1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 * 21 * Copyright (c) 2001, 2010, Oracle and/or its affiliates. All rights reserved. 22 */ 23 24 #include <unistd.h> 25 #include <stdio.h> 26 #include <stdarg.h> 27 #include <stdlib.h> 28 #include <sys/sysconf.h> 29 #include <string.h> 30 #include <strings.h> 31 #include <libintl.h> 32 #include <locale.h> 33 #include <ctype.h> 34 #include <time.h> 35 #include <sys/sysmacros.h> 36 #include <sys/stat.h> 37 #include <sys/mman.h> 38 #include <fcntl.h> 39 #include <sys/socket.h> 40 #include <netdb.h> 41 #include <errno.h> 42 #include <assert.h> 43 #include <netinet/in.h> 44 #include <arpa/inet.h> 45 #include <door.h> 46 #include <setjmp.h> 47 48 #include <ipsec_util.h> 49 #include <ikedoor.h> 50 51 static int doorfd = -1; 52 53 /* 54 * These are additional return values for the command line parsing 55 * function (parsecmd()). They are specific to this utility, but 56 * need to share the same space as the IKE_SVC_* defs, without conflicts. 57 * So they're defined relative to the end of that range. 58 */ 59 #define IKEADM_HELP_GENERAL IKE_SVC_MAX + 1 60 #define IKEADM_HELP_GET IKE_SVC_MAX + 2 61 #define IKEADM_HELP_SET IKE_SVC_MAX + 3 62 #define IKEADM_HELP_ADD IKE_SVC_MAX + 4 63 #define IKEADM_HELP_DEL IKE_SVC_MAX + 5 64 #define IKEADM_HELP_DUMP IKE_SVC_MAX + 6 65 #define IKEADM_HELP_FLUSH IKE_SVC_MAX + 7 66 #define IKEADM_HELP_READ IKE_SVC_MAX + 8 67 #define IKEADM_HELP_WRITE IKE_SVC_MAX + 9 68 #define IKEADM_HELP_TOKEN IKE_SVC_MAX + 10 69 #define IKEADM_HELP_HELP IKE_SVC_MAX + 11 70 #define IKEADM_EXIT IKE_SVC_MAX + 12 71 72 /* 73 * Disable default TAB completion for now (until some brave soul tackles it). 74 */ 75 /* ARGSUSED */ 76 static 77 CPL_MATCH_FN(no_match) 78 { 79 return (0); 80 } 81 82 static void command_complete(int s) __NORETURN; 83 static void usage(void) __NORETURN; 84 85 static void 86 command_complete(int s) 87 { 88 if (interactive) { 89 longjmp(env, 1); 90 } else { 91 exit(s); 92 } 93 } 94 95 static void 96 usage(void) 97 { 98 if (!interactive) { 99 (void) fprintf(stderr, gettext("Usage:\t" 100 "ikeadm [ -hnp ] cmd obj [cmd-specific options]\n")); 101 (void) fprintf(stderr, gettext(" \tikeadm help\n")); 102 } else { 103 (void) fprintf(stderr, 104 gettext("\nType help for usage info\n")); 105 } 106 107 command_complete(1); 108 } 109 110 static void 111 print_help() 112 { 113 (void) printf(gettext("Valid commands and objects:\n")); 114 (void) printf( 115 "\tget debug|priv|stats|p1|rule|preshared|defaults [%s]\n", 116 gettext("identifier")); 117 (void) printf("\tset priv %s\n", gettext("level")); 118 (void) printf("\tset debug %s [%s]\n", 119 gettext("level"), gettext("filename")); 120 (void) printf("\tadd rule|preshared {%s}|%s\n", 121 gettext("definition"), gettext("filename")); 122 (void) printf("\tdel p1|rule|preshared %s\n", gettext("identifier")); 123 (void) printf("\tdump p1|rule|preshared|certcache|groups|" 124 "encralgs|authalgs\n"); 125 (void) printf("\tflush p1|certcache\n"); 126 (void) printf("\tread rule|preshared [%s]\n", gettext("filename")); 127 (void) printf("\twrite rule|preshared %s\n", gettext("filename")); 128 (void) printf("\ttoken <login|logout> %s\n", 129 gettext("<PKCS#11 Token Object>")); 130 (void) printf( 131 "\thelp [get|set|add|del|dump|flush|read|write|token|help]\n"); 132 (void) printf("\texit %s\n", gettext("exit the program")); 133 (void) printf("\tquit %s\n", gettext("exit the program")); 134 135 command_complete(0); 136 } 137 138 static void 139 print_get_help() 140 { 141 (void) printf( 142 gettext("This command gets information from in.iked.\n\n")); 143 (void) printf(gettext("Objects that may be retrieved include:\n")); 144 (void) printf("\tdebug\t\t"); 145 (void) printf(gettext("the current debug level\n")); 146 (void) printf("\tpriv\t\t"); 147 (void) printf(gettext("the current privilege level\n")); 148 (void) printf("\tstats\t\t"); 149 (void) printf(gettext("current usage statistics\n")); 150 (void) printf("\tp1\t\t"); 151 (void) printf(gettext("a phase 1 SA, identified by\n")); 152 (void) printf(gettext("\t\t\t local_ip remote_ip OR\n")); 153 (void) printf(gettext("\t\t\t init_cookie resp_cookie\n")); 154 (void) printf("\trule\t\t"); 155 (void) printf(gettext("a phase 1 rule, identified by its label\n")); 156 (void) printf("\tpreshared\t"); 157 (void) printf(gettext("a preshared key, identified by\n")); 158 (void) printf(gettext("\t\t\t local_ip remote_ip OR\n")); 159 (void) printf(gettext("\t\t\t local_id remote_id\n")); 160 (void) printf("\n"); 161 162 command_complete(0); 163 } 164 165 static void 166 print_set_help() 167 { 168 (void) printf(gettext("This command sets values in in.iked.\n\n")); 169 (void) printf(gettext("Objects that may be set include:\n")); 170 (void) printf("\tdebug\t\t"); 171 (void) printf(gettext("change the debug level\n")); 172 (void) printf("\tpriv\t\t"); 173 (void) printf( 174 gettext("change the privilege level (may only be lowered)\n")); 175 (void) printf("\n"); 176 177 command_complete(0); 178 } 179 180 static void 181 print_add_help() 182 { 183 (void) printf( 184 gettext("This command adds items to in.iked's tables.\n\n")); 185 (void) printf(gettext("Objects that may be set include:\n")); 186 (void) printf("\trule\t\t"); 187 (void) printf(gettext("a phase 1 policy rule\n")); 188 (void) printf("\tpreshared\t"); 189 (void) printf(gettext("a preshared key\n")); 190 (void) printf( 191 gettext("\nObjects may be entered on the command-line, as a\n")); 192 (void) printf( 193 gettext("series of keywords and tokens contained in curly\n")); 194 (void) printf( 195 gettext("braces ('{', '}'); or the name of a file containing\n")); 196 (void) printf(gettext("the object definition may be provided.\n\n")); 197 (void) printf( 198 gettext("For security purposes, preshared keys may only be\n")); 199 (void) printf( 200 gettext("entered on the command-line if ikeadm is running in\n")); 201 (void) printf(gettext("interactive mode.\n")); 202 (void) printf("\n"); 203 204 command_complete(0); 205 } 206 207 static void 208 print_del_help() 209 { 210 (void) printf( 211 gettext("This command deletes an item from in.iked's tables.\n\n")); 212 (void) printf(gettext("Objects that may be deleted include:\n")); 213 (void) printf("\tp1\t\t"); 214 (void) printf(gettext("a phase 1 SA, identified by\n")); 215 (void) printf(gettext("\t\t\t local_ip remote_ip OR\n")); 216 (void) printf(gettext("\t\t\t init_cookie resp_cookie\n")); 217 (void) printf("\trule\t\t"); 218 (void) printf(gettext("a phase 1 rule, identified by its label\n")); 219 (void) printf("\tpreshared\t"); 220 (void) printf(gettext("a preshared key, identified by\n")); 221 (void) printf(gettext("\t\t\t local_ip remote_ip OR\n")); 222 (void) printf(gettext("\t\t\t local_id remote_id\n")); 223 (void) printf("\n"); 224 225 command_complete(0); 226 } 227 228 static void 229 print_dump_help() 230 { 231 (void) printf( 232 gettext("This command dumps one of in.iked's tables.\n\n")); 233 (void) printf(gettext("Tables that may be dumped include:\n")); 234 (void) printf("\tp1\t\t"); 235 (void) printf(gettext("all phase 1 SAs\n")); 236 (void) printf("\trule\t\t"); 237 (void) printf(gettext("all phase 1 rules\n")); 238 (void) printf("\tpreshared\t"); 239 (void) printf(gettext("all preshared keys\n")); 240 (void) printf("\tcertcache\t"); 241 (void) printf(gettext("all cached certificates\n")); 242 (void) printf("\tgroups\t\t"); 243 (void) printf(gettext("all implemented Diffie-Hellman groups\n")); 244 (void) printf("\tencralgs\t"); 245 (void) printf(gettext("all encryption algorithms for IKE\n")); 246 (void) printf("\tauthalgs\t"); 247 (void) printf(gettext("all authentication algorithms IKE\n")); 248 (void) printf("\n"); 249 250 command_complete(0); 251 } 252 253 static void 254 print_flush_help() 255 { 256 (void) printf( 257 gettext("This command clears one of in.iked's tables.\n\n")); 258 (void) printf(gettext("Tables that may be flushed include:\n")); 259 (void) printf("\tp1\t\t"); 260 (void) printf(gettext("all phase 1 SAs\n")); 261 (void) printf("\tcertcache\t"); 262 (void) printf(gettext("all cached certificates\n")); 263 (void) printf("\n"); 264 265 command_complete(0); 266 } 267 268 static void 269 print_read_help() 270 { 271 (void) printf( 272 gettext("This command reads a new configuration file into\n")); 273 (void) printf( 274 gettext("in.iked, discarding the old configuration info.\n\n")); 275 (void) printf(gettext("Sets of data that may be read include:\n")); 276 (void) printf("\trule\t\t"); 277 (void) printf(gettext("all phase 1 rules\n")); 278 (void) printf("\tpreshared\t"); 279 (void) printf(gettext("all preshared keys\n\n")); 280 (void) printf( 281 gettext("A filename may be provided to specify a source file\n")); 282 (void) printf(gettext("other than the default.\n")); 283 (void) printf("\n"); 284 285 command_complete(0); 286 } 287 288 static void 289 print_write_help() 290 { 291 (void) printf( 292 gettext("This command writes in.iked's current configuration\n")); 293 (void) printf(gettext("out to a config file.\n\n")); 294 (void) printf(gettext("Sets of data that may be written include:\n")); 295 (void) printf("\trule\t\t"); 296 (void) printf(gettext("all phase 1 rules\n")); 297 (void) printf("\tpreshared\t"); 298 (void) printf(gettext("all preshared keys\n\n")); 299 (void) printf( 300 gettext("A filename must be provided to specify the file to\n")); 301 (void) printf(gettext("which the information should be written.\n")); 302 (void) printf("\n"); 303 304 command_complete(0); 305 } 306 307 static void 308 print_token_help() 309 { 310 (void) printf(gettext( 311 "This command logs IKE into and out of PKCS#11 tokens.\n\n")); 312 (void) printf(gettext("Commands include:\n")); 313 (void) printf("\tlogin <PKCS#11 Token Object>\t"); 314 (void) printf(gettext("log into token\n")); 315 (void) printf("\tlogout <PKCS#11 Token Object>\t"); 316 (void) printf(gettext("log out of token\n\n")); 317 (void) printf( 318 gettext("The PKCS#11 Token Object name must be " 319 "enclosed in quotation marks.\n")); 320 (void) printf("\n"); 321 322 command_complete(0); 323 } 324 325 static void 326 print_help_help() 327 { 328 (void) printf( 329 gettext("This command provides information about commands.\n\n")); 330 (void) printf( 331 gettext("The 'help' command alone provides a list of valid\n")); 332 (void) printf( 333 gettext("commands, along with the valid objects for each.\n")); 334 (void) printf( 335 gettext("'help' followed by a valid command name provides\n")); 336 (void) printf(gettext("further information about that command.\n")); 337 (void) printf("\n"); 338 339 command_complete(0); 340 } 341 342 /*PRINTFLIKE1*/ 343 static void 344 message(char *fmt, ...) 345 { 346 va_list ap; 347 char msgbuf[BUFSIZ]; 348 349 va_start(ap, fmt); 350 (void) vsnprintf(msgbuf, BUFSIZ, fmt, ap); 351 (void) fprintf(stderr, gettext("ikeadm: %s\n"), msgbuf); 352 va_end(ap); 353 } 354 355 static int 356 open_door(void) 357 { 358 if (doorfd >= 0) 359 (void) close(doorfd); 360 doorfd = open(DOORNM, O_RDONLY); 361 return (doorfd); 362 } 363 364 static ike_service_t * 365 ikedoor_call(char *reqp, int size, door_desc_t *descp, int ndesc) 366 { 367 door_arg_t arg; 368 int retries = 0; 369 370 arg.data_ptr = reqp; 371 arg.data_size = size; 372 arg.desc_ptr = descp; 373 arg.desc_num = ndesc; 374 arg.rbuf = (char *)NULL; 375 arg.rsize = 0; 376 377 retry: 378 if (door_call(doorfd, &arg) < 0) { 379 if ((errno == EBADF) && ((++retries < 2) && 380 (open_door() >= 0))) 381 goto retry; 382 (void) fprintf(stderr, 383 gettext("Unable to communicate with in.iked\n")); 384 Bail("door_call failed"); 385 } 386 387 if ((ndesc > 0) && (descp->d_attributes & DOOR_RELEASE) && 388 ((errno == EBADF) || (errno == EFAULT))) { 389 /* callers assume passed fds will be closed no matter what */ 390 (void) close(descp->d_data.d_desc.d_descriptor); 391 } 392 393 /* LINTED E_BAD_PTR_CAST_ALIGN */ 394 return ((ike_service_t *)arg.rbuf); 395 } 396 397 /* 398 * Parsing functions 399 */ 400 401 /* stolen from ipseckey.c, with a second tier added */ 402 static int 403 parsecmd(char *cmdstr, char *objstr) 404 { 405 #define MAXOBJS 11 406 struct objtbl { 407 char *obj; 408 int token; 409 }; 410 static struct cmdtbl { 411 char *cmd; 412 int null_obj_token; 413 struct objtbl objt[MAXOBJS]; 414 } table[] = { 415 {"get", IKE_SVC_ERROR, { 416 {"debug", IKE_SVC_GET_DBG}, 417 {"priv", IKE_SVC_GET_PRIV}, 418 {"stats", IKE_SVC_GET_STATS}, 419 {"p1", IKE_SVC_GET_P1}, 420 {"rule", IKE_SVC_GET_RULE}, 421 {"preshared", IKE_SVC_GET_PS}, 422 {"defaults", IKE_SVC_GET_DEFS}, 423 {NULL, IKE_SVC_ERROR} 424 } 425 }, 426 {"set", IKE_SVC_ERROR, { 427 {"debug", IKE_SVC_SET_DBG}, 428 {"priv", IKE_SVC_SET_PRIV}, 429 {NULL, IKE_SVC_ERROR} 430 } 431 }, 432 {"token", IKE_SVC_ERROR, { 433 {"login", IKE_SVC_SET_PIN}, 434 {"logout", IKE_SVC_DEL_PIN}, 435 {NULL, IKE_SVC_ERROR}, 436 } 437 }, 438 {"add", IKE_SVC_ERROR, { 439 {"rule", IKE_SVC_NEW_RULE}, 440 {"preshared", IKE_SVC_NEW_PS}, 441 {NULL, IKE_SVC_ERROR} 442 } 443 }, 444 {"del", IKE_SVC_ERROR, { 445 {"p1", IKE_SVC_DEL_P1}, 446 {"rule", IKE_SVC_DEL_RULE}, 447 {"preshared", IKE_SVC_DEL_PS}, 448 {NULL, IKE_SVC_ERROR} 449 } 450 }, 451 {"dump", IKE_SVC_ERROR, { 452 {"p1", IKE_SVC_DUMP_P1S}, 453 {"rule", IKE_SVC_DUMP_RULES}, 454 {"preshared", IKE_SVC_DUMP_PS}, 455 {"certcache", IKE_SVC_DUMP_CERTCACHE}, 456 {"groups", IKE_SVC_DUMP_GROUPS}, 457 {"encralgs", IKE_SVC_DUMP_ENCRALGS}, 458 {"authalgs", IKE_SVC_DUMP_AUTHALGS}, 459 {NULL, IKE_SVC_ERROR} 460 } 461 }, 462 {"flush", IKE_SVC_ERROR, { 463 {"p1", IKE_SVC_FLUSH_P1S}, 464 {"certcache", IKE_SVC_FLUSH_CERTCACHE}, 465 {NULL, IKE_SVC_ERROR} 466 } 467 }, 468 {"read", IKE_SVC_ERROR, { 469 {"rule", IKE_SVC_READ_RULES}, 470 {"preshared", IKE_SVC_READ_PS}, 471 {NULL, IKE_SVC_ERROR} 472 } 473 }, 474 {"write", IKE_SVC_ERROR, { 475 {"rule", IKE_SVC_WRITE_RULES}, 476 {"preshared", IKE_SVC_WRITE_PS}, 477 {NULL, IKE_SVC_ERROR} 478 } 479 }, 480 {"help", IKEADM_HELP_GENERAL, { 481 {"get", IKEADM_HELP_GET}, 482 {"set", IKEADM_HELP_SET}, 483 {"add", IKEADM_HELP_ADD}, 484 {"del", IKEADM_HELP_DEL}, 485 {"dump", IKEADM_HELP_DUMP}, 486 {"flush", IKEADM_HELP_FLUSH}, 487 {"read", IKEADM_HELP_READ}, 488 {"write", IKEADM_HELP_WRITE}, 489 {"token", IKEADM_HELP_TOKEN}, 490 {"help", IKEADM_HELP_HELP}, 491 {NULL, IKE_SVC_ERROR} 492 } 493 }, 494 {"exit", IKEADM_EXIT, { 495 {NULL, IKE_SVC_ERROR} 496 } 497 }, 498 {"quit", IKEADM_EXIT, { 499 {NULL, IKE_SVC_ERROR} 500 } 501 }, 502 {"dbg", IKE_SVC_ERROR, { 503 {"rbdump", IKE_SVC_DBG_RBDUMP}, 504 {NULL, IKE_SVC_ERROR} 505 } 506 }, 507 {NULL, IKE_SVC_ERROR, { 508 {NULL, IKE_SVC_ERROR} 509 } 510 } 511 }; 512 struct cmdtbl *ct = table; 513 struct objtbl *ot; 514 515 if (cmdstr == NULL) { 516 return (IKE_SVC_ERROR); 517 } 518 519 while (ct->cmd != NULL && strcmp(ct->cmd, cmdstr) != 0) 520 ct++; 521 ot = ct->objt; 522 523 if (ct->cmd == NULL) { 524 message(gettext("Unrecognized command '%s'"), cmdstr); 525 return (ot->token); 526 } 527 528 if (objstr == NULL) { 529 return (ct->null_obj_token); 530 } 531 532 while (ot->obj != NULL && strcmp(ot->obj, objstr) != 0) 533 ot++; 534 535 if (ot->obj == NULL) 536 message(gettext("Unrecognized object '%s'"), objstr); 537 538 return (ot->token); 539 } 540 541 /* 542 * Parsing functions: 543 * Parse command-line identification info. All return -1 on failure, 544 * or the number of cmd-line args "consumed" on success (though argc 545 * and argv params are not actually modified). 546 */ 547 548 static int 549 parse_label(int argc, char **argv, char *label) 550 { 551 if ((argc < 1) || (argv == NULL)) 552 return (-1); 553 554 if (strlcpy(label, argv[0], MAX_LABEL_LEN) >= MAX_LABEL_LEN) 555 return (-1); 556 557 return (1); 558 } 559 560 /* 561 * Parse a PKCS#11 token get the label. 562 */ 563 static int 564 parse_token(int argc, char **argv, char *token_label) 565 { 566 if ((argc < 1) || (argv == NULL)) 567 return (-1); 568 569 if (strlcpy(token_label, argv[0], PKCS11_TOKSIZE) >= PKCS11_TOKSIZE) 570 return (-1); 571 572 return (0); 573 } 574 575 /* 576 * Parse an address off the command line. In the hpp param, either 577 * return a hostent pointer (caller frees) or a pointer to a dummy_he_t 578 * (must also be freed by the caller; both cases are handled by the 579 * macro FREE_HE). The new getipnodebyname() call does the Right Thing 580 * (TM), even with raw addresses (colon-separated IPv6 or dotted decimal 581 * IPv4). 582 * (mostly stolen from ipseckey.c, though some tweaks were made 583 * to better serve our purposes here.) 584 */ 585 586 typedef struct { 587 struct hostent he; 588 char *addtl[2]; 589 } dummy_he_t; 590 591 static int 592 parse_addr(int argc, char **argv, struct hostent **hpp) 593 { 594 int hp_errno; 595 struct hostent *hp = NULL; 596 dummy_he_t *dhp; 597 char *addr1; 598 599 if ((argc < 1) || (argv == NULL) || (argv[0] == NULL)) 600 return (-1); 601 602 if (!nflag) { 603 /* 604 * Try name->address first. Assume AF_INET6, and 605 * get IPV4s, plus IPv6s iff IPv6 is configured. 606 */ 607 hp = getipnodebyname(argv[0], AF_INET6, AI_DEFAULT | AI_ALL, 608 &hp_errno); 609 } else { 610 /* 611 * Try a normal address conversion only. malloc a 612 * dummy_he_t to construct a fake hostent. Caller 613 * will know to free this one using free_he(). 614 */ 615 dhp = (dummy_he_t *)malloc(sizeof (dummy_he_t)); 616 addr1 = (char *)malloc(sizeof (struct in6_addr)); 617 if (inet_pton(AF_INET6, argv[0], addr1) == 1) { 618 dhp->he.h_addr_list = dhp->addtl; 619 dhp->addtl[0] = addr1; 620 dhp->addtl[1] = NULL; 621 hp = &dhp->he; 622 dhp->he.h_addrtype = AF_INET6; 623 dhp->he.h_length = sizeof (struct in6_addr); 624 } else if (inet_pton(AF_INET, argv[0], addr1) == 1) { 625 dhp->he.h_addr_list = dhp->addtl; 626 dhp->addtl[0] = addr1; 627 dhp->addtl[1] = NULL; 628 hp = &dhp->he; 629 dhp->he.h_addrtype = AF_INET; 630 dhp->he.h_length = sizeof (struct in_addr); 631 } else { 632 hp = NULL; 633 } 634 } 635 636 *hpp = hp; 637 638 if (hp == NULL) { 639 message(gettext("Unknown address %s."), argv[0]); 640 return (-1); 641 } 642 643 return (1); 644 } 645 646 /* 647 * Free a dummy_he_t structure that was malloc'd in parse_addr(). 648 * Unfortunately, callers of parse_addr don't want to know about 649 * dummy_he_t structs, so all they have is a pointer to the struct 650 * hostent; so that's what's passed in. To manage this, we make 651 * the assumption that the struct hostent is the first field in 652 * the dummy_he_t, and therefore a pointer to it is a pointer to 653 * the dummy_he_t. 654 */ 655 static void 656 free_he(struct hostent *hep) 657 { 658 dummy_he_t *p = (dummy_he_t *)hep; 659 660 assert(p != NULL); 661 662 if (p->addtl[0]) 663 free(p->addtl[0]); 664 if (p->addtl[1]) 665 free(p->addtl[1]); 666 667 free(p); 668 } 669 670 #define FREE_HE(x) \ 671 if (nflag) \ 672 free_he(x); \ 673 else \ 674 freehostent(x) 675 676 static void 677 headdr2sa(char *hea, struct sockaddr_storage *sa, int len) 678 { 679 struct sockaddr_in *sin; 680 struct sockaddr_in6 *sin6; 681 682 if (len == sizeof (struct in6_addr)) { 683 /* LINTED E_BAD_PTR_CAST_ALIGN */ 684 if (IN6_IS_ADDR_V4MAPPED((struct in6_addr *)hea)) { 685 sin = (struct sockaddr_in *)sa; 686 (void) memset(sin, 0, sizeof (*sin)); 687 /* LINTED E_BAD_PTR_CAST_ALIGN */ 688 IN6_V4MAPPED_TO_INADDR((struct in6_addr *)hea, 689 &sin->sin_addr); 690 sin->sin_family = AF_INET; 691 } else { 692 sin6 = (struct sockaddr_in6 *)sa; 693 (void) memset(sin6, 0, sizeof (*sin6)); 694 (void) memcpy(&sin6->sin6_addr, hea, 695 sizeof (struct in6_addr)); 696 sin6->sin6_family = AF_INET6; 697 } 698 } else { 699 sin = (struct sockaddr_in *)sa; 700 (void) memset(sin, 0, sizeof (*sin)); 701 (void) memcpy(&sin->sin_addr, hea, sizeof (struct in_addr)); 702 sin->sin_family = AF_INET; 703 } 704 } 705 706 /* 707 * The possible ident-type keywords that might be used on the command 708 * line. This is a superset of the ones supported by ipseckey, those 709 * in the ike config file, and those in ike.preshared. 710 */ 711 static keywdtab_t idtypes[] = { 712 /* ip, ipv4, and ipv6 are valid for preshared keys... */ 713 {SADB_IDENTTYPE_RESERVED, "ip"}, 714 {SADB_IDENTTYPE_RESERVED, "ipv4"}, 715 {SADB_IDENTTYPE_RESERVED, "ipv6"}, 716 {SADB_IDENTTYPE_PREFIX, "prefix"}, 717 {SADB_IDENTTYPE_PREFIX, "ipv4-prefix"}, 718 {SADB_IDENTTYPE_PREFIX, "ipv6-prefix"}, 719 {SADB_IDENTTYPE_PREFIX, "subnet"}, 720 {SADB_IDENTTYPE_PREFIX, "subnetv4"}, 721 {SADB_IDENTTYPE_PREFIX, "subnetv6"}, 722 {SADB_IDENTTYPE_FQDN, "fqdn"}, 723 {SADB_IDENTTYPE_FQDN, "dns"}, 724 {SADB_IDENTTYPE_FQDN, "domain"}, 725 {SADB_IDENTTYPE_FQDN, "domainname"}, 726 {SADB_IDENTTYPE_USER_FQDN, "user_fqdn"}, 727 {SADB_IDENTTYPE_USER_FQDN, "mbox"}, 728 {SADB_IDENTTYPE_USER_FQDN, "mailbox"}, 729 {SADB_X_IDENTTYPE_DN, "dn"}, 730 {SADB_X_IDENTTYPE_DN, "asn1dn"}, 731 {SADB_X_IDENTTYPE_GN, "gn"}, 732 {SADB_X_IDENTTYPE_GN, "asn1gn"}, 733 {SADB_X_IDENTTYPE_ADDR_RANGE, "ipv4-range"}, 734 {SADB_X_IDENTTYPE_ADDR_RANGE, "ipv6-range"}, 735 {SADB_X_IDENTTYPE_ADDR_RANGE, "rangev4"}, 736 {SADB_X_IDENTTYPE_ADDR_RANGE, "rangev6"}, 737 {SADB_X_IDENTTYPE_KEY_ID, "keyid"}, 738 {0, NULL} 739 }; 740 741 static int 742 parse_idtype(char *type, uint16_t *idnum) 743 { 744 keywdtab_t *idp; 745 746 if (type == NULL) 747 return (-1); 748 749 for (idp = idtypes; idp->kw_str != NULL; idp++) { 750 if (strcasecmp(idp->kw_str, type) == 0) { 751 if (idnum != NULL) 752 *idnum = idp->kw_tag; 753 return (1); 754 } 755 } 756 757 return (-1); 758 } 759 760 /* 761 * The sadb_ident_t is malloc'd, since its length varies; 762 * so the caller must free() it when done with the data. 763 */ 764 static int 765 parse_ident(int argc, char **argv, sadb_ident_t **idpp) 766 { 767 int alloclen, consumed; 768 sadb_ident_t *idp; 769 if ((argc < 2) || (argv == NULL) || (argv[0] == NULL) || 770 (argv[1] == NULL)) 771 return (-1); 772 773 alloclen = sizeof (sadb_ident_t) + IKEDOORROUNDUP(strlen(argv[1]) + 1); 774 *idpp = idp = (sadb_ident_t *)malloc(alloclen); 775 if (idp == NULL) 776 Bail("parsing identity"); 777 778 if ((consumed = parse_idtype(argv[0], &idp->sadb_ident_type)) < 0) { 779 message(gettext("unknown identity type %s."), argv[0]); 780 return (-1); 781 } 782 783 idp->sadb_ident_len = SADB_8TO64(alloclen); 784 idp->sadb_ident_reserved = 0; 785 idp->sadb_ident_id = 0; 786 787 /* now copy in identity param */ 788 (void) strlcpy((char *)(idp + 1), argv[1], 789 alloclen - (sizeof (sadb_ident_t))); 790 791 return (++consumed); 792 } 793 794 static int 795 parse_cky(int argc, char **argv, uint64_t *ckyp) 796 { 797 u_longlong_t arg; 798 799 if ((argc < 1) || (argv[0] == NULL)) 800 return (-1); 801 802 errno = 0; 803 arg = strtoull(argv[0], NULL, 0); 804 if (errno != 0) { 805 message(gettext("failed to parse cookie %s."), argv[0]); 806 return (-1); 807 } 808 809 *ckyp = (uint64_t)arg; 810 811 return (1); 812 } 813 814 static int 815 parse_addr_pr(int argc, char **argv, struct hostent **h1pp, 816 struct hostent **h2pp) 817 { 818 int rtn, consumed = 0; 819 820 if ((rtn = parse_addr(argc, argv, h1pp)) < 0) { 821 return (-1); 822 } 823 consumed = rtn; 824 argc -= rtn; 825 argv += rtn; 826 827 if ((rtn = parse_addr(argc, argv, h2pp)) < 0) { 828 FREE_HE(*h1pp); 829 return (-1); 830 } 831 consumed += rtn; 832 833 return (consumed); 834 } 835 836 /* 837 * The sadb_ident_ts are malloc'd, since their length varies; 838 * so the caller must free() them when done with the data. 839 */ 840 static int 841 parse_ident_pr(int argc, char **argv, sadb_ident_t **id1pp, 842 sadb_ident_t **id2pp) 843 { 844 int rtn, consumed = 0; 845 846 if ((rtn = parse_ident(argc, argv, id1pp)) < 0) { 847 return (-1); 848 } 849 consumed = rtn; 850 argc -= rtn; 851 argv += rtn; 852 853 (*id1pp)->sadb_ident_exttype = SADB_EXT_IDENTITY_SRC; 854 855 if ((rtn = parse_ident(argc, argv, id2pp)) < 0) { 856 free(*id1pp); 857 return (-1); 858 } 859 consumed += rtn; 860 861 (*id2pp)->sadb_ident_exttype = SADB_EXT_IDENTITY_DST; 862 863 return (consumed); 864 } 865 866 static int 867 parse_cky_pr(int argc, char **argv, ike_cky_pr_t *cpr) 868 { 869 int rtn, consumed = 0; 870 871 if ((rtn = parse_cky(argc, argv, &cpr->cky_i)) < 0) { 872 return (-1); 873 } 874 consumed = rtn; 875 argc -= rtn; 876 argv += rtn; 877 878 if ((rtn = parse_cky(argc, argv, &cpr->cky_r)) < 0) { 879 return (-1); 880 } 881 consumed += rtn; 882 883 return (consumed); 884 } 885 886 /* 887 * Preshared key field types...used for parsing preshared keys that 888 * have been entered on the command line. The code to parse preshared 889 * keys (parse_ps, parse_key, parse_psfldid, parse_ikmtype, ...) is 890 * mostly duplicated from in.iked's readps.c. 891 */ 892 #define PSFLD_LOCID 1 893 #define PSFLD_LOCIDTYPE 2 894 #define PSFLD_REMID 3 895 #define PSFLD_REMIDTYPE 4 896 #define PSFLD_MODE 5 897 #define PSFLD_KEY 6 898 899 static keywdtab_t psfldtypes[] = { 900 {PSFLD_LOCID, "localid"}, 901 {PSFLD_LOCIDTYPE, "localidtype"}, 902 {PSFLD_REMID, "remoteid"}, 903 {PSFLD_REMIDTYPE, "remoteidtype"}, 904 {PSFLD_MODE, "ike_mode"}, 905 {PSFLD_KEY, "key"}, 906 {0, NULL} 907 }; 908 909 static int 910 parse_psfldid(char *type, uint16_t *idnum) 911 { 912 keywdtab_t *pfp; 913 914 if (type == NULL) 915 return (-1); 916 917 for (pfp = psfldtypes; pfp->kw_str != NULL; pfp++) { 918 if (strcasecmp(pfp->kw_str, type) == 0) { 919 if (idnum != NULL) 920 *idnum = pfp->kw_tag; 921 return (1); 922 } 923 } 924 925 return (-1); 926 } 927 928 static keywdtab_t ikemodes[] = { 929 {IKE_XCHG_IDENTITY_PROTECT, "main"}, 930 {IKE_XCHG_AGGRESSIVE, "aggressive"}, 931 {IKE_XCHG_IP_AND_AGGR, "both"}, 932 {0, NULL} 933 }; 934 935 static int 936 parse_ikmtype(char *mode, uint16_t *modenum) 937 { 938 keywdtab_t *ikmp; 939 940 if (mode == NULL) 941 return (-1); 942 943 for (ikmp = ikemodes; ikmp->kw_str != NULL; ikmp++) { 944 if (strcasecmp(ikmp->kw_str, mode) == 0) { 945 if (modenum != NULL) 946 *modenum = ikmp->kw_tag; 947 return (1); 948 } 949 } 950 951 return (-1); 952 } 953 954 #define hd2num(hd) (((hd) >= '0' && (hd) <= '9') ? ((hd) - '0') : \ 955 (((hd) >= 'a' && (hd) <= 'f') ? ((hd) - 'a' + 10) : ((hd) - 'A' + 10))) 956 957 static uint8_t * 958 parse_key(char *input, uint_t *keybuflen, uint_t *lbits) 959 { 960 uint8_t *keyp, *keybufp; 961 uint_t i, hexlen = 0, bits, alloclen; 962 963 for (i = 0; input[i] != '\0' && input[i] != '/'; i++) 964 hexlen++; 965 966 if (input[i] == '\0') { 967 bits = 0; 968 } else { 969 /* Have /nn. */ 970 input[i] = '\0'; 971 if (sscanf((input + i + 1), "%u", &bits) != 1) 972 return (NULL); 973 974 /* hexlen is in nibbles */ 975 if (((bits + 3) >> 2) > hexlen) 976 return (NULL); 977 978 /* 979 * Adjust hexlen down if user gave us too small of a bit 980 * count. 981 */ 982 if ((hexlen << 2) > bits + 3) { 983 hexlen = (bits + 3) >> 2; 984 input[hexlen] = '\0'; 985 } 986 } 987 988 /* 989 * Allocate. Remember, hexlen is in nibbles. 990 */ 991 992 alloclen = (hexlen/2 + (hexlen & 0x1)); 993 keyp = malloc(alloclen); 994 995 if (keyp == NULL) 996 return (NULL); 997 998 keybufp = keyp; 999 *keybuflen = alloclen; 1000 if (bits == 0) 1001 *lbits = (hexlen + (hexlen & 0x1)) << 2; 1002 else 1003 *lbits = bits; 1004 1005 /* 1006 * Read in nibbles. Read in odd-numbered as shifted high. 1007 * (e.g. 123 becomes 0x1230). 1008 */ 1009 for (i = 0; input[i] != '\0'; i += 2) { 1010 boolean_t second = (input[i + 1] != '\0'); 1011 1012 if (!isxdigit(input[i]) || 1013 (!isxdigit(input[i + 1]) && second)) { 1014 free(keyp); 1015 return (NULL); 1016 } 1017 *keyp = (hd2num(input[i]) << 4); 1018 if (second) 1019 *keyp |= hd2num(input[i + 1]); 1020 else 1021 break; /* out of for loop. */ 1022 keyp++; 1023 } 1024 1025 /* zero the remaining bits if we're a non-octet amount. */ 1026 if (bits & 0x7) 1027 *((input[i] == '\0') ? keyp - 1 : keyp) &= 1028 0xff << (8 - (bits & 0x7)); 1029 return (keybufp); 1030 } 1031 1032 /* 1033 * the ike_ps_t struct (plus trailing data) will be allocated here, 1034 * so it will need to be freed by the caller. 1035 */ 1036 static int 1037 parse_ps(int argc, char **argv, ike_ps_t **presharedpp, int *len) 1038 { 1039 uint_t c = 0, locidlen, remidlen, keylen, keybits; 1040 uint_t a_locidtotal = 0, a_remidtotal = 0; 1041 char *locid, *remid, *locpfx = NULL, *rempfx = NULL; 1042 uint8_t *keyp = NULL; 1043 uint16_t fldid, locidtype, remidtype, mtype; 1044 struct hostent *loche = NULL, *remhe = NULL; 1045 ike_ps_t *psp = NULL; 1046 sadb_ident_t *sidp; 1047 boolean_t whacked = B_FALSE; 1048 int pfxlen = 0; 1049 1050 if ((argv[c] == NULL) || (argv[c][0] != '{')) 1051 return (-1); 1052 if (argv[c][1] != 0) { 1053 /* no space between '{' and first token */ 1054 argv[c]++; 1055 } else { 1056 c++; 1057 } 1058 if ((argv[argc - 1][strlen(argv[argc - 1]) - 1] == '}') && 1059 (argv[argc - 1][0] != '}')) { 1060 /* 1061 * whack '}' without a space before it or parsers break. 1062 * Remember this trailing character for later 1063 */ 1064 argv[argc - 1][strlen(argv[argc - 1]) - 1] = '\0'; 1065 whacked = B_TRUE; 1066 } 1067 1068 /* Default to type IP */ 1069 locidtype = remidtype = SADB_IDENTTYPE_RESERVED; 1070 /* Default to base exchanges */ 1071 mtype = IKE_XCHG_BASE; 1072 1073 while ((c < argc) && (argv[c] != NULL) && (argv[c][0] != '}')) { 1074 if ((argv[c + 1] == NULL) || (argv[c + 1][0] == '}')) 1075 goto bail; 1076 if (parse_psfldid(argv[c++], &fldid) < 0) 1077 goto bail; 1078 switch (fldid) { 1079 case PSFLD_LOCID: 1080 locid = argv[c++]; 1081 locidlen = strlen(locid) + 1; 1082 break; 1083 case PSFLD_LOCIDTYPE: 1084 if (parse_idtype(argv[c++], &locidtype) < 0) 1085 goto bail; 1086 break; 1087 case PSFLD_REMID: 1088 remid = argv[c++]; 1089 remidlen = strlen(remid) + 1; 1090 break; 1091 case PSFLD_REMIDTYPE: 1092 if (parse_idtype(argv[c++], &remidtype) < 0) 1093 goto bail; 1094 break; 1095 case PSFLD_MODE: 1096 if (parse_ikmtype(argv[c++], &mtype) < 0) 1097 goto bail; 1098 break; 1099 case PSFLD_KEY: 1100 keyp = parse_key(argv[c++], &keylen, &keybits); 1101 if (keyp == NULL) 1102 goto bail; 1103 break; 1104 } 1105 } 1106 1107 /* Make sure the line was terminated with '}' */ 1108 if (argv[c] == NULL) { 1109 if (!whacked) 1110 goto bail; 1111 } else if (argv[c][0] != '}') { 1112 goto bail; 1113 } 1114 1115 /* 1116 * make sure we got all the required fields. If no idtype, assume 1117 * ip addr; if that translation fails, we'll catch the error then. 1118 */ 1119 if (locid == NULL || remid == NULL || keyp == NULL || mtype == 0) 1120 goto bail; 1121 1122 /* figure out the size buffer we need */ 1123 *len = sizeof (ike_ps_t); 1124 if (locidtype != SADB_IDENTTYPE_RESERVED) { 1125 a_locidtotal = IKEDOORROUNDUP(sizeof (sadb_ident_t) + locidlen); 1126 *len += a_locidtotal; 1127 } 1128 if (remidtype != SADB_IDENTTYPE_RESERVED) { 1129 a_remidtotal = IKEDOORROUNDUP(sizeof (sadb_ident_t) + remidlen); 1130 *len += a_remidtotal; 1131 } 1132 *len += keylen; 1133 1134 psp = malloc(*len); 1135 if (psp == NULL) 1136 goto bail; 1137 (void) memset(psp, 0, *len); 1138 1139 psp->ps_ike_mode = mtype; 1140 1141 psp->ps_localid_off = sizeof (ike_ps_t); 1142 if (locidtype == SADB_IDENTTYPE_RESERVED) { 1143 locpfx = strchr(locid, '/'); 1144 if (locpfx != NULL) { 1145 *locpfx = '\0'; 1146 locpfx++; 1147 } 1148 1149 /* 1150 * this is an ip address, store in the sockaddr field; 1151 * we won't use an sadb_ident_t. 1152 */ 1153 psp->ps_localid_len = 0; 1154 if (parse_addr(1, &locid, &loche) < 0) 1155 goto bail; 1156 if (loche->h_addr_list[1] != NULL) { 1157 message(gettext("preshared key identifier cannot " 1158 "match multiple IP addresses")); 1159 goto bail; 1160 } 1161 headdr2sa(loche->h_addr_list[0], &psp->ps_ipaddrs.loc_addr, 1162 loche->h_length); 1163 FREE_HE(loche); 1164 } else { 1165 psp->ps_localid_len = sizeof (sadb_ident_t) + locidlen; 1166 sidp = (sadb_ident_t *)((int)psp + psp->ps_localid_off); 1167 sidp->sadb_ident_len = psp->ps_localid_len; 1168 sidp->sadb_ident_type = locidtype; 1169 (void) strlcpy((char *)(sidp + 1), locid, a_locidtotal); 1170 } 1171 1172 psp->ps_remoteid_off = psp->ps_localid_off + a_locidtotal; 1173 if (remidtype == SADB_IDENTTYPE_RESERVED) { 1174 rempfx = strchr(remid, '/'); 1175 if (rempfx != NULL) { 1176 *rempfx = '\0'; 1177 rempfx++; 1178 } 1179 1180 /* 1181 * this is an ip address, store in the sockaddr field; 1182 * we won't use an sadb_ident_t. 1183 */ 1184 psp->ps_remoteid_len = 0; 1185 if (parse_addr(1, &remid, &remhe) < 0) 1186 goto bail; 1187 if (remhe->h_addr_list[1] != NULL) { 1188 message(gettext("preshared key identifier cannot " 1189 "match multiple IP addresses")); 1190 goto bail; 1191 } 1192 headdr2sa(remhe->h_addr_list[0], &psp->ps_ipaddrs.rem_addr, 1193 remhe->h_length); 1194 FREE_HE(remhe); 1195 } else { 1196 /* make sure we have at least 16-bit alignment */ 1197 if (remidlen & 0x1) 1198 remidlen++; 1199 psp->ps_remoteid_len = sizeof (sadb_ident_t) + remidlen; 1200 sidp = (sadb_ident_t *)((int)psp + psp->ps_remoteid_off); 1201 sidp->sadb_ident_len = psp->ps_remoteid_len; 1202 sidp->sadb_ident_type = remidtype; 1203 (void) strlcpy((char *)(sidp + 1), remid, a_remidtotal); 1204 } 1205 1206 psp->ps_key_off = psp->ps_remoteid_off + a_remidtotal; 1207 psp->ps_key_len = keylen; 1208 psp->ps_key_bits = keybits; 1209 (void) memcpy((uint8_t *)((int)psp + psp->ps_key_off), keyp, keylen); 1210 if (locpfx != NULL && ((pfxlen = atoi(locpfx)) > 0)) 1211 psp->ps_localid_plen = pfxlen; 1212 if (rempfx != NULL && ((pfxlen = atoi(rempfx)) > 0)) 1213 psp->ps_remoteid_plen = pfxlen; 1214 1215 *presharedpp = psp; 1216 1217 return (c); 1218 1219 bail: 1220 if (loche != NULL) 1221 FREE_HE(loche); 1222 if (remhe != NULL) 1223 FREE_HE(remhe); 1224 if (keyp != NULL) 1225 free(keyp); 1226 if (psp != NULL) 1227 free(psp); 1228 1229 *presharedpp = NULL; 1230 1231 return (-1); 1232 } 1233 1234 /* 1235 * Printing functions 1236 * 1237 * A potential point of confusion here is that the ikeadm-specific string- 1238 * producing functions do not match the ipsec_util.c versions in style: the 1239 * ikeadm-specific functions return a string (and are named foostr), while 1240 * the ipsec_util.c functions actually print the string to the file named 1241 * in the second arg to the function (and are named dump_foo). 1242 * 1243 * Localization for ikeadm seems more straightforward when complete 1244 * phrases are translated rather than: a part of a phrase, a call to 1245 * dump_foo(), and more of the phrase. It could also accommodate 1246 * non-English grammar more easily. 1247 */ 1248 1249 static char * 1250 errstr(int err) 1251 { 1252 static char rtn[MAXLINESIZE]; 1253 1254 switch (err) { 1255 case IKE_ERR_NO_OBJ: 1256 return (gettext("No data returned")); 1257 case IKE_ERR_NO_DESC: 1258 return (gettext("No destination provided")); 1259 case IKE_ERR_ID_INVALID: 1260 return (gettext("Id info invalid")); 1261 case IKE_ERR_LOC_INVALID: 1262 return (gettext("Destination invalid")); 1263 case IKE_ERR_CMD_INVALID: 1264 return (gettext("Command invalid")); 1265 case IKE_ERR_DATA_INVALID: 1266 return (gettext("Supplied data invalid")); 1267 case IKE_ERR_CMD_NOTSUP: 1268 return (gettext("Unknown command")); 1269 case IKE_ERR_REQ_INVALID: 1270 return (gettext("Request invalid")); 1271 case IKE_ERR_NO_PRIV: 1272 return (gettext("Not allowed at current privilege level")); 1273 case IKE_ERR_NO_AUTH: 1274 return (gettext("User not authorized")); 1275 case IKE_ERR_SYS_ERR: 1276 return (gettext("System error")); 1277 case IKE_ERR_DUP_IGNORED: 1278 return (gettext("One or more duplicate entries ignored")); 1279 case IKE_ERR_NO_TOKEN: 1280 return (gettext( 1281 "token login failed or no objects on device")); 1282 case IKE_ERR_IN_PROGRESS: 1283 return (gettext( 1284 "Duplicate operation already in progress")); 1285 case IKE_ERR_NO_MEM: 1286 return (gettext( 1287 "Insufficient memory")); 1288 default: 1289 (void) snprintf(rtn, MAXLINESIZE, 1290 gettext("<unknown error %d>"), err); 1291 return (rtn); 1292 } 1293 } 1294 1295 static char * 1296 dbgstr(int bit) 1297 { 1298 static char rtn[MAXLINESIZE]; 1299 1300 switch (bit) { 1301 case D_CERT: 1302 return (gettext("Certificate management")); 1303 case D_KEY: 1304 return (gettext("Key management")); 1305 case D_OP: 1306 return (gettext("Operational")); 1307 case D_P1: 1308 return (gettext("Phase 1 SA creation")); 1309 case D_P2: 1310 return (gettext("Phase 2 SA creation")); 1311 case D_PFKEY: 1312 return (gettext("PF_KEY interface")); 1313 case D_POL: 1314 return (gettext("Policy management")); 1315 case D_PROP: 1316 return (gettext("Proposal construction")); 1317 case D_DOOR: 1318 return (gettext("Door interface")); 1319 case D_CONFIG: 1320 return (gettext("Config file processing")); 1321 case D_LABEL: 1322 return (gettext("MAC label processing")); 1323 default: 1324 (void) snprintf(rtn, MAXLINESIZE, 1325 gettext("<unknown flag 0x%x>"), bit); 1326 return (rtn); 1327 } 1328 } 1329 1330 static char * 1331 privstr(int priv) 1332 { 1333 static char rtn[MAXLINESIZE]; 1334 1335 switch (priv) { 1336 case IKE_PRIV_MINIMUM: 1337 return (gettext("base privileges")); 1338 case IKE_PRIV_MODKEYS: 1339 return (gettext("access to preshared key information")); 1340 case IKE_PRIV_KEYMAT: 1341 return (gettext("access to keying material")); 1342 default: 1343 (void) snprintf(rtn, MAXLINESIZE, 1344 gettext("<unknown level %d>"), priv); 1345 return (rtn); 1346 } 1347 } 1348 1349 static char * 1350 xchgstr(int xchg) 1351 { 1352 static char rtn[MAXLINESIZE]; 1353 1354 switch (xchg) { 1355 case IKE_XCHG_NONE: 1356 return (gettext("<unspecified>")); 1357 case IKE_XCHG_BASE: 1358 return (gettext("base")); 1359 case IKE_XCHG_IDENTITY_PROTECT: 1360 return (gettext("main mode (identity protect)")); 1361 case IKE_XCHG_AUTH_ONLY: 1362 return (gettext("authentication only")); 1363 case IKE_XCHG_AGGRESSIVE: 1364 return (gettext("aggressive mode")); 1365 case IKE_XCHG_IP_AND_AGGR: 1366 return (gettext("main and aggressive mode")); 1367 case IKE_XCHG_ANY: 1368 return (gettext("any mode")); 1369 default: 1370 (void) snprintf(rtn, MAXLINESIZE, 1371 gettext("<unknown %d>"), xchg); 1372 return (rtn); 1373 } 1374 } 1375 1376 static char * 1377 statestr(int state) 1378 { 1379 static char rtn[MAXLINESIZE]; 1380 1381 switch (state) { 1382 case IKE_SA_STATE_INIT: 1383 return (gettext("INITIALIZING")); 1384 case IKE_SA_STATE_SENT_SA: 1385 return (gettext("SENT FIRST MSG (SA)")); 1386 case IKE_SA_STATE_SENT_KE: 1387 return (gettext("SENT SECOND MSG (KE)")); 1388 case IKE_SA_STATE_SENT_LAST: 1389 return (gettext("SENT FINAL MSG")); 1390 case IKE_SA_STATE_DONE: 1391 return (gettext("ACTIVE")); 1392 case IKE_SA_STATE_DELETED: 1393 return (gettext("DELETED")); 1394 case IKE_SA_STATE_INVALID: 1395 return (gettext("<invalid>")); 1396 default: 1397 (void) snprintf(rtn, MAXLINESIZE, 1398 gettext("<unknown %d>"), state); 1399 return (rtn); 1400 } 1401 } 1402 1403 static char * 1404 authmethstr(int meth) 1405 { 1406 static char rtn[MAXLINESIZE]; 1407 1408 switch (meth) { 1409 case IKE_AUTH_METH_PRE_SHARED_KEY: 1410 return (gettext("pre-shared key")); 1411 case IKE_AUTH_METH_DSS_SIG: 1412 return (gettext("DSS signatures")); 1413 case IKE_AUTH_METH_RSA_SIG: 1414 return (gettext("RSA signatures")); 1415 case IKE_AUTH_METH_RSA_ENCR: 1416 return (gettext("RSA Encryption")); 1417 case IKE_AUTH_METH_RSA_ENCR_REVISED: 1418 return (gettext("Revised RSA Encryption")); 1419 default: 1420 (void) snprintf(rtn, MAXLINESIZE, 1421 gettext("<unknown %d>"), meth); 1422 return (rtn); 1423 } 1424 } 1425 1426 static char * 1427 prfstr(int prf) 1428 { 1429 static char rtn[MAXLINESIZE]; 1430 1431 switch (prf) { 1432 case IKE_PRF_NONE: 1433 return (gettext("<none/unavailable>")); 1434 case IKE_PRF_HMAC_MD5: 1435 return ("HMAC MD5"); 1436 case IKE_PRF_HMAC_SHA1: 1437 return ("HMAC SHA1"); 1438 case IKE_PRF_HMAC_SHA256: 1439 return ("HMAC SHA256"); 1440 case IKE_PRF_HMAC_SHA384: 1441 return ("HMAC SHA384"); 1442 case IKE_PRF_HMAC_SHA512: 1443 return ("HMAC SHA512"); 1444 default: 1445 (void) snprintf(rtn, MAXLINESIZE, 1446 gettext("<unknown %d>"), prf); 1447 return (rtn); 1448 } 1449 } 1450 1451 static char * 1452 dhstr(int grp) 1453 { 1454 static char rtn[MAXLINESIZE]; 1455 1456 switch (grp) { 1457 case 0: 1458 return (gettext("<unavailable>")); 1459 case IKE_GRP_DESC_MODP_768: 1460 return (gettext("768-bit MODP (group 1)")); 1461 case IKE_GRP_DESC_MODP_1024: 1462 return (gettext("1024-bit MODP (group 2)")); 1463 case IKE_GRP_DESC_EC2N_155: 1464 return (gettext("EC2N group on GP[2^155]")); 1465 case IKE_GRP_DESC_EC2N_185: 1466 return (gettext("EC2N group on GP[2^185]")); 1467 case IKE_GRP_DESC_MODP_1536: 1468 return (gettext("1536-bit MODP (group 5)")); 1469 case IKE_GRP_DESC_MODP_2048: 1470 return (gettext("2048-bit MODP (group 14)")); 1471 case IKE_GRP_DESC_MODP_3072: 1472 return (gettext("3072-bit MODP (group 15)")); 1473 case IKE_GRP_DESC_MODP_4096: 1474 return (gettext("4096-bit MODP (group 16)")); 1475 case IKE_GRP_DESC_MODP_6144: 1476 return (gettext("6144-bit MODP (group 17)")); 1477 case IKE_GRP_DESC_MODP_8192: 1478 return (gettext("8192-bit MODP (group 18)")); 1479 case IKE_GRP_DESC_ECP_256: 1480 return (gettext("256-bit ECP (group 19)")); 1481 case IKE_GRP_DESC_ECP_384: 1482 return (gettext("384-bit ECP (group 20)")); 1483 case IKE_GRP_DESC_ECP_521: 1484 return (gettext("521-bit ECP (group 21)")); 1485 case IKE_GRP_DESC_MODP_1024_160: 1486 return ( 1487 gettext("1024-bit MODP with 160-bit subprime (group 22)")); 1488 case IKE_GRP_DESC_MODP_2048_224: 1489 return ( 1490 gettext("2048-bit MODP with 224-bit subprime (group 23)")); 1491 case IKE_GRP_DESC_MODP_2048_256: 1492 return ( 1493 gettext("2048-bit MODP with 256-bit subprime (group 24)")); 1494 case IKE_GRP_DESC_ECP_192: 1495 return (gettext("192-bit ECP (group 25)")); 1496 case IKE_GRP_DESC_ECP_224: 1497 return (gettext("224-bit ECP (group 26)")); 1498 default: 1499 (void) snprintf(rtn, MAXLINESIZE, gettext("<unknown %d>"), grp); 1500 return (rtn); 1501 } 1502 } 1503 1504 static void 1505 print_hdr(char *prefix, ike_p1_hdr_t *hdrp) 1506 { 1507 char sbuf[TBUF_SIZE]; 1508 char tbuf[TBUF_SIZE]; 1509 time_t ltime = (time_t)hdrp->p1hdr_dpd_time; 1510 1511 (void) printf( 1512 gettext("%s Cookies: Initiator 0x%llx Responder 0x%llx\n"), 1513 prefix, ntohll(hdrp->p1hdr_cookies.cky_i), 1514 ntohll(hdrp->p1hdr_cookies.cky_r)); 1515 (void) printf(gettext("%s The local host is the %s.\n"), prefix, 1516 hdrp->p1hdr_isinit ? gettext("initiator") : gettext("responder")); 1517 (void) printf(gettext("%s ISAKMP version %d.%d; %s exchange\n"), prefix, 1518 hdrp->p1hdr_major, hdrp->p1hdr_minor, xchgstr(hdrp->p1hdr_xchg)); 1519 (void) printf(gettext("%s Current state is %s\n"), prefix, 1520 statestr(hdrp->p1hdr_state)); 1521 if (hdrp->p1hdr_support_dpd == B_FALSE) { 1522 return; 1523 } 1524 (void) printf(gettext("%s Dead Peer Detection (RFC 3706)" 1525 " enabled"), prefix); 1526 if (hdrp->p1hdr_dpd_state < DPD_IN_PROGRESS) { 1527 (void) printf("\n"); 1528 return; 1529 } 1530 if (strftime(tbuf, TBUF_SIZE, NULL, 1531 localtime(<ime)) == 0) { 1532 (void) strlcpy(tbuf, gettext("<time conversion failed>"), 1533 TBUF_SIZE); 1534 } 1535 (void) printf(gettext("\n%s Dead Peer Detection handshake "), prefix); 1536 switch (hdrp->p1hdr_dpd_state) { 1537 case DPD_SUCCESSFUL: 1538 (void) strlcpy(sbuf, gettext("was successful at "), TBUF_SIZE); 1539 break; 1540 case DPD_FAILURE: 1541 (void) strlcpy(sbuf, gettext("failed at "), TBUF_SIZE); 1542 break; 1543 case DPD_IN_PROGRESS: 1544 (void) strlcpy(sbuf, gettext("is in progress."), TBUF_SIZE); 1545 break; 1546 } 1547 (void) printf("%s %s", sbuf, 1548 (hdrp->p1hdr_dpd_state == DPD_IN_PROGRESS) ? "" : tbuf); 1549 (void) printf("\n"); 1550 } 1551 1552 static void 1553 print_lt_limits(char *prefix, ike_p1_xform_t *xfp) 1554 { 1555 char byte_str[BYTE_STR_SIZE]; /* byte lifetime string representation */ 1556 char secs_str[SECS_STR_SIZE]; /* lifetime string representation */ 1557 1558 (void) printf(gettext("%s Lifetime limits:\n"), prefix); 1559 (void) printf(gettext("%s %u seconds%s; %u kbytes %sprotected\n"), 1560 prefix, xfp->p1xf_max_secs, secs2out(xfp->p1xf_max_secs, 1561 secs_str, sizeof (secs_str), SPC_BEGIN), xfp->p1xf_max_kbytes, 1562 bytecnt2out((uint64_t)xfp->p1xf_max_kbytes << 10, byte_str, 1563 sizeof (byte_str), SPC_END)); 1564 (void) printf(gettext("%s keying material for IPsec SAs can be " 1565 "provided %u times%s\n"), prefix, xfp->p1xf_max_keyuses, 1566 xfp->p1xf_max_keyuses == 0 ? " (no limit)" : ""); 1567 } 1568 1569 #define LT_USAGE_LEN 16 /* 1 uint64 + 2 uint32s */ 1570 static void 1571 print_lt_usage(char *prefix, ike_p1_stats_t *sp) 1572 { 1573 time_t scratch; 1574 char tbuf[TBUF_SIZE]; 1575 char bytestr[BYTE_STR_SIZE]; /* byte lifetime representation */ 1576 1577 (void) printf(gettext("%s Current usage:\n"), prefix); 1578 scratch = (time_t)sp->p1stat_start; 1579 if (strftime(tbuf, TBUF_SIZE, NULL, localtime(&scratch)) == 0) 1580 (void) strlcpy(tbuf, gettext("<time conversion failed>"), 1581 TBUF_SIZE); 1582 (void) printf(gettext("%s SA was created at %s\n"), prefix, tbuf); 1583 (void) printf(gettext("%s %u kbytes %sprotected\n"), 1584 prefix, sp->p1stat_kbytes, 1585 bytecnt2out((uint64_t)sp->p1stat_kbytes << 10, bytestr, 1586 sizeof (bytestr), SPC_END)); 1587 (void) printf(gettext("%s keying material for IPsec SAs provided " 1588 "%u times\n"), prefix, sp->p1stat_keyuses); 1589 } 1590 1591 static void 1592 print_xform(char *prefix, ike_p1_xform_t *xfp, boolean_t print_lifetimes) 1593 { 1594 (void) printf(gettext("%s Authentication method: %s"), prefix, 1595 authmethstr(xfp->p1xf_auth_meth)); 1596 (void) printf(gettext("\n%s Encryption alg: "), prefix); 1597 (void) dump_ealg(xfp->p1xf_encr_alg, stdout); 1598 if (xfp->p1xf_encr_low_bits != 0) { 1599 (void) printf(gettext("(%d..%d)"), xfp->p1xf_encr_low_bits, 1600 xfp->p1xf_encr_high_bits); 1601 } else if ((xfp->p1xf_encr_low_bits == 0) && 1602 (xfp->p1xf_encr_high_bits != 0)) { 1603 /* 1604 * High bits is a placeholder for 1605 * negotiated algorithm strength 1606 */ 1607 (void) printf(gettext("(%d)"), xfp->p1xf_encr_high_bits); 1608 } 1609 (void) printf(gettext("; Authentication alg: ")); 1610 (void) dump_aalg(xfp->p1xf_auth_alg, stdout); 1611 (void) printf("\n%s ", prefix); 1612 if (xfp->p1xf_prf != 0) 1613 (void) printf(gettext("PRF: %s ; "), prfstr(xfp->p1xf_prf)); 1614 (void) printf(gettext("Oakley Group: %s\n"), 1615 dhstr(xfp->p1xf_dh_group)); 1616 if (xfp->p1xf_pfs == 0) { 1617 (void) printf(gettext("%s Phase 2 PFS is not used\n"), prefix); 1618 } else { 1619 (void) printf(gettext( 1620 "%s Phase 2 PFS is required (Oakley Group: %s)\n"), 1621 prefix, dhstr(xfp->p1xf_pfs)); 1622 } 1623 1624 if (print_lifetimes) 1625 print_lt_limits(prefix, xfp); 1626 } 1627 1628 static void 1629 print_lifetime(char *prefix, ike_p1_xform_t *xfp, ike_p1_stats_t *sp, 1630 int statlen) 1631 { 1632 time_t current, remain, exp; 1633 char tbuf[TBUF_SIZE]; 1634 char byte_str[BYTE_STR_SIZE]; /* byte lifetime representation */ 1635 char secs_str[SECS_STR_SIZE]; /* seconds lifetime representation */ 1636 1637 current = time(NULL); 1638 1639 print_lt_limits(prefix, xfp); 1640 1641 /* 1642 * make sure the stats struct we've been passed is as big 1643 * as we expect it to be. The usage stats are at the end, 1644 * so anything less than the size we expect won't work. 1645 */ 1646 if (statlen >= sizeof (ike_p1_stats_t)) { 1647 print_lt_usage(prefix, sp); 1648 } else { 1649 return; 1650 } 1651 1652 (void) printf(gettext("%s Expiration info:\n"), prefix); 1653 1654 if (xfp->p1xf_max_kbytes != 0) 1655 (void) printf(gettext("%s %u more bytes %scan be " 1656 "protected.\n"), 1657 prefix, xfp->p1xf_max_kbytes - sp->p1stat_kbytes, 1658 bytecnt2out((uint64_t)(xfp->p1xf_max_kbytes - 1659 sp->p1stat_kbytes) << 10, byte_str, sizeof (byte_str), 1660 SPC_END)); 1661 1662 if (xfp->p1xf_max_keyuses != 0) 1663 (void) printf(gettext("%s Keying material can be provided " 1664 "%u more times.\n"), prefix, 1665 xfp->p1xf_max_keyuses - sp->p1stat_keyuses); 1666 1667 if (xfp->p1xf_max_secs != 0) { 1668 exp = (time_t)sp->p1stat_start + (time_t)xfp->p1xf_max_secs; 1669 remain = exp - current; 1670 if (strftime(tbuf, TBUF_SIZE, NULL, localtime(&exp)) == 0) 1671 (void) strlcpy(tbuf, 1672 gettext("<time conversion failed>"), TBUF_SIZE); 1673 /* 1674 * The SA may have expired but still exist because libike 1675 * has not freed it yet. 1676 */ 1677 if (remain > 0) { 1678 (void) printf(gettext( 1679 "%s SA expires in %lu seconds%s\n"), 1680 prefix, remain, secs2out(remain, secs_str, 1681 sizeof (secs_str), SPC_BEGIN)); 1682 (void) printf(gettext("%s Time of expiration: %s\n"), 1683 prefix, tbuf); 1684 } else { 1685 (void) printf(gettext("%s SA Expired at %s\n"), 1686 prefix, tbuf); 1687 } 1688 } 1689 } 1690 1691 /* used to verify structure lengths... */ 1692 #define COUNTER_32BIT 4 1693 #define COUNTER_PAIR 8 1694 1695 static void 1696 print_p1stats(char *prefix, ike_p1_stats_t *sp, int statlen, 1697 boolean_t print_lifetimes) 1698 { 1699 if (statlen < COUNTER_PAIR) 1700 return; 1701 (void) printf(gettext("%s %u Quick Mode SAs created; "), prefix, 1702 sp->p1stat_new_qm_sas); 1703 (void) printf(gettext("%u Quick Mode SAs deleted\n"), 1704 sp->p1stat_del_qm_sas); 1705 statlen -= COUNTER_PAIR; 1706 1707 if ((print_lifetimes) && (statlen >= LT_USAGE_LEN)) 1708 print_lt_usage(prefix, sp); 1709 } 1710 1711 static void 1712 print_errs(char *prefix, ike_p1_errors_t *errp, int errlen) 1713 { 1714 /* 1715 * Don't try to break this one up; it's either all or nothing! 1716 */ 1717 if (errlen < sizeof (ike_p1_errors_t)) 1718 return; 1719 1720 (void) printf(gettext("%s %u RX errors: "), prefix, 1721 errp->p1err_decrypt + errp->p1err_hash + errp->p1err_otherrx); 1722 (void) printf(gettext("%u decryption, %u hash, %u other\n"), 1723 errp->p1err_decrypt, errp->p1err_hash, errp->p1err_otherrx); 1724 (void) printf(gettext("%s %u TX errors\n"), prefix, errp->p1err_tx); 1725 } 1726 1727 static void 1728 print_addr_range(char *prefix, ike_addr_pr_t *pr) 1729 { 1730 boolean_t range = B_TRUE; 1731 struct sockaddr_storage *beg, *end; 1732 struct sockaddr_in *bsin, *esin; 1733 struct sockaddr_in6 *bsin6, *esin6; 1734 1735 beg = &pr->beg_iprange; 1736 end = &pr->end_iprange; 1737 1738 if (beg->ss_family != end->ss_family) { 1739 (void) printf(gettext("%s invalid address range\n"), prefix); 1740 return; 1741 } 1742 1743 switch (beg->ss_family) { 1744 case AF_INET: 1745 bsin = (struct sockaddr_in *)beg; 1746 esin = (struct sockaddr_in *)end; 1747 if ((uint32_t)bsin->sin_addr.s_addr == 1748 (uint32_t)esin->sin_addr.s_addr) 1749 range = B_FALSE; 1750 break; 1751 case AF_INET6: 1752 bsin6 = (struct sockaddr_in6 *)beg; 1753 esin6 = (struct sockaddr_in6 *)end; 1754 if (IN6_ARE_ADDR_EQUAL(&bsin6->sin6_addr, &esin6->sin6_addr)) 1755 range = B_FALSE; 1756 break; 1757 default: 1758 (void) printf(gettext("%s invalid address range\n"), prefix); 1759 return; 1760 } 1761 1762 (void) printf("%s ", prefix); 1763 (void) dump_sockaddr((struct sockaddr *)beg, 0, B_TRUE, stdout, nflag); 1764 if (range) { 1765 (void) printf(" - "); 1766 (void) dump_sockaddr((struct sockaddr *)end, 0, B_TRUE, stdout, 1767 nflag); 1768 } 1769 (void) printf("\n"); 1770 1771 } 1772 1773 /* 1774 * used to tell printing function if info should be identified 1775 * as belonging to initiator, responder, or neither 1776 */ 1777 #define IS_INITIATOR 1 1778 #define IS_RESPONDER 2 1779 #define DONT_PRINT_INIT 3 1780 1781 static void 1782 print_addr(char *prefix, struct sockaddr_storage *sa, int init_instr, 1783 int mask) 1784 { 1785 (void) printf(gettext("%s Address"), prefix); 1786 1787 if (init_instr != DONT_PRINT_INIT) 1788 (void) printf(" (%s):\n", (init_instr == IS_INITIATOR) ? 1789 gettext("Initiator") : gettext("Responder")); 1790 else 1791 (void) printf(":\n"); 1792 1793 (void) printf("%s ", prefix); 1794 (void) dump_sockaddr((struct sockaddr *)sa, mask, B_FALSE, stdout, 1795 nflag); 1796 } 1797 1798 static void 1799 print_id(char *prefix, sadb_ident_t *idp, int init_instr) 1800 { 1801 boolean_t canprint; 1802 1803 switch (init_instr) { 1804 case IS_INITIATOR: 1805 (void) printf(gettext("%s Initiator identity, "), prefix); 1806 break; 1807 case IS_RESPONDER: 1808 (void) printf(gettext("%s Responder identity, "), prefix); 1809 break; 1810 case DONT_PRINT_INIT: 1811 (void) printf(gettext("%s Identity, "), prefix); 1812 break; 1813 default: 1814 (void) printf(gettext("<invalid identity>\n")); 1815 return; 1816 } 1817 (void) printf(gettext("uid=%d, type "), idp->sadb_ident_id); 1818 canprint = dump_sadb_idtype(idp->sadb_ident_type, stdout, NULL); 1819 if (canprint) { 1820 (void) printf("\n%s %s\n", prefix, (char *)(idp + 1)); 1821 } else { 1822 (void) printf(gettext("\n%s "), prefix); 1823 print_asn1_name(stdout, 1824 (const unsigned char *)(idp + 1), 1825 SADB_64TO8(idp->sadb_ident_len) - sizeof (sadb_ident_t)); 1826 } 1827 } 1828 1829 static void 1830 print_idspec(char *prefix, char *idp, int icnt, int ecnt) 1831 { 1832 int i; 1833 1834 (void) printf(gettext("%s Identity descriptors:\n"), prefix); 1835 1836 for (i = 0; i < icnt; i++) { 1837 if (i == 0) 1838 (void) printf(gettext("%s Includes:\n"), prefix); 1839 (void) printf("%s %s\n", prefix, idp); 1840 idp += strlen(idp) + 1; 1841 } 1842 1843 for (i = 0; i < ecnt; i++) { 1844 if (i == 0) 1845 (void) printf(gettext("%s Excludes:\n"), prefix); 1846 (void) printf("%s %s\n", prefix, idp); 1847 idp += strlen(idp) + 1; 1848 } 1849 } 1850 1851 static void 1852 print_keys(char *prefix, ike_p1_key_t *keyp, int size) 1853 { 1854 uint32_t *curp; 1855 ike_p1_key_t *p; 1856 int ssize; 1857 1858 curp = (uint32_t *)keyp; 1859 1860 ssize = sizeof (ike_p1_key_t); 1861 1862 while ((intptr_t)curp - (intptr_t)keyp < size) { 1863 size_t p1klen, len; 1864 1865 p = (ike_p1_key_t *)curp; 1866 p1klen = p->p1key_len; 1867 len = p1klen - ssize; 1868 1869 p1klen = roundup(p1klen, sizeof (ike_p1_key_t)); 1870 if (p1klen < ssize) { 1871 (void) printf(gettext("Short key\n")); 1872 break; 1873 } 1874 1875 switch (p->p1key_type) { 1876 case IKE_KEY_PRESHARED: 1877 (void) printf(gettext("%s Pre-shared key (%d bytes): "), 1878 prefix, len); 1879 break; 1880 case IKE_KEY_SKEYID: 1881 (void) printf(gettext("%s SKEYID (%d bytes): "), 1882 prefix, len); 1883 break; 1884 case IKE_KEY_SKEYID_D: 1885 (void) printf(gettext("%s SKEYID_d (%d bytes): "), 1886 prefix, len); 1887 break; 1888 case IKE_KEY_SKEYID_A: 1889 (void) printf(gettext("%s SKEYID_a (%d bytes): "), 1890 prefix, len); 1891 break; 1892 case IKE_KEY_SKEYID_E: 1893 (void) printf(gettext("%s SKEYID_e (%d bytes): "), 1894 prefix, len); 1895 break; 1896 case IKE_KEY_ENCR: 1897 (void) printf(gettext("%s Encryption key (%d bytes): "), 1898 prefix, len); 1899 break; 1900 case IKE_KEY_IV: 1901 (void) printf( 1902 gettext("%s Initialization vector (%d bytes): "), 1903 prefix, len); 1904 break; 1905 default: 1906 (void) printf(gettext("%s Unidentified key info %p %d"), 1907 prefix, p, p1klen); 1908 goto badkey; 1909 } 1910 (void) dump_key((uint8_t *)(p + 1), SADB_8TO1(len), 0, 1911 stdout, B_FALSE); 1912 badkey: 1913 (void) printf("\n"); 1914 assert(IS_P2ALIGNED(p1klen, 8)); 1915 curp += (p1klen >> 2); 1916 } 1917 } 1918 1919 static void 1920 print_group_header(void) 1921 { 1922 (void) printf(gettext("\nList of Diffie-Hellman groups for setting " 1923 "up IKE SAs")); 1924 (void) printf(gettext("\nThe values match the IPsec attribute " 1925 "assigned numbers published by IANA\n\n")); 1926 (void) printf("%-6s%-9s%-50s\n", 1927 gettext("Value"), gettext("Strength"), gettext("Description")); 1928 } 1929 1930 static void 1931 print_group(ike_group_t *gp) 1932 { 1933 (void) printf("%-6u%-9u%-50s\n", 1934 gp->group_number, gp->group_bits, gp->group_label); 1935 } 1936 1937 static void 1938 print_encralg_header(void) 1939 { 1940 (void) printf(gettext("\nList of encryption algorithms for IKE")); 1941 (void) printf(gettext("\nThe values match the IPsec attribute " 1942 "assigned numbers published by IANA\n\n")); 1943 (void) printf("%-6s%-20s%-15s\n", gettext("Value"), 1944 gettext("Name"), gettext("Keylen range")); 1945 } 1946 1947 static void 1948 print_encralg(ike_encralg_t *ep) 1949 { 1950 char keylen_str[16]; 1951 1952 (void) strlcpy(keylen_str, "N/A", sizeof (keylen_str)); 1953 if (ep->encr_keylen_min != 0 || ep->encr_keylen_max != 0) 1954 (void) snprintf(keylen_str, sizeof (keylen_str), "%d-%d", 1955 ep->encr_keylen_min, ep->encr_keylen_max); 1956 (void) printf("%-6u%-20s%-15s\n", 1957 ep->encr_value, ep->encr_name, keylen_str); 1958 } 1959 1960 static void 1961 print_authalg_header(void) 1962 { 1963 (void) printf(gettext("\nList of authentication algorithms for IKE")); 1964 (void) printf(gettext("\nThe values match the IPsec attribute " 1965 "assigned numbers published by IANA\n\n")); 1966 (void) printf("%-6s%-20s\n", gettext("Value"), gettext("Name")); 1967 } 1968 1969 static void 1970 print_authalg(ike_authalg_t *ap) 1971 { 1972 (void) printf("%-6u%-20s\n", 1973 ap->auth_value, ap->auth_name); 1974 } 1975 1976 static void 1977 print_p1(ike_p1_sa_t *p1) 1978 { 1979 ike_p1_stats_t *sp; 1980 ike_p1_errors_t *ep; 1981 ike_p1_key_t *kp; 1982 sadb_ident_t *lidp, *ridp; 1983 int lstat, rstat; 1984 1985 (void) printf("\n"); 1986 print_hdr("IKESA:", &p1->p1sa_hdr); 1987 print_xform("XFORM:", &p1->p1sa_xform, B_FALSE); 1988 1989 if (p1->p1sa_hdr.p1hdr_isinit) { 1990 lstat = IS_INITIATOR; 1991 rstat = IS_RESPONDER; 1992 } else { 1993 lstat = IS_RESPONDER; 1994 rstat = IS_INITIATOR; 1995 } 1996 print_addr("LOCIP:", &p1->p1sa_ipaddrs.loc_addr, lstat, 0); 1997 print_addr("REMIP:", &p1->p1sa_ipaddrs.rem_addr, rstat, 0); 1998 1999 /* 2000 * the stat len might be 0; but still make the call 2001 * to print_lifetime() to pick up the xform info 2002 */ 2003 sp = (ike_p1_stats_t *)((int)(p1) + p1->p1sa_stat_off); 2004 print_lifetime("LIFTM:", &p1->p1sa_xform, sp, p1->p1sa_stat_len); 2005 2006 if (p1->p1sa_stat_len > 0) { 2007 print_p1stats("STATS:", sp, p1->p1sa_stat_len, B_FALSE); 2008 } 2009 2010 if (p1->p1sa_error_len > 0) { 2011 ep = (ike_p1_errors_t *)((int)(p1) + p1->p1sa_error_off); 2012 print_errs("ERRS: ", ep, p1->p1sa_error_len); 2013 } 2014 2015 if (p1->p1sa_localid_len > 0) { 2016 lidp = (sadb_ident_t *)((int)(p1) + p1->p1sa_localid_off); 2017 print_id("LOCID:", lidp, lstat); 2018 } 2019 2020 if (p1->p1sa_remoteid_len > 0) { 2021 ridp = (sadb_ident_t *)((int)(p1) + p1->p1sa_remoteid_off); 2022 print_id("REMID:", ridp, rstat); 2023 } 2024 2025 if (p1->p1sa_key_len > 0) { 2026 kp = (ike_p1_key_t *)((int)(p1) + p1->p1sa_key_off); 2027 print_keys("KEY: ", kp, p1->p1sa_key_len); 2028 } 2029 } 2030 2031 static void 2032 print_certcache(ike_certcache_t *c) 2033 { 2034 (void) printf("\n"); 2035 2036 (void) printf(gettext("CERTIFICATE CACHE ID: %d\n"), c->cache_id); 2037 (void) printf(gettext("\tSubject Name: <%s>\n"), 2038 (*c->subject != '\0') ? c->subject : gettext("Name unavailable")); 2039 (void) printf(gettext("\t Issuer Name: <%s>\n"), 2040 (*c->issuer != '\0') ? c->issuer : gettext("Name unavailable")); 2041 if ((int)c->certclass == -1) 2042 (void) printf(gettext("\t\t[trusted certificate]\n")); 2043 switch (c->linkage) { 2044 case CERT_OFF_WIRE: 2045 (void) printf(gettext("\t\t[Public certificate only]\n")); 2046 (void) printf(gettext( 2047 "\t\t[Obtained via certificate payload]\n")); 2048 break; 2049 case CERT_NO_PRIVKEY: 2050 (void) printf(gettext("\t\t[Public certificate only]\n")); 2051 break; 2052 case CERT_PRIVKEY_LOCKED: 2053 (void) printf(gettext( 2054 "\t\t[Private key linked but locked]\n")); 2055 break; 2056 case CERT_PRIVKEY_AVAIL: 2057 (void) printf(gettext("\t\t[Private key available]\n")); 2058 break; 2059 } 2060 } 2061 2062 static void 2063 print_ps(ike_ps_t *ps) 2064 { 2065 sadb_ident_t *lidp, *ridp; 2066 uint8_t *keyp; 2067 2068 (void) printf("\n"); 2069 2070 (void) printf(gettext("PSKEY: For %s exchanges\n"), 2071 xchgstr(ps->ps_ike_mode)); 2072 2073 if (ps->ps_key_len > 0) { 2074 keyp = (uint8_t *)((int)(ps) + ps->ps_key_off); 2075 (void) printf(gettext("PSKEY: Pre-shared key (%d bytes): "), 2076 ps->ps_key_len); 2077 (void) dump_key(keyp, ps->ps_key_bits, 0, stdout, B_FALSE); 2078 (void) printf("\n"); 2079 } 2080 2081 /* 2082 * We get *either* and address or an ident, never both. So if 2083 * the ident is there, don't try printing an address. 2084 */ 2085 if (ps->ps_localid_len > 0) { 2086 lidp = (sadb_ident_t *) 2087 ((int)(ps) + ps->ps_localid_off); 2088 print_id("LOCID:", lidp, DONT_PRINT_INIT); 2089 } else { 2090 print_addr("LOCIP:", &ps->ps_ipaddrs.loc_addr, DONT_PRINT_INIT, 2091 ps->ps_localid_plen > 0 ? ps->ps_localid_plen : 0); 2092 } 2093 2094 if (ps->ps_remoteid_len > 0) { 2095 ridp = (sadb_ident_t *) 2096 ((int)(ps) + ps->ps_remoteid_off); 2097 print_id("REMID:", ridp, DONT_PRINT_INIT); 2098 } else { 2099 print_addr("REMIP:", &ps->ps_ipaddrs.rem_addr, DONT_PRINT_INIT, 2100 ps->ps_remoteid_plen > 0 ? ps->ps_remoteid_plen : 0); 2101 } 2102 } 2103 2104 #define PREFIXLEN 16 2105 2106 static void 2107 print_rule(ike_rule_t *rp) 2108 { 2109 char prefix[PREFIXLEN]; 2110 int i; 2111 ike_p1_xform_t *xfp; 2112 ike_addr_pr_t *lipp, *ripp; 2113 char *lidp, *ridp; 2114 char byte_str[BYTE_STR_SIZE]; /* kbyte string representation */ 2115 char secs_str[SECS_STR_SIZE]; /* seconds string representation */ 2116 2117 (void) printf("\n"); 2118 (void) printf(gettext("GLOBL: Label '%s', key manager cookie %u\n"), 2119 rp->rule_label, rp->rule_kmcookie); 2120 (void) printf(gettext("GLOBL: local_idtype=")); 2121 (void) dump_sadb_idtype(rp->rule_local_idtype, stdout, NULL); 2122 (void) printf(gettext(", ike_mode=%s\n"), xchgstr(rp->rule_ike_mode)); 2123 (void) printf(gettext( 2124 "GLOBL: p1_nonce_len=%u, p2_nonce_len=%u, p2_pfs=%s (group %u)\n"), 2125 rp->rule_p1_nonce_len, rp->rule_p2_nonce_len, 2126 (rp->rule_p2_pfs) ? gettext("true") : gettext("false"), 2127 rp->rule_p2_pfs); 2128 (void) printf( 2129 gettext("GLOBL: p2_lifetime=%u seconds%s\n"), 2130 rp->rule_p2_lifetime_secs, secs2out(rp->rule_p2_lifetime_secs, 2131 secs_str, sizeof (secs_str), SPC_BEGIN)); 2132 (void) printf( 2133 gettext("GLOBL: p2_softlife=%u seconds%s\n"), 2134 rp->rule_p2_softlife_secs, secs2out(rp->rule_p2_softlife_secs, 2135 secs_str, sizeof (secs_str), SPC_BEGIN)); 2136 (void) printf( 2137 gettext("GLOBL: p2_idletime=%u seconds%s\n"), 2138 rp->rule_p2_idletime_secs, secs2out(rp->rule_p2_idletime_secs, 2139 secs_str, sizeof (secs_str), SPC_BEGIN)); 2140 /* 2141 * Perform explicit conversion before passing to bytecnt2out() 2142 * to avoid integer overflow. 2143 */ 2144 (void) printf( 2145 gettext("GLOBL: p2_lifetime_kb=%u kilobytes%s\n"), 2146 rp->rule_p2_lifetime_kb, 2147 bytecnt2out((uint64_t)(rp->rule_p2_lifetime_kb) << 10, 2148 byte_str, sizeof (byte_str), SPC_BEGIN)); 2149 (void) printf( 2150 gettext("GLOBL: p2_softlife_kb=%u kilobytes%s\n"), 2151 rp->rule_p2_softlife_kb, 2152 bytecnt2out(((uint64_t)(rp->rule_p2_softlife_kb)) << 10, 2153 byte_str, sizeof (byte_str), SPC_BEGIN)); 2154 2155 if (rp->rule_locip_cnt > 0) { 2156 (void) printf(gettext("LOCIP: IP address range(s):\n")); 2157 lipp = (ike_addr_pr_t *)((int)rp + rp->rule_locip_off); 2158 for (i = 0; i < rp->rule_locip_cnt; i++, lipp++) { 2159 print_addr_range("LOCIP:", lipp); 2160 } 2161 } 2162 2163 if (rp->rule_remip_cnt > 0) { 2164 (void) printf(gettext("REMIP: IP address range(s):\n")); 2165 ripp = (ike_addr_pr_t *)((int)rp + rp->rule_remip_off); 2166 for (i = 0; i < rp->rule_remip_cnt; i++, ripp++) { 2167 print_addr_range("REMIP:", ripp); 2168 } 2169 } 2170 2171 if (rp->rule_locid_inclcnt + rp->rule_locid_exclcnt > 0) { 2172 lidp = (char *)((int)rp + rp->rule_locid_off); 2173 print_idspec("LOCID:", lidp, rp->rule_locid_inclcnt, 2174 rp->rule_locid_exclcnt); 2175 } 2176 2177 if (rp->rule_remid_inclcnt + rp->rule_remid_exclcnt > 0) { 2178 ridp = (char *)((int)rp + rp->rule_remid_off); 2179 print_idspec("REMID:", ridp, rp->rule_remid_inclcnt, 2180 rp->rule_remid_exclcnt); 2181 } 2182 2183 if (rp->rule_xform_cnt > 0) { 2184 (void) printf(gettext("XFRMS: Available Transforms:\n")); 2185 xfp = (ike_p1_xform_t *)((int)rp + rp->rule_xform_off); 2186 for (i = 0; i < rp->rule_xform_cnt; i++, xfp++) { 2187 (void) snprintf(prefix, PREFIXLEN, "XF %2u:", i); 2188 print_xform(prefix, xfp, B_TRUE); 2189 } 2190 } 2191 } 2192 2193 #undef PREFIXLEN 2194 2195 #define PRSACNTS(init, resp) \ 2196 (void) printf(gettext("initiator: %10u responder: %10u\n"), \ 2197 (init), (resp)) 2198 2199 static void 2200 print_stats(ike_stats_t *sp, int len) 2201 { 2202 /* 2203 * before printing each line, make sure the structure we were 2204 * given is big enough to include the fields needed. 2205 */ 2206 if (len < COUNTER_PAIR) 2207 return; 2208 (void) printf(gettext("Phase 1 SA counts:\n")); 2209 (void) printf(gettext("Current: ")); 2210 PRSACNTS(sp->st_init_p1_current, sp->st_resp_p1_current); 2211 len -= COUNTER_PAIR; 2212 2213 if (len < COUNTER_PAIR) 2214 return; 2215 (void) printf(gettext("Total: ")); 2216 PRSACNTS(sp->st_init_p1_total, sp->st_resp_p1_total); 2217 len -= COUNTER_PAIR; 2218 2219 if (len < COUNTER_PAIR) 2220 return; 2221 (void) printf(gettext("Attempted: ")); 2222 PRSACNTS(sp->st_init_p1_attempts, sp->st_resp_p1_attempts); 2223 len -= COUNTER_PAIR; 2224 2225 if (len < (COUNTER_PAIR + COUNTER_32BIT)) 2226 return; 2227 (void) printf(gettext("Failed: ")); 2228 PRSACNTS(sp->st_init_p1_noresp + sp->st_init_p1_respfail, 2229 sp->st_resp_p1_fail); 2230 (void) printf( 2231 gettext(" initiator fails include %u time-out(s)\n"), 2232 sp->st_init_p1_noresp); 2233 2234 if (len < PATH_MAX) 2235 return; 2236 if (*(sp->st_pkcs11_libname) != '\0') 2237 (void) printf(gettext("PKCS#11 library linked in from %s\n"), 2238 sp->st_pkcs11_libname); 2239 } 2240 2241 /* Print one line of 'get defaults' output (i.e. single value). */ 2242 static void 2243 print_defaults(char *label, char *description, char *unit, 2244 uint_t current, uint_t def) 2245 { 2246 (void) printf("%-18s%-10s%11u %-10s%-26s\n", label, 2247 (current != def) ? gettext("config") : gettext("default"), 2248 current, unit, description); 2249 } 2250 2251 /* 2252 * Print out defaults used by in.iked, the argument is a buffer containing 2253 * two ike_defaults_t's, the first contains the hard coded defaults, the second 2254 * contains the actual values used. If these differ, then the defaults have been 2255 * changed via a config file entry. Note that "-" indicates this default 2256 * is not tunable via ike.config(5) or is system wide tunable. 2257 */ 2258 static void 2259 do_print_defaults(ike_defaults_t *dp) 2260 { 2261 ike_defaults_t *ddp; 2262 ddp = (ike_defaults_t *)(dp + 1); 2263 2264 (void) printf(gettext("\nGlobal defaults. Some values can be" 2265 " over-ridden on a per rule basis.\n")); 2266 (void) printf(gettext("\nSystem defaults are time delayed.\n\n")); 2267 2268 (void) printf("%-18s%-10s%-12s%-10s%-26s\n\n", 2269 gettext("Token:"), gettext("Source:"), gettext("Value:"), 2270 gettext("Unit:"), gettext("Description:")); 2271 2272 /* iked tunables */ 2273 print_defaults("p1_lifetime_secs", gettext("phase 1 lifetime"), 2274 gettext("seconds"), ddp->rule_p1_lifetime_secs, 2275 dp->rule_p1_lifetime_secs); 2276 2277 print_defaults("-", gettext("minimum phase 1 lifetime"), 2278 gettext("seconds"), ddp->rule_p1_minlife, 2279 dp->rule_p1_minlife); 2280 2281 print_defaults("p1_nonce_len", gettext("phase 1 nonce length"), 2282 gettext("bytes"), ddp->rule_p1_nonce_len, 2283 dp->rule_p1_nonce_len); 2284 2285 print_defaults("p2_lifetime_secs", gettext("phase 2 lifetime"), 2286 gettext("seconds"), ddp->rule_p2_lifetime_secs, 2287 dp->rule_p2_lifetime_secs); 2288 2289 print_defaults("p2_softlife_secs", gettext("phase 2 soft lifetime"), 2290 gettext("seconds"), ddp->rule_p2_softlife_secs, 2291 dp->rule_p2_softlife_secs); 2292 2293 print_defaults("p2_idletime_secs", gettext("phase 2 idle time"), 2294 gettext("seconds"), ddp->rule_p2_idletime_secs, 2295 dp->rule_p2_idletime_secs); 2296 2297 print_defaults("p2_lifetime_kb", gettext("phase 2 lifetime"), 2298 gettext("kilobytes"), ddp->rule_p2_lifetime_kb, 2299 dp->rule_p2_lifetime_kb); 2300 2301 print_defaults("p2_softlife_kb", gettext("phase 2 soft lifetime"), 2302 gettext("kilobytes"), ddp->rule_p2_softlife_kb, 2303 dp->rule_p2_softlife_kb); 2304 2305 /* system wide tunables */ 2306 print_defaults("-", gettext("system phase 2 lifetime"), 2307 gettext("seconds"), ddp->sys_p2_lifetime_secs, 2308 dp->sys_p2_lifetime_secs); 2309 2310 print_defaults("-", gettext("system phase 2 soft lifetime"), 2311 gettext("seconds"), ddp->sys_p2_softlife_secs, 2312 dp->sys_p2_softlife_secs); 2313 2314 print_defaults("-", gettext("system phase 2 idle time"), 2315 gettext("seconds"), ddp->sys_p2_idletime_secs, 2316 dp->sys_p2_idletime_secs); 2317 2318 print_defaults("-", gettext("system phase 2 lifetime"), 2319 gettext("bytes"), ddp->sys_p2_lifetime_bytes, 2320 dp->sys_p2_lifetime_bytes); 2321 2322 print_defaults("-", gettext("system phase 2 soft lifetime"), 2323 gettext("bytes"), ddp->sys_p2_softlife_bytes, 2324 dp->sys_p2_softlife_bytes); 2325 2326 /* minimum and maximum values */ 2327 print_defaults("-", gettext("minimum phase 2 hard lifetime"), 2328 gettext("seconds"), ddp->rule_p2_minlife_hard_secs, 2329 dp->rule_p2_minlife_hard_secs); 2330 2331 print_defaults("-", gettext("minimum phase 2 soft lifetime"), 2332 gettext("seconds"), ddp->rule_p2_minlife_soft_secs, 2333 dp->rule_p2_minlife_soft_secs); 2334 2335 print_defaults("-", gettext("minimum phase 2 idle lifetime"), 2336 gettext("seconds"), ddp->rule_p2_minlife_idle_secs, 2337 dp->rule_p2_minlife_idle_secs); 2338 2339 print_defaults("-", gettext("minimum phase 2 hard lifetime"), 2340 gettext("kilobytes"), ddp->rule_p2_minlife_hard_kb, 2341 dp->rule_p2_minlife_hard_kb); 2342 2343 print_defaults("-", gettext("minimum phase 2 soft lifetime"), 2344 gettext("kilobytes"), ddp->rule_p2_minlife_soft_kb, 2345 dp->rule_p2_minlife_soft_kb); 2346 2347 print_defaults("-", gettext("minimum phase 2 delta"), 2348 gettext("seconds"), ddp->rule_p2_mindiff_secs, 2349 dp->rule_p2_mindiff_secs); 2350 2351 print_defaults("-", gettext("minimum phase 2 delta"), 2352 gettext("kilobytes"), ddp->rule_p2_mindiff_kb, 2353 dp->rule_p2_mindiff_kb); 2354 2355 print_defaults("-", gettext("maximum phase 2 lifetime"), 2356 gettext("seconds"), ddp->rule_p2_maxlife_secs, 2357 dp->rule_p2_maxlife_secs); 2358 2359 print_defaults("-", gettext("conversion factor"), 2360 gettext("kbytes/s"), ddp->conversion_factor, 2361 dp->conversion_factor); 2362 2363 print_defaults("-", gettext("maximum phase 2 lifetime"), 2364 gettext("kilobytes"), ddp->rule_p2_maxlife_kb, 2365 dp->rule_p2_maxlife_kb); 2366 2367 /* other values */ 2368 print_defaults("p2_nonce_len", gettext("phase 2 nonce length"), 2369 gettext("bytes"), ddp->rule_p2_nonce_len, 2370 dp->rule_p2_nonce_len); 2371 2372 print_defaults("p2_pfs", gettext("phase 2 PFS"), 2373 " ", ddp->rule_p2_pfs, dp->rule_p2_pfs); 2374 2375 print_defaults("max_certs", gettext("max certificates"), 2376 " ", ddp->rule_max_certs, dp->rule_max_certs); 2377 2378 print_defaults("-", gettext("IKE port number"), 2379 " ", ddp->rule_ike_port, dp->rule_ike_port); 2380 2381 print_defaults("-", gettext("NAT-T port number"), 2382 " ", ddp->rule_natt_port, dp->rule_natt_port); 2383 } 2384 2385 static void 2386 print_categories(int level) 2387 { 2388 int mask; 2389 2390 if (level == 0) { 2391 (void) printf(gettext("No debug categories enabled.\n")); 2392 return; 2393 } 2394 2395 (void) printf(gettext("Debug categories enabled:")); 2396 for (mask = 1; mask <= D_HIGHBIT; mask <<= 1) { 2397 if (level & mask) 2398 (void) printf("\n\t%s", dbgstr(mask)); 2399 } 2400 (void) printf("\n"); 2401 } 2402 2403 /*PRINTFLIKE2*/ 2404 static void 2405 ikeadm_err_exit(ike_err_t *err, char *fmt, ...) 2406 { 2407 va_list ap; 2408 char bailbuf[BUFSIZ]; 2409 2410 va_start(ap, fmt); 2411 (void) vsnprintf(bailbuf, BUFSIZ, fmt, ap); 2412 va_end(ap); 2413 if ((err != NULL) && (err->ike_err == IKE_ERR_SYS_ERR)) { 2414 bail_msg("%s: %s", bailbuf, (err->ike_err_unix == 0) ? 2415 gettext("<unknown error>") : strerror(err->ike_err_unix)); 2416 } else { 2417 bail_msg("%s: %s", bailbuf, (err == NULL) ? 2418 gettext("<unknown error>") : errstr(err->ike_err)); 2419 } 2420 } 2421 2422 /*PRINTFLIKE2*/ 2423 static void 2424 ikeadm_err_msg(ike_err_t *err, char *fmt, ...) 2425 { 2426 va_list ap; 2427 char mbuf[BUFSIZ]; 2428 2429 va_start(ap, fmt); 2430 (void) vsnprintf(mbuf, BUFSIZ, fmt, ap); 2431 va_end(ap); 2432 if ((err != NULL) && (err->ike_err == IKE_ERR_SYS_ERR)) { 2433 message("%s: %s", mbuf, (err->ike_err_unix == 0) ? 2434 gettext("<unknown error>") : 2435 ((err->ike_err_unix == EEXIST) ? 2436 gettext("Duplicate entry") : 2437 strerror(err->ike_err_unix))); 2438 } else { 2439 message("%s: %s", mbuf, (err == NULL) ? 2440 gettext("<unknown error>") : errstr(err->ike_err)); 2441 } 2442 } 2443 2444 2445 /* 2446 * Command functions 2447 */ 2448 2449 /* 2450 * Exploit the fact that ike_dbg_t and ike_priv_t have identical 2451 * formats in the following two functions. 2452 */ 2453 static void 2454 do_getvar(int cmd) 2455 { 2456 ike_service_t req, *rtn; 2457 ike_dbg_t *dreq; 2458 char *varname; 2459 2460 switch (cmd) { 2461 case IKE_SVC_GET_DBG: 2462 varname = gettext("debug"); 2463 break; 2464 case IKE_SVC_GET_PRIV: 2465 varname = gettext("privilege"); 2466 break; 2467 default: 2468 bail_msg(gettext("unrecognized get command (%d)"), cmd); 2469 } 2470 2471 dreq = &req.svc_dbg; 2472 dreq->cmd = cmd; 2473 dreq->dbg_level = 0; 2474 2475 rtn = ikedoor_call((char *)&req, sizeof (ike_dbg_t), NULL, 0); 2476 2477 if ((rtn == NULL) || (rtn->svc_err.cmd == IKE_SVC_ERROR)) { 2478 ikeadm_err_exit(&rtn->svc_err, 2479 gettext("error getting %s level"), varname); 2480 } 2481 dreq = &rtn->svc_dbg; 2482 (void) printf(gettext("Current %s level is 0x%x"), 2483 varname, dreq->dbg_level); 2484 2485 if (cmd == IKE_SVC_GET_DBG) { 2486 (void) printf("\n"); 2487 print_categories(dreq->dbg_level); 2488 } else { 2489 (void) printf(gettext(", %s enabled\n"), 2490 privstr(dreq->dbg_level)); 2491 } 2492 } 2493 2494 /* 2495 * Log into a token and unlock all objects 2496 * referenced by PKCS#11 hint files. 2497 */ 2498 static void 2499 do_setdel_pin(int cmd, int argc, char **argv) 2500 { 2501 ike_service_t req, *rtn; 2502 ike_pin_t *preq; 2503 char token_label[PKCS11_TOKSIZE]; 2504 char *token_pin; 2505 char prompt[80]; 2506 2507 if (argc < 1) 2508 Bail(gettext("Must specify PKCS#11 token object.")); 2509 2510 preq = &req.svc_pin; 2511 preq->cmd = cmd; 2512 2513 switch (cmd) { 2514 case IKE_SVC_SET_PIN: 2515 if (parse_token(argc, argv, token_label) != 0) 2516 Bail("Invalid syntax for \"token login\""); 2517 (void) snprintf(prompt, sizeof (prompt), 2518 "Enter PIN for PKCS#11 token \'%s\': ", token_label); 2519 token_pin = 2520 getpassphrase(prompt); 2521 (void) strlcpy((char *)preq->token_pin, token_pin, MAX_PIN_LEN); 2522 bzero(token_pin, strlen(token_pin)); 2523 break; 2524 case IKE_SVC_DEL_PIN: 2525 if (parse_token(argc, argv, token_label) != 0) 2526 Bail("Invalid syntax for \"token logout\""); 2527 break; 2528 default: 2529 bail_msg(gettext("unrecognized token command (%d)"), cmd); 2530 } 2531 2532 (void) strlcpy(preq->pkcs11_token, token_label, PKCS11_TOKSIZE); 2533 2534 rtn = ikedoor_call((char *)&req, sizeof (ike_pin_t), NULL, 0); 2535 if (cmd == IKE_SVC_SET_PIN) 2536 bzero(preq->token_pin, sizeof (preq->token_pin)); 2537 2538 if ((rtn == NULL) || (rtn->svc_err.cmd == IKE_SVC_ERROR)) { 2539 ikeadm_err_exit(&rtn->svc_err, 2540 gettext("PKCS#11 operation")); 2541 } 2542 preq = &rtn->svc_pin; 2543 message(gettext("PKCS#11 operation successful")); 2544 } 2545 2546 static void 2547 do_setvar(int cmd, int argc, char **argv) 2548 { 2549 ike_service_t req, *rtn; 2550 ike_dbg_t *dreq; 2551 door_desc_t *descp = NULL, desc; 2552 int fd, ndesc = 0; 2553 uint32_t reqlevel; 2554 char *varname; 2555 2556 if (argc < 1) 2557 Bail("unspecified level"); 2558 reqlevel = strtoul(argv[0], NULL, 0); 2559 2560 switch (cmd) { 2561 case IKE_SVC_SET_DBG: 2562 if (argc > 2) 2563 Bail("Too many arguments to \"set debug\""); 2564 varname = gettext("debug"); 2565 if (reqlevel == 0) { 2566 /* check for a string... */ 2567 reqlevel = parsedbgopts(argv[0]); 2568 } 2569 if (reqlevel == D_INVALID) 2570 bail_msg(gettext("Bad debug flag: %s"), argv[0]); 2571 break; 2572 case IKE_SVC_SET_PRIV: 2573 if (argc > 1) 2574 Bail("Too many arguments to \"set priv\""); 2575 2576 varname = gettext("privilege"); 2577 if (reqlevel == 0) { 2578 /* check for a string... */ 2579 reqlevel = privstr2num(argv[0]); 2580 } 2581 if (reqlevel > IKE_PRIV_MAXIMUM) 2582 bail_msg(gettext("Bad privilege flag: %s"), argv[0]); 2583 break; 2584 default: 2585 bail_msg(gettext("unrecognized set command (%d)"), cmd); 2586 } 2587 2588 dreq = &req.svc_dbg; 2589 dreq->cmd = cmd; 2590 dreq->dbg_level = reqlevel; 2591 2592 if ((argc == 2) && (cmd == IKE_SVC_SET_DBG)) { 2593 fd = open(argv[1], O_RDWR | O_CREAT | O_APPEND, 2594 S_IRUSR | S_IWUSR); 2595 if (fd < 0) 2596 Bail("open debug file"); 2597 desc.d_data.d_desc.d_descriptor = fd; 2598 desc.d_attributes = DOOR_DESCRIPTOR; 2599 descp = &desc; 2600 ndesc = 1; 2601 } 2602 2603 rtn = ikedoor_call((char *)&req, sizeof (ike_dbg_t), descp, ndesc); 2604 2605 if ((rtn == NULL) || (rtn->svc_err.cmd == IKE_SVC_ERROR)) { 2606 ikeadm_err_exit(&rtn->svc_err, 2607 gettext("error setting %s level"), varname); 2608 } 2609 dreq = &rtn->svc_dbg; 2610 (void) printf( 2611 gettext("Successfully changed %s level from 0x%x to 0x%x\n"), 2612 varname, dreq->dbg_level, reqlevel); 2613 2614 if (cmd == IKE_SVC_SET_DBG) { 2615 print_categories(reqlevel); 2616 } else { 2617 (void) printf(gettext("New privilege level 0x%x enables %s\n"), 2618 reqlevel, privstr(reqlevel)); 2619 } 2620 } 2621 2622 static void 2623 do_getstats(int cmd) 2624 { 2625 ike_service_t *rtn; 2626 ike_statreq_t sreq, *sreqp; 2627 ike_stats_t *sp; 2628 2629 sreq.cmd = cmd; 2630 2631 rtn = ikedoor_call((char *)&sreq, sizeof (ike_statreq_t), NULL, 0); 2632 if ((rtn == NULL) || (rtn->svc_err.cmd == IKE_SVC_ERROR)) { 2633 ikeadm_err_exit(&rtn->svc_err, gettext("error getting stats")); 2634 } 2635 2636 sreqp = &rtn->svc_stats; 2637 sp = (ike_stats_t *)(sreqp + 1); 2638 print_stats(sp, sreqp->stat_len); 2639 } 2640 2641 static void 2642 do_getdefs(int cmd) 2643 { 2644 ike_service_t *rtn; 2645 ike_defreq_t dreq, *dreqp; 2646 ike_defaults_t *dp; 2647 2648 dreq.cmd = cmd; 2649 2650 rtn = ikedoor_call((char *)&dreq, sizeof (ike_defreq_t), NULL, 0); 2651 if ((rtn == NULL) || (rtn->svc_err.cmd == IKE_SVC_ERROR)) { 2652 ikeadm_err_exit(&rtn->svc_err, 2653 gettext("error getting defaults")); 2654 } 2655 2656 dreqp = &rtn->svc_defaults; 2657 dp = (ike_defaults_t *)(dreqp + 1); 2658 2659 /* 2660 * Before printing each line, make sure the structure we were 2661 * given is big enough to include the fields needed. 2662 * Silently bail out of there is a version mismatch. 2663 */ 2664 if (dreqp->stat_len < ((2 * sizeof (ike_defaults_t)) 2665 + sizeof (ike_defreq_t)) || dreqp->version != DOORVER) { 2666 return; 2667 } 2668 do_print_defaults(dp); 2669 } 2670 2671 static void 2672 do_dump(int cmd) 2673 { 2674 char *name; 2675 ike_service_t req, *rtn; 2676 ike_dump_t *dreq, *dump; 2677 2678 switch (cmd) { 2679 case IKE_SVC_DUMP_P1S: 2680 name = gettext("phase 1 SA info"); 2681 break; 2682 case IKE_SVC_DUMP_RULES: 2683 name = gettext("policy rules"); 2684 break; 2685 case IKE_SVC_DUMP_PS: 2686 name = gettext("preshared keys"); 2687 break; 2688 case IKE_SVC_DUMP_CERTCACHE: 2689 name = gettext("certcache"); 2690 break; 2691 case IKE_SVC_DUMP_GROUPS: 2692 name = gettext("groups"); 2693 print_group_header(); 2694 break; 2695 case IKE_SVC_DUMP_ENCRALGS: 2696 name = gettext("encralgs"); 2697 print_encralg_header(); 2698 break; 2699 case IKE_SVC_DUMP_AUTHALGS: 2700 name = gettext("authalgs"); 2701 print_authalg_header(); 2702 break; 2703 default: 2704 bail_msg(gettext("unrecognized dump command (%d)"), cmd); 2705 } 2706 2707 dreq = &req.svc_dump; 2708 dreq->cmd = cmd; 2709 dreq->dump_len = 0; 2710 dreq->dump_next = 0; 2711 do { 2712 rtn = ikedoor_call((char *)&req, sizeof (ike_dump_t), 2713 NULL, 0); 2714 if ((rtn == NULL) || (rtn->svc_err.cmd == IKE_SVC_ERROR)) { 2715 if (rtn && (rtn->svc_err.ike_err == IKE_ERR_NO_OBJ)) { 2716 /* no entries to print */ 2717 break; 2718 } 2719 ikeadm_err_exit(&rtn->svc_err, 2720 gettext("error getting %s"), name); 2721 } 2722 dump = &rtn->svc_dump; 2723 2724 switch (cmd) { 2725 case IKE_SVC_DUMP_P1S: 2726 print_p1((ike_p1_sa_t *)(dump + 1)); 2727 break; 2728 case IKE_SVC_DUMP_RULES: 2729 print_rule((ike_rule_t *)(dump + 1)); 2730 break; 2731 case IKE_SVC_DUMP_PS: 2732 print_ps((ike_ps_t *)(dump + 1)); 2733 break; 2734 case IKE_SVC_DUMP_CERTCACHE: 2735 print_certcache((ike_certcache_t *)(dump + 1)); 2736 break; 2737 case IKE_SVC_DUMP_GROUPS: 2738 print_group((ike_group_t *)(dump + 1)); 2739 break; 2740 case IKE_SVC_DUMP_ENCRALGS: 2741 print_encralg((ike_encralg_t *)(dump + 1)); 2742 break; 2743 case IKE_SVC_DUMP_AUTHALGS: 2744 print_authalg((ike_authalg_t *)(dump + 1)); 2745 break; 2746 } 2747 2748 dreq->dump_next = dump->dump_next; 2749 2750 (void) munmap((char *)rtn, dump->dump_len); 2751 2752 } while (dreq->dump_next); 2753 2754 (void) printf(gettext("\nCompleted dump of %s\n"), name); 2755 } 2756 2757 static void 2758 do_getdel_doorcall(int cmd, int idlen, int idtype, char *idp, char *name) 2759 { 2760 int totallen; 2761 char *p; 2762 ike_service_t *reqp, *rtnp; 2763 ike_get_t *getp; 2764 boolean_t getcmd; 2765 2766 getcmd = ((cmd == IKE_SVC_GET_P1) || (cmd == IKE_SVC_GET_RULE) || 2767 (cmd == IKE_SVC_GET_PS)); 2768 2769 /* 2770 * WARNING: to avoid being redundant, this code takes advantage 2771 * of the fact that the ike_get_t and ike_del_t structures are 2772 * identical (only the field names differ, their function and 2773 * size are the same). If for some reason those structures 2774 * change, this code will need to be re-written to accomodate 2775 * that difference. 2776 */ 2777 totallen = sizeof (ike_get_t) + idlen; 2778 if ((reqp = (ike_service_t *)malloc(totallen)) == NULL) 2779 Bail("malloc(id)"); 2780 2781 getp = &reqp->svc_get; 2782 getp->cmd = cmd; 2783 getp->get_len = totallen; 2784 getp->get_idtype = idtype; 2785 p = (char *)(getp + 1); 2786 2787 (void) memcpy(p, idp, idlen); 2788 2789 rtnp = ikedoor_call((char *)reqp, totallen, NULL, 0); 2790 if ((rtnp == NULL) || (rtnp->svc_err.cmd == IKE_SVC_ERROR)) { 2791 if (rtnp && (rtnp->svc_err.ike_err == IKE_ERR_NO_OBJ)) { 2792 message(gettext("Could not find requested %s."), name); 2793 } else { 2794 ikeadm_err_msg(&rtnp->svc_err, gettext("error %s %s"), 2795 (getcmd) ? gettext("getting") : gettext("deleting"), 2796 name); 2797 } 2798 free(reqp); 2799 return; 2800 } 2801 getp = &rtnp->svc_get; 2802 2803 if (getcmd) { 2804 switch (cmd) { 2805 case IKE_SVC_GET_P1: 2806 print_p1((ike_p1_sa_t *)(getp + 1)); 2807 break; 2808 case IKE_SVC_GET_PS: 2809 print_ps((ike_ps_t *)(getp + 1)); 2810 break; 2811 case IKE_SVC_GET_RULE: 2812 print_rule((ike_rule_t *)(getp + 1)); 2813 break; 2814 } 2815 } else { 2816 message(gettext("Successfully deleted selected %s."), name); 2817 } 2818 2819 (void) munmap((char *)rtnp, getp->get_len); 2820 free(reqp); 2821 } 2822 2823 static void 2824 do_getdel(int cmd, int argc, char **argv) 2825 { 2826 int idlen, idtype = 0, i, j; 2827 int bytelen1, bytelen2; 2828 char *name, *idp, *p, *p1, *p2; 2829 ike_addr_pr_t apr; 2830 ike_cky_pr_t cpr; 2831 sadb_ident_t *sid1p, *sid2p; 2832 struct hostent *he1p, *he2p; 2833 char label[MAX_LABEL_LEN]; 2834 2835 if ((argc < 1) || (argv[0] == NULL)) { 2836 Bail("not enough identification info"); 2837 } 2838 2839 switch (cmd) { 2840 case IKE_SVC_GET_P1: 2841 case IKE_SVC_DEL_P1: 2842 name = gettext("phase 1 SA"); 2843 /* 2844 * The first token must either be an address (or hostname) 2845 * or a cookie. We require cookies to be entered as hex 2846 * numbers, beginning with 0x; so if our token starts with 2847 * that, it's a cookie. 2848 */ 2849 if (strncmp(argv[0], "0x", 2) == 0) { 2850 if (parse_cky_pr(argc, argv, &cpr) >= 0) { 2851 idtype = IKE_ID_CKY_PAIR; 2852 idlen = sizeof (ike_cky_pr_t); 2853 idp = (char *)&cpr; 2854 } 2855 } else { 2856 if (parse_addr_pr(argc, argv, &he1p, &he2p) >= 0) { 2857 idtype = IKE_ID_ADDR_PAIR; 2858 idlen = sizeof (ike_addr_pr_t); 2859 } 2860 } 2861 break; 2862 2863 case IKE_SVC_GET_RULE: 2864 case IKE_SVC_DEL_RULE: 2865 name = gettext("policy rule"); 2866 if (parse_label(argc, argv, label) >= 0) { 2867 idtype = IKE_ID_LABEL; 2868 idlen = MAX_LABEL_LEN; 2869 idp = label; 2870 } 2871 break; 2872 2873 case IKE_SVC_GET_PS: 2874 case IKE_SVC_DEL_PS: 2875 name = gettext("preshared key"); 2876 /* 2877 * The first token must either be an address or an ident 2878 * type. Check for an ident type to determine which it is. 2879 */ 2880 if (parse_idtype(argv[0], NULL) >= 0) { 2881 if (parse_ident_pr(argc, argv, &sid1p, &sid2p) >= 0) { 2882 idtype = IKE_ID_IDENT_PAIR; 2883 idlen = SADB_64TO8(sid1p->sadb_ident_len) + 2884 SADB_64TO8(sid2p->sadb_ident_len); 2885 } 2886 } else { 2887 if (parse_addr_pr(argc, argv, &he1p, &he2p) >= 0) { 2888 idtype = IKE_ID_ADDR_PAIR; 2889 idlen = sizeof (ike_addr_pr_t); 2890 } 2891 } 2892 break; 2893 2894 default: 2895 bail_msg(gettext("unrecognized get/del command (%d)"), cmd); 2896 } 2897 2898 switch (idtype) { 2899 case IKE_ID_ADDR_PAIR: 2900 /* 2901 * we might have exploding addrs here; do every possible 2902 * combination. 2903 */ 2904 i = 0; 2905 j = 0; 2906 while ((p1 = he1p->h_addr_list[i++]) != NULL) { 2907 headdr2sa(p1, &apr.loc_addr, he1p->h_length); 2908 2909 while ((p2 = he2p->h_addr_list[j++]) != NULL) { 2910 headdr2sa(p2, &apr.rem_addr, he2p->h_length); 2911 do_getdel_doorcall(cmd, idlen, idtype, 2912 (char *)&apr, name); 2913 } 2914 } 2915 FREE_HE(he1p); 2916 FREE_HE(he2p); 2917 break; 2918 2919 case IKE_ID_IDENT_PAIR: 2920 bytelen1 = SADB_64TO8(sid1p->sadb_ident_len); 2921 bytelen2 = SADB_64TO8(sid2p->sadb_ident_len); 2922 if (idlen != bytelen1 + bytelen2) 2923 Bail("ident syntax error"); 2924 idp = p = (char *)malloc(idlen); 2925 if (p == NULL) 2926 Bail("malloc(id)"); 2927 (void) memcpy(p, (char *)sid1p, bytelen1); 2928 p += bytelen1; 2929 (void) memcpy(p, (char *)sid2p, bytelen2); 2930 do_getdel_doorcall(cmd, idlen, idtype, idp, name); 2931 free(idp); 2932 free(sid1p); 2933 free(sid2p); 2934 break; 2935 2936 case IKE_ID_CKY_PAIR: 2937 case IKE_ID_LABEL: 2938 do_getdel_doorcall(cmd, idlen, idtype, idp, name); 2939 break; 2940 2941 case 0: 2942 default: 2943 bail_msg(gettext("invalid %s identification\n"), name); 2944 } 2945 } 2946 2947 /* 2948 * Copy source into target, inserting an escape character ('\') before 2949 * any quotes that appear. Return true on success, false on failure. 2950 */ 2951 static boolean_t 2952 escapequotes(char *target, char *source, int tlen) 2953 { 2954 int s, t, len = strlen(source) + 1; 2955 2956 if (tlen < len) 2957 return (B_FALSE); 2958 2959 for (s = 0, t = 0; s < len && t < tlen; s++) { 2960 if (source[s] == '\"') 2961 target[t++] = '\\'; 2962 target[t++] = source[s]; 2963 } 2964 2965 if ((t == tlen) && (s < len)) 2966 return (B_FALSE); 2967 2968 return (B_TRUE); 2969 } 2970 2971 /* 2972 * Return true if the arg following the given keyword should 2973 * be in quotes (i.e. is a string), false if not. 2974 */ 2975 static boolean_t 2976 quotedfield(char *keywd) 2977 { 2978 if ((strncmp(keywd, "label", strlen("label") + 1) == 0) || 2979 (strncmp(keywd, "local_id", strlen("local_id") + 1) == 0) || 2980 (strncmp(keywd, "remote_id", strlen("remote_id") + 1) == 0)) 2981 return (B_TRUE); 2982 2983 return (B_FALSE); 2984 } 2985 2986 static void 2987 do_new(int cmd, int argc, char **argv) 2988 { 2989 ike_service_t *rtn; 2990 ike_new_t new, *newp = NULL; 2991 door_desc_t desc, *descp = NULL; 2992 int i, fd, ndesc = 0, buflen; 2993 char *name, tmpfilepath[32]; 2994 FILE *tmpfile; 2995 2996 switch (cmd) { 2997 case IKE_SVC_NEW_PS: 2998 name = gettext("preshared key"); 2999 break; 3000 case IKE_SVC_NEW_RULE: 3001 name = gettext("policy rule"); 3002 break; 3003 default: 3004 bail_msg(gettext("unrecognized new command (%d)"), cmd); 3005 } 3006 3007 if (argc == 1) { 3008 /* We've been given a file to read from */ 3009 fd = open(argv[0], O_RDONLY); 3010 if (fd < 0) 3011 Bail("open source file"); 3012 3013 desc.d_data.d_desc.d_descriptor = fd; 3014 desc.d_attributes = DOOR_DESCRIPTOR | DOOR_RELEASE; 3015 descp = &desc; 3016 ndesc = 1; 3017 3018 new.cmd = cmd; 3019 new.new_len = 0; 3020 newp = &new; 3021 buflen = sizeof (ike_new_t); 3022 3023 } else if ((argc > 1) && (cmd == IKE_SVC_NEW_PS)) { 3024 /* 3025 * This is an alternative to using the tmpfile method 3026 * for preshared keys. It means we're duplicating the 3027 * parsing effort that happens in readps.c; but it 3028 * does avoid having the key sitting in a file. 3029 */ 3030 ike_ps_t *psp; 3031 int pslen; 3032 3033 /* 3034 * must be in interactive mode; don't want keys in 3035 * the process args. 3036 */ 3037 if (!interactive) 3038 Bail("Must be in interactive mode to add key info."); 3039 if (parse_ps(argc, argv, &psp, &pslen) < 0) { 3040 errno = 0; 3041 Bail("invalid preshared key definition"); 3042 } 3043 newp = malloc(sizeof (ike_new_t) + pslen); 3044 if (newp == NULL) 3045 Bail("alloc pskey"); 3046 newp->cmd = cmd; 3047 newp->new_len = sizeof (ike_new_t) + pslen; 3048 (void) memcpy((char *)(newp + 1), psp, pslen); 3049 buflen = newp->new_len; 3050 /* parse_ps allocated the ike_ps_t buffer; free it now */ 3051 free(psp); 3052 3053 } else if ((argc > 1) && (cmd == IKE_SVC_NEW_RULE)) { 3054 /* 3055 * We've been given the item in argv. However, parsing 3056 * rules can get more than a little messy, and in.iked 3057 * already has a great parser for this stuff! So don't 3058 * fool around with trying to do the parsing here. Just 3059 * write it out to a tempfile, and send the fd to in.iked. 3060 * 3061 * We could conceivably do this for preshared keys, 3062 * rather than duplicating the parsing effort; but that 3063 * would mean the key would be written out to a file, 3064 * which isn't such a good idea. 3065 */ 3066 boolean_t doquotes = B_FALSE; 3067 int rtn; 3068 3069 if ((argv[0][0] != '{') || 3070 (argv[argc - 1][strlen(argv[argc - 1]) - 1] != '}')) 3071 bail_msg(gettext("improperly formatted %s"), name); 3072 3073 /* attempt to use a fairly unpredictable file name... */ 3074 (void) sprintf(tmpfilepath, "/var/run/%x", (int)gethrtime()); 3075 fd = open(tmpfilepath, O_RDWR | O_CREAT | O_EXCL, 3076 S_IRUSR | S_IWUSR); 3077 if (fd < 0) 3078 Bail("cannot open tmpfile"); 3079 3080 /* and make it inaccessible asap */ 3081 if (unlink(tmpfilepath) < 0) { 3082 (void) close(fd); 3083 Bail("tmpfile error"); 3084 } 3085 3086 tmpfile = fdopen(fd, "w"); 3087 if (tmpfile == NULL) { 3088 (void) close(fd); 3089 Bail("cannot write to tmpfile"); 3090 } 3091 3092 for (i = 0; i < argc; i++) { 3093 /* 3094 * We have to do some gyrations with our string here, 3095 * to properly handle quotes. There are two issues: 3096 * - some of the fields of a rule may have embedded 3097 * whitespace, and thus must be quoted on the cmd 3098 * line. The shell removes the quotes, and gives 3099 * us a single argv string; but we need to put the 3100 * quotes back in when we write the string out to 3101 * file. The doquotes boolean is set when we 3102 * process a keyword which will be followed by a 3103 * string value (so the NEXT argv element will be 3104 * quoted). 3105 * - there might be a quote character in a field, 3106 * that was escaped on the cmdline. The shell 3107 * removes the escape char, and leaves the quote 3108 * in the string it gives us. We need to put the 3109 * escape char back in before writing to file. 3110 */ 3111 char field[MAXLINESIZE]; 3112 if (!escapequotes(field, argv[i], MAXLINESIZE)) 3113 Bail("write to tmpfile failed (arg too big)"); 3114 if (doquotes) { 3115 rtn = fprintf(tmpfile, "\"%s\"\n", field); 3116 doquotes = B_FALSE; 3117 } else { 3118 rtn = fprintf(tmpfile, "%s\n", field); 3119 } 3120 if (rtn < 0) 3121 Bail("write to tmpfile failed"); 3122 /* 3123 * check if this is a keyword identifying 3124 * a field that needs to be quoted. 3125 */ 3126 doquotes = quotedfield(argv[i]); 3127 } 3128 if (fflush(tmpfile) == EOF) 3129 Bail("write to tmpfile failed"); 3130 /* rewind so that the daemon will get the beginning */ 3131 rewind(tmpfile); 3132 3133 desc.d_data.d_desc.d_descriptor = fd; 3134 desc.d_attributes = DOOR_DESCRIPTOR | DOOR_RELEASE; 3135 descp = &desc; 3136 ndesc = 1; 3137 3138 new.cmd = cmd; 3139 new.new_len = 0; 3140 newp = &new; 3141 buflen = sizeof (ike_new_t); 3142 3143 } else { 3144 /* not enough information! */ 3145 bail_msg(gettext("missing %s description or file name"), name); 3146 } 3147 3148 rtn = ikedoor_call((char *)newp, buflen, descp, ndesc); 3149 3150 if ((rtn == NULL) || (rtn->svc_err.cmd == IKE_SVC_ERROR)) { 3151 ikeadm_err_msg(&rtn->svc_err, 3152 gettext("error creating new %s"), name); 3153 } else { 3154 message(gettext("Successfully created new %s."), name); 3155 } 3156 } 3157 3158 static void 3159 do_flush(int cmd) 3160 { 3161 ike_service_t *rtnp; 3162 ike_flush_t flush; 3163 3164 if (cmd != IKE_SVC_FLUSH_P1S && cmd != IKE_SVC_FLUSH_CERTCACHE) { 3165 bail_msg(gettext("unrecognized flush command (%d)."), cmd); 3166 } 3167 3168 flush.cmd = cmd; 3169 3170 rtnp = ikedoor_call((char *)&flush, sizeof (ike_flush_t), NULL, 0); 3171 if ((rtnp == NULL) || (rtnp->svc_err.cmd == IKE_SVC_ERROR)) { 3172 ikeadm_err_exit(&rtnp->svc_err, gettext("error doing flush")); 3173 } 3174 if (cmd == IKE_SVC_FLUSH_P1S) 3175 message(gettext("Successfully flushed P1 SAs.")); 3176 else 3177 message(gettext("Successfully flushed cert cache.")); 3178 } 3179 3180 static void 3181 do_rw(int cmd, int argc, char **argv) 3182 { 3183 ike_service_t *rtnp; 3184 ike_rw_t rw; 3185 door_desc_t desc, *descp = NULL; 3186 int oflag, omode, fd, ndesc = 0; 3187 char *op, *obj = NULL; 3188 boolean_t writing = B_FALSE; 3189 3190 switch (cmd) { 3191 case IKE_SVC_READ_PS: 3192 obj = gettext("preshared key"); 3193 /* FALLTHRU */ 3194 case IKE_SVC_READ_RULES: 3195 if (obj == NULL) 3196 obj = gettext("policy rule"); 3197 op = gettext("read"); 3198 oflag = O_RDONLY; 3199 omode = 0; 3200 break; 3201 3202 case IKE_SVC_WRITE_PS: 3203 obj = gettext("preshared key"); 3204 /* FALLTHRU */ 3205 case IKE_SVC_WRITE_RULES: 3206 if (obj == NULL) 3207 obj = gettext("policy rule"); 3208 op = gettext("write"); 3209 oflag = O_RDWR | O_CREAT | O_EXCL; 3210 omode = S_IRUSR | S_IWUSR; 3211 3212 /* for write commands, dest location must be specified */ 3213 if (argc < 1) { 3214 bail_msg(gettext("destination location required " 3215 "to write %ss"), obj); 3216 } 3217 writing = B_TRUE; 3218 break; 3219 3220 default: 3221 bail_msg(gettext("unrecognized read/write command (%d)."), cmd); 3222 } 3223 3224 rw.cmd = cmd; 3225 3226 if (argc >= 1) { 3227 rw.rw_loc = IKE_RW_LOC_USER_SPEC; 3228 fd = open(argv[0], oflag, omode); 3229 if (fd < 0) 3230 Bail("open user-specified file"); 3231 3232 desc.d_data.d_desc.d_descriptor = fd; 3233 desc.d_attributes = DOOR_DESCRIPTOR | DOOR_RELEASE; 3234 descp = &desc; 3235 ndesc = 1; 3236 } else { 3237 rw.rw_loc = IKE_RW_LOC_DEFAULT; 3238 } 3239 3240 rtnp = ikedoor_call((char *)&rw, sizeof (ike_rw_t), descp, ndesc); 3241 if ((rtnp == NULL) || (rtnp->svc_err.cmd == IKE_SVC_ERROR)) { 3242 /* 3243 * Need to remove the target file in the 3244 * case of a failed write command. 3245 */ 3246 if (writing) { 3247 /* 3248 * argv[0] must be valid if we're writing; we 3249 * exit before setting this boolean if not. 3250 */ 3251 (void) unlink(argv[0]); 3252 (void) close(fd); 3253 3254 if ((rtnp != NULL) && 3255 (rtnp->svc_err.ike_err == IKE_ERR_NO_OBJ)) { 3256 message(gettext("No %s information to write."), 3257 obj); 3258 return; 3259 } 3260 } 3261 ikeadm_err_exit(&rtnp->svc_err, gettext("error doing %s"), op); 3262 } 3263 message(gettext("Completed %s of %s configuration information."), 3264 op, obj); 3265 } 3266 3267 static void 3268 do_rbdump() 3269 { 3270 ike_cmd_t req; 3271 ike_service_t *rtnp; 3272 3273 req.cmd = IKE_SVC_DBG_RBDUMP; 3274 3275 rtnp = ikedoor_call((char *)&req, sizeof (ike_cmd_t), NULL, 0); 3276 if ((rtnp == NULL) || (rtnp->svc_err.cmd == IKE_SVC_ERROR)) { 3277 ikeadm_err_exit(&rtnp->svc_err, gettext("error doing flush")); 3278 } 3279 message(gettext("Successfully dumped rulebase; check iked dbg")); 3280 } 3281 3282 #define REQ_ARG_CNT 1 3283 3284 /*ARGSUSED*/ 3285 static void 3286 parseit(int argc, char **argv, char *notused, boolean_t notused_either) 3287 { 3288 int cmd, cmd_obj_args = 1; 3289 char *cmdstr, *objstr; 3290 3291 if (interactive) { 3292 if (argc == 0) 3293 return; 3294 } 3295 3296 if (argc < REQ_ARG_CNT) { 3297 usage(); 3298 } 3299 3300 cmdstr = argv[0]; 3301 if (argc > REQ_ARG_CNT) { 3302 cmd_obj_args++; 3303 objstr = argv[1]; 3304 } else { 3305 objstr = NULL; 3306 } 3307 cmd = parsecmd(cmdstr, objstr); 3308 3309 /* skip over args specifying command/object */ 3310 argc -= cmd_obj_args; 3311 argv += cmd_obj_args; 3312 3313 switch (cmd) { 3314 case IKE_SVC_GET_DEFS: 3315 if (argc != 0) { 3316 print_get_help(); 3317 break; 3318 } 3319 do_getdefs(cmd); 3320 break; 3321 case IKE_SVC_GET_DBG: 3322 case IKE_SVC_GET_PRIV: 3323 if (argc != 0) { 3324 print_get_help(); 3325 break; 3326 } 3327 do_getvar(cmd); 3328 break; 3329 case IKE_SVC_GET_STATS: 3330 if (argc != 0) { 3331 print_get_help(); 3332 break; 3333 } 3334 do_getstats(cmd); 3335 break; 3336 case IKE_SVC_SET_DBG: 3337 case IKE_SVC_SET_PRIV: 3338 do_setvar(cmd, argc, argv); 3339 break; 3340 case IKE_SVC_SET_PIN: 3341 case IKE_SVC_DEL_PIN: 3342 do_setdel_pin(cmd, argc, argv); 3343 break; 3344 case IKE_SVC_DUMP_P1S: 3345 case IKE_SVC_DUMP_RULES: 3346 case IKE_SVC_DUMP_GROUPS: 3347 case IKE_SVC_DUMP_ENCRALGS: 3348 case IKE_SVC_DUMP_AUTHALGS: 3349 case IKE_SVC_DUMP_PS: 3350 case IKE_SVC_DUMP_CERTCACHE: 3351 if (argc != 0) { 3352 print_dump_help(); 3353 break; 3354 } 3355 do_dump(cmd); 3356 break; 3357 case IKE_SVC_GET_P1: 3358 case IKE_SVC_GET_RULE: 3359 case IKE_SVC_GET_PS: 3360 case IKE_SVC_DEL_P1: 3361 case IKE_SVC_DEL_RULE: 3362 case IKE_SVC_DEL_PS: 3363 do_getdel(cmd, argc, argv); 3364 break; 3365 case IKE_SVC_NEW_RULE: 3366 case IKE_SVC_NEW_PS: 3367 do_new(cmd, argc, argv); 3368 break; 3369 case IKE_SVC_FLUSH_P1S: 3370 case IKE_SVC_FLUSH_CERTCACHE: 3371 if (argc != 0) { 3372 print_flush_help(); 3373 break; 3374 } 3375 do_flush(cmd); 3376 break; 3377 case IKE_SVC_READ_RULES: 3378 case IKE_SVC_READ_PS: 3379 case IKE_SVC_WRITE_RULES: 3380 case IKE_SVC_WRITE_PS: 3381 do_rw(cmd, argc, argv); 3382 break; 3383 case IKEADM_HELP_GENERAL: 3384 print_help(); 3385 break; 3386 case IKEADM_HELP_GET: 3387 print_get_help(); 3388 break; 3389 case IKEADM_HELP_SET: 3390 print_set_help(); 3391 break; 3392 case IKEADM_HELP_ADD: 3393 print_add_help(); 3394 break; 3395 case IKEADM_HELP_DEL: 3396 print_del_help(); 3397 break; 3398 case IKEADM_HELP_DUMP: 3399 print_dump_help(); 3400 break; 3401 case IKEADM_HELP_FLUSH: 3402 print_flush_help(); 3403 break; 3404 case IKEADM_HELP_READ: 3405 print_read_help(); 3406 break; 3407 case IKEADM_HELP_WRITE: 3408 print_write_help(); 3409 break; 3410 case IKEADM_HELP_TOKEN: 3411 print_token_help(); 3412 break; 3413 case IKEADM_HELP_HELP: 3414 print_help_help(); 3415 break; 3416 case IKEADM_EXIT: 3417 if (interactive) 3418 exit(0); 3419 break; 3420 case IKE_SVC_DBG_RBDUMP: 3421 do_rbdump(); 3422 break; 3423 case IKE_SVC_ERROR: 3424 usage(); 3425 default: 3426 exit(0); 3427 } 3428 } 3429 3430 int 3431 main(int argc, char **argv) 3432 { 3433 int ch; 3434 3435 (void) setlocale(LC_ALL, ""); 3436 #if !defined(TEXT_DOMAIN) 3437 #define TEXT_DOMAIN "SYS_TEST" 3438 #endif 3439 (void) textdomain(TEXT_DOMAIN); 3440 3441 while ((ch = getopt(argc, argv, "hpn")) != EOF) { 3442 switch (ch) { 3443 case 'h': 3444 print_help(); 3445 return (0); 3446 case 'p': 3447 pflag = B_TRUE; 3448 break; 3449 case 'n': 3450 nflag = B_TRUE; 3451 break; 3452 default: 3453 usage(); 3454 } 3455 } 3456 argc -= optind; 3457 argv += optind; 3458 3459 if (open_door() < 0) { 3460 (void) fprintf(stderr, 3461 gettext("Unable to communicate with in.iked\n")); 3462 Bail("open_door failed"); 3463 } 3464 3465 if (*argv == NULL) { 3466 /* no cmd-line args, do interactive mode */ 3467 do_interactive(stdin, NULL, "ikeadm> ", NULL, parseit, 3468 no_match); 3469 } 3470 3471 parseit(argc, argv, NULL, B_FALSE); 3472 3473 return (0); 3474 } 3475