use generic KA stuff for dtls
[platform/upstream/openconnect.git] / mainloop.c
1 /*
2  * Open AnyConnect (SSL + DTLS) client
3  *
4  * © 2008 David Woodhouse <dwmw2@infradead.org>
5  *
6  * Permission to use, copy, modify, and/or distribute this software
7  * for any purpose with or without fee is hereby granted, provided
8  * that the above copyright notice and this permission notice appear
9  * in all copies.
10  *
11  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
12  * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
13  * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
14  * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR
15  * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS
16  * OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
17  * NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
18  * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19  */
20
21 #include <errno.h>
22 #include <poll.h>
23 #include <limits.h>
24 #include <sys/select.h>
25 #include <signal.h>
26 #include <arpa/inet.h>
27
28 #include "anyconnect.h"
29
30 void queue_packet(struct pkt **q, struct pkt *new)
31 {
32         while (*q)
33                 q = &(*q)->next;
34
35         new->next = NULL;
36         *q = new;
37 }
38
39 int queue_new_packet(struct pkt **q, int type, void *buf, int len)
40 {
41         struct pkt *new = malloc(sizeof(struct pkt) + len);
42         if (!new)
43                 return -ENOMEM;
44
45         new->type = type;
46         new->len = len;
47         new->next = NULL;
48         memcpy(new->data, buf, len);
49         queue_packet(q, new);
50         return 0;
51 }
52
53 int vpn_add_pollfd(struct anyconnect_info *vpninfo, int fd, short events)
54 {
55         vpninfo->nfds++;
56         vpninfo->pfds = realloc(vpninfo->pfds, sizeof(struct pollfd) * vpninfo->nfds);
57         if (!vpninfo->pfds) {
58                 fprintf(stderr, "Failed to reallocate pfds\n");
59                 exit(1);
60         }
61         vpninfo->pfds[vpninfo->nfds - 1].fd = fd;
62         vpninfo->pfds[vpninfo->nfds - 1].events = events;
63
64         return vpninfo->nfds - 1;
65 }
66
67 static int killed;
68
69 static void handle_sigint(int sig)
70 {
71         killed = sig;
72 }
73
74 int vpn_mainloop(struct anyconnect_info *vpninfo)
75 {
76         struct sigaction sa;
77         memset(&sa, 0, sizeof(sa));
78         sa.sa_handler = handle_sigint;
79         
80         sigaction(SIGINT, &sa, NULL);
81         sigaction(SIGHUP, &sa, NULL);
82
83         while (!vpninfo->quit_reason) {
84                 int did_work = 0;
85                 int timeout = INT_MAX;
86
87                 if (vpninfo->dtls_fd != -1)
88                         did_work += dtls_mainloop(vpninfo, &timeout);
89
90                 if (vpninfo->quit_reason)
91                         break;
92
93                 did_work += ssl_mainloop(vpninfo, &timeout);
94                 if (vpninfo->quit_reason)
95                         break;
96                 
97                 did_work += tun_mainloop(vpninfo, &timeout);
98                 if (vpninfo->quit_reason)
99                         break;
100
101                 if (killed) {
102                         if (killed == SIGHUP)
103                                 vpninfo->quit_reason = "Client received SIGHUP";
104                         else if (killed == SIGINT)
105                                 vpninfo->quit_reason = "Client received SIGINT";
106                         else
107                                 vpninfo->quit_reason = "Client killed";
108                         break;
109                 }
110
111                 if (did_work)
112                         continue;
113
114                 if (verbose)
115                         printf("Did no work; sleeping for %d ms...\n", timeout);
116
117                 poll(vpninfo->pfds, vpninfo->nfds, timeout);
118                 if (vpninfo->pfds[vpninfo->ssl_pfd].revents & POLL_HUP) {
119                         fprintf(stderr, "Server closed connection!\n");
120                         /* OpenSSL doesn't seem to cope properly with this... */
121                         exit(1);
122                 }
123         }
124
125         ssl_bye(vpninfo, vpninfo->quit_reason);
126         printf("Sent quit message: %s\n", vpninfo->quit_reason);
127
128         if (vpninfo->vpnc_script) {
129                 setenv("TUNDEV", vpninfo->ifname, 1);
130                 setenv("reason", "disconnect", 1);
131                 system(vpninfo->vpnc_script);
132         }
133
134         return 0;
135 }
136
137 int keepalive_action(struct keepalive_info *ka, int *timeout)
138 {
139         time_t now = time(NULL);
140
141         if (ka->rekey) {
142                 time_t due = ka->last_rekey + ka->rekey;
143
144                 if (now >= due)
145                         return KA_REKEY;
146
147                 if (verbose)
148                         printf("Rekey in %d seconds\n", (int)(due - now));
149                 if (*timeout > (due - now) * 1000)
150                         *timeout = (due - now) * 1000;
151         }
152
153         /* DPD is bidirectional -- PKT 3 out, PKT 4 back */
154         if (ka->dpd) {
155                 time_t due = ka->last_rx + ka->dpd;
156                 time_t overdue = ka->last_rx + (2 * ka->dpd);
157
158                 /* Peer didn't respond */
159                 if (now > overdue)
160                         return KA_DPD_DEAD;
161
162                 /* If we already have DPD outstanding, don't flood. Repeat by
163                    all means, but only after half the DPD period. */
164                 if (ka->last_dpd > ka->last_rx)
165                         due = ka->last_dpd + ka->dpd / 2;
166
167                 /* We haven't seen a packet from this host for $DPD seconds.
168                    Prod it to see if it's still alive */
169                 if (now >= due) {
170                         ka->last_dpd = now;
171                         return KA_DPD;
172                 }
173
174                 if (verbose)
175                         printf("DPD in %d seconds\n", (int)(due - now));
176                 if (*timeout > (due - now) * 1000)
177                         *timeout = (due - now) * 1000;
178         }
179
180         /* Keepalive is just client -> server */
181         if (ka->keepalive) {
182                 time_t due = ka->last_tx + ka->keepalive;
183
184                 /* If we haven't sent anything for $KEEPALIVE seconds, send a
185                    dummy packet (which the server will discard) */
186                 if (now >= due)
187                         return KA_KEEPALIVE;
188
189                 if (verbose)
190                         printf("KA in %d seconds\n", (int)(due - now));
191                 if (*timeout > (due - now) * 1000)
192                         *timeout = (due - now) * 1000;
193         }
194
195         return KA_NONE;
196 }