aboutsummaryrefslogtreecommitdiffstats
path: root/Source/charon/threads/stroke_interface.c
diff options
context:
space:
mode:
Diffstat (limited to 'Source/charon/threads/stroke_interface.c')
-rwxr-xr-xSource/charon/threads/stroke_interface.c1147
1 files changed, 1147 insertions, 0 deletions
diff --git a/Source/charon/threads/stroke_interface.c b/Source/charon/threads/stroke_interface.c
new file mode 100755
index 000000000..5ef2737ff
--- /dev/null
+++ b/Source/charon/threads/stroke_interface.c
@@ -0,0 +1,1147 @@
+/**
+ * @file stroke.c
+ *
+ * @brief Implementation of stroke_t.
+ *
+ */
+
+/*
+ * Copyright (C) 2006 Martin Willi
+ * Hochschule fuer Technik Rapperswil
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
+ * for more details.
+ */
+
+#include <stdlib.h>
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <sys/socket.h>
+#include <sys/un.h>
+#include <sys/fcntl.h>
+#include <unistd.h>
+#include <dirent.h>
+#include <errno.h>
+#include <pthread.h>
+
+#include "stroke_interface.h"
+
+#include <stroke.h>
+#include <types.h>
+#include <daemon.h>
+#include <transforms/certificate.h>
+#include <utils/allocator.h>
+#include <queues/jobs/initiate_ike_sa_job.h>
+
+
+struct sockaddr_un socket_addr = { AF_UNIX, STROKE_SOCKET};
+
+typedef struct configuration_entry_t configuration_entry_t;
+
+/**
+ * A configuration entry combines a configuration name with a connection
+ * and a policy.
+ *
+ * @b Constructors:
+ * - configuration_entry_create()
+ */
+struct configuration_entry_t {
+
+ /**
+ * Configuration name.
+ *
+ */
+ char *name;
+
+ /**
+ * Configuration for IKE_SA_INIT exchange.
+ */
+ connection_t *connection;
+
+ /**
+ * Configuration for all phases after IKE_SA_INIT exchange.
+ */
+ policy_t *policy;
+
+ /**
+ * Public key of other peer
+ */
+ rsa_public_key_t *public_key;
+
+ /**
+ * Own private key
+ */
+ rsa_private_key_t *private_key;
+
+ /**
+ * Destroys a configuration_entry_t
+ */
+ void (*destroy) (configuration_entry_t *this);
+};
+
+/**
+ * Implementation of configuration_entry_t.destroy.
+ */
+static void configuration_entry_destroy (configuration_entry_t *this)
+{
+ this->connection->destroy(this->connection);
+ this->policy->destroy(this->policy);
+ if (this->public_key)
+ {
+ this->public_key->destroy(this->public_key);
+ }
+ allocator_free(this->name);
+ allocator_free(this);
+}
+
+/**
+ * Creates a configuration_entry_t object.
+ */
+static configuration_entry_t * configuration_entry_create(char *name, connection_t* connection, policy_t *policy,
+ rsa_private_key_t *private_key, rsa_public_key_t *public_key)
+{
+ configuration_entry_t *entry = allocator_alloc_thing(configuration_entry_t);
+
+ /* functions */
+ entry->destroy = configuration_entry_destroy;
+
+ /* private data */
+ entry->connection = connection;
+ entry->policy = policy;
+ entry->public_key = public_key;
+ entry->private_key = private_key;
+ entry->name = allocator_alloc(strlen(name) + 1);
+ strcpy(entry->name, name);
+
+ return entry;
+}
+
+typedef struct private_stroke_t private_stroke_t;
+
+/**
+ * Private data of an stroke_t object.
+ */
+struct private_stroke_t {
+
+ /**
+ * Public part of stroke_t object.
+ */
+ stroke_t public;
+
+ /**
+ * Holding all configurations.
+ */
+ linked_list_t *configurations;
+
+ /**
+ * The list of RSA private keys accessible through crendial_store_t interface
+ */
+ linked_list_t *private_keys;
+
+ /**
+ * Assigned logger_t object in charon.
+ */
+ logger_t *logger;
+
+ /**
+ * Logger which logs to stroke
+ */
+ logger_t *stroke_logger;
+
+ /**
+ * Unix socket to listen for strokes
+ */
+ int socket;
+
+ /**
+ * Thread which reads from the socket
+ */
+ pthread_t assigned_thread;
+
+ /**
+ * Read from the socket and handle stroke messages
+ */
+ void (*stroke_receive) (private_stroke_t *this);
+
+ /**
+ * find a connection in the config list by name
+ */
+ connection_t *(*get_connection_by_name) (private_stroke_t *this, char *name);
+};
+
+/**
+ * Helper function which corrects the string pointers
+ * in a stroke_msg_t. Strings in a stroke_msg sent over "wire"
+ * contains RELATIVE addresses (relative to the beginning of the
+ * stroke_msg). They must be corrected if they reach our address
+ * space...
+ */
+static void pop_string(stroke_msg_t *msg, char **string)
+{
+ /* check for sanity of string pointer and string */
+ if (*string == NULL)
+ {
+ *string = "";
+ }
+ else if (string < (char**)msg ||
+ string > (char**)msg + sizeof(stroke_msg_t) ||
+ *string < (char*)msg->buffer - (u_int)msg ||
+ *string > (char*)(u_int)msg->length)
+ {
+ *string = "(invalid char* in stroke msg)";
+ }
+ else
+ {
+ *string = (char*)msg + (u_int)*string;
+ }
+}
+
+/**
+ * Find the private key for a public key
+ */
+static rsa_private_key_t *find_private_key(private_stroke_t *this, rsa_public_key_t *public_key)
+{
+ rsa_private_key_t *private_key = NULL;
+ iterator_t *iterator;
+
+ iterator = this->private_keys->create_iterator(this->private_keys, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ iterator->current(iterator, (void**)&private_key);
+ if (private_key->belongs_to(private_key, public_key))
+ {
+ break;
+ }
+ }
+ iterator->destroy(iterator);
+ return private_key;
+}
+
+/**
+ * Load all private keys form "/etc/ipsec.d/private/"
+ */
+static void load_private_keys(private_stroke_t *this)
+{
+ struct dirent* entry;
+ struct stat stb;
+ DIR* dir;
+ rsa_private_key_t *key;
+
+ /* currently only unencrypted binary DER files are loaded */
+ dir = opendir(PRIVATE_KEY_DIR);
+ if (dir == NULL || chdir(PRIVATE_KEY_DIR) == -1) {
+ this->logger->log(this->logger, ERROR, "error opening private key directory \"%s\"", PRIVATE_KEY_DIR);
+ return;
+ }
+ while ((entry = readdir(dir)) != NULL)
+ {
+ if (stat(entry->d_name, &stb) == -1)
+ {
+ continue;
+ }
+ /* try to parse all regular files */
+ if (stb.st_mode & S_IFREG)
+ {
+ key = rsa_private_key_create_from_file(entry->d_name, NULL);
+ if (key)
+ {
+ this->private_keys->insert_last(this->private_keys, (void*)key);
+ this->logger->log(this->logger, CONTROL|LEVEL1, "loaded private key \"%s%s\"",
+ PRIVATE_KEY_DIR, entry->d_name);
+ }
+ else
+ {
+ this->logger->log(this->logger, CONTROL|LEVEL1, "private key \"%s%s\" invalid, skipped",
+ PRIVATE_KEY_DIR, entry->d_name);
+ }
+ }
+ }
+ closedir(dir);
+}
+
+/**
+ * Add a connection to the configuration list
+ */
+static void stroke_add_conn(private_stroke_t *this, stroke_msg_t *msg)
+{
+ connection_t *connection;
+ policy_t *policy;
+ identification_t *my_id, *other_id;
+ host_t *my_host, *other_host, *my_subnet, *other_subnet;
+ proposal_t *proposal;
+ traffic_selector_t *my_ts, *other_ts;
+ certificate_t *my_cert, *other_cert;
+ rsa_private_key_t *private_key = NULL;
+ rsa_public_key_t *public_key = NULL;
+
+ pop_string(msg, &msg->add_conn.name);
+ pop_string(msg, &msg->add_conn.me.address);
+ pop_string(msg, &msg->add_conn.other.address);
+ pop_string(msg, &msg->add_conn.me.id);
+ pop_string(msg, &msg->add_conn.other.id);
+ pop_string(msg, &msg->add_conn.me.cert);
+ pop_string(msg, &msg->add_conn.other.cert);
+ pop_string(msg, &msg->add_conn.me.subnet);
+ pop_string(msg, &msg->add_conn.other.subnet);
+
+ this->logger->log(this->logger, CONTROL, "received stroke: add connection \"%s\"", msg->add_conn.name);
+
+ my_host = host_create(AF_INET, msg->add_conn.me.address, 500);
+ if (my_host == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid host: %s", msg->add_conn.me.address);
+ return;
+ }
+ other_host = host_create(AF_INET, msg->add_conn.other.address, 500);
+ if (other_host == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid host: %s", msg->add_conn.other.address);
+ my_host->destroy(my_host);
+ return;
+ }
+ my_id = identification_create_from_string(ID_IPV4_ADDR,
+ *msg->add_conn.me.id ? msg->add_conn.me.id : msg->add_conn.me.address);
+ if (my_id == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid id: %s", msg->add_conn.me.id);
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ return;
+ }
+ other_id = identification_create_from_string(ID_IPV4_ADDR,
+ *msg->add_conn.other.id ? msg->add_conn.other.id : msg->add_conn.other.address);
+ if (other_id == NULL)
+ {
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid id: %s", msg->add_conn.other.id);
+ return;
+ }
+
+ my_subnet = host_create(AF_INET, *msg->add_conn.me.subnet ? msg->add_conn.me.subnet : msg->add_conn.me.address, 500);
+ if (my_subnet == NULL)
+ {
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ other_id->destroy(other_id);
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid subnet: %s", msg->add_conn.me.subnet);
+ return;
+ }
+
+ other_subnet = host_create(AF_INET, *msg->add_conn.other.subnet ? msg->add_conn.other.subnet : msg->add_conn.other.address, 500);
+ if (other_subnet == NULL)
+ {
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ other_id->destroy(other_id);
+ my_subnet->destroy(my_subnet);
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid subnet: %s", msg->add_conn.me.subnet);
+ return;
+ }
+
+ my_ts = traffic_selector_create_from_subnet(my_subnet, *msg->add_conn.me.subnet ? msg->add_conn.me.subnet_mask : 32);
+ my_subnet->destroy(my_subnet);
+ other_ts = traffic_selector_create_from_subnet(other_subnet, *msg->add_conn.other.subnet ? msg->add_conn.other.subnet_mask : 32);
+ other_subnet->destroy(other_subnet);
+
+ if (charon->socket->is_listening_on(charon->socket, other_host))
+ {
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "left is other host, switching");
+
+ host_t *tmp_host = my_host;
+ identification_t *tmp_id = my_id;
+ traffic_selector_t *tmp_ts = my_ts;
+ char *tmp_cert = msg->add_conn.me.cert;
+
+ my_host = other_host;
+ other_host = tmp_host;
+ my_id = other_id;
+ other_id = tmp_id;
+ my_ts = other_ts;
+ other_ts = tmp_ts;
+ msg->add_conn.me.cert = msg->add_conn.other.cert;
+ msg->add_conn.other.cert = tmp_cert;
+ }
+ else if (charon->socket->is_listening_on(charon->socket, my_host))
+ {
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "left is own host, not switching");
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "left nor right host is our, aborting");
+
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ other_id->destroy(other_id);
+ my_ts->destroy(my_ts);
+ other_ts->destroy(other_ts);
+ return;
+ }
+
+
+ connection = connection_create(my_host, other_host, my_id->clone(my_id), other_id->clone(other_id),
+ RSA_DIGITAL_SIGNATURE);
+ proposal = proposal_create(1);
+ proposal->add_algorithm(proposal, PROTO_IKE, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
+ proposal->add_algorithm(proposal, PROTO_IKE, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA1, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_MD5, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_2048_BIT, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_1536_BIT, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_1024_BIT, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_4096_BIT, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_8192_BIT, 0);
+ connection->add_proposal(connection, proposal);
+
+ policy = policy_create(my_id, other_id);
+ proposal = proposal_create(1);
+ proposal->add_algorithm(proposal, PROTO_ESP, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
+ proposal->add_algorithm(proposal, PROTO_ESP, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
+ proposal->add_algorithm(proposal, PROTO_ESP, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
+ policy->add_proposal(policy, proposal);
+ policy->add_my_traffic_selector(policy, my_ts);
+ policy->add_other_traffic_selector(policy, other_ts);
+
+
+ chdir(CERTIFICATE_DIR);
+ my_cert = certificate_create_from_file(msg->add_conn.me.cert);
+ if (my_cert == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "loading own certificate \"%s%s\" failed",
+ CERTIFICATE_DIR, msg->add_conn.me.cert);
+ }
+ else
+ {
+ public_key = my_cert->get_public_key(my_cert);
+ private_key = find_private_key(this, public_key);
+ public_key->destroy(public_key);
+ if (private_key)
+ {
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "found private key for certificate \"%s%s\"",
+ CERTIFICATE_DIR, msg->add_conn.me.cert);
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "no private key for certificate \"%s%s\" found",
+ CERTIFICATE_DIR, msg->add_conn.me.cert);
+ }
+ my_cert->destroy(my_cert);
+ }
+ other_cert = certificate_create_from_file(msg->add_conn.other.cert);
+ public_key = NULL;
+ if (other_cert == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "loading peers certificate \"%s%s\" failed",
+ CERTIFICATE_DIR, msg->add_conn.other.cert);
+ }
+ else
+ {
+ public_key = other_cert->get_public_key(other_cert);
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "loaded certificate \"%s%s\" (%p)",
+ CERTIFICATE_DIR, msg->add_conn.other.cert, public_key);
+ other_cert->destroy(other_cert);
+ }
+
+ this->configurations->insert_last(this->configurations,
+ configuration_entry_create(msg->add_conn.name, connection, policy, private_key, public_key));
+
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "connection \"%s\" added (%d in store)",
+ msg->add_conn.name,
+ this->configurations->get_count(this->configurations));
+}
+
+/**
+ * initiate a connection by name
+ */
+static void stroke_initiate(private_stroke_t *this, stroke_msg_t *msg)
+{
+ initiate_ike_sa_job_t *job;
+ connection_t *connection;
+
+ pop_string(msg, &(msg->initiate.name));
+ this->logger->log(this->logger, CONTROL, "received stroke: initiate \"%s\"", msg->initiate.name);
+ connection = this->get_connection_by_name(this, msg->initiate.name);
+ if (connection == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "could not find a connection named \"%s\"", msg->initiate.name);
+ }
+ else
+ {
+ job = initiate_ike_sa_job_create(connection->clone(connection));
+ charon->job_queue->add(charon->job_queue, (job_t*)job);
+ }
+}
+
+/**
+ * terminate a connection by name
+ */
+static void stroke_terminate(private_stroke_t *this, stroke_msg_t *msg)
+{
+ connection_t *connection;
+ ike_sa_t *ike_sa;
+ host_t *my_host, *other_host;
+ status_t status;
+
+ pop_string(msg, &(msg->terminate.name));
+ this->logger->log(this->logger, CONTROL, "received stroke: terminate \"%s\"", msg->terminate.name);
+ connection = this->get_connection_by_name(this, msg->terminate.name);
+
+ if (connection)
+ {
+ my_host = connection->get_my_host(connection);
+ other_host = connection->get_other_host(connection);
+
+ status = charon->ike_sa_manager->checkout_by_hosts(charon->ike_sa_manager,
+ my_host, other_host, &ike_sa);
+
+ if (status == SUCCESS)
+ {
+ this->stroke_logger->log(this->stroke_logger, CONTROL, "deleting IKE SA between %s - %s",
+ my_host->get_address(my_host), other_host->get_address(other_host));
+
+ charon->ike_sa_manager->checkin_and_delete(charon->ike_sa_manager, ike_sa);
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "no active connection found between %s - %s",
+ my_host->get_address(my_host), other_host->get_address(other_host));
+ }
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "could not find a connection named \"%s\"", msg->terminate.name);
+ }
+
+}
+
+/**
+ * show status of (established) connections
+ */
+static void stroke_status(private_stroke_t *this, stroke_msg_t *msg)
+{
+ linked_list_t *list;
+ iterator_t *iterator;
+ status_t status;
+
+
+ list = charon->ike_sa_manager->get_ike_sa_list(charon->ike_sa_manager);
+ iterator = list->create_iterator(list, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ ike_sa_id_t *ike_sa_id;
+ ike_sa_t *ike_sa;
+ iterator->current(iterator, (void**)&ike_sa_id);
+
+ status = charon->ike_sa_manager->checkout(charon->ike_sa_manager, ike_sa_id, &ike_sa);
+ if (status == SUCCESS)
+ {
+ host_t *me, *other;
+ me = ike_sa->get_my_host(ike_sa);
+ other = ike_sa->get_other_host(ike_sa);
+
+
+ this->stroke_logger->log(this->stroke_logger, CONTROL, "IKE SA in state %s as %s",
+ mapping_find(ike_sa_state_m, ike_sa->get_state(ike_sa)),
+ ike_sa_id->is_initiator ? "initiator" : "responder");
+
+ this->stroke_logger->log(this->stroke_logger, CONTROL, " SPIs: %15lld - %-15lld",
+ ike_sa_id->get_initiator_spi(ike_sa_id),
+ ike_sa_id->get_responder_spi(ike_sa_id));
+
+
+ this->stroke_logger->log(this->stroke_logger, CONTROL, " Addr: %15s - %-15s",
+ me->get_address(me), other->get_address(other));
+
+ charon->ike_sa_manager->checkin(charon->ike_sa_manager, ike_sa);
+ }
+
+ ike_sa_id->destroy(ike_sa_id);
+ }
+ iterator->destroy(iterator);
+ list->destroy(list);
+}
+
+logger_context_t get_context(char *context)
+{
+ if (strcasecmp(context, "ALL") == 0) return ALL_LOGGERS;
+ else if (strcasecmp(context, "PARSR") == 0) return PARSER;
+ else if (strcasecmp(context, "GNRAT") == 0) return GENERATOR;
+ else if (strcasecmp(context, "IKESA") == 0) return IKE_SA;
+ else if (strcasecmp(context, "SAMGR") == 0) return IKE_SA_MANAGER;
+ else if (strcasecmp(context, "CHDSA") == 0) return CHILD_SA;
+ else if (strcasecmp(context, "MESSG") == 0) return MESSAGE;
+ else if (strcasecmp(context, "TPOOL") == 0) return THREAD_POOL;
+ else if (strcasecmp(context, "WORKR") == 0) return WORKER;
+ else if (strcasecmp(context, "SCHED") == 0) return SCHEDULER;
+ else if (strcasecmp(context, "SENDR") == 0) return SENDER;
+ else if (strcasecmp(context, "RECVR") == 0) return RECEIVER;
+ else if (strcasecmp(context, "SOCKT") == 0) return SOCKET;
+ else if (strcasecmp(context, "TESTR") == 0) return TESTER;
+ else if (strcasecmp(context, "DAEMN") == 0) return DAEMON;
+ else if (strcasecmp(context, "CONFG") == 0) return CONFIG;
+ else if (strcasecmp(context, "ENCPL") == 0) return ENCRYPTION_PAYLOAD;
+ else if (strcasecmp(context, "PAYLD") == 0) return PAYLOAD;
+ else return -2;
+}
+
+/**
+ * set the type of logged messages in a context
+ */
+static void stroke_logtype(private_stroke_t *this, stroke_msg_t *msg)
+{
+ pop_string(msg, &(msg->logtype.context));
+ pop_string(msg, &(msg->logtype.type));
+
+ this->logger->log(this->logger, CONTROL, "received stroke: logtype for %s", msg->logtype.context);
+
+ log_level_t level;
+ logger_context_t context = get_context(msg->logtype.context);
+ if (context == -2)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid context (%s)!", msg->logtype.context);
+ return;
+ }
+
+ if (strcasecmp(msg->logtype.type, "CONTROL") == 0) level = CONTROL;
+ else if (strcasecmp(msg->logtype.type, "ERROR") == 0) level = ERROR;
+ else if (strcasecmp(msg->logtype.type, "AUDIT") == 0) level = AUDIT;
+ else if (strcasecmp(msg->logtype.type, "RAW") == 0) level = RAW;
+ else if (strcasecmp(msg->logtype.type, "PRIVATE") == 0) level = PRIVATE;
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid type (%s)!", msg->logtype.type);
+ return;
+ }
+
+ if (msg->logtype.enable)
+ {
+ charon->logger_manager->enable_log_level(charon->logger_manager,
+ context, level);
+ }
+ else
+ {
+ charon->logger_manager->disable_log_level(charon->logger_manager,
+ context, level);
+ }
+}
+
+/**
+ * set the verbosity of a logger
+ */
+static void stroke_loglevel(private_stroke_t *this, stroke_msg_t *msg)
+{
+ pop_string(msg, &(msg->loglevel.context));
+
+ this->logger->log(this->logger, CONTROL, "received stroke: log_level for %s", msg->loglevel.context);
+
+ log_level_t level;
+ logger_context_t context = get_context(msg->loglevel.context);
+
+ if (context == -2)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid context (%s)!", msg->loglevel.context);
+ return;
+ }
+
+ if (msg->loglevel.level == 0)
+ {
+ level = LEVEL0;
+ }
+ else if (msg->loglevel.level == 1)
+ {
+ level = LEVEL1;
+ }
+ else if (msg->loglevel.level == 2)
+ {
+ level = LEVEL2;
+ }
+ else if (msg->loglevel.level == 3)
+ {
+ level = LEVEL3;
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid level (%d)!", msg->loglevel.level);
+ return;
+ }
+
+ charon->logger_manager->enable_log_level(charon->logger_manager, context, level);
+}
+
+/**
+ * Implementation of private_stroke_t.stroke_receive.
+ */
+static void stroke_receive(private_stroke_t *this)
+{
+ stroke_msg_t *msg;
+ u_int16_t msg_length;
+ struct sockaddr_un strokeaddr;
+ int strokeaddrlen = sizeof(strokeaddr);
+ ssize_t bytes_read;
+ int strokefd;
+ FILE *strokefile;
+
+ while (1)
+ {
+ strokefd = accept(this->socket, (struct sockaddr *)&strokeaddr, &strokeaddrlen);
+
+ if (strokefd < 0)
+ {
+ this->logger->log(this->logger, ERROR, "accepting stroke connection failed: %s", strerror(errno));
+ continue;
+ }
+
+ /* peek the length */
+ bytes_read = recv(strokefd, &msg_length, sizeof(msg_length), MSG_PEEK);
+ if (bytes_read != sizeof(msg_length))
+ {
+ this->logger->log(this->logger, ERROR, "reading lenght of stroke message failed");
+ close(strokefd);
+ continue;
+ }
+
+ /* read message */
+ msg = allocator_alloc(msg_length);
+ bytes_read = recv(strokefd, msg, msg_length, 0);
+ if (bytes_read != msg_length)
+ {
+ this->logger->log(this->logger, ERROR, "reading stroke message failed: %s");
+ close(strokefd);
+ continue;
+ }
+
+ strokefile = fdopen(dup(strokefd), "w");
+ if (strokefile == NULL)
+ {
+ this->logger->log(this->logger, ERROR, "opening stroke output channel failed:", strerror(errno));
+ close(strokefd);
+ allocator_free(msg);
+ continue;
+ }
+
+ this->stroke_logger = logger_create("-", CONTROL|ERROR, FALSE, strokefile);
+
+ this->logger->log_bytes(this->logger, RAW, "stroke message", (void*)msg, msg_length);
+
+ switch (msg->type)
+ {
+ case STR_INITIATE:
+ {
+ stroke_initiate(this, msg);
+ break;
+ }
+ case STR_TERMINATE:
+ {
+ stroke_terminate(this, msg);
+ break;
+ }
+ case STR_STATUS:
+ {
+ stroke_status(this, msg);
+ break;
+ }
+ case STR_ADD_CONN:
+ {
+ stroke_add_conn(this, msg);
+ break;
+ }
+ case STR_LOGTYPE:
+ {
+ stroke_logtype(this, msg);
+ break;
+ }
+ case STR_LOGLEVEL:
+ {
+ stroke_loglevel(this, msg);
+ break;
+ }
+ default:
+ this->logger->log(this->logger, ERROR, "received invalid stroke");
+ }
+ this->stroke_logger->destroy(this->stroke_logger);
+ fclose(strokefile);
+ close(strokefd);
+ allocator_free(msg);
+ }
+}
+
+/**
+ * Implementation of connection_store_t.get_connection_by_hosts.
+ */
+static connection_t *get_connection_by_hosts(connection_store_t *store, host_t *my_host, host_t *other_host)
+{
+ private_stroke_t *this = (private_stroke_t*)((u_int8_t*)store - offsetof(stroke_t, connections));
+ iterator_t *iterator;
+ connection_t *found = NULL;
+
+ this->logger->log(this->logger, CONTROL|LEVEL1, "getting config for hosts %s - %s",
+ my_host->get_address(my_host), other_host->get_address(other_host));
+
+ iterator = this->configurations->create_iterator(this->configurations,TRUE);
+ while (iterator->has_next(iterator))
+ {
+ configuration_entry_t *entry;
+ host_t *config_my_host, *config_other_host;
+
+ iterator->current(iterator,(void **) &entry);
+
+ config_my_host = entry->connection->get_my_host(entry->connection);
+ config_other_host = entry->connection->get_other_host(entry->connection);
+
+ /* first check if ip is equal */
+ if(config_other_host->ip_equals(config_other_host, other_host))
+ {
+ this->logger->log(this->logger, CONTROL|LEVEL2, "config entry with remote host %s",
+ config_other_host->get_address(config_other_host));
+ /* could be right one, check my_host for default route*/
+ if (config_my_host->is_default_route(config_my_host))
+ {
+ found = entry->connection->clone(entry->connection);
+ break;
+ }
+ /* check now if host informations are the same */
+ else if (config_my_host->ip_equals(config_my_host,my_host))
+ {
+ found = entry->connection->clone(entry->connection);
+ break;
+ }
+
+ }
+ /* Then check for wildcard hosts!
+ * TODO
+ * actually its only checked if other host with default route can be found! */
+ else if (config_other_host->is_default_route(config_other_host))
+ {
+ /* could be right one, check my_host for default route*/
+ if (config_my_host->is_default_route(config_my_host))
+ {
+ found = entry->connection->clone(entry->connection);
+ break;
+ }
+ /* check now if host informations are the same */
+ else if (config_my_host->ip_equals(config_my_host,my_host))
+ {
+ found = entry->connection->clone(entry->connection);
+ break;
+ }
+ }
+ }
+ iterator->destroy(iterator);
+
+ /* apply hosts as they are supplied since my_host may be %defaultroute, and other_host may be %any. */
+ if (found)
+ {
+ found->update_my_host(found, my_host->clone(my_host));
+ found->update_other_host(found, other_host->clone(other_host));
+ }
+
+ return found;
+}
+
+/**
+ * Implementation of connection_store_t.get_connection_by_ids.
+ */
+static connection_t *get_connection_by_ids(connection_store_t *store, identification_t *my_id, identification_t *other_id)
+{
+ private_stroke_t *this = (private_stroke_t*)((u_int8_t*)store - offsetof(stroke_t, connections));
+ iterator_t *iterator;
+ connection_t *found = NULL;
+
+ this->logger->log(this->logger, CONTROL|LEVEL1, "getting config for ids %s - %s",
+ my_id->get_string(my_id), other_id->get_string(other_id));
+
+ iterator = this->configurations->create_iterator(this->configurations,TRUE);
+ while (iterator->has_next(iterator))
+ {
+ configuration_entry_t *entry;
+ identification_t *config_my_id, *config_other_id;
+
+ iterator->current(iterator,(void **) &entry);
+
+ config_my_id = entry->connection->get_my_id(entry->connection);
+ config_other_id = entry->connection->get_other_id(entry->connection);
+
+ /* first check if ids are equal
+ * TODO: Add wildcard checks */
+ if (config_other_id->equals(config_other_id, other_id) &&
+ config_my_id->equals(config_my_id, my_id))
+ {
+ this->logger->log(this->logger, CONTROL|LEVEL2, "config entry with remote id %s",
+ config_other_id->get_string(config_other_id));
+ found = entry->connection->clone(entry->connection);
+ break;
+ }
+ }
+ iterator->destroy(iterator);
+
+ return found;
+}
+
+/**
+ * Implementation of private_stroke_t.get_connection_by_name.
+ */
+static connection_t *get_connection_by_name(private_stroke_t *this, char *name)
+{
+ iterator_t *iterator;
+ connection_t *found = NULL;
+
+ iterator = this->configurations->create_iterator(this->configurations, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ configuration_entry_t *entry;
+ iterator->current(iterator,(void **) &entry);
+
+ if (strcmp(entry->name,name) == 0)
+ {
+ /* found configuration */
+ found = entry->connection;
+ break;
+ }
+ }
+ iterator->destroy(iterator);
+
+ return found;
+}
+
+/**
+ * Implementation of policy_store_t.get_policy.
+ */
+static policy_t *get_policy(policy_store_t *store,identification_t *my_id, identification_t *other_id)
+{
+ private_stroke_t *this = (private_stroke_t*)((u_int8_t*)store - offsetof(stroke_t, policies));
+ iterator_t *iterator;
+ policy_t *found = NULL;
+
+ iterator = this->configurations->create_iterator(this->configurations, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ configuration_entry_t *entry;
+ iterator->current(iterator,(void **) &entry);
+ identification_t *config_my_id = entry->policy->get_my_id(entry->policy);
+ identification_t *config_other_id = entry->policy->get_other_id(entry->policy);
+
+ /* check other host first */
+ if (config_other_id->belongs_to(config_other_id, other_id))
+ {
+ /* get it if my_id not specified */
+ if (my_id == NULL)
+ {
+ found = entry->policy->clone(entry->policy);
+ break;
+ }
+
+ if (config_my_id->belongs_to(config_my_id, my_id))
+ {
+ found = entry->policy->clone(entry->policy);
+ break;
+ }
+ }
+ }
+ iterator->destroy(iterator);
+
+ /* apply IDs as they are requsted, since they may be configured as %any or such */
+ if (found)
+ {
+ if (my_id)
+ {
+ found->update_my_id(found, my_id->clone(my_id));
+ }
+ found->update_other_id(found, other_id->clone(other_id));
+ }
+ return found;
+}
+
+/**
+ * Implementation of credential_store_t.get_shared_secret.
+ */
+static status_t get_shared_secret(credential_store_t *this, identification_t *identification, chunk_t *preshared_secret)
+{
+ char *secret = "schluessel\n";
+ preshared_secret->ptr = secret;
+ preshared_secret->len = strlen(secret) + 1;
+
+ *preshared_secret = allocator_clone_chunk(*preshared_secret);
+ return SUCCESS;
+}
+
+/**
+ * Implementation of credential_store_t.get_rsa_public_key.
+ */
+static status_t get_rsa_public_key(credential_store_t *store, identification_t *identification, rsa_public_key_t **public_key)
+{
+ private_stroke_t *this = (private_stroke_t*)((u_int8_t*)store - offsetof(stroke_t, credentials));
+ iterator_t *iterator;
+
+ this->logger->log(this->logger, CONTROL|LEVEL2, "Looking for public key for %s",
+ identification->get_string(identification));
+ iterator = this->configurations->create_iterator(this->configurations, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ configuration_entry_t *config;
+ iterator->current(iterator, (void**)&config);
+ identification_t *stored = config->policy->get_other_id(config->policy);
+ this->logger->log(this->logger, CONTROL|LEVEL2, "there is one for %s",
+ stored->get_string(stored));
+ if (identification->equals(identification, stored))
+ {
+ this->logger->log(this->logger, CONTROL|LEVEL2, "found a match: %p",
+ config->public_key);
+ if (config->public_key)
+ {
+ iterator->destroy(iterator);
+ *public_key = config->public_key->clone(config->public_key);
+ return SUCCESS;
+ }
+ }
+ }
+ iterator->destroy(iterator);
+ return NOT_FOUND;
+}
+
+/**
+ * Implementation of credential_store_t.get_rsa_private_key.
+ */
+static status_t get_rsa_private_key(credential_store_t *store, identification_t *identification, rsa_private_key_t **private_key)
+{
+ private_stroke_t *this = (private_stroke_t*)((u_int8_t*)store - offsetof(stroke_t, credentials));
+ iterator_t *iterator;
+
+ iterator = this->configurations->create_iterator(this->configurations, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ configuration_entry_t *config;
+ iterator->current(iterator, (void**)&config);
+ identification_t *stored = config->policy->get_my_id(config->policy);
+ if (identification->equals(identification, stored))
+ {
+ if (config->private_key)
+ {
+ iterator->destroy(iterator);
+ *private_key = config->private_key->clone(config->private_key);
+ return SUCCESS;
+ }
+ }
+ }
+ iterator->destroy(iterator);
+ return NOT_FOUND;
+}
+
+/**
+ * Implementation of stroke_t.destroy.
+ */
+static void destroy(private_stroke_t *this)
+{
+ configuration_entry_t *entry;
+ rsa_private_key_t *priv_key;
+
+ while (this->configurations->remove_first(this->configurations, (void **)&entry) == SUCCESS)
+ {
+ entry->destroy(entry);
+ }
+ this->configurations->destroy(this->configurations);
+
+ while (this->private_keys->remove_first(this->private_keys, (void **)&priv_key) == SUCCESS)
+ {
+ priv_key->destroy(priv_key);
+ }
+ this->private_keys->destroy(this->private_keys);
+
+ close(this->socket);
+ unlink(socket_addr.sun_path);
+ allocator_free(this);
+}
+
+/**
+ * Dummy function which does nothing.
+ * Used for connection_store_t.destroy and policy_store_t.destroy,
+ * since destruction is done in store_t's destructor...
+ */
+void do_nothing(void *nothing)
+{
+ return;
+}
+
+/*
+ * Described in header-file
+ */
+stroke_t *stroke_create()
+{
+ private_stroke_t *this = allocator_alloc_thing(private_stroke_t);
+ mode_t old;
+
+ /* public functions */
+ this->public.connections.get_connection_by_ids = get_connection_by_ids;
+ this->public.connections.get_connection_by_hosts = get_connection_by_hosts;
+ this->public.connections.destroy = (void (*) (connection_store_t*))do_nothing;
+ this->public.policies.get_policy = get_policy;
+ this->public.policies.destroy = (void (*) (policy_store_t*))do_nothing;
+ this->public.credentials.get_shared_secret = (status_t (*)(credential_store_t*,identification_t*,chunk_t*))get_shared_secret;
+ this->public.credentials.get_rsa_public_key = (status_t (*)(credential_store_t*,identification_t*,rsa_public_key_t**))get_rsa_public_key;
+ this->public.credentials.get_rsa_private_key = (status_t (*)(credential_store_t*,identification_t*,rsa_private_key_t**))get_rsa_private_key;
+ this->public.credentials.destroy = (void (*) (credential_store_t*))do_nothing;
+ this->public.destroy = (void (*)(stroke_t*))destroy;
+
+ /* private functions */
+ this->stroke_receive = stroke_receive;
+ this->get_connection_by_name = get_connection_by_name;
+
+ this->logger = charon->logger_manager->get_logger(charon->logger_manager, CONFIG);
+
+ /* set up unix socket */
+ this->socket = socket(AF_UNIX, SOCK_STREAM, 0);
+ if (this->socket == -1)
+ {
+ this->logger->log(this->logger, ERROR, "could not create whack socket");
+ allocator_free(this);
+ return NULL;
+ }
+
+ old = umask(~S_IRWXU);
+ if (bind(this->socket, (struct sockaddr *)&socket_addr, sizeof(socket_addr)) < 0)
+ {
+ this->logger->log(this->logger, ERROR, "could not bind stroke socket: %s", strerror(errno));
+ close(this->socket);
+ allocator_free(this);
+ return NULL;
+ }
+ umask(old);
+
+ if (listen(this->socket, 0) < 0)
+ {
+ this->logger->log(this->logger, ERROR, "could not listen on stroke socket: %s", strerror(errno));
+ close(this->socket);
+ unlink(socket_addr.sun_path);
+ allocator_free(this);
+ return NULL;
+ }
+
+ /* start a thread reading from the socket */
+ if (pthread_create(&(this->assigned_thread), NULL, (void*(*)(void*))this->stroke_receive, this) != 0)
+ {
+ this->logger->log(this->logger, ERROR, "Could not spawn stroke thread");
+ close(this->socket);
+ unlink(socket_addr.sun_path);
+ allocator_free(this);
+ return NULL;
+ }
+
+ /* private variables */
+ this->configurations = linked_list_create();
+ this->private_keys = linked_list_create();
+
+ load_private_keys(this);
+
+ return (&this->public);
+}