Annotation of ansh/src/utils.c, revision 1.1.1.1.2.8
1.1 misho 1: /*************************************************************************
2: * (C) 2011 AITNET - Sofia/Bulgaria - <office@aitnet.org>
3: * by Michael Pounov <misho@elwix.org>
4: *
5: * $Author: misho $
1.1.1.1.2.8! misho 6: * $Id: utils.c,v 1.1.1.1.2.7 2011/10/13 15:24:17 misho Exp $
1.1 misho 7: *
1.1.1.1.2.8! misho 8: *************************************************************************
! 9: The ELWIX and AITNET software is distributed under the following
! 10: terms:
! 11:
! 12: All of the documentation and software included in the ELWIX and AITNET
! 13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
! 14:
! 15: Copyright 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011
! 16: by Michael Pounov <misho@elwix.org>. All rights reserved.
! 17:
! 18: Redistribution and use in source and binary forms, with or without
! 19: modification, are permitted provided that the following conditions
! 20: are met:
! 21: 1. Redistributions of source code must retain the above copyright
! 22: notice, this list of conditions and the following disclaimer.
! 23: 2. Redistributions in binary form must reproduce the above copyright
! 24: notice, this list of conditions and the following disclaimer in the
! 25: documentation and/or other materials provided with the distribution.
! 26: 3. All advertising materials mentioning features or use of this software
! 27: must display the following acknowledgement:
! 28: This product includes software developed by Michael Pounov <misho@elwix.org>
! 29: ELWIX - Embedded LightWeight unIX and its contributors.
! 30: 4. Neither the name of AITNET nor the names of its contributors
! 31: may be used to endorse or promote products derived from this software
! 32: without specific prior written permission.
! 33:
! 34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
! 35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
! 36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
! 37: ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
! 38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
! 39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
! 40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
! 41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
! 42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
! 43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
! 44: SUCH DAMAGE.
! 45: */
1.1 misho 46: #include "global.h"
47:
48:
49: void
50: Get1stEth(char *psDev, int devlen)
51: {
52: struct ifaddrs *ifa;
53:
54: assert(psDev);
55: assert(devlen > 0);
56:
57: getifaddrs(&ifa);
58: strlcpy(psDev, ifa->ifa_name, devlen);
59: freeifaddrs(ifa);
60: }
61:
62: int
63: PrepareL2(const char *psDev, int *bpflen)
64: {
65: int h, n = 1;
66: register int i;
67: char szStr[STRSIZ];
68: struct ifreq ifr;
1.1.1.1.2.3 misho 69: struct bpf_program fcode = { 0 };
70: struct bpf_insn insns[] = {
71: BPF_STMT(BPF_LD + BPF_H + BPF_ABS, 12),
72: BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ANSH_ID, 0, 1),
73: BPF_STMT(BPF_RET + BPF_K, -1),
74: BPF_STMT(BPF_RET + BPF_K, 0),
75: };
1.1 misho 76:
77: FTRACE(3);
78: assert(psDev);
79:
1.1.1.1.2.3 misho 80: fcode.bf_len = sizeof(insns) / sizeof(struct bpf_insn);
81: fcode.bf_insns = insns;
82:
1.1 misho 83: for (i = 0; i < 10; i++) {
84: memset(szStr, 0, sizeof szStr);
85: snprintf(szStr, sizeof szStr, "/dev/bpf%d", i);
86: h = open(szStr, O_RDWR);
87: if (h > 2)
88: break;
89: }
90: if (h < 3) {
91: printf("Error:: open bpf %s #%d - %s\n", szStr, errno, strerror(errno));
92: return -1;
93: }
94:
1.1.1.1.2.5 misho 95: if (ioctl(h, BIOCIMMEDIATE, &n) == -1) {
1.1.1.1.2.3 misho 96: printf("Error:: set interface %s to bpf #%d - %s\n", psDev, errno, strerror(errno));
97: close(h);
98: return -1;
99: }
1.1.1.1.2.7 misho 100: n = USHRT_MAX + 1;
101: if (ioctl(h, BIOCSBLEN, &n) == -1) {
102: printf("Error:: set buffer interface %s buffer length #%d - %s\n", psDev, errno, strerror(errno));
103: close(h);
104: return -1;
105: }
1.1.1.1.2.5 misho 106: strlcpy(ifr.ifr_name, psDev, sizeof ifr.ifr_name);
107: if (ioctl(h, BIOCSETIF, &ifr) == -1) {
108: printf("Error:: bind interface %s to bpf #%d - %s\n", psDev, errno, strerror(errno));
1.1 misho 109: close(h);
110: return -1;
111: }
1.1.1.1.2.3 misho 112: if (ioctl(h, BIOCSETF, &fcode) == -1) {
113: printf("Error:: set filter interface %s to bpf #%d - %s\n", psDev, errno, strerror(errno));
114: close(h);
115: return -1;
116: }
1.1 misho 117: if (ioctl(h, BIOCGBLEN, bpflen) == -1) {
1.1.1.1.2.7 misho 118: printf("Error:: get buffer interface %s buffer length #%d - %s\n", psDev, errno, strerror(errno));
1.1 misho 119: close(h);
120: return -1;
121: }
122:
1.1.1.1.2.4 misho 123: /*
1.1.1.1.2.3 misho 124: n = fcntl(h, F_GETFL);
125: fcntl(h, F_SETFL, n | O_NONBLOCK);
1.1.1.1.2.4 misho 126: */
1.1.1.1.2.3 misho 127:
1.1 misho 128: VERB(3) LOG("Openned device handle %d with bpf buflen %d", h, *bpflen);
129: return h;
130: }
131:
132: int
133: PrepareL3(const struct sockaddr *sa, int *bpflen)
134: {
135: int h, n = 1;
136:
137: FTRACE(3);
138: assert(sa);
139:
140: h = socket(sa->sa_family, SOCK_RAW, IPPROTO_ICMP);
141: if (h == -1) {
142: printf("Error:: Cant open raw socket #%d - %s\n", errno, strerror(errno));
143: return -1;
144: }
145: /*
146: if (setsockopt(h, SOL_SOCKET, SO_REUSEADDR, &n, sizeof n) == -1) {
147: printf("Error:: Cant set raw socket #%d - %s\n", errno, strerror(errno));
148: close(h);
149: return -1;
150: }
151: */
152: if (bind(h, sa, sizeof(struct sockaddr)) == -1) {
153: printf("Error:: Cant bind to raw socket #%d - %s\n", errno, strerror(errno));
154: close(h);
155: return -1;
156: }
157:
158: n = fcntl(h, F_GETFL);
159: fcntl(h, F_SETFL, n | O_NONBLOCK);
160:
161: *bpflen = USHRT_MAX;
162: VERB(3) LOG("Openned socket handle %d", h);
163: return h;
164: }
165:
166: char
1.1.1.1.2.6 misho 167: icmpRecv(int s, u_int * __restrict seq, u_short * __restrict id, u_int * __restrict crypted,
168: u_char * __restrict data, int * __restrict datlen, struct sockaddr *sa, socklen_t *salen)
1.1 misho 169: {
170: int ret = 0;
171: struct icmp *icmp;
172: struct ansh_hdr *hdr;
173: u_char buf[USHRT_MAX] = { 0 };
174: u_int crc;
175:
176: ret = recvfrom(s, buf, sizeof buf, 0, sa, salen);
177: if (ret == -1) {
178: ERR("Receive recvfrom() #%d - %s", errno, strerror(errno));
179: return ANSH_FLG_ERR;
180: } else
181: VERB(4) LOG("Get packet with len=%d", ret);
182:
183: /* check header len */
184: if (ret < (sizeof(struct ip) + sizeof(struct icmp) + sizeof(struct ansh_hdr))) {
185: VERB(1) LOG("Discard packet too short %d ...", ret);
186: return ANSH_FLG_ERR;
187: } else
188: icmp = (struct icmp*) (buf + sizeof(struct ip));
189:
190: /* check echo magic ansh code */
191: if (icmp->icmp_type != ICMP_ECHOREPLY || icmp->icmp_code != ANSH_CODE) {
192: VERB(3) LOG("Packet isnt for me %d ... icmp_code=%d", ret, icmp->icmp_code);
193: return ANSH_FLG_ERR;
194: } else
195: hdr = (struct ansh_hdr*) (buf + sizeof(struct ip) + sizeof(struct icmp));
196:
197: /* check version and total size of packet */
198: if (hdr->ansh_ver != ANSH_VERSION) {
199: VERB(3) LOG("Packet with wrong version ...");
200: return ANSH_FLG_ERR;
201: }
1.1.1.1.2.1 misho 202: if (crypted) {
203: if (hdr->ansh_nonce && !*crypted) {
204: VERB(3) LOG("Channel INSECURED:: Crypted communication not supported at this moment ...");
205: return ANSH_FLG_ERR;
206: }
207: if (!hdr->ansh_nonce && *crypted) {
208: VERB(3) LOG("Channel SECURED:: Plain text communication not supported at this moment ...");
209: return ANSH_FLG_ERR;
210: }
211:
212: *crypted = ntohl(hdr->ansh_nonce);
213: }
1.1 misho 214:
215: /* check crc of packet */
216: crc = hdr->ansh_crc;
217: hdr->ansh_crc ^= hdr->ansh_crc;
218: hdr->ansh_crc = htonl(crcAdler((u_char*) hdr, ntohs(hdr->ansh_len)));
219: if (crc != hdr->ansh_crc) {
220: VERB(3) LOG("Packet with wrong crc ...");
221: return ANSH_FLG_ERR;
222: }
223:
224: /* copy data */
225: if (data && datlen) {
226: memset(data, 0, *datlen);
227: *datlen = ntohs(hdr->ansh_len) - sizeof(struct ansh_hdr);
228: memcpy(data, buf + sizeof(struct ip) + sizeof(struct icmp) + sizeof(struct ansh_hdr), *datlen);
229: }
230:
1.1.1.1.2.6 misho 231: if (seq)
232: *seq = ntohl(hdr->ansh_seq);
1.1 misho 233: if (id)
234: *id = ntohs(icmp->icmp_id);
235: return hdr->ansh_flg;
236: }
237:
238: int
1.1.1.1.2.6 misho 239: icmpSend(int s, u_int seq, u_short id, char flg, u_int crypted, u_char *data, int datlen,
240: struct sockaddr *sa, socklen_t salen)
1.1 misho 241: {
242: u_char *pos, buf[USHRT_MAX] = { 0 };
243: struct icmp *icmp;
244: struct ansh_hdr *hdr;
245: int ret = 0;
246:
247: assert(data);
248: if ((sizeof buf - sizeof(struct icmp) + sizeof(struct ansh_hdr)) < datlen)
249: return ANSH_FLG_ERR;
250:
251: icmp = (struct icmp*) buf;
252: hdr = (struct ansh_hdr*) (buf + sizeof(struct icmp));
253: pos = buf + sizeof(struct icmp) + sizeof(struct ansh_hdr);
254:
255: memcpy(pos, data, datlen);
256:
257: hdr->ansh_ver = ANSH_VERSION;
258: hdr->ansh_flg = flg;
259: hdr->ansh_len = htons(datlen + sizeof(struct ansh_hdr));
1.1.1.1.2.1 misho 260: hdr->ansh_nonce = htonl(crypted);
1.1.1.1.2.6 misho 261: hdr->ansh_seq = htonl(seq);
1.1 misho 262: hdr->ansh_crc = 0;
263: hdr->ansh_crc = htonl(crcAdler((u_char*) hdr, ntohs(hdr->ansh_len)));
264:
265: icmp->icmp_type = ICMP_ECHOREPLY;
266: icmp->icmp_code = ANSH_CODE;
267: icmp->icmp_id = htons(id);
268: icmp->icmp_seq = htons(datlen);
269: icmp->icmp_cksum = 0;
270: icmp->icmp_cksum = crcIP(buf, sizeof(struct icmp) + sizeof(struct ansh_hdr) + datlen);
271:
272: if ((ret = sendto(s, buf, sizeof(struct icmp) + sizeof(struct ansh_hdr) + datlen,
273: 0, sa, salen)) == -1) {
274: ERR("Send sendto() #%d - %s", errno, strerror(errno));
275: return ANSH_FLG_ERR;
276: } else
277: VERB(4) LOG("Put packet with len=%d", ret);
278: if (ret != sizeof(struct icmp) + sizeof(struct ansh_hdr) + datlen) {
279: VERB(3) LOG("Sended data %d is different from source data len %d", ret,
280: sizeof(struct icmp) + sizeof(struct ansh_hdr) + datlen);
281: return ANSH_FLG_ERR;
282: }
283:
284: return ret;
285: }
286:
1.1.1.1.2.5 misho 287: static int
1.1.1.1.2.6 misho 288: _pkt_Send(int s, u_int seq, char flg, u_int crypted, u_char *data, int datlen, struct ether_addr *ea)
1.1 misho 289: {
290: u_char *pos, buf[USHRT_MAX] = { 0 };
291: struct ether_header *e = (struct ether_header*) buf;
292: struct ansh_hdr *hdr;
293: int ret = 0;
294:
295: assert(data);
296: if ((sizeof buf - ETHER_HDR_LEN + sizeof(struct ansh_hdr)) < datlen)
297: return ANSH_FLG_ERR;
298:
1.1.1.1.2.3 misho 299: e->ether_type = ntohs(ANSH_ID);
1.1 misho 300: memcpy(e->ether_dhost, ea->octet, ETHER_ADDR_LEN);
301: hdr = (struct ansh_hdr*) (buf + ETHER_HDR_LEN);
302: pos = ((u_char*) hdr) + sizeof(struct ansh_hdr);
303:
304: memcpy(pos, data, datlen);
305:
306: hdr->ansh_ver = ANSH_VERSION;
307: hdr->ansh_flg = flg;
308: hdr->ansh_len = htons(datlen + sizeof(struct ansh_hdr));
1.1.1.1.2.2 misho 309: hdr->ansh_nonce = htonl(crypted);
1.1.1.1.2.6 misho 310: hdr->ansh_seq = htonl(seq);
1.1 misho 311: hdr->ansh_crc = 0;
312: hdr->ansh_crc = htonl(crcAdler((u_char*) hdr, ntohs(hdr->ansh_len)));
313:
314: if ((ret = write(s, buf, ETHER_HDR_LEN + sizeof(struct ansh_hdr) + datlen)) == -1) {
315: ERR("Send packet() #%d - %s", errno, strerror(errno));
316: return ANSH_FLG_ERR;
317: } else
318: VERB(4) LOG("Put packet with len=%d", ret);
319: if (ret != ETHER_HDR_LEN + sizeof(struct ansh_hdr) + datlen) {
320: VERB(3) LOG("Sended data %d is different from source data len %d", ret,
321: ETHER_HDR_LEN + sizeof(struct ansh_hdr) + datlen);
322: return ANSH_FLG_ERR;
323: }
324:
325: return ret;
326: }
327:
1.1.1.1.2.5 misho 328: int
1.1.1.1.2.6 misho 329: pktSend(int s, u_int seq, char flg, u_int crypted, u_char *data, int datlen, struct ether_addr *ea)
1.1 misho 330: {
1.1.1.1.2.5 misho 331: int wlen, ret = 0;
332: u_char *pos = data;
1.1 misho 333:
1.1.1.1.2.5 misho 334: while (datlen > -1) {
1.1.1.1.2.6 misho 335: wlen = _pkt_Send(s, seq, flg, crypted, pos, (datlen > 512) ? 512 : datlen, ea);
1.1.1.1.2.5 misho 336: if (wlen == -1)
337: return -1;
338: else {
339: pos += wlen;
340: datlen -= wlen;
341: ret += wlen;
342: }
1.1 misho 343: }
344:
1.1.1.1.2.5 misho 345: return ret;
346: }
1.1 misho 347:
1.1.1.1.2.5 misho 348: static char
1.1.1.1.2.6 misho 349: _pkt_Recv(u_char * __restrict buf, int rlen, u_int * __restrict seq, u_int * __restrict crypted,
1.1.1.1.2.5 misho 350: u_char * __restrict data, int * __restrict datlen,
351: u_char ** __restrict next, int * __restrict nextlen)
352: {
353: int bias;
354: struct bpf_hdr *bpf;
355: struct ansh_hdr *hdr;
356: u_int crc;
357:
358: if (rlen < (sizeof(struct bpf_hdr) + ETHER_HDR_LEN + sizeof(struct ansh_hdr))) {
359: VERB(1) LOG("Discard packet too short %d ...", rlen);
1.1 misho 360: return ANSH_FLG_ERR;
361: } else {
362: bpf = (struct bpf_hdr*) buf;
363: hdr = (struct ansh_hdr*) (buf + bpf->bh_hdrlen + ETHER_HDR_LEN);
364: }
365:
1.1.1.1.2.5 misho 366: /* slice readed data to packets */
367: if ((bias = BPF_WORDALIGN(bpf->bh_hdrlen + bpf->bh_caplen)) < rlen) {
368: *next = buf + bias;
369: *nextlen = rlen - bias;
370: } else {
371: *next = NULL;
372: *nextlen = 0;
373: }
374:
1.1 misho 375: /* check version and total size of packet */
376: if (hdr->ansh_ver != ANSH_VERSION) {
377: VERB(3) LOG("Packet with wrong version ... %d", hdr->ansh_ver);
378: return ANSH_FLG_ERR;
379: }
1.1.1.1.2.2 misho 380: if (crypted) {
381: if (hdr->ansh_nonce && !*crypted) {
382: VERB(3) LOG("Channel INSECURED:: Crypted communication not supported at this moment ...");
383: return ANSH_FLG_ERR;
384: }
385: if (!hdr->ansh_nonce && *crypted) {
386: VERB(3) LOG("Channel SECURED:: Plain text communication not supported at this moment ...");
387: return ANSH_FLG_ERR;
388: }
389:
390: *crypted = ntohl(hdr->ansh_nonce);
391: }
392:
1.1 misho 393: /* check crc of packet */
394: crc = hdr->ansh_crc;
395: hdr->ansh_crc ^= hdr->ansh_crc;
396: hdr->ansh_crc = htonl(crcAdler((u_char*) hdr, ntohs(hdr->ansh_len)));
397: if (crc != hdr->ansh_crc) {
398: VERB(3) LOG("Packet with wrong crc ...");
399: return ANSH_FLG_ERR;
400: }
401:
1.1.1.1.2.5 misho 402: /* select data */
1.1 misho 403: if (data) {
404: *datlen = ntohs(hdr->ansh_len) - sizeof(struct ansh_hdr);
1.1.1.1.2.4 misho 405: memcpy(data, buf + bpf->bh_hdrlen + ETHER_HDR_LEN + sizeof(struct ansh_hdr), *datlen);
1.1 misho 406: }
407:
1.1.1.1.2.6 misho 408: if (seq)
409: *seq = ntohl(hdr->ansh_seq);
1.1.1.1.2.5 misho 410: return hdr->ansh_flg;
411: }
412:
413: char
1.1.1.1.2.6 misho 414: pktRecv(int s, u_int * __restrict seq, u_int * __restrict crypted, u_char * __restrict data,
415: int * __restrict datlen, struct ether_header *eth)
1.1.1.1.2.5 misho 416: {
1.1.1.1.2.6 misho 417: u_char *buf, *next, *ptr, *pos = data;
1.1.1.1.2.5 misho 418: int nextlen, rlen, buflen, ptrlen;
419: char flg;
420: struct bpf_hdr *bpf;
421: struct ether_header *e;
422:
1.1.1.1.2.6 misho 423: if (!eth || !data || !datlen)
1.1.1.1.2.5 misho 424: return ANSH_FLG_ERR;
1.1.1.1.2.6 misho 425: else
426: memset(data, 0, *datlen);
1.1.1.1.2.5 misho 427:
428: if (!(buf = malloc(*datlen))) {
429: ERR("malloc() #%d - %s", errno, strerror(errno));
430: return ANSH_FLG_ERR;
431: }
432:
433: rlen = read(s, buf, *datlen);
434: if (rlen == -1) {
435: ERR("Receive packet() #%d - %s", errno, strerror(errno));
436: free(buf);
437: return ANSH_FLG_ERR;
438: } else
439: VERB(4) LOG("Get packet with len=%d", rlen);
440:
441: /* check header len */
442: if (rlen < (sizeof(struct bpf_hdr) + ETHER_HDR_LEN + sizeof(struct ansh_hdr))) {
443: VERB(1) LOG("Discard packet too short %d ...", rlen);
444: free(buf);
445: return ANSH_FLG_ERR;
446: } else {
447: bpf = (struct bpf_hdr*) buf;
448: e = (struct ether_header*) (buf + bpf->bh_hdrlen);
449: memcpy(eth, e, ETHER_HDR_LEN);
450: }
451:
452: ptr = next = buf;
453: ptrlen = nextlen = rlen;
1.1.1.1.2.6 misho 454: if ((flg = _pkt_Recv(ptr, ptrlen, seq, crypted, pos, &buflen, &next, &nextlen)) == -1) {
1.1.1.1.2.5 misho 455: free(buf);
456: return ANSH_FLG_ERR;
457: } else {
458: pos += buflen;
459: *datlen = buflen;
460: ptr = next;
461: ptrlen = nextlen;
462: }
1.1.1.1.2.6 misho 463: /* get additional packets from buffer */
1.1.1.1.2.5 misho 464: while (next && nextlen > 0)
1.1.1.1.2.6 misho 465: if (_pkt_Recv(ptr, ptrlen, seq, crypted, pos, &buflen, &next, &nextlen) == -1)
1.1.1.1.2.5 misho 466: break;
467: else {
468: pos += buflen;
469: *datlen += buflen;
470: ptr = next;
471: ptrlen = nextlen;
472: }
473:
1.1 misho 474: free(buf);
1.1.1.1.2.6 misho 475:
1.1.1.1.2.5 misho 476: return flg;
1.1 misho 477: }
478:
479: void *
480: TOfunc(sched_task_t *task)
481: {
482: struct tagProc *proc;
483:
484: FTRACE(3);
485:
486: /* not found argument, drop data */
487: if (!(proc = TASK_ARG(task)))
488: return (void*) -1;
489:
490: if (proc->proc_pid)
491: kill(proc->proc_pid, SIGTERM);
492:
493: return NULL;
494: }
495:
1.1.1.1.2.1 misho 496: u_char *
497: cryptBuffer(u_char *buf, int rlen, u_int ctr)
498: {
499: u_char *str, ivec[AES_BLOCK_SIZE] = { 0 };
500: u_int rctr = htonl(ctr);
501:
502: FTRACE(3);
503:
504: if (!buf)
505: return NULL;
506:
507: memcpy(ivec, &ctr, sizeof ctr);
508: memcpy(ivec + 4, &rctr, sizeof rctr);
509: memcpy(ivec + 8, &ctr, sizeof ctr);
510: memcpy(ivec + 12, &rctr, sizeof rctr);
511:
512: if (io_ctr_AES(buf, rlen, &str, (u_char*) "_ansh_ELWIX_", ivec) == -1)
513: return NULL;
514:
515: return str;
516: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>