]> git.saurik.com Git - apple/ipsec.git/blame - ipsec-tools/racoon/isakmp_unity.c
ipsec-164.10.tar.gz
[apple/ipsec.git] / ipsec-tools / racoon / isakmp_unity.c
CommitLineData
d1e348cf
A
1/* $NetBSD: isakmp_unity.c,v 1.7 2006/10/09 06:17:20 manu Exp $ */
2
3/* Id: isakmp_unity.c,v 1.10 2006/07/31 04:49:23 manubsd Exp */
52b7d2ce
A
4
5/*
6 * Copyright (C) 2004 Emmanuel Dreyfus
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the project nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#include "config.h"
35
36#include <sys/types.h>
37#include <sys/param.h>
38#include <sys/socket.h>
39#include <sys/queue.h>
40
41#include <netinet/in.h>
42#include <arpa/inet.h>
43
44#include <stdlib.h>
45#include <stdio.h>
46#include <fcntl.h>
47#include <string.h>
48#include <errno.h>
49#if TIME_WITH_SYS_TIME
50# include <sys/time.h>
51# include <time.h>
52#else
53# if HAVE_SYS_TIME_H
54# include <sys/time.h>
55# else
56# include <time.h>
57# endif
58#endif
59#include <netdb.h>
60#ifdef HAVE_UNISTD_H
61#include <unistd.h>
62#endif
63#include <ctype.h>
d1e348cf 64#include <resolv.h>
52b7d2ce
A
65
66#include "var.h"
67#include "misc.h"
68#include "vmbuf.h"
69#include "plog.h"
70#include "sockmisc.h"
71#include "schedule.h"
72#include "debug.h"
73
74#include "isakmp_var.h"
75#include "isakmp.h"
76#include "handler.h"
77#include "isakmp_xauth.h"
78#include "isakmp_unity.h"
79#include "isakmp_cfg.h"
80#include "strnames.h"
81
d1e348cf
A
82static vchar_t *isakmp_cfg_split(struct ph1handle *,
83 struct isakmp_data *, struct unity_netentry*,int);
84
52b7d2ce
A
85vchar_t *
86isakmp_unity_req(iph1, attr)
87 struct ph1handle *iph1;
88 struct isakmp_data *attr;
89{
90 int type;
91 vchar_t *reply_attr = NULL;
92
93 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_UNITY) == 0) {
94 plog(LLV_ERROR, LOCATION, NULL,
95 "Unity mode config request but the peer "
96 "did not declare itself as unity compliant\n");
97 return NULL;
98 }
99
100 type = ntohs(attr->type);
101
102 /* Handle short attributes */
103 if ((type & ISAKMP_GEN_MASK) == ISAKMP_GEN_TV) {
104 type &= ~ISAKMP_GEN_MASK;
105
106 plog(LLV_DEBUG, LOCATION, NULL,
d1e348cf
A
107 "Short attribute %s = %d\n",
108 s_isakmp_cfg_type(type), ntohs(attr->lorv));
52b7d2ce
A
109
110 switch (type) {
111 default:
112 plog(LLV_DEBUG, LOCATION, NULL,
d1e348cf
A
113 "Ignored short attribute %s\n",
114 s_isakmp_cfg_type(type));
52b7d2ce
A
115 break;
116 }
117
118 return reply_attr;
119 }
120
121 switch(type) {
122 case UNITY_BANNER: {
123#define MAXMOTD 65536
124 char buf[MAXMOTD + 1];
125 int fd;
126 char *filename = &isakmp_cfg_config.motd[0];
d1e348cf 127 int len;
52b7d2ce
A
128
129 if ((fd = open(filename, O_RDONLY, 0)) == -1) {
130 plog(LLV_ERROR, LOCATION, NULL,
131 "Cannot open \"%s\"\n", filename);
132 return NULL;
133 }
134
135 if ((len = read(fd, buf, MAXMOTD)) == -1) {
136 plog(LLV_ERROR, LOCATION, NULL,
137 "Cannot read \"%s\"\n", filename);
138 close(fd);
139 return NULL;
140 }
141 close(fd);
142
143 buf[len] = '\0';
144 reply_attr = isakmp_cfg_string(iph1, attr, buf);
145
146 break;
147 }
148
149 case UNITY_PFS:
150 reply_attr = isakmp_cfg_short(iph1, attr,
151 isakmp_cfg_config.pfs_group);
152 break;
153
154 case UNITY_SAVE_PASSWD:
155 reply_attr = isakmp_cfg_short(iph1, attr,
156 isakmp_cfg_config.save_passwd);
157 break;
158
159 case UNITY_DDNS_HOSTNAME:
160 reply_attr = isakmp_cfg_copy(iph1, attr);
161 break;
162
163 case UNITY_DEF_DOMAIN:
d1e348cf
A
164 reply_attr = isakmp_cfg_string(iph1,
165 attr, isakmp_cfg_config.default_domain);
166 break;
167
52b7d2ce 168 case UNITY_SPLIT_INCLUDE:
d1e348cf
A
169 if(isakmp_cfg_config.splitnet_type == UNITY_SPLIT_INCLUDE)
170 reply_attr = isakmp_cfg_split(iph1, attr,
171 isakmp_cfg_config.splitnet_list,
172 isakmp_cfg_config.splitnet_count);
173 else
174 return NULL;
175 break;
176 case UNITY_LOCAL_LAN:
177 if(isakmp_cfg_config.splitnet_type == UNITY_LOCAL_LAN)
178 reply_attr = isakmp_cfg_split(iph1, attr,
179 isakmp_cfg_config.splitnet_list,
180 isakmp_cfg_config.splitnet_count);
181 else
182 return NULL;
183 break;
184 case UNITY_SPLITDNS_NAME:
185 reply_attr = isakmp_cfg_varlen(iph1, attr,
186 isakmp_cfg_config.splitdns_list,
187 isakmp_cfg_config.splitdns_len);
188 break;
189 case UNITY_FW_TYPE:
52b7d2ce
A
190 case UNITY_NATT_PORT:
191 case UNITY_BACKUP_SERVERS:
192 default:
193 plog(LLV_DEBUG, LOCATION, NULL,
d1e348cf 194 "Ignored attribute %s\n", s_isakmp_cfg_type(type));
52b7d2ce
A
195 return NULL;
196 break;
197 }
198
199 return reply_attr;
200}
201
d1e348cf
A
202void
203isakmp_unity_reply(iph1, attr)
204 struct ph1handle *iph1;
205 struct isakmp_data *attr;
206{
207 int type = ntohs(attr->type);
208 int alen = ntohs(attr->lorv);
209
210 type &= ~ISAKMP_GEN_MASK;
211
212 struct unity_network *network = (struct unity_network *)(attr + 1);
213 int index = 0;
214 int count = 0;
215
216 switch(type) {
217 case UNITY_SPLIT_INCLUDE:
218 {
219 if ((iph1->mode_cfg->flags & ISAKMP_CFG_GOT_SPLIT_INCLUDE) == 0) {
220 if (alen)
221 count = alen / sizeof(struct unity_network);
222
223 for(;index < count; index++)
224 splitnet_list_add(
225 &iph1->mode_cfg->split_include,
226 &network[index],
227 &iph1->mode_cfg->include_count);
228
229 iph1->mode_cfg->flags |= ISAKMP_CFG_GOT_SPLIT_INCLUDE;
230 }
231 break;
232 }
233 case UNITY_LOCAL_LAN:
234 {
235 if ((iph1->mode_cfg->flags & ISAKMP_CFG_GOT_SPLIT_LOCAL) == 0) {
236 if (alen)
237 count = alen / sizeof(struct unity_network);
238
239 for(;index < count; index++)
240 splitnet_list_add(
241 &iph1->mode_cfg->split_local,
242 &network[index],
243 &iph1->mode_cfg->local_count);
244
245 iph1->mode_cfg->flags |= ISAKMP_CFG_GOT_SPLIT_LOCAL;
246 }
247 break;
248 }
249 case UNITY_PFS:
250 {
251 break;
252 }
253 case UNITY_SPLITDNS_NAME:
254 case UNITY_BANNER:
255 case UNITY_SAVE_PASSWD:
256 case UNITY_NATT_PORT:
257 case UNITY_FW_TYPE:
258 case UNITY_BACKUP_SERVERS:
259 case UNITY_DDNS_HOSTNAME:
260 default:
261 plog(LLV_WARNING, LOCATION, NULL,
262 "Ignored attribute %s\n",
263 s_isakmp_cfg_type(type));
264 break;
265 }
266 return;
267}
268
269static vchar_t *
270isakmp_cfg_split(iph1, attr, netentry, count)
271 struct ph1handle *iph1;
272 struct isakmp_data *attr;
273 struct unity_netentry *netentry;
274 int count;
275{
276 vchar_t *buffer;
277 struct isakmp_data *new;
278 struct unity_network * network;
279 size_t len;
280 int index = 0;
281
282 char tmp1[40];
283 char tmp2[40];
284
285 len = sizeof(struct unity_network) * count;
286 if ((buffer = vmalloc(sizeof(*attr) + len)) == NULL) {
287 plog(LLV_ERROR, LOCATION, NULL, "Cannot allocate memory\n");
288 return NULL;
289 }
290
291 new = (struct isakmp_data *)buffer->v;
292 new->type = attr->type;
293 new->lorv = htons(len);
294
295 network = (struct unity_network *)(new + 1);
296 for (; index < count; index++) {
297
298 memcpy(&network[index],
299 &netentry->network,
300 sizeof(struct unity_network));
301
302 inet_ntop(AF_INET, &netentry->network.addr4, tmp1, 40);
303 inet_ntop(AF_INET, &netentry->network.mask4, tmp2, 40);
304 plog(LLV_DEBUG, LOCATION, NULL, "splitnet: %s/%s\n", tmp1, tmp2);
305
306 netentry = netentry->next;
307 }
308
309 return buffer;
310}
311
312int splitnet_list_add(list, network, count)
313 struct unity_netentry ** list;
314 struct unity_network * network;
315 int *count;
316{
317 struct unity_netentry * newentry;
318
319 /*
320 * allocate new netentry and copy
321 * new splitnet network data
322 */
323 newentry = (struct unity_netentry *)
324 racoon_malloc(sizeof(struct unity_netentry));
325 if (newentry == NULL)
326 return -1;
327
328 memcpy(&newentry->network,network,
329 sizeof(struct unity_network));
330 newentry->next = NULL;
331
332 /*
333 * locate the last netentry in our
334 * splitnet list and add our entry
335 */
336 if (*list == NULL)
337 *list = newentry;
338 else {
339 struct unity_netentry * tmpentry = *list;
340 while (tmpentry->next != NULL)
341 tmpentry = tmpentry->next;
342 tmpentry->next = newentry;
343 }
344
345 (*count)++;
346
347 return 0;
348}
52b7d2ce 349
d1e348cf
A
350void splitnet_list_free(list, count)
351 struct unity_netentry * list;
352 int *count;
353{
354 struct unity_netentry * netentry = list;
355 struct unity_netentry * delentry;
356
357 *count = 0;
358
359 while (netentry != NULL) {
360 delentry = netentry;
361 netentry = netentry->next;
362 racoon_free(delentry);
363 }
364}
365
366char * splitnet_list_2str(list)
367 struct unity_netentry * list;
368{
369 struct unity_netentry * netentry;
370 char tmp1[40];
371 char tmp2[40];
372 char * str;
373 int len;
374 int print_len;
375 int rc;
376
377 /* determine string length */
378 len = 0;
379 netentry = list;
380 while (netentry != NULL) {
381
382 inet_ntop(AF_INET, &netentry->network.addr4, tmp1, 40);
383 inet_ntop(AF_INET, &netentry->network.mask4, tmp2, 40);
384 len += strlen(tmp1);
385 len += strlen(tmp2);
386 len += 2;
387
388 netentry = netentry->next;
389 }
390
391 /* allocate network list string */
392 str = racoon_malloc(len);
393 if (str == NULL)
394 return NULL;
395
396 /* create network list string */
397 str[0] = 0;
398 print_len = 0;
399 netentry = list;
400 while (netentry != NULL && print_len < len) {
401
402 inet_ntop(AF_INET, &netentry->network.addr4, tmp1, 40);
403 inet_ntop(AF_INET, &netentry->network.mask4, tmp2, 40);
404
405 rc = snprintf(str+print_len, len-print_len, "%s/%s ", tmp1, tmp2);
406 if (rc < 0) {
407 // failure -> exit loop
408 break;
409 }
410 print_len += rc;
411
412 netentry = netentry->next;
413 }
414
415 return str;
416}