ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/src/connection.h
Revision: 1.1
Committed: Wed Apr 2 03:06:22 2003 UTC (21 years, 1 month ago) by pcg
Content type: text/plain
Branch: MAIN
Log Message:
*** empty log message ***

File Contents

# Content
1 /*
2 connection.h -- header for connection.C
3
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version.
8
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
13
14 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software
16 Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
17 */
18
19 #ifndef VPE_CONNECTION_H__
20 #define VPE_CONNECTION_H__
21
22 #include <netinet/ip.h> // for tos etc.
23
24 #include <openssl/rand.h>
25 #include <openssl/hmac.h>
26 #include <openssl/evp.h>
27 #include <openssl/rsa.h>
28 #include <openssl/err.h>
29
30 #include "global.h"
31 #include "conf.h"
32 #include "sockinfo.h"
33 #include "util.h"
34 #include "device.h"
35
36 struct vpn;
37
38 // called after HUP etc. to (re-)initialize global data structures
39 void connection_init ();
40
41 struct rsaid {
42 u8 id[RSA_IDLEN]; // the challenge id
43 };
44
45 typedef u8 rsachallenge[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data;
46 typedef u8 rsaencrdata[RSA_KEYLEN]; // encrypted challenge
47 typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash
48
49 ////////////////////////////////////////////////////////////////////////////////////////
50
51 struct crypto_ctx;
52
53 struct hmac_packet:net_packet
54 {
55 u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere
56
57 void hmac_set (crypto_ctx * ctx);
58 bool hmac_chk (crypto_ctx * ctx);
59
60 private:
61 static unsigned char hmac_digest[EVP_MAX_MD_SIZE];
62
63 void hmac_gen (crypto_ctx * ctx);
64 };
65
66 struct vpn_packet : hmac_packet
67 {
68 enum ptype
69 {
70 PT_RESET = 0,
71 PT_DATA_UNCOMPRESSED,
72 PT_DATA_COMPRESSED,
73 PT_PING, PT_PONG, // wasting namespace space? ;)
74 PT_AUTH_REQ, // authentification request
75 PT_AUTH_RES, // authentification response
76 PT_CONNECT_REQ, // want other host to contact me
77 PT_CONNECT_INFO, // request connection to some node
78 PT_MAX
79 };
80
81 u8 type;
82 u8 srcdst, src1, dst1;
83
84 void set_hdr (ptype type, unsigned int dst);
85
86 unsigned int src () const
87 {
88 return src1 | ((srcdst >> 4) << 8);
89 }
90
91 unsigned int dst () const
92 {
93 return dst1 | ((srcdst & 0xf) << 8);
94 }
95
96 ptype typ () const
97 {
98 return (ptype) type;
99 }
100 };
101
102 ////////////////////////////////////////////////////////////////////////////////////////
103
104 // a very simple fifo pkt-queue
105 class pkt_queue
106 {
107 tap_packet *queue[QUEUEDEPTH];
108 int i, j;
109
110 public:
111
112 void put (tap_packet *p);
113 tap_packet *get ();
114
115 pkt_queue ();
116 ~pkt_queue ();
117 };
118
119 struct connection
120 {
121 conf_node *conf;
122 struct vpn *vpn;
123
124 sockinfo si; // the current(!) destination ip to send packets to
125 int retry_cnt;
126
127 tstamp last_activity; // time of last packet received
128
129 u32 oseqno;
130 sliding_window iseqno;
131
132 u8 protocol;
133
134 pkt_queue queue;
135
136 crypto_ctx *octx, *ictx;
137
138 enum conf_node::connectmode connectmode;
139 u8 prot_minor; // minor number of other side
140
141 void reset_dstaddr ();
142
143 void shutdown ();
144 void reset_connection ();
145 void establish_connection_cb (tstamp &ts); time_watcher establish_connection;
146 void rekey_cb (tstamp &ts); time_watcher rekey; // next rekying (actually current reset + reestablishing)
147 void keepalive_cb (tstamp &ts); time_watcher keepalive; // next keepalive probe
148
149 void send_auth_request (const sockinfo &si, bool initiate);
150 void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg);
151 void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols);
152 void send_reset (const sockinfo &dsi);
153 void send_ping (const sockinfo &dsi, u8 pong = 0);
154 void send_data_packet (tap_packet *pkt, bool broadcast = false);
155 void inject_data_packet (tap_packet *pkt, bool broadcast = false);
156 void connect_request (int id);
157
158 void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = IPTOS_RELIABILITY);
159 void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi);
160
161 void script_node ();
162 const char *script_node_up (int);
163 const char *script_node_down (int);
164
165 void dump_status ();
166
167 connection(struct vpn *vpn_);
168 ~connection ();
169 };
170
171 #endif
172