#include "stg/servconf_types.h"
#include "stg/common.h"
#include "stg/blowfish.h"
+#include "stg/bfstream.h"
#include <algorithm> // std::min
-#include <cstdio>
#include <cerrno>
#include <cstring>
+#include <cassert>
#include <netdb.h>
#include <arpa/inet.h>
#include <sys/socket.h>
#include <netinet/in.h>
+const char STG_HEADER[] = "SG04";
+const char OK_HEADER[] = "OKHD";
+const char ERR_HEADER[] = "ERHD";
+const char OK_LOGIN[] = "OKLG";
+const char ERR_LOGIN[] = "ERLG";
+const char OK_LOGINS[] = "OKLS";
+const char ERR_LOGINS[] = "ERLS";
+
using namespace STG;
namespace
{
-const std::string::size_type MAX_XML_CHUNK_LENGTH = 2048;
+struct ReadState
+{
+ bool final;
+ NETTRANSACT::CALLBACK callback;
+ void * callbackData;
+ NETTRANSACT * nt;
+};
}
//---------------------------------------------------------------------------
-#define SEND_DATA_ERROR "Send data error!"
-#define RECV_DATA_ANSWER_ERROR "Recv data answer error!"
-#define UNKNOWN_ERROR "Unknown error!"
-#define CONNECT_FAILED "Connect failed!"
-#define INCORRECT_LOGIN "Incorrect login!"
-#define INCORRECT_HEADER "Incorrect header!"
-#define SEND_LOGIN_ERROR "Send login error!"
-#define RECV_LOGIN_ANSWER_ERROR "Recv login answer error!"
-#define CREATE_SOCKET_ERROR "Create socket failed!"
-#define WSASTARTUP_FAILED "WSAStartup failed!"
-#define SEND_HEADER_ERROR "Send header error!"
-#define RECV_HEADER_ANSWER_ERROR "Recv header answer error!"
+const char SEND_DATA_ERROR[] = "Error sending data.";
+const char RECV_DATA_ANSWER_ERROR[] = "Error receiving data answer.";
+const char UNKNOWN_ERROR[] = "Unknown error";
+const char CONNECT_FAILED[] = "Failed to connect.";
+const char BIND_FAILED[] = "Failed to bind.";
+const char INCORRECT_LOGIN[] = "Incorrect login.";
+const char INCORRECT_HEADER[] = "Incorrect header.";
+const char SEND_LOGIN_ERROR[] = "Error sending login.";
+const char RECV_LOGIN_ANSWER_ERROR[] = "Error receiving login answer.";
+const char CREATE_SOCKET_ERROR[] = "Failed to create socket.";
+const char SEND_HEADER_ERROR[] = "Error sending header.";
+const char RECV_HEADER_ANSWER_ERROR[] = "Error receiving header answer.";
//---------------------------------------------------------------------------
NETTRANSACT::NETTRANSACT(const std::string & s, uint16_t p,
const std::string & l, const std::string & pwd)
: server(s),
port(p),
+ localPort(0),
+ login(l),
+ password(pwd),
+ sock(-1)
+{
+}
+//---------------------------------------------------------------------------
+NETTRANSACT::NETTRANSACT(const std::string & s, uint16_t p,
+ const std::string & la, uint16_t lp,
+ const std::string & l, const std::string & pwd)
+ : server(s),
+ port(p),
+ localAddress(la),
+ localPort(lp),
login(l),
password(pwd),
- outerSocket(-1)
+ sock(-1)
+{
+}
+//---------------------------------------------------------------------------
+NETTRANSACT::~NETTRANSACT()
{
+Disconnect();
}
//---------------------------------------------------------------------------
int NETTRANSACT::Connect()
{
-outerSocket = socket(PF_INET, SOCK_STREAM, 0);
-if (outerSocket < 0)
+sock = socket(PF_INET, SOCK_STREAM, 0);
+if (sock < 0)
{
errorMsg = CREATE_SOCKET_ERROR;
return st_conn_fail;
}
+if (!localAddress.empty())
+ {
+ if (localPort == 0)
+ localPort = port;
+
+ unsigned long ip = inet_addr(localAddress.c_str());
+
+ if (ip == INADDR_NONE)
+ {
+ struct hostent * phe = gethostbyname(localAddress.c_str());
+ if (phe == NULL)
+ {
+ errorMsg = "Can not reslove '" + localAddress + "'";
+ return st_dns_err;
+ }
+
+ struct hostent he;
+ memcpy(&he, phe, sizeof(he));
+ ip = *((long *)he.h_addr_list[0]);
+ }
+
+ struct sockaddr_in localAddr;
+ memset(&localAddr, 0, sizeof(localAddr));
+ localAddr.sin_family = AF_INET;
+ localAddr.sin_port = htons(localPort);
+ localAddr.sin_addr.s_addr = ip;
+
+ if (bind(sock, (struct sockaddr *)&localAddr, sizeof(localAddr)) < 0)
+ {
+ errorMsg = BIND_FAILED;
+ return st_conn_fail;
+ }
+ }
+
struct sockaddr_in outerAddr;
memset(&outerAddr, 0, sizeof(outerAddr));
struct hostent * phe = gethostbyname(server.c_str());
if (phe == NULL)
{
- errorMsg = "DNS error.\nCan not reslove " + server;
+ errorMsg = "Can not reslove '" + server + "'";
return st_dns_err;
}
outerAddr.sin_port = htons(port);
outerAddr.sin_addr.s_addr = ip;
-if (connect(outerSocket, (struct sockaddr *)&outerAddr, sizeof(outerAddr)) < 0)
+if (connect(sock, (struct sockaddr *)&outerAddr, sizeof(outerAddr)) < 0)
{
errorMsg = CONNECT_FAILED;
- close(outerSocket);
return st_conn_fail;
}
//---------------------------------------------------------------------------
void NETTRANSACT::Disconnect()
{
-close(outerSocket);
+if (sock != -1)
+ {
+ shutdown(sock, SHUT_RDWR);
+ close(sock);
+ sock = -1;
+ }
}
//---------------------------------------------------------------------------
int NETTRANSACT::Transact(const std::string & request, CALLBACK callback, void * data)
{
int ret;
if ((ret = TxHeader()) != st_ok)
- {
- Disconnect();
return ret;
- }
if ((ret = RxHeaderAnswer()) != st_ok)
- {
- Disconnect();
return ret;
- }
if ((ret = TxLogin()) != st_ok)
- {
- Disconnect();
return ret;
- }
if ((ret = RxLoginAnswer()) != st_ok)
- {
- Disconnect();
return ret;
- }
if ((ret = TxLoginS()) != st_ok)
- {
- Disconnect();
return ret;
- }
if ((ret = RxLoginSAnswer()) != st_ok)
- {
- Disconnect();
return ret;
- }
if ((ret = TxData(request)) != st_ok)
- {
- Disconnect();
return ret;
- }
if ((ret = RxDataAnswer(callback, data)) != st_ok)
- {
- Disconnect();
return ret;
- }
return st_ok;
}
//---------------------------------------------------------------------------
int NETTRANSACT::TxHeader()
{
-if (send(outerSocket, STG_HEADER, strlen(STG_HEADER), 0) <= 0)
+if (!WriteAll(sock, STG_HEADER, strlen(STG_HEADER)))
{
errorMsg = SEND_HEADER_ERROR;
return st_send_fail;
{
char buffer[sizeof(STG_HEADER) + 1];
-if (recv(outerSocket, buffer, strlen(OK_HEADER), 0) <= 0)
+if (!ReadAll(sock, buffer, strlen(OK_HEADER)))
{
- printf("Receive header answer error: '%s'\n", strerror(errno));
errorMsg = RECV_HEADER_ANSWER_ERROR;
return st_recv_fail;
}
if (strncmp(OK_HEADER, buffer, strlen(OK_HEADER)) == 0)
- {
return st_ok;
+
+if (strncmp(ERR_HEADER, buffer, strlen(ERR_HEADER)) == 0)
+ {
+ errorMsg = INCORRECT_HEADER;
+ return st_header_err;
}
else
{
- if (strncmp(ERR_HEADER, buffer, strlen(ERR_HEADER)) == 0)
- {
- errorMsg = INCORRECT_HEADER;
- return st_header_err;
- }
- else
- {
- errorMsg = UNKNOWN_ERROR;
- return st_unknown_err;
- }
+ errorMsg = UNKNOWN_ERROR;
+ return st_unknown_err;
}
}
//---------------------------------------------------------------------------
int NETTRANSACT::TxLogin()
{
-char loginZ[ADM_LOGIN_LEN];
-memset(loginZ, 0, ADM_LOGIN_LEN);
+char loginZ[ADM_LOGIN_LEN + 1];
+memset(loginZ, 0, ADM_LOGIN_LEN + 1);
strncpy(loginZ, login.c_str(), ADM_LOGIN_LEN);
-if (send(outerSocket, loginZ, ADM_LOGIN_LEN, 0) <= 0)
+if (!WriteAll(sock, loginZ, ADM_LOGIN_LEN))
{
errorMsg = SEND_LOGIN_ERROR;
return st_send_fail;
{
char buffer[sizeof(OK_LOGIN) + 1];
-if (recv(outerSocket, buffer, strlen(OK_LOGIN), 0) <= 0)
+if (!ReadAll(sock, buffer, strlen(OK_LOGIN)))
{
- printf("Receive login answer error: '%s'\n", strerror(errno));
errorMsg = RECV_LOGIN_ANSWER_ERROR;
return st_recv_fail;
}
if (strncmp(OK_LOGIN, buffer, strlen(OK_LOGIN)) == 0)
- {
return st_ok;
+
+if (strncmp(ERR_LOGIN, buffer, strlen(ERR_LOGIN)) == 0)
+ {
+ errorMsg = INCORRECT_LOGIN;
+ return st_login_err;
}
else
{
- if (strncmp(ERR_LOGIN, buffer, strlen(ERR_LOGIN)) == 0)
- {
- errorMsg = INCORRECT_LOGIN;
- return st_login_err;
- }
- else
- {
- errorMsg = UNKNOWN_ERROR;
- return st_unknown_err;
- }
+ errorMsg = UNKNOWN_ERROR;
+ return st_unknown_err;
}
}
//---------------------------------------------------------------------------
int NETTRANSACT::TxLoginS()
{
-char loginZ[ADM_LOGIN_LEN];
-memset(loginZ, 0, ADM_LOGIN_LEN);
-strncpy(loginZ, login.c_str(), ADM_LOGIN_LEN);
+char loginZ[ADM_LOGIN_LEN + 1];
+memset(loginZ, 0, ADM_LOGIN_LEN + 1);
BLOWFISH_CTX ctx;
-EnDecodeInit(password.c_str(), PASSWD_LEN, &ctx);
-
-for (int j = 0; j < ADM_LOGIN_LEN / ENC_MSG_LEN; j++)
+InitContext(password.c_str(), PASSWD_LEN, &ctx);
+EncryptString(loginZ, login.c_str(), std::min<size_t>(login.length() + 1, ADM_LOGIN_LEN), &ctx);
+if (!WriteAll(sock, loginZ, ADM_LOGIN_LEN))
{
- char ct[ENC_MSG_LEN];
- EncodeString(ct, loginZ + j * ENC_MSG_LEN, &ctx);
- if (send(outerSocket, ct, ENC_MSG_LEN, 0) <= 0)
- {
- errorMsg = SEND_LOGIN_ERROR;
- return st_send_fail;
- }
+ errorMsg = SEND_LOGIN_ERROR;
+ return st_send_fail;
}
return st_ok;
{
char buffer[sizeof(OK_LOGINS) + 1];
-if (recv(outerSocket, buffer, strlen(OK_LOGINS), 0) <= 0)
+if (!ReadAll(sock, buffer, strlen(OK_LOGINS)))
{
- printf("Receive secret login answer error: '%s'\n", strerror(errno));
errorMsg = RECV_LOGIN_ANSWER_ERROR;
return st_recv_fail;
}
if (strncmp(OK_LOGINS, buffer, strlen(OK_LOGINS)) == 0)
- {
return st_ok;
+
+if (strncmp(ERR_LOGINS, buffer, strlen(ERR_LOGINS)) == 0)
+ {
+ errorMsg = INCORRECT_LOGIN;
+ return st_logins_err;
}
else
{
- if (strncmp(ERR_LOGINS, buffer, strlen(ERR_LOGINS)) == 0)
- {
- errorMsg = INCORRECT_LOGIN;
- return st_logins_err;
- }
- else
- {
- errorMsg = UNKNOWN_ERROR;
- return st_unknown_err;
- }
+ errorMsg = UNKNOWN_ERROR;
+ return st_unknown_err;
}
}
//---------------------------------------------------------------------------
int NETTRANSACT::TxData(const std::string & text)
{
-BLOWFISH_CTX ctx;
-EnDecodeInit(password.c_str(), PASSWD_LEN, &ctx);
-
-size_t pos = 0;
-while (pos < text.size())
+STG::ENCRYPT_STREAM stream(password, TxCrypto, this);
+stream.Put(text.c_str(), text.length() + 1, true);
+if (!stream.IsOk())
{
- char textZ[ENC_MSG_LEN];
- if (text.size() - pos < ENC_MSG_LEN)
- memset(textZ, 0, ENC_MSG_LEN);
- strncpy(textZ, text.c_str() + pos, std::min(ENC_MSG_LEN, (int)(text.size() - pos)));
- char ct[ENC_MSG_LEN];
- EncodeString(ct, textZ, &ctx);
- if (send(outerSocket, ct, ENC_MSG_LEN, 0) <= 0)
- {
- errorMsg = SEND_DATA_ERROR;
- return st_send_fail;
- }
- pos += ENC_MSG_LEN;
+ errorMsg = SEND_DATA_ERROR;
+ return st_send_fail;
}
return st_ok;
//---------------------------------------------------------------------------
int NETTRANSACT::RxDataAnswer(CALLBACK callback, void * data)
{
-BLOWFISH_CTX ctx;
-EnDecodeInit(password.c_str(), PASSWD_LEN, &ctx);
-
-std::string chunk;
-while (true)
+ReadState state = {false, callback, data, this};
+STG::DECRYPT_STREAM stream(password, RxCrypto, &state);
+while (!state.final)
{
- char bufferS[ENC_MSG_LEN];
- size_t toRead = ENC_MSG_LEN;
- while (toRead > 0)
+ char buffer[1024];
+ ssize_t res = read(sock, buffer, sizeof(buffer));
+ if (res < 0)
{
- int ret = recv(outerSocket, &bufferS[ENC_MSG_LEN - toRead], toRead, 0);
- if (ret <= 0)
- {
- printf("Receive data error: '%s'\n", strerror(errno));
- close(outerSocket);
- errorMsg = RECV_DATA_ANSWER_ERROR;
- return st_recv_fail;
- }
- toRead -= ret;
+ errorMsg = RECV_DATA_ANSWER_ERROR;
+ return st_recv_fail;
}
+ stream.Put(buffer, res, res == 0);
+ if (!stream.IsOk())
+ return st_xml_parse_error;
+ }
- char buffer[ENC_MSG_LEN];
- DecodeString(buffer, bufferS, &ctx);
-
- bool final = false;
- size_t pos = 0;
- for (; pos < ENC_MSG_LEN && buffer[pos] != 0; pos++) ;
- if (pos < ENC_MSG_LEN && buffer[pos] == 0)
- final = true;
-
- if (pos > 0)
- chunk.append(&buffer[0], &buffer[pos]);
+return st_ok;
+}
+//---------------------------------------------------------------------------
+bool NETTRANSACT::TxCrypto(const void * block, size_t size, void * data)
+{
+assert(data != NULL);
+NETTRANSACT & nt = *static_cast<NETTRANSACT *>(data);
+if (!WriteAll(nt.sock, block, size))
+ return false;
+return true;
+}
+//---------------------------------------------------------------------------
+bool NETTRANSACT::RxCrypto(const void * block, size_t size, void * data)
+{
+assert(data != NULL);
+ReadState & state = *static_cast<ReadState *>(data);
- if (chunk.length() > MAX_XML_CHUNK_LENGTH || final)
+const char * buffer = static_cast<const char *>(block);
+for (size_t pos = 0; pos < size; ++pos)
+ if (buffer[pos] == 0)
{
- if (callback)
- if (!callback(chunk, final, data))
- return st_xml_parse_error;
- chunk.clear();
+ state.final = true;
+ size = pos; // Adjust string size
}
- if (final)
- return st_ok;
- }
+if (state.callback)
+ if (!state.callback(std::string(buffer, size), state.final, state.callbackData))
+ return false;
+
+return true;
}