summaryrefslogtreecommitdiff
path: root/anyrtpproxy/commandHandler.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'anyrtpproxy/commandHandler.cpp')
-rw-r--r--anyrtpproxy/commandHandler.cpp200
1 files changed, 200 insertions, 0 deletions
diff --git a/anyrtpproxy/commandHandler.cpp b/anyrtpproxy/commandHandler.cpp
new file mode 100644
index 0000000..cac5c4b
--- /dev/null
+++ b/anyrtpproxy/commandHandler.cpp
@@ -0,0 +1,200 @@
+/*
+ * anytun
+ *
+ * The secure anycast tunneling protocol (satp) defines a protocol used
+ * for communication between any combination of unicast and anycast
+ * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel
+ * mode and allows tunneling of every ETHER TYPE protocol (e.g.
+ * ethernet, ip, arp ...). satp directly includes cryptography and
+ * message authentication based on the methodes used by SRTP. It is
+ * intended to deliver a generic, scaleable and secure solution for
+ * tunneling and relaying of packets of any protocol.
+ *
+ *
+ * Copyright (C) 2007 anytun.org <satp@wirdorange.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2
+ * as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program (see the file COPYING included with this
+ * distribution); if not, write to the Free Software Foundation, Inc.,
+ * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ */
+
+#include <sstream>
+#include <vector>
+
+#include <iomanip>
+#include <iostream>
+
+#include "commandHandler.h"
+#include "../buffer.h"
+#include "../log.h"
+
+#define MAX_COMMAND_LENGTH 1000
+
+CommandHandler::CommandHandler(u_int16_t lp) : running_(true), control_sock_(lp), local_address_("0.0.0.0"), local_port_(lp)
+{
+ pthread_create(&thread_, NULL, run, this);
+}
+
+CommandHandler::CommandHandler(string la, u_int16_t lp) : running_(true), control_sock_(la, lp), local_address_(la), local_port_(lp)
+{
+ pthread_create(&thread_, NULL, run, this);
+}
+
+CommandHandler::~CommandHandler()
+{
+ pthread_cancel(thread_);
+ pthread_join(thread_, NULL);
+}
+
+void* CommandHandler::run(void* s)
+{
+ CommandHandler* self = reinterpret_cast<CommandHandler*>(s);
+
+ Buffer buf(u_int32_t(MAX_COMMAND_LENGTH));
+ try
+ {
+ string remote_host;
+ u_int16_t remote_port;
+
+ int len;
+ while(1)
+ {
+ buf.setLength(MAX_COMMAND_LENGTH);
+ len = self->control_sock_.recvFrom(buf.getBuf(), buf.getLength(), remote_host, remote_port);
+ buf.setLength(len);
+
+ std::string ret = self->handle(std::string(reinterpret_cast<char*>(buf.getBuf()), buf.getLength())); // TODO: reinterpret is ugly
+
+ cLog.msg(Log::PRIO_DEBUG) << "CommandHandler received Command from " << remote_host << ":" << remote_port
+ << ", ret='" << ret << "'";
+
+ self->control_sock_.sendTo(ret.c_str(), ret.length(), remote_host, remote_port);
+ }
+ }
+ catch(SocketException &e)
+ {
+ self->running_ = false;
+ pthread_exit(NULL);
+ }
+ self->running_ = false;
+ pthread_exit(NULL);
+}
+
+bool CommandHandler::isRunning()
+{
+ return running_;
+}
+
+
+
+std::string CommandHandler::handle(std::string command)
+{
+ istringstream iss(command);
+ ostringstream oss;
+ std::string cookie;
+ std::string cmd;
+
+ iss >> cookie;
+ oss << cookie << " ";
+
+ if(iss.bad() || iss.eof()) {
+ oss << RET_ERR_SYNTAX;
+ return oss.str();
+ }
+ iss >> cmd;
+
+ std::vector<std::string> params;
+ while(!iss.bad() && !iss.eof()) {
+ std::string tmp;
+ iss >> tmp;
+ params.push_back(tmp);
+ }
+
+ std::string ret;
+ switch(std::toupper(cmd[0]))
+ {
+ case CMD_REQUEST:
+ if(params.size() < 4) { ret = RET_ERR_SYNTAX; break; }
+ ret = handleRequest(cmd.erase(0,1), params[0], params[1], params[2], params[3], (params.size() < 5) ? "" : params[4]);
+ break;
+ case CMD_RESPONSE:
+ if(params.size() < 4) { ret = RET_ERR_SYNTAX; break; }
+ ret = handleResponse(cmd.erase(0,1), params[0], params[1], params[2], params[3], (params.size() < 5) ? "" : params[4]);
+ break;
+ case CMD_DELETE:
+ if(params.size() < 2) { ret = RET_ERR_SYNTAX; break; }
+ return handleDelete(params[0], params[1], (params.size() < 3) ? "" : params[2]);
+ case CMD_VERSION:
+ if(cmd.length() > 1 && cmd[1] == 'F') {
+ if(params.size() < 1) { ret = RET_ERR_SYNTAX; break; }
+ ret = handleVersionF(params[0]);
+ break;
+ }
+ ret = handleVersion();
+ break;
+ case CMD_INFO:
+ ret = handleInfo();
+ break;
+ default:
+ ret = RET_ERR_SYNTAX;
+ break;
+ }
+
+ oss << ret;
+ return oss.str();
+}
+
+string CommandHandler::handleRequest(string modifiers, string call_id, string addr, string port, string from_tag, string to_tag)
+{
+ std::cout << "received request[" << modifiers << "] command ('" << call_id << "','" << addr << "','" << port
+ << "','" << from_tag << "','" << to_tag << "')" << std::endl;
+
+ return RET_OK;
+}
+
+string CommandHandler::handleResponse(string modifiers, string call_id, string addr, string port, string from_tag, string to_tag)
+{
+ std::cout << "received response[" << modifiers << "] command ('" << call_id << "','" << addr << "','" << port
+ << "','" << from_tag << "','" << to_tag << "')" << std::endl;
+
+ return RET_OK;
+}
+
+string CommandHandler::handleDelete(string call_id, string from_tag, string to_tag)
+{
+ std::cout << "received delete command ('" << call_id << "','" << from_tag << "','" << to_tag << "')" << std::endl;
+
+ return RET_OK;
+}
+
+string CommandHandler::handleVersion()
+{
+ std::cout << "received version command" << std::endl;
+ return BASE_VERSION;
+}
+
+string CommandHandler::handleVersionF(string date_code)
+{
+ std::cout << "received version[F] command ('" << date_code << "')" << std::endl;
+ if(!date_code.compare(SUP_VERSION))
+ return "1";
+
+ return "0";
+}
+
+string CommandHandler::handleInfo()
+{
+ std::cout << "received info command" << std::endl;
+ return RET_OK;
+}
+