]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
- configuration_manager replaced by configuration_t interface
authorMartin Willi <martin@strongswan.org>
Tue, 7 Mar 2006 09:42:15 +0000 (09:42 -0000)
committerMartin Willi <martin@strongswan.org>
Tue, 7 Mar 2006 09:42:15 +0000 (09:42 -0000)
- current configuration_manager is now static_configuration (testing)
- first draft of starter_configuration, which should once interact with ipsec starter (via whack?)
- some cleanups
- socket_t uses RAW socket, which allows parallel service of pluto/charon

43 files changed:
Source/charon/config/Makefile.config
Source/charon/config/configuration.h [moved from Source/charon/config/configuration_manager.h with 66% similarity, mode: 0755]
Source/charon/config/proposal.h
Source/charon/config/sa_config.h
Source/charon/config/starter_configuration.c [new file with mode: 0755]
Source/charon/config/starter_configuration.h [new file with mode: 0644]
Source/charon/config/static_configuration.c [moved from Source/charon/config/configuration_manager.c with 84% similarity, mode: 0755]
Source/charon/config/static_configuration.h [new file with mode: 0644]
Source/charon/daemon.c
Source/charon/daemon.h
Source/charon/encoding/payloads/auth_payload.h
Source/charon/encoding/payloads/cert_payload.h
Source/charon/encoding/payloads/certreq_payload.h
Source/charon/encoding/payloads/configuration_attribute.h
Source/charon/encoding/payloads/delete_payload.h
Source/charon/encoding/payloads/eap_payload.h
Source/charon/encoding/payloads/id_payload.h
Source/charon/encoding/payloads/nonce_payload.h
Source/charon/encoding/payloads/notify_payload.h
Source/charon/encoding/payloads/traffic_selector_substructure.h
Source/charon/encoding/payloads/transform_attribute.h
Source/charon/encoding/payloads/ts_payload.h
Source/charon/encoding/payloads/vendor_id_payload.h
Source/charon/network/socket.c
Source/charon/network/socket.h
Source/charon/sa/authenticator.c
Source/charon/sa/authenticator.h
Source/charon/sa/ike_sa.c
Source/charon/sa/ike_sa.h
Source/charon/sa/states/ike_sa_init_requested.c
Source/charon/sa/states/ike_sa_init_responded.c
Source/charon/sa/states/initiator_init.c
Source/charon/sa/states/responder_init.c
Source/charon/testcases/testcases.c
Source/charon/threads/kernel_interface.c
Source/charon/threads/thread_pool.c
Source/charon/transforms/crypters/crypter.h
Source/charon/transforms/diffie_hellman.h
Source/charon/transforms/prf_plus.h
Source/charon/transforms/prfs/prf.h
Source/charon/transforms/signers/signer.h
Source/charon/utils/logger_manager.c
Source/charon/utils/logger_manager.h

index 7189d404b09bcfece7cf91a4936b53803d7882e9..f4786be100cb4453312391dd8843586fe917ac65 100644 (file)
@@ -15,9 +15,6 @@
 CONFIG_DIR= $(MAIN_DIR)config/
 
 
-OBJS+= $(BUILD_DIR)configuration_manager.o
-$(BUILD_DIR)configuration_manager.o :          $(CONFIG_DIR)configuration_manager.c $(CONFIG_DIR)configuration_manager.h
-                                                                                       $(CC) $(CFLAGS) -c -o $@ $<
                                                
 OBJS+= $(BUILD_DIR)init_config.o
 $(BUILD_DIR)init_config.o :                                    $(CONFIG_DIR)init_config.c $(CONFIG_DIR)init_config.h
@@ -34,3 +31,11 @@ $(BUILD_DIR)traffic_selector.o :                     $(CONFIG_DIR)traffic_selector.c $(CONFIG_DIR)
 OBJS+= $(BUILD_DIR)proposal.o
 $(BUILD_DIR)proposal.o :                                       $(CONFIG_DIR)proposal.c $(CONFIG_DIR)proposal.h
                                                                                        $(CC) $(CFLAGS) -c -o $@ $<
+
+OBJS+= $(BUILD_DIR)static_configuration.o
+$(BUILD_DIR)static_configuration.o :           $(CONFIG_DIR)static_configuration.c $(CONFIG_DIR)static_configuration.h
+                                                                                       $(CC) $(CFLAGS) -c -o $@ $<
+
+OBJS+= $(BUILD_DIR)starter_configuration.o
+$(BUILD_DIR)starter_configuration.o :          $(CONFIG_DIR)starter_configuration.c $(CONFIG_DIR)starter_configuration.h
+                                                                                       $(CC) $(CFLAGS) -c -o $@ $<
\ No newline at end of file
old mode 100644 (file)
new mode 100755 (executable)
similarity index 66%
rename from Source/charon/config/configuration_manager.h
rename to Source/charon/config/configuration.h
index f471899..8aa85bb
@@ -1,7 +1,7 @@
 /**
- * @file configuration_manager.h
+ * @file configuration.h
  * 
- * @brief Interface of configuration_manager_t.
+ * @brief Interface configuration_t.
  *  
  */
 
@@ -20,8 +20,8 @@
  * for more details.
  */
 
-#ifndef CONFIGURATION_MANAGER_H_
-#define CONFIGURATION_MANAGER_H_
+#ifndef CONFIGURATION_H_
+#define CONFIGURATION_H_
 
 #include <types.h>
 #include <config/init_config.h>
 #include <transforms/rsa/rsa_public_key.h>
 
 
-typedef struct configuration_manager_t configuration_manager_t;
+typedef struct configuration_t configuration_t;
 
 /**
- * @brief Manages all configuration aspects of the daemon.
+ * @brief The interface for a configuration backend.
  * 
- * @b Constructors:
- *     - configuration_manager_create()
+ * Multiple backends for the configuration are conceivable:
+ * - ipsec starter from pluto
+ * - own file backend
+ * - multiple database backends
+ * - LDAP backend?
  * 
- * @todo Build a (file) backend for the configuration manager.
+ * @b Constructors:
+ *     - configuration_create()
  * 
  * @ingroup config
  */
-struct configuration_manager_t { 
+struct configuration_t { 
 
        /**
         * @brief Returns the configuration information needed for IKE_SA_INIT exchange 
         * for a specific configuration name.
         * 
         * The returned init_config_t object MUST NOT be destroyed cause it's managed by 
-        * this configuration_manager_t object.
+        * this configuration_t object.
         * 
         * @param this                          calling object
         * @param name                          name of the configuration
@@ -59,14 +63,14 @@ struct configuration_manager_t {
         *                                                      - NOT_FOUND
         *                                                      - SUCCESS
         */
-       status_t (*get_init_config_for_name) (configuration_manager_t *this, char *name, init_config_t **init_config);
+       status_t (*get_init_config_for_name) (configuration_t *this, char *name, init_config_t **init_config);
 
        /**
         * @brief Returns the configuration information needed for IKE_SA_INIT exchange 
         * for specific host informations.
         * 
         * The returned init_config_t object MUST NOT be destroyed cause it's managed by 
-        * this configuration_manager_t object.
+        * this configuration_t object.
         * 
         * @param this                          calling object
         * @param my_host                       my host informations
@@ -77,14 +81,14 @@ struct configuration_manager_t {
         *                                                      - NOT_FOUND
         *                                                      - SUCCESS
         */     
-       status_t (*get_init_config_for_host) (configuration_manager_t *this, host_t *my_host, host_t *other_host,init_config_t **init_config);
+       status_t (*get_init_config_for_host) (configuration_t *this, host_t *my_host, host_t *other_host,init_config_t **init_config);
        
        /**
         * @brief Returns the configuration information needed after IKE_SA_INIT exchange 
         * for a specific configuration name.
         * 
         * The returned sa_config_t object MUST NOT be destroyed cause it's managed by 
-        * this configuration_manager_t object.
+        * this configuration_t object.
         * 
         * @param this                          calling object
         * @param name                          name of the configuration
@@ -94,14 +98,14 @@ struct configuration_manager_t {
         *                              - NOT_FOUND
         *                              - SUCCESS
         */
-       status_t (*get_sa_config_for_name) (configuration_manager_t *this, char *name, sa_config_t **sa_config);
+       status_t (*get_sa_config_for_name) (configuration_t *this, char *name, sa_config_t **sa_config);
        
        /**
         * @brief Returns the configuration information needed after IKE_SA_INIT exchange 
         * for specific init_config_t and ID data.
         * 
         * The returned sa_config_t object MUST NOT be destroyed cause it's managed by 
-        * this configuration_manager_t object.
+        * this configuration_t object.
         * 
         * @param this                          calling object
         * @param init_config           init_config_t object
@@ -113,12 +117,12 @@ struct configuration_manager_t {
         *                                                      - NOT_FOUND
         *                                                      - SUCCESS
         */     
-       status_t (*get_sa_config_for_init_config_and_id) (configuration_manager_t *this, init_config_t *init_config, identification_t *other_id, identification_t *my_id,sa_config_t **sa_config);
+       status_t (*get_sa_config_for_init_config_and_id) (configuration_t *this, init_config_t *init_config, identification_t *other_id, identification_t *my_id,sa_config_t **sa_config);
 
        /**
         * @brief Returns the retransmit timeout.
         * 
-        * The timeout values are managed by the configuration manager.
+        * The timeout values are managed by the configuration.
         * 
         * @param this                          calling object
         * @param retransmit_count      number of times a message was retransmitted so far
@@ -128,7 +132,7 @@ struct configuration_manager_t {
         *                                                      - FAILED, if the message should not be retransmitted
         *                                                      - SUCCESS
         */
-       status_t (*get_retransmit_timeout) (configuration_manager_t *this, u_int32_t retransmit_count, u_int32_t *timeout);
+       status_t (*get_retransmit_timeout) (configuration_t *this, u_int32_t retransmit_count, u_int32_t *timeout);
        
        /**
         * @brief Returns the timeout for an half open IKE_SA in ms.
@@ -143,13 +147,13 @@ struct configuration_manager_t {
         * @param this                          calling object
         * @return                                      timeout in milliseconds (ms)
         */     
-       u_int32_t (*get_half_open_ike_sa_timeout) (configuration_manager_t *this);
+       u_int32_t (*get_half_open_ike_sa_timeout) (configuration_t *this);
        
        /**
         * @brief Returns the preshared secret of a specific ID.
         * 
         * The returned preshared secret MUST NOT be destroyed cause it's managed by 
-        * this configuration_manager_t object.
+        * this configuration_t object.
         * 
         * @param this                                  calling object
         * @param identification                identification_t object identifiying the ID.
@@ -159,13 +163,13 @@ struct configuration_manager_t {
         *                                                              - NOT_FOUND     if no preshared secrets for specific ID could be found
         *                                                              - SUCCESS
         */     
-       status_t (*get_shared_secret) (configuration_manager_t *this, identification_t *identification, chunk_t *preshared_secret);
+       status_t (*get_shared_secret) (configuration_t *this, identification_t *identification, chunk_t *preshared_secret);
        
        /**
         * @brief Returns the RSA public key of a specific ID.
         * 
         * The returned rsa_public_key_t object MUST NOT be destroyed cause it's managed by 
-        * this configuration_manager_t object.
+        * this configuration_t object.
         * 
         * @param this                                  calling object
         * @param identification                identification_t object identifiying the ID.
@@ -175,13 +179,13 @@ struct configuration_manager_t {
         *                                                              - NOT_FOUND     if no key is configured for specific id
         *                                                              - SUCCESS
         */     
-       status_t (*get_rsa_public_key) (configuration_manager_t *this, identification_t *identification, rsa_public_key_t **public_key);
+       status_t (*get_rsa_public_key) (configuration_t *this, identification_t *identification, rsa_public_key_t **public_key);
        
        /**
         * @brief Returns the RSA private key of a specific ID.
         * 
         * The returned rsa_private_key_t object MUST NOT be destroyed cause it's managed by 
-        * this configuration_manager_t object.
+        * this configuration_t object.
         * 
         * @param this                                  calling object
         * @param identification                identification_t object identifiying the ID.
@@ -191,26 +195,14 @@ struct configuration_manager_t {
         *                                                              - NOT_FOUND     if no key is configured for specific id
         *                                                              - SUCCESS
         */     
-       status_t (*get_rsa_private_key) (configuration_manager_t *this, identification_t *identification, rsa_private_key_t **private_key);
+       status_t (*get_rsa_private_key) (configuration_t *this, identification_t *identification, rsa_private_key_t **private_key);
 
        /**
-        * @brief Destroys a configuration_manager_t object.
+        * @brief Destroys a configuration_t object.
         * 
         * @param this                                  calling object
         */
-       void (*destroy) (configuration_manager_t *this);
+       void (*destroy) (configuration_t *this);
 };
 
-/**
- * @brief Creates the mighty configuration manager.
- * 
- * @param first_retransmit_timeout     first retransmit timeout in milliseconds
- * @param max_retransmit_count         max number of tries to retransmitted a requests (0 for infinite)
- * @param half_open_ike_sa_timeout  timeout after that a half open IKE_SA gets deleted
- * @return                                                     configuration_manager_t object
- * 
- * @ingroup config
- */
-configuration_manager_t *configuration_manager_create(u_int32_t first_retransmit_timeout,u_int32_t max_retransmit_count, u_int32_t half_open_ike_sa_timeout);
-
-#endif /*CONFIGURATION_MANAGER_H_*/
+#endif /*CONFIGURATION_H_*/
index 047d653d32ed6b30d5514ba274796370cd44e1b9..e25d43512cb758570a7e75835738bea43fbe3e50 100644 (file)
@@ -58,7 +58,7 @@ extern mapping_t protocol_id_m[];
 typedef enum transform_type_t transform_type_t;
 
 /**
- * Type of a transform, as in IKEv2 draft 3.3.2.
+ * Type of a transform, as in IKEv2 RFC 3.3.2.
  * 
  * @ingroup payloads
  */
@@ -82,7 +82,7 @@ extern mapping_t transform_type_m[];
 typedef enum extended_sequence_numbers_t extended_sequence_numbers_t;
 
 /** 
- * Extended sequence numbers, as in IKEv2 draft 3.3.2.
+ * Extended sequence numbers, as in IKEv2 RFC 3.3.2.
  * 
  * @ingroup payloads
  */
index 6ecf71d32dad77a5eb6bc1db26ab6428c904c813..783e2f5683022c48dd8f6d31002c12d3420b52d9 100644 (file)
@@ -99,7 +99,6 @@ struct sa_config_t {
         */
        linked_list_t *(*get_my_traffic_selectors) (sa_config_t *this);
        
-               
        /**
         * @brief Get configured traffic selectors for others site.
         * 
diff --git a/Source/charon/config/starter_configuration.c b/Source/charon/config/starter_configuration.c
new file mode 100755 (executable)
index 0000000..938a2b7
--- /dev/null
@@ -0,0 +1,882 @@
+/**
+ * @file starter_configuration.c
+ * 
+ * @brief Implementation of starter_configuration_t.
+ * 
+ */
+
+/*
+ * Copyright (C) 2005 Jan Hutter, Martin Willi
+ * Hochschule fuer Technik Rapperswil
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * for more details.
+ */
+
+#include <stdlib.h>
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <sys/socket.h>
+#include <sys/un.h>
+#include <sys/fcntl.h>
+#include <unistd.h>
+#include <errno.h>
+#include <pthread.h>
+
+#include "starter_configuration.h"
+
+#include <types.h>
+#include <daemon.h>
+#include <utils/allocator.h>
+
+
+/**
+ * First retransmit timeout in milliseconds.
+ * 
+ * Timeout value is increasing in each retransmit round.
+ */
+#define RETRANSMIT_TIMEOUT 3000
+
+/**
+ * Timeout in milliseconds after that a half open IKE_SA gets deleted.
+ */
+#define HALF_OPEN_IKE_SA_TIMEOUT 30000
+
+/**
+ * Max retransmit count.
+ * 0 for infinite. The max time a half open IKE_SA is alive is set by 
+ * RETRANSMIT_TIMEOUT.
+ */
+#define MAX_RETRANSMIT_COUNT 0
+
+
+struct sockaddr_un socket_addr = { AF_UNIX, "/var/run/pluto.ctl"};
+
+
+typedef struct preshared_secret_entry_t preshared_secret_entry_t;
+
+/**
+ * A preshared secret entry combines an identifier and a 
+ * preshared secret.
+ */
+struct preshared_secret_entry_t {
+
+       /**
+        * Identification.
+        */
+       identification_t *identification;
+       
+       /**
+        * Preshared secret as chunk_t. The NULL termination is not included.
+        */     
+       chunk_t preshared_secret;
+};
+
+
+typedef struct rsa_private_key_entry_t rsa_private_key_entry_t;
+
+/**
+ * Entry for a rsa private key.
+ */
+struct rsa_private_key_entry_t {
+
+       /**
+        * Identification.
+        */
+       identification_t *identification;
+       
+       /**
+        * Private key.
+        */     
+       rsa_private_key_t* private_key;
+};
+
+typedef struct rsa_public_key_entry_t rsa_public_key_entry_t;
+
+/**
+ * Entry for a rsa private key.
+ */
+struct rsa_public_key_entry_t {
+
+       /**
+        * Identification.
+        */
+       identification_t *identification;
+       
+       /**
+        * Private key.
+        */     
+       rsa_public_key_t* public_key;
+};
+
+typedef struct configuration_entry_t configuration_entry_t;
+
+/**
+ * A configuration entry combines a configuration name with a init and sa 
+ * configuration represented as init_config_t and sa_config_t objects.
+ * 
+ * @b Constructors:
+ *  - configuration_entry_create()
+ */
+struct configuration_entry_t {
+       
+       /**
+        * Configuration name.
+        * 
+        */
+       char *name;
+       
+       /**
+        * Configuration for IKE_SA_INIT exchange.
+        */
+       init_config_t *init_config;
+
+       /**
+        * Configuration for all phases after IKE_SA_INIT exchange.
+        */
+       sa_config_t *sa_config;
+       
+       /**
+        * Destroys a configuration_entry_t
+        * 
+        * @param this                          calling object
+        */
+       void (*destroy) (configuration_entry_t *this);
+};
+
+/**
+ * Implementation of configuration_entry_t.destroy.
+ */
+static void configuration_entry_destroy (configuration_entry_t *this)
+{
+       allocator_free(this->name);
+       allocator_free(this);
+}
+
+/**
+ * @brief Creates a configuration_entry_t object.
+ * 
+ * @param name                         name of the configuration entry (gets copied)
+ * @param init_config  object of type init_config_t
+ * @param sa_config            object of type sa_config_t
+ */
+static configuration_entry_t * configuration_entry_create(char * name, init_config_t * init_config, sa_config_t * sa_config)
+{
+       configuration_entry_t *entry = allocator_alloc_thing(configuration_entry_t);
+
+       /* functions */
+       entry->destroy = configuration_entry_destroy;
+
+       /* private data */
+       entry->init_config = init_config;
+       entry->sa_config = sa_config;
+       entry->name = allocator_alloc(strlen(name) + 1);
+       strcpy(entry->name,name);
+       return entry;
+}
+
+typedef struct private_starter_configuration_t private_starter_configuration_t;
+
+/**
+ * Private data of an starter_configuration_t object.
+ */
+struct private_starter_configuration_t {
+
+       /**
+        * Public part of starter_configuration_t object.
+        */
+       starter_configuration_t public;
+
+       /**
+        * Holding all configurations.
+        */
+       linked_list_t *configurations;
+
+       /**
+        * Holding all managed init_configs.
+        */
+       linked_list_t *init_configs;
+
+       /**
+        * Holding all managed init_configs.
+        */
+       linked_list_t *sa_configs;
+       
+       /**
+        * Holding all managed preshared secrets.
+        */
+       linked_list_t *preshared_secrets;
+       
+       /**
+        * Holding all managed private secrets.
+        */
+       linked_list_t *rsa_private_keys;
+       
+       /**
+        * Holding all managed public secrets.
+        */
+       linked_list_t *rsa_public_keys;
+
+       /**
+        * Assigned logger_t object.
+        */
+       logger_t *logger;
+       
+       /**
+        * Max number of requests to be retransmitted.
+        * 0 for infinite.
+        */     
+       u_int32_t max_retransmit_count;
+       
+       /**
+        * First retransmit timeout in ms.
+        */
+       u_int32_t first_retransmit_timeout;
+       
+       /**
+        * Timeout in ms after that time a IKE_SA gets deleted.
+        */
+       u_int32_t half_open_ike_sa_timeout;
+       
+       int socket;
+       
+       pthread_t assigned_thread;
+
+       /**
+        * Adds a new IKE_SA configuration.
+        * 
+        * @param this                          calling object
+        * @param name                          name for the configuration
+        * @param init_config           init_config_t object
+        * @param sa_config                     sa_config_t object
+        */
+       void (*add_new_configuration) (private_starter_configuration_t *this, char *name, init_config_t *init_config, sa_config_t *sa_config);
+       
+       /**
+        * Adds a new preshared secret.
+        * 
+        * @param this                          calling object
+        * @param type                          type of identification
+        * @param id_string                     identification as string
+        * @param preshared_secret      preshared secret as string
+        */
+       void (*add_new_preshared_secret) (private_starter_configuration_t *this,id_type_t type, char *id_string, char *preshared_secret);
+       
+       /**
+        * Adds a new rsa private key.
+        * 
+        * @param this                          calling object
+        * @param type                          type of identification
+        * @param id_string                     identification as string
+        * @param key_pos                       location of key
+        * @param key_len                       length of key
+        */
+       void (*add_new_rsa_private_key) (private_starter_configuration_t *this,id_type_t type, char *id_string, u_int8_t *key_pos, size_t key_len);
+       
+       /**
+        * Adds a new rsa public key.
+        * 
+        * @param this                          calling object
+        * @param type                          type of identification
+        * @param id_string                     identification as string
+        * @param key_pos                       location of key
+        * @param key_len                       length of key
+        */
+       void (*add_new_rsa_public_key) (private_starter_configuration_t *this,id_type_t type, char *id_string, u_int8_t *key_pos, size_t key_len);
+       
+       void (*whack_receive) (private_starter_configuration_t *this);
+};
+
+/**
+ * Implementation of private_starter_configuration_t.listen.
+ */
+static void whack_receive(private_starter_configuration_t *this)
+{
+       u_int8_t buffer[5000];
+       struct sockaddr_un whackaddr;
+       int whackaddrlen = sizeof(whackaddr);
+       ssize_t n;
+       int whackfd;
+       
+       while (1)
+       {
+               whackfd = accept(this->socket, (struct sockaddr *)&whackaddr, &whackaddrlen);
+       
+               if (whackfd < 0)
+               {
+                       this->logger->log(this->logger, ERROR, "accept() failed in whack_handle()");
+                       continue;
+               }
+               if (fcntl(whackfd, F_SETFD, FD_CLOEXEC) < 0)
+               {
+                       this->logger->log(this->logger, ERROR, "failed to set CLOEXEC in whack_handle()");
+                       close(whackfd);
+                       continue;
+               }
+       
+               n = read(whackfd, &buffer, sizeof(buffer));
+       
+               if (n == -1)
+               {
+                       this->logger->log(this->logger, ERROR, "read() failed in whack_handle()");
+                       close(whackfd);
+                       continue;
+               }
+               this->logger->log_bytes(this->logger, CONTROL, "Whackinput", buffer, n);
+       }
+}
+
+
+/**
+ * Implementation of starter_configuration_t.get_init_config_for_host.
+ */
+static status_t get_init_config_for_host (private_starter_configuration_t *this, host_t *my_host, host_t *other_host,init_config_t **init_config)
+{
+       iterator_t *iterator;
+       status_t status = NOT_FOUND;
+       
+       iterator = this->configurations->create_iterator(this->configurations,TRUE);
+       
+       this->logger->log(this->logger, CONTROL|LEVEL1, "getting config for hosts %s - %s", 
+                                               my_host->get_address(my_host), other_host->get_address(other_host));
+       
+       while (iterator->has_next(iterator))
+       {
+               configuration_entry_t *entry;
+               host_t *config_my_host;
+               host_t *config_other_host;
+               
+               iterator->current(iterator,(void **) &entry);
+
+               config_my_host = entry->init_config->get_my_host(entry->init_config);
+               config_other_host = entry->init_config->get_other_host(entry->init_config);
+
+               /* first check if ip is equal */
+               if(config_other_host->ip_is_equal(config_other_host,other_host))
+               {
+                       this->logger->log(this->logger, CONTROL|LEVEL2, "config entry with remote host %s", 
+                                               config_other_host->get_address(config_other_host));
+                       /* could be right one, check my_host for default route*/
+                       if (config_my_host->is_default_route(config_my_host))
+                       {
+                               *init_config = entry->init_config;
+                               status = SUCCESS;
+                               break;
+                       }
+                       /* check now if host informations are the same */
+                       else if (config_my_host->ip_is_equal(config_my_host,my_host))
+                       {
+                               *init_config = entry->init_config;
+                               status = SUCCESS;
+                               break;
+                       }
+                       
+               }
+               /* Then check for wildcard hosts!
+                * TODO
+                * actually its only checked if other host with default route can be found! */
+               else if (config_other_host->is_default_route(config_other_host))
+               {
+                       /* could be right one, check my_host for default route*/
+                       if (config_my_host->is_default_route(config_my_host))
+                       {
+                               *init_config = entry->init_config;
+                               status = SUCCESS;
+                               break;
+                       }
+                       /* check now if host informations are the same */
+                       else if (config_my_host->ip_is_equal(config_my_host,my_host))
+                       {
+                               *init_config = entry->init_config;
+                               status = SUCCESS;
+                               break;
+                       }
+               }
+       }
+       
+       iterator->destroy(iterator);
+       
+       return status;
+}
+
+/**
+ * Implementation of starter_configuration_t.get_init_config_for_name.
+ */
+static status_t get_init_config_for_name (private_starter_configuration_t *this, char *name, init_config_t **init_config)
+{
+       iterator_t *iterator;
+       status_t status = NOT_FOUND;
+       
+       iterator = this->configurations->create_iterator(this->configurations,TRUE);
+       
+       while (iterator->has_next(iterator))
+       {
+               configuration_entry_t *entry;
+               iterator->current(iterator,(void **) &entry);
+
+               if (strcmp(entry->name,name) == 0)
+               {
+
+                       /* found configuration */
+                       *init_config = entry->init_config;
+                       status = SUCCESS;
+                       break;
+               }
+       }
+       
+       iterator->destroy(iterator);
+       
+       return status;
+}
+       
+/**
+ * Implementation of starter_configuration_t.get_sa_config_for_name.
+ */
+static status_t get_sa_config_for_name (private_starter_configuration_t *this, char *name, sa_config_t **sa_config)
+{
+       iterator_t *iterator;
+       status_t status = NOT_FOUND;
+       
+       iterator = this->configurations->create_iterator(this->configurations,TRUE);
+       
+       while (iterator->has_next(iterator))
+       {
+               configuration_entry_t *entry;
+               iterator->current(iterator,(void **) &entry);
+
+               if (strcmp(entry->name,name) == 0)
+               {
+                       /* found configuration */
+                       *sa_config = entry->sa_config;
+                       status = SUCCESS;
+                       break;
+               }
+       }
+       
+       iterator->destroy(iterator);
+       
+       return status;
+}
+
+/**
+ * Implementation of starter_configuration_t.get_sa_config_for_init_config_and_id.
+ */
+static status_t get_sa_config_for_init_config_and_id (private_starter_configuration_t *this, init_config_t *init_config, identification_t *other_id, identification_t *my_id,sa_config_t **sa_config)
+{      
+       iterator_t *iterator;
+       status_t status = NOT_FOUND;
+       
+       iterator = this->configurations->create_iterator(this->configurations,TRUE);
+       
+       while (iterator->has_next(iterator))
+       {
+               configuration_entry_t *entry;
+               iterator->current(iterator,(void **) &entry);
+
+               if (entry->init_config == init_config)
+               {
+                       identification_t *config_my_id = entry->sa_config->get_my_id(entry->sa_config);
+                       identification_t *config_other_id = entry->sa_config->get_other_id(entry->sa_config);
+
+                       /* host informations seem to be the same */
+                       if (config_other_id->equals(config_other_id,other_id))
+                       {
+                               /* other ids seems to match */
+                               
+                               if (my_id == NULL)
+                               {
+                                       /* first matching one is selected */
+                                       
+                                       /* TODO priorize found entries */
+                                       *sa_config = entry->sa_config;
+                                       status = SUCCESS;
+                                       break;
+                               }
+
+                               if (config_my_id->equals(config_my_id,my_id))
+                               {
+                                       *sa_config = entry->sa_config;
+                                       status = SUCCESS;
+                                       break;
+                               }
+
+                       }
+               }
+       }
+       
+       iterator->destroy(iterator);
+       
+       return status;
+}
+
+/**
+ * Implementation of private_starter_configuration_t.add_new_configuration.
+ */
+static void add_new_configuration (private_starter_configuration_t *this, char *name, init_config_t *init_config, sa_config_t *sa_config)
+{
+       iterator_t *iterator;
+       bool found;
+       
+       iterator = this->init_configs->create_iterator(this->init_configs,TRUE);
+       found = FALSE;
+       while (iterator->has_next(iterator))
+       {
+               init_config_t *found_init_config;
+               iterator->current(iterator,(void **) &found_init_config);
+               if (init_config == found_init_config)
+               {
+                       found = TRUE;
+                       break;
+               }
+       }
+       iterator->destroy(iterator);
+       if (!found)
+       {
+               this->init_configs->insert_first(this->init_configs,init_config);
+       }
+       
+       iterator = this->sa_configs->create_iterator(this->sa_configs,TRUE);
+       found = FALSE;
+       while (iterator->has_next(iterator))
+       {
+               sa_config_t *found_sa_config;
+               iterator->current(iterator,(void **) &found_sa_config);
+               if (sa_config == found_sa_config)
+               {
+                       found = TRUE;
+                       break;
+               }
+       }
+       iterator->destroy(iterator);
+       if (!found)
+       {
+               this->sa_configs->insert_first(this->sa_configs,sa_config);
+       }
+
+       this->configurations->insert_last(this->configurations,configuration_entry_create(name,init_config,sa_config));
+}
+
+/**
+ * Implementation of private_starter_configuration_t.add_new_preshared_secret.
+ */
+static void add_new_preshared_secret (private_starter_configuration_t *this,id_type_t type, char *id_string, char *preshared_secret)
+{
+       preshared_secret_entry_t *entry = allocator_alloc_thing(preshared_secret_entry_t);
+       
+       entry->identification = identification_create_from_string(type,id_string);
+       entry->preshared_secret.len = strlen(preshared_secret) + 1;
+       entry->preshared_secret.ptr = allocator_alloc(entry->preshared_secret.len);
+       memcpy(entry->preshared_secret.ptr,preshared_secret,entry->preshared_secret.len);
+       
+       this->preshared_secrets->insert_last(this->preshared_secrets,entry);
+}
+
+/**
+ * Implementation of private_starter_configuration_t.add_new_preshared_secret.
+ */
+static void add_new_rsa_public_key (private_starter_configuration_t *this, id_type_t type, char *id_string, u_int8_t* key_pos, size_t key_len)
+{
+       chunk_t key;
+       key.ptr = key_pos;
+       key.len = key_len;
+       
+       rsa_public_key_entry_t *entry = allocator_alloc_thing(rsa_public_key_entry_t);
+       
+       entry->identification = identification_create_from_string(type,id_string);
+       entry->public_key = rsa_public_key_create();
+       entry->public_key->set_key(entry->public_key, key);
+       
+       this->rsa_public_keys->insert_last(this->rsa_public_keys, entry);
+}
+
+/**
+ * Implementation of private_starter_configuration_t.add_new_preshared_secret.
+ */
+static void add_new_rsa_private_key (private_starter_configuration_t *this, id_type_t type, char *id_string, u_int8_t* key_pos, size_t key_len)
+{
+       chunk_t key;
+       key.ptr = key_pos;
+       key.len = key_len;
+       
+       rsa_private_key_entry_t *entry = allocator_alloc_thing(rsa_private_key_entry_t);
+       
+       entry->identification = identification_create_from_string(type,id_string);
+       entry->private_key = rsa_private_key_create();
+       entry->private_key->set_key(entry->private_key, key);
+       
+       this->rsa_private_keys->insert_last(this->rsa_private_keys, entry);
+}
+
+/**
+ * Implementation of starter_configuration_t.get_shared_secret.
+ */
+static status_t get_shared_secret(private_starter_configuration_t *this, identification_t *identification, chunk_t *preshared_secret)
+{
+       iterator_t *iterator;
+       
+       iterator = this->preshared_secrets->create_iterator(this->preshared_secrets,TRUE);
+       while (iterator->has_next(iterator))
+       {
+               preshared_secret_entry_t *entry;
+               iterator->current(iterator,(void **) &entry);
+               if (entry->identification->equals(entry->identification,identification))
+               {
+                       *preshared_secret = entry->preshared_secret;
+                       iterator->destroy(iterator);
+                       return SUCCESS;
+               }
+       }
+       iterator->destroy(iterator);
+       return NOT_FOUND;
+}
+
+/**
+ * Implementation of starter_configuration_t.get_shared_secret.
+ */
+static status_t get_rsa_public_key(private_starter_configuration_t *this, identification_t *identification, rsa_public_key_t **public_key)
+{
+       iterator_t *iterator;
+       
+       iterator = this->rsa_public_keys->create_iterator(this->rsa_public_keys,TRUE);
+       while (iterator->has_next(iterator))
+       {
+               rsa_public_key_entry_t *entry;
+               iterator->current(iterator,(void **) &entry);
+               if (entry->identification->equals(entry->identification,identification))
+               {
+                       *public_key = entry->public_key;
+                       iterator->destroy(iterator);
+                       return SUCCESS;
+               }
+       }
+       iterator->destroy(iterator);
+       return NOT_FOUND;
+}
+
+/**
+ * Implementation of starter_configuration_t.get_shared_secret.
+ */
+static status_t get_rsa_private_key(private_starter_configuration_t *this, identification_t *identification, rsa_private_key_t **private_key)
+{
+       iterator_t *iterator;
+       
+       iterator = this->rsa_private_keys->create_iterator(this->rsa_private_keys,TRUE);
+       while (iterator->has_next(iterator))
+       {
+               rsa_private_key_entry_t *entry;
+               iterator->current(iterator,(void **) &entry);
+               if (entry->identification->equals(entry->identification,identification))
+               {
+                       *private_key = entry->private_key;
+                       iterator->destroy(iterator);
+                       return SUCCESS;
+               }
+       }
+       iterator->destroy(iterator);
+       return NOT_FOUND;
+}
+
+/**
+ * Implementation of starter_configuration_t.get_retransmit_timeout.
+ */
+static status_t get_retransmit_timeout (private_starter_configuration_t *this, u_int32_t retransmit_count, u_int32_t *timeout)
+{
+       int new_timeout = this->first_retransmit_timeout, i;
+       if ((retransmit_count > this->max_retransmit_count) && (this->max_retransmit_count != 0))
+       {
+               return FAILED;
+       }
+       
+
+       for (i = 0; i < retransmit_count; i++)
+       {
+               new_timeout *= 2;
+       }
+       
+       *timeout = new_timeout;
+       
+       return SUCCESS;
+}
+
+/**
+ * Implementation of starter_configuration_t.get_half_open_ike_sa_timeout.
+ */
+static u_int32_t get_half_open_ike_sa_timeout (private_starter_configuration_t *this)
+{
+       return this->half_open_ike_sa_timeout;
+}
+
+/**
+ * Implementation of starter_configuration_t.destroy.
+ */
+static void destroy(private_starter_configuration_t *this)
+{
+       this->logger->log(this->logger,CONTROL | LEVEL1, "Going to destroy configuration backend ");
+
+       this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy configuration entries");
+       while (this->configurations->get_count(this->configurations) > 0)
+       {
+               configuration_entry_t *entry;
+               this->configurations->remove_first(this->configurations,(void **) &entry);
+               entry->destroy(entry);
+       }
+       this->configurations->destroy(this->configurations);
+
+       this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy sa_config_t objects");        
+       while (this->sa_configs->get_count(this->sa_configs) > 0)
+       {
+               sa_config_t *sa_config;
+               this->sa_configs->remove_first(this->sa_configs,(void **) &sa_config);
+               sa_config->destroy(sa_config);
+       }
+
+       this->sa_configs->destroy(this->sa_configs);
+       
+       this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy init_config_t objects");
+       while (this->init_configs->get_count(this->init_configs) > 0)
+       {
+               init_config_t *init_config;
+               this->init_configs->remove_first(this->init_configs,(void **) &init_config);
+               init_config->destroy(init_config);
+       }
+       this->init_configs->destroy(this->init_configs);
+       
+       while (this->preshared_secrets->get_count(this->preshared_secrets) > 0)
+       {
+               preshared_secret_entry_t *entry;
+               this->preshared_secrets->remove_first(this->preshared_secrets,(void **) &entry);
+               entry->identification->destroy(entry->identification);
+               allocator_free_chunk(&(entry->preshared_secret));
+               allocator_free(entry);
+       }
+       this->preshared_secrets->destroy(this->preshared_secrets);
+
+       this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy rsa private keys");   
+       while (this->rsa_private_keys->get_count(this->rsa_private_keys) > 0)
+       {
+               rsa_private_key_entry_t *entry;
+               this->rsa_private_keys->remove_first(this->rsa_private_keys,(void **) &entry);
+               entry->identification->destroy(entry->identification);
+               entry->private_key->destroy(entry->private_key);
+               allocator_free(entry);
+       }
+       this->rsa_private_keys->destroy(this->rsa_private_keys);
+
+       this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy rsa public keys");
+       while (this->rsa_public_keys->get_count(this->rsa_public_keys) > 0)
+       {
+               rsa_public_key_entry_t *entry;
+               this->rsa_public_keys->remove_first(this->rsa_public_keys,(void **) &entry);
+               entry->identification->destroy(entry->identification);
+               entry->public_key->destroy(entry->public_key);
+               allocator_free(entry);
+       }
+       this->rsa_public_keys->destroy(this->rsa_public_keys);
+               
+       this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy assigned logger");
+       charon->logger_manager->destroy_logger(charon->logger_manager,this->logger);
+       close(this->socket);
+       unlink(socket_addr.sun_path);
+       allocator_free(this);
+}
+
+/*
+ * Described in header-file
+ */
+starter_configuration_t *starter_configuration_create()
+{
+       private_starter_configuration_t *this = allocator_alloc_thing(private_starter_configuration_t);
+       mode_t old;
+       bool on = TRUE;
+
+       /* public functions */
+       this->public.configuration_interface.destroy = (void(*)(configuration_t*))destroy;
+       this->public.configuration_interface.get_init_config_for_name = (status_t (*) (configuration_t *, char *, init_config_t **)) get_init_config_for_name;
+       this->public.configuration_interface.get_init_config_for_host = (status_t (*) (configuration_t *, host_t *, host_t *,init_config_t **)) get_init_config_for_host;
+       this->public.configuration_interface.get_sa_config_for_name =(status_t (*) (configuration_t *, char *, sa_config_t **)) get_sa_config_for_name;
+       this->public.configuration_interface.get_sa_config_for_init_config_and_id =(status_t (*) (configuration_t *, init_config_t *, identification_t *, identification_t *,sa_config_t **)) get_sa_config_for_init_config_and_id;
+       this->public.configuration_interface.get_retransmit_timeout = (status_t (*) (configuration_t *, u_int32_t retransmit_count, u_int32_t *timeout))get_retransmit_timeout;
+       this->public.configuration_interface.get_half_open_ike_sa_timeout = (u_int32_t (*) (configuration_t *)) get_half_open_ike_sa_timeout;
+       this->public.configuration_interface.get_shared_secret = (status_t (*) (configuration_t *, identification_t *, chunk_t *))get_shared_secret;
+       this->public.configuration_interface.get_rsa_private_key = (status_t (*) (configuration_t *, identification_t *, rsa_private_key_t**))get_rsa_private_key;
+       this->public.configuration_interface.get_rsa_public_key = (status_t (*) (configuration_t *, identification_t *, rsa_public_key_t**))get_rsa_public_key;
+       
+       /* private functions */
+       this->add_new_configuration = add_new_configuration;
+       this->add_new_preshared_secret = add_new_preshared_secret;
+       this->add_new_rsa_public_key = add_new_rsa_public_key;
+       this->add_new_rsa_private_key = add_new_rsa_private_key;
+       this->whack_receive = whack_receive;
+       
+       this->logger = charon->logger_manager->create_logger(charon->logger_manager,CONFIG,NULL);
+       
+       /* set up unix socket */
+       this->socket = socket(AF_UNIX, SOCK_STREAM, 0);
+       if (this->socket == -1)
+       {
+               this->logger->log(this->logger, ERROR, "could not create whack socket");
+               charon->logger_manager->destroy_logger(charon->logger_manager,this->logger);
+               allocator_free(this);
+               return NULL;
+       }
+       if (fcntl(this->socket, F_SETFD, FD_CLOEXEC) < 0)
+       {
+               this->logger->log(this->logger, ERROR, "could not FD_CLOEXEC on whack socket");
+               charon->logger_manager->destroy_logger(charon->logger_manager,this->logger);
+               close(this->socket);
+               allocator_free(this);
+               return NULL;
+       }
+       if (setsockopt(this->socket, SOL_SOCKET, SO_REUSEADDR, (const void *)&on, sizeof(on)) < 0)
+       
+       old = umask(~S_IRWXU);
+       if (bind(this->socket, (struct sockaddr *)&socket_addr, sizeof(socket_addr)) < 0)
+       {
+               this->logger->log(this->logger, ERROR, "could not bind whack socket: %s", strerror(errno));
+               charon->logger_manager->destroy_logger(charon->logger_manager,this->logger);
+               close(this->socket);
+               allocator_free(this);
+               return NULL;
+       }
+       umask(old);
+       
+       if (listen(this->socket, 0) < 0)
+       {
+               this->logger->log(this->logger, ERROR, "could not listen on whack socket: %s", strerror(errno));
+               charon->logger_manager->destroy_logger(charon->logger_manager,this->logger);
+               close(this->socket);
+               unlink(socket_addr.sun_path);
+               allocator_free(this);
+               return NULL;
+       }
+       
+       /* start a thread reading from the socket */
+       if (pthread_create(&(this->assigned_thread), NULL, (void*(*)(void*))this->whack_receive, this) != 0)
+       {
+               this->logger->log(this->logger, ERROR, "Could not spawn whack thread");
+               charon->logger_manager->destroy_logger(charon->logger_manager, this->logger);
+               close(this->socket);
+               unlink(socket_addr.sun_path);
+               allocator_free(this);
+       }
+       
+       /* private variables */
+       this->configurations = linked_list_create();
+       this->sa_configs = linked_list_create();
+       this->init_configs = linked_list_create();
+       this->preshared_secrets = linked_list_create();
+       this->rsa_private_keys = linked_list_create();
+       this->rsa_public_keys = linked_list_create();
+       this->max_retransmit_count = MAX_RETRANSMIT_COUNT;
+       this->first_retransmit_timeout = RETRANSMIT_TIMEOUT;
+       this->half_open_ike_sa_timeout = HALF_OPEN_IKE_SA_TIMEOUT;
+       
+       return (&this->public);
+}
diff --git a/Source/charon/config/starter_configuration.h b/Source/charon/config/starter_configuration.h
new file mode 100644 (file)
index 0000000..408b84e
--- /dev/null
@@ -0,0 +1,60 @@
+/**
+ * @file starter_configuration_t.h
+ *
+ * @brief Interface of starter_configuration_t.
+ *
+ */
+
+/*
+ * Copyright (C) 2005 Jan Hutter, Martin Willi
+ * Hochschule fuer Technik Rapperswil
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * for more details.
+ */
+
+#ifndef STARTER_CONFIGURATION_H_
+#define STARTER_CONFIGURATION_H_
+
+#include <config/configuration.h>
+
+
+typedef struct starter_configuration_t starter_configuration_t;
+
+/**
+ * @brief A config backend which uses the ipsec starter
+ * from pluto, wich parses config files.
+ * 
+ * This configuration implementation opens a Whack-Socket
+ * and waits for input from ipsec starter.
+ * 
+ * @b Constructors:
+ * - starter_configuration_create()
+ * 
+ * @ingroup config
+ */
+struct starter_configuration_t { 
+
+       /**
+        * Implements configuration_t interface
+        */
+       configuration_t configuration_interface;
+};
+
+/**
+ * @brief Creates an configuration using ipsec starter as input.
+ * 
+ * @return starter_configuration_t object
+ * 
+ * @ingroup config
+ */
+starter_configuration_t *starter_configuration_create();
+
+#endif /*STARTER_CONFIGURATION_H_*/
old mode 100644 (file)
new mode 100755 (executable)
similarity index 84%
rename from Source/charon/config/configuration_manager.c
rename to Source/charon/config/static_configuration.c
index d7191b8..0cec6e1
@@ -1,7 +1,7 @@
 /**
- * @file configuration_manager.c
+ * @file static_configuration.c
  * 
- * @brief Implementation of configuration_manager_t.
+ * @brief Implementation of static_configuration_t.
  * 
  */
 
 
 #include <stdlib.h>
 
-#include "configuration_manager.h"
+#include "static_configuration.h"
 
 #include <types.h>
 #include <daemon.h>
 #include <utils/allocator.h>
 
+/**
+ * First retransmit timeout in milliseconds.
+ * 
+ * Timeout value is increasing in each retransmit round.
+ */
+#define RETRANSMIT_TIMEOUT 3000
+
+/**
+ * Timeout in milliseconds after that a half open IKE_SA gets deleted.
+ */
+#define HALF_OPEN_IKE_SA_TIMEOUT 30000
+
+/**
+ * Max retransmit count.
+ * 0 for infinite. The max time a half open IKE_SA is alive is set by 
+ * RETRANSMIT_TIMEOUT.
+ */
+#define MAX_RETRANSMIT_COUNT 0
+
 
 typedef struct preshared_secret_entry_t preshared_secret_entry_t;
 
@@ -150,17 +169,17 @@ configuration_entry_t * configuration_entry_create(char * name, init_config_t *
        return entry;
 }
 
-typedef struct private_configuration_manager_t private_configuration_manager_t;
+typedef struct private_static_configuration_t private_static_configuration_t;
 
 /**
- * Private data of an configuration_manager_t object.
+ * Private data of an static_configuration_t object.
  */
-struct private_configuration_manager_t {
+struct private_static_configuration_t {
 
        /**
-        * Public part of configuration_manager_t object.
+        * Public part of static_configuration_t object.
         */
-       configuration_manager_t public;
+       static_configuration_t public;
 
        /**
         * Holding all configurations.
@@ -221,7 +240,7 @@ struct private_configuration_manager_t {
         * @param init_config           init_config_t object
         * @param sa_config                     sa_config_t object
         */
-       void (*add_new_configuration) (private_configuration_manager_t *this, char *name, init_config_t *init_config, sa_config_t *sa_config);
+       void (*add_new_configuration) (private_static_configuration_t *this, char *name, init_config_t *init_config, sa_config_t *sa_config);
        
        /**
         * Adds a new preshared secret.
@@ -231,7 +250,7 @@ struct private_configuration_manager_t {
         * @param id_string                     identification as string
         * @param preshared_secret      preshared secret as string
         */
-       void (*add_new_preshared_secret) (private_configuration_manager_t *this,id_type_t type, char *id_string, char *preshared_secret);
+       void (*add_new_preshared_secret) (private_static_configuration_t *this,id_type_t type, char *id_string, char *preshared_secret);
        
        /**
         * Adds a new rsa private key.
@@ -242,7 +261,7 @@ struct private_configuration_manager_t {
         * @param key_pos                       location of key
         * @param key_len                       length of key
         */
-       void (*add_new_rsa_private_key) (private_configuration_manager_t *this,id_type_t type, char *id_string, u_int8_t *key_pos, size_t key_len);
+       void (*add_new_rsa_private_key) (private_static_configuration_t *this,id_type_t type, char *id_string, u_int8_t *key_pos, size_t key_len);
        
        /**
         * Adds a new rsa public key.
@@ -253,14 +272,14 @@ struct private_configuration_manager_t {
         * @param key_pos                       location of key
         * @param key_len                       length of key
         */
-       void (*add_new_rsa_public_key) (private_configuration_manager_t *this,id_type_t type, char *id_string, u_int8_t *key_pos, size_t key_len);
+       void (*add_new_rsa_public_key) (private_static_configuration_t *this,id_type_t type, char *id_string, u_int8_t *key_pos, size_t key_len);
        
        /**
         * Load default configuration.
         * 
         * @param this                          calling object
         */
-       void (*load_default_config) (private_configuration_manager_t *this);
+       void (*load_default_config) (private_static_configuration_t *this);
 };
 
 
@@ -270,17 +289,17 @@ u_int8_t public_key_2[];
 u_int8_t private_key_2[];
 
 /**
- * Implementation of private_configuration_manager_t.load_default_config.
+ * Implementation of private_static_configuration_t.load_default_config.
  */
-static void load_default_config (private_configuration_manager_t *this)
+static void load_default_config (private_static_configuration_t *this)
 {
        init_config_t *init_config_a, *init_config_b;
        proposal_t *proposal;
        sa_config_t *sa_config_a, *sa_config_b;
        traffic_selector_t *ts;
        
-       init_config_a = init_config_create("192.168.0.1","192.168.0.2",IKEV2_UDP_PORT,IKEV2_UDP_PORT);
-       init_config_b = init_config_create("192.168.0.2","192.168.0.1",IKEV2_UDP_PORT,IKEV2_UDP_PORT);
+       init_config_a = init_config_create("0.0.0.0","192.168.0.2",IKEV2_UDP_PORT,IKEV2_UDP_PORT);
+       init_config_b = init_config_create("0.0.0.0","192.168.0.1",IKEV2_UDP_PORT,IKEV2_UDP_PORT);
        
        /* IKE proposals for alice */
        proposal = proposal_create(1);
@@ -358,15 +377,10 @@ static void load_default_config (private_configuration_manager_t *this)
        
        sa_config_b->add_proposal(sa_config_b, proposal);
        
-       
-       
-
        this->add_new_configuration(this,"sun",init_config_a,sa_config_a);
        this->add_new_configuration(this,"moon",init_config_b,sa_config_b);
        
-
        //this->add_new_preshared_secret(this,ID_IPV4_ADDR, "192.168.1.2","verschluesselt");
-       
        this->add_new_rsa_public_key(this,ID_IPV4_ADDR, "192.168.0.1", public_key_1, 256);
        this->add_new_rsa_public_key(this,ID_IPV4_ADDR, "192.168.0.2", public_key_2, 256);
        this->add_new_rsa_private_key(this,ID_IPV4_ADDR, "192.168.0.1", private_key_1, 1024);
@@ -374,9 +388,9 @@ static void load_default_config (private_configuration_manager_t *this)
 }
 
 /**
- * Implementation of configuration_manager_t.get_init_config_for_host.
+ * Implementation of static_configuration_t.get_init_config_for_host.
  */
-static status_t get_init_config_for_host (private_configuration_manager_t *this, host_t *my_host, host_t *other_host,init_config_t **init_config)
+static status_t get_init_config_for_host (private_static_configuration_t *this, host_t *my_host, host_t *other_host,init_config_t **init_config)
 {
        iterator_t *iterator;
        status_t status = NOT_FOUND;
@@ -446,9 +460,9 @@ static status_t get_init_config_for_host (private_configuration_manager_t *this,
 }
 
 /**
- * Implementation of configuration_manager_t.get_init_config_for_name.
+ * Implementation of static_configuration_t.get_init_config_for_name.
  */
-static status_t get_init_config_for_name (private_configuration_manager_t *this, char *name, init_config_t **init_config)
+static status_t get_init_config_for_name (private_static_configuration_t *this, char *name, init_config_t **init_config)
 {
        iterator_t *iterator;
        status_t status = NOT_FOUND;
@@ -476,9 +490,9 @@ static status_t get_init_config_for_name (private_configuration_manager_t *this,
 }
        
 /**
- * Implementation of configuration_manager_t.get_sa_config_for_name.
+ * Implementation of static_configuration_t.get_sa_config_for_name.
  */
-static status_t get_sa_config_for_name (private_configuration_manager_t *this, char *name, sa_config_t **sa_config)
+static status_t get_sa_config_for_name (private_static_configuration_t *this, char *name, sa_config_t **sa_config)
 {
        iterator_t *iterator;
        status_t status = NOT_FOUND;
@@ -505,9 +519,9 @@ static status_t get_sa_config_for_name (private_configuration_manager_t *this, c
 }
 
 /**
- * Implementation of configuration_manager_t.get_sa_config_for_init_config_and_id.
+ * Implementation of static_configuration_t.get_sa_config_for_init_config_and_id.
  */
-static status_t get_sa_config_for_init_config_and_id (private_configuration_manager_t *this, init_config_t *init_config, identification_t *other_id, identification_t *my_id,sa_config_t **sa_config)
+static status_t get_sa_config_for_init_config_and_id (private_static_configuration_t *this, init_config_t *init_config, identification_t *other_id, identification_t *my_id,sa_config_t **sa_config)
 {      
        iterator_t *iterator;
        status_t status = NOT_FOUND;
@@ -556,9 +570,9 @@ static status_t get_sa_config_for_init_config_and_id (private_configuration_mana
 }
 
 /**
- * Implementation of private_configuration_manager_t.add_new_configuration.
+ * Implementation of private_static_configuration_t.add_new_configuration.
  */
-static void add_new_configuration (private_configuration_manager_t *this, char *name, init_config_t *init_config, sa_config_t *sa_config)
+static void add_new_configuration (private_static_configuration_t *this, char *name, init_config_t *init_config, sa_config_t *sa_config)
 {
        iterator_t *iterator;
        bool found;
@@ -603,9 +617,9 @@ static void add_new_configuration (private_configuration_manager_t *this, char *
 }
 
 /**
- * Implementation of private_configuration_manager_t.add_new_preshared_secret.
+ * Implementation of private_static_configuration_t.add_new_preshared_secret.
  */
-static void add_new_preshared_secret (private_configuration_manager_t *this,id_type_t type, char *id_string, char *preshared_secret)
+static void add_new_preshared_secret (private_static_configuration_t *this,id_type_t type, char *id_string, char *preshared_secret)
 {
        preshared_secret_entry_t *entry = allocator_alloc_thing(preshared_secret_entry_t);
        
@@ -618,9 +632,9 @@ static void add_new_preshared_secret (private_configuration_manager_t *this,id_t
 }
 
 /**
- * Implementation of private_configuration_manager_t.add_new_preshared_secret.
+ * Implementation of private_static_configuration_t.add_new_preshared_secret.
  */
-static void add_new_rsa_public_key (private_configuration_manager_t *this, id_type_t type, char *id_string, u_int8_t* key_pos, size_t key_len)
+static void add_new_rsa_public_key (private_static_configuration_t *this, id_type_t type, char *id_string, u_int8_t* key_pos, size_t key_len)
 {
        chunk_t key;
        key.ptr = key_pos;
@@ -636,9 +650,9 @@ static void add_new_rsa_public_key (private_configuration_manager_t *this, id_ty
 }
 
 /**
- * Implementation of private_configuration_manager_t.add_new_preshared_secret.
+ * Implementation of private_static_configuration_t.add_new_preshared_secret.
  */
-static void add_new_rsa_private_key (private_configuration_manager_t *this, id_type_t type, char *id_string, u_int8_t* key_pos, size_t key_len)
+static void add_new_rsa_private_key (private_static_configuration_t *this, id_type_t type, char *id_string, u_int8_t* key_pos, size_t key_len)
 {
        chunk_t key;
        key.ptr = key_pos;
@@ -654,9 +668,9 @@ static void add_new_rsa_private_key (private_configuration_manager_t *this, id_t
 }
 
 /**
- * Implementation of configuration_manager_t.get_shared_secret.
+ * Implementation of static_configuration_t.get_shared_secret.
  */
-static status_t get_shared_secret(private_configuration_manager_t *this, identification_t *identification, chunk_t *preshared_secret)
+static status_t get_shared_secret(private_static_configuration_t *this, identification_t *identification, chunk_t *preshared_secret)
 {
        iterator_t *iterator;
        
@@ -677,9 +691,9 @@ static status_t get_shared_secret(private_configuration_manager_t *this, identif
 }
 
 /**
- * Implementation of configuration_manager_t.get_shared_secret.
+ * Implementation of static_configuration_t.get_shared_secret.
  */
-static status_t get_rsa_public_key(private_configuration_manager_t *this, identification_t *identification, rsa_public_key_t **public_key)
+static status_t get_rsa_public_key(private_static_configuration_t *this, identification_t *identification, rsa_public_key_t **public_key)
 {
        iterator_t *iterator;
        
@@ -700,9 +714,9 @@ static status_t get_rsa_public_key(private_configuration_manager_t *this, identi
 }
 
 /**
- * Implementation of configuration_manager_t.get_shared_secret.
+ * Implementation of static_configuration_t.get_shared_secret.
  */
-static status_t get_rsa_private_key(private_configuration_manager_t *this, identification_t *identification, rsa_private_key_t **private_key)
+static status_t get_rsa_private_key(private_static_configuration_t *this, identification_t *identification, rsa_private_key_t **private_key)
 {
        iterator_t *iterator;
        
@@ -723,9 +737,9 @@ static status_t get_rsa_private_key(private_configuration_manager_t *this, ident
 }
 
 /**
- * Implementation of configuration_manager_t.get_retransmit_timeout.
+ * Implementation of static_configuration_t.get_retransmit_timeout.
  */
-static status_t get_retransmit_timeout (private_configuration_manager_t *this, u_int32_t retransmit_count, u_int32_t *timeout)
+static status_t get_retransmit_timeout (private_static_configuration_t *this, u_int32_t retransmit_count, u_int32_t *timeout)
 {
        int new_timeout = this->first_retransmit_timeout, i;
        if ((retransmit_count > this->max_retransmit_count) && (this->max_retransmit_count != 0))
@@ -745,19 +759,19 @@ static status_t get_retransmit_timeout (private_configuration_manager_t *this, u
 }
 
 /**
- * Implementation of configuration_manager_t.get_half_open_ike_sa_timeout.
+ * Implementation of static_configuration_t.get_half_open_ike_sa_timeout.
  */
-static u_int32_t get_half_open_ike_sa_timeout (private_configuration_manager_t *this)
+static u_int32_t get_half_open_ike_sa_timeout (private_static_configuration_t *this)
 {
        return this->half_open_ike_sa_timeout;
 }
 
 /**
- * Implementation of configuration_manager_t.destroy.
+ * Implementation of static_configuration_t.destroy.
  */
-static void destroy(private_configuration_manager_t *this)
+static void destroy(private_static_configuration_t *this)
 {
-       this->logger->log(this->logger,CONTROL | LEVEL1, "Going to destroy configuration manager ");
+       this->logger->log(this->logger,CONTROL | LEVEL1, "Going to destroy configuration backend ");
 
        this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy configuration entries");
        while (this->configurations->get_count(this->configurations) > 0)
@@ -827,21 +841,21 @@ static void destroy(private_configuration_manager_t *this)
 /*
  * Described in header-file
  */
-configuration_manager_t *configuration_manager_create(u_int32_t first_retransmit_timeout,u_int32_t max_retransmit_count, u_int32_t half_open_ike_sa_timeout)
+static_configuration_t *static_configuration_create()
 {
-       private_configuration_manager_t *this = allocator_alloc_thing(private_configuration_manager_t);
+       private_static_configuration_t *this = allocator_alloc_thing(private_static_configuration_t);
 
        /* public functions */
-       this->public.destroy = (void(*)(configuration_manager_t*))destroy;
-       this->public.get_init_config_for_name = (status_t (*) (configuration_manager_t *, char *, init_config_t **)) get_init_config_for_name;
-       this->public.get_init_config_for_host = (status_t (*) (configuration_manager_t *, host_t *, host_t *,init_config_t **)) get_init_config_for_host;
-       this->public.get_sa_config_for_name =(status_t (*) (configuration_manager_t *, char *, sa_config_t **)) get_sa_config_for_name;
-       this->public.get_sa_config_for_init_config_and_id =(status_t (*) (configuration_manager_t *, init_config_t *, identification_t *, identification_t *,sa_config_t **)) get_sa_config_for_init_config_and_id;
-       this->public.get_retransmit_timeout = (status_t (*) (configuration_manager_t *, u_int32_t retransmit_count, u_int32_t *timeout))get_retransmit_timeout;
-       this->public.get_half_open_ike_sa_timeout = (u_int32_t (*) (configuration_manager_t *)) get_half_open_ike_sa_timeout;
-       this->public.get_shared_secret = (status_t (*) (configuration_manager_t *, identification_t *, chunk_t *))get_shared_secret;
-       this->public.get_rsa_private_key = (status_t (*) (configuration_manager_t *, identification_t *, rsa_private_key_t**))get_rsa_private_key;
-       this->public.get_rsa_public_key = (status_t (*) (configuration_manager_t *, identification_t *, rsa_public_key_t**))get_rsa_public_key;
+       this->public.configuration_interface.destroy = (void(*)(configuration_t*))destroy;
+       this->public.configuration_interface.get_init_config_for_name = (status_t (*) (configuration_t *, char *, init_config_t **)) get_init_config_for_name;
+       this->public.configuration_interface.get_init_config_for_host = (status_t (*) (configuration_t *, host_t *, host_t *,init_config_t **)) get_init_config_for_host;
+       this->public.configuration_interface.get_sa_config_for_name =(status_t (*) (configuration_t *, char *, sa_config_t **)) get_sa_config_for_name;
+       this->public.configuration_interface.get_sa_config_for_init_config_and_id =(status_t (*) (configuration_t *, init_config_t *, identification_t *, identification_t *,sa_config_t **)) get_sa_config_for_init_config_and_id;
+       this->public.configuration_interface.get_retransmit_timeout = (status_t (*) (configuration_t *, u_int32_t retransmit_count, u_int32_t *timeout))get_retransmit_timeout;
+       this->public.configuration_interface.get_half_open_ike_sa_timeout = (u_int32_t (*) (configuration_t *)) get_half_open_ike_sa_timeout;
+       this->public.configuration_interface.get_shared_secret = (status_t (*) (configuration_t *, identification_t *, chunk_t *))get_shared_secret;
+       this->public.configuration_interface.get_rsa_private_key = (status_t (*) (configuration_t *, identification_t *, rsa_private_key_t**))get_rsa_private_key;
+       this->public.configuration_interface.get_rsa_public_key = (status_t (*) (configuration_t *, identification_t *, rsa_public_key_t**))get_rsa_public_key;
        
        /* private functions */
        this->load_default_config = load_default_config;
@@ -851,16 +865,16 @@ configuration_manager_t *configuration_manager_create(u_int32_t first_retransmit
        this->add_new_rsa_private_key = add_new_rsa_private_key;
        
        /* private variables */
-       this->logger = charon->logger_manager->create_logger(charon->logger_manager,CONFIGURATION_MANAGER,NULL);
+       this->logger = charon->logger_manager->create_logger(charon->logger_manager,CONFIG,NULL);
        this->configurations = linked_list_create();
        this->sa_configs = linked_list_create();
        this->init_configs = linked_list_create();
        this->preshared_secrets = linked_list_create();
        this->rsa_private_keys = linked_list_create();
        this->rsa_public_keys = linked_list_create();
-       this->max_retransmit_count = max_retransmit_count;
-       this->first_retransmit_timeout = first_retransmit_timeout;
-       this->half_open_ike_sa_timeout = half_open_ike_sa_timeout;
+       this->max_retransmit_count = MAX_RETRANSMIT_COUNT;
+       this->first_retransmit_timeout = RETRANSMIT_TIMEOUT;
+       this->half_open_ike_sa_timeout = HALF_OPEN_IKE_SA_TIMEOUT;
        
        this->load_default_config(this);
 
diff --git a/Source/charon/config/static_configuration.h b/Source/charon/config/static_configuration.h
new file mode 100644 (file)
index 0000000..b63fffe
--- /dev/null
@@ -0,0 +1,56 @@
+/**
+ * @file static_configuration_t.h
+ * 
+ * @brief Interface of static_configuration_t.
+ *  
+ */
+
+/*
+ * Copyright (C) 2005 Jan Hutter, Martin Willi
+ * Hochschule fuer Technik Rapperswil
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * for more details.
+ */
+
+#ifndef STATIC_CONFIGURATION_H_
+#define STATIC_CONFIGURATION_H_
+
+#include <config/configuration.h>
+
+
+typedef struct static_configuration_t static_configuration_t;
+
+/**
+ * @brief A static hardcoded config for testing purposes.
+ * 
+ * @b Constructors:
+ * - static_configuration_create()
+ * 
+ * @ingroup config
+ */
+struct static_configuration_t { 
+
+       /**
+        * Implements configuration_t interface
+        */
+       configuration_t configuration_interface;
+};
+
+/**
+ * @brief Creates an static configuration
+ * 
+ * @return static_configuration_t object
+ * 
+ * @ingroup config
+ */
+static_configuration_t *static_configuration_create();
+
+#endif /*STATIC_CONFIGURATION_H_*/
index 21ed44ef8f587085c31a9b82f52836e10caf0fbc..db75809d283e4f8f673419c3b9b61b11f532113d 100644 (file)
@@ -29,6 +29,8 @@
 #include <types.h>
 #include <utils/allocator.h>
 #include <queues/jobs/initiate_ike_sa_job.h>
+#include <config/static_configuration.h>
+#include <config/starter_configuration.h>
 
 
 typedef struct private_daemon_t private_daemon_t;
@@ -182,7 +184,7 @@ static void initialize(private_daemon_t *this)
        this->public.job_queue = job_queue_create();
        this->public.event_queue = event_queue_create();
        this->public.send_queue = send_queue_create();
-       this->public.configuration_manager = configuration_manager_create(RETRANSMIT_TIMEOUT,MAX_RETRANSMIT_COUNT, HALF_OPEN_IKE_SA_TIMEOUT);
+       this->public.configuration = (configuration_t*)static_configuration_create();
        
        this->public.sender = sender_create();
        this->public.receiver = receiver_create();
@@ -236,9 +238,9 @@ static void destroy(private_daemon_t *this)
        {
                this->public.socket->destroy(this->public.socket);
        }
-       if (this->public.configuration_manager != NULL)
+       if (this->public.configuration != NULL)
        {
-               this->public.configuration_manager->destroy(this->public.configuration_manager);
+               this->public.configuration->destroy(this->public.configuration);
        }
        
        this->public.logger_manager->destroy(this->public.logger_manager);
@@ -273,7 +275,7 @@ private_daemon_t *daemon_create()
        this->public.job_queue = NULL;
        this->public.event_queue = NULL;
        this->public.send_queue = NULL;
-       this->public.configuration_manager = NULL;
+       this->public.configuration = NULL;
        this->public.sender= NULL;
        this->public.receiver = NULL;
        this->public.scheduler = NULL;
index 343aecb25cce5fefe03703d690418d6b8afce790..3291743e0a2071a7d72b72801cbb62d8e315294c 100644 (file)
@@ -34,7 +34,7 @@
 #include <queues/job_queue.h>
 #include <queues/event_queue.h>
 #include <utils/logger_manager.h>
-#include <config/configuration_manager.h>
+#include <config/configuration.h>
 
 /**
  * Name of the daemon.
  */
 #define IKEV2_UDP_PORT 500
 
-/**
- * @brief First retransmit timeout in milliseconds.
- * 
- * Timeout value is increasing in each retransmit round.
- */
-#define RETRANSMIT_TIMEOUT 3000
-
-/**
- * Timeout in milliseconds after that a half open IKE_SA gets deleted.
- */
-#define HALF_OPEN_IKE_SA_TIMEOUT 30000
-
-/**
- * @brief Max retransmit count.
- * 
- * 0 for infinite. The max time a half open IKE_SA is alive is set by 
- * RETRANSMIT_TIMEOUT.
- */
-#define MAX_RETRANSMIT_COUNT 0
-
 /**
  * @brief Default loglevel for every logger context.
  * 
@@ -120,9 +100,9 @@ struct daemon_t {
        ike_sa_manager_t *ike_sa_manager;
        
        /**
-        * A configuration_manager_t instance.
+        * A configuration_t instance.
         */
-       configuration_manager_t *configuration_manager;
+       configuration_t *configuration;
        
        /**
         * The Sender-Thread.
index 7be3859aa90e4d8265c6f4fff22a7c54789048be..1df8673560211f40acb8c23dc81f6e22493a144c 100644 (file)
@@ -44,19 +44,19 @@ typedef enum auth_method_t auth_method_t;
  */
 enum auth_method_t {
        /**
-        * Computed as specified in section 2.15 of draft using 
+        * Computed as specified in section 2.15 of RFC using 
         * an RSA private key over a PKCS#1 padded hash.
         */
        RSA_DIGITAL_SIGNATURE = 1,
        
        /* Computed as specified in
-     * section 2.15 of draft using the shared key associated with the identity
+     * section 2.15 of RFC using the shared key associated with the identity
      * in the ID payload and the negotiated prf function
      */
        SHARED_KEY_MESSAGE_INTEGRITY_CODE = 2,
        
        /* Computed as specified in section
-     * 2.15 of draft using a DSS private key over a SHA-1 hash.
+       * 2.15 of RFC using a DSS private key over a SHA-1 hash.
      */
     DSS_DIGITAL_SIGNATURE = 3,
 };
@@ -74,7 +74,7 @@ typedef struct auth_payload_t auth_payload_t;
 /**
  * @brief Class representing an IKEv2 AUTH payload.
  * 
- * The AUTH payload format is described in draft section 3.8.
+ * The AUTH payload format is described in RFC section 3.8.
  * 
  * @b Constructors:
  * - auth_payload_create()
index 8553e1a1d94a07b67d39c6e0911697a8a7a6561b..05b21046261a77dfef3154285502928bcb0f9942 100644 (file)
@@ -37,7 +37,7 @@
 typedef enum cert_encoding_t cert_encoding_t;
 
 /**
- * @brief Certificate encoding, as described in IKEv2 draft section 3.6
+ * @brief Certificate encoding, as described in IKEv2 RFC section 3.6
  * 
  * @ingroup payloads
  */
@@ -69,7 +69,7 @@ typedef struct cert_payload_t cert_payload_t;
 /**
  * @brief Class representing an IKEv2 CERT payload.
  * 
- * The CERT payload format is described in draft section 3.6.
+ * The CERT payload format is described in RFC section 3.6.
  * This is just a dummy implementation to fullfill the standards
  * requirements. A full implementation would offer setters/getters
  * for the different encoding types.
index 055bfc79d390caa21c88b49e71f339de6dbce0e0..c5947ae72859ec4a31f851aadac488105592a39c 100644 (file)
@@ -40,7 +40,7 @@ typedef struct certreq_payload_t certreq_payload_t;
 /**
  * @brief Class representing an IKEv2 CERTREQ payload.
  * 
- * The CERTREQ payload format is described in draft section 3.7.
+ * The CERTREQ payload format is described in RFC section 3.7.
  * This is just a dummy implementation to fullfill the standards
  * requirements. A full implementation would offer setters/getters
  * for the different encoding types.
index ad7d39a612dd1ac2cab5cd9c0370b3da8a8fa026..9de6ac9ea8973082aa94cf9e763c7f11df85d2f9 100644 (file)
@@ -39,7 +39,7 @@
 typedef enum configuration_attribute_type_t configuration_attribute_type_t;
 
 /**
- * Type of the attribute, as in IKEv2 draft 3.15.1.
+ * Type of the attribute, as in IKEv2 RFC 3.15.1.
  * 
  * @ingroup payloads
  */
index 522754c950dcda6d26eaddfb06d2a1a1f79c60af..d4417b59f3c2cc0d62e63b3dd9a215be3960cd65 100644 (file)
@@ -41,7 +41,7 @@ typedef struct delete_payload_t delete_payload_t;
 /**
  * @brief Class representing an IKEv2 DELETE payload.
  * 
- * The DELETE payload format is described in draft section 3.11.
+ * The DELETE payload format is described in RFC section 3.11.
  * 
  * @b Constructors:
  * - delete_payload_create()
index a934a186028c177f2065e8423b5cf92a4af675d1..4c324c6daa689a912f63524771da642e9826a1b2 100644 (file)
@@ -39,7 +39,7 @@ typedef struct eap_payload_t eap_payload_t;
 /**
  * @brief Class representing an IKEv2 EAP payload.
  * 
- * The EAP payload format is described in draft section 3.16.
+ * The EAP payload format is described in RFC section 3.16.
  * 
  * @b Constructors:
  * - eap_payload_create()
index 137f0ea3380edf299f9891d786356ad05ae06803..f453ee99401afb3e1a3acde24c282222bd49a53d 100644 (file)
@@ -41,7 +41,7 @@ typedef struct id_payload_t id_payload_t;
 /**
  * Object representing an IKEv2 ID payload.
  * 
- * The ID payload format is described in draft section 3.5.
+ * The ID payload format is described in RFC section 3.5.
  * 
  * @b Constructors:
  * - id_payload_create_from_identification()
index 0ddc14186343952094246f77fd36ebea0dd72776..366dfec15253382c69f6d274ac2e670e43997a17 100644 (file)
@@ -38,7 +38,7 @@ typedef struct nonce_payload_t nonce_payload_t;
 /**
  * Object representing an IKEv2 Nonce payload.
  * 
- * The Nonce payload format is described in draft section 3.3.
+ * The Nonce payload format is described in RFC section 3.3.
  * 
  * @b Constructors:
  * - nonce_payload_create()
index 40995c4020c1653829fde3421b3b21cc94046bc2..148a8833f758fa3d9d40c8947dc3b60650e90cf8 100644 (file)
@@ -49,7 +49,7 @@ typedef enum notify_message_type_t notify_message_type_t;
 /** 
  * @brief Notify message types.
  * 
- * See IKEv2 draft 3.10.1.
+ * See IKEv2 RFC 3.10.1.
  * 
  * @ingroup payloads
  */
index 35ef0181aae25f246cb20c5e8013bb446566ff2e..841877c15fba5906339b6534afd0cc7cea679396 100644 (file)
@@ -41,7 +41,7 @@ typedef struct traffic_selector_substructure_t traffic_selector_substructure_t;
 /**
  * @brief Class representing an IKEv2 TRAFFIC SELECTOR.
  * 
- * The TRAFFIC SELECTOR format is described in draft section 3.13.1.
+ * The TRAFFIC SELECTOR format is described in RFC section 3.13.1.
  * 
  * @b Constructors:
  * - traffic_selector_substructure_create()
index 732edd0238727258ae5834199613627f42d94a3e..547699915992ba936ac0972792a04b76125b6da4 100644 (file)
@@ -30,7 +30,7 @@
 typedef enum transform_attribute_type_t transform_attribute_type_t;
 
 /**
- * Type of the attribute, as in IKEv2 draft 3.3.5.
+ * Type of the attribute, as in IKEv2 RFC 3.3.5.
  * 
  * @ingroup payloads
  */
index b7e3b80fbae6186bb26354e39b00557258b4e161..7e8c2f0a3e5150cf84544c551c093ec6d37e9e0d 100644 (file)
@@ -43,7 +43,7 @@ typedef struct ts_payload_t ts_payload_t;
 /**
  * @brief Class representing an IKEv2 TS payload.
  * 
- * The TS payload format is described in draft section 3.13.
+ * The TS payload format is described in RFC section 3.13.
  * 
  * @b Constructors:
  * - ts_payload_create()
index 4b047ac1423d3d0e1b6e62fb5d93de1c6c5eaa55..4733ba2430d20bbeedf46e05b28ff501a7e8872f 100644 (file)
@@ -39,7 +39,7 @@ typedef struct vendor_id_payload_t vendor_id_payload_t;
 /**
  * @brief Class representing an IKEv2 VENDOR ID payload.
  * 
- * The VENDOR ID payload format is described in draft section 3.12.
+ * The VENDOR ID payload format is described in RFC section 3.12.
  * 
  * @b Constructors:
  * - vendor_id_payload_create()
index d02e21476b842be2776d02efa74ac428fe78f991..f8d45ddd1bb6d2e8e6afed7f8eb74224dae9959d 100644 (file)
@@ -34,6 +34,8 @@
 #include <fcntl.h>
 #include <net/if.h>
 #include <sys/ioctl.h>
+#include <netinet/in.h>
+#include <linux/filter.h>
 
 #include "socket.h"
 
 #include <utils/logger_manager.h>
 
 
+#define IP_HEADER_LENGTH 20
+#define UDP_HEADER_LENGTH 8
+
+
+/**
+ * This filter code filters out all non-IKEv2 traffic on 
+ * a SOCK_RAW IP_PROTP_UDP socket. Handling of other
+ * IKE versions is done in pluto.
+ */
+struct sock_filter ikev2_filter_code[] = 
+{
+       /* Protocol must be UDP */
+       BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 9),
+       BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, IPPROTO_UDP, 0, 7),
+       /* Destination Port must be 500 */
+       BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 22),
+       BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 500, 0, 5),
+       /* IKE version must be 2.0 */
+       BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 45),
+       BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x20, 0, 3),
+       /* packet length is length in IKEv2 header + ip header + udp header */
+       BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 52),
+       BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, IP_HEADER_LENGTH + UDP_HEADER_LENGTH),
+       BPF_STMT(BPF_RET+BPF_A, 0),
+       /* packet doesn't match IKEv2, ignore */
+       BPF_STMT(BPF_RET+BPF_K, 0),
+};
+
+/**
+ * Filter struct to use with setsockopt
+ */
+struct sock_fprog ikev2_filter = {
+       sizeof(ikev2_filter_code) / sizeof(struct sock_filter),
+       ikev2_filter_code
+};
+
+
 typedef struct interface_t interface_t;
 
 /**
@@ -52,7 +91,7 @@ struct interface_t {
        /**
         * Name of the interface
         */
-       char name[IFNAMSIZ+1];
+       char name[IFNAMSIZ];
        
        /**
         * Associated socket
@@ -98,10 +137,6 @@ status_t receiver(private_socket_t *this, packet_t **packet)
        host_t *source, *dest;
        int bytes_read = 0;
        
-       source = host_create(AF_INET, "0.0.0.0", 0);
-       dest = host_create(AF_INET, "0.0.0.0", 0);
-       pkt->set_source(pkt, source);
-       pkt->set_destination(pkt, dest);
        
        while (bytes_read >= 0)
        {
@@ -124,7 +159,7 @@ status_t receiver(private_socket_t *this, packet_t **packet)
                        }
                }
                iterator->destroy(iterator);
-       
+               
                /* add packet destroy handler for cancellation, enable cancellation */
                pthread_cleanup_push((void(*)(void*))pkt->destroy, (void*)pkt);
                pthread_setcancelstate(PTHREAD_CANCEL_ENABLE, &oldstate);
@@ -136,12 +171,6 @@ status_t receiver(private_socket_t *this, packet_t **packet)
                pthread_setcancelstate(oldstate, NULL);
                pthread_cleanup_pop(0);
                
-               if (bytes_read  < 0)
-               {
-                       this->logger->log(this->logger, ERROR, "error reading from socket: %s", strerror(errno));
-                       continue;
-               }
-       
                /* read on the first nonblocking socket */
                bytes_read = 0;
                iterator = this->interfaces->create_iterator(this->interfaces, TRUE);
@@ -151,28 +180,41 @@ status_t receiver(private_socket_t *this, packet_t **packet)
                        if (FD_ISSET(interface->socket_fd, &readfds))
                        {
                                /* do the read */
-                               bytes_read = recvfrom(interface->socket_fd, buffer, MAX_PACKET, 0,
-                                                                       source->get_sockaddr(source), 
-                                                                       source->get_sockaddr_len(source));
-                               getsockname(interface->socket_fd, dest->get_sockaddr(dest), dest->get_sockaddr_len(dest));
+                               bytes_read = recv(interface->socket_fd, buffer, MAX_PACKET, 0);
                                break;
                        }
                }
                iterator->destroy(iterator);
-               if (bytes_read > 0)
+               
+               if (bytes_read  < 0)
                {
+                       this->logger->log(this->logger, ERROR, "error reading from socket: %s", strerror(errno));
+                       continue;
+               }
+               if (bytes_read > IP_HEADER_LENGTH + UDP_HEADER_LENGTH)
+               {
+                       /* read source/dest from raw IP/UDP header */
+                       chunk_t source_chunk = {buffer + 12, 4};
+                       chunk_t dest_chunk = {buffer + 16, 4};
+                       u_int16_t source_port = ntohs(*(u_int16_t*)(buffer + 20));
+                       u_int16_t dest_port = ntohs(*(u_int16_t*)(buffer + 22));
+                       source = host_create_from_chunk(AF_INET, source_chunk, source_port);
+                       dest = host_create_from_chunk(AF_INET, dest_chunk, dest_port);
+                       pkt->set_source(pkt, source);
+                       pkt->set_destination(pkt, dest);
                        break;
                }
+               this->logger->log(this->logger, ERROR|LEVEL1, "too short packet received");
        }
        
-       this->logger->log(this->logger, CONTROL, "received packet from %s:%d",
-                                               source->get_address(source), 
-                                               source->get_port(source));
+       this->logger->log(this->logger, CONTROL, "received packet: from %s:%d to %s:%d",
+                                         source->get_address(source), source->get_port(source),
+                                         dest->get_address(dest), dest->get_port(dest));
 
        /* fill in packet */
-       data.len = bytes_read;
+       data.len = bytes_read - IP_HEADER_LENGTH - UDP_HEADER_LENGTH;
        data.ptr = allocator_alloc(data.len);
-       memcpy(data.ptr, buffer, data.len);
+       memcpy(data.ptr, buffer + IP_HEADER_LENGTH + UDP_HEADER_LENGTH, data.len);
        pkt->set_data(pkt, data);
 
        /* return packet */
@@ -291,7 +333,7 @@ static status_t build_interface_list(private_socket_t *this, u_int16_t port)
                }
                
                /* set up interface socket */
-               skt = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
+               skt = socket(AF_INET, SOCK_RAW, IPPROTO_UDP);
                if (socket < 0)
                {
                        this->logger->log(this->logger, ERROR, "unable to open interface socket!");
@@ -311,12 +353,21 @@ static status_t build_interface_list(private_socket_t *this, u_int16_t port)
                        close(skt);
                        continue;
                }
+                       
+               if (setsockopt(skt, SOL_SOCKET, SO_ATTACH_FILTER, &ikev2_filter, sizeof(ikev2_filter)) < 0)
+               {
+                       this->logger->log(this->logger, ERROR, "unable to attack IKEv2 filter to interface socket!");
+                       close(skt);
+                       continue;
+               }
                
                /* add socket with interface name to list */
                interface = allocator_alloc_thing(interface_t);
                memcpy(interface->name, buf[i].ifr_name, IFNAMSIZ);
-               interface->name[IFNAMSIZ] = '\0';
+               interface->name[IFNAMSIZ-1] = '\0';
                interface->socket_fd = skt;
+               this->logger->log(this->logger, CONTROL, "listening on %s (%s)",
+                                                 interface->name, inet_ntoa(current->sin_addr));
                this->interfaces->insert_last(this->interfaces, (void*)interface);
        }
        
index 8a00e88b0f85ec4528bc5435645c4bc73d4a93d7..7e43ffab57b2b3885b315d346cb4c8169078e808 100644 (file)
@@ -31,7 +31,7 @@
 /**
  * @brief Maximum size of a packet.
  * 
- * 3000 Bytes should be sufficient, see IKEv2 draft.
+ * 3000 Bytes should be sufficient, see IKEv2 RFC.
  * 
  * @ingroup network
  */
 typedef struct socket_t socket_t;
 
 /**
- * @brief Abstraction of one (ipv4), or in future, of multiple sockets.
+ * @brief Abstraction all sockets (currently IPv4 only).
  *
- * Receiver reads from here, sender writes to here.
+ * All available IPv4 sockets are bound and the receive function
+ * reads from them. To allow binding of other daemons (pluto) to
+ * UDP/500, this implementation uses RAW sockets. An installed
+ * "Linux socket filter" filters out all non-IKEv2 traffic and handles
+ * just IKEv2 messages. An other daemon (pluto) must handle all traffic
+ * seperatly, e.g. ignore IKEv2 traffic, since charon handles that. 
  * 
  * @b Constructors:
  * - socket_create()
  * 
  * @todo add IPv6 support
  * 
- * @todo allow listening/sending to multiple sockets, depending on address
+ * @todo We currently use multiple sockets for historic reasons. With the
+ * new RAW socket mechanism, we could use just one socket and filter
+ * addresses in userspace (or via linux socket filter). This would allow 
+ * realtime interface/address management in a easy way...
  * 
  * @ingroup network
  */
@@ -58,9 +66,8 @@ struct socket_t {
        /**
         * @brief Receive a packet.
         * 
-        * reads a packet from one of the sockets.
-        * source will be set, dest not implemented
-        * 
+        * Reads a packet from the socket and sets source/dest
+        * appropriately.
         * 
         * @param sock                  socket_t object to work on
         * @param packet                pinter gets address from allocated packet_t
@@ -73,8 +80,9 @@ struct socket_t {
        /**
         * @brief Send a packet.
         * 
-        * sends a packet via desired socket.
-        * uses source and dest in packet.
+        * Sends a packet to the net using destination from the packet.
+        * Packet is sent using default routing mechanisms, thus the 
+        * source address in packet is ignored.
         * 
         * @param sock                  socket_t object to work on
         * @param packet[out]   packet_t to send
@@ -95,10 +103,10 @@ struct socket_t {
 };
 
 /**
- * @brief socket_t constructor.
+ * @brief Create a socket_t, wich binds multiple sockets.
  * 
  * currently creates one socket, listening on all addresses
- * on port.
+ * on "port".
  *  
  * @param port                         port to bind socket to
  * @return                             socket_t object
index 5aaa2d9838afbb81f6ef4112ea4b28317a144d47..f6f09c268986cf1a319e54dc7dd729612c71d873 100644 (file)
@@ -67,7 +67,7 @@ struct private_authenticator_t {
        
        /**
         * @brief Creates the octets which are signed (RSA) or MACed (shared secret) as described in section 
-        * 2.15 of draft.
+        * 2.15 of RFC.
         * 
         * @param this                          calling object
         * @param last_message          the last message to include in created octets 
@@ -211,7 +211,7 @@ static status_t verify_auth_data (private_authenticator_t *this,
                        chunk_t preshared_secret;
                        status_t status;
                                                
-                       status = charon->configuration_manager->get_shared_secret(charon->configuration_manager,
+                       status = charon->configuration->get_shared_secret(charon->configuration,
                                                                                                                                                other_id,
                                                                                                                                                &preshared_secret);
                        other_id->destroy(other_id);
@@ -252,7 +252,7 @@ static status_t verify_auth_data (private_authenticator_t *this,
                        
                        auth_data = auth_payload->get_data(auth_payload);
                        
-                       status = charon->configuration_manager->get_rsa_public_key(charon->configuration_manager,
+                       status = charon->configuration->get_rsa_public_key(charon->configuration,
                                                                                                                                                other_id,
                                                                                                                                                &public_key);
                        other_id->destroy(other_id);
@@ -295,7 +295,7 @@ static status_t compute_auth_data (private_authenticator_t *this,
                        chunk_t preshared_secret;
                        status_t status;                
 
-                       status = charon->configuration_manager->get_shared_secret(charon->configuration_manager,
+                       status = charon->configuration->get_shared_secret(charon->configuration,
                                                                                                                                                my_id,
                                                                                                                                                &preshared_secret);
 
@@ -326,7 +326,7 @@ static status_t compute_auth_data (private_authenticator_t *this,
                        status_t status;
                        chunk_t octets, auth_data;
                        
-                       status = charon->configuration_manager->get_rsa_private_key(charon->configuration_manager,
+                       status = charon->configuration->get_rsa_private_key(charon->configuration,
                                                                                                                                                my_id,
                                                                                                                                                &private_key);
                        my_id->destroy(my_id);
index 2160eaec5e75ecba54545e84a372acc88900e50d..c50ac4f32aaf79057a86c8eb9a3781ed200d0f26 100644 (file)
@@ -40,7 +40,7 @@ typedef struct authenticator_t authenticator_t;
  *  - RSA_DIGITAL_SIGNATURE
  * 
  * This class retrieves needed data for specific AUTH methods (RSA keys, shared secrets, etc.)
- * over an internal stored protected_ike_sa_t object or directly from the configuration_manager_t over
+ * over an internal stored protected_ike_sa_t object or directly from the configuration_t over
  * the daemon_t object "charon".
  * 
  * @b Constructors:
index 55c03ef92afea5b8f36c8b807bafaaef98a42c32..7e4f7c772ccbd3f8dc0060eb83150691fbb3dbc0 100644 (file)
@@ -484,6 +484,10 @@ static void set_sa_config (private_ike_sa_t *this,sa_config_t * sa_config)
  */
 static void set_my_host (private_ike_sa_t *this, host_t *my_host)
 {
+       if (this->me.host)
+       {
+               this->me.host->destroy(this->me.host);
+       }
        this->me.host = my_host;
 }
 
@@ -492,6 +496,10 @@ static void set_my_host (private_ike_sa_t *this, host_t *my_host)
  */
 static void set_other_host (private_ike_sa_t *this, host_t *other_host)
 {
+       if (this->other.host)
+       {
+               this->other.host->destroy(this->other.host);
+       }
        this->other.host = other_host;
 }
 
@@ -814,7 +822,7 @@ static status_t send_request (private_ike_sa_t *this,message_t * message)
        
        retransmit_job = retransmit_request_job_create(this->message_id_out,this->ike_sa_id);
        
-       status = charon->configuration_manager->get_retransmit_timeout (charon->configuration_manager,
+       status = charon->configuration->get_retransmit_timeout (charon->configuration,
                                                                                                retransmit_job->get_retransmit_count(retransmit_job),&timeout);
        
        if (status != SUCCESS)
index b15a8eaab88dff09c1bc5b8fa2d2687d6cbf82f4..e1d27e25da39be3bd1f4e26604ef05dcffceee19 100644 (file)
@@ -29,7 +29,7 @@
 #include <sa/ike_sa_id.h>
 #include <sa/child_sa.h>
 #include <sa/states/state.h>
-#include <config/configuration_manager.h>
+#include <config/configuration.h>
 #include <utils/logger.h>
 #include <utils/randomizer.h>
 #include <transforms/prfs/prf.h>
index 7f80c347704c34d1944c877670aa7865d00cd2cb..06ff238b9e742c6f193418cb4c0aaa401f16e3cc 100644 (file)
@@ -213,6 +213,7 @@ static status_t process_message(private_ike_sa_init_requested_t *this, message_t
        u_int64_t responder_spi;
        ike_sa_id_t *ike_sa_id;
        iterator_t *payloads;
+       host_t *me;
 
        message_t *request;
        status_t status;
@@ -338,6 +339,10 @@ static status_t process_message(private_ike_sa_init_requested_t *this, message_t
                return DELETE_ME;
        }
        
+       /* apply the address on wich we really received the packet */
+       me = ike_sa_init_reply->get_destination(ike_sa_init_reply);
+       this->ike_sa->set_my_host(this->ike_sa, me->clone(me)); 
+       
        /*  build empty message */
        this->ike_sa->build_message(this->ike_sa, IKE_AUTH, TRUE, &request);
        
index 379eaebe19478b9f523a6caa070dd68d655ec453..54e70041a18eedb79d8a45f249f9d96e0cfb243c 100644 (file)
@@ -391,7 +391,7 @@ static status_t build_idr_payload(private_ike_sa_init_responded_t *this, id_payl
 
        /* build new sa config */
        init_config = this->ike_sa->get_init_config(this->ike_sa);
-       status = charon->configuration_manager->get_sa_config_for_init_config_and_id(charon->configuration_manager,init_config, other_id,my_id, &(this->sa_config));
+       status = charon->configuration->get_sa_config_for_init_config_and_id(charon->configuration,init_config, other_id,my_id, &(this->sa_config));
        if (status != SUCCESS)
        {       
                if (my_id)
index f27dcb5593cc8d0465c5869993ef5d9a2465d400..46cbbcdbe4748c0bcf781e797717481744759b10 100644 (file)
@@ -118,14 +118,14 @@ static status_t initiate_connection (private_initiator_init_t *this, char *name)
        this->logger->log(this->logger, CONTROL, "Initializing connection %s",name);
        
        /* get configs */
-       status = charon->configuration_manager->get_init_config_for_name(charon->configuration_manager,name,&init_config);
+       status = charon->configuration->get_init_config_for_name(charon->configuration,name,&init_config);
        if (status != SUCCESS)
        {       
                this->logger->log(this->logger, ERROR | LEVEL1, "Could not retrieve INIT configuration informations for %s",name);
                return DELETE_ME;
        }
        this->ike_sa->set_init_config(this->ike_sa,init_config);
-       status = charon->configuration_manager->get_sa_config_for_name(charon->configuration_manager,name,&sa_config);
+       status = charon->configuration->get_sa_config_for_name(charon->configuration,name,&sa_config);
        if (status != SUCCESS)
        {
                this->logger->log(this->logger, ERROR | LEVEL1, "Could not retrieve SA configuration informations for %s",name);
index c85f12efc2dce56a016f1c3f940b2dd89a987337..f67e2833c695081c010a00c6e59035bb805589db 100644 (file)
@@ -177,7 +177,7 @@ static status_t process_message(private_responder_init_t *this, message_t *messa
        source = message->get_source(message);
        destination = message->get_destination(message);
 
-       status = charon->configuration_manager->get_init_config_for_host(charon->configuration_manager,destination,source,&init_config);
+       status = charon->configuration->get_init_config_for_host(charon->configuration,destination,source,&init_config);
        if (status != SUCCESS)
        {
                /* no configuration matches given host */
index b4eadef912023d68c55816df4d7b0ddcd2fd7bf7..8b3bfa9b978b6441f0fe8ca9b515d3ae1dadb1c7 100644 (file)
@@ -28,7 +28,7 @@
 #include <queues/job_queue.h>
 #include <queues/event_queue.h>
 #include <queues/send_queue.h>
-#include <config/configuration_manager.h>
+#include <config/configuration.h>
 #include <sa/ike_sa_manager.h>
 #include <network/socket.h>
 #include <utils/logger_manager.h>
@@ -141,7 +141,7 @@ static void daemon_kill(daemon_t *this, char* none)
        this->event_queue->destroy(this->event_queue);
        this->send_queue->destroy(this->send_queue);
        this->kernel_interface->destroy(this->kernel_interface);
-       //this->configuration_manager->destroy(this->configuration_manager);
+       //this->configuration->destroy(this->configuration);
        allocator_free(charon);
 }
 
@@ -164,7 +164,7 @@ daemon_t *daemon_create()
        charon->event_queue = event_queue_create();
        charon->send_queue = send_queue_create();
        charon->kernel_interface = kernel_interface_create();
-       //charon->configuration_manager = configuration_manager_create(RETRANSMIT_TIMEOUT,MAX_RETRANSMIT_COUNT,HALF_OPEN_IKE_SA_TIMEOUT);
+       //charon->configuration = configuration_create(RETRANSMIT_TIMEOUT,MAX_RETRANSMIT_COUNT,HALF_OPEN_IKE_SA_TIMEOUT);
        charon->sender = NULL;
        charon->receiver = NULL;
        charon->scheduler = NULL;
index 7b0c163ce5a3bd7b2a7a639f8768f1bd5749f8e2..c42a09129f4bf4fc01568dd22dd73bb44429e436 100644 (file)
@@ -273,7 +273,7 @@ static status_t add_sa(     private_kernel_interface_t *this,
        request.sa.id.proto = (protocol == ESP) ? KERNEL_ESP : KERNEL_AH;
        request.sa.family = me->get_family(me);
        request.sa.mode = TRUE; /* tunnel mode */
-       request.sa.replay_window = 0; //sa->replay_window; ???
+       request.sa.replay_window = 32;
        request.sa.reqid = reqid;
        request.sa.lft.soft_byte_limit = XFRM_INF;
        request.sa.lft.soft_packet_limit = XFRM_INF;
index ac926a30b7093640347447a0eea1f670092f0066..e4c94d9ad9ba85c62147cb2d611d1d01f4e97fd4 100644 (file)
@@ -298,7 +298,7 @@ static void process_incoming_packet_job(private_thread_pool_t *this, incoming_pa
        if (status == CREATED)
        {
                this->worker_logger->log(this->worker_logger, CONTROL|LEVEL3, "Create Job to delete half open IKE_SA.");
-               this->create_delete_half_open_ike_sa_job(this,ike_sa_id,charon->configuration_manager->get_half_open_ike_sa_timeout(charon->configuration_manager));
+               this->create_delete_half_open_ike_sa_job(this,ike_sa_id,charon->configuration->get_half_open_ike_sa_timeout(charon->configuration));
        }
 
        status = ike_sa->process_message(ike_sa, message);                              
@@ -349,25 +349,25 @@ static void process_initiate_ike_sa_job(private_thread_pool_t *this, initiate_ik
        
        charon->ike_sa_manager->create_and_checkout(charon->ike_sa_manager, &ike_sa);
        
-       this->worker_logger->log(this->worker_logger, CONTROL, "Initializing connection \"%s\"", 
+       this->worker_logger->log(this->worker_logger, CONTROL, "Initiating connection \"%s\"", 
                                                         job->get_configuration_name(job));
        status = ike_sa->initialize_connection(ike_sa, job->get_configuration_name(job));
        if (status != SUCCESS)
        {
-               this->worker_logger->log(this->worker_logger, ERROR, "%s: By initialize_conection, going to delete IKE_SA.", 
+               this->worker_logger->log(this->worker_logger, ERROR, "Initiation returned %s, going to delete IKE_SA.", 
                                                                 mapping_find(status_m, status));
                charon->ike_sa_manager->checkin_and_delete(charon->ike_sa_manager, ike_sa);
                return;
        }
 
        this->worker_logger->log(this->worker_logger, CONTROL|LEVEL3, "Create Job to delete half open IKE_SA.");
-       this->create_delete_half_open_ike_sa_job(this,ike_sa->get_id(ike_sa),charon->configuration_manager->get_half_open_ike_sa_timeout(charon->configuration_manager));
+       this->create_delete_half_open_ike_sa_job(this,ike_sa->get_id(ike_sa),charon->configuration->get_half_open_ike_sa_timeout(charon->configuration));
        
        this->worker_logger->log(this->worker_logger, CONTROL|LEVEL2, "Checking in IKE SA");
        status = charon->ike_sa_manager->checkin(charon->ike_sa_manager, ike_sa);
        if (status != SUCCESS)
        {
-               this->worker_logger->log(this->worker_logger, ERROR, "%s: Could not checkin IKE_SA.", 
+               this->worker_logger->log(this->worker_logger, ERROR, "Could not checkin IKE_SA (%s)", 
                                                                 mapping_find(status_m, status));
        }
 }
@@ -510,7 +510,7 @@ static void process_retransmit_request_job(private_thread_pool_t *this, retransm
        }
        
        job->increase_retransmit_count(job);
-       status = charon->configuration_manager->get_retransmit_timeout (charon->configuration_manager,job->get_retransmit_count(job),&timeout);
+       status = charon->configuration->get_retransmit_timeout (charon->configuration,job->get_retransmit_count(job),&timeout);
        if (status != SUCCESS)
        {
                this->worker_logger->log(this->worker_logger, CONTROL | LEVEL2, "Message will not be anymore retransmitted");
index 7f371de8ab706500aee47710323b907456dcf4bd..9c219f5cccd05e931282ad1c2cdbcfc2256d0dac 100644 (file)
@@ -28,7 +28,7 @@
 typedef enum encryption_algorithm_t encryption_algorithm_t;
 
 /**
- * @brief Encryption algorithm, as in IKEv2 draft 3.3.2.
+ * @brief Encryption algorithm, as in IKEv2 RFC 3.3.2.
  * 
  * Currently only the following algorithms are implemented and therefore supported:
  * - ENCR_AES_CBC
index d4f956325884a313bd03a6d8d17d8203ef5e0d3c..9a3608aeaa5a0327633e226baf05e148dd9473ee 100644 (file)
@@ -33,7 +33,7 @@ typedef enum diffie_hellman_group_t diffie_hellman_group_t;
  * 
  * The modulus (or group) to use for a Diffie-Hellman calculation.
  * 
- * See IKEv2 draft 3.3.2 and RFC 3526.
+ * See IKEv2 RFC 3.3.2 and RFC 3526.
  * 
  * @warning Use of big modulus sizes can be cpu consuming.
  * 
index 538724c48f129f0de256b1609b87c265c0df8fb7..82919178646e0f24330a001026b39909bbe0abfe 100644 (file)
 typedef struct prf_plus_t prf_plus_t;
 
 /**
- * @brief Implementation of the prf+ function described in IKEv2 draft.
+ * @brief Implementation of the prf+ function described in IKEv2 RFC.
  *
  * This class implements the prf+ algorithm. Internally it uses a pseudo random
  * function, which implements the prf_t interface.
  * 
- * See IKEv2 draft 2.13.
+ * See IKEv2 RFC 2.13.
  * 
  * @b Constructors:
  *  - prf_plus_create()
index 17b1110b2c8150e3e1610026351439ccbe36e16b..b1c1e6a66e94e5593909047f7111fe744d3e87f6 100644 (file)
@@ -28,7 +28,7 @@
 typedef enum pseudo_random_function_t pseudo_random_function_t;
 
 /**
- * @brief Pseudo random function, as in IKEv2 draft 3.3.2.
+ * @brief Pseudo random function, as in IKEv2 RFC 3.3.2.
  * 
  * Currently only the following algorithms are implemented and therefore supported:
  * - PRF_HMAC_MD5
index 1c339178c1e963a7d4e524eb3c82c6daf78e396a..9625af813141d03d3645361d10dda0c44eb1ee48 100644 (file)
@@ -29,7 +29,7 @@
 typedef enum integrity_algorithm_t integrity_algorithm_t;
 
 /**
- * @brief Integrity algorithm, as in IKEv2 draft 3.3.2.
+ * @brief Integrity algorithm, as in IKEv2 RFC 3.3.2.
  * 
  * Currently only the following algorithms are implemented and therefore supported:
  * - AUTH_HMAC_MD5_96
index 1a2da19bcc6b1394cccf5e23639b90dbb38c556c..bdc8aae0a6d751202419053070366480ae3f394a 100644 (file)
@@ -45,7 +45,7 @@ mapping_t logger_context_t_mappings[] = {
        {SOCKET, "SOCKET"},
        {TESTER, "TESTER"},
        {DAEMON, "DAEMON"},
-       {CONFIGURATION_MANAGER, "CONFIG"},
+       {CONFIG, "CONFIG"},
        {ENCRYPTION_PAYLOAD, "ENCPLD"},
        {MAPPING_END, NULL},
 };
@@ -175,13 +175,15 @@ static logger_t *create_logger(private_logger_manager_t *this, logger_context_t
                        log_thread_ids = TRUE;
                        break;
                case IKE_SA:
+                       logger_level |= LEVEL1;
                        log_thread_ids = TRUE;
                        break;
                case CHILD_SA:
                        logger_level |= LEVEL1;
                        log_thread_ids = TRUE;
                        break;
-               case CONFIGURATION_MANAGER:
+               case CONFIG:
+                       logger_level |= FULL;
                        log_thread_ids = TRUE;
                        break;
                case MESSAGE:
index 41466b2a9503868625020133e5db618a4cf94c94..e934435aa7550486b5e35427faacd3b08a8fce8e 100644 (file)
@@ -50,7 +50,7 @@ enum logger_context_t {
        SOCKET,
        TESTER,
        DAEMON,
-       CONFIGURATION_MANAGER,
+       CONFIG,
        ENCRYPTION_PAYLOAD,
 };