aboutsummaryrefslogtreecommitdiffstats
path: root/Source
diff options
context:
space:
mode:
authorMartin Willi <martin@strongswan.org>2006-03-20 15:43:26 +0000
committerMartin Willi <martin@strongswan.org>2006-03-20 15:43:26 +0000
commit87a217f9f1640ed08dbe06564f6fbcd3cdfdeefb (patch)
tree928291a14cedbcb875d205b5a38527a37f515561 /Source
parente8d25806f3281b71d2512e926c08f50f72d5d505 (diff)
downloadstrongswan-87a217f9f1640ed08dbe06564f6fbcd3cdfdeefb.tar.bz2
strongswan-87a217f9f1640ed08dbe06564f6fbcd3cdfdeefb.tar.xz
- works quite well now with ipsec.conf & ipsec starter
Diffstat (limited to 'Source')
-rw-r--r--Source/charon/config/connection.c38
-rw-r--r--Source/charon/config/connection.h22
-rwxr-xr-xSource/charon/config/connection_store.h6
-rwxr-xr-xSource/charon/config/credential_store.h11
-rw-r--r--Source/charon/config/policy.c100
-rw-r--r--Source/charon/config/policy.h60
-rwxr-xr-xSource/charon/config/policy_store.h7
-rw-r--r--Source/charon/config/proposal.c45
-rw-r--r--Source/charon/config/proposal.h8
-rw-r--r--Source/charon/config/traffic_selector.c31
-rw-r--r--Source/charon/config/traffic_selector.h33
-rw-r--r--Source/charon/daemon.h2
-rw-r--r--Source/charon/sa/authenticator.c28
-rw-r--r--Source/charon/sa/ike_sa.c36
-rw-r--r--Source/charon/sa/states/ike_auth_requested.c13
-rw-r--r--Source/charon/sa/states/ike_sa_init_requested.c3
-rw-r--r--Source/charon/sa/states/ike_sa_init_responded.c25
-rwxr-xr-xSource/charon/threads/stroke.c203
-rw-r--r--Source/charon/threads/stroke.h22
-rw-r--r--Source/charon/utils/identification.c23
-rw-r--r--Source/charon/utils/identification.h14
-rw-r--r--Source/charon/utils/logger.c28
22 files changed, 631 insertions, 127 deletions
diff --git a/Source/charon/config/connection.c b/Source/charon/config/connection.c
index 789cebb49..e0b29ac2f 100644
--- a/Source/charon/config/connection.c
+++ b/Source/charon/config/connection.c
@@ -114,6 +114,15 @@ static void update_my_host(private_connection_t *this, host_t *my_host)
}
/**
+ * Implementation of connection_t.update_other_host.
+ */
+static void update_other_host(private_connection_t *this, host_t *other_host)
+{
+ this->other_host->destroy(this->other_host);
+ this->other_host = other_host;
+}
+
+/**
* Implementation of connection_t.get_other_host.
*/
static host_t * get_other_host (private_connection_t *this)
@@ -238,6 +247,33 @@ static bool check_dh_group(private_connection_t *this, diffie_hellman_group_t dh
}
/**
+ * Implementation of connection_t.clone.
+ */
+static connection_t *clone(private_connection_t *this)
+{
+ iterator_t *iterator;
+ proposal_t *proposal;
+ private_connection_t *clone = (private_connection_t*)connection_create(
+ this->my_host->clone(this->my_host),
+ this->other_host->clone(this->other_host),
+ this->my_id->clone(this->my_id),
+ this->other_id->clone(this->other_id),
+ this->auth_method);
+
+ /* clone all proposals */
+ iterator = this->proposals->create_iterator(this->proposals, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ iterator->current(iterator, (void**)&proposal);
+ proposal = proposal->clone(proposal);
+ clone->proposals->insert_last(clone->proposals, (void*)proposal);
+ }
+ iterator->destroy(iterator);
+
+ return &clone->public;
+}
+
+/**
* Implementation of connection_t.destroy.
*/
static void destroy (private_connection_t *this)
@@ -269,6 +305,7 @@ connection_t * connection_create(host_t *my_host, host_t *other_host, identifica
this->public.get_other_id = (identification_t*(*)(connection_t*))get_other_id;
this->public.get_my_host = (host_t*(*)(connection_t*))get_my_host;
this->public.update_my_host = (void(*)(connection_t*,host_t*))update_my_host;
+ this->public.update_other_host = (void(*)(connection_t*,host_t*))update_other_host;
this->public.get_other_host = (host_t*(*)(connection_t*))get_other_host;
this->public.get_proposals = (linked_list_t*(*)(connection_t*))get_proposals;
this->public.select_proposal = (proposal_t*(*)(connection_t*,linked_list_t*))select_proposal;
@@ -276,6 +313,7 @@ connection_t * connection_create(host_t *my_host, host_t *other_host, identifica
this->public.get_auth_method = (auth_method_t(*)(connection_t*)) get_auth_method;
this->public.get_dh_group = (diffie_hellman_group_t(*)(connection_t*)) get_dh_group;
this->public.check_dh_group = (bool(*)(connection_t*,diffie_hellman_group_t)) check_dh_group;
+ this->public.clone = (connection_t*(*)(connection_t*))clone;
this->public.destroy = (void(*)(connection_t*))destroy;
/* private variables */
diff --git a/Source/charon/config/connection.h b/Source/charon/config/connection.h
index b112ace70..9ec26b778 100644
--- a/Source/charon/config/connection.h
+++ b/Source/charon/config/connection.h
@@ -123,7 +123,7 @@ struct connection_t {
/**
* @brief Update address of my host.
*
- * It may be necessary to uptdate this address, as it
+ * It may be necessary to uptdate own address, as it
* is set to the default route (0.0.0.0) in some cases.
* Old host is destroyed, new one NOT cloned.
*
@@ -131,6 +131,18 @@ struct connection_t {
* @param my_host new host to set as my_host
*/
void (*update_my_host) (connection_t *this, host_t *my_host);
+
+ /**
+ * @brief Update address of remote host.
+ *
+ * It may be necessary to uptdate remote address, as a
+ * connection may define %any (0.0.0.0) or a subnet.
+ * Old host is destroyed, new one NOT cloned.
+ *
+ * @param this calling object
+ * @param my_host new host to set as other_host
+ */
+ void (*update_other_host) (connection_t *this, host_t *other_host);
/**
* @brief Returns a list of all supported proposals.
@@ -193,6 +205,14 @@ struct connection_t {
bool (*check_dh_group) (connection_t *this, diffie_hellman_group_t dh_group);
/**
+ * @brief Clone a connection_t object.
+ *
+ * @param this connection to clone
+ * @return clone of it
+ */
+ connection_t *(*clone) (connection_t *this);
+
+ /**
* @brief Destroys a connection_t object.
*
* @param this calling object
diff --git a/Source/charon/config/connection_store.h b/Source/charon/config/connection_store.h
index aac10574b..8b80c0fea 100755
--- a/Source/charon/config/connection_store.h
+++ b/Source/charon/config/connection_store.h
@@ -33,7 +33,7 @@ typedef struct connection_store_t connection_store_t;
* @brief The interface for a store of connection_t's.
*
* @b Constructors:
- * - connection_store_create()
+ * - stroke_create()
*
* @ingroup config
*/
@@ -42,6 +42,8 @@ struct connection_store_t {
/**
* @brief Returns a connection definition identified by two IDs.
*
+ * This call is usefull to get a connection identified by addresses.
+ * It may be used after kernel request for traffic protection.
* The returned connection gets created/cloned and therefore must
* be destroyed after usage.
*
@@ -57,6 +59,8 @@ struct connection_store_t {
/**
* @brief Returns a connection definition identified by two hosts.
*
+ * This call is useful to get a connection which is identified by IDs
+ * rather than addresses, e.g. for connection setup on user request.
* The returned connection gets created/cloned and therefore must
* be destroyed after usage.
*
diff --git a/Source/charon/config/credential_store.h b/Source/charon/config/credential_store.h
index 89e9704b3..27f957aa1 100755
--- a/Source/charon/config/credential_store.h
+++ b/Source/charon/config/credential_store.h
@@ -34,7 +34,7 @@ typedef struct credential_store_t credential_store_t;
* @brief The interface for a credential_store backend.
*
* @b Constructors:
- * - credential_store_create()
+ * - stroke_create()
*
* @ingroup config
*/
@@ -43,8 +43,7 @@ struct credential_store_t {
/**
* @brief Returns the preshared secret of a specific ID.
*
- * The returned preshared secret MUST NOT be destroyed cause it's managed by
- * this credential_store_t object.
+ * The returned chunk must be destroyed by the caller after usage.
*
* @param this calling object
* @param identification identification_t object identifiying the secret.
@@ -59,8 +58,7 @@ struct credential_store_t {
/**
* @brief Returns the RSA public key of a specific ID.
*
- * The returned rsa_public_key_t object MUST NOT be destroyed cause it's managed by
- * this credential_store_t object.
+ * The returned rsa_public_key_t must be destroyed by the caller after usage.
*
* @param this calling object
* @param identification identification_t object identifiying the key.
@@ -75,8 +73,7 @@ struct credential_store_t {
/**
* @brief Returns the RSA private key of a specific ID.
*
- * The returned rsa_private_key_t object MUST NOT be destroyed cause it's managed by
- * this credential_store_t object.
+ * The returned rsa_private_key_t must be destroyed by the caller after usage.
*
* @param this calling object
* @param identification identification_t object identifiying the key
diff --git a/Source/charon/config/policy.c b/Source/charon/config/policy.c
index 0d9e8487d..fbdc46def 100644
--- a/Source/charon/config/policy.c
+++ b/Source/charon/config/policy.c
@@ -87,6 +87,57 @@ static identification_t *get_other_id(private_policy_t *this)
}
/**
+ * Implementation of policy_t.update_my_id
+ */
+static void update_my_id(private_policy_t *this, identification_t *my_id)
+{
+ this->my_id->destroy(this->my_id);
+ this->my_id = my_id;
+}
+
+/**
+ * Implementation of policy_t.update_other_id
+ */
+static void update_other_id(private_policy_t *this, identification_t *other_id)
+{
+ this->other_id->destroy(this->other_id);
+ this->other_id = other_id;
+}
+
+/**
+ * Helper function which does the work for policy_t.update_my_ts and update_other_ts
+ */
+static void update_ts(linked_list_t* list, host_t *new_host)
+{
+ traffic_selector_t *ts;
+ iterator_t *iterator;
+
+ iterator = list->create_iterator(list, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ iterator->current(iterator, (void**)&ts);
+ ts->update_address_range(ts, new_host);
+ }
+ iterator->destroy(iterator);
+}
+
+/**
+ * Implementation of policy_t.update_my_id
+ */
+static void update_my_ts(private_policy_t *this, host_t *my_host)
+{
+ update_ts(this->my_ts, my_host);
+}
+
+/**
+ * Implementation of policy_t.update_other_ts
+ */
+static void update_other_ts(private_policy_t *this, host_t *my_host)
+{
+ update_ts(this->other_ts, my_host);
+}
+
+/**
* Implementation of policy_t.get_my_traffic_selectors
*/
static linked_list_t *get_my_traffic_selectors(private_policy_t *this)
@@ -263,6 +314,50 @@ static status_t destroy(private_policy_t *this)
return SUCCESS;
}
+/**
+ * Implements policy_t.clone.
+ */
+static policy_t *clone(private_policy_t *this)
+{
+ private_policy_t *clone = (private_policy_t*)policy_create(this->my_id->clone(this->my_id),
+ this->other_id->clone(this->other_id));
+ iterator_t *iterator;
+ proposal_t *proposal;
+ traffic_selector_t *ts;
+
+ /* clone all proposals */
+ iterator = this->proposals->create_iterator(this->proposals, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ iterator->current(iterator, (void**)&proposal);
+ proposal = proposal->clone(proposal);
+ clone->proposals->insert_last(clone->proposals, (void*)proposal);
+ }
+ iterator->destroy(iterator);
+
+ /* clone all local traffic selectors */
+ iterator = this->my_ts->create_iterator(this->my_ts, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ iterator->current(iterator, (void**)&ts);
+ ts = ts->clone(ts);
+ clone->my_ts->insert_last(clone->my_ts, (void*)ts);
+ }
+ iterator->destroy(iterator);
+
+ /* clone all remote traffic selectors */
+ iterator = this->other_ts->create_iterator(this->other_ts, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ iterator->current(iterator, (void**)&ts);
+ ts = ts->clone(ts);
+ clone->other_ts->insert_last(clone->other_ts, (void*)ts);
+ }
+ iterator->destroy(iterator);
+
+ return &clone->public;
+}
+
/*
* Described in header-file
*/
@@ -273,6 +368,10 @@ policy_t *policy_create(identification_t *my_id, identification_t *other_id)
/* public functions */
this->public.get_my_id = (identification_t*(*)(policy_t*))get_my_id;
this->public.get_other_id = (identification_t*(*)(policy_t*))get_other_id;
+ this->public.update_my_id = (void(*)(policy_t*,identification_t*))update_my_id;
+ this->public.update_other_id = (void(*)(policy_t*,identification_t*))update_other_id;
+ this->public.update_my_ts = (void(*)(policy_t*,host_t*))update_my_ts;
+ this->public.update_other_ts = (void(*)(policy_t*,host_t*))update_other_ts;
this->public.get_my_traffic_selectors = (linked_list_t*(*)(policy_t*))get_my_traffic_selectors;
this->public.select_my_traffic_selectors = (linked_list_t*(*)(policy_t*,linked_list_t*))select_my_traffic_selectors;
this->public.get_other_traffic_selectors = (linked_list_t*(*)(policy_t*))get_other_traffic_selectors;
@@ -282,6 +381,7 @@ policy_t *policy_create(identification_t *my_id, identification_t *other_id)
this->public.add_my_traffic_selector = (void(*)(policy_t*,traffic_selector_t*))add_my_traffic_selector;
this->public.add_other_traffic_selector = (void(*)(policy_t*,traffic_selector_t*))add_other_traffic_selector;
this->public.add_proposal = (void(*)(policy_t*,proposal_t*))add_proposal;
+ this->public.clone = (policy_t*(*)(policy_t*))clone;
this->public.destroy = (void(*)(policy_t*))destroy;
/* apply init values */
diff --git a/Source/charon/config/policy.h b/Source/charon/config/policy.h
index ddae051b9..78cda1e8b 100644
--- a/Source/charon/config/policy.h
+++ b/Source/charon/config/policy.h
@@ -64,6 +64,56 @@ struct policy_t {
* @return other id
*/
identification_t *(*get_other_id) (policy_t *this);
+
+ /**
+ * @brief Update own ID.
+ *
+ * It may be necessary to uptdate own ID, as it
+ * is set to %any or to e.g. *@strongswan.org in
+ * some cases.
+ * Old ID is destroyed, new one NOT cloned.
+ *
+ * @param this calling object
+ * @param my_id new ID to set as my_id
+ */
+ void (*update_my_id) (policy_t *this, identification_t *my_id);
+
+ /**
+ * @brief Update others ID.
+ *
+ * It may be necessary to uptdate others ID, as it
+ * is set to %any or to e.g. *@strongswan.org in
+ * some cases.
+ * Old ID is destroyed, new one NOT cloned.
+ *
+ * @param this calling object
+ * @param other_id new ID to set as other_id
+ */
+ void (*update_other_id) (policy_t *this, identification_t *other_id);
+
+ /**
+ * @brief Update own address in traffic selectors.
+ *
+ * Update own 0.0.0.0 address in traffic selectors
+ * with supplied one. The size of the subnet will be
+ * set to /32.
+ *
+ * @param this calling object
+ * @param my_host new address to set in traffic selectors
+ */
+ void (*update_my_ts) (policy_t *this, host_t *my_host);
+
+ /**
+ * @brief Update others address in traffic selectors.
+ *
+ * Update remote 0.0.0.0 address in traffic selectors
+ * with supplied one. The size of the subnet will be
+ * set to /32.
+ *
+ * @param this calling object
+ * @param other_host new address to set in traffic selectors
+ */
+ void (*update_other_ts) (policy_t *this, host_t *other_host);
/**
* @brief Get configured traffic selectors for our site.
@@ -170,7 +220,15 @@ struct policy_t {
void (*add_proposal) (policy_t *this, proposal_t *proposal);
/**
- * @brief Destroys the config object
+ * @brief Clone a policy.
+ *
+ * @param this policy to clone
+ * @return clone of it
+ */
+ policy_t *(*clone) (policy_t *this);
+
+ /**
+ * @brief Destroys the policy object
*
* @param this calling object
*/
diff --git a/Source/charon/config/policy_store.h b/Source/charon/config/policy_store.h
index 1c4402393..467e27d1d 100755
--- a/Source/charon/config/policy_store.h
+++ b/Source/charon/config/policy_store.h
@@ -30,10 +30,10 @@
typedef struct policy_store_t policy_store_t;
/**
- * @brief The interface for a store of polcy_t's.
+ * @brief The interface for a store of policy_t's.
*
* @b Constructors:
- * - policy_store_create()
+ * - stroke_create()
*
* @ingroup config
*/
@@ -42,6 +42,9 @@ struct policy_store_t {
/**
* @brief Returns a policy identified by two IDs.
*
+ * The returned policy gets created/cloned and therefore must be
+ * destroyed by the caller.
+ *
* @param this calling object
* @param my_id own ID of the policy
* @param other_id others ID of the policy
diff --git a/Source/charon/config/proposal.c b/Source/charon/config/proposal.c
index a547583d9..e5a8a64cc 100644
--- a/Source/charon/config/proposal.c
+++ b/Source/charon/config/proposal.c
@@ -533,6 +533,50 @@ static u_int64_t get_spi(private_proposal_t *this, protocol_id_t proto)
}
/**
+ * Clone a algorithm list
+ */
+static void clone_algo_list(linked_list_t *list, linked_list_t *clone_list)
+{
+ algorithm_t *algo, *clone_algo;
+ iterator_t *iterator = list->create_iterator(list, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ iterator->current(iterator, (void**)&algo);
+ clone_algo = allocator_alloc_thing(algorithm_t);
+ memcpy(clone_algo, algo, sizeof(algorithm_t));
+ clone_list->insert_last(clone_list, (void*)clone_algo);
+ }
+ iterator->destroy(iterator);
+}
+
+/**
+ * Implements proposal_t.clone
+ */
+static proposal_t *clone(private_proposal_t *this)
+{
+ private_proposal_t *clone = (private_proposal_t*)proposal_create(this->number);
+
+ iterator_t *iterator = this->protocol_proposals->create_iterator(this->protocol_proposals, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ protocol_proposal_t *proto_prop, *clone_proto_prop;
+ iterator->current(iterator, (void**)&proto_prop);
+
+ clone_proto_prop = get_protocol_proposal(clone, proto_prop->protocol, TRUE);
+ memcpy(clone_proto_prop->spi.ptr, proto_prop->spi.ptr, clone_proto_prop->spi.len);
+
+ clone_algo_list(proto_prop->encryption_algos, clone_proto_prop->encryption_algos);
+ clone_algo_list(proto_prop->integrity_algos, clone_proto_prop->integrity_algos);
+ clone_algo_list(proto_prop->prf_algos, clone_proto_prop->prf_algos);
+ clone_algo_list(proto_prop->dh_groups, clone_proto_prop->dh_groups);
+ clone_algo_list(proto_prop->esns, clone_proto_prop->esns);
+ }
+ iterator->destroy(iterator);
+
+ return &clone->public;
+}
+
+/**
* Frees all list items and destroys the list
*/
static void free_algo_list(linked_list_t *list)
@@ -586,6 +630,7 @@ proposal_t *proposal_create(u_int8_t number)
this->public.get_protocols = (void(*)(proposal_t *this, protocol_id_t ids[2]))get_protocols;
this->public.set_spi = (void(*)(proposal_t*,protocol_id_t,u_int64_t spi))set_spi;
this->public.get_spi = (u_int64_t(*)(proposal_t*,protocol_id_t))get_spi;
+ this->public.clone = (proposal_t*(*)(proposal_t*))clone;
this->public.destroy = (void(*)(proposal_t*))destroy;
/* init private members*/
diff --git a/Source/charon/config/proposal.h b/Source/charon/config/proposal.h
index 48ed4ea79..e2a4856e9 100644
--- a/Source/charon/config/proposal.h
+++ b/Source/charon/config/proposal.h
@@ -237,6 +237,14 @@ struct proposal_t {
void (*set_spi) (proposal_t *this, protocol_id_t proto, u_int64_t spi);
/**
+ * @brief Clone a proposal.
+ *
+ * @param this proposal to clone
+ * @return clone of it
+ */
+ proposal_t *(*clone) (proposal_t *this);
+
+ /**
* @brief Destroys the proposal object.
*
* @param this calling object
diff --git a/Source/charon/config/traffic_selector.c b/Source/charon/config/traffic_selector.c
index 317b7a38e..0b8193135 100644
--- a/Source/charon/config/traffic_selector.c
+++ b/Source/charon/config/traffic_selector.c
@@ -225,7 +225,7 @@ static u_int8_t get_netmask(private_traffic_selector_t *this)
return bit;
}
}
- return 0;
+ return 32;
}
case TS_IPV6_ADDR_RANGE:
default:
@@ -236,6 +236,24 @@ static u_int8_t get_netmask(private_traffic_selector_t *this)
}
/**
+ * Implements traffic_selector_t.update_address_range.
+ */
+static void update_address_range(private_traffic_selector_t *this, host_t *host)
+{
+ if (host->get_family(host) == AF_INET &&
+ this->type == TS_IPV4_ADDR_RANGE)
+ {
+ if (this->from_addr_ipv4 == 0)
+ {
+ chunk_t from = host->get_address_as_chunk(host);
+ this->from_addr_ipv4 = ntohl(*((u_int32_t*)from.ptr));
+ this->to_addr_ipv4 = this->from_addr_ipv4;
+ allocator_free_chunk(&from);
+ }
+ }
+}
+
+/**
* Implements traffic_selector_t.clone.
*/
static traffic_selector_t *clone(private_traffic_selector_t *this)
@@ -315,7 +333,15 @@ traffic_selector_t *traffic_selector_create_from_subnet(host_t *net, u_int8_t ne
this->type = TS_IPV4_ADDR_RANGE;
from = net->get_address_as_chunk(net);
this->from_addr_ipv4 = ntohl(*((u_int32_t*)from.ptr));
- this->to_addr_ipv4 = this->from_addr_ipv4 | ((1 << (32 - netbits)) - 1);
+ if (this->from_addr_ipv4 == 0)
+ {
+ /* use /32 for 0.0.0.0 */
+ this->to_addr_ipv4 = 0xFFFFFF;
+ }
+ else
+ {
+ this->to_addr_ipv4 = this->from_addr_ipv4 | ((1 << (32 - netbits)) - 1);
+ }
allocator_free_chunk(&from);
break;
}
@@ -386,6 +412,7 @@ static private_traffic_selector_t *traffic_selector_create(u_int8_t protocol, ts
this->public.get_type = (ts_type_t(*)(traffic_selector_t*))get_type;
this->public.get_protocol = (u_int8_t(*)(traffic_selector_t*))get_protocol;
this->public.get_netmask = (u_int8_t(*)(traffic_selector_t*))get_netmask;
+ this->public.update_address_range = (void(*)(traffic_selector_t*,host_t*))update_address_range;
this->public.clone = (traffic_selector_t*(*)(traffic_selector_t*))clone;
this->public.destroy = (void(*)(traffic_selector_t*))destroy;
diff --git a/Source/charon/config/traffic_selector.h b/Source/charon/config/traffic_selector.h
index 2980520ce..7e59b53fc 100644
--- a/Source/charon/config/traffic_selector.h
+++ b/Source/charon/config/traffic_selector.h
@@ -169,12 +169,27 @@ struct traffic_selector_t {
*
* Returns the number of bits associated to the subnet.
* (As the "24" in "192.168.0.0/24"). This is approximated
- * if the address range is not a complete subnet!
+ * if the address range is not a complete subnet! Since Linux
+ * does not support full IP address ranges (yet), we can't do this
+ * (much) better.
*
* @param this calling obect
* @return netmask as "bits for subnet"
*/
u_int8_t (*get_netmask) (traffic_selector_t *this);
+
+ /**
+ * @brief Update the address of a traffic selector.
+ *
+ * Update the address range of a traffic selector,
+ * if the current address is 0.0.0.0. The new address range
+ * starts from the supplied address and also ends there
+ * (which means it is a one-host-address-range ;-).
+ *
+ * @param this calling obect
+ * @param host host_t specifying the address range
+ */
+ void (*update_address_range) (traffic_selector_t *this, host_t* host);
/**
* @brief Destroys the ts object
@@ -222,6 +237,22 @@ traffic_selector_t *traffic_selector_create_from_string(u_int8_t protocol, ts_ty
*/
traffic_selector_t *traffic_selector_create_from_bytes(u_int8_t protocol, ts_type_t type, chunk_t from_address, int16_t from_port, chunk_t to_address, u_int16_t to_port);
+/**
+ * @brief Create a new traffic selector defining a whole subnet.
+ *
+ * In most cases, definition of a traffic selector for full subnets
+ * is sufficient. This constructor creates a traffic selector for
+ * all protocols, all ports and the address range specified by the
+ * subnet.
+ *
+ * @param net subnet to use
+ * @param netbits size of the subnet, as used in e.g. 192.168.0.0/24 notation
+ * @return
+ * - traffic_selector_t object
+ * - NULL if address family of net not supported
+ *
+ * @ingroup config
+ */
traffic_selector_t *traffic_selector_create_from_subnet(host_t *net, u_int8_t netbits);
#endif /* TRAFFIC_SELECTOR_H_ */
diff --git a/Source/charon/daemon.h b/Source/charon/daemon.h
index 4b7003179..421dbd16a 100644
--- a/Source/charon/daemon.h
+++ b/Source/charon/daemon.h
@@ -66,7 +66,7 @@
/**
* Output of log, use NULL for syslog
*/
-#define LOG_OUTPUT stdout
+#define LOG_OUTPUT NULL
/**
* @brief Default loglevel for every logger context.
diff --git a/Source/charon/sa/authenticator.c b/Source/charon/sa/authenticator.c
index d735b633e..8b96246ac 100644
--- a/Source/charon/sa/authenticator.c
+++ b/Source/charon/sa/authenticator.c
@@ -206,9 +206,9 @@ static status_t verify_auth_data (private_authenticator_t *this,
status = charon->credentials->get_shared_secret(charon->credentials,
other_id,
&preshared_secret);
- other_id->destroy(other_id);
if (status != SUCCESS)
{
+ other_id->destroy(other_id);
return status;
}
@@ -218,20 +218,26 @@ static status_t verify_auth_data (private_authenticator_t *this,
other_id_payload,
initiator,
preshared_secret);
+ allocator_free_chunk(&preshared_secret);
if (auth_data.len != my_auth_data.len)
{
allocator_free_chunk(&my_auth_data);
- return FAILED;
+ status = FAILED;
}
- if (memcmp(auth_data.ptr,my_auth_data.ptr, my_auth_data.len) == 0)
+ else if (memcmp(auth_data.ptr,my_auth_data.ptr, my_auth_data.len) == 0)
{
+ this->logger->log(this->logger, CONTROL, "Authentication of %s with preshared secret successful",
+ other_id->get_string(other_id));
status = SUCCESS;
}
else
{
+ this->logger->log(this->logger, CONTROL, "Authentication of %s with preshared secret failed",
+ other_id->get_string(other_id));
status = FAILED;
}
+ other_id->destroy(other_id);
allocator_free_chunk(&my_auth_data);
return status;
}
@@ -247,16 +253,28 @@ static status_t verify_auth_data (private_authenticator_t *this,
status = charon->credentials->get_rsa_public_key(charon->credentials,
other_id,
&public_key);
- other_id->destroy(other_id);
if (status != SUCCESS)
{
+ other_id->destroy(other_id);
return status;
}
octets = this->allocate_octets(this,last_received_packet, my_nonce,other_id_payload, initiator);
status = public_key->verify_emsa_pkcs1_signature(public_key, octets, auth_data);
+ if (status == SUCCESS)
+ {
+ this->logger->log(this->logger, CONTROL, "Authentication of %s with RSA successful",
+ other_id->get_string(other_id));
+ }
+ else
+ {
+ this->logger->log(this->logger, CONTROL, "Authentication of %s with RSA failed",
+ other_id->get_string(other_id));
+ }
+ public_key->destroy(public_key);
+ other_id->destroy(other_id);
allocator_free_chunk(&octets);
return status;
}
@@ -300,6 +318,7 @@ static status_t compute_auth_data (private_authenticator_t *this,
auth_data = this->build_preshared_secret_signature(this, last_sent_packet, other_nonce,
my_id_payload, initiator, preshared_secret);
+ allocator_free_chunk(&preshared_secret);
*auth_payload = auth_payload_create();
(*auth_payload)->set_auth_method(*auth_payload, SHARED_KEY_MESSAGE_INTEGRITY_CODE);
(*auth_payload)->set_data(*auth_payload, auth_data);
@@ -334,6 +353,7 @@ static status_t compute_auth_data (private_authenticator_t *this,
(*auth_payload)->set_auth_method(*auth_payload, RSA_DIGITAL_SIGNATURE);
(*auth_payload)->set_data(*auth_payload, auth_data);
+ private_key->destroy(private_key);
allocator_free_chunk(&auth_data);
return SUCCESS;
}
diff --git a/Source/charon/sa/ike_sa.c b/Source/charon/sa/ike_sa.c
index 6517c388c..c990e1dac 100644
--- a/Source/charon/sa/ike_sa.c
+++ b/Source/charon/sa/ike_sa.c
@@ -210,8 +210,8 @@ static status_t process_message (private_ike_sa_t *this, message_t *message)
is_request = message->get_request(message);
exchange_type = message->get_exchange_type(message);
- this->logger->log(this->logger, CONTROL, "Process %s message of exchange type %s",
- (is_request) ? "REQUEST" : "RESPONSE",mapping_find(exchange_type_m,exchange_type));
+ this->logger->log(this->logger, CONTROL|LEVEL1, "Process %s of exchange type %s",
+ (is_request) ? "request" : "response",mapping_find(exchange_type_m,exchange_type));
message_id = message->get_message_id(message);
@@ -966,53 +966,61 @@ static void destroy (private_ike_sa_t *this)
/* inform other peer of delete */
send_delete_ike_sa_request(this);
-
while (this->child_sas->remove_last(this->child_sas, (void**)&child_sa) == SUCCESS)
{
child_sa->destroy(child_sa);
}
this->child_sas->destroy(this->child_sas);
- if (this->crypter_initiator != NULL)
+
+ if (this->crypter_initiator)
{
this->crypter_initiator->destroy(this->crypter_initiator);
}
- if (this->crypter_responder != NULL)
+ if (this->crypter_responder)
{
this->crypter_responder->destroy(this->crypter_responder);
}
- if (this->signer_initiator != NULL)
+ if (this->signer_initiator)
{
this->signer_initiator->destroy(this->signer_initiator);
}
- if (this->signer_responder != NULL)
+ if (this->signer_responder)
{
this->signer_responder->destroy(this->signer_responder);
}
- if (this->prf != NULL)
+ if (this->prf)
{
this->prf->destroy(this->prf);
}
- if (this->child_prf != NULL)
+ if (this->child_prf)
{
this->child_prf->destroy(this->child_prf);
}
- if (this->prf_auth_i != NULL)
+ if (this->prf_auth_i)
{
this->prf_auth_i->destroy(this->prf_auth_i);
}
- if (this->prf_auth_r != NULL)
+ if (this->prf_auth_r)
{
this->prf_auth_r->destroy(this->prf_auth_r);
}
- this->ike_sa_id->destroy(this->ike_sa_id);
- if (this->last_requested_message != NULL)
+ if (this->connection)
+ {
+ this->connection->destroy(this->connection);
+ }
+ if (this->policy)
+ {
+ this->policy->destroy(this->policy);
+ }
+ if (this->last_requested_message)
{
this->last_requested_message->destroy(this->last_requested_message);
}
- if (this->last_responded_message != NULL)
+ if (this->last_responded_message)
{
this->last_responded_message->destroy(this->last_responded_message);
}
+ this->ike_sa_id->destroy(this->ike_sa_id);
this->randomizer->destroy(this->randomizer);
this->current_state->destroy(this->current_state);
charon->logger_manager->destroy_logger(charon->logger_manager, this->logger);
diff --git a/Source/charon/sa/states/ike_auth_requested.c b/Source/charon/sa/states/ike_auth_requested.c
index c80b7f72a..3fedf431c 100644
--- a/Source/charon/sa/states/ike_auth_requested.c
+++ b/Source/charon/sa/states/ike_auth_requested.c
@@ -352,16 +352,17 @@ static status_t process_message(private_ike_auth_requested_t *this, message_t *i
}
this->ike_sa->set_last_replied_message_id(this->ike_sa,ike_auth_reply->get_message_id(ike_auth_reply));
+
/* create new state */
+ this->ike_sa->set_new_state(this->ike_sa, (state_t*)ike_sa_established_create(this->ike_sa));
+ this->destroy_after_state_change(this);
+
connection = this->ike_sa->get_connection(this->ike_sa);
my_host = connection->get_my_host(connection);
other_host = connection->get_other_host(connection);
- this->logger->log(this->logger, AUDIT, "IKE_SA established between %s - %s, authenticated peer with %s",
- my_host->get_address(my_host), other_host->get_address(other_host),
- mapping_find(auth_method_m, auth_payload->get_auth_method(auth_payload)));
-
- this->ike_sa->set_new_state(this->ike_sa, (state_t*)ike_sa_established_create(this->ike_sa));
- this->destroy_after_state_change(this);
+ this->logger->log(this->logger, AUDIT, "IKE_SA established between %s - %s",
+ my_host->get_address(my_host), other_host->get_address(other_host));
+
return SUCCESS;
}
diff --git a/Source/charon/sa/states/ike_sa_init_requested.c b/Source/charon/sa/states/ike_sa_init_requested.c
index 5e641f9b3..0c4b6b690 100644
--- a/Source/charon/sa/states/ike_sa_init_requested.c
+++ b/Source/charon/sa/states/ike_sa_init_requested.c
@@ -215,6 +215,7 @@ static status_t process_message(private_ike_sa_init_requested_t *this, message_t
iterator_t *payloads;
host_t *me;
connection_t *connection;
+ policy_t *policy;
message_t *request;
status_t status;
@@ -344,6 +345,8 @@ static status_t process_message(private_ike_sa_init_requested_t *this, message_t
connection = this->ike_sa->get_connection(this->ike_sa);
me = ike_sa_init_reply->get_destination(ike_sa_init_reply);
connection->update_my_host(connection, me->clone(me));
+ policy = this->ike_sa->get_policy(this->ike_sa);
+ policy->update_my_ts(policy, me);
/* build empty message */
this->ike_sa->build_message(this->ike_sa, IKE_AUTH, TRUE, &request);
diff --git a/Source/charon/sa/states/ike_sa_init_responded.c b/Source/charon/sa/states/ike_sa_init_responded.c
index 8c93e3275..751f13517 100644
--- a/Source/charon/sa/states/ike_sa_init_responded.c
+++ b/Source/charon/sa/states/ike_sa_init_responded.c
@@ -247,10 +247,9 @@ static status_t process_message(private_ike_sa_init_responded_t *this, message_t
sa_request = (sa_payload_t*)payload;
break;
}
-
case TRAFFIC_SELECTOR_INITIATOR:
{
- tsi_request = (ts_payload_t*)payload;
+ tsi_request = (ts_payload_t*)payload;
break;
}
case TRAFFIC_SELECTOR_RESPONDER:
@@ -360,16 +359,15 @@ static status_t process_message(private_ike_sa_init_responded_t *this, message_t
this->ike_sa->add_child_sa(this->ike_sa, this->child_sa);
}
- /* create new state */
+ /* create new state */
+ this->ike_sa->set_new_state(this->ike_sa, (state_t*)ike_sa_established_create(this->ike_sa));
+ this->destroy_after_state_change(this);
+
connection = this->ike_sa->get_connection(this->ike_sa);
my_host = connection->get_my_host(connection);
other_host = connection->get_other_host(connection);
- this->logger->log(this->logger, AUDIT, "IKE_SA established between %s - %s, authenticated peer with %s",
- my_host->get_address(my_host), other_host->get_address(other_host),
- mapping_find(auth_method_m, auth_request->get_auth_method(auth_request)));
-
- this->ike_sa->set_new_state(this->ike_sa, (state_t*)ike_sa_established_create(this->ike_sa));
- this->destroy_after_state_change(this);
+ this->logger->log(this->logger, AUDIT, "IKE_SA established between %s - %s",
+ my_host->get_address(my_host), other_host->get_address(other_host));
return SUCCESS;
}
@@ -396,13 +394,13 @@ static status_t build_idr_payload(private_ike_sa_init_responded_t *this, id_payl
{
if (my_id)
{
- this->logger->log(this->logger, AUDIT, "IKE_AUTH request uses IDs %s to %s, which we have no policy for",
+ this->logger->log(this->logger, AUDIT, "We don't have a policy for IDs %s - %s. Deleting IKE_SA",
other_id->get_string(other_id),my_id->get_string(my_id));
my_id->destroy(my_id);
}
else
{
- this->logger->log(this->logger, AUDIT, "IKE_AUTH request uses ID %s, which we have no policy for",
+ this->logger->log(this->logger, AUDIT, "We don't have a policy for remote ID %s. Deleting IKE_SA",
other_id->get_string(other_id));
}
other_id->destroy(other_id);
@@ -416,7 +414,10 @@ static status_t build_idr_payload(private_ike_sa_init_responded_t *this, id_payl
other_id->destroy(other_id);
/* get my id, if not requested */
- my_id = this->policy->get_my_id(this->policy);
+ my_id = this->policy->get_my_id(this->policy);
+
+ /* update others traffic selectors with actually used address */
+ this->policy->update_other_ts(this->policy, response->get_destination(response));
/* set policy in ike_sa for other states */
this->ike_sa->set_policy(this->ike_sa, this->policy);
diff --git a/Source/charon/threads/stroke.c b/Source/charon/threads/stroke.c
index 9dad95d3c..1bc94c85d 100755
--- a/Source/charon/threads/stroke.c
+++ b/Source/charon/threads/stroke.c
@@ -119,6 +119,16 @@ struct private_stroke_t {
* Holding all configurations.
*/
linked_list_t *configurations;
+
+ /**
+ * The list of RSA private keys accessible through crendial_store_t interface
+ */
+ linked_list_t *rsa_private_keys;
+
+ /**
+ * The list of RSA public keys accessible through crendial_store_t interface
+ */
+ linked_list_t *rsa_public_keys;
/**
* Assigned logger_t object.
@@ -153,10 +163,14 @@ struct private_stroke_t {
* stroke_msg). They must be corrected if they reach our address
* space...
*/
-static void fix_string(stroke_msg_t *msg, char **string)
+static void pop_string(stroke_msg_t *msg, char **string)
{
/* check for sanity of string pointer and string */
- if (string < (char**)msg ||
+ if (*string == NULL)
+ {
+ *string = "";
+ }
+ else if (string < (char**)msg ||
string > (char**)msg + sizeof(stroke_msg_t) ||
*string < (char*)msg->buffer - (u_int)msg ||
*string > (char*)(u_int)msg->length)
@@ -210,7 +224,7 @@ static void stroke_receive(private_stroke_t *this)
continue;
}
- this->logger->log_bytes(this->logger, RAW|LEVEL1, "stroke message", (void*)msg, msg_length);
+ this->logger->log_bytes(this->logger, CONTROL, "stroke message", (void*)msg, msg_length);
switch (msg->type)
{
@@ -218,8 +232,8 @@ static void stroke_receive(private_stroke_t *this)
{
initiate_ike_sa_job_t *job;
connection_t *connection;
- fix_string(msg, &(msg->initiate.name));
- this->logger->log(this->logger, CONTROL|LEVEL1, "received stroke: initiate \"%s\"", msg->initiate.name);
+ pop_string(msg, &(msg->initiate.name));
+ this->logger->log(this->logger, CONTROL, "received stroke: initiate \"%s\"", msg->initiate.name);
connection = this->get_connection_by_name(this, msg->initiate.name);
if (connection == NULL)
{
@@ -234,8 +248,8 @@ static void stroke_receive(private_stroke_t *this)
}
case STR_INSTALL:
{
- fix_string(msg, &(msg->install.name));
- this->logger->log(this->logger, CONTROL|LEVEL1, "received stroke: install \"%s\"", msg->install.name);
+ pop_string(msg, &(msg->install.name));
+ this->logger->log(this->logger, CONTROL, "received stroke: install \"%s\"", msg->install.name);
break;
}
case STR_ADD_CONN:
@@ -245,28 +259,84 @@ static void stroke_receive(private_stroke_t *this)
identification_t *my_id, *other_id;
host_t *my_host, *other_host, *my_subnet, *other_subnet;
proposal_t *proposal;
- traffic_selector_t *ts;
- chunk_t chunk;
+ traffic_selector_t *my_ts, *other_ts;
+
+ pop_string(msg, &msg->add_conn.name);
+ pop_string(msg, &msg->add_conn.me.address);
+ pop_string(msg, &msg->add_conn.other.address);
+ pop_string(msg, &msg->add_conn.me.id);
+ pop_string(msg, &msg->add_conn.other.id);
+ pop_string(msg, &msg->add_conn.me.subnet);
+ pop_string(msg, &msg->add_conn.other.subnet);
+
+ this->logger->log(this->logger, CONTROL, "received stroke: add connection \"%s\"", msg->add_conn.name);
+
+ my_host = host_create(AF_INET, msg->add_conn.me.address, 500);
+ if (my_host == NULL)
+ {
+ this->logger->log(this->logger, ERROR, "received invalid host: %s", msg->add_conn.me.address);
+ break;
+ }
+ other_host = host_create(AF_INET, msg->add_conn.other.address, 500);
+ if (other_host == NULL)
+ {
+ this->logger->log(this->logger, ERROR, "received invalid host: %s", msg->add_conn.other.address);
+ my_host->destroy(my_host);
+ break;
+ }
+ my_id = identification_create_from_string(ID_IPV4_ADDR,
+ *msg->add_conn.me.id ? msg->add_conn.me.id : msg->add_conn.me.address);
+ if (my_id == NULL)
+ {
+ this->logger->log(this->logger, ERROR, "received invalid id: %s", msg->add_conn.me.id);
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ break;
+ }
+ other_id = identification_create_from_string(ID_IPV4_ADDR,
+ *msg->add_conn.other.id ? msg->add_conn.other.id : msg->add_conn.other.address);
+ if (other_id == NULL)
+ {
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ this->logger->log(this->logger, ERROR, "received invalid id: %s", msg->add_conn.other.id);
+ break;
+ }
- fix_string(msg, &msg->add_conn.name);
- this->logger->log(this->logger, CONTROL|LEVEL1, "received stroke: add connection \"%s\"", msg->add_conn.name);
+ my_subnet = host_create(AF_INET, *msg->add_conn.me.subnet ? msg->add_conn.me.subnet : msg->add_conn.me.address, 500);
+ if (my_subnet == NULL)
+ {
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ other_id->destroy(other_id);
+ this->logger->log(this->logger, ERROR, "received invalid subnet: %s", msg->add_conn.me.subnet);
+ break;
+ }
- msg->add_conn.me.address.v4.sin_port = htons(500);
- msg->add_conn.other.address.v4.sin_port = htons(500);
- my_host = host_create_from_sockaddr(&msg->add_conn.me.address.saddr);
- other_host = host_create_from_sockaddr(&msg->add_conn.other.address.saddr);
+ other_subnet = host_create(AF_INET, *msg->add_conn.other.subnet ? msg->add_conn.other.subnet : msg->add_conn.other.address, 500);
+ if (other_subnet == NULL)
+ {
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ other_id->destroy(other_id);
+ my_subnet->destroy(my_subnet);
+ this->logger->log(this->logger, ERROR, "received invalid subnet: %s", msg->add_conn.me.subnet);
+ break;
+ }
- fix_string(msg, &msg->add_conn.me.id);
- fix_string(msg, &msg->add_conn.other.id);
- my_id = identification_create_from_string(ID_IPV4_ADDR, msg->add_conn.me.id);
- other_id = identification_create_from_string(ID_IPV4_ADDR, msg->add_conn.other.id);
+ this->logger->log(this->logger, CONTROL, "my ID %s, others ID %s",
+ my_id->get_string(my_id),
+ other_id->get_string(other_id));
connection = connection_create(my_host, other_host, my_id->clone(my_id), other_id->clone(other_id), SHARED_KEY_MESSAGE_INTEGRITY_CODE);
proposal = proposal_create(1);
proposal->add_algorithm(proposal, IKE, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
proposal->add_algorithm(proposal, IKE, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
proposal->add_algorithm(proposal, IKE, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA1, 0);
- proposal->add_algorithm(proposal, IKE, DIFFIE_HELLMAN_GROUP, MODP_1024_BIT, 0);
+ proposal->add_algorithm(proposal, IKE, DIFFIE_HELLMAN_GROUP, MODP_2048_BIT, 0);
connection->add_proposal(connection, proposal);
policy = policy_create(my_id, other_id);
@@ -275,23 +345,19 @@ static void stroke_receive(private_stroke_t *this)
proposal->add_algorithm(proposal, ESP, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
policy->add_proposal(policy, proposal);
- my_subnet = host_create_from_sockaddr(&msg->add_conn.me.subnet.saddr);
- ts = traffic_selector_create_from_subnet(my_subnet, msg->add_conn.me.subnet_netbits);
+ my_ts = traffic_selector_create_from_subnet(my_subnet, *msg->add_conn.me.subnet ? msg->add_conn.me.subnet_mask : 32);
my_subnet->destroy(my_subnet);
- policy->add_my_traffic_selector(policy, ts);
-
- other_subnet = host_create_from_sockaddr(&msg->add_conn.other.subnet.saddr);
- ts = traffic_selector_create_from_subnet(other_subnet, msg->add_conn.other.subnet_netbits);
+ policy->add_my_traffic_selector(policy, my_ts);
+ other_ts = traffic_selector_create_from_subnet(other_subnet, *msg->add_conn.other.subnet ? msg->add_conn.other.subnet_mask : 32);
other_subnet->destroy(other_subnet);
- policy->add_other_traffic_selector(policy, ts);
+ policy->add_other_traffic_selector(policy, other_ts);
this->configurations->insert_last(this->configurations,
configuration_entry_create(msg->add_conn.name, connection, policy));
- this->logger->log(this->logger, CONTROL|LEVEL1, "connection \"%s\" added (%d in store)",
+ this->logger->log(this->logger, CONTROL, "connection \"%s\" added (%d in store)",
msg->add_conn.name,
this->configurations->get_count(this->configurations));
-
break;
}
case STR_DEL_CONN:
@@ -299,6 +365,7 @@ static void stroke_receive(private_stroke_t *this)
this->logger->log(this->logger, ERROR, "received invalid stroke");
}
+ close(strokefd);
allocator_free(msg);
}
}
@@ -335,13 +402,13 @@ static connection_t *get_connection_by_hosts(connection_store_t *store, host_t *
/* could be right one, check my_host for default route*/
if (config_my_host->is_default_route(config_my_host))
{
- found = entry->connection;
+ found = entry->connection->clone(entry->connection);
break;
}
/* check now if host informations are the same */
else if (config_my_host->ip_is_equal(config_my_host,my_host))
{
- found = entry->connection;
+ found = entry->connection->clone(entry->connection);
break;
}
@@ -354,19 +421,26 @@ static connection_t *get_connection_by_hosts(connection_store_t *store, host_t *
/* could be right one, check my_host for default route*/
if (config_my_host->is_default_route(config_my_host))
{
- found = entry->connection;
+ found = entry->connection->clone(entry->connection);
break;
}
/* check now if host informations are the same */
else if (config_my_host->ip_is_equal(config_my_host,my_host))
{
- found = entry->connection;
+ found = entry->connection->clone(entry->connection);
break;
}
}
}
iterator->destroy(iterator);
+ /* apply hosts as they are supplied since my_host may be %defaultroute, and other_host may be %any. */
+ if (found)
+ {
+ found->update_my_host(found, my_host->clone(my_host));
+ found->update_other_host(found, other_host->clone(other_host));
+ }
+
return found;
}
@@ -400,7 +474,7 @@ static connection_t *get_connection_by_ids(connection_store_t *store, identifica
{
this->logger->log(this->logger, CONTROL|LEVEL2, "config entry with remote id %s",
config_other_id->get_string(config_other_id));
- found = entry->connection;
+ found = entry->connection->clone(entry->connection);
break;
}
}
@@ -426,7 +500,7 @@ static connection_t *get_connection_by_name(private_stroke_t *this, char *name)
if (strcmp(entry->name,name) == 0)
{
/* found configuration */
- found = entry->connection;
+ found = entry->connection->clone(entry->connection);
break;
}
}
@@ -452,64 +526,92 @@ static policy_t *get_policy(policy_store_t *store,identification_t *my_id, ident
identification_t *config_my_id = entry->policy->get_my_id(entry->policy);
identification_t *config_other_id = entry->policy->get_other_id(entry->policy);
- /* host informations seem to be the same */
- if (config_other_id->equals(config_other_id, other_id))
+ /* check other host first */
+ if (config_other_id->belongs_to(config_other_id, other_id))
{
- /* other ids seems to match */
+ /* get it if my_id not specified */
if (my_id == NULL)
{
- /* first matching one is selected */
- /* TODO priorize found entries */
- found = entry->policy;
+ found = entry->policy->clone(entry->policy);
break;
}
- if (config_my_id->equals(config_my_id, my_id))
+ if (config_my_id->belongs_to(config_my_id, my_id))
{
- found = entry->policy;
+ found = entry->policy->clone(entry->policy);
break;
}
-
}
}
iterator->destroy(iterator);
+ /* apply IDs as they are requsted, since they may be configured as %any or such */
+ if (found)
+ {
+ if (my_id)
+ {
+ found->update_my_id(found, my_id->clone(my_id));
+ }
+ found->update_other_id(found, other_id->clone(other_id));
+ }
return found;
}
-
+/**
+ * Implementation of credential_store_t.get_shared_secret.
+ */
static status_t get_shared_secret(credential_store_t *this, identification_t *identification, chunk_t *preshared_secret)
{
char *secret = "schluessel";
preshared_secret->ptr = secret;
- preshared_secret->len = strlen(secret) + 1;
+ preshared_secret->len = strlen(secret) + 1;
+
+ *preshared_secret = allocator_clone_chunk(*preshared_secret);
return SUCCESS;
}
+/**
+ * Implementation of credential_store_t.get_rsa_public_key.
+ */
static status_t get_rsa_public_key(credential_store_t *this, identification_t *identification, rsa_public_key_t **public_key)
{
return FAILED;
}
+/**
+ * Implementation of credential_store_t.get_rsa_private_key.
+ */
static status_t get_rsa_private_key(credential_store_t *this, identification_t *identification, rsa_private_key_t **private_key)
{
return FAILED;
}
-
-
-
/**
* Implementation of stroke_t.destroy.
*/
static void destroy(private_stroke_t *this)
{
configuration_entry_t *entry;
+ rsa_public_key_t *pub_key;
+ rsa_private_key_t *priv_key;
+
while (this->configurations->remove_first(this->configurations, (void **)&entry) == SUCCESS)
{
entry->destroy(entry);
}
this->configurations->destroy(this->configurations);
+
+ while (this->rsa_private_keys->remove_first(this->rsa_private_keys, (void **)&priv_key) == SUCCESS)
+ {
+ priv_key->destroy(priv_key);
+ }
+ this->rsa_private_keys->destroy(this->rsa_private_keys);
+
+ while (this->rsa_public_keys->remove_first(this->rsa_public_keys, (void **)&pub_key) == SUCCESS)
+ {
+ pub_key->destroy(pub_key);
+ }
+ this->rsa_public_keys->destroy(this->rsa_public_keys);
charon->logger_manager->destroy_logger(charon->logger_manager,this->logger);
close(this->socket);
@@ -592,10 +694,13 @@ stroke_t *stroke_create()
close(this->socket);
unlink(socket_addr.sun_path);
allocator_free(this);
+ return NULL;
}
/* private variables */
this->configurations = linked_list_create();
+ this->rsa_private_keys = linked_list_create();
+ this->rsa_public_keys = linked_list_create();
return (&this->public);
}
diff --git a/Source/charon/threads/stroke.h b/Source/charon/threads/stroke.h
index 4fc0fe5e7..267c455f0 100644
--- a/Source/charon/threads/stroke.h
+++ b/Source/charon/threads/stroke.h
@@ -60,20 +60,10 @@ struct stroke_msg_t {
struct {
char *name;
struct {
- union {
- u_int16_t family;
- struct sockaddr saddr;
- struct sockaddr_in v4;
- struct sockaddr_in6 v6;
- } address;
char *id;
- union {
- u_int16_t family;
- struct sockaddr saddr;
- struct sockaddr_in v4;
- struct sockaddr_in6 v6;
- } subnet;
- u_int8_t subnet_netbits;
+ char *address;
+ char *subnet;
+ u_int8_t subnet_mask;
} me, other;
} add_conn;
};
@@ -99,10 +89,12 @@ typedef struct stroke_t stroke_t;
* stroke_t.interface_xy to access the specific interface! You have
* been warned...
*
+ * @todo Add clean thread cancellation
+ *
* @b Constructors:
* - stroke_create()
*
- * @ingroup config
+ * @ingroup threads
*/
struct stroke_t {
@@ -135,7 +127,7 @@ struct stroke_t {
*
* @return stroke_t object
*
- * @ingroup config
+ * @ingroup threads
*/
stroke_t *stroke_create();
diff --git a/Source/charon/utils/identification.c b/Source/charon/utils/identification.c
index 73f218874..72d1610af 100644
--- a/Source/charon/utils/identification.c
+++ b/Source/charon/utils/identification.c
@@ -116,6 +116,28 @@ static bool equals (private_identification_t *this,private_identification_t *oth
}
/**
+ * Implementation of identification_t.belongs_to.
+ */
+static bool belongs_to(private_identification_t *this, private_identification_t *other)
+{
+ if (this->public.equals(&this->public, &other->public))
+ {
+ return TRUE;
+ }
+
+ if (this->type == other->type && this->type == ID_IPV4_ADDR)
+ {
+ /* is this %any (0.0.0.0)?*/
+ if (*((u_int32_t*)this->encoded.ptr) == 0)
+ {
+ return TRUE;
+ }
+ /* TODO: Do we need subnet support? */
+ }
+ return FALSE;
+}
+
+/**
* Implementation of identification_t.clone.
*/
static identification_t *clone(private_identification_t *this)
@@ -150,6 +172,7 @@ static private_identification_t *identification_create()
private_identification_t *this = allocator_alloc_thing(private_identification_t);
this->public.equals = (bool (*) (identification_t*,identification_t*))equals;
+ this->public.belongs_to = (bool (*) (identification_t*,identification_t*))belongs_to;
this->public.get_encoding = (chunk_t (*) (identification_t*))get_encoding;
this->public.get_type = (id_type_t (*) (identification_t*))get_type;
this->public.get_string = (char* (*) (identification_t*))get_string;
diff --git a/Source/charon/utils/identification.h b/Source/charon/utils/identification.h
index 38bac5ee1..b973da9a4 100644
--- a/Source/charon/utils/identification.h
+++ b/Source/charon/utils/identification.h
@@ -153,6 +153,20 @@ struct identification_t {
bool (*equals) (identification_t *this,identification_t *other);
/**
+ * @brief Check if an ID belongs to a wildcard ID.
+ *
+ * An identification_t may contain wildcards, such as
+ * *@strongswan.org. This call checks if a given ID
+ * (e.g. tester@strongswan.org) belongs to a such wildcard
+ * ID. Returns TRUE if IDs are identical.
+ *
+ * @param this the ID containing a wildcard
+ * @param other the ID without wildcard
+ * @return TRUE if other belongs to this
+ */
+ bool (*belongs_to) (identification_t *this, identification_t *other);
+
+ /**
* @brief Clone a identification_t instance.
*
* @param this the identification_t object to clone
diff --git a/Source/charon/utils/logger.c b/Source/charon/utils/logger.c
index 29f485baa..3e2c93860 100644
--- a/Source/charon/utils/logger.c
+++ b/Source/charon/utils/logger.c
@@ -178,6 +178,7 @@ static void log_bytes(private_logger_t *this, logger_level_t loglevel, char *lab
if ((this->level & loglevel) == loglevel)
{
char buffer[MAX_LOG];
+ char ascii_buffer[17];
char *format;
char *buffer_pos;
char *bytes_pos, *bytes_roof;
@@ -207,6 +208,7 @@ static void log_bytes(private_logger_t *this, logger_level_t loglevel, char *lab
bytes_pos = bytes;
bytes_roof = bytes + len;
buffer_pos = buffer;
+ memset(ascii_buffer, 0, 17);
for (i = 1; bytes_pos < bytes_roof; i++)
{
@@ -219,30 +221,34 @@ static void log_bytes(private_logger_t *this, logger_level_t loglevel, char *lab
buffer_pos = buffer;
if (this->output == NULL)
{
- syslog(LOG_INFO, "[=>] [%5d ] %s", line_start, buffer);
+ syslog(LOG_INFO, "[=>] [%5d ] %s %s", line_start, buffer, ascii_buffer);
}
else
{
- fprintf(this->output, "[=>] [%5d ] %s\n", line_start, buffer);
+ fprintf(this->output, "[=>] [%5d ] %s %s\n", line_start, buffer, ascii_buffer);
}
+ memset(ascii_buffer, 0, 16);
line_start += 16;
}
- else if ((i % 8) == 0)
- {
- *buffer_pos++ = ' ';
- *buffer_pos++ = ' ';
- *buffer_pos++ = ' ';
- }
else if ((i % 4) == 0)
{
*buffer_pos++ = ' ';
- *buffer_pos++ = ' ';
+ // *buffer_pos++ = ' ';
}
else
{
*buffer_pos++ = ' ';
}
+ if (*bytes_pos > 31 && *bytes_pos < 127)
+ {
+ ascii_buffer[(i % 16)] = *bytes_pos;
+ }
+ else
+ {
+ ascii_buffer[(i % 16)] = '*';
+ }
+
bytes_pos++;
}
@@ -252,11 +258,11 @@ static void log_bytes(private_logger_t *this, logger_level_t loglevel, char *lab
buffer_pos = buffer;
if (this->output == NULL)
{
- syslog(LOG_INFO, "[=>] [%5d ] %s", line_start, buffer);
+ syslog(LOG_INFO, "[=>] [%5d ] %s %16s", line_start, buffer, ascii_buffer);
}
else
{
- fprintf(this->output, "[=>] [%5d ] %s\n", line_start, buffer);
+ fprintf(this->output, "[=>] [%5d ] %s %16s\n", line_start, buffer, ascii_buffer);
}
}
pthread_mutex_unlock(&mutex);