/* vim: set expandtab ts=4 sw=4: */ /* * You may redistribute this program and/or modify it under the terms of * the GNU General Public License as published by the Free Software Foundation, * either version 3 of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #ifndef SessionManager_H #define SessionManager_H #include "crypto/CryptoAuth.h" #include "crypto/random/Random.h" #include "interface/Interface.h" #include "memory/Allocator.h" #include "util/events/EventBase.h" #include "util/Linker.h" Linker_require("interface/SessionManager.c") #include struct SessionManager; struct SessionManager_Session { struct Interface iface; /** When the last message was received on this session. */ uint32_t lastMessageTime; /** The handle which will be used to lookup this session on our side, big endian. */ uint32_t receiveHandle_be; /** The handle which we are expected to send to identify ourselves, big endian. */ uint32_t sendHandle_be; /** The version of the other node. */ uint32_t version; /** The IPv6 address of the other node. */ uint8_t ip6[16]; }; struct SessionManager_HandleList { uint32_t count; uint32_t* handles; }; /** * Create a new session manager for keeping track of and expiring crypto sessions. * The typical use case is discriminating between packets by ip address, keyOffset is the number * of bytes between the beginning of each message and the beginning of the ip address and keySize * is the number of bytes in the address. * * @param decryptedIncoming the callback to call with incoming data after it has been decrypted. * @param encryptedOutgoing the callback to call with outgoing data after it has been encrypted. * @param interfaceContext the context which will become the senderContext and receiverContext for * encryptedOutgoing and decryptedIncoming respectively. * @param eventBase the libevent event base. * @param cryptoAuth the cryptoauthenticator for the sessions. * @param allocator means of getting memory. * @return a session manager. */ struct SessionManager* SessionManager_new(Interface_CALLBACK(decryptedIncoming), Interface_CALLBACK(encryptedOutgoing), void* interfaceContext, struct EventBase* eventBase, struct CryptoAuth* cryptoAuth, struct Random* rand, struct Allocator* allocator); /** * Get a session from the session manager. * If there is no session for the lookup key, it will be created. * * @param lookupKey this must be the size given by keySize in SessionManager_new(). * @param cryptoKey optional encryption key if it is known, otherwise NULL. * @param sm the session manager. */ struct SessionManager_Session* SessionManager_getSession(uint8_t* lookupKey, uint8_t cryptoKey[32], struct SessionManager* sm); /** * Get a session by its handle. * * @param handle an opaque handle associated with the session. * @param sm the session manager. * @return the sesssion if there is one by that handle or null. */ struct SessionManager_Session* SessionManager_sessionForHandle(uint32_t handle, struct SessionManager* sm); /** * Get the IPv6 address for a session. * * @param handle the handle for the session * @param sm the session manager * @return a binary ipv6 address or NULL. */ uint8_t* SessionManager_getIp6(uint32_t handle, struct SessionManager* sm); /** * Get the list of all handles. */ struct SessionManager_HandleList* SessionManager_getHandleList(struct SessionManager* sm, struct Allocator* alloc); #endif