2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
18 * Author : Boris Mikhailenko <stg34@stargazer.dp.ua>
23 $Date: 2010/03/25 15:18:48 $
31 #include <sys/types.h>
32 #include <sys/socket.h>
33 #include <unistd.h> // usleep, close
37 #include <cstdio> // snprintf
41 #include "stg/common.h"
42 #include "stg/locker.h"
43 #include "stg/tariff.h"
44 #include "stg/user_property.h"
45 #include "stg/settings.h"
46 #include "stg/plugin_creator.h"
47 #include "inetaccess.h"
49 extern volatile const time_t stgTime;
51 void InitEncrypt(BLOWFISH_CTX * ctx, const string & password);
52 void Decrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8);
53 void Encrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8);
55 //-----------------------------------------------------------------------------
56 //-----------------------------------------------------------------------------
57 //-----------------------------------------------------------------------------
58 PLUGIN_CREATOR<AUTH_IA> iac;
59 //-----------------------------------------------------------------------------
60 //-----------------------------------------------------------------------------
61 //-----------------------------------------------------------------------------
64 return iac.GetPlugin();
66 //-----------------------------------------------------------------------------
67 //-----------------------------------------------------------------------------
68 //-----------------------------------------------------------------------------
69 AUTH_IA_SETTINGS::AUTH_IA_SETTINGS()
73 freeMbShowType(freeMbCash)
76 //-----------------------------------------------------------------------------
77 int AUTH_IA_SETTINGS::ParseSettings(const MODULE_SETTINGS & s)
81 vector<PARAM_VALUE>::const_iterator pvi;
82 ///////////////////////////
84 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
85 if (pvi == s.moduleParams.end())
87 errorStr = "Parameter \'Port\' not found.";
88 printfd(__FILE__, "Parameter 'Port' not found\n");
91 if (ParseIntInRange(pvi->value[0], 2, 65535, &p))
93 errorStr = "Cannot parse parameter \'Port\': " + errorStr;
94 printfd(__FILE__, "Cannot parse parameter 'Port'\n");
98 ///////////////////////////
99 pv.param = "UserDelay";
100 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
101 if (pvi == s.moduleParams.end())
103 errorStr = "Parameter \'UserDelay\' not found.";
104 printfd(__FILE__, "Parameter 'UserDelay' not found\n");
108 if (ParseIntInRange(pvi->value[0], 5, 600, &userDelay))
110 errorStr = "Cannot parse parameter \'UserDelay\': " + errorStr;
111 printfd(__FILE__, "Cannot parse parameter 'UserDelay'\n");
114 ///////////////////////////
115 pv.param = "UserTimeout";
116 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
117 if (pvi == s.moduleParams.end())
119 errorStr = "Parameter \'UserTimeout\' not found.";
120 printfd(__FILE__, "Parameter 'UserTimeout' not found\n");
124 if (ParseIntInRange(pvi->value[0], 15, 1200, &userTimeout))
126 errorStr = "Cannot parse parameter \'UserTimeout\': " + errorStr;
127 printfd(__FILE__, "Cannot parse parameter 'UserTimeout'\n");
130 /////////////////////////////////////////////////////////////
134 pvi = find(s.moduleParams.begin(), s.moduleParams.end(), pv);
135 if (pvi == s.moduleParams.end())
137 errorStr = "Parameter \'FreeMb\' not found.";
138 printfd(__FILE__, "Parameter 'FreeMb' not found\n");
141 freeMbType = pvi->value[0];
143 if (strcasecmp(freeMbType.c_str(), "cash") == 0)
145 freeMbShowType = freeMbCash;
147 else if (strcasecmp(freeMbType.c_str(), "none") == 0)
149 freeMbShowType = freeMbNone;
151 else if (!str2x(freeMbType.c_str(), n))
153 if (n < 0 || n >= DIR_NUM)
155 errorStr = "Incorrect parameter \'" + freeMbType + "\'.";
156 printfd(__FILE__, "%s\n", errorStr.c_str());
159 freeMbShowType = (FREEMB)(freeMb0 + n);
163 errorStr = "Incorrect parameter \'" + freeMbType + "\'.";
164 printfd(__FILE__, "%s\n", errorStr.c_str());
167 /////////////////////////////////////////////////////////////
170 //-----------------------------------------------------------------------------
171 //-----------------------------------------------------------------------------
172 //-----------------------------------------------------------------------------
173 #ifdef IA_PHASE_DEBUG
178 gettimeofday(&phaseTime, NULL);
184 gettimeofday(&phaseTime, NULL);
187 //-----------------------------------------------------------------------------
188 IA_PHASE::~IA_PHASE()
190 #ifdef IA_PHASE_DEBUG
191 flog = fopen(log.c_str(), "at");
194 fprintf(flog, "IA %s D\n", login.c_str());
199 //-----------------------------------------------------------------------------
200 #ifdef IA_PHASE_DEBUG
201 void IA_PHASE::SetLogFileName(const string & logFileName)
203 log = logFileName + ".ia.log";
205 //-----------------------------------------------------------------------------
206 void IA_PHASE::SetUserLogin(const string & login)
208 IA_PHASE::login = login;
210 //-----------------------------------------------------------------------------
211 void IA_PHASE::WritePhaseChange(int newPhase)
214 gettimeofday(&newPhaseTime, NULL);
215 flog = fopen(log.c_str(), "at");
216 /*int64_t tn = newPhaseTime.GetSec()*1000000 + newPhaseTime.GetUSec();
217 int64_t to = phaseTime.GetSec()*1000000 + phaseTime.GetUSec();*/
220 string action = newPhase == phase ? "U" : "C";
221 double delta = newPhaseTime.GetSec() - phaseTime.GetSec();
222 delta += (newPhaseTime.GetUSec() - phaseTime.GetUSec()) * 1.0e-6;
223 fprintf(flog, "IA %s %s oldPhase = %d, newPhase = %d. dt = %.6f\n",
233 //-----------------------------------------------------------------------------
234 void IA_PHASE::SetPhase1()
236 #ifdef IA_PHASE_DEBUG
240 gettimeofday(&phaseTime, NULL);
242 //-----------------------------------------------------------------------------
243 void IA_PHASE::SetPhase2()
245 #ifdef IA_PHASE_DEBUG
249 gettimeofday(&phaseTime, NULL);
251 //-----------------------------------------------------------------------------
252 void IA_PHASE::SetPhase3()
254 #ifdef IA_PHASE_DEBUG
258 gettimeofday(&phaseTime, NULL);
260 //-----------------------------------------------------------------------------
261 void IA_PHASE::SetPhase4()
263 #ifdef IA_PHASE_DEBUG
267 gettimeofday(&phaseTime, NULL);
269 //-----------------------------------------------------------------------------
270 void IA_PHASE::SetPhase5()
272 #ifdef IA_PHASE_DEBUG
276 gettimeofday(&phaseTime, NULL);
278 //-----------------------------------------------------------------------------
279 int IA_PHASE::GetPhase() const
283 //-----------------------------------------------------------------------------
284 void IA_PHASE::UpdateTime()
286 #ifdef IA_PHASE_DEBUG
287 WritePhaseChange(phase);
289 gettimeofday(&phaseTime, NULL);
291 //-----------------------------------------------------------------------------
292 const UTIME & IA_PHASE::GetTime() const
296 //-----------------------------------------------------------------------------
297 //-----------------------------------------------------------------------------
298 //-----------------------------------------------------------------------------
302 isRunningRunTimeouter(false),
306 WriteServLog(GetStgLogger()),
307 enabledDirs(0xFFffFFff),
308 onDelUserNotifier(*this)
310 InitEncrypt(&ctxS, "pr7Hhen");
312 pthread_mutexattr_t attr;
313 pthread_mutexattr_init(&attr);
314 pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_RECURSIVE);
315 pthread_mutex_init(&mutex, &attr);
317 memset(&connSynAck6, 0, sizeof(CONN_SYN_ACK_6));
318 memset(&connSynAck8, 0, sizeof(CONN_SYN_ACK_8));
319 memset(&disconnSynAck6, 0, sizeof(DISCONN_SYN_ACK_6));
320 memset(&disconnSynAck8, 0, sizeof(DISCONN_SYN_ACK_8));
321 memset(&aliveSyn6, 0, sizeof(ALIVE_SYN_6));
322 memset(&aliveSyn8, 0, sizeof(ALIVE_SYN_8));
323 memset(&fin6, 0, sizeof(FIN_6));
324 memset(&fin8, 0, sizeof(FIN_8));
326 printfd(__FILE__, "sizeof(CONN_SYN_6) = %d %d\n", sizeof(CONN_SYN_6), Min8(sizeof(CONN_SYN_6)));
327 printfd(__FILE__, "sizeof(CONN_SYN_8) = %d %d\n", sizeof(CONN_SYN_8), Min8(sizeof(CONN_SYN_8)));
328 printfd(__FILE__, "sizeof(CONN_SYN_ACK_6) = %d %d\n", sizeof(CONN_SYN_ACK_6), Min8(sizeof(CONN_SYN_ACK_6)));
329 printfd(__FILE__, "sizeof(CONN_SYN_ACK_8) = %d %d\n", sizeof(CONN_SYN_ACK_8), Min8(sizeof(CONN_SYN_ACK_8)));
330 printfd(__FILE__, "sizeof(CONN_ACK_6) = %d %d\n", sizeof(CONN_ACK_6), Min8(sizeof(CONN_ACK_6)));
331 printfd(__FILE__, "sizeof(ALIVE_SYN_6) = %d %d\n", sizeof(ALIVE_SYN_6), Min8(sizeof(ALIVE_SYN_6)));
332 printfd(__FILE__, "sizeof(ALIVE_SYN_8) = %d %d\n", sizeof(ALIVE_SYN_8), Min8(sizeof(ALIVE_SYN_8)));
333 printfd(__FILE__, "sizeof(ALIVE_ACK_6) = %d %d\n", sizeof(ALIVE_ACK_6), Min8(sizeof(ALIVE_ACK_6)));
334 printfd(__FILE__, "sizeof(DISCONN_SYN_6) = %d %d\n", sizeof(DISCONN_SYN_6), Min8(sizeof(DISCONN_SYN_6)));
335 printfd(__FILE__, "sizeof(DISCONN_SYN_ACK_6) = %d %d\n", sizeof(DISCONN_SYN_ACK_6), Min8(sizeof(DISCONN_SYN_ACK_6)));
336 printfd(__FILE__, "sizeof(DISCONN_SYN_ACK_8) = %d %d\n", sizeof(DISCONN_SYN_ACK_8), Min8(sizeof(DISCONN_SYN_ACK_8)));
337 printfd(__FILE__, "sizeof(DISCONN_ACK_6) = %d %d\n", sizeof(DISCONN_ACK_6), Min8(sizeof(DISCONN_ACK_6)));
338 printfd(__FILE__, "sizeof(FIN_6) = %d %d\n", sizeof(FIN_6), Min8(sizeof(FIN_6)));
339 printfd(__FILE__, "sizeof(FIN_8) = %d %d\n", sizeof(FIN_8), Min8(sizeof(FIN_8)));
340 printfd(__FILE__, "sizeof(ERR) = %d %d\n", sizeof(ERR), Min8(sizeof(ERR)));
341 printfd(__FILE__, "sizeof(INFO_6) = %d %d\n", sizeof(INFO_6), Min8(sizeof(INFO_6)));
342 printfd(__FILE__, "sizeof(INFO_7) = %d %d\n", sizeof(INFO_7), Min8(sizeof(INFO_7)));
343 printfd(__FILE__, "sizeof(INFO_8) = %d %d\n", sizeof(INFO_8), Min8(sizeof(INFO_8)));
345 packetTypes["CONN_SYN"] = CONN_SYN_N;
346 packetTypes["CONN_SYN_ACK"] = CONN_SYN_ACK_N;
347 packetTypes["CONN_ACK"] = CONN_ACK_N;
348 packetTypes["ALIVE_SYN"] = ALIVE_SYN_N;
349 packetTypes["ALIVE_ACK"] = ALIVE_ACK_N;
350 packetTypes["DISCONN_SYN"] = DISCONN_SYN_N;
351 packetTypes["DISCONN_SYN_ACK"] = DISCONN_SYN_ACK_N;
352 packetTypes["DISCONN_ACK"] = DISCONN_ACK_N;
353 packetTypes["FIN"] = FIN_N;
354 packetTypes["ERR"] = ERROR_N;
356 //-----------------------------------------------------------------------------
359 pthread_mutex_destroy(&mutex);
361 //-----------------------------------------------------------------------------
364 users->AddNotifierUserDel(&onDelUserNotifier);
374 if (pthread_create(&recvThread, NULL, Run, this))
376 errorStr = "Cannot create thread.";
377 printfd(__FILE__, "Cannot create recv thread\n");
382 if (!isRunningRunTimeouter)
384 if (pthread_create(&timeouterThread, NULL, RunTimeouter, this))
386 errorStr = "Cannot create thread.";
387 printfd(__FILE__, "Cannot create timeouter thread\n");
394 //-----------------------------------------------------------------------------
405 UnauthorizeUser(this)
410 //5 seconds to thread stops itself
411 for (int i = 0; i < 25 && isRunningRun; i++)
416 //after 5 seconds waiting thread still running. now killing it
419 //TODO pthread_cancel()
420 if (pthread_kill(recvThread, SIGINT))
422 errorStr = "Cannot kill thread.";
423 printfd(__FILE__, "Cannot kill thread\n");
426 for (int i = 0; i < 25 && isRunningRun; ++i)
430 printfd(__FILE__, "Failed to stop recv thread\n");
434 pthread_join(recvThread, NULL);
436 printfd(__FILE__, "AUTH_IA killed Run\n");
442 if (isRunningRunTimeouter)
444 //5 seconds to thread stops itself
445 for (int i = 0; i < 25 && isRunningRunTimeouter; i++)
450 //after 5 seconds waiting thread still running. now killing it
451 if (isRunningRunTimeouter)
453 //TODO pthread_cancel()
454 if (pthread_kill(timeouterThread, SIGINT))
456 errorStr = "Cannot kill thread.";
459 for (int i = 0; i < 25 && isRunningRunTimeouter; ++i)
461 if (isRunningRunTimeouter)
463 printfd(__FILE__, "Failed to stop timeouter thread\n");
467 pthread_join(timeouterThread, NULL);
469 printfd(__FILE__, "AUTH_IA killed Timeouter\n");
472 printfd(__FILE__, "AUTH_IA::Stoped successfully.\n");
473 users->DelNotifierUserDel(&onDelUserNotifier);
476 //-----------------------------------------------------------------------------
477 void * AUTH_IA::Run(void * d)
479 AUTH_IA * ia = static_cast<AUTH_IA *>(d);
481 ia->isRunningRun = true;
485 time_t touchTime = stgTime - MONITOR_TIME_DELAY_SEC;
489 ia->RecvData(buffer, sizeof(buffer));
490 if ((touchTime + MONITOR_TIME_DELAY_SEC <= stgTime) && ia->stgSettings->GetMonitoring())
493 string monFile = ia->stgSettings->GetMonitorDir() + "/inetaccess_r";
494 TouchFile(monFile.c_str());
498 ia->isRunningRun = false;
501 //-----------------------------------------------------------------------------
502 void * AUTH_IA::RunTimeouter(void * d)
504 AUTH_IA * ia = static_cast<AUTH_IA *>(d);
506 ia->isRunningRunTimeouter = true;
509 string monFile = ia->stgSettings->GetMonitorDir() + "/inetaccess_t";
514 // TODO cahange counter to timer and MONITOR_TIME_DELAY_SEC
515 if (++a % (50*60) == 0 && ia->stgSettings->GetMonitoring())
517 TouchFile(monFile.c_str());
521 ia->isRunningRunTimeouter = false;
524 //-----------------------------------------------------------------------------
525 int AUTH_IA::ParseSettings()
527 int ret = iaSettings.ParseSettings(settings);
529 errorStr = iaSettings.GetStrError();
532 //-----------------------------------------------------------------------------
533 int AUTH_IA::PrepareNet()
535 struct sockaddr_in listenAddr;
537 listenSocket = socket(AF_INET, SOCK_DGRAM, 0);
539 if (listenSocket < 0)
541 errorStr = "Cannot create socket.";
545 listenAddr.sin_family = AF_INET;
546 listenAddr.sin_port = htons(iaSettings.GetUserPort());
547 listenAddr.sin_addr.s_addr = inet_addr("0.0.0.0");
549 if (bind(listenSocket, (struct sockaddr*)&listenAddr, sizeof(listenAddr)) < 0)
551 errorStr = "AUTH_IA: Bind failed.";
556 if (getsockopt(listenSocket, SOL_SOCKET, SO_SNDBUF, &buffLen, sizeof(buffLen)) < 0)
559 errorStr = "Getsockopt failed. " + string(strerror(errno));
563 //WriteServLog("buffLen = %d", buffLen);
567 //-----------------------------------------------------------------------------
568 int AUTH_IA::FinalizeNet()
573 //-----------------------------------------------------------------------------
574 int AUTH_IA::RecvData(char * buffer, int bufferSize)
576 if (!WaitPackets(listenSocket)) // Timeout
581 struct sockaddr_in outerAddr;
582 socklen_t outerAddrLen(sizeof(outerAddr));
583 int dataLen = recvfrom(listenSocket, buffer, bufferSize, 0, (struct sockaddr *)&outerAddr, &outerAddrLen);
590 if (dataLen <= 0) // Error
594 printfd(__FILE__, "recvfrom res=%d, error: '%s'\n", dataLen, strerror(errno));
604 if (CheckHeader(buffer, &protoVer))
607 char login[PASSWD_LEN]; //TODO why PASSWD_LEN ?
608 memset(login, 0, PASSWD_LEN);
610 Decrypt(&ctxS, login, buffer + 8, PASSWD_LEN / 8);
612 uint32_t sip = *((uint32_t*)&outerAddr.sin_addr);
613 uint16_t sport = htons(outerAddr.sin_port);
616 if (users->FindByName(login, &user) == 0)
618 printfd(__FILE__, "User %s FOUND!\n", user->GetLogin().c_str());
619 PacketProcessor(buffer, dataLen, sip, sport, protoVer, user);
623 WriteServLog("User\'s connect failed:: user \'%s\' not found. IP \'%s\'",
625 inet_ntostring(sip).c_str());
626 printfd(__FILE__, "User %s NOT found!\n", login);
627 SendError(sip, sport, protoVer, "îÅÐÒÁ×ÉÌØÎÙÊ ÌÏÇÉÎ ÉÌÉ ÐÁÒÏÌØ!");
633 //-----------------------------------------------------------------------------
634 int AUTH_IA::CheckHeader(const char * buffer, int * protoVer)
636 if (strncmp(IA_ID, buffer, strlen(IA_ID)) != 0)
638 //SendError(userIP, updateMsg);
639 printfd(__FILE__, "update needed - IA_ID\n");
640 //SendError(userIP, "Incorrect header!");
644 if (buffer[6] != 0) //proto[0] shoud be 0
646 printfd(__FILE__, "update needed - PROTO major: %d\n", buffer[6]);
647 //SendError(userIP, updateMsg);
654 //SendError(userIP, updateMsg);
655 printfd(__FILE__, "update needed - PROTO minor: %d\n", buffer[7]);
660 *protoVer = buffer[7];
664 //-----------------------------------------------------------------------------
665 int AUTH_IA::Timeouter()
667 STG_LOCKER lock(&mutex, __FILE__, __LINE__);
669 map<uint32_t, IA_USER>::iterator it;
670 it = ip2user.begin();
673 while (it != ip2user.end())
677 static UTIME currTime;
678 gettimeofday(&currTime, NULL);
680 if ((it->second.phase.GetPhase() == 2)
681 && (currTime - it->second.phase.GetTime()) > iaSettings.GetUserDelay())
683 it->second.phase.SetPhase1();
684 printfd(__FILE__, "Phase changed from 2 to 1. Reason: timeout\n");
687 if (it->second.phase.GetPhase() == 3)
689 if (!it->second.messagesToSend.empty())
691 if (it->second.protoVer == 6)
692 RealSendMessage6(*it->second.messagesToSend.begin(), sip, it->second);
694 if (it->second.protoVer == 7)
695 RealSendMessage7(*it->second.messagesToSend.begin(), sip, it->second);
697 if (it->second.protoVer == 8)
698 RealSendMessage8(*it->second.messagesToSend.begin(), sip, it->second);
700 it->second.messagesToSend.erase(it->second.messagesToSend.begin());
703 if((currTime - it->second.lastSendAlive) > iaSettings.GetUserDelay())
705 switch (it->second.protoVer)
708 Send_ALIVE_SYN_6(&(it->second), sip);
711 Send_ALIVE_SYN_7(&(it->second), sip);
714 Send_ALIVE_SYN_8(&(it->second), sip);
718 gettimeofday(&it->second.lastSendAlive, NULL);
721 if ((currTime - it->second.phase.GetTime()) > iaSettings.GetUserTimeout())
723 users->Unauthorize(it->second.user->GetLogin(), this);
729 if ((it->second.phase.GetPhase() == 4)
730 && ((currTime - it->second.phase.GetTime()) > iaSettings.GetUserDelay()))
732 it->second.phase.SetPhase3();
733 printfd(__FILE__, "Phase changed from 4 to 3. Reason: timeout\n");
741 //-----------------------------------------------------------------------------
742 int AUTH_IA::PacketProcessor(char * buff, int dataLen, uint32_t sip, uint16_t sport, int protoVer, USER_PTR user)
744 std::string login(user->GetLogin());
745 // ôÕÔ ÓÏÂÒÁÎÙ ÏÂÒÁÂÏÔÞÉËÉ ÒÁÚÎÙÈ ÐÁËÅÔÏ×
746 const int offset = LOGIN_LEN + 2 + 6; // LOGIN_LEN + sizeOfMagic + sizeOfVer;
748 IA_USER * iaUser = NULL;
750 CONN_SYN_6 * connSyn6;
751 CONN_SYN_7 * connSyn7;
752 CONN_SYN_8 * connSyn8;
754 CONN_ACK_6 * connAck;
755 ALIVE_ACK_6 * aliveAck;
756 DISCONN_SYN_6 * disconnSyn;
757 DISCONN_ACK_6 * disconnAck;
759 STG_LOCKER lock(&mutex, __FILE__, __LINE__);
760 map<uint32_t, IA_USER>::iterator it(ip2user.find(sip));
762 if (it == ip2user.end())
764 // åÝÅ ÎÅ ÂÙÌÏ ÚÁÐÒÏÓÏ× Ó ÜÔÏÇÏ IP
765 printfd(__FILE__, "Add new user\n");
766 ip2user[sip].login = user->GetLogin();
767 ip2user[sip].user = user;
768 ip2user[sip].protoVer = protoVer;
769 ip2user[sip].port = sport;
770 #ifdef IA_PHASE_DEBUG
771 ip2user[sip].phase.SetLogFileName(stgSettings->GetLogFileName());
772 ip2user[sip].phase.SetUserLogin(login);
776 it = ip2user.find(sip); //TODO
777 if (it == ip2user.end())
779 printfd(__FILE__, "+++ ERROR +++\n");
783 else if (user->GetID() != it->second.user->GetID())
785 printfd(__FILE__, "IP address already in use. IP \'%s\'\n", inet_ntostring(sip).c_str());
786 WriteServLog("IP address already in use. IP \'%s\'", inet_ntostring(sip).c_str());
787 SendError(sip, sport, protoVer, "÷ÁÛ IP ÁÄÒÅÓ ÕÖÅ ÉÓÐÏÌØÚÕÅÔÓÑ!");
791 iaUser = &(it->second);
793 if (iaUser->port != sport)
794 iaUser->port = sport;
796 if (iaUser->password != user->GetProperty().password.Get())
798 InitEncrypt(&iaUser->ctx, user->GetProperty().password.Get());
799 iaUser->password = user->GetProperty().password.Get();
803 Decrypt(&iaUser->ctx, buff, buff, (dataLen - offset) / 8);
805 char packetName[IA_MAX_TYPE_LEN];
806 strncpy(packetName, buff + 4, IA_MAX_TYPE_LEN);
807 packetName[IA_MAX_TYPE_LEN - 1] = 0;
809 map<string, int>::iterator pi(packetTypes.find(packetName));
810 if (pi == packetTypes.end())
812 SendError(sip, sport, protoVer, "îÅÐÒÁ×ÉÌØÎÙÊ ÌÏÇÉÎ ÉÌÉ ÐÁÒÏÌØ!");
813 printfd(__FILE__, "Login or password is wrong!\n");
814 WriteServLog("User's connect failed. IP \'%s\'. Wrong login or password", inet_ntostring(sip).c_str());
818 if (user->GetProperty().disabled.Get())
820 SendError(sip, sport, protoVer, "õÞÅÔÎÁÑ ÚÁÐÉÓØ ÚÁÂÌÏËÉÒÏ×ÁÎÁ");
824 if (user->GetProperty().passive.Get())
826 SendError(sip, sport, protoVer, "õÞÅÔÎÁÑ ÚÁÐÉÓØ ÚÁÍÏÒÏÖÅÎÁ");
830 if (user->IsAuthorizedBy(this) && user->GetCurrIP() != sip)
832 printfd(__FILE__, "Login %s already in use. IP \'%s\'\n", login.c_str(), inet_ntostring(sip).c_str());
833 WriteServLog("Login %s already in use. IP \'%s\'", login.c_str(), inet_ntostring(sip).c_str());
834 SendError(sip, sport, protoVer, "÷ÁÛ ÌÏÇÉÎ ÕÖÅ ÉÓÐÏÌØÚÕÅÔÓÑ!");
838 // ôÅÐÅÒØ ÍÙ ÄÏÌÖÎÙ ÐÒÏ×ÅÒÉÔØ, ÍÏÖÅÔ ÌÉ ÐÏÌØÚÏ×ÁÔÅÌØ ÐÏÄËÌÀÞÉÔÓÑ Ó ÜÔÏÇÏ ÁÄÒÅÓÁ.
839 int ipFound = user->GetProperty().ips.Get().IsIPInIPS(sip);
842 printfd(__FILE__, "User %s. IP address is incorrect. IP \'%s\'\n", login.c_str(), inet_ntostring(sip).c_str());
843 WriteServLog("User %s. IP address is incorrect. IP \'%s\'", login.c_str(), inet_ntostring(sip).c_str());
844 SendError(sip, sport, protoVer, "ðÏÌØÚÏ×ÁÔÅÌØ ÎÅ ÏÐÏÚÎÁÎ! ðÒÏ×ÅÒØÔÅ IP ÁÄÒÅÓ.");
856 connSyn6 = (CONN_SYN_6*)(buff - offset);
857 ret = Process_CONN_SYN_6(connSyn6, &(it->second), sip);
860 connSyn7 = (CONN_SYN_7*)(buff - offset);
861 ret = Process_CONN_SYN_7(connSyn7, &(it->second), sip);
864 connSyn8 = (CONN_SYN_8*)(buff - offset);
865 ret = Process_CONN_SYN_8(connSyn8, &(it->second), sip);
876 Send_CONN_SYN_ACK_6(iaUser, sip);
879 Send_CONN_SYN_ACK_7(iaUser, sip);
882 Send_CONN_SYN_ACK_8(iaUser, sip);
888 connAck = (CONN_ACK_6*)(buff - offset);
892 ret = Process_CONN_ACK_6(connAck, iaUser, sip);
895 ret = Process_CONN_ACK_7(connAck, iaUser, sip);
898 ret = Process_CONN_ACK_8((CONN_ACK_8*)(buff - offset), iaUser, sip);
904 SendError(sip, sport, protoVer, errorStr);
911 Send_ALIVE_SYN_6(iaUser, sip);
914 Send_ALIVE_SYN_7(iaUser, sip);
917 Send_ALIVE_SYN_8(iaUser, sip);
923 // ðÒÉÂÙÌ ÏÔ×ÅÔ Ó ÐÏÄÔ×ÅÒÖÄÅÎÉÅÍ ALIVE
925 aliveAck = (ALIVE_ACK_6*)(buff - offset);
929 ret = Process_ALIVE_ACK_6(aliveAck, iaUser, sip);
932 ret = Process_ALIVE_ACK_7(aliveAck, iaUser, sip);
935 ret = Process_ALIVE_ACK_8((ALIVE_ACK_8*)(buff - offset), iaUser, sip);
940 // úÁÐÒÏÓ ÎÁ ÏÔËÌÀÞÅÎÉÅ
943 disconnSyn = (DISCONN_SYN_6*)(buff - offset);
947 ret = Process_DISCONN_SYN_6(disconnSyn, iaUser, sip);
950 ret = Process_DISCONN_SYN_7(disconnSyn, iaUser, sip);
953 ret = Process_DISCONN_SYN_8((DISCONN_SYN_8*)(buff - offset), iaUser, sip);
963 Send_DISCONN_SYN_ACK_6(iaUser, sip);
966 Send_DISCONN_SYN_ACK_7(iaUser, sip);
969 Send_DISCONN_SYN_ACK_8(iaUser, sip);
975 disconnAck = (DISCONN_ACK_6*)(buff - offset);
980 ret = Process_DISCONN_ACK_6(disconnAck, iaUser, sip, it);
983 ret = Process_DISCONN_ACK_7(disconnAck, iaUser, sip, it);
986 ret = Process_DISCONN_ACK_8((DISCONN_ACK_8*)(buff - offset), iaUser, sip, it);
993 Send_FIN_6(iaUser, sip, it);
996 Send_FIN_7(iaUser, sip, it);
999 Send_FIN_8(iaUser, sip, it);
1007 //-----------------------------------------------------------------------------
1008 void AUTH_IA::DelUser(USER_PTR u)
1010 STG_LOCKER lock(&mutex, __FILE__, __LINE__);
1012 uint32_t ip = u->GetCurrIP();
1017 map<uint32_t, IA_USER>::iterator it;
1018 it = ip2user.find(ip);
1019 if (it == ip2user.end())
1022 printfd(__FILE__, "Nothing to delete\n");
1026 if (it->second.user == u)
1028 printfd(__FILE__, "User removed!\n");
1029 users->Unauthorize(u->GetLogin(), this);
1033 //-----------------------------------------------------------------------------
1034 int AUTH_IA::SendError(uint32_t ip, uint16_t port, int protoVer, const string & text)
1036 struct sockaddr_in sendAddr;
1043 memset(&err, 0, sizeof(ERR));
1045 sendAddr.sin_family = AF_INET;
1046 sendAddr.sin_port = htons(port);
1048 sendAddr.sin_addr.s_addr = ip;// IP ÐÏÌØÚÏ×ÁÔÅÌÑ
1051 strncpy((char*)err.type, "ERR", 16);
1052 strncpy((char*)err.text, text.c_str(), MAX_MSG_LEN);
1058 res = sendto(listenSocket, &err, sizeof(err), 0, (struct sockaddr*)&sendAddr, sizeof(sendAddr));
1059 printfd(__FILE__, "SendError %d bytes sent\n", res);
1064 memset(&err8, 0, sizeof(ERR_8));
1066 sendAddr.sin_family = AF_INET;
1067 sendAddr.sin_port = htons(port);
1069 sendAddr.sin_addr.s_addr = ip;// IP ÐÏÌØÚÏ×ÁÔÅÌÑ
1072 strncpy((char*)err8.type, "ERR", 16);
1073 strncpy((char*)err8.text, text.c_str(), MAX_MSG_LEN);
1076 SwapBytes(err8.len);
1079 res = sendto(listenSocket, &err8, sizeof(err8), 0, (struct sockaddr*)&sendAddr, sizeof(sendAddr));
1080 printfd(__FILE__, "SendError_8 %d bytes sent\n", res);
1086 //-----------------------------------------------------------------------------
1087 int AUTH_IA::Send(uint32_t ip, uint16_t port, const char * buffer, int len)
1089 struct sockaddr_in sendAddr;
1092 sendAddr.sin_family = AF_INET;
1093 sendAddr.sin_port = htons(port);
1094 sendAddr.sin_addr.s_addr = ip;
1096 res = sendto(listenSocket, buffer, len, 0, (struct sockaddr*)&sendAddr, sizeof(sendAddr));
1098 static struct timeval tv;
1099 gettimeofday(&tv, NULL);
1103 //-----------------------------------------------------------------------------
1104 int AUTH_IA::SendMessage(const STG_MSG & msg, uint32_t ip) const
1106 STG_LOCKER lock(&mutex, __FILE__, __LINE__);
1108 printfd(__FILE__, "SendMessage userIP=%s\n", inet_ntostring(ip).c_str());
1110 map<uint32_t, IA_USER>::iterator it;
1111 it = ip2user.find(ip);
1112 if (it == ip2user.end())
1114 errorStr = "Unknown user.";
1117 it->second.messagesToSend.push_back(msg);
1120 //-----------------------------------------------------------------------------
1121 int AUTH_IA::RealSendMessage6(const STG_MSG & msg, uint32_t ip, IA_USER & user)
1123 printfd(__FILE__, "RealSendMessage 6 user=%s\n", user.login.c_str());
1128 memset(&info, 0, sizeof(INFO_6));
1131 strncpy((char*)info.type, "INFO", 16);
1132 info.infoType = 'I';
1133 strncpy((char*)info.text, msg.text.c_str(), 235);
1136 size_t len = info.len;
1138 SwapBytes(info.len);
1141 memcpy(buffer, &info, sizeof(INFO_6));
1142 Encrypt(&user.ctx, buffer, buffer, len / 8);
1143 Send(ip, iaSettings.GetUserPort(), buffer, len);
1147 //-----------------------------------------------------------------------------
1148 int AUTH_IA::RealSendMessage7(const STG_MSG & msg, uint32_t ip, IA_USER & user)
1150 printfd(__FILE__, "RealSendMessage 7 user=%s\n", user.login.c_str());
1155 memset(&info, 0, sizeof(INFO_7));
1158 strncpy((char*)info.type, "INFO_7", 16);
1159 info.infoType = msg.header.type;
1160 info.showTime = msg.header.showTime;
1162 info.sendTime = msg.header.creationTime;
1164 size_t len = info.len;
1166 SwapBytes(info.len);
1167 SwapBytes(info.sendTime);
1170 strncpy((char*)info.text, msg.text.c_str(), MAX_MSG_LEN - 1);
1171 info.text[MAX_MSG_LEN - 1] = 0;
1173 memcpy(buffer, &info, sizeof(INFO_7));
1175 Encrypt(&user.ctx, buffer, buffer, len / 8);
1176 Send(ip, iaSettings.GetUserPort(), buffer, len);
1180 //-----------------------------------------------------------------------------
1181 int AUTH_IA::RealSendMessage8(const STG_MSG & msg, uint32_t ip, IA_USER & user)
1183 printfd(__FILE__, "RealSendMessage 8 user=%s\n", user.login.c_str());
1186 memset(buffer, 0, sizeof(buffer));
1190 memset(&info, 0, sizeof(INFO_8));
1193 strncpy((char*)info.type, "INFO_8", 16);
1194 info.infoType = msg.header.type;
1195 info.showTime = msg.header.showTime;
1196 info.sendTime = msg.header.creationTime;
1198 strncpy((char*)info.text, msg.text.c_str(), IA_MAX_MSG_LEN_8 - 1);
1199 info.text[IA_MAX_MSG_LEN_8 - 1] = 0;
1201 size_t len = info.len;
1203 SwapBytes(info.len);
1204 SwapBytes(info.sendTime);
1207 memcpy(buffer, &info, sizeof(INFO_8));
1209 Encrypt(&user.ctx, buffer, buffer, len / 8);
1210 Send(ip, user.port, buffer, len);
1214 //-----------------------------------------------------------------------------
1215 int AUTH_IA::Process_CONN_SYN_6(CONN_SYN_6 *, IA_USER * iaUser, uint32_t)
1217 if (!(iaUser->phase.GetPhase() == 1 || iaUser->phase.GetPhase() == 3))
1220 enabledDirs = 0xFFffFFff;
1222 iaUser->phase.SetPhase2();
1223 printfd(__FILE__, "Phase changed from %d to 2. Reason: CONN_SYN_6\n", iaUser->phase.GetPhase());
1226 //-----------------------------------------------------------------------------
1227 int AUTH_IA::Process_CONN_SYN_7(CONN_SYN_7 * connSyn, IA_USER * iaUser, uint32_t sip)
1229 return Process_CONN_SYN_6(connSyn, iaUser, sip);
1231 //-----------------------------------------------------------------------------
1232 int AUTH_IA::Process_CONN_SYN_8(CONN_SYN_8 * connSyn, IA_USER * iaUser, uint32_t sip)
1235 SwapBytes(connSyn->dirs);
1237 int ret = Process_CONN_SYN_6((CONN_SYN_6*)connSyn, iaUser, sip);
1238 enabledDirs = connSyn->dirs;
1241 //-----------------------------------------------------------------------------
1242 int AUTH_IA::Process_CONN_ACK_6(CONN_ACK_6 * connAck, IA_USER * iaUser, uint32_t sip)
1245 SwapBytes(connAck->len);
1246 SwapBytes(connAck->rnd);
1248 printfd( __FILE__, "CONN_ACK_6 %s\n", connAck->type);
1249 // ÕÓÔÁÎÏ×ÉÔØ ÎÏ×ÕÀ ÆÁÚÕ É ×ÒÅÍÑ É ÒÁÚÒÅÛÉÔØ ÉÎÅÔ
1250 if ((iaUser->phase.GetPhase() == 2) && (connAck->rnd == iaUser->rnd + 1))
1252 iaUser->phase.UpdateTime();
1254 iaUser->lastSendAlive = iaUser->phase.GetTime();
1255 if (users->Authorize(iaUser->login, sip, enabledDirs, this))
1257 iaUser->phase.SetPhase3();
1258 printfd(__FILE__, "Phase changed from 2 to 3. Reason: CONN_ACK_6\n");
1263 errorStr = iaUser->user->GetStrError();
1264 iaUser->phase.SetPhase1();
1265 printfd(__FILE__, "Phase changed from 2 to 1. Reason: failed to authorize user\n");
1269 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), connAck->rnd);
1272 //-----------------------------------------------------------------------------
1273 int AUTH_IA::Process_CONN_ACK_7(CONN_ACK_7 * connAck, IA_USER * iaUser, uint32_t sip)
1275 return Process_CONN_ACK_6(connAck, iaUser, sip);
1277 //-----------------------------------------------------------------------------
1278 int AUTH_IA::Process_CONN_ACK_8(CONN_ACK_8 * connAck, IA_USER * iaUser, uint32_t sip)
1281 SwapBytes(connAck->len);
1282 SwapBytes(connAck->rnd);
1284 printfd( __FILE__, "CONN_ACK_8 %s\n", connAck->type);
1286 if ((iaUser->phase.GetPhase() == 2) && (connAck->rnd == iaUser->rnd + 1))
1288 iaUser->phase.UpdateTime();
1289 iaUser->lastSendAlive = iaUser->phase.GetTime();
1290 if (users->Authorize(iaUser->login, sip, enabledDirs, this))
1292 iaUser->phase.SetPhase3();
1293 printfd(__FILE__, "Phase changed from 2 to 3. Reason: CONN_ACK_8\n");
1298 errorStr = iaUser->user->GetStrError();
1299 iaUser->phase.SetPhase1();
1300 printfd(__FILE__, "Phase changed from 2 to 1. Reason: failed to authorize user\n");
1304 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), connAck->rnd);
1307 //-----------------------------------------------------------------------------
1308 int AUTH_IA::Process_ALIVE_ACK_6(ALIVE_ACK_6 * aliveAck, IA_USER * iaUser, uint32_t)
1311 SwapBytes(aliveAck->len);
1312 SwapBytes(aliveAck->rnd);
1314 printfd(__FILE__, "ALIVE_ACK_6\n");
1315 if ((iaUser->phase.GetPhase() == 3) && (aliveAck->rnd == iaUser->rnd + 1))
1317 iaUser->phase.UpdateTime();
1319 iaUser->aliveSent = false;
1324 //-----------------------------------------------------------------------------
1325 int AUTH_IA::Process_ALIVE_ACK_7(ALIVE_ACK_7 * aliveAck, IA_USER * iaUser, uint32_t sip)
1327 return Process_ALIVE_ACK_6(aliveAck, iaUser, sip);
1329 //-----------------------------------------------------------------------------
1330 int AUTH_IA::Process_ALIVE_ACK_8(ALIVE_ACK_8 * aliveAck, IA_USER * iaUser, uint32_t)
1333 SwapBytes(aliveAck->len);
1334 SwapBytes(aliveAck->rnd);
1336 printfd(__FILE__, "ALIVE_ACK_8\n");
1337 if ((iaUser->phase.GetPhase() == 3) && (aliveAck->rnd == iaUser->rnd + 1))
1339 iaUser->phase.UpdateTime();
1341 iaUser->aliveSent = false;
1346 //-----------------------------------------------------------------------------
1347 int AUTH_IA::Process_DISCONN_SYN_6(DISCONN_SYN_6 *, IA_USER * iaUser, uint32_t)
1349 printfd(__FILE__, "DISCONN_SYN_6\n");
1350 if (iaUser->phase.GetPhase() != 3)
1352 printfd(__FILE__, "Invalid phase. Expected 3, actual %d\n", iaUser->phase.GetPhase());
1353 errorStr = "Incorrect request DISCONN_SYN";
1357 iaUser->phase.SetPhase4();
1358 printfd(__FILE__, "Phase changed from 3 to 4. Reason: DISCONN_SYN_6\n");
1362 //-----------------------------------------------------------------------------
1363 int AUTH_IA::Process_DISCONN_SYN_7(DISCONN_SYN_7 * disconnSyn, IA_USER * iaUser, uint32_t sip)
1365 return Process_DISCONN_SYN_6(disconnSyn, iaUser, sip);
1367 //-----------------------------------------------------------------------------
1368 int AUTH_IA::Process_DISCONN_SYN_8(DISCONN_SYN_8 *, IA_USER * iaUser, uint32_t)
1370 if (iaUser->phase.GetPhase() != 3)
1372 errorStr = "Incorrect request DISCONN_SYN";
1373 printfd(__FILE__, "Invalid phase. Expected 3, actual %d\n", iaUser->phase.GetPhase());
1377 iaUser->phase.SetPhase4();
1378 printfd(__FILE__, "Phase changed from 3 to 4. Reason: DISCONN_SYN_6\n");
1382 //-----------------------------------------------------------------------------
1383 int AUTH_IA::Process_DISCONN_ACK_6(DISCONN_ACK_6 * disconnAck,
1386 map<uint32_t, IA_USER>::iterator)
1389 SwapBytes(disconnAck->len);
1390 SwapBytes(disconnAck->rnd);
1392 printfd(__FILE__, "DISCONN_ACK_6\n");
1393 if (!((iaUser->phase.GetPhase() == 4) && (disconnAck->rnd == iaUser->rnd + 1)))
1395 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), disconnAck->rnd);
1401 //-----------------------------------------------------------------------------
1402 int AUTH_IA::Process_DISCONN_ACK_7(DISCONN_ACK_7 * disconnAck, IA_USER * iaUser, uint32_t sip, map<uint32_t, IA_USER>::iterator it)
1404 return Process_DISCONN_ACK_6(disconnAck, iaUser, sip, it);
1406 //-----------------------------------------------------------------------------
1407 int AUTH_IA::Process_DISCONN_ACK_8(DISCONN_ACK_8 * disconnAck, IA_USER * iaUser, uint32_t, map<uint32_t, IA_USER>::iterator)
1410 SwapBytes(disconnAck->len);
1411 SwapBytes(disconnAck->rnd);
1413 printfd(__FILE__, "DISCONN_ACK_8\n");
1414 if (!((iaUser->phase.GetPhase() == 4) && (disconnAck->rnd == iaUser->rnd + 1)))
1416 printfd(__FILE__, "Invalid phase or control number. Phase: %d. Control number: %d\n", iaUser->phase.GetPhase(), disconnAck->rnd);
1422 //-----------------------------------------------------------------------------
1423 int AUTH_IA::Send_CONN_SYN_ACK_6(IA_USER * iaUser, uint32_t sip)
1425 //+++ Fill static data in connSynAck +++
1426 // TODO Move this code. It must be executed only once
1427 connSynAck6.len = Min8(sizeof(CONN_SYN_ACK_6));
1428 strcpy((char*)connSynAck6.type, "CONN_SYN_ACK");
1429 for (int j = 0; j < DIR_NUM; j++)
1431 strncpy((char*)connSynAck6.dirName[j],
1432 stgSettings->GetDirName(j).c_str(),
1435 connSynAck6.dirName[j][sizeof(string16) - 1] = 0;
1437 //--- Fill static data in connSynAck ---
1439 iaUser->rnd = random();
1440 connSynAck6.rnd = iaUser->rnd;
1442 connSynAck6.userTimeOut = iaSettings.GetUserTimeout();
1443 connSynAck6.aliveDelay = iaSettings.GetUserDelay();
1446 SwapBytes(connSynAck6.len);
1447 SwapBytes(connSynAck6.rnd);
1448 SwapBytes(connSynAck6.userTimeOut);
1449 SwapBytes(connSynAck6.aliveDelay);
1452 Encrypt(&iaUser->ctx, (char*)&connSynAck6, (char*)&connSynAck6, Min8(sizeof(CONN_SYN_ACK_6))/8);
1453 return Send(sip, iaSettings.GetUserPort(), (char*)&connSynAck6, Min8(sizeof(CONN_SYN_ACK_6)));;
1455 //-----------------------------------------------------------------------------
1456 int AUTH_IA::Send_CONN_SYN_ACK_7(IA_USER * iaUser, uint32_t sip)
1458 return Send_CONN_SYN_ACK_6(iaUser, sip);
1460 //-----------------------------------------------------------------------------
1461 int AUTH_IA::Send_CONN_SYN_ACK_8(IA_USER * iaUser, uint32_t sip)
1463 strcpy((char*)connSynAck8.hdr.magic, IA_ID);
1464 connSynAck8.hdr.protoVer[0] = 0;
1465 connSynAck8.hdr.protoVer[1] = 8;
1467 //+++ Fill static data in connSynAck +++
1468 // TODO Move this code. It must be executed only once
1469 connSynAck8.len = Min8(sizeof(CONN_SYN_ACK_8));
1470 strcpy((char*)connSynAck8.type, "CONN_SYN_ACK");
1471 for (int j = 0; j < DIR_NUM; j++)
1473 strncpy((char*)connSynAck8.dirName[j],
1474 stgSettings->GetDirName(j).c_str(),
1477 connSynAck8.dirName[j][sizeof(string16) - 1] = 0;
1479 //--- Fill static data in connSynAck ---
1481 iaUser->rnd = random();
1482 connSynAck8.rnd = iaUser->rnd;
1484 connSynAck8.userTimeOut = iaSettings.GetUserTimeout();
1485 connSynAck8.aliveDelay = iaSettings.GetUserDelay();
1488 SwapBytes(connSynAck8.len);
1489 SwapBytes(connSynAck8.rnd);
1490 SwapBytes(connSynAck8.userTimeOut);
1491 SwapBytes(connSynAck8.aliveDelay);
1494 Encrypt(&iaUser->ctx, (char*)&connSynAck8, (char*)&connSynAck8, Min8(sizeof(CONN_SYN_ACK_8))/8);
1495 return Send(sip, iaUser->port, (char*)&connSynAck8, Min8(sizeof(CONN_SYN_ACK_8)));
1496 //return Send(sip, iaUser->port, (char*)&connSynAck8, 384);
1498 //-----------------------------------------------------------------------------
1499 int AUTH_IA::Send_ALIVE_SYN_6(IA_USER * iaUser, uint32_t sip)
1501 aliveSyn6.len = Min8(sizeof(ALIVE_SYN_6));
1502 aliveSyn6.rnd = iaUser->rnd = random();
1504 strcpy((char*)aliveSyn6.type, "ALIVE_SYN");
1506 for (int i = 0; i < DIR_NUM; i++)
1508 aliveSyn6.md[i] = iaUser->user->GetProperty().down.Get()[i];
1509 aliveSyn6.mu[i] = iaUser->user->GetProperty().up.Get()[i];
1511 aliveSyn6.sd[i] = iaUser->user->GetSessionDownload()[i];
1512 aliveSyn6.su[i] = iaUser->user->GetSessionUpload()[i];
1516 int dn = iaSettings.GetFreeMbShowType();
1517 const TARIFF * tf = iaUser->user->GetTariff();
1521 double p = tf->GetPriceWithTraffType(aliveSyn6.mu[dn],
1528 snprintf((char*)aliveSyn6.freeMb, IA_FREEMB_LEN, "---");
1532 double fmb = iaUser->user->GetProperty().freeMb;
1533 fmb = fmb < 0 ? 0 : fmb;
1534 snprintf((char*)aliveSyn6.freeMb, IA_FREEMB_LEN, "%.3f", fmb / p);
1539 if (freeMbNone == iaSettings.GetFreeMbShowType())
1541 aliveSyn6.freeMb[0] = 0;
1545 double fmb = iaUser->user->GetProperty().freeMb;
1546 fmb = fmb < 0 ? 0 : fmb;
1547 snprintf((char*)aliveSyn6.freeMb, IA_FREEMB_LEN, "C%.3f", fmb);
1552 if (iaUser->aliveSent)
1554 printfd(__FILE__, "========= ALIVE_ACK_6(7) TIMEOUT !!! %s =========\n", iaUser->login.c_str());
1556 iaUser->aliveSent = true;
1559 aliveSyn6.cash =(int64_t) (iaUser->user->GetProperty().cash.Get() * 1000.0);
1560 if (!stgSettings->GetShowFeeInCash())
1561 aliveSyn6.cash -= (int64_t)(tf->GetFee() * 1000.0);
1564 SwapBytes(aliveSyn6.len);
1565 SwapBytes(aliveSyn6.rnd);
1566 SwapBytes(aliveSyn6.cash);
1567 for (int i = 0; i < DIR_NUM; ++i)
1569 SwapBytes(aliveSyn6.mu[i]);
1570 SwapBytes(aliveSyn6.md[i]);
1571 SwapBytes(aliveSyn6.su[i]);
1572 SwapBytes(aliveSyn6.sd[i]);
1576 Encrypt(&(iaUser->ctx), (char*)&aliveSyn6, (char*)&aliveSyn6, Min8(sizeof(aliveSyn6))/8);
1577 return Send(sip, iaSettings.GetUserPort(), (char*)&aliveSyn6, Min8(sizeof(aliveSyn6)));
1579 //-----------------------------------------------------------------------------
1580 int AUTH_IA::Send_ALIVE_SYN_7(IA_USER * iaUser, uint32_t sip)
1582 return Send_ALIVE_SYN_6(iaUser, sip);
1584 //-----------------------------------------------------------------------------
1585 int AUTH_IA::Send_ALIVE_SYN_8(IA_USER * iaUser, uint32_t sip)
1587 strcpy((char*)aliveSyn8.hdr.magic, IA_ID);
1588 aliveSyn8.hdr.protoVer[0] = 0;
1589 aliveSyn8.hdr.protoVer[1] = 8;
1591 aliveSyn8.len = Min8(sizeof(ALIVE_SYN_8));
1592 aliveSyn8.rnd = iaUser->rnd = random();
1594 strcpy((char*)aliveSyn8.type, "ALIVE_SYN");
1596 for (int i = 0; i < DIR_NUM; i++)
1598 aliveSyn8.md[i] = iaUser->user->GetProperty().down.Get()[i];
1599 aliveSyn8.mu[i] = iaUser->user->GetProperty().up.Get()[i];
1601 aliveSyn8.sd[i] = iaUser->user->GetSessionDownload()[i];
1602 aliveSyn8.su[i] = iaUser->user->GetSessionUpload()[i];
1606 int dn = iaSettings.GetFreeMbShowType();
1610 const TARIFF * tf = iaUser->user->GetTariff();
1611 double p = tf->GetPriceWithTraffType(aliveSyn8.mu[dn],
1618 snprintf((char*)aliveSyn8.freeMb, IA_FREEMB_LEN, "---");
1622 double fmb = iaUser->user->GetProperty().freeMb;
1623 fmb = fmb < 0 ? 0 : fmb;
1624 snprintf((char*)aliveSyn8.freeMb, IA_FREEMB_LEN, "%.3f", fmb / p);
1629 if (freeMbNone == iaSettings.GetFreeMbShowType())
1631 aliveSyn8.freeMb[0] = 0;
1635 double fmb = iaUser->user->GetProperty().freeMb;
1636 fmb = fmb < 0 ? 0 : fmb;
1637 snprintf((char*)aliveSyn8.freeMb, IA_FREEMB_LEN, "C%.3f", fmb);
1642 if (iaUser->aliveSent)
1644 printfd(__FILE__, "========= ALIVE_ACK_8 TIMEOUT !!! =========\n");
1646 iaUser->aliveSent = true;
1649 const TARIFF * tf = iaUser->user->GetTariff();
1651 aliveSyn8.cash =(int64_t) (iaUser->user->GetProperty().cash.Get() * 1000.0);
1652 if (!stgSettings->GetShowFeeInCash())
1653 aliveSyn8.cash -= (int64_t)(tf->GetFee() * 1000.0);
1656 SwapBytes(aliveSyn8.len);
1657 SwapBytes(aliveSyn8.rnd);
1658 SwapBytes(aliveSyn8.cash);
1659 SwapBytes(aliveSyn8.status);
1660 for (int i = 0; i < DIR_NUM; ++i)
1662 SwapBytes(aliveSyn8.mu[i]);
1663 SwapBytes(aliveSyn8.md[i]);
1664 SwapBytes(aliveSyn8.su[i]);
1665 SwapBytes(aliveSyn8.sd[i]);
1669 Encrypt(&(iaUser->ctx), (char*)&aliveSyn8, (char*)&aliveSyn8, Min8(sizeof(aliveSyn8))/8);
1670 return Send(sip, iaUser->port, (char*)&aliveSyn8, Min8(sizeof(aliveSyn8)));
1672 //-----------------------------------------------------------------------------
1673 int AUTH_IA::Send_DISCONN_SYN_ACK_6(IA_USER * iaUser, uint32_t sip)
1675 disconnSynAck6.len = Min8(sizeof(DISCONN_SYN_ACK_6));
1676 strcpy((char*)disconnSynAck6.type, "DISCONN_SYN_ACK");
1677 disconnSynAck6.rnd = iaUser->rnd = random();
1680 SwapBytes(disconnSynAck6.len);
1681 SwapBytes(disconnSynAck6.rnd);
1684 Encrypt(&iaUser->ctx, (char*)&disconnSynAck6, (char*)&disconnSynAck6, Min8(sizeof(disconnSynAck6))/8);
1685 return Send(sip, iaSettings.GetUserPort(), (char*)&disconnSynAck6, Min8(sizeof(disconnSynAck6)));
1687 //-----------------------------------------------------------------------------
1688 int AUTH_IA::Send_DISCONN_SYN_ACK_7(IA_USER * iaUser, uint32_t sip)
1690 return Send_DISCONN_SYN_ACK_6(iaUser, sip);
1692 //-----------------------------------------------------------------------------
1693 int AUTH_IA::Send_DISCONN_SYN_ACK_8(IA_USER * iaUser, uint32_t sip)
1695 strcpy((char*)disconnSynAck8.hdr.magic, IA_ID);
1696 disconnSynAck8.hdr.protoVer[0] = 0;
1697 disconnSynAck8.hdr.protoVer[1] = 8;
1699 disconnSynAck8.len = Min8(sizeof(DISCONN_SYN_ACK_8));
1700 strcpy((char*)disconnSynAck8.type, "DISCONN_SYN_ACK");
1701 disconnSynAck8.rnd = iaUser->rnd = random();
1704 SwapBytes(disconnSynAck8.len);
1705 SwapBytes(disconnSynAck8.rnd);
1708 Encrypt(&iaUser->ctx, (char*)&disconnSynAck8, (char*)&disconnSynAck8, Min8(sizeof(disconnSynAck8))/8);
1709 return Send(sip, iaUser->port, (char*)&disconnSynAck8, Min8(sizeof(disconnSynAck8)));
1711 //-----------------------------------------------------------------------------
1712 int AUTH_IA::Send_FIN_6(IA_USER * iaUser, uint32_t sip, map<uint32_t, IA_USER>::iterator it)
1714 fin6.len = Min8(sizeof(FIN_6));
1715 strcpy((char*)fin6.type, "FIN");
1716 strcpy((char*)fin6.ok, "OK");
1719 SwapBytes(fin6.len);
1722 Encrypt(&iaUser->ctx, (char*)&fin6, (char*)&fin6, Min8(sizeof(fin6))/8);
1724 users->Unauthorize(iaUser->login, this);
1726 int ret = Send(sip, iaSettings.GetUserPort(), (char*)&fin6, Min8(sizeof(fin6)));
1730 //-----------------------------------------------------------------------------
1731 int AUTH_IA::Send_FIN_7(IA_USER * iaUser, uint32_t sip, map<uint32_t, IA_USER>::iterator it)
1733 return Send_FIN_6(iaUser, sip, it);
1735 //-----------------------------------------------------------------------------
1736 int AUTH_IA::Send_FIN_8(IA_USER * iaUser, uint32_t sip, map<uint32_t, IA_USER>::iterator it)
1738 strcpy((char*)fin8.hdr.magic, IA_ID);
1739 fin8.hdr.protoVer[0] = 0;
1740 fin8.hdr.protoVer[1] = 8;
1742 fin8.len = Min8(sizeof(FIN_8));
1743 strcpy((char*)fin8.type, "FIN");
1744 strcpy((char*)fin8.ok, "OK");
1747 SwapBytes(fin8.len);
1750 Encrypt(&iaUser->ctx, (char*)&fin8, (char*)&fin8, Min8(sizeof(fin8))/8);
1752 users->Unauthorize(iaUser->login, this);
1754 int ret = Send(sip, iaUser->port, (char*)&fin8, Min8(sizeof(fin8)));
1758 //-----------------------------------------------------------------------------
1760 void InitEncrypt(BLOWFISH_CTX * ctx, const string & password)
1762 unsigned char keyL[PASSWD_LEN]; // ðÁÒÏÌØ ÄÌÑ ÛÉÆÒÏ×ËÉ
1763 memset(keyL, 0, PASSWD_LEN);
1764 strncpy((char *)keyL, password.c_str(), PASSWD_LEN);
1765 Blowfish_Init(ctx, keyL, PASSWD_LEN);
1767 //-----------------------------------------------------------------------------
1769 void Decrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8)
1771 // len8 - ÄÌÉÎÁ × 8-ÍÉ ÂÁÊÔÏ×ÙÈ ÂÌÏËÁÈ
1773 for (int i = 0; i < len8; i++)
1774 DecodeString(dst + i * 8, src + i * 8, ctx);
1776 //-----------------------------------------------------------------------------
1778 void Encrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8)
1780 // len8 - ÄÌÉÎÁ × 8-ÍÉ ÂÁÊÔÏ×ÙÈ ÂÌÏËÁÈ
1782 for (int i = 0; i < len8; i++)
1783 EncodeString(dst + i * 8, src + i * 8, ctx);