X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fprotocol_key.c;h=7e122068edd672c7a8117107675dab425bd6b59b;hp=802f7ca68d5f2707fb6eaed2ce47990d810d3a60;hb=ff306f0cdaedb50de1472e7c1fb55de922a6ca60;hpb=6dfdb323612184529b4b83c1be914dda8262de47 diff --git a/src/protocol_key.c b/src/protocol_key.c index 802f7ca6..7e122068 100644 --- a/src/protocol_key.c +++ b/src/protocol_key.c @@ -20,7 +20,6 @@ #include "system.h" -#include "splay_tree.h" #include "cipher.h" #include "connection.h" #include "crypto.h" @@ -37,15 +36,13 @@ static bool mykeyused = false; void send_key_changed(void) { - splay_node_t *node; - connection_t *c; - send_request(everyone, "%d %x %s", KEY_CHANGED, rand(), myself->name); /* Immediately send new keys to directly connected nodes to keep UDP mappings alive */ - for(node = connection_tree->head; node; node = node->next) { - c = node->data; + for(list_node_t *node = connection_list->head, *next; node; node = next) { + next = node->next; + connection_t *c = node->data; if(c->status.active && c->node && c->node->status.reachable) { if(!c->node->status.sptps) send_ans_key(c->node); @@ -55,7 +52,7 @@ void send_key_changed(void) { /* Force key exchange for connections using SPTPS */ if(experimental) { - for(node = node_tree->head; node; node = node->next) { + for(splay_node_t *node = node_tree->head; node; node = node->next) { node_t *n = node->data; if(n->status.reachable && n->status.validkey && n->status.sptps) sptps_force_kex(&n->sptps); @@ -116,6 +113,8 @@ bool send_req_key(node_t *to) { snprintf(label, sizeof label, "tinc UDP key expansion %s %s", myself->name, to->name); sptps_stop(&to->sptps); to->status.validkey = false; + to->status.waitingforkey = true; + to->last_req_key = time(NULL); to->incompression = myself->incompression; return sptps_start(&to->sptps, to, true, true, myself->connection->ecdsa, to->ecdsa, label, sizeof label, send_initial_sptps_data, receive_sptps_record); } @@ -172,11 +171,29 @@ static bool req_key_ext_h(connection_t *c, const char *request, node_t *from, in snprintf(label, sizeof label, "tinc UDP key expansion %s %s", from->name, myself->name); sptps_stop(&from->sptps); from->status.validkey = false; + from->status.waitingforkey = true; + from->last_req_key = time(NULL); sptps_start(&from->sptps, from, false, true, myself->connection->ecdsa, from->ecdsa, label, sizeof label, send_sptps_data, receive_sptps_record); sptps_receive_data(&from->sptps, buf, len); return true; } + case REQ_PACKET: { + if(!from->status.validkey) { + logger(DEBUG_PROTOCOL, LOG_ERR, "Got REQ_PACKET from %s (%s) but we don't have a valid key yet", from->name, from->hostname); + return true; + } + + char buf[MAX_STRING_SIZE]; + if(sscanf(request, "%*d %*s %*s %*d " MAX_STRING, buf) != 1) { + logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s): %s", "REQ_KEY", from->name, from->hostname, "invalid SPTPS data"); + return true; + } + int len = b64decode(buf, buf, strlen(buf)); + sptps_receive_data(&from->sptps, buf, len); + return true; + } + default: logger(DEBUG_ALWAYS, LOG_ERR, "Unknown extended REQ_KEY request from %s (%s): %s", from->name, from->hostname, request); return true;