ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/src/connection.h
(Generate patch)

Comparing gvpe/src/connection.h (file contents):
Revision 1.2 by pcg, Wed Apr 2 03:25:17 2003 UTC vs.
Revision 1.15 by pcg, Tue Mar 1 06:27:20 2005 UTC

1/* 1/*
2 connection.h -- header for connection.C 2 connection.h -- header for connection.C
3 Copyright (C) 2003-2004 Marc Lehmann <pcg@goof.com>
3 4
4 This program is free software; you can redistribute it and/or modify 5 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by 6 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or 7 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version. 8 (at your option) any later version.
17*/ 18*/
18 19
19#ifndef VPE_CONNECTION_H__ 20#ifndef VPE_CONNECTION_H__
20#define VPE_CONNECTION_H__ 21#define VPE_CONNECTION_H__
21 22
22#include <netinet/ip.h> // for tos etc.
23
24#include <openssl/hmac.h> 23#include <openssl/hmac.h>
25 24
26#include "global.h" 25#include "global.h"
27#include "conf.h" 26#include "conf.h"
28#include "sockinfo.h" 27#include "sockinfo.h"
36 35
37struct rsaid { 36struct rsaid {
38 u8 id[RSA_IDLEN]; // the challenge id 37 u8 id[RSA_IDLEN]; // the challenge id
39}; 38};
40 39
41typedef u8 rsachallenge[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data; 40typedef rsaclear rsachallenge; // challenge data;
42typedef u8 rsaencrdata[RSA_KEYLEN]; // encrypted challenge 41typedef rsacrypt rsaencrdata; // encrypted challenge
43typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash 42typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash
44 43
45//////////////////////////////////////////////////////////////////////////////////////// 44////////////////////////////////////////////////////////////////////////////////////////
46 45
47struct crypto_ctx; 46struct crypto_ctx;
48 47
49struct hmac_packet:net_packet 48struct hmac_packet : net_packet
50{ 49{
51 u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere 50 u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere
52 51
53 void hmac_set (crypto_ctx * ctx); 52 void hmac_set (crypto_ctx * ctx);
54 bool hmac_chk (crypto_ctx * ctx); 53 bool hmac_chk (crypto_ctx * ctx);
75 }; 74 };
76 75
77 u8 type; 76 u8 type;
78 u8 srcdst, src1, dst1; 77 u8 srcdst, src1, dst1;
79 78
80 void set_hdr (ptype type, unsigned int dst); 79 void set_hdr (ptype type_, unsigned int dst);
81 80
82 unsigned int src () const 81 unsigned int src () const
83 { 82 {
84 return src1 | ((srcdst >> 4) << 8); 83 return src1 | ((srcdst >> 4) << 8);
85 } 84 }
98//////////////////////////////////////////////////////////////////////////////////////// 97////////////////////////////////////////////////////////////////////////////////////////
99 98
100// a very simple fifo pkt-queue 99// a very simple fifo pkt-queue
101class pkt_queue 100class pkt_queue
102 { 101 {
103 tap_packet *queue[QUEUEDEPTH]; 102 net_packet *queue[QUEUEDEPTH];
104 int i, j; 103 int i, j;
105 104
106 public: 105 public:
107 106
108 void put (tap_packet *p); 107 void put (net_packet *p);
109 tap_packet *get (); 108 net_packet *get ();
110 109
111 pkt_queue (); 110 pkt_queue ();
112 ~pkt_queue (); 111 ~pkt_queue ();
112 };
113
114enum
115 {
116 FEATURE_COMPRESSION = 0x01,
117 FEATURE_ROHC = 0x02,
113 }; 118 };
114 119
115struct connection 120struct connection
116 { 121 {
117 conf_node *conf; 122 conf_node *conf;
124 129
125 u32 oseqno; 130 u32 oseqno;
126 sliding_window iseqno; 131 sliding_window iseqno;
127 132
128 u8 protocol; 133 u8 protocol;
134 u8 features;
129 135
130 pkt_queue queue; 136 pkt_queue data_queue, vpn_queue;
131 137
132 crypto_ctx *octx, *ictx; 138 crypto_ctx *octx, *ictx;
139
140#if ENABLE_DNS
141 vector<struct dns_rep *> dns_rcvq;
142 vector<struct dns_req *> dns_sndq;
143
144 void dnsv4_cb (time_watcher &w); time_watcher dnsv4_tw;
145 bool send_dnsv4_packet (vpn_packet *pkt, const sockinfo &si, int tos);
146#endif
133 147
134 enum conf_node::connectmode connectmode; 148 enum conf_node::connectmode connectmode;
135 u8 prot_minor; // minor number of other side 149 u8 prot_minor; // minor number of other side
136 150
137 void reset_dstaddr (); 151 void reset_si ();
152 const sockinfo &forward_si (const sockinfo &si) const;
138 153
139 void shutdown (); 154 void shutdown ();
155 void connection_established ();
140 void reset_connection (); 156 void reset_connection ();
141 void establish_connection_cb (tstamp &ts); time_watcher establish_connection;
142 void rekey_cb (tstamp &ts); time_watcher rekey; // next rekying (actually current reset + reestablishing)
143 void keepalive_cb (tstamp &ts); time_watcher keepalive; // next keepalive probe
144 157
158 void establish_connection_cb (time_watcher &w); time_watcher establish_connection;
159 void rekey_cb (time_watcher &w); time_watcher rekey; // next rekying (actually current reset + reestablishing)
160 void keepalive_cb (time_watcher &w); time_watcher keepalive; // next keepalive probe
161
162 void send_connect_request (int id);
145 void send_auth_request (const sockinfo &si, bool initiate); 163 void send_auth_request (const sockinfo &si, bool initiate);
146 void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); 164 void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg);
147 void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); 165 void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols);
148 void send_reset (const sockinfo &dsi); 166 void send_reset (const sockinfo &dsi);
149 void send_ping (const sockinfo &dsi, u8 pong = 0); 167 void send_ping (const sockinfo &dsi, u8 pong = 0);
150 void send_data_packet (tap_packet *pkt, bool broadcast = false); 168 void send_data_packet (tap_packet *pkt);
169
151 void inject_data_packet (tap_packet *pkt, bool broadcast = false); 170 void inject_data_packet (tap_packet *pkt, bool broadcast = false);
152 void connect_request (int id); 171 void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding
153 172
154 void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = IPTOS_RELIABILITY); 173 void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0);
155 void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); 174 void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi);
156 175
157 void script_node (); 176 void script_node ();
158 const char *script_node_up (int); 177 const char *script_node_up ();
159 const char *script_node_down (int); 178 const char *script_node_down ();
160 179
161 void dump_status (); 180 void dump_status ();
162 181
163 connection(struct vpn *vpn_); 182 connection (struct vpn *vpn, conf_node *conf);
164 ~connection (); 183 ~connection ();
165 }; 184 };
166 185
167#endif 186#endif
168 187

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines