X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fprotocol.h;h=0d163868782f59d28e2f47880898f38c0c1e68c0;hp=d77c045586c0ac2a61e7800c85cac5039a69dc78;hb=24a2c7e51a0b080c4bdb55f697b3f0458ebc3fb1;hpb=c78a204f06182f50b0812c8e4fef6163e82097bf diff --git a/src/protocol.h b/src/protocol.h index d77c0455..0d163868 100644 --- a/src/protocol.h +++ b/src/protocol.h @@ -1,7 +1,7 @@ /* protocol.h -- header for protocol.c - Copyright (C) 1999,2000 Ivo Timmermans , - 2000 Guus Sliepen + Copyright (C) 1999-2001 Ivo Timmermans , + 2000,2001 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -17,62 +17,64 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: protocol.h,v 1.5.4.8 2000/09/26 14:06:11 guus Exp $ + $Id: protocol.h,v 1.5.4.22 2001/09/24 14:12:00 guus Exp $ */ #ifndef __TINC_PROTOCOL_H__ #define __TINC_PROTOCOL_H__ #include "net.h" +#include "subnet.h" /* Protocol version. Different versions are incompatible, incompatible version have different protocols. */ -#define PROT_CURRENT 8 - -/* Length of the challenge. Since the challenge will also - contain the key for the symmetric cipher, it must be - quite large. - */ - -#define CHAL_LENGTH 2048 +#define PROT_CURRENT 11 /* Request numbers */ enum { ALL = -1, /* Guardian for allow_request */ - ID = 0, CHALLENGE, CHAL_REPLY, ACK, + ID = 0, METAKEY, CHALLENGE, CHAL_REPLY, STATUS, ERROR, TERMREQ, PING, PONG, ADD_HOST, DEL_HOST, ADD_SUBNET, DEL_SUBNET, KEY_CHANGED, REQ_KEY, ANS_KEY, + PACKET, LAST /* Guardian for the highest request number */ }; -extern int (*request_handlers[])(conn_list_t*); - -extern int send_id(conn_list_t*); -extern int send_challenge(conn_list_t*); -extern int send_chal_reply(conn_list_t*, char*); -extern int send_ack(conn_list_t*); -extern int send_status(conn_list_t*, int, char*); -extern int send_error(conn_list_t*, int, char*); -extern int send_termreq(conn_list_t*); -extern int send_ping(conn_list_t*); -extern int send_pong(conn_list_t*); -extern int send_add_host(conn_list_t*, conn_list_t*); -extern int send_del_host(conn_list_t*, conn_list_t*); -extern int send_add_subnet(conn_list_t*, conn_list_t*, subnet_t*); -extern int send_del_subnet(conn_list_t*, conn_list_t*, subnet_t*); -extern int send_key_changed(conn_list_t*, conn_list_t*); -extern int send_req_key(conn_list_t*, conn_list_t*); -extern int send_ans_key(conn_list_t*, conn_list_t*, char*); +/* Maximum size of strings in a request */ + +#define MAX_STRING_SIZE 1024 +#define MAX_STRING "%1024s" + +extern int (*request_handlers[])(connection_t*); + +extern int send_id(connection_t*); +extern int send_challenge(connection_t*); +extern int send_chal_reply(connection_t*); +extern int send_metakey(connection_t*); +extern int send_status(connection_t*, int, char*); +extern int send_error(connection_t*, int, char*); +extern int send_termreq(connection_t*); +extern int send_ping(connection_t*); +extern int send_pong(connection_t*); +extern int send_add_host(connection_t*, connection_t*); +extern int send_del_host(connection_t*, connection_t*); +extern int send_add_subnet(connection_t*, subnet_t*); +extern int send_del_subnet(connection_t*, subnet_t*); +extern int send_key_changed(connection_t*, connection_t*); +extern int send_req_key(connection_t*, connection_t*); +extern int send_ans_key(connection_t*, connection_t*, char*); +extern int send_tcppacket(connection_t *, vpn_packet_t *); /* Old functions */ -extern int send_tcppacket(conn_list_t *, void *, int); -extern int notify_others(conn_list_t *, conn_list_t *, int (*function)(conn_list_t*, conn_list_t*)); +extern int notify_others(connection_t *, connection_t *, int (*function)(connection_t*, connection_t*)); +extern int receive_request(connection_t *); +extern int check_id(char *); #endif /* __TINC_PROTOCOL_H__ */