forked from gjedeer/tuntox
-
Notifications
You must be signed in to change notification settings - Fork 0
/
main.h
156 lines (130 loc) · 4.39 KB
/
main.h
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
#ifndef _MAIN_H
#define _MAIN_H
#include <arpa/inet.h>
#include <ctype.h>
#include <errno.h>
#include <fcntl.h>
#include <limits.h>
#include <netdb.h>
#include <netinet/in.h>
#include <pwd.h>
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/time.h>
#include <sys/types.h>
#include <syslog.h>
#include <time.h>
#include <tox/tox.h>
#include <unistd.h>
#include "util.h"
#include "uthash.h"
#include "utlist.h"
#define PROTOCOL_MAGIC_V1 0xa26a
#define PROTOCOL_MAGIC_V2 0xa26b
#define PROTOCOL_MAGIC PROTOCOL_MAGIC_V2
#define PROTOCOL_MAGIC_HIGH (PROTOCOL_MAGIC >> 8)
#define PROTOCOL_MAGIC_LOW (PROTOCOL_MAGIC & 0xff)
#define PACKET_TYPE_PONG 0x0100
#define PACKET_TYPE_PING 0x0108
#define PACKET_TYPE_REQUESTTUNNEL 0x0602 /* TODO - currently unused */
#define PACKET_TYPE_DENYTUNNEL 0x0604
#define PACKET_TYPE_ACKTUNNEL 0x0610
#define PACKET_TYPE_TCP 0x0600
#define PACKET_TYPE_TCP_FIN 0x0601
#define INT16_AT(array,pos) ( (*((array)+(pos)))*256 + (*((array)+(pos)+1)) )
#define INT32_AT(array,pos) ( (*((array)+(pos)))*256*256*256 + (*((array)+(pos)+1))*256*256 +(*((array)+(pos)+2))*256 + (*((array)+(pos)+3)) )
#define BYTE1(number) ((number)&0xff)
#define BYTE2(number) (((number) / 256) & 0xff)
#define BYTE3(number) (((number) / (256*256)) & 0xff)
#define BYTE4(number) (((number) / (256*256*256)) & 0xff)
/* Offset of the data buffer in the packet */
#define PROTOCOL_BUFFER_OFFSET 8
#define READ_BUFFER_SIZE TOX_MAX_CUSTOM_PACKET_SIZE - PROTOCOL_BUFFER_OFFSET
#define PROTOCOL_MAX_PACKET_SIZE (READ_BUFFER_SIZE + PROTOCOL_BUFFER_OFFSET)
typedef struct tunnel_t {
/* The forwarded socket fd */
int sockfd;
/* Connection ID, must be int because of uthash */
int connid;
/* Friend number of remote end */
uint32_t friendnumber;
UT_hash_handle hh;
} tunnel;
typedef struct tunnel_list_t {
tunnel *tun;
struct tunnel_list_t *next;
} tunnel_list;
typedef struct allowed_toxid {
uint8_t toxid[TOX_ADDRESS_SIZE];
struct allowed_toxid *next;
} allowed_toxid;
typedef struct protocol_frame_t {
uint32_t friendnumber;
/* Fields actually found in the protocol */
uint16_t magic;
uint16_t packet_type;
uint16_t connid;
uint16_t data_length;
uint8_t *data;
} protocol_frame;
/* A list of local port forwards (listen locally, forward to server) */
typedef struct local_port_forward_t {
int local_port;
char *remote_host;
int remote_port;
/* Sock representing the local port - call accept() on it */
int bind_sockfd;
/* If tunnel open is pending, accepted sockfd is temporarly stored here */
/* -1 = we can accept another connection */
int accept_sockfd;
/* When the forward has been created - used in ack timeouts */
time_t created;
/* ID - used to identify the ack frame */
uint32_t forward_id;
struct local_port_forward_t *next;
} local_port_forward;
/* Rules policy */
enum rules_policy_enum { VALIDATE, NONE };
typedef struct rule {
uint16_t port;
char * host;
struct rule *next;
} rule;
/**** GLOBAL VARIABLES ****/
extern Tox *tox;
/* Whether we're a client */
extern int client_mode;
/* Just send a ping and exit */
extern int ping_mode;
/* TOX_CONNECTION global variable */
extern TOX_CONNECTION connection_status;
/* Open a local port and forward it */
extern int client_local_port_mode;
/* Forward stdin/stdout to remote machine - SSH ProxyCommand mode */
extern int client_pipe_mode;
/* Remote Tox ID in client mode */
extern uint8_t *remote_tox_id;
/* Ports and hostname for port forwarding */
extern int remote_port;
extern char *remote_host;
extern int local_port;
/* Shared secret used for authentication */
extern int use_shared_secret;
extern char shared_secret[TOX_MAX_FRIEND_REQUEST_LENGTH];
extern int select_nfds;
extern tunnel *by_id;
extern local_port_forward *local_port_forwards;
local_port_forward *find_pending_forward_by_id(uint32_t local_forward_id);
void parse_lossless_packet(Tox *tox, uint32_t friendnumber, const uint8_t *data, size_t len, void *tmp);
tunnel *tunnel_create(int sockfd, int connid, uint32_t friendnumber);
void tunnel_delete(tunnel *t);
void update_select_nfds(int fd);
int send_frame(protocol_frame *frame, uint8_t *data);
int send_tunnel_request_packet(char *remote_host, int remote_port, uint32_t local_forward_id, int friend_number);
void print_version(void);
void print_version_stdout(void);
#endif