File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / ipsec-tools / src / racoon / admin.c
Revision 1.1.1.2 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Nov 2 10:45:57 2016 UTC (7 years, 8 months ago) by misho
Branches: ipsec-tools, MAIN
CVS tags: v0_8_2p2, HEAD
ipsec-tools 0.8.2

/*	$NetBSD: admin.c,v 1.38.4.1 2013/06/03 05:49:59 tteras Exp $	*/

/* Id: admin.c,v 1.25 2006/04/06 14:31:04 manubsd Exp */

/*
 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. Neither the name of the project nor the names of its contributors
 *    may be used to endorse or promote products derived from this software
 *    without specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 */

#include "config.h"

#include <sys/types.h>
#include <sys/param.h>
#include <sys/socket.h>
#include <sys/signal.h>
#include <sys/stat.h>
#include <sys/un.h>

#include <net/pfkeyv2.h>

#include <netinet/in.h>
#include PATH_IPSEC_H


#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <errno.h>
#include <netdb.h>
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
#ifdef ENABLE_HYBRID
#include <resolv.h>
#endif

#include "var.h"
#include "misc.h"
#include "vmbuf.h"
#include "plog.h"
#include "sockmisc.h"
#include "debug.h"

#include "schedule.h"
#include "localconf.h"
#include "remoteconf.h"
#include "grabmyaddr.h"
#include "isakmp_var.h"
#include "isakmp.h"
#include "oakley.h"
#include "handler.h"
#include "evt.h"
#include "pfkey.h"
#include "ipsec_doi.h"
#include "policy.h"
#include "admin.h"
#include "admin_var.h"
#include "isakmp_inf.h"
#ifdef ENABLE_HYBRID
#include "isakmp_cfg.h"
#endif
#include "session.h"
#include "gcmalloc.h"

#ifdef ENABLE_ADMINPORT
char *adminsock_path = ADMINSOCK_PATH;
uid_t adminsock_owner = 0;
gid_t adminsock_group = 0;
mode_t adminsock_mode = 0600;

static struct sockaddr_un sunaddr;
static int admin_process __P((int, char *));
static int admin_reply __P((int, struct admin_com *, int, vchar_t *));

static int
admin_handler(ctx, fd)
	void *ctx;
	int fd;
{
	int so2;
	struct sockaddr_storage from;
	socklen_t fromlen = sizeof(from);
	struct admin_com com;
	char *combuf = NULL;
	int len, error = -1;

	so2 = accept(lcconf->sock_admin, (struct sockaddr *)&from, &fromlen);
	if (so2 < 0) {
		plog(LLV_ERROR, LOCATION, NULL,
			"failed to accept admin command: %s\n",
			strerror(errno));
		return -1;
	}
	close_on_exec(so2);

	/* get buffer length */
	while ((len = recv(so2, (char *)&com, sizeof(com), MSG_PEEK)) < 0) {
		if (errno == EINTR)
			continue;
		plog(LLV_ERROR, LOCATION, NULL,
			"failed to recv admin command: %s\n",
			strerror(errno));
		goto end;
	}

	/* sanity check */
	if (len < sizeof(com)) {
		plog(LLV_ERROR, LOCATION, NULL,
			"invalid header length of admin command\n");
		goto end;
	}

	/* get buffer to receive */
	if ((combuf = racoon_malloc(com.ac_len)) == 0) {
		plog(LLV_ERROR, LOCATION, NULL,
			"failed to alloc buffer for admin command\n");
		goto end;
	}

	/* get real data */
	while ((len = recv(so2, combuf, com.ac_len, 0)) < 0) {
		if (errno == EINTR)
			continue;
		plog(LLV_ERROR, LOCATION, NULL,
			"failed to recv admin command: %s\n",
			strerror(errno));
		goto end;
	}

	error = admin_process(so2, combuf);

end:
	if (error == -2) {
		plog(LLV_DEBUG, LOCATION, NULL,
			"[%d] admin connection established\n", so2);
	} else {
		(void)close(so2);
	}

	if (combuf)
		racoon_free(combuf);

	return error;
}

static int admin_ph1_delete_sa(struct ph1handle *iph1, void *arg)
{
	if (iph1->status >= PHASE1ST_ESTABLISHED)
		isakmp_info_send_d1(iph1);
	purge_remote(iph1);
	return 0;
}

/*
 * main child's process.
 */
static int
admin_process(so2, combuf)
	int so2;
	char *combuf;
{
	struct admin_com *com = (struct admin_com *)combuf;
	vchar_t *buf = NULL;
	vchar_t *id = NULL;
	vchar_t *key = NULL;
	int idtype = 0;
	int error = 0, l_ac_errno = 0;
	struct evt_listener_list *event_list = NULL;

	if (com->ac_cmd & ADMIN_FLAG_VERSION)
		com->ac_cmd &= ~ADMIN_FLAG_VERSION;
	else
		com->ac_version = 0;

	switch (com->ac_cmd) {
	case ADMIN_RELOAD_CONF:
		signal_handler(SIGHUP);
		break;

	case ADMIN_SHOW_SCHED: {
		caddr_t p = NULL;
		int len;

		if (sched_dump(&p, &len) != -1) {
			buf = vmalloc(len);
			if (buf != NULL)
				memcpy(buf->v, p, len);
			else
				l_ac_errno = ENOMEM;
			racoon_free(p);
		} else
			l_ac_errno = ENOMEM;
		break;
	}

	case ADMIN_SHOW_EVT:
		if (com->ac_version == 0) {
			buf = evt_dump();
			l_ac_errno = 0;
		}
		break;

	case ADMIN_SHOW_SA:
		switch (com->ac_proto) {
		case ADMIN_PROTO_ISAKMP:
			buf = dumpph1();
			if (buf == NULL)
				l_ac_errno = ENOMEM;
			break;
		case ADMIN_PROTO_IPSEC:
		case ADMIN_PROTO_AH:
		case ADMIN_PROTO_ESP: {
			u_int p;
			p = admin2pfkey_proto(com->ac_proto);
			if (p != -1) {
				buf = pfkey_dump_sadb(p);
				if (buf == NULL)
					l_ac_errno = ENOMEM;
			} else
				l_ac_errno = EINVAL;
			break;
		}
		case ADMIN_PROTO_INTERNAL:
		default:
			l_ac_errno = ENOTSUP;
			break;
		}
		break;

	case ADMIN_GET_SA_CERT: {
		struct admin_com_indexes *ndx;
		struct sockaddr *src, *dst;
		struct ph1handle *iph1;

		ndx = (struct admin_com_indexes *) ((caddr_t)com + sizeof(*com));
		src = (struct sockaddr *) &ndx->src;
		dst = (struct sockaddr *) &ndx->dst;

		if (com->ac_proto != ADMIN_PROTO_ISAKMP) {
			l_ac_errno = ENOTSUP;
			break;
		}

		iph1 = getph1byaddr(src, dst, 0);
		if (iph1 == NULL) {
			l_ac_errno = ENOENT;
			break;
		}

		if (iph1->cert_p != NULL) {
			vchar_t tmp;
			tmp.v = iph1->cert_p->v + 1;
			tmp.l = iph1->cert_p->l - 1;
			buf = vdup(&tmp);
		}
		break;
	}

	case ADMIN_FLUSH_SA:
		switch (com->ac_proto) {
		case ADMIN_PROTO_ISAKMP:
			flushph1();
			break;
		case ADMIN_PROTO_IPSEC:
		case ADMIN_PROTO_AH:
		case ADMIN_PROTO_ESP:
			pfkey_flush_sadb(com->ac_proto);
			break;
		case ADMIN_PROTO_INTERNAL:
			/*XXX flushph2();*/
		default:
			l_ac_errno = ENOTSUP;
			break;
		}
		break;

	case ADMIN_DELETE_SA: {
		char *loc, *rem;
		struct ph1selector sel;

		memset(&sel, 0, sizeof(sel));
		sel.local = (struct sockaddr *)
			&((struct admin_com_indexes *)
			    ((caddr_t)com + sizeof(*com)))->src;
		sel.remote = (struct sockaddr *)
			&((struct admin_com_indexes *)
			    ((caddr_t)com + sizeof(*com)))->dst;

		loc = racoon_strdup(saddr2str(sel.local));
		rem = racoon_strdup(saddr2str(sel.remote));
		STRDUP_FATAL(loc);
		STRDUP_FATAL(rem);

		plog(LLV_INFO, LOCATION, NULL,
		     "admin delete-sa %s %s\n", loc, rem);
		enumph1(&sel, admin_ph1_delete_sa, NULL);
		remcontacted(sel.remote);

		racoon_free(loc);
		racoon_free(rem);
		break;
	}

#ifdef ENABLE_HYBRID
	case ADMIN_LOGOUT_USER: {
		struct ph1handle *iph1;
		char user[LOGINLEN+1];
		int found = 0, len = com->ac_len - sizeof(*com);

		if (len > LOGINLEN) {
			plog(LLV_ERROR, LOCATION, NULL,
			    "malformed message (login too long)\n");
			break;
		}

		memcpy(user, (char *)(com + 1), len);
		user[len] = 0;

		found = purgeph1bylogin(user);
		plog(LLV_INFO, LOCATION, NULL,
		    "deleted %d SA for user \"%s\"\n", found, user);

		break;
	}
#endif

	case ADMIN_DELETE_ALL_SA_DST: {
		struct ph1handle *iph1;
		struct sockaddr *dst;
		char *loc, *rem;

		dst = (struct sockaddr *)
			&((struct admin_com_indexes *)
			    ((caddr_t)com + sizeof(*com)))->dst;

		rem = racoon_strdup(saddrwop2str(dst));
		STRDUP_FATAL(rem);

		plog(LLV_INFO, LOCATION, NULL,
		    "Flushing all SAs for peer %s\n", rem);

		while ((iph1 = getph1bydstaddr(dst)) != NULL) {
			loc = racoon_strdup(saddrwop2str(iph1->local));
			STRDUP_FATAL(loc);

			if (iph1->status >= PHASE1ST_ESTABLISHED)
				isakmp_info_send_d1(iph1);
			purge_remote(iph1);

			racoon_free(loc);
		}

		racoon_free(rem);
		break;
	}

	case ADMIN_ESTABLISH_SA_PSK: {
		struct admin_com_psk *acp;
		char *data;

		acp = (struct admin_com_psk *)
		    ((char *)com + sizeof(*com) +
		    sizeof(struct admin_com_indexes));

		idtype = acp->id_type;

		if ((id = vmalloc(acp->id_len)) == NULL) {
			plog(LLV_ERROR, LOCATION, NULL,
			    "cannot allocate memory: %s\n",
			    strerror(errno));
			break;
		}
		data = (char *)(acp + 1);
		memcpy(id->v, data, id->l);

		if ((key = vmalloc(acp->key_len)) == NULL) {
			plog(LLV_ERROR, LOCATION, NULL,
			    "cannot allocate memory: %s\n",
			    strerror(errno));
			vfree(id);
			id = NULL;
			break;
		}
		data = (char *)(data + acp->id_len);
		memcpy(key->v, data, key->l);
	}
	/* FALLTHROUGH */
	case ADMIN_ESTABLISH_SA: {
		struct admin_com_indexes *ndx;
		struct sockaddr *dst;
		struct sockaddr *src;
		char *name = NULL;

		ndx = (struct admin_com_indexes *) ((caddr_t)com + sizeof(*com));
		src = (struct sockaddr *) &ndx->src;
		dst = (struct sockaddr *) &ndx->dst;

		if (com->ac_cmd == ADMIN_ESTABLISH_SA &&
		    com->ac_len > sizeof(*com) + sizeof(*ndx))
			name = (char *) ((caddr_t) ndx + sizeof(*ndx));

		switch (com->ac_proto) {
		case ADMIN_PROTO_ISAKMP: {
			struct ph1handle *ph1;
			struct remoteconf *rmconf;
			u_int16_t port;

			l_ac_errno = -1;

			/* connected already? */
			ph1 = getph1byaddr(src, dst, 0);
			if (ph1 != NULL) {
				event_list = &ph1->evt_listeners;
				if (ph1->status == PHASE1ST_ESTABLISHED)
					l_ac_errno = EEXIST;
				else
					l_ac_errno = 0;
				break;
			}

			/* search appropreate configuration */
			if (name == NULL)
				rmconf = getrmconf(dst, 0);
			else
				rmconf = getrmconf_by_name(name);
			if (rmconf == NULL) {
				plog(LLV_ERROR, LOCATION, NULL,
					"no configuration found "
					"for %s\n", saddrwop2str(dst));
				break;
			}

#ifdef ENABLE_HYBRID
			/* XXX This overwrites rmconf information globally. */
			/* Set the id and key */
			if (id && key) {
				if (xauth_rmconf_used(&rmconf->xauth) == -1)
					break;

				if (rmconf->xauth->login != NULL) {
					vfree(rmconf->xauth->login);
					rmconf->xauth->login = NULL;
				}
				if (rmconf->xauth->pass != NULL) {
					vfree(rmconf->xauth->pass);
					rmconf->xauth->pass = NULL;
				}

				rmconf->xauth->login = id;
				rmconf->xauth->pass = key;
			}
#endif

			plog(LLV_INFO, LOCATION, NULL,
				"accept a request to establish IKE-SA: "
				"%s\n", saddrwop2str(dst));

			/* begin ident mode */
			ph1 = isakmp_ph1begin_i(rmconf, dst, src);
			if (ph1 == NULL)
				break;

			event_list = &ph1->evt_listeners;
			l_ac_errno = 0;
			break;
		}
		case ADMIN_PROTO_AH:
		case ADMIN_PROTO_ESP: {
			struct ph2handle *iph2;
			struct secpolicy *sp_out = NULL, *sp_in = NULL;
			struct policyindex spidx;

			l_ac_errno = -1;

			/* got outbound policy */
			memset(&spidx, 0, sizeof(spidx));
			spidx.dir = IPSEC_DIR_OUTBOUND;
			memcpy(&spidx.src, src, sizeof(spidx.src));
			memcpy(&spidx.dst, dst, sizeof(spidx.dst));
			spidx.prefs = ndx->prefs;
			spidx.prefd = ndx->prefd;
			spidx.ul_proto = ndx->ul_proto;

			sp_out = getsp_r(&spidx);
			if (sp_out) {
				plog(LLV_DEBUG, LOCATION, NULL,
					"suitable outbound SP found: %s.\n",
					spidx2str(&sp_out->spidx));
			} else {
				l_ac_errno = ENOENT;
				plog(LLV_NOTIFY, LOCATION, NULL,
					"no outbound policy found: %s\n",
					spidx2str(&spidx));
				break;
			}

			iph2 = getph2byid(src, dst, sp_out->id);
			if (iph2 != NULL) {
				event_list = &iph2->evt_listeners;
				if (iph2->status == PHASE2ST_ESTABLISHED)
					l_ac_errno = EEXIST;
				else
					l_ac_errno = 0;
				break;
			}

			/* get inbound policy */
			memset(&spidx, 0, sizeof(spidx));
			spidx.dir = IPSEC_DIR_INBOUND;
			memcpy(&spidx.src, dst, sizeof(spidx.src));
			memcpy(&spidx.dst, src, sizeof(spidx.dst));
			spidx.prefs = ndx->prefd;
			spidx.prefd = ndx->prefs;
			spidx.ul_proto = ndx->ul_proto;

			sp_in = getsp_r(&spidx);
			if (sp_in) {
				plog(LLV_DEBUG, LOCATION, NULL,
					"suitable inbound SP found: %s.\n",
					spidx2str(&sp_in->spidx));
			} else {
				l_ac_errno = ENOENT;
				plog(LLV_NOTIFY, LOCATION, NULL,
					"no inbound policy found: %s\n",
				spidx2str(&spidx));
				break;
			}

			/* allocate a phase 2 */
			iph2 = newph2();
			if (iph2 == NULL) {
				plog(LLV_ERROR, LOCATION, NULL,
					"failed to allocate phase2 entry.\n");
				break;
			}
			iph2->side = INITIATOR;
			iph2->satype = admin2pfkey_proto(com->ac_proto);
			iph2->spid = sp_out->id;
			iph2->seq = pk_getseq();
			iph2->status = PHASE2ST_STATUS2;

                        if (sp_out->local && sp_out->remote) {
                            /* hints available, let's use them */
                            iph2->sa_dst = dupsaddr(dst);
                            iph2->sa_src = dupsaddr(src);
                            iph2->src = dupsaddr((struct sockaddr *)sp_out->local);
                            iph2->dst = dupsaddr((struct sockaddr *)sp_out->remote);
                        } else if (sp_out->req && sp_out->req->saidx.mode == IPSEC_MODE_TUNNEL) {
                            /* Tunnel mode and no hint, use endpoints */
                            iph2->src = dupsaddr((struct sockaddr *)&sp_out->req->saidx.src);
                            iph2->dst = dupsaddr((struct sockaddr *)&sp_out->req->saidx.dst);
                        } else {
                            /* default, use selectors as fallback */
                            iph2->sa_dst = dupsaddr(dst);
                            iph2->sa_src = dupsaddr(src);
                            iph2->dst = dupsaddr(dst);
                            iph2->src = dupsaddr(src);
                        }

                        if (iph2->dst == NULL || iph2->src == NULL) {
                            delph2(iph2);
                            break;
                        }
                        set_port(iph2->dst, 0);
                        set_port(iph2->src, 0);

			if (isakmp_get_sainfo(iph2, sp_out, sp_in) < 0) {
				delph2(iph2);
				break;
			}

			insph2(iph2);
			if (isakmp_post_acquire(iph2, NULL, FALSE) < 0) {
				remph2(iph2);
				delph2(iph2);
				break;
			}

			event_list = &iph2->evt_listeners;
			l_ac_errno = 0;
			break;
		}
		default:
			/* ignore */
			l_ac_errno = ENOTSUP;
		}
		break;
	}

	default:
		plog(LLV_ERROR, LOCATION, NULL,
			"invalid command: %d\n", com->ac_cmd);
		l_ac_errno = ENOTSUP;
	}

	if ((error = admin_reply(so2, com, l_ac_errno, buf)) != 0)
		goto out;

	/* start pushing events if so requested */
	if ((l_ac_errno == 0) &&
	    (com->ac_version >= 1) &&
	    (com->ac_cmd == ADMIN_SHOW_EVT || event_list != NULL))
		error = evt_subscribe(event_list, so2);
out:
	if (buf != NULL)
		vfree(buf);

	return error;
}

static int
admin_reply(so, req, l_ac_errno, buf)
	int so, l_ac_errno;
	struct admin_com *req;
	vchar_t *buf;
{
	int tlen;
	struct admin_com *combuf;
	char *retbuf = NULL;

	if (buf != NULL)
		tlen = sizeof(*combuf) + buf->l;
	else
		tlen = sizeof(*combuf);

	retbuf = racoon_calloc(1, tlen);
	if (retbuf == NULL) {
		plog(LLV_ERROR, LOCATION, NULL,
			"failed to allocate admin buffer\n");
		return -1;
	}

	combuf = (struct admin_com *) retbuf;
	combuf->ac_len = (u_int16_t) tlen;
	combuf->ac_cmd = req->ac_cmd & ~ADMIN_FLAG_VERSION;
	if (tlen != (u_int32_t) combuf->ac_len &&
	    l_ac_errno == 0) {
		combuf->ac_len_high = tlen >> 16;
		combuf->ac_cmd |= ADMIN_FLAG_LONG_REPLY;
	} else {
		combuf->ac_errno = l_ac_errno;
	}
	combuf->ac_proto = req->ac_proto;

	if (buf != NULL)
		memcpy(retbuf + sizeof(*combuf), buf->v, buf->l);

	tlen = send(so, retbuf, tlen, 0);
	racoon_free(retbuf);
	if (tlen < 0) {
		plog(LLV_ERROR, LOCATION, NULL,
			"failed to send admin command: %s\n",
			strerror(errno));
		return -1;
	}

	return 0;
}

/* ADMIN_PROTO -> SADB_SATYPE */
int
admin2pfkey_proto(proto)
	u_int proto;
{
	switch (proto) {
	case ADMIN_PROTO_IPSEC:
		return SADB_SATYPE_UNSPEC;
	case ADMIN_PROTO_AH:
		return SADB_SATYPE_AH;
	case ADMIN_PROTO_ESP:
		return SADB_SATYPE_ESP;
	default:
		plog(LLV_ERROR, LOCATION, NULL,
			"unsupported proto for admin: %d\n", proto);
		return -1;
	}
	/*NOTREACHED*/
}

int
admin_init()
{
	if (adminsock_path == NULL) {
		lcconf->sock_admin = -1;
		return 0;
	}

	memset(&sunaddr, 0, sizeof(sunaddr));
	sunaddr.sun_family = AF_UNIX;
	snprintf(sunaddr.sun_path, sizeof(sunaddr.sun_path),
		"%s", adminsock_path);

	lcconf->sock_admin = socket(AF_UNIX, SOCK_STREAM, 0);
	if (lcconf->sock_admin == -1) {
		plog(LLV_ERROR, LOCATION, NULL,
			"socket: %s\n", strerror(errno));
		return -1;
	}
	close_on_exec(lcconf->sock_admin);

	unlink(sunaddr.sun_path);
	if (bind(lcconf->sock_admin, (struct sockaddr *)&sunaddr,
			sizeof(sunaddr)) != 0) {
		plog(LLV_ERROR, LOCATION, NULL,
			"bind(sockname:%s): %s\n",
			sunaddr.sun_path, strerror(errno));
		(void)close(lcconf->sock_admin);
		return -1;
	}

	if (chown(sunaddr.sun_path, adminsock_owner, adminsock_group) != 0) {
		plog(LLV_ERROR, LOCATION, NULL,
		    "chown(%s, %d, %d): %s\n",
		    sunaddr.sun_path, adminsock_owner,
		    adminsock_group, strerror(errno));
		(void)close(lcconf->sock_admin);
		return -1;
	}

	if (chmod(sunaddr.sun_path, adminsock_mode) != 0) {
		plog(LLV_ERROR, LOCATION, NULL,
		    "chmod(%s, 0%03o): %s\n",
		    sunaddr.sun_path, adminsock_mode, strerror(errno));
		(void)close(lcconf->sock_admin);
		return -1;
	}

	if (listen(lcconf->sock_admin, 5) != 0) {
		plog(LLV_ERROR, LOCATION, NULL,
			"listen(sockname:%s): %s\n",
			sunaddr.sun_path, strerror(errno));
		(void)close(lcconf->sock_admin);
		return -1;
	}

	monitor_fd(lcconf->sock_admin, admin_handler, NULL, 0);
	plog(LLV_DEBUG, LOCATION, NULL,
	     "open %s as racoon management.\n", sunaddr.sun_path);

	return 0;
}

int
admin_close()
{
	unmonitor_fd(lcconf->sock_admin);
	close(lcconf->sock_admin);
	return 0;
}

#endif

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>