X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fnet_setup.c;h=b5dc727ff2a447d12458a4baf909bc43dc03e185;hp=6887fe3429aa6b6c55e44f65803ddc205020300c;hb=d8c249008a0b2abd44e652ed70e69b3dbc05b9d8;hpb=f93b1334e087dd7af1b87f475b2d398fdd4d56ab diff --git a/src/net_setup.c b/src/net_setup.c index 6887fe34..b5dc727f 100644 --- a/src/net_setup.c +++ b/src/net_setup.c @@ -17,7 +17,7 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: net_setup.c,v 1.1.2.7 2002/03/01 13:18:54 guus Exp $ + $Id: net_setup.c,v 1.1.2.14 2002/04/01 21:28:39 guus Exp $ */ #include "config.h" @@ -184,34 +184,6 @@ cp return -1; } -int check_rsa_key(RSA *rsa_key) -{ - char *test1, *test2, *test3; -cp - if(rsa_key->p && rsa_key->q) - { - if(RSA_check_key(rsa_key) != 1) - return -1; - } - else - { - test1 = xmalloc(RSA_size(rsa_key)); - test2 = xmalloc(RSA_size(rsa_key)); - test3 = xmalloc(RSA_size(rsa_key)); - - if(RSA_public_encrypt(RSA_size(rsa_key), test1, test2, rsa_key, RSA_NO_PADDING) != RSA_size(rsa_key)) - return -1; - - if(RSA_private_decrypt(RSA_size(rsa_key), test2, test3, rsa_key, RSA_NO_PADDING) != RSA_size(rsa_key)) - return -1; - - if(memcmp(test1, test3, RSA_size(rsa_key))) - return -1; - } -cp - return 0; -} - /* Configure node_t myself and set up the local sockets (listen only) */ @@ -263,12 +235,6 @@ cp return -1; cp - if(check_rsa_key(myself->connection->rsa_key)) - { - syslog(LOG_ERR, _("Invalid public/private keypair!")); - return -1; - } - if(!get_config_string(lookup_config(myself->connection->config_tree, "Port"), &myport)) asprintf(&myport, "655"); @@ -327,6 +293,13 @@ cp routing_mode = RMODE_ROUTER; get_config_bool(lookup_config(config_tree, "PriorityInheritance"), &priorityinheritance); +#if !defined(SOL_IP) || !defined(IP_TOS) + if(priorityinheritance) + syslog(LOG_WARNING, _("PriorityInheritance not supported on this platform")); +#endif + + if(!get_config_int(lookup_config(config_tree, "MACExpire"), &macexpire)) + macexpire= 600; if(get_config_int(lookup_config(myself->connection->config_tree, "MaxTimeout"), &maxtimeout)) { @@ -392,7 +365,7 @@ cp if(!get_config_int(lookup_config(config_tree, "KeyExpire"), &keylifetime)) keylifetime = 3600; - keyexpires = time(NULL) + keylifetime; + keyexpires = now + keylifetime; /* Check if we want to use message authentication codes... */ @@ -457,6 +430,7 @@ cp myself->nexthop = myself; myself->via = myself; myself->status.active = 1; + myself->status.reachable = 1; node_add(myself); graph(); @@ -479,10 +453,10 @@ cp for(aip = ai; aip; aip = aip->ai_next) { - if((tcp_socket[listen_sockets] = setup_listen_socket((sockaddr_t *)aip->ai_addr)) < 0) + if((listen_socket[listen_sockets].tcp = setup_listen_socket((sockaddr_t *)aip->ai_addr)) < 0) continue; - if((udp_socket[listen_sockets] = setup_vpn_in_socket((sockaddr_t *)aip->ai_addr)) < 0) + if((listen_socket[listen_sockets].udp = setup_vpn_in_socket((sockaddr_t *)aip->ai_addr)) < 0) continue; if(debug_lvl >= DEBUG_CONNECTIONS) @@ -492,6 +466,7 @@ cp free(hostname); } + listen_socket[listen_sockets].sa.sa = *aip->ai_addr; listen_sockets++; } @@ -514,11 +489,14 @@ cp int setup_network_connections(void) { cp + now = time(NULL); + init_connections(); init_subnets(); init_nodes(); init_edges(); init_events(); + init_requests(); if(get_config_int(lookup_config(config_tree, "PingTimeout"), &pingtimeout)) { @@ -558,7 +536,7 @@ cp next = node->next; c = (connection_t *)node->data; if(c->outgoing) - free(c->outgoing->name), free(c->outgoing); + free(c->outgoing->name), free(c->outgoing), c->outgoing = NULL; terminate_connection(c, 0); } @@ -567,10 +545,11 @@ cp for(i = 0; i < listen_sockets; i++) { - close(udp_socket[i]); - close(tcp_socket[i]); + close(listen_socket[i].tcp); + close(listen_socket[i].udp); } + exit_requests(); exit_events(); exit_edges(); exit_subnets();