/*
net.h -- header for net.c
- Copyright (C) 1998-2001 Ivo Timmermans <zarq@iname.com>
- 2000,2001 Guus Sliepen <guus@sliepen.warande.net>
+ Copyright (C) 1998-2005 Ivo Timmermans
+ 2000-2009 Guus Sliepen <guus@tinc-vpn.org>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
- You should have received a copy of the GNU General Public License
- along with this program; if not, write to the Free Software
- Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-
- $Id: net.h,v 1.9.4.34 2001/07/21 15:34:18 guus Exp $
+ You should have received a copy of the GNU General Public License along
+ with this program; if not, write to the Free Software Foundation, Inc.,
+ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#ifndef __TINC_NET_H__
#define __TINC_NET_H__
-#include <sys/time.h>
-
-#include "config.h"
-
-#define MAXSIZE 1700 /* should be a bit more than the MTU for the tapdevice */
-#define MTU 1600
-#define SALTLEN 2 /* to spice things up for the NSA... */
+#include "ipv6.h"
+#include "cipher.h"
+#include "digest.h"
-#define MAC_ADDR_S "%02x:%02x:%02x:%02x:%02x:%02x"
-#define MAC_ADDR_V(x) ((unsigned char*)&(x))[0],((unsigned char*)&(x))[1], \
- ((unsigned char*)&(x))[2],((unsigned char*)&(x))[3], \
- ((unsigned char*)&(x))[4],((unsigned char*)&(x))[5]
-
-#define IP_ADDR_S "%d.%d.%d.%d"
-
-#ifdef WORDS_BIGENDIAN
-# define IP_ADDR_V(x) ((unsigned char*)&(x))[0],((unsigned char*)&(x))[1], \
- ((unsigned char*)&(x))[2],((unsigned char*)&(x))[3]
+#ifdef ENABLE_JUMBOGRAMS
+#define MTU 9018 /* 9000 bytes payload + 14 bytes ethernet header + 4 bytes VLAN tag */
#else
-# define IP_ADDR_V(x) ((unsigned char*)&(x))[3],((unsigned char*)&(x))[2], \
- ((unsigned char*)&(x))[1],((unsigned char*)&(x))[0]
+#define MTU 1518 /* 1500 bytes payload + 14 bytes ethernet header + 4 bytes VLAN tag */
#endif
-#define MAXBUFSIZE 4096 /* Probably way too much, but it must fit every possible request. */
+#define MAXSIZE (MTU + 4 + CIPHER_MAX_BLOCK_SIZE + DIGEST_MAX_SIZE + MTU/64 + 20) /* MTU + seqno + padding + HMAC + compressor overhead */
+#define MAXBUFSIZE ((MAXSIZE > 2048 ? MAXSIZE : 2048) + 128) /* Enough room for a request with a MAXSIZEd packet or a 8192 bits RSA key */
-/* tap types */
-#define TAP_TYPE_ETHERTAP 0
-#define TAP_TYPE_TUNTAP 1
+#define MAXSOCKETS 8 /* Probably overkill... */
-typedef struct mac_t
-{
- unsigned char x[6];
+typedef struct mac_t {
+ uint8_t x[6];
} mac_t;
-typedef unsigned long ipv4_t;
+typedef struct ipv4_t {
+ uint8_t x[4];
+} ipv4_t;
-typedef struct ipv6_t
-{
- unsigned short x[8];
+typedef struct ipv6_t {
+ uint16_t x[8];
} ipv6_t;
-typedef unsigned short port_t;
-
typedef short length_t;
-typedef struct vpn_packet_t {
- length_t len; /* the actual number of bytes in the `data' field */
- unsigned char salt[SALTLEN]; /* two bytes of randomness */
- unsigned char data[MAXSIZE];
-} vpn_packet_t;
-
-typedef struct queue_element_t {
- void *packet;
- struct queue_element_t *prev;
- struct queue_element_t *next;
-} queue_element_t;
-
-typedef struct packet_queue_t {
- queue_element_t *head;
- queue_element_t *tail;
-} packet_queue_t;
-
-typedef struct enc_key_t {
- int length;
- char *key;
- time_t expiry;
-} enc_key_t;
+#define AF_UNKNOWN 255
+
+struct sockaddr_unknown {
+ uint16_t family;
+ uint16_t pad1;
+ uint32_t pad2;
+ char *address;
+ char *port;
+};
+
+typedef union sockaddr_t {
+ struct sockaddr sa;
+ struct sockaddr_in in;
+ struct sockaddr_in6 in6;
+ struct sockaddr_unknown unknown;
+#ifdef HAVE_STRUCT_SOCKADDR_STORAGE
+ struct sockaddr_storage storage;
+#endif
+} sockaddr_t;
-extern int tap_fd;
+#ifdef SA_LEN
+#define SALEN(s) SA_LEN(&s)
+#else
+#define SALEN(s) (s.sa_family==AF_INET?sizeof(struct sockaddr_in):sizeof(struct sockaddr_in6))
+#endif
-extern int total_tap_in;
-extern int total_tap_out;
-extern int total_socket_in;
-extern int total_socket_out;
+typedef struct vpn_packet_t {
+ length_t len; /* the actual number of bytes in the `data' field */
+ int priority; /* priority or TOS */
+ uint32_t seqno; /* 32 bits sequence number (network byte order of course) */
+ uint8_t data[MAXSIZE];
+} vpn_packet_t;
+typedef struct listen_socket_t {
+ struct event ev_tcp;
+ struct event ev_udp;
+ int tcp;
+ int udp;
+ sockaddr_t sa;
+} listen_socket_t;
+
+#include "conf.h"
+#include "list.h"
+
+typedef struct outgoing_t {
+ char *name;
+ int timeout;
+ struct config_t *cfg;
+ struct addrinfo *ai;
+ struct addrinfo *aip;
+ struct event ev;
+} outgoing_t;
+
+extern list_t *outgoing_list;
+
+extern int maxoutbufsize;
extern int seconds_till_retry;
-
-extern char *request_name[256];
-extern char *status_text[10];
-
-#include "connection.h" /* Yes, very strange placement indeed, but otherwise the typedefs get all tangled up */
-
-extern int str2opt(const char *);
-extern char *opt2str(int);
-extern void send_packet(connection_t *, vpn_packet_t *);
-extern void receive_packet(connection_t *, vpn_packet_t *);
-extern void receive_tcppacket(connection_t *, char *, int);
-extern void accept_packet(vpn_packet_t *);
-extern void broadcast_packet(connection_t *, vpn_packet_t *);
-extern int setup_network_connections(void);
+extern int addressfamily;
+extern unsigned replaywin;
+
+extern listen_socket_t listen_socket[MAXSOCKETS];
+extern int listen_sockets;
+extern int keylifetime;
+extern int udp_rcvbuf;
+extern int udp_sndbuf;
+extern bool do_prune;
+extern char *myport;
+extern int contradicting_add_edge;
+extern int contradicting_del_edge;
+
+/* Yes, very strange placement indeed, but otherwise the typedefs get all tangled up */
+#include "connection.h"
+#include "node.h"
+
+extern void retry_outgoing(outgoing_t *);
+extern void handle_incoming_vpn_data(int, short, void *);
+extern void finish_connecting(struct connection_t *);
+extern bool do_outgoing_connection(struct connection_t *);
+extern void handle_new_meta_connection(int, short, void *);
+extern int setup_listen_socket(const sockaddr_t *);
+extern int setup_vpn_in_socket(const sockaddr_t *);
+extern void send_packet(struct node_t *, vpn_packet_t *);
+extern void receive_tcppacket(struct connection_t *, const char *, int);
+extern void broadcast_packet(const struct node_t *, vpn_packet_t *);
+extern bool setup_network(void);
+extern void setup_outgoing_connection(struct outgoing_t *);
+extern void try_outgoing_connections(void);
extern void close_network_connections(void);
-extern void main_loop(void);
-extern void terminate_connection(connection_t *, int);
-extern void flush_queue(connection_t *);
-
-#include <config.h>
-#ifdef HAVE_OPENSSL_RSA_H
-# include <openssl/rsa.h>
+extern int main_loop(void);
+extern void terminate_connection(struct connection_t *, bool);
+extern void flush_queue(struct node_t *);
+extern bool read_rsa_public_key(struct connection_t *);
+extern void send_mtu_probe(struct node_t *);
+extern void handle_device_data(int, short, void *);
+extern void handle_meta_connection_data(int, short, void *);
+extern void regenerate_key(void);
+extern void purge(void);
+extern void retry(void);
+extern int reload_configuration(void);
+extern void load_all_subnets(void);
+
+#ifndef HAVE_MINGW
+#define closesocket(s) close(s)
#else
-# include <rsa.h>
+extern CRITICAL_SECTION mutex;
#endif
-extern int read_rsa_public_key(connection_t *);
-
-#endif /* __TINC_NET_H__ */
+#endif /* __TINC_NET_H__ */