1 | /* |
1 | /* |
2 | connection.h -- header for connection.C |
2 | connection.h -- header for connection.C |
|
|
3 | Copyright (C) 2003-2004 Marc Lehmann <pcg@goof.com> |
3 | |
4 | |
4 | This program is free software; you can redistribute it and/or modify |
5 | This program is free software; you can redistribute it and/or modify |
5 | it under the terms of the GNU General Public License as published by |
6 | it under the terms of the GNU General Public License as published by |
6 | the Free Software Foundation; either version 2 of the License, or |
7 | the Free Software Foundation; either version 2 of the License, or |
7 | (at your option) any later version. |
8 | (at your option) any later version. |
… | |
… | |
34 | |
35 | |
35 | struct rsaid { |
36 | struct rsaid { |
36 | u8 id[RSA_IDLEN]; // the challenge id |
37 | u8 id[RSA_IDLEN]; // the challenge id |
37 | }; |
38 | }; |
38 | |
39 | |
39 | typedef u8 rsachallenge[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data; |
40 | typedef rsaclear rsachallenge; // challenge data; |
40 | typedef u8 rsaencrdata[RSA_KEYLEN]; // encrypted challenge |
41 | typedef rsacrypt rsaencrdata; // encrypted challenge |
41 | typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash |
42 | typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash |
42 | |
43 | |
43 | //////////////////////////////////////////////////////////////////////////////////////// |
44 | //////////////////////////////////////////////////////////////////////////////////////// |
44 | |
45 | |
45 | struct crypto_ctx; |
46 | struct crypto_ctx; |
46 | |
47 | |
47 | struct hmac_packet:net_packet |
48 | struct hmac_packet : net_packet |
48 | { |
49 | { |
49 | u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere |
50 | u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere |
50 | |
51 | |
51 | void hmac_set (crypto_ctx * ctx); |
52 | void hmac_set (crypto_ctx * ctx); |
52 | bool hmac_chk (crypto_ctx * ctx); |
53 | bool hmac_chk (crypto_ctx * ctx); |
… | |
… | |
108 | |
109 | |
109 | pkt_queue (); |
110 | pkt_queue (); |
110 | ~pkt_queue (); |
111 | ~pkt_queue (); |
111 | }; |
112 | }; |
112 | |
113 | |
|
|
114 | enum |
|
|
115 | { |
|
|
116 | FEATURE_COMPRESSION = 0x01, |
|
|
117 | FEATURE_ROHC = 0x02, |
|
|
118 | }; |
|
|
119 | |
113 | struct connection |
120 | struct connection |
114 | { |
121 | { |
115 | conf_node *conf; |
122 | conf_node *conf; |
116 | struct vpn *vpn; |
123 | struct vpn *vpn; |
117 | |
124 | |
… | |
… | |
122 | |
129 | |
123 | u32 oseqno; |
130 | u32 oseqno; |
124 | sliding_window iseqno; |
131 | sliding_window iseqno; |
125 | |
132 | |
126 | u8 protocol; |
133 | u8 protocol; |
|
|
134 | u8 features; |
127 | |
135 | |
128 | pkt_queue data_queue, vpn_queue; |
136 | pkt_queue data_queue, vpn_queue; |
129 | |
137 | |
130 | crypto_ctx *octx, *ictx; |
138 | crypto_ctx *octx, *ictx; |
|
|
139 | |
|
|
140 | #if ENABLE_DNS |
|
|
141 | vector<struct dns_rep *> dns_rcvq; |
|
|
142 | vector<struct dns_req *> dns_sndq; |
|
|
143 | |
|
|
144 | void dnsv4_cb (time_watcher &w); time_watcher dnsv4_tw; |
|
|
145 | bool send_dnsv4_packet (vpn_packet *pkt, const sockinfo &si, int tos); |
|
|
146 | #endif |
131 | |
147 | |
132 | enum conf_node::connectmode connectmode; |
148 | enum conf_node::connectmode connectmode; |
133 | u8 prot_minor; // minor number of other side |
149 | u8 prot_minor; // minor number of other side |
134 | |
150 | |
135 | void reset_si (); |
151 | void reset_si (); |
… | |
… | |
147 | void send_auth_request (const sockinfo &si, bool initiate); |
163 | void send_auth_request (const sockinfo &si, bool initiate); |
148 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
164 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
149 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
165 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
150 | void send_reset (const sockinfo &dsi); |
166 | void send_reset (const sockinfo &dsi); |
151 | void send_ping (const sockinfo &dsi, u8 pong = 0); |
167 | void send_ping (const sockinfo &dsi, u8 pong = 0); |
152 | void send_data_packet (tap_packet *pkt, bool broadcast = false); |
168 | void send_data_packet (tap_packet *pkt); |
153 | |
169 | |
154 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
170 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
155 | void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding |
171 | void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding |
156 | |
172 | |
157 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0); |
173 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0); |
… | |
… | |
161 | const char *script_node_up (); |
177 | const char *script_node_up (); |
162 | const char *script_node_down (); |
178 | const char *script_node_down (); |
163 | |
179 | |
164 | void dump_status (); |
180 | void dump_status (); |
165 | |
181 | |
166 | connection(struct vpn *vpn_); |
182 | connection (struct vpn *vpn, conf_node *conf); |
167 | ~connection (); |
183 | ~connection (); |
168 | }; |
184 | }; |
169 | |
185 | |
170 | #endif |
186 | #endif |
171 | |
187 | |