getpass(3) is not supported on Android.
[strongswan.git] / src / stroke / stroke.c
1 /* Stroke for charon is the counterpart to whack from pluto
2 * Copyright (C) 2007 Tobias Brunner
3 * Copyright (C) 2006 Martin Willi
4 * Hochschule fuer Technik Rapperswil
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2 of the License, or (at your
9 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
10 *
11 * This program is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
13 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14 * for more details.
15 */
16
17 #include <stdlib.h>
18 #include <sys/types.h>
19 #include <sys/stat.h>
20 #include <sys/socket.h>
21 #include <sys/un.h>
22 #include <unistd.h>
23 #include <dirent.h>
24 #include <errno.h>
25 #include <stdio.h>
26 #include <stddef.h>
27 #include <string.h>
28
29 #include <library.h>
30
31 #include "stroke_msg.h"
32 #include "stroke_keywords.h"
33
34 struct stroke_token {
35 char *name;
36 stroke_keyword_t kw;
37 };
38
39 static char* push_string(stroke_msg_t *msg, char *string)
40 {
41 unsigned long string_start = msg->length;
42
43 if (string == NULL || msg->length + strlen(string) >= sizeof(stroke_msg_t))
44 {
45 return NULL;
46 }
47 else
48 {
49 msg->length += strlen(string) + 1;
50 strcpy((char*)msg + string_start, string);
51 return (char*)string_start;
52 }
53 }
54
55 static int send_stroke_msg (stroke_msg_t *msg)
56 {
57 struct sockaddr_un ctl_addr;
58 int sock, byte_count;
59 char buffer[512], *pass;
60
61 ctl_addr.sun_family = AF_UNIX;
62 strcpy(ctl_addr.sun_path, STROKE_SOCKET);
63
64 msg->output_verbosity = 1; /* CONTROL */
65
66 sock = socket(AF_UNIX, SOCK_STREAM, 0);
67 if (sock < 0)
68 {
69 fprintf(stderr, "Opening unix socket %s: %s\n", STROKE_SOCKET, strerror(errno));
70 return -1;
71 }
72 if (connect(sock, (struct sockaddr *)&ctl_addr,
73 offsetof(struct sockaddr_un, sun_path) + strlen(ctl_addr.sun_path)) < 0)
74 {
75 fprintf(stderr, "Connect to socket failed: %s\n", strerror(errno));
76 close(sock);
77 return -1;
78 }
79
80 /* send message */
81 if (write(sock, msg, msg->length) != msg->length)
82 {
83 fprintf(stderr, "writing to socket failed: %s\n", strerror(errno));
84 close(sock);
85 return -1;
86 }
87
88 while ((byte_count = read(sock, buffer, sizeof(buffer)-1)) > 0)
89 {
90 buffer[byte_count] = '\0';
91
92 /* we prompt if we receive the "Passphrase:"/"PIN:" magic keyword */
93 if ((byte_count >= 12 &&
94 strcmp(buffer + byte_count - 12, "Passphrase:\n") == 0) ||
95 (byte_count >= 5 &&
96 strcmp(buffer + byte_count - 5, "PIN:\n") == 0))
97 {
98 /* remove trailing newline */
99 pass = strrchr(buffer, '\n');
100 if (pass)
101 {
102 *pass = ' ';
103 }
104 #ifdef HAVE_GETPASS
105 pass = getpass(buffer);
106 #else
107 pass = "";
108 #endif
109 if (pass)
110 {
111 ignore_result(write(sock, pass, strlen(pass)));
112 ignore_result(write(sock, "\n", 1));
113 }
114 }
115 else
116 {
117 printf("%s", buffer);
118 }
119 }
120 if (byte_count < 0)
121 {
122 fprintf(stderr, "reading from socket failed: %s\n", strerror(errno));
123 }
124
125 close(sock);
126 return 0;
127 }
128
129 static int add_connection(char *name,
130 char *my_id, char *other_id,
131 char *my_addr, char *other_addr,
132 char *my_nets, char *other_nets)
133 {
134 stroke_msg_t msg;
135
136 memset(&msg, 0, sizeof(msg));
137 msg.length = offsetof(stroke_msg_t, buffer);
138 msg.type = STR_ADD_CONN;
139
140 msg.add_conn.name = push_string(&msg, name);
141 msg.add_conn.ikev2 = 1;
142 msg.add_conn.auth_method = 2;
143 msg.add_conn.mode = 1;
144 msg.add_conn.mobike = 1;
145 msg.add_conn.dpd.action = 1;
146
147 msg.add_conn.me.id = push_string(&msg, my_id);
148 msg.add_conn.me.address = push_string(&msg, my_addr);
149 msg.add_conn.me.ikeport = 500;
150 msg.add_conn.me.subnets = push_string(&msg, my_nets);
151 msg.add_conn.me.sendcert = 1;
152
153 msg.add_conn.other.id = push_string(&msg, other_id);
154 msg.add_conn.other.address = push_string(&msg, other_addr);
155 msg.add_conn.other.ikeport = 500;
156 msg.add_conn.other.subnets = push_string(&msg, other_nets);
157 msg.add_conn.other.sendcert = 1;
158
159 return send_stroke_msg(&msg);
160 }
161
162 static int del_connection(char *name)
163 {
164 stroke_msg_t msg;
165
166 msg.length = offsetof(stroke_msg_t, buffer);
167 msg.type = STR_DEL_CONN;
168 msg.initiate.name = push_string(&msg, name);
169 return send_stroke_msg(&msg);
170 }
171
172 static int initiate_connection(char *name)
173 {
174 stroke_msg_t msg;
175
176 msg.length = offsetof(stroke_msg_t, buffer);
177 msg.type = STR_INITIATE;
178 msg.initiate.name = push_string(&msg, name);
179 return send_stroke_msg(&msg);
180 }
181
182 static int terminate_connection(char *name)
183 {
184 stroke_msg_t msg;
185
186 msg.type = STR_TERMINATE;
187 msg.length = offsetof(stroke_msg_t, buffer);
188 msg.initiate.name = push_string(&msg, name);
189 return send_stroke_msg(&msg);
190 }
191
192 static int terminate_connection_srcip(char *start, char *end)
193 {
194 stroke_msg_t msg;
195
196 msg.type = STR_TERMINATE_SRCIP;
197 msg.length = offsetof(stroke_msg_t, buffer);
198 msg.terminate_srcip.start = push_string(&msg, start);
199 msg.terminate_srcip.end = push_string(&msg, end);
200 return send_stroke_msg(&msg);
201 }
202
203 static int rekey_connection(char *name)
204 {
205 stroke_msg_t msg;
206
207 msg.type = STR_REKEY;
208 msg.length = offsetof(stroke_msg_t, buffer);
209 msg.rekey.name = push_string(&msg, name);
210 return send_stroke_msg(&msg);
211 }
212
213 static int route_connection(char *name)
214 {
215 stroke_msg_t msg;
216
217 msg.type = STR_ROUTE;
218 msg.length = offsetof(stroke_msg_t, buffer);
219 msg.route.name = push_string(&msg, name);
220 return send_stroke_msg(&msg);
221 }
222
223 static int unroute_connection(char *name)
224 {
225 stroke_msg_t msg;
226
227 msg.type = STR_UNROUTE;
228 msg.length = offsetof(stroke_msg_t, buffer);
229 msg.unroute.name = push_string(&msg, name);
230 return send_stroke_msg(&msg);
231 }
232
233 static int show_status(stroke_keyword_t kw, char *connection)
234 {
235 stroke_msg_t msg;
236
237 switch (kw)
238 {
239 case STROKE_STATUSALL:
240 msg.type = STR_STATUS_ALL;
241 break;
242 case STROKE_STATUSALL_NOBLK:
243 msg.type = STR_STATUS_ALL_NOBLK;
244 break;
245 default:
246 msg.type = STR_STATUS;
247 break;
248 }
249 msg.length = offsetof(stroke_msg_t, buffer);
250 msg.status.name = push_string(&msg, connection);
251 return send_stroke_msg(&msg);
252 }
253
254 static int list_flags[] = {
255 LIST_PUBKEYS,
256 LIST_CERTS,
257 LIST_CACERTS,
258 LIST_OCSPCERTS,
259 LIST_AACERTS,
260 LIST_ACERTS,
261 LIST_GROUPS,
262 LIST_CAINFOS,
263 LIST_CRLS,
264 LIST_OCSP,
265 LIST_ALGS,
266 LIST_ALL
267 };
268
269 static int list(stroke_keyword_t kw, int utc)
270 {
271 stroke_msg_t msg;
272
273 msg.type = STR_LIST;
274 msg.length = offsetof(stroke_msg_t, buffer);
275 msg.list.utc = utc;
276 msg.list.flags = list_flags[kw - STROKE_LIST_FIRST];
277 return send_stroke_msg(&msg);
278 }
279
280 static int reread_flags[] = {
281 REREAD_SECRETS,
282 REREAD_CACERTS,
283 REREAD_OCSPCERTS,
284 REREAD_AACERTS,
285 REREAD_ACERTS,
286 REREAD_CRLS,
287 REREAD_ALL
288 };
289
290 static int reread(stroke_keyword_t kw)
291 {
292 stroke_msg_t msg;
293
294 msg.type = STR_REREAD;
295 msg.length = offsetof(stroke_msg_t, buffer);
296 msg.reread.flags = reread_flags[kw - STROKE_REREAD_FIRST];
297 return send_stroke_msg(&msg);
298 }
299
300 static int purge_flags[] = {
301 PURGE_OCSP,
302 PURGE_CRLS,
303 PURGE_CERTS,
304 PURGE_IKE,
305 };
306
307 static int purge(stroke_keyword_t kw)
308 {
309 stroke_msg_t msg;
310
311 msg.type = STR_PURGE;
312 msg.length = offsetof(stroke_msg_t, buffer);
313 msg.purge.flags = purge_flags[kw - STROKE_PURGE_FIRST];
314 return send_stroke_msg(&msg);
315 }
316
317 static int export_flags[] = {
318 EXPORT_X509,
319 };
320
321 static int export(stroke_keyword_t kw, char *selector)
322 {
323 stroke_msg_t msg;
324
325 msg.type = STR_EXPORT;
326 msg.length = offsetof(stroke_msg_t, buffer);
327 msg.export.selector = push_string(&msg, selector);
328 msg.export.flags = export_flags[kw - STROKE_EXPORT_FIRST];
329 return send_stroke_msg(&msg);
330 }
331
332 static int leases(stroke_keyword_t kw, char *pool, char *address)
333 {
334 stroke_msg_t msg;
335
336 msg.type = STR_LEASES;
337 msg.length = offsetof(stroke_msg_t, buffer);
338 msg.leases.pool = push_string(&msg, pool);
339 msg.leases.address = push_string(&msg, address);
340 return send_stroke_msg(&msg);
341 }
342
343 static int memusage()
344 {
345 stroke_msg_t msg;
346
347 msg.type = STR_MEMUSAGE;
348 msg.length = offsetof(stroke_msg_t, buffer);
349 return send_stroke_msg(&msg);
350 }
351
352 static int set_loglevel(char *type, u_int level)
353 {
354 stroke_msg_t msg;
355
356 msg.type = STR_LOGLEVEL;
357 msg.length = offsetof(stroke_msg_t, buffer);
358 msg.loglevel.type = push_string(&msg, type);
359 msg.loglevel.level = level;
360 return send_stroke_msg(&msg);
361 }
362
363 static void exit_error(char *error)
364 {
365 if (error)
366 {
367 fprintf(stderr, "%s\n", error);
368 }
369 exit(-1);
370 }
371
372 static void exit_usage(char *error)
373 {
374 printf("Usage:\n");
375 printf(" Add a connection:\n");
376 printf(" stroke add NAME MY_ID OTHER_ID MY_ADDR OTHER_ADDR\\\n");
377 printf(" MY_NET OTHER_NET MY_NETBITS OTHER_NETBITS\n");
378 printf(" where: ID is any IKEv2 ID \n");
379 printf(" ADDR is a IPv4 address\n");
380 printf(" NET is a IPv4 subnet in CIDR notation\n");
381 printf(" Delete a connection:\n");
382 printf(" stroke delete NAME\n");
383 printf(" where: NAME is a connection name added with \"stroke add\"\n");
384 printf(" Initiate a connection:\n");
385 printf(" stroke up NAME\n");
386 printf(" where: NAME is a connection name added with \"stroke add\"\n");
387 printf(" Terminate a connection:\n");
388 printf(" stroke down NAME\n");
389 printf(" where: NAME is a connection name added with \"stroke add\"\n");
390 printf(" Terminate a connection by remote srcip:\n");
391 printf(" stroke down-srcip START [END]\n");
392 printf(" where: START and optional END define the clients source IP\n");
393 printf(" Set loglevel for a logging type:\n");
394 printf(" stroke loglevel TYPE LEVEL\n");
395 printf(" where: TYPE is any|dmn|mgr|ike|chd|job|cfg|knl|net|enc|tnc|imc|imv|pts|tls|lib\n");
396 printf(" LEVEL is -1|0|1|2|3|4\n");
397 printf(" Show connection status:\n");
398 printf(" stroke status\n");
399 printf(" Show extended status information:\n");
400 printf(" stroke statusall\n");
401 printf(" Show extended status information without blocking:\n");
402 printf(" stroke statusallnb\n");
403 printf(" Show list of authority and attribute certificates:\n");
404 printf(" stroke listcacerts|listocspcerts|listaacerts|listacerts\n");
405 printf(" Show list of end entity certificates, ca info records and crls:\n");
406 printf(" stroke listcerts|listcainfos|listcrls|listall\n");
407 printf(" Show list of supported algorithms:\n");
408 printf(" stroke listalgs\n");
409 printf(" Reload authority and attribute certificates:\n");
410 printf(" stroke rereadcacerts|rereadocspcerts|rereadaacerts|rereadacerts\n");
411 printf(" Reload secrets and crls:\n");
412 printf(" stroke rereadsecrets|rereadcrls|rereadall\n");
413 printf(" Purge ocsp cache entries:\n");
414 printf(" stroke purgeocsp\n");
415 printf(" Purge CRL cache entries:\n");
416 printf(" stroke purgecrls\n");
417 printf(" Purge X509 cache entries:\n");
418 printf(" stroke purgecerts\n");
419 printf(" Purge IKE_SAs without a CHILD_SA:\n");
420 printf(" stroke purgeike\n");
421 printf(" Export credentials to the console:\n");
422 printf(" stroke exportx509 DN\n");
423 printf(" Show current memory usage:\n");
424 printf(" stroke memusage\n");
425 printf(" Show leases of a pool:\n");
426 printf(" stroke leases [POOL [ADDRESS]]\n");
427 exit_error(error);
428 }
429
430 int main(int argc, char *argv[])
431 {
432 const stroke_token_t *token;
433 int res = 0;
434
435 library_init(NULL);
436 atexit(library_deinit);
437
438 if (argc < 2)
439 {
440 exit_usage(NULL);
441 }
442
443 token = in_word_set(argv[1], strlen(argv[1]));
444
445 if (token == NULL)
446 {
447 exit_usage("unknown keyword");
448 }
449
450 switch (token->kw)
451 {
452 case STROKE_ADD:
453 if (argc < 11)
454 {
455 exit_usage("\"add\" needs more parameters...");
456 }
457 res = add_connection(argv[2],
458 argv[3], argv[4],
459 argv[5], argv[6],
460 argv[7], argv[8]);
461 break;
462 case STROKE_DELETE:
463 case STROKE_DEL:
464 if (argc < 3)
465 {
466 exit_usage("\"delete\" needs a connection name");
467 }
468 res = del_connection(argv[2]);
469 break;
470 case STROKE_UP:
471 if (argc < 3)
472 {
473 exit_usage("\"up\" needs a connection name");
474 }
475 res = initiate_connection(argv[2]);
476 break;
477 case STROKE_DOWN:
478 if (argc < 3)
479 {
480 exit_usage("\"down\" needs a connection name");
481 }
482 res = terminate_connection(argv[2]);
483 break;
484 case STROKE_DOWN_SRCIP:
485 if (argc < 3)
486 {
487 exit_usage("\"down-srcip\" needs start and optional end address");
488 }
489 res = terminate_connection_srcip(argv[2], argc > 3 ? argv[3] : NULL);
490 break;
491 case STROKE_REKEY:
492 if (argc < 3)
493 {
494 exit_usage("\"rekey\" needs a connection name");
495 }
496 res = rekey_connection(argv[2]);
497 break;
498 case STROKE_ROUTE:
499 if (argc < 3)
500 {
501 exit_usage("\"route\" needs a connection name");
502 }
503 res = route_connection(argv[2]);
504 break;
505 case STROKE_UNROUTE:
506 if (argc < 3)
507 {
508 exit_usage("\"unroute\" needs a connection name");
509 }
510 res = unroute_connection(argv[2]);
511 break;
512 case STROKE_LOGLEVEL:
513 if (argc < 4)
514 {
515 exit_usage("\"logtype\" needs more parameters...");
516 }
517 res = set_loglevel(argv[2], atoi(argv[3]));
518 break;
519 case STROKE_STATUS:
520 case STROKE_STATUSALL:
521 case STROKE_STATUSALL_NOBLK:
522 res = show_status(token->kw, argc > 2 ? argv[2] : NULL);
523 break;
524 case STROKE_LIST_PUBKEYS:
525 case STROKE_LIST_CERTS:
526 case STROKE_LIST_CACERTS:
527 case STROKE_LIST_OCSPCERTS:
528 case STROKE_LIST_AACERTS:
529 case STROKE_LIST_ACERTS:
530 case STROKE_LIST_CAINFOS:
531 case STROKE_LIST_CRLS:
532 case STROKE_LIST_OCSP:
533 case STROKE_LIST_ALGS:
534 case STROKE_LIST_ALL:
535 res = list(token->kw, argc > 2 && strcmp(argv[2], "--utc") == 0);
536 break;
537 case STROKE_REREAD_SECRETS:
538 case STROKE_REREAD_CACERTS:
539 case STROKE_REREAD_OCSPCERTS:
540 case STROKE_REREAD_AACERTS:
541 case STROKE_REREAD_ACERTS:
542 case STROKE_REREAD_CRLS:
543 case STROKE_REREAD_ALL:
544 res = reread(token->kw);
545 break;
546 case STROKE_PURGE_OCSP:
547 case STROKE_PURGE_CRLS:
548 case STROKE_PURGE_CERTS:
549 case STROKE_PURGE_IKE:
550 res = purge(token->kw);
551 break;
552 case STROKE_EXPORT_X509:
553 if (argc != 3)
554 {
555 exit_usage("\"exportx509\" needs a distinguished name");
556 }
557 res = export(token->kw, argv[2]);
558 break;
559 case STROKE_LEASES:
560 res = leases(token->kw, argc > 2 ? argv[2] : NULL,
561 argc > 3 ? argv[3] : NULL);
562 break;
563 case STROKE_MEMUSAGE:
564 res = memusage();
565 break;
566 default:
567 exit_usage(NULL);
568 }
569 return res;
570 }