… | |
… | |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
15 | GNU General Public License for more details. |
15 | GNU General Public License for more details. |
16 | |
16 | |
17 | You should have received a copy of the GNU General Public License |
17 | You should have received a copy of the GNU General Public License |
18 | along with gvpe; if not, write to the Free Software |
18 | along with gvpe; if not, write to the Free Software |
19 | Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
19 | Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
20 | */ |
20 | */ |
21 | |
21 | |
22 | #ifndef VPE_CONNECTION_H__ |
22 | #ifndef GVPE_CONNECTION_H__ |
23 | #define VPE_CONNECTION_H__ |
23 | #define GVPE_CONNECTION_H__ |
24 | |
24 | |
25 | #include <openssl/hmac.h> |
25 | #include <openssl/hmac.h> |
26 | |
26 | |
27 | #include "global.h" |
27 | #include "global.h" |
28 | #include "conf.h" |
28 | #include "conf.h" |
… | |
… | |
68 | PT_DATA_UNCOMPRESSED, |
68 | PT_DATA_UNCOMPRESSED, |
69 | PT_DATA_COMPRESSED, |
69 | PT_DATA_COMPRESSED, |
70 | PT_PING, PT_PONG, // wasting namespace space? ;) |
70 | PT_PING, PT_PONG, // wasting namespace space? ;) |
71 | PT_AUTH_REQ, // authentification request |
71 | PT_AUTH_REQ, // authentification request |
72 | PT_AUTH_RES, // authentification response |
72 | PT_AUTH_RES, // authentification response |
73 | PT_CONNECT_REQ, // want other host to contact me |
73 | PT_CONNECT_REQ, // want other node to contact me |
74 | PT_CONNECT_INFO, // request connection to some node |
74 | PT_CONNECT_INFO, // request connection to some node |
|
|
75 | PT_DATA_BRIDGED, // uncompressed packet with foreign mac pot. larger than path mtu |
75 | PT_MAX |
76 | PT_MAX |
76 | }; |
77 | }; |
77 | |
78 | |
78 | u8 type; |
79 | u8 type; |
79 | u8 srcdst, src1, dst1; |
80 | u8 srcdst, src1, dst1; |
… | |
… | |
115 | |
116 | |
116 | enum |
117 | enum |
117 | { |
118 | { |
118 | FEATURE_COMPRESSION = 0x01, |
119 | FEATURE_COMPRESSION = 0x01, |
119 | FEATURE_ROHC = 0x02, |
120 | FEATURE_ROHC = 0x02, |
|
|
121 | FEATURE_BRIDGING = 0x04, |
120 | }; |
122 | }; |
121 | |
123 | |
122 | struct connection |
124 | struct connection |
123 | { |
125 | { |
124 | conf_node *conf; |
126 | conf_node *conf; |
… | |
… | |
140 | crypto_ctx *octx, *ictx; |
142 | crypto_ctx *octx, *ictx; |
141 | |
143 | |
142 | #if ENABLE_DNS |
144 | #if ENABLE_DNS |
143 | struct dns_connection *dns; |
145 | struct dns_connection *dns; |
144 | |
146 | |
145 | bool send_dnsv4_packet (vpn_packet *pkt, const sockinfo &si, int tos); |
147 | void dnsv4_reset_connection (); |
146 | #endif |
148 | #endif |
147 | |
149 | |
148 | enum conf_node::connectmode connectmode; |
150 | enum conf_node::connectmode connectmode; |
149 | u8 prot_minor; // minor number of other side |
151 | u8 prot_minor; // minor number of other side |
150 | |
152 | |
… | |
… | |
153 | |
155 | |
154 | void shutdown (); |
156 | void shutdown (); |
155 | void connection_established (); |
157 | void connection_established (); |
156 | void reset_connection (); |
158 | void reset_connection (); |
157 | |
159 | |
158 | void establish_connection_cb (time_watcher &w); time_watcher establish_connection; |
160 | void establish_connection_cb (ev::timer &w, int revents); ev::timer establish_connection; |
159 | void rekey_cb (time_watcher &w); time_watcher rekey; // next rekying (actually current reset + reestablishing) |
161 | void rekey_cb (ev::timer &w, int revents); ev::timer rekey; // next rekying (actually current reset + reestablishing) |
160 | void keepalive_cb (time_watcher &w); time_watcher keepalive; // next keepalive probe |
162 | void keepalive_cb (ev::timer &w, int revents); ev::timer keepalive; // next keepalive probe |
161 | |
163 | |
162 | void send_connect_request (int id); |
164 | void send_connect_request (int id); |
163 | void send_auth_request (const sockinfo &si, bool initiate); |
165 | void send_auth_request (const sockinfo &si, bool initiate); |
164 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
166 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
165 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
167 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
… | |
… | |
168 | void send_data_packet (tap_packet *pkt); |
170 | void send_data_packet (tap_packet *pkt); |
169 | |
171 | |
170 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
172 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
171 | void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding |
173 | void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding |
172 | |
174 | |
|
|
175 | void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); |
173 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0); |
176 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0); |
174 | void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); |
|
|
175 | |
177 | |
|
|
178 | void script_init_env (const char *ext); |
176 | void script_node (); |
179 | void script_init_connect_env (); |
177 | const char *script_node_up (); |
180 | const char *script_node_up (); |
178 | const char *script_node_down (); |
181 | const char *script_node_down (); |
179 | |
182 | |
180 | void dump_status (); |
183 | void dump_status (); |
181 | |
184 | |