,(child_proposals[0].esp.spi[0] == 2),"spi check"); + tester->assert_true(tester,(child_proposals[0].esp.spi[1] == 2),"spi check"); + tester->assert_true(tester,(child_proposals[0].esp.spi[2] == 2),"spi check"); + tester->assert_true(tester,(child_proposals[0].esp.spi[3] == 2),"spi check"); + + tester->assert_true(tester,(child_proposals[1].ah.is_set == TRUE),"is ah set check"); + tester->assert_true(tester,(child_proposals[1].ah.integrity_algorithm == AUTH_HMAC_MD5_96),"integrity_algorithm check"); + tester->assert_true(tester,(child_proposals[1].ah.integrity_algorithm_key_size == 20),"integrity_algorithm_key_size check"); + tester->assert_true(tester,(child_proposals[1].ah.diffie_hellman_group == MODP_2048_BIT),"diffie_hellman_group check"); + tester->assert_true(tester,(child_proposals[1].ah.extended_sequence_numbers == EXT_SEQ_NUMBERS),"extended_sequence_numbers check"); + tester->assert_true(tester,(child_proposals[1].ah.spi[0] == 1),"spi check"); + tester->assert_true(tester,(child_proposals[1].ah.spi[1] == 1),"spi check"); + tester->assert_true(tester,(child_proposals[1].ah.spi[2] == 1),"spi check"); + tester->assert_true(tester,(child_proposals[1].ah.spi[3] == 1),"spi check"); + + tester->assert_true(tester,(child_proposals[1].esp.is_set == TRUE),"is ah set check"); + tester->assert_true(tester,(child_proposals[1].esp.encryption_algorithm == ENCR_AES_CBC),"integrity_algorithm check"); + tester->assert_true(tester,(child_proposals[1].esp.encryption_algorithm_key_size == 32),"integrity_algorithm_key_size check"); + tester->assert_true(tester,(child_proposals[1].esp.diffie_hellman_group == MODP_1024_BIT),"diffie_hellman_group check"); + tester->assert_true(tester,(child_proposals[1].esp.integrity_algorithm == AUTH_HMAC_MD5_96),"integrity_algorithm check"); + tester->assert_true(tester,(child_proposals[1].esp.integrity_algorithm_key_size == 20),"integrity_algorithm check"); + tester->assert_true(tester,(child_proposals[1].esp.spi[0] == 2),"spi check"); + tester->assert_true(tester,(child_proposals[1].esp.spi[1] == 2),"spi check"); + tester->assert_true(tester,(child_proposals[1].esp.spi[2] == 2),"spi check"); + tester->assert_true(tester,(child_proposals[1].esp.spi[3] == 2),"spi check"); + + if (status == SUCCESS) + { + allocator_free(child_proposals); + } + sa_payload->destroy(sa_payload); } diff --git a/Source/charon/testcases/testcases.c b/Source/charon/testcases/testcases.c index 4ec6834bb..0d1a08664 100644 --- a/Source/charon/testcases/testcases.c +++ b/Source/charon/testcases/testcases.c @@ -206,12 +206,12 @@ int main() daemon_create(); charon->logger_manager->disable_logger_level(charon->logger_manager,TESTER,FULL); - //charon->logger_manager->enable_logger_level(charon->logger_manager,TESTER,RAW); +// charon->logger_manager->enable_logger_level(charon->logger_manager,TESTER,RAW); tester_t *tester = tester_create(test_output, FALSE); tester->perform_tests(tester,all_tests); -// tester->perform_test(tester,&generator_test5); +// tester->perform_test(tester,&parser_test2); tester->destroy(tester); |