simaka_manager.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626
  1. /*
  2. * Copyright (C) 2008 Martin Willi
  3. * HSR Hochschule fuer Technik Rapperswil
  4. *
  5. * This program is free software; you can redistribute it and/or modify it
  6. * under the terms of the GNU General Public License as published by the
  7. * Free Software Foundation; either version 2 of the License, or (at your
  8. * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
  9. *
  10. * This program is distributed in the hope that it will be useful, but
  11. * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
  12. * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
  13. * for more details.
  14. */
  15. #include "simaka_manager.h"
  16. #include <utils/debug.h>
  17. #include <collections/linked_list.h>
  18. #include <threading/rwlock.h>
  19. typedef struct private_simaka_manager_t private_simaka_manager_t;
  20. /**
  21. * Private data of an simaka_manager_t object.
  22. */
  23. struct private_simaka_manager_t {
  24. /**
  25. * Public simaka_manager_t interface.
  26. */
  27. simaka_manager_t public;
  28. /**
  29. * list of added cards
  30. */
  31. linked_list_t *cards;
  32. /**
  33. * list of added provider
  34. */
  35. linked_list_t *providers;
  36. /**
  37. * list of added hooks
  38. */
  39. linked_list_t *hooks;
  40. /**
  41. * lock for lists above
  42. */
  43. rwlock_t *lock;
  44. };
  45. /**
  46. * Described in header.
  47. */
  48. void libsimaka_init(void)
  49. {
  50. /* empty */
  51. }
  52. METHOD(simaka_manager_t, add_card, void,
  53. private_simaka_manager_t *this, simaka_card_t *card)
  54. {
  55. this->lock->write_lock(this->lock);
  56. this->cards->insert_last(this->cards, card);
  57. this->lock->unlock(this->lock);
  58. }
  59. METHOD(simaka_manager_t, remove_card, void,
  60. private_simaka_manager_t *this, simaka_card_t *card)
  61. {
  62. this->lock->write_lock(this->lock);
  63. this->cards->remove(this->cards, card, NULL);
  64. this->lock->unlock(this->lock);
  65. }
  66. METHOD(simaka_manager_t, card_get_triplet, bool,
  67. private_simaka_manager_t *this, identification_t *id,
  68. char rand[SIM_RAND_LEN], char sres[SIM_SRES_LEN], char kc[SIM_KC_LEN])
  69. {
  70. enumerator_t *enumerator;
  71. simaka_card_t *card;
  72. int tried = 0;
  73. this->lock->read_lock(this->lock);
  74. enumerator = this->cards->create_enumerator(this->cards);
  75. while (enumerator->enumerate(enumerator, &card))
  76. {
  77. if (card->get_triplet(card, id, rand, sres, kc))
  78. {
  79. enumerator->destroy(enumerator);
  80. this->lock->unlock(this->lock);
  81. return TRUE;
  82. }
  83. tried++;
  84. }
  85. enumerator->destroy(enumerator);
  86. this->lock->unlock(this->lock);
  87. DBG1(DBG_LIB, "tried %d SIM cards, but none has triplets for '%Y'",
  88. tried, id);
  89. return FALSE;
  90. }
  91. METHOD(simaka_manager_t, card_get_quintuplet, status_t,
  92. private_simaka_manager_t *this, identification_t *id, char rand[AKA_RAND_LEN],
  93. char autn[AKA_AUTN_LEN], char ck[AKA_CK_LEN], char ik[AKA_IK_LEN],
  94. char res[AKA_RES_MAX], int *res_len)
  95. {
  96. enumerator_t *enumerator;
  97. simaka_card_t *card;
  98. status_t status = NOT_FOUND;
  99. int tried = 0;
  100. this->lock->read_lock(this->lock);
  101. enumerator = this->cards->create_enumerator(this->cards);
  102. while (enumerator->enumerate(enumerator, &card))
  103. {
  104. status = card->get_quintuplet(card, id, rand, autn, ck, ik, res, res_len);
  105. switch (status)
  106. { /* try next on error, but not on INVALID_STATE */
  107. case SUCCESS:
  108. case INVALID_STATE:
  109. enumerator->destroy(enumerator);
  110. this->lock->unlock(this->lock);
  111. return status;
  112. case NOT_SUPPORTED:
  113. case FAILED:
  114. default:
  115. tried++;
  116. continue;
  117. }
  118. }
  119. enumerator->destroy(enumerator);
  120. this->lock->unlock(this->lock);
  121. DBG1(DBG_LIB, "tried %d SIM cards, but none has quintuplets for '%Y'",
  122. tried, id);
  123. return status;
  124. }
  125. METHOD(simaka_manager_t, card_resync, bool,
  126. private_simaka_manager_t *this, identification_t *id,
  127. char rand[AKA_RAND_LEN], char auts[AKA_AUTS_LEN])
  128. {
  129. enumerator_t *enumerator;
  130. simaka_card_t *card;
  131. this->lock->read_lock(this->lock);
  132. enumerator = this->cards->create_enumerator(this->cards);
  133. while (enumerator->enumerate(enumerator, &card))
  134. {
  135. if (card->resync(card, id, rand, auts))
  136. {
  137. enumerator->destroy(enumerator);
  138. this->lock->unlock(this->lock);
  139. return TRUE;
  140. }
  141. }
  142. enumerator->destroy(enumerator);
  143. this->lock->unlock(this->lock);
  144. return FALSE;
  145. }
  146. METHOD(simaka_manager_t, card_set_pseudonym, void,
  147. private_simaka_manager_t *this, identification_t *id,
  148. identification_t *pseudonym)
  149. {
  150. enumerator_t *enumerator;
  151. simaka_card_t *card;
  152. DBG1(DBG_LIB, "storing pseudonym '%Y' for '%Y'", pseudonym, id);
  153. this->lock->read_lock(this->lock);
  154. enumerator = this->cards->create_enumerator(this->cards);
  155. while (enumerator->enumerate(enumerator, &card))
  156. {
  157. card->set_pseudonym(card, id, pseudonym);
  158. }
  159. enumerator->destroy(enumerator);
  160. this->lock->unlock(this->lock);
  161. }
  162. METHOD(simaka_manager_t, card_get_pseudonym, identification_t*,
  163. private_simaka_manager_t *this, identification_t *id)
  164. {
  165. enumerator_t *enumerator;
  166. simaka_card_t *card;
  167. identification_t *pseudonym = NULL;
  168. this->lock->read_lock(this->lock);
  169. enumerator = this->cards->create_enumerator(this->cards);
  170. while (enumerator->enumerate(enumerator, &card))
  171. {
  172. pseudonym = card->get_pseudonym(card, id);
  173. if (pseudonym)
  174. {
  175. DBG1(DBG_LIB, "using stored pseudonym identity '%Y' "
  176. "instead of '%Y'", pseudonym, id);
  177. break;
  178. }
  179. }
  180. enumerator->destroy(enumerator);
  181. this->lock->unlock(this->lock);
  182. return pseudonym;
  183. }
  184. METHOD(simaka_manager_t, card_set_reauth, void,
  185. private_simaka_manager_t *this, identification_t *id, identification_t *next,
  186. char mk[HASH_SIZE_SHA1], uint16_t counter)
  187. {
  188. enumerator_t *enumerator;
  189. simaka_card_t *card;
  190. DBG1(DBG_LIB, "storing next reauthentication identity '%Y' for '%Y'",
  191. next, id);
  192. this->lock->read_lock(this->lock);
  193. enumerator = this->cards->create_enumerator(this->cards);
  194. while (enumerator->enumerate(enumerator, &card))
  195. {
  196. card->set_reauth(card, id, next, mk, counter);
  197. }
  198. enumerator->destroy(enumerator);
  199. this->lock->unlock(this->lock);
  200. }
  201. METHOD(simaka_manager_t, card_get_reauth, identification_t*,
  202. private_simaka_manager_t *this, identification_t *id, char mk[HASH_SIZE_SHA1],
  203. uint16_t *counter)
  204. {
  205. enumerator_t *enumerator;
  206. simaka_card_t *card;
  207. identification_t *reauth = NULL;
  208. this->lock->read_lock(this->lock);
  209. enumerator = this->cards->create_enumerator(this->cards);
  210. while (enumerator->enumerate(enumerator, &card))
  211. {
  212. reauth = card->get_reauth(card, id, mk, counter);
  213. if (reauth)
  214. {
  215. DBG1(DBG_LIB, "using stored reauthentication identity '%Y' "
  216. "instead of '%Y'", reauth, id);
  217. break;
  218. }
  219. }
  220. enumerator->destroy(enumerator);
  221. this->lock->unlock(this->lock);
  222. return reauth;
  223. }
  224. METHOD(simaka_manager_t, add_provider, void,
  225. private_simaka_manager_t *this, simaka_provider_t *provider)
  226. {
  227. this->lock->write_lock(this->lock);
  228. this->providers->insert_last(this->providers, provider);
  229. this->lock->unlock(this->lock);
  230. }
  231. METHOD(simaka_manager_t, remove_provider, void,
  232. private_simaka_manager_t *this, simaka_provider_t *provider)
  233. {
  234. this->lock->write_lock(this->lock);
  235. this->providers->remove(this->providers, provider, NULL);
  236. this->lock->unlock(this->lock);
  237. }
  238. METHOD(simaka_manager_t, provider_get_triplet, bool,
  239. private_simaka_manager_t *this, identification_t *id,
  240. char rand[SIM_RAND_LEN], char sres[SIM_SRES_LEN], char kc[SIM_KC_LEN])
  241. {
  242. enumerator_t *enumerator;
  243. simaka_provider_t *provider;
  244. int tried = 0;
  245. this->lock->read_lock(this->lock);
  246. enumerator = this->providers->create_enumerator(this->providers);
  247. while (enumerator->enumerate(enumerator, &provider))
  248. {
  249. if (provider->get_triplet(provider, id, rand, sres, kc))
  250. {
  251. enumerator->destroy(enumerator);
  252. this->lock->unlock(this->lock);
  253. return TRUE;
  254. }
  255. tried++;
  256. }
  257. enumerator->destroy(enumerator);
  258. this->lock->unlock(this->lock);
  259. DBG1(DBG_LIB, "tried %d SIM providers, but none had a triplet for '%Y'",
  260. tried, id);
  261. return FALSE;
  262. }
  263. METHOD(simaka_manager_t, provider_get_quintuplet, bool,
  264. private_simaka_manager_t *this, identification_t *id,
  265. char rand[AKA_RAND_LEN], char xres[AKA_RES_MAX], int *xres_len,
  266. char ck[AKA_CK_LEN], char ik[AKA_IK_LEN], char autn[AKA_AUTN_LEN])
  267. {
  268. enumerator_t *enumerator;
  269. simaka_provider_t *provider;
  270. int tried = 0;
  271. this->lock->read_lock(this->lock);
  272. enumerator = this->providers->create_enumerator(this->providers);
  273. while (enumerator->enumerate(enumerator, &provider))
  274. {
  275. if (provider->get_quintuplet(provider, id, rand, xres, xres_len,
  276. ck, ik, autn))
  277. {
  278. enumerator->destroy(enumerator);
  279. this->lock->unlock(this->lock);
  280. return TRUE;
  281. }
  282. }
  283. enumerator->destroy(enumerator);
  284. this->lock->unlock(this->lock);
  285. DBG1(DBG_LIB, "tried %d SIM providers, but none had a quintuplet for '%Y'",
  286. tried, id);
  287. return FALSE;
  288. }
  289. METHOD(simaka_manager_t, provider_resync, bool,
  290. private_simaka_manager_t *this, identification_t *id,
  291. char rand[AKA_RAND_LEN], char auts[AKA_AUTS_LEN])
  292. {
  293. enumerator_t *enumerator;
  294. simaka_provider_t *provider;
  295. this->lock->read_lock(this->lock);
  296. enumerator = this->providers->create_enumerator(this->providers);
  297. while (enumerator->enumerate(enumerator, &provider))
  298. {
  299. if (provider->resync(provider, id, rand, auts))
  300. {
  301. enumerator->destroy(enumerator);
  302. this->lock->unlock(this->lock);
  303. return TRUE;
  304. }
  305. }
  306. enumerator->destroy(enumerator);
  307. this->lock->unlock(this->lock);
  308. return FALSE;
  309. }
  310. METHOD(simaka_manager_t, provider_is_pseudonym, identification_t*,
  311. private_simaka_manager_t *this, identification_t *id)
  312. {
  313. enumerator_t *enumerator;
  314. simaka_provider_t *provider;
  315. identification_t *permanent = NULL;
  316. this->lock->read_lock(this->lock);
  317. enumerator = this->providers->create_enumerator(this->providers);
  318. while (enumerator->enumerate(enumerator, &provider))
  319. {
  320. permanent = provider->is_pseudonym(provider, id);
  321. if (permanent)
  322. {
  323. DBG1(DBG_LIB, "received pseudonym identity '%Y' "
  324. "mapping to '%Y'", id, permanent);
  325. break;
  326. }
  327. }
  328. enumerator->destroy(enumerator);
  329. this->lock->unlock(this->lock);
  330. return permanent;
  331. }
  332. METHOD(simaka_manager_t, provider_gen_pseudonym, identification_t*,
  333. private_simaka_manager_t *this, identification_t *id)
  334. {
  335. enumerator_t *enumerator;
  336. simaka_provider_t *provider;
  337. identification_t *pseudonym = NULL;
  338. this->lock->read_lock(this->lock);
  339. enumerator = this->providers->create_enumerator(this->providers);
  340. while (enumerator->enumerate(enumerator, &provider))
  341. {
  342. pseudonym = provider->gen_pseudonym(provider, id);
  343. if (pseudonym)
  344. {
  345. DBG1(DBG_LIB, "proposing new pseudonym '%Y'", pseudonym);
  346. break;
  347. }
  348. }
  349. enumerator->destroy(enumerator);
  350. this->lock->unlock(this->lock);
  351. return pseudonym;
  352. }
  353. METHOD(simaka_manager_t, provider_is_reauth, identification_t*,
  354. private_simaka_manager_t *this, identification_t *id, char mk[HASH_SIZE_SHA1],
  355. uint16_t *counter)
  356. {
  357. enumerator_t *enumerator;
  358. simaka_provider_t *provider;
  359. identification_t *permanent = NULL;
  360. this->lock->read_lock(this->lock);
  361. enumerator = this->providers->create_enumerator(this->providers);
  362. while (enumerator->enumerate(enumerator, &provider))
  363. {
  364. permanent = provider->is_reauth(provider, id, mk, counter);
  365. if (permanent)
  366. {
  367. DBG1(DBG_LIB, "received reauthentication identity '%Y' "
  368. "mapping to '%Y'", id, permanent);
  369. break;
  370. }
  371. }
  372. enumerator->destroy(enumerator);
  373. this->lock->unlock(this->lock);
  374. return permanent;
  375. }
  376. METHOD(simaka_manager_t, provider_gen_reauth, identification_t*,
  377. private_simaka_manager_t *this, identification_t *id, char mk[HASH_SIZE_SHA1])
  378. {
  379. enumerator_t *enumerator;
  380. simaka_provider_t *provider;
  381. identification_t *reauth = NULL;
  382. this->lock->read_lock(this->lock);
  383. enumerator = this->providers->create_enumerator(this->providers);
  384. while (enumerator->enumerate(enumerator, &provider))
  385. {
  386. reauth = provider->gen_reauth(provider, id, mk);
  387. if (reauth)
  388. {
  389. DBG1(DBG_LIB, "proposing new reauthentication identity '%Y'", reauth);
  390. break;
  391. }
  392. }
  393. enumerator->destroy(enumerator);
  394. this->lock->unlock(this->lock);
  395. return reauth;
  396. }
  397. METHOD(simaka_manager_t, add_hooks, void,
  398. private_simaka_manager_t *this, simaka_hooks_t *hooks)
  399. {
  400. this->lock->write_lock(this->lock);
  401. this->hooks->insert_last(this->hooks, hooks);
  402. this->lock->unlock(this->lock);
  403. }
  404. METHOD(simaka_manager_t, remove_hooks, void,
  405. private_simaka_manager_t *this, simaka_hooks_t *hooks)
  406. {
  407. this->lock->write_lock(this->lock);
  408. this->hooks->remove(this->hooks, hooks, NULL);
  409. this->lock->unlock(this->lock);
  410. }
  411. METHOD(simaka_manager_t, message_hook, void,
  412. private_simaka_manager_t *this, simaka_message_t *message,
  413. bool inbound, bool decrypted)
  414. {
  415. enumerator_t *enumerator;
  416. simaka_hooks_t *hooks;
  417. this->lock->read_lock(this->lock);
  418. enumerator = this->hooks->create_enumerator(this->hooks);
  419. while (enumerator->enumerate(enumerator, &hooks))
  420. {
  421. hooks->message(hooks, message, inbound, decrypted);
  422. }
  423. enumerator->destroy(enumerator);
  424. this->lock->unlock(this->lock);
  425. }
  426. METHOD(simaka_manager_t, key_hook, void,
  427. private_simaka_manager_t *this, chunk_t k_encr, chunk_t k_auth)
  428. {
  429. enumerator_t *enumerator;
  430. simaka_hooks_t *hooks;
  431. this->lock->read_lock(this->lock);
  432. enumerator = this->hooks->create_enumerator(this->hooks);
  433. while (enumerator->enumerate(enumerator, &hooks))
  434. {
  435. hooks->keys(hooks, k_encr, k_auth);
  436. }
  437. enumerator->destroy(enumerator);
  438. this->lock->unlock(this->lock);
  439. }
  440. METHOD(simaka_manager_t, destroy, void,
  441. private_simaka_manager_t *this)
  442. {
  443. this->cards->destroy(this->cards);
  444. this->providers->destroy(this->providers);
  445. this->hooks->destroy(this->hooks);
  446. this->lock->destroy(this->lock);
  447. free(this);
  448. }
  449. /**
  450. * See header
  451. */
  452. simaka_manager_t *simaka_manager_create()
  453. {
  454. private_simaka_manager_t *this;
  455. INIT(this,
  456. .public = {
  457. .add_card = _add_card,
  458. .remove_card = _remove_card,
  459. .card_get_triplet = _card_get_triplet,
  460. .card_get_quintuplet = _card_get_quintuplet,
  461. .card_resync = _card_resync,
  462. .card_set_pseudonym = _card_set_pseudonym,
  463. .card_get_pseudonym = _card_get_pseudonym,
  464. .card_set_reauth = _card_set_reauth,
  465. .card_get_reauth = _card_get_reauth,
  466. .add_provider = _add_provider,
  467. .remove_provider = _remove_provider,
  468. .provider_get_triplet = _provider_get_triplet,
  469. .provider_get_quintuplet = _provider_get_quintuplet,
  470. .provider_resync = _provider_resync,
  471. .provider_is_pseudonym = _provider_is_pseudonym,
  472. .provider_gen_pseudonym = _provider_gen_pseudonym,
  473. .provider_is_reauth = _provider_is_reauth,
  474. .provider_gen_reauth = _provider_gen_reauth,
  475. .add_hooks = _add_hooks,
  476. .remove_hooks = _remove_hooks,
  477. .message_hook = _message_hook,
  478. .key_hook = _key_hook,
  479. .destroy = _destroy,
  480. },
  481. .cards = linked_list_create(),
  482. .providers = linked_list_create(),
  483. .hooks = linked_list_create(),
  484. .lock = rwlock_create(RWLOCK_TYPE_DEFAULT),
  485. );
  486. return &this->public;
  487. }
  488. /**
  489. * (Un-)register a provider to a simaka manager
  490. */
  491. static bool register_card(char *mgr_name, bool reg, simaka_card_t *card)
  492. {
  493. simaka_manager_t *mgr;
  494. if (!card)
  495. {
  496. return FALSE;
  497. }
  498. mgr = lib->get(lib, mgr_name);
  499. if (mgr)
  500. {
  501. if (reg)
  502. {
  503. mgr->add_card(mgr, card);
  504. }
  505. else
  506. {
  507. mgr->remove_card(mgr, card);
  508. }
  509. return TRUE;
  510. }
  511. return FALSE;
  512. }
  513. /**
  514. * (Un-)register a provider to a simaka manager
  515. */
  516. static bool register_provider(char *mgr_name, bool reg,
  517. simaka_provider_t *provider)
  518. {
  519. simaka_manager_t *mgr;
  520. if (!provider)
  521. {
  522. return FALSE;
  523. }
  524. mgr = lib->get(lib, mgr_name);
  525. if (mgr)
  526. {
  527. if (reg)
  528. {
  529. mgr->add_provider(mgr, provider);
  530. }
  531. else
  532. {
  533. mgr->remove_provider(mgr, provider);
  534. }
  535. return TRUE;
  536. }
  537. return FALSE;
  538. }
  539. /**
  540. * See header
  541. */
  542. bool simaka_manager_register(plugin_t *plugin, plugin_feature_t *feature,
  543. bool reg, void *data)
  544. {
  545. simaka_manager_register_cb_t get = (simaka_manager_register_cb_t)data;
  546. if (feature->type == FEATURE_CUSTOM)
  547. {
  548. if (streq(feature->arg.custom, "aka-card"))
  549. {
  550. return register_card("aka-manager", reg, get(plugin));
  551. }
  552. else if (streq(feature->arg.custom, "aka-provider"))
  553. {
  554. return register_provider("aka-manager", reg, get(plugin));
  555. }
  556. else if (streq(feature->arg.custom, "sim-card"))
  557. {
  558. return register_card("sim-manager", reg, get(plugin));
  559. }
  560. else if (streq(feature->arg.custom, "sim-provider"))
  561. {
  562. return register_provider("sim-manager", reg, get(plugin));
  563. }
  564. }
  565. return FALSE;
  566. }