strongswan/Source/charon/encoding/message.c

844 lines
22 KiB
C
Raw Normal View History

/**
* @file message.c
*
2005-11-28 16:55:46 +00:00
* @brief Implementation of message_t.
*
*/
/*
* Copyright (C) 2005 Jan Hutter, Martin Willi
* Hochschule fuer Technik Rapperswil
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
#include <stdlib.h>
#include "message.h"
2005-11-23 09:24:35 +00:00
#include <types.h>
#include <globals.h>
2005-11-23 10:11:50 +00:00
#include <sa/ike_sa_id.h>
2005-11-23 09:57:18 +00:00
#include <encoding/generator.h>
#include <encoding/parser.h>
2005-11-23 09:24:35 +00:00
#include <utils/linked_list.h>
#include <utils/allocator.h>
#include <utils/logger_manager.h>
2005-11-23 09:57:18 +00:00
#include <encoding/payloads/encodings.h>
#include <encoding/payloads/payload.h>
2005-11-28 15:43:05 +00:00
#include <encoding/payloads/encryption_payload.h>
2005-11-24 09:17:51 +00:00
typedef struct supported_payload_entry_t supported_payload_entry_t;
/**
2005-11-28 16:55:46 +00:00
* Supported payload entry used in message_rule_t.
*
*/
2005-11-24 09:17:51 +00:00
struct supported_payload_entry_t {
/**
2005-11-28 16:55:46 +00:00
* Payload type.
*/
payload_type_t payload_type;
/**
2005-11-28 16:55:46 +00:00
* Minimal occurence of this payload.
*/
size_t min_occurence;
/**
2005-11-28 16:55:46 +00:00
* Max occurence of this payload.
*/
size_t max_occurence;
};
2005-11-24 09:17:51 +00:00
typedef struct message_rule_t message_rule_t;
/**
2005-11-28 16:55:46 +00:00
* Message Rule used to find out which payloads
* are supported by each message type.
*
*/
2005-11-24 09:17:51 +00:00
struct message_rule_t {
/**
2005-11-28 16:55:46 +00:00
* Type of message.
*/
exchange_type_t exchange_type;
/**
2005-11-28 16:55:46 +00:00
* Is message a request or response.
*/
bool is_request;
/**
2005-11-28 16:55:46 +00:00
* Number of supported payloads.
*/
size_t supported_payloads_count;
/**
2005-11-28 16:55:46 +00:00
* Pointer to first supported payload entry.
*/
supported_payload_entry_t *supported_payloads;
};
2005-11-21 15:34:44 +00:00
/**
2005-11-28 16:55:46 +00:00
* Message rule for IKE_SA_INIT from initiator.
2005-11-21 15:34:44 +00:00
*/
2005-11-17 11:19:45 +00:00
static supported_payload_entry_t supported_ike_sa_init_i_payloads[] =
{
{SECURITY_ASSOCIATION,1,1},
{KEY_EXCHANGE,1,1},
2005-11-17 11:19:45 +00:00
{NONCE,1,1},
};
2005-11-21 15:34:44 +00:00
/**
2005-11-28 16:55:46 +00:00
* Message rule for IKE_SA_INIT from responder.
2005-11-21 15:34:44 +00:00
*/
2005-11-17 11:19:45 +00:00
static supported_payload_entry_t supported_ike_sa_init_r_payloads[] =
{
{SECURITY_ASSOCIATION,1,1},
{KEY_EXCHANGE,1,1},
{NONCE,1,1},
};
2005-11-21 15:34:44 +00:00
/**
2005-11-28 16:55:46 +00:00
* Message rules, defines allowed payloads.
2005-11-21 15:34:44 +00:00
*/
2005-11-17 11:19:45 +00:00
static message_rule_t message_rules[] = {
{IKE_SA_INIT,TRUE,(sizeof(supported_ike_sa_init_i_payloads)/sizeof(supported_payload_entry_t)),supported_ike_sa_init_i_payloads},
{IKE_SA_INIT,FALSE,(sizeof(supported_ike_sa_init_r_payloads)/sizeof(supported_payload_entry_t)),supported_ike_sa_init_r_payloads}
};
2005-11-24 11:30:19 +00:00
typedef struct payload_entry_t payload_entry_t;
/**
2005-11-28 16:55:46 +00:00
* Entry for a payload in the internal used linked list.
*
*/
2005-11-24 11:30:19 +00:00
struct payload_entry_t {
/**
2005-11-28 16:55:46 +00:00
* Type of payload.
*/
payload_type_t payload_type;
/**
2005-11-28 16:55:46 +00:00
* Data struct holding the data of given payload.
*/
void *data_struct;
};
2005-11-24 11:30:19 +00:00
typedef struct private_message_t private_message_t;
/**
2005-11-28 16:55:46 +00:00
* Private data of an message_t object.
*/
2005-11-24 11:30:19 +00:00
struct private_message_t {
/**
2005-11-28 16:55:46 +00:00
* Public part of a message_t object.
*/
message_t public;
/**
2005-11-28 16:55:46 +00:00
* Minor version of message.
*/
u_int8_t major_version;
/**
2005-11-28 16:55:46 +00:00
* Major version of message.
*/
u_int8_t minor_version;
/**
2005-11-28 16:55:46 +00:00
* First Payload in message.
*/
payload_type_t first_payload;
/**
2005-11-28 16:55:46 +00:00
* Assigned exchange type.
*/
exchange_type_t exchange_type;
/**
* TRUE if message is request.
* FALSE if message is reply.
*/
bool is_request;
2005-11-10 15:38:38 +00:00
/**
2005-11-28 16:55:46 +00:00
* Message ID of this message.
*/
u_int32_t message_id;
/**
2005-11-28 16:55:46 +00:00
* ID of assigned IKE_SA.
*/
ike_sa_id_t *ike_sa_id;
2005-11-10 15:38:38 +00:00
/**
* Assigned UDP packet.
*
* Stores incoming packet or last generated one.
*/
packet_t *packet;
2005-11-10 15:38:38 +00:00
/**
2005-11-28 16:55:46 +00:00
* Linked List where payload data are stored in.
*/
2005-11-10 15:38:38 +00:00
linked_list_t *payloads;
2005-11-16 16:50:13 +00:00
/**
2005-11-28 16:55:46 +00:00
* Assigned parser to parse Header and Body of this message.
2005-11-16 16:50:13 +00:00
*/
parser_t *parser;
/**
2005-11-28 16:55:46 +00:00
* Assigned logger.
*/
logger_t *logger;
2005-11-17 11:19:45 +00:00
/**
* Gets a list of supported payloads of this message type
*
* @param this calling object
* @param[out] supported_payloads first entry of supported payloads
* @param[out] supported_payloads_count number of supported payload entries
*
2005-11-28 16:55:46 +00:00
* @return
* - SUCCESS
* - NOT_FOUND if no supported payload definition could be found
2005-11-17 11:19:45 +00:00
*/
status_t (*get_supported_payloads) (private_message_t *this, supported_payload_entry_t **supported_payloads,size_t *supported_payloads_count);
};
2005-11-17 11:19:45 +00:00
/**
2005-11-28 16:55:46 +00:00
* Implementation of private_message_t.get_supported_payloads.
2005-11-17 11:19:45 +00:00
*/
status_t get_supported_payloads (private_message_t *this, supported_payload_entry_t **supported_payloads,size_t *supported_payloads_count)
{
int i;
exchange_type_t exchange_type = this->public.get_exchange_type(&(this->public));
bool is_request = this->public.get_request(&(this->public));
for (i = 0; i < (sizeof(message_rules) / sizeof(message_rule_t)); i++)
{
if ((exchange_type == message_rules[i].exchange_type) &&
(is_request == message_rules[i].is_request))
{
/* found rule for given exchange_type*/
*supported_payloads = message_rules[i].supported_payloads;
*supported_payloads_count = message_rules[i].supported_payloads_count;
return SUCCESS;
}
}
*supported_payloads = NULL;
*supported_payloads_count = 0;
return NOT_FOUND;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.set_ike_sa_id.
*/
2005-11-28 16:55:46 +00:00
static void set_ike_sa_id (private_message_t *this,ike_sa_id_t *ike_sa_id)
{
2005-11-28 16:55:46 +00:00
ike_sa_id->clone(ike_sa_id,&(this->ike_sa_id));
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.get_ike_sa_id.
*/
static status_t get_ike_sa_id (private_message_t *this,ike_sa_id_t **ike_sa_id)
{
if (this->ike_sa_id == NULL)
{
return FAILED;
}
2005-11-28 16:55:46 +00:00
this->ike_sa_id->clone(this->ike_sa_id,ike_sa_id);
return SUCCESS;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.set_message_id.
*/
2005-11-28 16:55:46 +00:00
static void set_message_id (private_message_t *this,u_int32_t message_id)
{
this->message_id = message_id;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.get_message_id.
*/
static u_int32_t get_message_id (private_message_t *this)
{
return this->message_id;
}
2005-11-22 15:37:32 +00:00
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.get_responder_spi.
2005-11-22 15:37:32 +00:00
*/
static u_int64_t get_responder_spi (private_message_t *this)
{
return (this->ike_sa_id->get_responder_spi(this->ike_sa_id));
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.set_major_version.
*/
2005-11-28 16:55:46 +00:00
static void set_major_version (private_message_t *this,u_int8_t major_version)
{
this->major_version = major_version;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.set_major_version.
*/
static u_int8_t get_major_version (private_message_t *this)
{
return this->major_version;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.set_minor_version.
*/
2005-11-28 16:55:46 +00:00
static void set_minor_version (private_message_t *this,u_int8_t minor_version)
{
this->minor_version = minor_version;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.get_minor_version.
*/
static u_int8_t get_minor_version (private_message_t *this)
{
return this->minor_version;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.set_exchange_type.
*/
2005-11-28 16:55:46 +00:00
static void set_exchange_type (private_message_t *this,exchange_type_t exchange_type)
{
this->exchange_type = exchange_type;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.get_exchange_type.
*/
static exchange_type_t get_exchange_type (private_message_t *this)
{
return this->exchange_type;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.set_request.
*/
2005-11-28 16:55:46 +00:00
static void set_request (private_message_t *this,bool request)
{
this->is_request = request;
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.get_request.
*/
static exchange_type_t get_request (private_message_t *this)
{
return this->is_request;
}
2005-11-28 16:55:46 +00:00
/**
* Implementation of message_t.add_payload.
*/
static void add_payload(private_message_t *this, payload_t *payload)
{
payload_t *last_payload;
2005-11-28 16:55:46 +00:00
if (this->payloads->get_count(this->payloads) > 0)
{
2005-11-28 16:55:46 +00:00
this->payloads->get_last(this->payloads,(void **) &last_payload);
}
2005-11-28 16:55:46 +00:00
this->payloads->insert_last(this->payloads, payload);
if (this->payloads->get_count(this->payloads) == 1)
{
this->first_payload = payload->get_type(payload);
}
else
{
last_payload->set_next_type(last_payload,payload->get_type(payload));
}
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, CONTROL|MORE, "added payload of type %s to message",
mapping_find(payload_type_m, payload->get_type(payload)));
}
2005-11-28 16:55:46 +00:00
/**
* Implementation of message_t.set_source.
*/
static void set_source(private_message_t *this, host_t *host)
{
if (this->packet->source != NULL)
{
this->packet->source->destroy(this->packet->source);
}
this->packet->source = host;
}
2005-11-28 16:55:46 +00:00
/**
* Implementation of message_t.set_destination.
*/
static void set_destination(private_message_t *this, host_t *host)
{
if (this->packet->destination != NULL)
{
this->packet->destination->destroy(this->packet->destination);
}
this->packet->destination = host;
}
2005-11-28 16:55:46 +00:00
/**
* Implementation of message_t.get_source.
*/
static void get_source(private_message_t *this, host_t **host)
{
*host = this->packet->source;
}
2005-11-28 16:55:46 +00:00
/**
* Implementation of message_t.get_destination.
*/
static void get_destination(private_message_t *this, host_t **host)
{
*host = this->packet->destination;
}
2005-11-28 16:55:46 +00:00
/**
* Implementation of message_t.get_destination.
*/
static void get_payload_iterator(private_message_t *this, iterator_t **iterator)
2005-11-18 10:31:56 +00:00
{
2005-11-28 16:55:46 +00:00
this->payloads->create_iterator(this->payloads, iterator, TRUE);
2005-11-18 10:31:56 +00:00
}
/**
2005-11-28 16:55:46 +00:00
* Implementation of message_t.generate.
*/
2005-11-28 15:43:05 +00:00
static status_t generate(private_message_t *this, crypter_t *crypter, signer_t* signer, packet_t **packet)
{
generator_t *generator;
ike_header_t *ike_header;
payload_t *payload, *next_payload;
iterator_t *iterator;
status_t status;
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, CONTROL, "generating message, contains %d payloads",
this->payloads->get_count(this->payloads));
if (this->exchange_type == EXCHANGE_TYPE_UNDEFINED)
{
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, ERROR, "exchange type is not defined");
return INVALID_STATE;
}
if (this->packet->source == NULL ||
this->packet->destination == NULL)
{
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, ERROR, "source/destination not defined");
return INVALID_STATE;
}
2005-11-28 15:43:05 +00:00
/* build ike header */
ike_header = ike_header_create();
2005-11-28 16:55:46 +00:00
ike_header->set_exchange_type(ike_header, this->exchange_type);
ike_header->set_message_id(ike_header, this->message_id);
ike_header->set_response_flag(ike_header, !this->is_request);
ike_header->set_initiator_flag(ike_header, this->ike_sa_id->is_initiator(this->ike_sa_id));
ike_header->set_initiator_spi(ike_header, this->ike_sa_id->get_initiator_spi(this->ike_sa_id));
ike_header->set_responder_spi(ike_header, this->ike_sa_id->get_responder_spi(this->ike_sa_id));
2005-11-17 14:28:07 +00:00
generator = generator_create();
payload = (payload_t*)ike_header;
2005-11-28 16:55:46 +00:00
this->payloads->create_iterator(this->payloads, &iterator, TRUE);
2005-11-28 15:43:05 +00:00
/* generate every payload, except last one */
while(iterator->has_next(iterator))
{
iterator->current(iterator, (void**)&next_payload);
payload->set_next_type(payload, next_payload->get_type(next_payload));
generator->generate_payload(generator, payload);
payload = next_payload;
}
iterator->destroy(iterator);
2005-11-28 15:43:05 +00:00
/* build last payload */
payload->set_next_type(payload, NO_PAYLOAD);
2005-11-28 15:43:05 +00:00
/* if it's an encryption payload, build it first */
if (payload->get_type(payload) == ENCRYPTED)
{
encryption_payload_t *encryption_payload = (encryption_payload_t*)payload;
encryption_payload->set_signer(encryption_payload, signer);
status = encryption_payload->encrypt(encryption_payload, crypter);
if (status != SUCCESS)
{
generator->destroy(generator);
ike_header->destroy(ike_header);
return status;
}
}
generator->generate_payload(generator, payload);
ike_header->destroy(ike_header);
2005-11-28 15:43:05 +00:00
/* build packet */
if (this->packet->data.ptr != NULL)
{
allocator_free(this->packet->data.ptr);
}
generator->write_to_chunk(generator, &(this->packet->data));
2005-11-28 15:43:05 +00:00
generator->destroy(generator);
2005-11-28 15:43:05 +00:00
/* append integrity checksum if necessary */
if (payload->get_type(payload) == ENCRYPTED)
{
encryption_payload_t *encryption_payload = (encryption_payload_t*)payload;
status = encryption_payload->build_signature(encryption_payload, this->packet->data);
if (status != SUCCESS)
{
return status;
}
}
2005-11-21 15:34:44 +00:00
2005-11-28 15:43:05 +00:00
/* colen packet for caller */
this->packet->clone(this->packet, packet);
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, CONTROL, "message generated successfully");
return SUCCESS;
}
2005-11-16 16:50:13 +00:00
/**
* Implements message_t's parse_header function.
* See #message_s.parse_header.
2005-11-16 16:50:13 +00:00
*/
2005-11-21 15:34:44 +00:00
static status_t parse_header(private_message_t *this)
2005-11-16 16:50:13 +00:00
{
ike_header_t *ike_header;
status_t status;
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, CONTROL, "parsing header of message");
2005-11-16 16:50:13 +00:00
this->parser->reset_context(this->parser);
status = this->parser->parse_payload(this->parser,HEADER,(payload_t **) &ike_header);
if (status != SUCCESS)
{
2005-11-17 12:50:54 +00:00
this->logger->log(this->logger, ERROR, "Header could not be parsed");
2005-11-16 16:50:13 +00:00
return status;
}
2005-11-17 12:50:54 +00:00
/* verify payload */
status = ike_header->payload_interface.verify(&(ike_header->payload_interface));
if (status != SUCCESS)
{
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, ERROR, "Header verification failed");
2005-11-22 12:36:27 +00:00
ike_header->destroy(ike_header);
2005-11-17 12:50:54 +00:00
return status;
}
if (this->ike_sa_id != NULL)
{
this->ike_sa_id->destroy(this->ike_sa_id);
}
this->ike_sa_id = ike_sa_id_create(ike_header->get_initiator_spi(ike_header),
ike_header->get_responder_spi(ike_header),
2005-11-21 15:34:44 +00:00
ike_header->get_initiator_flag(ike_header));
2005-11-28 16:55:46 +00:00
this->exchange_type = ike_header->get_exchange_type(ike_header);
this->message_id = ike_header->get_message_id(ike_header);
2005-11-17 11:19:45 +00:00
this->is_request = (!(ike_header->get_response_flag(ike_header)));
this->major_version = ike_header->get_maj_version(ike_header);
this->minor_version = ike_header->get_min_version(ike_header);
this->first_payload = ike_header->payload_interface.get_next_type(&(ike_header->payload_interface));
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, CONTROL, "parsing header successfully");
ike_header->destroy(ike_header);
return SUCCESS;
}
/**
2005-11-28 15:43:05 +00:00
* Implements message_t.parse_body.
*/
2005-11-28 15:43:05 +00:00
static status_t parse_body(private_message_t *this, crypter_t *crypter, signer_t *signer)
{
status_t status = SUCCESS;
payload_type_t current_payload_type = this->first_payload;
2005-11-21 15:34:44 +00:00
2005-11-28 15:43:05 +00:00
this->logger->log(this->logger, CONTROL, "parsing body of message");
while (current_payload_type != NO_PAYLOAD)
{
payload_t *current_payload;
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, CONTROL|MORE, "start parsing payload of type %s",
mapping_find(payload_type_m, current_payload_type));
status = this->parser->parse_payload(this->parser,current_payload_type,(payload_t **) &current_payload);
2005-11-17 11:19:45 +00:00
if (status != SUCCESS)
{
2005-11-28 15:43:05 +00:00
this->logger->log(this->logger, ERROR, "payload type %s could not be parsed",mapping_find(payload_type_m,current_payload_type));
return status;
2005-11-17 11:19:45 +00:00
}
2005-11-17 12:50:54 +00:00
status = current_payload->verify(current_payload);
2005-11-17 11:19:45 +00:00
if (status != SUCCESS)
{
2005-11-28 15:43:05 +00:00
this->logger->log(this->logger, ERROR, "payload type %s could not be verified",mapping_find(payload_type_m,current_payload_type));
2005-11-17 12:50:54 +00:00
status = VERIFY_ERROR;
2005-11-28 15:43:05 +00:00
return status;
}
/* encrypted payload must be decrypted */
if (current_payload->get_type(current_payload) == ENCRYPTED)
{
encryption_payload_t *encryption_payload = (encryption_payload_t*)current_payload;
encryption_payload->set_signer(encryption_payload, signer);
status = encryption_payload->verify_signature(encryption_payload, this->packet->data);
if (status != SUCCESS)
{
this->logger->log(this->logger, ERROR, "encryption payload signature invaild");
return status;
}
status = encryption_payload->decrypt(encryption_payload, crypter);
if (status != SUCCESS)
{
this->logger->log(this->logger, ERROR, "parsing decrypted encryption payload failed");
return status;
}
2005-11-17 11:19:45 +00:00
}
/* get next payload type */
current_payload_type = current_payload->get_next_type(current_payload);
2005-11-17 11:19:45 +00:00
status = this->payloads->insert_last(this->payloads,current_payload);
if (status != SUCCESS)
{
2005-11-28 15:43:05 +00:00
this->logger->log(this->logger, ERROR, "%s on adding payload", mapping_find(status_m, status));
return status;;
2005-11-17 11:19:45 +00:00
}
}
2005-11-28 15:43:05 +00:00
return this->public.verify(&(this->public));
}
/**
* implements message_t.verify
*/
static status_t verify(private_message_t *this)
{
iterator_t *iterator;
status_t status;
int i;
supported_payload_entry_t *supported_payloads;
size_t supported_payloads_count;
this->logger->log(this->logger, CONTROL|MORE, "verifying message");
status = this->get_supported_payloads(this, &supported_payloads, &supported_payloads_count);
2005-11-17 11:19:45 +00:00
if (status != SUCCESS)
{
2005-11-28 15:43:05 +00:00
this->logger->log(this->logger, ERROR, "could not get supported payloads: %s");
return status;
2005-11-17 11:19:45 +00:00
}
2005-11-28 16:55:46 +00:00
this->payloads->create_iterator(this->payloads,&iterator,TRUE);
2005-11-28 15:43:05 +00:00
/* check for payloads with wrong count*/
for (i = 0; i < supported_payloads_count;i++)
{
size_t min_occurence = supported_payloads[i].min_occurence;
size_t max_occurence = supported_payloads[i].max_occurence;
payload_type_t payload_type = supported_payloads[i].payload_type;
size_t found_payloads = 0;
2005-11-17 11:19:45 +00:00
2005-11-28 15:43:05 +00:00
iterator->reset(iterator);
2005-11-17 11:19:45 +00:00
2005-11-28 15:43:05 +00:00
while(iterator->has_next(iterator))
{
payload_t *current_payload;
2005-11-28 16:55:46 +00:00
iterator->current(iterator,(void **)&current_payload);
2005-11-28 15:43:05 +00:00
if (current_payload->get_type(current_payload) == payload_type)
2005-11-17 11:19:45 +00:00
{
2005-11-28 15:43:05 +00:00
found_payloads++;
if (found_payloads > max_occurence)
{
this->logger->log(this->logger, ERROR, "Payload of type %s more than %d times (%d) occured in current message",
mapping_find(payload_type_m,current_payload->get_type(current_payload)),max_occurence,found_payloads);
2005-11-17 11:19:45 +00:00
iterator->destroy(iterator);
2005-11-28 15:43:05 +00:00
return NOT_SUPPORTED;
}
2005-11-17 11:19:45 +00:00
}
}
2005-11-28 15:43:05 +00:00
if (found_payloads < min_occurence)
{
this->logger->log(this->logger, ERROR, "Payload of type %s not occured %d times",
mapping_find(payload_type_m,payload_type),min_occurence);
iterator->destroy(iterator);
return NOT_SUPPORTED;
}
2005-11-17 11:19:45 +00:00
}
2005-11-28 15:43:05 +00:00
iterator->destroy(iterator);
return SUCCESS;
2005-11-16 16:50:13 +00:00
}
/**
2005-11-10 15:38:38 +00:00
* Implements message_t's destroy function.
* See #message_s.destroy.
*/
2005-11-28 16:55:46 +00:00
static void destroy (private_message_t *this)
{
iterator_t *iterator;
2005-11-21 17:50:56 +00:00
this->packet->destroy(this->packet);
if (this->ike_sa_id != NULL)
{
this->ike_sa_id->destroy(this->ike_sa_id);
}
this->payloads->create_iterator(this->payloads, &iterator, TRUE);
while (iterator->has_next(iterator))
{
payload_t *payload;
iterator->current(iterator, (void**)&payload);
2005-11-21 15:34:44 +00:00
this->logger->log(this->logger, CONTROL|MOST, "Destroying payload of type %s",
mapping_find(payload_type_m, payload->get_type(payload)));
payload->destroy(payload);
}
iterator->destroy(iterator);
2005-11-10 15:38:38 +00:00
this->payloads->destroy(this->payloads);
this->parser->destroy(this->parser);
2005-11-21 15:34:44 +00:00
global_logger_manager->destroy_logger(global_logger_manager, this->logger);
2005-11-17 11:19:45 +00:00
allocator_free(this);
}
/*
* Described in Header-File
*/
2005-11-10 15:38:38 +00:00
message_t *message_create_from_packet(packet_t *packet)
{
private_message_t *this = allocator_alloc_thing(private_message_t);
if (this == NULL)
{
return NULL;
}
2005-11-10 15:38:38 +00:00
/* public functions */
2005-11-28 16:55:46 +00:00
this->public.set_major_version = (void(*)(message_t*, u_int8_t))set_major_version;
this->public.get_major_version = (u_int8_t(*)(message_t*))get_major_version;
2005-11-28 16:55:46 +00:00
this->public.set_minor_version = (void(*)(message_t*, u_int8_t))set_minor_version;
this->public.get_minor_version = (u_int8_t(*)(message_t*))get_minor_version;
2005-11-28 16:55:46 +00:00
this->public.set_message_id = (void(*)(message_t*, u_int32_t))set_message_id;
this->public.get_message_id = (u_int32_t(*)(message_t*))get_message_id;
2005-11-22 15:37:32 +00:00
this->public.get_responder_spi = (u_int64_t(*)(message_t*))get_responder_spi;
2005-11-28 16:55:46 +00:00
this->public.set_ike_sa_id = (void(*)(message_t*, ike_sa_id_t *))set_ike_sa_id;
this->public.get_ike_sa_id = (status_t(*)(message_t*, ike_sa_id_t **))get_ike_sa_id;
2005-11-28 16:55:46 +00:00
this->public.set_exchange_type = (void(*)(message_t*, exchange_type_t))set_exchange_type;
this->public.get_exchange_type = (exchange_type_t(*)(message_t*))get_exchange_type;
2005-11-28 16:55:46 +00:00
this->public.set_request = (void(*)(message_t*, bool))set_request;
this->public.get_request = (bool(*)(message_t*))get_request;
2005-11-28 16:55:46 +00:00
this->public.add_payload = (void(*)(message_t*,payload_t*))add_payload;
2005-11-28 15:43:05 +00:00
this->public.generate = (status_t (*) (message_t *,crypter_t*,signer_t*,packet_t**)) generate;
2005-11-28 16:55:46 +00:00
this->public.set_source = (void (*) (message_t*,host_t*)) set_source;
this->public.get_source = (void (*) (message_t*,host_t**)) get_source;
this->public.set_destination = (void (*) (message_t*,host_t*)) set_destination;
this->public.get_destination = (void (*) (message_t*,host_t**)) get_destination;
this->public.get_payload_iterator = (void (*) (message_t *, iterator_t **)) get_payload_iterator;
2005-11-28 15:43:05 +00:00
this->public.parse_header = (status_t (*) (message_t *)) parse_header;
this->public.parse_body = (status_t (*) (message_t *,crypter_t*,signer_t*)) parse_body;
this->public.verify = (status_t (*) (message_t*)) verify;
2005-11-28 16:55:46 +00:00
this->public.destroy = (void(*)(message_t*))destroy;
/* public values */
this->exchange_type = EXCHANGE_TYPE_UNDEFINED;
this->is_request = TRUE;
this->ike_sa_id = NULL;
this->first_payload = NO_PAYLOAD;
this->message_id = 0;
2005-11-17 11:19:45 +00:00
/* private functions */
this->get_supported_payloads = get_supported_payloads;
2005-11-10 15:38:38 +00:00
/* private values */
if (packet == NULL)
{
packet = packet_create();
}
if (packet == NULL)
{
allocator_free(this);
return NULL;
}
2005-11-10 15:38:38 +00:00
this->packet = packet;
this->payloads = linked_list_create();
if (this->payloads == NULL)
{
allocator_free(this);
return NULL;
}
2005-11-16 16:50:13 +00:00
/* parser is created from data of packet */
this->parser = parser_create(this->packet->data);
if (this->parser == NULL)
{
this->payloads->destroy(this->payloads);
allocator_free(this);
return NULL;
}
this->logger = global_logger_manager->create_logger(global_logger_manager, MESSAGE, NULL);
if (this->logger == NULL)
{
2005-11-16 16:50:13 +00:00
this->parser->destroy(this->parser);
this->payloads->destroy(this->payloads);
2005-11-16 16:50:13 +00:00
allocator_free(this);
return NULL;
}
return (&this->public);
}
2005-11-10 15:38:38 +00:00
/*
* Described in Header-File
*/
message_t *message_create()
{
return message_create_from_packet(NULL);
}