#include <unistd.h>
#include <csignal>
+#include <cerrno>
#include <ctime>
#include <cstring>
#include <sstream>
#include "stg_locker.h"
#include "common.h"
+void InitEncrypt(BLOWFISH_CTX * ctx, const std::string & password);
+void Decrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8);
+
//-----------------------------------------------------------------------------
LISTENER::LISTENER()
: WriteServLog(GetStgLogger()),
pthread_mutex_init(&mutex, NULL);
}
//-----------------------------------------------------------------------------
-void LISTENER::SetPassword(const string & p)
+void LISTENER::SetPassword(const std::string & p)
{
password = p;
printfd(__FILE__, "Encryption initiated with password \'%s\'\n", password.c_str());
std::stringstream params;
params << data.login << " "
<< inet_ntostring(data.ip) << " "
- << ntohl(data.id) << " "
+ << data.id << " "
<< (char *)packetTail.params;
data.params = params.str();
//-----------------------------------------------------------------------------
void LISTENER::ProcessPending()
{
-printfd(__FILE__, "Pending data size: %d\n", pending.size());
-std::list<PendingData>::iterator it(pending.begin());
-while (it != pending.end())
+std::list<PendingData> localPending;
+
+ {
+ STG_LOCKER lock(&mutex, __FILE__, __LINE__);
+ printfd(__FILE__, "Pending data size: %d\n", pending.size());
+ localPending.swap(pending);
+ }
+
+std::list<PendingData>::iterator it(localPending.begin());
+while (it != localPending.end())
{
std::vector<AliveData>::iterator uit(
std::lower_bound(
users.erase(uit);
}
}
-
- STG_LOCKER lock(&mutex, __FILE__, __LINE__);
- pending.erase(it++);
+ ++it;
}
}
//-----------------------------------------------------------------------------
return false;
}
//-----------------------------------------------------------------------------
-void LISTENER::InitEncrypt(BLOWFISH_CTX * ctx, const string & password)
-{
-unsigned char keyL[PASSWD_LEN];
-memset(keyL, 0, PASSWD_LEN);
-strncpy((char *)keyL, password.c_str(), PASSWD_LEN);
-Blowfish_Init(ctx, keyL, PASSWD_LEN);
-}
-//-----------------------------------------------------------------------------
-void LISTENER::Decrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8)
-{
-if (dst != src)
- memcpy(dst, src, len8 * 8);
-
-for (int i = 0; i < len8; i++)
- Blowfish_Decrypt(ctx, (uint32_t *)(dst + i * 8), (uint32_t *)(dst + i * 8 + 4));
-}
-//-----------------------------------------------------------------------------
bool LISTENER::CheckHeader(const RS_PACKET_HEADER & header) const
{
if (strncmp((char *)header.magic, RS_ID, RS_MAGIC_LEN))
return true;
}
//-----------------------------------------------------------------------------
+inline
+void InitEncrypt(BLOWFISH_CTX * ctx, const std::string & password)
+{
+unsigned char keyL[PASSWD_LEN];
+memset(keyL, 0, PASSWD_LEN);
+strncpy((char *)keyL, password.c_str(), PASSWD_LEN);
+Blowfish_Init(ctx, keyL, PASSWD_LEN);
+}
+//-----------------------------------------------------------------------------
+inline
+void Decrypt(BLOWFISH_CTX * ctx, char * dst, const char * src, int len8)
+{
+if (dst != src)
+ memcpy(dst, src, len8 * 8);
+
+for (int i = 0; i < len8; i++)
+ Blowfish_Decrypt(ctx, (uint32_t *)(dst + i * 8), (uint32_t *)(dst + i * 8 + 4));
+}
+//-----------------------------------------------------------------------------