]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
libhydra: Move kernel interface to libcharon
authorTobias Brunner <tobias@strongswan.org>
Fri, 12 Feb 2016 14:30:18 +0000 (15:30 +0100)
committerTobias Brunner <tobias@strongswan.org>
Thu, 3 Mar 2016 16:36:11 +0000 (17:36 +0100)
This moves hydra->kernel_interface to charon->kernel.

69 files changed:
src/charon-tkm/src/ees/ees_callbacks.c
src/charon-tkm/tests/keymat_tests.c
src/conftest/conftest.h
src/frontends/android/app/src/main/jni/libandroidbridge/backend/android_attr.c
src/frontends/android/app/src/main/jni/libandroidbridge/backend/android_dns_proxy.c
src/frontends/android/app/src/main/jni/libandroidbridge/kernel/android_ipsec.c
src/frontends/android/app/src/main/jni/libandroidbridge/kernel/android_net.c
src/libcharon/Android.mk
src/libcharon/Makefile.am
src/libcharon/attributes/mem_pool.c
src/libcharon/daemon.c
src/libcharon/daemon.h
src/libcharon/kernel/kernel_handler.c
src/libcharon/kernel/kernel_handler.h
src/libcharon/kernel/kernel_interface.c [moved from src/libhydra/kernel/kernel_interface.c with 99% similarity]
src/libcharon/kernel/kernel_interface.h [moved from src/libhydra/kernel/kernel_interface.h with 99% similarity]
src/libcharon/kernel/kernel_ipsec.c [moved from src/libhydra/kernel/kernel_ipsec.c with 81% similarity]
src/libcharon/kernel/kernel_ipsec.h [moved from src/libhydra/kernel/kernel_ipsec.h with 99% similarity]
src/libcharon/kernel/kernel_listener.h [moved from src/libhydra/kernel/kernel_listener.h with 99% similarity]
src/libcharon/kernel/kernel_net.c [moved from src/libhydra/kernel/kernel_net.c with 81% similarity]
src/libcharon/kernel/kernel_net.h [moved from src/libhydra/kernel/kernel_net.h with 99% similarity]
src/libcharon/network/receiver.c
src/libcharon/plugins/dhcp/dhcp_socket.c
src/libcharon/plugins/forecast/forecast_forwarder.c
src/libcharon/plugins/kernel_iph/kernel_iph_net.c
src/libcharon/plugins/kernel_iph/kernel_iph_plugin.c
src/libcharon/plugins/kernel_libipsec/kernel_libipsec_ipsec.c
src/libcharon/plugins/kernel_libipsec/kernel_libipsec_router.c
src/libcharon/plugins/kernel_netlink/Makefile.am
src/libcharon/plugins/kernel_netlink/kernel_netlink_ipsec.c
src/libcharon/plugins/kernel_netlink/kernel_netlink_net.c
src/libcharon/plugins/kernel_netlink/kernel_netlink_plugin.c
src/libcharon/plugins/kernel_netlink/tests.c
src/libcharon/plugins/kernel_pfkey/Makefile.am
src/libcharon/plugins/kernel_pfkey/kernel_pfkey_ipsec.c
src/libcharon/plugins/kernel_pfkey/kernel_pfkey_plugin.c
src/libcharon/plugins/kernel_pfroute/Makefile.am
src/libcharon/plugins/kernel_pfroute/kernel_pfroute_net.c
src/libcharon/plugins/kernel_pfroute/kernel_pfroute_plugin.c
src/libcharon/plugins/kernel_wfp/kernel_wfp_ipsec.c
src/libcharon/plugins/load_tester/load_tester_config.c
src/libcharon/plugins/load_tester/load_tester_plugin.c
src/libcharon/plugins/resolve/resolve_handler.c
src/libcharon/plugins/socket_default/socket_default_socket.c
src/libcharon/plugins/socket_dynamic/socket_dynamic_socket.c
src/libcharon/plugins/socket_win/socket_win_socket.c
src/libcharon/plugins/stroke/stroke_config.c
src/libcharon/plugins/stroke/stroke_control.c
src/libcharon/plugins/stroke/stroke_list.c
src/libcharon/plugins/tnc_ifmap/tnc_ifmap_listener.c
src/libcharon/plugins/updown/updown_listener.c
src/libcharon/plugins/vici/vici_tests.c
src/libcharon/processing/jobs/adopt_children_job.c
src/libcharon/sa/child_sa.c
src/libcharon/sa/ike_sa.c
src/libcharon/sa/ikev1/tasks/isakmp_natd.c
src/libcharon/sa/ikev1/tasks/xauth.c
src/libcharon/sa/ikev2/tasks/child_create.c
src/libcharon/sa/ikev2/tasks/ike_me.c
src/libcharon/sa/ikev2/tasks/ike_mobike.c
src/libcharon/sa/ikev2/tasks/ike_natd.c
src/libcharon/sa/shunt_manager.c
src/libcharon/sa/trap_manager.c
src/libhydra/Android.mk
src/libhydra/Makefile.am
src/libhydra/hydra.c
src/libhydra/hydra.h
src/starter/Makefile.am
src/starter/netkey.c

index 74c0d3618a003a8915a73f0559655121cc43f003..f4107d90a1930380243d94ce39c64c14c7567b09 100644 (file)
@@ -14,7 +14,7 @@
  * for more details.
  */
 
-#include <hydra.h>
+#include <daemon.h>
 #include <utils/debug.h>
 #include <tkm/constants.h>
 #include <tkm/types.h>
@@ -25,8 +25,7 @@
 void charon_esa_acquire(result_type *res, const sp_id_type sp_id)
 {
        DBG1(DBG_KNL, "ees: acquire received for reqid %u", sp_id);
-       hydra->kernel_interface->acquire(hydra->kernel_interface, sp_id, NULL,
-                                                                        NULL);
+       charon->kernel->acquire(charon->kernel, sp_id, NULL, NULL);
        *res = TKM_OK;
 }
 
@@ -47,6 +46,5 @@ void charon_esa_expire(result_type *res, const sp_id_type sp_id,
 
        DBG1(DBG_KNL, "ees: expire received for reqid %u, spi %x, dst %H", sp_id,
                 ntohl(spi_rem), dst);
-       hydra->kernel_interface->expire(hydra->kernel_interface, protocol,
-                                                                       spi_rem, dst, hard != 0);
+       charon->kernel->expire(charon->kernel, protocol, spi_rem, dst, hard != 0);
 }
index d087bee3f69439d7a70c70e13ed1ae2fbf43be65..8bba1f9d9bf56609c8fa42d4f6a7ba37c3f3e5ee 100644 (file)
@@ -17,7 +17,6 @@
 #include <tests/test_suite.h>
 
 #include <daemon.h>
-#include <hydra.h>
 #include <config/proposal.h>
 #include <encoding/payloads/ike_header.h>
 #include <tkm/client.h>
index 6bbdabd07ee906aaae5d681f730057925f1da79f..2d0320429834eb9fc87c58243210e054ddcb7ec4 100644 (file)
@@ -21,7 +21,6 @@
 #define CONFTEST_H_
 
 #include <library.h>
-#include <hydra.h>
 #include <daemon.h>
 #include <credentials/sets/mem_cred.h>
 
index 645b3fa9b44533c522f44b726e4fa04b5cca36a7..8015b7c3803d6deae01198ef2bef007ad15d6f97 100644 (file)
@@ -18,7 +18,6 @@
 #include "android_attr.h"
 #include "../charonservice.h"
 
-#include <hydra.h>
 #include <utils/debug.h>
 #include <library.h>
 
index 908e37238aaa0d28d677177a82cda26ce78aafd0..7d71da208f19d54fc6144ee3088bb2d0ca6ebdaf 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "android_dns_proxy.h"
 
-#include <hydra.h>
+#include <daemon.h>
 #include <threading/rwlock.h>
 #include <collections/hashtable.h>
 #include <processing/jobs/callback_job.h>
@@ -121,8 +121,7 @@ static int open_socket(int family)
                DBG1(DBG_NET, "could not open proxy socket: %s", strerror(errno));
                return -1;
        }
-       if (!hydra->kernel_interface->bypass_socket(hydra->kernel_interface,
-                                                                                               skt, family))
+       if (!charon->kernel->bypass_socket(charon->kernel, skt, family))
        {
                DBG1(DBG_NET, "installing bypass policy for proxy socket failed");
                close(skt);
index 1eb6084db96b2cca0e01f880473655d809c37180..a740303b67b976ed6fc2e394ca8ad10fe1ea0d5f 100644 (file)
@@ -19,7 +19,7 @@
 
 #include <utils/debug.h>
 #include <library.h>
-#include <hydra.h>
+#include <daemon.h>
 #include <ipsec.h>
 
 typedef struct private_kernel_android_ipsec_t private_kernel_android_ipsec_t;
@@ -42,8 +42,7 @@ struct private_kernel_android_ipsec_t {
  */
 static void expire(u_int8_t protocol, u_int32_t spi, host_t *dst, bool hard)
 {
-       hydra->kernel_interface->expire(hydra->kernel_interface, protocol,
-                                                                       spi, dst, hard);
+       charon->kernel->expire(charon->kernel, protocol, spi, dst, hard);
 }
 
 METHOD(kernel_ipsec_t, get_spi, status_t,
index 2ce1bdfac997b497aee958ce0b244920f705e5ba..acc4b75e975a604306c850bbb9ad91a56d60d2dc 100644 (file)
@@ -20,7 +20,7 @@
 
 #include "../android_jni.h"
 #include "../charonservice.h"
-#include <hydra.h>
+#include <daemon.h>
 #include <processing/jobs/callback_job.h>
 #include <threading/mutex.h>
 
@@ -75,7 +75,7 @@ static job_requeue_t roam_event()
 {
        /* this will fail if no connection is up */
        charonservice->bypass_socket(charonservice, -1, 0);
-       hydra->kernel_interface->roam(hydra->kernel_interface, TRUE);
+       charon->kernel->roam(charon->kernel, TRUE);
        return JOB_REQUEUE_NONE;
 }
 
index 65d0e2b114088d5071ae6ec8cecf7f99a6dccd2d..79422866593c1f525106062fda68f2eb51e83085 100644 (file)
@@ -47,7 +47,10 @@ encoding/payloads/unknown_payload.c encoding/payloads/unknown_payload.h \
 encoding/payloads/vendor_id_payload.c encoding/payloads/vendor_id_payload.h \
 encoding/payloads/hash_payload.c encoding/payloads/hash_payload.h \
 encoding/payloads/fragment_payload.c encoding/payloads/fragment_payload.h \
-kernel/kernel_handler.c kernel/kernel_handler.h \
+kernel/kernel_interface.c kernel/kernel_interface.h \
+kernel/kernel_ipsec.c kernel/kernel_ipsec.h \
+kernel/kernel_net.c kernel/kernel_net.h \
+kernel/kernel_listener.h kernel/kernel_handler.c kernel/kernel_handler.h \
 network/receiver.c network/receiver.h network/sender.c network/sender.h \
 network/socket.c network/socket.h \
 network/socket_manager.c network/socket_manager.h \
index 0eee3c28d5f60eb191ad7a68ee9c64837e8d94dd..910f502695a483e86e13e70735dd6c900b56c19f 100644 (file)
@@ -46,7 +46,10 @@ encoding/payloads/unknown_payload.c encoding/payloads/unknown_payload.h \
 encoding/payloads/vendor_id_payload.c encoding/payloads/vendor_id_payload.h \
 encoding/payloads/hash_payload.c encoding/payloads/hash_payload.h \
 encoding/payloads/fragment_payload.c encoding/payloads/fragment_payload.h \
-kernel/kernel_handler.c kernel/kernel_handler.h \
+kernel/kernel_interface.c kernel/kernel_interface.h \
+kernel/kernel_ipsec.c kernel/kernel_ipsec.h \
+kernel/kernel_net.c kernel/kernel_net.h \
+kernel/kernel_listener.h kernel/kernel_handler.c kernel/kernel_handler.h \
 network/receiver.c network/receiver.h network/sender.c network/sender.h \
 network/socket.c network/socket.h \
 network/socket_manager.c network/socket_manager.h \
index 2796682495279e84dcecdc9dde4f851147ec2753..833c3e95019180bd597479a7a0ed14173e4d8144 100644 (file)
@@ -17,7 +17,6 @@
 #include "mem_pool.h"
 
 #include <library.h>
-#include <hydra.h>
 #include <utils/debug.h>
 #include <collections/hashtable.h>
 #include <collections/array.h>
index f861460dba38856d84dc7488b4c7d1bcee37e25d..799c3f6dc984a7e6340a8c14151de83f48e62bb6 100644 (file)
@@ -685,6 +685,7 @@ static void destroy(private_daemon_t *this)
        DESTROY_IF(this->public.xauth);
        DESTROY_IF(this->public.backends);
        DESTROY_IF(this->public.socket);
+       DESTROY_IF(this->public.kernel);
 
        /* rehook library logging, shutdown logging */
        dbg = dbg_old;
@@ -862,6 +863,7 @@ private_daemon_t *daemon_create()
                .ref = 1,
        );
        charon = &this->public;
+       this->public.kernel = kernel_interface_create();
        this->public.attributes = attribute_manager_create();
        this->public.controller = controller_create();
        this->public.eap = eap_manager_create();
index 0b66ea39a755df9b1a5cd47a09ad22ca592a2c79..654e22a07639d7e7b4777eeb809df35e74972207 100644 (file)
@@ -63,7 +63,7 @@
  * @defgroup payloads payloads
  * @ingroup encoding
  *
- * @defgroup ckernel kernel
+ * @defgroup kernel kernel
  * @ingroup libcharon
  *
  * @defgroup network network
 typedef struct daemon_t daemon_t;
 
 #include <attributes/attribute_manager.h>
+#include <kernel/kernel_interface.h>
 #include <network/sender.h>
 #include <network/receiver.h>
 #include <network/socket_manager.h>
@@ -238,6 +239,11 @@ struct daemon_t {
         */
        socket_manager_t *socket;
 
+       /**
+        * Kernel interface to communicate with kernel
+        */
+       kernel_interface_t *kernel;
+
        /**
         * A ike_sa_manager_t instance.
         */
index 9c0e2602b44cde6068c7bd08e70d8928254dd563..be37d30e539cc0685763a1a911a3e75e233ec8c9 100644 (file)
@@ -15,7 +15,6 @@
 
 #include "kernel_handler.h"
 
-#include <hydra.h>
 #include <daemon.h>
 #include <processing/jobs/acquire_job.h>
 #include <processing/jobs/delete_child_sa_job.h>
@@ -135,8 +134,7 @@ METHOD(kernel_listener_t, roam, bool,
 METHOD(kernel_handler_t, destroy, void,
        private_kernel_handler_t *this)
 {
-       hydra->kernel_interface->remove_listener(hydra->kernel_interface,
-                                                                                        &this->public.listener);
+       charon->kernel->remove_listener(charon->kernel, &this->public.listener);
        free(this);
 }
 
@@ -157,8 +155,7 @@ kernel_handler_t *kernel_handler_create()
                },
        );
 
-       hydra->kernel_interface->add_listener(hydra->kernel_interface,
-                                                                                 &this->public.listener);
+       charon->kernel->add_listener(charon->kernel, &this->public.listener);
 
        return &this->public;
 }
index 48ad6889c989274c666439cabadd4cb3a7a5ea46..f1fa0bdfcfa0351fe4899e2be8a028b06eef225e 100644 (file)
@@ -15,7 +15,7 @@
 
 /**
  * @defgroup kernel_handler kernel_handler
- * @{ @ingroup ckernel
+ * @{ @ingroup kernel
  */
 
 #ifndef KERNEL_HANDLER_H_
similarity index 99%
rename from src/libhydra/kernel/kernel_interface.c
rename to src/libcharon/kernel/kernel_interface.c
index 89e95ade9c88832777087bb1c061470be6cb8e15..40c4ee589df6ffca468aee88bbad3107e225b1d0 100644 (file)
@@ -39,7 +39,6 @@
 
 #include "kernel_interface.h"
 
-#include <hydra.h>
 #include <utils/debug.h>
 #include <threading/mutex.h>
 #include <collections/linked_list.h>
similarity index 99%
rename from src/libhydra/kernel/kernel_interface.h
rename to src/libcharon/kernel/kernel_interface.h
index 45efe89461d1dca2590631b4c57d4301f708515d..6793c6cc6f56198101e83412e2a7836294eb2cf7 100644 (file)
@@ -40,7 +40,7 @@
 
 /**
  * @defgroup kernel_interface kernel_interface
- * @{ @ingroup hkernel
+ * @{ @ingroup kernel
  */
 
 #ifndef KERNEL_INTERFACE_H_
similarity index 81%
rename from src/libhydra/kernel/kernel_ipsec.c
rename to src/libcharon/kernel/kernel_ipsec.c
index 697b1b33dc90f54d36f5453862d9f0bff87805b2..0440f11bbc298437c4e94ada19252d2608f90d90 100644 (file)
@@ -15,7 +15,7 @@
 
 #include "kernel_ipsec.h"
 
-#include <hydra.h>
+#include <daemon.h>
 
 /**
  * See header
@@ -25,14 +25,12 @@ bool kernel_ipsec_register(plugin_t *plugin, plugin_feature_t *feature,
 {
        if (reg)
        {
-               return hydra->kernel_interface->add_ipsec_interface(
-                                                                                       hydra->kernel_interface,
+               return charon->kernel->add_ipsec_interface(charon->kernel,
                                                                                        (kernel_ipsec_constructor_t)data);
        }
        else
        {
-               return hydra->kernel_interface->remove_ipsec_interface(
-                                                                                       hydra->kernel_interface,
+               return charon->kernel->remove_ipsec_interface(charon->kernel,
                                                                                        (kernel_ipsec_constructor_t)data);
        }
 }
similarity index 99%
rename from src/libhydra/kernel/kernel_ipsec.h
rename to src/libcharon/kernel/kernel_ipsec.h
index 2458db5b9ac383ba803c6e65e12b9a1e0dcda400..31e06308e65bb00c4895b87fd9ab7e9e7f73f279 100644 (file)
@@ -18,7 +18,7 @@
 
 /**
  * @defgroup kernel_ipsec kernel_ipsec
- * @{ @ingroup hkernel
+ * @{ @ingroup kernel
  */
 
 #ifndef KERNEL_IPSEC_H_
similarity index 99%
rename from src/libhydra/kernel/kernel_listener.h
rename to src/libcharon/kernel/kernel_listener.h
index 8074356a43a1b55e7b0c6dd4a3329d86bfc86856..6426fae2aafd7af0fcd305e882c096862971794e 100644 (file)
@@ -15,7 +15,7 @@
 
 /**
  * @defgroup kernel_listener kernel_listener
- * @{ @ingroup hkernel
+ * @{ @ingroup kernel
  */
 
 #ifndef KERNEL_LISTENER_H_
similarity index 81%
rename from src/libhydra/kernel/kernel_net.c
rename to src/libcharon/kernel/kernel_net.c
index 07d8b2999380f00b17a4ac95350b3dee3cdf2e59..f169cad143deff82786049c964ec830449244f0f 100644 (file)
@@ -15,7 +15,7 @@
 
 #include "kernel_net.h"
 
-#include <hydra.h>
+#include <daemon.h>
 
 /**
  * See header
@@ -25,14 +25,12 @@ bool kernel_net_register(plugin_t *plugin, plugin_feature_t *feature,
 {
        if (reg)
        {
-               return hydra->kernel_interface->add_net_interface(
-                                                                                       hydra->kernel_interface,
+               return charon->kernel->add_net_interface(charon->kernel,
                                                                                        (kernel_net_constructor_t)data);
        }
        else
        {
-               return hydra->kernel_interface->remove_net_interface(
-                                                                                       hydra->kernel_interface,
+               return charon->kernel->remove_net_interface(charon->kernel,
                                                                                        (kernel_net_constructor_t)data);
        }
 }
similarity index 99%
rename from src/libhydra/kernel/kernel_net.h
rename to src/libcharon/kernel/kernel_net.h
index 4312c17d14558f1ca93e041f28bc3dd782eea07c..7fc644a7e39cd13a28173e1b81e073d541e99e25 100644 (file)
@@ -16,7 +16,7 @@
 
 /**
  * @defgroup kernel_net kernel_net
- * @{ @ingroup hkernel
+ * @{ @ingroup kernel
  */
 
 #ifndef KERNEL_NET_H_
index a2f2016ff5c777be76de3cafaa5fb20d7ee14b44..ee357ca4df7c607ef08bf8d6f968a935dbfcc447 100644 (file)
@@ -20,7 +20,6 @@
 
 #include "receiver.h"
 
-#include <hydra.h>
 #include <daemon.h>
 #include <network/socket.h>
 #include <processing/jobs/job.h>
@@ -451,9 +450,8 @@ static job_requeue_t receive_packets(private_receiver_t *this)
 
        dst = packet->get_destination(packet);
        src = packet->get_source(packet);
-       if (!hydra->kernel_interface->all_interfaces_usable(hydra->kernel_interface)
-               && !hydra->kernel_interface->get_interface(hydra->kernel_interface,
-                                                                                                  dst, NULL))
+       if (!charon->kernel->all_interfaces_usable(charon->kernel)
+               && !charon->kernel->get_interface(charon->kernel, dst, NULL))
        {
                DBG3(DBG_NET, "received packet from %#H to %#H on ignored interface",
                         src, dst);
index b8c1b4059389a13dd4f91f50ee43a5133435ea86..0fd1d33fd4ad73c1dbc606f540935d5156acd972 100644 (file)
@@ -31,7 +31,6 @@
 #include <threading/condvar.h>
 #include <threading/thread.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <processing/jobs/callback_job.h>
 
@@ -209,8 +208,7 @@ static int prepare_dhcp(private_dhcp_socket_t *this,
        else
        {
                /* act as relay agent */
-               src = hydra->kernel_interface->get_source_addr(hydra->kernel_interface,
-                                                                                                          this->dst, NULL);
+               src = charon->kernel->get_source_addr(charon->kernel, this->dst, NULL);
                if (src)
                {
                        memcpy(&dhcp->gateway_address, src->get_address(src).ptr,
index 07a3d4953650f387275ea442e1d28e7aa2cf6543..40aaa7f25b885f00dfd6ed397c139c10473f179e 100644 (file)
@@ -27,7 +27,6 @@
 #include <ifaddrs.h>
 #include <net/if.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <threading/thread.h>
 #include <processing/jobs/callback_job.h>
@@ -428,8 +427,7 @@ METHOD(forecast_forwarder_t, destroy, void,
                lib->watcher->remove(lib->watcher, this->kernel.pkt);
                close(this->kernel.pkt);
        }
-       hydra->kernel_interface->remove_listener(hydra->kernel_interface,
-                                                                                        &this->kernel.listener);
+       charon->kernel->remove_listener(charon->kernel, &this->kernel.listener);
        free(this);
 }
 
@@ -486,8 +484,8 @@ forecast_forwarder_t *forecast_forwarder_create(forecast_listener_t *listener)
 
        setup_interface(&this->kernel);
 
-       hydra->kernel_interface->add_listener(hydra->kernel_interface,
-                                                                                 &this->kernel.listener);
+       charon->kernel->add_listener(charon->kernel,
+                                                                                  &this->kernel.listener);
 
        lib->watcher->add(lib->watcher, this->kernel.pkt, WATCHER_READ,
                                          (watcher_cb_t)receive_casts, this);
index a4be4041e69f942f32b73405f17fdb12e5131020..6a8a96821a9cf0a73bd8dc3eae265c2fa99703d9 100644 (file)
@@ -24,7 +24,7 @@
 
 #include "kernel_iph_net.h"
 
-#include <hydra.h>
+#include <daemon.h>
 #include <threading/mutex.h>
 #include <collections/linked_list.h>
 #include <processing/jobs/callback_job.h>
@@ -130,7 +130,7 @@ static job_requeue_t roam_event(private_kernel_iph_net_t *this)
        this->roam_address = FALSE;
        this->mutex->unlock(this->mutex);
 
-       hydra->kernel_interface->roam(hydra->kernel_interface, address);
+       charon->kernel->roam(charon->kernel, address);
        return JOB_REQUEUE_NONE;
 }
 
index c5475e30b9385990015307ad87ffb4831e018036..c16381440119ff6cebe36791b3af48c6a58ae2d5 100644 (file)
@@ -17,8 +17,6 @@
 #include "kernel_iph_plugin.h"
 #include "kernel_iph_net.h"
 
-#include <hydra.h>
-
 typedef struct private_kernel_iph_plugin_t private_kernel_iph_plugin_t;
 
 /**
index 9f5f4edbd8ff74cbba3cef7887e18fbdc39c7aad..4c8771e96b449483baa8e4525224b8b502e3fc2b 100644 (file)
@@ -17,7 +17,7 @@
 
 #include <library.h>
 #include <ipsec.h>
-#include <hydra.h>
+#include <daemon.h>
 #include <networking/tun_device.h>
 #include <threading/mutex.h>
 #include <utils/debug.h>
@@ -224,8 +224,7 @@ static inline bool policy_entry_equals(policy_entry_t *a,
  */
 static void expire(u_int8_t protocol, u_int32_t spi, host_t *dst, bool hard)
 {
-       hydra->kernel_interface->expire(hydra->kernel_interface, protocol,
-                                                                       spi, dst, hard);
+       charon->kernel->expire(charon->kernel, protocol, spi, dst, hard);
 }
 
 METHOD(kernel_ipsec_t, get_features, kernel_feature_t,
@@ -313,16 +312,13 @@ static void add_exclude_route(private_kernel_libipsec_ipsec_t *this,
        if (!route->exclude)
        {
                DBG2(DBG_KNL, "installing new exclude route for %H src %H", dst, src);
-               gtw = hydra->kernel_interface->get_nexthop(hydra->kernel_interface,
-                                                                                                  dst, -1, NULL);
+               gtw = charon->kernel->get_nexthop(charon->kernel, dst, -1, NULL);
                if (gtw)
                {
                        char *if_name = NULL;
 
-                       if (hydra->kernel_interface->get_interface(
-                                                                       hydra->kernel_interface, src, &if_name) &&
-                               hydra->kernel_interface->add_route(hydra->kernel_interface,
-                                                                       dst->get_address(dst),
+                       if (charon->kernel->get_interface(charon->kernel, src, &if_name) &&
+                               charon->kernel->add_route(charon->kernel, dst->get_address(dst),
                                                                        dst->get_family(dst) == AF_INET ? 32 : 128,
                                                                        gtw, src, if_name) == SUCCESS)
                        {
@@ -367,14 +363,12 @@ static void remove_exclude_route(private_kernel_libipsec_ipsec_t *this,
        dst = route->exclude->dst;
        DBG2(DBG_KNL, "uninstalling exclude route for %H src %H",
                 dst, route->exclude->src);
-       if (hydra->kernel_interface->get_interface(
-                                                                       hydra->kernel_interface,
-                                                                       route->exclude->src, &if_name) &&
-               hydra->kernel_interface->del_route(hydra->kernel_interface,
-                                                                       dst->get_address(dst),
-                                                                       dst->get_family(dst) == AF_INET ? 32 : 128,
-                                                                       route->exclude->gtw, route->exclude->src,
-                                                                       if_name) != SUCCESS)
+       if (charon->kernel->get_interface(charon->kernel, route->exclude->src,
+                                                                         &if_name) &&
+               charon->kernel->del_route(charon->kernel, dst->get_address(dst),
+                                                                 dst->get_family(dst) == AF_INET ? 32 : 128,
+                                                                 route->exclude->gtw, route->exclude->src,
+                                                                 if_name) != SUCCESS)
        {
                DBG1(DBG_KNL, "uninstalling exclude route for %H failed", dst);
        }
@@ -402,8 +396,8 @@ static bool install_route(private_kernel_libipsec_ipsec_t *this,
                return TRUE;
        }
 
-       if (hydra->kernel_interface->get_address_by_ts(hydra->kernel_interface,
-                                                                       src_ts, &src_ip, &is_virtual) != SUCCESS)
+       if (charon->kernel->get_address_by_ts(charon->kernel, src_ts, &src_ip,
+                                                                                 &is_virtual) != SUCCESS)
        {
                traffic_selector_t *multicast, *broadcast = NULL;
                bool ignore = FALSE;
@@ -444,8 +438,7 @@ static bool install_route(private_kernel_libipsec_ipsec_t *this,
        );
 #ifndef __linux__
        /* on Linux we cant't install a gateway */
-       route->gateway = hydra->kernel_interface->get_nexthop(
-                                                                               hydra->kernel_interface, dst, -1, src);
+       route->gateway = charon->kernel->get_nexthop(charon->kernel, dst, -1, src);
 #endif
 
        if (policy->route)
@@ -459,9 +452,9 @@ static bool install_route(private_kernel_libipsec_ipsec_t *this,
                        return TRUE;
                }
                /* uninstall previously installed route */
-               if (hydra->kernel_interface->del_route(hydra->kernel_interface,
-                                                                       old->dst_net, old->prefixlen, old->gateway,
-                                                                       old->src_ip, old->if_name) != SUCCESS)
+               if (charon->kernel->del_route(charon->kernel, old->dst_net,
+                                                                         old->prefixlen, old->gateway,
+                                                                         old->src_ip, old->if_name) != SUCCESS)
                {
                        DBG1(DBG_KNL, "error uninstalling route installed with policy "
                                 "%R === %R %N", src_ts, dst_ts, policy_dir_names,
@@ -490,9 +483,9 @@ static bool install_route(private_kernel_libipsec_ipsec_t *this,
        DBG2(DBG_KNL, "installing route: %R src %H dev %s",
                 dst_ts, route->src_ip, route->if_name);
 
-       switch (hydra->kernel_interface->add_route(hydra->kernel_interface,
-                                                       route->dst_net, route->prefixlen, route->gateway,
-                                                       route->src_ip, route->if_name))
+       switch (charon->kernel->add_route(charon->kernel, route->dst_net,
+                                                                         route->prefixlen, route->gateway,
+                                                                         route->src_ip, route->if_name))
        {
                case ALREADY_DONE:
                        /* route exists, do not uninstall */
@@ -598,9 +591,9 @@ METHOD(kernel_ipsec_t, del_policy, status_t,
        {
                route_entry_t *route = policy->route;
 
-               if (hydra->kernel_interface->del_route(hydra->kernel_interface,
-                               route->dst_net, route->prefixlen, route->gateway, route->src_ip,
-                               route->if_name) != SUCCESS)
+               if (charon->kernel->del_route(charon->kernel, route->dst_net,
+                                                                         route->prefixlen, route->gateway,
+                                                                         route->src_ip, route->if_name) != SUCCESS)
                {
                        DBG1(DBG_KNL, "error uninstalling route installed with "
                                                  "policy %R === %R %N", src_ts, dst_ts,
@@ -629,9 +622,9 @@ METHOD(kernel_ipsec_t, flush_policies, status_t,
                {
                        route_entry_t *route = pol->route;
 
-                       hydra->kernel_interface->del_route(hydra->kernel_interface,
-                                       route->dst_net, route->prefixlen, route->gateway,
-                                       route->src_ip, route->if_name);
+                       charon->kernel->del_route(charon->kernel, route->dst_net,
+                                                                         route->prefixlen, route->gateway,
+                                                                         route->src_ip, route->if_name);
                        remove_exclude_route(this, route);
                }
                policy_entry_destroy(pol);
index 830954e11e83d4693028cd0ad792a60afce89572..66141ad5684267bfb8e8c0c0428b17a2ab784c65 100644 (file)
@@ -19,7 +19,6 @@
 #include "kernel_libipsec_router.h"
 
 #include <daemon.h>
-#include <hydra.h>
 #include <ipsec.h>
 #include <collections/hashtable.h>
 #include <networking/tun_device.h>
@@ -298,8 +297,7 @@ METHOD(kernel_libipsec_router_t, destroy, void,
                                                                                 (ipsec_outbound_cb_t)send_esp);
        ipsec->processor->unregister_inbound(ipsec->processor,
                                                                                 (ipsec_inbound_cb_t)deliver_plain);
-       hydra->kernel_interface->remove_listener(hydra->kernel_interface,
-                                                                                        &this->public.listener);
+       charon->kernel->remove_listener(charon->kernel, &this->public.listener);
        this->lock->destroy(this->lock);
        this->tuns->destroy(this->tuns);
        close(this->notify[0]);
@@ -351,8 +349,7 @@ kernel_libipsec_router_t *kernel_libipsec_router_create()
                                                                  (hashtable_equals_t)tun_entry_equals, 4);
        this->lock = rwlock_create(RWLOCK_TYPE_DEFAULT);
 
-       hydra->kernel_interface->add_listener(hydra->kernel_interface,
-                                                                                 &this->public.listener);
+       charon->kernel->add_listener(charon->kernel, &this->public.listener);
        ipsec->processor->register_outbound(ipsec->processor, send_esp, NULL);
        ipsec->processor->register_inbound(ipsec->processor,
                                                                        (ipsec_inbound_cb_t)deliver_plain, this);
index cc885540662cadf387a3f4915771a5717d5d5448..973e2c2f4440d5a39807fc57b055985fc8d12a18 100644 (file)
@@ -1,7 +1,7 @@
 AM_CPPFLAGS = \
        -I${linux_headers} \
        -I$(top_srcdir)/src/libstrongswan \
-       -I$(top_srcdir)/src/libhydra \
+       -I$(top_srcdir)/src/libcharon \
        -DROUTING_TABLE=${routing_table} \
        -DROUTING_TABLE_PRIO=${routing_table_prio}
 
index 8c506d9f4f85a7c46bfae96bf3379d6be85b0ad1..275aa6cb215a6d55c1ae2a09a50eb57a137b24fc 100644 (file)
@@ -35,7 +35,7 @@
 #include "kernel_netlink_ipsec.h"
 #include "kernel_netlink_shared.h"
 
-#include <hydra.h>
+#include <daemon.h>
 #include <utils/debug.h>
 #include <threading/mutex.h>
 #include <collections/array.h>
@@ -262,8 +262,8 @@ static char* lookup_algorithm(transform_type_t type, int ikev2)
                        return list[i].name;
                }
        }
-       if (hydra->kernel_interface->lookup_algorithm(hydra->kernel_interface,
-                                                                                                 ikev2, type, NULL, &name))
+       if (charon->kernel->lookup_algorithm(charon->kernel, ikev2, type, NULL,
+                                                                                &name))
        {
                return name;
        }
@@ -856,8 +856,7 @@ static void process_acquire(private_kernel_netlink_ipsec_t *this,
        src_ts = selector2ts(&acquire->sel, TRUE);
        dst_ts = selector2ts(&acquire->sel, FALSE);
 
-       hydra->kernel_interface->acquire(hydra->kernel_interface, reqid, src_ts,
-                                                                        dst_ts);
+       charon->kernel->acquire(charon->kernel, reqid, src_ts, dst_ts);
 }
 
 /**
@@ -882,8 +881,8 @@ static void process_expire(private_kernel_netlink_ipsec_t *this,
                dst = xfrm2host(expire->state.family, &expire->state.id.daddr, 0);
                if (dst)
                {
-                       hydra->kernel_interface->expire(hydra->kernel_interface, protocol,
-                                                                                       spi, dst, expire->hard != 0);
+                       charon->kernel->expire(charon->kernel, protocol, spi, dst,
+                                                                  expire->hard != 0);
                        dst->destroy(dst);
                }
        }
@@ -951,8 +950,8 @@ static void process_migrate(private_kernel_netlink_ipsec_t *this,
 
        if (src_ts && dst_ts && local && remote)
        {
-               hydra->kernel_interface->migrate(hydra->kernel_interface, reqid,
-                                                                                src_ts, dst_ts, dir, local, remote);
+               charon->kernel->migrate(charon->kernel, reqid, src_ts, dst_ts, dir,
+                                                               local, remote);
        }
        else
        {
@@ -988,8 +987,8 @@ static void process_mapping(private_kernel_netlink_ipsec_t *this,
                                                        mapping->new_sport);
                        if (new)
                        {
-                               hydra->kernel_interface->mapping(hydra->kernel_interface,
-                                                                                                IPPROTO_ESP, spi, dst, new);
+                               charon->kernel->mapping(charon->kernel, IPPROTO_ESP, spi, dst,
+                                                                               new);
                                new->destroy(new);
                        }
                        dst->destroy(dst);
@@ -2202,22 +2201,21 @@ static status_t add_policy_internal(private_kernel_netlink_ipsec_t *this,
                        .prefixlen = policy->sel.prefixlen_s,
                );
 
-               if (hydra->kernel_interface->get_address_by_ts(hydra->kernel_interface,
-                               fwd->dst_ts, &route->src_ip, NULL) == SUCCESS)
+               if (charon->kernel->get_address_by_ts(charon->kernel, fwd->dst_ts,
+                                                                                         &route->src_ip, NULL) == SUCCESS)
                {
                        /* get the nexthop to src (src as we are in POLICY_FWD) */
                        if (!ipsec->src->is_anyaddr(ipsec->src))
                        {
-                               route->gateway = hydra->kernel_interface->get_nexthop(
-                                                                                       hydra->kernel_interface, ipsec->src,
-                                                                                       -1, ipsec->dst);
+                               route->gateway = charon->kernel->get_nexthop(charon->kernel,
+                                                                                                       ipsec->src, -1, ipsec->dst);
                        }
                        else
                        {       /* for shunt policies */
                                iface = xfrm2host(policy->sel.family, &policy->sel.saddr, 0);
-                               route->gateway = hydra->kernel_interface->get_nexthop(
-                                                                               hydra->kernel_interface, iface,
-                                                                               policy->sel.prefixlen_s, route->src_ip);
+                               route->gateway = charon->kernel->get_nexthop(charon->kernel,
+                                                                                               iface, policy->sel.prefixlen_s,
+                                                                                               route->src_ip);
                                iface->destroy(iface);
                        }
                        route->dst_net = chunk_alloc(policy->sel.family == AF_INET ? 4 : 16);
@@ -2232,8 +2230,8 @@ static status_t add_policy_internal(private_kernel_netlink_ipsec_t *this,
                                iface = route->src_ip;
                        }
                        /* install route via outgoing interface */
-                       if (!hydra->kernel_interface->get_interface(hydra->kernel_interface,
-                                                                                                               iface, &route->if_name))
+                       if (!charon->kernel->get_interface(charon->kernel, iface,
+                                                                                          &route->if_name))
                        {
                                this->mutex->unlock(this->mutex);
                                route_entry_destroy(route);
@@ -2250,9 +2248,9 @@ static status_t add_policy_internal(private_kernel_netlink_ipsec_t *this,
                                        return SUCCESS;
                                }
                                /* uninstall previously installed route */
-                               if (hydra->kernel_interface->del_route(hydra->kernel_interface,
-                                               old->dst_net, old->prefixlen, old->gateway,
-                                               old->src_ip, old->if_name) != SUCCESS)
+                               if (charon->kernel->del_route(charon->kernel, old->dst_net,
+                                                                               old->prefixlen, old->gateway,
+                                                                               old->src_ip, old->if_name) != SUCCESS)
                                {
                                        DBG1(DBG_KNL, "error uninstalling route installed with "
                                                                  "policy %R === %R %N", fwd->src_ts,
@@ -2265,10 +2263,9 @@ static status_t add_policy_internal(private_kernel_netlink_ipsec_t *this,
 
                        DBG2(DBG_KNL, "installing route: %R via %H src %H dev %s",
                                 fwd->src_ts, route->gateway, route->src_ip, route->if_name);
-                       switch (hydra->kernel_interface->add_route(
-                                                               hydra->kernel_interface, route->dst_net,
-                                                               route->prefixlen, route->gateway,
-                                                               route->src_ip, route->if_name))
+                       switch (charon->kernel->add_route(charon->kernel, route->dst_net,
+                                                                                         route->prefixlen, route->gateway,
+                                                                                         route->src_ip, route->if_name))
                        {
                                default:
                                        DBG1(DBG_KNL, "unable to install source route for %H",
@@ -2579,9 +2576,9 @@ METHOD(kernel_ipsec_t, del_policy, status_t,
        if (current->route)
        {
                route_entry_t *route = current->route;
-               if (hydra->kernel_interface->del_route(hydra->kernel_interface,
-                               route->dst_net, route->prefixlen, route->gateway,
-                               route->src_ip, route->if_name) != SUCCESS)
+               if (charon->kernel->del_route(charon->kernel, route->dst_net,
+                                                                         route->prefixlen, route->gateway,
+                                                                         route->src_ip, route->if_name) != SUCCESS)
                {
                        DBG1(DBG_KNL, "error uninstalling route installed with "
                                                  "policy %R === %R %N", src_ts, dst_ts,
index 4e5e02d07e1154a198c6102e875b747bd3680d9a..abe29e2c53e9a7944ae3cc4fb1a5cd18e5c50ef4 100644 (file)
@@ -51,7 +51,7 @@
 #include "kernel_netlink_net.h"
 #include "kernel_netlink_shared.h"
 
-#include <hydra.h>
+#include <daemon.h>
 #include <utils/debug.h>
 #include <threading/mutex.h>
 #include <threading/rwlock.h>
@@ -893,7 +893,7 @@ static job_requeue_t roam_event(private_kernel_netlink_net_t *this)
        address = this->roam_address;
        this->roam_address = FALSE;
        this->roam_lock->unlock(this->roam_lock);
-       hydra->kernel_interface->roam(hydra->kernel_interface, address);
+       charon->kernel->roam(charon->kernel, address);
        return JOB_REQUEUE_NONE;
 }
 
@@ -1004,8 +1004,8 @@ static void process_link(private_kernel_netlink_net_t *this,
                                INIT(entry,
                                        .ifindex = msg->ifi_index,
                                        .addrs = linked_list_create(),
-                                       .usable = hydra->kernel_interface->is_interface_usable(
-                                                                                               hydra->kernel_interface, name),
+                                       .usable = charon->kernel->is_interface_usable(
+                                                                                                               charon->kernel, name),
                                );
                                this->ifaces->insert_last(this->ifaces, entry);
                        }
index 8d5a0d5e81b04a3d9b9bdd0255806aa4f4b5473e..8bafc3c55ed418002850c705b4e9b712f4d1f48b 100644 (file)
@@ -19,8 +19,6 @@
 #include "kernel_netlink_ipsec.h"
 #include "kernel_netlink_net.h"
 
-#include <hydra.h>
-
 typedef struct private_kernel_netlink_plugin_t private_kernel_netlink_plugin_t;
 
 /**
index 52985b4387bef797a7406be6918d306d93d4ec17..a1799ea70592aacf0c49585b2d3dbee929a37f34 100644 (file)
@@ -15,8 +15,6 @@
 
 #include <test_runner.h>
 
-#include <hydra.h>
-
 /* declare test suite constructors */
 #define TEST_SUITE(x) test_suite_t* x();
 #include "tests.h"
index f645528d9de4278e9314f2e861eea27cc337daba..8fdca93a526b1db1c66651371449256a3429a258 100644 (file)
@@ -1,7 +1,7 @@
 AM_CPPFLAGS = \
        -I${linux_headers} \
        -I$(top_srcdir)/src/libstrongswan \
-       -I$(top_srcdir)/src/libhydra
+       -I$(top_srcdir)/src/libcharon
 
 AM_CFLAGS = \
        $(PLUGIN_CFLAGS)
index a2fccd1d3f5879a8d19b00f9222371ee17accde6..d505f1c3357d7ba2f13de0f06d120fb75e3fdd5b 100644 (file)
@@ -78,7 +78,7 @@
 
 #include "kernel_pfkey_ipsec.h"
 
-#include <hydra.h>
+#include <daemon.h>
 #include <utils/debug.h>
 #include <networking/host.h>
 #include <collections/linked_list.h>
@@ -922,8 +922,7 @@ static int lookup_algorithm(transform_type_t type, int ikev2)
                }
                list++;
        }
-       hydra->kernel_interface->lookup_algorithm(hydra->kernel_interface, ikev2,
-                                                                                         type, &alg, NULL);
+       charon->kernel->lookup_algorithm(charon->kernel, ikev2, type, &alg, NULL);
        return alg;
 }
 
@@ -1283,8 +1282,7 @@ static void process_acquire(private_kernel_pfkey_ipsec_t *this,
        src_ts = sadb_address2ts(response.src);
        dst_ts = sadb_address2ts(response.dst);
 
-       hydra->kernel_interface->acquire(hydra->kernel_interface, reqid, src_ts,
-                                                                        dst_ts);
+       charon->kernel->acquire(charon->kernel, reqid, src_ts, dst_ts);
 }
 
 /**
@@ -1316,8 +1314,7 @@ static void process_expire(private_kernel_pfkey_ipsec_t *this,
                dst = host_create_from_sockaddr((sockaddr_t*)(response.dst + 1));
                if (dst)
                {
-                       hydra->kernel_interface->expire(hydra->kernel_interface, protocol,
-                                                                                       spi, dst, hard);
+                       charon->kernel->expire(charon->kernel, protocol, spi, dst, hard);
                        dst->destroy(dst);
                }
        }
@@ -1366,8 +1363,8 @@ static void process_migrate(private_kernel_pfkey_ipsec_t *this,
 
        if (src_ts && dst_ts && local && remote)
        {
-               hydra->kernel_interface->migrate(hydra->kernel_interface, reqid,
-                                                                                src_ts, dst_ts, dir, local, remote);
+               charon->kernel->migrate(charon->kernel, reqid, src_ts, dst_ts, dir,
+                                                               local, remote);
        }
        else
        {
@@ -1437,8 +1434,7 @@ static void process_mapping(private_kernel_pfkey_ipsec_t *this,
                new = host_create_from_sockaddr(sa);
                if (new)
                {
-                       hydra->kernel_interface->mapping(hydra->kernel_interface,
-                                                                                        IPPROTO_ESP, spi, dst, new);
+                       charon->kernel->mapping(charon->kernel, IPPROTO_ESP, spi, dst, new);
                        new->destroy(new);
                }
                dst->destroy(dst);
@@ -2142,15 +2138,13 @@ static void add_exclude_route(private_kernel_pfkey_ipsec_t *this,
        if (!route->exclude)
        {
                DBG2(DBG_KNL, "installing new exclude route for %H src %H", dst, src);
-               gtw = hydra->kernel_interface->get_nexthop(hydra->kernel_interface,
-                                                                                                  dst, -1, NULL);
+               gtw = charon->kernel->get_nexthop(charon->kernel, dst, -1, NULL);
                if (gtw)
                {
                        char *if_name = NULL;
 
-                       if (hydra->kernel_interface->get_interface(
-                                                                       hydra->kernel_interface, src, &if_name) &&
-                               hydra->kernel_interface->add_route(hydra->kernel_interface,
+                       if (charon->kernel->get_interface(charon->kernel, src, &if_name) &&
+                               charon->kernel->add_route(charon->kernel,
                                                                        dst->get_address(dst),
                                                                        dst->get_family(dst) == AF_INET ? 32 : 128,
                                                                        gtw, src, if_name) == SUCCESS)
@@ -2213,10 +2207,10 @@ static void remove_exclude_route(private_kernel_pfkey_ipsec_t *this,
                        dst = route->exclude->dst;
                        DBG2(DBG_KNL, "uninstalling exclude route for %H src %H",
                                 dst, route->exclude->src);
-                       if (hydra->kernel_interface->get_interface(
-                                                                       hydra->kernel_interface,
+                       if (charon->kernel->get_interface(
+                                                                       charon->kernel,
                                                                        route->exclude->src, &if_name) &&
-                               hydra->kernel_interface->del_route(hydra->kernel_interface,
+                               charon->kernel->del_route(charon->kernel,
                                                                        dst->get_address(dst),
                                                                        dst->get_family(dst) == AF_INET ? 32 : 128,
                                                                        route->exclude->gtw, route->exclude->src,
@@ -2241,8 +2235,8 @@ static bool install_route(private_kernel_pfkey_ipsec_t *this,
        host_t *host, *src, *dst;
        bool is_virtual;
 
-       if (hydra->kernel_interface->get_address_by_ts(hydra->kernel_interface,
-                                                                       in->dst_ts, &host, &is_virtual) != SUCCESS)
+       if (charon->kernel->get_address_by_ts(charon->kernel, in->dst_ts, &host,
+                                                                                 &is_virtual) != SUCCESS)
        {
                return FALSE;
        }
@@ -2259,8 +2253,8 @@ static bool install_route(private_kernel_pfkey_ipsec_t *this,
 
        if (!dst->is_anyaddr(dst))
        {
-               route->gateway = hydra->kernel_interface->get_nexthop(
-                                                                       hydra->kernel_interface, dst, -1, src);
+               route->gateway = charon->kernel->get_nexthop(charon->kernel, dst, -1,
+                                                                                                        src);
 
                /* if the IP is virtual, we install the route over the interface it has
                 * been installed on. Otherwise we use the interface we use for IKE, as
@@ -2272,17 +2266,16 @@ static bool install_route(private_kernel_pfkey_ipsec_t *this,
        }
        else
        {       /* for shunt policies */
-               route->gateway = hydra->kernel_interface->get_nexthop(
-                                                                       hydra->kernel_interface, policy->src.net,
-                                                                       policy->src.mask, route->src_ip);
+               route->gateway = charon->kernel->get_nexthop(charon->kernel,
+                                                                                       policy->src.net, policy->src.mask,
+                                                                                       route->src_ip);
 
                /* we don't have a source address, use the address we found */
                src = route->src_ip;
        }
 
        /* get interface for route, using source address */
-       if (!hydra->kernel_interface->get_interface(hydra->kernel_interface,
-                                                                                               src, &route->if_name))
+       if (!charon->kernel->get_interface(charon->kernel, src, &route->if_name))
        {
                route_entry_destroy(route);
                return FALSE;
@@ -2298,9 +2291,9 @@ static bool install_route(private_kernel_pfkey_ipsec_t *this,
                        return TRUE;
                }
                /* uninstall previously installed route */
-               if (hydra->kernel_interface->del_route(hydra->kernel_interface,
-                                                                       old->dst_net, old->prefixlen, old->gateway,
-                                                                       old->src_ip, old->if_name) != SUCCESS)
+               if (charon->kernel->del_route(charon->kernel, old->dst_net,
+                                                                         old->prefixlen, old->gateway,
+                                                                         old->src_ip, old->if_name) != SUCCESS)
                {
                        DBG1(DBG_KNL, "error uninstalling route installed with policy "
                                 "%R === %R %N", in->src_ts, in->dst_ts,
@@ -2311,8 +2304,7 @@ static bool install_route(private_kernel_pfkey_ipsec_t *this,
        }
 
        /* if remote traffic selector covers the IKE peer, add an exclude route */
-       if (hydra->kernel_interface->get_features(
-                                       hydra->kernel_interface) & KERNEL_REQUIRE_EXCLUDE_ROUTE)
+       if (charon->kernel->get_features(charon->kernel) & KERNEL_REQUIRE_EXCLUDE_ROUTE)
        {
                if (in->src_ts->is_host(in->src_ts, dst))
                {
@@ -2331,9 +2323,9 @@ static bool install_route(private_kernel_pfkey_ipsec_t *this,
        DBG2(DBG_KNL, "installing route: %R via %H src %H dev %s",
                 in->src_ts, route->gateway, route->src_ip, route->if_name);
 
-       switch (hydra->kernel_interface->add_route(hydra->kernel_interface,
-                                                       route->dst_net, route->prefixlen, route->gateway,
-                                                       route->src_ip, route->if_name))
+       switch (charon->kernel->add_route(charon->kernel, route->dst_net,
+                                                                         route->prefixlen, route->gateway,
+                                                                         route->src_ip, route->if_name))
        {
                case ALREADY_DONE:
                        /* route exists, do not uninstall */
@@ -2813,9 +2805,9 @@ METHOD(kernel_ipsec_t, del_policy, status_t,
        if (policy->route)
        {
                route_entry_t *route = policy->route;
-               if (hydra->kernel_interface->del_route(hydra->kernel_interface,
-                               route->dst_net, route->prefixlen, route->gateway,
-                               route->src_ip, route->if_name) != SUCCESS)
+               if (charon->kernel->del_route(charon->kernel, route->dst_net,
+                                                                         route->prefixlen, route->gateway,
+                                                                         route->src_ip, route->if_name) != SUCCESS)
                {
                        DBG1(DBG_KNL, "error uninstalling route installed with "
                                                  "policy %R === %R %N", src_ts, dst_ts,
index 61d576547d57fb16c2810b9e8cec2fefdb6993df..d49fe2422545ed74d6a7dafd4d27b5ad2ff6f3a1 100644 (file)
@@ -18,8 +18,6 @@
 
 #include "kernel_pfkey_ipsec.h"
 
-#include <hydra.h>
-
 typedef struct private_kernel_pfkey_plugin_t private_kernel_pfkey_plugin_t;
 
 /**
index 5129c02f6b4bcd42d2c7e1a51b119c64a89559b3..51047e38a48c036604f27eb50c5e86b2d57e5adb 100644 (file)
@@ -1,7 +1,7 @@
 AM_CPPFLAGS = \
        -I${linux_headers} \
        -I$(top_srcdir)/src/libstrongswan \
-       -I$(top_srcdir)/src/libhydra
+       -I$(top_srcdir)/src/libcharon
 
 AM_CFLAGS = \
        $(PLUGIN_CFLAGS)
index df80c29b8f4e7d4e195e6fe1cdb753b6cb205869..4eebdfdade7daa04f818830594a24b0e70843150 100644 (file)
@@ -24,7 +24,7 @@
 
 #include "kernel_pfroute_net.h"
 
-#include <hydra.h>
+#include <daemon.h>
 #include <utils/debug.h>
 #include <networking/host.h>
 #include <networking/tun_device.h>
@@ -555,7 +555,7 @@ static job_requeue_t roam_event(private_kernel_pfroute_net_t *this)
        address = this->roam_address;
        this->roam_address = FALSE;
        this->roam_lock->unlock(this->roam_lock);
-       hydra->kernel_interface->roam(hydra->kernel_interface, address);
+       charon->kernel->roam(charon->kernel, address);
        return JOB_REQUEUE_NONE;
 }
 
@@ -862,8 +862,8 @@ static void process_link(private_kernel_pfroute_net_t *this,
                if (if_indextoname(iface->ifindex, iface->ifname))
                {
                        DBG1(DBG_KNL, "interface %s appeared", iface->ifname);
-                       iface->usable = hydra->kernel_interface->is_interface_usable(
-                                                                               hydra->kernel_interface, iface->ifname);
+                       iface->usable = charon->kernel->is_interface_usable(charon->kernel,
+                                                                                                                               iface->ifname);
                        repopulate_iface(this, iface);
                        this->ifaces->insert_last(this->ifaces, iface);
                        if (iface->usable)
@@ -1266,7 +1266,7 @@ METHOD(kernel_net_t, add_ip, status_t,
        /* lets do this while holding the lock, thus preventing another thread
         * from deleting the TUN device concurrently, hopefully listeners are quick
         * and cause no deadlocks */
-       hydra->kernel_interface->tun(hydra->kernel_interface, tun, TRUE);
+       charon->kernel->tun(charon->kernel, tun, TRUE);
        this->lock->unlock(this->lock);
 
        return SUCCESS;
@@ -1294,8 +1294,7 @@ METHOD(kernel_net_t, del_ip, status_t,
                if (addr && addr->ip_equals(addr, vip))
                {
                        this->tuns->remove_at(this->tuns, enumerator);
-                       hydra->kernel_interface->tun(hydra->kernel_interface, tun,
-                                                                                FALSE);
+                       charon->kernel->tun(charon->kernel, tun, FALSE);
                        tun->destroy(tun);
                        found = TRUE;
                        break;
@@ -1738,8 +1737,8 @@ static status_t init_address_list(private_kernel_pfroute_net_t *this)
                                                .ifindex = if_nametoindex(ifa->ifa_name),
                                                .flags = ifa->ifa_flags,
                                                .addrs = linked_list_create(),
-                                               .usable = hydra->kernel_interface->is_interface_usable(
-                                                                               hydra->kernel_interface, ifa->ifa_name),
+                                               .usable = charon->kernel->is_interface_usable(
+                                                                                               charon->kernel, ifa->ifa_name),
                                        );
                                        memcpy(iface->ifname, ifa->ifa_name, IFNAMSIZ);
                                        this->ifaces->insert_last(this->ifaces, iface);
index 09068b33e3daccb4b9b6760ebae299c54104a1e2..acd834ba34abb349d3a90a4a023dbba869c7cdab 100644 (file)
@@ -18,8 +18,6 @@
 
 #include "kernel_pfroute_net.h"
 
-#include <hydra.h>
-
 typedef struct private_kernel_pfroute_plugin_t private_kernel_pfroute_plugin_t;
 
 /**
index 95f79f1682f8c03c41384006e55e68d83e043429..e1c4298858d0b13fd5dd8ce7acb167242025f13e 100644 (file)
@@ -20,7 +20,6 @@
 #include "kernel_wfp_ipsec.h"
 
 #include <daemon.h>
-#include <hydra.h>
 #include <threading/mutex.h>
 #include <collections/array.h>
 #include <collections/hashtable.h>
@@ -1396,10 +1395,9 @@ static bool uninstall_route(private_kernel_wfp_ipsec_t *this,
        {
                if (--route->refs == 0)
                {
-                       if (hydra->kernel_interface->get_interface(hydra->kernel_interface,
-                                                                                                          src, &name))
+                       if (charon->kernel->get_interface(charon->kernel, src, &name))
                        {
-                               res = hydra->kernel_interface->del_route(hydra->kernel_interface,
+                               res = charon->kernel->del_route(charon->kernel,
                                                dst->get_address(dst), mask, gtw, src, name) == SUCCESS;
                                free(name);
                        }
@@ -1442,10 +1440,9 @@ static bool install_route(private_kernel_wfp_ipsec_t *this,
        }
        else
        {
-               if (hydra->kernel_interface->get_interface(hydra->kernel_interface,
-                                                                                                  src, &name))
+               if (charon->kernel->get_interface(charon->kernel, src, &name))
                {
-                       if (hydra->kernel_interface->add_route(hydra->kernel_interface,
+                       if (charon->kernel->add_route(charon->kernel,
                                                dst->get_address(dst), mask, gtw, src, name) == SUCCESS)
                        {
                                INIT(route,
@@ -1486,14 +1483,13 @@ static bool manage_route(private_kernel_wfp_ipsec_t *this,
        {
                return FALSE;
        }
-       if (hydra->kernel_interface->get_address_by_ts(hydra->kernel_interface,
-                                                                                               src_ts, &src, NULL) != SUCCESS)
+       if (charon->kernel->get_address_by_ts(charon->kernel, src_ts, &src,
+                                                                                 NULL) != SUCCESS)
        {
                dst->destroy(dst);
                return FALSE;
        }
-       gtw = hydra->kernel_interface->get_nexthop(hydra->kernel_interface,
-                                                                                          remote, -1, local);
+       gtw = charon->kernel->get_nexthop(charon->kernel, remote, -1, local);
        if (add)
        {
                done = install_route(this, dst, mask, src, gtw);
@@ -1650,8 +1646,7 @@ static void acquire(private_kernel_wfp_ipsec_t *this, UINT64 filter_id,
        {
                src = src ? src->clone(src) : NULL;
                dst = dst ? dst->clone(dst) : NULL;
-               hydra->kernel_interface->acquire(hydra->kernel_interface, reqid,
-                                                                                src, dst);
+               charon->kernel->acquire(charon->kernel, reqid, src, dst);
        }
 }
 
@@ -2069,8 +2064,8 @@ static job_requeue_t expire_job(expire_data_t *data)
 
        if (entry)
        {
-               hydra->kernel_interface->expire(hydra->kernel_interface, protocol,
-                                                                               data->spi, data->dst, data->hard);
+               charon->kernel->expire(charon->kernel, protocol, data->spi, data->dst,
+                                                          data->hard);
        }
 
        return JOB_REQUEUE_NONE;
index 8a500635c15c2b8d171a926d78c72717198986cc..8f6abde0c17cec65264deed614e1b0bd6b8a0463 100644 (file)
@@ -18,7 +18,6 @@
 #include <netdb.h>
 
 #include <daemon.h>
-#include <hydra.h>
 #include <attributes/mem_pool.h>
 #include <collections/hashtable.h>
 #include <threading/mutex.h>
@@ -656,8 +655,8 @@ static host_t *allocate_addr(private_load_tester_config_t *this, uint num)
                id->destroy(id);
                return NULL;
        }
-       if (hydra->kernel_interface->add_ip(hydra->kernel_interface,
-                                                                               found, this->prefix, iface) != SUCCESS)
+       if (charon->kernel->add_ip(charon->kernel, found, this->prefix,
+                                                          iface) != SUCCESS)
        {
                DBG1(DBG_CFG, "installing load-tester IP %H on %s failed", found, iface);
                found->destroy(found);
@@ -852,8 +851,8 @@ METHOD(load_tester_config_t, delete_ip, void,
                {
                        if (pool->release_address(pool, entry->host, entry->id))
                        {
-                               hydra->kernel_interface->del_ip(hydra->kernel_interface,
-                                                                                       entry->host, this->prefix, FALSE);
+                               charon->kernel->del_ip(charon->kernel, entry->host,
+                                                                          this->prefix, FALSE);
                                break;
                        }
                }
@@ -882,8 +881,8 @@ static void cleanup_leases(private_load_tester_config_t *this)
                {
                        if (online)
                        {
-                               hydra->kernel_interface->del_ip(hydra->kernel_interface,
-                                                                                               addr, this->prefix, FALSE);
+                               charon->kernel->del_ip(charon->kernel, addr, this->prefix,
+                                                                          FALSE);
                                entry = this->leases->remove(this->leases, addr);
                                if (entry)
                                {
index a0c467e2288df69fbcec5a4b7b006a183cf22a02..6cf3a909cfdff3077b413985c6eeb25efbad61f4 100644 (file)
@@ -23,7 +23,6 @@
 
 #include <unistd.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <processing/jobs/callback_job.h>
 #include <threading/condvar.h>
index 74c3960ffda1e15916cd409750fc119a2defa3a6..ec3decc4dc2ed91fcb43936d54cdb3cbf84d2baa 100644 (file)
@@ -20,7 +20,6 @@
 #include <sys/stat.h>
 #include <unistd.h>
 
-#include <hydra.h>
 #include <utils/debug.h>
 #include <threading/mutex.h>
 
index 13bf3e775ed49d487df41439b2d3fd530cd8f33a..6e432d9cff1b2d8d3e8f1d72e7d0003bb0bd451f 100644 (file)
@@ -41,7 +41,6 @@
 #include <netinet/udp.h>
 #include <net/if.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <threading/thread.h>
 
@@ -720,16 +719,15 @@ static int open_socket(private_socket_default_socket_t *this,
        }
 #endif
 
-       if (!hydra->kernel_interface->bypass_socket(hydra->kernel_interface,
-                                                                                               skt, family))
+       if (!charon->kernel->bypass_socket(charon->kernel, skt, family))
        {
                DBG1(DBG_NET, "installing IKE bypass policy failed");
        }
 
        /* enable UDP decapsulation for NAT-T sockets */
        if (port == &this->natt &&
-               !hydra->kernel_interface->enable_udp_decap(hydra->kernel_interface,
-                                                                                                  skt, family, this->natt))
+               !charon->kernel->enable_udp_decap(charon->kernel, skt, family,
+                                                                                 this->natt))
        {
                DBG1(DBG_NET, "enabling UDP decapsulation for %s on port %d failed",
                         family == AF_INET ? "IPv4" : "IPv6", this->natt);
index a032134c31096a7986f80148eb5d74d72c644b02..b89cae47bdcf8ac64ab592991d0176a5639d83e6 100644 (file)
@@ -36,7 +36,6 @@
 #include <netinet/udp.h>
 #include <net/if.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <threading/thread.h>
 #include <threading/rwlock.h>
@@ -438,15 +437,13 @@ static int open_socket(private_socket_dynamic_socket_t *this,
                return 0;
        }
 
-       if (!hydra->kernel_interface->bypass_socket(hydra->kernel_interface,
-                                                                                               fd, family))
+       if (!charon->kernel->bypass_socket(charon->kernel, fd, family))
        {
                DBG1(DBG_NET, "installing IKE bypass policy failed");
        }
 
        /* enable UDP decapsulation on each socket */
-       if (!hydra->kernel_interface->enable_udp_decap(hydra->kernel_interface,
-                                                                                                  fd, family, *port))
+       if (!charon->kernel->enable_udp_decap(charon->kernel, fd, family, *port))
        {
                DBG1(DBG_NET, "enabling UDP decapsulation for %s on port %d failed",
                         family == AF_INET ? "IPv4" : "IPv6", *port);
index fbfbedae16257e6e38cd8951b4a57e7465130407..94af08e809340093127b1c4944fcab5e3b4add5a 100644 (file)
@@ -19,7 +19,6 @@
 #include "socket_win_socket.h"
 
 #include <library.h>
-#include <hydra.h>
 #include <threading/thread.h>
 #include <daemon.h>
 
@@ -397,13 +396,11 @@ static SOCKET open_socket(private_socket_win_socket_t *this, int i)
                closesocket(s);
                return INVALID_SOCKET;
        }
-       if (!hydra->kernel_interface->bypass_socket(hydra->kernel_interface,
-                                                                                               s, AF_INET))
+       if (!charon->kernel->bypass_socket(charon->kernel, s, AF_INET))
        {
                DBG1(DBG_NET, "installing IPv4 IKE bypass policy failed");
        }
-       if (!hydra->kernel_interface->bypass_socket(hydra->kernel_interface,
-                                                                                               s, AF_INET6))
+       if (!charon->kernel->bypass_socket(charon->kernel, s, AF_INET6))
        {
                DBG1(DBG_NET, "installing IPv6 IKE bypass policy failed");
        }
index 400aa64a2d37ea0ee47fb9e5e7f8c45a45f0c7e4..134abb955f9ffd89d2bb32200cf9248ffa356619 100644 (file)
@@ -16,7 +16,6 @@
 
 #include "stroke_config.h"
 
-#include <hydra.h>
 #include <daemon.h>
 #include <threading/mutex.h>
 #include <utils/lexparser.h>
@@ -201,8 +200,7 @@ static bool is_local(char *address, bool any_allowed)
                        host = host_create_from_dns(token, 0, 0);
                        if (host)
                        {
-                               if (hydra->kernel_interface->get_interface(
-                                                                               hydra->kernel_interface, host, NULL))
+                               if (charon->kernel->get_interface(charon->kernel, host, NULL))
                                {
                                        found = TRUE;
                                }
index 5a1a5074d0ae06f0aeac139144b4cb2c6c3302d8..36da5ff21f732c58e9e624e45b3f24035c60ea03 100644 (file)
@@ -16,7 +16,6 @@
 
 #include "stroke_control.h"
 
-#include <hydra.h>
 #include <daemon.h>
 
 #include <processing/jobs/delete_ike_sa_job.h>
index 14233c975682f0bc8dff2abf81f3862637f071cb..9d4d5424649659d46ec03d0256ec7840dac6ca0b 100644 (file)
@@ -26,7 +26,6 @@
 #include <malloc.h>
 #endif /* HAVE_MALLINFO */
 
-#include <hydra.h>
 #include <daemon.h>
 #include <collections/linked_list.h>
 #include <plugins/plugin.h>
@@ -533,8 +532,8 @@ METHOD(stroke_list_t, status, void,
                }
                enumerator->destroy(enumerator);
 
-               enumerator = hydra->kernel_interface->create_address_enumerator(
-                                                               hydra->kernel_interface, ADDR_TYPE_REGULAR);
+               enumerator = charon->kernel->create_address_enumerator(charon->kernel,
+                                                                                                                       ADDR_TYPE_REGULAR);
                fprintf(out, "Listening IP addresses:\n");
                while (enumerator->enumerate(enumerator, (void**)&host))
                {
index d2ba2e345b8d5de73b37c236822d1e32021b29b7..2bad4fab0bdecfbf5b1670f24a750e72cb38437c 100644 (file)
@@ -18,7 +18,6 @@
 #include "tnc_ifmap_renew_session_job.h"
 
 #include <daemon.h>
-#include <hydra.h>
 #include <utils/debug.h>
 
 #define IFMAP_RENEW_SESSION_INTERVAL   150
@@ -51,8 +50,8 @@ static bool publish_device_ip_addresses(private_tnc_ifmap_listener_t *this)
        host_t *host;
        bool success = TRUE;
 
-       enumerator = hydra->kernel_interface->create_address_enumerator(
-                                                                       hydra->kernel_interface, ADDR_TYPE_REGULAR);
+       enumerator = charon->kernel->create_address_enumerator(charon->kernel,
+                                                                                                                  ADDR_TYPE_REGULAR);
        while (enumerator->enumerate(enumerator, &host))
        {
                if (!this->ifmap->publish_device_ip(this->ifmap, host))
index 96282bee07eadf2624e25d07ef39e5a43bae06c9..dafdf94fcd6a3ab07538d80c57a5d774ace0c129 100644 (file)
@@ -21,7 +21,6 @@
 #include "updown_listener.h"
 
 #include <utils/process.h>
-#include <hydra.h>
 #include <daemon.h>
 #include <config/child_cfg.h>
 
@@ -265,8 +264,7 @@ static void invoke_once(private_updown_listener_t *this, ike_sa_t *ike_sa,
                         config->get_name(config));
        if (up)
        {
-               if (hydra->kernel_interface->get_interface(hydra->kernel_interface,
-                                                                                                  me, &iface))
+               if (charon->kernel->get_interface(charon->kernel, me, &iface))
                {
                        cache_iface(this, child_sa->get_reqid(child_sa), iface);
                }
index 434aa5e1853394999891ba7e8f935f9043346ae7..d1f8097bf139c6f53ac5e507e929da1bc2f119dd 100644 (file)
@@ -16,7 +16,6 @@
 #include <test_runner.h>
 
 #include <daemon.h>
-#include <hydra.h>
 
 /* declare test suite constructors */
 #define TEST_SUITE(x) test_suite_t* x();
index b4f135a57fbdd85fbb0637dcf6ce926b2e222852..c396890127325d2625aa3cd84a6bd7ab1513eba8 100644 (file)
@@ -19,7 +19,6 @@
 #include "adopt_children_job.h"
 
 #include <daemon.h>
-#include <hydra.h>
 #include <collections/array.h>
 #include <processing/jobs/delete_ike_sa_job.h>
 
index b0f163c838ffc81a4cfaf6cb8ee54899ef26d8b7..56b7cb5a4142666f58da76b0126655a0fc916aaf 100644 (file)
@@ -23,7 +23,6 @@
 #include <string.h>
 #include <time.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <collections/array.h>
 
@@ -469,10 +468,10 @@ static status_t update_usebytes(private_child_sa_t *this, bool inbound)
        {
                if (this->my_spi)
                {
-                       status = hydra->kernel_interface->query_sa(hydra->kernel_interface,
-                                                       this->other_addr, this->my_addr, this->my_spi,
-                                                       proto_ike2ip(this->protocol), this->mark_in,
-                                                       &bytes, &packets, &time);
+                       status = charon->kernel->query_sa(charon->kernel, this->other_addr,
+                                                                       this->my_addr, this->my_spi,
+                                                                       proto_ike2ip(this->protocol), this->mark_in,
+                                                                       &bytes, &packets, &time);
                        if (status == SUCCESS)
                        {
                                if (bytes > this->my_usebytes)
@@ -493,10 +492,10 @@ static status_t update_usebytes(private_child_sa_t *this, bool inbound)
        {
                if (this->other_spi)
                {
-                       status = hydra->kernel_interface->query_sa(hydra->kernel_interface,
-                                                       this->my_addr, this->other_addr, this->other_spi,
-                                                       proto_ike2ip(this->protocol), this->mark_out,
-                                                       &bytes, &packets, &time);
+                       status = charon->kernel->query_sa(charon->kernel, this->my_addr,
+                                                               this->other_addr, this->other_spi,
+                                                               proto_ike2ip(this->protocol), this->mark_out,
+                                                               &bytes, &packets, &time);
                        if (status == SUCCESS)
                        {
                                if (bytes > this->other_usebytes)
@@ -532,15 +531,15 @@ static bool update_usetime(private_child_sa_t *this, bool inbound)
 
                if (inbound)
                {
-                       if (hydra->kernel_interface->query_policy(hydra->kernel_interface,
-                                               other_ts, my_ts, POLICY_IN, this->mark_in, &in) == SUCCESS)
+                       if (charon->kernel->query_policy(charon->kernel, other_ts,
+                                                       my_ts, POLICY_IN, this->mark_in, &in) == SUCCESS)
                        {
                                last_use = max(last_use, in);
                        }
                        if (this->mode != MODE_TRANSPORT)
                        {
-                               if (hydra->kernel_interface->query_policy(hydra->kernel_interface,
-                                               other_ts, my_ts, POLICY_FWD, this->mark_in, &fwd) == SUCCESS)
+                               if (charon->kernel->query_policy(charon->kernel, other_ts,
+                                                       my_ts, POLICY_FWD, this->mark_in, &fwd) == SUCCESS)
                                {
                                        last_use = max(last_use, fwd);
                                }
@@ -548,8 +547,8 @@ static bool update_usetime(private_child_sa_t *this, bool inbound)
                }
                else
                {
-                       if (hydra->kernel_interface->query_policy(hydra->kernel_interface,
-                                               my_ts, other_ts, POLICY_OUT, this->mark_out, &out) == SUCCESS)
+                       if (charon->kernel->query_policy(charon->kernel, my_ts,
+                                                       other_ts, POLICY_OUT, this->mark_out, &out) == SUCCESS)
                        {
                                last_use = max(last_use, out);
                        }
@@ -629,10 +628,8 @@ METHOD(child_sa_t, get_installtime, time_t,
 METHOD(child_sa_t, alloc_spi, u_int32_t,
           private_child_sa_t *this, protocol_id_t protocol)
 {
-       if (hydra->kernel_interface->get_spi(hydra->kernel_interface,
-                                                                                this->other_addr, this->my_addr,
-                                                                                proto_ike2ip(protocol),
-                                                                                &this->my_spi) == SUCCESS)
+       if (charon->kernel->get_spi(charon->kernel, this->other_addr, this->my_addr,
+                                                       proto_ike2ip(protocol), &this->my_spi) == SUCCESS)
        {
                /* if we allocate a SPI, but then are unable to establish the SA, we
                 * need to know the protocol family to delete the partial SA */
@@ -645,9 +642,8 @@ METHOD(child_sa_t, alloc_spi, u_int32_t,
 METHOD(child_sa_t, alloc_cpi, u_int16_t,
           private_child_sa_t *this)
 {
-       if (hydra->kernel_interface->get_cpi(hydra->kernel_interface,
-                                                                                this->other_addr, this->my_addr,
-                                                                                &this->my_cpi) == SUCCESS)
+       if (charon->kernel->get_cpi(charon->kernel, this->other_addr, this->my_addr,
+                                                               &this->my_cpi) == SUCCESS)
        {
                return this->my_cpi;
        }
@@ -711,9 +707,8 @@ METHOD(child_sa_t, install, status_t,
 
        if (!this->reqid_allocated && !this->static_reqid)
        {
-               status = hydra->kernel_interface->alloc_reqid(hydra->kernel_interface,
-                                                       my_ts, other_ts, this->mark_in, this->mark_out,
-                                                       &this->reqid);
+               status = charon->kernel->alloc_reqid(charon->kernel, my_ts, other_ts,
+                                                               this->mark_in, this->mark_out, &this->reqid);
                if (status != SUCCESS)
                {
                        return status;
@@ -757,7 +752,7 @@ METHOD(child_sa_t, install, status_t,
                dst_ts = other_ts;
        }
 
-       status = hydra->kernel_interface->add_sa(hydra->kernel_interface,
+       status = charon->kernel->add_sa(charon->kernel,
                                src, dst, spi, proto_ike2ip(this->protocol), this->reqid,
                                inbound ? this->mark_in : this->mark_out, tfc,
                                lifetime, enc_alg, encr, int_alg, integ, this->mode,
@@ -776,7 +771,7 @@ static bool require_policy_update()
 {
        kernel_feature_t f;
 
-       f = hydra->kernel_interface->get_features(hydra->kernel_interface);
+       f = charon->kernel->get_features(charon->kernel);
        return !(f & KERNEL_NO_POLICY_UPDATES);
 }
 
@@ -833,18 +828,18 @@ static status_t install_policies_internal(private_child_sa_t *this,
        ipsec_sa_cfg_t *other_sa, policy_type_t type, policy_priority_t priority)
 {
        status_t status = SUCCESS;
-       status |= hydra->kernel_interface->add_policy(hydra->kernel_interface,
+       status |= charon->kernel->add_policy(charon->kernel,
                                                        my_addr, other_addr, my_ts, other_ts,
                                                        POLICY_OUT, type, other_sa,
                                                        this->mark_out, priority);
 
-       status |= hydra->kernel_interface->add_policy(hydra->kernel_interface,
+       status |= charon->kernel->add_policy(charon->kernel,
                                                        other_addr, my_addr, other_ts, my_ts,
                                                        POLICY_IN, type, my_sa,
                                                        this->mark_in, priority);
        if (this->mode != MODE_TRANSPORT)
        {
-               status |= hydra->kernel_interface->add_policy(hydra->kernel_interface,
+               status |= charon->kernel->add_policy(charon->kernel,
                                                        other_addr, my_addr, other_ts, my_ts,
                                                        POLICY_FWD, type, my_sa,
                                                        this->mark_in, priority);
@@ -861,15 +856,15 @@ static void del_policies_internal(private_child_sa_t *this,
        ipsec_sa_cfg_t *other_sa, policy_type_t type, policy_priority_t priority)
 {
 
-       hydra->kernel_interface->del_policy(hydra->kernel_interface,
+       charon->kernel->del_policy(charon->kernel,
                                                my_addr, other_addr, my_ts, other_ts, POLICY_OUT, type,
                                                other_sa, this->mark_out, priority);
-       hydra->kernel_interface->del_policy(hydra->kernel_interface,
+       charon->kernel->del_policy(charon->kernel,
                                                other_addr, my_addr, other_ts, my_ts, POLICY_IN,
                                                type, my_sa, this->mark_in, priority);
        if (this->mode != MODE_TRANSPORT)
        {
-               hydra->kernel_interface->del_policy(hydra->kernel_interface,
+               charon->kernel->del_policy(charon->kernel,
                                                other_addr, my_addr, other_ts, my_ts, POLICY_FWD,
                                                type, my_sa, this->mark_in, priority);
        }
@@ -886,8 +881,8 @@ METHOD(child_sa_t, add_policies, status_t,
        if (!this->reqid_allocated && !this->static_reqid)
        {
                /* trap policy, get or confirm reqid */
-               status = hydra->kernel_interface->alloc_reqid(
-                                                       hydra->kernel_interface, my_ts_list, other_ts_list,
+               status = charon->kernel->alloc_reqid(
+                                                       charon->kernel, my_ts_list, other_ts_list,
                                                        this->mark_in, this->mark_out, &this->reqid);
                if (status != SUCCESS)
                {
@@ -967,11 +962,10 @@ static void reinstall_vip(host_t *vip, host_t *me)
 {
        char *iface;
 
-       if (hydra->kernel_interface->get_interface(hydra->kernel_interface,
-                                                                                          me, &iface))
+       if (charon->kernel->get_interface(charon->kernel, me, &iface))
        {
-               hydra->kernel_interface->del_ip(hydra->kernel_interface, vip, -1, TRUE);
-               hydra->kernel_interface->add_ip(hydra->kernel_interface, vip, -1, iface);
+               charon->kernel->del_ip(charon->kernel, vip, -1, TRUE);
+               charon->kernel->add_ip(charon->kernel, vip, -1, iface);
                free(iface);
        }
 }
@@ -1000,7 +994,7 @@ METHOD(child_sa_t, update, status_t,
                /* update our (initiator) SA */
                if (this->my_spi)
                {
-                       if (hydra->kernel_interface->update_sa(hydra->kernel_interface,
+                       if (charon->kernel->update_sa(charon->kernel,
                                                        this->my_spi, proto_ike2ip(this->protocol),
                                                        this->ipcomp != IPCOMP_NONE ? this->my_cpi : 0,
                                                        this->other_addr, this->my_addr, other, me,
@@ -1014,7 +1008,7 @@ METHOD(child_sa_t, update, status_t,
                /* update his (responder) SA */
                if (this->other_spi)
                {
-                       if (hydra->kernel_interface->update_sa(hydra->kernel_interface,
+                       if (charon->kernel->update_sa(charon->kernel,
                                                        this->other_spi, proto_ike2ip(this->protocol),
                                                        this->ipcomp != IPCOMP_NONE ? this->other_cpi : 0,
                                                        this->my_addr, this->other_addr, me, other,
@@ -1143,14 +1137,14 @@ METHOD(child_sa_t, destroy, void,
        /* delete SAs in the kernel, if they are set up */
        if (this->my_spi)
        {
-               hydra->kernel_interface->del_sa(hydra->kernel_interface,
+               charon->kernel->del_sa(charon->kernel,
                                        this->other_addr, this->my_addr, this->my_spi,
                                        proto_ike2ip(this->protocol), this->my_cpi,
                                        this->mark_in);
        }
        if (this->other_spi)
        {
-               hydra->kernel_interface->del_sa(hydra->kernel_interface,
+               charon->kernel->del_sa(charon->kernel,
                                        this->my_addr, this->other_addr, this->other_spi,
                                        proto_ike2ip(this->protocol), this->other_cpi,
                                        this->mark_out);
@@ -1158,7 +1152,7 @@ METHOD(child_sa_t, destroy, void,
 
        if (this->reqid_allocated)
        {
-               if (hydra->kernel_interface->release_reqid(hydra->kernel_interface,
+               if (charon->kernel->release_reqid(charon->kernel,
                                                this->reqid, this->mark_in, this->mark_out) != SUCCESS)
                {
                        DBG1(DBG_CHD, "releasing reqid %u failed", this->reqid);
index afd6fdf2aa9c06bf74de47640337e032967e60a1..48a4b274a14f27ce63b9b81652476655df54028f 100644 (file)
@@ -46,7 +46,6 @@
 #include "ike_sa.h"
 
 #include <library.h>
-#include <hydra.h>
 #include <daemon.h>
 #include <collections/array.h>
 #include <utils/lexparser.h>
@@ -803,12 +802,12 @@ METHOD(ike_sa_t, add_virtual_ip, void,
        {
                char *iface;
 
-               if (hydra->kernel_interface->get_interface(hydra->kernel_interface,
-                                                                                                  this->my_host, &iface))
+               if (charon->kernel->get_interface(charon->kernel, this->my_host,
+                                                                                 &iface))
                {
                        DBG1(DBG_IKE, "installing new virtual IP %H", ip);
-                       if (hydra->kernel_interface->add_ip(hydra->kernel_interface,
-                                                                                               ip, -1, iface) == SUCCESS)
+                       if (charon->kernel->add_ip(charon->kernel, ip, -1,
+                                                                          iface) == SUCCESS)
                        {
                                array_insert_create(&this->my_vips, ARRAY_TAIL, ip->clone(ip));
                        }
@@ -845,8 +844,7 @@ METHOD(ike_sa_t, clear_virtual_ips, void,
        {
                if (local)
                {
-                       hydra->kernel_interface->del_ip(hydra->kernel_interface,
-                                                                                       vip, -1, TRUE);
+                       charon->kernel->del_ip(charon->kernel, vip, -1, TRUE);
                }
                vip->destroy(vip);
        }
@@ -1282,8 +1280,8 @@ static void resolve_hosts(private_ike_sa_t *this)
                        !this->other_host->is_anyaddr(this->other_host))
                {
                        host->destroy(host);
-                       host = hydra->kernel_interface->get_source_addr(
-                                                       hydra->kernel_interface, this->other_host, NULL);
+                       host = charon->kernel->get_source_addr(charon->kernel,
+                                                                                                  this->other_host, NULL);
                        if (host)
                        {
                                host->set_port(host, this->ike_cfg->get_my_port(this->ike_cfg));
@@ -2084,8 +2082,8 @@ static bool is_current_path_valid(private_ike_sa_t *this)
 {
        bool valid = FALSE;
        host_t *src;
-       src = hydra->kernel_interface->get_source_addr(hydra->kernel_interface,
-                                                                                       this->other_host, this->my_host);
+       src = charon->kernel->get_source_addr(charon->kernel, this->other_host,
+                                                                                 this->my_host);
        if (src)
        {
                if (src->ip_equals(src, this->my_host))
@@ -2129,8 +2127,7 @@ static bool is_any_path_valid(private_ike_sa_t *this)
                        continue;
                }
                DBG1(DBG_IKE, "looking for a route to %H ...", addr);
-               src = hydra->kernel_interface->get_source_addr(
-                                                                               hydra->kernel_interface, addr, NULL);
+               src = charon->kernel->get_source_addr(charon->kernel, addr, NULL);
                if (src)
                {
                        break;
@@ -2418,7 +2415,7 @@ METHOD(ike_sa_t, destroy, void,
        }
        while (array_remove(this->my_vips, ARRAY_TAIL, &vip))
        {
-               hydra->kernel_interface->del_ip(hydra->kernel_interface, vip, -1, TRUE);
+               charon->kernel->del_ip(charon->kernel, vip, -1, TRUE);
                vip->destroy(vip);
        }
        if (array_count(this->other_vips))
index b8af6f67bf5377d02c1bec0046666eff09e1c675..cb1a313718155277e35a3d776589620699a8056e 100644 (file)
@@ -41,7 +41,6 @@
 
 #include <string.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <sa/ikev1/keymat_v1.h>
 #include <config/peer_cfg.h>
@@ -104,7 +103,7 @@ static bool force_encap(ike_cfg_t *ike_cfg)
 {
        if (!ike_cfg->force_encap(ike_cfg))
        {
-               return hydra->kernel_interface->get_features(hydra->kernel_interface) &
+               return charon->kernel->get_features(charon->kernel) &
                                        KERNEL_REQUIRE_UDP_ENCAPSULATION;
        }
        return TRUE;
index c0c91574c784513ca38e45eac448aa4d1a9d8785..ecdfc780dcd1a722ab875bd102ce619163a64a64 100644 (file)
@@ -16,7 +16,6 @@
 #include "xauth.h"
 
 #include <daemon.h>
-#include <hydra.h>
 #include <encoding/payloads/cp_payload.h>
 #include <processing/jobs/adopt_children_job.h>
 #include <sa/ikev1/tasks/mode_config.h>
index 97f73d851d9d346cf75db86f493ff5b0fd0ec686..740d09778f935990304d3232c8f9dd222df22076 100644 (file)
@@ -18,7 +18,6 @@
 #include "child_create.h"
 
 #include <daemon.h>
-#include <hydra.h>
 #include <sa/ikev2/keymat_v2.h>
 #include <crypto/diffie_hellman.h>
 #include <credentials/certificates/x509.h>
@@ -786,7 +785,7 @@ static bool build_payloads(private_child_create_t *this, message_t *message)
                        break;
        }
 
-       features = hydra->kernel_interface->get_features(hydra->kernel_interface);
+       features = charon->kernel->get_features(charon->kernel);
        if (!(features & KERNEL_ESP_V3_TFC))
        {
                message->add_notify(message, FALSE, ESP_TFC_PADDING_NOT_SUPPORTED,
index a7e7505a19a9a133825333169b67c8e94e70e539..10d412ffdb415a74e59416541475f00848b5bc52 100644 (file)
@@ -17,7 +17,6 @@
 
 #include <string.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <config/peer_cfg.h>
 #include <encoding/payloads/id_payload.h>
@@ -135,8 +134,8 @@ static void gather_and_add_endpoints(private_ike_me_t *this, message_t *message)
        host = this->ike_sa->get_my_host(this->ike_sa);
        port = host->get_port(host);
 
-       enumerator = hydra->kernel_interface->create_address_enumerator(
-                                                                       hydra->kernel_interface, ADDR_TYPE_REGULAR);
+       enumerator = charon->kernel->create_address_enumerator(charon->kernel,
+                                                                                                                  ADDR_TYPE_REGULAR);
        while (enumerator->enumerate(enumerator, (void**)&addr))
        {
                host = addr->clone(addr);
index cbdc5e79722ab832af01d1e62bde63d9b1e49883..3f7bb175f8c3f5caeae5273ab23ec445bc12a74b 100644 (file)
@@ -18,7 +18,6 @@
 
 #include <string.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <sa/ikev2/tasks/ike_natd.h>
 #include <encoding/payloads/notify_payload.h>
@@ -196,8 +195,8 @@ static void build_address_list(private_ike_mobike_t *this, message_t *message)
        int added = 0;
 
        me = this->ike_sa->get_my_host(this->ike_sa);
-       enumerator = hydra->kernel_interface->create_address_enumerator(
-                                                                       hydra->kernel_interface, ADDR_TYPE_REGULAR);
+       enumerator = charon->kernel->create_address_enumerator(charon->kernel,
+                                                                                                                  ADDR_TYPE_REGULAR);
        while (enumerator->enumerate(enumerator, (void**)&host))
        {
                if (me->ip_equals(me, host))
@@ -333,8 +332,7 @@ METHOD(ike_mobike_t, transmit, bool,
 
        if (!this->check)
        {
-               me = hydra->kernel_interface->get_source_addr(hydra->kernel_interface,
-                                                                                                         other_old, me_old);
+               me = charon->kernel->get_source_addr(charon->kernel, other_old, me_old);
                if (me)
                {
                        if (me->ip_equals(me, me_old))
@@ -372,8 +370,7 @@ METHOD(ike_mobike_t, transmit, bool,
                {
                        continue;
                }
-               me = hydra->kernel_interface->get_source_addr(
-                                                                               hydra->kernel_interface, other, NULL);
+               me = charon->kernel->get_source_addr(charon->kernel, other, NULL);
                if (me)
                {
                        /* reuse port for an active address, 4500 otherwise */
@@ -407,7 +404,7 @@ METHOD(task_t, build_i, status_t,
 
                /* we check if the existing address is still valid */
                old = message->get_source(message);
-               new = hydra->kernel_interface->get_source_addr(hydra->kernel_interface,
+               new = charon->kernel->get_source_addr(charon->kernel,
                                                                                message->get_destination(message), old);
                if (new)
                {
index dd34c123473a41a8404f0ef1b7f5f9905fb323ac..4bf5264ddc4ac43ba39fa985e0f135f1f517d23f 100644 (file)
@@ -18,7 +18,6 @@
 
 #include <string.h>
 
-#include <hydra.h>
 #include <daemon.h>
 #include <config/peer_cfg.h>
 #include <crypto/hashers/hasher.h>
@@ -86,7 +85,7 @@ static bool force_encap(ike_cfg_t *ike_cfg)
 {
        if (!ike_cfg->force_encap(ike_cfg))
        {
-               return hydra->kernel_interface->get_features(hydra->kernel_interface) &
+               return charon->kernel->get_features(charon->kernel) &
                                        KERNEL_REQUIRE_UDP_ENCAPSULATION;
        }
        return TRUE;
@@ -327,7 +326,7 @@ METHOD(task_t, build_i, status_t,
        }
        else
        {
-               host = hydra->kernel_interface->get_source_addr(hydra->kernel_interface,
+               host = charon->kernel->get_source_addr(charon->kernel,
                                                        this->ike_sa->get_other_host(this->ike_sa), NULL);
                if (host)
                {       /* 2. */
@@ -341,8 +340,8 @@ METHOD(task_t, build_i, status_t,
                }
                else
                {       /* 3. */
-                       enumerator = hydra->kernel_interface->create_address_enumerator(
-                                                                       hydra->kernel_interface, ADDR_TYPE_REGULAR);
+                       enumerator = charon->kernel->create_address_enumerator(
+                                                                                       charon->kernel, ADDR_TYPE_REGULAR);
                        while (enumerator->enumerate(enumerator, (void**)&host))
                        {
                                /* apply port 500 to host, but work on a copy */
index 5231994c830c02d89256eb6ac7b0401ed94d631b..0e9cf6e1fe3b476699837902b8d344e538ed7a1a 100644 (file)
@@ -16,7 +16,6 @@
 
 #include "shunt_manager.h"
 
-#include <hydra.h>
 #include <daemon.h>
 #include <threading/rwlock.h>
 #include <threading/rwlock_condvar.h>
@@ -111,22 +110,22 @@ static bool install_shunt_policy(child_cfg_t *child)
                                continue;
                        }
                        /* install out policy */
-                       status |= hydra->kernel_interface->add_policy(
-                                                               hydra->kernel_interface, host_any, host_any,
+                       status |= charon->kernel->add_policy(charon->kernel,
+                                                               host_any, host_any,
                                                                my_ts, other_ts, POLICY_OUT, policy_type,
                                                                &sa, child->get_mark(child, FALSE),
                                                                policy_prio);
 
                        /* install in policy */
-                       status |= hydra->kernel_interface->add_policy(
-                                                               hydra->kernel_interface, host_any, host_any,
+                       status |= charon->kernel->add_policy(charon->kernel,
+                                                               host_any, host_any,
                                                                other_ts, my_ts, POLICY_IN, policy_type,
                                                                &sa, child->get_mark(child, TRUE),
                                                                policy_prio);
 
                        /* install forward policy */
-                       status |= hydra->kernel_interface->add_policy(
-                                                               hydra->kernel_interface, host_any, host_any,
+                       status |= charon->kernel->add_policy(charon->kernel,
+                                                               host_any, host_any,
                                                                other_ts, my_ts, POLICY_FWD, policy_type,
                                                                &sa, child->get_mark(child, TRUE),
                                                                policy_prio);
@@ -248,22 +247,22 @@ static void uninstall_shunt_policy(child_cfg_t *child)
                                continue;
                        }
                        /* uninstall out policy */
-                       status |= hydra->kernel_interface->del_policy(
-                                                       hydra->kernel_interface, host_any, host_any,
+                       status |= charon->kernel->del_policy(charon->kernel,
+                                                       host_any, host_any,
                                                        my_ts, other_ts, POLICY_OUT, policy_type,
                                                        &sa, child->get_mark(child, FALSE),
                                                        policy_prio);
 
                        /* uninstall in policy */
-                       status |= hydra->kernel_interface->del_policy(
-                                                       hydra->kernel_interface, host_any, host_any,
+                       status |= charon->kernel->del_policy(charon->kernel,
+                                                       host_any, host_any,
                                                        other_ts, my_ts, POLICY_IN, policy_type,
                                                        &sa, child->get_mark(child, TRUE),
                                                        policy_prio);
 
                        /* uninstall forward policy */
-                       status |= hydra->kernel_interface->del_policy(
-                                                       hydra->kernel_interface, host_any, host_any,
+                       status |= charon->kernel->del_policy(charon->kernel,
+                                                       host_any, host_any,
                                                        other_ts, my_ts, POLICY_FWD, policy_type,
                                                        &sa, child->get_mark(child, TRUE),
                                                        policy_prio);
index 90ad7e40e7456fb33df09b6d9dd4085a697ca720..85e2207751a5072e5fe41fb3a0dce107b5e33b77 100644 (file)
@@ -16,7 +16,6 @@
 
 #include "trap_manager.h"
 
-#include <hydra.h>
 #include <daemon.h>
 #include <threading/mutex.h>
 #include <threading/rwlock.h>
@@ -195,8 +194,7 @@ METHOD(trap_manager_t, install, u_int32_t,
                if (!me || me->is_anyaddr(me))
                {
                        DESTROY_IF(me);
-                       me = hydra->kernel_interface->get_source_addr(
-                                                                               hydra->kernel_interface, other, NULL);
+                       me = charon->kernel->get_source_addr(charon->kernel, other, NULL);
                        if (!me)
                        {
                                DBG1(DBG_CFG, "installing trap failed, local address unknown");
index 938f5ec96bfc5c19f401f6f0aa35264fc967d0f3..2e50800071c23e06233c17a36cf15d5fbd5c0c36 100644 (file)
@@ -3,11 +3,7 @@ include $(CLEAR_VARS)
 
 # copy-n-paste from Makefile.am
 libhydra_la_SOURCES := \
-hydra.c hydra.h \
-kernel/kernel_interface.c kernel/kernel_interface.h \
-kernel/kernel_ipsec.c kernel/kernel_ipsec.h \
-kernel/kernel_net.c kernel/kernel_net.h \
-kernel/kernel_listener.h
+hydra.c hydra.h
 
 LOCAL_SRC_FILES := $(filter %.c,$(libhydra_la_SOURCES))
 
index 28303fc70455e0028a9e92283355f9802846599c..047f7ca54dffa99946d003af2900e41e548806c7 100644 (file)
@@ -1,11 +1,7 @@
 ipseclib_LTLIBRARIES = libhydra.la
 
 libhydra_la_SOURCES = \
-hydra.c hydra.h \
-kernel/kernel_interface.c kernel/kernel_interface.h \
-kernel/kernel_ipsec.c kernel/kernel_ipsec.h \
-kernel/kernel_net.c kernel/kernel_net.h \
-kernel/kernel_listener.h
+hydra.c hydra.h
 
 libhydra_la_LIBADD = \
   $(top_builddir)/src/libstrongswan/libstrongswan.la
index 47ffb59c60d8ca5a48c798c2b5a5311e5f7bc31f..2f6ce452b4a85d30374ea044b46212ccabd0328f 100644 (file)
@@ -57,7 +57,6 @@ void libhydra_deinit()
                return;
        }
 
-       this->public.kernel_interface->destroy(this->public.kernel_interface);
        free(this);
        hydra = NULL;
 }
@@ -81,8 +80,6 @@ bool libhydra_init()
        );
        hydra = &this->public;
 
-       this->public.kernel_interface = kernel_interface_create();
-
        if (lib->integrity &&
                !lib->integrity->check(lib->integrity, "libhydra", libhydra_init))
        {
index b23a30584f784b2ffb6acd7745055778b9906086..df9c69ddf5c0c49c8c76e1281ac819602a59a38f 100644 (file)
@@ -31,8 +31,6 @@
 
 typedef struct hydra_t hydra_t;
 
-#include <kernel/kernel_interface.h>
-
 #include <library.h>
 
 /**
@@ -40,10 +38,6 @@ typedef struct hydra_t hydra_t;
  */
 struct hydra_t {
 
-       /**
-        * kernel interface to communicate with kernel
-        */
-       kernel_interface_t *kernel_interface;
 };
 
 /**
index 7f5d1ca5b6adc95e5f9edb3090f9623c05dc6f39..175486689d111f1b4557d7d055ba6eaac2ee828b 100644 (file)
@@ -16,6 +16,7 @@ AM_CPPFLAGS = \
        -I${linux_headers} \
        -I$(top_srcdir)/src/libstrongswan \
        -I$(top_srcdir)/src/libhydra \
+       -I$(top_srcdir)/src/libcharon \
        -I$(top_srcdir)/src/starter \
        -I$(top_srcdir)/src/stroke \
        -DIPSEC_DIR=\"${ipsecdir}\" \
@@ -33,6 +34,7 @@ AM_YFLAGS = -v -d
 starter_LDADD = \
        $(top_builddir)/src/libstrongswan/libstrongswan.la \
        $(top_builddir)/src/libhydra/libhydra.la \
+       $(top_builddir)/src/libcharon/libcharon.la \
        libstarter.la \
        $(SOCKLIB) $(PTHREADLIB)
 
index 3eb6973a1c8c1ae5c52d42cc548ab29cb0c5cd99..b150d3e80beed726c944c1779268e847654c16fd 100644 (file)
@@ -17,7 +17,6 @@
 #include <stdlib.h>
 
 #include <library.h>
-#include <hydra.h>
 #include <utils/debug.h>
 
 #include "files.h"