X-Git-Url: https://www.tinc-vpn.org/git/browse?a=blobdiff_plain;f=src%2Fprotocol_key.c;h=c042c4b5e259f5dc2c463aa9a2654875499dbc47;hb=d1ec010660905ae0b99d783737350ccc08b37b16;hp=f34a70da103dc1f2830090f8a2ccee7901f1dd07;hpb=c2a9ed9e98e3dc4218c74fff774ddfe654adfd72;p=tinc diff --git a/src/protocol_key.c b/src/protocol_key.c index f34a70da..c042c4b5 100644 --- a/src/protocol_key.c +++ b/src/protocol_key.c @@ -20,7 +20,6 @@ #include "system.h" -#include "splay_tree.h" #include "cipher.h" #include "connection.h" #include "crypto.h" @@ -37,29 +36,20 @@ static bool mykeyused = false; void send_key_changed(void) { - splay_node_t *node; - connection_t *c; - send_request(everyone, "%d %x %s", KEY_CHANGED, rand(), myself->name); /* Immediately send new keys to directly connected nodes to keep UDP mappings alive */ - for(node = connection_tree->head; node; node = node->next) { - c = node->data; - if(c->status.active && c->node && c->node->status.reachable) { - if(!c->node->status.sptps) - send_ans_key(c->node); - } - } + for list_each(connection_t, c, connection_list) + if(c->status.active && c->node && c->node->status.reachable && !c->node->status.sptps) + send_ans_key(c->node); /* Force key exchange for connections using SPTPS */ if(experimental) { - for(node = node_tree->head; node; node = node->next) { - node_t *n = node->data; + for splay_each(node_t, n, node_tree) if(n->status.reachable && n->status.validkey && n->status.sptps) sptps_force_kex(&n->sptps); - } } } @@ -268,6 +258,9 @@ bool send_ans_key(node_t *to) { size_t keylen = cipher_keylength(&myself->incipher); char key[keylen * 2 + 1]; + cipher_close(&to->incipher); + digest_close(&to->indigest); + cipher_open_by_nid(&to->incipher, cipher_get_nid(&myself->incipher)); digest_open_by_nid(&to->indigest, digest_get_nid(&myself->indigest), digest_length(&myself->indigest)); to->incompression = myself->incompression; @@ -355,6 +348,8 @@ bool ans_key_h(connection_t *c, const char *request) { } /* Don't use key material until every check has passed. */ + cipher_close(&from->outcipher); + digest_close(&from->outdigest); from->status.validkey = false; if(compression < 0 || compression > 11) {