2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
18 * Author : Boris Mikhailenko <stg34@stargazer.dp.ua>
23 $Date: 2010/03/25 15:18:48 $
31 #include <sys/types.h>
32 #include <sys/socket.h>
33 #include <sys/select.h>
34 #include <unistd.h> // usleep, close
38 #include <cstdio> // snprintf
42 #include "stg/common.h"
43 #include "stg/locker.h"
44 #include "stg/tariff.h"
45 #include "stg/user_property.h"
46 #include "stg/settings.h"
47 #include "stg/plugin_creator.h"
48 #include "inetaccess.h"
50 extern volatile const time_t stgTime;
52 void InitEncrypt(BLOWFISH_CTX * ctx, const string & password);
53 void Decrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8);
54 void Encrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8);
56 //-----------------------------------------------------------------------------
57 //-----------------------------------------------------------------------------
58 //-----------------------------------------------------------------------------
59 PLUGIN_CREATOR<AUTH_IA> iac;
60 //-----------------------------------------------------------------------------
61 //-----------------------------------------------------------------------------
62 //-----------------------------------------------------------------------------
65 return iac.GetPlugin();
67 //-----------------------------------------------------------------------------
68 //-----------------------------------------------------------------------------
69 //-----------------------------------------------------------------------------
70 AUTH_IA_SETTINGS::AUTH_IA_SETTINGS()
74 freeMbShowType(freeMbCash)
77 //-----------------------------------------------------------------------------
78 int AUTH_IA_SETTINGS::ParseSettings(const MODULE_SETTINGS & s)
82 vector<PARAM_VALUE>::const_iterator pvi;
83 ///////////////////////////
85 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
86 if (pvi == s.moduleParams.end())
88 errorStr = "Parameter \'Port\' not found.";
89 printfd(__FILE__, "Parameter 'Port' not found\n");
92 if (ParseIntInRange(pvi->value[0], 2, 65535, &p))
94 errorStr = "Cannot parse parameter \'Port\': " + errorStr;
95 printfd(__FILE__, "Cannot parse parameter 'Port'\n");
99 ///////////////////////////
100 pv.param = "UserDelay";
101 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
102 if (pvi == s.moduleParams.end())
104 errorStr = "Parameter \'UserDelay\' not found.";
105 printfd(__FILE__, "Parameter 'UserDelay' not found\n");
109 if (ParseIntInRange(pvi->value[0], 5, 600, &userDelay))
111 errorStr = "Cannot parse parameter \'UserDelay\': " + errorStr;
112 printfd(__FILE__, "Cannot parse parameter 'UserDelay'\n");
115 ///////////////////////////
116 pv.param = "UserTimeout";
117 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
118 if (pvi == s.moduleParams.end())
120 errorStr = "Parameter \'UserTimeout\' not found.";
121 printfd(__FILE__, "Parameter 'UserTimeout' not found\n");
125 if (ParseIntInRange(pvi->value[0], 15, 1200, &userTimeout))
127 errorStr = "Cannot parse parameter \'UserTimeout\': " + errorStr;
128 printfd(__FILE__, "Cannot parse parameter 'UserTimeout'\n");
131 /////////////////////////////////////////////////////////////
135 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
136 if (pvi == s.moduleParams.end())
138 errorStr = "Parameter \'FreeMb\' not found.";
139 printfd(__FILE__, "Parameter 'FreeMb' not found\n");
142 freeMbType = pvi->value[0];
144 if (strcasecmp(freeMbType.c_str(), "cash") == 0)
146 freeMbShowType = freeMbCash;
148 else if (strcasecmp(freeMbType.c_str(), "none") == 0)
150 freeMbShowType = freeMbNone;
152 else if (!str2x(freeMbType.c_str(), n))
154 if (n < 0 || n >= DIR_NUM)
156 errorStr = "Incorrect parameter \'" + freeMbType + "\'.";
157 printfd(__FILE__, "%s\n", errorStr.c_str());
160 freeMbShowType = (FREEMB)(freeMb0 + n);
164 errorStr = "Incorrect parameter \'" + freeMbType + "\'.";
165 printfd(__FILE__, "%s\n", errorStr.c_str());
168 /////////////////////////////////////////////////////////////
171 //-----------------------------------------------------------------------------
172 //-----------------------------------------------------------------------------
173 //-----------------------------------------------------------------------------
174 #ifdef IA_PHASE_DEBUG
179 gettimeofday(&phaseTime, NULL);
185 gettimeofday(&phaseTime, NULL);
188 //-----------------------------------------------------------------------------
189 IA_PHASE::~IA_PHASE()
191 #ifdef IA_PHASE_DEBUG
192 flog = fopen(log.c_str(), "at");
195 fprintf(flog, "IA %s D\n", login.c_str());
200 //-----------------------------------------------------------------------------
201 #ifdef IA_PHASE_DEBUG
202 void IA_PHASE::SetLogFileName(const string & logFileName)
204 log = logFileName + ".ia.log";
206 //-----------------------------------------------------------------------------
207 void IA_PHASE::SetUserLogin(const string & login)
209 IA_PHASE::login = login;
211 //-----------------------------------------------------------------------------
212 void IA_PHASE::WritePhaseChange(int newPhase)
215 gettimeofday(&newPhaseTime, NULL);
216 flog = fopen(log.c_str(), "at");
217 /*int64_t tn = newPhaseTime.GetSec()*1000000 + newPhaseTime.GetUSec();
218 int64_t to = phaseTime.GetSec()*1000000 + phaseTime.GetUSec();*/
221 string action = newPhase == phase ? "U" : "C";
222 double delta = newPhaseTime.GetSec() - phaseTime.GetSec();
223 delta += (newPhaseTime.GetUSec() - phaseTime.GetUSec()) * 1.0e-6;
224 fprintf(flog, "IA %s %s oldPhase = %d, newPhase = %d. dt = %.6f\n",
234 //-----------------------------------------------------------------------------
235 void IA_PHASE::SetPhase1()
237 #ifdef IA_PHASE_DEBUG
241 gettimeofday(&phaseTime, NULL);
243 //-----------------------------------------------------------------------------
244 void IA_PHASE::SetPhase2()
246 #ifdef IA_PHASE_DEBUG
250 gettimeofday(&phaseTime, NULL);
252 //-----------------------------------------------------------------------------
253 void IA_PHASE::SetPhase3()
255 #ifdef IA_PHASE_DEBUG
259 gettimeofday(&phaseTime, NULL);
261 //-----------------------------------------------------------------------------
262 void IA_PHASE::SetPhase4()
264 #ifdef IA_PHASE_DEBUG
268 gettimeofday(&phaseTime, NULL);
270 //-----------------------------------------------------------------------------
271 void IA_PHASE::SetPhase5()
273 #ifdef IA_PHASE_DEBUG
277 gettimeofday(&phaseTime, NULL);
279 //-----------------------------------------------------------------------------
280 int IA_PHASE::GetPhase() const
284 //-----------------------------------------------------------------------------
285 void IA_PHASE::UpdateTime()
287 #ifdef IA_PHASE_DEBUG
288 WritePhaseChange(phase);
290 gettimeofday(&phaseTime, NULL);
292 //-----------------------------------------------------------------------------
293 const UTIME & IA_PHASE::GetTime() const
297 //-----------------------------------------------------------------------------
298 //-----------------------------------------------------------------------------
299 //-----------------------------------------------------------------------------
303 isRunningRunTimeouter(false),
307 WriteServLog(GetStgLogger()),
308 enabledDirs(0xFFffFFff),
309 onDelUserNotifier(*this)
311 InitEncrypt(&ctxS, "pr7Hhen");
313 pthread_mutexattr_t attr;
314 pthread_mutexattr_init(&attr);
315 pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_RECURSIVE);
316 pthread_mutex_init(&mutex, &attr);
318 memset(&connSynAck6, 0, sizeof(CONN_SYN_ACK_6));
319 memset(&connSynAck8, 0, sizeof(CONN_SYN_ACK_8));
320 memset(&disconnSynAck6, 0, sizeof(DISCONN_SYN_ACK_6));
321 memset(&disconnSynAck8, 0, sizeof(DISCONN_SYN_ACK_8));
322 memset(&aliveSyn6, 0, sizeof(ALIVE_SYN_6));
323 memset(&aliveSyn8, 0, sizeof(ALIVE_SYN_8));
324 memset(&fin6, 0, sizeof(FIN_6));
325 memset(&fin8, 0, sizeof(FIN_8));
327 printfd(__FILE__, "sizeof(CONN_SYN_6) = %d %d\n", sizeof(CONN_SYN_6), Min8(sizeof(CONN_SYN_6)));
328 printfd(__FILE__, "sizeof(CONN_SYN_8) = %d %d\n", sizeof(CONN_SYN_8), Min8(sizeof(CONN_SYN_8)));
329 printfd(__FILE__, "sizeof(CONN_SYN_ACK_6) = %d %d\n", sizeof(CONN_SYN_ACK_6), Min8(sizeof(CONN_SYN_ACK_6)));
330 printfd(__FILE__, "sizeof(CONN_SYN_ACK_8) = %d %d\n", sizeof(CONN_SYN_ACK_8), Min8(sizeof(CONN_SYN_ACK_8)));
331 printfd(__FILE__, "sizeof(CONN_ACK_6) = %d %d\n", sizeof(CONN_ACK_6), Min8(sizeof(CONN_ACK_6)));
332 printfd(__FILE__, "sizeof(ALIVE_SYN_6) = %d %d\n", sizeof(ALIVE_SYN_6), Min8(sizeof(ALIVE_SYN_6)));
333 printfd(__FILE__, "sizeof(ALIVE_SYN_8) = %d %d\n", sizeof(ALIVE_SYN_8), Min8(sizeof(ALIVE_SYN_8)));
334 printfd(__FILE__, "sizeof(ALIVE_ACK_6) = %d %d\n", sizeof(ALIVE_ACK_6), Min8(sizeof(ALIVE_ACK_6)));
335 printfd(__FILE__, "sizeof(DISCONN_SYN_6) = %d %d\n", sizeof(DISCONN_SYN_6), Min8(sizeof(DISCONN_SYN_6)));
336 printfd(__FILE__, "sizeof(DISCONN_SYN_ACK_6) = %d %d\n", sizeof(DISCONN_SYN_ACK_6), Min8(sizeof(DISCONN_SYN_ACK_6)));
337 printfd(__FILE__, "sizeof(DISCONN_SYN_ACK_8) = %d %d\n", sizeof(DISCONN_SYN_ACK_8), Min8(sizeof(DISCONN_SYN_ACK_8)));
338 printfd(__FILE__, "sizeof(DISCONN_ACK_6) = %d %d\n", sizeof(DISCONN_ACK_6), Min8(sizeof(DISCONN_ACK_6)));
339 printfd(__FILE__, "sizeof(FIN_6) = %d %d\n", sizeof(FIN_6), Min8(sizeof(FIN_6)));
340 printfd(__FILE__, "sizeof(FIN_8) = %d %d\n", sizeof(FIN_8), Min8(sizeof(FIN_8)));
341 printfd(__FILE__, "sizeof(ERR) = %d %d\n", sizeof(ERR), Min8(sizeof(ERR)));
342 printfd(__FILE__, "sizeof(INFO_6) = %d %d\n", sizeof(INFO_6), Min8(sizeof(INFO_6)));
343 printfd(__FILE__, "sizeof(INFO_7) = %d %d\n", sizeof(INFO_7), Min8(sizeof(INFO_7)));
344 printfd(__FILE__, "sizeof(INFO_8) = %d %d\n", sizeof(INFO_8), Min8(sizeof(INFO_8)));
346 packetTypes["CONN_SYN"] = CONN_SYN_N;
347 packetTypes["CONN_SYN_ACK"] = CONN_SYN_ACK_N;
348 packetTypes["CONN_ACK"] = CONN_ACK_N;
349 packetTypes["ALIVE_SYN"] = ALIVE_SYN_N;
350 packetTypes["ALIVE_ACK"] = ALIVE_ACK_N;
351 packetTypes["DISCONN_SYN"] = DISCONN_SYN_N;
352 packetTypes["DISCONN_SYN_ACK"] = DISCONN_SYN_ACK_N;
353 packetTypes["DISCONN_ACK"] = DISCONN_ACK_N;
354 packetTypes["FIN"] = FIN_N;
355 packetTypes["ERR"] = ERROR_N;
357 //-----------------------------------------------------------------------------
360 pthread_mutex_destroy(&mutex);
362 //-----------------------------------------------------------------------------
365 users->AddNotifierUserDel(&onDelUserNotifier);
375 if (pthread_create(&recvThread, NULL, Run, this))
377 errorStr = "Cannot create thread.";
378 printfd(__FILE__, "Cannot create recv thread\n");
383 if (!isRunningRunTimeouter)
385 if (pthread_create(&timeouterThread, NULL, RunTimeouter, this))
387 errorStr = "Cannot create thread.";
388 printfd(__FILE__, "Cannot create timeouter thread\n");
395 //-----------------------------------------------------------------------------
406 UnauthorizeUser(this)
411 //5 seconds to thread stops itself
412 for (int i = 0; i < 25 && isRunningRun; i++)
417 //after 5 seconds waiting thread still running. now killing it
420 //TODO pthread_cancel()
421 if (pthread_kill(recvThread, SIGINT))
423 errorStr = "Cannot kill thread.";
424 printfd(__FILE__, "Cannot kill thread\n");
427 for (int i = 0; i < 25 && isRunningRun; ++i)
431 printfd(__FILE__, "Failed to stop recv thread\n");
435 pthread_join(recvThread, NULL);
437 printfd(__FILE__, "AUTH_IA killed Run\n");
443 if (isRunningRunTimeouter)
445 //5 seconds to thread stops itself
446 for (int i = 0; i < 25 && isRunningRunTimeouter; i++)
451 //after 5 seconds waiting thread still running. now killing it
452 if (isRunningRunTimeouter)
454 //TODO pthread_cancel()
455 if (pthread_kill(timeouterThread, SIGINT))
457 errorStr = "Cannot kill thread.";
460 for (int i = 0; i < 25 && isRunningRunTimeouter; ++i)
462 if (isRunningRunTimeouter)
464 printfd(__FILE__, "Failed to stop timeouter thread\n");
468 pthread_join(timeouterThread, NULL);
470 printfd(__FILE__, "AUTH_IA killed Timeouter\n");
473 printfd(__FILE__, "AUTH_IA::Stoped successfully.\n");
474 users->DelNotifierUserDel(&onDelUserNotifier);
477 //-----------------------------------------------------------------------------
478 void * AUTH_IA::Run(void * d)
480 AUTH_IA * ia = static_cast<AUTH_IA *>(d);
482 ia->isRunningRun = true;
486 time_t touchTime = stgTime - MONITOR_TIME_DELAY_SEC;
490 ia->RecvData(buffer, sizeof(buffer));
491 if ((touchTime + MONITOR_TIME_DELAY_SEC <= stgTime) && ia->stgSettings->GetMonitoring())
494 string monFile = ia->stgSettings->GetMonitorDir() + "/inetaccess_r";
495 TouchFile(monFile.c_str());
499 ia->isRunningRun = false;
502 //-----------------------------------------------------------------------------
503 void * AUTH_IA::RunTimeouter(void * d)
505 AUTH_IA * ia = static_cast<AUTH_IA *>(d);
507 ia->isRunningRunTimeouter = true;
510 string monFile = ia->stgSettings->GetMonitorDir() + "/inetaccess_t";
515 // TODO cahange counter to timer and MONITOR_TIME_DELAY_SEC
516 if (++a % (50*60) == 0 && ia->stgSettings->GetMonitoring())
518 TouchFile(monFile.c_str());
522 ia->isRunningRunTimeouter = false;
525 //-----------------------------------------------------------------------------
526 int AUTH_IA::ParseSettings()
528 int ret = iaSettings.ParseSettings(settings);
530 errorStr = iaSettings.GetStrError();
533 //-----------------------------------------------------------------------------
534 int AUTH_IA::PrepareNet()
536 struct sockaddr_in listenAddr;
538 listenSocket = socket(AF_INET, SOCK_DGRAM, 0);
540 if (listenSocket < 0)
542 errorStr = "Cannot create socket.";
546 listenAddr.sin_family = AF_INET;
547 listenAddr.sin_port = htons(iaSettings.GetUserPort());
548 listenAddr.sin_addr.s_addr = inet_addr("0.0.0.0");
550 if (bind(listenSocket, (struct sockaddr*)&listenAddr, sizeof(listenAddr)) < 0)
552 errorStr = "AUTH_IA: Bind failed.";
557 if (getsockopt(listenSocket, SOL_SOCKET, SO_SNDBUF, &buffLen, sizeof(buffLen)) < 0)
560 errorStr = "Getsockopt failed. " + string(strerror(errno));
564 //WriteServLog("buffLen = %d", buffLen);
568 //-----------------------------------------------------------------------------
569 int AUTH_IA::FinalizeNet()
574 //-----------------------------------------------------------------------------
575 int AUTH_IA::RecvData(char * buffer, int bufferSize)
577 if (!WaitPackets(listenSocket)) // Timeout
582 struct sockaddr_in outerAddr;
583 socklen_t outerAddrLen(sizeof(outerAddr));
584 int dataLen = recvfrom(listenSocket, buffer, bufferSize, 0, (struct sockaddr *)&outerAddr, &outerAddrLen);
591 if (dataLen <= 0) // Error
595 printfd(__FILE__, "recvfrom res=%d, error: '%s'\n", dataLen, strerror(errno));
605 if (CheckHeader(buffer, &protoVer))
608 char login[PASSWD_LEN]; //TODO why PASSWD_LEN ?
609 memset(login, 0, PASSWD_LEN);
611 Decrypt(&ctxS, login, buffer + 8, PASSWD_LEN / 8);
613 uint32_t sip = *((uint32_t*)&outerAddr.sin_addr);
614 uint16_t sport = htons(outerAddr.sin_port);
617 if (users->FindByName(login, &user) == 0)
619 printfd(__FILE__, "User %s FOUND!\n", user->GetLogin().c_str());
620 PacketProcessor(buffer, dataLen, sip, sport, protoVer, &user);
624 WriteServLog("User\'s connect failed:: user \'%s\' not found. IP \'%s\'",
626 inet_ntostring(sip).c_str());
627 printfd(__FILE__, "User %s NOT found!\n", login);
628 SendError(sip, sport, protoVer, "îÅÐÒÁ×ÉÌØÎÙÊ ÌÏÇÉÎ ÉÌÉ ÐÁÒÏÌØ!");
634 //-----------------------------------------------------------------------------
635 int AUTH_IA::CheckHeader(const char * buffer, int * protoVer)
637 if (strncmp(IA_ID, buffer, strlen(IA_ID)) != 0)
639 //SendError(userIP, updateMsg);
640 printfd(__FILE__, "update needed - IA_ID\n");
641 //SendError(userIP, "Incorrect header!");
645 if (buffer[6] != 0) //proto[0] shoud be 0
647 printfd(__FILE__, "update needed - PROTO major: %d\n", buffer[6]);
648 //SendError(userIP, updateMsg);
655 //SendError(userIP, updateMsg);
656 printfd(__FILE__, "update needed - PROTO minor: %d\n", buffer[7]);
661 *protoVer = buffer[7];
665 //-----------------------------------------------------------------------------
666 int AUTH_IA::Timeouter()
668 STG_LOCKER lock(&mutex, __FILE__, __LINE__);
670 map<uint32_t, IA_USER>::iterator it;
671 it = ip2user.begin();
674 while (it != ip2user.end())
678 static UTIME currTime;
679 gettimeofday(&currTime, NULL);
681 if ((it->second.phase.GetPhase() == 2)
682 && (currTime - it->second.phase.GetTime()) > iaSettings.GetUserDelay())
684 it->second.phase.SetPhase1();
685 printfd(__FILE__, "Phase changed from 2 to 1. Reason: timeout\n");
688 if (it->second.phase.GetPhase() == 3)
690 if (!it->second.messagesToSend.empty())
692 if (it->second.protoVer == 6)
693 RealSendMessage6(*it->second.messagesToSend.begin(), sip, it->second);
695 if (it->second.protoVer == 7)
696 RealSendMessage7(*it->second.messagesToSend.begin(), sip, it->second);
698 if (it->second.protoVer == 8)
699 RealSendMessage8(*it->second.messagesToSend.begin(), sip, it->second);
701 it->second.messagesToSend.erase(it->second.messagesToSend.begin());
704 if((currTime - it->second.lastSendAlive) > iaSettings.GetUserDelay())
706 switch (it->second.protoVer)
709 Send_ALIVE_SYN_6(&(it->second), sip);
712 Send_ALIVE_SYN_7(&(it->second), sip);
715 Send_ALIVE_SYN_8(&(it->second), sip);
719 gettimeofday(&it->second.lastSendAlive, NULL);
722 if ((currTime - it->second.phase.GetTime()) > iaSettings.GetUserTimeout())
724 it->second.user->Unauthorize(this);
730 if ((it->second.phase.GetPhase() == 4)
731 && ((currTime - it->second.phase.GetTime()) > iaSettings.GetUserDelay()))
733 it->second.phase.SetPhase3();
734 printfd(__FILE__, "Phase changed from 4 to 3. Reason: timeout\n");
742 //-----------------------------------------------------------------------------
743 int AUTH_IA::PacketProcessor(char * buff, int dataLen, uint32_t sip, uint16_t sport, int protoVer, USER_PTR * user)
745 STG_LOCKER lock(&mutex, __FILE__, __LINE__);
746 // ôÕÔ ÓÏÂÒÁÎÙ ÏÂÒÁÂÏÔÞÉËÉ ÒÁÚÎÙÈ ÐÁËÅÔÏ×
748 const int offset = LOGIN_LEN + 2 + 6; // LOGIN_LEN + sizeOfMagic + sizeOfVer;
750 IA_USER * iaUser = NULL;
752 CONN_SYN_6 * connSyn6;
753 CONN_SYN_7 * connSyn7;
754 CONN_SYN_8 * connSyn8;
756 CONN_ACK_6 * connAck;
757 ALIVE_ACK_6 * aliveAck;
758 DISCONN_SYN_6 * disconnSyn;
759 DISCONN_ACK_6 * disconnAck;
761 map<uint32_t, IA_USER>::iterator it;
762 it = ip2user.find(sip);
764 if (it == ip2user.end() || (*user)->GetID() != it->second.user->GetID())
766 // åÝÅ ÎÅ ÂÙÌÏ ÚÁÐÒÏÓÏ× Ó ÜÔÏÇÏ IP
767 printfd(__FILE__, "Add new user\n");
768 ip2user[sip].protoVer = protoVer;
769 ip2user[sip].user = *user;
770 ip2user[sip].port = sport;
771 #ifdef IA_PHASE_DEBUG
772 ip2user[sip].phase.SetLogFileName(stgSettings->GetLogFileName());
773 ip2user[sip].phase.SetUserLogin((*user)->GetLogin());
777 it = ip2user.find(sip); //TODO
778 if (it == ip2user.end())
780 printfd(__FILE__, "+++ ERROR +++\n");
785 iaUser = &(it->second);
787 if (iaUser->port != sport)
788 iaUser->port = sport;
790 if (iaUser->password != (*user)->GetProperty().password.Get())
792 InitEncrypt(&iaUser->ctx, (*user)->GetProperty().password.Get());
793 iaUser->password = (*user)->GetProperty().password.Get();
797 Decrypt(&iaUser->ctx, buff, buff, (dataLen - offset) / 8);
799 char packetName[IA_MAX_TYPE_LEN];
800 strncpy(packetName, buff + 4, IA_MAX_TYPE_LEN);
801 packetName[IA_MAX_TYPE_LEN - 1] = 0;
803 map<string, int>::iterator pi;
804 pi = packetTypes.find(packetName);
805 if (pi == packetTypes.end())
807 SendError(sip, sport, protoVer, "îÅÐÒÁ×ÉÌØÎÙÊ ÌÏÇÉÎ ÉÌÉ ÐÁÒÏÌØ!");
808 printfd(__FILE__, "Login or password is wrong!\n");
809 WriteServLog("User's connect failed. IP \'%s\'. Wrong login or password", inet_ntostring(sip).c_str());
817 if ((*user)->GetProperty().disabled.Get())
819 SendError(sip, sport, protoVer, "õÞÅÔÎÁÑ ÚÁÐÉÓØ ÚÁÂÌÏËÉÒÏ×ÁÎÁ");
823 if ((*user)->GetProperty().passive.Get())
825 SendError(sip, sport, protoVer, "õÞÅÔÎÁÑ ÚÁÐÉÓØ ÚÁÍÏÒÏÖÅÎÁ");
829 if ((*user)->GetAuthorized() && (*user)->GetCurrIP() != sip)
831 printfd(__FILE__, "Login %s already in use. IP \'%s\'\n", (*user)->GetLogin().c_str(), inet_ntostring(sip).c_str());
832 WriteServLog("Login %s already in use. IP \'%s\'", (*user)->GetLogin().c_str(), inet_ntostring(sip).c_str());
833 SendError(sip, sport, protoVer, "÷ÁÛ ÌÏÇÉÎ ÕÖÅ ÉÓÐÏÌØÚÕÅÔÓÑ!");
838 if (users->FindByIPIdx(sip, &u) == 0 && u->GetLogin() != (*user)->GetLogin())
840 printfd(__FILE__, "IP address already in use. IP \'%s\'", inet_ntostring(sip).c_str());
841 WriteServLog("IP address already in use. IP \'%s\'", inet_ntostring(sip).c_str());
842 SendError(sip, sport, protoVer, "÷ÁÛ IP ÁÄÒÅÓ ÕÖÅ ÉÓÐÏÌØÚÕÅÔÓÑ!");
846 // ôÅÐÅÒØ ÍÙ ÄÏÌÖÎÙ ÐÒÏ×ÅÒÉÔØ, ÍÏÖÅÔ ÌÉ ÐÏÌØÚÏ×ÁÔÅÌØ ÐÏÄËÌÀÞÉÔÓÑ Ó ÜÔÏÇÏ ÁÄÒÅÓÁ.
847 int ipFound = (*user)->GetProperty().ips.Get().IsIPInIPS(sip);
850 printfd(__FILE__, "User %s. IP address is incorrect. IP \'%s\'\n", (*user)->GetLogin().c_str(), inet_ntostring(sip).c_str());
851 WriteServLog("User %s. IP address is incorrect. IP \'%s\'", (*user)->GetLogin().c_str(), inet_ntostring(sip).c_str());
852 SendError(sip, sport, protoVer, "ðÏÌØÚÏ×ÁÔÅÌØ ÎÅ ÏÐÏÚÎÁÎ! ðÒÏ×ÅÒØÔÅ IP ÁÄÒÅÓ.");
864 connSyn6 = (CONN_SYN_6*)(buff - offset);
865 ret = Process_CONN_SYN_6(connSyn6, &(it->second), sip);
868 connSyn7 = (CONN_SYN_7*)(buff - offset);
869 ret = Process_CONN_SYN_7(connSyn7, &(it->second), sip);
872 connSyn8 = (CONN_SYN_8*)(buff - offset);
873 ret = Process_CONN_SYN_8(connSyn8, &(it->second), sip);
884 Send_CONN_SYN_ACK_6(iaUser, sip);
887 Send_CONN_SYN_ACK_7(iaUser, sip);
890 Send_CONN_SYN_ACK_8(iaUser, sip);
896 connAck = (CONN_ACK_6*)(buff - offset);
900 ret = Process_CONN_ACK_6(connAck, iaUser, sip);
903 ret = Process_CONN_ACK_7(connAck, iaUser, sip);
906 ret = Process_CONN_ACK_8((CONN_ACK_8*)(buff - offset), iaUser, sip);
912 SendError(sip, sport, protoVer, errorStr);
919 Send_ALIVE_SYN_6(iaUser, sip);
922 Send_ALIVE_SYN_7(iaUser, sip);
925 Send_ALIVE_SYN_8(iaUser, sip);
931 // ðÒÉÂÙÌ ÏÔ×ÅÔ Ó ÐÏÄÔ×ÅÒÖÄÅÎÉÅÍ ALIVE
933 aliveAck = (ALIVE_ACK_6*)(buff - offset);
937 ret = Process_ALIVE_ACK_6(aliveAck, iaUser, sip);
940 ret = Process_ALIVE_ACK_7(aliveAck, iaUser, sip);
943 ret = Process_ALIVE_ACK_8((ALIVE_ACK_8*)(buff - offset), iaUser, sip);
948 // úÁÐÒÏÓ ÎÁ ÏÔËÌÀÞÅÎÉÅ
951 disconnSyn = (DISCONN_SYN_6*)(buff - offset);
955 ret = Process_DISCONN_SYN_6(disconnSyn, iaUser, sip);
958 ret = Process_DISCONN_SYN_7(disconnSyn, iaUser, sip);
961 ret = Process_DISCONN_SYN_8((DISCONN_SYN_8*)(buff - offset), iaUser, sip);
971 Send_DISCONN_SYN_ACK_6(iaUser, sip);
974 Send_DISCONN_SYN_ACK_7(iaUser, sip);
977 Send_DISCONN_SYN_ACK_8(iaUser, sip);
983 disconnAck = (DISCONN_ACK_6*)(buff - offset);
988 ret = Process_DISCONN_ACK_6(disconnAck, iaUser, sip, it);
991 ret = Process_DISCONN_ACK_7(disconnAck, iaUser, sip, it);
994 ret = Process_DISCONN_ACK_8((DISCONN_ACK_8*)(buff - offset), iaUser, sip, it);
1001 Send_FIN_6(iaUser, sip, it);
1004 Send_FIN_7(iaUser, sip, it);
1007 Send_FIN_8(iaUser, sip, it);
1015 //-----------------------------------------------------------------------------
1016 void AUTH_IA::DelUser(USER_PTR u)
1018 STG_LOCKER lock(&mutex, __FILE__, __LINE__);
1020 uint32_t ip = u->GetCurrIP();
1025 map<uint32_t, IA_USER>::iterator it;
1026 it = ip2user.find(ip);
1027 if (it == ip2user.end())
1030 printfd(__FILE__, "Nothing to delete\n");
1034 if (it->second.user == u)
1036 printfd(__FILE__, "User removed!\n");
1037 it->second.user->Unauthorize(this);
1041 //-----------------------------------------------------------------------------
1042 int AUTH_IA::SendError(uint32_t ip, uint16_t port, int protoVer, const string & text)
1044 struct sockaddr_in sendAddr;
1051 memset(&err, 0, sizeof(ERR));
1053 sendAddr.sin_family = AF_INET;
1054 sendAddr.sin_port = htons(port);
1056 sendAddr.sin_addr.s_addr = ip;// IP ÐÏÌØÚÏ×ÁÔÅÌÑ
1059 strncpy((char*)err.type, "ERR", 16);
1060 strncpy((char*)err.text, text.c_str(), MAX_MSG_LEN);
1066 res = sendto(listenSocket, &err, sizeof(err), 0, (struct sockaddr*)&sendAddr, sizeof(sendAddr));
1067 printfd(__FILE__, "SendError %d bytes sent\n", res);
1072 memset(&err8, 0, sizeof(ERR_8));
1074 sendAddr.sin_family = AF_INET;
1075 sendAddr.sin_port = htons(port);
1077 sendAddr.sin_addr.s_addr = ip;// IP ÐÏÌØÚÏ×ÁÔÅÌÑ
1080 strncpy((char*)err8.type, "ERR", 16);
1081 strncpy((char*)err8.text, text.c_str(), MAX_MSG_LEN);
1084 SwapBytes(err8.len);
1087 res = sendto(listenSocket, &err8, sizeof(err8), 0, (struct sockaddr*)&sendAddr, sizeof(sendAddr));
1088 printfd(__FILE__, "SendError_8 %d bytes sent\n", res);
1094 //-----------------------------------------------------------------------------
1095 int AUTH_IA::Send(uint32_t ip, uint16_t port, const char * buffer, int len)
1097 struct sockaddr_in sendAddr;
1100 sendAddr.sin_family = AF_INET;
1101 sendAddr.sin_port = htons(port);
1102 sendAddr.sin_addr.s_addr = ip;
1104 res = sendto(listenSocket, buffer, len, 0, (struct sockaddr*)&sendAddr, sizeof(sendAddr));
1106 static struct timeval tv;
1107 gettimeofday(&tv, NULL);
1111 //-----------------------------------------------------------------------------
1112 int AUTH_IA::SendMessage(const STG_MSG & msg, uint32_t ip) const
1114 STG_LOCKER lock(&mutex, __FILE__, __LINE__);
1116 printfd(__FILE__, "SendMessage userIP=%s\n", inet_ntostring(ip).c_str());
1118 map<uint32_t, IA_USER>::iterator it;
1119 it = ip2user.find(ip);
1120 if (it == ip2user.end())
1122 errorStr = "Unknown user.";
1125 it->second.messagesToSend.push_back(msg);
1128 //-----------------------------------------------------------------------------
1129 int AUTH_IA::RealSendMessage6(const STG_MSG & msg, uint32_t ip, IA_USER & user)
1131 printfd(__FILE__, "RealSendMessage 6 user=%s\n", user.user->GetLogin().c_str());
1136 memset(&info, 0, sizeof(INFO_6));
1139 strncpy((char*)info.type, "INFO", 16);
1140 info.infoType = 'I';
1141 strncpy((char*)info.text, msg.text.c_str(), 235);
1144 size_t len = info.len;
1146 SwapBytes(info.len);
1149 memcpy(buffer, &info, sizeof(INFO_6));
1150 Encrypt(&user.ctx, buffer, buffer, len / 8);
1151 Send(ip, iaSettings.GetUserPort(), buffer, len);
1155 //-----------------------------------------------------------------------------
1156 int AUTH_IA::RealSendMessage7(const STG_MSG & msg, uint32_t ip, IA_USER & user)
1158 printfd(__FILE__, "RealSendMessage 7 user=%s\n", user.user->GetLogin().c_str());
1163 memset(&info, 0, sizeof(INFO_7));
1166 strncpy((char*)info.type, "INFO_7", 16);
1167 info.infoType = msg.header.type;
1168 info.showTime = msg.header.showTime;
1170 info.sendTime = msg.header.creationTime;
1172 size_t len = info.len;
1174 SwapBytes(info.len);
1175 SwapBytes(info.sendTime);
1178 strncpy((char*)info.text, msg.text.c_str(), MAX_MSG_LEN - 1);
1179 info.text[MAX_MSG_LEN - 1] = 0;
1181 memcpy(buffer, &info, sizeof(INFO_7));
1183 Encrypt(&user.ctx, buffer, buffer, len / 8);
1184 Send(ip, iaSettings.GetUserPort(), buffer, len);
1188 //-----------------------------------------------------------------------------
1189 int AUTH_IA::RealSendMessage8(const STG_MSG & msg, uint32_t ip, IA_USER & user)
1191 printfd(__FILE__, "RealSendMessage 8 user=%s\n", user.user->GetLogin().c_str());
1194 memset(buffer, 0, sizeof(buffer));
1198 memset(&info, 0, sizeof(INFO_8));
1201 strncpy((char*)info.type, "INFO_8", 16);
1202 info.infoType = msg.header.type;
1203 info.showTime = msg.header.showTime;
1204 info.sendTime = msg.header.creationTime;
1206 strncpy((char*)info.text, msg.text.c_str(), IA_MAX_MSG_LEN_8 - 1);
1207 info.text[IA_MAX_MSG_LEN_8 - 1] = 0;
1209 size_t len = info.len;
1211 SwapBytes(info.len);
1212 SwapBytes(info.sendTime);
1215 memcpy(buffer, &info, sizeof(INFO_8));
1217 Encrypt(&user.ctx, buffer, buffer, len / 8);
1218 Send(ip, user.port, buffer, len);
1222 //-----------------------------------------------------------------------------
1223 int AUTH_IA::Process_CONN_SYN_6(CONN_SYN_6 *, IA_USER * iaUser, uint32_t)
1225 if (!(iaUser->phase.GetPhase() == 1 || iaUser->phase.GetPhase() == 3))
1228 enabledDirs = 0xFFffFFff;
1230 iaUser->phase.SetPhase2();
1231 printfd(__FILE__, "Phase changed from %d to 2. Reason: CONN_SYN_6\n", iaUser->phase.GetPhase());
1234 //-----------------------------------------------------------------------------
1235 int AUTH_IA::Process_CONN_SYN_7(CONN_SYN_7 * connSyn, IA_USER * iaUser, uint32_t sip)
1237 return Process_CONN_SYN_6(connSyn, iaUser, sip);
1239 //-----------------------------------------------------------------------------
1240 int AUTH_IA::Process_CONN_SYN_8(CONN_SYN_8 * connSyn, IA_USER * iaUser, uint32_t sip)
1243 SwapBytes(connSyn->dirs);
1245 int ret = Process_CONN_SYN_6((CONN_SYN_6*)connSyn, iaUser, sip);
1246 enabledDirs = connSyn->dirs;
1249 //-----------------------------------------------------------------------------
1250 int AUTH_IA::Process_CONN_ACK_6(CONN_ACK_6 * connAck, IA_USER * iaUser, uint32_t sip)
1253 SwapBytes(connAck->len);
1254 SwapBytes(connAck->rnd);
1256 printfd( __FILE__, "CONN_ACK_6 %s\n", connAck->type);
1257 // ÕÓÔÁÎÏ×ÉÔØ ÎÏ×ÕÀ ÆÁÚÕ É ×ÒÅÍÑ É ÒÁÚÒÅÛÉÔØ ÉÎÅÔ
1258 if ((iaUser->phase.GetPhase() == 2) && (connAck->rnd == iaUser->rnd + 1))
1260 iaUser->phase.UpdateTime();
1262 iaUser->lastSendAlive = iaUser->phase.GetTime();
1263 if (iaUser->user->Authorize(sip, enabledDirs, this) == 0)
1265 iaUser->phase.SetPhase3();
1266 printfd(__FILE__, "Phase changed from 2 to 3. Reason: CONN_ACK_6\n");
1271 errorStr = iaUser->user->GetStrError();
1272 iaUser->phase.SetPhase1();
1273 printfd(__FILE__, "Phase changed from 2 to 1. Reason: failed to authorize user\n");
1277 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), connAck->rnd);
1280 //-----------------------------------------------------------------------------
1281 int AUTH_IA::Process_CONN_ACK_7(CONN_ACK_7 * connAck, IA_USER * iaUser, uint32_t sip)
1283 return Process_CONN_ACK_6(connAck, iaUser, sip);
1285 //-----------------------------------------------------------------------------
1286 int AUTH_IA::Process_CONN_ACK_8(CONN_ACK_8 * connAck, IA_USER * iaUser, uint32_t sip)
1289 SwapBytes(connAck->len);
1290 SwapBytes(connAck->rnd);
1292 printfd( __FILE__, "CONN_ACK_8 %s\n", connAck->type);
1294 if ((iaUser->phase.GetPhase() == 2) && (connAck->rnd == iaUser->rnd + 1))
1296 iaUser->phase.UpdateTime();
1297 iaUser->lastSendAlive = iaUser->phase.GetTime();
1298 if (iaUser->user->Authorize(sip, enabledDirs, this) == 0)
1300 iaUser->phase.SetPhase3();
1301 printfd(__FILE__, "Phase changed from 2 to 3. Reason: CONN_ACK_8\n");
1306 errorStr = iaUser->user->GetStrError();
1307 iaUser->phase.SetPhase1();
1308 printfd(__FILE__, "Phase changed from 2 to 1. Reason: failed to authorize user\n");
1312 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), connAck->rnd);
1315 //-----------------------------------------------------------------------------
1316 int AUTH_IA::Process_ALIVE_ACK_6(ALIVE_ACK_6 * aliveAck, IA_USER * iaUser, uint32_t)
1319 SwapBytes(aliveAck->len);
1320 SwapBytes(aliveAck->rnd);
1322 printfd(__FILE__, "ALIVE_ACK_6\n");
1323 if ((iaUser->phase.GetPhase() == 3) && (aliveAck->rnd == iaUser->rnd + 1))
1325 iaUser->phase.UpdateTime();
1327 iaUser->aliveSent = false;
1332 //-----------------------------------------------------------------------------
1333 int AUTH_IA::Process_ALIVE_ACK_7(ALIVE_ACK_7 * aliveAck, IA_USER * iaUser, uint32_t sip)
1335 return Process_ALIVE_ACK_6(aliveAck, iaUser, sip);
1337 //-----------------------------------------------------------------------------
1338 int AUTH_IA::Process_ALIVE_ACK_8(ALIVE_ACK_8 * aliveAck, IA_USER * iaUser, uint32_t)
1341 SwapBytes(aliveAck->len);
1342 SwapBytes(aliveAck->rnd);
1344 printfd(__FILE__, "ALIVE_ACK_8\n");
1345 if ((iaUser->phase.GetPhase() == 3) && (aliveAck->rnd == iaUser->rnd + 1))
1347 iaUser->phase.UpdateTime();
1349 iaUser->aliveSent = false;
1354 //-----------------------------------------------------------------------------
1355 int AUTH_IA::Process_DISCONN_SYN_6(DISCONN_SYN_6 *, IA_USER * iaUser, uint32_t)
1357 printfd(__FILE__, "DISCONN_SYN_6\n");
1358 if (iaUser->phase.GetPhase() != 3)
1360 printfd(__FILE__, "Invalid phase. Expected 3, actual %d\n", iaUser->phase.GetPhase());
1361 errorStr = "Incorrect request DISCONN_SYN";
1365 iaUser->phase.SetPhase4();
1366 printfd(__FILE__, "Phase changed from 3 to 4. Reason: DISCONN_SYN_6\n");
1370 //-----------------------------------------------------------------------------
1371 int AUTH_IA::Process_DISCONN_SYN_7(DISCONN_SYN_7 * disconnSyn, IA_USER * iaUser, uint32_t sip)
1373 return Process_DISCONN_SYN_6(disconnSyn, iaUser, sip);
1375 //-----------------------------------------------------------------------------
1376 int AUTH_IA::Process_DISCONN_SYN_8(DISCONN_SYN_8 *, IA_USER * iaUser, uint32_t)
1378 if (iaUser->phase.GetPhase() != 3)
1380 errorStr = "Incorrect request DISCONN_SYN";
1381 printfd(__FILE__, "Invalid phase. Expected 3, actual %d\n", iaUser->phase.GetPhase());
1385 iaUser->phase.SetPhase4();
1386 printfd(__FILE__, "Phase changed from 3 to 4. Reason: DISCONN_SYN_6\n");
1390 //-----------------------------------------------------------------------------
1391 int AUTH_IA::Process_DISCONN_ACK_6(DISCONN_ACK_6 * disconnAck,
1394 map<uint32_t, IA_USER>::iterator)
1397 SwapBytes(disconnAck->len);
1398 SwapBytes(disconnAck->rnd);
1400 printfd(__FILE__, "DISCONN_ACK_6\n");
1401 if (!((iaUser->phase.GetPhase() == 4) && (disconnAck->rnd == iaUser->rnd + 1)))
1403 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), disconnAck->rnd);
1409 //-----------------------------------------------------------------------------
1410 int AUTH_IA::Process_DISCONN_ACK_7(DISCONN_ACK_7 * disconnAck, IA_USER * iaUser, uint32_t sip, map<uint32_t, IA_USER>::iterator it)
1412 return Process_DISCONN_ACK_6(disconnAck, iaUser, sip, it);
1414 //-----------------------------------------------------------------------------
1415 int AUTH_IA::Process_DISCONN_ACK_8(DISCONN_ACK_8 * disconnAck, IA_USER * iaUser, uint32_t, map<uint32_t, IA_USER>::iterator)
1418 SwapBytes(disconnAck->len);
1419 SwapBytes(disconnAck->rnd);
1421 printfd(__FILE__, "DISCONN_ACK_8\n");
1422 if (!((iaUser->phase.GetPhase() == 4) && (disconnAck->rnd == iaUser->rnd + 1)))
1424 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), disconnAck->rnd);
1430 //-----------------------------------------------------------------------------
1431 int AUTH_IA::Send_CONN_SYN_ACK_6(IA_USER * iaUser, uint32_t sip)
1433 //+++ Fill static data in connSynAck +++
1434 // TODO Move this code. It must be executed only once
1435 connSynAck6.len = Min8(sizeof(CONN_SYN_ACK_6));
1436 strcpy((char*)connSynAck6.type, "CONN_SYN_ACK");
1437 for (int j = 0; j < DIR_NUM; j++)
1439 strncpy((char*)connSynAck6.dirName[j],
1440 stgSettings->GetDirName(j).c_str(),
1443 connSynAck6.dirName[j][sizeof(string16) - 1] = 0;
1445 //--- Fill static data in connSynAck ---
1447 iaUser->rnd = random();
1448 connSynAck6.rnd = iaUser->rnd;
1450 connSynAck6.userTimeOut = iaSettings.GetUserTimeout();
1451 connSynAck6.aliveDelay = iaSettings.GetUserDelay();
1454 SwapBytes(connSynAck6.len);
1455 SwapBytes(connSynAck6.rnd);
1456 SwapBytes(connSynAck6.userTimeOut);
1457 SwapBytes(connSynAck6.aliveDelay);
1460 Encrypt(&iaUser->ctx, (char*)&connSynAck6, (char*)&connSynAck6, Min8(sizeof(CONN_SYN_ACK_6))/8);
1461 return Send(sip, iaSettings.GetUserPort(), (char*)&connSynAck6, Min8(sizeof(CONN_SYN_ACK_6)));;
1463 //-----------------------------------------------------------------------------
1464 int AUTH_IA::Send_CONN_SYN_ACK_7(IA_USER * iaUser, uint32_t sip)
1466 return Send_CONN_SYN_ACK_6(iaUser, sip);
1468 //-----------------------------------------------------------------------------
1469 int AUTH_IA::Send_CONN_SYN_ACK_8(IA_USER * iaUser, uint32_t sip)
1471 strcpy((char*)connSynAck8.hdr.magic, IA_ID);
1472 connSynAck8.hdr.protoVer[0] = 0;
1473 connSynAck8.hdr.protoVer[1] = 8;
1475 //+++ Fill static data in connSynAck +++
1476 // TODO Move this code. It must be executed only once
1477 connSynAck8.len = Min8(sizeof(CONN_SYN_ACK_8));
1478 strcpy((char*)connSynAck8.type, "CONN_SYN_ACK");
1479 for (int j = 0; j < DIR_NUM; j++)
1481 strncpy((char*)connSynAck8.dirName[j],
1482 stgSettings->GetDirName(j).c_str(),
1485 connSynAck8.dirName[j][sizeof(string16) - 1] = 0;
1487 //--- Fill static data in connSynAck ---
1489 iaUser->rnd = random();
1490 connSynAck8.rnd = iaUser->rnd;
1492 connSynAck8.userTimeOut = iaSettings.GetUserTimeout();
1493 connSynAck8.aliveDelay = iaSettings.GetUserDelay();
1496 SwapBytes(connSynAck8.len);
1497 SwapBytes(connSynAck8.rnd);
1498 SwapBytes(connSynAck8.userTimeOut);
1499 SwapBytes(connSynAck8.aliveDelay);
1502 Encrypt(&iaUser->ctx, (char*)&connSynAck8, (char*)&connSynAck8, Min8(sizeof(CONN_SYN_ACK_8))/8);
1503 return Send(sip, iaUser->port, (char*)&connSynAck8, Min8(sizeof(CONN_SYN_ACK_8)));
1504 //return Send(sip, iaUser->port, (char*)&connSynAck8, 384);
1506 //-----------------------------------------------------------------------------
1507 int AUTH_IA::Send_ALIVE_SYN_6(IA_USER * iaUser, uint32_t sip)
1509 aliveSyn6.len = Min8(sizeof(ALIVE_SYN_6));
1510 aliveSyn6.rnd = iaUser->rnd = random();
1512 strcpy((char*)aliveSyn6.type, "ALIVE_SYN");
1514 for (int i = 0; i < DIR_NUM; i++)
1516 aliveSyn6.md[i] = iaUser->user->GetProperty().down.Get()[i];
1517 aliveSyn6.mu[i] = iaUser->user->GetProperty().up.Get()[i];
1519 aliveSyn6.sd[i] = iaUser->user->GetSessionDownload()[i];
1520 aliveSyn6.su[i] = iaUser->user->GetSessionUpload()[i];
1524 int dn = iaSettings.GetFreeMbShowType();
1525 const TARIFF * tf = iaUser->user->GetTariff();
1529 double p = tf->GetPriceWithTraffType(aliveSyn6.mu[dn],
1536 snprintf((char*)aliveSyn6.freeMb, IA_FREEMB_LEN, "---");
1540 double fmb = iaUser->user->GetProperty().freeMb;
1541 fmb = fmb < 0 ? 0 : fmb;
1542 snprintf((char*)aliveSyn6.freeMb, IA_FREEMB_LEN, "%.3f", fmb / p);
1547 if (freeMbNone == iaSettings.GetFreeMbShowType())
1549 aliveSyn6.freeMb[0] = 0;
1553 double fmb = iaUser->user->GetProperty().freeMb;
1554 fmb = fmb < 0 ? 0 : fmb;
1555 snprintf((char*)aliveSyn6.freeMb, IA_FREEMB_LEN, "C%.3f", fmb);
1560 if (iaUser->aliveSent)
1562 printfd(__FILE__, "========= ALIVE_ACK_6(7) TIMEOUT !!! %s =========\n", iaUser->user->GetLogin().c_str());
1564 iaUser->aliveSent = true;
1567 aliveSyn6.cash =(int64_t) (iaUser->user->GetProperty().cash.Get() * 1000.0);
1568 if (!stgSettings->GetShowFeeInCash())
1569 aliveSyn6.cash -= (int64_t)(tf->GetFee() * 1000.0);
1572 SwapBytes(aliveSyn6.len);
1573 SwapBytes(aliveSyn6.rnd);
1574 SwapBytes(aliveSyn6.cash);
1575 for (int i = 0; i < DIR_NUM; ++i)
1577 SwapBytes(aliveSyn6.mu[i]);
1578 SwapBytes(aliveSyn6.md[i]);
1579 SwapBytes(aliveSyn6.su[i]);
1580 SwapBytes(aliveSyn6.sd[i]);
1584 Encrypt(&(iaUser->ctx), (char*)&aliveSyn6, (char*)&aliveSyn6, Min8(sizeof(aliveSyn6))/8);
1585 return Send(sip, iaSettings.GetUserPort(), (char*)&aliveSyn6, Min8(sizeof(aliveSyn6)));
1587 //-----------------------------------------------------------------------------
1588 int AUTH_IA::Send_ALIVE_SYN_7(IA_USER * iaUser, uint32_t sip)
1590 return Send_ALIVE_SYN_6(iaUser, sip);
1592 //-----------------------------------------------------------------------------
1593 int AUTH_IA::Send_ALIVE_SYN_8(IA_USER * iaUser, uint32_t sip)
1595 strcpy((char*)aliveSyn8.hdr.magic, IA_ID);
1596 aliveSyn8.hdr.protoVer[0] = 0;
1597 aliveSyn8.hdr.protoVer[1] = 8;
1599 aliveSyn8.len = Min8(sizeof(ALIVE_SYN_8));
1600 aliveSyn8.rnd = iaUser->rnd = random();
1602 strcpy((char*)aliveSyn8.type, "ALIVE_SYN");
1604 for (int i = 0; i < DIR_NUM; i++)
1606 aliveSyn8.md[i] = iaUser->user->GetProperty().down.Get()[i];
1607 aliveSyn8.mu[i] = iaUser->user->GetProperty().up.Get()[i];
1609 aliveSyn8.sd[i] = iaUser->user->GetSessionDownload()[i];
1610 aliveSyn8.su[i] = iaUser->user->GetSessionUpload()[i];
1614 int dn = iaSettings.GetFreeMbShowType();
1618 const TARIFF * tf = iaUser->user->GetTariff();
1619 double p = tf->GetPriceWithTraffType(aliveSyn8.mu[dn],
1626 snprintf((char*)aliveSyn8.freeMb, IA_FREEMB_LEN, "---");
1630 double fmb = iaUser->user->GetProperty().freeMb;
1631 fmb = fmb < 0 ? 0 : fmb;
1632 snprintf((char*)aliveSyn8.freeMb, IA_FREEMB_LEN, "%.3f", fmb / p);
1637 if (freeMbNone == iaSettings.GetFreeMbShowType())
1639 aliveSyn8.freeMb[0] = 0;
1643 double fmb = iaUser->user->GetProperty().freeMb;
1644 fmb = fmb < 0 ? 0 : fmb;
1645 snprintf((char*)aliveSyn8.freeMb, IA_FREEMB_LEN, "C%.3f", fmb);
1650 if (iaUser->aliveSent)
1652 printfd(__FILE__, "========= ALIVE_ACK_8 TIMEOUT !!! =========\n");
1654 iaUser->aliveSent = true;
1657 const TARIFF * tf = iaUser->user->GetTariff();
1659 aliveSyn8.cash =(int64_t) (iaUser->user->GetProperty().cash.Get() * 1000.0);
1660 if (!stgSettings->GetShowFeeInCash())
1661 aliveSyn8.cash -= (int64_t)(tf->GetFee() * 1000.0);
1664 SwapBytes(aliveSyn8.len);
1665 SwapBytes(aliveSyn8.rnd);
1666 SwapBytes(aliveSyn8.cash);
1667 SwapBytes(aliveSyn8.status);
1668 for (int i = 0; i < DIR_NUM; ++i)
1670 SwapBytes(aliveSyn8.mu[i]);
1671 SwapBytes(aliveSyn8.md[i]);
1672 SwapBytes(aliveSyn8.su[i]);
1673 SwapBytes(aliveSyn8.sd[i]);
1677 Encrypt(&(iaUser->ctx), (char*)&aliveSyn8, (char*)&aliveSyn8, Min8(sizeof(aliveSyn8))/8);
1678 return Send(sip, iaUser->port, (char*)&aliveSyn8, Min8(sizeof(aliveSyn8)));
1680 //-----------------------------------------------------------------------------
1681 int AUTH_IA::Send_DISCONN_SYN_ACK_6(IA_USER * iaUser, uint32_t sip)
1683 disconnSynAck6.len = Min8(sizeof(DISCONN_SYN_ACK_6));
1684 strcpy((char*)disconnSynAck6.type, "DISCONN_SYN_ACK");
1685 disconnSynAck6.rnd = iaUser->rnd = random();
1688 SwapBytes(disconnSynAck6.len);
1689 SwapBytes(disconnSynAck6.rnd);
1692 Encrypt(&iaUser->ctx, (char*)&disconnSynAck6, (char*)&disconnSynAck6, Min8(sizeof(disconnSynAck6))/8);
1693 return Send(sip, iaSettings.GetUserPort(), (char*)&disconnSynAck6, Min8(sizeof(disconnSynAck6)));
1695 //-----------------------------------------------------------------------------
1696 int AUTH_IA::Send_DISCONN_SYN_ACK_7(IA_USER * iaUser, uint32_t sip)
1698 return Send_DISCONN_SYN_ACK_6(iaUser, sip);
1700 //-----------------------------------------------------------------------------
1701 int AUTH_IA::Send_DISCONN_SYN_ACK_8(IA_USER * iaUser, uint32_t sip)
1703 strcpy((char*)disconnSynAck8.hdr.magic, IA_ID);
1704 disconnSynAck8.hdr.protoVer[0] = 0;
1705 disconnSynAck8.hdr.protoVer[1] = 8;
1707 disconnSynAck8.len = Min8(sizeof(DISCONN_SYN_ACK_8));
1708 strcpy((char*)disconnSynAck8.type, "DISCONN_SYN_ACK");
1709 disconnSynAck8.rnd = iaUser->rnd = random();
1712 SwapBytes(disconnSynAck8.len);
1713 SwapBytes(disconnSynAck8.rnd);
1716 Encrypt(&iaUser->ctx, (char*)&disconnSynAck8, (char*)&disconnSynAck8, Min8(sizeof(disconnSynAck8))/8);
1717 return Send(sip, iaUser->port, (char*)&disconnSynAck8, Min8(sizeof(disconnSynAck8)));
1719 //-----------------------------------------------------------------------------
1720 int AUTH_IA::Send_FIN_6(IA_USER * iaUser, uint32_t sip, map<uint32_t, IA_USER>::iterator it)
1722 fin6.len = Min8(sizeof(FIN_6));
1723 strcpy((char*)fin6.type, "FIN");
1724 strcpy((char*)fin6.ok, "OK");
1727 SwapBytes(fin6.len);
1730 Encrypt(&iaUser->ctx, (char*)&fin6, (char*)&fin6, Min8(sizeof(fin6))/8);
1732 iaUser->user->Unauthorize(this);
1734 int ret = Send(sip, iaSettings.GetUserPort(), (char*)&fin6, Min8(sizeof(fin6)));
1738 //-----------------------------------------------------------------------------
1739 int AUTH_IA::Send_FIN_7(IA_USER * iaUser, uint32_t sip, map<uint32_t, IA_USER>::iterator it)
1741 return Send_FIN_6(iaUser, sip, it);
1743 //-----------------------------------------------------------------------------
1744 int AUTH_IA::Send_FIN_8(IA_USER * iaUser, uint32_t sip, map<uint32_t, IA_USER>::iterator it)
1746 strcpy((char*)fin8.hdr.magic, IA_ID);
1747 fin8.hdr.protoVer[0] = 0;
1748 fin8.hdr.protoVer[1] = 8;
1750 fin8.len = Min8(sizeof(FIN_8));
1751 strcpy((char*)fin8.type, "FIN");
1752 strcpy((char*)fin8.ok, "OK");
1755 SwapBytes(fin8.len);
1758 Encrypt(&iaUser->ctx, (char*)&fin8, (char*)&fin8, Min8(sizeof(fin8))/8);
1760 iaUser->user->Unauthorize(this);
1762 int ret = Send(sip, iaUser->port, (char*)&fin8, Min8(sizeof(fin8)));
1766 //-----------------------------------------------------------------------------
1767 bool AUTH_IA::WaitPackets(int sd) const
1775 tv.tv_usec = 500000;
1777 int res = select(sd + 1, &rfds, NULL, NULL, &tv);
1778 if (res == -1) // Error
1782 printfd(__FILE__, "Error on select: '%s'\n", strerror(errno));
1787 if (res == 0) // Timeout
1794 //-----------------------------------------------------------------------------
1796 void InitEncrypt(BLOWFISH_CTX * ctx, const string & password)
1798 unsigned char keyL[PASSWD_LEN]; // ðÁÒÏÌØ ÄÌÑ ÛÉÆÒÏ×ËÉ
1799 memset(keyL, 0, PASSWD_LEN);
1800 strncpy((char *)keyL, password.c_str(), PASSWD_LEN);
1801 Blowfish_Init(ctx, keyL, PASSWD_LEN);
1803 //-----------------------------------------------------------------------------
1805 void Decrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8)
1807 // len8 - ÄÌÉÎÁ × 8-ÍÉ ÂÁÊÔÏ×ÙÈ ÂÌÏËÁÈ
1809 for (int i = 0; i < len8; i++)
1810 DecodeString(dst + i * 8, src + i * 8, ctx);
1812 //-----------------------------------------------------------------------------
1814 void Encrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8)
1816 // len8 - ÄÌÉÎÁ × 8-ÍÉ ÂÁÊÔÏ×ÙÈ ÂÌÏËÁÈ
1818 for (int i = 0; i < len8; i++)
1819 EncodeString(dst + i * 8, src + i * 8, ctx);