… | |
… | |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
15 | GNU General Public License for more details. |
15 | GNU General Public License for more details. |
16 | |
16 | |
17 | You should have received a copy of the GNU General Public License |
17 | You should have received a copy of the GNU General Public License |
18 | along with gvpe; if not, write to the Free Software |
18 | along with gvpe; if not, write to the Free Software |
19 | Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
19 | Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
20 | */ |
20 | */ |
21 | |
21 | |
22 | #ifndef VPE_CONNECTION_H__ |
22 | #ifndef GVPE_CONNECTION_H__ |
23 | #define VPE_CONNECTION_H__ |
23 | #define GVPE_CONNECTION_H__ |
24 | |
24 | |
25 | #include <openssl/hmac.h> |
25 | #include <openssl/hmac.h> |
26 | |
26 | |
27 | #include "global.h" |
27 | #include "global.h" |
28 | #include "conf.h" |
28 | #include "conf.h" |
… | |
… | |
33 | struct vpn; |
33 | struct vpn; |
34 | |
34 | |
35 | // called after HUP etc. to (re-)initialize global data structures |
35 | // called after HUP etc. to (re-)initialize global data structures |
36 | void connection_init (); |
36 | void connection_init (); |
37 | |
37 | |
38 | struct rsaid { |
38 | struct rsaid |
|
|
39 | { |
39 | u8 id[RSA_IDLEN]; // the challenge id |
40 | u8 id[RSA_IDLEN]; // the challenge id |
40 | }; |
41 | }; |
41 | |
42 | |
42 | typedef rsaclear rsachallenge; // challenge data; |
43 | typedef rsaclear rsachallenge; // challenge data; |
43 | typedef rsacrypt rsaencrdata; // encrypted challenge |
44 | typedef rsacrypt rsaencrdata; // encrypted challenge |
… | |
… | |
59 | |
60 | |
60 | void hmac_gen (crypto_ctx * ctx); |
61 | void hmac_gen (crypto_ctx * ctx); |
61 | }; |
62 | }; |
62 | |
63 | |
63 | struct vpn_packet : hmac_packet |
64 | struct vpn_packet : hmac_packet |
64 | { |
65 | { |
65 | enum ptype |
66 | enum ptype |
66 | { |
67 | { |
67 | PT_RESET = 0, |
68 | PT_RESET = 0, |
68 | PT_DATA_UNCOMPRESSED, |
69 | PT_DATA_UNCOMPRESSED, |
69 | PT_DATA_COMPRESSED, |
70 | PT_DATA_COMPRESSED, |
70 | PT_PING, PT_PONG, // wasting namespace space? ;) |
71 | PT_PING, PT_PONG, // wasting namespace space? ;) |
71 | PT_AUTH_REQ, // authentification request |
72 | PT_AUTH_REQ, // authentification request |
72 | PT_AUTH_RES, // authentification response |
73 | PT_AUTH_RES, // authentification response |
73 | PT_CONNECT_REQ, // want other host to contact me |
74 | PT_CONNECT_REQ, // want other node to contact me |
74 | PT_CONNECT_INFO, // request connection to some node |
75 | PT_CONNECT_INFO, // request connection to some node |
|
|
76 | PT_DATA_BRIDGED, // uncompressed packet with foreign mac pot. larger than path mtu |
75 | PT_MAX |
77 | PT_MAX |
76 | }; |
|
|
77 | |
|
|
78 | u8 type; |
|
|
79 | u8 srcdst, src1, dst1; |
|
|
80 | |
|
|
81 | void set_hdr (ptype type_, unsigned int dst); |
|
|
82 | |
|
|
83 | unsigned int src () const |
|
|
84 | { |
|
|
85 | return src1 | ((srcdst >> 4) << 8); |
|
|
86 | } |
|
|
87 | |
|
|
88 | unsigned int dst () const |
|
|
89 | { |
|
|
90 | return dst1 | ((srcdst & 0xf) << 8); |
|
|
91 | } |
|
|
92 | |
|
|
93 | ptype typ () const |
|
|
94 | { |
|
|
95 | return (ptype) type; |
|
|
96 | } |
|
|
97 | }; |
78 | }; |
|
|
79 | |
|
|
80 | u8 type; |
|
|
81 | u8 srcdst, src1, dst1; |
|
|
82 | |
|
|
83 | void set_hdr (ptype type_, unsigned int dst); |
|
|
84 | |
|
|
85 | unsigned int src () const |
|
|
86 | { |
|
|
87 | return src1 | ((srcdst >> 4) << 8); |
|
|
88 | } |
|
|
89 | |
|
|
90 | unsigned int dst () const |
|
|
91 | { |
|
|
92 | return dst1 | ((srcdst & 0xf) << 8); |
|
|
93 | } |
|
|
94 | |
|
|
95 | ptype typ () const |
|
|
96 | { |
|
|
97 | return (ptype) type; |
|
|
98 | } |
|
|
99 | }; |
98 | |
100 | |
99 | //////////////////////////////////////////////////////////////////////////////////////// |
101 | //////////////////////////////////////////////////////////////////////////////////////// |
100 | |
102 | |
101 | // a very simple fifo pkt-queue |
103 | // a very simple fifo pkt-queue |
102 | class pkt_queue |
104 | class pkt_queue |
103 | { |
105 | { |
104 | net_packet *queue[QUEUEDEPTH]; |
|
|
105 | int i, j; |
106 | int i, j; |
|
|
107 | int max_queue; |
|
|
108 | double max_ttl; |
106 | |
109 | |
|
|
110 | struct pkt { |
|
|
111 | ev_tstamp tstamp; |
|
|
112 | net_packet *pkt; |
|
|
113 | } *queue; |
|
|
114 | |
|
|
115 | void expire_cb (ev::timer &w, int revents); ev::timer expire; |
|
|
116 | |
107 | public: |
117 | public: |
108 | |
118 | |
109 | void put (net_packet *p); |
119 | void put (net_packet *p); |
110 | net_packet *get (); |
120 | net_packet *get (); |
111 | |
121 | |
112 | pkt_queue (); |
122 | bool empty () |
|
|
123 | { |
|
|
124 | return i == j; |
|
|
125 | } |
|
|
126 | |
|
|
127 | pkt_queue (double max_ttl, int max_queue); |
113 | ~pkt_queue (); |
128 | ~pkt_queue (); |
114 | }; |
129 | }; |
115 | |
130 | |
116 | enum |
131 | enum |
117 | { |
132 | { |
118 | FEATURE_COMPRESSION = 0x01, |
133 | FEATURE_COMPRESSION = 0x01, |
119 | FEATURE_ROHC = 0x02, |
134 | FEATURE_ROHC = 0x02, |
120 | }; |
135 | FEATURE_BRIDGING = 0x04, |
|
|
136 | }; |
121 | |
137 | |
122 | struct connection |
138 | struct connection |
123 | { |
139 | { |
124 | conf_node *conf; |
140 | conf_node *conf; |
125 | struct vpn *vpn; |
141 | struct vpn *vpn; |
126 | |
142 | |
127 | sockinfo si; // the current(!) destination ip to send packets to |
143 | sockinfo si; // the current(!) destination ip to send packets to |
128 | int retry_cnt; |
144 | int retry_cnt; |
129 | |
145 | |
130 | tstamp last_activity; // time of last packet received |
146 | tstamp last_activity; // time of last packet received |
131 | |
147 | |
132 | u32 oseqno; |
148 | u32 oseqno; |
133 | sliding_window iseqno; |
149 | sliding_window iseqno; |
134 | |
150 | |
135 | u8 protocol; |
151 | u8 protocol; |
136 | u8 features; |
152 | u8 features; |
137 | |
153 | |
138 | pkt_queue data_queue, vpn_queue; |
154 | pkt_queue data_queue, vpn_queue; |
139 | |
155 | |
140 | crypto_ctx *octx, *ictx; |
156 | crypto_ctx *octx, *ictx; |
141 | |
157 | |
142 | #if ENABLE_DNS |
158 | #if ENABLE_DNS |
143 | struct dns_connection *dns; |
159 | struct dns_connection *dns; |
144 | |
160 | |
145 | bool send_dnsv4_packet (vpn_packet *pkt, const sockinfo &si, int tos); |
|
|
146 | void dnsv4_reset_connection (); |
161 | void dnsv4_reset_connection (); |
147 | #endif |
162 | #endif |
148 | |
163 | |
149 | enum conf_node::connectmode connectmode; |
164 | enum conf_node::connectmode connectmode; |
150 | u8 prot_minor; // minor number of other side |
165 | u8 prot_minor; // minor number of other side |
151 | |
166 | |
152 | void reset_si (); |
167 | void reset_si (); |
153 | const sockinfo &forward_si (const sockinfo &si) const; |
168 | const sockinfo &forward_si (const sockinfo &si) const; |
154 | |
169 | |
155 | void shutdown (); |
170 | void shutdown (); |
156 | void connection_established (); |
171 | void connection_established (); |
157 | void reset_connection (); |
172 | void reset_connection (); |
158 | |
173 | |
159 | void establish_connection_cb (time_watcher &w); time_watcher establish_connection; |
174 | void establish_connection_cb (ev::timer &w, int revents); ev::timer establish_connection; |
160 | void rekey_cb (time_watcher &w); time_watcher rekey; // next rekying (actually current reset + reestablishing) |
175 | void rekey_cb (ev::timer &w, int revents); ev::timer rekey; // next rekying (actually current reset + reestablishing) |
161 | void keepalive_cb (time_watcher &w); time_watcher keepalive; // next keepalive probe |
176 | void keepalive_cb (ev::timer &w, int revents); ev::timer keepalive; // next keepalive probe |
162 | |
177 | |
163 | void send_connect_request (int id); |
178 | void send_connect_request (int id); |
164 | void send_auth_request (const sockinfo &si, bool initiate); |
179 | void send_auth_request (const sockinfo &si, bool initiate); |
165 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
180 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
166 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
181 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
167 | void send_reset (const sockinfo &dsi); |
182 | void send_reset (const sockinfo &dsi); |
168 | void send_ping (const sockinfo &dsi, u8 pong = 0); |
183 | void send_ping (const sockinfo &dsi, u8 pong = 0); |
169 | void send_data_packet (tap_packet *pkt); |
184 | void send_data_packet (tap_packet *pkt); |
170 | |
185 | |
171 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
186 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
172 | void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding |
187 | void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding |
173 | |
188 | |
|
|
189 | void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); |
174 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0); |
190 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0); |
175 | void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); |
|
|
176 | |
191 | |
177 | void script_node (); |
192 | void script_init_env (const char *ext); |
|
|
193 | void script_init_connect_env (); |
178 | const char *script_node_up (); |
194 | const char *script_node_up (); |
179 | const char *script_node_down (); |
195 | const char *script_node_down (); |
180 | |
196 | |
181 | void dump_status (); |
197 | void dump_status (); |
182 | |
198 | |
183 | connection (struct vpn *vpn, conf_node *conf); |
199 | connection (struct vpn *vpn, conf_node *conf); |
184 | ~connection (); |
200 | ~connection (); |
185 | }; |
201 | }; |
186 | |
202 | |
187 | #endif |
203 | #endif |
188 | |
204 | |