aboutsummaryrefslogtreecommitdiffstats
path: root/src/charon/sa/states/ike_sa_init_requested.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/charon/sa/states/ike_sa_init_requested.c')
-rw-r--r--src/charon/sa/states/ike_sa_init_requested.c798
1 files changed, 798 insertions, 0 deletions
diff --git a/src/charon/sa/states/ike_sa_init_requested.c b/src/charon/sa/states/ike_sa_init_requested.c
new file mode 100644
index 000000000..311cdf0a0
--- /dev/null
+++ b/src/charon/sa/states/ike_sa_init_requested.c
@@ -0,0 +1,798 @@
+/**
+ * @file ike_sa_init_requested.c
+ *
+ * @brief Implementation of ike_sa_init_requested_t.
+ *
+ */
+
+/*
+ * Copyright (C) 2005 Jan Hutter, Martin Willi
+ * Hochschule fuer Technik Rapperswil
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
+ * for more details.
+ */
+
+#include "ike_sa_init_requested.h"
+
+#include <daemon.h>
+#include <encoding/payloads/sa_payload.h>
+#include <encoding/payloads/ke_payload.h>
+#include <encoding/payloads/nonce_payload.h>
+#include <encoding/payloads/notify_payload.h>
+#include <encoding/payloads/id_payload.h>
+#include <encoding/payloads/auth_payload.h>
+#include <encoding/payloads/ts_payload.h>
+#include <crypto/diffie_hellman.h>
+#include <sa/states/ike_auth_requested.h>
+#include <sa/states/initiator_init.h>
+#include <sa/authenticator.h>
+
+
+typedef struct private_ike_sa_init_requested_t private_ike_sa_init_requested_t;
+
+/**
+ * Private data of a ike_sa_init_requested_t object.
+ *
+ */
+struct private_ike_sa_init_requested_t {
+ /**
+ * Public interface of an ike_sa_init_requested_t object.
+ */
+ ike_sa_init_requested_t public;
+
+ /**
+ * Assigned IKE_SA
+ */
+ protected_ike_sa_t *ike_sa;
+
+ /**
+ * Diffie Hellman object used to compute shared secret.
+ */
+ diffie_hellman_t *diffie_hellman;
+
+ /**
+ * Sent nonce value.
+ */
+ chunk_t sent_nonce;
+
+ /**
+ * Received nonce
+ */
+ chunk_t received_nonce;
+
+ /**
+ * Selected proposal
+ */
+ proposal_t *proposal;
+
+ /**
+ * Packet data of ike_sa_init request
+ */
+ chunk_t ike_sa_init_request_data;
+
+ /**
+ * Created child sa, if any
+ */
+ child_sa_t *child_sa;
+
+ /**
+ * Assigned logger
+ *
+ * Is logger of ike_sa!
+ */
+ logger_t *logger;
+
+
+ /**
+ * Process NONCE payload of IKE_SA_INIT response.
+ *
+ * @param this calling object
+ * @param nonce_payload NONCE payload to process
+ * @return SUCCESS in any case
+ */
+ status_t (*process_nonce_payload) (private_ike_sa_init_requested_t *this, nonce_payload_t *nonce_payload);
+
+ /**
+ * Process SA payload of IKE_SA_INIT response.
+ *
+ * @param this calling object
+ * @param sa_payload SA payload to process
+ * @return
+ * - SUCCESS
+ * - FAILED
+ */
+ status_t (*process_sa_payload) (private_ike_sa_init_requested_t *this, sa_payload_t *sa_payload);
+
+ /**
+ * Process KE payload of IKE_SA_INIT response.
+ *
+ * @param this calling object
+ * @param sa_payload KE payload to process
+ * @return
+ * - SUCCESS
+ * - FAILED
+ */
+ status_t (*process_ke_payload) (private_ike_sa_init_requested_t *this, ke_payload_t *ke_payload);
+
+ /**
+ * Build ID payload for IKE_AUTH request.
+ *
+ * @param this calling object
+ * @param[out] id_payload buildet ID payload
+ * @param response created payload will be added to this message_t object
+ * @return
+ * - SUCCESS
+ * - FAILED
+ */
+ status_t (*build_id_payload) (private_ike_sa_init_requested_t *this,id_payload_t **id_payload, message_t *response);
+
+ /**
+ * Build IDr payload for IKE_AUTH request.
+ *
+ * Only built when the ID of the responder contains no wildcards.
+ *
+ * @param this calling object
+ * @param response created payload will be added to this message_t object
+ * @return
+ * - SUCCESS
+ * - FAILED
+ */
+ status_t (*build_idr_payload) (private_ike_sa_init_requested_t *this, message_t *response);
+
+ /**
+ * Build AUTH payload for IKE_AUTH request.
+ *
+ * @param this calling object
+ * @param my_id_payload buildet ID payload
+ * @param response created payload will be added to this message_t object
+ * @return
+ * - SUCCESS
+ * - FAILED
+ */
+ status_t (*build_auth_payload) (private_ike_sa_init_requested_t *this,id_payload_t *my_id_payload, message_t *response);
+
+ /**
+ * Build SA payload for IKE_AUTH request.
+ *
+ * @param this calling object
+ * @param response created payload will be added to this message_t object
+ * @return
+ * - SUCCESS
+ * - FAILED
+ */
+ status_t (*build_sa_payload) (private_ike_sa_init_requested_t *this, message_t *response);
+
+ /**
+ * Build TSi payload for IKE_AUTH request.
+ *
+ * @param this calling object
+ * @param response created payload will be added to this message_t object
+ * @return
+ * - SUCCESS
+ * - FAILED
+ */
+ status_t (*build_tsi_payload) (private_ike_sa_init_requested_t *this, message_t *response);
+
+ /**
+ * Build TSr payload for IKE_AUTH request.
+ *
+ * @param this calling object
+ * @param response created payload will be added to this message_t object
+ * @return
+ * - SUCCESS
+ * - FAILED
+ */
+ status_t (*build_tsr_payload) (private_ike_sa_init_requested_t *this, message_t *response);
+
+ /**
+ * Process a notify payload and react.
+ *
+ * @param this calling object
+ * @param notify_payload notify_payload to handle
+ */
+ status_t (*process_notify_payload) (private_ike_sa_init_requested_t *this, notify_payload_t *notify_payload);
+
+ /**
+ * Destroy function called internally of this class after state change to
+ * state IKE_AUTH_REQUESTED succeeded.
+ *
+ * This destroy function does not destroy objects which were passed to the new state.
+ *
+ * @param this calling object
+ */
+ void (*destroy_after_state_change) (private_ike_sa_init_requested_t *this);
+};
+
+/**
+ * Implementation of state_t.process_message.
+ */
+static status_t process_message(private_ike_sa_init_requested_t *this, message_t *ike_sa_init_reply)
+{
+ ike_auth_requested_t *next_state;
+ chunk_t ike_sa_init_reply_data;
+ sa_payload_t *sa_payload = NULL;
+ ke_payload_t *ke_payload = NULL;
+ id_payload_t *id_payload = NULL;
+ nonce_payload_t *nonce_payload = NULL;
+ u_int64_t responder_spi;
+ ike_sa_id_t *ike_sa_id;
+ iterator_t *payloads;
+ host_t *me;
+ connection_t *connection;
+ policy_t *policy;
+
+ message_t *request;
+ status_t status;
+
+ /*
+ * In this state a reply message of type IKE_SA_INIT is expected:
+ *
+ * <-- HDR, SAr1, KEr, Nr, [CERTREQ]
+ * or
+ * <-- HDR, N
+ */
+
+ if (ike_sa_init_reply->get_exchange_type(ike_sa_init_reply) != IKE_SA_INIT)
+ {
+ this->logger->log(this->logger, ERROR | LEVEL1, "Message of type %s not supported in state ike_sa_init_requested",
+ mapping_find(exchange_type_m,ike_sa_init_reply->get_exchange_type(ike_sa_init_reply)));
+ return FAILED;
+ }
+
+ if (ike_sa_init_reply->get_request(ike_sa_init_reply))
+ {
+ this->logger->log(this->logger, ERROR | LEVEL1, "IKE_SA_INIT requests not allowed state ike_sa_init_responded");
+ return FAILED;
+ }
+
+ /* parse incoming message */
+ status = ike_sa_init_reply->parse_body(ike_sa_init_reply, NULL, NULL);
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, ERROR | LEVEL1, "IKE_SA_INIT reply parsing faild. Ignoring message");
+ return status;
+ }
+
+ /* because we are original initiator we have to update the responder SPI to the new one */
+ responder_spi = ike_sa_init_reply->get_responder_spi(ike_sa_init_reply);
+ if (responder_spi == 0)
+ {
+ this->logger->log(this->logger, ERROR | LEVEL1, "IKE_SA_INIT reply contained a SPI of zero");
+ return FAILED;
+ }
+ ike_sa_id = this->ike_sa->public.get_id(&(this->ike_sa->public));
+ ike_sa_id->set_responder_spi(ike_sa_id,responder_spi);
+
+ /* Iterate over all payloads.
+ *
+ * The message is allready checked for the right payload types.
+ */
+ payloads = ike_sa_init_reply->get_payload_iterator(ike_sa_init_reply);
+ while (payloads->has_next(payloads))
+ {
+ payload_t *payload;
+ payloads->current(payloads, (void**)&payload);
+
+ switch (payload->get_type(payload))
+ {
+ case SECURITY_ASSOCIATION:
+ {
+ sa_payload = (sa_payload_t*)payload;
+ break;
+ }
+ case KEY_EXCHANGE:
+ {
+ ke_payload = (ke_payload_t*)payload;
+ break;
+ }
+ case NONCE:
+ {
+ nonce_payload = (nonce_payload_t*)payload;
+ break;
+ }
+ case NOTIFY:
+ {
+ notify_payload_t *notify_payload = (notify_payload_t *) payload;
+
+ status = this->process_notify_payload(this, notify_payload);
+ if (status != SUCCESS)
+ {
+ payloads->destroy(payloads);
+ return status;
+ }
+ break;
+ }
+ default:
+ {
+ this->logger->log(this->logger, ERROR|LEVEL1, "Ignoring payload %s (%d)",
+ mapping_find(payload_type_m, payload->get_type(payload)), payload->get_type(payload));
+ break;
+ }
+
+ }
+
+ }
+ payloads->destroy(payloads);
+
+ if (!(nonce_payload && sa_payload && ke_payload))
+ {
+ this->logger->log(this->logger, AUDIT, "IKE_SA_INIT reply did not contain all required payloads. Deleting IKE_SA");
+ return DELETE_ME;
+ }
+
+ status = this->process_nonce_payload (this,nonce_payload);
+ if (status != SUCCESS)
+ {
+ return status;
+ }
+
+ status = this->process_sa_payload (this,sa_payload);
+ if (status != SUCCESS)
+ {
+ return status;
+ }
+
+ status = this->process_ke_payload (this,ke_payload);
+ if (status != SUCCESS)
+ {
+ return status;
+ }
+
+ /* derive all the keys used in the IKE_SA */
+ status = this->ike_sa->build_transforms(this->ike_sa, this->proposal, this->diffie_hellman, this->sent_nonce, this->received_nonce);
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, AUDIT, "Transform objects could not be created from selected proposal. Deleting IKE_SA");
+ return DELETE_ME;
+ }
+
+ /* apply the address on wich we really received the packet */
+ connection = this->ike_sa->get_connection(this->ike_sa);
+ me = ike_sa_init_reply->get_destination(ike_sa_init_reply);
+ connection->update_my_host(connection, me->clone(me));
+ policy = this->ike_sa->get_policy(this->ike_sa);
+ policy->update_my_ts(policy, me);
+
+ /* build empty message */
+ this->ike_sa->build_message(this->ike_sa, IKE_AUTH, TRUE, &request);
+
+ status = this->build_id_payload(this, &id_payload, request);
+ if (status != SUCCESS)
+ {
+ request->destroy(request);
+ return status;
+ }
+ status = this->build_idr_payload(this, request);
+ if (status != SUCCESS)
+ {
+ request->destroy(request);
+ return status;
+ }
+ status = this->build_auth_payload(this, (id_payload_t*)id_payload, request);
+ if (status != SUCCESS)
+ {
+ request->destroy(request);
+ return status;
+ }
+ status = this->build_sa_payload(this, request);
+ if (status != SUCCESS)
+ {
+ request->destroy(request);
+ return status;
+ }
+ status = this->build_tsi_payload(this, request);
+ if (status != SUCCESS)
+ {
+ request->destroy(request);
+ return status;
+ }
+ status = this->build_tsr_payload(this, request);
+ if (status != SUCCESS)
+ {
+ request->destroy(request);
+ return status;
+ }
+
+ /* message can now be sent (must not be destroyed) */
+ status = this->ike_sa->send_request(this->ike_sa, request);
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, AUDIT, "Unable to send IKE_AUTH request. Deleting IKE_SA");
+ request->destroy(request);
+ return DELETE_ME;
+ }
+
+ this->ike_sa->set_last_replied_message_id(this->ike_sa,ike_sa_init_reply->get_message_id(ike_sa_init_reply));
+
+ ike_sa_init_reply_data = ike_sa_init_reply->get_packet_data(ike_sa_init_reply);
+
+ /* state can now be changed */
+ next_state = ike_auth_requested_create(this->ike_sa, this->sent_nonce, this->received_nonce,
+ ike_sa_init_reply_data, this->child_sa);
+ this->ike_sa->set_new_state(this->ike_sa,(state_t *) next_state);
+
+ this->destroy_after_state_change(this);
+ return SUCCESS;
+}
+
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.process_nonce_payload.
+ */
+status_t process_nonce_payload (private_ike_sa_init_requested_t *this, nonce_payload_t *nonce_payload)
+{
+ free(this->received_nonce.ptr);
+ this->received_nonce = nonce_payload->get_nonce(nonce_payload);
+ return SUCCESS;
+}
+
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.process_sa_payload.
+ */
+status_t process_sa_payload (private_ike_sa_init_requested_t *this, sa_payload_t *sa_payload)
+{
+ proposal_t *proposal;
+ linked_list_t *proposal_list;
+ connection_t *connection;
+
+ connection = this->ike_sa->get_connection(this->ike_sa);
+
+ /* get the list of selected proposals, the peer has to select only one proposal */
+ proposal_list = sa_payload->get_proposals (sa_payload);
+ if (proposal_list->get_count(proposal_list) != 1)
+ {
+ this->logger->log(this->logger, AUDIT, "IKE_SA_INIT response did not contain a single proposal. Deleting IKE_SA");
+ while (proposal_list->remove_last(proposal_list, (void**)&proposal) == SUCCESS)
+ {
+ proposal->destroy(proposal);
+ }
+ proposal_list->destroy(proposal_list);
+ return DELETE_ME;
+ }
+
+ /* we have to re-check if the others selection is valid */
+ this->proposal = connection->select_proposal(connection, proposal_list);
+ while (proposal_list->remove_last(proposal_list, (void**)&proposal) == SUCCESS)
+ {
+ proposal->destroy(proposal);
+ }
+ proposal_list->destroy(proposal_list);
+
+ if (this->proposal == NULL)
+ {
+ this->logger->log(this->logger, AUDIT, "IKE_SA_INIT response contained selected proposal we did not offer. Deleting IKE_SA");
+ return DELETE_ME;
+ }
+
+ return SUCCESS;
+}
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.process_ke_payload.
+ */
+status_t process_ke_payload (private_ike_sa_init_requested_t *this, ke_payload_t *ke_payload)
+{
+ this->diffie_hellman->set_other_public_value(this->diffie_hellman, ke_payload->get_key_exchange_data(ke_payload));
+
+ return SUCCESS;
+}
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.build_id_payload.
+ */
+static status_t build_id_payload (private_ike_sa_init_requested_t *this,id_payload_t **id_payload, message_t *request)
+{
+ policy_t *policy;
+ id_payload_t *new_id_payload;
+ identification_t *identification;
+
+ policy = this->ike_sa->get_policy(this->ike_sa);
+ identification = policy->get_my_id(policy);
+ new_id_payload = id_payload_create_from_identification(TRUE, identification);
+
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Add ID payload to message");
+ request->add_payload(request,(payload_t *) new_id_payload);
+
+ *id_payload = new_id_payload;
+
+ return SUCCESS;
+}
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.build_idr_payload.
+ */
+static status_t build_idr_payload (private_ike_sa_init_requested_t *this, message_t *request)
+{
+ policy_t *policy;
+ id_payload_t *idr_payload;
+ identification_t *identification;
+
+ policy = this->ike_sa->get_policy(this->ike_sa);
+ identification = policy->get_other_id(policy);
+ if (!identification->contains_wildcards(identification))
+ {
+ idr_payload = id_payload_create_from_identification(FALSE, identification);
+
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Add IDr payload to message");
+ request->add_payload(request,(payload_t *) idr_payload);
+ }
+ return SUCCESS;
+}
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.build_auth_payload.
+ */
+static status_t build_auth_payload (private_ike_sa_init_requested_t *this, id_payload_t *my_id_payload, message_t *request)
+{
+ authenticator_t *authenticator;
+ auth_payload_t *auth_payload;
+ status_t status;
+
+ authenticator = authenticator_create(this->ike_sa);
+ status = authenticator->compute_auth_data(authenticator,&auth_payload,this->ike_sa_init_request_data,this->received_nonce,my_id_payload,TRUE);
+ authenticator->destroy(authenticator);
+
+ if (status != SUCCESS)
+ {
+ this->logger->log(this->logger, AUDIT, "Could not generate AUTH data for IKE_AUTH request. Deleting IKE_SA");
+ return DELETE_ME;
+ }
+
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Add AUTH payload to message");
+ request->add_payload(request,(payload_t *) auth_payload);
+
+ return SUCCESS;
+}
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.build_sa_payload.
+ */
+static status_t build_sa_payload (private_ike_sa_init_requested_t *this, message_t *request)
+{
+ linked_list_t *proposal_list;
+ sa_payload_t *sa_payload;
+ policy_t *policy;
+ connection_t *connection;
+
+ /* get proposals form config, add to payload */
+ policy = this->ike_sa->get_policy(this->ike_sa);
+ proposal_list = policy->get_proposals(policy);
+ /* build child sa */
+ connection = this->ike_sa->get_connection(this->ike_sa);
+ this->child_sa = child_sa_create(connection->get_my_host(connection),
+ connection->get_other_host(connection));
+ if (this->child_sa->alloc(this->child_sa, proposal_list) != SUCCESS)
+ {
+ this->logger->log(this->logger, AUDIT, "Could not install CHILD_SA! Deleting IKE_SA");
+ return DELETE_ME;
+ }
+
+ sa_payload = sa_payload_create_from_proposal_list(proposal_list);
+
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Add SA payload to message");
+ request->add_payload(request,(payload_t *) sa_payload);
+
+ return SUCCESS;
+}
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.build_tsi_payload.
+ */
+static status_t build_tsi_payload (private_ike_sa_init_requested_t *this, message_t *request)
+{
+ linked_list_t *ts_list;
+ ts_payload_t *ts_payload;
+ policy_t *policy;
+
+ policy = this->ike_sa->get_policy(this->ike_sa);
+ ts_list = policy->get_my_traffic_selectors(policy);
+ ts_payload = ts_payload_create_from_traffic_selectors(TRUE, ts_list);
+
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Add TSi payload to message");
+ request->add_payload(request,(payload_t *) ts_payload);
+
+ return SUCCESS;
+}
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.build_tsr_payload.
+ */
+static status_t build_tsr_payload (private_ike_sa_init_requested_t *this, message_t *request)
+{
+ linked_list_t *ts_list;
+ ts_payload_t *ts_payload;
+ policy_t *policy;
+
+ policy = this->ike_sa->get_policy(this->ike_sa);
+ ts_list = policy->get_other_traffic_selectors(policy);
+ ts_payload = ts_payload_create_from_traffic_selectors(FALSE, ts_list);
+
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Add TSr payload to message");
+ request->add_payload(request,(payload_t *) ts_payload);
+
+ return SUCCESS;
+}
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.process_notify_payload.
+ */
+static status_t process_notify_payload(private_ike_sa_init_requested_t *this, notify_payload_t *notify_payload)
+{
+ notify_message_type_t notify_message_type = notify_payload->get_notify_message_type(notify_payload);
+
+ this->logger->log(this->logger, CONTROL|LEVEL1, "Process notify type %s",
+ mapping_find(notify_message_type_m, notify_message_type));
+
+ switch (notify_message_type)
+ {
+ case NO_PROPOSAL_CHOSEN:
+ {
+ this->logger->log(this->logger, AUDIT, "IKE_SA_INIT response contained a NO_PROPOSAL_CHOSEN notify. Deleting IKE_SA");
+ return DELETE_ME;
+ }
+ case INVALID_MAJOR_VERSION:
+ {
+ this->logger->log(this->logger, AUDIT, "IKE_SA_INIT response contained a INVALID_MAJOR_VERSION notify. Deleting IKE_SA");
+ return DELETE_ME;
+ }
+ case INVALID_KE_PAYLOAD:
+ {
+ initiator_init_t *initiator_init_state;
+ chunk_t notify_data;
+ diffie_hellman_group_t dh_group, old_dh_group;
+ connection_t *connection;
+
+ connection = this->ike_sa->get_connection(this->ike_sa);
+ old_dh_group = connection->get_dh_group(connection);
+ notify_data = notify_payload->get_notification_data(notify_payload);
+ dh_group = ntohs(*((u_int16_t*)notify_data.ptr));
+
+ /* TODO:
+ * We are very restrictive here: If the other didn't accept
+ * our DH group, and we do not accept his offer, continuation
+ * is cancelled...
+ */
+
+ this->logger->log(this->logger, AUDIT, "Peer didn't accept %s, it requested %s!",
+ mapping_find(diffie_hellman_group_m, old_dh_group),
+ mapping_find(diffie_hellman_group_m, dh_group));
+ /* check if we can accept this dh group */
+ if (!connection->check_dh_group(connection, dh_group))
+ {
+ this->logger->log(this->logger, AUDIT,
+ "Peer does only accept DH group %s, which we do not accept! Aborting",
+ mapping_find(diffie_hellman_group_m, dh_group));
+ return DELETE_ME;
+ }
+
+ /* Going to change state back to initiator_init_t */
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Create next state object");
+ initiator_init_state = initiator_init_create(this->ike_sa);
+
+ /* buffer of sent and received messages has to get reseted */
+ this->ike_sa->reset_message_buffers(this->ike_sa);
+
+ /* state can now be changed */
+ this->ike_sa->set_new_state(this->ike_sa,(state_t *) initiator_init_state);
+
+ /* state has NOW changed :-) */
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Destroy old sate object");
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Going to retry initialization of connection");
+
+ this->public.state_interface.destroy(&(this->public.state_interface));
+ if (initiator_init_state->retry_initiate_connection (initiator_init_state, dh_group) != SUCCESS)
+ {
+ return DELETE_ME;
+ }
+ return FAILED;
+ }
+ default:
+ {
+ /*
+ * - In case of unknown error: IKE_SA gets destroyed.
+ * - In case of unknown status: logging
+ */
+ if (notify_message_type < 16383)
+ {
+ this->logger->log(this->logger, AUDIT, "IKE_SA_INIT reply contained an unknown notify error (%d). Deleting IKE_SA",
+ notify_message_type);
+ return DELETE_ME;
+ }
+ else
+ {
+ this->logger->log(this->logger, CONTROL, "IKE_SA_INIT reply contained an unknown notify (%d), ignored.",
+ notify_message_type);
+ return SUCCESS;
+ }
+ }
+ }
+}
+
+/**
+ * Implementation of state_t.get_state.
+ */
+static ike_sa_state_t get_state(private_ike_sa_init_requested_t *this)
+{
+ return IKE_SA_INIT_REQUESTED;
+}
+
+/**
+ * Implementation of private_ike_sa_init_requested_t.destroy_after_state_change.
+ */
+static void destroy_after_state_change (private_ike_sa_init_requested_t *this)
+{
+ this->diffie_hellman->destroy(this->diffie_hellman);
+ chunk_free(&(this->ike_sa_init_request_data));
+ if (this->proposal)
+ {
+ this->proposal->destroy(this->proposal);
+ }
+ free(this);
+}
+
+/**
+ * Implementation state_t.destroy.
+ */
+static void destroy(private_ike_sa_init_requested_t *this)
+{
+ this->diffie_hellman->destroy(this->diffie_hellman);
+ free(this->sent_nonce.ptr);
+ free(this->received_nonce.ptr);
+ chunk_free(&(this->ike_sa_init_request_data));
+ if (this->child_sa)
+ {
+ this->child_sa->destroy(this->child_sa);
+ }
+ if (this->proposal)
+ {
+ this->proposal->destroy(this->proposal);
+ }
+ free(this);
+}
+
+/*
+ * Described in header.
+ */
+ike_sa_init_requested_t *ike_sa_init_requested_create(protected_ike_sa_t *ike_sa, diffie_hellman_t *diffie_hellman, chunk_t sent_nonce,chunk_t ike_sa_init_request_data)
+{
+ private_ike_sa_init_requested_t *this = malloc_thing(private_ike_sa_init_requested_t);
+
+ /* interface functions */
+ this->public.state_interface.process_message = (status_t (*) (state_t *,message_t *)) process_message;
+ this->public.state_interface.get_state = (ike_sa_state_t (*) (state_t *)) get_state;
+ this->public.state_interface.destroy = (void (*) (state_t *)) destroy;
+
+ /* private functions */
+ this->destroy_after_state_change = destroy_after_state_change;
+ this->process_nonce_payload = process_nonce_payload;
+ this->process_sa_payload = process_sa_payload;
+ this->process_ke_payload = process_ke_payload;
+ this->build_auth_payload = build_auth_payload;
+ this->build_tsi_payload = build_tsi_payload;
+ this->build_tsr_payload = build_tsr_payload;
+ this->build_id_payload = build_id_payload;
+ this->build_idr_payload = build_idr_payload;
+ this->build_sa_payload = build_sa_payload;
+ this->process_notify_payload = process_notify_payload;
+
+ /* private data */
+ this->ike_sa = ike_sa;
+ this->received_nonce = CHUNK_INITIALIZER;
+ this->logger = logger_manager->get_logger(logger_manager, IKE_SA);
+ this->diffie_hellman = diffie_hellman;
+ this->proposal = NULL;
+ this->sent_nonce = sent_nonce;
+ this->child_sa = NULL;
+ this->ike_sa_init_request_data = ike_sa_init_request_data;
+
+ return &(this->public);
+}