/* strongSwan KLIPS starter * Copyright (C) 2001-2002 Mathieu Lafon - Arkoon Network Security * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. */ #include #include #include #include #include #include "files.h" bool starter_klips_init(void) { struct stat stb; if (stat(PROC_KLIPS, &stb) != 0) { /* ipsec module makes the pf_key proc interface visible */ if (stat(PROC_MODULES, &stb) == 0) { ignore_result(system("modprobe -qv ipsec")); } /* now test again */ if (stat(PROC_KLIPS, &stb) != 0) { DBG2(DBG_APP, "kernel appears to lack the KLIPS IPsec stack"); return FALSE; } } /* load crypto algorithm modules */ ignore_result(system("modprobe -qv ipsec_aes")); ignore_result(system("modprobe -qv ipsec_blowfish")); ignore_result(system("modprobe -qv ipsec_sha2")); DBG2(DBG_APP, "found KLIPS IPsec stack"); return TRUE; } void starter_klips_cleanup(void) { if (system("type eroute > /dev/null 2>&1") == 0) { ignore_result(system("spi --clear")); ignore_result(system("eroute --clear")); } else if (system("type setkey > /dev/null 2>&1") == 0) { ignore_result(system("setkey -F")); ignore_result(system("setkey -FP")); } else { DBG1(DBG_APP, "WARNING: cannot flush IPsec state/policy database"); } }