ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/src/connection.h
(Generate patch)

Comparing gvpe/src/connection.h (file contents):
Revision 1.5 by pcg, Sat Apr 5 02:32:40 2003 UTC vs.
Revision 1.14 by pcg, Sun Feb 8 07:24:25 2004 UTC

1/* 1/*
2 connection.h -- header for connection.C 2 connection.h -- header for connection.C
3 Copyright (C) 2003-2004 Marc Lehmann <pcg@goof.com>
3 4
4 This program is free software; you can redistribute it and/or modify 5 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by 6 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or 7 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version. 8 (at your option) any later version.
34 35
35struct rsaid { 36struct rsaid {
36 u8 id[RSA_IDLEN]; // the challenge id 37 u8 id[RSA_IDLEN]; // the challenge id
37}; 38};
38 39
39typedef u8 rsachallenge[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data; 40typedef rsaclear rsachallenge; // challenge data;
40typedef u8 rsaencrdata[RSA_KEYLEN]; // encrypted challenge 41typedef rsacrypt rsaencrdata; // encrypted challenge
41typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash 42typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash
42 43
43//////////////////////////////////////////////////////////////////////////////////////// 44////////////////////////////////////////////////////////////////////////////////////////
44 45
45struct crypto_ctx; 46struct crypto_ctx;
46 47
47struct hmac_packet:net_packet 48struct hmac_packet : net_packet
48{ 49{
49 u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere 50 u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere
50 51
51 void hmac_set (crypto_ctx * ctx); 52 void hmac_set (crypto_ctx * ctx);
52 bool hmac_chk (crypto_ctx * ctx); 53 bool hmac_chk (crypto_ctx * ctx);
96//////////////////////////////////////////////////////////////////////////////////////// 97////////////////////////////////////////////////////////////////////////////////////////
97 98
98// a very simple fifo pkt-queue 99// a very simple fifo pkt-queue
99class pkt_queue 100class pkt_queue
100 { 101 {
101 tap_packet *queue[QUEUEDEPTH]; 102 net_packet *queue[QUEUEDEPTH];
102 int i, j; 103 int i, j;
103 104
104 public: 105 public:
105 106
106 void put (tap_packet *p); 107 void put (net_packet *p);
107 tap_packet *get (); 108 net_packet *get ();
108 109
109 pkt_queue (); 110 pkt_queue ();
110 ~pkt_queue (); 111 ~pkt_queue ();
112 };
113
114enum
115 {
116 FEATURE_COMPRESSION = 0x01,
117 FEATURE_ROHC = 0x02,
111 }; 118 };
112 119
113struct connection 120struct connection
114 { 121 {
115 conf_node *conf; 122 conf_node *conf;
122 129
123 u32 oseqno; 130 u32 oseqno;
124 sliding_window iseqno; 131 sliding_window iseqno;
125 132
126 u8 protocol; 133 u8 protocol;
134 u8 features;
127 135
128 pkt_queue queue; 136 pkt_queue data_queue, vpn_queue;
129 137
130 crypto_ctx *octx, *ictx; 138 crypto_ctx *octx, *ictx;
131 139
132 enum conf_node::connectmode connectmode; 140 enum conf_node::connectmode connectmode;
133 u8 prot_minor; // minor number of other side 141 u8 prot_minor; // minor number of other side
134 142
135 void reset_dstaddr (); 143 void reset_si ();
144 const sockinfo &forward_si (const sockinfo &si) const;
136 145
137 void shutdown (); 146 void shutdown ();
147 void connection_established ();
138 void reset_connection (); 148 void reset_connection ();
149
139 void establish_connection_cb (time_watcher &w); time_watcher establish_connection; 150 void establish_connection_cb (time_watcher &w); time_watcher establish_connection;
140 void rekey_cb (time_watcher &w); time_watcher rekey; // next rekying (actually current reset + reestablishing) 151 void rekey_cb (time_watcher &w); time_watcher rekey; // next rekying (actually current reset + reestablishing)
141 void keepalive_cb (time_watcher &w); time_watcher keepalive; // next keepalive probe 152 void keepalive_cb (time_watcher &w); time_watcher keepalive; // next keepalive probe
142 153
154 void send_connect_request (int id);
143 void send_auth_request (const sockinfo &si, bool initiate); 155 void send_auth_request (const sockinfo &si, bool initiate);
144 void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); 156 void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg);
145 void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); 157 void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols);
146 void send_reset (const sockinfo &dsi); 158 void send_reset (const sockinfo &dsi);
147 void send_ping (const sockinfo &dsi, u8 pong = 0); 159 void send_ping (const sockinfo &dsi, u8 pong = 0);
148 void send_data_packet (tap_packet *pkt, bool broadcast = false); 160 void send_data_packet (tap_packet *pkt);
161
149 void inject_data_packet (tap_packet *pkt, bool broadcast = false); 162 void inject_data_packet (tap_packet *pkt, bool broadcast = false);
150 void connect_request (int id); 163 void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding
151 164
165 void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0);
152 void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); 166 void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi);
153 167
154 void script_node (); 168 void script_node ();
155 const char *script_node_up (); 169 const char *script_node_up ();
156 const char *script_node_down (); 170 const char *script_node_down ();

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines