blob: 2d10704c11a7f0ce39f2d9cf8a7d7e4875b517b2 [file] [log] [blame]
Willy Tarreau56e9c5e2012-07-06 09:47:57 +02001/*
2 * include/types/connection.h
3 * This file describes the connection struct and associated constants.
4 *
Willy Tarreaubaf5b9b2014-01-23 15:26:18 +01005 * Copyright (C) 2000-2014 Willy Tarreau - w@1wt.eu
Willy Tarreau56e9c5e2012-07-06 09:47:57 +02006 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22#ifndef _TYPES_CONNECTION_H
23#define _TYPES_CONNECTION_H
24
25#include <stdlib.h>
26#include <sys/socket.h>
27
28#include <common/config.h>
29
Willy Tarreaud1d54542012-09-12 22:58:11 +020030#include <types/listener.h>
Willy Tarreau3fdb3662012-11-12 00:42:33 +010031#include <types/obj_type.h>
Willy Tarreauef9a3602012-12-08 22:29:20 +010032#include <types/port_range.h>
Willy Tarreaud1d54542012-09-12 22:58:11 +020033#include <types/protocol.h>
34
Bertrand Jacquin93b227d2016-06-04 15:11:10 +010035#include <netinet/ip.h>
36#include <netinet/ip6.h>
Bertrand Jacquin93b227d2016-06-04 15:11:10 +010037
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020038/* referenced below */
Willy Tarreauc5788912012-08-24 18:12:41 +020039struct connection;
40struct buffer;
41struct pipe;
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020042
Willy Tarreaubaf5b9b2014-01-23 15:26:18 +010043/* For each direction, we have a CO_FL_{SOCK,DATA}_<DIR>_ENA flag, which
44 * indicates if read or write is desired in that direction for the respective
45 * layers. The current status corresponding to the current layer being used is
46 * remembered in the CO_FL_CURR_<DIR>_ENA flag. The need to poll (ie receipt of
47 * EAGAIN) is remembered at the file descriptor level so that even when the
48 * activity is stopped and restarted, we still remember whether it was needed
49 * to poll before attempting the I/O.
Willy Tarreaue9dfa792012-09-01 17:26:16 +020050 *
Willy Tarreaubaf5b9b2014-01-23 15:26:18 +010051 * The CO_FL_CURR_<DIR>_ENA flag is set from the FD status in
52 * conn_refresh_polling_flags(). The FD state is updated according to these
53 * flags in conn_cond_update_polling().
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020054 */
55
Willy Tarreau900bc932012-07-06 09:52:14 +020056/* flags for use in connection->flags */
57enum {
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020058 CO_FL_NONE = 0x00000000, /* Just for initialization purposes */
Willy Tarreauc76ae332012-07-12 15:32:13 +020059
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020060 /* Do not change these values without updating conn_*_poll_changes() ! */
Willy Tarreauc8dd77f2012-11-05 17:52:26 +010061 CO_FL_SOCK_RD_ENA = 0x00000001, /* receiving handshakes is allowed */
62 CO_FL_DATA_RD_ENA = 0x00000002, /* receiving data is allowed */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020063 CO_FL_CURR_RD_ENA = 0x00000004, /* receiving is currently allowed */
Willy Tarreau310987a2014-01-22 19:46:33 +010064 /* unused : 0x00000008 */
Willy Tarreauc8dd77f2012-11-05 17:52:26 +010065
66 CO_FL_SOCK_WR_ENA = 0x00000010, /* sending handshakes is desired */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020067 CO_FL_DATA_WR_ENA = 0x00000020, /* sending data is desired */
Willy Tarreauc8dd77f2012-11-05 17:52:26 +010068 CO_FL_CURR_WR_ENA = 0x00000040, /* sending is currently desired */
Willy Tarreau310987a2014-01-22 19:46:33 +010069 /* unused : 0x00000080 */
Willy Tarreauc76ae332012-07-12 15:32:13 +020070
Willy Tarreauf79c8172013-10-21 16:30:56 +020071 /* These flags indicate whether the Control and Transport layers are initialized */
72 CO_FL_CTRL_READY = 0x00000100, /* FD was registered, fd_delete() needed */
73 CO_FL_XPRT_READY = 0x00000200, /* xprt_init() done, xprt_close() needed */
74
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020075 /* These flags are used by data layers to indicate they had to stop
76 * sending data because a buffer was empty (WAIT_DATA) or stop receiving
77 * data because a buffer was full (WAIT_ROOM). The connection handler
78 * clears them before first calling the I/O and data callbacks.
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020079 */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020080 CO_FL_WAIT_DATA = 0x00000400, /* data source is empty */
81 CO_FL_WAIT_ROOM = 0x00000800, /* data sink is full */
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020082
Willy Tarreau986a9d22012-08-30 21:11:38 +020083 /* These flags are used to report whether the from/to addresses are set or not */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020084 CO_FL_ADDR_FROM_SET = 0x00001000, /* addr.from is set */
85 CO_FL_ADDR_TO_SET = 0x00002000, /* addr.to is set */
86
87 /* flags indicating what event type the data layer is interested in */
88 CO_FL_INIT_DATA = 0x00004000, /* initialize the data layer before using it */
89 CO_FL_WAKE_DATA = 0x00008000, /* wake-up data layer upon activity at the transport layer */
Willy Tarreau2ba44652012-08-20 17:30:32 +020090
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020091 /* flags used to remember what shutdown have been performed/reported */
92 CO_FL_DATA_RD_SH = 0x00010000, /* DATA layer was notified about shutr/read0 */
93 CO_FL_DATA_WR_SH = 0x00020000, /* DATA layer asked for shutw */
94 CO_FL_SOCK_RD_SH = 0x00040000, /* SOCK layer was notified about shutr/read0 */
95 CO_FL_SOCK_WR_SH = 0x00080000, /* SOCK layer asked for shutw */
96
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020097 /* flags used to report connection status and errors */
98 CO_FL_ERROR = 0x00100000, /* a fatal error was reported */
99 CO_FL_CONNECTED = 0x00200000, /* the connection is now established */
100 CO_FL_WAIT_L4_CONN = 0x00400000, /* waiting for L4 to be connected */
101 CO_FL_WAIT_L6_CONN = 0x00800000, /* waiting for L6 to be connected (eg: SSL) */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200102
Willy Tarreau9e272bf2012-10-03 21:04:48 +0200103 /* synthesis of the flags above */
104 CO_FL_CONN_STATE = 0x00FF0000, /* all shut/connected flags */
105
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200106 /*** All the flags below are used for connection handshakes. Any new
107 * handshake should be added after this point, and CO_FL_HANDSHAKE
108 * should be updated.
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200109 */
Willy Tarreau57cd3e42013-10-24 22:01:26 +0200110 CO_FL_SEND_PROXY = 0x01000000, /* send a valid PROXY protocol header */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200111 CO_FL_SSL_WAIT_HS = 0x02000000, /* wait for an SSL handshake to complete */
Willy Tarreau5f1504f2012-10-04 23:55:57 +0200112 CO_FL_ACCEPT_PROXY = 0x04000000, /* receive a valid PROXY protocol header */
Bertrand Jacquin93b227d2016-06-04 15:11:10 +0100113 CO_FL_ACCEPT_CIP = 0x08000000, /* receive a valid NetScaler Client IP header */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200114
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200115 /* below we have all handshake flags grouped into one */
Bertrand Jacquin93b227d2016-06-04 15:11:10 +0100116 CO_FL_HANDSHAKE = CO_FL_SEND_PROXY | CO_FL_SSL_WAIT_HS | CO_FL_ACCEPT_PROXY | CO_FL_ACCEPT_CIP,
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200117
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200118 /* when any of these flags is set, polling is defined by socket-layer
119 * operations, as opposed to data-layer. Transport is explicitly not
120 * mentionned here to avoid any confusion, since it can be the same
121 * as DATA or SOCK on some implementations.
122 */
123 CO_FL_POLL_SOCK = CO_FL_HANDSHAKE | CO_FL_WAIT_L4_CONN | CO_FL_WAIT_L6_CONN,
Willy Tarreau1e954912012-10-12 17:50:05 +0200124
Willy Tarreau387ebf82015-08-04 19:24:13 +0200125 /* This connection may not be shared between clients */
126 CO_FL_PRIVATE = 0x10000000,
127
128 /* unused : 0x20000000, 0x40000000 */
Willy Tarreauf79c8172013-10-21 16:30:56 +0200129
Willy Tarreau1e954912012-10-12 17:50:05 +0200130 /* This last flag indicates that the transport layer is used (for instance
131 * by logs) and must not be cleared yet. The last call to conn_xprt_close()
132 * must be done after clearing this flag.
133 */
134 CO_FL_XPRT_TRACKED = 0x80000000,
Willy Tarreau900bc932012-07-06 09:52:14 +0200135};
136
Willy Tarreau14cba4b2012-11-30 17:33:05 +0100137
138/* possible connection error codes */
139enum {
140 CO_ER_NONE, /* no error */
Willy Tarreau45b34e82014-01-24 16:06:50 +0100141
142 CO_ER_CONF_FDLIM, /* reached process' configured FD limitation */
143 CO_ER_PROC_FDLIM, /* reached process' FD limitation */
144 CO_ER_SYS_FDLIM, /* reached system's FD limitation */
145 CO_ER_SYS_MEMLIM, /* reached system buffers limitation */
146 CO_ER_NOPROTO, /* protocol not supported */
147 CO_ER_SOCK_ERR, /* other socket error */
148
149 CO_ER_PORT_RANGE, /* source port range exhausted */
150 CO_ER_CANT_BIND, /* can't bind to source address */
151 CO_ER_FREE_PORTS, /* no more free ports on the system */
152 CO_ER_ADDR_INUSE, /* local address already in use */
153
Willy Tarreau8e3bf692012-12-03 15:41:18 +0100154 CO_ER_PRX_EMPTY, /* nothing received in PROXY protocol header */
155 CO_ER_PRX_ABORT, /* client abort during PROXY protocol header */
Willy Tarreau0af29122012-12-03 15:35:00 +0100156 CO_ER_PRX_TIMEOUT, /* timeout while waiting for a PROXY header */
Willy Tarreau8e3bf692012-12-03 15:41:18 +0100157 CO_ER_PRX_TRUNCATED, /* truncated PROXY protocol header */
158 CO_ER_PRX_NOT_HDR, /* not a PROXY protocol header */
159 CO_ER_PRX_BAD_HDR, /* bad PROXY protocol header */
160 CO_ER_PRX_BAD_PROTO, /* unsupported protocol in PROXY header */
161
Bertrand Jacquin93b227d2016-06-04 15:11:10 +0100162 CO_ER_CIP_EMPTY, /* nothing received in NetScaler Client IP header */
163 CO_ER_CIP_ABORT, /* client abort during NetScaler Client IP header */
164 CO_ER_CIP_TIMEOUT, /* timeout while waiting for a NetScaler Client IP header */
165 CO_ER_CIP_TRUNCATED, /* truncated NetScaler Client IP header */
166 CO_ER_CIP_BAD_MAGIC, /* bad magic number in NetScaler Client IP header */
167 CO_ER_CIP_BAD_PROTO, /* unsupported protocol in NetScaler Client IP header */
168
Willy Tarreau20879a02012-12-03 16:32:10 +0100169 CO_ER_SSL_EMPTY, /* client closed during SSL handshake */
170 CO_ER_SSL_ABORT, /* client abort during SSL handshake */
Willy Tarreau0af29122012-12-03 15:35:00 +0100171 CO_ER_SSL_TIMEOUT, /* timeout during SSL handshake */
Willy Tarreau20879a02012-12-03 16:32:10 +0100172 CO_ER_SSL_TOO_MANY, /* too many SSL connections */
173 CO_ER_SSL_NO_MEM, /* no more memory to allocate an SSL connection */
174 CO_ER_SSL_RENEG, /* forbidden client renegociation */
175 CO_ER_SSL_CA_FAIL, /* client cert verification failed in the CA chain */
176 CO_ER_SSL_CRT_FAIL, /* client cert verification failed on the certificate */
177 CO_ER_SSL_HANDSHAKE, /* SSL error during handshake */
Willy Tarreaub3966372014-04-25 18:54:29 +0200178 CO_ER_SSL_HANDSHAKE_HB, /* SSL error during handshake with heartbeat present */
Willy Tarreauf51c6982014-04-25 20:02:39 +0200179 CO_ER_SSL_KILLED_HB, /* Stopped a TLSv1 heartbeat attack (CVE-2014-0160) */
180 CO_ER_SSL_NO_TARGET, /* unknown target (not client nor server) */
Willy Tarreau14cba4b2012-11-30 17:33:05 +0100181};
182
Willy Tarreauef9a3602012-12-08 22:29:20 +0100183/* source address settings for outgoing connections */
184enum {
185 /* Tproxy exclusive values from 0 to 7 */
186 CO_SRC_TPROXY_ADDR = 0x0001, /* bind to this non-local address when connecting */
187 CO_SRC_TPROXY_CIP = 0x0002, /* bind to the client's IP address when connecting */
188 CO_SRC_TPROXY_CLI = 0x0003, /* bind to the client's IP+port when connecting */
189 CO_SRC_TPROXY_DYN = 0x0004, /* bind to a dynamically computed non-local address */
190 CO_SRC_TPROXY_MASK = 0x0007, /* bind to a non-local address when connecting */
191
192 CO_SRC_BIND = 0x0008, /* bind to a specific source address when connecting */
193};
194
Willy Tarreau1049b1f2014-02-02 01:51:17 +0100195/* flags that can be passed to xprt->snd_buf() */
196enum {
197 CO_SFL_MSG_MORE = 0x0001, /* More data to come afterwards */
Willy Tarreau7bed9452014-02-02 02:00:24 +0100198 CO_SFL_STREAMER = 0x0002, /* Producer is continuously streaming data */
Willy Tarreau1049b1f2014-02-02 01:51:17 +0100199};
Willy Tarreauef9a3602012-12-08 22:29:20 +0100200
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200201/* xprt_ops describes transport-layer operations for a connection. They
202 * generally run over a socket-based control layer, but not always. Some
203 * of them are used for data transfer with the upper layer (rcv_*, snd_*)
204 * and the other ones are used to setup and release the transport layer.
Willy Tarreauc5788912012-08-24 18:12:41 +0200205 */
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200206struct xprt_ops {
Willy Tarreauc5788912012-08-24 18:12:41 +0200207 int (*rcv_buf)(struct connection *conn, struct buffer *buf, int count); /* recv callback */
208 int (*snd_buf)(struct connection *conn, struct buffer *buf, int flags); /* send callback */
209 int (*rcv_pipe)(struct connection *conn, struct pipe *pipe, unsigned int count); /* recv-to-pipe callback */
210 int (*snd_pipe)(struct connection *conn, struct pipe *pipe); /* send-to-pipe callback */
211 void (*shutr)(struct connection *, int); /* shutr function */
212 void (*shutw)(struct connection *, int); /* shutw function */
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200213 void (*close)(struct connection *); /* close the transport layer */
214 int (*init)(struct connection *conn); /* initialize the transport layer */
Willy Tarreauc5788912012-08-24 18:12:41 +0200215};
216
Willy Tarreau74beec32012-10-03 00:41:04 +0200217/* data_cb describes the data layer's recv and send callbacks which are called
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200218 * when I/O activity was detected after the transport layer is ready. These
219 * callbacks are supposed to make use of the xprt_ops above to exchange data
Willy Tarreau4aa36832012-10-02 20:07:22 +0200220 * from/to buffers and pipes. The <wake> callback is used to report activity
221 * at the transport layer, which can be a connection opening/close, or any
Willy Tarreauf4e114f2012-10-03 01:12:30 +0200222 * data movement. The <init> callback may be called by the connection handler
223 * at the end of a transport handshake, when it is about to transfer data and
Willy Tarreau2396c1c2012-10-03 21:12:16 +0200224 * the data layer is not ready yet. Both <wake> and <init> may abort a connection
225 * by returning < 0.
Willy Tarreauc5788912012-08-24 18:12:41 +0200226 */
Willy Tarreau74beec32012-10-03 00:41:04 +0200227struct data_cb {
228 void (*recv)(struct connection *conn); /* data-layer recv callback */
229 void (*send)(struct connection *conn); /* data-layer send callback */
Willy Tarreau2396c1c2012-10-03 21:12:16 +0200230 int (*wake)(struct connection *conn); /* data-layer callback to report activity */
Willy Tarreauf4e114f2012-10-03 01:12:30 +0200231 int (*init)(struct connection *conn); /* data-layer initialization */
Willy Tarreauc5788912012-08-24 18:12:41 +0200232};
233
David Carlier3015a2e2016-07-04 22:51:33 +0100234struct my_tcphdr {
235 u_int16_t source;
236 u_int16_t dest;
237};
238
Willy Tarreauef9a3602012-12-08 22:29:20 +0100239/* a connection source profile defines all the parameters needed to properly
240 * bind an outgoing connection for a server or proxy.
241 */
242
243struct conn_src {
244 unsigned int opts; /* CO_SRC_* */
245 int iface_len; /* bind interface name length */
246 char *iface_name; /* bind interface name or NULL */
247 struct port_range *sport_range; /* optional per-server TCP source ports */
248 struct sockaddr_storage source_addr; /* the address to which we want to bind for connect() */
Willy Tarreau29fbe512015-08-20 19:35:14 +0200249#if defined(CONFIG_HAP_TRANSPARENT)
Willy Tarreauef9a3602012-12-08 22:29:20 +0100250 struct sockaddr_storage tproxy_addr; /* non-local address we want to bind to for connect() */
251 char *bind_hdr_name; /* bind to this header name if defined */
252 int bind_hdr_len; /* length of the name of the header above */
253 int bind_hdr_occ; /* occurrence number of header above: >0 = from first, <0 = from end, 0=disabled */
254#endif
255};
256
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200257/* This structure describes a connection with its methods and data.
258 * A connection may be performed to proxy or server via a local or remote
259 * socket, and can also be made to an internal applet. It can support
Willy Tarreau51c21842013-09-29 09:06:42 +0200260 * several transport schemes (raw, ssl, ...). It can support several
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200261 * connection control schemes, generally a protocol for socket-oriented
262 * connections, but other methods for applets.
263 */
264struct connection {
Willy Tarreau51c21842013-09-29 09:06:42 +0200265 enum obj_type obj_type; /* differentiates connection from applet context */
Willy Tarreauad5281c2013-12-06 21:09:57 +0100266 unsigned char err_code; /* CO_ER_* */
267 signed short send_proxy_ofs; /* <0 = offset to (re)send from the end, >0 = send all */
Willy Tarreaub8020ce2013-10-24 21:10:08 +0200268 unsigned int flags; /* CO_FL_* */
Willy Tarreauc5788912012-08-24 18:12:41 +0200269 const struct protocol *ctrl; /* operations at the socket layer */
Willy Tarreau378e0412012-10-13 14:33:58 +0200270 const struct xprt_ops *xprt; /* operations at the transport layer */
Willy Tarreauf79c8172013-10-21 16:30:56 +0200271 const struct data_cb *data; /* data layer callbacks. Must be set before xprt->init() */
Willy Tarreau378e0412012-10-13 14:33:58 +0200272 void *xprt_ctx; /* general purpose pointer, initialized to NULL */
Willy Tarreaucd379952012-09-27 22:14:33 +0200273 void *owner; /* pointer to upper layer's entity (eg: stream interface) */
Willy Tarreaub8020ce2013-10-24 21:10:08 +0200274 int xprt_st; /* transport layer state, initialized to zero */
Willy Tarreauad5281c2013-12-06 21:09:57 +0100275
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200276 union { /* definitions which depend on connection type */
277 struct { /*** information used by socket-based connections ***/
278 int fd; /* file descriptor for a stream driver when known */
279 } sock;
280 } t;
Willy Tarreau3fdb3662012-11-12 00:42:33 +0100281 enum obj_type *target; /* the target to connect to (server, proxy, applet, ...) */
Willy Tarreaud75d40e2015-08-04 17:25:58 +0200282 struct list list; /* attach point to various connection lists (idle, ...) */
KOVACS Krisztianb3e54fe2014-11-17 15:11:45 +0100283 const struct netns_entry *proxy_netns;
Willy Tarreau986a9d22012-08-30 21:11:38 +0200284 struct {
285 struct sockaddr_storage from; /* client address, or address to spoof when connecting to the server */
Willy Tarreaucd379952012-09-27 22:14:33 +0200286 struct sockaddr_storage to; /* address reached by the client, or address to connect to */
Willy Tarreau986a9d22012-08-30 21:11:38 +0200287 } addr; /* addresses of the remote side, client for producer and server for consumer */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200288};
289
David Safb76832014-05-08 23:42:08 -0400290/* proxy protocol v2 definitions */
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200291#define PP2_SIGNATURE "\x0D\x0A\x0D\x0A\x00\x0D\x0A\x51\x55\x49\x54\x0A"
292#define PP2_SIGNATURE_LEN 12
293#define PP2_HEADER_LEN 16
David Safb76832014-05-08 23:42:08 -0400294
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200295/* ver_cmd byte */
296#define PP2_CMD_LOCAL 0x00
297#define PP2_CMD_PROXY 0x01
298#define PP2_CMD_MASK 0x0F
David Safb76832014-05-08 23:42:08 -0400299
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200300#define PP2_VERSION 0x20
301#define PP2_VERSION_MASK 0xF0
302
303/* fam byte */
304#define PP2_TRANS_UNSPEC 0x00
305#define PP2_TRANS_STREAM 0x01
306#define PP2_TRANS_DGRAM 0x02
307#define PP2_TRANS_MASK 0x0F
308
309#define PP2_FAM_UNSPEC 0x00
310#define PP2_FAM_INET 0x10
311#define PP2_FAM_INET6 0x20
312#define PP2_FAM_UNIX 0x30
313#define PP2_FAM_MASK 0xF0
314
315#define PP2_ADDR_LEN_UNSPEC (0)
316#define PP2_ADDR_LEN_INET (4 + 4 + 2 + 2)
317#define PP2_ADDR_LEN_INET6 (16 + 16 + 2 + 2)
318#define PP2_ADDR_LEN_UNIX (108 + 108)
319
320#define PP2_HDR_LEN_UNSPEC (PP2_HEADER_LEN + PP2_ADDR_LEN_UNSPEC)
321#define PP2_HDR_LEN_INET (PP2_HEADER_LEN + PP2_ADDR_LEN_INET)
322#define PP2_HDR_LEN_INET6 (PP2_HEADER_LEN + PP2_ADDR_LEN_INET6)
323#define PP2_HDR_LEN_UNIX (PP2_HEADER_LEN + PP2_ADDR_LEN_UNIX)
David Safb76832014-05-08 23:42:08 -0400324
325struct proxy_hdr_v2 {
326 uint8_t sig[12]; /* hex 0D 0A 0D 0A 00 0D 0A 51 55 49 54 0A */
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200327 uint8_t ver_cmd; /* protocol version and command */
David Safb76832014-05-08 23:42:08 -0400328 uint8_t fam; /* protocol family and transport */
329 uint16_t len; /* number of following bytes part of the header */
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200330 union {
331 struct { /* for TCP/UDP over IPv4, len = 12 */
332 uint32_t src_addr;
333 uint32_t dst_addr;
334 uint16_t src_port;
335 uint16_t dst_port;
336 } ip4;
337 struct { /* for TCP/UDP over IPv6, len = 36 */
338 uint8_t src_addr[16];
339 uint8_t dst_addr[16];
340 uint16_t src_port;
341 uint16_t dst_port;
342 } ip6;
343 struct { /* for AF_UNIX sockets, len = 216 */
344 uint8_t src_addr[108];
345 uint8_t dst_addr[108];
346 } unx;
347 } addr;
David Safb76832014-05-08 23:42:08 -0400348};
349
350#define PP2_TYPE_SSL 0x20
351#define PP2_TYPE_SSL_VERSION 0x21
352#define PP2_TYPE_SSL_CN 0x22
KOVACS Krisztianb3e54fe2014-11-17 15:11:45 +0100353#define PP2_TYPE_NETNS 0x30
David Safb76832014-05-08 23:42:08 -0400354
KOVACS Krisztianb3e54fe2014-11-17 15:11:45 +0100355#define TLV_HEADER_SIZE 3
David Safb76832014-05-08 23:42:08 -0400356struct tlv {
357 uint8_t type;
358 uint8_t length_hi;
359 uint8_t length_lo;
360 uint8_t value[0];
361}__attribute__((packed));
362
363struct tlv_ssl {
364 struct tlv tlv;
365 uint8_t client;
366 uint32_t verify;
367 uint8_t sub_tlv[0];
368}__attribute__((packed));
369
Dave McCowan328fb582014-07-30 10:39:13 -0400370#define PP2_CLIENT_SSL 0x01
371#define PP2_CLIENT_CERT_CONN 0x02
372#define PP2_CLIENT_CERT_SESS 0x04
David Safb76832014-05-08 23:42:08 -0400373
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200374#endif /* _TYPES_CONNECTION_H */
375
376/*
377 * Local variables:
378 * c-indent-level: 8
379 * c-basic-offset: 8
380 * End:
381 */