ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/src/util.h
Revision: 1.22
Committed: Sun Dec 2 00:09:36 2007 UTC (16 years, 5 months ago) by pcg
Content type: text/plain
Branch: MAIN
Changes since 1.21: +2 -1 lines
Log Message:
*** empty log message ***

File Contents

# Content
1 /*
2 util.h -- process management and other utility functions
3 Copyright (C) 1998-2002 Ivo Timmermans <ivo@o2w.nl>
4 2000-2002 Guus Sliepen <guus@sliepen.eu.org>
5 2003 Marc Lehmann <gvpe@schmorp.de>
6
7 This file is part of GVPE.
8
9 GVPE is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with gvpe; if not, write to the Free Software
21 Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
22 */
23
24 #ifndef UTIL_H__
25 #define UTIL_H__
26
27 #include <openssl/rsa.h>
28
29 #include "gettext.h"
30
31 #include "slog.h"
32 #include "ev_cpp.h"
33 #include "callback.h"
34
35 typedef ev_tstamp tstamp;
36
37 /*
38 * check for an existing gvpe for this net, and write pid to pidfile
39 */
40 extern int write_pidfile (void);
41
42 /*
43 * kill older gvpe
44 */
45 extern int kill_other (int signal);
46
47 /*
48 * Detach from current terminal, write pidfile, kill parent
49 */
50 extern int detach (int do_detach);
51
52 /*
53 * check wether the given path is an absolute pathname
54 */
55 #define ABSOLUTE_PATH(c) ((c)[0] == '/')
56
57 /*****************************************************************************/
58
59 typedef u8 mac[6];
60
61 extern void id2mac (unsigned int id, void *m);
62
63 #define mac2id(p) ((p)[0] & 0x01 ? 0 : ((p)[4] << 8) | (p)[5])
64
65 struct sliding_window
66 {
67 u32 v[(WINDOWSIZE + 31) / 32];
68 u32 seq;
69
70 void reset (u32 seqno)
71 {
72 memset (v, -1, sizeof v);
73 seq = seqno;
74 }
75
76 bool recv_ok (u32 seqno)
77 {
78 if (seqno <= seq - WINDOWSIZE)
79 slog (L_ERR, _("received duplicate or outdated packet (received %08lx, expected %08lx)\n"
80 "possible replay attack, or just massive packet reordering"), seqno, seq + 1);
81 else if (seqno > seq + WINDOWSIZE * 4)
82 slog (L_ERR, _("received duplicate or out-of-sync packet (received %08lx, expected %08lx)\n"
83 "possible replay attack, or just massive packet loss"), seqno, seq + 1);
84 else
85 {
86 while (seqno > seq)
87 {
88 seq++;
89
90 u32 s = seq % WINDOWSIZE;
91 u32 *cell = v + (s >> 5);
92 u32 mask = 1 << (s & 31);
93
94 *cell &= ~mask;
95 }
96
97 u32 s = seqno % WINDOWSIZE;
98 u32 *cell = v + (s >> 5);
99 u32 mask = 1 << (s & 31);
100
101 if (*cell & mask)
102 slog (L_ERR, _("received duplicate packet (received %08lx, expected %08lx)\n"
103 "possible replay attack, or just packet duplication"), seqno, seq + 1);
104 else
105 {
106 *cell |= mask;
107 return true;
108 }
109 }
110
111 return false;
112 }
113 };
114
115 typedef callback0<const char *> run_script_cb;
116
117 // run a shell script (or actually an external program).
118 bool run_script (const run_script_cb &cb, bool wait);
119
120 #if ENABLE_HTTP_PROXY
121 u8 *base64_encode (const u8 *data, unsigned int len);
122 #endif
123
124 /*****************************************************************************/
125
126 typedef u8 rsaclear[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data;
127 typedef u8 rsacrypt[RSA_KEYLEN]; // encrypted challenge
128
129 static inline void
130 rsa_encrypt (RSA *key, const rsaclear &chg, rsacrypt &encr)
131 {
132 if (RSA_public_encrypt (sizeof chg,
133 (unsigned char *)&chg, (unsigned char *)&encr,
134 key, RSA_PKCS1_OAEP_PADDING) < 0)
135 fatal ("RSA_public_encrypt error");
136 }
137
138 static inline bool
139 rsa_decrypt (RSA *key, const rsacrypt &encr, rsaclear &chg)
140 {
141 return RSA_private_decrypt (sizeof encr,
142 (unsigned char *)&encr, (unsigned char *)&chg,
143 key, RSA_PKCS1_OAEP_PADDING) > 0;
144 }
145
146 #endif
147