/*
net.h -- header for net.c
- Copyright (C) 1998,1999,2000 Ivo Timmermans <zarq@iname.com>
+ Copyright (C) 1998-2003 Ivo Timmermans <zarq@iname.com>
+ 2000-2003 Guus Sliepen <guus@sliepen.eu.org>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
- $Id: net.h,v 1.9.4.11 2000/09/14 21:51:20 zarq Exp $
+ $Id: net.h,v 1.9.4.68 2003/07/29 22:59:00 guus Exp $
*/
#ifndef __TINC_NET_H__
#define __TINC_NET_H__
-#include <sys/time.h>
+#include <openssl/evp.h>
-#include "config.h"
-#include "conf.h"
+#include "ipv6.h"
-#define MAXSIZE 1700 /* should be a bit more than the MTU for the tapdevice */
-#define MTU 1600
+#ifdef ENABLE_JUMBOGRAMS
+#define MTU 9014 /* 9000 bytes payload + 14 bytes ethernet header */
+#else
+#define MTU 1514 /* 1500 bytes payload + 14 bytes ethernet header */
+#endif
-#define MAC_ADDR_S "%02x:%02x:%02x:%02x:%02x:%02x"
-#define MAC_ADDR_V(x) ((unsigned char*)&(x))[0],((unsigned char*)&(x))[1], \
- ((unsigned char*)&(x))[2],((unsigned char*)&(x))[3], \
- ((unsigned char*)&(x))[4],((unsigned char*)&(x))[5]
+#define MAXSIZE (MTU + 4 + EVP_MAX_BLOCK_LENGTH + EVP_MAX_MD_SIZE + MTU/64 + 20) /* MTU + seqno + padding + HMAC + compressor overhead */
+#define MAXBUFSIZE ((MAXSIZE > 2048 ? MAXSIZE : 2048) + 128) /* Enough room for a request with a MAXSIZEd packet or a 8192 bits RSA key */
-#define IP_ADDR_S "%d.%d.%d.%d"
+#define MAXSOCKETS 128 /* Overkill... */
-#ifdef WORDS_BIGENDIAN
-# define IP_ADDR_V(x) ((unsigned char*)&(x))[0],((unsigned char*)&(x))[1], \
- ((unsigned char*)&(x))[2],((unsigned char*)&(x))[3]
-#else
-# define IP_ADDR_V(x) ((unsigned char*)&(x))[3],((unsigned char*)&(x))[2], \
- ((unsigned char*)&(x))[1],((unsigned char*)&(x))[0]
-#endif
+#define MAXQUEUELENGTH 8 /* Maximum number of packats in a single queue */
+
+typedef struct mac_t {
+ uint8_t x[6];
+} mac_t;
-#define MAXBUFSIZE 2048 /* Probably way too much, but it must fit every possible request. */
+typedef struct ipv4_t {
+ uint8_t x[4];
+} ipv4_t;
-/* flags */
-#define INDIRECTDATA 0x0001 /* Used to indicate that this host has to be reached indirect */
-#define EXPORTINDIRECTDATA 0x0002 /* Used to indicate uplink that it has to tell others to do INDIRECTDATA */
-#define TCPONLY 0x0004 /* Tells sender to send packets over TCP instead of UDP (for firewalls) */
+typedef struct ipv6_t {
+ uint16_t x[8];
+} ipv6_t;
-typedef unsigned long ip_t;
-typedef unsigned short port_t;
typedef short length_t;
-struct conn_list_t;
+typedef union sockaddr_t {
+ struct sockaddr sa;
+ struct sockaddr_in in;
+ struct sockaddr_in6 in6;
+#ifdef HAVE_STRUCT_SOCKADDR_STORAGE
+ struct sockaddr_storage storage;
+#endif
+} sockaddr_t;
-typedef struct subnet_t {
- ip_t netaddr;
- ip_t netmask;
- struct conn_list_t *owner;
- struct subnet_t *next;
- struct subnet_t *prev;
-} subnet_t;
+#ifdef SA_LEN
+#define SALEN(s) SA_LEN(&s)
+#else
+#define SALEN(s) (s.sa_family==AF_INET?sizeof(struct sockaddr_in):sizeof(struct sockaddr_in6))
+#endif
typedef struct vpn_packet_t {
- length_t len; /* the actual number of bytes in the `data' field */
- unsigned char data[MAXSIZE];
+ length_t len; /* the actual number of bytes in the `data' field */
+ int priority; /* priority or TOS */
+ uint32_t seqno; /* 32 bits sequence number (network byte order of course) */
+ uint8_t data[MAXSIZE];
} vpn_packet_t;
-typedef struct real_packet_t {
- length_t len; /* the length of the entire packet */
- ip_t from; /* where the packet came from */
- vpn_packet_t data; /* encrypted vpn_packet_t */
-} real_packet_t;
-
-typedef struct passphrase_t {
- unsigned short len;
- unsigned char *phrase;
-} passphrase_t;
-
-typedef struct status_bits_t {
- int pinged:1; /* sent ping */
- int got_pong:1; /* received pong */
- int meta:1; /* meta connection exists */
- int active:1; /* 1 if active.. */
- int outgoing:1; /* I myself asked for this conn */
- int termreq:1; /* the termination of this connection was requested */
- int remove:1; /* Set to 1 if you want this connection removed */
- int timeout:1; /* 1 if gotten timeout */
- int validkey:1; /* 1 if we currently have a valid key for him */
- int waitingforkey:1; /* 1 if we already sent out a request */
- int dataopen:1; /* 1 if we have a valid UDP connection open */
- int encryptout:1; /* 1 if we can encrypt outgoing traffic */
- int encryptin:1; /* 1 if we have to decrypt incoming traffic */
- int encrypted:1;
- int unused:18;
-} status_bits_t;
-
-typedef struct option_bits_t {
- int unused:32;
-} option_bits_t;
-
typedef struct queue_element_t {
- void *packet;
- struct queue_element_t *prev;
- struct queue_element_t *next;
+ void *packet;
+ struct queue_element_t *prev;
+ struct queue_element_t *next;
} queue_element_t;
typedef struct packet_queue_t {
- queue_element_t *head;
- queue_element_t *tail;
+ queue_element_t *head;
+ queue_element_t *tail;
} packet_queue_t;
-typedef struct enc_key_t {
- int length;
- char *key;
- time_t expiry;
-} enc_key_t;
-
-typedef struct conn_list_t {
- char *name; /* name of this connection */
- ip_t vpn_ip; /* his vpn ip */
- ip_t vpn_mask; /* his vpn network address */
- ip_t real_ip; /* his real (internet) ip */
- char *hostname; /* the hostname of its real ip */
- short unsigned int port; /* his portnumber */
- int flags; /* his flags */
- int socket; /* our udp vpn socket */
- int meta_socket; /* our tcp meta socket */
- int protocol_version; /* used protocol */
- status_bits_t status; /* status info */
- option_bits_t options; /* options turned on for this connection */
- passphrase_t *pp; /* encoded passphrase */
- packet_queue_t *sq; /* pending outgoing packets */
- packet_queue_t *rq; /* pending incoming packets (they have no
- valid key to be decrypted with) */
- enc_key_t *public_key; /* the other party's public key */
- enc_key_t *key; /* encrypt with this key */
- char *buffer; /* metadata input buffer */
- int buflen; /* bytes read into buffer */
- int reqlen; /* length of first request in buffer */
- int tcppacket; /* length of incoming TCP tunnelled packet */
- time_t last_ping_time; /* last time we saw some activity from the other end */
- int want_ping; /* 0 if there's no need to check for activity */
- int allow_request; /* defined if there's only one request possible */
- char *chal_answer; /* answer to the given challenge */
- enc_key_t *rsakey;
- struct conn_list_t *nexthop; /* nearest meta-hop in this direction */
- struct conn_list_t *next; /* after all, it's a list of connections */
-} conn_list_t;
-
-extern int tap_fd;
-
-extern int total_tap_in;
-extern int total_tap_out;
-extern int total_socket_in;
-extern int total_socket_out;
-
-extern conn_list_t *conn_list;
-extern conn_list_t *myself;
-
-extern char *request_name[256];
-
-extern int send_packet(ip_t, vpn_packet_t *);
-extern int setup_network_connections(void);
+typedef struct listen_socket_t {
+ int tcp;
+ int udp;
+ sockaddr_t sa;
+} listen_socket_t;
+
+#include "conf.h"
+
+typedef struct outgoing_t {
+ char *name;
+ int timeout;
+ struct config_t *cfg;
+ struct addrinfo *ai;
+ struct addrinfo *aip;
+} outgoing_t;
+
+extern int maxtimeout;
+extern int seconds_till_retry;
+extern int addressfamily;
+
+extern listen_socket_t listen_socket[MAXSOCKETS];
+extern int listen_sockets;
+extern int keyexpires;
+extern int keylifetime;
+extern bool do_prune;
+extern bool do_purge;
+extern char *myport;
+extern time_t now;
+extern EVP_CIPHER_CTX packet_ctx;
+
+/* Yes, very strange placement indeed, but otherwise the typedefs get all tangled up */
+#include "connection.h"
+#include "node.h"
+
+extern void retry_outgoing(outgoing_t *);
+extern void handle_incoming_vpn_data(int);
+extern void finish_connecting(struct connection_t *);
+extern void do_outgoing_connection(struct connection_t *);
+extern bool handle_new_meta_connection(int);
+extern int setup_listen_socket(const sockaddr_t *);
+extern int setup_vpn_in_socket(const sockaddr_t *);
+extern void send_packet(const struct node_t *, vpn_packet_t *);
+extern void receive_tcppacket(struct connection_t *, char *, int);
+extern void broadcast_packet(const struct node_t *, vpn_packet_t *);
+extern bool setup_network_connections(void);
+extern void setup_outgoing_connection(struct outgoing_t *);
+extern void try_outgoing_connections(void);
extern void close_network_connections(void);
extern void main_loop(void);
-extern int setup_vpn_connection(conn_list_t *);
-extern void terminate_connection(conn_list_t *);
-extern void flush_queues(conn_list_t*);
-extern int xrecv(conn_list_t *, void *);
-extern void add_queue(packet_queue_t **, void *, size_t);
+extern void terminate_connection(struct connection_t *, bool);
+extern void flush_queue(struct node_t *);
+extern bool read_rsa_public_key(struct connection_t *);
+
+#ifndef HAVE_MINGW
+#define closesocket(s) close(s)
+#endif
-#endif /* __TINC_NET_H__ */
+#endif /* __TINC_NET_H__ */