1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
|
/*
* ServerConnection.cpp
*
* Copyright (C) 2008 Matthias Schiffer <matthias@gamezock.de>
*
* This program is free software: you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
* See the GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "ServerConnection.h"
#include "FdManager.h"
#include "IPAddress.h"
#include <cstring>
#include <cerrno>
#include <sys/socket.h>
#include <fcntl.h>
namespace Mad {
namespace Net {
void ServerConnection::connectionHeaderReceiveHandler(const void *data, unsigned long length) {
if(length != sizeof(ConnectionHeader))
// Error... disconnect
return;
const ConnectionHeader *header = (const ConnectionHeader*)data;
if(header->m != 'M' || header->a != 'A' || header->d != 'D')
// Error... disconnect
return;
if(header->protVerMin > 1 || header->protVerMax < 1)
// Unsupported protocol... disconnect
return;
if(header->type == 'C')
daemon = false;
else if(header->type == 'D')
daemon = true;
else
// Error... disconnect
return;
ConnectionHeader header2 = {'M', 'A', 'D', 0, 0, 1, 1, 0};
rawSend((uint8_t*)&header2, sizeof(header2));
enterReceiveLoop();
}
ServerConnection::ServerConnection(int sock0, const IPAddress &address, gnutls_dh_params_t dh_params, const std::string &x905CertFile, const std::string &x905KeyFile)
: daemon(false) {
sock = sock0;
peer = new IPAddress(address);
gnutls_certificate_set_dh_params(x509_cred, dh_params);
gnutls_certificate_set_x509_key_file(x509_cred, x905CertFile.c_str(), x905KeyFile.c_str(), GNUTLS_X509_FMT_PEM);
gnutls_init(&session, GNUTLS_SERVER);
gnutls_set_default_priority(session);
gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred);
gnutls_transport_set_ptr(session, (gnutls_transport_ptr_t)sock);
FdManager::get()->registerFd(sock, sigc::mem_fun(this, &Connection::sendReceive));
handshake();
}
}
}
|