summaryrefslogtreecommitdiffstats
path: root/types.h
blob: 71cd36dfefbf9bd240b04bf0470ca15f68af906b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
#ifndef _TYPES_H_
#define _TYPES_H_

#include <stddef.h>
#include <stdint.h>
#include <time.h>
#include <openssl/ssl.h>

#define ADDRLEN 40
#define BINDLEN 250
#define PWLEN 40
#define BASELEN 250
#define SIDLEN 28
#define MOUNTLEN 100

#define REQLEN 4000
#define MAXMSGLEN 100000

#define BOOL uint8_t
#define TRUE 1
#define FALSE 0

typedef struct _server_t_ server_t;

typedef struct {
	void (*callback)(void *data, int haveIn, int haveOut, int doCleanup);
	int fd;
} epoll_item_t;

typedef struct {
	void (*callback)(void *data, int haveIn, int haveOut, int doCleanup);
	int fd;
	//
	SSL_CTX *sslContext; // Listening for SSL connections, NULL otherwise
} epoll_listen_t;

typedef struct {
	void (*callback)(void *data, int haveIn, int haveOut, int doCleanup);
	int fd;
	//
	BOOL bound; // Client did successful ldap bind
	BOOL sslAccepted; // SSL_accept done?
	BOOL kill; // Should the connection be killed?
	BOOL writeBlocked; // An SSL_write returned WANT_*, so we must not reallocate the current send buffer
	// Send buffer (me to client)
	size_t sbPos, sbFill, sbLen;
	SSL *ssl; // NULL if not encrypted
	char *sendBuffer; // Dynamically allocated, might or might not get huge
	// Recv buffer (client's request)
	size_t rbPos;
	char readBuffer[REQLEN]; // Static, queries > 4000 bytes simply not supported
} epoll_client_t;

typedef struct {
	void (*callback)(void *data, int haveIn, int haveOut, int doCleanup);
	int fd;
	// Send buffer (me to server)
	size_t sbPos, sbFill, sbLen;
	char *sendBuffer; // Dynamically allocated, might or might not get huge
	// Recv buffer (server's response)
	size_t rbPos;
	char readBuffer[MAXMSGLEN];
	BOOL bound;
	BOOL dynamic;
	//unsigned long messageId; // ID of message currently being received
	time_t lastActive;
	server_t *serverData;
} epoll_server_t;

struct _server_t_ {
	size_t baseLen;
	char ip[4];
	time_t lastLookup;
	char addr[ADDRLEN];
	char bind[BINDLEN];
	char password[PWLEN];
	char base[BASELEN];
	char sid[SIDLEN];
	char homeTemplate[MOUNTLEN];
	epoll_server_t con;
};

#endif