+#include "buffer.h"
+#include "cipher.h"
+#include "digest.h"
+#include "rsa.h"
+#include "list.h"
+#include "sptps.h"
+#include "logger.h"
+
+#define OPTION_INDIRECT 0x0001
+#define OPTION_TCPONLY 0x0002
+#define OPTION_PMTU_DISCOVERY 0x0004
+#define OPTION_CLAMP_MSS 0x0008
+#define OPTION_VERSION(x) ((x) >> 24) /* Top 8 bits are for protocol minor version */
+
+typedef union connection_status_t {
+ struct {
+ bool pinged: 1; /* sent ping */
+ bool unused_active: 1;
+ bool connecting: 1; /* 1 if we are waiting for a non-blocking connect() to finish */
+ bool unused_termreq: 1; /* the termination of this connection was requested */
+ bool remove_unused: 1; /* Set to 1 if you want this connection removed */
+ bool timeout_unused: 1; /* 1 if gotten timeout */
+ bool encryptout: 1; /* 1 if we can encrypt outgoing traffic */
+ bool decryptin: 1; /* 1 if we have to decrypt incoming traffic */
+ bool mst: 1; /* 1 if this connection is part of a minimum spanning tree */
+ bool control: 1; /* 1 if this is a control connection */
+ bool pcap: 1; /* 1 if this is a control connection requesting packet capture */
+ bool log: 1; /* 1 if this is a control connection requesting log dump */
+ bool log_color: 1; /* 1 if this connection supports ANSI escape codes */
+ bool invitation: 1; /* 1 if this is an invitation */
+ bool invitation_used: 1; /* 1 if the invitation has been consumed */
+ bool tarpit: 1; /* 1 if the connection should be added to the tarpit */
+ };
+ uint32_t value;
+} connection_status_t;
+
+#include "ecdsa.h"
+#include "edge.h"
+#include "net.h"
+#include "node.h"
+
+#ifndef DISABLE_LEGACY
+typedef struct legacy_crypto_t {
+ cipher_t cipher;
+ digest_t digest;
+ uint64_t budget;
+} legacy_crypto_t;
+
+bool init_crypto_by_nid(legacy_crypto_t *c, nid_t cipher, nid_t digest) ATTR_WARN_UNUSED;
+bool init_crypto_by_name(legacy_crypto_t *c, const char *cipher, const char *digest) ATTR_WARN_UNUSED;
+bool decrease_budget(legacy_crypto_t *c, size_t bytes) ATTR_WARN_UNUSED;
+
+typedef struct legacy_ctx_t {
+ rsa_t *rsa; /* his public RSA key or my private RSA key */
+ legacy_crypto_t in; /* cipher/digest he will use to send data to us */
+ legacy_crypto_t out; /* cipher/digest we will use to send data to him */
+} legacy_ctx_t;
+
+legacy_ctx_t *new_legacy_ctx(rsa_t *rsa);
+void free_legacy_ctx(legacy_ctx_t *ctx);
+#endif
+
+typedef struct connection_t {
+ char *name; /* name he claims to have */
+ char *hostname; /* the hostname of its real ip */