src/openvpn/forward.h
6fbf66fa
 /*
  *  OpenVPN -- An application to securely tunnel IP networks
  *             over a single TCP/UDP port, with support for SSL/TLS-based
  *             session authentication and key exchange,
  *             packet encryption, packet authentication, and
  *             packet compression.
  *
49979459
  *  Copyright (C) 2002-2018 OpenVPN Inc <sales@openvpn.net>
6fbf66fa
  *
  *  This program is free software; you can redistribute it and/or modify
  *  it under the terms of the GNU General Public License version 2
  *  as published by the Free Software Foundation.
  *
  *  This program is distributed in the hope that it will be useful,
  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  *  GNU General Public License for more details.
  *
caa54ac3
  *  You should have received a copy of the GNU General Public License along
  *  with this program; if not, write to the Free Software Foundation, Inc.,
  *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
6fbf66fa
  */
 
98619012
 
 /**
  * @file
  * Interface functions to the internal and external multiplexers.
  */
 
 
6fbf66fa
 #ifndef FORWARD_H
 #define FORWARD_H
 
 #include "openvpn.h"
 #include "occ.h"
 #include "ping.h"
 
 #define TUN_OUT(c)      (BLEN(&(c)->c2.to_tun) > 0)
 #define LINK_OUT(c)     (BLEN(&(c)->c2.to_link) > 0)
 #define ANY_OUT(c)      (TUN_OUT(c) || LINK_OUT(c))
 
 #ifdef ENABLE_FRAGMENT
81d882d5
 #define TO_LINK_FRAG(c) ((c)->c2.fragment && fragment_outgoing_defined((c)->c2.fragment))
6fbf66fa
 #else
 #define TO_LINK_FRAG(c) (false)
 #endif
 
 #define TO_LINK_DEF(c)  (LINK_OUT(c) || TO_LINK_FRAG(c))
 
 #define IOW_TO_TUN          (1<<0)
 #define IOW_TO_LINK         (1<<1)
 #define IOW_READ_TUN        (1<<2)
 #define IOW_READ_LINK       (1<<3)
 #define IOW_SHAPER          (1<<4)
 #define IOW_CHECK_RESIDUAL  (1<<5)
 #define IOW_FRAG            (1<<6)
 #define IOW_MBUF            (1<<7)
 #define IOW_READ_TUN_FORCE  (1<<8)
 #define IOW_WAIT_SIGNAL     (1<<9)
 
 #define IOW_READ            (IOW_READ_TUN|IOW_READ_LINK)
 
 
81d882d5
 void pre_select(struct context *c);
6fbf66fa
 
81d882d5
 void process_io(struct context *c);
 
 const char *wait_status_string(struct context *c, struct gc_arena *gc);
 
 void show_wait_status(struct context *c);
6fbf66fa
 
98619012
 
 /**********************************************************************/
 /**
  * Process a data channel packet that will be sent through a VPN tunnel.
  * @ingroup data_control
  *
  * This function controls the processing of a data channel packet which
  * will be sent through a VPN tunnel to a remote OpenVPN peer.  It's
  * general structure is as follows:
  * - Check that the client authentication has succeeded; if not, drop the
  *   packet.
  * - If the \a comp_frag argument is true:
  *   - Call \c lzo_compress() of the \link Data Channel Compression
  *     module\endlink to (possibly) compress the packet.
  *   - Call \c fragment_outgoing() of the \link Data Channel Fragmentation
  *     module\endlink to (possibly) fragment the packet.
  * - Activate the \link Data Channel Crypto module\endlink to perform
  *   security operations on the packet.
  *   - Call \c tls_pre_encrypt() to choose the appropriate security
  *     parameters for this packet.
  *   - Call \c openvpn_encrypt() to encrypt and HMAC signed the packet.
  *   - Call \c tls_post_encrypt() to prepend the one-byte OpenVPN header
  *     and do some TLS accounting.
  * - Place the resulting packet in \c c->c2.to_link so that it can be sent
  *   over the external network interface to its remote destination by the
  *   \link external_multiplexer External Multiplexer\endlink.
  *
  * @param c - The context structure of the VPN tunnel associated with this
  *     packet.
  * @param comp_frag - Whether to do packet compression and fragmentation.
  *     This flag is set to true the first time a packet is processed.  If
  *     the packet then gets fragmented, this function will be called again
  *     once for each remaining fragment with this parameter set to false.
  */
81d882d5
 void encrypt_sign(struct context *c, bool comp_frag);
 
 int get_server_poll_remaining_time(struct event_timeout *server_poll_timeout);
98619012
 
 /**********************************************************************/
 /**
  * Read a packet from the external network interface.
  * @ingroup external_multiplexer
  *
  * The packet read from the external network interface is stored in \c
  * c->c2.buf and its source address in \c c->c2.from.  If an error
  * occurred, the length of \c c->c2.buf will be 0.
  *
  * OpenVPN running as client or as UDP server only has a single external
  * network socket, so this function can be called with the single (client
  * mode) or top level (UDP server) context as its argument. OpenVPN
  * running as TCP server, on the other hand, has a network socket for each
  * active VPN tunnel.  In that case this function must be called with the
  * context associated with the appropriate VPN tunnel for which data is
  * available to be read.
  *
  * @param c - The context structure which contains the external
  *     network socket from which to read incoming packets.
  */
81d882d5
 void read_incoming_link(struct context *c);
98619012
 
 /**
65eedc35
  * Starts processing a packet read from the external network interface.
98619012
  * @ingroup external_multiplexer
  *
65eedc35
  * This function starts the processing of a data channel packet which
98619012
  * has come out of a VPN tunnel.  It's high-level structure is as follows:
  * - Verify that a nonzero length packet has been received from a valid
  *   source address for the given context \a c.
  * - Call \c tls_pre_decrypt(), which splits data channel and control
  *   channel packets:
  *   - If a data channel packet, the appropriate security parameters are
  *     loaded.
  *   - If a control channel packet, this function process is it and
  *     afterwards sets the packet's buffer length to 0, so that the data
  *     channel processing steps below will ignore it.
  * - Call \c openvpn_decrypt() of the \link data_crypto Data Channel
  *   Crypto module\endlink to authenticate and decrypt the packet using
  *   the security parameters loaded by \c tls_pre_decrypt() above.
65eedc35
  *
  * @param c - The context structure of the VPN tunnel associated with the
  *     packet.
  * @param lsi - link_socket_info obtained from context before processing.
  * @param floated - Flag indicates that peer has floated.
  *
  * @return true if packet is authenticated, false otherwise.
  */
81d882d5
 bool process_incoming_link_part1(struct context *c, struct link_socket_info *lsi, bool floated);
65eedc35
 
 /**
  * Continues processing a packet read from the external network interface.
  * @ingroup external_multiplexer
  *
  * This function continues the processing of a data channel packet which
  * has come out of a VPN tunnel. It must be called after
  * \c process_incoming_link_part1() function.
  *
  * It's high-level structure is as follows:
98619012
  * - Call \c fragment_incoming() of the \link fragmentation Data Channel
  *   Fragmentation module\endlink to reassemble the packet if it's
  *   fragmented.
  * - Call \c lzo_decompress() of the \link compression Data Channel
  *   Compression module\endlink to decompress the packet if it's
  *   compressed.
  * - Place the resulting packet in \c c->c2.to_tun so that it can be sent
  *   over the virtual tun/tap network interface to its local destination
  *   by the \link internal_multiplexer Internal Multiplexer\endlink.
  *
  * @param c - The context structure of the VPN tunnel associated with the
  *     packet.
65eedc35
  * @param lsi - link_socket_info obtained from context before processing.
  * @param orig_buf - Pointer to a buffer data.
  *
98619012
  */
81d882d5
 void process_incoming_link_part2(struct context *c, struct link_socket_info *lsi, const uint8_t *orig_buf);
98619012
 
 /**
  * Write a packet to the external network interface.
  * @ingroup external_multiplexer
  *
  * This function writes the packet stored in \c c->c2.to_link to the
  * external network device contained within \c c->c1.link_socket.
  *
  * If an error occurs, it is logged and the packet is dropped.
  *
  * @param c - The context structure of the VPN tunnel associated with the
  *     packet.
  */
81d882d5
 void process_outgoing_link(struct context *c);
98619012
 
 
 /**************************************************************************/
 /**
  * Read a packet from the virtual tun/tap network interface.
  * @ingroup internal_multiplexer
  *
  * This function reads a packet from the virtual tun/tap network device \c
  * c->c1.tuntap and stores it in \c c->c2.buf.
  *
  * If an error occurs, it is logged and the packet is dropped.
  *
  * @param c - The context structure in which to store the received
  *     packet.
  */
81d882d5
 void read_incoming_tun(struct context *c);
98619012
 
 
 /**
  * Process a packet read from the virtual tun/tap network interface.
  * @ingroup internal_multiplexer
  *
  * This function calls \c encrypt_sign() of the \link data_control Data
  * Channel Control module\endlink to process the packet.
  *
  * If an error occurs, it is logged and the packet is dropped.
  *
  * @param c - The context structure of the VPN tunnel associated with the
  *     packet.
  */
81d882d5
 void process_incoming_tun(struct context *c);
98619012
 
 
 /**
  * Write a packet to the virtual tun/tap network interface.
  * @ingroup internal_multiplexer
  *
  * This function writes the packet stored in \c c->c2.to_tun to the
  * virtual tun/tap network device \c c->c1.tuntap.
  *
  * If an error occurs, it is logged and the packet is dropped.
  *
  * @param c - The context structure of the VPN tunnel associated with
  *     the packet.
  */
81d882d5
 void process_outgoing_tun(struct context *c);
6fbf66fa
 
98619012
 
 /**************************************************************************/
 
81d882d5
 bool send_control_channel_string(struct context *c, const char *str, int msglevel);
6fbf66fa
 
 #define PIPV4_PASSTOS         (1<<0)
f0e8997a
 #define PIP_MSSFIX            (1<<1)         /* v4 and v6 */
3c7f2f55
 #define PIPV4_OUTGOING        (1<<2)
03731db3
 #define PIPV4_EXTRACT_DHCP_ROUTER (1<<3)
581bef87
 #define PIPV4_CLIENT_NAT      (1<<4)
6fbf66fa
 
81d882d5
 void process_ip_header(struct context *c, unsigned int flags, struct buffer *buf);
6fbf66fa
 
 #if P2MP
81d882d5
 void schedule_exit(struct context *c, const int n_seconds, const int signal);
 
6fbf66fa
 #endif
 
 #endif /* FORWARD_H */