+#ifndef TINC_NET_H
+#define TINC_NET_H
+
/*
net.h -- header for net.c
- Copyright (C) 1998-2002 Ivo Timmermans <zarq@iname.com>
- 2000-2002 Guus Sliepen <guus@sliepen.eu.org>
+ Copyright (C) 1998-2005 Ivo Timmermans
+ 2000-2016 Guus Sliepen <guus@tinc-vpn.org>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
- You should have received a copy of the GNU General Public License
- along with this program; if not, write to the Free Software
- Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-
- $Id: net.h,v 1.9.4.55 2002/09/15 12:26:24 guus Exp $
+ You should have received a copy of the GNU General Public License along
+ with this program; if not, write to the Free Software Foundation, Inc.,
+ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
-#ifndef __TINC_NET_H__
-#define __TINC_NET_H__
-
-#include "config.h"
+#include "system.h"
-#include <sys/types.h>
-#include <sys/socket.h>
-#include <netinet/in.h>
-#include <sys/time.h>
-
-#ifdef HAVE_INTTYPES_H
-#include <inttypes.h>
-#endif
+#include "ipv6.h"
+#include "cipher.h"
+#include "digest.h"
+#include "event.h"
#ifdef ENABLE_JUMBOGRAMS
-#define MTU 9014 /* 9000 bytes payload + 14 bytes ethernet header */
-#define MAXSIZE 9100 /* MTU + header (seqno) and trailer (CBC padding and HMAC) */
-#define MAXBUFSIZE 9100 /* Must support TCP packets of length 9000. */
+#define MTU 9018 /* 9000 bytes payload + 14 bytes ethernet header + 4 bytes VLAN tag */
#else
-#define MTU 1514 /* 1500 bytes payload + 14 bytes ethernet header */
-#define MAXSIZE 1600 /* MTU + header (seqno) and trailer (CBC padding and HMAC) */
-#define MAXBUFSIZE 2100 /* Quite large but needed for support of keys up to 8192 bits. */
+#define MTU 1518 /* 1500 bytes payload + 14 bytes ethernet header + 4 bytes VLAN tag */
#endif
-#define MAXSOCKETS 128 /* Overkill... */
+/* MAXSIZE is the maximum size of an encapsulated packet: MTU + seqno + srcid + dstid + padding + HMAC + compressor overhead */
+#define MAXSIZE (MTU + 4 + sizeof(node_id_t) + sizeof(node_id_t) + CIPHER_MAX_BLOCK_SIZE + DIGEST_MAX_SIZE + MTU/64 + 20)
+
+/* MAXBUFSIZE is the maximum size of a request: enough for a MAXSIZEd packet or a 8192 bits RSA key */
+#define MAXBUFSIZE ((MAXSIZE > 2048 ? MAXSIZE : 2048) + 128)
-#define MAXQUEUELENGTH 8 /* Maximum number of packats in a single queue */
+#define MAXSOCKETS 8 /* Probably overkill... */
typedef struct mac_t {
uint8_t x[6];
uint8_t x[4];
} ipv4_t;
-typedef struct ip_mask_t {
- ipv4_t address;
- ipv4_t mask;
-} ip_mask_t;
-
typedef struct ipv6_t {
uint16_t x[8];
} ipv6_t;
-typedef short length_t;
+typedef struct node_id_t {
+ uint8_t x[6];
+} node_id_t;
+
+typedef uint16_t length_t;
+typedef uint32_t seqno_t;
+
+#define AF_UNKNOWN 255
+
+struct sockaddr_unknown {
+ uint16_t family;
+ uint16_t pad1;
+ uint32_t pad2;
+ char *address;
+ char *port;
+};
-typedef union {
+typedef union sockaddr_t {
struct sockaddr sa;
struct sockaddr_in in;
struct sockaddr_in6 in6;
+ struct sockaddr_unknown unknown;
} sockaddr_t;
#ifdef SA_LEN
#define SALEN(s) (s.sa_family==AF_INET?sizeof(struct sockaddr_in):sizeof(struct sockaddr_in6))
#endif
+#define SEQNO(x) ((x)->data + (x)->offset - 4)
+#define SRCID(x) ((node_id_t *)((x)->data + (x)->offset - 6))
+#define DSTID(x) ((node_id_t *)((x)->data + (x)->offset - 12))
+#define DATA(x) ((x)->data + (x)->offset)
+#define DEFAULT_PACKET_OFFSET 12
+
typedef struct vpn_packet_t {
- length_t len; /* the actual number of bytes in the `data' field */
- int priority; /* priority or TOS */
- uint32_t seqno; /* 32 bits sequence number (network byte order of course) */
+ length_t len; /* The actual number of valid bytes in the `data' field (including seqno or dstid/srcid) */
+ length_t offset; /* Offset in the buffer where the packet data starts (righter after seqno or dstid/srcid) */
+ int priority; /* priority or TOS */
uint8_t data[MAXSIZE];
} vpn_packet_t;
-typedef struct queue_element_t {
- void *packet;
- struct queue_element_t *prev;
- struct queue_element_t *next;
-} queue_element_t;
+/* Packet types when using SPTPS */
+
+#define PKT_COMPRESSED 1
+#define PKT_MAC 2
+#define PKT_PROBE 4
+
+typedef struct listen_socket_t {
+ io_t tcp;
+ io_t udp;
+ sockaddr_t sa;
+ bool bindto;
+ int priority;
+} listen_socket_t;
-typedef struct packet_queue_t {
- queue_element_t *head;
- queue_element_t *tail;
-} packet_queue_t;
+#include "conf.h"
+#include "list.h"
typedef struct outgoing_t {
- char *name;
+ struct node_t *node;
int timeout;
- struct config_t *cfg;
- struct addrinfo *ai;
- struct addrinfo *aip;
+ timeout_t ev;
} outgoing_t;
-typedef struct listen_socket_t {
- int tcp;
- int udp;
- sockaddr_t sa;
-} listen_socket_t;
+extern list_t outgoing_list;
-extern int maxtimeout;
+extern int maxoutbufsize;
extern int seconds_till_retry;
extern int addressfamily;
+extern unsigned replaywin;
+extern bool localdiscovery;
-extern char *request_name[];
-extern char *status_text[];
+extern bool udp_discovery;
+extern int udp_discovery_keepalive_interval;
+extern int udp_discovery_interval;
+extern int udp_discovery_timeout;
-#include "connection.h" /* Yes, very strange placement indeed, but otherwise the typedefs get all tangled up */
+extern int mtu_info_interval;
+extern int udp_info_interval;
extern listen_socket_t listen_socket[MAXSOCKETS];
extern int listen_sockets;
-extern int keyexpires;
+extern io_t unix_socket;
extern int keylifetime;
-extern int do_prune;
-extern int do_purge;
+extern int udp_rcvbuf;
+extern int udp_sndbuf;
+extern bool udp_rcvbuf_warnings;
+extern bool udp_sndbuf_warnings;
+extern int max_connection_burst;
+extern int fwmark;
+extern bool do_prune;
extern char *myport;
-extern time_t now;
-
-extern void retry_outgoing(outgoing_t *);
-extern void handle_incoming_vpn_data(int);
-extern void finish_connecting(connection_t *);
-extern void do_outgoing_connection(connection_t *);
-extern int handle_new_meta_connection(int);
-extern int setup_listen_socket(sockaddr_t *);
-extern int setup_vpn_in_socket(sockaddr_t *);
-extern void send_packet(struct node_t *, vpn_packet_t *);
-extern void receive_packet(struct node_t *, vpn_packet_t *);
-extern void receive_tcppacket(struct connection_t *, char *, int);
-extern void broadcast_packet(struct node_t *, vpn_packet_t *);
-extern int setup_network_connections(void);
-extern void setup_outgoing_connection(struct outgoing_t *);
+extern bool device_standby;
+extern bool autoconnect;
+extern bool disablebuggypeers;
+extern int contradicting_add_edge;
+extern int contradicting_del_edge;
+extern time_t last_config_check;
+
+extern char *proxyhost;
+extern char *proxyport;
+extern char *proxyuser;
+extern char *proxypass;
+typedef enum proxytype_t {
+ PROXY_NONE = 0,
+ PROXY_SOCKS4,
+ PROXY_SOCKS4A,
+ PROXY_SOCKS5,
+ PROXY_HTTP,
+ PROXY_EXEC,
+} proxytype_t;
+extern proxytype_t proxytype;
+
+extern char *scriptinterpreter;
+extern char *scriptextension;
+
+/* Yes, very strange placement indeed, but otherwise the typedefs get all tangled up */
+#include "connection.h"
+#include "node.h"
+
+extern void retry_outgoing(outgoing_t *outgoing);
+extern void handle_incoming_vpn_data(void *data, int flags);
+extern void finish_connecting(struct connection_t *c);
+extern bool do_outgoing_connection(struct outgoing_t *outgoing);
+extern void handle_new_meta_connection(void *data, int flags);
+extern void handle_new_unix_connection(void *data, int flags);
+extern int setup_listen_socket(const sockaddr_t *sa);
+extern int setup_vpn_in_socket(const sockaddr_t *sa);
+extern bool send_sptps_data(struct node_t *to, struct node_t *from, int type, const void *data, size_t len);
+extern bool receive_sptps_record(void *handle, uint8_t type, const void *data, uint16_t len);
+extern void send_packet(struct node_t *n, vpn_packet_t *packet);
+extern void receive_tcppacket(struct connection_t *c, const char *buffer, size_t length);
+extern bool receive_tcppacket_sptps(struct connection_t *c, const char *buffer, size_t length);
+extern void broadcast_packet(const struct node_t *n, vpn_packet_t *packet);
+extern char *get_name(void);
+extern void device_enable(void);
+extern void device_disable(void);
+extern bool setup_myself_reloadable(void);
+extern bool setup_network(void);
+extern void setup_outgoing_connection(struct outgoing_t *outgoing, bool verbose);
extern void try_outgoing_connections(void);
extern void close_network_connections(void);
-extern void main_loop(void);
-extern void terminate_connection(connection_t *, int);
-extern void flush_queue(struct node_t *);
-extern int read_rsa_public_key(struct connection_t *);
+extern int main_loop(void);
+extern void terminate_connection(struct connection_t *c, bool report);
+extern bool node_read_ecdsa_public_key(struct node_t *n);
+extern void handle_device_data(void *data, int flags);
+extern void handle_meta_connection_data(struct connection_t *c);
+extern void regenerate_key(void);
+extern void purge(void);
+extern void retry(void);
+extern int reload_configuration(void);
+extern void load_all_nodes(void);
+extern void try_tx(struct node_t *n, bool mtu);
+extern void tarpit(int fd);
+
+#ifndef HAVE_MINGW
+#define closesocket(s) close(s)
+#endif
-#endif /* __TINC_NET_H__ */
+#endif