telnet_server.c 31 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057
  1. /*
  2. * telnet_server.c
  3. *
  4. * Created on: 24.11.2017
  5. * Author: balbekova
  6. */
  7. /* Standard includes. */
  8. #include <string.h>
  9. /* lwIP core includes */
  10. #include "lwip/opt.h"
  11. #include "lwip/sockets.h"
  12. /* FreeRTOS includes. */
  13. #include "FreeRTOS.h"
  14. #include "task.h"
  15. #include "fr_timers.h"
  16. /* Utils includes. */
  17. #include "FreeRTOS_CLI.h"
  18. #include "CLI_Commands.h"
  19. #include "telnet_server.h"
  20. #include "settings_api.h"
  21. #include "parameters.h"
  22. #include "control_symbol.h"
  23. #include "log.h"
  24. #include "web_params_api.h"
  25. #define ISO_nl 0x0a
  26. #define ISO_cr 0x0d
  27. //
  28. // States
  29. //
  30. #define STATE_NORMAL 0
  31. #define STATE_IAC 1
  32. #define STATE_OPT 2
  33. #define STATE_SB 3
  34. #define STATE_OPTDAT 4
  35. #define STATE_SE 5
  36. #define STATE_CLOSE 6
  37. //
  38. // Special telnet characters
  39. //
  40. #define TELNET_SE 240 // End of subnegotiation parameters
  41. #define TELNET_NOP 241 // No operation
  42. #define TELNET_MARK 242 // Data mark
  43. #define TELNET_BRK 243 // Break
  44. #define TELNET_IP 244 // Interrupt process
  45. #define TELNET_AO 245 // Abort output
  46. #define TELNET_AYT 246 // Are you there
  47. #define TELNET_EC 247 // Erase character
  48. #define TELNET_EL 248 // Erase line
  49. #define TELNET_GA 249 // Go ahead
  50. #define TELNET_SB 250 // Start of subnegotiation parameters
  51. #define TELNET_WILL 251 // Will option code
  52. #define TELNET_WONT 252 // Won't option code
  53. #define TELNET_DO 253 // Do option code
  54. #define TELNET_DONT 254 // Don't option code
  55. #define TELNET_IAC 255 // Interpret as command
  56. //
  57. // Telnet options
  58. //
  59. #define TELOPT_TRANSMIT_BINARY 0 // Binary Transmission (RFC856)
  60. #define TELOPT_ECHO 1 // Echo (RFC857)
  61. #define TELOPT_SUPPRESS_GO_AHEAD 3 // Suppress Go Ahead (RFC858)
  62. #define TELOPT_STATUS 5 // Status (RFC859)
  63. #define TELOPT_TIMING_MARK 6 // Timing Mark (RFC860)
  64. #define TELOPT_NAOCRD 10 // Output Carriage-Return Disposition (RFC652)
  65. #define TELOPT_NAOHTS 11 // Output Horizontal Tab Stops (RFC653)
  66. #define TELOPT_NAOHTD 12 // Output Horizontal Tab Stop Disposition (RFC654)
  67. #define TELOPT_NAOFFD 13 // Output Formfeed Disposition (RFC655)
  68. #define TELOPT_NAOVTS 14 // Output Vertical Tabstops (RFC656)
  69. #define TELOPT_NAOVTD 15 // Output Vertical Tab Disposition (RFC657)
  70. #define TELOPT_NAOLFD 16 // Output Linefeed Disposition (RFC658)
  71. #define TELOPT_EXTEND_ASCII 17 // Extended ASCII (RFC698)
  72. #define TELOPT_TERMINAL_TYPE 24 // Terminal Type (RFC1091)
  73. #define TELOPT_NAWS 31 // Negotiate About Window Size (RFC1073)
  74. #define TELOPT_TERMINAL_SPEED 32 // Terminal Speed (RFC1079)
  75. #define TELOPT_TOGGLE_FLOW_CONTROL 33 // Remote Flow Control (RFC1372)
  76. #define TELOPT_LINEMODE 34 // Linemode (RFC1184)
  77. #define TELOPT_DISPLAY_POS 35 // Linemode (RFC1184)
  78. #define TELOPT_AUTHENTICATION 37 // Authentication (RFC1416)
  79. #define TELOPT_NEW_ENV_OPTION 39 // Authentication (RFC1416)
  80. //Sub option for LINEMODE
  81. #define LINEMODE_MODE 1
  82. #define LINEMODE_EDIT 1
  83. #define LINEMODE_TRAPSIG 2
  84. #define LINEMODE_MODE_ACK 4
  85. #define LINEMODE_SOFT_TAB 8
  86. #define LINEMODE_LIT_ECHO 16
  87. #define LINEMODE_FORWARDMASK 2
  88. #define LINEMODE_SLC 3
  89. #define LINEMODE_SLC_SYNCH 1
  90. #define LINEMODE_SLC_BRK 2
  91. #define LINEMODE_SLC_IP 3
  92. #define LINEMODE_SLC_AO 4
  93. #define LINEMODE_SLC_AYT 5
  94. #define LINEMODE_SLC_EOR 6
  95. #define LINEMODE_SLC_ABORT 7
  96. #define LINEMODE_SLC_EOF 8
  97. #define LINEMODE_SLC_SUSP 9
  98. #define LINEMODE_SLC_EC 10
  99. #define LINEMODE_SLC_EL 11
  100. #define LINEMODE_SLC_EW 12
  101. #define LINEMODE_SLC_RP 13
  102. #define LINEMODE_SLC_LNEXT 14
  103. #define LINEMODE_SLC_XON 15
  104. #define LINEMODE_SLC_XOFF 16
  105. #define LINEMODE_SLC_FORW1 17
  106. #define LINEMODE_SLC_FORW2 18
  107. #define LINEMODE_SLC_MCL 19
  108. #define LINEMODE_SLC_MCR 20
  109. #define LINEMODE_SLC_MCWL 21
  110. #define LINEMODE_SLC_MCWR 22
  111. #define LINEMODE_SLC_MCBOL 23
  112. #define LINEMODE_SLC_MCEOL 24
  113. #define LINEMODE_SLC_INSRT 25
  114. #define LINEMODE_SLC_OVER 26
  115. #define LINEMODE_SLC_ECR 27
  116. #define LINEMODE_SLC_EWR 28
  117. #define LINEMODE_SLC_EBOL 29
  118. #define LINEMODE_SLC_EEOL 30
  119. #define LINEMODE_SLC_DEFAULT 3
  120. #define LINEMODE_SLC_VALUE 2
  121. #define LINEMODE_SLC_CANTCHANGE 1
  122. #define LINEMODE_SLC_NOSUPPORT 0
  123. #define LINEMODE_SLC_LEVELBITS 3
  124. #define LINEMODE_SLC_ACK 128
  125. #define LINEMODE_SLC_FLUSHIN 64
  126. #define LINEMODE_SLC_FLUSHOUT 32
  127. #define LINEMODE_EOF 236
  128. #define LINEMODE_SUSP 237
  129. #define LINEMODE_ABORT 238
  130. /* Repeat Login timeout, 1 seconds */
  131. #define REPEAT_SENSOR_INFO_TIME configTICK_RATE_HZ*5*1
  132. /* Set option to drop old connection if the new one is accepted */
  133. #define TCP_DROP_PREV_CONNECTION 0
  134. /**
  135. * A telnet connection structure.
  136. */
  137. typedef struct{
  138. TimerHandle_t RepeatSensorInfoTimer;
  139. uint8_t state;
  140. uint8_t code;
  141. char buf[cmdMAX_INPUT_SIZE];
  142. char bufptr;
  143. char prev_cmd[cmdMAX_INPUT_SIZE];
  144. unsigned char optdata[cmdMAX_INPUT_SIZE];
  145. uint8_t optlen;
  146. state_telnet_server_t telnetState;
  147. user_level_t telnet_code_auth;
  148. char login[MAX_WEB_LOGIN_LEN];
  149. uint8_t login_err;
  150. uint8_t num_connect;
  151. bool active_conn;
  152. bool flag_telnet_ip_option;
  153. }telnetd_state_t;
  154. static portBASE_TYPE FreeRTOS_CLIAuthProcess( int8_t * pcWriteBuffer, telnetd_state_t *s );
  155. static portBASE_TYPE FreeRTOS_ChangePWDProcess( int8_t * pcWriteBuffer, telnetd_state_t *s );
  156. void SensorInfoTimerCallback(TimerHandle_t pxTimer);
  157. state_telnet_server_t telnetState = TELNET_AUTH;
  158. uint8_t id_change_pwd = 0;
  159. user_level_t telnet_code_auth = USER;
  160. telnetd_state_t auth_tlnt_srvr_param[NUMBER_TELNET_CONNECT];
  161. uint8_t type_term = 0;
  162. static int32_t lSocket;
  163. static int8_t *pcOutputString;
  164. static bool flagTelnetChange = false;
  165. static struct fd_set master_set, read_set, write_set;
  166. static int max_sd;
  167. static struct sockaddr_in sa;
  168. const int8_t * const pcWarningMessage = ( const int8_t * ) "Количество соединенений превышено. Данное соединение будет закрыто\r\n";
  169. #ifdef HARDWARE_BT6708
  170. const int8_t * const pcWelcomeMessage = ( const int8_t * ) "BT6708 command server - connection accepted.\r\nlogin:";
  171. #else
  172. const int8_t * const pcWelcomeMessage = ( const int8_t * ) "BT6706 command server - connection accepted.\r\nlogin:";
  173. #endif
  174. static const int8_t * const pcEndOfCommandOutputString = ( int8_t * ) "\r\n[Нажмите клавишу ENTER для повторного выполнения предыдущей команды]\r\n>";
  175. /**
  176. * @brief Общая структура настроек
  177. */
  178. extern SETTINGS_t sSettings;
  179. /*-----------------------------------------------------------------------------------*/
  180. /**
  181. * Close a telnet session.
  182. *
  183. * This function can be called from a telnet command in order to close
  184. * the connection.
  185. *
  186. * \param s The connection which is to be closed.
  187. *
  188. */
  189. /*-----------------------------------------------------------------------------------*/
  190. void
  191. telnetd_close(telnetd_state_t *s)
  192. {
  193. s->state = STATE_CLOSE;
  194. }
  195. static void telnetd_input(telnetd_state_t *s)
  196. {
  197. portBASE_TYPE xReturned;
  198. switch(s->telnetState){
  199. case TELNET_AUTH:
  200. case TELNET_AUTH_PASSW:
  201. if(FreeRTOS_CLIAuthProcess(pcOutputString, s)){
  202. send( s->num_connect, pcOutputString, strlen( ( const char * ) pcOutputString ), 0 );
  203. memset( s->buf, 0x00, cmdMAX_INPUT_SIZE );
  204. }
  205. else{
  206. s->state = STATE_CLOSE;
  207. }
  208. break;
  209. case TELNET_CMD:
  210. /* The input string has been terminated. Was the
  211. input a quit command? */
  212. if( strcmp( "quit", ( const char * ) s->buf ) == 0 )
  213. {
  214. s->state = STATE_CLOSE;
  215. }
  216. else
  217. {
  218. /* The input string was not a quit command.
  219. Pass the string to the command interpreter. */
  220. /* See if the command is empty, indicating that the last command is
  221. to be executed again. */
  222. if( s->bufptr == 0 )
  223. {
  224. if(s->flag_telnet_ip_option ){
  225. s->flag_telnet_ip_option = false;
  226. return;
  227. }
  228. else{
  229. strcpy( s->buf, s->prev_cmd );
  230. }
  231. }
  232. /* Transmit a line separator, just to make the
  233. output easier to read. */
  234. lwip_send( s->num_connect, "\r\n", strlen( "\r\n" ), 0 );
  235. do
  236. {
  237. /* Ensure there is not a string lingering in
  238. the output buffer. */
  239. pcOutputString[ 0 ] = 0x00;
  240. telnetState = s->telnetState;
  241. xReturned = FreeRTOS_CLIProcessCommand( s->buf, pcOutputString, configCOMMAND_INT_MAX_OUTPUT_SIZE );
  242. s->telnetState = telnetState;
  243. send( s->num_connect, pcOutputString, strlen( ( const char * ) pcOutputString ), 0 );
  244. } while( xReturned != pdFALSE );
  245. if( strcmp( "sensor info", ( const char * ) s->buf ) == 0 ){
  246. strcpy( s->prev_cmd, s->buf );
  247. memset( s->buf, 0x00, cmdMAX_INPUT_SIZE );
  248. xTimerStart(s->RepeatSensorInfoTimer, 0);
  249. }
  250. else{
  251. /* All the strings generated by the input
  252. command have been sent. Clear the input
  253. string ready to receive the next command.
  254. Remember the command that was just processed
  255. first in case it is to be processed again. */
  256. strcpy( s->prev_cmd, s->buf );
  257. memset( s->buf, 0x00, cmdMAX_INPUT_SIZE );
  258. if(s->telnetState != TELNET_CHANGE_PWD)
  259. send( s->num_connect, pcEndOfCommandOutputString, strlen( ( const char * ) pcEndOfCommandOutputString ), 0 );
  260. }
  261. }
  262. break;
  263. case TELNET_CHANGE_PWD:
  264. case TELNET_CHANGE_PWD_ACK:
  265. FreeRTOS_ChangePWDProcess(pcOutputString, s);
  266. send( s->num_connect, pcOutputString, strlen( ( const char * ) pcOutputString ), 0 );
  267. memset( s->buf, 0x00, cmdMAX_INPUT_SIZE );
  268. break;
  269. }
  270. }
  271. /*-----------------------------------------------------------------------------------*/
  272. static void getchar(telnetd_state_t *s)
  273. {
  274. if(type_term == 1 && s->telnetState != TELNET_AUTH_PASSW){
  275. if(s->buf[s->bufptr] != 0x03 && s->buf[s->bufptr] != 0x7f){
  276. send( s->num_connect, &s->buf[s->bufptr], 1, 0 );
  277. }
  278. }
  279. else if(s->telnetState == TELNET_AUTH_PASSW){
  280. send( s->num_connect, " ", 1, 0 );
  281. }
  282. if(s->buf[s->bufptr] == ISO_nl ||
  283. s->buf[s->bufptr] == 0) {
  284. s->bufptr = 0;
  285. return;
  286. }
  287. if(s->buf[s->bufptr] == ISO_cr ||
  288. s->bufptr == sizeof(s->buf) - 1) {
  289. if(s->bufptr > 0) {
  290. s->buf[s->bufptr] = 0;
  291. }
  292. telnetd_input(s);
  293. s->bufptr = 0;
  294. } else if( s->buf[s->bufptr] == '\b' || s->buf[s->bufptr] == 0x7f)
  295. {
  296. /* Backspace was pressed. Erase the last
  297. character in the string - if any. */
  298. s->buf[s->bufptr] = '\0';
  299. if( s->bufptr > 0 )
  300. {
  301. s->bufptr--;
  302. s->buf[s->bufptr] = '\0';
  303. }
  304. }
  305. else if (s->buf[s->bufptr] == 0x03){
  306. xTimerStop(s->RepeatSensorInfoTimer, 0);
  307. s->flag_telnet_ip_option = true;
  308. if(s->telnetState != TELNET_CHANGE_PWD && s->telnetState != TELNET_CHANGE_PWD_ACK)
  309. send( s->num_connect, pcEndOfCommandOutputString, strlen( ( const char * ) pcEndOfCommandOutputString ), 0 );
  310. }
  311. else {
  312. ++s->bufptr;
  313. }
  314. }
  315. /*-----------------------------------------------------------------------------------*/
  316. static void sendopt(telnetd_state_t *s, u8_t code, u8_t option)
  317. {
  318. unsigned char buf[3];
  319. buf[0] = TELNET_IAC;
  320. buf[1] = code;
  321. buf[2] = option;
  322. send( s->num_connect, buf, 3, 0 );
  323. }
  324. static void sendsubopt(telnetd_state_t *s, u8_t code, u8_t *option, u8_t len)
  325. {
  326. unsigned char buf[cmdMAX_INPUT_SIZE+3];
  327. buf[0] = TELNET_IAC;
  328. buf[1] = TELNET_SB;
  329. buf[2] = code;
  330. memcpy(&buf[3], option, len);
  331. buf[len + 3] = TELNET_IAC;
  332. buf[len + 4] = TELNET_SE;
  333. send( s->num_connect, buf, (len + 5), 0 );
  334. }
  335. void parseopt(telnetd_state_t *ts, uint8_t code, uint8_t option)
  336. {
  337. switch (option) {
  338. case TELOPT_ECHO:
  339. if (code == TELNET_WONT) {
  340. type_term = 0;
  341. }
  342. else if (code == TELNET_WILL ){
  343. type_term = 1;
  344. }
  345. break;
  346. case TELOPT_SUPPRESS_GO_AHEAD:
  347. case TELOPT_LINEMODE:
  348. case TELOPT_NAWS:
  349. case TELOPT_DISPLAY_POS:
  350. case TELOPT_NEW_ENV_OPTION:
  351. case TELOPT_TERMINAL_SPEED:
  352. case TELOPT_TERMINAL_TYPE:
  353. case TELOPT_STATUS:
  354. case TELOPT_TOGGLE_FLOW_CONTROL:
  355. break;
  356. case TELOPT_TIMING_MARK:
  357. xTimerStop(ts->RepeatSensorInfoTimer, 0);
  358. ts->flag_telnet_ip_option = true;
  359. sendopt(ts, TELNET_WILL, TELOPT_TIMING_MARK);
  360. sendopt(ts, TELNET_MARK, 0);
  361. if(ts->telnetState != TELNET_CHANGE_PWD && ts->telnetState != TELNET_CHANGE_PWD_ACK)
  362. send( ts->num_connect, pcEndOfCommandOutputString, strlen( ( const char * ) pcEndOfCommandOutputString ), 0 );
  363. break;
  364. default:
  365. if (code == TELNET_WILL || code == TELNET_WONT) {
  366. sendopt(ts, TELNET_DONT, option);
  367. } else {
  368. sendopt(ts, TELNET_WONT, option);
  369. }
  370. break;
  371. }
  372. }
  373. static void parseoptdat(telnetd_state_t *ts, int option, unsigned char *data, uint8_t len) {
  374. uint8_t subopt = 0;
  375. uint8_t subopt_val = 0;
  376. uint8_t sub_opt_data[2] = {LINEMODE_MODE, LINEMODE_EDIT};
  377. switch (option) {
  378. case TELOPT_NAWS:
  379. break;
  380. case TELOPT_TERMINAL_SPEED:
  381. break;
  382. case TELOPT_TERMINAL_TYPE:
  383. break;
  384. case TELOPT_LINEMODE:
  385. subopt = data[0];
  386. switch (subopt) {
  387. case LINEMODE_SLC:
  388. if(data[2] & LINEMODE_SLC_ACK){
  389. return;
  390. }
  391. sendsubopt(ts, option, sub_opt_data, 2);
  392. for(uint8_t i = 1; i < len; i += 3){
  393. subopt_val = data[i];
  394. switch (subopt_val) {
  395. case LINEMODE_SLC_IP:
  396. data[i+1] = LINEMODE_SLC_VALUE | LINEMODE_SLC_FLUSHIN | LINEMODE_SLC_FLUSHOUT | LINEMODE_SLC_ACK;
  397. break;
  398. case LINEMODE_SLC_XON:
  399. case LINEMODE_SLC_XOFF:
  400. case LINEMODE_SLC_EC:
  401. data[i+1] = LINEMODE_SLC_VALUE | LINEMODE_SLC_ACK;
  402. break;
  403. default:
  404. data[i+1] = LINEMODE_SLC_NOSUPPORT;
  405. data[i+2] = 0;
  406. break;
  407. }
  408. }
  409. sendsubopt(ts, option, data, len);
  410. break;
  411. }
  412. break;
  413. }
  414. }
  415. /*-----------------------------------------------------------------------------------*/
  416. static void newdata(telnetd_state_t *s)
  417. {
  418. char c;
  419. c = s->buf[s->bufptr];
  420. switch(s->state) {
  421. case STATE_IAC:
  422. switch (c) {
  423. case TELNET_IAC:
  424. s->state = STATE_NORMAL;
  425. break;
  426. case TELNET_WILL:
  427. case TELNET_WONT:
  428. case TELNET_DO:
  429. case TELNET_DONT:
  430. s->code = c;
  431. s->state = STATE_OPT;
  432. break;
  433. case TELNET_SB:
  434. s->state = STATE_SB;
  435. break;
  436. default:
  437. s->state = STATE_NORMAL;
  438. break;
  439. }
  440. break;
  441. case STATE_OPT:
  442. parseopt(s, s->code, c);
  443. s->state = STATE_NORMAL;
  444. break;
  445. case STATE_SB:
  446. s->code = c;
  447. s->optlen = 0;
  448. s->state = STATE_OPTDAT;
  449. break;
  450. case STATE_OPTDAT:
  451. if (c == TELNET_SE && s->optdata[s->optlen-1] == TELNET_IAC) {
  452. parseoptdat(s, s->code, s->optdata, (s->optlen-1));
  453. s->state = STATE_NORMAL;
  454. //s->state = STATE_SE;
  455. } else if (s->optlen < sizeof(s->optdata)) {
  456. s->optdata[s->optlen++] = c;
  457. }
  458. break;
  459. /*case STATE_SE:
  460. if (c == TELNET_SE) parseoptdat(s, s->code, s->optdata, s->optlen);
  461. s->state = STATE_NORMAL;
  462. break;*/
  463. case STATE_NORMAL:
  464. if(c == TELNET_IAC) {
  465. s->state = STATE_IAC;
  466. } else {
  467. getchar(s);
  468. }
  469. break;
  470. }
  471. }
  472. /*-----------------------------------------------------------*/
  473. /* Stop server */
  474. static void stop_server(void) {
  475. /* Clean up all of the sockets that are open */
  476. for (int i = 0; i <= max_sd; ++i)
  477. {
  478. if (FD_ISSET(i, &master_set)) {
  479. DBG printf("Close sock %d\n", i);
  480. closesocket(i);
  481. FD_CLR(i, &master_set);
  482. }
  483. }
  484. DBG printf("Portgw stopped\n");
  485. }
  486. /* Start server */
  487. static bool start_server(uint16_t port)
  488. {
  489. int res;
  490. lSocket = socket(PF_INET, SOCK_STREAM, 0);
  491. if (lSocket < 0) {
  492. DBG printf("Socket create failed\r\n");
  493. return false;
  494. }
  495. res = fcntl(lSocket, F_SETFL, O_NONBLOCK);
  496. if (res < 0) {
  497. DBG printf("fcntl() failed");
  498. closesocket(lSocket);
  499. return false;
  500. }
  501. memset(&sa, 0, sizeof(struct sockaddr_in));
  502. sa.sin_family = AF_INET;
  503. sa.sin_addr.s_addr = IPADDR_ANY;
  504. sa.sin_port = htons(port);
  505. if (bind(lSocket, (struct sockaddr *)&sa, sizeof(sa)) == -1)
  506. {
  507. DBG printf("Bind to port %d failed\n", port);
  508. closesocket(lSocket);
  509. return false;
  510. }
  511. res = listen(lSocket, 20);
  512. if (res < 0) {
  513. DBG printf("Listen failed failed\r\n");
  514. closesocket(lSocket);
  515. return false;
  516. }
  517. FD_ZERO(&master_set);
  518. max_sd = lSocket;
  519. FD_SET(lSocket, &master_set);
  520. DBG printf("Port %d opened\n", port);
  521. return true;
  522. }
  523. void vBasicSocketsCommandInterpreterTask( void *pvParameters )
  524. {
  525. int32_t lBytes, lAddrLen = sizeof( struct sockaddr_in );
  526. struct sockaddr_in sLocalAddr;
  527. struct sockaddr_in client_addr;
  528. int new_sd;
  529. int desc_ready, rc;
  530. struct timeval timeout;
  531. uint16_t port;
  532. bool enabled;
  533. bool firstrun = true;
  534. #ifdef HARDWARE_BT6708
  535. struct sockaddr_in sa_temp;
  536. socklen_t len;
  537. #endif
  538. static int active_sd = -1;
  539. static uint8_t cnt_conn = 0;
  540. uint8_t cur_cnt = 0;
  541. FD_ZERO(&master_set);
  542. timeout.tv_sec = 5;
  543. timeout.tv_usec = 0;
  544. ( void ) pvParameters;
  545. pcOutputString = FreeRTOS_CLIGetOutputBuffer();
  546. enabled = sSettings.sTelnet.TelnetEnable;
  547. port = ( uint16_t ) sSettings.sTelnet.port;
  548. while (1) {
  549. /* Check if network settings was changed */
  550. if ((sSettings.sTelnet.port != port) ||
  551. (sSettings.sTelnet.TelnetEnable != enabled) ||
  552. (firstrun))
  553. {
  554. if (!firstrun || sSettings.sTelnet.port != port) {
  555. /* Stop server */
  556. stop_server();
  557. }
  558. if (sSettings.sTelnet.TelnetEnable) {
  559. /* (Re)start server */
  560. if (!start_server(sSettings.sTelnet.port)) {
  561. DBG printf("Server start error\n");
  562. firstrun = true;
  563. vTaskDelay(5000);
  564. continue;
  565. }
  566. }
  567. else {
  568. /* Obtain the address of the output buffer. Note there is no mutual
  569. exclusion on this buffer as it is assumed only one command console
  570. interface will be used at any one time. */
  571. firstrun = true;
  572. vTaskDelay(5000);
  573. continue;
  574. }
  575. firstrun = false;
  576. port = sSettings.sTelnet.port;
  577. enabled = sSettings.sTelnet.TelnetEnable;
  578. }
  579. if (!enabled) {
  580. firstrun = true;
  581. vTaskDelay(5000);
  582. continue;
  583. }
  584. memcpy(&read_set, &master_set, sizeof(master_set));
  585. DBG printf("Waiting on select()...\n");
  586. rc = select(max_sd + 1, &read_set, NULL, NULL, &timeout);
  587. DBG printf(" select() returned %d\n", rc);
  588. if (rc < 0) {
  589. DBG printf(" select() failed\n");
  590. }
  591. if (rc == 0) {
  592. DBG printf(" select() timed out.\n");
  593. }
  594. /* One or more descriptors are readable. Need to \
  595. * determine which ones they are. */
  596. desc_ready = rc;
  597. for (int i=0; i <= max_sd && desc_ready > 0; ++i) {
  598. /*******************************************************/
  599. /* Check to see if this descriptor is ready */
  600. /*******************************************************/
  601. if (FD_ISSET(i, &read_set)) {
  602. /* A descriptor was found that was readable - one \
  603. * less has to be looked for. This is being done \
  604. * so that we can stop looking at the working set \
  605. * once we have found all of the descriptors that \
  606. * were ready. */
  607. desc_ready -= 1;
  608. /* Check to see if this is the listening socket */
  609. if (i == lSocket) {
  610. DBG printf(" Listening socket is readable\n");
  611. /* Accept all incoming connections that are */
  612. /* queued up on the listening socket before we */
  613. /* loop back and call select again. */
  614. do {
  615. /* Accept each incoming connection. If */
  616. /* accept fails with EWOULDBLOCK, then we */
  617. /* have accepted all of them. Any other */
  618. /* failure on accept will cause us to end the */
  619. /* server. */
  620. new_sd = accept(lSocket, NULL, NULL);
  621. if (new_sd < 0) {
  622. if (errno != EWOULDBLOCK) {
  623. DBG printf(" accept() failed\n");
  624. }
  625. break;
  626. }
  627. /* Add the new incoming connection to the */
  628. /* master read set */
  629. printf(" New incoming connection - %d\n", new_sd);
  630. FD_SET(new_sd, &master_set);
  631. if (new_sd > max_sd) {
  632. max_sd = new_sd;
  633. }
  634. #ifdef HARDWARE_BT6708
  635. lwip_getpeername(new_sd, &sa_temp, &len);
  636. #endif
  637. // recv( new_sd, &auth_tlnt_srvr_param[cur_cnt].buf, 27, 0 );
  638. // Send initial options
  639. if(cnt_conn < NUMBER_TELNET_CONNECT){
  640. for(uint8_t k = 0; k < NUMBER_TELNET_CONNECT; k ++){
  641. if(auth_tlnt_srvr_param[k].active_conn == false){
  642. auth_tlnt_srvr_param[k].active_conn = true;
  643. auth_tlnt_srvr_param[k].num_connect = new_sd;
  644. auth_tlnt_srvr_param[k].telnetState = TELNET_AUTH;
  645. auth_tlnt_srvr_param[k].state = STATE_NORMAL;
  646. while(recv( new_sd, &auth_tlnt_srvr_param[k].buf[auth_tlnt_srvr_param[k].bufptr], 1, MSG_DONTWAIT ) > 0){
  647. newdata(&auth_tlnt_srvr_param[k]);
  648. vTaskDelay(10);
  649. }
  650. sendopt(&auth_tlnt_srvr_param[k], TELNET_DO, TELOPT_SUPPRESS_GO_AHEAD);
  651. sendopt(&auth_tlnt_srvr_param[k], TELNET_DO, TELOPT_LINEMODE);
  652. sendopt(&auth_tlnt_srvr_param[k], TELNET_DO, TELOPT_ECHO);
  653. vTaskDelay(50);
  654. while(recv( new_sd, &auth_tlnt_srvr_param[k].buf[auth_tlnt_srvr_param[k].bufptr], 1, MSG_DONTWAIT ) > 0){
  655. newdata(&auth_tlnt_srvr_param[k]);
  656. vTaskDelay(5);
  657. }
  658. send( new_sd, pcWelcomeMessage, strlen( ( const char * ) pcWelcomeMessage ), 0 );
  659. break;
  660. }
  661. }
  662. cnt_conn ++;
  663. }
  664. else{
  665. send( new_sd, pcWarningMessage, strlen( ( const char * ) pcWarningMessage ), 0 );
  666. closesocket(new_sd);
  667. FD_CLR(new_sd, &master_set);
  668. while (FD_ISSET(max_sd, &master_set) == false) {
  669. max_sd -= 1;
  670. }
  671. }
  672. #if TCP_DROP_PREV_CONNECTION
  673. /* Close previous active connection */
  674. if (active_sd != -1 && active_sd != new_sd) {
  675. DBG printf(" Close prev active connection %d\n", active_sd);
  676. close(active_sd);
  677. FD_CLR(active_sd, &master_set);
  678. if (active_sd == max_sd) {
  679. while (FD_ISSET(max_sd, &master_set) == false) {
  680. max_sd -= 1;
  681. }
  682. }
  683. }
  684. /* Mark new connection as active */
  685. active_sd = new_sd;
  686. DBG printf(" New active connection %d\n", active_sd);
  687. #endif
  688. /* Loop back up and accept another incoming */
  689. /* connection */
  690. } while (new_sd != -1);
  691. }
  692. /* This is not the listening socket, therefore an */
  693. /* existing connection must be readable */
  694. else {
  695. DBG printf(" Descriptor %d is readable\n", i);
  696. for(cur_cnt = 0; cur_cnt < NUMBER_TELNET_CONNECT; cur_cnt ++){
  697. if(auth_tlnt_srvr_param[cur_cnt].num_connect == i){
  698. telnetState = auth_tlnt_srvr_param[cur_cnt].telnetState;
  699. telnet_code_auth = auth_tlnt_srvr_param[cur_cnt].telnet_code_auth;
  700. switch (telnet_code_auth) {
  701. case ADMIN:
  702. snprintf(name_login_telnet, sizeof(name_login_telnet), "Администратор");
  703. break;
  704. case USER:
  705. snprintf(name_login_telnet, sizeof(name_login_telnet), "Пользователь");
  706. break;
  707. default:
  708. break;
  709. }
  710. break;
  711. }
  712. }
  713. /* Receive data on this connection until the */
  714. /* recv fails with EWOULDBLOCK. If any other */
  715. /* failure occurs, we will close the */
  716. /* connection. */
  717. if ((lBytes = recv(i, &auth_tlnt_srvr_param[cur_cnt].buf[auth_tlnt_srvr_param[cur_cnt].bufptr], 1, 0 )) > 0) {
  718. newdata(&auth_tlnt_srvr_param[cur_cnt]);
  719. }
  720. if (lBytes < 0) {
  721. if (errno != EWOULDBLOCK){
  722. DBG printf(" recv() failed\n");
  723. auth_tlnt_srvr_param[cur_cnt].state = STATE_CLOSE;
  724. }
  725. }
  726. /* Check to see if the connection has been */
  727. /* closed by the client */
  728. if (lBytes == 0) {
  729. DBG printf(" Connection closed\n");
  730. auth_tlnt_srvr_param[cur_cnt].state = STATE_CLOSE;
  731. }
  732. /* If the close_conn flag was turned on, we need */
  733. /* to clean up this active connection. This */
  734. /* clean up process includes removing the */
  735. /* descriptor from the master set and */
  736. /* determining the new maximum descriptor value */
  737. /* based on the bits that are still turned on in */
  738. /* the master set. */
  739. if (auth_tlnt_srvr_param[cur_cnt].state == STATE_CLOSE) {
  740. memset(auth_tlnt_srvr_param[cur_cnt].buf, 0, cmdMAX_INPUT_SIZE);
  741. memset(auth_tlnt_srvr_param[cur_cnt].prev_cmd, 0, cmdMAX_INPUT_SIZE);
  742. memset(auth_tlnt_srvr_param[cur_cnt].optdata, 0, cmdMAX_INPUT_SIZE);
  743. auth_tlnt_srvr_param[cur_cnt].optlen = 0;
  744. auth_tlnt_srvr_param[cur_cnt].state = STATE_NORMAL;
  745. auth_tlnt_srvr_param[cur_cnt].num_connect = 0;
  746. auth_tlnt_srvr_param[cur_cnt].active_conn = false;
  747. auth_tlnt_srvr_param[cur_cnt].telnetState = TELNET_AUTH;
  748. auth_tlnt_srvr_param[cur_cnt].telnet_code_auth = USER;
  749. auth_tlnt_srvr_param[cur_cnt].flag_telnet_ip_option = false;
  750. xTimerStop(auth_tlnt_srvr_param[cur_cnt].RepeatSensorInfoTimer, 0);
  751. cnt_conn -= 1;
  752. closesocket(i);
  753. FD_CLR(i, &master_set);
  754. if (i == max_sd) {
  755. while (FD_ISSET(max_sd, &master_set) == false) {
  756. max_sd -= 1;
  757. }
  758. }
  759. }
  760. }
  761. }
  762. }
  763. }
  764. }
  765. void telnet_server_init(void) {
  766. for(uint8_t i = 0; i < NUMBER_TELNET_CONNECT; i++){
  767. memset(auth_tlnt_srvr_param[i].buf, 0, cmdMAX_INPUT_SIZE);
  768. memset(auth_tlnt_srvr_param[i].prev_cmd, 0, cmdMAX_INPUT_SIZE);
  769. memset(auth_tlnt_srvr_param[i].optdata, 0, cmdMAX_INPUT_SIZE);
  770. auth_tlnt_srvr_param[i].optlen = 0;
  771. auth_tlnt_srvr_param[i].num_connect = 0;
  772. auth_tlnt_srvr_param[i].active_conn = false;
  773. auth_tlnt_srvr_param[i].telnetState = TELNET_AUTH;
  774. auth_tlnt_srvr_param[i].telnet_code_auth = USER;
  775. auth_tlnt_srvr_param[i].flag_telnet_ip_option = false;
  776. auth_tlnt_srvr_param[i].RepeatSensorInfoTimer = xTimerCreate("SensorInfoTmr", REPEAT_SENSOR_INFO_TIME, pdFALSE, ( void * ) i, SensorInfoTimerCallback);
  777. }
  778. vRegisterCLICommands();
  779. xTaskCreate(vBasicSocketsCommandInterpreterTask, ( char * ) "vBasicSocketsCommandInterpreterTask", 8*configMINIMAL_STACK_SIZE , NULL, tskIDLE_PRIORITY + 1, NULL);
  780. }
  781. void SensorInfoTimerCallback(TimerHandle_t pxTimer) {
  782. portBASE_TYPE xReturned = pdTRUE;
  783. uint8_t num_timer;
  784. for(uint8_t i = 0; i < NUMBER_TELNET_CONNECT; i ++){
  785. if(pxTimer == auth_tlnt_srvr_param[i].RepeatSensorInfoTimer){
  786. num_timer = i;
  787. break;
  788. }
  789. }
  790. do
  791. {
  792. /* Ensure there is not a string lingering in
  793. the output buffer. */
  794. pcOutputString[ 0 ] = 0x00;
  795. xReturned = FreeRTOS_CLIProcessCommand( "sensor info", pcOutputString, configCOMMAND_INT_MAX_OUTPUT_SIZE );
  796. send( auth_tlnt_srvr_param[num_timer].num_connect, pcOutputString, strlen( ( const char * ) pcOutputString ), 0 );
  797. } while( xReturned != pdFALSE );
  798. xTimerStart(auth_tlnt_srvr_param[num_timer].RepeatSensorInfoTimer, 0);
  799. }
  800. static portBASE_TYPE FreeRTOS_CLIAuthProcess( int8_t * pcWriteBuffer, telnetd_state_t *s )
  801. {
  802. portBASE_TYPE xReturn = pdTRUE;
  803. uint32_t len;
  804. uint8_t valueLen, user_id;
  805. char WebPassword[MAX_WEB_PASSWD_LEN];
  806. char WebLogin[MAX_WEB_LOGIN_LEN];
  807. char password[cmdMAX_INPUT_SIZE] = { 0 };
  808. const int8_t * const pcPSWHeader = ( int8_t * ) "\r\npassword:";
  809. const int8_t * const pcLoginHeader = ( int8_t * ) "\r\nlogin:";
  810. memset(pcWriteBuffer, 0, configCOMMAND_INT_MAX_OUTPUT_SIZE);
  811. switch(s->telnetState){
  812. case TELNET_AUTH:
  813. memset(s->login, 0, MAX_WEB_LOGIN_LEN);
  814. len = strlen(s->buf);
  815. if(len < MAX_WEB_LOGIN_LEN){
  816. strncpy(s->login, s->buf, len);
  817. sendopt(s, TELNET_WILL, TELOPT_ECHO);
  818. strncpy( ( char * ) pcWriteBuffer, ( const char * ) pcPSWHeader, strlen( ( char * ) pcPSWHeader ) );
  819. s->telnetState = TELNET_AUTH_PASSW;
  820. xReturn = pdTRUE;
  821. }
  822. else{
  823. xReturn = pdFALSE;
  824. }
  825. break;
  826. case TELNET_AUTH_PASSW:
  827. sendopt(s, TELNET_WONT, TELOPT_ECHO);
  828. memset(name_login_telnet, 0, 50);
  829. memset(password, 0, MAX_WEB_PASSWD_LEN);
  830. len = strlen(s->buf);
  831. strncpy(password, s->buf, len);
  832. for (user_id = 0; user_id < MAX_WEB_USERS; user_id++) {
  833. GetUserLogin(user_id, WebLogin, &valueLen);
  834. GetUserPassword(user_id, WebPassword, &valueLen);
  835. /* Check login and password */
  836. if ((strncmp(WebLogin, s->login, MAX_WEB_LOGIN_LEN) == 0) &&
  837. (strncmp(WebPassword, password, MAX_WEB_PASSWD_LEN) == 0)) {
  838. /* Login and pass are valid */
  839. s->telnet_code_auth = user_id;
  840. s->login_err = 0;
  841. strcpy( ( char * ) pcWriteBuffer, "\r\nАвторизация успешно пройдена\r\n>" );
  842. s->telnetState = TELNET_CMD;
  843. switch (user_id) {
  844. case 0:
  845. snprintf(name_login_telnet, sizeof(name_login_telnet), "Администратор");
  846. break;
  847. case 1:
  848. snprintf(name_login_telnet, sizeof(name_login_telnet), "Пользователь");
  849. break;
  850. default:
  851. break;
  852. }
  853. log_event_data(LOG_LOGIN_TELNET, name_login_telnet);
  854. xReturn = pdTRUE;
  855. break;
  856. }
  857. else{
  858. xReturn = pdFALSE;
  859. }
  860. }
  861. break;
  862. default:
  863. xReturn = pdFALSE;
  864. s->telnetState = TELNET_AUTH;
  865. return xReturn;
  866. break;
  867. }
  868. if(xReturn == pdFALSE){
  869. s->telnetState = TELNET_AUTH;
  870. if(s->login_err < 4){
  871. s->login_err ++;
  872. strcpy( ( char * ) pcWriteBuffer, "\r\nОшибка авторизации\r\n" );
  873. strncat( ( char * ) pcWriteBuffer, ( const char * ) pcLoginHeader, strlen( ( char * ) pcLoginHeader ) );
  874. xReturn = pdTRUE;
  875. }
  876. else{
  877. s->login_err = 0;
  878. xReturn = pdFALSE;
  879. }
  880. }
  881. return xReturn;
  882. }
  883. static portBASE_TYPE FreeRTOS_ChangePWDProcess( int8_t * pcWriteBuffer, telnetd_state_t *s )
  884. {
  885. portBASE_TYPE xReturn = pdTRUE;
  886. uint32_t len;
  887. static char password[ MAX_WEB_PASSWD_LEN ] = { 0 };
  888. char password2[ MAX_WEB_PASSWD_LEN ] = { 0 };
  889. const int8_t * const pcNewPSWHeader = ( int8_t * ) "\r\nВведите повторно новый пароль:";
  890. memset(pcWriteBuffer, 0, configCOMMAND_INT_MAX_OUTPUT_SIZE);
  891. len = strlen(s->buf);
  892. if(s->telnetState == TELNET_CHANGE_PWD){
  893. memset(password, 0, MAX_WEB_PASSWD_LEN);
  894. if(len >= MAX_WEB_PASSWD_LEN){
  895. strcpy( ( char * ) pcWriteBuffer, "\r\nОшибка при вводе нового пароля\r\n>" );
  896. s->telnetState = TELNET_CMD;
  897. }
  898. else{
  899. if(!control_string_en_digit(s->buf, len)){
  900. strcpy( ( char * ) pcWriteBuffer, "\r\nОшибка при вводе нового пароля\r\n>" );
  901. s->telnetState = TELNET_CMD;
  902. }
  903. else{
  904. strncpy(password, s->buf, len);
  905. strncpy( ( char * ) pcWriteBuffer, ( const char * ) pcNewPSWHeader, strlen( ( char * ) pcNewPSWHeader ) );
  906. s->telnetState = TELNET_CHANGE_PWD_ACK;
  907. }
  908. }
  909. }
  910. else{
  911. s->telnetState = TELNET_CHANGE_PWD;
  912. memset(password2, 0, cmdMAX_INPUT_SIZE);
  913. if(len >= MAX_WEB_LOGIN_LEN){
  914. strcpy( ( char * ) pcWriteBuffer, "\r\nОшибка при вводе нового пароля\r\n>" );
  915. s->telnetState = TELNET_CMD;
  916. }
  917. else{
  918. strncpy(password2, s->buf, len);
  919. if (strncmp(password, password2, MAX_WEB_PASSWD_LEN) == 0) {
  920. memcpy(sSettings.sAuth[id_change_pwd].password, password, 11);
  921. telnet_act = true;
  922. HTTP_SaveSettings();
  923. log_event_data(LOG_PSW_CHANGE, name_login_telnet);
  924. strcpy( ( char * ) pcWriteBuffer, "\r\nПароль успешно изменен\r\n>" );
  925. s->telnetState = TELNET_CMD;
  926. xReturn = pdTRUE;
  927. }
  928. else{
  929. strcpy( ( char * ) pcWriteBuffer, "\r\nОшибка при вводе нового пароля\r\n>" );
  930. s->telnetState = TELNET_CMD;
  931. }
  932. }
  933. }
  934. return xReturn;
  935. }