2 protocol.c -- handle the meta-protocol
3 Copyright (C) 1999,2000 Ivo Timmermans <itimmermans@bigfoot.com>,
4 2000 Guus Sliepen <guus@sliepen.warande.net>
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
20 $Id: protocol.c,v 1.28.4.19 2000/06/30 21:03:51 guus Exp $
25 #include <sys/types.h>
30 #include <sys/socket.h>
45 char buffer[MAXBUFSIZE+1];
48 /* Outgoing request routines */
50 int send_ack(conn_list_t *cl)
54 syslog(LOG_DEBUG, _("Sending ACK to %s (%s)"),
55 cl->vpn_hostname, cl->real_hostname);
57 buflen = snprintf(buffer, MAXBUFSIZE, "%d\n", ACK);
59 if((write(cl->meta_socket, buffer, buflen)) < 0)
61 syslog(LOG_ERR, _("Send failed: %d:%d: %m"), __FILE__, __LINE__);
68 int send_termreq(conn_list_t *cl)
72 syslog(LOG_DEBUG, _("Sending TERMREQ to %s (%s)"),
73 cl->vpn_hostname, cl->real_hostname);
75 buflen = snprintf(buffer, MAXBUFSIZE, "%d %lx\n", TERMREQ, myself->vpn_ip);
77 if(write(cl->meta_socket, buffer, buflen) < 0)
80 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
87 int send_timeout(conn_list_t *cl)
91 syslog(LOG_DEBUG, _("Sending TIMEOUT to %s (%s)"),
92 cl->vpn_hostname, cl->real_hostname);
94 buflen = snprintf(buffer, MAXBUFSIZE, "%d %lx\n", PINGTIMEOUT, myself->vpn_ip);
96 if((write(cl->meta_socket, buffer, buflen)) < 0)
98 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
105 int send_del_host(conn_list_t *cl, conn_list_t *new_host)
109 syslog(LOG_DEBUG, _("Sending DEL_HOST for %s (%s) to %s (%s)"),
110 new_host->vpn_hostname, new_host->real_hostname, cl->vpn_hostname, cl->real_hostname);
112 buflen = snprintf(buffer, MAXBUFSIZE, "%d %lx\n", DEL_HOST, new_host->vpn_ip);
114 if((write(cl->meta_socket, buffer, buflen)) < 0)
116 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
123 int send_ping(conn_list_t *cl)
127 syslog(LOG_DEBUG, _("Sending PING to %s (%s)"),
128 cl->vpn_hostname, cl->real_hostname);
130 buflen = snprintf(buffer, MAXBUFSIZE, "%d\n", PING);
132 if((write(cl->meta_socket, buffer, buflen)) < 0)
134 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
141 int send_pong(conn_list_t *cl)
145 syslog(LOG_DEBUG, _("Sending PONG to %s (%s)"),
146 cl->vpn_hostname, cl->real_hostname);
148 buflen = snprintf(buffer, MAXBUFSIZE, "%d\n", PONG);
150 if((write(cl->meta_socket, buffer, buflen)) < 0)
152 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
159 int send_add_host(conn_list_t *cl, conn_list_t *new_host)
165 real_ip = new_host->real_ip;
166 hostname = new_host->real_hostname;
167 flags = new_host->flags;
169 /* If we need to propagate information about a new host that wants us to export
170 * it's indirectdata flag, we set the INDIRECTDATA flag and unset the EXPORT...
171 * flag, and set it's real_ip to our vpn_ip, so that net.c send_packet() will
175 if(flags & EXPORTINDIRECTDATA)
177 flags &= ~EXPORTINDIRECTDATA;
178 flags |= INDIRECTDATA;
179 real_ip = myself->vpn_ip;
180 hostname = myself->real_hostname;
184 syslog(LOG_DEBUG, _("Sending ADD_HOST for %s (%s) to %s (%s)"),
185 new_host->vpn_hostname, hostname, cl->vpn_hostname, cl->real_hostname);
187 buflen = snprintf(buffer, MAXBUFSIZE, "%d %lx %lx/%lx:%x %d\n", ADD_HOST, real_ip, new_host->vpn_ip, new_host->vpn_mask, new_host->port, flags);
189 if((write(cl->meta_socket, buffer, buflen)) < 0)
191 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
198 int send_key_changed(conn_list_t *cl, conn_list_t *src)
202 syslog(LOG_DEBUG, _("Sending KEY_CHANGED origin %s to %s (%s)"),
203 src->vpn_hostname, cl->vpn_hostname, cl->real_hostname);
205 buflen = snprintf(buffer, MAXBUFSIZE, "%d %lx\n", KEY_CHANGED, src->vpn_ip);
207 if((write(cl->meta_socket, buffer, buflen)) < 0)
209 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
216 void send_key_changed_all(void)
220 for(p = conn_list; p != NULL; p = p->next)
221 if(p->status.meta && p->status.active)
222 send_key_changed(p, myself);
226 int send_basic_info(conn_list_t *cl)
230 syslog(LOG_DEBUG, _("Sending BASIC_INFO to %s"),
233 buflen = snprintf(buffer, MAXBUFSIZE, "%d %d %lx/%lx:%x %d\n", BASIC_INFO, PROT_CURRENT, myself->vpn_ip, myself->vpn_mask, myself->port, myself->flags);
235 if((write(cl->meta_socket, buffer, buflen)) < 0)
237 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
244 int send_passphrase(conn_list_t *cl)
248 encrypt_passphrase(&tmp);
251 syslog(LOG_DEBUG, _("Sending PASSPHRASE to %s (%s)"),
252 cl->vpn_hostname, cl->real_hostname);
254 buflen = snprintf(buffer, MAXBUFSIZE, "%d %s\n", PASSPHRASE, tmp.phrase);
256 if((write(cl->meta_socket, buffer, buflen)) < 0)
258 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
265 int send_public_key(conn_list_t *cl)
269 syslog(LOG_DEBUG, _("Sending PUBLIC_KEY to %s (%s)"),
270 cl->vpn_hostname, cl->real_hostname);
272 buflen = snprintf(buffer, MAXBUFSIZE, "%d %s\n", PUBLIC_KEY, my_public_key_base36);
274 if((write(cl->meta_socket, buffer, buflen)) < 0)
276 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
283 /* WDN doet deze functie? (GS)
284 int send_calculate(conn_list_t *cl, char *k)
287 buflen = snprintf(buffer, MAXBUFSIZE, "%d %s\n", CALCULATE, k);
289 if((write(cl->meta_socket, buffer, buflen)) < 0)
291 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
299 int send_key_request(ip_t to)
303 fw = lookup_conn(to);
306 syslog(LOG_ERR, _("Attempting to send REQ_KEY to %d.%d.%d.%d, which does not exist?"),
312 syslog(LOG_DEBUG, _("Sending REQ_KEY to %s (%s)"),
313 fw->nexthop->vpn_hostname, fw->nexthop->real_hostname);
315 buflen = snprintf(buffer, MAXBUFSIZE, "%d %lx %lx\n", REQ_KEY, to, myself->vpn_ip);
317 if((write(fw->nexthop->meta_socket, buffer, buflen)) < 0)
319 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
322 fw->status.waitingforkey = 1;
327 int send_key_answer(conn_list_t *cl, ip_t to)
332 fw = lookup_conn(to);
336 syslog(LOG_ERR, _("Attempting to send ANS_KEY to %d.%d.%d.%d, which does not exist?"),
342 syslog(LOG_DEBUG, _("Sending ANS_KEY to %s (%s)"),
343 fw->nexthop->vpn_hostname, fw->nexthop->real_hostname);
345 buflen = snprintf(buffer, MAXBUFSIZE, "%d %lx %lx %d %s\n", ANS_KEY, to, myself->vpn_ip, my_key_expiry, my_public_key_base36);
347 if((write(fw->nexthop->meta_socket, buffer, buflen)) < 0)
349 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
357 notify all my direct connections of a new host
358 that was added to the vpn, with the exception
359 of the source of the announcement.
361 int notify_others(conn_list_t *new, conn_list_t *source,
362 int (*function)(conn_list_t*, conn_list_t*))
366 for(p = conn_list; p != NULL; p = p->next)
367 if(p != new && p != source && p->status.meta && p->status.active)
374 notify one connection of everything
377 int notify_one(conn_list_t *new)
381 for(p = conn_list; p != NULL; p = p->next)
382 if(p != new && p->status.active)
383 send_add_host(new, p);
389 The incoming request handlers
392 int basic_info_h(conn_list_t *cl)
397 syslog(LOG_DEBUG, _("Got BASIC_INFO from %s"), cl->real_hostname);
399 if(sscanf(cl->buffer, "%*d %d %lx/%lx:%hx %d", &cl->protocol_version, &cl->vpn_ip, &cl->vpn_mask, &cl->port, &cl->flags) != 5)
401 syslog(LOG_ERR, _("Got bad BASIC_INFO from %s"),
406 cl->vpn_hostname = hostlookup(htonl(cl->vpn_ip));
408 if(cl->protocol_version != PROT_CURRENT)
410 syslog(LOG_ERR, _("Peer uses incompatible protocol version %d"),
411 cl->protocol_version);
415 if(cl->status.outgoing)
417 /* First check if the host we connected to is already in our
418 connection list. If so, we are probably making a loop, which
422 if(old=lookup_conn(cl->vpn_ip))
425 syslog(LOG_NOTICE, _("Uplink %s (%s) is already in our connection list"),
426 cl->vpn_hostname, cl->real_hostname);
427 cl->status.outgoing = 0;
428 old->status.outgoing = 1;
429 terminate_connection(cl);
433 if(setup_vpn_connection(cl) < 0)
440 if(setup_vpn_connection(cl) < 0)
448 int passphrase_h(conn_list_t *cl)
451 cl->pp = xmalloc(sizeof(*(cl->pp)));
453 if(sscanf(cl->buffer, "%*d %as", &(cl->pp->phrase)) != 1)
455 syslog(LOG_ERR, _("Got bad PASSPHRASE from %s (%s)"),
456 cl->vpn_hostname, cl->real_hostname);
459 cl->pp->len = strlen(cl->pp->phrase);
462 syslog(LOG_DEBUG, _("Got PASSPHRASE from %s (%s)"),
463 cl->vpn_hostname, cl->real_hostname);
465 if(cl->status.outgoing)
473 int public_key_h(conn_list_t *cl)
478 if(sscanf(cl->buffer, "%*d %as", &g_n) != 1)
480 syslog(LOG_ERR, _("Got bad PUBLIC_KEY from %s (%s)"),
481 cl->vpn_hostname, cl->real_hostname);
486 syslog(LOG_DEBUG, _("Got PUBLIC_KEY from %s (%s)"),
487 cl->vpn_hostname, cl->real_hostname);
489 if(verify_passphrase(cl, g_n))
492 syslog(LOG_ERR, _("Intruder from %s: passphrase for %s does not match!"),
493 cl->real_hostname, cl->vpn_hostname);
497 if(cl->status.outgoing)
503 /* Okay, before we active the connection, we check if there is another entry
504 in the connection list with the same vpn_ip. If so, it presumably is an
505 old connection that has timed out but we don't know it yet.
508 while(old = lookup_conn(cl->vpn_ip))
511 syslog(LOG_NOTICE, _("Removing old entry for %s at %s in favour of new connection from %s"),
512 cl->vpn_hostname, old->real_hostname, cl->real_hostname);
513 old->status.active = 0;
514 terminate_connection(old);
517 cl->status.active = 1;
520 syslog(LOG_NOTICE, _("Connection with %s (%s) activated"),
521 cl->vpn_hostname, cl->real_hostname);
523 notify_others(cl, NULL, send_add_host);
530 int ack_h(conn_list_t *cl)
534 syslog(LOG_DEBUG, _("Got ACK from %s (%s)"),
535 cl->vpn_hostname, cl->real_hostname);
537 cl->status.active = 1;
540 syslog(LOG_NOTICE, _("Connection with %s (%s) activated"),
541 cl->vpn_hostname, cl->real_hostname);
543 notify_others(cl, NULL, send_add_host);
551 int termreq_h(conn_list_t *cl)
554 if(!cl->status.active)
556 syslog(LOG_ERR, _("Got unauthorized TERMREQ from %s (%s)"),
557 cl->vpn_hostname, cl->real_hostname);
562 syslog(LOG_DEBUG, _("Got TERMREQ from %s (%s)"),
563 cl->vpn_hostname, cl->real_hostname);
565 cl->status.termreq = 1;
567 terminate_connection(cl);
572 int timeout_h(conn_list_t *cl)
575 if(!cl->status.active)
577 syslog(LOG_ERR, _("Got unauthorized TIMEOUT from %s (%s)"),
578 cl->vpn_hostname, cl->real_hostname);
583 syslog(LOG_DEBUG, _("Got TIMEOUT from %s (%s)"),
584 cl->vpn_hostname, cl->real_hostname);
586 cl->status.termreq = 1;
587 terminate_connection(cl);
592 int del_host_h(conn_list_t *cl)
597 if(!cl->status.active)
599 syslog(LOG_ERR, _("Got unauthorized DEL_HOST from %s (%s)"),
600 cl->vpn_hostname, cl->real_hostname);
604 if(sscanf(cl->buffer, "%*d %lx", &vpn_ip) != 1)
606 syslog(LOG_ERR, _("Got bad DEL_HOST from %s (%s)"),
607 cl->vpn_hostname, cl->real_hostname);
611 if(!(fw = lookup_conn(vpn_ip)))
613 syslog(LOG_ERR, _("Got DEL_HOST for %d.%d.%d.%d from %s (%s) which does not exist?"),
614 IP_ADDR_V(vpn_ip), cl->vpn_hostname, cl->real_hostname);
618 /* Connections lists are really messed up if this happens */
619 if(vpn_ip == myself->vpn_ip)
621 syslog(LOG_ERR, _("Warning: got DEL_HOST from %s (%s) for ourself, restarting"),
622 cl->vpn_hostname, cl->real_hostname);
628 syslog(LOG_DEBUG, _("Got DEL_HOST for %s (%s) from %s (%s)"),
629 fw->vpn_hostname, fw->real_hostname, cl->vpn_hostname, cl->real_hostname);
631 notify_others(fw, cl, send_del_host);
633 fw->status.termreq = 1;
634 fw->status.active = 0;
636 terminate_connection(fw);
641 int ping_h(conn_list_t *cl)
644 if(!cl->status.active)
646 syslog(LOG_ERR, _("Got unauthorized PING from %s (%s)"),
647 cl->vpn_hostname, cl->real_hostname);
652 syslog(LOG_DEBUG, _("Got PING from %s (%s)"),
653 cl->vpn_hostname, cl->real_hostname);
655 cl->status.pinged = 0;
656 cl->status.got_pong = 1;
663 int pong_h(conn_list_t *cl)
666 if(!cl->status.active)
668 syslog(LOG_ERR, _("Got unauthorized PONG from %s (%s)"),
669 cl->vpn_hostname, cl->real_hostname);
674 syslog(LOG_DEBUG, _("Got PONG from %s (%s)"),
675 cl->vpn_hostname, cl->real_hostname);
677 cl->status.got_pong = 1;
682 int add_host_h(conn_list_t *cl)
689 conn_list_t *ncn, *old;
691 if(!cl->status.active)
693 syslog(LOG_ERR, _("Got unauthorized ADD_HOST from %s (%s)"),
694 cl->vpn_hostname, cl->real_hostname);
698 if(sscanf(cl->buffer, "%*d %lx %lx/%lx:%hx %d", &real_ip, &vpn_ip, &vpn_mask, &port, &flags) != 5)
700 syslog(LOG_ERR, _("Got bad ADD_HOST from %s (%s)"),
701 cl->vpn_hostname, cl->real_hostname);
705 if(old = lookup_conn(vpn_ip))
707 if((real_ip==old->real_ip) && (vpn_mask==old->vpn_mask) && (port==old->port))
710 syslog(LOG_NOTICE, _("Got duplicate ADD_HOST for %s (%s) from %s (%s)"),
711 old->vpn_hostname, old->real_hostname, cl->vpn_hostname, cl->real_hostname);
712 goto skip_add_host; /* One goto a day keeps the deeply nested if constructions away. */
717 syslog(LOG_NOTICE, _("Removing old entry for %s (%s)"),
718 old->vpn_hostname, old->real_hostname);
719 old->status.active = 0;
720 terminate_connection(old);
724 /* Connections lists are really messed up if this happens */
725 if(vpn_ip == myself->vpn_ip)
727 syslog(LOG_ERR, _("Warning: got ADD_HOST from %s (%s) for ourself, restarting"),
728 cl->vpn_hostname, cl->real_hostname);
733 ncn = new_conn_list();
734 ncn->real_ip = real_ip;
735 ncn->real_hostname = hostlookup(htonl(real_ip));
736 ncn->vpn_ip = vpn_ip;
737 ncn->vpn_mask = vpn_mask;
738 ncn->vpn_hostname = hostlookup(htonl(vpn_ip));
742 ncn->next = conn_list;
744 ncn->status.active = 1;
747 syslog(LOG_DEBUG, _("Got ADD_HOST for %s (%s) from %s (%s)"),
748 ncn->vpn_hostname, ncn->real_hostname, cl->vpn_hostname, cl->real_hostname);
752 notify_others(ncn, cl, send_add_host);
757 int req_key_h(conn_list_t *cl)
763 if(!cl->status.active)
765 syslog(LOG_ERR, _("Got unauthorized REQ_KEY from %s (%s)"),
766 cl->vpn_hostname, cl->real_hostname);
770 if(sscanf(cl->buffer, "%*d %lx %lx", &to, &from) != 2)
772 syslog(LOG_ERR, _("Got bad REQ_KEY from %s (%s)"),
773 cl->vpn_hostname, cl->real_hostname);
778 syslog(LOG_DEBUG, _("Got REQ_KEY origin %d.%d.%d.%d destination %d.%d.%d.%d from %s (%s)"),
779 IP_ADDR_V(from), IP_ADDR_V(to), cl->vpn_hostname, cl->real_hostname);
781 if((to & myself->vpn_mask) == (myself->vpn_ip & myself->vpn_mask))
782 { /* hey! they want something from ME! :) */
783 send_key_answer(cl, from);
787 fw = lookup_conn(to);
791 syslog(LOG_ERR, _("Attempting to forward REQ_KEY to %d.%d.%d.%d, which does not exist?"),
797 syslog(LOG_DEBUG, _("Forwarding REQ_KEY to %s (%s)"),
798 fw->nexthop->vpn_hostname, fw->nexthop->real_hostname);
800 cl->buffer[cl->reqlen-1] = '\n';
802 if(write(fw->nexthop->meta_socket, cl->buffer, cl->reqlen) < 0)
804 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
811 void set_keys(conn_list_t *cl, int expiry, char *key)
817 cl->public_key = xmalloc(sizeof(*cl->key));
818 cl->public_key->key = NULL;
821 if(cl->public_key->key)
822 free(cl->public_key->key);
823 cl->public_key->length = strlen(key);
824 cl->public_key->expiry = expiry;
825 cl->public_key->key = xmalloc(cl->public_key->length + 1);
826 strcpy(cl->public_key->key, key);
828 ek = make_shared_key(key);
832 cl->key = xmalloc(sizeof(*cl->key));
839 cl->key->length = strlen(ek);
840 cl->key->expiry = expiry;
841 cl->key->key = xmalloc(cl->key->length + 1);
842 strcpy(cl->key->key, ek);
846 int ans_key_h(conn_list_t *cl)
852 conn_list_t *fw, *gk;
854 if(!cl->status.active)
856 syslog(LOG_ERR, _("Got unauthorized ANS_KEY from %s (%s)"),
857 cl->vpn_hostname, cl->real_hostname);
861 if(sscanf(cl->buffer, "%*d %lx %lx %d %as", &to, &from, &expiry, &key) != 4)
863 syslog(LOG_ERR, _("Got bad ANS_KEY from %s (%s)"),
864 cl->vpn_hostname, cl->real_hostname);
869 syslog(LOG_DEBUG, _("Got ANS_KEY origin %d.%d.%d.%d destination %d.%d.%d.%d from %s (%s)"),
870 IP_ADDR_V(from), IP_ADDR_V(to), cl->vpn_hostname, cl->real_hostname);
872 if(to == myself->vpn_ip)
873 { /* hey! that key's for ME! :) */
874 gk = lookup_conn(from);
878 syslog(LOG_ERR, _("Receiving ANS_KEY origin %d.%d.%d.%d from %s (%s), which does not exist?"),
879 IP_ADDR_V(from), cl->vpn_hostname, cl->real_hostname);
883 set_keys(gk, expiry, key);
884 gk->status.validkey = 1;
885 gk->status.waitingforkey = 0;
890 fw = lookup_conn(to);
894 syslog(LOG_ERR, _("Attempting to forward ANS_KEY to %d.%d.%d.%d, which does not exist?"),
900 syslog(LOG_DEBUG, _("Forwarding ANS_KEY to %s (%s)"),
901 fw->nexthop->vpn_hostname, fw->nexthop->real_hostname);
903 cl->buffer[cl->reqlen-1] = '\n';
905 if((write(fw->nexthop->meta_socket, cl->buffer, cl->reqlen)) < 0)
907 syslog(LOG_ERR, _("Send failed: %s:%d: %m"), __FILE__, __LINE__);
914 int key_changed_h(conn_list_t *cl)
919 if(!cl->status.active)
921 syslog(LOG_ERR, _("Got unauthorized KEY_CHANGED from %s (%s)"),
922 cl->vpn_hostname, cl->real_hostname);
926 if(sscanf(cl->buffer, "%*d %lx", &from) != 1)
928 syslog(LOG_ERR, _("Got bad KEY_CHANGED from %s (%s)"),
929 cl->vpn_hostname, cl->real_hostname);
933 ik = lookup_conn(from);
937 syslog(LOG_ERR, _("Got KEY_CHANGED origin %d.%d.%d.%d from %s (%s), which does not exist?"),
938 IP_ADDR_V(from), cl->vpn_hostname, cl->real_hostname);
943 syslog(LOG_DEBUG, _("Got KEY_CHANGED origin %s from %s (%s)"),
944 ik->vpn_hostname, cl->vpn_hostname, cl->real_hostname);
946 ik->status.validkey = 0;
947 ik->status.waitingforkey = 0;
949 notify_others(ik, cl, send_key_changed);
954 int (*request_handlers[256])(conn_list_t*) = {
955 0, ack_h, 0, 0, 0, 0, 0, 0, 0, 0,
956 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
957 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
958 termreq_h, timeout_h, del_host_h, 0, 0, 0, 0, 0, 0, 0,
959 ping_h, pong_h, 0, 0, 0, 0, 0, 0, 0, 0,
960 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
961 add_host_h, basic_info_h, passphrase_h, public_key_h, 0, 0, 0, 0, 0, 0,
962 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
963 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
964 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
965 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
966 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
967 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
968 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
969 req_key_h, ans_key_h, key_changed_h, 0, 0, 0, 0, 0, 0, 0,
970 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
971 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
972 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
973 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
974 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0