This repository has been archived on 2024-04-08. You can view files and clone it, but cannot push or open issues or pull requests.
deb-mbse/mbcico/binkp.c

1476 lines
35 KiB
C
Raw Normal View History

2001-08-17 05:46:24 +00:00
/*****************************************************************************
*
2001-12-02 14:57:46 +00:00
* $Id$
2003-05-12 18:31:51 +00:00
* Purpose .................: Fidonet binkp protocol
2001-08-17 05:46:24 +00:00
* Binkp protocol copyright : Dima Maloff.
*
*****************************************************************************
* Copyright (C) 1997-2003
2001-08-17 05:46:24 +00:00
*
* Michiel Broek FIDO: 2:280/2802
* Beekmansbos 10
* 1971 BV IJmuiden
* the Netherlands
*
* This file is part of MBSE BBS.
*
* This BBS is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2, or (at your option) any
* later version.
*
* MBSE BBS is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with MBSE BBS; see the file COPYING. If not, write to the Free
* Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
*****************************************************************************/
2002-06-30 12:48:44 +00:00
#include "../config.h"
2001-08-17 05:46:24 +00:00
#include "../lib/libs.h"
2002-06-30 12:48:44 +00:00
#include "../lib/memwatch.h"
2001-08-17 05:46:24 +00:00
#include "../lib/structs.h"
2002-01-07 19:16:03 +00:00
#include "../lib/users.h"
2001-08-17 05:46:24 +00:00
#include "../lib/records.h"
#include "../lib/common.h"
#include "../lib/nodelist.h"
2001-08-17 05:46:24 +00:00
#include "../lib/dbnode.h"
#include "../lib/clcomm.h"
2002-10-20 20:58:55 +00:00
#include "../lib/mberrors.h"
2001-08-17 05:46:24 +00:00
#include "ttyio.h"
#include "session.h"
#include "statetbl.h"
#include "config.h"
#include "emsi.h"
#include "openfile.h"
#include "respfreq.h"
#include "filelist.h"
#include "opentcp.h"
#include "rdoptions.h"
#include "lutil.h"
#include "binkp.h"
#include "config.h"
2003-07-06 20:37:58 +00:00
#include "md5b.h"
2001-08-17 05:46:24 +00:00
/*
* Safe characters for binkp filenames, the rest will be escaped.
*/
2003-05-10 21:52:52 +00:00
#define BNKCHARS "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789@&=+%$-_.!()#|"
2001-08-17 05:46:24 +00:00
static char rbuf[2048];
2003-05-12 18:31:51 +00:00
/*
* Local prototypes
*/
char *unix2binkp(char *);
char *binkp2unix(char *);
int binkp_expired(void);
2003-07-06 20:37:58 +00:00
void b_banner(void);
2003-05-12 18:31:51 +00:00
void b_nul(char *);
void fill_binkp_list(binkp_list **, file_list *, off_t);
void debug_binkp_list(binkp_list **);
2001-08-17 05:46:24 +00:00
void binkp_send_data(char *, int);
void binkp_send_control(int id, ...);
int binkp_recv_frame(char *, int *, int *);
void binkp_settimer(int);
int resync(off_t);
static int orgbinkp(void);
static int ansbinkp(void);
2002-07-06 17:37:55 +00:00
static int binkp_batch(file_list *, int);
2001-08-17 05:46:24 +00:00
2003-05-12 18:31:51 +00:00
2001-08-17 05:46:24 +00:00
extern char *ttystat[];
extern int Loaded;
extern pid_t mypid;
2003-07-06 20:37:58 +00:00
extern struct sockaddr_in peeraddr;
2001-08-17 05:46:24 +00:00
extern unsigned long sentbytes;
extern unsigned long rcvdbytes;
typedef enum {RxWaitFile, RxAcceptFile, RxReceData, RxWriteData, RxEndOfBatch, RxDone} RxType;
typedef enum {TxGetNextFile, TxTryRead, TxReadSend, TxWaitLastAck, TxDone} TxType;
typedef enum {InitTransfer, Switch, Receive, Transmit} TransferType;
typedef enum {Ok, Failure, Continue} TrType;
static int RxState;
static int TxState;
static int TfState;
static time_t Timer;
static int NRflag = FALSE;
static int MBflag = FALSE;
static int NDflag = FALSE;
static int CRYPTflag = FALSE;
static int CRAMflag = FALSE;
2002-06-16 08:58:53 +00:00
static int CRCflag = FALSE;
2001-08-17 05:46:24 +00:00
unsigned long nethold, mailhold;
int transferred = FALSE;
2002-06-16 16:44:38 +00:00
int batchnr = 0, crc_errors = 0;
2003-07-06 20:37:58 +00:00
unsigned char *MD_challenge = NULL; /* Received CRAM challenge data */
int ext_rand = 0;
2001-08-17 05:46:24 +00:00
int binkp(int role)
{
2002-10-20 20:58:55 +00:00
int rc = MBERR_OK;
fa_list *eff_remote;
file_list *tosend = NULL, *request = NULL, *respond = NULL, *tmpfl;
char *nonhold_mail;
if (role == 1) {
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: start outbound session");
2002-10-20 20:58:55 +00:00
if (orgbinkp()) {
2002-10-21 18:29:29 +00:00
rc = MBERR_SESSION_ERROR;
2001-08-17 05:46:24 +00:00
}
2002-10-20 20:58:55 +00:00
} else {
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: start inbound session");
2002-10-20 20:58:55 +00:00
if (ansbinkp()) {
2002-10-21 18:29:29 +00:00
rc = MBERR_SESSION_ERROR;
2001-08-17 05:46:24 +00:00
}
2002-10-20 20:58:55 +00:00
}
if (rc) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: session failed");
2002-10-20 20:58:55 +00:00
return rc;
}
2001-08-17 05:46:24 +00:00
2002-10-20 20:58:55 +00:00
nonhold_mail = (char *)ALL_MAIL;
eff_remote = remote;
/*
* If remote doesn't have the 8.3 flag set, allow long filenames.
*/
if (!nodes.FNC)
remote_flags &= ~SESSION_FNC;
2002-10-20 20:58:55 +00:00
tosend = create_filelist(eff_remote, nonhold_mail, 0);
request = create_freqlist(remote);
2001-08-17 05:46:24 +00:00
2002-10-20 20:58:55 +00:00
if (request != NULL) {
Syslog('b', "Inserting request list");
tmpfl = tosend;
tosend = request;
for (; request->next; request = request->next);
request->next = tmpfl;
2001-08-17 05:46:24 +00:00
2002-10-20 20:58:55 +00:00
request = NULL;
}
2001-08-17 05:46:24 +00:00
2002-10-20 20:58:55 +00:00
rc = binkp_batch(tosend, role);
tidy_filelist(tosend, (rc == 0));
tosend = NULL;
2001-08-17 05:46:24 +00:00
2002-10-20 20:58:55 +00:00
if ((rc == 0) && transferred && MBflag) {
/*
* Running Multiple Batch, only if last batch actually
* did transfer some data.
*/
respond = respond_wazoo();
/*
* Just create the tosend list again, there may be something
* ready again for this node.
*/
tosend = create_filelist(eff_remote, nonhold_mail, 0);
for (tmpfl = tosend; tmpfl->next; tmpfl = tmpfl->next);
tmpfl->next = respond;
rc = binkp_batch(tosend, role);
tmpfl->next = NULL;
}
2001-08-17 05:46:24 +00:00
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: end transfer rc=%d", rc);
2002-10-20 20:58:55 +00:00
closetcp();
2001-08-17 05:46:24 +00:00
2002-10-20 20:58:55 +00:00
if (!MBflag) {
/*
* In singe batch mode we process filerequests after the batch.
* The results will be put on hold for the calling node.
*/
respond = respond_wazoo();
for (tmpfl = respond; tmpfl; tmpfl = tmpfl->next) {
if (strncmp(tmpfl->local, "/tmp", 4)) {
attach(*remote->addr, tmpfl->local, LEAVE, 'h');
Syslog('+', "Put on hold: %s", MBSE_SS(tmpfl->local));
} else {
file_mv(tmpfl->local, pktname(remote->addr, 'h'));
Syslog('+', "New netmail: %s", pktname(remote->addr, 'h'));
}
2001-08-17 05:46:24 +00:00
}
2002-10-20 20:58:55 +00:00
}
2001-08-17 05:46:24 +00:00
2002-10-20 20:58:55 +00:00
tidy_filelist(request, (rc == 0));
tidy_filelist(tosend, (rc == 0));
tidy_filelist(respond, 0);
2001-08-17 05:46:24 +00:00
2002-10-20 20:58:55 +00:00
rc = abs(rc);
return rc;
2001-08-17 05:46:24 +00:00
}
int resync(off_t off)
{
return 0;
2001-08-17 05:46:24 +00:00
}
2003-05-10 21:52:52 +00:00
/*
2003-07-22 20:22:39 +00:00
* Translate string to binkp escaped string, unsafe characters are escaped.
2003-05-10 21:52:52 +00:00
*/
2003-05-12 18:31:51 +00:00
char *unix2binkp(char *fn)
2003-05-10 21:52:52 +00:00
{
static char buf[PATH_MAX];
char *p, *q;
memset(&buf, 0, sizeof(buf));
p = fn;
q = buf;
while (*p) {
if (strspn(p, (char *)BNKCHARS)) {
2003-05-11 10:24:35 +00:00
*q++ = *p;
*q = '\0';
2003-05-10 21:52:52 +00:00
} else {
2003-05-11 10:24:35 +00:00
sprintf(q, "\\%2x", p[0]);
2003-05-10 21:52:52 +00:00
}
2003-05-11 10:24:35 +00:00
while (*q)
q++;
2003-05-10 21:52:52 +00:00
p++;
}
*q = '\0';
return buf;
}
2003-05-12 18:31:51 +00:00
/*
2003-07-22 20:22:39 +00:00
* Translate escaped binkp string to normal string.
2003-05-12 18:31:51 +00:00
*/
char *binkp2unix(char *fn)
{
static char buf[PATH_MAX];
char *p, *q, hex[3];
int c;
memset(&buf, 0, sizeof(buf));
p = fn;
q = buf;
while (*p) {
if (p[0] == '\\') {
2003-05-12 19:11:19 +00:00
p++;
2003-07-22 20:22:39 +00:00
if (*p == '\\') {
/*
* A backslash is transmitted
*/
*q++ = '\\';
*q = '\0';
} else {
/*
* If remote sends \x0a method instead of \0a, eat the x character
*/
if ((*p == 'x') || (*p == 'X'))
p++;
/*
* Decode hex characters
*/
hex[0] = *p++;
hex[1] = *p;
hex[2] = '\0';
sscanf(hex, "%2x", &c);
*q++ = c;
*q = '\0';
}
2003-05-12 18:31:51 +00:00
} else {
*q++ = *p;
*q = '\0';
}
p++;
}
*q = '\0';
return buf;
}
2001-08-17 05:46:24 +00:00
/*
* Transmit data frame
*/
void binkp_send_data(char *buf, int len)
{
unsigned short header = 0;
2001-08-17 05:46:24 +00:00
header = ((BINKP_DATA_BLOCK + len) & 0xffff);
2001-08-17 05:46:24 +00:00
PUTCHAR((header >> 8) & 0x00ff);
PUTCHAR(header & 0x00ff);
if (len)
PUT(buf, len);
FLUSHOUT();
binkp_settimer(BINKP_TIMEOUT);
2001-08-17 05:46:24 +00:00
}
/*
* Transmit control frame
*/
void binkp_send_control(int id,...)
{
va_list args;
char *fmt, *s;
binkp_frame frame;
static char buf[1024];
int sz;
va_start(args, id);
fmt = va_arg(args, char*);
if (fmt) {
vsprintf(buf, fmt, args);
sz = ((1 + strlen(buf)) & 0x7fff);
} else {
buf[0]='\0';
sz = 1;
}
2001-08-17 05:46:24 +00:00
frame.header = ((BINKP_CONTROL_BLOCK + sz) & 0xffff);
frame.id = (char)id;
frame.data = buf;
s = (unsigned char *)malloc(sz + 2 + 1);
s[sz + 2] = '\0';
s[0] = ((frame.header >> 8)&0xff);
s[1] = (frame.header & 0xff);
s[2] = frame.id;
if (frame.data[0])
strncpy(s + 3, frame.data, sz-1);
2001-08-17 05:46:24 +00:00
PUT(s, sz+2);
FLUSHOUT();
2001-08-17 05:46:24 +00:00
free(s);
va_end(args);
binkp_settimer(BINKP_TIMEOUT);
2001-08-17 05:46:24 +00:00
}
/*
* Receive control frame
*/
int binkp_recv_frame(char *buf, int *len, int *cmd)
{
int b0, b1;
2001-08-17 05:46:24 +00:00
*len = *cmd = 0;
2001-08-17 05:46:24 +00:00
b0 = GETCHAR(180);
if (tty_status)
goto to;
if (b0 & 0x80)
*cmd = 1;
2001-08-17 05:46:24 +00:00
b1 = GETCHAR(1);
if (tty_status)
goto to;
2001-08-17 05:46:24 +00:00
*len = (b0 & 0x7f) << 8;
*len += b1;
2001-08-17 05:46:24 +00:00
GET(buf, *len, 120);
buf[*len] = '\0';
if (tty_status)
goto to;
2001-08-17 05:46:24 +00:00
to:
if (tty_status)
2003-05-14 20:25:11 +00:00
WriteError("Binkp: TCP receive error: %d %s", tty_status, ttystat[tty_status]);
return tty_status;
2001-08-17 05:46:24 +00:00
}
void binkp_settimer(int interval)
{
2002-06-16 16:44:38 +00:00
Timer = time((time_t*)NULL) + interval;
2001-08-17 05:46:24 +00:00
}
int binkp_expired(void)
{
time_t now;
2001-08-17 05:46:24 +00:00
now = time(NULL);
if (now >= Timer)
Syslog('+', "Binkp: timeout");
return (now >= Timer);
2001-08-17 05:46:24 +00:00
}
2003-07-06 20:37:58 +00:00
void b_banner(void)
2001-08-17 05:46:24 +00:00
{
2002-06-16 16:44:38 +00:00
time_t t;
binkp_send_control(MM_NUL,"SYS %s", CFG.bbs_name);
binkp_send_control(MM_NUL,"ZYZ %s", CFG.sysop_name);
binkp_send_control(MM_NUL,"LOC %s", CFG.location);
binkp_send_control(MM_NUL,"NDL %s", CFG.Flags);
t = time(NULL);
binkp_send_control(MM_NUL,"TIME %s", rfcdate(t));
binkp_send_control(MM_NUL,"VER mbcico/%s/%s-%s binkp/1.0", VERSION, OsName(), OsCPU());
if (strlen(CFG.Phone))
binkp_send_control(MM_NUL,"PHN %s", CFG.Phone);
if (strlen(CFG.comment))
binkp_send_control(MM_NUL,"OPM %s", CFG.comment);
2001-08-17 05:46:24 +00:00
}
void b_nul(char *msg)
{
2002-06-16 16:44:38 +00:00
if (strncmp(msg, "SYS ", 4) == 0) {
Syslog('+', "System : %s", msg+4);
strncpy(history.system_name, msg+4, 35);
} else if (strncmp(msg, "ZYZ ", 4) == 0) {
Syslog('+', "Sysop : %s", msg+4);
strncpy(history.sysop, msg+4, 35);
} else if (strncmp(msg, "LOC ", 4) == 0) {
Syslog('+', "Location: %s", msg+4);
strncpy(history.location, msg+4, 35);
} else if (strncmp(msg, "NDL ", 4) == 0)
Syslog('+', "Flags : %s", msg+4);
else if (strncmp(msg, "TIME ", 5) == 0)
Syslog('+', "Time : %s", msg+5);
else if (strncmp(msg, "VER ", 4) == 0)
Syslog('+', "Uses : %s", msg+4);
else if (strncmp(msg, "PHN ", 4) == 0)
Syslog('+', "Phone : %s", msg+4);
else if (strncmp(msg, "OPM ", 4) == 0)
Syslog('+', "Remark : %s", msg+4);
else if (strncmp(msg, "TRF ", 4) == 0)
Syslog('+', "Binkp: remote has %s mail/files for us", msg+4);
else if (strncmp(msg, "OPT ", 4) == 0) {
Syslog('+', "Options : %s", msg+4);
if (strstr(msg, (char *)"NR") != NULL)
NRflag = TRUE;
if (strstr(msg, (char *)"MB") != NULL)
MBflag = TRUE;
if (strstr(msg, (char *)"ND") != NULL)
NDflag = TRUE;
2003-07-06 20:37:58 +00:00
if (strstr(msg, (char *)"CRYPT") != NULL) {
2002-06-16 16:44:38 +00:00
CRYPTflag = TRUE;
2003-07-06 20:37:58 +00:00
// Syslog('+', "Remote requests CRYPT mode");
}
if (strstr(msg, (char *)"CRAM-MD5-") != NULL) { /* No SHA-1 support */
if (CFG.NoMD5) {
Syslog('+', "Remote supports MD5, but it's turned off here");
} else {
2003-07-07 18:06:02 +00:00
Syslog('b', "Remote requests MD5 password");
2003-07-06 20:37:58 +00:00
if (MD_challenge)
free(MD_challenge);
MD_challenge = MD_getChallenge(msg, NULL);
}
}
2002-06-16 16:44:38 +00:00
if (strstr(msg, (char *)"CRC") != NULL) {
CRCflag = TRUE;
2003-07-06 20:37:58 +00:00
Syslog('+', "Switching to CRC32 mode");
2002-06-16 16:44:38 +00:00
}
} else
Syslog('+', "M_NUL \"%s\"", msg);
2001-08-17 05:46:24 +00:00
}
/*
* Originate a binkp session
*/
SM_DECL(orgbinkp, (char *)"orgbinkp")
SM_STATES
2002-06-16 16:44:38 +00:00
waitconn,
sendpass,
waitaddr,
authremote,
waitok
2001-08-17 05:46:24 +00:00
SM_NAMES
2002-06-16 16:44:38 +00:00
(char *)"waitconn",
(char *)"sendpass",
(char *)"waitaddr",
(char *)"authremote",
(char *)"waitok"
2001-08-17 05:46:24 +00:00
SM_EDECL
2002-06-16 16:44:38 +00:00
faddr *primary;
char *p, *q;
2002-12-27 19:50:14 +00:00
int i, rc, bufl, cmd, dupe;
2002-06-16 16:44:38 +00:00
fa_list **tmp, *tmpa;
int SendPass = FALSE;
faddr *fa, ra;
2001-08-17 05:46:24 +00:00
SM_START(waitconn)
SM_STATE(waitconn)
2002-06-16 16:44:38 +00:00
Loaded = FALSE;
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: node %s", ascfnode(remote->addr, 0x1f));
IsDoing("Connect binkp %s", ascfnode(remote->addr, 0xf));
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_NUL,"OPT MB CRC");
2003-07-06 20:37:58 +00:00
b_banner();
2002-06-16 16:44:38 +00:00
/*
* Build a list of aka's to send, the primary aka first.
*/
ra.zone = remote->addr->zone;
ra.net = remote->addr->net;
ra.node = remote->addr->node;
ra.point = remote->addr->point;
primary = bestaka_s(remote->addr);
p = xstrcpy(ascfnode(primary, 0x1f));
/*
* Add all other aka's exept primary aka.
*/
for (i = 0; i < 40; i++)
if ((CFG.aka[i].zone) && (CFG.akavalid[i]) &&
((CFG.aka[i].zone != primary->zone) || (CFG.aka[i].net != primary->net) ||
(CFG.aka[i].node != primary->node) || (CFG.aka[i].point!= primary->point))) {
p = xstrcat(p, (char *)" ");
p = xstrcat(p, aka2str(CFG.aka[i]));
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_ADR, "%s", p);
free(p);
tidy_faddr(primary);
SM_PROCEED(waitaddr)
2001-08-17 05:46:24 +00:00
SM_STATE(waitaddr)
2002-06-16 16:44:38 +00:00
for (;;) {
if ((rc = binkp_recv_frame(rbuf, &bufl, &cmd))) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: error receiving remote info");
2002-06-16 16:44:38 +00:00
SM_ERROR;
}
if (cmd) {
if (rbuf[0] == MM_ADR) {
p = xstrcpy(&rbuf[1]);
tidy_falist(&remote);
remote = NULL;
tmp = &remote;
for (q = strtok(p, " "); q; q = strtok(NULL, " "))
if ((fa = parsefnode(q))) {
2002-12-27 19:50:14 +00:00
dupe = FALSE;
for (tmpa = remote; tmpa; tmpa = tmpa->next) {
if ((tmpa->addr->zone == fa->zone) && (tmpa->addr->net == fa->net) &&
(tmpa->addr->node == fa->node) && (tmpa->addr->point == fa->point) &&
(strcmp(tmpa->addr->domain, fa->domain) == 0)) {
dupe = TRUE;
Syslog('b', "Double address %s", ascfnode(tmpa->addr, 0x1f));
break;
}
}
if (!dupe) {
*tmp = (fa_list*)malloc(sizeof(fa_list));
(*tmp)->next = NULL;
(*tmp)->addr = fa;
tmp = &((*tmp)->next);
}
2002-06-16 16:44:38 +00:00
} else {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: bad remote address: \"%s\"", printable(q, 0));
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_ERR, "Bad address");
}
for (tmpa = remote; tmpa; tmpa = tmpa->next) {
Syslog('+', "Address : %s", ascfnode(tmpa->addr, 0x1f));
if (nodelock(tmpa->addr)) {
binkp_send_control(MM_BSY, "Address %s locked", ascfnode(tmpa->addr, 0x1f));
2001-08-17 05:46:24 +00:00
SM_ERROR;
2002-06-16 16:44:38 +00:00
}
/*
* With the loaded flag we prevent removing the noderecord
* when the remote presents us an address we don't know about.
*/
if (!Loaded) {
if (noderecord(tmpa->addr))
Loaded = TRUE;
}
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
history.aka.zone = remote->addr->zone;
history.aka.net = remote->addr->net;
history.aka.node = remote->addr->node;
history.aka.point = remote->addr->point;
sprintf(history.aka.domain, "%s", remote->addr->domain);
2001-08-17 05:46:24 +00:00
2003-07-06 20:37:58 +00:00
SM_PROCEED(sendpass)
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_BSY) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: remote is busy");
2002-06-16 16:44:38 +00:00
SM_ERROR;
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_ERR) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: remote error: %s", &rbuf[1]);
2002-06-16 16:44:38 +00:00
SM_ERROR;
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_NUL) {
b_nul(&rbuf[1]);
}
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
}
2001-08-17 05:46:24 +00:00
2003-07-06 20:37:58 +00:00
SM_STATE(sendpass)
2003-07-07 18:06:02 +00:00
if (MD_challenge && strlen(nodes.Spasswd)) {
2003-07-06 20:55:41 +00:00
char *pw = NULL, *tp = NULL;
2003-07-06 20:37:58 +00:00
Syslog('b', "MD_challenge is set, building digest");
2003-07-06 20:55:41 +00:00
pw = xstrcpy(nodes.Spasswd);
tp = MD_buildDigest(pw, MD_challenge);
2003-07-06 20:37:58 +00:00
if (!tp) {
Syslog('!', "Unable to build MD5 digest");
SM_ERROR;
}
SendPass = TRUE;
2003-07-07 18:06:02 +00:00
CRAMflag = TRUE;
2003-07-06 20:37:58 +00:00
binkp_send_control(MM_PWD, "%s", tp);
2003-07-07 18:06:02 +00:00
free(tp);
2003-07-06 20:37:58 +00:00
free(pw);
} else {
if (strlen(nodes.Spasswd)) {
SendPass = TRUE;
binkp_send_control(MM_PWD, "%s", nodes.Spasswd);
} else {
binkp_send_control(MM_PWD, "-");
}
}
SM_PROCEED(authremote)
2001-08-17 05:46:24 +00:00
SM_STATE(authremote)
2002-06-16 16:44:38 +00:00
rc = 0;
for (tmpa = remote; tmpa; tmpa = tmpa->next) {
if ((tmpa->addr->zone == ra.zone) && (tmpa->addr->net == ra.net) &&
(tmpa->addr->node == ra.node) && (tmpa->addr->point == ra.point)) {
rc = 1;
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
if (rc) {
SM_PROCEED(waitok)
} else {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: error, the wrong node is reached");
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_ERR, "No AKAs in common or all AKAs busy");
SM_ERROR;
}
2001-08-17 05:46:24 +00:00
SM_STATE(waitok)
2002-06-16 16:44:38 +00:00
for (;;) {
if ((rc = binkp_recv_frame(rbuf, &bufl, &cmd))) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: error waiting for remote acknowledge");
2002-06-16 16:44:38 +00:00
SM_ERROR;
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
if (cmd) {
if (rbuf[0] == MM_OK) {
if (SendPass)
2003-07-07 18:06:02 +00:00
Syslog('+', "Binkp: %spassword protected session", CRAMflag ? "MD5 ":"");
2002-06-16 16:44:38 +00:00
else
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: unprotected session");
2002-06-16 16:44:38 +00:00
SM_SUCCESS;
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_BSY) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: remote is busy");
2002-06-16 16:44:38 +00:00
SM_ERROR;
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_ERR) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: remote error: %s", &rbuf[1]);
2002-06-16 16:44:38 +00:00
SM_ERROR;
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_NUL) {
b_nul(&rbuf[1]);
}
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
}
2001-08-17 05:46:24 +00:00
SM_END
SM_RETURN
/*
* Answer a binkp session
*/
SM_DECL(ansbinkp, (char *)"ansbinkp")
SM_STATES
2002-06-16 16:44:38 +00:00
waitconn,
waitaddr,
waitpwd,
pwdack
2001-08-17 05:46:24 +00:00
SM_NAMES
2002-06-16 16:44:38 +00:00
(char *)"waitconn",
(char *)"waitaddr",
(char *)"waitpwd",
(char *)"pwdack"
2001-08-17 05:46:24 +00:00
SM_EDECL
2002-06-16 16:44:38 +00:00
char *p, *q;
2002-12-27 19:50:14 +00:00
int i, rc, bufl, cmd, dupe;
2002-06-16 16:44:38 +00:00
fa_list **tmp, *tmpa;
faddr *fa;
2001-08-17 05:46:24 +00:00
SM_START(waitconn)
SM_STATE(waitconn)
2002-06-16 16:44:38 +00:00
Loaded = FALSE;
2003-07-06 20:37:58 +00:00
if (!CFG.NoMD5 && ((MD_challenge = MD_getChallenge(NULL, &peeraddr)) != NULL)) {
/*
* Answering site MUST send CRAM message as very first M_NUL
*/
char s[MD5_DIGEST_LEN*2+15]; /* max. length of opt string */
strcpy(s, "OPT ");
MD_toString(s+4, MD_challenge[0], MD_challenge+1);
CRAMflag = TRUE;
Syslog('b', "sending \"%s\"", s);
binkp_send_control(MM_NUL, "%s", s);
}
b_banner();
2002-06-16 16:44:38 +00:00
p = xstrcpy((char *)"");
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
for (i = 0; i < 40; i++)
if ((CFG.aka[i].zone) && (CFG.akavalid[i])) {
p = xstrcat(p, (char *)" ");
p = xstrcat(p, aka2str(CFG.aka[i]));
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_ADR, "%s", p);
free(p);
SM_PROCEED(waitaddr)
2001-08-17 05:46:24 +00:00
SM_STATE(waitaddr)
2002-06-16 16:44:38 +00:00
for (;;) {
if ((rc = binkp_recv_frame(rbuf, &bufl, &cmd))) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: error waiting for remote info");
2002-06-16 16:44:38 +00:00
SM_ERROR;
}
if (cmd) {
if (rbuf[0] == MM_ADR) {
p = xstrcpy(&rbuf[1]);
tidy_falist(&remote);
remote = NULL;
tmp = &remote;
for (q = strtok(p, " "); q; q = strtok(NULL, " "))
if ((fa = parsefnode(q))) {
2002-12-27 19:50:14 +00:00
dupe = FALSE;
for (tmpa = remote; tmpa; tmpa = tmpa->next) {
if ((tmpa->addr->zone == fa->zone) && (tmpa->addr->net == fa->net) &&
(tmpa->addr->node == fa->node) && (tmpa->addr->point == fa->point) &&
(strcmp(tmpa->addr->domain, fa->domain) == 0)) {
dupe = TRUE;
Syslog('b', "Double address %s", ascfnode(tmpa->addr, 0x1f));
break;
}
}
if (!dupe) {
*tmp = (fa_list*)malloc(sizeof(fa_list));
(*tmp)->next = NULL;
(*tmp)->addr = fa;
tmp = &((*tmp)->next);
}
2002-06-16 16:44:38 +00:00
} else {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: bad remote address: \"%s\"", printable(q, 0));
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_ERR, "Bad address");
}
for (tmpa = remote; tmpa; tmpa = tmpa->next) {
Syslog('+', "Address : %s", ascfnode(tmpa->addr, 0x1f));
if (nodelock(tmpa->addr)) {
binkp_send_control(MM_BSY, "Address %s locked", ascfnode(tmpa->addr, 0x1f));
2001-08-17 05:46:24 +00:00
SM_ERROR;
2002-06-16 16:44:38 +00:00
}
/*
* With the loaded flag we prevent removing the noderecord
* when the remote presents us an address we don't know about.
*/
if (!Loaded) {
if (noderecord(tmpa->addr))
Loaded = TRUE;
}
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
for (tmpa = remote; tmpa; tmpa = tmpa->next) {
if (((nlent = getnlent(tmpa->addr))) && (nlent->pflag != NL_DUMMY)) {
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: remote is a listed system");
2002-06-16 16:44:38 +00:00
if (inbound)
free(inbound);
inbound = xstrcpy(CFG.inbound);
UserCity(mypid, nlent->sysop, nlent->location);
2002-06-16 16:44:38 +00:00
break;
}
}
if (nlent)
rdoptions(Loaded);
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
if (MBflag) {
Syslog('b', "Remote supports MB");
binkp_send_control(MM_NUL,"OPT MB");
}
if (CRCflag) {
Syslog('b', "Remote supports CRC32");
binkp_send_control(MM_NUL,"OPT CRC");
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
history.aka.zone = remote->addr->zone;
history.aka.net = remote->addr->net;
history.aka.node = remote->addr->node;
history.aka.point = remote->addr->point;
sprintf(history.aka.domain, "%s", remote->addr->domain);
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
SM_PROCEED(waitpwd)
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_ERR) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: remote error: %s", &rbuf[1]);
2002-06-16 16:44:38 +00:00
SM_ERROR;
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_NUL) {
b_nul(&rbuf[1]);
}
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
}
2001-08-17 05:46:24 +00:00
SM_STATE(waitpwd)
2002-06-16 16:44:38 +00:00
for (;;) {
if ((rc = binkp_recv_frame(rbuf, &bufl, &cmd))) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: error waiting for password");
2002-06-16 16:44:38 +00:00
SM_ERROR;
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
if (cmd) {
if (rbuf[0] == MM_PWD) {
SM_PROCEED(pwdack)
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_ERR) {
2003-05-14 20:25:11 +00:00
Syslog('!', "Binkp: remote error: %s", &rbuf[1]);
2002-06-16 16:44:38 +00:00
SM_ERROR;
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
} else if (rbuf[0] == MM_NUL) {
b_nul(&rbuf[1]);
}
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
}
2001-08-17 05:46:24 +00:00
SM_STATE(pwdack)
2002-06-16 16:44:38 +00:00
2003-07-06 20:37:58 +00:00
if ((strncmp(&rbuf[1], "CRAM-", 5) == 0) && CRAMflag && Loaded) {
char *sp, *pw;
pw = xstrcpy(nodes.Spasswd);
sp = MD_buildDigest(pw, MD_challenge);
free(pw);
if (sp != NULL) {
if (strcmp(&rbuf[1], sp)) {
Syslog('+', "Binkp: bad MD5 crypted password");
binkp_send_control(MM_ERR, "*** Password error, check setup ***");
free(sp);
sp = NULL;
SM_ERROR;
} else {
free(sp);
sp = NULL;
Syslog('+', "Binkp: MD5 password OK, protected session");
if (inbound)
free(inbound);
inbound = xstrcpy(CFG.pinbound);
2003-07-22 20:22:39 +00:00
binkp_send_control(MM_OK, "secure");
2003-07-06 20:37:58 +00:00
SM_SUCCESS;
}
} else {
Syslog('!', "Could not build MD5 digest");
binkp_send_control(MM_ERR, "*** Internal error ***");
SM_ERROR;
}
} else if ((strcmp(&rbuf[1], "-") == 0) && !Loaded) {
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: node not in setup, unprotected session");
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_OK, "");
SM_SUCCESS;
} else if ((strcmp(&rbuf[1], "-") == 0) && Loaded && !strlen(nodes.Spasswd)) {
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: node in setup but no session password, unprotected session");
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_OK, "");
SM_SUCCESS;
} else if ((strcmp(&rbuf[1], nodes.Spasswd) == 0) && Loaded) {
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: password OK, protected session");
2002-06-16 16:44:38 +00:00
if (inbound)
free(inbound);
inbound = xstrcpy(CFG.pinbound);
binkp_send_control(MM_OK, "");
SM_SUCCESS;
} else {
2003-05-14 20:25:11 +00:00
Syslog('?', "Binkp: password error: expected \"%s\", got \"%s\"", nodes.Spasswd, &rbuf[1]);
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_ERR, "*** Password error, check setup ***");
SM_ERROR;
}
2001-08-17 05:46:24 +00:00
SM_END
SM_RETURN
void fill_binkp_list(binkp_list **bll, file_list *fal, off_t offs)
{
binkp_list **tmpl;
struct stat tstat;
2001-08-17 05:46:24 +00:00
if (stat(fal->local, &tstat) != 0) {
Syslog('!', "$Can't add %s to sendlist", fal->local);
exit;
}
if (strstr(fal->remote, (char *)".pkt"))
nethold += tstat.st_size;
else
mailhold += tstat.st_size;
2001-08-17 05:46:24 +00:00
for (tmpl = bll; *tmpl; tmpl = &((*tmpl)->next));
*tmpl = (binkp_list *)malloc(sizeof(binkp_list));
(*tmpl)->next = NULL;
(*tmpl)->state = NoState;
(*tmpl)->get = FALSE;
(*tmpl)->local = xstrcpy(fal->local);
2003-05-12 18:31:51 +00:00
(*tmpl)->remote = xstrcpy(unix2binkp(fal->remote));
(*tmpl)->offset = offs;
(*tmpl)->size = tstat.st_size;
(*tmpl)->date = tstat.st_mtime;
2001-08-17 05:46:24 +00:00
}
char *lbstat[]={(char *)"None",
(char *)"Sending",
(char *)"IsSent",
(char *)"Got",
(char *)"Skipped",
(char *)"Get"};
2001-08-17 05:46:24 +00:00
void debug_binkp_list(binkp_list **bll)
{
binkp_list *tmpl;
2001-08-17 05:46:24 +00:00
Syslog('B', "Current filelist:");
2001-08-17 05:46:24 +00:00
for (tmpl = *bll; tmpl; tmpl = tmpl->next)
Syslog('B', "%s %s %s %ld", MBSE_SS(tmpl->local), MBSE_SS(tmpl->remote), lbstat[tmpl->state], tmpl->offset);
2001-08-17 05:46:24 +00:00
}
2002-07-06 17:37:55 +00:00
int binkp_batch(file_list *to_send, int role)
2001-08-17 05:46:24 +00:00
{
2002-06-16 16:44:38 +00:00
int rc = 0, NotDone, rxlen = 0, txlen = 0, rxerror = FALSE;
static char *txbuf, *rxbuf;
FILE *txfp = NULL, *rxfp = NULL;
long txpos = 0, rxpos = 0, stxpos = 0, written, rsize, roffs, lsize, gsize, goffset;
int sverr, cmd = FALSE, GotFrame = FALSE, blklen = 0, c, Found = FALSE;
unsigned short header = 0;
char *rname, *lname, *gname;
time_t rtime, ltime, gtime;
unsigned long rcrc = 0, tcrc = 0, rxcrc = 0;
off_t rxbytes;
binkp_list *bll = NULL, *tmp, *tmpg, *cursend = NULL;
file_list *tsl;
struct timeval rxtvstart, rxtvend;
struct timeval txtvstart, txtvend;
struct timezone tz;
rxtvstart.tv_sec = rxtvstart.tv_usec = 0;
rxtvend.tv_sec = rxtvend.tv_usec = 0;
txtvstart.tv_sec = txtvstart.tv_usec = 0;
txtvend.tv_sec = txtvend.tv_usec = 0;
tz.tz_minuteswest = tz.tz_dsttime = 0;
batchnr++;
Syslog('+', "Binkp: starting batch %d", batchnr);
IsDoing("Binkp %s %s", (role == 1)?"out":"inb", ascfnode(remote->addr, 0xf));
2002-06-16 16:44:38 +00:00
txbuf = calloc(MAX_BLKSIZE + 3, sizeof(unsigned char));
rxbuf = calloc(MAX_BLKSIZE + 3, sizeof(unsigned char));
rname = calloc(512, sizeof(char));
lname = calloc(512, sizeof(char));
gname = calloc(512, sizeof(char));
TfState = Switch;
RxState = RxWaitFile;
TxState = TxGetNextFile;
binkp_settimer(BINKP_TIMEOUT);
nethold = mailhold = 0L;
transferred = FALSE;
/*
* Build a new filelist from the existing filelist.
* This one is special for binkp behaviour.
*/
for (tsl = to_send; tsl; tsl = tsl->next) {
if (tsl->remote != NULL)
fill_binkp_list(&bll, tsl, 0L);
}
debug_binkp_list(&bll);
Syslog('+', "Binkp: mail %ld, files %ld bytes", nethold, mailhold);
binkp_send_control(MM_NUL, "TRF %ld %ld", nethold, mailhold);
while ((RxState != RxDone) || (TxState != TxDone)) {
Nopper();
if (binkp_expired()) {
Syslog('!', "Binkp: Transfer timeout");
Syslog('b', "Binkp: TxState=%d, RxState=%d, rxlen=%d", TxState, RxState, rxlen);
RxState = RxDone;
TxState = TxDone;
binkp_send_control(MM_ERR, "Transfer timeout");
2002-10-20 20:58:55 +00:00
rc = MBERR_FTRANSFER;
2002-06-16 16:44:38 +00:00
break;
}
2001-08-17 05:46:24 +00:00
/*
2002-06-16 16:44:38 +00:00
* Receiver binkp frame
2001-08-17 05:46:24 +00:00
*/
2002-06-16 16:44:38 +00:00
for (;;) {
if (GotFrame) {
Syslog('b', "WARNING: frame not processed");
break;
} else {
c = GETCHAR(0);
if (c < 0) {
c = -c;
if (c == STAT_TIMEOUT) {
usleep(1);
break;
}
Syslog('?', "Binkp: receiver status %s", ttystat[c]);
TxState = TxDone;
RxState = RxDone;
2002-10-20 20:58:55 +00:00
rc = (MBERR_TTYIO + (-c));
2002-06-16 16:44:38 +00:00
break;
} else {
switch (rxlen) {
case 0: header = c << 8;
break;
case 1: header += c;
break;
default:rxbuf[rxlen-2] = c;
}
if (rxlen == 1) {
cmd = header & 0x8000;
blklen = header & 0x7fff;
}
if ((rxlen == (blklen + 1) && (rxlen >= 1))) {
GotFrame = TRUE;
binkp_settimer(BINKP_TIMEOUT);
rxbuf[rxlen-1] = '\0';
break;
}
rxlen++;
}
}
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
/*
* Transmitter state machine
*/
switch (TxState) {
case TxGetNextFile:
for (tmp = bll; tmp; tmp = tmp->next) {
if (tmp->state == NoState) {
/*
* There is something to send
*/
struct flock txflock;
txflock.l_type = F_RDLCK;
txflock.l_whence = 0;
txflock.l_start = 0L;
txflock.l_len = 0L;
if (CRCflag)
tcrc = file_crc(tmp->local, FALSE);
else
tcrc = 0;
txfp = fopen(tmp->local, "r");
if (txfp == NULL) {
sverr = errno;
if ((sverr == ENOENT) || (sverr == EINVAL)) {
Syslog('+', "Binkp: file %s doesn't exist, removing", MBSE_SS(tmp->local));
tmp->state = Got;
} else {
WriteError("$Binkp: can't open %s, skipping", MBSE_SS(tmp->local));
tmp->state = Skipped;
}
break;
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
if (fcntl(fileno(txfp), F_SETLK, &txflock) != 0) {
WriteError("$Binkp: can't lock file %s, skipping", MBSE_SS(tmp->local));
fclose(txfp);
tmp->state = Skipped;
2001-08-17 05:46:24 +00:00
break;
2002-06-16 16:44:38 +00:00
}
txpos = stxpos = tmp->offset;
Syslog('+', "Binkp: send \"%s\" as \"%s\"", MBSE_SS(tmp->local), MBSE_SS(tmp->remote));
if (CRCflag && tcrc) {
2002-06-16 18:34:59 +00:00
Syslog('+', "Binkp: size %lu bytes, dated %s, crc %lx", (unsigned long)tmp->size, date(tmp->date), tcrc);
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_FILE, "%s %lu %ld %ld %lx", MBSE_SS(tmp->remote),
2002-06-16 18:34:59 +00:00
(unsigned long)tmp->size, (long)tmp->date, (unsigned long)tmp->offset, tcrc);
2002-06-16 16:44:38 +00:00
} else {
Syslog('+', "Binkp: size %lu bytes, dated %s", (unsigned long)tmp->size, date(tmp->date));
binkp_send_control(MM_FILE, "%s %lu %ld %ld", MBSE_SS(tmp->remote),
(unsigned long)tmp->size, (long)tmp->date, (unsigned long)tmp->offset);
}
gettimeofday(&txtvstart, &tz);
tmp->state = Sending;
cursend = tmp;
TxState = TxTryRead;
transferred = TRUE;
break;
} /* if state == NoState */
} /* for */
if (tmp == NULL) {
/*
* No more files to send
*/
TxState = TxWaitLastAck;
Syslog('b', "Binkp: transmitter to WaitLastAck");
}
break;
case TxTryRead:
/*
* Check if there is room in the output buffer
*/
if ((WAITPUTGET(-1) & 2) != 0)
TxState = TxReadSend;
break;
case TxReadSend:
fseek(txfp, txpos, SEEK_SET);
txlen = fread(txbuf, 1, SND_BLKSIZE, txfp);
if (txlen == 0) {
if (ferror(txfp)) {
WriteError("$Binkp: error reading from file");
TxState = TxGetNextFile;
cursend->state = Skipped;
debug_binkp_list(&bll);
break;
2001-08-17 05:46:24 +00:00
}
/*
2002-06-16 16:44:38 +00:00
* Send empty dataframe, most binkp mailers need it to detect EOF.
2001-08-17 05:46:24 +00:00
*/
2002-06-16 16:44:38 +00:00
binkp_send_data(txbuf, 0);
2001-08-17 05:46:24 +00:00
/*
2002-06-16 16:44:38 +00:00
* calculate time needed and bytes transferred
2001-08-17 05:46:24 +00:00
*/
2002-06-16 16:44:38 +00:00
gettimeofday(&txtvend, &tz);
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
/*
* Close transmitter file
*/
fclose(txfp);
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
if (txpos >= 0) {
stxpos = txpos - stxpos;
Syslog('+', "Binkp: OK %s", transfertime(txtvstart, txtvend, stxpos, TRUE));
} else {
Syslog('+', "Binkp: transmitter skipped file after %ld seconds", txtvend.tv_sec - txtvstart.tv_sec);
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
cursend->state = IsSent;
TxState = TxGetNextFile;
break;
} else {
txpos += txlen;
sentbytes += txlen;
binkp_send_data(txbuf, txlen);
}
TxState = TxTryRead;
break;
case TxWaitLastAck:
debug_binkp_list(&bll);
NotDone = FALSE;
for (tmp = bll; tmp; tmp = tmp->next)
if ((tmp->state != Got) && (tmp->state != Skipped)) {
NotDone = TRUE;
break;
}
if (tmp == NULL) {
TxState = TxDone;
binkp_send_control(MM_EOB, "");
Syslog('+', "Binkp: sending EOB");
}
break;
case TxDone:
break;
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
/*
* Process received frame
*/
if (GotFrame) {
if (cmd) {
switch (rxbuf[0]) {
case MM_ERR: Syslog('+', "Binkp: got ERR: %s", rxbuf+1);
RxState = RxDone;
TxState = TxDone;
2002-10-20 20:58:55 +00:00
rc = MBERR_FTRANSFER;
2002-06-16 16:44:38 +00:00
break;
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
case MM_BSY: Syslog('+', "Binkp: got BSY: %s", rxbuf+1);
RxState = RxDone;
TxState = TxDone;
2002-10-20 20:58:55 +00:00
rc = MBERR_FTRANSFER;
2002-06-16 16:44:38 +00:00
break;
2001-08-17 05:46:24 +00:00
2002-06-16 19:55:30 +00:00
case MM_SKIP: Syslog('+', "Binkp: got SKIP: %s", rxbuf+1);
2002-06-16 16:44:38 +00:00
break;
2002-06-16 19:55:30 +00:00
case MM_GET: Syslog('+', "Binkp: got GET: %s", rxbuf+1);
2002-06-16 16:44:38 +00:00
sscanf(rxbuf+1, "%s %ld %ld %ld", gname, &gsize, &gtime, &goffset);
for (tmpg = bll; tmpg; tmpg = tmpg->next) {
if (strcasecmp(tmpg->remote, gname) == 0) {
tmpg->state = NoState;
tmpg->offset = goffset;
Syslog('+', "Remote wants %s again, offset %ld", gname, goffset);
2001-08-17 05:46:24 +00:00
TxState = TxGetNextFile;
2002-06-16 16:44:38 +00:00
}
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
break;
2001-08-17 05:46:24 +00:00
2002-06-16 19:55:30 +00:00
case MM_GOT: Syslog('+', "Binkp: got GOT: %s", rxbuf+1);
sscanf(rxbuf+1, "%s %ld %ld", lname, &lsize, &ltime);
2002-06-16 16:44:38 +00:00
Found = FALSE;
for (tmp = bll; tmp; tmp = tmp->next)
if ((strcmp(lname, tmp->remote) == 0) && (lsize == tmp->size) && (ltime == tmp->date)) {
Syslog('+', "Binkp: remote GOT \"%s\"", tmp->remote);
tmp->state = Got;
Found = TRUE;
}
if (!Found) {
Syslog('!', "Binkp: unexpected GOT \"%s\"", rxbuf+1);
2001-08-17 05:46:24 +00:00
}
break;
2002-06-16 16:44:38 +00:00
case MM_NUL: b_nul(rxbuf+1);
break;
2001-08-17 05:46:24 +00:00
2002-06-16 19:55:30 +00:00
case MM_EOB: Syslog('+', "Binkp: got EOB");
2002-06-16 16:44:38 +00:00
RxState = RxEndOfBatch;
break;
2001-08-17 05:46:24 +00:00
2002-06-16 19:55:30 +00:00
case MM_FILE: Syslog('b', "Binkp: got FILE: %s", rxbuf+1);
if ((RxState == RxWaitFile) || (RxState == RxEndOfBatch)) {
2002-06-16 16:44:38 +00:00
RxState = RxAcceptFile;
if (strlen(rxbuf) < 512) {
/*
* Check against buffer overflow
*/
rcrc = 0;
if (CRCflag) {
sscanf(rxbuf+1, "%s %ld %ld %ld %lx", rname, &rsize, &rtime, &roffs, &rcrc);
2001-08-17 05:46:24 +00:00
} else {
2002-06-16 16:44:38 +00:00
sscanf(rxbuf+1, "%s %ld %ld %ld", rname, &rsize, &rtime, &roffs);
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
} else {
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: got corrupted FILE frame, size %d bytes", strlen(rxbuf));
2002-06-16 16:44:38 +00:00
}
} else {
Syslog('+', "Binkp: got unexpected FILE frame %s", rxbuf+1);
2001-08-17 05:46:24 +00:00
}
break;
2002-06-16 16:44:38 +00:00
default: Syslog('+', "Binkp: Unexpected frame %d", rxbuf[0]);
}
} else {
if (blklen) {
if (RxState == RxReceData) {
written = fwrite(rxbuf, 1, blklen, rxfp);
if (CRCflag)
rxcrc = upd_crc32(rxbuf, rxcrc, blklen);
if (!written && blklen) {
Syslog('+', "Binkp: file write error");
RxState = RxDone;
}
rxpos += written;
if (rxpos == rsize) {
2002-06-16 19:55:30 +00:00
RxState = RxWaitFile;
2002-06-16 16:44:38 +00:00
if (CRCflag && rcrc) {
rxcrc = rxcrc ^ 0xffffffff;
if (rcrc == rxcrc) {
binkp_send_control(MM_GOT, "%s %ld %ld %lx", rname, rsize, rtime, rcrc);
2002-06-16 19:55:30 +00:00
closefile(TRUE);
2002-06-16 16:44:38 +00:00
} else {
rxerror = TRUE;
crc_errors++;
2002-06-16 19:55:30 +00:00
binkp_send_control(MM_SKIP, "%s %ld %ld %lx", rname, rsize, rtime, rcrc);
2003-05-14 20:25:11 +00:00
Syslog('+', "Binkp: file CRC error nr %d, sending SKIP frame", crc_errors);
2002-06-16 19:55:30 +00:00
if (crc_errors >= 3) {
2003-05-14 20:25:11 +00:00
WriteError("Binkp: file CRC error nr %d, aborting session", crc_errors);
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_ERR, "Too much CRC errors, aborting session");
RxState = RxDone;
2002-10-20 20:58:55 +00:00
rc = MBERR_FTRANSFER;
2002-06-16 16:44:38 +00:00
}
2002-06-16 19:55:30 +00:00
closefile(FALSE);
2002-06-16 16:44:38 +00:00
}
} else {
2001-08-17 05:46:24 +00:00
/*
2002-06-16 16:44:38 +00:00
* ACK without CRC check
2001-08-17 05:46:24 +00:00
*/
binkp_send_control(MM_GOT, "%s %ld %ld", rname, rsize, rtime);
2002-06-16 19:55:30 +00:00
closefile(TRUE);
2002-06-16 16:44:38 +00:00
}
rxpos = rxpos - rxbytes;
gettimeofday(&rxtvend, &tz);
Syslog('+', "Binkp: %s %s", rxerror?"ERROR":"OK", transfertime(rxtvstart, rxtvend, rxpos, FALSE));
rcvdbytes += rxpos;
RxState = RxWaitFile;
transferred = TRUE;
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
} else {
Syslog('+', "Binkp: unexpected DATA frame %d", rxbuf[0]);
}
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
}
GotFrame = FALSE;
rxlen = 0;
header = 0;
blklen = 0;
2001-08-17 05:46:24 +00:00
}
/*
2002-06-16 16:44:38 +00:00
* Receiver state machine
2001-08-17 05:46:24 +00:00
*/
2002-06-16 16:44:38 +00:00
switch (RxState) {
case RxWaitFile:
break;
case RxAcceptFile:
if (CRCflag)
Syslog('+', "Binkp: receive file \"%s\" date %s size %ld offset %ld crc %lx",
rname, date(rtime), rsize, roffs, rcrc);
else
Syslog('+', "Binkp: receive file \"%s\" date %s size %ld offset %ld",
rname, date(rtime), rsize, roffs);
2003-05-12 18:31:51 +00:00
(void)binkp2unix(rname);
2003-05-13 21:07:40 +00:00
rxfp = openfile(binkp2unix(rname), rtime, rsize, &rxbytes, resync);
2002-06-16 16:44:38 +00:00
gettimeofday(&rxtvstart, &tz);
rxpos = 0;
rxcrc = 0xffffffff;
rxerror = FALSE;
if (!diskfree(CFG.freespace)) {
Syslog('+', "Binkp: low diskspace, sending BSY");
binkp_send_control(MM_BSY, "Low diskspace, try again later");
RxState = RxDone;
TxState = TxDone;
2002-10-20 20:58:55 +00:00
rc = MBERR_FTRANSFER;
2002-06-16 16:44:38 +00:00
break;
}
if (rsize == rxbytes) {
/*
* We already got this file, send GOT so it will
* be deleted at the remote.
*/
Syslog('+', "Binkp: already got %s, sending GOT", rname);
2002-06-16 19:55:30 +00:00
if (CRCflag && rcrc)
2002-06-16 16:44:38 +00:00
binkp_send_control(MM_GOT, "%s %ld %ld %lx", rname, rsize, rtime, rcrc);
else
binkp_send_control(MM_GOT, "%s %ld %ld", rname, rsize, rtime);
RxState = RxWaitFile;
rxfp = NULL;
} else if (!rxfp) {
/*
* Some error, request to skip it
*/
Syslog('+', "Binkp: error file %s, sending SKIP", rname);
if (CRCflag && rcrc)
binkp_send_control(MM_SKIP, "%s %ld %ld %lx", rname, rsize, rtime, rcrc);
else
binkp_send_control(MM_SKIP, "%s %ld %ld", rname, rsize, rtime);
RxState = RxWaitFile;
} else {
RxState = RxReceData;
}
break;
case RxReceData:
break;
case RxEndOfBatch:
if (TxState == TxDone)
RxState = RxDone;
break;
case RxDone:
break;
2001-08-17 05:46:24 +00:00
}
2002-06-16 16:44:38 +00:00
}
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
debug_binkp_list(&bll);
2001-08-17 05:46:24 +00:00
2002-06-16 16:44:38 +00:00
/*
* Process all send files.
*/
for (tsl = to_send; tsl; tsl = tsl->next) {
if (tsl->remote == NULL) {
execute_disposition(tsl);
} else {
for (tmp = bll; tmp; tmp = tmp->next) {
if ((strcmp(tmp->local, tsl->local) == 0) && (tmp->state == Got)) {
execute_disposition(tsl);
}
}
}
}
for (tmp = bll; bll; bll = tmp) {
tmp = bll->next;
if (bll->local)
free(bll->local);
if (bll->remote)
free(bll->remote);
free(bll);
}
free(txbuf);
free(rxbuf);
free(rname);
free(lname);
free(gname);
Syslog('+', "Binkp: batch %d completed rc=%d", batchnr, rc);
return rc;
2001-08-17 05:46:24 +00:00
}