ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/src/connection.h
(Generate patch)

Comparing gvpe/src/connection.h (file contents):
Revision 1.1 by pcg, Wed Apr 2 03:06:22 2003 UTC vs.
Revision 1.29 by pcg, Sun Dec 2 00:09:35 2007 UTC

1/* 1/*
2 connection.h -- header for connection.C 2 connection.h -- header for connection.C
3 Copyright (C) 2003-2005 Marc Lehmann <gvpe@schmorp.de>
3 4
5 This file is part of GVPE.
6
4 This program is free software; you can redistribute it and/or modify 7 GVPE is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by 8 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or 9 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version. 10 (at your option) any later version.
8 11
9 This program is distributed in the hope that it will be useful, 12 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of 13 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details. 15 GNU General Public License for more details.
13 16
14 You should have received a copy of the GNU General Public License 17 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software 18 along with gvpe; if not, write to the Free Software
16 Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 19 Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
17*/ 20*/
18 21
19#ifndef VPE_CONNECTION_H__ 22#ifndef GVPE_CONNECTION_H__
20#define VPE_CONNECTION_H__ 23#define GVPE_CONNECTION_H__
21 24
22#include <netinet/ip.h> // for tos etc.
23
24#include <openssl/rand.h>
25#include <openssl/hmac.h> 25#include <openssl/hmac.h>
26#include <openssl/evp.h>
27#include <openssl/rsa.h>
28#include <openssl/err.h>
29 26
30#include "global.h" 27#include "global.h"
31#include "conf.h" 28#include "conf.h"
32#include "sockinfo.h" 29#include "sockinfo.h"
33#include "util.h" 30#include "util.h"
36struct vpn; 33struct vpn;
37 34
38// called after HUP etc. to (re-)initialize global data structures 35// called after HUP etc. to (re-)initialize global data structures
39void connection_init (); 36void connection_init ();
40 37
41struct rsaid { 38struct rsaid
39{
42 u8 id[RSA_IDLEN]; // the challenge id 40 u8 id[RSA_IDLEN]; // the challenge id
43}; 41};
44 42
45typedef u8 rsachallenge[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data; 43typedef rsaclear rsachallenge; // challenge data;
46typedef u8 rsaencrdata[RSA_KEYLEN]; // encrypted challenge 44typedef rsacrypt rsaencrdata; // encrypted challenge
47typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash 45typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash
48 46
49//////////////////////////////////////////////////////////////////////////////////////// 47////////////////////////////////////////////////////////////////////////////////////////
50 48
51struct crypto_ctx; 49struct crypto_ctx;
52 50
53struct hmac_packet:net_packet 51struct hmac_packet : net_packet
54{ 52{
55 u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere 53 u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere
56 54
57 void hmac_set (crypto_ctx * ctx); 55 void hmac_set (crypto_ctx * ctx);
58 bool hmac_chk (crypto_ctx * ctx); 56 bool hmac_chk (crypto_ctx * ctx);
62 60
63 void hmac_gen (crypto_ctx * ctx); 61 void hmac_gen (crypto_ctx * ctx);
64}; 62};
65 63
66struct vpn_packet : hmac_packet 64struct vpn_packet : hmac_packet
65{
66 enum ptype
67 { 67 {
68 enum ptype
69 {
70 PT_RESET = 0, 68 PT_RESET = 0,
71 PT_DATA_UNCOMPRESSED, 69 PT_DATA_UNCOMPRESSED,
72 PT_DATA_COMPRESSED, 70 PT_DATA_COMPRESSED,
73 PT_PING, PT_PONG, // wasting namespace space? ;) 71 PT_PING, PT_PONG, // wasting namespace space? ;)
74 PT_AUTH_REQ, // authentification request 72 PT_AUTH_REQ, // authentification request
75 PT_AUTH_RES, // authentification response 73 PT_AUTH_RES, // authentification response
76 PT_CONNECT_REQ, // want other host to contact me 74 PT_CONNECT_REQ, // want other node to contact me
77 PT_CONNECT_INFO, // request connection to some node 75 PT_CONNECT_INFO, // request connection to some node
76 PT_DATA_BRIDGED, // uncompressed packet with foreign mac pot. larger than path mtu
78 PT_MAX 77 PT_MAX
79 }; 78 };
80 79
81 u8 type; 80 u8 type;
82 u8 srcdst, src1, dst1; 81 u8 srcdst, src1, dst1;
83 82
84 void set_hdr (ptype type, unsigned int dst); 83 void set_hdr (ptype type_, unsigned int dst);
85 84
86 unsigned int src () const 85 unsigned int src () const
87 { 86 {
88 return src1 | ((srcdst >> 4) << 8); 87 return src1 | ((srcdst >> 4) << 8);
89 } 88 }
90 89
91 unsigned int dst () const 90 unsigned int dst () const
92 { 91 {
93 return dst1 | ((srcdst & 0xf) << 8); 92 return dst1 | ((srcdst & 0xf) << 8);
94 } 93 }
95 94
96 ptype typ () const 95 ptype typ () const
97 { 96 {
98 return (ptype) type; 97 return (ptype) type;
99 }
100 }; 98 }
99};
101 100
102//////////////////////////////////////////////////////////////////////////////////////// 101////////////////////////////////////////////////////////////////////////////////////////
103 102
104// a very simple fifo pkt-queue 103// a very simple fifo pkt-queue
105class pkt_queue 104class pkt_queue
106 { 105{
107 tap_packet *queue[QUEUEDEPTH]; 106 net_packet *queue[QUEUEDEPTH];
108 int i, j; 107 int i, j;
109 108
110 public: 109public:
111 110
112 void put (tap_packet *p); 111 void put (net_packet *p);
113 tap_packet *get (); 112 net_packet *get ();
114 113
115 pkt_queue (); 114 pkt_queue ();
116 ~pkt_queue (); 115 ~pkt_queue ();
117 }; 116};
117
118enum
119{
120 FEATURE_COMPRESSION = 0x01,
121 FEATURE_ROHC = 0x02,
122 FEATURE_BRIDGING = 0x04,
123};
118 124
119struct connection 125struct connection
120 { 126{
121 conf_node *conf; 127 conf_node *conf;
122 struct vpn *vpn; 128 struct vpn *vpn;
123 129
124 sockinfo si; // the current(!) destination ip to send packets to 130 sockinfo si; // the current(!) destination ip to send packets to
125 int retry_cnt; 131 int retry_cnt;
126 132
127 tstamp last_activity; // time of last packet received 133 tstamp last_activity; // time of last packet received
128 134
129 u32 oseqno; 135 u32 oseqno;
130 sliding_window iseqno; 136 sliding_window iseqno;
131 137
132 u8 protocol; 138 u8 protocol;
139 u8 features;
133 140
134 pkt_queue queue; 141 pkt_queue data_queue, vpn_queue;
135 142
136 crypto_ctx *octx, *ictx; 143 crypto_ctx *octx, *ictx;
137 144
138 enum conf_node::connectmode connectmode; 145#if ENABLE_DNS
139 u8 prot_minor; // minor number of other side 146 struct dns_connection *dns;
140 147
141 void reset_dstaddr (); 148 void dnsv4_reset_connection ();
149#endif
142 150
143 void shutdown (); 151 enum conf_node::connectmode connectmode;
144 void reset_connection (); 152 u8 prot_minor; // minor number of other side
145 void establish_connection_cb (tstamp &ts); time_watcher establish_connection;
146 void rekey_cb (tstamp &ts); time_watcher rekey; // next rekying (actually current reset + reestablishing)
147 void keepalive_cb (tstamp &ts); time_watcher keepalive; // next keepalive probe
148 153
149 void send_auth_request (const sockinfo &si, bool initiate); 154 void reset_si ();
150 void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); 155 const sockinfo &forward_si (const sockinfo &si) const;
151 void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols);
152 void send_reset (const sockinfo &dsi);
153 void send_ping (const sockinfo &dsi, u8 pong = 0);
154 void send_data_packet (tap_packet *pkt, bool broadcast = false);
155 void inject_data_packet (tap_packet *pkt, bool broadcast = false);
156 void connect_request (int id);
157 156
158 void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = IPTOS_RELIABILITY); 157 void shutdown ();
159 void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); 158 void connection_established ();
159 void reset_connection ();
160 160
161 void script_node (); 161 void establish_connection_cb (ev::timer &w, int revents); ev::timer establish_connection;
162 const char *script_node_up (int); 162 void rekey_cb (ev::timer &w, int revents); ev::timer rekey; // next rekying (actually current reset + reestablishing)
163 const char *script_node_down (int); 163 void keepalive_cb (ev::timer &w, int revents); ev::timer keepalive; // next keepalive probe
164 164
165 void dump_status (); 165 void send_connect_request (int id);
166 void send_auth_request (const sockinfo &si, bool initiate);
167 void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg);
168 void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols);
169 void send_reset (const sockinfo &dsi);
170 void send_ping (const sockinfo &dsi, u8 pong = 0);
171 void send_data_packet (tap_packet *pkt);
166 172
173 void inject_data_packet (tap_packet *pkt, bool broadcast = false);
174 void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding
175
176 void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi);
177 void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0);
178
179 void script_init_env (const char *ext);
180 void script_init_connect_env ();
181 const char *script_node_up ();
182 const char *script_node_down ();
183
184 void dump_status ();
185
167 connection(struct vpn *vpn_); 186 connection (struct vpn *vpn, conf_node *conf);
168 ~connection (); 187 ~connection ();
169 }; 188};
170 189
171#endif 190#endif
172 191

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines