aboutsummaryrefslogtreecommitdiffstats
path: root/Source/charon/threads
diff options
context:
space:
mode:
Diffstat (limited to 'Source/charon/threads')
-rw-r--r--Source/charon/threads/Makefile.threads4
-rwxr-xr-xSource/charon/threads/stroke_interface.c (renamed from Source/charon/threads/stroke.c)673
-rw-r--r--Source/charon/threads/stroke_interface.h (renamed from Source/charon/threads/stroke.h)42
3 files changed, 463 insertions, 256 deletions
diff --git a/Source/charon/threads/Makefile.threads b/Source/charon/threads/Makefile.threads
index 402ab96c4..043f547bc 100644
--- a/Source/charon/threads/Makefile.threads
+++ b/Source/charon/threads/Makefile.threads
@@ -34,6 +34,6 @@ OBJS+= $(BUILD_DIR)kernel_interface.o
$(BUILD_DIR)kernel_interface.o :$(THREADS_DIR)kernel_interface.c $(THREADS_DIR)kernel_interface.h
$(CC) $(CFLAGS) -c -o $@ $<
-OBJS+= $(BUILD_DIR)stroke.o
-$(BUILD_DIR)stroke.o : $(THREADS_DIR)stroke.c $(THREADS_DIR)stroke.h
+OBJS+= $(BUILD_DIR)stroke_interface.o
+$(BUILD_DIR)stroke_interface.o :$(THREADS_DIR)stroke_interface.c $(THREADS_DIR)stroke_interface.h
$(CC) $(CFLAGS) -c -o $@ $<
diff --git a/Source/charon/threads/stroke.c b/Source/charon/threads/stroke_interface.c
index fac2dc6fc..5ef2737ff 100755
--- a/Source/charon/threads/stroke.c
+++ b/Source/charon/threads/stroke_interface.c
@@ -31,8 +31,9 @@
#include <errno.h>
#include <pthread.h>
-#include "stroke.h"
+#include "stroke_interface.h"
+#include <stroke.h>
#include <types.h>
#include <daemon.h>
#include <transforms/certificate.h>
@@ -145,12 +146,17 @@ struct private_stroke_t {
linked_list_t *private_keys;
/**
- * Assigned logger_t object.
+ * Assigned logger_t object in charon.
*/
logger_t *logger;
+
+ /**
+ * Logger which logs to stroke
+ */
+ logger_t *stroke_logger;
/**
- * Unix socket to use for communication
+ * Unix socket to listen for strokes
*/
int socket;
@@ -261,6 +267,420 @@ static void load_private_keys(private_stroke_t *this)
}
/**
+ * Add a connection to the configuration list
+ */
+static void stroke_add_conn(private_stroke_t *this, stroke_msg_t *msg)
+{
+ connection_t *connection;
+ policy_t *policy;
+ identification_t *my_id, *other_id;
+ host_t *my_host, *other_host, *my_subnet, *other_subnet;
+ proposal_t *proposal;
+ traffic_selector_t *my_ts, *other_ts;
+ certificate_t *my_cert, *other_cert;
+ rsa_private_key_t *private_key = NULL;
+ rsa_public_key_t *public_key = NULL;
+
+ pop_string(msg, &msg->add_conn.name);
+ pop_string(msg, &msg->add_conn.me.address);
+ pop_string(msg, &msg->add_conn.other.address);
+ pop_string(msg, &msg->add_conn.me.id);
+ pop_string(msg, &msg->add_conn.other.id);
+ pop_string(msg, &msg->add_conn.me.cert);
+ pop_string(msg, &msg->add_conn.other.cert);
+ pop_string(msg, &msg->add_conn.me.subnet);
+ pop_string(msg, &msg->add_conn.other.subnet);
+
+ this->logger->log(this->logger, CONTROL, "received stroke: add connection \"%s\"", msg->add_conn.name);
+
+ my_host = host_create(AF_INET, msg->add_conn.me.address, 500);
+ if (my_host == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid host: %s", msg->add_conn.me.address);
+ return;
+ }
+ other_host = host_create(AF_INET, msg->add_conn.other.address, 500);
+ if (other_host == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid host: %s", msg->add_conn.other.address);
+ my_host->destroy(my_host);
+ return;
+ }
+ my_id = identification_create_from_string(ID_IPV4_ADDR,
+ *msg->add_conn.me.id ? msg->add_conn.me.id : msg->add_conn.me.address);
+ if (my_id == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid id: %s", msg->add_conn.me.id);
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ return;
+ }
+ other_id = identification_create_from_string(ID_IPV4_ADDR,
+ *msg->add_conn.other.id ? msg->add_conn.other.id : msg->add_conn.other.address);
+ if (other_id == NULL)
+ {
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid id: %s", msg->add_conn.other.id);
+ return;
+ }
+
+ my_subnet = host_create(AF_INET, *msg->add_conn.me.subnet ? msg->add_conn.me.subnet : msg->add_conn.me.address, 500);
+ if (my_subnet == NULL)
+ {
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ other_id->destroy(other_id);
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid subnet: %s", msg->add_conn.me.subnet);
+ return;
+ }
+
+ other_subnet = host_create(AF_INET, *msg->add_conn.other.subnet ? msg->add_conn.other.subnet : msg->add_conn.other.address, 500);
+ if (other_subnet == NULL)
+ {
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ other_id->destroy(other_id);
+ my_subnet->destroy(my_subnet);
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid subnet: %s", msg->add_conn.me.subnet);
+ return;
+ }
+
+ my_ts = traffic_selector_create_from_subnet(my_subnet, *msg->add_conn.me.subnet ? msg->add_conn.me.subnet_mask : 32);
+ my_subnet->destroy(my_subnet);
+ other_ts = traffic_selector_create_from_subnet(other_subnet, *msg->add_conn.other.subnet ? msg->add_conn.other.subnet_mask : 32);
+ other_subnet->destroy(other_subnet);
+
+ if (charon->socket->is_listening_on(charon->socket, other_host))
+ {
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "left is other host, switching");
+
+ host_t *tmp_host = my_host;
+ identification_t *tmp_id = my_id;
+ traffic_selector_t *tmp_ts = my_ts;
+ char *tmp_cert = msg->add_conn.me.cert;
+
+ my_host = other_host;
+ other_host = tmp_host;
+ my_id = other_id;
+ other_id = tmp_id;
+ my_ts = other_ts;
+ other_ts = tmp_ts;
+ msg->add_conn.me.cert = msg->add_conn.other.cert;
+ msg->add_conn.other.cert = tmp_cert;
+ }
+ else if (charon->socket->is_listening_on(charon->socket, my_host))
+ {
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "left is own host, not switching");
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "left nor right host is our, aborting");
+
+ my_host->destroy(my_host);
+ other_host->destroy(other_host);
+ my_id->destroy(my_id);
+ other_id->destroy(other_id);
+ my_ts->destroy(my_ts);
+ other_ts->destroy(other_ts);
+ return;
+ }
+
+
+ connection = connection_create(my_host, other_host, my_id->clone(my_id), other_id->clone(other_id),
+ RSA_DIGITAL_SIGNATURE);
+ proposal = proposal_create(1);
+ proposal->add_algorithm(proposal, PROTO_IKE, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
+ proposal->add_algorithm(proposal, PROTO_IKE, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA1, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_MD5, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_2048_BIT, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_1536_BIT, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_1024_BIT, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_4096_BIT, 0);
+ proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_8192_BIT, 0);
+ connection->add_proposal(connection, proposal);
+
+ policy = policy_create(my_id, other_id);
+ proposal = proposal_create(1);
+ proposal->add_algorithm(proposal, PROTO_ESP, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
+ proposal->add_algorithm(proposal, PROTO_ESP, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
+ proposal->add_algorithm(proposal, PROTO_ESP, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
+ policy->add_proposal(policy, proposal);
+ policy->add_my_traffic_selector(policy, my_ts);
+ policy->add_other_traffic_selector(policy, other_ts);
+
+
+ chdir(CERTIFICATE_DIR);
+ my_cert = certificate_create_from_file(msg->add_conn.me.cert);
+ if (my_cert == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "loading own certificate \"%s%s\" failed",
+ CERTIFICATE_DIR, msg->add_conn.me.cert);
+ }
+ else
+ {
+ public_key = my_cert->get_public_key(my_cert);
+ private_key = find_private_key(this, public_key);
+ public_key->destroy(public_key);
+ if (private_key)
+ {
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "found private key for certificate \"%s%s\"",
+ CERTIFICATE_DIR, msg->add_conn.me.cert);
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "no private key for certificate \"%s%s\" found",
+ CERTIFICATE_DIR, msg->add_conn.me.cert);
+ }
+ my_cert->destroy(my_cert);
+ }
+ other_cert = certificate_create_from_file(msg->add_conn.other.cert);
+ public_key = NULL;
+ if (other_cert == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "loading peers certificate \"%s%s\" failed",
+ CERTIFICATE_DIR, msg->add_conn.other.cert);
+ }
+ else
+ {
+ public_key = other_cert->get_public_key(other_cert);
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "loaded certificate \"%s%s\" (%p)",
+ CERTIFICATE_DIR, msg->add_conn.other.cert, public_key);
+ other_cert->destroy(other_cert);
+ }
+
+ this->configurations->insert_last(this->configurations,
+ configuration_entry_create(msg->add_conn.name, connection, policy, private_key, public_key));
+
+ this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "connection \"%s\" added (%d in store)",
+ msg->add_conn.name,
+ this->configurations->get_count(this->configurations));
+}
+
+/**
+ * initiate a connection by name
+ */
+static void stroke_initiate(private_stroke_t *this, stroke_msg_t *msg)
+{
+ initiate_ike_sa_job_t *job;
+ connection_t *connection;
+
+ pop_string(msg, &(msg->initiate.name));
+ this->logger->log(this->logger, CONTROL, "received stroke: initiate \"%s\"", msg->initiate.name);
+ connection = this->get_connection_by_name(this, msg->initiate.name);
+ if (connection == NULL)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "could not find a connection named \"%s\"", msg->initiate.name);
+ }
+ else
+ {
+ job = initiate_ike_sa_job_create(connection->clone(connection));
+ charon->job_queue->add(charon->job_queue, (job_t*)job);
+ }
+}
+
+/**
+ * terminate a connection by name
+ */
+static void stroke_terminate(private_stroke_t *this, stroke_msg_t *msg)
+{
+ connection_t *connection;
+ ike_sa_t *ike_sa;
+ host_t *my_host, *other_host;
+ status_t status;
+
+ pop_string(msg, &(msg->terminate.name));
+ this->logger->log(this->logger, CONTROL, "received stroke: terminate \"%s\"", msg->terminate.name);
+ connection = this->get_connection_by_name(this, msg->terminate.name);
+
+ if (connection)
+ {
+ my_host = connection->get_my_host(connection);
+ other_host = connection->get_other_host(connection);
+
+ status = charon->ike_sa_manager->checkout_by_hosts(charon->ike_sa_manager,
+ my_host, other_host, &ike_sa);
+
+ if (status == SUCCESS)
+ {
+ this->stroke_logger->log(this->stroke_logger, CONTROL, "deleting IKE SA between %s - %s",
+ my_host->get_address(my_host), other_host->get_address(other_host));
+
+ charon->ike_sa_manager->checkin_and_delete(charon->ike_sa_manager, ike_sa);
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "no active connection found between %s - %s",
+ my_host->get_address(my_host), other_host->get_address(other_host));
+ }
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "could not find a connection named \"%s\"", msg->terminate.name);
+ }
+
+}
+
+/**
+ * show status of (established) connections
+ */
+static void stroke_status(private_stroke_t *this, stroke_msg_t *msg)
+{
+ linked_list_t *list;
+ iterator_t *iterator;
+ status_t status;
+
+
+ list = charon->ike_sa_manager->get_ike_sa_list(charon->ike_sa_manager);
+ iterator = list->create_iterator(list, TRUE);
+ while (iterator->has_next(iterator))
+ {
+ ike_sa_id_t *ike_sa_id;
+ ike_sa_t *ike_sa;
+ iterator->current(iterator, (void**)&ike_sa_id);
+
+ status = charon->ike_sa_manager->checkout(charon->ike_sa_manager, ike_sa_id, &ike_sa);
+ if (status == SUCCESS)
+ {
+ host_t *me, *other;
+ me = ike_sa->get_my_host(ike_sa);
+ other = ike_sa->get_other_host(ike_sa);
+
+
+ this->stroke_logger->log(this->stroke_logger, CONTROL, "IKE SA in state %s as %s",
+ mapping_find(ike_sa_state_m, ike_sa->get_state(ike_sa)),
+ ike_sa_id->is_initiator ? "initiator" : "responder");
+
+ this->stroke_logger->log(this->stroke_logger, CONTROL, " SPIs: %15lld - %-15lld",
+ ike_sa_id->get_initiator_spi(ike_sa_id),
+ ike_sa_id->get_responder_spi(ike_sa_id));
+
+
+ this->stroke_logger->log(this->stroke_logger, CONTROL, " Addr: %15s - %-15s",
+ me->get_address(me), other->get_address(other));
+
+ charon->ike_sa_manager->checkin(charon->ike_sa_manager, ike_sa);
+ }
+
+ ike_sa_id->destroy(ike_sa_id);
+ }
+ iterator->destroy(iterator);
+ list->destroy(list);
+}
+
+logger_context_t get_context(char *context)
+{
+ if (strcasecmp(context, "ALL") == 0) return ALL_LOGGERS;
+ else if (strcasecmp(context, "PARSR") == 0) return PARSER;
+ else if (strcasecmp(context, "GNRAT") == 0) return GENERATOR;
+ else if (strcasecmp(context, "IKESA") == 0) return IKE_SA;
+ else if (strcasecmp(context, "SAMGR") == 0) return IKE_SA_MANAGER;
+ else if (strcasecmp(context, "CHDSA") == 0) return CHILD_SA;
+ else if (strcasecmp(context, "MESSG") == 0) return MESSAGE;
+ else if (strcasecmp(context, "TPOOL") == 0) return THREAD_POOL;
+ else if (strcasecmp(context, "WORKR") == 0) return WORKER;
+ else if (strcasecmp(context, "SCHED") == 0) return SCHEDULER;
+ else if (strcasecmp(context, "SENDR") == 0) return SENDER;
+ else if (strcasecmp(context, "RECVR") == 0) return RECEIVER;
+ else if (strcasecmp(context, "SOCKT") == 0) return SOCKET;
+ else if (strcasecmp(context, "TESTR") == 0) return TESTER;
+ else if (strcasecmp(context, "DAEMN") == 0) return DAEMON;
+ else if (strcasecmp(context, "CONFG") == 0) return CONFIG;
+ else if (strcasecmp(context, "ENCPL") == 0) return ENCRYPTION_PAYLOAD;
+ else if (strcasecmp(context, "PAYLD") == 0) return PAYLOAD;
+ else return -2;
+}
+
+/**
+ * set the type of logged messages in a context
+ */
+static void stroke_logtype(private_stroke_t *this, stroke_msg_t *msg)
+{
+ pop_string(msg, &(msg->logtype.context));
+ pop_string(msg, &(msg->logtype.type));
+
+ this->logger->log(this->logger, CONTROL, "received stroke: logtype for %s", msg->logtype.context);
+
+ log_level_t level;
+ logger_context_t context = get_context(msg->logtype.context);
+ if (context == -2)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid context (%s)!", msg->logtype.context);
+ return;
+ }
+
+ if (strcasecmp(msg->logtype.type, "CONTROL") == 0) level = CONTROL;
+ else if (strcasecmp(msg->logtype.type, "ERROR") == 0) level = ERROR;
+ else if (strcasecmp(msg->logtype.type, "AUDIT") == 0) level = AUDIT;
+ else if (strcasecmp(msg->logtype.type, "RAW") == 0) level = RAW;
+ else if (strcasecmp(msg->logtype.type, "PRIVATE") == 0) level = PRIVATE;
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid type (%s)!", msg->logtype.type);
+ return;
+ }
+
+ if (msg->logtype.enable)
+ {
+ charon->logger_manager->enable_log_level(charon->logger_manager,
+ context, level);
+ }
+ else
+ {
+ charon->logger_manager->disable_log_level(charon->logger_manager,
+ context, level);
+ }
+}
+
+/**
+ * set the verbosity of a logger
+ */
+static void stroke_loglevel(private_stroke_t *this, stroke_msg_t *msg)
+{
+ pop_string(msg, &(msg->loglevel.context));
+
+ this->logger->log(this->logger, CONTROL, "received stroke: log_level for %s", msg->loglevel.context);
+
+ log_level_t level;
+ logger_context_t context = get_context(msg->loglevel.context);
+
+ if (context == -2)
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid context (%s)!", msg->loglevel.context);
+ return;
+ }
+
+ if (msg->loglevel.level == 0)
+ {
+ level = LEVEL0;
+ }
+ else if (msg->loglevel.level == 1)
+ {
+ level = LEVEL1;
+ }
+ else if (msg->loglevel.level == 2)
+ {
+ level = LEVEL2;
+ }
+ else if (msg->loglevel.level == 3)
+ {
+ level = LEVEL3;
+ }
+ else
+ {
+ this->stroke_logger->log(this->stroke_logger, ERROR, "invalid level (%d)!", msg->loglevel.level);
+ return;
+ }
+
+ charon->logger_manager->enable_log_level(charon->logger_manager, context, level);
+}
+
+/**
* Implementation of private_stroke_t.stroke_receive.
*/
static void stroke_receive(private_stroke_t *this)
@@ -271,6 +691,7 @@ static void stroke_receive(private_stroke_t *this)
int strokeaddrlen = sizeof(strokeaddr);
ssize_t bytes_read;
int strokefd;
+ FILE *strokefile;
while (1)
{
@@ -278,7 +699,7 @@ static void stroke_receive(private_stroke_t *this)
if (strokefd < 0)
{
- this->logger->log(this->logger, ERROR, "accepting stroke connection failed");
+ this->logger->log(this->logger, ERROR, "accepting stroke connection failed: %s", strerror(errno));
continue;
}
@@ -296,233 +717,61 @@ static void stroke_receive(private_stroke_t *this)
bytes_read = recv(strokefd, msg, msg_length, 0);
if (bytes_read != msg_length)
{
- this->logger->log(this->logger, ERROR, "reading stroke message failed");
+ this->logger->log(this->logger, ERROR, "reading stroke message failed: %s");
close(strokefd);
continue;
}
+ strokefile = fdopen(dup(strokefd), "w");
+ if (strokefile == NULL)
+ {
+ this->logger->log(this->logger, ERROR, "opening stroke output channel failed:", strerror(errno));
+ close(strokefd);
+ allocator_free(msg);
+ continue;
+ }
+
+ this->stroke_logger = logger_create("-", CONTROL|ERROR, FALSE, strokefile);
+
this->logger->log_bytes(this->logger, RAW, "stroke message", (void*)msg, msg_length);
switch (msg->type)
{
case STR_INITIATE:
{
- initiate_ike_sa_job_t *job;
- connection_t *connection;
-
- pop_string(msg, &(msg->initiate.name));
- this->logger->log(this->logger, CONTROL, "received stroke: initiate \"%s\"", msg->initiate.name);
- connection = this->get_connection_by_name(this, msg->initiate.name);
- if (connection == NULL)
- {
- this->logger->log(this->logger, ERROR, "could not find a connection named \"%s\"", msg->initiate.name);
- }
- else
- {
- job = initiate_ike_sa_job_create(connection);
- charon->job_queue->add(charon->job_queue, (job_t*)job);
- }
+ stroke_initiate(this, msg);
+ break;
+ }
+ case STR_TERMINATE:
+ {
+ stroke_terminate(this, msg);
break;
}
- case STR_INSTALL:
+ case STR_STATUS:
{
- pop_string(msg, &(msg->install.name));
- this->logger->log(this->logger, CONTROL, "received stroke: install \"%s\"", msg->install.name);
+ stroke_status(this, msg);
break;
}
case STR_ADD_CONN:
{
- connection_t *connection;
- policy_t *policy;
- identification_t *my_id, *other_id;
- host_t *my_host, *other_host, *my_subnet, *other_subnet;
- proposal_t *proposal;
- traffic_selector_t *my_ts, *other_ts;
- certificate_t *my_cert, *other_cert;
- rsa_private_key_t *private_key = NULL;
- rsa_public_key_t *public_key = NULL;
-
- pop_string(msg, &msg->add_conn.name);
- pop_string(msg, &msg->add_conn.me.address);
- pop_string(msg, &msg->add_conn.other.address);
- pop_string(msg, &msg->add_conn.me.id);
- pop_string(msg, &msg->add_conn.other.id);
- pop_string(msg, &msg->add_conn.me.cert);
- pop_string(msg, &msg->add_conn.other.cert);
- pop_string(msg, &msg->add_conn.me.subnet);
- pop_string(msg, &msg->add_conn.other.subnet);
-
- this->logger->log(this->logger, CONTROL, "received stroke: add connection \"%s\"", msg->add_conn.name);
-
- my_host = host_create(AF_INET, msg->add_conn.me.address, 500);
- if (my_host == NULL)
- {
- this->logger->log(this->logger, ERROR, "received invalid host: %s", msg->add_conn.me.address);
- break;
- }
- other_host = host_create(AF_INET, msg->add_conn.other.address, 500);
- if (other_host == NULL)
- {
- this->logger->log(this->logger, ERROR, "received invalid host: %s", msg->add_conn.other.address);
- my_host->destroy(my_host);
- break;
- }
- my_id = identification_create_from_string(ID_IPV4_ADDR,
- *msg->add_conn.me.id ? msg->add_conn.me.id : msg->add_conn.me.address);
- if (my_id == NULL)
- {
- this->logger->log(this->logger, ERROR, "received invalid id: %s", msg->add_conn.me.id);
- my_host->destroy(my_host);
- other_host->destroy(other_host);
- break;
- }
- other_id = identification_create_from_string(ID_IPV4_ADDR,
- *msg->add_conn.other.id ? msg->add_conn.other.id : msg->add_conn.other.address);
- if (other_id == NULL)
- {
- my_host->destroy(my_host);
- other_host->destroy(other_host);
- my_id->destroy(my_id);
- this->logger->log(this->logger, ERROR, "received invalid id: %s", msg->add_conn.other.id);
- break;
- }
-
- my_subnet = host_create(AF_INET, *msg->add_conn.me.subnet ? msg->add_conn.me.subnet : msg->add_conn.me.address, 500);
- if (my_subnet == NULL)
- {
- my_host->destroy(my_host);
- other_host->destroy(other_host);
- my_id->destroy(my_id);
- other_id->destroy(other_id);
- this->logger->log(this->logger, ERROR, "received invalid subnet: %s", msg->add_conn.me.subnet);
- break;
- }
-
- other_subnet = host_create(AF_INET, *msg->add_conn.other.subnet ? msg->add_conn.other.subnet : msg->add_conn.other.address, 500);
- if (other_subnet == NULL)
- {
- my_host->destroy(my_host);
- other_host->destroy(other_host);
- my_id->destroy(my_id);
- other_id->destroy(other_id);
- my_subnet->destroy(my_subnet);
- this->logger->log(this->logger, ERROR, "received invalid subnet: %s", msg->add_conn.me.subnet);
- break;
- }
-
- my_ts = traffic_selector_create_from_subnet(my_subnet, *msg->add_conn.me.subnet ? msg->add_conn.me.subnet_mask : 32);
- my_subnet->destroy(my_subnet);
- other_ts = traffic_selector_create_from_subnet(other_subnet, *msg->add_conn.other.subnet ? msg->add_conn.other.subnet_mask : 32);
- other_subnet->destroy(other_subnet);
-
- if (charon->socket->is_listening_on(charon->socket, other_host))
- {
- this->logger->log(this->logger, CONTROL|LEVEL1, "left is other host, switching");
-
- host_t *tmp_host = my_host;
- identification_t *tmp_id = my_id;
- traffic_selector_t *tmp_ts = my_ts;
- char *tmp_cert = msg->add_conn.me.cert;
-
- my_host = other_host;
- other_host = tmp_host;
- my_id = other_id;
- other_id = tmp_id;
- my_ts = other_ts;
- other_ts = tmp_ts;
- msg->add_conn.me.cert = msg->add_conn.other.cert;
- msg->add_conn.other.cert = tmp_cert;
- }
- else if (charon->socket->is_listening_on(charon->socket, my_host))
- {
- this->logger->log(this->logger, CONTROL|LEVEL1, "left is own host, not switching");
- }
- else
- {
- this->logger->log(this->logger, ERROR, "left nor right host is our, aborting");
-
- my_host->destroy(my_host);
- other_host->destroy(other_host);
- my_id->destroy(my_id);
- other_id->destroy(other_id);
- my_ts->destroy(my_ts);
- other_ts->destroy(other_ts);
- break;
- }
-
- connection = connection_create(my_host, other_host, my_id->clone(my_id), other_id->clone(other_id),
- RSA_DIGITAL_SIGNATURE);
- proposal = proposal_create(1);
- proposal->add_algorithm(proposal, PROTO_IKE, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
- proposal->add_algorithm(proposal, PROTO_IKE, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
- proposal->add_algorithm(proposal, PROTO_IKE, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
- proposal->add_algorithm(proposal, PROTO_IKE, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA1, 0);
- proposal->add_algorithm(proposal, PROTO_IKE, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_MD5, 0);
- proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_2048_BIT, 0);
- proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_1536_BIT, 0);
- proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_1024_BIT, 0);
- proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_4096_BIT, 0);
- proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_8192_BIT, 0);
- connection->add_proposal(connection, proposal);
-
- policy = policy_create(my_id, other_id);
- proposal = proposal_create(1);
- proposal->add_algorithm(proposal, PROTO_ESP, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
- proposal->add_algorithm(proposal, PROTO_ESP, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
- proposal->add_algorithm(proposal, PROTO_ESP, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
- policy->add_proposal(policy, proposal);
- policy->add_my_traffic_selector(policy, my_ts);
- policy->add_other_traffic_selector(policy, other_ts);
-
-
- chdir(CERTIFICATE_DIR);
- my_cert = certificate_create_from_file(msg->add_conn.me.cert);
- if (my_cert == NULL)
- {
- this->logger->log(this->logger, ERROR, "loading own certificate \"%s%s\" failed",
- CERTIFICATE_DIR, msg->add_conn.me.cert);
- }
- else
- {
- private_key = find_private_key(this, my_cert->get_public_key(my_cert));
- if (private_key)
- {
- this->logger->log(this->logger, CONTROL|LEVEL1, "found private key for certificate \"%s%s\"",
- CERTIFICATE_DIR, msg->add_conn.me.cert);
- }
- else
- {
- this->logger->log(this->logger, ERROR, "no private key for certificate \"%s%s\" found",
- CERTIFICATE_DIR, msg->add_conn.me.cert);
- }
- }
- other_cert = certificate_create_from_file(msg->add_conn.other.cert);
- if (other_cert == NULL)
- {
- this->logger->log(this->logger, ERROR, "loading peers certificate \"%s%s\" failed",
- CERTIFICATE_DIR, msg->add_conn.other.cert);
- }
- else
- {
- public_key = other_cert->get_public_key(other_cert);
- this->logger->log(this->logger, CONTROL|LEVEL1, "loaded certificate \"%s%s\" (%p)",
- CERTIFICATE_DIR, msg->add_conn.other.cert, public_key);
-
- }
-
- this->configurations->insert_last(this->configurations,
- configuration_entry_create(msg->add_conn.name, connection, policy, private_key, public_key));
-
- this->logger->log(this->logger, CONTROL|LEVEL1, "connection \"%s\" added (%d in store)",
- msg->add_conn.name,
- this->configurations->get_count(this->configurations));
+ stroke_add_conn(this, msg);
+ break;
+ }
+ case STR_LOGTYPE:
+ {
+ stroke_logtype(this, msg);
+ break;
+ }
+ case STR_LOGLEVEL:
+ {
+ stroke_loglevel(this, msg);
break;
}
- case STR_DEL_CONN:
default:
this->logger->log(this->logger, ERROR, "received invalid stroke");
}
-
+ this->stroke_logger->destroy(this->stroke_logger);
+ fclose(strokefile);
close(strokefd);
allocator_free(msg);
}
@@ -657,7 +906,7 @@ static connection_t *get_connection_by_name(private_stroke_t *this, char *name)
if (strcmp(entry->name,name) == 0)
{
/* found configuration */
- found = entry->connection->clone(entry->connection);
+ found = entry->connection;
break;
}
}
@@ -752,7 +1001,7 @@ static status_t get_rsa_public_key(credential_store_t *store, identification_t *
if (config->public_key)
{
iterator->destroy(iterator);
- *public_key = config->public_key;
+ *public_key = config->public_key->clone(config->public_key);
return SUCCESS;
}
}
@@ -780,7 +1029,7 @@ static status_t get_rsa_private_key(credential_store_t *store, identification_t
if (config->private_key)
{
iterator->destroy(iterator);
- *private_key = config->private_key;
+ *private_key = config->private_key->clone(config->private_key);
return SUCCESS;
}
}
diff --git a/Source/charon/threads/stroke.h b/Source/charon/threads/stroke_interface.h
index 113d38d30..ced887fa6 100644
--- a/Source/charon/threads/stroke.h
+++ b/Source/charon/threads/stroke_interface.h
@@ -28,52 +28,10 @@
#include <config/credential_store.h>
-#define STROKE_SOCKET "/var/run/charon.ctl"
#define IPSEC_DIR "/etc/ipsec.d/"
#define PRIVATE_KEY_DIR IPSEC_DIR "private/"
#define CERTIFICATE_DIR IPSEC_DIR "certs/"
-/**
- * @brief A stroke message sent over the unix socket.
- *
- */
-typedef struct stroke_msg_t stroke_msg_t;
-
-struct stroke_msg_t {
- /* length of this message with all strings */
- u_int16_t length;
- /* type of the message */
- enum {
- /* initiate a connection */
- STR_INITIATE,
- /* install SPD entries for a connection */
- STR_INSTALL,
- /* add a connection */
- STR_ADD_CONN,
- /* delete a connection */
- STR_DEL_CONN,
- /* more to come */
- } type;
- union {
- /* data for STR_INITIATE, STR_INSTALL */
- struct {
- char *name;
- } initiate, install;
- /* data for STR_ADD_CONN */
- struct {
- char *name;
- struct {
- char *id;
- char *cert;
- char *address;
- char *subnet;
- u_int8_t subnet_mask;
- } me, other;
- } add_conn;
- };
- u_int8_t buffer[];
-};
-
typedef struct stroke_t stroke_t;