mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-04 00:00:14 -04:00
Added signature scheme options left/rightauth
This commit is contained in:
parent
918e92c4c9
commit
e35bbb9740
@ -260,6 +260,103 @@ static void build_crl_policy(auth_cfg_t *cfg, bool local, int policy)
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Parse public key / signature strength constraints
|
||||
*/
|
||||
static void parse_pubkey_constraints(char *auth, auth_cfg_t *cfg)
|
||||
{
|
||||
enumerator_t *enumerator;
|
||||
bool rsa = FALSE, ecdsa = FALSE, rsa_len = FALSE, ecdsa_len = FALSE;
|
||||
int strength;
|
||||
char *token;
|
||||
|
||||
enumerator = enumerator_create_token(auth, "-", "");
|
||||
while (enumerator->enumerate(enumerator, &token))
|
||||
{
|
||||
bool found = FALSE;
|
||||
int i;
|
||||
struct {
|
||||
char *name;
|
||||
signature_scheme_t scheme;
|
||||
key_type_t key;
|
||||
} schemes[] = {
|
||||
{ "md5", SIGN_RSA_EMSA_PKCS1_MD5, KEY_RSA, },
|
||||
{ "sha1", SIGN_RSA_EMSA_PKCS1_SHA1, KEY_RSA, },
|
||||
{ "sha224", SIGN_RSA_EMSA_PKCS1_SHA224, KEY_RSA, },
|
||||
{ "sha256", SIGN_RSA_EMSA_PKCS1_SHA256, KEY_RSA, },
|
||||
{ "sha384", SIGN_RSA_EMSA_PKCS1_SHA384, KEY_RSA, },
|
||||
{ "sha512", SIGN_RSA_EMSA_PKCS1_SHA512, KEY_RSA, },
|
||||
{ "sha1", SIGN_ECDSA_WITH_SHA1_DER, KEY_ECDSA, },
|
||||
{ "sha256", SIGN_ECDSA_WITH_SHA256_DER, KEY_ECDSA, },
|
||||
{ "sha384", SIGN_ECDSA_WITH_SHA384_DER, KEY_ECDSA, },
|
||||
{ "sha512", SIGN_ECDSA_WITH_SHA512_DER, KEY_ECDSA, },
|
||||
{ "sha256", SIGN_ECDSA_256, KEY_ECDSA, },
|
||||
{ "sha384", SIGN_ECDSA_384, KEY_ECDSA, },
|
||||
{ "sha512", SIGN_ECDSA_521, KEY_ECDSA, },
|
||||
};
|
||||
|
||||
if (rsa_len || ecdsa_len)
|
||||
{ /* expecting a key strength token */
|
||||
strength = atoi(token);
|
||||
if (strength)
|
||||
{
|
||||
if (rsa_len)
|
||||
{
|
||||
cfg->add(cfg, AUTH_RULE_RSA_STRENGTH, (uintptr_t)strength);
|
||||
}
|
||||
else if (ecdsa_len)
|
||||
{
|
||||
cfg->add(cfg, AUTH_RULE_ECDSA_STRENGTH, (uintptr_t)strength);
|
||||
}
|
||||
}
|
||||
rsa_len = ecdsa_len = FALSE;
|
||||
if (strength)
|
||||
{
|
||||
continue;
|
||||
}
|
||||
}
|
||||
if (streq(token, "rsa"))
|
||||
{
|
||||
rsa = rsa_len = TRUE;
|
||||
continue;
|
||||
}
|
||||
if (streq(token, "ecdsa"))
|
||||
{
|
||||
ecdsa = ecdsa_len = TRUE;
|
||||
continue;
|
||||
}
|
||||
if (streq(token, "pubkey"))
|
||||
{
|
||||
continue;
|
||||
}
|
||||
|
||||
for (i = 0; i < countof(schemes); i++)
|
||||
{
|
||||
if (streq(schemes[i].name, token))
|
||||
{
|
||||
/* for each matching string, allow the scheme, if:
|
||||
* - it is an RSA scheme, and we enforced RSA
|
||||
* - it is an ECDSA scheme, and we enforced ECDSA
|
||||
* - it is not a key type specific scheme
|
||||
*/
|
||||
if ((rsa && schemes[i].key == KEY_RSA) ||
|
||||
(ecdsa && schemes[i].key == KEY_ECDSA) ||
|
||||
(!rsa && !ecdsa))
|
||||
{
|
||||
cfg->add(cfg, AUTH_RULE_SIGNATURE_SCHEME,
|
||||
(uintptr_t)schemes[i].scheme);
|
||||
}
|
||||
found = TRUE;
|
||||
}
|
||||
}
|
||||
if (!found)
|
||||
{
|
||||
DBG1(DBG_CFG, "ignoring invalid auth token: '%s'", token);
|
||||
}
|
||||
}
|
||||
enumerator->destroy(enumerator);
|
||||
}
|
||||
|
||||
/**
|
||||
* build authentication config
|
||||
*/
|
||||
@ -423,23 +520,14 @@ static auth_cfg_t *build_auth_cfg(private_stroke_config_t *this,
|
||||
}
|
||||
|
||||
/* authentication metod (class, actually) */
|
||||
if (streq(auth, "pubkey") ||
|
||||
if (strneq(auth, "pubkey", strlen("pubkey")) ||
|
||||
strneq(auth, "rsa", strlen("rsa")) ||
|
||||
strneq(auth, "ecdsa", strlen("ecdsa")))
|
||||
{
|
||||
u_int strength;
|
||||
|
||||
cfg->add(cfg, AUTH_RULE_AUTH_CLASS, AUTH_CLASS_PUBKEY);
|
||||
build_crl_policy(cfg, local, msg->add_conn.crl_policy);
|
||||
|
||||
if (sscanf(auth, "rsa-%d", &strength) == 1)
|
||||
{
|
||||
cfg->add(cfg, AUTH_RULE_RSA_STRENGTH, (uintptr_t)strength);
|
||||
}
|
||||
if (sscanf(auth, "ecdsa-%d", &strength) == 1)
|
||||
{
|
||||
cfg->add(cfg, AUTH_RULE_ECDSA_STRENGTH, (uintptr_t)strength);
|
||||
}
|
||||
parse_pubkey_constraints(auth, cfg);
|
||||
}
|
||||
else if (streq(auth, "psk") || streq(auth, "secret"))
|
||||
{
|
||||
|
Loading…
x
Reference in New Issue
Block a user