- char *hash;
-cp
- if(sscanf(cl->buffer, "%*d %as", &cl->name, &hash) != 2)
- {
- syslog(LOG_ERR, _("Got bad CHAL_REPLY from %s (%s)"), cl->name, cl->hostname);
- return -1;
- }
-
- /* Check if the length of the hash is all right */
-
- if(strlen(hash) != SHA_DIGEST_LENGTH*2)
- {
- syslog(LOG_ERR, _("Intruder: wrong challenge reply length from %s (%s)"), cl->name, cl->hostname);
- return -1;
- }
-
- /* Convert the hash to binary format */
-
- hex2bin(hash, hash, SHA_DIGEST_LENGTH);
-
- /* Verify the incoming hash with the calculated hash */
-
- if(!memcmp(hash, cl->chal_answer, SHA_DIGEST_LENGTH))
- {
- syslog(LOG_ERR, _("Intruder: wrong challenge reply from %s (%s)"), cl->name, cl->hostname);
- return -1;
- }
-
- /* Identity has now been positively verified.
- If we are accepting this new connection, then send our identity,
- if we are making this connecting, acknowledge.
- */
-
- free(hash);
- free(cl->chal_answer);
-
-cp
- if(cl->status.outgoing)
- {
- cl->allow_request = ACK;
- return send_ack(cl);
- }
- else
- {
- cl->allow_request = CHALLENGE;
- return send_id(cl);
- }
-}
-
-int send_ack(conn_list_t *cl)
-{
-cp
- return send_request(cl, "%d", ACK);
-}
-
-int ack_h(conn_list_t *cl)
-{
- conn_list_t *old;
-
-cp
- /* Okay, before we active the connection, we check if there is another entry
- in the connection list with the same vpn_ip. If so, it presumably is an
- old connection that has timed out but we don't know it yet.
- */
-
- while((old = lookup_id(cl->name)))
- {
- if(debug_lvl > DEBUG_CONNECTIONS)
- syslog(LOG_NOTICE, _("Removing old entry for %s at %s in favour of new connection from %s"),
- cl->name, old->hostname, cl->hostname);
- old->status.active = 0;
- terminate_connection(old);
- }
-
- /* Activate this connection */
-
- cl->allow_request = ALL;
- cl->status.active = 1;
-
- if(debug_lvl > DEBUG_CONNECTIONS)
- syslog(LOG_NOTICE, _("Connection with %s (%s) activated"), cl->name, cl->hostname);