2 * Open AnyConnect (SSL + DTLS) client
4 * © 2008 David Woodhouse <dwmw2@infradead.org>
6 * Permission to use, copy, modify, and/or distribute this software
7 * for any purpose with or without fee is hereby granted, provided
8 * that the above copyright notice and this permission notice appear
11 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
12 * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
13 * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
14 * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR
15 * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS
16 * OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
17 * NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
18 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
24 #include <sys/select.h>
26 #include <arpa/inet.h>
28 #include "anyconnect.h"
30 void queue_packet(struct pkt **q, struct pkt *new)
39 int inflate_and_queue_packet(struct anyconnect_info *vpninfo, int type, void *buf, int len)
41 struct pkt *new = malloc(sizeof(struct pkt) + vpninfo->mtu);
49 vpninfo->inflate_strm.next_in = buf;
50 vpninfo->inflate_strm.avail_in = len - 4;
52 vpninfo->inflate_strm.next_out = new->data;
53 vpninfo->inflate_strm.avail_out = vpninfo->mtu;
54 vpninfo->inflate_strm.total_out = 0;
56 if (inflate(&vpninfo->inflate_strm, Z_SYNC_FLUSH)) {
57 fprintf(stderr, "inflate failed\n");
62 new->len = vpninfo->inflate_strm.total_out;
64 vpninfo->inflate_adler32 = adler32(vpninfo->inflate_adler32,
67 if (vpninfo->inflate_adler32 != ntohl( *(uint32_t *)(buf + len - 4))) {
68 vpninfo->quit_reason = "Compression (inflate) adler32 failure";
71 queue_packet(&vpninfo->incoming_queue, new);
75 int queue_new_packet(struct pkt **q, int type, void *buf, int len)
77 struct pkt *new = malloc(sizeof(struct pkt) + len);
84 memcpy(new->data, buf, len);
89 int vpn_add_pollfd(struct anyconnect_info *vpninfo, int fd, short events)
92 vpninfo->pfds = realloc(vpninfo->pfds, sizeof(struct pollfd) * vpninfo->nfds);
94 fprintf(stderr, "Failed to reallocate pfds\n");
97 vpninfo->pfds[vpninfo->nfds - 1].fd = fd;
98 vpninfo->pfds[vpninfo->nfds - 1].events = events;
100 return vpninfo->nfds - 1;
105 static void handle_sigint(int sig)
110 int vpn_mainloop(struct anyconnect_info *vpninfo)
113 memset(&sa, 0, sizeof(sa));
114 sa.sa_handler = handle_sigint;
116 sigaction(SIGINT, &sa, NULL);
117 while (!killed && !vpninfo->quit_reason) {
119 int timeout = INT_MAX;
121 if (vpninfo->dtls_fd != -1)
122 did_work += dtls_mainloop(vpninfo, &timeout);
124 did_work += ssl_mainloop(vpninfo, &timeout);
125 did_work += tun_mainloop(vpninfo, &timeout);
131 printf("Did no work; sleeping for %d ms...\n", timeout);
133 poll(vpninfo->pfds, vpninfo->nfds, timeout);
134 if (vpninfo->pfds[vpninfo->ssl_pfd].revents & POLL_HUP) {
135 fprintf(stderr, "Server closed connection!\n");
136 /* OpenSSL doesn't seem to cope properly with this... */
140 if (!vpninfo->quit_reason)
141 vpninfo->quit_reason = "Client received SIGINT";
143 ssl_bye(vpninfo, vpninfo->quit_reason);