2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
18 * Author : Boris Mikhailenko <stg34@stargazer.dp.ua>
23 $Date: 2010/03/25 15:18:48 $
31 #include <sys/types.h>
32 #include <sys/socket.h>
33 #include <unistd.h> // close
37 #include <cstdio> // snprintf
42 #include "stg/common.h"
43 #include "stg/locker.h"
44 #include "stg/tariff.h"
45 #include "stg/user_property.h"
46 #include "stg/settings.h"
47 #include "stg/plugin_creator.h"
48 #include "inetaccess.h"
50 extern volatile time_t stgTime;
52 //-----------------------------------------------------------------------------
53 //-----------------------------------------------------------------------------
54 //-----------------------------------------------------------------------------
57 PLUGIN_CREATOR<AUTH_IA> iac;
60 extern "C" PLUGIN * GetPlugin();
61 //-----------------------------------------------------------------------------
62 //-----------------------------------------------------------------------------
63 //-----------------------------------------------------------------------------
66 return iac.GetPlugin();
68 //-----------------------------------------------------------------------------
69 //-----------------------------------------------------------------------------
70 //-----------------------------------------------------------------------------
71 AUTH_IA_SETTINGS::AUTH_IA_SETTINGS()
76 freeMbShowType(freeMbCash),
77 logProtocolErrors(false)
80 //-----------------------------------------------------------------------------
81 int AUTH_IA_SETTINGS::ParseSettings(const MODULE_SETTINGS & s)
85 std::vector<PARAM_VALUE>::const_iterator pvi;
86 ///////////////////////////
88 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
89 if (pvi == s.moduleParams.end() || pvi->value.empty())
91 errorStr = "Parameter \'Port\' not found.";
92 printfd(__FILE__, "Parameter 'Port' not found\n");
95 if (ParseIntInRange(pvi->value[0], 2, 65535, &p))
97 errorStr = "Cannot parse parameter \'Port\': " + errorStr;
98 printfd(__FILE__, "Cannot parse parameter 'Port'\n");
101 port = static_cast<uint16_t>(p);
102 ///////////////////////////
103 pv.param = "UserDelay";
104 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
105 if (pvi == s.moduleParams.end() || pvi->value.empty())
107 errorStr = "Parameter \'UserDelay\' not found.";
108 printfd(__FILE__, "Parameter 'UserDelay' not found\n");
112 if (ParseIntInRange(pvi->value[0], 5, 600, &userDelay))
114 errorStr = "Cannot parse parameter \'UserDelay\': " + errorStr;
115 printfd(__FILE__, "Cannot parse parameter 'UserDelay'\n");
118 ///////////////////////////
119 pv.param = "UserTimeout";
120 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
121 if (pvi == s.moduleParams.end() || pvi->value.empty())
123 errorStr = "Parameter \'UserTimeout\' not found.";
124 printfd(__FILE__, "Parameter 'UserTimeout' not found\n");
128 if (ParseIntInRange(pvi->value[0], 15, 1200, &userTimeout))
130 errorStr = "Cannot parse parameter \'UserTimeout\': " + errorStr;
131 printfd(__FILE__, "Cannot parse parameter 'UserTimeout'\n");
134 ///////////////////////////
135 pv.param = "LogProtocolErrors";
136 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
137 if (pvi == s.moduleParams.end() || pvi->value.empty())
138 logProtocolErrors = false;
139 else if (ParseYesNo(pvi->value[0], &logProtocolErrors))
141 errorStr = "Cannot parse parameter \'LogProtocolErrors\': " + errorStr;
142 printfd(__FILE__, "Cannot parse parameter 'LogProtocolErrors'\n");
145 /////////////////////////////////////////////////////////////
146 std::string freeMbType;
149 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
150 if (pvi == s.moduleParams.end() || pvi->value.empty())
152 errorStr = "Parameter \'FreeMb\' not found.";
153 printfd(__FILE__, "Parameter 'FreeMb' not found\n");
156 freeMbType = pvi->value[0];
158 if (strcasecmp(freeMbType.c_str(), "cash") == 0)
160 freeMbShowType = freeMbCash;
162 else if (strcasecmp(freeMbType.c_str(), "none") == 0)
164 freeMbShowType = freeMbNone;
166 else if (!str2x(freeMbType.c_str(), n))
168 if (n < 0 || n >= DIR_NUM)
170 errorStr = "Incorrect parameter \'" + freeMbType + "\'.";
171 printfd(__FILE__, "%s\n", errorStr.c_str());
174 freeMbShowType = (FREEMB)(freeMb0 + n);
178 errorStr = "Incorrect parameter \'" + freeMbType + "\'.";
179 printfd(__FILE__, "%s\n", errorStr.c_str());
182 /////////////////////////////////////////////////////////////
185 //-----------------------------------------------------------------------------
186 //-----------------------------------------------------------------------------
187 //-----------------------------------------------------------------------------
188 #ifdef IA_PHASE_DEBUG
193 gettimeofday(&phaseTime, NULL);
199 gettimeofday(&phaseTime, NULL);
202 //-----------------------------------------------------------------------------
203 IA_PHASE::~IA_PHASE()
205 #ifdef IA_PHASE_DEBUG
206 flog = fopen(log.c_str(), "at");
209 fprintf(flog, "IA %s D\n", login.c_str());
214 //-----------------------------------------------------------------------------
215 #ifdef IA_PHASE_DEBUG
216 void IA_PHASE::SetLogFileName(const string & logFileName)
218 log = logFileName + ".ia.log";
220 //-----------------------------------------------------------------------------
221 void IA_PHASE::SetUserLogin(const string & login)
223 IA_PHASE::login = login;
225 //-----------------------------------------------------------------------------
226 void IA_PHASE::WritePhaseChange(int newPhase)
229 gettimeofday(&newPhaseTime, NULL);
230 flog = fopen(log.c_str(), "at");
233 string action = newPhase == phase ? "U" : "C";
234 double delta = newPhaseTime.GetSec() - phaseTime.GetSec();
235 delta += (newPhaseTime.GetUSec() - phaseTime.GetUSec()) * 1.0e-6;
236 fprintf(flog, "IA %s %s oldPhase = %d, newPhase = %d. dt = %.6f\n",
246 //-----------------------------------------------------------------------------
247 void IA_PHASE::SetPhase1()
249 #ifdef IA_PHASE_DEBUG
253 gettimeofday(&phaseTime, NULL);
255 //-----------------------------------------------------------------------------
256 void IA_PHASE::SetPhase2()
258 #ifdef IA_PHASE_DEBUG
262 gettimeofday(&phaseTime, NULL);
264 //-----------------------------------------------------------------------------
265 void IA_PHASE::SetPhase3()
267 #ifdef IA_PHASE_DEBUG
271 gettimeofday(&phaseTime, NULL);
273 //-----------------------------------------------------------------------------
274 void IA_PHASE::SetPhase4()
276 #ifdef IA_PHASE_DEBUG
280 gettimeofday(&phaseTime, NULL);
282 //-----------------------------------------------------------------------------
283 int IA_PHASE::GetPhase() const
287 //-----------------------------------------------------------------------------
288 void IA_PHASE::UpdateTime()
290 #ifdef IA_PHASE_DEBUG
291 WritePhaseChange(phase);
293 gettimeofday(&phaseTime, NULL);
295 //-----------------------------------------------------------------------------
296 const UTIME & IA_PHASE::GetTime() const
300 //-----------------------------------------------------------------------------
301 //-----------------------------------------------------------------------------
302 //-----------------------------------------------------------------------------
310 isRunningRunTimeouter(false),
327 enabledDirs(0xFFffFFff),
328 onDelUserNotifier(*this),
329 logger(GetPluginLogger(GetStgLogger(), "auth_ia"))
331 InitContext("pr7Hhen", 7, &ctxS);
333 pthread_mutexattr_t attr;
334 pthread_mutexattr_init(&attr);
335 pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_RECURSIVE);
336 pthread_mutex_init(&mutex, &attr);
338 memset(&connSynAck6, 0, sizeof(CONN_SYN_ACK_6));
339 memset(&connSynAck8, 0, sizeof(CONN_SYN_ACK_8));
340 memset(&disconnSynAck6, 0, sizeof(DISCONN_SYN_ACK_6));
341 memset(&disconnSynAck8, 0, sizeof(DISCONN_SYN_ACK_8));
342 memset(&aliveSyn6, 0, sizeof(ALIVE_SYN_6));
343 memset(&aliveSyn8, 0, sizeof(ALIVE_SYN_8));
344 memset(&fin6, 0, sizeof(FIN_6));
345 memset(&fin8, 0, sizeof(FIN_8));
347 printfd(__FILE__, "sizeof(CONN_SYN_6) = %d %d\n", sizeof(CONN_SYN_6), Min8(sizeof(CONN_SYN_6)));
348 printfd(__FILE__, "sizeof(CONN_SYN_8) = %d %d\n", sizeof(CONN_SYN_8), Min8(sizeof(CONN_SYN_8)));
349 printfd(__FILE__, "sizeof(CONN_SYN_ACK_6) = %d %d\n", sizeof(CONN_SYN_ACK_6), Min8(sizeof(CONN_SYN_ACK_6)));
350 printfd(__FILE__, "sizeof(CONN_SYN_ACK_8) = %d %d\n", sizeof(CONN_SYN_ACK_8), Min8(sizeof(CONN_SYN_ACK_8)));
351 printfd(__FILE__, "sizeof(CONN_ACK_6) = %d %d\n", sizeof(CONN_ACK_6), Min8(sizeof(CONN_ACK_6)));
352 printfd(__FILE__, "sizeof(ALIVE_SYN_6) = %d %d\n", sizeof(ALIVE_SYN_6), Min8(sizeof(ALIVE_SYN_6)));
353 printfd(__FILE__, "sizeof(ALIVE_SYN_8) = %d %d\n", sizeof(ALIVE_SYN_8), Min8(sizeof(ALIVE_SYN_8)));
354 printfd(__FILE__, "sizeof(ALIVE_ACK_6) = %d %d\n", sizeof(ALIVE_ACK_6), Min8(sizeof(ALIVE_ACK_6)));
355 printfd(__FILE__, "sizeof(DISCONN_SYN_6) = %d %d\n", sizeof(DISCONN_SYN_6), Min8(sizeof(DISCONN_SYN_6)));
356 printfd(__FILE__, "sizeof(DISCONN_SYN_ACK_6) = %d %d\n", sizeof(DISCONN_SYN_ACK_6), Min8(sizeof(DISCONN_SYN_ACK_6)));
357 printfd(__FILE__, "sizeof(DISCONN_SYN_ACK_8) = %d %d\n", sizeof(DISCONN_SYN_ACK_8), Min8(sizeof(DISCONN_SYN_ACK_8)));
358 printfd(__FILE__, "sizeof(DISCONN_ACK_6) = %d %d\n", sizeof(DISCONN_ACK_6), Min8(sizeof(DISCONN_ACK_6)));
359 printfd(__FILE__, "sizeof(FIN_6) = %d %d\n", sizeof(FIN_6), Min8(sizeof(FIN_6)));
360 printfd(__FILE__, "sizeof(FIN_8) = %d %d\n", sizeof(FIN_8), Min8(sizeof(FIN_8)));
361 printfd(__FILE__, "sizeof(ERR) = %d %d\n", sizeof(ERR), Min8(sizeof(ERR)));
362 printfd(__FILE__, "sizeof(INFO_6) = %d %d\n", sizeof(INFO_6), Min8(sizeof(INFO_6)));
363 printfd(__FILE__, "sizeof(INFO_7) = %d %d\n", sizeof(INFO_7), Min8(sizeof(INFO_7)));
364 printfd(__FILE__, "sizeof(INFO_8) = %d %d\n", sizeof(INFO_8), Min8(sizeof(INFO_8)));
366 packetTypes["CONN_SYN"] = CONN_SYN_N;
367 packetTypes["CONN_SYN_ACK"] = CONN_SYN_ACK_N;
368 packetTypes["CONN_ACK"] = CONN_ACK_N;
369 packetTypes["ALIVE_SYN"] = ALIVE_SYN_N;
370 packetTypes["ALIVE_ACK"] = ALIVE_ACK_N;
371 packetTypes["DISCONN_SYN"] = DISCONN_SYN_N;
372 packetTypes["DISCONN_SYN_ACK"] = DISCONN_SYN_ACK_N;
373 packetTypes["DISCONN_ACK"] = DISCONN_ACK_N;
374 packetTypes["FIN"] = FIN_N;
375 packetTypes["ERR"] = ERROR_N;
377 //-----------------------------------------------------------------------------
380 pthread_mutex_destroy(&mutex);
382 //-----------------------------------------------------------------------------
385 users->AddNotifierUserDel(&onDelUserNotifier);
395 if (pthread_create(&recvThread, NULL, Run, this))
397 errorStr = "Cannot create thread.";
398 printfd(__FILE__, "Cannot create recv thread\n");
399 logger("Cannot create recv thread.");
404 if (!isRunningRunTimeouter)
406 if (pthread_create(&timeouterThread, NULL, RunTimeouter, this))
408 errorStr = "Cannot create thread.";
409 printfd(__FILE__, "Cannot create timeouter thread\n");
410 logger("Cannot create timeouter thread.");
417 //-----------------------------------------------------------------------------
428 UnauthorizeUser(this)
433 //5 seconds to thread stops itself
434 for (int i = 0; i < 25 && isRunningRun; i++)
436 struct timespec ts = {0, 200000000};
437 nanosleep(&ts, NULL);
443 if (isRunningRunTimeouter)
445 //5 seconds to thread stops itself
446 for (int i = 0; i < 25 && isRunningRunTimeouter; i++)
448 struct timespec ts = {0, 200000000};
449 nanosleep(&ts, NULL);
453 users->DelNotifierUserDel(&onDelUserNotifier);
455 if (isRunningRun || isRunningRunTimeouter)
458 printfd(__FILE__, "AUTH_IA::Stoped successfully.\n");
461 //-----------------------------------------------------------------------------
462 void * AUTH_IA::Run(void * d)
465 sigfillset(&signalSet);
466 pthread_sigmask(SIG_BLOCK, &signalSet, NULL);
468 AUTH_IA * ia = static_cast<AUTH_IA *>(d);
470 ia->isRunningRun = true;
474 time_t touchTime = stgTime - MONITOR_TIME_DELAY_SEC;
478 ia->RecvData(buffer, sizeof(buffer));
479 if ((touchTime + MONITOR_TIME_DELAY_SEC <= stgTime) && ia->stgSettings->GetMonitoring())
482 std::string monFile = ia->stgSettings->GetMonitorDir() + "/inetaccess_r";
487 ia->isRunningRun = false;
490 //-----------------------------------------------------------------------------
491 void * AUTH_IA::RunTimeouter(void * d)
494 sigfillset(&signalSet);
495 pthread_sigmask(SIG_BLOCK, &signalSet, NULL);
497 AUTH_IA * ia = static_cast<AUTH_IA *>(d);
499 ia->isRunningRunTimeouter = true;
502 std::string monFile = ia->stgSettings->GetMonitorDir() + "/inetaccess_t";
505 struct timespec ts = {0, 20000000};
506 nanosleep(&ts, NULL);
508 // TODO change counter to timer and MONITOR_TIME_DELAY_SEC
509 if (++a % (50 * 60) == 0 && ia->stgSettings->GetMonitoring())
515 ia->isRunningRunTimeouter = false;
518 //-----------------------------------------------------------------------------
519 int AUTH_IA::ParseSettings()
521 int ret = iaSettings.ParseSettings(settings);
523 errorStr = iaSettings.GetStrError();
526 //-----------------------------------------------------------------------------
527 int AUTH_IA::Reload(const MODULE_SETTINGS & ms)
529 AUTH_IA_SETTINGS newIaSettings;
530 if (newIaSettings.ParseSettings(ms))
532 printfd(__FILE__, "AUTH_IA::Reload() - Failed to reload InetAccess.\n");
533 logger("AUTH_IA: Cannot reload InetAccess. Errors found.");
537 printfd(__FILE__, "AUTH_IA::Reload() - Reloaded InetAccess successfully.\n");
538 logger("AUTH_IA: Reloaded InetAccess successfully.");
539 iaSettings = newIaSettings;
542 //-----------------------------------------------------------------------------
543 int AUTH_IA::PrepareNet()
545 struct sockaddr_in listenAddr;
547 listenSocket = socket(AF_INET, SOCK_DGRAM, 0);
549 if (listenSocket < 0)
551 errorStr = "Cannot create socket.";
552 logger("Cannot create a socket: %s", strerror(errno));
556 listenAddr.sin_family = AF_INET;
557 listenAddr.sin_port = htons(static_cast<uint16_t>(iaSettings.GetUserPort()));
558 listenAddr.sin_addr.s_addr = inet_addr("0.0.0.0");
560 if (bind(listenSocket, (struct sockaddr*)&listenAddr, sizeof(listenAddr)) < 0)
562 errorStr = "AUTH_IA: Bind failed.";
563 logger("Cannot bind the socket: %s", strerror(errno));
569 //-----------------------------------------------------------------------------
570 int AUTH_IA::FinalizeNet()
575 //-----------------------------------------------------------------------------
576 int AUTH_IA::RecvData(char * buffer, int bufferSize)
578 if (!WaitPackets(listenSocket)) // Timeout
583 struct sockaddr_in outerAddr;
584 socklen_t outerAddrLen(sizeof(outerAddr));
585 ssize_t dataLen = recvfrom(listenSocket, buffer, bufferSize, 0, (struct sockaddr *)&outerAddr, &outerAddrLen);
592 if (dataLen <= 0) // Error
596 printfd(__FILE__, "recvfrom res=%d, error: '%s'\n", dataLen, strerror(errno));
597 logger("recvfrom error: %s", strerror(errno));
606 uint32_t sip = outerAddr.sin_addr.s_addr;
607 uint16_t sport = htons(outerAddr.sin_port);
610 if (CheckHeader(buffer, sip, &protoVer))
613 char login[PASSWD_LEN]; //TODO why PASSWD_LEN ?
614 memset(login, 0, PASSWD_LEN);
616 DecryptString(login, buffer + 8, PASSWD_LEN, &ctxS);
619 if (users->FindByName(login, &user))
621 logger("User's connect failed: user '%s' not found. IP %s",
623 inet_ntostring(sip).c_str());
624 printfd(__FILE__, "User '%s' NOT found!\n", login);
625 SendError(sip, sport, protoVer, IconvString("Неправильный логин.", "utf8", "koi8-ru"));
629 printfd(__FILE__, "User '%s' FOUND!\n", user->GetLogin().c_str());
631 if (user->GetProperty().disabled.Get())
633 logger("Cannont authorize '%s', user is disabled.", login);
634 SendError(sip, sport, protoVer, IconvString("Учетная запись заблокирована.", "utf8", "koi8-ru"));
638 if (user->GetProperty().passive.Get())
640 logger("Cannont authorize '%s', user is passive.", login);
641 SendError(sip, sport, protoVer, IconvString("Учетная запись заморожена.", "utf8", "koi8-ru"));
645 if (!user->GetProperty().ips.Get().IsIPInIPS(sip))
647 printfd(__FILE__, "User %s. IP address is incorrect. IP %s\n",
648 user->GetLogin().c_str(), inet_ntostring(sip).c_str());
649 logger("User %s. IP address is incorrect. IP %s",
650 user->GetLogin().c_str(), inet_ntostring(sip).c_str());
651 SendError(sip, sport, protoVer, IconvString("Пользователь не опознан. Проверьте IP-адрес.", "utf8", "koi8-ru"));
655 return PacketProcessor(buffer, dataLen, sip, sport, protoVer, user);
657 //-----------------------------------------------------------------------------
658 int AUTH_IA::CheckHeader(const char * buffer, uint32_t sip, int * protoVer)
660 if (strncmp(IA_ID, buffer, strlen(IA_ID)) != 0)
662 printfd(__FILE__, "update needed - IA_ID\n");
663 if (iaSettings.LogProtocolErrors())
664 logger("IP: %s. Header: invalid packed signature.", inet_ntostring(sip).c_str());
668 if (buffer[6] != 0) //proto[0] shoud be 0
670 printfd(__FILE__, "update needed - PROTO major: %d\n", buffer[6]);
671 if (iaSettings.LogProtocolErrors())
672 logger("IP: %s. Header: invalid protocol major version: %d.", inet_ntostring(sip).c_str(), buffer[6]);
679 printfd(__FILE__, "update needed - PROTO minor: %d\n", buffer[7]);
680 if (iaSettings.LogProtocolErrors())
681 logger("IP: %s. Header: invalid protocol minor version: %d.", inet_ntostring(sip).c_str(), buffer[7]);
686 *protoVer = buffer[7];
690 //-----------------------------------------------------------------------------
691 int AUTH_IA::Timeouter()
693 STG_LOCKER lock(&mutex);
695 std::map<uint32_t, IA_USER>::iterator it;
696 it = ip2user.begin();
698 while (it != ip2user.end())
700 uint32_t sip = it->first;
702 static UTIME currTime;
703 gettimeofday(&currTime, NULL);
705 if ((it->second.phase.GetPhase() == 2)
706 && (currTime - it->second.phase.GetTime()) > iaSettings.GetUserDelay())
708 if (iaSettings.LogProtocolErrors())
709 logger("User '%s'. Protocol version: %d. Phase 2: connect request timeout (%f > %d).", it->second.login.c_str(), it->second.protoVer, (currTime - it->second.phase.GetTime()).AsDouble(), iaSettings.GetUserDelay().GetSec());
710 it->second.phase.SetPhase1();
711 printfd(__FILE__, "Phase changed from 2 to 1. Reason: timeout\n");
716 if (it->second.phase.GetPhase() == 3)
718 if (!it->second.messagesToSend.empty())
720 if (it->second.protoVer == 6)
721 RealSendMessage6(*it->second.messagesToSend.begin(), sip, it->second);
723 if (it->second.protoVer == 7)
724 RealSendMessage7(*it->second.messagesToSend.begin(), sip, it->second);
726 if (it->second.protoVer == 8)
727 RealSendMessage8(*it->second.messagesToSend.begin(), sip, it->second);
729 it->second.messagesToSend.erase(it->second.messagesToSend.begin());
732 if((currTime - it->second.lastSendAlive) > iaSettings.GetUserDelay())
734 switch (it->second.protoVer)
737 Send_ALIVE_SYN_6(&(it->second), sip);
740 Send_ALIVE_SYN_7(&(it->second), sip);
743 Send_ALIVE_SYN_8(&(it->second), sip);
747 gettimeofday(&it->second.lastSendAlive, NULL);
750 if ((currTime - it->second.phase.GetTime()) > iaSettings.GetUserTimeout())
752 if (iaSettings.LogProtocolErrors())
753 logger("User '%s'. Protocol version: %d. Phase 3: alive timeout (%f > %d).", it->second.login.c_str(), it->second.protoVer, (currTime - it->second.phase.GetTime()).AsDouble(), iaSettings.GetUserTimeout().GetSec());
754 users->Unauthorize(it->second.user->GetLogin(), this);
760 if ((it->second.phase.GetPhase() == 4)
761 && ((currTime - it->second.phase.GetTime()) > iaSettings.GetUserDelay()))
763 if (iaSettings.LogProtocolErrors())
764 logger("User '%s'. Protocol version: %d. Phase 4: disconnect request timeout (%f > %d).", it->second.login.c_str(), it->second.protoVer, (currTime - it->second.phase.GetTime()).AsDouble(), iaSettings.GetUserDelay().GetSec());
765 it->second.phase.SetPhase3();
766 printfd(__FILE__, "Phase changed from 4 to 3. Reason: timeout\n");
774 //-----------------------------------------------------------------------------
775 int AUTH_IA::PacketProcessor(void * buff, size_t dataLen, uint32_t sip, uint16_t sport, int protoVer, USER_PTR user)
777 std::string login(user->GetLogin());
778 const size_t offset = LOGIN_LEN + 2 + 6; // LOGIN_LEN + sizeOfMagic + sizeOfVer;
780 STG_LOCKER lock(&mutex);
781 std::map<uint32_t, IA_USER>::iterator it(ip2user.find(sip));
783 if (it == ip2user.end())
786 if (!users->FindByIPIdx(sip, &userPtr))
788 if (userPtr->GetID() != user->GetID())
790 printfd(__FILE__, "IP address already in use by user '%s'. IP %s, login: '%s'\n",
791 userPtr->GetLogin().c_str(),
792 inet_ntostring(sip).c_str(),
794 logger("IP address is already in use by user '%s'. IP %s, login: '%s'",
795 userPtr->GetLogin().c_str(),
796 inet_ntostring(sip).c_str(),
798 SendError(sip, sport, protoVer, IconvString("IP-адрес уже сипользуется.", "utf8", "koi8-ru"));
803 printfd(__FILE__, "Add new user '%s' from ip %s\n",
804 login.c_str(), inet_ntostring(sip).c_str());
805 std::pair<std::map<uint32_t, IA_USER>::iterator, bool> res;
806 res = ip2user.insert(std::make_pair(sip, IA_USER(login, user, sport, protoVer)));
808 #ifdef IA_PHASE_DEBUG
809 it->second.phase.SetLogFileName(stgSettings->GetLogFileName());
810 it->second.phase.SetUserLogin(login);
813 else if (user->GetID() != it->second.user->GetID())
815 printfd(__FILE__, "IP address already in use by user '%s'. IP %s, login: '%s'\n",
816 it->second.user->GetLogin().c_str(),
817 inet_ntostring(sip).c_str(),
818 user->GetLogin().c_str());
819 logger("IP address is already in use by user '%s'. IP %s, login: '%s'",
820 it->second.user->GetLogin().c_str(),
821 inet_ntostring(sip).c_str(),
822 user->GetLogin().c_str());
823 SendError(sip, sport, protoVer, IconvString("IP-адрес уже используется.", "utf8", "koi8-ru"));
827 IA_USER * iaUser = &(it->second);
829 if (iaUser->password != user->GetProperty().password.Get())
831 const std::string & password = user->GetProperty().password.Get();
832 InitContext(password.c_str(), password.length(), &iaUser->ctx);
833 iaUser->password = user->GetProperty().password.Get();
836 DecryptString(static_cast<char *>(buff) + offset, static_cast<char *>(buff) + offset, (dataLen - offset), &iaUser->ctx);
838 char packetName[IA_MAX_TYPE_LEN];
839 strncpy(packetName, static_cast<char *>(buff) + offset + 4, IA_MAX_TYPE_LEN);
840 packetName[IA_MAX_TYPE_LEN - 1] = 0;
842 std::map<std::string, int>::iterator pi(packetTypes.find(packetName));
843 if (pi == packetTypes.end())
845 SendError(sip, sport, protoVer, IconvString("Неправильный логин или пароль.", "utf8", "koi8-ru"));
846 printfd(__FILE__, "Login or password is wrong!\n");
847 logger("User's connect failed. User: '%s', ip %s. Wrong login or password",
849 inet_ntostring(sip).c_str());
854 if (user->IsAuthorizedBy(this) && user->GetCurrIP() != sip)
856 printfd(__FILE__, "Login %s already in use from ip %s. IP %s\n",
857 login.c_str(), inet_ntostring(user->GetCurrIP()).c_str(),
858 inet_ntostring(sip).c_str());
859 logger("Login '%s' is already in use from ip %s. IP %s",
861 inet_ntostring(user->GetCurrIP()).c_str(),
862 inet_ntostring(sip).c_str());
863 SendError(sip, sport, protoVer, IconvString("Логин уже используется.", "utf8", "koi8-ru"));
874 if (Process_CONN_SYN_6(static_cast<CONN_SYN_6 *>(buff), &(it->second), sip))
876 return Send_CONN_SYN_ACK_6(iaUser, sip);
878 if (Process_CONN_SYN_7(static_cast<CONN_SYN_7 *>(buff), &(it->second), sip))
880 return Send_CONN_SYN_ACK_7(iaUser, sip);
882 if (Process_CONN_SYN_8(static_cast<CONN_SYN_8 *>(buff), &(it->second), sip))
884 return Send_CONN_SYN_ACK_8(iaUser, sip);
892 if (Process_CONN_ACK_6(static_cast<CONN_ACK_6 *>(buff), iaUser, sip))
894 return Send_ALIVE_SYN_6(iaUser, sip);
896 if (Process_CONN_ACK_7(static_cast<CONN_ACK_6 *>(buff), iaUser, sip))
898 return Send_ALIVE_SYN_7(iaUser, sip);
900 if (Process_CONN_ACK_8(static_cast<CONN_ACK_8 *>(buff), iaUser, sip))
902 return Send_ALIVE_SYN_8(iaUser, sip);
910 return Process_ALIVE_ACK_6(static_cast<ALIVE_ACK_6 *>(buff), iaUser, sip);
912 return Process_ALIVE_ACK_7(static_cast<ALIVE_ACK_6 *>(buff), iaUser, sip);
914 return Process_ALIVE_ACK_8(static_cast<ALIVE_ACK_8 *>(buff), iaUser, sip);
922 if (Process_DISCONN_SYN_6(static_cast<DISCONN_SYN_6 *>(buff), iaUser, sip))
924 return Send_DISCONN_SYN_ACK_6(iaUser, sip);
926 if (Process_DISCONN_SYN_7(static_cast<DISCONN_SYN_6 *>(buff), iaUser, sip))
928 return Send_DISCONN_SYN_ACK_7(iaUser, sip);
930 if (Process_DISCONN_SYN_8(static_cast<DISCONN_SYN_8 *>(buff), iaUser, sip))
932 return Send_DISCONN_SYN_ACK_8(iaUser, sip);
940 if (Process_DISCONN_ACK_6(static_cast<DISCONN_ACK_6 *>(buff), iaUser, sip, it))
942 return Send_FIN_6(iaUser, sip, it);
944 if (Process_DISCONN_ACK_7(static_cast<DISCONN_ACK_6 *>(buff), iaUser, sip, it))
946 return Send_FIN_7(iaUser, sip, it);
948 if (Process_DISCONN_ACK_8(static_cast<DISCONN_ACK_8 *>(buff), iaUser, sip, it))
950 return Send_FIN_8(iaUser, sip, it);
957 //-----------------------------------------------------------------------------
958 void AUTH_IA::DelUser(USER_PTR u)
961 uint32_t ip = u->GetCurrIP();
966 std::map<uint32_t, IA_USER>::iterator it;
968 STG_LOCKER lock(&mutex);
969 it = ip2user.find(ip);
970 if (it == ip2user.end())
973 printfd(__FILE__, "Nothing to delete\n");
977 if (it->second.user == u)
979 printfd(__FILE__, "User removed!\n");
980 users->Unauthorize(u->GetLogin(), this);
984 //-----------------------------------------------------------------------------
985 int AUTH_IA::SendError(uint32_t ip, uint16_t port, int protoVer, const std::string & text)
987 struct sockaddr_in sendAddr;
994 memset(&err, 0, sizeof(ERR));
996 sendAddr.sin_family = AF_INET;
997 sendAddr.sin_port = htons(port);
998 sendAddr.sin_addr.s_addr = ip;
1001 strncpy((char*)err.type, "ERR", 16);
1002 strncpy((char*)err.text, text.c_str(), MAX_MSG_LEN);
1008 res = sendto(listenSocket, &err, sizeof(err), 0, (struct sockaddr*)&sendAddr, sizeof(sendAddr));
1009 printfd(__FILE__, "SendError %d bytes sent\n", res);
1014 memset(&err8, 0, sizeof(ERR_8));
1016 sendAddr.sin_family = AF_INET;
1017 sendAddr.sin_port = htons(port);
1018 sendAddr.sin_addr.s_addr = ip;
1021 strncpy((char*)err8.type, "ERR", 16);
1022 strncpy((char*)err8.text, text.c_str(), MAX_MSG_LEN);
1025 SwapBytes(err8.len);
1028 res = sendto(listenSocket, &err8, sizeof(err8), 0, (struct sockaddr*)&sendAddr, sizeof(sendAddr));
1029 printfd(__FILE__, "SendError_8 %d bytes sent\n", res);
1035 //-----------------------------------------------------------------------------
1036 int AUTH_IA::Send(uint32_t ip, uint16_t port, const char * buffer, size_t len)
1038 struct sockaddr_in sendAddr;
1040 sendAddr.sin_family = AF_INET;
1041 sendAddr.sin_port = htons(port);
1042 sendAddr.sin_addr.s_addr = ip;
1044 if (sendto(listenSocket, buffer, len, 0, (struct sockaddr*)&sendAddr, sizeof(sendAddr)) == static_cast<ssize_t>(len))
1049 //-----------------------------------------------------------------------------
1050 int AUTH_IA::SendMessage(const STG_MSG & msg, uint32_t ip) const
1052 printfd(__FILE__, "SendMessage userIP=%s\n", inet_ntostring(ip).c_str());
1054 std::map<uint32_t, IA_USER>::iterator it;
1056 STG_LOCKER lock(&mutex);
1057 it = ip2user.find(ip);
1058 if (it == ip2user.end())
1060 errorStr = "Unknown user.";
1063 it->second.messagesToSend.push_back(msg);
1066 //-----------------------------------------------------------------------------
1067 int AUTH_IA::RealSendMessage6(const STG_MSG & msg, uint32_t ip, IA_USER & user)
1069 printfd(__FILE__, "RealSendMessage 6 user=%s\n", user.login.c_str());
1072 memset(&info, 0, sizeof(INFO_6));
1075 strncpy((char*)info.type, "INFO", 16);
1076 info.infoType = 'I';
1077 strncpy((char*)info.text, msg.text.c_str(), 235);
1080 size_t len = info.len;
1082 SwapBytes(info.len);
1086 memcpy(buffer, &info, sizeof(INFO_6));
1087 EncryptString(buffer, buffer, len, &user.ctx);
1088 return Send(ip, iaSettings.GetUserPort(), buffer, len);
1090 //-----------------------------------------------------------------------------
1091 int AUTH_IA::RealSendMessage7(const STG_MSG & msg, uint32_t ip, IA_USER & user)
1093 printfd(__FILE__, "RealSendMessage 7 user=%s\n", user.login.c_str());
1096 memset(&info, 0, sizeof(INFO_7));
1099 strncpy((char*)info.type, "INFO_7", 16);
1100 info.infoType = static_cast<int8_t>(msg.header.type);
1101 info.showTime = static_cast<int8_t>(msg.header.showTime);
1102 info.sendTime = msg.header.creationTime;
1104 size_t len = info.len;
1106 SwapBytes(info.len);
1107 SwapBytes(info.sendTime);
1110 strncpy((char*)info.text, msg.text.c_str(), MAX_MSG_LEN - 1);
1111 info.text[MAX_MSG_LEN - 1] = 0;
1114 memcpy(buffer, &info, sizeof(INFO_7));
1116 EncryptString(buffer, buffer, len, &user.ctx);
1117 return Send(ip, iaSettings.GetUserPort(), buffer, len);
1119 //-----------------------------------------------------------------------------
1120 int AUTH_IA::RealSendMessage8(const STG_MSG & msg, uint32_t ip, IA_USER & user)
1122 printfd(__FILE__, "RealSendMessage 8 user=%s\n", user.login.c_str());
1125 memset(&info, 0, sizeof(INFO_8));
1128 strncpy((char*)info.type, "INFO_8", 16);
1129 info.infoType = static_cast<int8_t>(msg.header.type);
1130 info.showTime = static_cast<int8_t>(msg.header.showTime);
1131 info.sendTime = msg.header.creationTime;
1133 strncpy((char*)info.text, msg.text.c_str(), IA_MAX_MSG_LEN_8 - 1);
1134 info.text[IA_MAX_MSG_LEN_8 - 1] = 0;
1136 size_t len = info.len;
1138 SwapBytes(info.len);
1139 SwapBytes(info.sendTime);
1143 memcpy(buffer, &info, sizeof(INFO_8));
1145 EncryptString(buffer, buffer, len, &user.ctx);
1146 return Send(ip, user.port, buffer, len);
1148 //-----------------------------------------------------------------------------
1149 int AUTH_IA::Process_CONN_SYN_6(CONN_SYN_6 *, IA_USER * iaUser, uint32_t)
1151 if (!(iaUser->phase.GetPhase() == 1 || iaUser->phase.GetPhase() == 3))
1154 enabledDirs = 0xFFffFFff;
1156 iaUser->phase.SetPhase2();
1157 printfd(__FILE__, "Phase changed from %d to 2. Reason: CONN_SYN_6\n", iaUser->phase.GetPhase());
1160 //-----------------------------------------------------------------------------
1161 int AUTH_IA::Process_CONN_SYN_7(CONN_SYN_7 * connSyn, IA_USER * iaUser, uint32_t sip)
1163 return Process_CONN_SYN_6(connSyn, iaUser, sip);
1165 //-----------------------------------------------------------------------------
1166 int AUTH_IA::Process_CONN_SYN_8(CONN_SYN_8 * connSyn, IA_USER * iaUser, uint32_t sip)
1169 SwapBytes(connSyn->dirs);
1171 int ret = Process_CONN_SYN_6(reinterpret_cast<CONN_SYN_6 *>(connSyn), iaUser, sip);
1172 enabledDirs = connSyn->dirs;
1175 //-----------------------------------------------------------------------------
1176 int AUTH_IA::Process_CONN_ACK_6(CONN_ACK_6 * connAck, IA_USER * iaUser, uint32_t sip)
1179 SwapBytes(connAck->len);
1180 SwapBytes(connAck->rnd);
1182 printfd( __FILE__, "CONN_ACK_6 %s\n", connAck->type);
1184 if ((iaUser->phase.GetPhase() == 2) && (connAck->rnd == iaUser->rnd + 1))
1186 iaUser->phase.UpdateTime();
1188 iaUser->lastSendAlive = iaUser->phase.GetTime();
1189 if (users->Authorize(iaUser->login, sip, enabledDirs, this))
1191 iaUser->phase.SetPhase3();
1192 printfd(__FILE__, "Phase changed from 2 to 3. Reason: CONN_ACK_6\n");
1197 errorStr = iaUser->user->GetStrError();
1198 if (iaSettings.LogProtocolErrors())
1199 logger("IP: %s. User '%s'. Protocol version: %d. CONN_ACK: phase 2, authorization error ('%s').", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, errorStr.c_str());
1200 iaUser->phase.SetPhase1();
1202 printfd(__FILE__, "Phase changed from 2 to 1. Reason: failed to authorize user\n");
1206 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d, expected: %d\n", iaUser->phase.GetPhase(), connAck->rnd, iaUser->rnd + 1);
1207 if (iaSettings.LogProtocolErrors())
1209 if (iaUser->phase.GetPhase() != 2)
1210 logger("IP: %s. User '%s'. Protocol version: %d. CONN_ACK: invalid phase, expected 2, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, iaUser->phase.GetPhase());
1211 if (connAck->rnd != iaUser->rnd + 1)
1212 logger("IP: %s. User '%s'. Protocol version: %d. CONN_ACK: invalid control number, expected %d, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, (iaUser->rnd + 1), connAck->rnd);
1216 //-----------------------------------------------------------------------------
1217 int AUTH_IA::Process_CONN_ACK_7(CONN_ACK_7 * connAck, IA_USER * iaUser, uint32_t sip)
1219 return Process_CONN_ACK_6(connAck, iaUser, sip);
1221 //-----------------------------------------------------------------------------
1222 int AUTH_IA::Process_CONN_ACK_8(CONN_ACK_8 * connAck, IA_USER * iaUser, uint32_t sip)
1225 SwapBytes(connAck->len);
1226 SwapBytes(connAck->rnd);
1228 printfd( __FILE__, "CONN_ACK_8 %s\n", connAck->type);
1230 if ((iaUser->phase.GetPhase() == 2) && (connAck->rnd == iaUser->rnd + 1))
1232 iaUser->phase.UpdateTime();
1233 iaUser->lastSendAlive = iaUser->phase.GetTime();
1234 if (users->Authorize(iaUser->login, sip, enabledDirs, this))
1236 iaUser->phase.SetPhase3();
1237 printfd(__FILE__, "Phase changed from 2 to 3. Reason: CONN_ACK_8\n");
1242 errorStr = iaUser->user->GetStrError();
1243 if (iaSettings.LogProtocolErrors())
1244 logger("IP: %s. User '%s'. Protocol version: %d. CONN_ACK: phase 2, authorization error ('%s').", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, errorStr.c_str());
1245 iaUser->phase.SetPhase1();
1247 printfd(__FILE__, "Phase changed from 2 to 1. Reason: failed to authorize user\n");
1251 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d, expected: %d\n", iaUser->phase.GetPhase(), connAck->rnd, iaUser->rnd + 1);
1252 if (iaSettings.LogProtocolErrors())
1254 if (iaUser->phase.GetPhase() != 2)
1255 logger("IP: %s. User '%s'. Protocol version: %d. CONN_ACK: invalid phase, expected 2, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, iaUser->phase.GetPhase());
1256 if (connAck->rnd != iaUser->rnd + 1)
1257 logger("IP: %s. User '%s'. Protocol version: %d. CONN_ACK: invalid control number, expected %d, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, (iaUser->rnd + 1), connAck->rnd);
1261 //-----------------------------------------------------------------------------
1262 int AUTH_IA::Process_ALIVE_ACK_6(ALIVE_ACK_6 * aliveAck, IA_USER * iaUser, uint32_t)
1265 SwapBytes(aliveAck->len);
1266 SwapBytes(aliveAck->rnd);
1268 printfd(__FILE__, "ALIVE_ACK_6\n");
1269 if ((iaUser->phase.GetPhase() == 3) && (aliveAck->rnd == iaUser->rnd + 1))
1271 iaUser->phase.UpdateTime();
1273 iaUser->aliveSent = false;
1278 //-----------------------------------------------------------------------------
1279 int AUTH_IA::Process_ALIVE_ACK_7(ALIVE_ACK_7 * aliveAck, IA_USER * iaUser, uint32_t sip)
1281 return Process_ALIVE_ACK_6(aliveAck, iaUser, sip);
1283 //-----------------------------------------------------------------------------
1284 int AUTH_IA::Process_ALIVE_ACK_8(ALIVE_ACK_8 * aliveAck, IA_USER * iaUser, uint32_t)
1287 SwapBytes(aliveAck->len);
1288 SwapBytes(aliveAck->rnd);
1290 printfd(__FILE__, "ALIVE_ACK_8\n");
1291 if ((iaUser->phase.GetPhase() == 3) && (aliveAck->rnd == iaUser->rnd + 1))
1293 iaUser->phase.UpdateTime();
1295 iaUser->aliveSent = false;
1300 //-----------------------------------------------------------------------------
1301 int AUTH_IA::Process_DISCONN_SYN_6(DISCONN_SYN_6 *, IA_USER * iaUser, uint32_t sip)
1303 printfd(__FILE__, "DISCONN_SYN_6\n");
1304 if (iaUser->phase.GetPhase() != 3)
1306 if (iaSettings.LogProtocolErrors())
1307 logger("IP: %s. User '%s'. Protocol version: %d. DISCONN_SYN: invalid phase, expected 3, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, iaUser->phase.GetPhase());
1308 printfd(__FILE__, "Invalid phase. Expected 3, actual %d\n", iaUser->phase.GetPhase());
1309 errorStr = "Incorrect request DISCONN_SYN";
1313 iaUser->phase.SetPhase4();
1314 printfd(__FILE__, "Phase changed from 3 to 4. Reason: DISCONN_SYN_6\n");
1318 //-----------------------------------------------------------------------------
1319 int AUTH_IA::Process_DISCONN_SYN_7(DISCONN_SYN_7 * disconnSyn, IA_USER * iaUser, uint32_t sip)
1321 return Process_DISCONN_SYN_6(disconnSyn, iaUser, sip);
1323 //-----------------------------------------------------------------------------
1324 int AUTH_IA::Process_DISCONN_SYN_8(DISCONN_SYN_8 *, IA_USER * iaUser, uint32_t sip)
1326 if (iaUser->phase.GetPhase() != 3)
1328 if (iaSettings.LogProtocolErrors())
1329 logger("IP: %s. User '%s'. Protocol version: %d. DISCONN_SYN: invalid phase, expected 3, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, iaUser->phase.GetPhase());
1330 errorStr = "Incorrect request DISCONN_SYN";
1331 printfd(__FILE__, "Invalid phase. Expected 3, actual %d\n", iaUser->phase.GetPhase());
1335 iaUser->phase.SetPhase4();
1336 printfd(__FILE__, "Phase changed from 3 to 4. Reason: DISCONN_SYN_6\n");
1340 //-----------------------------------------------------------------------------
1341 int AUTH_IA::Process_DISCONN_ACK_6(DISCONN_ACK_6 * disconnAck,
1344 std::map<uint32_t, IA_USER>::iterator)
1347 SwapBytes(disconnAck->len);
1348 SwapBytes(disconnAck->rnd);
1350 printfd(__FILE__, "DISCONN_ACK_6\n");
1351 if (!((iaUser->phase.GetPhase() == 4) && (disconnAck->rnd == iaUser->rnd + 1)))
1353 if (iaSettings.LogProtocolErrors())
1355 if (iaUser->phase.GetPhase() != 4)
1356 logger("IP: %s. User '%s'. Protocol version: %d. DISCONN_ACK: invalid phase, expected 4, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, iaUser->phase.GetPhase());
1357 if (disconnAck->rnd != iaUser->rnd + 1)
1358 logger("IP: %s. User '%s'. Protocol version: %d. DISCONN_ACK: invalid control number, expected %d, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, (iaUser->rnd + 1), disconnAck->rnd);
1360 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), disconnAck->rnd);
1366 //-----------------------------------------------------------------------------
1367 int AUTH_IA::Process_DISCONN_ACK_7(DISCONN_ACK_7 * disconnAck, IA_USER * iaUser, uint32_t sip, std::map<uint32_t, IA_USER>::iterator it)
1369 return Process_DISCONN_ACK_6(disconnAck, iaUser, sip, it);
1371 //-----------------------------------------------------------------------------
1372 int AUTH_IA::Process_DISCONN_ACK_8(DISCONN_ACK_8 * disconnAck, IA_USER * iaUser, uint32_t sip, std::map<uint32_t, IA_USER>::iterator)
1375 SwapBytes(disconnAck->len);
1376 SwapBytes(disconnAck->rnd);
1378 printfd(__FILE__, "DISCONN_ACK_8\n");
1379 if (!((iaUser->phase.GetPhase() == 4) && (disconnAck->rnd == iaUser->rnd + 1)))
1381 if (iaSettings.LogProtocolErrors())
1383 if (iaUser->phase.GetPhase() != 4)
1384 logger("IP: %s. User '%s'. Protocol version: %d. DISCONN_ACK: invalid phase, expected 4, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, iaUser->phase.GetPhase());
1385 if (disconnAck->rnd != iaUser->rnd + 1)
1386 logger("IP: %s. User '%s'. Protocol version: %d. DISCONN_ACK: invalid control number, expected %d, got %d.", inet_ntostring(sip).c_str(), iaUser->login.c_str(), iaUser->protoVer, (iaUser->rnd + 1), disconnAck->rnd);
1388 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), disconnAck->rnd);
1394 //-----------------------------------------------------------------------------
1395 int AUTH_IA::Send_CONN_SYN_ACK_6(IA_USER * iaUser, uint32_t sip)
1397 //+++ Fill static data in connSynAck +++
1398 // TODO Move this code. It must be executed only once
1399 connSynAck6.len = Min8(sizeof(CONN_SYN_ACK_6));
1400 strcpy((char*)connSynAck6.type, "CONN_SYN_ACK");
1401 for (int j = 0; j < DIR_NUM; j++)
1403 strncpy((char*)connSynAck6.dirName[j],
1404 stgSettings->GetDirName(j).c_str(),
1407 connSynAck6.dirName[j][sizeof(string16) - 1] = 0;
1409 //--- Fill static data in connSynAck ---
1411 iaUser->rnd = static_cast<uint32_t>(random());
1412 connSynAck6.rnd = iaUser->rnd;
1414 printfd(__FILE__, "Sending CONN_SYN_ACK with control number %d.\n", iaUser->rnd);
1416 connSynAck6.userTimeOut = iaSettings.GetUserTimeout().GetSec();
1417 connSynAck6.aliveDelay = iaSettings.GetUserDelay().GetSec();
1420 SwapBytes(connSynAck6.len);
1421 SwapBytes(connSynAck6.rnd);
1422 SwapBytes(connSynAck6.userTimeOut);
1423 SwapBytes(connSynAck6.aliveDelay);
1426 EncryptString((char*)&connSynAck6, (char*)&connSynAck6, Min8(sizeof(CONN_SYN_ACK_6)), &iaUser->ctx);
1427 return Send(sip, iaSettings.GetUserPort(), (char*)&connSynAck6, Min8(sizeof(CONN_SYN_ACK_6)));;
1429 //-----------------------------------------------------------------------------
1430 int AUTH_IA::Send_CONN_SYN_ACK_7(IA_USER * iaUser, uint32_t sip)
1432 return Send_CONN_SYN_ACK_6(iaUser, sip);
1434 //-----------------------------------------------------------------------------
1435 int AUTH_IA::Send_CONN_SYN_ACK_8(IA_USER * iaUser, uint32_t sip)
1437 strcpy((char*)connSynAck8.hdr.magic, IA_ID);
1438 connSynAck8.hdr.protoVer[0] = 0;
1439 connSynAck8.hdr.protoVer[1] = 8;
1441 //+++ Fill static data in connSynAck +++
1442 // TODO Move this code. It must be executed only once
1443 connSynAck8.len = Min8(sizeof(CONN_SYN_ACK_8));
1444 strcpy((char*)connSynAck8.type, "CONN_SYN_ACK");
1445 for (int j = 0; j < DIR_NUM; j++)
1447 strncpy((char*)connSynAck8.dirName[j],
1448 stgSettings->GetDirName(j).c_str(),
1451 connSynAck8.dirName[j][sizeof(string16) - 1] = 0;
1453 //--- Fill static data in connSynAck ---
1455 iaUser->rnd = static_cast<uint32_t>(random());
1456 connSynAck8.rnd = iaUser->rnd;
1458 printfd(__FILE__, "Sending CONN_SYN_ACK with control number %d.\n", iaUser->rnd);
1460 connSynAck8.userTimeOut = iaSettings.GetUserTimeout().GetSec();
1461 connSynAck8.aliveDelay = iaSettings.GetUserDelay().GetSec();
1464 SwapBytes(connSynAck8.len);
1465 SwapBytes(connSynAck8.rnd);
1466 SwapBytes(connSynAck8.userTimeOut);
1467 SwapBytes(connSynAck8.aliveDelay);
1470 EncryptString((char*)&connSynAck8, (char*)&connSynAck8, Min8(sizeof(CONN_SYN_ACK_8)), &iaUser->ctx);
1471 return Send(sip, iaUser->port, (char*)&connSynAck8, Min8(sizeof(CONN_SYN_ACK_8)));
1473 //-----------------------------------------------------------------------------
1474 int AUTH_IA::Send_ALIVE_SYN_6(IA_USER * iaUser, uint32_t sip)
1476 aliveSyn6.len = Min8(sizeof(ALIVE_SYN_6));
1477 aliveSyn6.rnd = iaUser->rnd = static_cast<uint32_t>(random());
1479 strcpy((char*)aliveSyn6.type, "ALIVE_SYN");
1481 for (int i = 0; i < DIR_NUM; i++)
1483 aliveSyn6.md[i] = iaUser->user->GetProperty().down.Get()[i];
1484 aliveSyn6.mu[i] = iaUser->user->GetProperty().up.Get()[i];
1486 aliveSyn6.sd[i] = iaUser->user->GetSessionDownload()[i];
1487 aliveSyn6.su[i] = iaUser->user->GetSessionUpload()[i];
1491 int dn = iaSettings.GetFreeMbShowType();
1492 const TARIFF * tf = iaUser->user->GetTariff();
1496 double p = tf->GetPriceWithTraffType(aliveSyn6.mu[dn],
1501 if (std::fabs(p) < 1.0e-3)
1503 snprintf((char*)aliveSyn6.freeMb, IA_FREEMB_LEN, "---");
1507 double fmb = iaUser->user->GetProperty().freeMb;
1508 fmb = fmb < 0 ? 0 : fmb;
1509 snprintf((char*)aliveSyn6.freeMb, IA_FREEMB_LEN, "%.3f", fmb / p);
1514 if (freeMbNone == iaSettings.GetFreeMbShowType())
1516 aliveSyn6.freeMb[0] = 0;
1520 double fmb = iaUser->user->GetProperty().freeMb;
1521 fmb = fmb < 0 ? 0 : fmb;
1522 snprintf((char*)aliveSyn6.freeMb, IA_FREEMB_LEN, "C%.3f", fmb);
1527 if (iaUser->aliveSent)
1529 printfd(__FILE__, "========= ALIVE_ACK_6(7) TIMEOUT !!! %s =========\n", iaUser->login.c_str());
1531 iaUser->aliveSent = true;
1534 aliveSyn6.cash =(int64_t) (iaUser->user->GetProperty().cash.Get() * 1000.0);
1535 if (!stgSettings->GetShowFeeInCash())
1536 aliveSyn6.cash -= (int64_t)(tf->GetFee() * 1000.0);
1539 SwapBytes(aliveSyn6.len);
1540 SwapBytes(aliveSyn6.rnd);
1541 SwapBytes(aliveSyn6.cash);
1542 for (int i = 0; i < DIR_NUM; ++i)
1544 SwapBytes(aliveSyn6.mu[i]);
1545 SwapBytes(aliveSyn6.md[i]);
1546 SwapBytes(aliveSyn6.su[i]);
1547 SwapBytes(aliveSyn6.sd[i]);
1551 EncryptString((char*)&aliveSyn6, (char*)&aliveSyn6, Min8(sizeof(aliveSyn6)), &iaUser->ctx);
1552 return Send(sip, iaSettings.GetUserPort(), (char*)&aliveSyn6, Min8(sizeof(aliveSyn6)));
1554 //-----------------------------------------------------------------------------
1555 int AUTH_IA::Send_ALIVE_SYN_7(IA_USER * iaUser, uint32_t sip)
1557 return Send_ALIVE_SYN_6(iaUser, sip);
1559 //-----------------------------------------------------------------------------
1560 int AUTH_IA::Send_ALIVE_SYN_8(IA_USER * iaUser, uint32_t sip)
1562 strcpy((char*)aliveSyn8.hdr.magic, IA_ID);
1563 aliveSyn8.hdr.protoVer[0] = 0;
1564 aliveSyn8.hdr.protoVer[1] = 8;
1566 aliveSyn8.len = Min8(sizeof(ALIVE_SYN_8));
1567 aliveSyn8.rnd = iaUser->rnd = static_cast<uint32_t>(random());
1569 strcpy((char*)aliveSyn8.type, "ALIVE_SYN");
1571 for (int i = 0; i < DIR_NUM; i++)
1573 aliveSyn8.md[i] = iaUser->user->GetProperty().down.Get()[i];
1574 aliveSyn8.mu[i] = iaUser->user->GetProperty().up.Get()[i];
1576 aliveSyn8.sd[i] = iaUser->user->GetSessionDownload()[i];
1577 aliveSyn8.su[i] = iaUser->user->GetSessionUpload()[i];
1581 int dn = iaSettings.GetFreeMbShowType();
1585 const TARIFF * tf = iaUser->user->GetTariff();
1586 double p = tf->GetPriceWithTraffType(aliveSyn8.mu[dn],
1591 if (std::fabs(p) < 1.0e-3)
1593 snprintf((char*)aliveSyn8.freeMb, IA_FREEMB_LEN, "---");
1597 double fmb = iaUser->user->GetProperty().freeMb;
1598 fmb = fmb < 0 ? 0 : fmb;
1599 snprintf((char*)aliveSyn8.freeMb, IA_FREEMB_LEN, "%.3f", fmb / p);
1604 if (freeMbNone == iaSettings.GetFreeMbShowType())
1606 aliveSyn8.freeMb[0] = 0;
1610 double fmb = iaUser->user->GetProperty().freeMb;
1611 fmb = fmb < 0 ? 0 : fmb;
1612 snprintf((char*)aliveSyn8.freeMb, IA_FREEMB_LEN, "C%.3f", fmb);
1617 if (iaUser->aliveSent)
1619 printfd(__FILE__, "========= ALIVE_ACK_8 TIMEOUT !!! =========\n");
1621 iaUser->aliveSent = true;
1624 const TARIFF * tf = iaUser->user->GetTariff();
1626 aliveSyn8.cash =(int64_t) (iaUser->user->GetProperty().cash.Get() * 1000.0);
1627 if (!stgSettings->GetShowFeeInCash())
1628 aliveSyn8.cash -= (int64_t)(tf->GetFee() * 1000.0);
1631 SwapBytes(aliveSyn8.len);
1632 SwapBytes(aliveSyn8.rnd);
1633 SwapBytes(aliveSyn8.cash);
1634 SwapBytes(aliveSyn8.status);
1635 for (int i = 0; i < DIR_NUM; ++i)
1637 SwapBytes(aliveSyn8.mu[i]);
1638 SwapBytes(aliveSyn8.md[i]);
1639 SwapBytes(aliveSyn8.su[i]);
1640 SwapBytes(aliveSyn8.sd[i]);
1644 EncryptString((char*)&aliveSyn8, (char*)&aliveSyn8, Min8(sizeof(aliveSyn8)), &iaUser->ctx);
1645 return Send(sip, iaUser->port, (char*)&aliveSyn8, Min8(sizeof(aliveSyn8)));
1647 //-----------------------------------------------------------------------------
1648 int AUTH_IA::Send_DISCONN_SYN_ACK_6(IA_USER * iaUser, uint32_t sip)
1650 disconnSynAck6.len = Min8(sizeof(DISCONN_SYN_ACK_6));
1651 strcpy((char*)disconnSynAck6.type, "DISCONN_SYN_ACK");
1652 disconnSynAck6.rnd = iaUser->rnd = static_cast<uint32_t>(random());
1655 SwapBytes(disconnSynAck6.len);
1656 SwapBytes(disconnSynAck6.rnd);
1659 EncryptString((char*)&disconnSynAck6, (char*)&disconnSynAck6, Min8(sizeof(disconnSynAck6)), &iaUser->ctx);
1660 return Send(sip, iaSettings.GetUserPort(), (char*)&disconnSynAck6, Min8(sizeof(disconnSynAck6)));
1662 //-----------------------------------------------------------------------------
1663 int AUTH_IA::Send_DISCONN_SYN_ACK_7(IA_USER * iaUser, uint32_t sip)
1665 return Send_DISCONN_SYN_ACK_6(iaUser, sip);
1667 //-----------------------------------------------------------------------------
1668 int AUTH_IA::Send_DISCONN_SYN_ACK_8(IA_USER * iaUser, uint32_t sip)
1670 strcpy((char*)disconnSynAck8.hdr.magic, IA_ID);
1671 disconnSynAck8.hdr.protoVer[0] = 0;
1672 disconnSynAck8.hdr.protoVer[1] = 8;
1674 disconnSynAck8.len = Min8(sizeof(DISCONN_SYN_ACK_8));
1675 strcpy((char*)disconnSynAck8.type, "DISCONN_SYN_ACK");
1676 disconnSynAck8.rnd = iaUser->rnd = static_cast<uint32_t>(random());
1679 SwapBytes(disconnSynAck8.len);
1680 SwapBytes(disconnSynAck8.rnd);
1683 EncryptString((char*)&disconnSynAck8, (char*)&disconnSynAck8, Min8(sizeof(disconnSynAck8)), &iaUser->ctx);
1684 return Send(sip, iaUser->port, (char*)&disconnSynAck8, Min8(sizeof(disconnSynAck8)));
1686 //-----------------------------------------------------------------------------
1687 int AUTH_IA::Send_FIN_6(IA_USER * iaUser, uint32_t sip, std::map<uint32_t, IA_USER>::iterator it)
1689 fin6.len = Min8(sizeof(FIN_6));
1690 strcpy((char*)fin6.type, "FIN");
1691 strcpy((char*)fin6.ok, "OK");
1694 SwapBytes(fin6.len);
1697 EncryptString((char*)&fin6, (char*)&fin6, Min8(sizeof(fin6)), &iaUser->ctx);
1699 users->Unauthorize(iaUser->login, this);
1701 int res = Send(sip, iaSettings.GetUserPort(), (char*)&fin6, Min8(sizeof(fin6)));
1707 //-----------------------------------------------------------------------------
1708 int AUTH_IA::Send_FIN_7(IA_USER * iaUser, uint32_t sip, std::map<uint32_t, IA_USER>::iterator it)
1710 return Send_FIN_6(iaUser, sip, it);
1712 //-----------------------------------------------------------------------------
1713 int AUTH_IA::Send_FIN_8(IA_USER * iaUser, uint32_t sip, std::map<uint32_t, IA_USER>::iterator it)
1715 strcpy((char*)fin8.hdr.magic, IA_ID);
1716 fin8.hdr.protoVer[0] = 0;
1717 fin8.hdr.protoVer[1] = 8;
1719 fin8.len = Min8(sizeof(FIN_8));
1720 strcpy((char*)fin8.type, "FIN");
1721 strcpy((char*)fin8.ok, "OK");
1724 SwapBytes(fin8.len);
1727 EncryptString((char*)&fin8, (char*)&fin8, Min8(sizeof(fin8)), &iaUser->ctx);
1729 users->Unauthorize(iaUser->login, this);
1731 int res = Send(sip, iaUser->port, (char*)&fin8, Min8(sizeof(fin8)));