Use standard unsigned integer types
[strongswan.git] / src / frontends / osx / charon-xpc / xpc_channels.c
1 /*
2 * Copyright (C) 2013 Martin Willi
3 * Copyright (C) 2013 revosec AG
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License as published by the
7 * Free Software Foundation; either version 2 of the License, or (at your
8 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
13 * for more details.
14 */
15
16 #include "xpc_channels.h"
17 #include "xpc_logger.h"
18
19 #include <credentials/sets/callback_cred.h>
20 #include <collections/hashtable.h>
21 #include <threading/rwlock.h>
22 #include <daemon.h>
23
24 typedef struct private_xpc_channels_t private_xpc_channels_t;
25
26 /**
27 * Private data of an xpc_channels_t object.
28 */
29 struct private_xpc_channels_t {
30
31 /**
32 * Public xpc_channels_t interface.
33 */
34 xpc_channels_t public;
35
36 /**
37 * Registered channels, IKE_SA unique ID => entry_t
38 */
39 hashtable_t *channels;
40
41 /**
42 * Lock for channels list
43 */
44 rwlock_t *lock;
45
46 /**
47 * Callback credential set for passwords
48 */
49 callback_cred_t *creds;
50 };
51
52 /**
53 * Channel entry
54 */
55 typedef struct {
56 /* XPC channel to App */
57 xpc_connection_t conn;
58 /* associated IKE_SA unique identifier */
59 uintptr_t sa;
60 /* did we already ask for a password? */
61 bool passworded;
62 /* channel specific logger */
63 xpc_logger_t *logger;
64 } entry_t;
65
66 /**
67 * Clean up an entry, cancelling connection
68 */
69 static void destroy_entry(entry_t *entry)
70 {
71 charon->bus->remove_logger(charon->bus, &entry->logger->logger);
72 entry->logger->destroy(entry->logger);
73 xpc_connection_suspend(entry->conn);
74 xpc_release(entry->conn);
75 free(entry);
76 }
77
78 /**
79 * Find an IKE_SA unique identifier by a given XPC channel
80 */
81 static uint32_t find_ike_sa_by_conn(private_xpc_channels_t *this,
82 xpc_connection_t conn)
83 {
84 enumerator_t *enumerator;
85 entry_t *entry;
86 uint32_t ike_sa = 0;
87
88 this->lock->read_lock(this->lock);
89 enumerator = this->channels->create_enumerator(this->channels);
90 while (enumerator->enumerate(enumerator, NULL, &entry))
91 {
92 if (entry->conn == conn)
93 {
94 ike_sa = entry->sa;
95 break;
96 }
97 }
98 enumerator->destroy(enumerator);
99 this->lock->unlock(this->lock);
100
101 return ike_sa;
102 }
103
104 /**
105 * Remove an entry for a given XPC connection
106 */
107 static void remove_conn(private_xpc_channels_t *this, xpc_connection_t conn)
108 {
109 uintptr_t ike_sa;
110 entry_t *entry;
111
112 ike_sa = find_ike_sa_by_conn(this, conn);
113 if (ike_sa)
114 {
115 this->lock->write_lock(this->lock);
116 entry = this->channels->remove(this->channels, (void*)ike_sa);
117 this->lock->unlock(this->lock);
118
119 if (entry)
120 {
121 destroy_entry(entry);
122 }
123 }
124 }
125
126 /**
127 * Trigger termination of a connection
128 */
129 static void stop_connection(private_xpc_channels_t *this, uint32_t ike_sa,
130 xpc_object_t request, xpc_object_t reply)
131 {
132 status_t status;
133
134 status = charon->controller->terminate_ike(charon->controller, ike_sa,
135 NULL, NULL, 0);
136 xpc_dictionary_set_bool(reply, "success", status != NOT_FOUND);
137 }
138
139 /**
140 * XPC RPC command dispatch table
141 */
142 static struct {
143 char *name;
144 void (*handler)(private_xpc_channels_t *this, uint32_t ike_sa,
145 xpc_object_t request, xpc_object_t reply);
146 } commands[] = {
147 { "stop_connection", stop_connection },
148 };
149
150 /**
151 * Handle a request message from App
152 */
153 static void handle(private_xpc_channels_t *this, xpc_connection_t conn,
154 xpc_object_t request)
155 {
156 xpc_object_t reply;
157 const char *type, *rpc;
158 bool found = FALSE;
159 uint32_t ike_sa;
160 int i;
161
162 type = xpc_dictionary_get_string(request, "type");
163 if (type)
164 {
165 if (streq(type, "rpc"))
166 {
167 reply = xpc_dictionary_create_reply(request);
168 rpc = xpc_dictionary_get_string(request, "rpc");
169 ike_sa = find_ike_sa_by_conn(this, conn);
170 if (reply && rpc && ike_sa)
171 {
172 for (i = 0; i < countof(commands); i++)
173 {
174 if (streq(commands[i].name, rpc))
175 {
176 found = TRUE;
177 commands[i].handler(this, ike_sa, request, reply);
178 break;
179 }
180 }
181 }
182 if (!found)
183 {
184 DBG1(DBG_CFG, "received invalid XPC rpc command: %s", rpc);
185 }
186 if (reply)
187 {
188 xpc_connection_send_message(conn, reply);
189 xpc_release(reply);
190 }
191 }
192 else
193 {
194 DBG1(DBG_CFG, "received unknown XPC message type: %s", type);
195 }
196 }
197 else
198 {
199 DBG1(DBG_CFG, "received XPC message without a type");
200 }
201 }
202
203 METHOD(xpc_channels_t, add, void,
204 private_xpc_channels_t *this, xpc_connection_t conn, uint32_t ike_sa)
205 {
206 entry_t *entry;
207
208 INIT(entry,
209 .conn = conn,
210 .sa = ike_sa,
211 .logger = xpc_logger_create(conn),
212 );
213
214 xpc_retain(entry->conn);
215 xpc_connection_set_event_handler(entry->conn, ^(xpc_object_t event)
216 {
217 if (event == XPC_ERROR_CONNECTION_INVALID ||
218 event == XPC_ERROR_CONNECTION_INTERRUPTED)
219 {
220 remove_conn(this, conn);
221 }
222 else if (xpc_get_type(event) == XPC_TYPE_DICTIONARY)
223 {
224 handle(this, conn, event);
225 }
226 });
227
228 entry->logger->set_ike_sa(entry->logger, entry->sa);
229 charon->bus->add_logger(charon->bus, &entry->logger->logger);
230
231 this->lock->write_lock(this->lock);
232 this->channels->put(this->channels, (void*)entry->sa, entry);
233 this->lock->unlock(this->lock);
234
235 xpc_connection_resume(conn);
236 }
237
238 METHOD(listener_t, alert, bool,
239 private_xpc_channels_t *this, ike_sa_t *ike_sa, alert_t alert, va_list args)
240 {
241 const char *desc;
242
243 switch (alert)
244 {
245 case ALERT_LOCAL_AUTH_FAILED:
246 desc = "local-auth";
247 break;
248 case ALERT_PEER_AUTH_FAILED:
249 desc = "remote-auth";
250 break;
251 case ALERT_PEER_ADDR_FAILED:
252 desc = "dns";
253 break;
254 case ALERT_PEER_INIT_UNREACHABLE:
255 desc = "unreachable";
256 break;
257 case ALERT_RETRANSMIT_SEND_TIMEOUT:
258 desc = "timeout";
259 break;
260 case ALERT_PROPOSAL_MISMATCH_IKE:
261 case ALERT_PROPOSAL_MISMATCH_CHILD:
262 desc = "proposal-mismatch";
263 break;
264 case ALERT_TS_MISMATCH:
265 desc = "ts-mismatch";
266 break;
267 default:
268 return TRUE;
269 }
270 if (ike_sa)
271 {
272 entry_t *entry;
273 uintptr_t sa;
274
275 sa = ike_sa->get_unique_id(ike_sa);
276 this->lock->read_lock(this->lock);
277 entry = this->channels->get(this->channels, (void*)sa);
278 if (entry)
279 {
280 xpc_object_t msg;
281
282 msg = xpc_dictionary_create(NULL, NULL, 0);
283 xpc_dictionary_set_string(msg, "type", "event");
284 xpc_dictionary_set_string(msg, "event", "alert");
285 xpc_dictionary_set_string(msg, "alert", desc);
286 xpc_connection_send_message(entry->conn, msg);
287 xpc_release(msg);
288 }
289 this->lock->unlock(this->lock);
290 }
291 return TRUE;
292 }
293
294 METHOD(listener_t, ike_rekey, bool,
295 private_xpc_channels_t *this, ike_sa_t *old, ike_sa_t *new)
296 {
297 entry_t *entry;
298 uintptr_t sa;
299
300 sa = old->get_unique_id(old);
301 this->lock->write_lock(this->lock);
302 entry = this->channels->remove(this->channels, (void*)sa);
303 if (entry)
304 {
305 entry->sa = new->get_unique_id(new);
306 entry->logger->set_ike_sa(entry->logger, entry->sa);
307 this->channels->put(this->channels, (void*)entry->sa, entry);
308 }
309 this->lock->unlock(this->lock);
310
311 return TRUE;
312 }
313
314 METHOD(listener_t, ike_state_change, bool,
315 private_xpc_channels_t *this, ike_sa_t *ike_sa, ike_sa_state_t state)
316 {
317 if (state == IKE_CONNECTING)
318 {
319 entry_t *entry;
320 uintptr_t sa;
321
322 sa = ike_sa->get_unique_id(ike_sa);
323 this->lock->read_lock(this->lock);
324 entry = this->channels->get(this->channels, (void*)sa);
325 if (entry)
326 {
327 xpc_object_t msg;
328
329 msg = xpc_dictionary_create(NULL, NULL, 0);
330 xpc_dictionary_set_string(msg, "type", "event");
331 xpc_dictionary_set_string(msg, "event", "connecting");
332 xpc_connection_send_message(entry->conn, msg);
333 xpc_release(msg);
334 }
335 this->lock->unlock(this->lock);
336 }
337 return TRUE;
338 }
339
340 METHOD(listener_t, child_updown, bool,
341 private_xpc_channels_t *this, ike_sa_t *ike_sa,
342 child_sa_t *child_sa, bool up)
343 {
344 entry_t *entry;
345 uintptr_t sa;
346
347 sa = ike_sa->get_unique_id(ike_sa);
348 this->lock->read_lock(this->lock);
349 entry = this->channels->get(this->channels, (void*)sa);
350 if (entry)
351 {
352 xpc_object_t msg;
353 linked_list_t *list;
354 char buf[256];
355
356 msg = xpc_dictionary_create(NULL, NULL, 0);
357 xpc_dictionary_set_string(msg, "type", "event");
358 if (up)
359 {
360 xpc_dictionary_set_string(msg, "event", "child_up");
361 }
362 else
363 {
364 xpc_dictionary_set_string(msg, "event", "child_down");
365 }
366
367 list = linked_list_create_from_enumerator(
368 child_sa->create_ts_enumerator(child_sa, TRUE));
369 snprintf(buf, sizeof(buf), "%#R", list);
370 list->destroy(list);
371 xpc_dictionary_set_string(msg, "ts_local", buf);
372
373 list = linked_list_create_from_enumerator(
374 child_sa->create_ts_enumerator(child_sa, FALSE));
375 snprintf(buf, sizeof(buf), "%#R", list);
376 list->destroy(list);
377 xpc_dictionary_set_string(msg, "ts_remote", buf);
378
379 xpc_connection_send_message(entry->conn, msg);
380 xpc_release(msg);
381 }
382 this->lock->unlock(this->lock);
383 return TRUE;
384 }
385
386 METHOD(listener_t, ike_updown, bool,
387 private_xpc_channels_t *this, ike_sa_t *ike_sa, bool up)
388 {
389 xpc_object_t msg;
390 entry_t *entry;
391 uintptr_t sa;
392
393 sa = ike_sa->get_unique_id(ike_sa);
394 if (up)
395 {
396 this->lock->read_lock(this->lock);
397 entry = this->channels->get(this->channels, (void*)sa);
398 if (entry)
399 {
400 msg = xpc_dictionary_create(NULL, NULL, 0);
401 xpc_dictionary_set_string(msg, "type", "event");
402 xpc_dictionary_set_string(msg, "event", "up");
403 xpc_connection_send_message(entry->conn, msg);
404 xpc_release(msg);
405 }
406 this->lock->unlock(this->lock);
407 }
408 else
409 {
410 this->lock->write_lock(this->lock);
411 entry = this->channels->remove(this->channels, (void*)sa);
412 this->lock->unlock(this->lock);
413 if (entry)
414 {
415 msg = xpc_dictionary_create(NULL, NULL, 0);
416 xpc_dictionary_set_string(msg, "type", "event");
417 xpc_dictionary_set_string(msg, "event", "down");
418 xpc_connection_send_message(entry->conn, msg);
419 xpc_release(msg);
420 xpc_connection_send_barrier(entry->conn, ^() {
421 destroy_entry(entry);
422 });
423 }
424 }
425 return TRUE;
426 }
427
428 /**
429 * Query password from App using XPC channel
430 */
431 static shared_key_t *query_password(xpc_connection_t conn, identification_t *id)
432 {
433 char buf[128], *password;
434 xpc_object_t request, response;
435 shared_key_t *shared = NULL;
436
437 request = xpc_dictionary_create(NULL, NULL, 0);
438 xpc_dictionary_set_string(request, "type", "rpc");
439 xpc_dictionary_set_string(request, "rpc", "get_password");
440 snprintf(buf, sizeof(buf), "%Y", id);
441 xpc_dictionary_set_string(request, "username", buf);
442
443 response = xpc_connection_send_message_with_reply_sync(conn, request);
444 xpc_release(request);
445 if (xpc_get_type(response) == XPC_TYPE_DICTIONARY)
446 {
447 password = (char*)xpc_dictionary_get_string(response, "password");
448 if (password)
449 {
450 shared = shared_key_create(SHARED_EAP,
451 chunk_clone(chunk_from_str(password)));
452 }
453 }
454 xpc_release(response);
455 return shared;
456 }
457
458 /**
459 * Password query callback
460 */
461 static shared_key_t* password_cb(private_xpc_channels_t *this,
462 shared_key_type_t type,
463 identification_t *me, identification_t *other,
464 id_match_t *match_me, id_match_t *match_other)
465 {
466 shared_key_t *shared = NULL;
467 ike_sa_t *ike_sa;
468 entry_t *entry;
469 uint32_t sa;
470
471 switch (type)
472 {
473 case SHARED_EAP:
474 break;
475 default:
476 return NULL;
477 }
478 ike_sa = charon->bus->get_sa(charon->bus);
479 if (ike_sa)
480 {
481 sa = ike_sa->get_unique_id(ike_sa);
482 this->lock->read_lock(this->lock);
483 entry = this->channels->get(this->channels, (void*)(uintptr_t)sa);
484 if (entry && !entry->passworded)
485 {
486 entry->passworded = TRUE;
487
488 shared = query_password(entry->conn, me);
489 if (shared)
490 {
491 if (match_me)
492 {
493 *match_me = ID_MATCH_PERFECT;
494 }
495 if (match_other)
496 {
497 *match_other = ID_MATCH_PERFECT;
498 }
499 }
500 }
501 this->lock->unlock(this->lock);
502 }
503 return shared;
504 }
505
506 METHOD(xpc_channels_t, destroy, void,
507 private_xpc_channels_t *this)
508 {
509 lib->credmgr->remove_set(lib->credmgr, &this->creds->set);
510 this->creds->destroy(this->creds);
511 this->channels->destroy(this->channels);
512 this->lock->destroy(this->lock);
513 free(this);
514 }
515
516 /**
517 * See header
518 */
519 xpc_channels_t *xpc_channels_create()
520 {
521 private_xpc_channels_t *this;
522
523 INIT(this,
524 .public = {
525 .listener = {
526 .alert = _alert,
527 .ike_updown = _ike_updown,
528 .ike_rekey = _ike_rekey,
529 .ike_state_change = _ike_state_change,
530 .child_updown = _child_updown,
531 },
532 .add = _add,
533 .destroy = _destroy,
534 },
535 .channels = hashtable_create(hashtable_hash_ptr,
536 hashtable_equals_ptr, 4),
537 .lock = rwlock_create(RWLOCK_TYPE_DEFAULT),
538 );
539
540 this->creds = callback_cred_create_shared(
541 (callback_cred_shared_cb_t)password_cb, this);
542 lib->credmgr->add_set(lib->credmgr, &this->creds->set);
543
544 return &this->public;
545 }