6c00469e90f167957e5fa587552c655044530d78
[strongswan.git] / Source / charon / config / configuration_manager.c
1 /**
2 * @file configuration_manager.c
3 *
4 * @brief Implementation of configuration_manager_t.
5 *
6 */
7
8 /*
9 * Copyright (C) 2005 Jan Hutter, Martin Willi
10 * Hochschule fuer Technik Rapperswil
11 *
12 * This program is free software; you can redistribute it and/or modify it
13 * under the terms of the GNU General Public License as published by the
14 * Free Software Foundation; either version 2 of the License, or (at your
15 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
16 *
17 * This program is distributed in the hope that it will be useful, but
18 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
19 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
20 * for more details.
21 */
22
23 #include <stdlib.h>
24
25 #include "configuration_manager.h"
26
27 #include <types.h>
28 #include <daemon.h>
29 #include <utils/allocator.h>
30
31
32 typedef struct preshared_secret_entry_t preshared_secret_entry_t;
33
34 /**
35 * A preshared secret entry combines an identifier and a
36 * preshared secret.
37 */
38 struct preshared_secret_entry_t {
39
40 /**
41 * Identification.
42 */
43 identification_t *identification;
44
45 /**
46 * Preshared secret as chunk_t. The NULL termination is not included.
47 */
48 chunk_t preshared_secret;
49 };
50
51
52 typedef struct rsa_private_key_entry_t rsa_private_key_entry_t;
53
54 /**
55 * Entry for a rsa private key.
56 */
57 struct rsa_private_key_entry_t {
58
59 /**
60 * Identification.
61 */
62 identification_t *identification;
63
64 /**
65 * Private key.
66 */
67 rsa_private_key_t* private_key;
68 };
69
70 typedef struct rsa_public_key_entry_t rsa_public_key_entry_t;
71
72 /**
73 * Entry for a rsa private key.
74 */
75 struct rsa_public_key_entry_t {
76
77 /**
78 * Identification.
79 */
80 identification_t *identification;
81
82 /**
83 * Private key.
84 */
85 rsa_public_key_t* public_key;
86 };
87
88 typedef struct configuration_entry_t configuration_entry_t;
89
90 /* A configuration entry combines a configuration name with a init and sa
91 * configuration represented as init_config_t and sa_config_t objects.
92 *
93 * @b Constructors:
94 * - configuration_entry_create()
95 */
96 struct configuration_entry_t {
97
98 /**
99 * Configuration name.
100 *
101 */
102 char *name;
103
104 /**
105 * Configuration for IKE_SA_INIT exchange.
106 */
107 init_config_t *init_config;
108
109 /**
110 * Configuration for all phases after IKE_SA_INIT exchange.
111 */
112 sa_config_t *sa_config;
113
114 /**
115 * Destroys a configuration_entry_t
116 *
117 * @param this calling object
118 */
119 void (*destroy) (configuration_entry_t *this);
120 };
121
122 /**
123 * Implementation of configuration_entry_t.destroy.
124 */
125 static void configuration_entry_destroy (configuration_entry_t *this)
126 {
127 allocator_free(this->name);
128 allocator_free(this);
129 }
130
131 /**
132 * @brief Creates a configuration_entry_t object.
133 *
134 * @param name name of the configuration entry (gets copied)
135 * @param init_config object of type init_config_t
136 * @param sa_config object of type sa_config_t
137 */
138 configuration_entry_t * configuration_entry_create(char * name, init_config_t * init_config, sa_config_t * sa_config)
139 {
140 configuration_entry_t *entry = allocator_alloc_thing(configuration_entry_t);
141
142 /* functions */
143 entry->destroy = configuration_entry_destroy;
144
145 /* private data */
146 entry->init_config = init_config;
147 entry->sa_config = sa_config;
148 entry->name = allocator_alloc(strlen(name) + 1);
149 strcpy(entry->name,name);
150 return entry;
151 }
152
153 typedef struct private_configuration_manager_t private_configuration_manager_t;
154
155 /**
156 * Private data of an configuration_manager_t object.
157 */
158 struct private_configuration_manager_t {
159
160 /**
161 * Public part of configuration_manager_t object.
162 */
163 configuration_manager_t public;
164
165 /**
166 * Holding all configurations.
167 */
168 linked_list_t *configurations;
169
170 /**
171 * Holding all managed init_configs.
172 */
173 linked_list_t *init_configs;
174
175 /**
176 * Holding all managed init_configs.
177 */
178 linked_list_t *sa_configs;
179
180 /**
181 * Holding all managed preshared secrets.
182 */
183 linked_list_t *preshared_secrets;
184
185 /**
186 * Holding all managed private secrets.
187 */
188 linked_list_t *rsa_private_keys;
189
190 /**
191 * Holding all managed public secrets.
192 */
193 linked_list_t *rsa_public_keys;
194
195 /**
196 * Assigned logger_t object.
197 */
198 logger_t *logger;
199
200 /**
201 * Max number of requests to be retransmitted.
202 * 0 for infinite.
203 */
204 u_int32_t max_retransmit_count;
205
206 /**
207 * First retransmit timeout in ms.
208 */
209 u_int32_t first_retransmit_timeout;
210
211 /**
212 * Timeout in ms after that time a IKE_SA gets deleted.
213 */
214 u_int32_t half_open_ike_sa_timeout;
215
216 /**
217 * Adds a new IKE_SA configuration.
218 *
219 * @param this calling object
220 * @param name name for the configuration
221 * @param init_config init_config_t object
222 * @param sa_config sa_config_t object
223 */
224 void (*add_new_configuration) (private_configuration_manager_t *this, char *name, init_config_t *init_config, sa_config_t *sa_config);
225
226 /**
227 * Adds a new preshared secret.
228 *
229 * @param this calling object
230 * @param type type of identification
231 * @param id_string identification as string
232 * @param preshared_secret preshared secret as string
233 */
234 void (*add_new_preshared_secret) (private_configuration_manager_t *this,id_type_t type, char *id_string, char *preshared_secret);
235
236 /**
237 * Adds a new rsa private key.
238 *
239 * @param this calling object
240 * @param type type of identification
241 * @param id_string identification as string
242 * @param key_pos location of key
243 * @param key_len length of key
244 */
245 void (*add_new_rsa_private_key) (private_configuration_manager_t *this,id_type_t type, char *id_string, u_int8_t *key_pos, size_t key_len);
246
247 /**
248 * Adds a new rsa public key.
249 *
250 * @param this calling object
251 * @param type type of identification
252 * @param id_string identification as string
253 * @param key_pos location of key
254 * @param key_len length of key
255 */
256 void (*add_new_rsa_public_key) (private_configuration_manager_t *this,id_type_t type, char *id_string, u_int8_t *key_pos, size_t key_len);
257
258 /**
259 * Load default configuration.
260 *
261 * @param this calling object
262 */
263 void (*load_default_config) (private_configuration_manager_t *this);
264 };
265
266
267 u_int8_t public_key_1[];
268 u_int8_t private_key_1[];
269 u_int8_t public_key_2[];
270 u_int8_t private_key_2[];
271
272 /**
273 * Implementation of private_configuration_manager_t.load_default_config.
274 */
275 static void load_default_config (private_configuration_manager_t *this)
276 {
277 init_config_t *init_config;
278 ike_proposal_t proposals;
279 child_proposal_t *child_proposal;
280 sa_config_t *sa_config;
281 traffic_selector_t *ts;
282
283 init_config = init_config_create("0.0.0.0","127.0.0.1",IKEV2_UDP_PORT,IKEV2_UDP_PORT);
284
285 ts = traffic_selector_create_from_string(1, TS_IPV4_ADDR_RANGE, "0.0.0.0", 0, "255.255.255.255", 65535);
286
287 proposals.encryption_algorithm = ENCR_AES_CBC;
288 proposals.encryption_algorithm_key_length = 16;
289 proposals.integrity_algorithm = AUTH_HMAC_MD5_96;
290 proposals.integrity_algorithm_key_length = 16;
291 proposals.pseudo_random_function = PRF_HMAC_MD5;
292 proposals.pseudo_random_function_key_length = 16;
293 proposals.diffie_hellman_group = MODP_1024_BIT;
294
295 init_config->add_proposal(init_config,1,proposals);
296
297 sa_config = sa_config_create(ID_IPV4_ADDR, "127.0.0.1",
298 ID_IPV4_ADDR, "127.0.0.1",
299 RSA_DIGITAL_SIGNATURE,
300 30000);
301
302 sa_config->add_traffic_selector_initiator(sa_config,ts);
303 sa_config->add_traffic_selector_responder(sa_config,ts);
304
305 ts->destroy(ts);
306
307 /* ah and esp prop */
308 child_proposal = child_proposal_create(1);
309
310 child_proposal->add_algorithm(child_proposal, AH, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 20);
311 child_proposal->add_algorithm(child_proposal, AH, DIFFIE_HELLMAN_GROUP, MODP_1024_BIT, 0);
312 child_proposal->add_algorithm(child_proposal, AH, EXTENDED_SEQUENCE_NUMBERS, NO_EXT_SEQ_NUMBERS, 0);
313
314 child_proposal->add_algorithm(child_proposal, ESP, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
315 child_proposal->add_algorithm(child_proposal, ESP, ENCRYPTION_ALGORITHM, ENCR_3DES, 32);
316 child_proposal->add_algorithm(child_proposal, ESP, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 20);
317 child_proposal->add_algorithm(child_proposal, ESP, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 20);
318 child_proposal->add_algorithm(child_proposal, ESP, DIFFIE_HELLMAN_GROUP, MODP_1024_BIT, 0);
319 child_proposal->add_algorithm(child_proposal, ESP, EXTENDED_SEQUENCE_NUMBERS, NO_EXT_SEQ_NUMBERS, 0);
320
321 sa_config->add_proposal(sa_config, child_proposal);
322
323 this->add_new_configuration(this,"localhost",init_config,sa_config);
324
325
326 //this->add_new_preshared_secret(this,ID_IPV4_ADDR, "192.168.1.2","verschluesselt");
327
328 this->add_new_rsa_public_key(this,ID_IPV4_ADDR, "127.0.0.1", public_key_1, 256);
329 //this->add_new_rsa_public_key(this,ID_IPV4_ADDR, "192.168.1.1", public_key_2, 256);
330 this->add_new_rsa_private_key(this,ID_IPV4_ADDR, "127.0.0.1", private_key_1, 1024);
331 //this->add_new_rsa_private_key(this,ID_IPV4_ADDR, "192.168.1.1", private_key_2, 1024);
332 }
333
334 /**
335 * Implementation of configuration_manager_t.get_init_config_for_host.
336 */
337 static status_t get_init_config_for_host (private_configuration_manager_t *this, host_t *my_host, host_t *other_host,init_config_t **init_config)
338 {
339 iterator_t *iterator;
340 status_t status = NOT_FOUND;
341
342 iterator = this->configurations->create_iterator(this->configurations,TRUE);
343
344 this->logger->log(this->logger, CONTROL|LEVEL1, "getting config for hosts %s - %s",
345 my_host->get_address(my_host), other_host->get_address(other_host));
346
347 while (iterator->has_next(iterator))
348 {
349 configuration_entry_t *entry;
350 host_t *config_my_host;
351 host_t *config_other_host;
352
353 iterator->current(iterator,(void **) &entry);
354
355 config_my_host = entry->init_config->get_my_host(entry->init_config);
356 config_other_host = entry->init_config->get_other_host(entry->init_config);
357
358 /* first check if ip is equal */
359 if(config_other_host->ip_is_equal(config_other_host,other_host))
360 {
361 this->logger->log(this->logger, CONTROL|LEVEL2, "config entry with remote host %s",
362 config_other_host->get_address(config_other_host));
363 /* could be right one, check my_host for default route*/
364 if (config_my_host->is_default_route(config_my_host))
365 {
366 *init_config = entry->init_config;
367 status = SUCCESS;
368 break;
369 }
370 /* check now if host informations are the same */
371 else if (config_my_host->ip_is_equal(config_my_host,my_host))
372 {
373 *init_config = entry->init_config;
374 status = SUCCESS;
375 break;
376 }
377
378 }
379 /* Then check for wildcard hosts!
380 * TODO
381 * actually its only checked if other host with default route can be found! */
382 else if (config_other_host->is_default_route(config_other_host))
383 {
384 /* could be right one, check my_host for default route*/
385 if (config_my_host->is_default_route(config_my_host))
386 {
387 *init_config = entry->init_config;
388 status = SUCCESS;
389 break;
390 }
391 /* check now if host informations are the same */
392 else if (config_my_host->ip_is_equal(config_my_host,my_host))
393 {
394 *init_config = entry->init_config;
395 status = SUCCESS;
396 break;
397 }
398 }
399 }
400
401 iterator->destroy(iterator);
402
403 return status;
404 }
405
406 /**
407 * Implementation of configuration_manager_t.get_init_config_for_name.
408 */
409 static status_t get_init_config_for_name (private_configuration_manager_t *this, char *name, init_config_t **init_config)
410 {
411 iterator_t *iterator;
412 status_t status = NOT_FOUND;
413
414 iterator = this->configurations->create_iterator(this->configurations,TRUE);
415
416 while (iterator->has_next(iterator))
417 {
418 configuration_entry_t *entry;
419 iterator->current(iterator,(void **) &entry);
420
421 if (strcmp(entry->name,name) == 0)
422 {
423
424 /* found configuration */
425 *init_config = entry->init_config;
426 status = SUCCESS;
427 break;
428 }
429 }
430
431 iterator->destroy(iterator);
432
433 return status;
434 }
435
436 /**
437 * Implementation of configuration_manager_t.get_sa_config_for_name.
438 */
439 static status_t get_sa_config_for_name (private_configuration_manager_t *this, char *name, sa_config_t **sa_config)
440 {
441 iterator_t *iterator;
442 status_t status = NOT_FOUND;
443
444 iterator = this->configurations->create_iterator(this->configurations,TRUE);
445
446 while (iterator->has_next(iterator))
447 {
448 configuration_entry_t *entry;
449 iterator->current(iterator,(void **) &entry);
450
451 if (strcmp(entry->name,name) == 0)
452 {
453 /* found configuration */
454 *sa_config = entry->sa_config;
455 status = SUCCESS;
456 break;
457 }
458 }
459
460 iterator->destroy(iterator);
461
462 return status;
463 }
464
465 /**
466 * Implementation of configuration_manager_t.get_sa_config_for_init_config_and_id.
467 */
468 static status_t get_sa_config_for_init_config_and_id (private_configuration_manager_t *this, init_config_t *init_config, identification_t *other_id, identification_t *my_id,sa_config_t **sa_config)
469 {
470 iterator_t *iterator;
471 status_t status = NOT_FOUND;
472
473 iterator = this->configurations->create_iterator(this->configurations,TRUE);
474
475 while (iterator->has_next(iterator))
476 {
477 configuration_entry_t *entry;
478 iterator->current(iterator,(void **) &entry);
479
480 if (entry->init_config == init_config)
481 {
482 identification_t *config_my_id = entry->sa_config->get_my_id(entry->sa_config);
483 identification_t *config_other_id = entry->sa_config->get_other_id(entry->sa_config);
484
485 /* host informations seem to be the same */
486 if (config_other_id->equals(config_other_id,other_id))
487 {
488 /* other ids seems to match */
489
490 if (my_id == NULL)
491 {
492 /* first matching one is selected */
493
494 /* TODO priorize found entries */
495 *sa_config = entry->sa_config;
496 status = SUCCESS;
497 break;
498 }
499
500 if (config_my_id->equals(config_my_id,my_id))
501 {
502 *sa_config = entry->sa_config;
503 status = SUCCESS;
504 break;
505 }
506
507 }
508 }
509 }
510
511 iterator->destroy(iterator);
512
513 return status;
514 }
515
516 /**
517 * Implementation of private_configuration_manager_t.add_new_configuration.
518 */
519 static void add_new_configuration (private_configuration_manager_t *this, char *name, init_config_t *init_config, sa_config_t *sa_config)
520 {
521 iterator_t *iterator;
522 bool found;
523
524 iterator = this->init_configs->create_iterator(this->init_configs,TRUE);
525 found = FALSE;
526 while (iterator->has_next(iterator))
527 {
528 init_config_t *found_init_config;
529 iterator->current(iterator,(void **) &found_init_config);
530 if (init_config == found_init_config)
531 {
532 found = TRUE;
533 break;
534 }
535 }
536 iterator->destroy(iterator);
537 if (!found)
538 {
539 this->init_configs->insert_first(this->init_configs,init_config);
540 }
541
542 iterator = this->sa_configs->create_iterator(this->sa_configs,TRUE);
543 found = FALSE;
544 while (iterator->has_next(iterator))
545 {
546 sa_config_t *found_sa_config;
547 iterator->current(iterator,(void **) &found_sa_config);
548 if (sa_config == found_sa_config)
549 {
550 found = TRUE;
551 break;
552 }
553 }
554 iterator->destroy(iterator);
555 if (!found)
556 {
557 this->sa_configs->insert_first(this->sa_configs,sa_config);
558 }
559
560 this->configurations->insert_last(this->configurations,configuration_entry_create(name,init_config,sa_config));
561 }
562
563 /**
564 * Implementation of private_configuration_manager_t.add_new_preshared_secret.
565 */
566 static void add_new_preshared_secret (private_configuration_manager_t *this,id_type_t type, char *id_string, char *preshared_secret)
567 {
568 preshared_secret_entry_t *entry = allocator_alloc_thing(preshared_secret_entry_t);
569
570 entry->identification = identification_create_from_string(type,id_string);
571 entry->preshared_secret.len = strlen(preshared_secret) + 1;
572 entry->preshared_secret.ptr = allocator_alloc(entry->preshared_secret.len);
573 memcpy(entry->preshared_secret.ptr,preshared_secret,entry->preshared_secret.len);
574
575 this->preshared_secrets->insert_last(this->preshared_secrets,entry);
576 }
577
578 /**
579 * Implementation of private_configuration_manager_t.add_new_preshared_secret.
580 */
581 static void add_new_rsa_public_key (private_configuration_manager_t *this, id_type_t type, char *id_string, u_int8_t* key_pos, size_t key_len)
582 {
583 chunk_t key;
584 key.ptr = key_pos;
585 key.len = key_len;
586
587 rsa_public_key_entry_t *entry = allocator_alloc_thing(rsa_public_key_entry_t);
588
589 entry->identification = identification_create_from_string(type,id_string);
590 entry->public_key = rsa_public_key_create();
591 entry->public_key->set_key(entry->public_key, key);
592
593 this->rsa_public_keys->insert_last(this->rsa_public_keys, entry);
594 }
595
596 /**
597 * Implementation of private_configuration_manager_t.add_new_preshared_secret.
598 */
599 static void add_new_rsa_private_key (private_configuration_manager_t *this, id_type_t type, char *id_string, u_int8_t* key_pos, size_t key_len)
600 {
601 chunk_t key;
602 key.ptr = key_pos;
603 key.len = key_len;
604
605 rsa_private_key_entry_t *entry = allocator_alloc_thing(rsa_private_key_entry_t);
606
607 entry->identification = identification_create_from_string(type,id_string);
608 entry->private_key = rsa_private_key_create();
609 entry->private_key->set_key(entry->private_key, key);
610
611 this->rsa_private_keys->insert_last(this->rsa_private_keys, entry);
612 }
613
614 /**
615 * Implementation of configuration_manager_t.get_shared_secret.
616 */
617 static status_t get_shared_secret(private_configuration_manager_t *this, identification_t *identification, chunk_t *preshared_secret)
618 {
619 iterator_t *iterator;
620
621 iterator = this->preshared_secrets->create_iterator(this->preshared_secrets,TRUE);
622 while (iterator->has_next(iterator))
623 {
624 preshared_secret_entry_t *entry;
625 iterator->current(iterator,(void **) &entry);
626 if (entry->identification->equals(entry->identification,identification))
627 {
628 *preshared_secret = entry->preshared_secret;
629 iterator->destroy(iterator);
630 return SUCCESS;
631 }
632 }
633 iterator->destroy(iterator);
634 return NOT_FOUND;
635 }
636
637 /**
638 * Implementation of configuration_manager_t.get_shared_secret.
639 */
640 static status_t get_rsa_public_key(private_configuration_manager_t *this, identification_t *identification, rsa_public_key_t **public_key)
641 {
642 iterator_t *iterator;
643
644 iterator = this->rsa_public_keys->create_iterator(this->rsa_public_keys,TRUE);
645 while (iterator->has_next(iterator))
646 {
647 rsa_public_key_entry_t *entry;
648 iterator->current(iterator,(void **) &entry);
649 if (entry->identification->equals(entry->identification,identification))
650 {
651 *public_key = entry->public_key;
652 iterator->destroy(iterator);
653 return SUCCESS;
654 }
655 }
656 iterator->destroy(iterator);
657 return NOT_FOUND;
658 }
659
660 /**
661 * Implementation of configuration_manager_t.get_shared_secret.
662 */
663 static status_t get_rsa_private_key(private_configuration_manager_t *this, identification_t *identification, rsa_private_key_t **private_key)
664 {
665 iterator_t *iterator;
666
667 iterator = this->rsa_private_keys->create_iterator(this->rsa_private_keys,TRUE);
668 while (iterator->has_next(iterator))
669 {
670 rsa_private_key_entry_t *entry;
671 iterator->current(iterator,(void **) &entry);
672 if (entry->identification->equals(entry->identification,identification))
673 {
674 *private_key = entry->private_key;
675 iterator->destroy(iterator);
676 return SUCCESS;
677 }
678 }
679 iterator->destroy(iterator);
680 return NOT_FOUND;
681 }
682
683 /**
684 * Implementation of configuration_manager_t.get_retransmit_timeout.
685 */
686 static status_t get_retransmit_timeout (private_configuration_manager_t *this, u_int32_t retransmit_count, u_int32_t *timeout)
687 {
688 int new_timeout = this->first_retransmit_timeout, i;
689 if ((retransmit_count > this->max_retransmit_count) && (this->max_retransmit_count != 0))
690 {
691 return FAILED;
692 }
693
694
695 for (i = 0; i < retransmit_count; i++)
696 {
697 new_timeout *= 2;
698 }
699
700 *timeout = new_timeout;
701
702 return SUCCESS;
703 }
704
705 /**
706 * Implementation of configuration_manager_t.get_half_open_ike_sa_timeout.
707 */
708 static u_int32_t get_half_open_ike_sa_timeout (private_configuration_manager_t *this)
709 {
710 return this->half_open_ike_sa_timeout;
711 }
712
713 /**
714 * Implementation of configuration_manager_t.destroy.
715 */
716 static void destroy(private_configuration_manager_t *this)
717 {
718 this->logger->log(this->logger,CONTROL | LEVEL1, "Going to destroy configuration manager ");
719
720 this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy configuration entries");
721 while (this->configurations->get_count(this->configurations) > 0)
722 {
723 configuration_entry_t *entry;
724 this->configurations->remove_first(this->configurations,(void **) &entry);
725 entry->destroy(entry);
726 }
727 this->configurations->destroy(this->configurations);
728
729 this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy sa_config_t objects");
730 while (this->sa_configs->get_count(this->sa_configs) > 0)
731 {
732 sa_config_t *sa_config;
733 this->sa_configs->remove_first(this->sa_configs,(void **) &sa_config);
734 sa_config->destroy(sa_config);
735 }
736
737 this->sa_configs->destroy(this->sa_configs);
738
739 this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy init_config_t objects");
740 while (this->init_configs->get_count(this->init_configs) > 0)
741 {
742 init_config_t *init_config;
743 this->init_configs->remove_first(this->init_configs,(void **) &init_config);
744 init_config->destroy(init_config);
745 }
746 this->init_configs->destroy(this->init_configs);
747
748 while (this->preshared_secrets->get_count(this->preshared_secrets) > 0)
749 {
750 preshared_secret_entry_t *entry;
751 this->preshared_secrets->remove_first(this->preshared_secrets,(void **) &entry);
752 entry->identification->destroy(entry->identification);
753 allocator_free_chunk(&(entry->preshared_secret));
754 allocator_free(entry);
755 }
756 this->preshared_secrets->destroy(this->preshared_secrets);
757
758 this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy rsa private keys");
759 while (this->rsa_private_keys->get_count(this->rsa_private_keys) > 0)
760 {
761 rsa_private_key_entry_t *entry;
762 this->rsa_private_keys->remove_first(this->rsa_private_keys,(void **) &entry);
763 entry->identification->destroy(entry->identification);
764 entry->private_key->destroy(entry->private_key);
765 allocator_free(entry);
766 }
767 this->rsa_private_keys->destroy(this->rsa_private_keys);
768
769 this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy rsa public keys");
770 while (this->rsa_public_keys->get_count(this->rsa_public_keys) > 0)
771 {
772 rsa_public_key_entry_t *entry;
773 this->rsa_public_keys->remove_first(this->rsa_public_keys,(void **) &entry);
774 entry->identification->destroy(entry->identification);
775 entry->public_key->destroy(entry->public_key);
776 allocator_free(entry);
777 }
778 this->rsa_public_keys->destroy(this->rsa_public_keys);
779
780 this->logger->log(this->logger,CONTROL | LEVEL2, "Destroy assigned logger");
781 charon->logger_manager->destroy_logger(charon->logger_manager,this->logger);
782 allocator_free(this);
783 }
784
785 /*
786 * Described in header-file
787 */
788 configuration_manager_t *configuration_manager_create(u_int32_t first_retransmit_timeout,u_int32_t max_retransmit_count, u_int32_t half_open_ike_sa_timeout)
789 {
790 private_configuration_manager_t *this = allocator_alloc_thing(private_configuration_manager_t);
791
792 /* public functions */
793 this->public.destroy = (void(*)(configuration_manager_t*))destroy;
794 this->public.get_init_config_for_name = (status_t (*) (configuration_manager_t *, char *, init_config_t **)) get_init_config_for_name;
795 this->public.get_init_config_for_host = (status_t (*) (configuration_manager_t *, host_t *, host_t *,init_config_t **)) get_init_config_for_host;
796 this->public.get_sa_config_for_name =(status_t (*) (configuration_manager_t *, char *, sa_config_t **)) get_sa_config_for_name;
797 this->public.get_sa_config_for_init_config_and_id =(status_t (*) (configuration_manager_t *, init_config_t *, identification_t *, identification_t *,sa_config_t **)) get_sa_config_for_init_config_and_id;
798 this->public.get_retransmit_timeout = (status_t (*) (configuration_manager_t *, u_int32_t retransmit_count, u_int32_t *timeout))get_retransmit_timeout;
799 this->public.get_half_open_ike_sa_timeout = (u_int32_t (*) (configuration_manager_t *)) get_half_open_ike_sa_timeout;
800 this->public.get_shared_secret = (status_t (*) (configuration_manager_t *, identification_t *, chunk_t *))get_shared_secret;
801 this->public.get_rsa_private_key = (status_t (*) (configuration_manager_t *, identification_t *, rsa_private_key_t**))get_rsa_private_key;
802 this->public.get_rsa_public_key = (status_t (*) (configuration_manager_t *, identification_t *, rsa_public_key_t**))get_rsa_public_key;
803
804 /* private functions */
805 this->load_default_config = load_default_config;
806 this->add_new_configuration = add_new_configuration;
807 this->add_new_preshared_secret = add_new_preshared_secret;
808 this->add_new_rsa_public_key = add_new_rsa_public_key;
809 this->add_new_rsa_private_key = add_new_rsa_private_key;
810
811 /* private variables */
812 this->logger = charon->logger_manager->create_logger(charon->logger_manager,CONFIGURATION_MANAGER,NULL);
813 this->configurations = linked_list_create();
814 this->sa_configs = linked_list_create();
815 this->init_configs = linked_list_create();
816 this->preshared_secrets = linked_list_create();
817 this->rsa_private_keys = linked_list_create();
818 this->rsa_public_keys = linked_list_create();
819 this->max_retransmit_count = max_retransmit_count;
820 this->first_retransmit_timeout = first_retransmit_timeout;
821 this->half_open_ike_sa_timeout = half_open_ike_sa_timeout;
822
823 this->load_default_config(this);
824
825 return (&this->public);
826 }
827
828
829 u_int8_t public_key_1[] = {
830 0xD4,0x8D,0x40,0x8E,0xBD,0xFC,0x6D,0xE9,0xDB,0x1C,0xD2,0x21,0x19,0x37,0x6B,0xE2,
831 0xDC,0xCE,0x74,0xA2,0x63,0xF6,0xD8,0x8D,0xAF,0x1C,0xC0,0xFF,0x07,0x3F,0xFB,0x52,
832 0x59,0x45,0x01,0x10,0x35,0xA9,0xB8,0x16,0x69,0x31,0x19,0x4F,0xDD,0x66,0xAD,0xAC,
833 0x80,0x11,0x33,0x38,0x5A,0x11,0xF9,0x33,0x3F,0xD2,0x41,0x4A,0x21,0x9B,0x54,0x44,
834 0x00,0xB6,0x07,0x33,0x4A,0x5B,0x4E,0x09,0x7C,0x9D,0xB8,0xDE,0x6B,0xA2,0xB2,0x78,
835 0x23,0x3D,0xF0,0xB7,0x37,0x2B,0x7A,0x71,0x50,0x6E,0xEA,0x93,0x3E,0xB5,0x2C,0xBD,
836 0xD6,0x08,0x43,0x12,0x0A,0xE8,0x8D,0xE6,0x6C,0x24,0xCC,0x3F,0xF7,0x18,0x7E,0x87,
837 0x59,0x0C,0xA9,0x5D,0x85,0xF8,0x6E,0x83,0xD8,0x18,0x77,0x07,0xB6,0x44,0x3C,0x8D,
838 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
839 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
840 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
841 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
842 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
843 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
844 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
845 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x01
846 };
847
848 u_int8_t private_key_1[] = {
849 0xD4,0x8D,0x40,0x8E,0xBD,0xFC,0x6D,0xE9,0xDB,0x1C,0xD2,0x21,0x19,0x37,0x6B,0xE2,
850 0xDC,0xCE,0x74,0xA2,0x63,0xF6,0xD8,0x8D,0xAF,0x1C,0xC0,0xFF,0x07,0x3F,0xFB,0x52,
851 0x59,0x45,0x01,0x10,0x35,0xA9,0xB8,0x16,0x69,0x31,0x19,0x4F,0xDD,0x66,0xAD,0xAC,
852 0x80,0x11,0x33,0x38,0x5A,0x11,0xF9,0x33,0x3F,0xD2,0x41,0x4A,0x21,0x9B,0x54,0x44,
853 0x00,0xB6,0x07,0x33,0x4A,0x5B,0x4E,0x09,0x7C,0x9D,0xB8,0xDE,0x6B,0xA2,0xB2,0x78,
854 0x23,0x3D,0xF0,0xB7,0x37,0x2B,0x7A,0x71,0x50,0x6E,0xEA,0x93,0x3E,0xB5,0x2C,0xBD,
855 0xD6,0x08,0x43,0x12,0x0A,0xE8,0x8D,0xE6,0x6C,0x24,0xCC,0x3F,0xF7,0x18,0x7E,0x87,
856 0x59,0x0C,0xA9,0x5D,0x85,0xF8,0x6E,0x83,0xD8,0x18,0x77,0x07,0xB6,0x44,0x3C,0x8D,
857 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
858 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
859 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
860 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
861 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
862 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
863 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
864 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x01,
865 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
866 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
867 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
868 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
869 0xEE,0xF2,0x37,0xF2,0x98,0xEB,0x33,0xC6,0x84,0xE8,0xB9,0xD1,0x18,0xB5,0x29,0x00,
870 0xAC,0x6B,0x78,0xBC,0x9E,0xB6,0x01,0x21,0x29,0xEE,0x4A,0x99,0xFB,0x3D,0x07,0x23,
871 0x77,0x84,0x93,0x4B,0x53,0x49,0xB0,0xA4,0x6F,0xB0,0xF5,0x50,0xDB,0x35,0xDD,0xDF,
872 0x41,0x6F,0x7B,0xA9,0x88,0x3D,0x0B,0x1C,0x2E,0x2B,0x44,0x35,0x24,0x72,0x66,0xC1,
873 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
874 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
875 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
876 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
877 0xE3,0xB8,0xC8,0x30,0x67,0xD0,0x5D,0xF1,0x32,0x64,0xDC,0x4B,0xB3,0x7E,0xE3,0x1A,
878 0xC5,0xBC,0xAC,0xC9,0x95,0x5C,0x96,0x0D,0x5A,0x52,0x90,0xE0,0x08,0x3F,0xA6,0x71,
879 0xC7,0x18,0xC5,0x64,0xA2,0xE4,0xB8,0x43,0x5A,0x8A,0x7A,0x9B,0xDF,0xDA,0x81,0x85,
880 0x6C,0x0F,0xA4,0xC9,0xAC,0x25,0x19,0x54,0xFE,0x75,0xAA,0x1D,0x22,0xB8,0xF4,0xCD,
881 0x1A,0x91,0xC2,0xA3,0x65,0x3F,0xD7,0xFC,0x7E,0xE1,0x92,0x29,0xC5,0x85,0x6E,0x44,
882 0xC8,0x4D,0xBD,0x7A,0x2C,0x2D,0x47,0xE2,0x24,0x24,0xDF,0xC2,0x31,0x65,0x8F,0xD4,
883 0xBA,0x28,0x7C,0x4A,0xCA,0xAE,0x79,0xBE,0xC1,0x6C,0xFC,0x09,0x45,0xF7,0x87,0x17,
884 0xB4,0x55,0x92,0x15,0xC5,0xFA,0x8F,0xB0,0x56,0x96,0xC1,0x87,0x12,0xFE,0xDF,0xF0,
885 0x3A,0xE1,0xB1,0x83,0x19,0x74,0xF0,0x7D,0x37,0x41,0x3E,0x6A,0xFE,0x33,0x3E,0x74,
886 0x01,0x45,0xE4,0x65,0xAE,0xC9,0xAE,0x64,0xE3,0xF1,0x90,0xFD,0x1A,0x30,0x44,0x82,
887 0xEE,0x34,0x94,0xF2,0x68,0x3D,0x61,0x90,0xFB,0xEB,0xD8,0x18,0xE6,0x7C,0xEC,0x69,
888 0x70,0xD0,0xEB,0x2F,0xC1,0x3D,0x9C,0x6A,0x4B,0x89,0x50,0x6B,0x3F,0xA5,0x38,0x41,
889 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
890 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
891 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
892 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
893 0x65,0xEE,0x34,0x09,0xAC,0x4C,0x21,0x71,0x1D,0x3F,0x7E,0x0D,0x01,0xC2,0x3E,0x34,
894 0x88,0x58,0xEC,0x4F,0x62,0x50,0xF7,0xD8,0x62,0xDF,0xC1,0x39,0x40,0xA0,0xBF,0x0B,
895 0xD5,0x2F,0x5B,0xFA,0x35,0x14,0x69,0x63,0x2C,0x36,0x4B,0xDF,0xEB,0x33,0x66,0x6B,
896 0x97,0xA9,0x6C,0x12,0x5D,0x08,0xD5,0x55,0x77,0x28,0x83,0xD7,0x3B,0xAE,0x05,0xC1,
897 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
898 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
899 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
900 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
901 0x9F,0x96,0x17,0x75,0x14,0xCB,0xC9,0x8A,0x06,0xAE,0xF8,0x53,0x74,0xEF,0x2F,0x68,
902 0xCB,0xBA,0x75,0xBC,0xAF,0x97,0xBA,0xF0,0x90,0xA3,0xDC,0x33,0xA4,0x94,0x36,0xA8,
903 0xF5,0xC6,0x3E,0x4F,0x50,0x78,0xC9,0x49,0x2A,0x62,0x71,0x9A,0x5B,0x3E,0x5E,0x16,
904 0x8A,0xAC,0x4B,0xE7,0xA9,0x64,0x36,0x64,0x82,0x0F,0x23,0xB0,0x57,0x6D,0x16,0xE1,
905 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
906 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
907 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
908 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
909 0x25,0xF1,0x40,0x05,0x58,0x19,0x37,0x61,0x34,0x98,0xBB,0x29,0x1B,0x44,0x08,0x1A,
910 0xD3,0x66,0x62,0x4C,0x9C,0x47,0xD2,0x91,0x60,0x46,0x6F,0x8E,0xA6,0xE7,0x80,0x7B,
911 0x17,0x77,0x9A,0xB5,0x18,0x8A,0x15,0x8F,0x77,0xA1,0x55,0x3E,0x96,0x66,0x86,0x57,
912 0x75,0x73,0xF5,0x57,0x50,0x28,0xEA,0x83,0x14,0xB1,0x55,0xA3,0x82,0xCD,0x36,0xF8
913 };
914 u_int8_t public_key_2[] = {
915 0x88,0x3E,0xE2,0x2E,0x5D,0x01,0x13,0xDF,0x1D,0x8B,0xF4,0x39,0xCA,0xE6,0x3C,0xE1,
916 0x46,0x8E,0xD4,0xF1,0x06,0x56,0x12,0x8D,0xCD,0x51,0xBD,0x32,0xF5,0x18,0x15,0x4D,
917 0x0F,0x98,0xDF,0xFF,0xA5,0xA3,0xAB,0x39,0x43,0xC4,0xF6,0xAC,0x98,0x5C,0x84,0x63,
918 0x8C,0x46,0x33,0xA2,0x23,0x8C,0xF0,0x4D,0xFE,0xE7,0xF3,0x38,0xC4,0x19,0x39,0xC4,
919 0x90,0xF4,0xC8,0x0D,0xB0,0xFE,0x65,0x11,0x0B,0x41,0x73,0xBB,0x05,0xA6,0x4B,0xC5,
920 0x27,0xA4,0x48,0x21,0xC5,0xAE,0x91,0x9C,0xD8,0x62,0x27,0xBE,0xDF,0xDA,0xC6,0x4E,
921 0xC1,0x6E,0x5B,0x61,0x51,0xAA,0xC9,0x53,0xCD,0x02,0x5B,0xC5,0xEE,0xE9,0xC7,0x7B,
922 0xB1,0x7E,0xD2,0xC2,0xFE,0x5F,0xD7,0x0F,0x75,0x2B,0xB9,0x49,0x5F,0x35,0xF1,0x83,
923 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
924 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
925 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
926 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
927 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
928 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
929 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
930 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x01
931 };
932 u_int8_t private_key_2[] = {
933 0x88,0x3E,0xE2,0x2E,0x5D,0x01,0x13,0xDF,0x1D,0x8B,0xF4,0x39,0xCA,0xE6,0x3C,0xE1,
934 0x46,0x8E,0xD4,0xF1,0x06,0x56,0x12,0x8D,0xCD,0x51,0xBD,0x32,0xF5,0x18,0x15,0x4D,
935 0x0F,0x98,0xDF,0xFF,0xA5,0xA3,0xAB,0x39,0x43,0xC4,0xF6,0xAC,0x98,0x5C,0x84,0x63,
936 0x8C,0x46,0x33,0xA2,0x23,0x8C,0xF0,0x4D,0xFE,0xE7,0xF3,0x38,0xC4,0x19,0x39,0xC4,
937 0x90,0xF4,0xC8,0x0D,0xB0,0xFE,0x65,0x11,0x0B,0x41,0x73,0xBB,0x05,0xA6,0x4B,0xC5,
938 0x27,0xA4,0x48,0x21,0xC5,0xAE,0x91,0x9C,0xD8,0x62,0x27,0xBE,0xDF,0xDA,0xC6,0x4E,
939 0xC1,0x6E,0x5B,0x61,0x51,0xAA,0xC9,0x53,0xCD,0x02,0x5B,0xC5,0xEE,0xE9,0xC7,0x7B,
940 0xB1,0x7E,0xD2,0xC2,0xFE,0x5F,0xD7,0x0F,0x75,0x2B,0xB9,0x49,0x5F,0x35,0xF1,0x83,
941 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
942 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
943 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
944 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
945 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
946 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
947 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
948 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x01,
949 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
950 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
951 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
952 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
953 0xE8,0x37,0xB6,0x08,0xD8,0x9C,0x72,0xC5,0x34,0xDB,0x3A,0xA2,0xF9,0x24,0xE1,0x44,
954 0x23,0x3B,0x72,0x70,0x5D,0xCC,0xC3,0xBA,0x3D,0xCE,0x82,0xAC,0x6A,0x71,0x72,0x90,
955 0xC7,0x94,0xB3,0x8B,0x85,0xE0,0xEF,0x39,0xF0,0xE4,0x08,0x31,0xEA,0xE6,0x3B,0x7D,
956 0xB0,0x36,0xFA,0x71,0x6E,0xA3,0xF9,0x4C,0x39,0x05,0x8C,0xB7,0x8C,0x99,0x94,0x85,
957 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
958 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
959 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
960 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
961 0x96,0x32,0xF9,0xD9,0xA8,0xC0,0x84,0xFD,0xE5,0x6B,0xA6,0xC2,0x85,0x85,0x68,0x17,
962 0x7E,0x98,0xD0,0x6A,0xDC,0xD8,0x4C,0x46,0xCB,0x6D,0x4C,0x25,0xE5,0xF9,0x58,0xB2,
963 0x17,0xE4,0x20,0x8A,0x87,0x0D,0xD7,0x4C,0x79,0xA3,0xB3,0x69,0x98,0x7F,0x5D,0x08,
964 0x33,0x5B,0xAD,0xA3,0x34,0xE8,0x55,0x5E,0x09,0x60,0x70,0xA8,0x11,0xFD,0x70,0x67,
965 0x00,0xE1,0xA7,0x44,0xF5,0x85,0x14,0x43,0xD5,0x45,0x1A,0x87,0x65,0x30,0xA8,0x24,
966 0x2C,0xF8,0xAF,0x97,0xFF,0x9A,0x7E,0xF4,0x3B,0xE7,0xD3,0x79,0x88,0xEC,0x66,0xF6,
967 0xE0,0xAA,0xF4,0x88,0x0A,0xE2,0x4C,0x31,0x4A,0xA6,0xF3,0x91,0x9A,0x4A,0xBE,0xF0,
968 0x85,0xEF,0xCE,0x55,0xB6,0x35,0x2B,0x38,0xD5,0xF5,0x5A,0x35,0x7B,0xCF,0x4D,0xF8,
969 0x5D,0x1E,0x57,0x99,0xAF,0xED,0x33,0x6F,0xD5,0xA7,0x49,0x5B,0x14,0x4C,0x7D,0x17,
970 0x81,0xAE,0x1E,0xDA,0x9D,0xFB,0xA9,0xC3,0x00,0x4C,0x17,0x37,0x30,0x96,0x60,0xE1,
971 0x6A,0xCC,0xD3,0xDB,0x40,0xCE,0x96,0x96,0x0D,0x95,0x0D,0x84,0x38,0xBD,0xDA,0x2F,
972 0xEC,0xED,0x22,0x39,0x8E,0x8C,0xDF,0xCD,0x07,0xCF,0x0F,0xB0,0x2B,0x76,0xDB,0xC1,
973 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
974 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
975 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
976 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
977 0xA5,0x37,0x9E,0x08,0x45,0x35,0x6A,0x62,0xEC,0xEC,0x5D,0x97,0xBE,0x73,0x82,0xE2,
978 0x9B,0xBE,0x9B,0xF9,0x5E,0x83,0x65,0x6E,0x88,0xB2,0xF9,0x3D,0xFA,0xAD,0xA4,0xB9,
979 0x65,0x86,0x63,0x08,0x0D,0xC4,0xAF,0xF0,0x25,0x77,0xD8,0x6C,0xCB,0x97,0xEB,0x13,
980 0xCD,0xE0,0x0F,0xE7,0xCC,0xB4,0x55,0x96,0xE9,0xAB,0x0D,0x27,0x3A,0x9D,0xBA,0x91,
981 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
982 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
983 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
984 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
985 0x44,0xA3,0x44,0xF4,0x47,0x9E,0xBA,0xE7,0xBF,0xF8,0xC2,0xFB,0x2F,0xC3,0x38,0x3F,
986 0x4C,0x56,0x0F,0x20,0x56,0x8D,0xED,0xC5,0x88,0x5F,0x09,0x26,0x64,0x82,0xDF,0x1A,
987 0x7B,0xBA,0x7F,0x78,0x6E,0xA1,0x4F,0x9B,0x1E,0x17,0x45,0xFC,0xE2,0x78,0x89,0x8E,
988 0x1E,0xD2,0x2D,0x76,0x60,0xCE,0x2F,0x7C,0xCA,0xB2,0x2C,0xA9,0x51,0x97,0x4C,0xCF,
989 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
990 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
991 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
992 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
993 0x01,0x40,0x4B,0x7D,0xAB,0x8A,0xB9,0x5E,0xEE,0xA1,0x81,0xED,0x27,0x89,0xF6,0x4C,
994 0x59,0x8C,0x23,0x14,0x3B,0x1B,0xBA,0xC3,0xB2,0x00,0x9A,0x9E,0xDF,0x54,0x82,0xA7,
995 0x3E,0xC9,0x23,0x85,0x4D,0xD3,0x80,0xA7,0x89,0x11,0xBA,0x76,0xF5,0xC1,0x55,0x37,
996 0x0A,0x0D,0x8C,0x07,0x0A,0xC8,0xC5,0x11,0x74,0x9C,0xB6,0x80,0x3B,0x0A,0x9A,0xA2
997 };