ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/src/util.h
(Generate patch)

Comparing gvpe/src/util.h (file contents):
Revision 1.3 by pcg, Fri Mar 21 23:17:01 2003 UTC vs.
Revision 1.14 by pcg, Fri Mar 18 01:53:05 2005 UTC

1/* 1/*
2 util.h -- process management and other utility functions 2 util.h -- process management and other utility functions
3 Copyright (C) 1998-2002 Ivo Timmermans <ivo@o2w.nl> 3 Copyright (C) 1998-2002 Ivo Timmermans <ivo@o2w.nl>
4 2000-2002 Guus Sliepen <guus@sliepen.eu.org> 4 2000-2002 Guus Sliepen <guus@sliepen.eu.org>
5 2003 Marc Lehmannn <pcg@goof.com> 5 2003 Marc Lehmann <gvpe@schmorp.de>
6 6
7 This file is part of GVPE.
8
7 This program is free software; you can redistribute it and/or modify 9 GVPE is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by 10 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or 11 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version. 12 (at your option) any later version.
11 13
12 This program is distributed in the hope that it will be useful, 14 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of 15 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details. 17 GNU General Public License for more details.
16 18
17 You should have received a copy of the GNU General Public License 19 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software 20 along with gvpe; if not, write to the Free Software
19 Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 21 Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20*/ 22*/
21 23
22#ifndef UTIL_H__ 24#ifndef UTIL_H__
23#define UTIL_H__ 25#define UTIL_H__
24 26
25#include <sys/socket.h> 27#include <openssl/rsa.h>
26#include <netinet/in.h>
27 28
28#include <map> 29#include "slog.h"
29
30#include "iom.h" 30#include "iom.h"
31#include "device.h"
32
33#define SOCKADDR sockaddr_in // this is lame, I know
34 31
35/* 32/*
36 * check for an existing vped for this net, and write pid to pidfile 33 * check for an existing vped for this net, and write pid to pidfile
37 */ 34 */
38extern int write_pidfile (void); 35extern int write_pidfile (void);
46 * Detach from current terminal, write pidfile, kill parent 43 * Detach from current terminal, write pidfile, kill parent
47 */ 44 */
48extern int detach (int do_detach); 45extern int detach (int do_detach);
49 46
50/* 47/*
51 * Set all files and paths according to netname
52 */
53extern void make_names (void);
54
55/*
56 * check wether the given path is an absolute pathname 48 * check wether the given path is an absolute pathname
57 */ 49 */
58#define ABSOLUTE_PATH(c) ((c)[0] == '/') 50#define ABSOLUTE_PATH(c) ((c)[0] == '/')
59 51
60static inline void 52/*****************************************************************************/
61id2mac (unsigned int id, void *m)
62{
63 mac &p = *(mac *)m;
64 53
65 p[0] = 0xfe; 54typedef u8 mac[6];
66 p[1] = 0xfd;
67 p[2] = 0x80;
68 p[3] = 0x00;
69 p[4] = id >> 8;
70 p[5] = id;
71}
72 55
73#define mac2id(p) (p[0] & 0x01 ? 0 : (p[4] << 8) | p[5]) 56extern void id2mac (unsigned int id, void *m);
74 57
75struct sockinfo 58#define mac2id(p) ((p)[0] & 0x01 ? 0 : ((p)[4] << 8) | (p)[5])
76 {
77 u32 host;
78 u16 port;
79
80 void set (const SOCKADDR *sa)
81 {
82 host = sa->sin_addr.s_addr;
83 port = sa->sin_port;
84 }
85
86 sockinfo()
87 {
88 host = port = 0;
89 }
90
91 sockinfo(const SOCKADDR &sa)
92 {
93 set (&sa);
94 }
95
96 sockinfo(const SOCKADDR *sa)
97 {
98 set (sa);
99 }
100
101 SOCKADDR *sa()
102 {
103 static SOCKADDR sa;
104
105 sa.sin_family = AF_INET;
106 sa.sin_port = port;
107 sa.sin_addr.s_addr = host;
108
109 return &sa;
110 }
111
112 operator const char *();
113 };
114
115inline bool
116operator == (const sockinfo &a, const sockinfo &b)
117{
118 return a.host == b.host && a.port == b.port;
119}
120
121inline bool
122operator < (const sockinfo &a, const sockinfo &b)
123{
124 return a.host < b.host
125 || (a.host == b.host && a.port < b.port);
126}
127 59
128struct sliding_window { 60struct sliding_window {
129 u32 v[(WINDOWSIZE + 31) / 32]; 61 u32 v[(WINDOWSIZE + 31) / 32];
130 u32 seq; 62 u32 seq;
131 63
158 90
159 u32 s = seqno % WINDOWSIZE; 91 u32 s = seqno % WINDOWSIZE;
160 u32 *cell = v + (s >> 5); 92 u32 *cell = v + (s >> 5);
161 u32 mask = 1 << (s & 31); 93 u32 mask = 1 << (s & 31);
162 94
163 //printf ("received seqno %08lx, seq %08lx, mask %08lx is %08lx\n", seqno, seq, mask, ismask);
164 if (*cell & mask) 95 if (*cell & mask)
165 { 96 {
166 slog (L_ERR, _("received duplicate packet (received %08lx, expected %08lx)\n" 97 slog (L_ERR, _("received duplicate packet (received %08lx, expected %08lx)\n"
167 "possible replay attack, or just packet duplication"), seqno, seq + 1);//D 98 "possible replay attack, or just packet duplication"), seqno, seq + 1);//D
168 return false; 99 return false;
174 } 105 }
175 } 106 }
176 } 107 }
177}; 108};
178 109
110typedef callback0<const char *> run_script_cb;
111
112// run a shell script (or actually an external program).
113void run_script (const run_script_cb &cb, bool wait);
114
115#if ENABLE_HTTP_PROXY
116u8 *base64_encode (const u8 *data, unsigned int len);
179#endif 117#endif
180 118
119/*****************************************************************************/
120
121typedef u8 rsaclear[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data;
122typedef u8 rsacrypt[RSA_KEYLEN]; // encrypted challenge
123
124static inline void
125rsa_encrypt (RSA *key, const rsaclear &chg, rsacrypt &encr)
126{
127 if (RSA_public_encrypt (sizeof chg,
128 (unsigned char *)&chg, (unsigned char *)&encr,
129 key, RSA_PKCS1_OAEP_PADDING) < 0)
130 fatal ("RSA_public_encrypt error");
131}
132
133static inline bool
134rsa_decrypt (RSA *key, const rsacrypt &encr, rsaclear &chg)
135{
136 return RSA_private_decrypt (sizeof encr,
137 (unsigned char *)&encr, (unsigned char *)&chg,
138 key, RSA_PKCS1_OAEP_PADDING) > 0;
139}
140
141#endif
142

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines