… | |
… | |
24 | |
24 | |
25 | #include <openssl/evp.h> |
25 | #include <openssl/evp.h> |
26 | #include <openssl/rsa.h> |
26 | #include <openssl/rsa.h> |
27 | |
27 | |
28 | #include "conf.h" |
28 | #include "conf.h" |
|
|
29 | #include "iom.h" |
29 | #include "util.h" |
30 | #include "util.h" |
30 | #include "device.h" |
31 | #include "device.h" |
31 | |
32 | |
32 | /* Protocol version. Different versions are incompatible, |
33 | /* Protocol version. Different versions are incompatible, |
33 | incompatible version have different protocols. |
34 | incompatible version have different protocols. |
… | |
… | |
42 | typedef u8 rsachallenge[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data |
43 | typedef u8 rsachallenge[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data |
43 | typedef u8 rsaencrdata[RSA_KEYLEN]; // encrypted challenge |
44 | typedef u8 rsaencrdata[RSA_KEYLEN]; // encrypted challenge |
44 | |
45 | |
45 | struct crypto_ctx; |
46 | struct crypto_ctx; |
46 | |
47 | |
|
|
48 | // a very simple fifo pkt-queue |
|
|
49 | class pkt_queue |
|
|
50 | { |
|
|
51 | tap_packet *queue[QUEUEDEPTH]; |
|
|
52 | int i, j; |
|
|
53 | |
|
|
54 | public: |
|
|
55 | |
|
|
56 | void put (tap_packet *p); |
|
|
57 | tap_packet *get (); |
|
|
58 | |
|
|
59 | pkt_queue (); |
|
|
60 | ~pkt_queue (); |
|
|
61 | }; |
|
|
62 | |
47 | enum auth_subtype { AUTH_INIT, AUTH_INITREPLY, AUTH_REPLY }; |
63 | enum auth_subtype { AUTH_INIT, AUTH_INITREPLY, AUTH_REPLY }; |
48 | |
64 | |
49 | struct connection |
65 | struct connection |
50 | { |
66 | { |
51 | conf_node *conf; |
67 | conf_node *conf; |
52 | struct vpn *vpn; |
68 | struct vpn *vpn; |
53 | |
69 | |
54 | SOCKADDR sa; |
70 | SOCKADDR sa; |
55 | int retry_cnt; |
71 | int retry_cnt; |
56 | |
72 | |
57 | time_t next_retry; // next connection retry |
|
|
58 | time_t next_rekey; // next rekying (actually current reset + reestablishing) |
|
|
59 | time_t last_activity; // time of last packet received |
73 | tstamp last_activity; // time of last packet received |
60 | |
74 | |
61 | u32 oseqno; |
75 | u32 oseqno; |
62 | u32 iseqno; |
76 | sliding_window iseqno; |
63 | u32 ismask; // bitmask with set bits for each received seqno (input seen mask) |
|
|
64 | |
77 | |
65 | pkt_queue queue; |
78 | pkt_queue queue; |
66 | |
79 | |
67 | crypto_ctx *octx, *ictx; |
80 | crypto_ctx *octx, *ictx; |
68 | |
81 | |
… | |
… | |
70 | |
83 | |
71 | void reset_dstaddr (); |
84 | void reset_dstaddr (); |
72 | |
85 | |
73 | void shutdown (); |
86 | void shutdown (); |
74 | void reset_connection (); |
87 | void reset_connection (); |
75 | void establish_connection (); |
88 | void establish_connection_cb (tstamp &ts); time_watcher establish_connection; |
76 | void rekey (); |
89 | void rekey_cb (tstamp &ts); time_watcher rekey; // next rekying (actually current reset + reestablishing) |
|
|
90 | void keepalive_cb (tstamp &ts); time_watcher keepalive; // next keepalive probe |
77 | |
91 | |
78 | void send_auth (auth_subtype subtype, SOCKADDR *sa, rsachallenge *k = 0); |
92 | void send_auth (auth_subtype subtype, SOCKADDR *sa, rsachallenge *k = 0); |
79 | void send_reset (SOCKADDR *dsa); |
93 | void send_reset (SOCKADDR *dsa); |
80 | void send_ping (SOCKADDR *dss, u8 pong = 0); |
94 | void send_ping (SOCKADDR *dss, u8 pong = 0); |
81 | void send_data_packet (tap_packet *pkt, bool broadcast = false); |
95 | void send_data_packet (tap_packet *pkt, bool broadcast = false); |
82 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
96 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
83 | void connect_request (int id); |
97 | void connect_request (int id); |
84 | |
98 | |
85 | void recv_vpn_packet (vpn_packet *pkt, SOCKADDR *rsa); |
99 | void recv_vpn_packet (vpn_packet *pkt, SOCKADDR *rsa); |
86 | |
100 | |
87 | void timer (); |
|
|
88 | |
|
|
89 | connection(struct vpn *vpn_) |
|
|
90 | : vpn(vpn_) |
|
|
91 | { |
|
|
92 | octx = ictx = 0; |
|
|
93 | retry_cnt = 0; |
|
|
94 | connectmode = conf_node::C_ALWAYS; // initial setting |
|
|
95 | reset_connection (); |
|
|
96 | } |
|
|
97 | |
|
|
98 | ~connection () |
|
|
99 | { |
|
|
100 | shutdown (); |
|
|
101 | } |
|
|
102 | |
|
|
103 | void script_node (); |
101 | void script_node (); |
104 | const char *script_node_up (); |
102 | const char *script_node_up (); |
105 | const char *script_node_down (); |
103 | const char *script_node_down (); |
|
|
104 | |
|
|
105 | connection(struct vpn *vpn_); |
|
|
106 | ~connection (); |
106 | }; |
107 | }; |
107 | |
108 | |
108 | struct vpn |
109 | struct vpn |
109 | { |
110 | { |
110 | int socket_fd; |
111 | int socket_fd; |
111 | int events; |
112 | int events; |
112 | |
113 | |
113 | tap_device *tap; |
|
|
114 | |
|
|
115 | enum { |
114 | enum { |
116 | EVENT_RECONNECT = 1, |
115 | EVENT_RECONNECT = 1, |
117 | EVENT_SHUTDOWN = 2, |
116 | EVENT_SHUTDOWN = 2, |
118 | }; |
117 | }; |
|
|
118 | |
|
|
119 | void event_cb (tstamp &ts); time_watcher event; |
|
|
120 | |
|
|
121 | tap_device *tap; |
119 | |
122 | |
120 | typedef vector<connection *> conns_vector; |
123 | typedef vector<connection *> conns_vector; |
121 | conns_vector conns; |
124 | conns_vector conns; |
122 | |
125 | |
123 | connection *find_router (); |
126 | connection *find_router (); |
… | |
… | |
125 | void send_vpn_packet (vpn_packet *pkt, SOCKADDR *sa, int tos = IPTOS_RELIABILITY); |
128 | void send_vpn_packet (vpn_packet *pkt, SOCKADDR *sa, int tos = IPTOS_RELIABILITY); |
126 | void reconnect_all (); |
129 | void reconnect_all (); |
127 | void shutdown_all (); |
130 | void shutdown_all (); |
128 | void connect_request (int id); |
131 | void connect_request (int id); |
129 | |
132 | |
|
|
133 | void vpn_ev (short revents); io_watcher vpn_ev_watcher; |
|
|
134 | void udp_ev (short revents); io_watcher udp_ev_watcher; |
|
|
135 | |
130 | vpn (); |
136 | vpn (); |
131 | ~vpn (); |
137 | ~vpn (); |
132 | |
138 | |
133 | int setup (); |
139 | int setup (); |
134 | void main_loop (); |
|
|
135 | |
140 | |
136 | const char *script_if_up (); |
141 | const char *script_if_up (); |
137 | }; |
142 | }; |
138 | |
143 | |
139 | #endif |
144 | #endif |