X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fnet.h;h=fdda07ed9f9a310af3d736f6bb18055b3a287526;hp=7dae41937eb5859cc6587f9a23dd0a63becd50ec;hb=d8e2f7104c3203edbf23d2349656c765a4310dee;hpb=ca6abd41ea0cdf2ca6491c3945fb3c62fd40ab98 diff --git a/src/net.h b/src/net.h index 7dae4193..fdda07ed 100644 --- a/src/net.h +++ b/src/net.h @@ -1,6 +1,6 @@ /* net.h -- header for net.c - Copyright (C) 1998,99 Ivo Timmermans + Copyright (C) 1998,1999,2000 Ivo Timmermans This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -28,9 +28,6 @@ #define MAXSIZE 1700 /* should be a bit more than the MTU for the tapdevice */ #define MTU 1600 -#define MAX_PASSPHRASE_SIZE 2000 /* 2kb is really waaaay too much. nobody's - gonna need a 16 kbit passphrase */ - #define MAC_ADDR_S "%02x:%02x:%02x:%02x:%02x:%02x" #define MAC_ADDR_V(x) ((unsigned char*)&(x))[0],((unsigned char*)&(x))[1], \ ((unsigned char*)&(x))[2],((unsigned char*)&(x))[3], \ @@ -48,6 +45,10 @@ #define MAXBUFSIZE 2048 /* Probably way too much, but it must fit every possible request. */ +/* flags */ +#define INDIRECTDATA 0x0001 /* Used to indicate that this host has to be reached indirect */ +#define EXPORTINDIRECTDATA 0x0002 /* Used to indicate uplink that it has to tell others to do INDIRECTDATA */ + typedef unsigned long ip_t; typedef short length_t; @@ -64,7 +65,7 @@ typedef struct real_packet_t { typedef struct passphrase_t { unsigned short len; - unsigned char phrase[MAX_PASSPHRASE_SIZE]; + unsigned char *phrase; } passphrase_t; typedef struct status_bits_t { @@ -105,18 +106,22 @@ typedef struct conn_list_t { ip_t real_ip; /* his real (internet) ip */ char *hostname; /* the hostname of its real ip */ short unsigned int port; /* his portnumber */ + int flags; /* his flags */ int socket; /* our udp vpn socket */ int meta_socket; /* our tcp meta socket */ int protocol_version; /* used protocol */ status_bits_t status; /* status info */ - unsigned char *pp; /* encoded passphrase */ + passphrase_t *pp; /* encoded passphrase */ packet_queue_t *sq; /* pending outgoing packets */ packet_queue_t *rq; /* pending incoming packets (they have no valid key to be decrypted with) */ enc_key_t *public_key; /* the other party's public key */ enc_key_t *key; /* encrypt with this key */ - char buffer[MAXBUFSIZE]; /* metadata input buffer */ + char buffer[MAXBUFSIZE+1]; /* metadata input buffer */ int buflen; /* bytes read into buffer */ + int reqlen; /* length of first request in buffer */ + time_t last_ping_time; /* last time we saw some activity from the other end */ + int want_ping; /* 0 if there's no need to check for activity */ struct conn_list_t *nexthop; /* nearest meta-hop in this direction */ struct conn_list_t *next; /* after all, it's a list of connections */ } conn_list_t; @@ -132,7 +137,6 @@ extern conn_list_t *conn_list; extern conn_list_t *myself; extern int send_packet(ip_t, vpn_packet_t *); -extern int send_broadcast(conn_list_t *, vpn_packet_t *); extern int setup_network_connections(void); extern void close_network_connections(void); extern void main_loop(void);