/* * comm.cpp * * Created on: Jul 29, 2017 * Author: wangyu */ #include "common.h" #include "log.h" #include #include int about_to_exit=0; raw_mode_t raw_mode=mode_faketcp; unordered_map raw_mode_tostring = {{mode_faketcp, "faketcp"}, {mode_udp, "udp"}, {mode_icmp, "icmp"}}; //static int random_number_fd=-1; char iptables_rule[200]=""; //int is_client = 0, is_server = 0; program_mode_t client_or_server=unset_mode;//0 unset; 1client 2server working_mode_t working_mode=tunnel_mode; int socket_buf_size=1024*1024; struct my_random_t { std::random_device rd; std::mt19937 gen; std::uniform_int_distribution dis64; std::uniform_int_distribution dis32; std::uniform_int_distribution dis8; my_random_t() { std::mt19937 gen_tmp(rd()); gen=gen_tmp; gen.discard(700000); //magic } u64_t gen64() { return dis64(gen); } u32_t gen32() { return dis32(gen); } unsigned char gen8() { return dis8(gen); } /*int random_number_fd; random_fd_t() { random_number_fd=open("/dev/urandom",O_RDONLY); if(random_number_fd==-1) { mylog(log_fatal,"error open /dev/urandom\n"); myexit(-1); } setnonblocking(random_number_fd); } int get_fd() { return random_number_fd; }*/ }my_random; void get_fake_random_chars(char * s,int len) { char *p=s; int left=len; while(left>=(int)sizeof(u64_t)) { //*((u64_t*)p)=my_random.gen64(); //this may break strict-alias , also p may not point to a multiple of sizeof(u64_t) u64_t tmp=my_random.gen64(); memcpy(p,&tmp,sizeof(u64_t)); // so,use memcpy instead. p+=sizeof(u64_t); left-=sizeof(u64_t); } if(left) { u64_t tmp=my_random.gen64(); memcpy(p,&tmp,left); } } int random_between(u32_t a,u32_t b) { if(a>b) { mylog(log_fatal,"min >max?? %d %d\n",a ,b); myexit(1); } if(a==b)return a; else return a+get_fake_random_number()%(b+1-a); } /* u64_t get_current_time()//ms { timespec tmp_time; clock_gettime(CLOCK_MONOTONIC, &tmp_time); return ((u64_t)tmp_time.tv_sec)*1000llu+((u64_t)tmp_time.tv_nsec)/(1000*1000llu); } u64_t get_current_time_us() { timespec tmp_time; clock_gettime(CLOCK_MONOTONIC, &tmp_time); return (uint64_t(tmp_time.tv_sec))*1000llu*1000llu+ (uint64_t(tmp_time.tv_nsec))/1000llu; }*/ u64_t get_current_time()//ms { //timespec tmp_time; //clock_gettime(CLOCK_MONOTONIC, &tmp_time); //return ((u64_t)tmp_time.tv_sec)*1000llu+((u64_t)tmp_time.tv_nsec)/(1000*1000llu); return (u64_t)(ev_time()*1000); } u64_t get_current_time_us() { //timespec tmp_time; //clock_gettime(CLOCK_MONOTONIC, &tmp_time); //return (uint64_t(tmp_time.tv_sec))*1000llu*1000llu+ (uint64_t(tmp_time.tv_nsec))/1000llu; return (u64_t)(ev_time()*1000*1000); } u64_t pack_u64(u32_t a,u32_t b) { u64_t ret=a; ret<<=32u; ret+=b; return ret; } u32_t get_u64_h(u64_t a) { return a>>32u; } u32_t get_u64_l(u64_t a) { return (a<<32u)>>32u; } void write_u16(char * p,u16_t w) { *(unsigned char*)(p + 1) = (w & 0xff); *(unsigned char*)(p + 0) = (w >> 8); } u16_t read_u16(char * p) { u16_t res; res = *(const unsigned char*)(p + 0); res = *(const unsigned char*)(p + 1) + (res << 8); return res; } void write_u32(char * p,u32_t l) { *(unsigned char*)(p + 3) = (unsigned char)((l >> 0) & 0xff); *(unsigned char*)(p + 2) = (unsigned char)((l >> 8) & 0xff); *(unsigned char*)(p + 1) = (unsigned char)((l >> 16) & 0xff); *(unsigned char*)(p + 0) = (unsigned char)((l >> 24) & 0xff); } u32_t read_u32(char * p) { u32_t res; res = *(const unsigned char*)(p + 0); res = *(const unsigned char*)(p + 1) + (res << 8); res = *(const unsigned char*)(p + 2) + (res << 8); res = *(const unsigned char*)(p + 3) + (res << 8); return res; } void write_u64(char * s,u64_t a) { assert(0==1); } u64_t read_u64(char * s) { assert(0==1); return 0; } char * my_ntoa(u32_t ip) { in_addr a; a.s_addr=ip; return inet_ntoa(a); } int add_iptables_rule(char * s) { strcpy(iptables_rule,s); char buf[300]="iptables -I "; strcat(buf,s); if(system(buf)==0) { mylog(log_warn,"auto added iptables rule by: %s\n",buf); } else { mylog(log_fatal,"auto added iptables failed by: %s\n",buf); myexit(-1); } return 0; } int clear_iptables_rule() { if(iptables_rule[0]!=0) { char buf[300]="iptables -D "; strcat(buf,iptables_rule); if(system(buf)==0) { mylog(log_warn,"iptables rule cleared by: %s \n",buf); } else { mylog(log_error,"clear iptables failed by: %s\n",buf); } } return 0; } u64_t get_fake_random_number_64() { //u64_t ret; //int size=read(random_fd.get_fd(),&ret,sizeof(ret)); //if(size!=sizeof(ret)) //{ // mylog(log_fatal,"get random number failed %d\n",size); // myexit(-1); //} return my_random.gen64(); } u32_t get_fake_random_number() { //u32_t ret; //int size=read(random_fd.get_fd(),&ret,sizeof(ret)); //if(size!=sizeof(ret)) //{ // mylog(log_fatal,"get random number failed %d\n",size); // myexit(-1); //} return my_random.gen32(); } u32_t get_fake_random_number_nz() //nz for non-zero { u32_t ret=0; while(ret==0) { ret=get_fake_random_number(); } return ret; } /* u64_t ntoh64(u64_t a) { if(__BYTE_ORDER == __LITTLE_ENDIAN) { return __bswap_64( a); } else return a; } u64_t hton64(u64_t a) { if(__BYTE_ORDER == __LITTLE_ENDIAN) { return __bswap_64( a); } else return a; }*/ void setnonblocking(int sock) { int opts; opts = fcntl(sock, F_GETFL); if (opts < 0) { mylog(log_fatal,"fcntl(sock,GETFL)\n"); //perror("fcntl(sock,GETFL)"); myexit(1); } opts = opts | O_NONBLOCK; if (fcntl(sock, F_SETFL, opts) < 0) { mylog(log_fatal,"fcntl(sock,SETFL,opts)\n"); //perror("fcntl(sock,SETFL,opts)"); myexit(1); } } /* Generic checksum calculation function */ unsigned short csum(const unsigned short *ptr,int nbytes) { long sum; unsigned short oddbyte; short answer; sum=0; while(nbytes>1) { sum+=*ptr++; nbytes-=2; } if(nbytes==1) { oddbyte=0; *((u_char*)&oddbyte)=*(u_char*)ptr; sum+=oddbyte; } sum = (sum>>16)+(sum & 0xffff); sum = sum + (sum>>16); answer=(short)~sum; return(answer); } unsigned short tcp_csum(const pseudo_header & ph,const unsigned short *ptr,int nbytes) {//works both for big and little endian long sum; unsigned short oddbyte; short answer; sum=0; unsigned short * tmp= (unsigned short *)&ph; for(int i=0;i<6;i++) { sum+=*tmp++; } while(nbytes>1) { sum+=*ptr++; nbytes-=2; } if(nbytes==1) { oddbyte=0; *((u_char*)&oddbyte)=*(u_char*)ptr; sum+=oddbyte; } sum = (sum>>16)+(sum & 0xffff); sum = sum + (sum>>16); answer=(short)~sum; return(answer); } int set_buf_size(int fd,int socket_buf_size,int force_socket_buf) { if(0) { /* if(setsockopt(fd, SOL_SOCKET, SO_SNDBUFFORCE, &socket_buf_size, sizeof(socket_buf_size))<0) { mylog(log_fatal,"SO_SNDBUFFORCE fail socket_buf_size=%d errno=%s\n",socket_buf_size,strerror(errno)); myexit(1); } if(setsockopt(fd, SOL_SOCKET, SO_RCVBUFFORCE, &socket_buf_size, sizeof(socket_buf_size))<0) { mylog(log_fatal,"SO_RCVBUFFORCE fail socket_buf_size=%d errno=%s\n",socket_buf_size,strerror(errno)); myexit(1); } */ } else { if(setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &socket_buf_size, sizeof(socket_buf_size))<0) { mylog(log_fatal,"SO_SNDBUF fail socket_buf_size=%d errno=%s\n",socket_buf_size,strerror(errno)); myexit(1); } if(setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &socket_buf_size, sizeof(socket_buf_size))<0) { mylog(log_fatal,"SO_RCVBUF fail socket_buf_size=%d errno=%s\n",socket_buf_size,strerror(errno)); myexit(1); } } return 0; } void myexit(int a) { if(enable_log_color) printf("%s\n",RESET); // clear_iptables_rule(); exit(a); } void signal_handler(int sig) { about_to_exit=1; // myexit(0); } /* int numbers_to_char(id_t id1,id_t id2,id_t id3,char * &data,int &len) { static char buf[buf_len]; data=buf; id_t tmp=htonl(id1); memcpy(buf,&tmp,sizeof(tmp)); tmp=htonl(id2); memcpy(buf+sizeof(tmp),&tmp,sizeof(tmp)); tmp=htonl(id3); memcpy(buf+sizeof(tmp)*2,&tmp,sizeof(tmp)); len=sizeof(id_t)*3; return 0; } int char_to_numbers(const char * data,int len,id_t &id1,id_t &id2,id_t &id3) { if(len