15661a2ec77bfceaa5ecbda839f792c36f116102
[strongswan.git] / src / stroke / stroke.c
1 /* Stroke for charon is the counterpart to whack from pluto
2 * Copyright (C) 2006 Martin Willi - Hochschule fuer Technik Rapperswil
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms of the GNU General Public License as published by the
6 * Free Software Foundation; either version 2 of the License, or (at your
7 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
8 *
9 * This program is distributed in the hope that it will be useful, but
10 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
11 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12 * for more details.
13 */
14
15 #include <stdlib.h>
16 #include <sys/types.h>
17 #include <sys/stat.h>
18 #include <sys/socket.h>
19 #include <sys/un.h>
20 #include <sys/fcntl.h>
21 #include <unistd.h>
22 #include <dirent.h>
23 #include <errno.h>
24 #include <stdio.h>
25 #include <linux/stddef.h>
26
27 #include <types.h>
28
29 #include "stroke.h"
30 #include "stroke_keywords.h"
31
32 struct stroke_token {
33 char *name;
34 stroke_keyword_t kw;
35 };
36
37 static char* push_string(stroke_msg_t *msg, char *string)
38 {
39 u_int string_start = msg->length;
40
41 if (string == NULL || msg->length + strlen(string) >= sizeof(stroke_msg_t))
42 {
43 return NULL;
44 }
45 else
46 {
47 msg->length += strlen(string) + 1;
48 strcpy((char*)msg + string_start, string);
49 return (char*)string_start;
50 }
51 }
52
53 static int send_stroke_msg (stroke_msg_t *msg)
54 {
55 struct sockaddr_un ctl_addr = { AF_UNIX, STROKE_SOCKET };
56 int sock;
57 char buffer[64];
58 int byte_count;
59
60 sock = socket(AF_UNIX, SOCK_STREAM, 0);
61 if (sock < 0)
62 {
63 fprintf(stderr, "Opening unix socket %s: %s\n", STROKE_SOCKET, strerror(errno));
64 return -1;
65 }
66 if (connect(sock, (struct sockaddr *)&ctl_addr,
67 offsetof(struct sockaddr_un, sun_path) + strlen(ctl_addr.sun_path)) < 0)
68 {
69 fprintf(stderr, "Connect to socket failed: %s\n", strerror(errno));
70 close(sock);
71 return -1;
72 }
73
74 /* send message */
75 if (write(sock, msg, msg->length) != msg->length)
76 {
77 fprintf(stderr, "writing to socket failed: %s\n", strerror(errno));
78 close(sock);
79 return -1;
80 }
81
82 while ((byte_count = read(sock, buffer, sizeof(buffer)-1)) > 0)
83 {
84 buffer[byte_count] = '\0';
85 printf("%s", buffer);
86 }
87 if (byte_count < 0)
88 {
89 fprintf(stderr, "reading from socket failed: %s\n", strerror(errno));
90 }
91
92 close(sock);
93 return 0;
94 }
95
96 static int add_connection(char *name,
97 char *my_id, char *other_id,
98 char *my_addr, char *other_addr,
99 char *my_net, char *other_net,
100 u_int my_netmask, u_int other_netmask)
101 {
102 stroke_msg_t msg;
103
104 msg.length = offsetof(stroke_msg_t, buffer);
105 msg.type = STR_ADD_CONN;
106
107 msg.add_conn.name = push_string(&msg, name);
108 msg.add_conn.ikev2 = 1;
109
110 msg.add_conn.rekey.ipsec_lifetime = 0;
111 msg.add_conn.rekey.ike_lifetime = 0;
112 msg.add_conn.rekey.margin = 0;
113 msg.add_conn.rekey.tries = 0;
114 msg.add_conn.rekey.fuzz = 0;
115
116 msg.add_conn.algorithms.ike = NULL;
117 msg.add_conn.algorithms.esp = NULL;
118
119 msg.add_conn.me.id = push_string(&msg, my_id);
120 msg.add_conn.me.address = push_string(&msg, my_addr);
121 msg.add_conn.me.subnet = push_string(&msg, my_net);
122 msg.add_conn.me.subnet_mask = my_netmask;
123 msg.add_conn.me.cert = NULL;
124 msg.add_conn.me.ca = NULL;
125 msg.add_conn.me.sendcert = 1;
126 msg.add_conn.me.protocol = 0;
127 msg.add_conn.me.port = 0;
128
129 msg.add_conn.other.id = push_string(&msg, other_id);
130 msg.add_conn.other.address = push_string(&msg, other_addr);
131 msg.add_conn.other.subnet = push_string(&msg, other_net);
132 msg.add_conn.other.subnet_mask = other_netmask;
133 msg.add_conn.other.cert = NULL;
134 msg.add_conn.other.ca = NULL;
135 msg.add_conn.other.sendcert = 1;
136 msg.add_conn.other.protocol = 0;
137 msg.add_conn.other.port = 0;
138
139 return send_stroke_msg(&msg);
140 }
141
142 static int del_connection(char *name)
143 {
144 stroke_msg_t msg;
145
146 msg.length = offsetof(stroke_msg_t, buffer);
147 msg.type = STR_DEL_CONN;
148 msg.initiate.name = push_string(&msg, name);
149 return send_stroke_msg(&msg);
150 }
151
152 static int initiate_connection(char *name)
153 {
154 stroke_msg_t msg;
155
156 msg.length = offsetof(stroke_msg_t, buffer);
157 msg.type = STR_INITIATE;
158 msg.initiate.name = push_string(&msg, name);
159 return send_stroke_msg(&msg);
160 }
161
162 static int terminate_connection(char *name)
163 {
164 stroke_msg_t msg;
165
166 msg.type = STR_TERMINATE;
167 msg.length = offsetof(stroke_msg_t, buffer);
168 msg.initiate.name = push_string(&msg, name);
169 return send_stroke_msg(&msg);
170 }
171
172 static int show_status(stroke_keyword_t kw, char *connection)
173 {
174 stroke_msg_t msg;
175
176 msg.type = (kw == STROKE_STATUS)? STR_STATUS:STR_STATUS_ALL;
177 msg.length = offsetof(stroke_msg_t, buffer);
178 msg.status.name = push_string(&msg, connection);
179 return send_stroke_msg(&msg);
180 }
181
182 static int list_flags[] = {
183 LIST_CERTS,
184 LIST_CACERTS,
185 LIST_CRLS,
186 LIST_ALL
187 };
188
189 static int list(stroke_keyword_t kw, bool utc)
190 {
191 stroke_msg_t msg;
192
193 msg.type = STR_LIST;
194 msg.length = offsetof(stroke_msg_t, buffer);
195 msg.list.utc = utc;
196 msg.list.flags = list_flags[kw - STROKE_LIST_FIRST];
197 return send_stroke_msg(&msg);
198 }
199
200 static int reread_flags[] = {
201 REREAD_CACERTS,
202 REREAD_CRLS,
203 REREAD_ALL
204 };
205
206 static int reread(stroke_keyword_t kw)
207 {
208 stroke_msg_t msg;
209
210 msg.type = STR_REREAD;
211 msg.length = offsetof(stroke_msg_t, buffer);
212 msg.reread.flags = reread_flags[kw - STROKE_REREAD_FIRST];
213 return send_stroke_msg(&msg);
214 }
215
216 static int set_logtype(char *context, char *type, int enable)
217 {
218 stroke_msg_t msg;
219
220 msg.type = STR_LOGTYPE;
221 msg.length = offsetof(stroke_msg_t, buffer);
222 msg.logtype.context = push_string(&msg, context);
223 msg.logtype.type = push_string(&msg, type);
224 msg.logtype.enable = enable;
225 return send_stroke_msg(&msg);
226 }
227
228 static int set_loglevel(char *context, u_int level)
229 {
230 stroke_msg_t msg;
231
232 msg.type = STR_LOGLEVEL;
233 msg.length = offsetof(stroke_msg_t, buffer);
234 msg.loglevel.context = push_string(&msg, context);
235 msg.loglevel.level = level;
236 return send_stroke_msg(&msg);
237 }
238
239 static void exit_error(char *error)
240 {
241 if (error)
242 {
243 fprintf(stderr, "%s\n", error);
244 }
245 exit(-1);
246 }
247
248 static void exit_usage(char *error)
249 {
250 printf("Usage:\n");
251 printf(" Add a connection:\n");
252 printf(" stroke add NAME MY_ID OTHER_ID MY_ADDR OTHER_ADDR\\\n");
253 printf(" MY_NET OTHER_NET MY_NETBITS OTHER_NETBITS\n");
254 printf(" where: ID is any IKEv2 ID \n");
255 printf(" ADDR is a IPv4 address\n");
256 printf(" NET is a IPv4 address of the subnet to tunnel\n");
257 printf(" NETBITS is the size of the subnet, as the \"24\" in 192.168.0.0/24\n");
258 printf(" Delete a connection:\n");
259 printf(" stroke delete NAME\n");
260 printf(" where: NAME is a connection name added with \"stroke add\"\n");
261 printf(" Initiate a connection:\n");
262 printf(" stroke up NAME\n");
263 printf(" where: NAME is a connection name added with \"stroke add\"\n");
264 printf(" Terminate a connection:\n");
265 printf(" stroke down NAME\n");
266 printf(" where: NAME is a connection name added with \"stroke add\"\n");
267 printf(" Set logtype for a logging context:\n");
268 printf(" stroke logtype CONTEXT TYPE ENABLE\n");
269 printf(" where: CONTEXT is PARSR|GNRAT|IKESA|SAMGR|CHDSA|MESSG|TPOOL|WORKR|SCHED|\n");
270 printf(" SENDR|RECVR|SOCKT|TESTR|DAEMN|CONFG|ENCPL|PAYLD\n");
271 printf(" TYPE is CONTROL|ERROR|AUDIT|RAW|PRIVATE\n");
272 printf(" ENABLE is 0|1\n");
273 printf(" Set loglevel for a logging context:\n");
274 printf(" stroke loglevel CONTEXT LEVEL\n");
275 printf(" where: CONTEXT is PARSR|GNRAT|IKESA|SAMGR|CHDSA|MESSG|TPOOL|WORKR|SCHED|\n");
276 printf(" SENDR|RECVR|SOCKT|TESTR|DAEMN|CONFG|ENCPL|PAYLD\n");
277 printf(" LEVEL is 0|1|2|3\n");
278 printf(" Show connection status:\n");
279 printf(" stroke status\n");
280 printf(" Show list of locally loaded certificates and crls:\n");
281 printf(" stroke listcerts|listcacerts|listcrls|listall\n");
282 printf(" Reload ca certificates and crls:\n");
283 printf(" stroke rereadcacerts|rereadcrls|rereadall\n");
284 exit_error(error);
285 }
286
287 int main(int argc, char *argv[])
288 {
289 const stroke_token_t *token;
290 int res = 0;
291
292 if (argc < 2)
293 {
294 exit_usage(NULL);
295 }
296
297 token = in_word_set(argv[1], strlen(argv[1]));
298
299 if (token == NULL)
300 {
301 exit_usage("unknown keyword");
302 }
303
304 switch (token->kw)
305 {
306 case STROKE_ADD:
307 if (argc < 11)
308 {
309 exit_usage("\"add\" needs more parameters...");
310 }
311 res = add_connection(argv[2],
312 argv[3], argv[4],
313 argv[5], argv[6],
314 argv[7], argv[8],
315 atoi(argv[9]), atoi(argv[10]));
316 break;
317 case STROKE_DELETE:
318 case STROKE_DEL:
319 if (argc < 3)
320 {
321 exit_usage("\"delete\" needs a connection name");
322 }
323 res = del_connection(argv[2]);
324 break;
325 case STROKE_UP:
326 if (argc < 3)
327 {
328 exit_usage("\"up\" needs a connection name");
329 }
330 res = initiate_connection(argv[2]);
331 break;
332 case STROKE_DOWN:
333 if (argc < 3)
334 {
335 exit_usage("\"down\" needs a connection name");
336 }
337 res = terminate_connection(argv[2]);
338 break;
339 case STROKE_LOGTYPE:
340 if (argc < 5)
341 {
342 exit_usage("\"logtype\" needs more parameters...");
343 }
344 res = set_logtype(argv[2], argv[3], atoi(argv[4]));
345 break;
346 case STROKE_LOGLEVEL:
347 if (argc < 4)
348 {
349 exit_usage("\"logtype\" needs more parameters...");
350 }
351 res = set_loglevel(argv[2], atoi(argv[3]));
352 break;
353 case STROKE_STATUS:
354 case STROKE_STATUSALL:
355 res = show_status(token->kw, argc > 2 ? argv[2] : NULL);
356 break;
357 case STROKE_LIST_CERTS:
358 case STROKE_LIST_CACERTS:
359 case STROKE_LIST_CRLS:
360 case STROKE_LIST_ALL:
361 res = list(token->kw, argc > 2 && streq(argv[2], "--utc"));
362 break;
363 case STROKE_REREAD_CACERTS:
364 case STROKE_REREAD_CRLS:
365 case STROKE_REREAD_ALL:
366 res = reread(token->kw);
367 break;
368 default:
369 exit_usage(NULL);
370 }
371 return res;
372 }