ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/src/vpn.C
(Generate patch)

Comparing gvpe/src/vpn.C (file contents):
Revision 1.26 by pcg, Sun Jul 25 18:11:54 2004 UTC vs.
Revision 1.30 by pcg, Fri Mar 4 20:26:50 2005 UTC

1/* 1/*
2 vpn.C -- handle the protocol, encryption, handshaking etc. 2 vpn.C -- handle the protocol, encryption, handshaking etc.
3 Copyright (C) 2003-2004 Marc Lehmann <pcg@goof.com> 3 Copyright (C) 2003-2005 Marc Lehmann <gvpe@schmorp.de>
4 4
5 This file is part of GVPE.
6
5 This program is free software; you can redistribute it and/or modify 7 GVPE is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by 8 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 2 of the License, or 9 the Free Software Foundation; either version 2 of the License, or
8 (at your option) any later version. 10 (at your option) any later version.
9 11
10 This program is distributed in the hope that it will be useful, 12 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of 13 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details. 15 GNU General Public License for more details.
14 16
15 You should have received a copy of the GNU General Public License 17 You should have received a copy of the GNU General Public License
16 along with this program; if not, write to the Free Software 18 along with gvpe; if not, write to the Free Software
17 Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 19 Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
18*/ 20*/
19 21
20#include "config.h" 22#include "config.h"
21 23
226#endif 228#endif
227 229
228#if ENABLE_DNS 230#if ENABLE_DNS
229 if (THISNODE->protocols & PROT_DNSv4) 231 if (THISNODE->protocols & PROT_DNSv4)
230 { 232 {
233 dns_forwarder.set (::conf.dns_forw_host, ::conf.dns_forw_port, PROT_DNSv4);
234
231 dnsv4_fd = socket (PF_INET, SOCK_DGRAM, IPPROTO_UDP); 235 dnsv4_fd = socket (PF_INET, SOCK_DGRAM, IPPROTO_UDP);
232 236
233 if (dnsv4_fd < 0) 237 if (dnsv4_fd < 0)
234 return -1; 238 return -1;
235 239
263 tap_ev_watcher.start (tap->fd, EVENT_READ); 267 tap_ev_watcher.start (tap->fd, EVENT_READ);
264 268
265 reconnect_all (); 269 reconnect_all ();
266 270
267 return 0; 271 return 0;
268}
269
270// send a vpn packet out to other hosts
271bool
272vpn::send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos)
273{
274 switch (si.prot)
275 {
276 case PROT_IPv4:
277 return send_ipv4_packet (pkt, si, tos);
278
279 case PROT_UDPv4:
280 return send_udpv4_packet (pkt, si, tos);
281
282#if ENABLE_TCP
283 case PROT_TCPv4:
284 return send_tcpv4_packet (pkt, si, tos);
285#endif
286
287#if ENABLE_ICMP
288 case PROT_ICMPv4:
289 return send_icmpv4_packet (pkt, si, tos);
290#endif
291
292#if ENABLE_DNS
293 case PROT_DNSv4:
294 return send_dnsv4_packet (pkt, si, tos);
295#endif
296
297 default:
298 slog (L_CRIT, _("%s: FATAL: trying to send packet with unsupported protocol"), (const char *)si);
299 return false;
300 }
301} 272}
302 273
303bool 274bool
304vpn::send_ipv4_packet (vpn_packet *pkt, const sockinfo &si, int tos) 275vpn::send_ipv4_packet (vpn_packet *pkt, const sockinfo &si, int tos)
305{ 276{
442 413
443 if (len > 0) 414 if (len > 0)
444 { 415 {
445 pkt->len = len; 416 pkt->len = len;
446 417
447 // raw sockets deliver the ipv4, but don't expect it on sends 418 // raw sockets deliver the ipv4 header, but don't expect it on sends
448 // this is slow, but...
449 pkt->skip_hdr (IP_OVERHEAD); 419 pkt->skip_hdr (IP_OVERHEAD);
450 420
451 recv_vpn_packet (pkt, si); 421 recv_vpn_packet (pkt, si);
452 } 422 }
453 else 423 else
459 delete pkt; 429 delete pkt;
460 } 430 }
461 else 431 else
462 { 432 {
463 slog (L_ERR, 433 slog (L_ERR,
464 _("FATAL: unknown revents %08x in socket, terminating\n"), 434 _("FATAL: unknown revents %08x in socket, terminating\n"),
465 revents); 435 revents);
466 exit (EXIT_FAILURE); 436 exit (EXIT_FAILURE);
467 } 437 }
468} 438}
469 439
470#if ENABLE_ICMP 440#if ENABLE_ICMP
571 int dst = mac2id (pkt->dst); 541 int dst = mac2id (pkt->dst);
572 int src = mac2id (pkt->src); 542 int src = mac2id (pkt->src);
573 543
574 if (src != THISNODE->id) 544 if (src != THISNODE->id)
575 { 545 {
576 slog (L_ERR, _("FATAL: tap packet not originating on current node received, exiting.")); 546 slog (L_ERR, _("FATAL: tap packet not originating on current node received (if-up script not working properly?), exiting."));
577 exit (EXIT_FAILURE); 547 exit (EXIT_FAILURE);
578 } 548 }
579 549
580 if (dst == THISNODE->id) 550 if (dst == THISNODE->id)
581 { 551 {
639 connection_init (); 609 connection_init ();
640 610
641 for (configuration::node_vector::iterator i = conf.nodes.begin (); 611 for (configuration::node_vector::iterator i = conf.nodes.begin ();
642 i != conf.nodes.end (); ++i) 612 i != conf.nodes.end (); ++i)
643 { 613 {
644 connection *conn = new connection (this); 614 connection *conn = new connection (this, *i);
645
646 conn->conf = *i;
647 conns.push_back (conn); 615 conns.push_back (conn);
648
649 conn->establish_connection (); 616 conn->establish_connection ();
650 } 617 }
651} 618}
652 619
653connection *vpn::find_router () 620connection *vpn::find_router ()

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines