#ifndef NETINC_INCLUDED #define NETINC_INCLUDED #ifndef HAVE_PACKET #ifndef _XBOX // struct sockaddr // { // short sa_family; // }; #define ntohs BigShort #define htons BigShort #define htonl BigLong #define ntohl BigLong #endif /* struct sockaddr_in { short sin_family; unsigned short sin_port; in_addr sin_addr; };*/ #define AF_UNSPEC 0 // #define AF_INET 1 #define AF_WEBSOCK 342 struct sockaddr_websocket { short sws_family; char url[64]; }; #elif defined(_WIN32) #ifdef _XBOX #include #include #else #if defined(_MSC_VER) && defined(HAVE_LEGACY) #define HAVE_IPX #endif #define WIN32_LEAN_AND_MEAN #include #include #ifdef HAVE_IPX #include "wsipx.h" #endif #include #endif #include #if !defined(IPPROTO_IPV6) && !defined(_XBOX) /*for msvc6*/ #define IPPROTO_IPV6 41 #ifndef EAI_NONAME #define EAI_NONAME 8 #endif struct ip6_scope_id { union { struct { u_long Zone : 28; u_long Level : 4; }; u_long Value; }; }; #if !defined(in_addr6) struct in6_addr { u_char s6_addr[16]; /* IPv6 address */ }; #define sockaddr_in6 sockaddr_in6_fixed /*earlier versions of msvc have a sockaddr_in6 which does _not_ match windows, so this *must* be redefined for any non-final msvc releases or it won't work at all*/ typedef struct sockaddr_in6 { short sin6_family; u_short sin6_port; u_long sin6_flowinfo; struct in6_addr sin6_addr; union { u_long sin6_scope_id; struct ip6_scope_id sin6_scope_struct; }; }; struct addrinfo { int ai_flags; int ai_family; int ai_socktype; int ai_protocol; size_t ai_addrlen; char* ai_canonname; struct sockaddr * ai_addr; struct addrinfo * ai_next; }; #endif #endif #ifndef IPV6_V6ONLY #define IPV6_V6ONLY 27 #endif #define HAVE_IPV4 #ifdef IPPROTO_IPV6 #define HAVE_IPV6 #endif #ifndef SOCK_CLOEXEC #define SOCK_CLOEXEC 0 #endif #else #include #include #include #include #include #include #include #include #include #include #include #ifdef sun #include #endif #ifdef UNIXSOCKETS #include #endif #ifdef NeXT #include #endif #ifdef __linux__ //requires linux 2.6.27 up (and equivelent libc) //note that BSD does tend to support the api, but emulated. //this works around the select FD limit, and supposedly has better performance. #include #ifdef EPOLL_CLOEXEC #define HAVE_EPOLL //#else too old, probably android... #endif #endif #if defined(__MORPHOS__) && !defined(ixemul) #define closesocket CloseSocket #define ioctlsocket IoctlSocket #else #define closesocket close #define ioctlsocket ioctl #endif #if defined(AF_INET) #define HAVE_IPV4 #endif #if defined(AF_INET6) #define HAVE_IPV6 #endif // #if defined(AF_IPX) && defined(HAVE_LEGACY) // #include // #define HAVE_IPX // #endif #define SOCKET int #ifndef SOCK_CLOEXEC #define SOCK_CLOEXEC 0 #endif #endif #if defined(_WIN32) #define neterrno() WSAGetLastError() //this madness is because winsock defines its own errors instead of using system error codes. //*AND* microsoft then went and defined names for all the unix ones too... with different values! oh the insanity of it all! #define NET_EINTR WSAEINTR #define NET_EWOULDBLOCK WSAEWOULDBLOCK #define NET_EINPROGRESS WSAEINPROGRESS #define NET_EMSGSIZE WSAEMSGSIZE #define NET_ECONNRESET WSAECONNRESET #define NET_ECONNABORTED WSAECONNABORTED #define NET_ECONNREFUSED WSAECONNREFUSED #define NET_ETIMEDOUT WSAETIMEDOUT #define NET_ENOTCONN WSAENOTCONN #define NET_EACCES WSAEACCES #define NET_EADDRNOTAVAIL WSAEADDRNOTAVAIL #define NET_ENETUNREACH WSAENETUNREACH #define NET_EAFNOSUPPORT WSAEAFNOSUPPORT #elif defined(__MORPHOS__) && !defined(ixemul) #define neterrno() Errno() #else #define neterrno() errno #endif #ifndef NET_EWOULDBLOCK //assume unix codes instead, so our prefix still works. #define NET_EINTR EINTR #define NET_EWOULDBLOCK EWOULDBLOCK #define NET_EINPROGRESS EINPROGRESS #define NET_EMSGSIZE EMSGSIZE #define NET_ECONNRESET ECONNRESET #define NET_ECONNABORTED ECONNABORTED #define NET_ECONNREFUSED ECONNREFUSED #define NET_ETIMEDOUT ETIMEDOUT #define NET_ENOTCONN ENOTCONN #define NET_EACCES EACCES #define NET_EADDRNOTAVAIL EADDRNOTAVAIL #define NET_ENETUNREACH ENETUNREACH #define NET_EAFNOSUPPORT EAFNOSUPPORT #endif #ifndef INVALID_SOCKET #define INVALID_SOCKET -1 #endif #ifndef MSG_NOSIGNAL #define MSG_NOSIGNAL 0 //available on linux, no idea about other unixes. don't bug out too much... (d)tls needs this to not get constant SIGPIPE errors #endif #ifndef INADDR_LOOPBACK #define INADDR_LOOPBACK 0x7f000001 #endif #if defined(FTE_TARGET_WEB) #undef HAVE_IPV4 #undef HAVE_IPV6 #undef HAVE_IPX #endif #if 1//def SUPPORT_ICE struct icecandinfo_s { char candidateid[64]; char addr[64]; //v4/v6/fqdn. fqdn should prefer ipv6 int port; //native endian... int transport; //0=udp. other values not supported int foundation; //to figure out... int component; //1-based. allows rtp+rtcp in a single ICE... we only support one. int priority; //some random value... enum { ICE_HOST=0, ICE_SRFLX=1, //Server Reflexive (from stun, etc) ICE_PRFLX=2, //Peer Reflexive ICE_RELAY=3, } type; //says what sort of proxy is used. char reladdr[64]; //when proxied, this is our local info int relport; int generation; //for ice restarts. starts at 0. int network; //which network device this comes from. }; enum iceproto_e { ICEP_INVALID, //not allowed.. ICEP_QWSERVER, //we're server side ICEP_QWCLIENT, //we're client side ICEP_VOICE, //speex. requires client. ICEP_VIDEO //err... REALLY?!?!? }; enum icemode_e { ICEM_RAW, //not actually interactive beyond a simple handshake. ICEM_ICE, //rfc5245. meant to be able to holepunch, but not implemented properly yet. ICEM_WEBRTC, //IP+UDP+((ICE/STUN/SDP)+(DTLS+SCTP))... no more layers? :o }; enum icestate_e { ICE_INACTIVE, //idle. ICE_FAILED, ICE_GATHERING, ICE_CONNECTING, //exchanging pings. ICE_CONNECTED //media is flowing, supposedly. sending keepalives. }; struct icestate_s; #define ICE_API_CURRENT "Internet Connectivity Establishment 0.0" typedef struct { struct icestate_s *(QDECL *Create)(void *module, const char *conname, const char *peername, enum icemode_e mode, enum iceproto_e proto, qboolean initiator); //doesn't start pinging anything. qboolean (QDECL *Set)(struct icestate_s *con, const char *prop, const char *value); qboolean (QDECL *Get)(struct icestate_s *con, const char *prop, char *value, size_t valuesize); struct icecandinfo_s *(QDECL *GetLCandidateInfo)(struct icestate_s *con); //retrieves candidates that need reporting to the peer. void (QDECL *AddRCandidateInfo)(struct icestate_s *con, struct icecandinfo_s *cand); //stuff that came from the peer. void (QDECL *Close)(struct icestate_s *con, qboolean force); //bye then. void (QDECL *CloseModule)(void *module); //closes all unclosed connections, with warning. qboolean (QDECL *GetLCandidateSDP)(struct icestate_s *con, char *out, size_t valuesize); //retrieves candidates that need reporting to the peer. struct icestate_s *(QDECL *Find)(void *module, const char *conname); } icefuncs_t; extern icefuncs_t iceapi; extern cvar_t net_ice_broker; #endif #ifdef HAVE_EPOLL typedef struct epollctx_s { void (*Polled) (struct epollctx_s *ctx, unsigned int events); } epollctx_t; #endif //address flags #define ADDR_NATPMP (1u<<0) #define ADDR_UPNPIGP (1u<<1) #define ADDR_REFLEX (1u<<2) //as reported by some external server. #define FTENET_ADDRTYPES 2 typedef struct ftenet_generic_connection_s { char name[MAX_QPATH]; int (*GetLocalAddresses)(struct ftenet_generic_connection_s *con, unsigned int *adrflags, netadr_t *addresses, const char **adrparams, int maxaddresses); qboolean (*ChangeLocalAddress)(struct ftenet_generic_connection_s *con, const char *addressstring, netadr_t *newadr); qboolean (*GetPacket)(struct ftenet_generic_connection_s *con); neterr_t (*SendPacket)(struct ftenet_generic_connection_s *con, int length, const void *data, netadr_t *to); void (*Close)(struct ftenet_generic_connection_s *con); #if defined(HAVE_PACKET) && !defined(HAVE_EPOLL) int (*SetFDSets) (struct ftenet_generic_connection_s *con, fd_set *readfdset, fd_set *writefdset); /*set for connections which have multiple sockets (ie: listening tcp connections)*/ #endif void (*PrintStatus)(struct ftenet_generic_connection_s *con); netproto_t prot; //if there's some special weirdness netadrtype_t addrtype[FTENET_ADDRTYPES]; //which address families it accepts qboolean islisten; int connum; struct ftenet_connections_s *owner; #ifdef HAVE_EPOLL epollctx_t epoll; #endif #ifdef HAVE_PACKET SOCKET thesocket; #else int thesocket; #endif } ftenet_generic_connection_t; enum hashvalidation_e { VH_UNSUPPORTED, //library not loaded (bad but not malicious) VH_AUTHORITY_UNKNOWN, //don't know who signed it / untrusted (bad but probably not malicious) VH_INCORRECT, //signature is wrong for that authority (bad, probably maliciously so) VH_CORRECT //all is well. }; struct dtlsfuncs_s; typedef struct dtlscred_s { struct dtlslocalcred_s { void *cert; size_t certsize; void *key; size_t keysize; } local; struct dtlspeercred_s { const char *name; //cert must match this if specified hashfunc_t *hash; //if set peer's cert MUST match the specified digest (with this hash function) qbyte digest[DIGEST_MAXSIZE]; } peer; } dtlscred_t; typedef struct dtlsfuncs_s { void *(*CreateContext)(const dtlscred_t *credinfo, void *cbctx, neterr_t(*push)(void *cbctx, const qbyte *data, size_t datasize), qboolean isserver); //the certificate to advertise. qboolean (*CheckConnection)(void *cbctx, void *peeraddr, size_t peeraddrsize, void *indata, size_t insize, neterr_t(*push)(void *cbctx, const qbyte *data, size_t datasize), void (*EstablishTrueContext)(void **cbctx, void *state)); void (*DestroyContext)(void *ctx); neterr_t (*Transmit)(void *ctx, const qbyte *data, size_t datasize); neterr_t (*Received)(void *ctx, sizebuf_t *message); //operates in-place... neterr_t (*Timeouts)(void *ctx); int (*GetPeerCertificate)(void *ctx, enum certprops_e prop, char *out, size_t outsize); qboolean (*GenTempCertificate)(const char *subject, struct dtlslocalcred_s *cred); } dtlsfuncs_t; #ifdef HAVE_DTLS const dtlsfuncs_t *DTLS_InitServer(void); const dtlsfuncs_t *DTLS_InitClient(void); #endif typedef struct ftecrypto_s { const char *drivername; //tlsey things vfsfile_t *(*OpenStream)(const char *hostname, vfsfile_t *source, qboolean isserver); //establish a tls connection around a tcp stream int (*GetChannelBinding)(vfsfile_t *vf, qbyte *binddata, size_t *bindsize); //returns -1 if functions don't match those from OpenStream //dtls entry points const struct dtlsfuncs_s *(*DTLS_InitClient)(void); //should always return something, if implemented. const struct dtlsfuncs_s *(*DTLS_InitServer)(void); //returns NULL if there's no cert available. //digital signature stuff. note: uses sha2_512 enum hashvalidation_e (*VerifyHash)(const qbyte *hashdata, size_t hashsize, const qbyte *certdata, size_t certsize, const qbyte *signdata, size_t signsize); //expect the cert in PEM format. int (*GenerateSignature)(const qbyte *hashdata, size_t hashsize, qbyte *signdata, size_t signsizemax); } ftecrypto_t; #define cryptolib_count 6 extern ftecrypto_t crypto_sspi, crypto_gnutls; extern ftecrypto_t *cryptolib[cryptolib_count]; #define MAX_CONNECTIONS 8 typedef struct ftenet_connections_s { qboolean islisten; unsigned int packetsin; unsigned int packetsout; unsigned int bytesin; unsigned int bytesout; unsigned int timemark; float packetsinrate; float packetsoutrate; float bytesinrate; float bytesoutrate; ftenet_generic_connection_t *conn[MAX_CONNECTIONS]; void (*ReadGamePacket) (void); #ifdef HAVE_DTLS struct dtlspeer_s *dtls; //linked list. linked lists are shit, but at least it keeps pointers valid when things are resized. const dtlsfuncs_t *dtlsfuncs; #endif struct ftenet_delayed_packet_s { unsigned int sendtime; //in terms of Sys_Milliseconds() struct ftenet_delayed_packet_s *next; netadr_t dest; size_t cursize; qbyte data[1]; } *delayed_packets; netadr_t srflx[2]; //ipv4, ipv6 unsigned int srflx_tid[3]; //to verify the above. } ftenet_connections_t; void ICE_Tick(void); qboolean ICE_WasStun(ftenet_connections_t *col); void QDECL ICE_AddLCandidateConn(ftenet_connections_t *col, netadr_t *addr, int type); void QDECL ICE_AddLCandidateInfo(struct icestate_s *con, netadr_t *adr, int adrno, int type); ftenet_generic_connection_t *FTENET_ICE_EstablishConnection(ftenet_connections_t *col, const char *address, netadr_t adr); enum icemsgtype_s { //shared by rtcpeers+broker ICEMSG_PEERLOST=0, //other side dropped connection ICEMSG_GREETING=1, //master telling us our unique game name ICEMSG_NEWPEER=2, //relay established, send an offer now. ICEMSG_OFFER=3, //peer->peer - peer's offer or answer details ICEMSG_CANDIDATE=4, //peer->peer - candidate updates. may arrive late as new ones are discovered. ICEMSG_ACCEPT=5, //go go go (response from offer) ICEMSG_SERVERINFO=6,//server->broker (for advertising the server properly) ICEMSG_SERVERUPDATE=7,//broker->browser (for querying available server lists) ICEMSG_NAMEINUSE=8, //requested resource is unavailable. }; enum websocketpackettype_e { //websocket packet types, used by both our tcp/http/broker/etc server and our ice client. WS_PACKETTYPE_CONTINUATION=0, WS_PACKETTYPE_TEXTFRAME=1, WS_PACKETTYPE_BINARYFRAME=2, WS_PACKETTYPE_CLOSE=8, WS_PACKETTYPE_PING=9, WS_PACKETTYPE_PONG=10, }; ftenet_connections_t *FTENET_CreateCollection(qboolean listen, void (*ReadPacket) (void)); void FTENET_CloseCollection(ftenet_connections_t *col); qboolean FTENET_AddToCollection(struct ftenet_connections_s *col, const char *name, const char *address, netadrtype_t addrtype, netproto_t addrprot); int NET_EnumerateAddresses(ftenet_connections_t *collection, struct ftenet_generic_connection_s **con, unsigned int *adrflags, netadr_t *addresses, const char **adrparams, int maxaddresses); void *TLS_GetKnownCertificate(const char *certname, size_t *size); void *Auth_GetKnownCertificate(const char *certname, size_t *size); vfsfile_t *FS_OpenSSL(const char *hostname, vfsfile_t *source, qboolean server); int TLS_GetChannelBinding(vfsfile_t *stream, qbyte *data, size_t *datasize); //datasize should be preinitialised to the max length allowed. -1 for not implemented. 0 for peer problems. 1 for success #ifdef HAVE_PACKET vfsfile_t *FS_WrapTCPSocket(SOCKET socket, qboolean conpending, const char *peername); //conpending allows us to reject any writes until the connection has succeeded. considers the socket owned (so be sure to stop using the direct socket at least before the VFS_CLOSE call). #endif vfsfile_t *FS_OpenTCP(const char *name, int defaultport, qboolean assumetls); #endif //NETINC_INCLUDED