/** * @file ike_cert.c * * @brief Implementation of the ike_cert task. * */ /* * Copyright (C) 2006-2007 Martin Willi * Hochschule fuer Technik Rapperswil * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. */ #include "ike_cert.h" #include #include #include #include #include typedef struct private_ike_cert_t private_ike_cert_t; /** * Private members of a ike_cert_t task. */ struct private_ike_cert_t { /** * Public methods and task_t interface. */ ike_cert_t public; /** * Assigned IKE_SA. */ ike_sa_t *ike_sa; /** * Are we the initiator? */ bool initiator; /** * list of CA cert hashes requested, items point to 20 byte chunk */ linked_list_t *cas; /** * have we seen a certificate request? */ bool certreq_seen; }; /** * read certificate requests */ static void process_certreqs(private_ike_cert_t *this, message_t *message) { iterator_t *iterator; payload_t *payload; iterator = message->get_payload_iterator(message); while (iterator->iterate(iterator, (void**)&payload)) { if (payload->get_type(payload) == CERTIFICATE_REQUEST) { certreq_payload_t *certreq = (certreq_payload_t*)payload; cert_encoding_t encoding; chunk_t keyids, keyid; this->certreq_seen = TRUE; encoding = certreq->get_cert_encoding(certreq); if (encoding != CERT_X509_SIGNATURE) { DBG1(DBG_IKE, "certreq payload %N not supported - ignored", cert_encoding_names, encoding); continue; } keyids = certreq->get_data(certreq); while (keyids.len >= HASH_SIZE_SHA1) { keyid = chunk_create(keyids.ptr, HASH_SIZE_SHA1); keyid = chunk_clone(keyid); this->cas->insert_last(this->cas, keyid.ptr); keyids = chunk_skip(keyids, HASH_SIZE_SHA1); } } } iterator->destroy(iterator); } /** * import certificates */ static void process_certs(private_ike_cert_t *this, message_t *message) { iterator_t *iterator; payload_t *payload; iterator = message->get_payload_iterator(message); while (iterator->iterate(iterator, (void**)&payload)) { if (payload->get_type(payload) == CERTIFICATE) { cert_encoding_t encoding; x509_t *cert; chunk_t cert_data; bool found; cert_payload_t *cert_payload = (cert_payload_t*)payload; encoding = cert_payload->get_cert_encoding(cert_payload); if (encoding != CERT_X509_SIGNATURE) { DBG1(DBG_IKE, "certificate payload %N not supported - ignored", cert_encoding_names, encoding); continue; } cert_data = cert_payload->get_data_clone(cert_payload); cert = x509_create_from_chunk(cert_data, 0); if (cert) { if (charon->credentials->verify(charon->credentials, cert, &found)) { DBG2(DBG_IKE, "received end entity certificate is trusted - " "added to store"); if (found) { cert->destroy(cert); } else { charon->credentials->add_end_certificate(charon->credentials, cert); } } else { DBG1(DBG_IKE, "received end entity certificate is not trusted - " "discarded"); cert->destroy(cert); } } else { DBG1(DBG_IKE, "parsing of received certificate failed - discarded"); chunk_free(&cert_data); } } } iterator->destroy(iterator); } /** * build certificate requests */ static void build_certreqs(private_ike_cert_t *this, message_t *message) { ike_cfg_t *ike_cfg; peer_cfg_t *peer_cfg; identification_t *ca; certreq_payload_t *certreq; ike_cfg = this->ike_sa->get_ike_cfg(this->ike_sa); if (ike_cfg->send_certreq(ike_cfg) != CERT_NEVER_SEND) { peer_cfg = this->ike_sa->get_peer_cfg(this->ike_sa); if (peer_cfg) { ca = peer_cfg->get_other_ca(peer_cfg); if (ca && ca->get_type(ca) != ID_ANY) { certreq = certreq_payload_create_from_cacert(ca); } else { certreq = certreq_payload_create_from_cacerts(); } } else { certreq = certreq_payload_create_from_cacerts(); } if (certreq) { message->add_payload(message, (payload_t*)certreq); } } } /** * add certificates to message */ static void build_certs(private_ike_cert_t *this, message_t *message) { peer_cfg_t *peer_cfg; x509_t *cert; cert_payload_t *payload; peer_cfg = this->ike_sa->get_peer_cfg(this->ike_sa); if (peer_cfg && peer_cfg->get_auth_method(peer_cfg) == AUTH_RSA) { switch (peer_cfg->get_cert_policy(peer_cfg)) { case CERT_NEVER_SEND: break; case CERT_SEND_IF_ASKED: if (!this->certreq_seen) { break; } /* FALL */ case CERT_ALWAYS_SEND: { /* TODO: respect CA cert request */ cert = charon->credentials->get_certificate(charon->credentials, peer_cfg->get_my_id(peer_cfg)); if (cert) { payload = cert_payload_create_from_x509(cert); message->add_payload(message, (payload_t*)payload); } } } } } /** * Implementation of task_t.process for initiator */ static status_t build_i(private_ike_cert_t *this, message_t *message) { if (message->get_exchange_type(message) == IKE_SA_INIT) { return NEED_MORE; } build_certreqs(this, message); build_certs(this, message); return NEED_MORE; } /** * Implementation of task_t.process for responder */ static status_t process_r(private_ike_cert_t *this, message_t *message) { if (message->get_exchange_type(message) == IKE_SA_INIT) { return NEED_MORE; } process_certreqs(this, message); process_certs(this, message); return NEED_MORE; } /** * Implementation of task_t.build for responder */ static status_t build_r(private_ike_cert_t *this, message_t *message) { if (message->get_exchange_type(message) == IKE_SA_INIT) { build_certreqs(this, message); return NEED_MORE; } build_certs(this, message); return SUCCESS; } /** * Implementation of task_t.process for initiator */ static status_t process_i(private_ike_cert_t *this, message_t *message) { if (message->get_exchange_type(message) == IKE_SA_INIT) { process_certreqs(this, message); return NEED_MORE; } process_certs(this, message); return SUCCESS; } /** * Implementation of task_t.get_type */ static task_type_t get_type(private_ike_cert_t *this) { return IKE_CERT; } /** * Implementation of task_t.migrate */ static void migrate(private_ike_cert_t *this, ike_sa_t *ike_sa) { this->ike_sa = ike_sa; this->cas->destroy_function(this->cas, free); this->cas = linked_list_create(); this->certreq_seen = FALSE; } /** * Implementation of task_t.destroy */ static void destroy(private_ike_cert_t *this) { this->cas->destroy_function(this->cas, free); free(this); } /* * Described in header. */ ike_cert_t *ike_cert_create(ike_sa_t *ike_sa, bool initiator) { private_ike_cert_t *this = malloc_thing(private_ike_cert_t); this->public.task.get_type = (task_type_t(*)(task_t*))get_type; this->public.task.migrate = (void(*)(task_t*,ike_sa_t*))migrate; this->public.task.destroy = (void(*)(task_t*))destroy; if (initiator) { this->public.task.build = (status_t(*)(task_t*,message_t*))build_i; this->public.task.process = (status_t(*)(task_t*,message_t*))process_i; } else { this->public.task.build = (status_t(*)(task_t*,message_t*))build_r; this->public.task.process = (status_t(*)(task_t*,message_t*))process_r; } this->ike_sa = ike_sa; this->initiator = initiator; this->cas = linked_list_create(); this->certreq_seen = FALSE; return &this->public; }