302 lines
7.0 KiB
C++
302 lines
7.0 KiB
C++
|
|
#include <iostream>
|
|
#include <unistd.h>
|
|
#include "testconnections.h"
|
|
|
|
#include <stdio.h>
|
|
#include <sys/socket.h>
|
|
#include <arpa/inet.h>
|
|
#include <stdlib.h>
|
|
#include <netdb.h>
|
|
#include <string.h>
|
|
|
|
#include <openssl/sha.h>
|
|
#include "maxinfo_func.h"
|
|
#include <sys/epoll.h>
|
|
#include <jansson.h>
|
|
#include <fcntl.h>
|
|
|
|
using namespace std;
|
|
|
|
#define PORT 8080
|
|
#define USERAGENT "HTMLGET 1.1"
|
|
|
|
int create_tcp_socket()
|
|
{
|
|
int sock;
|
|
if ((sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0)
|
|
{
|
|
perror("Can't create TCP socket");
|
|
return 0;
|
|
}
|
|
return sock;
|
|
}
|
|
|
|
char *get_ip(char *host)
|
|
{
|
|
struct hostent *hent;
|
|
int iplen = 16; //XXX.XXX.XXX.XXX
|
|
char *ip = (char *)malloc(iplen + 1);
|
|
memset(ip, 0, iplen + 1);
|
|
if ((hent = gethostbyname(host)) == NULL)
|
|
{
|
|
herror("Can't get IP");
|
|
return NULL;
|
|
}
|
|
if (inet_ntop(AF_INET, (void *)hent->h_addr_list[0], ip, iplen) == NULL)
|
|
{
|
|
perror("Can't resolve host");
|
|
return NULL;
|
|
}
|
|
return ip;
|
|
}
|
|
|
|
char *build_get_query(char *host, const char *page)
|
|
{
|
|
char *query;
|
|
const char *getpage = page;
|
|
char *tpl = (char *) "GET /%s HTTP/1.1\r\nHost: %s\r\nUser-Agent: %s\r\n\r\n";
|
|
if (getpage[0] == '/')
|
|
{
|
|
getpage = getpage + 1;
|
|
fprintf(stderr, "Removing leading \"/\", converting %s to %s\n", page, getpage);
|
|
}
|
|
// -5 is to consider the %s %s %s in tpl and the ending \0
|
|
query = (char *)malloc(strlen(host) + strlen(getpage) + strlen(USERAGENT) + strlen(tpl) - 5);
|
|
sprintf(query, tpl, getpage, host, USERAGENT);
|
|
return query;
|
|
}
|
|
|
|
char * get_maxinfo(const char * page, TestConnections* Test)
|
|
{
|
|
struct sockaddr_in *remote;
|
|
int sock;
|
|
int tmpres;
|
|
char *ip;
|
|
char *get;
|
|
char buf[BUFSIZ + 1];
|
|
|
|
sock = create_tcp_socket();
|
|
ip = get_ip(Test->maxscales->IP[0]);
|
|
if (ip == NULL)
|
|
{
|
|
Test->add_result(1, "Can't get IP\n");
|
|
return NULL;
|
|
}
|
|
remote = (struct sockaddr_in *)malloc(sizeof(struct sockaddr_in *));
|
|
remote->sin_family = AF_INET;
|
|
tmpres = inet_pton(AF_INET, ip, (void *)(&(remote->sin_addr.s_addr)));
|
|
if ( tmpres < 0)
|
|
{
|
|
Test->add_result(1, "Can't set remote->sin_addr.s_addr\n");
|
|
return NULL;
|
|
}
|
|
else if (tmpres == 0)
|
|
{
|
|
Test->add_result(1, "%s is not a valid IP address\n", ip);
|
|
return NULL;
|
|
}
|
|
remote->sin_port = htons(PORT);
|
|
|
|
if (connect(sock, (struct sockaddr *)remote, sizeof(struct sockaddr)) < 0)
|
|
{
|
|
Test->add_result(1, "Could not connect\n");
|
|
return NULL;
|
|
}
|
|
get = build_get_query(Test->maxscales->IP[0], page);
|
|
//Test->tprintf("Query is:\n<<START>>\n%s<<END>>\n", get);
|
|
|
|
//Send the query to the server
|
|
int sent = 0;
|
|
while (sent < strlen(get))
|
|
{
|
|
tmpres = send(sock, get + sent, strlen(get) - sent, 0);
|
|
if (tmpres == -1)
|
|
{
|
|
Test->add_result(1, "Can't send query\n");
|
|
return NULL;
|
|
}
|
|
sent += tmpres;
|
|
}
|
|
//now it is time to receive the page
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
char* result = (char*)calloc(BUFSIZ, sizeof(char));
|
|
size_t rsize = sizeof(buf);
|
|
while ((tmpres = recv(sock, buf, BUFSIZ, MSG_WAITALL)) > 0)
|
|
{
|
|
result = (char*)realloc(result, tmpres + rsize);
|
|
rsize += tmpres;
|
|
strcat(result, buf);
|
|
memset(buf, 0, tmpres);
|
|
}
|
|
if (tmpres < 0)
|
|
{
|
|
Test->add_result(1, "Error receiving data\n");
|
|
return NULL;
|
|
}
|
|
|
|
free(get);
|
|
free(remote);
|
|
free(ip);
|
|
close(sock);
|
|
|
|
char * content = strstr(result, "[");
|
|
if (content == NULL)
|
|
{
|
|
Test->add_result(1, "Content not found\n");
|
|
free(result);
|
|
return NULL;
|
|
}
|
|
|
|
char * ret_content = (char*) calloc(strlen(content) + 1, sizeof(char));
|
|
mempcpy(ret_content, content, strlen(content));
|
|
free(result);
|
|
|
|
return ret_content;
|
|
//return(result);
|
|
}
|
|
|
|
char * read_sc(int sock)
|
|
{
|
|
char buf[BUFSIZ + 1];
|
|
int tmpres;
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
char *result = (char*)calloc(BUFSIZ, sizeof(char));
|
|
size_t rsize = sizeof(buf);
|
|
while ((tmpres = recv(sock, buf, BUFSIZ, 0)) > 0)
|
|
{
|
|
result = (char*)realloc(result, tmpres + rsize);
|
|
rsize += tmpres;
|
|
//printf("%s", buf);
|
|
strcat(result, buf);
|
|
memset(buf, 0, tmpres);
|
|
}
|
|
return result;
|
|
}
|
|
int send_so(int sock, char * data)
|
|
{
|
|
int tmpres;
|
|
int sent = 0;
|
|
while (sent < strlen(data))
|
|
{
|
|
tmpres = send(sock, data + sent, strlen(data) - sent, 0);
|
|
if (tmpres == -1)
|
|
{
|
|
return -1;
|
|
}
|
|
sent += tmpres;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static char * bin2hex(const unsigned char *old, const size_t oldlen)
|
|
{
|
|
char *result = (char*) malloc(oldlen * 2 + 1);
|
|
size_t i, j;
|
|
|
|
for (i = j = 0; i < oldlen; i++)
|
|
{
|
|
result[j++] = hexconvtab[old[i] >> 4];
|
|
result[j++] = hexconvtab[old[i] & 15];
|
|
}
|
|
result[j] = '\0';
|
|
return result;
|
|
}
|
|
|
|
char * cdc_auth_srt(char * user, char * password)
|
|
{
|
|
unsigned char sha1pass[20];
|
|
char * str;
|
|
str = (char*) malloc(42 + strlen(user) * 2);
|
|
|
|
unsigned char *password_u;
|
|
unsigned char *user_u;
|
|
password_u = (unsigned char*) malloc(strlen(password));
|
|
user_u = (unsigned char*) malloc(strlen(user));
|
|
memcpy((void*)password_u, (void*)password, strlen(password));
|
|
memcpy((void*)user_u, (void*)user, strlen(user));
|
|
|
|
SHA1(password_u, strlen(password), sha1pass);
|
|
|
|
//char * sha1pass_hex = (char *) "454ac34c2999aacfebc6bf5fe9fa1db9b596f625";
|
|
|
|
char * sha1pass_hex = bin2hex(sha1pass, 20);
|
|
printf("password %s, len %lu, password sha1: %s\n", password, strlen(password), sha1pass_hex);
|
|
|
|
|
|
char * user_hex = bin2hex(user_u, strlen(user));
|
|
char * clmn_hex = bin2hex((unsigned char*)":", 1);
|
|
|
|
sprintf(str, "%s%s%s", user_hex, clmn_hex, sha1pass_hex);
|
|
|
|
free(clmn_hex);
|
|
free(user_hex);
|
|
free(sha1pass_hex);
|
|
free(user_u);
|
|
free(password_u);
|
|
|
|
printf("%s\n", str);
|
|
return str;
|
|
|
|
}
|
|
|
|
int setnonblocking(int sock)
|
|
{
|
|
int opts;
|
|
opts = fcntl(sock, F_GETFL);
|
|
if (opts < 0)
|
|
{
|
|
return -1;
|
|
}
|
|
opts = (opts | O_NONBLOCK);
|
|
if (fcntl(sock, F_SETFL, opts) < 0)
|
|
{
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
int get_x_fl_from_json(char * line, long long int * x1, long long int * fl)
|
|
{
|
|
json_t *root;
|
|
json_error_t error;
|
|
|
|
root = json_loads( line, 0, &error );
|
|
if ( !root )
|
|
{
|
|
fprintf( stderr, "error: on line %d: %s\n", error.line, error.text );
|
|
return 1;
|
|
}
|
|
|
|
json_t * x_json = json_object_get(root, "x1");
|
|
if (x_json == NULL)
|
|
{
|
|
return 1;
|
|
}
|
|
if ( !json_is_integer(x_json) )
|
|
{
|
|
printf("x1 is not int, type is %d\n", json_typeof(x_json));
|
|
return 1;
|
|
}
|
|
|
|
*x1 = json_integer_value(x_json);
|
|
json_t * fl_json = json_object_get(root, "fl");
|
|
if (fl_json == NULL)
|
|
{
|
|
return 1;
|
|
}
|
|
if ( !json_is_integer(fl_json) )
|
|
{
|
|
printf("fl is not int\n");
|
|
return 1;
|
|
}
|
|
|
|
*fl = json_integer_value(fl_json);
|
|
json_decref(x_json);
|
|
json_decref(fl_json);
|
|
json_decref(root);
|
|
}
|