main.cpp 71 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820
  1. #include "common.h"
  2. #include "network.h"
  3. #include "log.h"
  4. #include "md5.h"
  5. char local_address[100]="0.0.0.0", remote_address[100]="255.255.255.255",source_address[100]="0.0.0.0";
  6. u32_t local_address_uint32,remote_address_uint32,source_address_uint32;
  7. int source_port=0,local_port = -1, remote_port = -1;
  8. id_t const_id=0;
  9. const int disable_conv_clear=0;
  10. const int disable_conn_clear=0;
  11. enum server_current_state_t {server_idle=0,server_handshake1,server_ready};
  12. enum client_current_state_t {client_idle=0,client_tcp_handshake,client_handshake1,client_handshake2,client_ready};
  13. union current_state_t
  14. {
  15. server_current_state_t server_current_state;
  16. client_current_state_t client_current_state;
  17. };
  18. int udp_fd=-1; //for client only
  19. int bind_fd=-1; //bind only,never send or recv
  20. int epollfd=-1;
  21. int timer_fd=-1;
  22. int fail_time_counter=0;
  23. int epoll_trigger_counter=0;
  24. int debug_flag=0;
  25. int auto_add_iptables_rule=0;
  26. int debug_resend=0;
  27. int disable_anti_replay=0;
  28. char key_string[1000]= "secret key";
  29. char key[16];//,key2[16];
  30. //uint64_t current_time_rough=0;
  31. int VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV;
  32. ////////==============================variable divider=============================================================
  33. struct anti_replay_t
  34. {
  35. u64_t max_packet_received;
  36. char window[anti_replay_window_size];
  37. char disabled;
  38. anti_replay_seq_t anti_replay_seq;
  39. anti_replay_seq_t get_new_seq_for_send()
  40. {
  41. return anti_replay_seq++;
  42. }
  43. anti_replay_t()
  44. {
  45. disabled=disable_anti_replay;
  46. max_packet_received=0;
  47. anti_replay_seq=get_true_random_number_64()/10;//random first seq
  48. //memset(window,0,sizeof(window)); //not necessary
  49. }
  50. void re_init()
  51. {
  52. disabled=disable_anti_replay;
  53. max_packet_received=0;
  54. //memset(window,0,sizeof(window));
  55. }
  56. void disable()
  57. {
  58. disabled=1;
  59. }
  60. void enable()
  61. {
  62. disabled=0;
  63. }
  64. int is_vaild(u64_t seq)
  65. {
  66. //if(disabled) return 0;
  67. if(seq==max_packet_received) return 0||disabled;
  68. else if(seq>max_packet_received)
  69. {
  70. if(seq-max_packet_received>=anti_replay_window_size)
  71. {
  72. memset(window,0,sizeof(window));
  73. window[seq%anti_replay_window_size]=1;
  74. }
  75. else
  76. {
  77. for (u64_t i=max_packet_received+1;i<seq;i++)
  78. window[i%anti_replay_window_size]=0;
  79. window[seq%anti_replay_window_size]=1;
  80. }
  81. max_packet_received=seq;
  82. return 1;
  83. }
  84. else if(seq<max_packet_received)
  85. {
  86. if(max_packet_received-seq>=anti_replay_window_size) return 0||disabled;
  87. else
  88. {
  89. if (window[seq%anti_replay_window_size]==1) return 0||disabled;
  90. else
  91. {
  92. window[seq%anti_replay_window_size]=1;
  93. return 1;
  94. }
  95. }
  96. }
  97. return 0; //for complier check
  98. }
  99. };//anti_replay;
  100. void server_clear_function(u64_t u64);
  101. struct conv_manager_t //TODO change map to unordered map
  102. {
  103. //typedef hash_map map;
  104. unordered_map<u64_t,u32_t> u64_to_conv; //conv and u64 are both supposed to be uniq
  105. unordered_map<u32_t,u64_t> conv_to_u64;
  106. unordered_map<u32_t,u64_t> conv_last_active_time;
  107. unordered_map<u32_t,u64_t>::iterator clear_it;
  108. unordered_map<u32_t,u64_t>::iterator it;
  109. unordered_map<u32_t,u64_t>::iterator old_it;
  110. //void (*clear_function)(uint64_t u64) ;
  111. long long last_clear_time;
  112. conv_manager_t()
  113. {
  114. clear_it=conv_last_active_time.begin();
  115. long long last_clear_time=0;
  116. //clear_function=0;
  117. }
  118. ~conv_manager_t()
  119. {
  120. clear();
  121. }
  122. int get_size()
  123. {
  124. return conv_to_u64.size();
  125. }
  126. void reserve()
  127. {
  128. u64_to_conv.reserve(10007);
  129. conv_to_u64.reserve(10007);
  130. conv_last_active_time.reserve(10007);
  131. }
  132. void clear()
  133. {
  134. if(disable_conv_clear) return ;
  135. if(program_mode==server_mode)
  136. {
  137. for(it=conv_to_u64.begin();it!=conv_to_u64.end();it++)
  138. {
  139. //int fd=int((it->second<<32u)>>32u);
  140. server_clear_function( it->second);
  141. }
  142. }
  143. u64_to_conv.clear();
  144. conv_to_u64.clear();
  145. conv_last_active_time.clear();
  146. clear_it=conv_last_active_time.begin();
  147. }
  148. u32_t get_new_conv()
  149. {
  150. u32_t conv=get_true_random_number_nz();
  151. while(conv_to_u64.find(conv)!=conv_to_u64.end())
  152. {
  153. conv=get_true_random_number_nz();
  154. }
  155. return conv;
  156. }
  157. int is_conv_used(u32_t conv)
  158. {
  159. return conv_to_u64.find(conv)!=conv_to_u64.end();
  160. }
  161. int is_u64_used(u64_t u64)
  162. {
  163. return u64_to_conv.find(u64)!=u64_to_conv.end();
  164. }
  165. u32_t find_conv_by_u64(u64_t u64)
  166. {
  167. return u64_to_conv[u64];
  168. }
  169. u64_t find_u64_by_conv(u32_t conv)
  170. {
  171. return conv_to_u64[conv];
  172. }
  173. int update_active_time(u32_t conv)
  174. {
  175. return conv_last_active_time[conv]=get_current_time();
  176. }
  177. int insert_conv(u32_t conv,u64_t u64)
  178. {
  179. u64_to_conv[u64]=conv;
  180. conv_to_u64[conv]=u64;
  181. conv_last_active_time[conv]=get_current_time();
  182. return 0;
  183. }
  184. int erase_conv(u32_t conv)
  185. {
  186. if(disable_conv_clear) return 0;
  187. u64_t u64=conv_to_u64[conv];
  188. if(program_mode==server_mode)
  189. {
  190. server_clear_function(u64);
  191. }
  192. conv_to_u64.erase(conv);
  193. u64_to_conv.erase(u64);
  194. conv_last_active_time.erase(conv);
  195. mylog(log_info,"conv %x cleared\n",conv);
  196. return 0;
  197. }
  198. int clear_inactive()
  199. {
  200. if(get_current_time()-last_clear_time>conv_clear_interval)
  201. {
  202. last_clear_time=get_current_time();
  203. return clear_inactive0();
  204. }
  205. return 0;
  206. }
  207. int clear_inactive0()
  208. {
  209. if(disable_conv_clear) return 0;
  210. //map<uint32_t,uint64_t>::iterator it;
  211. int cnt=0;
  212. it=clear_it;
  213. int size=conv_last_active_time.size();
  214. int num_to_clean=size/conv_clear_ratio+conv_clear_min; //clear 1/10 each time,to avoid latency glitch
  215. u64_t current_time=get_current_time();
  216. for(;;)
  217. {
  218. if(cnt>=num_to_clean) break;
  219. if(conv_last_active_time.begin()==conv_last_active_time.end()) break;
  220. if(it==conv_last_active_time.end())
  221. {
  222. it=conv_last_active_time.begin();
  223. }
  224. if( current_time -it->second >conv_timeout )
  225. {
  226. //mylog(log_info,"inactive conv %u cleared \n",it->first);
  227. old_it=it;
  228. it++;
  229. erase_conv(old_it->first);
  230. }
  231. else
  232. {
  233. it++;
  234. }
  235. cnt++;
  236. }
  237. return 0;
  238. }
  239. };//g_conv_manager;
  240. struct blob_t
  241. {
  242. conv_manager_t conv_manager;
  243. anti_replay_t anti_replay;
  244. };
  245. struct conn_info_t
  246. {
  247. current_state_t state;
  248. raw_info_t raw_info;
  249. u64_t last_state_time;
  250. u64_t last_hb_sent_time; //client re-use this for retry
  251. u64_t last_hb_recv_time;
  252. //long long last_resent_time;
  253. id_t my_id;
  254. id_t oppsite_id;
  255. int timer_fd;
  256. id_t oppsite_const_id;
  257. blob_t *blob;
  258. /*
  259. const uint32_t &ip=raw_info.recv_info.src_ip;
  260. const uint16_t &port=raw_info.recv_info.src_port;
  261. */
  262. void recover(const conn_info_t &conn_info)
  263. {
  264. raw_info=conn_info.raw_info;
  265. last_state_time=conn_info.last_state_time;
  266. last_hb_recv_time=conn_info.last_hb_recv_time;
  267. last_hb_sent_time=conn_info.last_hb_sent_time;
  268. my_id=conn_info.my_id;
  269. oppsite_id=conn_info.oppsite_id;
  270. blob->anti_replay.re_init();
  271. }
  272. conn_info_t()
  273. {
  274. //send_packet_info.protocol=g_packet_info_send.protocol;
  275. if(program_mode==server_mode)
  276. state.server_current_state=server_idle;
  277. else
  278. state.client_current_state=client_idle;
  279. last_state_time=0;
  280. oppsite_const_id=0;
  281. blob=0;
  282. timer_fd=0;
  283. }
  284. void prepare()
  285. {
  286. blob=new blob_t;
  287. }
  288. conn_info_t(const conn_info_t&b)
  289. {
  290. //mylog(log_error,"called!!!!!!!!!!!!!\n");
  291. *this=b;
  292. if(blob!=0)
  293. {
  294. blob=new blob_t(*b.blob);
  295. }
  296. }
  297. conn_info_t& operator=(const conn_info_t& b)
  298. {
  299. mylog(log_fatal,"not allowed\n");
  300. myexit(-1);
  301. return *this;
  302. }
  303. ~conn_info_t();
  304. };//g_conn_info;
  305. struct conn_manager_t
  306. {
  307. u32_t ready_num;
  308. unordered_map<int,conn_info_t *> udp_fd_mp; //a bit dirty to used pointer,but can void unordered_map search
  309. unordered_map<int,conn_info_t *> timer_fd_mp;//we can use pointer here since unordered_map.rehash() uses shallow copy
  310. unordered_map<id_t,conn_info_t *> const_id_mp;
  311. unordered_map<u64_t,conn_info_t*> mp; //put it at end so that it de-consturcts first
  312. unordered_map<u64_t,conn_info_t*>::iterator clear_it;
  313. long long last_clear_time;
  314. conn_manager_t()
  315. {
  316. ready_num=0;
  317. mp.reserve(10007);
  318. clear_it=mp.begin();
  319. timer_fd_mp.reserve(10007);
  320. const_id_mp.reserve(10007);
  321. udp_fd_mp.reserve(100007);
  322. last_clear_time=0;
  323. //current_ready_ip=0;
  324. // current_ready_port=0;
  325. }
  326. int exist(u32_t ip,uint16_t port)
  327. {
  328. u64_t u64=0;
  329. u64=ip;
  330. u64<<=32u;
  331. u64|=port;
  332. if(mp.find(u64)!=mp.end())
  333. {
  334. return 1;
  335. }
  336. return 0;
  337. }
  338. /*
  339. int insert(uint32_t ip,uint16_t port)
  340. {
  341. uint64_t u64=0;
  342. u64=ip;
  343. u64<<=32u;
  344. u64|=port;
  345. mp[u64];
  346. return 0;
  347. }*/
  348. conn_info_t *& find_insert_p(u32_t ip,uint16_t port) //be aware,the adress may change after rehash
  349. {
  350. u64_t u64=0;
  351. u64=ip;
  352. u64<<=32u;
  353. u64|=port;
  354. unordered_map<u64_t,conn_info_t*>::iterator it=mp.find(u64);
  355. if(it==mp.end())
  356. {
  357. mp[u64]=new conn_info_t;
  358. }
  359. return mp[u64];
  360. }
  361. conn_info_t & find_insert(u32_t ip,uint16_t port) //be aware,the adress may change after rehash
  362. {
  363. u64_t u64=0;
  364. u64=ip;
  365. u64<<=32u;
  366. u64|=port;
  367. unordered_map<u64_t,conn_info_t*>::iterator it=mp.find(u64);
  368. if(it==mp.end())
  369. {
  370. mp[u64]=new conn_info_t;
  371. }
  372. return *mp[u64];
  373. }
  374. int erase(unordered_map<u64_t,conn_info_t*>::iterator erase_it)
  375. {
  376. if(erase_it->second->state.server_current_state==server_ready)
  377. {
  378. ready_num--;
  379. assert(i32_t(ready_num)!=-1);
  380. assert(erase_it->second!=0);
  381. assert(erase_it->second->timer_fd !=0);
  382. assert(erase_it->second->oppsite_const_id!=0);
  383. assert(const_id_mp.find(erase_it->second->oppsite_const_id)!=const_id_mp.end());
  384. assert(timer_fd_mp.find(erase_it->second->timer_fd)!=timer_fd_mp.end());
  385. const_id_mp.erase(erase_it->second->oppsite_const_id);
  386. timer_fd_mp.erase(erase_it->second->timer_fd);
  387. close(erase_it->second->timer_fd);// close will auto delte it from epoll
  388. delete(erase_it->second);
  389. mp.erase(erase_it->first);
  390. }
  391. else
  392. {
  393. assert(erase_it->second->blob==0);
  394. assert(erase_it->second->timer_fd ==0);
  395. assert(erase_it->second->oppsite_const_id==0);
  396. delete(erase_it->second);
  397. mp.erase(erase_it->first);
  398. }
  399. return 0;
  400. }
  401. int clear_inactive()
  402. {
  403. if(get_current_time()-last_clear_time>conn_clear_interval)
  404. {
  405. last_clear_time=get_current_time();
  406. return clear_inactive0();
  407. }
  408. return 0;
  409. }
  410. int clear_inactive0()
  411. {
  412. unordered_map<u64_t,conn_info_t*>::iterator it;
  413. unordered_map<u64_t,conn_info_t*>::iterator old_it;
  414. if(disable_conn_clear) return 0;
  415. //map<uint32_t,uint64_t>::iterator it;
  416. int cnt=0;
  417. it=clear_it;
  418. int size=mp.size();
  419. int num_to_clean=size/conn_clear_ratio+conn_clear_min; //clear 1/10 each time,to avoid latency glitch
  420. mylog(log_trace,"mp.size() %d\n", size);
  421. num_to_clean=min(num_to_clean,(int)mp.size());
  422. u64_t current_time=get_current_time();
  423. for(;;)
  424. {
  425. if(cnt>=num_to_clean) break;
  426. if(mp.begin()==mp.end()) break;
  427. if(it==mp.end())
  428. {
  429. it=mp.begin();
  430. }
  431. if(it->second->state.server_current_state==server_ready &&current_time - it->second->last_hb_recv_time <=server_conn_timeout)
  432. {
  433. it++;
  434. }
  435. else if(it->second->state.server_current_state!=server_ready&& current_time - it->second->last_state_time <=server_handshake_timeout )
  436. {
  437. it++;
  438. }
  439. else if(it->second->blob!=0&&it->second->blob->conv_manager.get_size() >0)
  440. {
  441. assert(it->second->state.server_current_state==server_ready);
  442. it++;
  443. }
  444. else
  445. {
  446. mylog(log_info,"[%s:%d]inactive conn cleared \n",my_ntoa(it->second->raw_info.recv_info.src_ip),it->second->raw_info.recv_info.src_port);
  447. old_it=it;
  448. it++;
  449. erase(old_it);
  450. }
  451. cnt++;
  452. }
  453. return 0;
  454. }
  455. }conn_manager;
  456. conn_info_t::~conn_info_t()
  457. {
  458. if(program_mode==server_mode)
  459. {
  460. if(state.server_current_state==server_ready)
  461. {
  462. assert(blob!=0);
  463. assert(oppsite_const_id!=0);
  464. //assert(conn_manager.const_id_mp.find(oppsite_const_id)!=conn_manager.const_id_mp.end()); // conn_manager 's deconstuction function erases it
  465. }
  466. else
  467. {
  468. assert(blob==0);
  469. assert(oppsite_const_id==0);
  470. }
  471. }
  472. //if(oppsite_const_id!=0) //do this at conn_manager 's deconstuction function
  473. //conn_manager.const_id_mp.erase(oppsite_const_id);
  474. if(blob!=0)
  475. delete blob;
  476. //send_packet_info.protocol=g_packet_info_send.protocol;
  477. }
  478. int TTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTT;
  479. ////////==========================type divider=======================================================
  480. int server_on_raw_recv_pre_ready(conn_info_t &conn_info,u32_t tmp_oppsite_const_id);
  481. int server_on_raw_recv_ready(conn_info_t &conn_info);
  482. int server_on_raw_recv_handshake1(conn_info_t &conn_info,id_t tmp_oppsite_id );
  483. int DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD;
  484. ////////////////=======================declear divider=============================
  485. /*
  486. int pre_send_deprecate(char * data, int &data_len)
  487. {
  488. const int disable_encrypt=0;
  489. const int disable_anti_replay=0;
  490. char replay_buf[buf_len];
  491. //return 0;
  492. if(data_len<0) return -3;
  493. if(disable_encrypt&&disable_anti_replay) return 0;
  494. if(!disable_anti_replay)
  495. {
  496. anti_replay_seq++;
  497. uint32_t seq_high= htonl(anti_replay_seq>>32u);
  498. uint32_t seq_low= htonl((anti_replay_seq<<32u)>>32u);
  499. memcpy(replay_buf,&seq_high,sizeof(uint32_t));
  500. memcpy(replay_buf+sizeof(uint32_t),&seq_low,sizeof(uint32_t));
  501. memcpy(replay_buf+sizeof(uint32_t)*2,data,data_len);
  502. data_len+=sizeof(uint32_t)*2;
  503. }
  504. else
  505. {
  506. memcpy(replay_buf,data,data_len);
  507. }
  508. if(!disable_encrypt)
  509. {
  510. if(my_encrypt(replay_buf,data,data_len,key2) <0)
  511. {
  512. mylog(log_debug,"encrypt fail\n");
  513. return -1;
  514. }
  515. }
  516. else
  517. {
  518. memcpy(data,replay_buf,data_len);
  519. }
  520. return 0;
  521. }
  522. int pre_recv_deprecated(char * data, int &data_len)
  523. {
  524. const int disable_encrypt=0;
  525. const int disable_anti_replay=0;
  526. char replay_buf[buf_len];
  527. //return 0;
  528. if(data_len<0) return -1;
  529. if(disable_encrypt&&disable_anti_replay) return 0;
  530. if(!disable_encrypt)
  531. {
  532. if(my_decrypt(data,replay_buf,data_len,key2) <0)
  533. {
  534. mylog(log_debug,"decrypt fail\n");
  535. return -1;
  536. }
  537. else
  538. {
  539. mylog(log_debug,"decrypt succ\n");
  540. }
  541. }
  542. else
  543. {
  544. memcpy(replay_buf,data,data_len);
  545. }
  546. if(!disable_anti_replay)
  547. {
  548. data_len-=sizeof(uint32_t)*2;
  549. if(data_len<0)
  550. {
  551. mylog(log_debug,"data_len<=0\n");
  552. return -2;
  553. }
  554. uint64_t seq_high= ntohl(*((uint32_t*)(replay_buf) ) );
  555. uint32_t seq_low= ntohl(*((uint32_t*)(replay_buf+sizeof(uint32_t)) ) );
  556. uint64_t recv_seq =(seq_high<<32u )+seq_low;
  557. if((program_mode==client_mode&&client_current_state==client_ready)
  558. ||(program_mode==server_mode&&server_current_state==server_ready ))
  559. {
  560. if(data_len<sizeof(uint32_t)*2+1)
  561. {
  562. mylog(log_debug,"no room for session id and oppiste session_id\n");
  563. return -4;
  564. }
  565. uint32_t tmp_oppiste_session_id = ntohl(
  566. *((uint32_t*) (replay_buf + sizeof(uint32_t) * 2+1)));
  567. uint32_t tmp_session_id = ntohl(
  568. *((uint32_t*) (replay_buf + sizeof(uint32_t) * 3+1)));
  569. if (tmp_oppiste_session_id != oppsite_id
  570. || tmp_session_id != my_id) {
  571. mylog(log_debug,"auth fail and pre send\n");
  572. return -5;
  573. }
  574. mylog(log_debug,"seq=========%u\n", recv_seq);
  575. if (anti_replay.is_vaild(recv_seq) != 1) {
  576. mylog(log_info,"dropped replay packet\n");
  577. return -1;
  578. }
  579. }
  580. mylog(log_trace,"<<<<<%ld,%d,%ld>>>>\n",seq_high,seq_low,recv_seq);
  581. memcpy(data,replay_buf+sizeof(uint32_t)*2,data_len);
  582. }
  583. else
  584. {
  585. memcpy(data,replay_buf,data_len);
  586. }
  587. return 0;
  588. }*/
  589. void server_clear_function(u64_t u64)
  590. {
  591. int fd=int(u64);
  592. int ret;
  593. assert(fd!=0);
  594. /*
  595. epoll_event ev;
  596. ev.events = EPOLLIN;
  597. ev.data.u64 = u64;
  598. ret = epoll_ctl(epollfd, EPOLL_CTL_DEL, fd, &ev);
  599. if (ret!=0)
  600. {
  601. mylog(log_fatal,"fd:%d epoll delete failed!!!!\n",fd);
  602. myexit(-1); //this shouldnt happen
  603. }*/ //no need
  604. ret= close(fd); //closed fd should be auto removed from epoll
  605. if (ret!=0)
  606. {
  607. mylog(log_fatal,"close fd %d failed !!!!\n",fd);
  608. myexit(-1); //this shouldnt happen
  609. }
  610. //mylog(log_fatal,"size:%d !!!!\n",conn_manager.udp_fd_mp.size());
  611. assert(conn_manager.udp_fd_mp.find(fd)!=conn_manager.udp_fd_mp.end());
  612. conn_manager.udp_fd_mp.erase(fd);
  613. }
  614. int send_bare(raw_info_t &raw_info,const char* data,int len)
  615. {
  616. if(len<0)
  617. {
  618. mylog(log_debug,"input_len <0");
  619. return -1;
  620. }
  621. packet_info_t &send_info=raw_info.send_info;
  622. packet_info_t &recv_info=raw_info.recv_info;
  623. char send_data_buf[buf_len]; //buf for send data and send hb
  624. char send_data_buf2[buf_len];
  625. //static send_bare[buf_len];
  626. iv_t iv=get_true_random_number_64();
  627. padding_t padding=get_true_random_number_64();
  628. memcpy(send_data_buf,&iv,sizeof(iv));
  629. memcpy(send_data_buf+sizeof(iv),&padding,sizeof(padding));
  630. send_data_buf[sizeof(iv)+sizeof(padding)]='b';
  631. memcpy(send_data_buf+sizeof(iv)+sizeof(padding)+1,data,len);
  632. int new_len=len+sizeof(iv)+sizeof(padding)+1;
  633. if(my_encrypt(send_data_buf,send_data_buf2,new_len,key)!=0)
  634. {
  635. return -1;
  636. }
  637. send_raw0(raw_info,send_data_buf2,new_len);
  638. return 0;
  639. }
  640. int parse_bare(const char *input,int input_len,char* & data,int & len) //allow overlap
  641. {
  642. static char recv_data_buf[buf_len];
  643. if(input_len<0)
  644. {
  645. mylog(log_debug,"input_len <0");
  646. return -1;
  647. }
  648. if(my_decrypt(input,recv_data_buf,input_len,key)!=0)
  649. {
  650. mylog(log_debug,"decrypt_fail in recv bare\n");
  651. return -1;
  652. }
  653. if(recv_data_buf[sizeof(iv_t)+sizeof(padding_t)]!='b')
  654. {
  655. mylog(log_debug,"not a bare packet\n");
  656. return -1;
  657. }
  658. len=input_len;
  659. data=recv_data_buf+sizeof(iv_t)+sizeof(padding_t)+1;
  660. len-=sizeof(iv_t)+sizeof(padding_t)+1;
  661. if(len<0)
  662. {
  663. mylog(log_debug,"len <0");
  664. return -1;
  665. }
  666. return 0;
  667. }
  668. int recv_bare(raw_info_t &raw_info,char* & data,int & len)
  669. {
  670. packet_info_t &send_info=raw_info.send_info;
  671. packet_info_t &recv_info=raw_info.recv_info;
  672. if(recv_raw0(raw_info,data,len)<0)
  673. {
  674. //printf("recv_raw_fail in recv bare\n");
  675. return -1;
  676. }
  677. if ((raw_mode == mode_faketcp && (recv_info.syn == 1 || recv_info.ack != 1)))
  678. {
  679. mylog(log_debug,"unexpect packet type recv_info.syn=%d recv_info.ack=%d \n",recv_info.syn,recv_info.ack);
  680. return -1;
  681. }
  682. return parse_bare(data,len,data,len);
  683. }
  684. int send_handshake(raw_info_t &raw_info,id_t id1,id_t id2,id_t id3)
  685. {
  686. packet_info_t &send_info=raw_info.send_info;
  687. packet_info_t &recv_info=raw_info.recv_info;
  688. char * data;int len;
  689. //len=sizeof(id_t)*3;
  690. if(numbers_to_char(id1,id2,id3,data,len)!=0) return -1;
  691. if(send_bare(raw_info,data,len)!=0) {mylog(log_warn,"send bare fail\n");return -1;}
  692. return 0;
  693. }
  694. /*
  695. int recv_handshake(packet_info_t &info,id_t &id1,id_t &id2,id_t &id3)
  696. {
  697. char * data;int len;
  698. if(recv_bare(info,data,len)!=0) return -1;
  699. if(char_to_numbers(data,len,id1,id2,id3)!=0) return -1;
  700. return 0;
  701. }*/
  702. int send_safer(conn_info_t &conn_info,const char* data,int len)
  703. {
  704. packet_info_t &send_info=conn_info.raw_info.send_info;
  705. packet_info_t &recv_info=conn_info.raw_info.recv_info;
  706. if(data[0]!='h'&&data[0]!='d')
  707. {
  708. mylog(log_warn,"first byte is not h or d ,%x\n",data[0]);
  709. return -1;
  710. }
  711. char send_data_buf[buf_len]; //buf for send data and send hb
  712. char send_data_buf2[buf_len];
  713. id_t n_tmp_id=htonl(conn_info.my_id);
  714. memcpy(send_data_buf,&n_tmp_id,sizeof(n_tmp_id));
  715. n_tmp_id=htonl(conn_info.oppsite_id);
  716. memcpy(send_data_buf+sizeof(n_tmp_id),&n_tmp_id,sizeof(n_tmp_id));
  717. anti_replay_seq_t n_seq=hton64(conn_info.blob->anti_replay.get_new_seq_for_send());
  718. memcpy(send_data_buf+sizeof(n_tmp_id)*2,&n_seq,sizeof(n_seq));
  719. memcpy(send_data_buf+sizeof(n_tmp_id)*2+sizeof(n_seq),data,len);//data;
  720. int new_len=len+sizeof(n_seq)+sizeof(n_tmp_id)*2;
  721. if(my_encrypt(send_data_buf,send_data_buf2,new_len,key)!=0)
  722. {
  723. return -1;
  724. }
  725. if(send_raw0(conn_info.raw_info,send_data_buf2,new_len)!=0) return -1;
  726. if(after_send_raw0(conn_info.raw_info)!=0) return -1;
  727. return 0;
  728. }
  729. int send_data_safer(conn_info_t &conn_info,const char* data,int len,u32_t conv_num)
  730. {
  731. packet_info_t &send_info=conn_info.raw_info.send_info;
  732. packet_info_t &recv_info=conn_info.raw_info.recv_info;
  733. char send_data_buf[buf_len];
  734. send_data_buf[0]='d';
  735. u32_t n_conv_num=htonl(conv_num);
  736. memcpy(send_data_buf+1,&n_conv_num,sizeof(n_conv_num));
  737. memcpy(send_data_buf+1+sizeof(n_conv_num),data,len);
  738. int new_len=len+1+sizeof(n_conv_num);
  739. send_safer(conn_info,send_data_buf,new_len);
  740. return 0;
  741. }
  742. int parse_safer(conn_info_t &conn_info,const char * input,int input_len,char* &data,int &len)//allow overlap
  743. {
  744. static char recv_data_buf0[buf_len];
  745. char *recv_data_buf=recv_data_buf0; //fix strict alias warning
  746. if(my_decrypt(input,recv_data_buf,input_len,key)!=0)
  747. {
  748. //printf("decrypt fail\n");
  749. return -1;
  750. }
  751. //char *a=recv_data_buf;
  752. id_t h_oppiste_id= ntohl ( *((id_t * )(recv_data_buf)) );
  753. id_t h_my_id= ntohl ( *((id_t * )(recv_data_buf+sizeof(id_t))) );
  754. anti_replay_seq_t h_seq= ntoh64 ( *((anti_replay_seq_t * )(recv_data_buf +sizeof(id_t) *2 )) );
  755. if(h_oppiste_id!=conn_info.oppsite_id||h_my_id!=conn_info.my_id)
  756. {
  757. mylog(log_warn,"id and oppsite_id verification failed %x %x %x %x \n",h_oppiste_id,conn_info.oppsite_id,h_my_id,conn_info.my_id);
  758. return -1;
  759. }
  760. if (conn_info.blob->anti_replay.is_vaild(h_seq) != 1) {
  761. mylog(log_debug,"dropped replay packet\n");
  762. return -1;
  763. }
  764. //printf("recv _len %d\n ",recv_len);
  765. data=recv_data_buf+sizeof(anti_replay_seq_t)+sizeof(id_t)*2;
  766. len=input_len-(sizeof(anti_replay_seq_t)+sizeof(id_t)*2 );
  767. if(data[0]!='h'&&data[0]!='d')
  768. {
  769. mylog(log_warn,"first byte is not h or d ,%x\n",data[0]);
  770. return -1;
  771. }
  772. if(len<0)
  773. {
  774. mylog(log_error,"len <0 ,%d\n",len);
  775. return -1;
  776. }
  777. if(after_recv_raw0(conn_info.raw_info)!=0) return -1;
  778. return 0;
  779. }
  780. int recv_safer(conn_info_t &conn_info,char* &data,int &len)
  781. {
  782. packet_info_t &send_info=conn_info.raw_info.send_info;
  783. packet_info_t &recv_info=conn_info.raw_info.recv_info;
  784. char * recv_data;int recv_len;
  785. static char recv_data_buf[buf_len];
  786. if(recv_raw0(conn_info.raw_info,recv_data,recv_len)!=0) return -1;
  787. return parse_safer(conn_info,recv_data,recv_len,data,len);
  788. }
  789. int try_to_list_and_bind(int port)
  790. {
  791. int old_bind_fd=bind_fd;
  792. if(raw_mode==mode_faketcp)
  793. {
  794. bind_fd=socket(AF_INET,SOCK_STREAM,0);
  795. }
  796. else if(raw_mode==mode_udp||raw_mode==mode_icmp)
  797. {
  798. bind_fd=socket(AF_INET,SOCK_DGRAM,0);
  799. }
  800. if(old_bind_fd!=-1)
  801. {
  802. close(old_bind_fd);
  803. }
  804. struct sockaddr_in temp_bind_addr;
  805. bzero(&temp_bind_addr, sizeof(temp_bind_addr));
  806. temp_bind_addr.sin_family = AF_INET;
  807. temp_bind_addr.sin_port = htons(port);
  808. temp_bind_addr.sin_addr.s_addr = local_address_uint32;
  809. if (bind(bind_fd, (struct sockaddr*)&temp_bind_addr, sizeof(temp_bind_addr)) !=0)
  810. {
  811. mylog(log_debug,"bind fail\n");
  812. return -1;
  813. }
  814. if(raw_mode==mode_faketcp)
  815. {
  816. if (listen(bind_fd, SOMAXCONN) != 0) {
  817. mylog(log_warn,"listen fail\n");
  818. return -1;
  819. }
  820. }
  821. return 0;
  822. }
  823. int client_bind_to_a_new_port()
  824. {
  825. int raw_send_port=10000+get_true_random_number()%(65535-10000);
  826. for(int i=0;i<1000;i++)//try 1000 times at max,this should be enough
  827. {
  828. if (try_to_list_and_bind(raw_send_port)==0)
  829. {
  830. return raw_send_port;
  831. }
  832. }
  833. mylog(log_fatal,"bind port fail\n");
  834. myexit(-1);
  835. return -1;////for compiler check
  836. }
  837. int set_timer(int epollfd,int &timer_fd)
  838. {
  839. int ret;
  840. epoll_event ev;
  841. itimerspec its;
  842. memset(&its,0,sizeof(its));
  843. if((timer_fd=timerfd_create(CLOCK_MONOTONIC,TFD_NONBLOCK)) < 0)
  844. {
  845. mylog(log_fatal,"timer_fd create error\n");
  846. myexit(1);
  847. }
  848. its.it_interval.tv_sec=(timer_interval/1000);
  849. its.it_interval.tv_nsec=(timer_interval%1000)*1000ll*1000ll;
  850. its.it_value.tv_nsec=1; //imidiately
  851. timerfd_settime(timer_fd,0,&its,0);
  852. ev.events = EPOLLIN;
  853. ev.data.u64 = timer_fd;
  854. ret=epoll_ctl(epollfd, EPOLL_CTL_ADD, timer_fd, &ev);
  855. if (ret < 0) {
  856. mylog(log_fatal,"epoll_ctl return %d\n", ret);
  857. myexit(-1);
  858. }
  859. return 0;
  860. }
  861. int set_timer_server(int epollfd,int &timer_fd)
  862. {
  863. int ret;
  864. epoll_event ev;
  865. itimerspec its;
  866. memset(&its,0,sizeof(its));
  867. if((timer_fd=timerfd_create(CLOCK_MONOTONIC,TFD_NONBLOCK)) < 0)
  868. {
  869. mylog(log_fatal,"timer_fd create error\n");
  870. myexit(1);
  871. }
  872. its.it_interval.tv_sec=(timer_interval/1000);
  873. its.it_interval.tv_nsec=(timer_interval%1000)*1000ll*1000ll;
  874. its.it_value.tv_nsec=1; //imidiately
  875. timerfd_settime(timer_fd,0,&its,0);
  876. ev.events = EPOLLIN;
  877. ev.data.u64 = pack_u64(2,timer_fd);
  878. ret=epoll_ctl(epollfd, EPOLL_CTL_ADD, timer_fd, &ev);
  879. if (ret < 0) {
  880. mylog(log_fatal,"epoll_ctl return %d\n", ret);
  881. myexit(-1);
  882. }
  883. return 0;
  884. }
  885. int client_on_timer(conn_info_t &conn_info) //for client
  886. {
  887. packet_info_t &send_info=conn_info.raw_info.send_info;
  888. packet_info_t &recv_info=conn_info.raw_info.recv_info;
  889. raw_info_t &raw_info=conn_info.raw_info;
  890. conn_info.blob->conv_manager.clear_inactive();
  891. mylog(log_trace,"timer!\n");
  892. mylog(log_trace,"<client_on_timer,send_info.ts_ack= %u>\n",send_info.ts_ack);
  893. if(conn_info.state.client_current_state==client_idle)
  894. {
  895. fail_time_counter++;
  896. if(fail_time_counter>max_fail_time)
  897. {
  898. mylog(log_fatal,"max_fail_time exceed");
  899. myexit(-1);
  900. }
  901. conn_info.blob->anti_replay.re_init();
  902. conn_info.my_id = get_true_random_number_nz(); ///todo no need to do this everytime
  903. if (source_port == 0)
  904. {
  905. send_info.src_port = client_bind_to_a_new_port();
  906. }
  907. else
  908. {
  909. send_info.src_port = source_port;
  910. }
  911. if (raw_mode == mode_icmp)
  912. {
  913. send_info.dst_port = send_info.src_port;
  914. }
  915. mylog(log_info, "using port %d\n", send_info.src_port);
  916. init_filter(send_info.src_port);
  917. if(raw_mode==mode_icmp||raw_mode==mode_udp)
  918. {
  919. conn_info.state.client_current_state=client_handshake1;
  920. mylog(log_info,"state changed from client_idle to client_pre_handshake\n");
  921. }
  922. if(raw_mode==mode_faketcp)
  923. {
  924. conn_info.state.client_current_state=client_tcp_handshake;
  925. mylog(log_info,"state changed from client_idle to client_tcp_handshake\n");
  926. }
  927. conn_info.last_state_time=get_current_time();
  928. conn_info.last_hb_sent_time=0;
  929. //dont return;
  930. }
  931. if(conn_info.state.client_current_state==client_tcp_handshake) //send and resend syn
  932. {
  933. assert(raw_mode==mode_faketcp);
  934. if (get_current_time() - conn_info.last_state_time > client_handshake_timeout)
  935. {
  936. conn_info.state.client_current_state = client_idle;
  937. mylog(log_info, "state back to client_idle from client_tcp_handshake\n");
  938. return 0;
  939. }
  940. else if (get_current_time() - conn_info.last_hb_sent_time > client_retry_interval)
  941. {
  942. if (raw_mode == mode_faketcp)
  943. {
  944. if (conn_info.last_hb_sent_time == 0)
  945. {
  946. send_info.psh = 0;
  947. send_info.syn = 1;
  948. send_info.ack = 0;
  949. send_info.ts_ack =0;
  950. send_info.seq=get_true_random_number();
  951. send_info.ack_seq=get_true_random_number();
  952. }
  953. }
  954. send_raw0(raw_info, 0, 0);
  955. conn_info.last_hb_sent_time = get_current_time();
  956. mylog(log_info, "(re)sent tcp syn\n");
  957. return 0;
  958. }
  959. else
  960. {
  961. return 0;
  962. }
  963. return 0;
  964. }
  965. else if(conn_info.state.client_current_state==client_handshake1)//send and resend handshake1
  966. {
  967. if(get_current_time()-conn_info.last_state_time>client_handshake_timeout)
  968. {
  969. conn_info.state.client_current_state=client_idle;
  970. mylog(log_info,"state back to client_idle from client_handshake1\n");
  971. return 0;
  972. }
  973. else if(get_current_time()-conn_info.last_hb_sent_time>client_retry_interval)
  974. {
  975. if(raw_mode==mode_faketcp)
  976. {
  977. if(conn_info.last_hb_sent_time==0)
  978. {
  979. send_info.seq++;
  980. send_info.ack_seq=recv_info.seq+1;
  981. send_info.ts_ack=recv_info.ts;
  982. raw_info.reserved_seq=send_info.seq;
  983. }
  984. send_info.seq=raw_info.reserved_seq;
  985. send_info.psh = 0;
  986. send_info.syn = 0;
  987. send_info.ack = 1;
  988. send_raw0(raw_info, 0, 0);
  989. send_handshake(raw_info,conn_info.my_id,0,const_id);
  990. send_info.seq+=raw_info.last_send_len;
  991. }
  992. else
  993. {
  994. send_handshake(raw_info,conn_info.my_id,0,const_id);
  995. if(raw_mode==mode_icmp)
  996. send_info.icmp_seq++;
  997. }
  998. conn_info.last_hb_sent_time=get_current_time();
  999. mylog(log_info,"(re)sent handshake1\n");
  1000. return 0;
  1001. }
  1002. else
  1003. {
  1004. return 0;
  1005. }
  1006. return 0;
  1007. }
  1008. else if(conn_info.state.client_current_state==client_handshake2)
  1009. {
  1010. if(get_current_time()-conn_info.last_state_time>client_handshake_timeout)
  1011. {
  1012. conn_info.state.client_current_state=client_idle;
  1013. mylog(log_info,"state back to client_idle from client_handshake2\n");
  1014. return 0;
  1015. }
  1016. else if(get_current_time()-conn_info.last_hb_sent_time>client_retry_interval)
  1017. {
  1018. if(raw_mode==mode_faketcp)
  1019. {
  1020. if(conn_info.last_hb_sent_time==0)
  1021. {
  1022. send_info.ack_seq=recv_info.seq+raw_info.last_recv_len;
  1023. send_info.ts_ack=recv_info.ts;
  1024. raw_info.reserved_seq=send_info.seq;
  1025. }
  1026. send_info.seq=raw_info.reserved_seq;
  1027. send_handshake(raw_info,conn_info.my_id,conn_info.oppsite_id,const_id);
  1028. send_info.seq+=raw_info.last_send_len;
  1029. }
  1030. else
  1031. {
  1032. send_handshake(raw_info,conn_info.my_id,conn_info.oppsite_id,const_id);
  1033. if(raw_mode==mode_icmp)
  1034. send_info.icmp_seq++;
  1035. }
  1036. conn_info.last_hb_sent_time=get_current_time();
  1037. mylog(log_info,"(re)sent handshake2\n");
  1038. return 0;
  1039. }
  1040. else
  1041. {
  1042. return 0;
  1043. }
  1044. return 0;
  1045. }
  1046. else if(conn_info.state.client_current_state==client_ready)
  1047. {
  1048. fail_time_counter=0;
  1049. mylog(log_trace,"time %llu,%llu\n",get_current_time(),conn_info.last_state_time);
  1050. if(get_current_time()-conn_info.last_hb_recv_time>client_conn_timeout)
  1051. {
  1052. conn_info.state.client_current_state=client_idle;
  1053. conn_info.my_id=get_true_random_number_nz();
  1054. mylog(log_info,"state back to client_idle from client_ready\n");
  1055. return 0;
  1056. }
  1057. if(get_current_time()-conn_info.last_hb_sent_time<heartbeat_interval)
  1058. {
  1059. return 0;
  1060. }
  1061. mylog(log_debug,"heartbeat sent <%x,%x>\n",conn_info.oppsite_id,conn_info.my_id);
  1062. send_safer(conn_info,(char *)"h",1);/////////////send
  1063. conn_info.last_hb_sent_time=get_current_time();
  1064. return 0;
  1065. }
  1066. else
  1067. {
  1068. mylog(log_fatal,"unknown state,this shouldnt happen.\n");
  1069. myexit(-1);
  1070. }
  1071. return 0;
  1072. }
  1073. int server_on_timer_multi(conn_info_t &conn_info)
  1074. {
  1075. mylog(log_trace,"server timer!\n");
  1076. raw_info_t &raw_info=conn_info.raw_info;
  1077. assert(conn_info.state.server_current_state==server_ready);
  1078. if(conn_info.state.server_current_state==server_ready)
  1079. {
  1080. conn_info.blob->conv_manager.clear_inactive();
  1081. /*
  1082. if( get_current_time()-conn_info.last_hb_recv_time>heartbeat_timeout )
  1083. {
  1084. mylog(log_trace,"%lld %lld\n",get_current_time(),conn_info.last_state_time);
  1085. conn_info.server_current_state=server_nothing;
  1086. //conn_manager.current_ready_ip=0;
  1087. //conn_manager.current_ready_port=0;
  1088. mylog(log_info,"changed state to server_nothing\n");
  1089. return 0;
  1090. }*/ //dont need to do this at server,conn_manger will clear expired connections
  1091. if(get_current_time()-conn_info.last_hb_sent_time<heartbeat_interval)
  1092. {
  1093. return 0;
  1094. }
  1095. send_safer(conn_info,(char *)"h",1); /////////////send
  1096. conn_info.last_hb_sent_time=get_current_time();
  1097. mylog(log_debug,"heart beat sent<%x,%x>\n",conn_info.my_id,conn_info.oppsite_id);
  1098. }
  1099. else
  1100. {
  1101. mylog(log_fatal,"this shouldnt happen!\n");
  1102. myexit(-1);
  1103. }
  1104. return 0;
  1105. }
  1106. int client_on_raw_recv(conn_info_t &conn_info)
  1107. {
  1108. char* data;int data_len;
  1109. packet_info_t &send_info=conn_info.raw_info.send_info;
  1110. packet_info_t &recv_info=conn_info.raw_info.recv_info;
  1111. raw_info_t &raw_info=conn_info.raw_info;
  1112. mylog(log_trace,"<client_on_raw_recv,send_info.ts_ack= %u>\n",send_info.ts_ack);
  1113. if(conn_info.state.client_current_state==client_idle )
  1114. {
  1115. recv(raw_recv_fd, 0,0, 0 );
  1116. }
  1117. else if(conn_info.state.client_current_state==client_tcp_handshake)//received syn ack
  1118. {
  1119. assert(raw_mode==mode_faketcp);
  1120. if(recv_raw0(raw_info,data,data_len)<0)
  1121. {
  1122. return -1;
  1123. }
  1124. if(recv_info.src_ip!=send_info.dst_ip||recv_info.src_port!=send_info.dst_port)
  1125. {
  1126. mylog(log_debug,"unexpected adress %x %x %d %d\n",recv_info.src_ip,send_info.dst_ip,recv_info.src_port,send_info.dst_port);
  1127. return -1;
  1128. }
  1129. if(data_len==0&&raw_info.recv_info.syn==1&&raw_info.recv_info.ack==1)
  1130. {
  1131. if(recv_info.ack_seq!=send_info.seq+1)
  1132. {
  1133. mylog(log_debug,"seq ack_seq mis match\n");
  1134. return -1;
  1135. }
  1136. conn_info.state.client_current_state = client_handshake1;
  1137. mylog(log_info,"state changed from client_tcp_handshake to client_handshake1\n");
  1138. conn_info.last_state_time = get_current_time();
  1139. conn_info.last_hb_sent_time=0;
  1140. client_on_timer(conn_info);
  1141. return 0;
  1142. }
  1143. else
  1144. {
  1145. mylog(log_debug,"unexpected packet type,expected:syn ack\n");
  1146. return -1;
  1147. }
  1148. }
  1149. else if(conn_info.state.client_current_state==client_handshake1)//recevied respond of handshake1
  1150. {
  1151. if(recv_bare(raw_info,data,data_len)!=0)
  1152. {
  1153. mylog(log_debug,"recv_bare failed!\n");
  1154. return -1;
  1155. }
  1156. if(recv_info.src_ip!=send_info.dst_ip||recv_info.src_port!=send_info.dst_port)
  1157. {
  1158. mylog(log_debug,"unexpected adress %x %x %d %d\n",recv_info.src_ip,send_info.dst_ip,recv_info.src_port,send_info.dst_port);
  1159. return -1;
  1160. }
  1161. if(data_len<int( 3*sizeof(id_t)))
  1162. {
  1163. mylog(log_debug,"too short to be a handshake\n");
  1164. return -1;
  1165. }
  1166. id_t tmp_oppsite_id= ntohl(* ((u32_t *)&data[0]));
  1167. id_t tmp_my_id=ntohl(* ((u32_t *)&data[sizeof(id_t)]));
  1168. id_t tmp_oppsite_const_id=ntohl(* ((u32_t *)&data[sizeof(id_t)*2]));
  1169. if(tmp_my_id!=conn_info.my_id)
  1170. {
  1171. mylog(log_debug,"tmp_my_id doesnt match\n");
  1172. return -1;
  1173. }
  1174. if(raw_mode==mode_faketcp)
  1175. {
  1176. if(recv_info.ack_seq!=send_info.seq)
  1177. {
  1178. mylog(log_debug,"seq ack_seq mis match\n");
  1179. return -1;
  1180. }
  1181. if(recv_info.seq!=send_info.ack_seq)
  1182. {
  1183. mylog(log_debug,"seq ack_seq mis match\n");
  1184. return -1;
  1185. }
  1186. }
  1187. conn_info.oppsite_id=tmp_oppsite_id;
  1188. mylog(log_info,"changed state from to client_handshake1 to client_handshake2,my_id is %x,oppsite id is %x\n",conn_info.my_id,conn_info.oppsite_id);
  1189. //send_handshake(raw_info,conn_info.my_id,conn_info.oppsite_id,const_id); //////////////send
  1190. conn_info.state.client_current_state = client_handshake2;
  1191. conn_info.last_state_time = get_current_time();
  1192. conn_info.last_hb_sent_time=0;
  1193. client_on_timer(conn_info);
  1194. return 0;
  1195. }
  1196. else if(conn_info.state.client_current_state==client_handshake2||conn_info.state.client_current_state==client_ready)//received heartbeat or data
  1197. {
  1198. if(recv_safer(conn_info,data,data_len)!=0)
  1199. {
  1200. mylog(log_debug,"recv_safer failed!\n");
  1201. return -1;
  1202. }
  1203. if(recv_info.src_ip!=send_info.dst_ip||recv_info.src_port!=send_info.dst_port)
  1204. {
  1205. mylog(log_warn,"unexpected adress %x %x %d %d,this shouldnt happen.\n",recv_info.src_ip,send_info.dst_ip,recv_info.src_port,send_info.dst_port);
  1206. return -1;
  1207. }
  1208. if(conn_info.state.client_current_state==client_handshake2)
  1209. {
  1210. mylog(log_info,"changed state from to client_handshake2 to client_ready\n");
  1211. conn_info.state.client_current_state=client_ready;
  1212. conn_info.last_hb_sent_time=0;
  1213. conn_info.last_hb_recv_time=get_current_time();
  1214. client_on_timer(conn_info);
  1215. }
  1216. if(data_len==1&&data[0]=='h')
  1217. {
  1218. mylog(log_debug,"[hb]heart beat received\n");
  1219. conn_info.last_hb_recv_time=get_current_time();
  1220. return 0;
  1221. }
  1222. else if(data_len>= int( sizeof(u32_t)+1 )&&data[0]=='d')
  1223. {
  1224. mylog(log_trace,"received a data from fake tcp,len:%d\n",data_len);
  1225. conn_info.last_hb_recv_time=get_current_time();
  1226. u32_t tmp_conv_id= ntohl(* ((u32_t *)&data[1]));
  1227. if(!conn_info.blob->conv_manager.is_conv_used(tmp_conv_id))
  1228. {
  1229. mylog(log_info,"unknow conv %d,ignore\n",tmp_conv_id);
  1230. return 0;
  1231. }
  1232. conn_info.blob->conv_manager.update_active_time(tmp_conv_id);
  1233. u64_t u64=conn_info.blob->conv_manager.find_u64_by_conv(tmp_conv_id);
  1234. sockaddr_in tmp_sockaddr;
  1235. tmp_sockaddr.sin_family = AF_INET;
  1236. tmp_sockaddr.sin_addr.s_addr=(u64>>32u);
  1237. tmp_sockaddr.sin_port= htons(uint16_t((u64<<32u)>>32u));
  1238. int ret=sendto(udp_fd,data+1+sizeof(u32_t),data_len -(1+sizeof(u32_t)),0,(struct sockaddr *)&tmp_sockaddr,sizeof(tmp_sockaddr));
  1239. if(ret<0)
  1240. {
  1241. mylog(log_warn,"sento returned %d\n",ret);
  1242. //perror("ret<0");
  1243. }
  1244. mylog(log_trace,"%s :%d\n",inet_ntoa(tmp_sockaddr.sin_addr),ntohs(tmp_sockaddr.sin_port));
  1245. mylog(log_trace,"%d byte sent\n",ret);
  1246. }
  1247. else
  1248. {
  1249. mylog(log_warn,"unknown packet,this shouldnt happen.\n");
  1250. return -1;
  1251. }
  1252. return 0;
  1253. }
  1254. else
  1255. {
  1256. mylog(log_fatal,"unknown state,this shouldnt happen.\n");
  1257. myexit(-1);
  1258. }
  1259. return 0;
  1260. }
  1261. int server_on_raw_recv_multi()
  1262. {
  1263. char dummy_buf[buf_len];
  1264. packet_info_t peek_info;
  1265. if(peek_raw(peek_info)<0)
  1266. {
  1267. recv(raw_recv_fd, 0,0, 0 );//
  1268. //struct sockaddr saddr;
  1269. //socklen_t saddr_size;
  1270. ///recvfrom(raw_recv_fd, 0,0, 0 ,&saddr , &saddr_size);//
  1271. mylog(log_trace,"peek_raw failed\n");
  1272. return -1;
  1273. }
  1274. u32_t ip=peek_info.src_ip;uint16_t port=peek_info.src_port;
  1275. mylog(log_trace,"peek_raw %s %d\n",my_ntoa(ip),port);
  1276. char ip_port[40];
  1277. sprintf(ip_port,"%s:%d",my_ntoa(ip),port);
  1278. int data_len; char *data;
  1279. if(raw_mode==mode_faketcp&&peek_info.syn==1)
  1280. {
  1281. if(!conn_manager.exist(ip,port)||conn_manager.find_insert(ip,port).state.server_current_state!=server_ready)
  1282. {
  1283. raw_info_t tmp_raw_info;
  1284. if(recv_raw0(tmp_raw_info,data,data_len)<0)
  1285. {
  1286. return 0;
  1287. }
  1288. raw_info_t &raw_info=tmp_raw_info;
  1289. packet_info_t &send_info=raw_info.send_info;
  1290. packet_info_t &recv_info=raw_info.recv_info;
  1291. send_info.src_ip=recv_info.dst_ip;
  1292. send_info.src_port=recv_info.dst_port;
  1293. send_info.dst_port = recv_info.src_port;
  1294. send_info.dst_ip = recv_info.src_ip;
  1295. if(data_len==0&&raw_info.recv_info.syn==1&&raw_info.recv_info.ack==0)
  1296. {
  1297. send_info.ack_seq = recv_info.seq + 1;
  1298. send_info.psh = 0;
  1299. send_info.syn = 1;
  1300. send_info.ack = 1;
  1301. send_info.ts_ack=recv_info.ts;
  1302. mylog(log_info,"received syn,sent syn ack back\n");
  1303. send_raw0(raw_info, 0, 0);
  1304. return 0;
  1305. }
  1306. }
  1307. return 0;
  1308. }
  1309. if(!conn_manager.exist(ip,port))
  1310. {
  1311. if(conn_manager.mp.size()>=max_handshake_conn_num)
  1312. {
  1313. mylog(log_info,"[%s]reached max_handshake_conn_num,ignored new handshake\n",ip_port);
  1314. recv(raw_recv_fd, 0,0, 0 );//
  1315. return 0;
  1316. }
  1317. raw_info_t tmp_raw_info;
  1318. if(raw_mode==mode_icmp)
  1319. {
  1320. tmp_raw_info.send_info.dst_port=tmp_raw_info.send_info.src_port=port;
  1321. }
  1322. if(recv_bare(tmp_raw_info,data,data_len)<0)
  1323. {
  1324. return 0;
  1325. }
  1326. if(data_len<int( 3*sizeof(id_t)))
  1327. {
  1328. mylog(log_debug,"[%s]too short to be a handshake\n",ip_port);
  1329. return -1;
  1330. }
  1331. id_t zero=ntohl(* ((u32_t *)&data[sizeof(id_t)]));
  1332. if(zero!=0)
  1333. {
  1334. mylog(log_debug,"[%s]not a invalid initial handshake\n",ip_port);
  1335. return -1;
  1336. }
  1337. mylog(log_info,"[%s]got packet from a new ip\n",ip_port);
  1338. conn_info_t &conn_info=conn_manager.find_insert(ip,port);
  1339. conn_info.raw_info=tmp_raw_info;
  1340. packet_info_t &send_info=conn_info.raw_info.send_info;
  1341. packet_info_t &recv_info=conn_info.raw_info.recv_info;
  1342. raw_info_t &raw_info=conn_info.raw_info;
  1343. send_info.src_ip=recv_info.dst_ip;
  1344. send_info.src_port=recv_info.dst_port;
  1345. send_info.dst_port = recv_info.src_port;
  1346. send_info.dst_ip = recv_info.src_ip;
  1347. id_t tmp_oppsite_id= ntohl(* ((u32_t *)&data[0]));
  1348. mylog(log_info,"handshake received %x\n",tmp_oppsite_id);
  1349. conn_info.my_id=get_true_random_number_nz();
  1350. mylog(log_info,"[%s]created new conn,state: server_handshake1,my_id is %x\n",ip_port,conn_info.my_id);
  1351. conn_info.state.server_current_state = server_handshake1;
  1352. conn_info.last_state_time = get_current_time();
  1353. server_on_raw_recv_handshake1(conn_info,tmp_oppsite_id);
  1354. return 0;
  1355. }
  1356. conn_info_t & conn_info=conn_manager.find_insert(ip,port);//insert if not exist
  1357. packet_info_t &send_info=conn_info.raw_info.send_info;
  1358. packet_info_t &recv_info=conn_info.raw_info.recv_info;
  1359. raw_info_t &raw_info=conn_info.raw_info;
  1360. if(conn_info.state.server_current_state==server_handshake1)
  1361. {
  1362. if(recv_bare(raw_info,data,data_len)<0)
  1363. {
  1364. return -1;
  1365. }
  1366. if(data_len<int( 3*sizeof(id_t)))
  1367. {
  1368. mylog(log_debug,"[%s] data_len=%d too short to be a handshake\n",ip_port,data_len);
  1369. return -1;
  1370. }
  1371. id_t tmp_oppsite_id= ntohl(* ((u32_t *)&data[0]));
  1372. id_t tmp_my_id=ntohl(* ((u32_t *)&data[sizeof(id_t)]));
  1373. if(tmp_my_id==0) //received init handshake again
  1374. {
  1375. server_on_raw_recv_handshake1(conn_info,tmp_oppsite_id);
  1376. mylog(log_info,"[%s]changed state to server_handshake1,my_id is %x\n",ip_port,conn_info.my_id);
  1377. }
  1378. else if(tmp_my_id==conn_info.my_id)
  1379. {
  1380. conn_info.oppsite_id=tmp_oppsite_id;
  1381. id_t tmp_oppsite_const_id=ntohl(* ((u32_t *)&data[sizeof(id_t)*2]));
  1382. if(raw_mode==mode_faketcp)
  1383. {
  1384. send_info.seq=recv_info.ack_seq;
  1385. send_info.ack_seq=recv_info.seq+raw_info.last_recv_len;
  1386. send_info.ts_ack=recv_info.ts;
  1387. }
  1388. if(raw_mode==mode_icmp)
  1389. {
  1390. send_info.icmp_seq=recv_info.icmp_seq;
  1391. }
  1392. server_on_raw_recv_pre_ready(conn_info,tmp_oppsite_const_id);
  1393. }
  1394. else
  1395. {
  1396. mylog(log_debug,"[%s]invalid my_id %x,my_id is %x\n",ip_port,tmp_my_id,conn_info.my_id);
  1397. }
  1398. return 0;
  1399. }
  1400. if(conn_info.state.server_current_state==server_ready)
  1401. {
  1402. return server_on_raw_recv_ready(conn_info);
  1403. }
  1404. return 0;
  1405. }
  1406. int server_on_raw_recv_handshake1(conn_info_t &conn_info,id_t tmp_oppsite_id )
  1407. {
  1408. packet_info_t &send_info=conn_info.raw_info.send_info;
  1409. packet_info_t &recv_info=conn_info.raw_info.recv_info;
  1410. raw_info_t &raw_info=conn_info.raw_info;
  1411. if(raw_mode==mode_faketcp)
  1412. {
  1413. send_info.seq=recv_info.ack_seq;
  1414. send_info.ack_seq=recv_info.seq+raw_info.last_recv_len;
  1415. send_info.ts_ack=recv_info.ts;
  1416. }
  1417. if(raw_mode==mode_icmp)
  1418. {
  1419. send_info.icmp_seq=recv_info.icmp_seq;
  1420. }
  1421. send_handshake(raw_info,conn_info.my_id,tmp_oppsite_id,const_id); //////////////send
  1422. return 0;
  1423. }
  1424. int server_on_raw_recv_ready(conn_info_t &conn_info)
  1425. {
  1426. int data_len; char *data;
  1427. raw_info_t &raw_info = conn_info.raw_info;
  1428. packet_info_t &send_info = conn_info.raw_info.send_info;
  1429. packet_info_t &recv_info = conn_info.raw_info.recv_info;
  1430. char ip_port[40];
  1431. sprintf(ip_port,"%s:%d",my_ntoa(recv_info.src_ip),recv_info.src_port);
  1432. if (recv_safer(conn_info, data, data_len) != 0) {
  1433. return -1;
  1434. }
  1435. if (recv_info.src_ip != send_info.dst_ip
  1436. || recv_info.src_port != send_info.dst_port) {
  1437. mylog(log_debug, "unexpected adress\n");
  1438. return 0;
  1439. }
  1440. if (data[0] == 'h' && data_len == 1) {
  1441. u32_t tmp = ntohl(*((u32_t *) &data[1 + sizeof(u32_t)]));
  1442. mylog(log_debug,"[%s][hb]received hb \n",ip_port);
  1443. conn_info.last_hb_recv_time = get_current_time();
  1444. return 0;
  1445. } else if (data[0] == 'd' && data_len >=int( sizeof(u32_t) + 1))
  1446. {
  1447. u32_t tmp_conv_id = ntohl(*((u32_t *) &data[1]));
  1448. conn_info.last_hb_recv_time = get_current_time();
  1449. mylog(log_trace, "conv:%u\n", tmp_conv_id);
  1450. if (!conn_info.blob->conv_manager.is_conv_used(tmp_conv_id)) {
  1451. if (conn_info.blob->conv_manager.get_size() >= max_conv_num) {
  1452. mylog(log_warn,
  1453. "ignored new conv %x connect bc max_conv_num exceed\n",
  1454. tmp_conv_id);
  1455. return 0;
  1456. }
  1457. struct sockaddr_in remote_addr_in;
  1458. socklen_t slen = sizeof(sockaddr_in);
  1459. memset(&remote_addr_in, 0, sizeof(remote_addr_in));
  1460. remote_addr_in.sin_family = AF_INET;
  1461. remote_addr_in.sin_port = htons(remote_port);
  1462. remote_addr_in.sin_addr.s_addr = remote_address_uint32;
  1463. int new_udp_fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  1464. if (new_udp_fd < 0) {
  1465. mylog(log_warn, "create udp_fd error\n");
  1466. return -1;
  1467. }
  1468. setnonblocking(new_udp_fd);
  1469. set_buf_size(new_udp_fd);
  1470. mylog(log_debug, "created new udp_fd %d\n", new_udp_fd);
  1471. int ret = connect(new_udp_fd, (struct sockaddr *) &remote_addr_in,
  1472. slen);
  1473. if (ret != 0) {
  1474. mylog(log_warn, "udp fd connect fail\n");
  1475. close(new_udp_fd);
  1476. return -1;
  1477. }
  1478. struct epoll_event ev;
  1479. u64_t u64 = (u32_t(new_udp_fd))+(1llu<<32u);
  1480. mylog(log_trace, "u64: %lld\n", u64);
  1481. ev.events = EPOLLIN;
  1482. ev.data.u64 = u64;
  1483. ret = epoll_ctl(epollfd, EPOLL_CTL_ADD, new_udp_fd, &ev);
  1484. if (ret != 0) {
  1485. mylog(log_warn, "add udp_fd error\n");
  1486. close(new_udp_fd);
  1487. return -1;
  1488. }
  1489. conn_info.blob->conv_manager.insert_conv(tmp_conv_id, new_udp_fd);
  1490. assert(conn_manager.udp_fd_mp.find(new_udp_fd)==conn_manager.udp_fd_mp.end());
  1491. conn_manager.udp_fd_mp[new_udp_fd] = &conn_info;
  1492. //pack_u64(conn_info.raw_info.recv_info.src_ip,conn_info.raw_info.recv_info.src_port);
  1493. mylog(log_info, "new conv conv_id=%x, assigned fd=%d\n",
  1494. tmp_conv_id, new_udp_fd);
  1495. }
  1496. u64_t u64 = conn_info.blob->conv_manager.find_u64_by_conv(tmp_conv_id);
  1497. conn_info.blob->conv_manager.update_active_time(tmp_conv_id);
  1498. int fd = int((u64 << 32u) >> 32u);
  1499. mylog(log_trace, "received a data from fake tcp,len:%d\n", data_len);
  1500. int ret = send(fd, data + 1 + sizeof(u32_t),
  1501. data_len - (1 + sizeof(u32_t)), 0);
  1502. mylog(log_trace, "%d byte sent ,fd :%d\n ", ret, fd);
  1503. if (ret < 0) {
  1504. mylog(log_warn, "send returned %d\n", ret);
  1505. //perror("what happened????");
  1506. }
  1507. return 0;
  1508. }
  1509. return 0;
  1510. }
  1511. int server_on_raw_recv_pre_ready(conn_info_t &conn_info,u32_t tmp_oppsite_const_id)
  1512. {
  1513. u32_t ip;uint16_t port;
  1514. ip=conn_info.raw_info.recv_info.src_ip;
  1515. port=conn_info.raw_info.recv_info.src_port;
  1516. char ip_port[40];
  1517. sprintf(ip_port,"%s:%d",my_ntoa(ip),port);
  1518. mylog(log_info,"[%s]received handshake oppsite_id:%x my_id:%x\n",ip_port,conn_info.oppsite_id,conn_info.my_id);
  1519. mylog(log_info,"[%s]oppsite const_id:%x \n",ip_port,tmp_oppsite_const_id);
  1520. if(conn_manager.const_id_mp.find(tmp_oppsite_const_id)==conn_manager.const_id_mp.end())
  1521. {
  1522. //conn_manager.const_id_mp=
  1523. if(conn_manager.ready_num>=max_ready_conn_num)
  1524. {
  1525. mylog(log_info,"[%s]max_ready_conn_num,cant turn to ready\n",ip_port);
  1526. conn_info.state.server_current_state =server_idle;
  1527. return 0;
  1528. }
  1529. conn_info.prepare();
  1530. conn_info.state.server_current_state = server_ready;
  1531. conn_info.oppsite_const_id=tmp_oppsite_const_id;
  1532. conn_manager.ready_num++;
  1533. conn_manager.const_id_mp[tmp_oppsite_const_id]=&conn_info;
  1534. //conn_info.last_state_time=get_current_time(); //dont change this!!!!!!!!!!!!!!!!!!!!!!!!!
  1535. //conn_manager.current_ready_ip=ip;
  1536. //conn_manager.current_ready_port=port;
  1537. //my_id=conn_info.my_id;
  1538. //oppsite_id=conn_info.oppsite_id;
  1539. conn_info.last_hb_recv_time = get_current_time();
  1540. conn_info.last_hb_sent_time = conn_info.last_hb_recv_time;//=get_current_time()
  1541. send_safer(conn_info, (char *) "h", 1); /////////////send
  1542. mylog(log_info, "[%s]changed state to server_ready\n",ip_port);
  1543. conn_info.blob->anti_replay.re_init();
  1544. //g_conn_info=conn_info;
  1545. int new_timer_fd;
  1546. set_timer_server(epollfd, new_timer_fd);
  1547. conn_info.timer_fd=new_timer_fd;
  1548. assert(conn_manager.timer_fd_mp.find(new_timer_fd)==conn_manager.timer_fd_mp.end());
  1549. conn_manager.timer_fd_mp[new_timer_fd] = &conn_info;//pack_u64(ip,port);
  1550. //timer_fd_mp[new_timer_fd]
  1551. /*
  1552. if(oppsite_const_id!=0&&tmp_oppsite_const_id!=oppsite_const_id) //TODO MOVE TO READY
  1553. {
  1554. mylog(log_info,"cleared all conv bc of const id doesnt match\n");
  1555. conv_manager.clear();
  1556. }*/
  1557. //oppsite_const_id=tmp_oppsite_const_id;
  1558. }
  1559. else
  1560. {
  1561. conn_info_t &ori_conn_info=*conn_manager.const_id_mp[tmp_oppsite_const_id];
  1562. if(ori_conn_info.state.server_current_state==server_ready)
  1563. {
  1564. if(conn_info.last_state_time<ori_conn_info.last_state_time)
  1565. {
  1566. mylog(log_info,"[%s]conn_info.last_state_time<ori_conn_info.last_state_time. ignored new handshake\n",ip_port);
  1567. conn_info.state.server_current_state=server_idle;
  1568. conn_info.oppsite_const_id=0;
  1569. return 0;
  1570. }
  1571. if(!conn_manager.exist(ori_conn_info.raw_info.recv_info.src_ip,ori_conn_info.raw_info.recv_info.src_port))//TODO remove this
  1572. {
  1573. mylog(log_fatal,"[%s]this shouldnt happen\n",ip_port);
  1574. myexit(-1);
  1575. }
  1576. if(!conn_manager.exist(conn_info.raw_info.recv_info.src_ip,conn_info.raw_info.recv_info.src_port))//TODO remove this
  1577. {
  1578. mylog(log_fatal,"[%s]this shouldnt happen2\n",ip_port);
  1579. myexit(-1);
  1580. }
  1581. conn_info_t *&p_ori=conn_manager.find_insert_p(ori_conn_info.raw_info.recv_info.src_ip,ori_conn_info.raw_info.recv_info.src_port);
  1582. conn_info_t *&p=conn_manager.find_insert_p(conn_info.raw_info.recv_info.src_ip,conn_info.raw_info.recv_info.src_port);
  1583. conn_info_t *tmp=p;
  1584. p=p_ori;
  1585. p_ori=tmp;
  1586. mylog(log_info,"[%s]grabbed a connection\n",ip_port);
  1587. //ori_conn_info.state.server_current_state=server_ready;
  1588. ori_conn_info.recover(conn_info);
  1589. send_safer(ori_conn_info, (char *) "h", 1);
  1590. //ori_conn_info.blob->anti_replay.re_init();
  1591. conn_info.state.server_current_state=server_idle;
  1592. conn_info.oppsite_const_id=0;
  1593. }
  1594. else
  1595. {
  1596. mylog(log_fatal,"[%s]this should never happen\n",ip_port);
  1597. myexit(-1);
  1598. }
  1599. return 0;
  1600. }
  1601. return 0;
  1602. }
  1603. int get_src_adress(u32_t &ip)
  1604. {
  1605. struct sockaddr_in remote_addr_in;
  1606. socklen_t slen = sizeof(sockaddr_in);
  1607. memset(&remote_addr_in, 0, sizeof(remote_addr_in));
  1608. remote_addr_in.sin_family = AF_INET;
  1609. remote_addr_in.sin_port = htons(remote_port);
  1610. remote_addr_in.sin_addr.s_addr = remote_address_uint32;
  1611. int new_udp_fd=socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  1612. if(new_udp_fd<0)
  1613. {
  1614. mylog(log_warn,"create udp_fd error\n");
  1615. return -1;
  1616. }
  1617. set_buf_size(new_udp_fd);
  1618. mylog(log_debug,"created new udp_fd %d\n",new_udp_fd);
  1619. int ret = connect(new_udp_fd, (struct sockaddr *) &remote_addr_in, slen);
  1620. if(ret!=0)
  1621. {
  1622. mylog(log_warn,"udp fd connect fail\n");
  1623. close(new_udp_fd);
  1624. return -1;
  1625. }
  1626. struct sockaddr_in my_addr;
  1627. unsigned int len=sizeof(my_addr);
  1628. if(getsockname(new_udp_fd, (struct sockaddr *) &my_addr, &len)!=0) return -1;
  1629. ip=my_addr.sin_addr.s_addr;
  1630. close(new_udp_fd);
  1631. return 0;
  1632. }
  1633. int client_event_loop()
  1634. {
  1635. char buf[buf_len];
  1636. conn_info_t conn_info;
  1637. conn_info.my_id=get_true_random_number_nz();
  1638. conn_info.prepare();
  1639. packet_info_t &send_info=conn_info.raw_info.send_info;
  1640. packet_info_t &recv_info=conn_info.raw_info.recv_info;
  1641. //printf("?????\n");
  1642. if(source_address_uint32==0)
  1643. {
  1644. mylog(log_info,"get_src_adress called\n");
  1645. if(get_src_adress(source_address_uint32)!=0)
  1646. {
  1647. mylog(log_fatal,"the trick to auto get source ip failed,you should specific an ip by --source-ip\n");
  1648. myexit(-1);
  1649. }
  1650. }
  1651. in_addr tmp;
  1652. tmp.s_addr=source_address_uint32;
  1653. mylog(log_info,"source ip = %s\n",inet_ntoa(tmp));
  1654. //printf("done\n");
  1655. if(try_to_list_and_bind(source_port)!=0)
  1656. {
  1657. mylog(log_fatal,"bind to source_port:%d fail\n ",source_port);
  1658. myexit(-1);
  1659. }
  1660. send_info.src_port=source_port;
  1661. send_info.src_ip = source_address_uint32;
  1662. int i, j, k;int ret;
  1663. init_raw_socket();
  1664. //init_filter(source_port);
  1665. send_info.dst_ip=remote_address_uint32;
  1666. send_info.dst_port=remote_port;
  1667. //g_packet_info.src_ip=source_address_uint32;
  1668. //g_packet_info.src_port=source_port;
  1669. udp_fd=socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  1670. set_buf_size(udp_fd);
  1671. int yes = 1;
  1672. //setsockopt(udp_fd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(yes));
  1673. struct sockaddr_in local_me;
  1674. socklen_t slen = sizeof(sockaddr_in);
  1675. memset(&local_me, 0, sizeof(local_me));
  1676. local_me.sin_family = AF_INET;
  1677. local_me.sin_port = htons(local_port);
  1678. local_me.sin_addr.s_addr = local_address_uint32;
  1679. if (bind(udp_fd, (struct sockaddr*) &local_me, slen) == -1) {
  1680. mylog(log_fatal,"socket bind error\n");
  1681. //perror("socket bind error");
  1682. myexit(1);
  1683. }
  1684. setnonblocking(udp_fd);
  1685. epollfd = epoll_create1(0);
  1686. const int max_events = 4096;
  1687. struct epoll_event ev, events[max_events];
  1688. if (epollfd < 0) {
  1689. mylog(log_fatal,"epoll return %d\n", epollfd);
  1690. myexit(-1);
  1691. }
  1692. ev.events = EPOLLIN;
  1693. ev.data.u64 = udp_fd;
  1694. ret = epoll_ctl(epollfd, EPOLL_CTL_ADD, udp_fd, &ev);
  1695. if (ret!=0) {
  1696. mylog(log_fatal,"add udp_listen_fd error\n");
  1697. myexit(-1);
  1698. }
  1699. ev.events = EPOLLIN;
  1700. ev.data.u64 = raw_recv_fd;
  1701. ret = epoll_ctl(epollfd, EPOLL_CTL_ADD, raw_recv_fd, &ev);
  1702. if (ret!= 0) {
  1703. mylog(log_fatal,"add raw_fd error\n");
  1704. myexit(-1);
  1705. }
  1706. ////add_timer for fake_tcp_keep_connection_client
  1707. //sleep(10);
  1708. //memset(&udp_old_addr_in,0,sizeof(sockaddr_in));
  1709. int unbind=1;
  1710. set_timer(epollfd,timer_fd);
  1711. mylog(log_debug,"send_raw : from %x %d to %x %d\n",send_info.src_ip,send_info.src_port,send_info.dst_ip,send_info.dst_port);
  1712. while(1)////////////////////////
  1713. {
  1714. epoll_trigger_counter++;
  1715. int nfds = epoll_wait(epollfd, events, max_events, 180 * 1000);
  1716. if (nfds < 0) { //allow zero
  1717. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  1718. myexit(-1);
  1719. }
  1720. int idx;
  1721. for (idx = 0; idx < nfds; ++idx) {
  1722. if (events[idx].data.u64 == (u64_t)raw_recv_fd)
  1723. {
  1724. iphdr *iph;tcphdr *tcph;
  1725. client_on_raw_recv(conn_info);
  1726. }
  1727. else if(events[idx].data.u64 ==(u64_t)timer_fd)
  1728. {
  1729. u64_t value;
  1730. read(timer_fd, &value, 8);
  1731. client_on_timer(conn_info);
  1732. mylog(log_trace,"epoll_trigger_counter: %d \n",epoll_trigger_counter);
  1733. epoll_trigger_counter=0;
  1734. }
  1735. else if (events[idx].data.u64 == (u64_t)udp_fd)
  1736. {
  1737. int recv_len;
  1738. struct sockaddr_in udp_new_addr_in;
  1739. if ((recv_len = recvfrom(udp_fd, buf, buf_len, 0,
  1740. (struct sockaddr *) &udp_new_addr_in, &slen)) == -1) {
  1741. mylog(log_error,"recv_from error,this shouldnt happen at client\n");
  1742. myexit(1);
  1743. };
  1744. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  1745. ntohs(udp_new_addr_in.sin_port),recv_len);
  1746. /*
  1747. if(udp_old_addr_in.sin_addr.s_addr==0&&udp_old_addr_in.sin_port==0)
  1748. {
  1749. memcpy(&udp_old_addr_in,&udp_new_addr_in,sizeof(udp_new_addr_in));
  1750. }
  1751. else if(udp_new_addr_in.sin_addr.s_addr!=udp_old_addr_in.sin_addr.s_addr
  1752. ||udp_new_addr_in.sin_port!=udp_old_addr_in.sin_port)
  1753. {
  1754. if(get_current_time()- last_udp_recv_time <udp_timeout)
  1755. {
  1756. printf("new <ip,port> connected in,ignored,bc last connection is still active\n");
  1757. continue;
  1758. }
  1759. else
  1760. {
  1761. printf("new <ip,port> connected in,accpeted\n");
  1762. memcpy(&udp_old_addr_in,&udp_new_addr_in,sizeof(udp_new_addr_in));
  1763. conv_id++;
  1764. }
  1765. }*/
  1766. //last_udp_recv_time=get_current_time();
  1767. u64_t u64=((u64_t(udp_new_addr_in.sin_addr.s_addr))<<32u)+ntohs(udp_new_addr_in.sin_port);
  1768. u32_t conv;
  1769. if(!conn_info.blob->conv_manager.is_u64_used(u64))
  1770. {
  1771. if(conn_info.blob->conv_manager.get_size() >=max_conv_num)
  1772. {
  1773. mylog(log_warn,"ignored new udp connect bc max_conv_num exceed\n");
  1774. continue;
  1775. }
  1776. conv=conn_info.blob->conv_manager.get_new_conv();
  1777. conn_info.blob->conv_manager.insert_conv(conv,u64);
  1778. mylog(log_info,"new packet from %s:%d,conv_id=%x\n",inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port),conv);
  1779. }
  1780. else
  1781. {
  1782. conv=conn_info.blob->conv_manager.find_conv_by_u64(u64);
  1783. }
  1784. conn_info.blob->conv_manager.update_active_time(conv);
  1785. if(conn_info.state.client_current_state==client_ready)
  1786. {
  1787. /*
  1788. char buf2[6000];
  1789. int ret1=send_raw(conn_info.raw_info,buf2,40);
  1790. int ret2=send_raw(conn_info.raw_info,buf2,500);
  1791. int ret3=send_raw(conn_info.raw_info,buf2,1000);
  1792. int ret4=send_raw(conn_info.raw_info,buf2,2000);
  1793. mylog(log_warn,"ret= %d %d %d %d\n",ret1,ret2,ret3,ret4);*/
  1794. send_data_safer(conn_info,buf,recv_len,conv);
  1795. }
  1796. }
  1797. else
  1798. {
  1799. mylog(log_fatal,"unknown fd,this should never happen\n");
  1800. myexit(-1);
  1801. }
  1802. }
  1803. }
  1804. return 0;
  1805. }
  1806. int server_event_loop()
  1807. {
  1808. char buf[buf_len];
  1809. int i, j, k;int ret;
  1810. bind_address_uint32=local_address_uint32;//only server has bind adress,client sets it to zero
  1811. if(raw_mode==mode_faketcp)
  1812. {
  1813. bind_fd=socket(AF_INET,SOCK_STREAM,0);
  1814. }
  1815. else if(raw_mode==mode_udp||raw_mode==mode_icmp)//bind an adress to avoid collision,for icmp,there is no port,just bind a udp port
  1816. {
  1817. bind_fd=socket(AF_INET,SOCK_DGRAM,0);
  1818. }
  1819. struct sockaddr_in temp_bind_addr;
  1820. bzero(&temp_bind_addr, sizeof(temp_bind_addr));
  1821. temp_bind_addr.sin_family = AF_INET;
  1822. temp_bind_addr.sin_port = htons(local_port);
  1823. temp_bind_addr.sin_addr.s_addr = local_address_uint32;
  1824. if (bind(bind_fd, (struct sockaddr*)&temp_bind_addr, sizeof(temp_bind_addr)) !=0)
  1825. {
  1826. mylog(log_fatal,"bind fail\n");
  1827. myexit(-1);
  1828. }
  1829. if(raw_mode==mode_faketcp)
  1830. {
  1831. if(listen(bind_fd, SOMAXCONN) != 0 )
  1832. {
  1833. mylog(log_fatal,"listen fail\n");
  1834. myexit(-1);
  1835. }
  1836. }
  1837. init_raw_socket();
  1838. init_filter(local_port);//bpf filter
  1839. epollfd = epoll_create1(0);
  1840. const int max_events = 4096;
  1841. struct epoll_event ev, events[max_events];
  1842. if (epollfd < 0) {
  1843. mylog(log_fatal,"epoll return %d\n", epollfd);
  1844. myexit(-1);
  1845. }
  1846. ev.events = EPOLLIN;
  1847. ev.data.u64 = raw_recv_fd;
  1848. ret = epoll_ctl(epollfd, EPOLL_CTL_ADD, raw_recv_fd, &ev);
  1849. if (ret!= 0) {
  1850. mylog(log_fatal,"add raw_fd error\n");
  1851. myexit(-1);
  1852. }
  1853. int timer_fd;
  1854. set_timer(epollfd,timer_fd);
  1855. u64_t begin_time=0;
  1856. u64_t end_time=0;
  1857. while(1)////////////////////////
  1858. {
  1859. int nfds = epoll_wait(epollfd, events, max_events, 180 * 1000);
  1860. if (nfds < 0) { //allow zero
  1861. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  1862. myexit(-1);
  1863. }
  1864. int idx;
  1865. for (idx = 0; idx < nfds; ++idx)
  1866. {
  1867. //mylog(log_debug,"ndfs: %d \n",nfds);
  1868. epoll_trigger_counter++;
  1869. //printf("%d %d %d %d\n",timer_fd,raw_recv_fd,raw_send_fd,n);
  1870. if ((events[idx].data.u64 ) == (u64_t)timer_fd)
  1871. {
  1872. if(debug_flag)begin_time=get_current_time();
  1873. conn_manager.clear_inactive();
  1874. u64_t dummy;
  1875. read(timer_fd, &dummy, 8);
  1876. //current_time_rough=get_current_time();
  1877. if(debug_flag)
  1878. {
  1879. end_time=get_current_time()-begin_time;
  1880. mylog(log_debug,"conn_manager.clear_inactive(),%llu,%llu,%llu\n",begin_time,end_time,end_time-begin_time);
  1881. }
  1882. mylog(log_trace,"epoll_trigger_counter: %d \n",epoll_trigger_counter);
  1883. epoll_trigger_counter=0;
  1884. }
  1885. else if (events[idx].data.u64 == (u64_t)raw_recv_fd)
  1886. {
  1887. if(debug_flag)begin_time=get_current_time();
  1888. server_on_raw_recv_multi();
  1889. if(debug_flag)
  1890. {
  1891. end_time=get_current_time()-begin_time;
  1892. mylog(log_debug,"conn_manager.clear_inactive(),%llu,%llu,%llu \n",begin_time,end_time,end_time-begin_time);
  1893. }
  1894. }
  1895. else if ((events[idx].data.u64 >>32u) == 2u)
  1896. {
  1897. if(debug_flag)begin_time=get_current_time();
  1898. int fd=get_u64_l(events[idx].data.u64);
  1899. u64_t dummy;
  1900. read(fd, &dummy, 8);
  1901. if(conn_manager.timer_fd_mp.find(fd)==conn_manager.timer_fd_mp.end()) //this can happen,when fd is a just closed fd
  1902. {
  1903. mylog(log_info,"timer_fd no longer exits\n");
  1904. continue;
  1905. }
  1906. conn_info_t* p_conn_info=conn_manager.timer_fd_mp[fd];
  1907. u32_t ip=p_conn_info->raw_info.recv_info.src_ip;
  1908. u32_t port=p_conn_info->raw_info.recv_info.src_port;
  1909. if(!conn_manager.exist(ip,port))//TODO remove this for peformance
  1910. {
  1911. mylog(log_fatal,"ip port no longer exits 1!!!this shouldnt happen\n");
  1912. myexit(-1);
  1913. }
  1914. if (p_conn_info->state.server_current_state != server_ready) //TODO remove this for peformance
  1915. {
  1916. mylog(log_fatal,"p_conn_info->state.server_current_state!=server_ready!!!this shouldnt happen\n");
  1917. myexit(-1);
  1918. }
  1919. //conn_info_t &conn_info=conn_manager.find(ip,port);
  1920. server_on_timer_multi(*p_conn_info);
  1921. if(debug_flag)
  1922. {
  1923. end_time=get_current_time()-begin_time;
  1924. mylog(log_debug,"conn_manager.clear_inactive(),%llu,%llu,%llu \n",begin_time,end_time,end_time-begin_time);
  1925. }
  1926. }
  1927. else if ((events[idx].data.u64 >>32u) == 1u)
  1928. {
  1929. //uint32_t conv_id=events[n].data.u64>>32u;
  1930. if(debug_flag)begin_time=get_current_time();
  1931. int fd=int((events[idx].data.u64<<32u)>>32u);
  1932. if(conn_manager.udp_fd_mp.find(fd)==conn_manager.udp_fd_mp.end()) //this can happen,when fd is a just closed fd
  1933. {
  1934. mylog(log_debug,"fd no longer exists in udp_fd_mp,udp fd %d\n",fd);
  1935. recv(fd,0,0,0);
  1936. continue;
  1937. }
  1938. conn_info_t* p_conn_info=conn_manager.udp_fd_mp[fd];
  1939. u32_t ip=p_conn_info->raw_info.recv_info.src_ip;
  1940. u32_t port=p_conn_info->raw_info.recv_info.src_port;
  1941. if(!conn_manager.exist(ip,port))//TODO remove this for peformance
  1942. {
  1943. mylog(log_fatal,"ip port no longer exits 2!!!this shouldnt happen\n");
  1944. myexit(-1);
  1945. }
  1946. if(p_conn_info->state.server_current_state!=server_ready)//TODO remove this for peformance
  1947. {
  1948. mylog(log_fatal,"p_conn_info->state.server_current_state!=server_ready!!!this shouldnt happen\n");
  1949. myexit(-1);
  1950. }
  1951. conn_info_t &conn_info=*p_conn_info;
  1952. if(!conn_info.blob->conv_manager.is_u64_used(fd))
  1953. {
  1954. mylog(log_debug,"conv no longer exists,udp fd %d\n",fd);
  1955. int recv_len=recv(fd,0,0,0); ///////////TODO ,delete this
  1956. continue;
  1957. }
  1958. u32_t conv_id=conn_info.blob->conv_manager.find_conv_by_u64(fd);
  1959. int recv_len=recv(fd,buf,buf_len,0);
  1960. mylog(log_trace,"received a packet from udp_fd,len:%d\n",recv_len);
  1961. if(recv_len<0)
  1962. {
  1963. mylog(log_debug,"udp fd,recv_len<0 continue\n");
  1964. continue;
  1965. }
  1966. //conn_info.conv_manager->update_active_time(conv_id); server dosnt update from upd side,only update from raw side. (client updates at both side)
  1967. if(conn_info.state.server_current_state==server_ready)
  1968. {
  1969. send_data_safer(conn_info,buf,recv_len,conv_id);
  1970. //send_data(g_packet_info_send,buf,recv_len,my_id,oppsite_id,conv_id);
  1971. mylog(log_trace,"send_data_safer ,sent !!\n");
  1972. }
  1973. if(debug_flag)
  1974. {
  1975. end_time=get_current_time()-begin_time;
  1976. mylog(log_debug,"conn_manager.clear_inactive(),%lld,%lld,%lld \n",begin_time,end_time,end_time-begin_time);
  1977. }
  1978. }
  1979. else
  1980. {
  1981. mylog(log_fatal,"unknown fd,this should never happen\n");
  1982. myexit(-1);
  1983. }
  1984. }
  1985. }
  1986. return 0;
  1987. }
  1988. void print_help()
  1989. {
  1990. printf("udp-to-raw tunnel v0.1\n");
  1991. printf("\n");
  1992. printf("usage:\n");
  1993. printf(" run as client : ./this_program -c -l adress:port -r adress:port [options]\n");
  1994. printf(" run as server : ./this_program -s -l adress:port -r adress:port [options]\n");
  1995. printf("\n");
  1996. printf("common options,these options must be same on both side:\n");
  1997. printf(" --raw-mode <string> avaliable values:faketcp,udp,icmp\n");
  1998. printf(" --key <string> password to gen symetric key\n");
  1999. printf(" --auth-mode <string> avaliable values:aes128cbc,xor,none\n");
  2000. printf(" --cipher-mode <string> avaliable values:md5,crc32,sum,none\n");
  2001. printf("\n");
  2002. printf("client options:\n");
  2003. printf(" --source-ip <ip> force source-ip for raw socket\n");
  2004. printf(" --source-port <port> force source-port for raw socket,tcp/udp only\n");
  2005. printf("\n");
  2006. printf("other options:\n");
  2007. printf(" --log-level <number> 0:never print log\n");
  2008. printf(" 1:fatal\n");
  2009. printf(" 2:error\n");
  2010. printf(" 3:warn\n");
  2011. printf(" 4:info (default)\n");
  2012. printf(" 5:debug\n");
  2013. printf(" 6:trace\n");
  2014. printf("\n");
  2015. printf(" --log-position enable file name,function name,line number in log\n");
  2016. printf(" --disable-color disable log color\n");
  2017. printf(" --disable-bpf disable the kernel space filter,most time its not necessary\n");
  2018. printf(" unless you suspect there is a bug\n");
  2019. printf("\n");
  2020. printf(" --sock-buf <number> buf size for socket,>=10 and <=10240,unit:kbyte\n");
  2021. printf(" --seqmode <number> seq increase mode for faketcp:\n");
  2022. printf(" 0:dont increase\n");
  2023. printf(" 1:increase every packet\n");
  2024. printf(" 2:increase randomly, about every 3 packets (default)\n");
  2025. printf("\n");
  2026. printf(" -h,--help print this help message\n");
  2027. //printf("common options,these options must be same on both side\n");
  2028. }
  2029. void process_arg(int argc, char *argv[])
  2030. {
  2031. int i,j,k,opt;
  2032. static struct option long_options[] =
  2033. {
  2034. /* These options set a flag. */
  2035. {"source-ip", required_argument, 0, 1},
  2036. {"source-port", required_argument, 0, 1},
  2037. {"log-level", required_argument, 0, 1},
  2038. {"key", required_argument, 0, 'k'},
  2039. {"auth-mode", required_argument, 0, 1},
  2040. {"cipher-mode", required_argument, 0, 1},
  2041. {"raw-mode", required_argument, 0, 1},
  2042. {"disable-color", no_argument, 0, 1},
  2043. {"log-position", no_argument, 0, 1},
  2044. {"disable-bpf", no_argument, 0, 1},
  2045. {"disable-anti-replay", no_argument, 0, 1},
  2046. {"debug", no_argument, 0, 1},
  2047. {"sock-buf", required_argument, 0, 1},
  2048. {"seq-mode", required_argument, 0, 1},
  2049. {NULL, 0, 0, 0}
  2050. };
  2051. int option_index = 0;
  2052. for (i = 0; i < argc; i++)
  2053. {
  2054. if(strcmp(argv[i],"-h")==0||strcmp(argv[i],"--help")==0)
  2055. {
  2056. print_help();
  2057. myexit(0);
  2058. }
  2059. }
  2060. for (i = 0; i < argc; i++)
  2061. {
  2062. if(strcmp(argv[i],"--log-level")==0)
  2063. {
  2064. if(i<argc -1)
  2065. {
  2066. sscanf(argv[i+1],"%d",&log_level);
  2067. if(0<=log_level&&log_level<log_end)
  2068. {
  2069. }
  2070. else
  2071. {
  2072. log_bare(log_fatal,"invalid log_level\n");
  2073. myexit(-1);
  2074. }
  2075. }
  2076. }
  2077. if(strcmp(argv[i],"--disable-color")==0)
  2078. {
  2079. enable_log_color=0;
  2080. }
  2081. }
  2082. mylog(log_info,"argc=%d ", argc);
  2083. for (i = 0; i < argc; i++) {
  2084. log_bare(log_info, "%s ", argv[i]);
  2085. }
  2086. log_bare(log_info, "\n");
  2087. if (argc == 1)
  2088. {
  2089. print_help();
  2090. myexit(-1);
  2091. }
  2092. int no_l = 1, no_r = 1;
  2093. while ((opt = getopt_long(argc, argv, "l:r:scha",long_options,&option_index)) != -1) {
  2094. //string opt_key;
  2095. //opt_key+=opt;
  2096. switch (opt) {
  2097. case 'l':
  2098. no_l = 0;
  2099. if (strchr(optarg, ':') != 0) {
  2100. sscanf(optarg, "%[^:]:%d", local_address, &local_port);
  2101. } else {
  2102. strcpy(local_address, "127.0.0.1");
  2103. sscanf(optarg, "%d", &local_port);
  2104. }
  2105. break;
  2106. case 'r':
  2107. no_r = 0;
  2108. if (strchr(optarg, ':') != 0) {
  2109. sscanf(optarg, "%[^:]:%d", remote_address, &remote_port);
  2110. } else {
  2111. strcpy(remote_address, "127.0.0.1");
  2112. sscanf(optarg, "%d", &remote_port);
  2113. }
  2114. break;
  2115. case 's':
  2116. if(program_mode==0)
  2117. {
  2118. program_mode=server_mode;
  2119. }
  2120. else
  2121. {
  2122. mylog(log_fatal,"-s /-c has already been set,-s option conflict\n");
  2123. myexit(-1);
  2124. }
  2125. break;
  2126. case 'c':
  2127. if(program_mode==0)
  2128. {
  2129. program_mode=client_mode;
  2130. }
  2131. else
  2132. {
  2133. mylog(log_fatal,"-s /-c has already been set,-c option conflict\n");
  2134. myexit(-1);
  2135. }
  2136. break;
  2137. case 'h':
  2138. break;
  2139. case 'a':
  2140. auto_add_iptables_rule=1;
  2141. break;
  2142. case 'k':
  2143. mylog(log_debug,"parsing key option\n");
  2144. sscanf(optarg,"%s",key_string);
  2145. break;
  2146. case 1:
  2147. mylog(log_debug,"option_index: %d\n",option_index);
  2148. if(strcmp(long_options[option_index].name,"source-ip")==0)
  2149. {
  2150. mylog(log_debug,"parsing long option :source-ip\n");
  2151. sscanf(optarg, "%s", source_address);
  2152. mylog(log_debug,"source: %s\n",source_address);
  2153. }
  2154. else if(strcmp(long_options[option_index].name,"source-port")==0)
  2155. {
  2156. mylog(log_debug,"parsing long option :source-port\n");
  2157. sscanf(optarg, "%d", &source_port);
  2158. mylog(log_info,"source: %d\n",source_port);
  2159. }
  2160. else if(strcmp(long_options[option_index].name,"raw-mode")==0)
  2161. {
  2162. for(i=0;i<mode_end;i++)
  2163. {
  2164. if(strcmp(optarg,raw_mode_tostring[i])==0)
  2165. {
  2166. //printf("%d i\n",i);
  2167. //printf("%s",raw_mode_tostring[i]);
  2168. raw_mode=(raw_mode_t)i;
  2169. break;
  2170. }
  2171. }
  2172. if(i==mode_end)
  2173. {
  2174. mylog(log_fatal,"no such raw_mode %s\n",optarg);
  2175. myexit(-1);
  2176. }
  2177. }
  2178. else if(strcmp(long_options[option_index].name,"auth-mode")==0)
  2179. {
  2180. for(i=0;i<auth_end;i++)
  2181. {
  2182. if(strcmp(optarg,auth_mode_tostring[i])==0)
  2183. {
  2184. auth_mode=(auth_mode_t)i;
  2185. break;
  2186. }
  2187. }
  2188. if(i==auth_end)
  2189. {
  2190. mylog(log_fatal,"no such auth_mode %s\n",optarg);
  2191. myexit(-1);
  2192. }
  2193. }
  2194. else if(strcmp(long_options[option_index].name,"cipher-mode")==0)
  2195. {
  2196. for(i=0;i<cipher_end;i++)
  2197. {
  2198. if(strcmp(optarg,cipher_mode_tostring[i])==0)
  2199. {
  2200. cipher_mode=(cipher_mode_t)i;
  2201. break;
  2202. }
  2203. }
  2204. if(i==cipher_end)
  2205. {
  2206. mylog(log_fatal,"no such cipher_mode %s\n",optarg);
  2207. myexit(-1);
  2208. }
  2209. }
  2210. else if(strcmp(long_options[option_index].name,"log-level")==0)
  2211. {
  2212. }
  2213. else if(strcmp(long_options[option_index].name,"disable-color")==0)
  2214. {
  2215. //enable_log_color=0;
  2216. }
  2217. else if(strcmp(long_options[option_index].name,"debug")==0)
  2218. {
  2219. debug_flag=1;
  2220. //enable_log_color=0;
  2221. }
  2222. else if(strcmp(long_options[option_index].name,"debug-resend")==0)
  2223. {
  2224. //debug_resend=1;
  2225. //enable_log_color=0;
  2226. }
  2227. else if(strcmp(long_options[option_index].name,"log-position")==0)
  2228. {
  2229. enable_log_position=1;
  2230. }
  2231. else if(strcmp(long_options[option_index].name,"disable-bpf")==0)
  2232. {
  2233. disable_bpf_filter=1;
  2234. }
  2235. else if(strcmp(long_options[option_index].name,"disable-anti-replay")==0)
  2236. {
  2237. disable_anti_replay=1;
  2238. }
  2239. else if(strcmp(long_options[option_index].name,"sock-buf")==0)
  2240. {
  2241. int tmp=-1;
  2242. sscanf(optarg,"%d",&tmp);
  2243. if(10<=tmp&&tmp<=10*1024)
  2244. {
  2245. socket_buf_size=tmp*1024;
  2246. }
  2247. else
  2248. {
  2249. mylog(log_fatal,"sock-buf value must be between 1 and 10240 (kbyte) \n");
  2250. myexit(-1);
  2251. }
  2252. }
  2253. else if(strcmp(long_options[option_index].name,"seq-mode")==0)
  2254. {
  2255. sscanf(optarg,"%d",&seq_mode);
  2256. if(0<=seq_mode&&seq_mode<=2)
  2257. {
  2258. }
  2259. else
  2260. {
  2261. mylog(log_fatal,"seq_mode value must be 0,1,or 2 \n");
  2262. myexit(-1);
  2263. }
  2264. }
  2265. else
  2266. {
  2267. mylog(log_warn,"ignored unknown long option ,option_index:%d code:<%x>\n",option_index, optopt);
  2268. }
  2269. break;
  2270. default:
  2271. mylog(log_fatal,"unknown option ,code:<%x>\n", optopt);
  2272. myexit(-1);
  2273. }
  2274. }
  2275. if (no_l)
  2276. mylog(log_fatal,"error: -l not found\n");
  2277. if (no_r)
  2278. mylog(log_fatal,"error: -r not found\n");
  2279. if(program_mode==0)
  2280. mylog(log_fatal,"error: -c /-s hasnt been set\n");
  2281. if (no_l || no_r||program_mode==0)
  2282. {
  2283. print_help();
  2284. myexit(-1);
  2285. }
  2286. mylog(log_info,"important variables: ");
  2287. log_bare(log_info,"log_level=%d:%s ",log_level,log_text[log_level]);
  2288. log_bare(log_info,"raw_mode=%s ",raw_mode_tostring[raw_mode]);
  2289. log_bare(log_info,"cipher_mode=%s ",cipher_mode_tostring[cipher_mode]);
  2290. log_bare(log_info,"auth_mode=%s ",auth_mode_tostring[auth_mode]);
  2291. log_bare(log_info,"key=%s ",key_string);
  2292. log_bare(log_info,"local_ip=%s ",local_address);
  2293. log_bare(log_info,"local_port=%d ",local_port);
  2294. log_bare(log_info,"remote_ip=%s ",remote_address);
  2295. log_bare(log_info,"remote_port=%d ",remote_port);
  2296. log_bare(log_info,"source_ip=%s ",source_address);
  2297. log_bare(log_info,"source_port=%d ",source_port);
  2298. log_bare(log_info,"socket_buf_size=%d ",socket_buf_size);
  2299. log_bare(log_info,"\n");
  2300. }
  2301. void iptables_warn()
  2302. {
  2303. char rule[200];
  2304. if(program_mode==client_mode)
  2305. {
  2306. if(raw_mode==mode_faketcp)
  2307. {
  2308. sprintf(rule,"INPUT -s %s/32 -p tcp -m tcp --sport %d -j DROP",remote_address,remote_port);
  2309. //mylog(log_warn,"make sure you have run once: iptables -A INPUT -s %s/32 -p tcp -m tcp --sport %d -j DROP\n",remote_address,remote_port);
  2310. }
  2311. if(raw_mode==mode_udp)
  2312. {
  2313. sprintf(rule,"INPUT -s %s/32 -p udp -m udp --sport %d -j DROP",remote_address,remote_port);
  2314. //mylog(log_warn,"make sure you have run once: iptables -A INPUT -s %s/32 -p udp -m udp --sport %d -j DROP\n",remote_address,remote_port);
  2315. }
  2316. if(raw_mode==mode_icmp)
  2317. {
  2318. sprintf(rule,"INPUT -s %s/32 -p icmp -j DROP",remote_address);
  2319. //mylog(log_warn,"make sure you have run once: iptables -A INPUT -s %s/32 -p icmp -j DROP\n",remote_address);
  2320. }
  2321. }
  2322. if(program_mode==server_mode)
  2323. {
  2324. if(raw_mode==mode_faketcp)
  2325. {
  2326. sprintf(rule,"INPUT -p tcp -m tcp --dport %d -j DROP",local_port);
  2327. //mylog(log_warn,"make sure you have run once: iptables -A INPUT -p tcp -m tcp --dport %d -j DROP\n",local_port);
  2328. }
  2329. if(raw_mode==mode_udp)
  2330. {
  2331. sprintf(rule,"INPUT -p udp -m udp --udp %d -j DROP",local_port);
  2332. //mylog(log_warn,"make sure you have run once: iptables -A INPUT -p udp -m udp --udp %d -j DROP\n",local_port);
  2333. }
  2334. if(raw_mode==mode_icmp)
  2335. {
  2336. if(local_address_uint32==0)
  2337. {
  2338. sprintf(rule,"INPUT -p icmp -j DROP");
  2339. //mylog(log_warn,"make sure you have run once: iptables -A INPUT -p icmp -j DROP\n");
  2340. }
  2341. else
  2342. {
  2343. sprintf(rule,"INPUT -d %s/32 -p icmp -j DROP",local_address);
  2344. //mylog(log_warn,"make sure you have run once: iptables -A INPUT -d %s/32 -p icmp -j DROP\n",local_address);
  2345. }
  2346. }
  2347. }
  2348. if(auto_add_iptables_rule)
  2349. {
  2350. strcat(rule," -m comment --comment udp2raw_added ");
  2351. add_iptables_rule(rule);
  2352. }
  2353. else
  2354. {
  2355. mylog(log_warn,"make sure you have run once: iptables -A %s\n",rule);
  2356. }
  2357. }
  2358. int main(int argc, char *argv[])
  2359. {
  2360. //printf("%d %d %d %d",larger_than_u32(1,2),larger_than_u32(2,1),larger_than_u32(0xeeaaeebb,2),larger_than_u32(2,0xeeaaeebb));
  2361. //assert(0==1);
  2362. dup2(1, 2);//redirect stderr to stdout
  2363. signal(SIGINT, INThandler);
  2364. process_arg(argc,argv);
  2365. local_address_uint32=inet_addr(local_address);
  2366. remote_address_uint32=inet_addr(remote_address);
  2367. source_address_uint32=inet_addr(source_address);
  2368. //current_time_rough=get_current_time();
  2369. init_random_number_fd();
  2370. srand(get_true_random_number_nz());
  2371. const_id=get_true_random_number_nz();
  2372. mylog(log_info,"const_id:%x\n",const_id);
  2373. char tmp[1000]="";
  2374. strcat(tmp,key_string);
  2375. strcat(tmp,"key1");
  2376. md5((uint8_t*)tmp,strlen(tmp),(uint8_t*)key);
  2377. /*
  2378. tmp[0]=0;
  2379. strcat(tmp,key_string);
  2380. strcat(tmp,"key2");
  2381. md5((uint8_t*)tmp,strlen(tmp),(uint8_t*)key2);*/
  2382. iptables_warn();
  2383. if(program_mode==client_mode)
  2384. {
  2385. client_event_loop();
  2386. }
  2387. else
  2388. {
  2389. server_event_loop();
  2390. }
  2391. return 0;
  2392. }