263 lines
4.8 KiB
C
263 lines
4.8 KiB
C
#define MODULE_LOG_PREFIX "camd33"
|
|
|
|
#include "globals.h"
|
|
#ifdef MODULE_CAMD33
|
|
#include "oscam-aes.h"
|
|
#include "oscam-client.h"
|
|
#include "oscam-ecm.h"
|
|
#include "oscam-emm.h"
|
|
#include "oscam-net.h"
|
|
#include "oscam-string.h"
|
|
|
|
#define REQ_SIZE 4
|
|
|
|
static int32_t camd33_send(uint8_t *buf, int32_t ml)
|
|
{
|
|
int32_t l;
|
|
|
|
if(!cur_client()->pfd)
|
|
{
|
|
return (-1);
|
|
}
|
|
|
|
l = boundary(4, ml);
|
|
memset(buf + ml, 0, l - ml);
|
|
cs_log_dump_dbg(D_CLIENT, buf, l, "send %d bytes to client", l);
|
|
|
|
if(cur_client()->crypted)
|
|
{
|
|
aes_encrypt_idx(cur_client()->aes_keys, buf, l);
|
|
}
|
|
|
|
return (send(cur_client()->pfd, buf, l, 0));
|
|
}
|
|
|
|
static int32_t camd33_recv(struct s_client *client, uint8_t *buf, int32_t l)
|
|
{
|
|
int32_t n;
|
|
|
|
if(!client->pfd)
|
|
{
|
|
return (-1);
|
|
}
|
|
|
|
if((n = cs_recv(client->pfd, buf, l, 0)) > 0)
|
|
{
|
|
client->last = time((time_t *)0);
|
|
if(client->crypted)
|
|
{
|
|
aes_encrypt_idx(cur_client()->aes_keys, buf, n);
|
|
}
|
|
}
|
|
cs_log_dump_dbg(D_CLIENT, buf, n, "received %d bytes from client", n);
|
|
|
|
return (n);
|
|
}
|
|
|
|
static void camd33_request_emm(void)
|
|
{
|
|
uint8_t mbuf[20];
|
|
struct s_reader *aureader = NULL, *rdr = NULL;
|
|
|
|
// TODO: just take the first reader in list
|
|
LL_ITER itr = ll_iter_create(cur_client()->aureader_list);
|
|
while((rdr = ll_iter_next(&itr)))
|
|
{
|
|
aureader = rdr;
|
|
break;
|
|
}
|
|
|
|
if(!aureader)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if(aureader->hexserial[0])
|
|
{
|
|
cs_log("%s emm-request sent (reader=%s, caid=%04X, auprovid=%06X)",
|
|
username(cur_client()), aureader->label, aureader->caid,
|
|
aureader->auprovid ? aureader->auprovid : b2i(4, aureader->prid[0]));
|
|
|
|
mbuf[0] = 0;
|
|
mbuf[1] = aureader->caid >> 8;
|
|
mbuf[2] = aureader->caid & 0xff;
|
|
|
|
memcpy(mbuf + 3, aureader->hexserial, 4);
|
|
memcpy(mbuf + 7, &aureader->prid[0][1], 3);
|
|
memcpy(mbuf + 10, &aureader->prid[2][1], 3);
|
|
camd33_send(mbuf, 13);
|
|
}
|
|
}
|
|
|
|
static void camd33_auth_client(uint8_t *camdbug)
|
|
{
|
|
int32_t i, rc;
|
|
uint8_t *usr = NULL, *pwd = NULL;
|
|
struct s_auth *account;
|
|
uint8_t mbuf[1024];
|
|
struct s_client *cl = cur_client();
|
|
|
|
cl->crypted = cfg.c33_crypted;
|
|
if(cl->crypted)
|
|
{
|
|
cl->crypted = !check_ip(cfg.c33_plain, cl->ip);
|
|
}
|
|
|
|
if(cl->crypted)
|
|
{
|
|
if (!aes_set_key_alloc(&cl->aes_keys, (char *)cfg.c33_key))
|
|
{
|
|
cs_disconnect_client(cl);
|
|
return;
|
|
}
|
|
}
|
|
|
|
mbuf[0] = 0;
|
|
camd33_send(mbuf, 1); // send login-request
|
|
|
|
for(rc = 0, camdbug[0] = 0, mbuf[0] = 1; (rc < 2) && (mbuf[0]); rc++)
|
|
{
|
|
i = process_input(mbuf, sizeof(mbuf), 1);
|
|
if((i > 0) && (!mbuf[0]))
|
|
{
|
|
usr = mbuf + 1;
|
|
pwd = usr + cs_strlen((char *)usr) + 2;
|
|
}
|
|
else
|
|
{
|
|
memcpy(camdbug + 1, mbuf, camdbug[0] = i);
|
|
}
|
|
}
|
|
|
|
for(rc = -1, account = cfg.account; (usr) && (account) && (rc < 0); account = account->next)
|
|
{
|
|
if(streq((char *)usr, account->usr) && streq((char *)pwd, account->pwd))
|
|
{
|
|
rc = cs_auth_client(cl, account, NULL);
|
|
}
|
|
}
|
|
|
|
if(!rc)
|
|
{
|
|
camd33_request_emm();
|
|
}
|
|
else
|
|
{
|
|
if(rc < 0)
|
|
{
|
|
cs_auth_client(cl, 0, usr ? "invalid account" : "no user given");
|
|
}
|
|
cs_disconnect_client(cl);
|
|
}
|
|
}
|
|
|
|
static void camd33_send_dcw(struct s_client *UNUSED(client), ECM_REQUEST *er)
|
|
{
|
|
uint8_t mbuf[128];
|
|
|
|
mbuf[0] = 2;
|
|
memcpy(mbuf + 1, &er->msgid, 4); // get pin
|
|
memcpy(mbuf + 5, er->cw, 16);
|
|
camd33_send(mbuf, 21);
|
|
|
|
if(!cfg.c33_passive)
|
|
{
|
|
camd33_request_emm();
|
|
}
|
|
}
|
|
|
|
static void camd33_process_ecm(uint8_t *buf, int32_t l)
|
|
{
|
|
ECM_REQUEST *er;
|
|
|
|
if(l < 7)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if(!(er = get_ecmtask()))
|
|
{
|
|
return;
|
|
}
|
|
|
|
memcpy(&er->msgid, buf + 3, 4); // save pin
|
|
er->ecmlen = l - 7;
|
|
|
|
if(er->ecmlen < 0 || er->ecmlen > MAX_ECM_SIZE)
|
|
{
|
|
NULLFREE(er);
|
|
return;
|
|
}
|
|
|
|
er->caid = b2i(2, buf + 1);
|
|
memcpy(er->ecm , buf + 7, er->ecmlen);
|
|
get_cw(cur_client(), er);
|
|
}
|
|
|
|
static void camd33_process_emm(uint8_t *buf, int32_t l)
|
|
{
|
|
EMM_PACKET epg;
|
|
|
|
if(l < 7)
|
|
{
|
|
return;
|
|
}
|
|
|
|
memset(&epg, 0, sizeof(epg));
|
|
epg.emmlen = l - 7;
|
|
|
|
if(epg.emmlen < 3 || epg.emmlen > MAX_EMM_SIZE)
|
|
{
|
|
return;
|
|
}
|
|
|
|
memcpy(epg.caid, buf + 1, 2);
|
|
memcpy(epg.hexserial, buf + 3, 4);
|
|
memcpy(epg.emm, buf + 7, epg.emmlen);
|
|
do_emm(cur_client(), &epg);
|
|
}
|
|
|
|
static void *camd33_server(struct s_client *UNUSED(client), uint8_t *mbuf, int32_t n)
|
|
{
|
|
switch(mbuf[0])
|
|
{
|
|
case 2:
|
|
camd33_process_ecm(mbuf, n);
|
|
break;
|
|
|
|
case 3:
|
|
camd33_process_emm(mbuf, n);
|
|
break;
|
|
|
|
default:
|
|
cs_log_dbg(D_CLIENT, "unknown command!");
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void camd33_server_init(struct s_client *UNUSED(client))
|
|
{
|
|
uint8_t camdbug[256];
|
|
|
|
camd33_auth_client(camdbug);
|
|
}
|
|
|
|
void module_camd33(struct s_module *ph)
|
|
{
|
|
cfg.c33_crypted = array_has_nonzero_byte(cfg.c33_key, sizeof(cfg.c33_key));
|
|
ph->ptab.nports = 1;
|
|
ph->ptab.ports[0].s_port = cfg.c33_port;
|
|
ph->desc = "camd33";
|
|
ph->type = MOD_CONN_TCP;
|
|
ph->large_ecm_support = 1;
|
|
ph->listenertype = LIS_CAMD33TCP;
|
|
IP_ASSIGN(ph->s_ip, cfg.c33_srvip);
|
|
ph->s_handler = camd33_server;
|
|
ph->s_init = camd33_server_init;
|
|
ph->recv = camd33_recv;
|
|
ph->send_dcw = camd33_send_dcw;
|
|
ph->num = R_CAMD33;
|
|
}
|
|
#endif
|