Use libevent to handle key expiration.
[tinc] / src / net.c
index 7513e3e..405114f 100644 (file)
--- a/src/net.c
+++ b/src/net.c
@@ -36,7 +36,6 @@
 #include "netutl.h"
 #include "process.h"
 #include "protocol.h"
-#include "route.h"
 #include "subnet.h"
 #include "xalloc.h"
 
@@ -267,7 +266,6 @@ void handle_meta_connection_data(int fd, short events, void *data)
                return;
 
        if(c->status.connecting) {
-               c->status.connecting = false;
                getsockopt(c->socket, SOL_SOCKET, SO_ERROR, &result, &len);
 
                if(!result)
@@ -276,6 +274,7 @@ void handle_meta_connection_data(int fd, short events, void *data)
                        ifdebug(CONNECTIONS) logger(LOG_DEBUG,
                                           _("Error while connecting to %s (%s): %s"),
                                           c->name, c->hostname, strerror(result));
+                       c->status.connecting = false;
                        closesocket(c->socket);
                        do_outgoing_connection(c);
                        return;
@@ -381,6 +380,37 @@ static void sighup_handler(int signal, short events, void *data) {
        try_outgoing_connections();
 }
 
+static void sigalrm_handler(int signal, short events, void *data) {
+       logger(LOG_NOTICE, _("Got %s signal"), strsignal(signal));
+
+       connection_t *c;
+       avl_node_t *node;
+
+       for(node = connection_tree->head; node; node = node->next) {
+               c = node->data;
+               
+               if(c->outgoing && !c->node) {
+                       if(timeout_initialized(&c->outgoing->ev))
+                               event_del(&c->outgoing->ev);
+                       if(c->status.connecting)
+                               close(c->socket);
+                       c->outgoing->timeout = 0;
+                       do_outgoing_connection(c);
+               }
+       }
+}
+
+static void keyexpire_handler(int fd, short events, void *event) {
+       ifdebug(STATUS) logger(LOG_INFO, _("Regenerating symmetric key"));
+
+       RAND_pseudo_bytes((unsigned char *)myself->key, myself->keylength);
+       if(myself->cipher)
+                       EVP_DecryptInit_ex(&packet_ctx, myself->cipher, NULL, (unsigned char *)myself->key, (unsigned char *)myself->key + myself->cipher->key_len);
+       send_key_changed(broadcast, myself);
+
+       event_add(event, &(struct timeval){keylifetime, 0});
+}
+
 /*
   this is where it all happens...
 */
@@ -397,6 +427,8 @@ int main_loop(void)
        struct event sigusr1_event;
        struct event sigusr2_event;
        struct event sigwinch_event;
+       struct event sigalrm_event;
+       struct event keyexpire_event;
 
        cp();
 
@@ -414,6 +446,10 @@ int main_loop(void)
        signal_add(&sigusr2_event, NULL);
        signal_set(&sigwinch_event, SIGWINCH, sigwinch_handler, NULL);
        signal_add(&sigwinch_event, NULL);
+       signal_set(&sigalrm_event, SIGALRM, sigalrm_handler, NULL);
+       signal_add(&sigalrm_event, NULL);
+       timeout_set(&keyexpire_event, keyexpire_handler, &keyexpire_event);
+       event_add(&keyexpire_event, &(struct timeval){keylifetime, 0});
 
        last_ping_check = now;
        
@@ -458,29 +494,6 @@ int main_loop(void)
                if(last_ping_check + pingtimeout < now) {
                        check_dead_connections();
                        last_ping_check = now;
-
-                       if(routing_mode == RMODE_SWITCH)
-                               age_subnets();
-
-                       age_past_requests();
-
-                       /* Should we regenerate our key? */
-
-                       if(keyexpires < now) {
-                               ifdebug(STATUS) logger(LOG_INFO, _("Regenerating symmetric key"));
-
-                               RAND_pseudo_bytes((unsigned char *)myself->key, myself->keylength);
-                               if(myself->cipher)
-                                       EVP_DecryptInit_ex(&packet_ctx, myself->cipher, NULL, (unsigned char *)myself->key, (unsigned char *)myself->key + myself->cipher->key_len);
-                               send_key_changed(broadcast, myself);
-                               keyexpires = now + keylifetime;
-                       }
-               }
-
-               if(sigalrm) {
-                       logger(LOG_INFO, _("Flushing event queue"));
-                       // TODO: do this another way
-                       sigalrm = false;
                }
        }
 
@@ -491,6 +504,8 @@ int main_loop(void)
        signal_del(&sigusr1_event);
        signal_del(&sigusr2_event);
        signal_del(&sigwinch_event);
+       signal_del(&sigalrm_event);
+       event_del(&keyexpire_event);
 
        return 0;
 }