aboutsummaryrefslogtreecommitdiffstats
path: root/Source/charon/sa/ike_sa.c
diff options
context:
space:
mode:
Diffstat (limited to 'Source/charon/sa/ike_sa.c')
-rw-r--r--Source/charon/sa/ike_sa.c201
1 files changed, 190 insertions, 11 deletions
diff --git a/Source/charon/sa/ike_sa.c b/Source/charon/sa/ike_sa.c
index 79620f29c..914da1e74 100644
--- a/Source/charon/sa/ike_sa.c
+++ b/Source/charon/sa/ike_sa.c
@@ -32,6 +32,7 @@
#include <utils/randomizer.h>
#include <transforms/diffie_hellman.h>
#include <transforms/prf_plus.h>
+#include <transforms/crypters/crypter.h>
#include <encoding/payloads/sa_payload.h>
#include <encoding/payloads/nonce_payload.h>
#include <encoding/payloads/ke_payload.h>
@@ -348,6 +349,9 @@ static ike_sa_id_t* get_id(private_ike_sa_t *this)
return this->ike_sa_id;
}
+/**
+ * @brief implements function protected_ike_sa_t.compute_secrets
+ */
static status_t compute_secrets (private_ike_sa_t *this,chunk_t dh_shared_secret,chunk_t initiator_nonce, chunk_t responder_nonce)
{
chunk_t concatenated_nonces;
@@ -357,8 +361,8 @@ static status_t compute_secrets (private_ike_sa_t *this,chunk_t dh_shared_secret
u_int64_t initiator_spi;
u_int64_t responder_spi;
prf_plus_t *prf_plus;
- chunk_t secrets_raw;
-
+
+
/*
* TODO check length for specific prf's
*/
@@ -398,6 +402,7 @@ static status_t compute_secrets (private_ike_sa_t *this,chunk_t dh_shared_secret
return FAILED;
}
+
/* first is initiator */
memcpy(prf_plus_seed.ptr,initiator_nonce.ptr,initiator_nonce.len);
/* second is responder */
@@ -409,8 +414,8 @@ static status_t compute_secrets (private_ike_sa_t *this,chunk_t dh_shared_secret
responder_spi = this->ike_sa_id->get_responder_spi(this->ike_sa_id);
memcpy(prf_plus_seed.ptr + initiator_nonce.len + responder_nonce.len + 8,&responder_spi,8);
- this->logger->log_chunk(this->logger, PRIVATE, "Keyseed", &skeyseed);
- this->logger->log_chunk(this->logger, PRIVATE, "PRF+ Seed", &prf_plus_seed);
+ this->logger->log_chunk(this->logger, PRIVATE | MORE, "Keyseed", &skeyseed);
+ this->logger->log_chunk(this->logger, PRIVATE | MORE, "PRF+ Seed", &prf_plus_seed);
this->logger->log(this->logger, CONTROL | MOST, "Set new key of prf object");
status = this->prf->set_key(this->prf,skeyseed);
@@ -431,11 +436,85 @@ static status_t compute_secrets (private_ike_sa_t *this,chunk_t dh_shared_secret
return FAILED;
}
- prf_plus->allocate_bytes(prf_plus,100,&secrets_raw);
-
- this->logger->log_chunk(this->logger, PRIVATE, "Secrets", &secrets_raw);
+ status = prf_plus->allocate_bytes(prf_plus,this->prf->get_block_size(this->prf),&(this->secrets.d_key));
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not allocate bytes from prf+ for Sk_d");
+ return status;
+ }
+ this->logger->log_chunk(this->logger, PRIVATE, "Sk_d secret", &(this->secrets.d_key));
+
+ status = prf_plus->allocate_bytes(prf_plus,this->crypter_initiator->get_block_size(this->crypter_initiator),&(this->secrets.ei_key));
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not allocate bytes from prf+ for Sk_ei");
+ return status;
+ }
+ this->logger->log_chunk(this->logger, PRIVATE, "Sk_ei secret", &(this->secrets.ei_key));
+ status = this->crypter_initiator->set_key(this->crypter_initiator,this->secrets.ei_key);
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not set encryption key initiator crypter");
+ return status;
+ }
+
+ status = prf_plus->allocate_bytes(prf_plus,this->crypter_responder->get_block_size(this->crypter_responder),&(this->secrets.er_key));
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not allocate bytes from prf+ for Sk_er");
+ return status;
+ }
+ this->logger->log_chunk(this->logger, PRIVATE, "Sk_er secret", &(this->secrets.er_key));
+ status = this->crypter_responder->set_key(this->crypter_responder,this->secrets.er_key);
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not set encryption key responder crypter");
+ return status;
+ }
+
+ status = prf_plus->allocate_bytes(prf_plus,this->signer_initiator->get_block_size(this->signer_initiator),&(this->secrets.ai_key));
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not allocate bytes from prf+ for Sk_ai");
+ return status;
+ }
+ this->logger->log_chunk(this->logger, PRIVATE, "Sk_ai secret", &(this->secrets.ai_key));
+ status = this->signer_initiator->set_key(this->signer_initiator,this->secrets.ai_key);
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not set key for initiator signer");
+ return status;
+ }
+
+ status = prf_plus->allocate_bytes(prf_plus,this->signer_responder->get_block_size(this->signer_responder),&(this->secrets.ar_key));
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not allocate bytes from prf+ for Sk_ar");
+ return status;
+ }
+ this->logger->log_chunk(this->logger, PRIVATE, "Sk_ar secret", &(this->secrets.ar_key));
+ status = this->signer_responder->set_key(this->signer_responder,this->secrets.ar_key);
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not set key for responder signer");
+ return status;
+ }
+
+ status = prf_plus->allocate_bytes(prf_plus,this->crypter_responder->get_block_size(this->crypter_responder),&(this->secrets.pi_key));
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not allocate bytes from prf+ for Sk_pi");
+ return status;
+ }
+ this->logger->log_chunk(this->logger, PRIVATE, "Sk_pi secret", &(this->secrets.pi_key));
- allocator_free_chunk(&secrets_raw);
+ status = prf_plus->allocate_bytes(prf_plus,this->crypter_responder->get_block_size(this->crypter_responder),&(this->secrets.pr_key));
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | MORE, "Could not allocate bytes from prf+ for Sk_pr");
+ return status;
+ }
+ this->logger->log_chunk(this->logger, PRIVATE, "Sk_pr secret", &(this->secrets.pr_key));
prf_plus->destroy(prf_plus);
@@ -496,6 +575,7 @@ status_t create_delete_job (private_ike_sa_t *this)
*/
static void set_new_state (private_ike_sa_t *this, state_t *state)
{
+ this->logger->log(this->logger, ERROR, "Change current state %s to %s",mapping_find(ike_sa_state_m,this->current_state->get_state(this->current_state)),mapping_find(ike_sa_state_m,state->get_state(state)));
this->current_state = state;
}
@@ -530,6 +610,7 @@ static void set_my_host (private_ike_sa_t *this, host_t *my_host)
{
if (this->me.host != NULL)
{
+ this ->logger->log(this->logger, CONTROL|MOST, "Destroy existing my host object");
this->me.host->destroy(this->me.host);
}
this->me.host = my_host;
@@ -542,6 +623,7 @@ static void set_other_host (private_ike_sa_t *this, host_t *other_host)
{
if (this->other.host != NULL)
{
+ this ->logger->log(this->logger, CONTROL|MOST, "Destroy existing other host object");
this->other.host->destroy(this->other.host);
}
this->other.host = other_host;
@@ -550,13 +632,110 @@ static void set_other_host (private_ike_sa_t *this, host_t *other_host)
/**
* Implementation of protected_ike_sa_t.set_prf.
*/
-static void set_prf (private_ike_sa_t *this,prf_t *prf)
+static status_t create_transforms_from_proposal (private_ike_sa_t *this,proposal_substructure_t *proposal)
{
+ status_t status;
+ u_int16_t encryption_algorithm;
+ u_int16_t encryption_algorithm_key_length;
+ u_int16_t integrity_algorithm;
+ u_int16_t integrity_algorithm_key_length;
+ u_int16_t pseudo_random_function;
+ u_int16_t pseudo_random_function_key_length;
+
+ this ->logger->log(this->logger, CONTROL|MORE, "Going to create transform objects for proposal");
+
+ this ->logger->log(this->logger, CONTROL|MOST, "Get encryption transform type");
+ status = proposal->get_info_for_transform_type(proposal,ENCRYPTION_ALGORITHM,&(encryption_algorithm),&(encryption_algorithm_key_length));
+ if (status != SUCCESS)
+ {
+ this ->logger->log(this->logger, ERROR|MORE, "Could not get encryption transform type");
+ return status;
+ }
+ this ->logger->log(this->logger, CONTROL|MORE, "Encryption algorithm: %s with keylength %d",mapping_find(encryption_algorithm_m,encryption_algorithm),encryption_algorithm_key_length);
+
+ this ->logger->log(this->logger, CONTROL|MOST, "Get integrity transform type");
+ status = proposal->get_info_for_transform_type(proposal,INTEGRITY_ALGORITHM,&(integrity_algorithm),&(integrity_algorithm_key_length));
+ if (status != SUCCESS)
+ {
+ this ->logger->log(this->logger, ERROR|MORE, "Could not get integrity transform type");
+ return status;
+ }
+ this ->logger->log(this->logger, CONTROL|MORE, "integrity algorithm: %s with keylength %d",mapping_find(integrity_algorithm_m,integrity_algorithm),integrity_algorithm_key_length);
+
+ this ->logger->log(this->logger, CONTROL|MOST, "Get prf transform type");
+ status = proposal->get_info_for_transform_type(proposal,PSEUDO_RANDOM_FUNCTION,&(pseudo_random_function),&(pseudo_random_function_key_length));
+ if (status != SUCCESS)
+ {
+ this ->logger->log(this->logger, ERROR|MORE, "Could not prf transform type");
+ return status;
+ }
+ this ->logger->log(this->logger, CONTROL|MORE, "prf: %s with keylength %d",mapping_find(pseudo_random_function_m,pseudo_random_function),pseudo_random_function_key_length);
+
+
+
+
if (this->prf != NULL)
{
+ this ->logger->log(this->logger, CONTROL|MOST, "Destroy existing prf_t object");
this->prf->destroy(this->prf);
}
- this->prf = prf;
+ this->prf = prf_create(pseudo_random_function);
+ if (this->prf == NULL)
+ {
+ this ->logger->log(this->logger, ERROR|MORE, "prf does not seem to be supported!");
+ return FAILED;
+ }
+
+ if (this->crypter_initiator != NULL)
+ {
+ this ->logger->log(this->logger, CONTROL|MOST, "Destroy existing initiator crypter_t object");
+ this->crypter_initiator->destroy(this->crypter_initiator);
+ }
+ this->crypter_initiator = crypter_create(encryption_algorithm,encryption_algorithm_key_length);
+ if (this->crypter_initiator == NULL)
+ {
+ this ->logger->log(this->logger, ERROR|MORE, "encryption algorithm does not seem to be supported!");
+ return FAILED;
+ }
+
+ if (this->crypter_responder != NULL)
+ {
+ this ->logger->log(this->logger, CONTROL|MOST, "Destroy existing responder crypter_t object");
+ this->crypter_responder->destroy(this->crypter_responder);
+ }
+ this->crypter_responder = crypter_create(encryption_algorithm,encryption_algorithm_key_length);
+ if (this->crypter_responder == NULL)
+ {
+ this ->logger->log(this->logger, ERROR|MORE, "encryption algorithm does not seem to be supported!");
+ return FAILED;
+ }
+
+ if (this->signer_initiator != NULL)
+ {
+ this ->logger->log(this->logger, CONTROL|MOST, "Destroy existing initiator signer_t object");
+ this->signer_initiator->destroy(this->signer_initiator);
+ }
+ this->signer_initiator = signer_create(integrity_algorithm);
+ if (this->signer_initiator == NULL)
+ {
+ this ->logger->log(this->logger, ERROR|MORE, "integrity algorithm does not seem to be supported!");
+ return FAILED;
+ }
+
+
+ if (this->signer_responder != NULL)
+ {
+ this ->logger->log(this->logger, CONTROL|MOST, "Destroy existing responder signer_t object");
+ this->signer_responder->destroy(this->signer_responder);
+ }
+ this->signer_responder = signer_create(integrity_algorithm);
+ if (this->signer_responder == NULL)
+ {
+ this ->logger->log(this->logger, ERROR|MORE, "integrity algorithm does not seem to be supported!");
+ return FAILED;
+ }
+
+ return SUCCESS;
}
/**
@@ -775,7 +954,7 @@ ike_sa_t * ike_sa_create(ike_sa_id_t *ike_sa_id)
this->protected.get_randomizer = (randomizer_t *(*) (protected_ike_sa_t *)) get_randomizer;
this->protected.set_last_requested_message = (status_t (*) (protected_ike_sa_t *,message_t *)) set_last_requested_message;
this->protected.set_last_responded_message = (status_t (*) (protected_ike_sa_t *,message_t *)) set_last_responded_message;
- this->protected.set_prf = (void (*) (protected_ike_sa_t *,prf_t *)) set_prf;
+ this->protected.create_transforms_from_proposal = (status_t (*) (protected_ike_sa_t *,proposal_substructure_t *)) create_transforms_from_proposal;
this->protected.set_new_state = (void (*) (protected_ike_sa_t *,state_t *)) set_new_state;
/* private functions */