1 | /* |
1 | /* |
2 | connection.h -- header for connection.C |
2 | connection.h -- header for connection.C |
|
|
3 | Copyright (C) 2003-2004 Marc Lehmann <pcg@goof.com> |
3 | |
4 | |
4 | This program is free software; you can redistribute it and/or modify |
5 | This program is free software; you can redistribute it and/or modify |
5 | it under the terms of the GNU General Public License as published by |
6 | it under the terms of the GNU General Public License as published by |
6 | the Free Software Foundation; either version 2 of the License, or |
7 | the Free Software Foundation; either version 2 of the License, or |
7 | (at your option) any later version. |
8 | (at your option) any later version. |
… | |
… | |
17 | */ |
18 | */ |
18 | |
19 | |
19 | #ifndef VPE_CONNECTION_H__ |
20 | #ifndef VPE_CONNECTION_H__ |
20 | #define VPE_CONNECTION_H__ |
21 | #define VPE_CONNECTION_H__ |
21 | |
22 | |
22 | #include <netinet/ip.h> // for tos etc. |
|
|
23 | |
|
|
24 | #include <openssl/hmac.h> |
23 | #include <openssl/hmac.h> |
25 | |
24 | |
26 | #include "global.h" |
25 | #include "global.h" |
27 | #include "conf.h" |
26 | #include "conf.h" |
28 | #include "sockinfo.h" |
27 | #include "sockinfo.h" |
… | |
… | |
36 | |
35 | |
37 | struct rsaid { |
36 | struct rsaid { |
38 | u8 id[RSA_IDLEN]; // the challenge id |
37 | u8 id[RSA_IDLEN]; // the challenge id |
39 | }; |
38 | }; |
40 | |
39 | |
41 | typedef u8 rsachallenge[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data; |
40 | typedef rsaclear rsachallenge; // challenge data; |
42 | typedef u8 rsaencrdata[RSA_KEYLEN]; // encrypted challenge |
41 | typedef rsacrypt rsaencrdata; // encrypted challenge |
43 | typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash |
42 | typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash |
44 | |
43 | |
45 | //////////////////////////////////////////////////////////////////////////////////////// |
44 | //////////////////////////////////////////////////////////////////////////////////////// |
46 | |
45 | |
47 | struct crypto_ctx; |
46 | struct crypto_ctx; |
48 | |
47 | |
49 | struct hmac_packet:net_packet |
48 | struct hmac_packet : net_packet |
50 | { |
49 | { |
51 | u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere |
50 | u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere |
52 | |
51 | |
53 | void hmac_set (crypto_ctx * ctx); |
52 | void hmac_set (crypto_ctx * ctx); |
54 | bool hmac_chk (crypto_ctx * ctx); |
53 | bool hmac_chk (crypto_ctx * ctx); |
… | |
… | |
75 | }; |
74 | }; |
76 | |
75 | |
77 | u8 type; |
76 | u8 type; |
78 | u8 srcdst, src1, dst1; |
77 | u8 srcdst, src1, dst1; |
79 | |
78 | |
80 | void set_hdr (ptype type, unsigned int dst); |
79 | void set_hdr (ptype type_, unsigned int dst); |
81 | |
80 | |
82 | unsigned int src () const |
81 | unsigned int src () const |
83 | { |
82 | { |
84 | return src1 | ((srcdst >> 4) << 8); |
83 | return src1 | ((srcdst >> 4) << 8); |
85 | } |
84 | } |
… | |
… | |
98 | //////////////////////////////////////////////////////////////////////////////////////// |
97 | //////////////////////////////////////////////////////////////////////////////////////// |
99 | |
98 | |
100 | // a very simple fifo pkt-queue |
99 | // a very simple fifo pkt-queue |
101 | class pkt_queue |
100 | class pkt_queue |
102 | { |
101 | { |
103 | tap_packet *queue[QUEUEDEPTH]; |
102 | net_packet *queue[QUEUEDEPTH]; |
104 | int i, j; |
103 | int i, j; |
105 | |
104 | |
106 | public: |
105 | public: |
107 | |
106 | |
108 | void put (tap_packet *p); |
107 | void put (net_packet *p); |
109 | tap_packet *get (); |
108 | net_packet *get (); |
110 | |
109 | |
111 | pkt_queue (); |
110 | pkt_queue (); |
112 | ~pkt_queue (); |
111 | ~pkt_queue (); |
113 | }; |
112 | }; |
114 | |
113 | |
… | |
… | |
125 | u32 oseqno; |
124 | u32 oseqno; |
126 | sliding_window iseqno; |
125 | sliding_window iseqno; |
127 | |
126 | |
128 | u8 protocol; |
127 | u8 protocol; |
129 | |
128 | |
130 | pkt_queue queue; |
129 | pkt_queue data_queue, vpn_queue; |
131 | |
130 | |
132 | crypto_ctx *octx, *ictx; |
131 | crypto_ctx *octx, *ictx; |
133 | |
132 | |
134 | enum conf_node::connectmode connectmode; |
133 | enum conf_node::connectmode connectmode; |
135 | u8 prot_minor; // minor number of other side |
134 | u8 prot_minor; // minor number of other side |
136 | |
135 | |
137 | void reset_dstaddr (); |
136 | void reset_si (); |
|
|
137 | const sockinfo &forward_si (const sockinfo &si) const; |
138 | |
138 | |
139 | void shutdown (); |
139 | void shutdown (); |
|
|
140 | void connection_established (); |
140 | void reset_connection (); |
141 | void reset_connection (); |
|
|
142 | |
141 | void establish_connection_cb (time_watcher &w); time_watcher establish_connection; |
143 | void establish_connection_cb (time_watcher &w); time_watcher establish_connection; |
142 | void rekey_cb (time_watcher &w); time_watcher rekey; // next rekying (actually current reset + reestablishing) |
144 | void rekey_cb (time_watcher &w); time_watcher rekey; // next rekying (actually current reset + reestablishing) |
143 | void keepalive_cb (time_watcher &w); time_watcher keepalive; // next keepalive probe |
145 | void keepalive_cb (time_watcher &w); time_watcher keepalive; // next keepalive probe |
144 | |
146 | |
|
|
147 | void send_connect_request (int id); |
145 | void send_auth_request (const sockinfo &si, bool initiate); |
148 | void send_auth_request (const sockinfo &si, bool initiate); |
146 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
149 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
147 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
150 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
148 | void send_reset (const sockinfo &dsi); |
151 | void send_reset (const sockinfo &dsi); |
149 | void send_ping (const sockinfo &dsi, u8 pong = 0); |
152 | void send_ping (const sockinfo &dsi, u8 pong = 0); |
150 | void send_data_packet (tap_packet *pkt, bool broadcast = false); |
153 | void send_data_packet (tap_packet *pkt); |
|
|
154 | |
151 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
155 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
152 | void connect_request (int id); |
156 | void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding |
153 | |
157 | |
154 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = IPTOS_RELIABILITY); |
158 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0); |
155 | void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); |
159 | void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); |
156 | |
160 | |
157 | void script_node (); |
161 | void script_node (); |
158 | const char *script_node_up (); |
162 | const char *script_node_up (); |
159 | const char *script_node_down (); |
163 | const char *script_node_down (); |