123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312 |
- /*
- * comm.cpp
- *
- * Created on: Jul 29, 2017
- * Author: wangyu
- */
- #include "common.h"
- #include "log.h"
- int about_to_exit=0;
- raw_mode_t raw_mode=mode_faketcp;
- unordered_map<int, const char*> raw_mode_tostring = {{mode_faketcp, "faketcp"}, {mode_udp, "udp"}, {mode_icmp, "icmp"}};
- int socket_buf_size=1024*1024;
- static int random_number_fd=-1;
- char iptables_rule[200]="";
- program_mode_t program_mode=unset_mode;//0 unset; 1client 2server
- u64_t get_current_time()
- {
- timespec tmp_time;
- clock_gettime(CLOCK_MONOTONIC, &tmp_time);
- return tmp_time.tv_sec*1000+tmp_time.tv_nsec/(1000*1000l);
- }
- u64_t pack_u64(u32_t a,u32_t b)
- {
- u64_t ret=a;
- ret<<=32u;
- ret+=b;
- return ret;
- }
- u32_t get_u64_h(u64_t a)
- {
- return a>>32u;
- }
- u32_t get_u64_l(u64_t a)
- {
- return (a<<32u)>>32u;
- }
- char * my_ntoa(u32_t ip)
- {
- in_addr a;
- a.s_addr=ip;
- return inet_ntoa(a);
- }
- int add_iptables_rule(char * s)
- {
- strcpy(iptables_rule,s);
- char buf[300]="iptables -I ";
- strcat(buf,s);
- if(system(buf)==0)
- {
- mylog(log_warn,"auto added iptables rule by: %s\n",buf);
- }
- else
- {
- mylog(log_fatal,"auto added iptables failed by: %s\n",buf);
- myexit(-1);
- }
- return 0;
- }
- int clear_iptables_rule()
- {
- if(iptables_rule[0]!=0)
- {
- char buf[300]="iptables -D ";
- strcat(buf,iptables_rule);
- if(system(buf)==0)
- {
- mylog(log_warn,"iptables rule cleared\n",buf);
- }
- else
- {
- mylog(log_error,"auto added iptables failed by: %s\n",buf);
- }
- }
- return 0;
- }
- void init_random_number_fd()
- {
- random_number_fd=open("/dev/urandom",O_RDONLY);
- if(random_number_fd==-1)
- {
- mylog(log_fatal,"error open /dev/urandom\n");
- myexit(-1);
- }
- setnonblocking(random_number_fd);
- }
- u64_t get_true_random_number_64()
- {
- u64_t ret;
- int size=read(random_number_fd,&ret,sizeof(ret));
- if(size!=sizeof(ret))
- {
- mylog(log_fatal,"get random number failed %d\n",size);
- myexit(-1);
- }
- return ret;
- }
- u32_t get_true_random_number()
- {
- u32_t ret;
- int size=read(random_number_fd,&ret,sizeof(ret));
- if(size!=sizeof(ret))
- {
- mylog(log_fatal,"get random number failed %d\n",size);
- myexit(-1);
- }
- return ret;
- }
- u32_t get_true_random_number_nz() //nz for non-zero
- {
- u32_t ret=0;
- while(ret==0)
- {
- ret=get_true_random_number();
- }
- return ret;
- }
- u64_t ntoh64(u64_t a)
- {
- if(__BYTE_ORDER == __LITTLE_ENDIAN)
- {
- return __bswap_64( a);
- }
- else return a;
- }
- u64_t hton64(u64_t a)
- {
- if(__BYTE_ORDER == __LITTLE_ENDIAN)
- {
- return __bswap_64( a);
- }
- else return a;
- }
- void setnonblocking(int sock) {
- int opts;
- opts = fcntl(sock, F_GETFL);
- if (opts < 0) {
- mylog(log_fatal,"fcntl(sock,GETFL)\n");
- //perror("fcntl(sock,GETFL)");
- myexit(1);
- }
- opts = opts | O_NONBLOCK;
- if (fcntl(sock, F_SETFL, opts) < 0) {
- mylog(log_fatal,"fcntl(sock,SETFL,opts)\n");
- //perror("fcntl(sock,SETFL,opts)");
- myexit(1);
- }
- }
- /*
- Generic checksum calculation function
- */
- unsigned short csum(const unsigned short *ptr,int nbytes) {
- register long sum;
- unsigned short oddbyte;
- register short answer;
- sum=0;
- while(nbytes>1) {
- sum+=*ptr++;
- nbytes-=2;
- }
- if(nbytes==1) {
- oddbyte=0;
- *((u_char*)&oddbyte)=*(u_char*)ptr;
- sum+=oddbyte;
- }
- sum = (sum>>16)+(sum & 0xffff);
- sum = sum + (sum>>16);
- answer=(short)~sum;
- return(answer);
- }
- int set_buf_size(int fd)
- {
- if(setsockopt(fd, SOL_SOCKET, SO_SNDBUFFORCE, &socket_buf_size, sizeof(socket_buf_size))<0)
- {
- mylog(log_fatal,"SO_SNDBUFFORCE fail\n");
- myexit(1);
- }
- if(setsockopt(fd, SOL_SOCKET, SO_RCVBUFFORCE, &socket_buf_size, sizeof(socket_buf_size))<0)
- {
- mylog(log_fatal,"SO_RCVBUFFORCE fail\n");
- myexit(1);
- }
- return 0;
- }
- void myexit(int a)
- {
- if(enable_log_color)
- printf("%s\n",RESET);
- clear_iptables_rule();
- exit(a);
- }
- void signal_handler(int sig)
- {
- about_to_exit=1;
- // myexit(0);
- }
- int numbers_to_char(id_t id1,id_t id2,id_t id3,char * &data,int &len)
- {
- static char buf[buf_len];
- data=buf;
- id_t tmp=htonl(id1);
- memcpy(buf,&tmp,sizeof(tmp));
- tmp=htonl(id2);
- memcpy(buf+sizeof(tmp),&tmp,sizeof(tmp));
- tmp=htonl(id3);
- memcpy(buf+sizeof(tmp)*2,&tmp,sizeof(tmp));
- len=sizeof(id_t)*3;
- return 0;
- }
- int char_to_numbers(const char * data,int len,id_t &id1,id_t &id2,id_t &id3)
- {
- if(len<int(sizeof(id_t)*3)) return -1;
- id1=ntohl( *((id_t*)(data+0)) );
- id2=ntohl( *((id_t*)(data+sizeof(id_t))) );
- id3=ntohl( *((id_t*)(data+sizeof(id_t)*2)) );
- return 0;
- }
- bool larger_than_u32(u32_t a,u32_t b)
- {
- u32_t smaller,bigger;
- smaller=min(a,b);//smaller in normal sense
- bigger=max(a,b);
- u32_t distance=min(bigger-smaller,smaller+(0xffffffff-bigger+1));
- if(distance==bigger-smaller)
- {
- if(bigger==a)
- {
- return 1;
- }
- else
- {
- return 0;
- }
- }
- else
- {
- if(smaller==b)
- {
- return 0;
- }
- else
- {
- return 1;
- }
- }
- }
- bool larger_than_u16(uint16_t a,uint16_t b)
- {
- uint16_t smaller,bigger;
- smaller=min(a,b);//smaller in normal sense
- bigger=max(a,b);
- uint16_t distance=min(bigger-smaller,smaller+(0xffff-bigger+1));
- if(distance==bigger-smaller)
- {
- if(bigger==a)
- {
- return 1;
- }
- else
- {
- return 0;
- }
- }
- else
- {
- if(smaller==b)
- {
- return 0;
- }
- else
- {
- return 1;
- }
- }
- }
|