Fix memory leak of CSTP deflated packets, and resend current pkt on reconnect
[platform/upstream/openconnect.git] / openconnect-internal.h
1 /*
2  * OpenConnect (SSL + DTLS) VPN client
3  *
4  * Copyright © 2008-2011 Intel Corporation.
5  * Copyright © 2008 Nick Andrew <nick@nick-andrew.net>
6  *
7  * Author: David Woodhouse <dwmw2@infradead.org>
8  *
9  * This program is free software; you can redistribute it and/or
10  * modify it under the terms of the GNU Lesser General Public License
11  * version 2.1, as published by the Free Software Foundation.
12  *
13  * This program is distributed in the hope that it will be useful, but
14  * WITHOUT ANY WARRANTY; without even the implied warranty of
15  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
16  * Lesser General Public License for more details.
17  *
18  * You should have received a copy of the GNU Lesser General Public
19  * License along with this library; if not, write to:
20  *
21  *   Free Software Foundation, Inc.
22  *   51 Franklin Street, Fifth Floor,
23  *   Boston, MA 02110-1301 USA
24  */
25
26 #ifndef __OPENCONNECT_INTERNAL_H__
27 #define __OPENCONNECT_INTERNAL_H__
28
29 #include "openconnect.h"
30
31 #include <openssl/ssl.h>
32 #include <zlib.h>
33 #include <stdint.h>
34 #include <sys/socket.h>
35 #include <sys/select.h>
36 #include <sys/time.h>
37 #include <sys/types.h>
38 #include <unistd.h>
39 #ifdef LIBPROXY_HDR
40 #include LIBPROXY_HDR
41 #endif
42 #ifdef ENABLE_NLS
43 #include <locale.h>
44 #include <libintl.h>
45 #define _(s) dgettext("openconnect", s)
46 #else
47 #define _(s) s
48 #endif
49 #define N_(s) s
50
51 /****************************************************************************/
52
53 struct pkt {
54         int len;
55         struct pkt *next;
56         unsigned char hdr[8];
57         unsigned char data[];
58 };
59
60 struct vpn_option {
61         char *option;
62         char *value;
63         struct vpn_option *next;
64 };
65
66 #define KA_NONE         0
67 #define KA_DPD          1
68 #define KA_DPD_DEAD     2
69 #define KA_KEEPALIVE    3
70 #define KA_REKEY        4
71
72 struct keepalive_info {
73         int dpd;
74         int keepalive;
75         int rekey;
76         time_t last_rekey;
77         time_t last_tx;
78         time_t last_rx;
79         time_t last_dpd;
80 };
81
82 struct split_include {
83         char *route;
84         struct split_include *next;
85 };
86
87 #define RECONNECT_INTERVAL_MIN  10
88 #define RECONNECT_INTERVAL_MAX  100
89
90 #define CERT_TYPE_UNKNOWN       0
91 #define CERT_TYPE_PEM           1
92 #define CERT_TYPE_PKCS12        2
93 #define CERT_TYPE_TPM           3
94
95 struct openconnect_info {
96         char *redirect_url;
97
98         char *csd_token;
99         char *csd_ticket;
100         char *csd_stuburl;
101         char *csd_starturl;
102         char *csd_waiturl;
103         char *csd_preurl;
104
105         char *csd_scriptname;
106
107 #ifdef LIBPROXY_HDR
108         pxProxyFactory *proxy_factory;
109 #endif
110         char *proxy_type;
111         char *proxy;
112         int proxy_port;
113
114         const char *localname;
115         char *hostname;
116         int port;
117         char *urlpath;
118         int cert_expire_warning;
119         const char *cert;
120         const char *sslkey;
121         X509 *cert_x509;
122         int cert_type;
123         char *cert_password;
124         const char *cafile;
125         const char *servercert;
126         const char *xmlconfig;
127         char xmlsha1[(SHA_DIGEST_LENGTH * 2) + 1];
128         char *username;
129         char *password;
130         char *authgroup;
131         int nopasswd;
132         char *dtls_ciphers;
133         uid_t uid_csd;
134         char *csd_wrapper;
135         int uid_csd_given;
136         int no_http_keepalive;
137
138         char *cookie; /* Pointer to within cookies list */
139         struct vpn_option *cookies;
140         struct vpn_option *cstp_options;
141         struct vpn_option *dtls_options;
142
143         SSL_CTX *https_ctx;
144         SSL *https_ssl;
145         struct keepalive_info ssl_times;
146         int owe_ssl_dpd_response;
147         struct pkt *deflate_pkt;
148         struct pkt *current_ssl_pkt;
149         struct pkt *pending_deflated_pkt;
150
151         z_stream inflate_strm;
152         uint32_t inflate_adler32;
153         z_stream deflate_strm;
154         uint32_t deflate_adler32;
155
156         int disable_ipv6;
157         int reconnect_timeout;
158         int reconnect_interval;
159         int dtls_attempt_period;
160         time_t new_dtls_started;
161         SSL_CTX *dtls_ctx;
162         SSL *dtls_ssl;
163         SSL *new_dtls_ssl;
164         SSL_SESSION *dtls_session;
165         struct keepalive_info dtls_times;
166         unsigned char dtls_session_id[32];
167         unsigned char dtls_secret[48];
168
169         char *dtls_cipher;
170         char *vpnc_script;
171         int script_tun;
172         char *ifname;
173
174         int mtu;
175         const char *banner;
176         const char *vpn_addr;
177         const char *vpn_netmask;
178         const char *vpn_addr6;
179         const char *vpn_netmask6;
180         const char *vpn_dns[3];
181         const char *vpn_nbns[3];
182         const char *vpn_domain;
183         const char *vpn_proxy_pac;
184         struct split_include *split_includes;
185         struct split_include *split_excludes;
186
187         int select_nfds;
188         fd_set select_rfds;
189         fd_set select_wfds;
190         fd_set select_efds;
191
192 #ifdef __sun__
193         int ip_fd;
194 #endif
195         int tun_fd;
196         int ssl_fd;
197         int dtls_fd;
198         int new_dtls_fd;
199
200         struct pkt *incoming_queue;
201         struct pkt *outgoing_queue;
202         int outgoing_qlen;
203         int max_qlen;
204
205         socklen_t peer_addrlen;
206         struct sockaddr *peer_addr;
207         struct sockaddr *dtls_addr;
208
209         int deflate;
210         char *useragent;
211
212         const char *quit_reason;
213
214         void *cbdata;
215         openconnect_validate_peer_cert_vfn validate_peer_cert;
216         openconnect_write_new_config_vfn write_new_config;
217         openconnect_process_auth_form_vfn process_auth_form;
218         openconnect_progress_vfn progress;
219 };
220
221 /* Packet types */
222
223 #define AC_PKT_DATA             0       /* Uncompressed data */
224 #define AC_PKT_DPD_OUT          3       /* Dead Peer Detection */
225 #define AC_PKT_DPD_RESP         4       /* DPD response */
226 #define AC_PKT_DISCONN          5       /* Client disconnection notice */
227 #define AC_PKT_KEEPALIVE        7       /* Keepalive */
228 #define AC_PKT_COMPRESSED       8       /* Compressed data */
229 #define AC_PKT_TERM_SERVER      9       /* Server kick */
230
231 /* Ick */
232 #if OPENSSL_VERSION_NUMBER >= 0x00909000L
233 #define method_const const
234 #else
235 #define method_const
236 #endif
237
238 #define vpn_progress(vpninfo, ...) (vpninfo)->progress ((vpninfo)->cbdata, __VA_ARGS__)
239
240 /****************************************************************************/
241
242 /* tun.c */
243 int setup_tun(struct openconnect_info *vpninfo);
244 int tun_mainloop(struct openconnect_info *vpninfo, int *timeout);
245 void shutdown_tun(struct openconnect_info *vpninfo);
246 void script_reconnect (struct openconnect_info *vpninfo);
247
248 /* dtls.c */
249 unsigned char unhex(const char *data);
250 int setup_dtls(struct openconnect_info *vpninfo);
251 int dtls_mainloop(struct openconnect_info *vpninfo, int *timeout);
252 int dtls_try_handshake(struct openconnect_info *vpninfo);
253 int connect_dtls_socket(struct openconnect_info *vpninfo);
254
255 /* cstp.c */
256 int make_cstp_connection(struct openconnect_info *vpninfo);
257 int cstp_mainloop(struct openconnect_info *vpninfo, int *timeout);
258 int cstp_bye(struct openconnect_info *vpninfo, const char *reason);
259 int cstp_reconnect(struct openconnect_info *vpninfo);
260
261 /* ssl.c */
262 int  __attribute__ ((format (printf, 2, 3)))
263                 openconnect_SSL_printf(SSL *ssl, const char *fmt, ...);
264 int openconnect_SSL_gets(SSL *ssl, char *buf, size_t len);
265 int openconnect_open_https(struct openconnect_info *vpninfo);
266 void openconnect_close_https(struct openconnect_info *vpninfo);
267 int get_cert_md5_fingerprint(struct openconnect_info *vpninfo, X509 *cert,
268                              char *buf);
269 void report_ssl_errors(struct openconnect_info *vpninfo);
270
271 /* mainloop.c */
272 int vpn_add_pollfd(struct openconnect_info *vpninfo, int fd, short events);
273 int vpn_mainloop(struct openconnect_info *vpninfo);
274 int queue_new_packet(struct pkt **q, void *buf, int len);
275 void queue_packet(struct pkt **q, struct pkt *new);
276 int keepalive_action(struct keepalive_info *ka, int *timeout);
277 int ka_stalled_dpd_time(struct keepalive_info *ka, int *timeout);
278
279 extern int killed;
280
281 /* xml.c */
282 int config_lookup_host(struct openconnect_info *vpninfo, const char *host);
283
284 /* auth.c */
285 int parse_xml_response(struct openconnect_info *vpninfo, char *response,
286                        char *request_body, int req_len, const char **method,
287                        const char **request_body_type);
288
289 /* http.c */
290 char *openconnect_create_useragent(const char *base);
291 int process_proxy(struct openconnect_info *vpninfo, int ssl_sock);
292 int internal_parse_url(char *url, char **res_proto, char **res_host,
293                        int *res_port, char **res_path, int default_port);
294
295 /* ssl_ui.c */
296 int set_openssl_ui(void);
297
298 /* securid.c */
299 int generate_securid_tokencodes(struct openconnect_info *vpninfo);
300 int add_securid_pin(char *token, char *pin);
301
302 /* version.c */
303 extern char openconnect_version[];
304
305 #endif /* __OPENCONNECT_INTERNAL_H__ */