1 |
pcg |
1.1 |
/* |
2 |
|
|
util.h -- process management and other utility functions |
3 |
|
|
Copyright (C) 1998-2002 Ivo Timmermans <ivo@o2w.nl> |
4 |
|
|
2000-2002 Guus Sliepen <guus@sliepen.eu.org> |
5 |
pcg |
1.13 |
2003 Marc Lehmann <gvpe@schmorp.de> |
6 |
pcg |
1.1 |
|
7 |
pcg |
1.13 |
This file is part of GVPE. |
8 |
|
|
|
9 |
|
|
GVPE is free software; you can redistribute it and/or modify |
10 |
pcg |
1.1 |
it under the terms of the GNU General Public License as published by |
11 |
|
|
the Free Software Foundation; either version 2 of the License, or |
12 |
|
|
(at your option) any later version. |
13 |
|
|
|
14 |
|
|
This program is distributed in the hope that it will be useful, |
15 |
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of |
16 |
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
17 |
|
|
GNU General Public License for more details. |
18 |
|
|
|
19 |
|
|
You should have received a copy of the GNU General Public License |
20 |
pcg |
1.13 |
along with gvpe; if not, write to the Free Software |
21 |
pcg |
1.18 |
Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
22 |
pcg |
1.1 |
*/ |
23 |
|
|
|
24 |
|
|
#ifndef UTIL_H__ |
25 |
|
|
#define UTIL_H__ |
26 |
|
|
|
27 |
pcg |
1.11 |
#include <openssl/rsa.h> |
28 |
|
|
|
29 |
pcg |
1.15 |
#include "gettext.h" |
30 |
|
|
|
31 |
pcg |
1.10 |
#include "slog.h" |
32 |
pcg |
1.20 |
#include "ev_cpp.h" |
33 |
|
|
#include "callback.h" |
34 |
|
|
|
35 |
pcg |
1.21 |
typedef ev_tstamp tstamp; |
36 |
pcg |
1.1 |
|
37 |
|
|
/* |
38 |
pcg |
1.16 |
* check for an existing gvpe for this net, and write pid to pidfile |
39 |
pcg |
1.1 |
*/ |
40 |
|
|
extern int write_pidfile (void); |
41 |
|
|
|
42 |
|
|
/* |
43 |
pcg |
1.16 |
* kill older gvpe |
44 |
pcg |
1.1 |
*/ |
45 |
|
|
extern int kill_other (int signal); |
46 |
|
|
|
47 |
|
|
/* |
48 |
|
|
* Detach from current terminal, write pidfile, kill parent |
49 |
|
|
*/ |
50 |
|
|
extern int detach (int do_detach); |
51 |
|
|
|
52 |
|
|
/* |
53 |
|
|
* check wether the given path is an absolute pathname |
54 |
|
|
*/ |
55 |
|
|
#define ABSOLUTE_PATH(c) ((c)[0] == '/') |
56 |
pcg |
1.10 |
|
57 |
pcg |
1.11 |
/*****************************************************************************/ |
58 |
|
|
|
59 |
pcg |
1.10 |
typedef u8 mac[6]; |
60 |
pcg |
1.1 |
|
61 |
pcg |
1.8 |
extern void id2mac (unsigned int id, void *m); |
62 |
pcg |
1.1 |
|
63 |
pcg |
1.8 |
#define mac2id(p) ((p)[0] & 0x01 ? 0 : ((p)[4] << 8) | (p)[5]) |
64 |
pcg |
1.1 |
|
65 |
pcg |
1.2 |
struct sliding_window { |
66 |
|
|
u32 v[(WINDOWSIZE + 31) / 32]; |
67 |
|
|
u32 seq; |
68 |
|
|
|
69 |
|
|
void reset (u32 seqno) |
70 |
|
|
{ |
71 |
|
|
memset (v, -1, sizeof v); |
72 |
|
|
seq = seqno; |
73 |
|
|
} |
74 |
|
|
|
75 |
|
|
bool recv_ok (u32 seqno) |
76 |
|
|
{ |
77 |
|
|
if (seqno <= seq - WINDOWSIZE) |
78 |
|
|
slog (L_ERR, _("received duplicate or outdated packet (received %08lx, expected %08lx)\n" |
79 |
pcg |
1.19 |
"possible replay attack, or just massive packet reordering"), seqno, seq + 1); |
80 |
|
|
else if (seqno > seq + WINDOWSIZE * 4) |
81 |
pcg |
1.2 |
slog (L_ERR, _("received duplicate or out-of-sync packet (received %08lx, expected %08lx)\n" |
82 |
pcg |
1.19 |
"possible replay attack, or just massive packet loss"), seqno, seq + 1); |
83 |
pcg |
1.2 |
else |
84 |
|
|
{ |
85 |
|
|
while (seqno > seq) |
86 |
|
|
{ |
87 |
|
|
seq++; |
88 |
|
|
|
89 |
|
|
u32 s = seq % WINDOWSIZE; |
90 |
|
|
u32 *cell = v + (s >> 5); |
91 |
|
|
u32 mask = 1 << (s & 31); |
92 |
|
|
|
93 |
|
|
*cell &= ~mask; |
94 |
|
|
} |
95 |
|
|
|
96 |
|
|
u32 s = seqno % WINDOWSIZE; |
97 |
|
|
u32 *cell = v + (s >> 5); |
98 |
|
|
u32 mask = 1 << (s & 31); |
99 |
|
|
|
100 |
|
|
if (*cell & mask) |
101 |
pcg |
1.19 |
slog (L_ERR, _("received duplicate packet (received %08lx, expected %08lx)\n" |
102 |
|
|
"possible replay attack, or just packet duplication"), seqno, seq + 1); |
103 |
pcg |
1.2 |
else |
104 |
|
|
{ |
105 |
|
|
*cell |= mask; |
106 |
|
|
return true; |
107 |
|
|
} |
108 |
|
|
} |
109 |
pcg |
1.19 |
|
110 |
|
|
return false; |
111 |
pcg |
1.2 |
} |
112 |
|
|
}; |
113 |
|
|
|
114 |
pcg |
1.6 |
typedef callback0<const char *> run_script_cb; |
115 |
pcg |
1.5 |
|
116 |
|
|
// run a shell script (or actually an external program). |
117 |
pcg |
1.17 |
bool run_script (const run_script_cb &cb, bool wait); |
118 |
pcg |
1.5 |
|
119 |
pcg |
1.7 |
#if ENABLE_HTTP_PROXY |
120 |
|
|
u8 *base64_encode (const u8 *data, unsigned int len); |
121 |
|
|
#endif |
122 |
pcg |
1.11 |
|
123 |
|
|
/*****************************************************************************/ |
124 |
|
|
|
125 |
|
|
typedef u8 rsaclear[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data; |
126 |
|
|
typedef u8 rsacrypt[RSA_KEYLEN]; // encrypted challenge |
127 |
|
|
|
128 |
|
|
static inline void |
129 |
|
|
rsa_encrypt (RSA *key, const rsaclear &chg, rsacrypt &encr) |
130 |
|
|
{ |
131 |
|
|
if (RSA_public_encrypt (sizeof chg, |
132 |
|
|
(unsigned char *)&chg, (unsigned char *)&encr, |
133 |
|
|
key, RSA_PKCS1_OAEP_PADDING) < 0) |
134 |
|
|
fatal ("RSA_public_encrypt error"); |
135 |
|
|
} |
136 |
|
|
|
137 |
|
|
static inline bool |
138 |
|
|
rsa_decrypt (RSA *key, const rsacrypt &encr, rsaclear &chg) |
139 |
|
|
{ |
140 |
|
|
return RSA_private_decrypt (sizeof encr, |
141 |
|
|
(unsigned char *)&encr, (unsigned char *)&chg, |
142 |
|
|
key, RSA_PKCS1_OAEP_PADDING) > 0; |
143 |
|
|
} |
144 |
pcg |
1.7 |
|
145 |
pcg |
1.1 |
#endif |
146 |
|
|
|