/*
|
* proxyserver.c
|
*
|
* Created on: Oct 9, 2016
|
* Author: JKM
|
*/
|
#include <sys/socket.h>
|
#include <sys/types.h>
|
#include <netinet/in.h>
|
#include <netdb.h>
|
#include <arpa/inet.h>
|
#include <pthread.h>
|
#include <sys/time.h>
|
#include <fcntl.h>
|
//#include "/usr/include/mysql/mysql.h"
|
#include <stdio.h>
|
#include <stdlib.h>
|
#include <unistd.h>
|
#include <sys/io.h>
|
#include <errno.h>
|
#include <sys/stat.h>
|
#include <signal.h>
|
|
#include "MD5Linux.h"
|
|
#define MAX_NUM 16
|
#define MAX 1024
|
#define fileread_buf 128
|
typedef struct{
|
int m_id;
|
char serverIP[32];
|
char serverport[10];
|
char port[10];
|
char ip[32];
|
char user[64];
|
char pass[64];
|
int reboot;
|
}sockinfo,*lpsockinfo;
|
pthread_t thread_no[MAX_NUM];
|
pthread_t thread_noEQ[MAX_NUM];
|
pthread_t thread_Real[MAX_NUM];
|
sockinfo equipments[16];
|
int sock_upper[16],sock_down[16];
|
int rsock_down[16];
|
char byte_array[2600];
|
int bbbbb=0;
|
int CommandEquipIdx=0;
|
int CommandKind[16];
|
char sessionIDs[16][5];
|
|
char linkequip_ip[32];
|
char linkequip_port[10];
|
int focusServer=-1;
|
int focusEquip=-1;
|
|
int NUM=0,equip_num=0;
|
|
int SupperConnectedflag[16]={0,},EquipConnectedflag[16]={0,},serverflag=0,GPIO_flag=0;
|
int EquipRealAlarmConnectedflag[16];
|
timer_t* timerID;
|
|
int Read_MysqlData();
|
int UpdateMysqData(int key);
|
void* createServerthread(void* arg);
|
void* createEquipmentthread(void* arg);
|
void* MyEquipmentthread(void* arg);
|
|
|
int net_test(char* serverIP,char* port);
|
void EquipCheckGPIOOut(void);
|
void GPIOinit(void);
|
int GPIOoutput(int no);
|
int time_lock(int year,int month,int day,int hour,int min,int sec,int during);
|
|
int GPIO_OPEN(int PortNum);
|
void GPIO_CLOSE(int PortNum);
|
int GPIO_READ(int PortNum);
|
void GPIO_WRITE(int PortNum,unsigned char DATA);
|
int RealEventStart(int Idx);
|
int gCapturing[16];
|
char sessions[16][10];
|
|
int n=0,m=0,k=0;
|
unsigned char DownBuffer[16][614000];
|
int DownCount[16];
|
int gCount=0;
|
int gCount30s=0;
|
int gCount2s=0;
|
void zclock_sleep (int msecs);
|
|
void zclock_sleep (int msecs)
|
{
|
struct timespec t;
|
t.tv_sec = msecs / 1000;
|
t.tv_nsec = (msecs % 1000) * 1000000;
|
nanosleep (&t, NULL);
|
}
|
void u_alarm_handler(int)
|
{
|
//printf("connect fail==============");
|
|
}
|
void timer_handler(int signum)
|
{
|
int i,j;
|
|
////////////// added on 2016.11.8 //////////////////
|
gCount2s++;
|
if(gCount2s>=8){
|
gCount2s=0;
|
for(;CommandEquipIdx<16;CommandEquipIdx++){//connected
|
if(EquipConnectedflag[CommandEquipIdx]>0) break;
|
}
|
if(CommandEquipIdx>=16){
|
CommandEquipIdx = 0;
|
}
|
}
|
/////////////////////////////////////////////////////
|
gCount30s++;
|
if(gCount30s>=120){//4*30=30s
|
gCount30s=0;
|
if(NUM>0){
|
EquipCheckGPIOOut();//GPIO Watchdog_Timer
|
}
|
}
|
gCount++;
|
if(gCount>=4){//1s
|
gCount = 0;
|
Read_MysqlData();
|
equip_num=NUM;
|
//time_lock(2016,10,28,10,10,10,30);
|
}
|
//serverthread
|
for(i=0;i<NUM;i++){
|
for(j=0;j<i;j++) if(strcmp(equipments[i].serverIP,equipments[j].serverIP)==0 && strcmp(equipments[i].serverport,equipments[j].serverport)==0) break;
|
if(j<i)continue;
|
|
if(SupperConnectedflag[i]==0){
|
struct sockaddr_in servaddr;
|
int strlen1=sizeof(servaddr);
|
if(equipments[i].serverIP[0]!=0 && equipments[i].serverport[0]!=0) {
|
if((sock_upper[i]=socket(PF_INET,SOCK_STREAM,0))<0){
|
perror("socket fail1");
|
continue;
|
}
|
memset(&servaddr,0,strlen1);
|
servaddr.sin_family=AF_INET;
|
inet_pton(AF_INET,equipments[i].serverIP,&servaddr.sin_addr);
|
servaddr.sin_port=htons(atoi(equipments[i].serverport));
|
|
sigset(SIGALRM, u_alarm_handler);
|
alarm(2);
|
int rt = connect(sock_upper[i],(struct sockaddr*)&servaddr,strlen1);
|
alarm(0);
|
sigrelse(SIGALRM);
|
if(rt<0){
|
printf("server connect fail-%s:%s\n",equipments[i].serverIP,equipments[i].serverport);
|
close(sock_upper[i]);
|
continue;
|
}
|
SupperConnectedflag[i]=1;
|
printf("server connect Success=:%s:%s\n",equipments[i].serverIP,equipments[i].serverport);
|
pthread_create(&thread_no[i],NULL,&createServerthread,(void*)i);//super
|
}
|
}
|
}
|
//equipment thread
|
for(i=0;i<NUM;i++){
|
for(j=0;j<i;j++) if(strcmp(equipments[i].ip,equipments[j].ip)==0 && strcmp(equipments[i].port,equipments[j].port)==0) break;
|
if(j<i)continue;
|
if(EquipConnectedflag[i]==0){
|
if(equipments[i].ip[0]!=0 && equipments[i].port[0]!=0) {
|
struct sockaddr_in servaddr;
|
int strlen1=sizeof(servaddr);
|
if((sock_down[i]=socket(PF_INET,SOCK_STREAM,0))<0){
|
perror("socket fail2");
|
continue;
|
}
|
// printf("==============================3333\n");
|
memset(&servaddr,0,strlen1);
|
servaddr.sin_family=AF_INET;
|
inet_pton(AF_INET,equipments[i].ip,&servaddr.sin_addr);
|
servaddr.sin_port=htons(atoi(equipments[i].port));
|
|
sigset(SIGALRM, u_alarm_handler);//add 2016.11.22
|
alarm(2);
|
int rt = connect(sock_down[i],(struct sockaddr*)&servaddr,strlen1);
|
alarm(0);
|
sigrelse(SIGALRM);
|
if(rt<0){
|
printf("Equipment connect fail-%s:%s\n",equipments[i].ip,equipments[i].port);
|
close(sock_down[i]);
|
continue;
|
}
|
EquipConnectedflag[i]=1;
|
pthread_create(&thread_noEQ[i],NULL,&createEquipmentthread,(void*)i);//super(void*)(&equipments[0])
|
printf("equipment connect Success=:%s:%s\n",equipments[i].ip,equipments[i].port);
|
}
|
}
|
if(EquipRealAlarmConnectedflag[i]==0)
|
{////// added on 2017.11.21
|
//printf("Myequipment connect ==================:");
|
if(RealEventStart(i)==0) EquipRealAlarmConnectedflag[i]=1;
|
}
|
|
}
|
}
|
|
int main(int argc,char **argv)
|
{
|
struct sigaction sa;
|
struct itimerval timer;
|
linkequip_port[0]=0;
|
linkequip_ip[0]=0;
|
GPIOinit();
|
int i;
|
Read_MysqlData();
|
chmod("/etc/network/interfaces",0777);
|
chmod("/tmp/interfaces",0777);
|
|
for(i=0;i<NUM;i++) {
|
SupperConnectedflag[i]=0;
|
EquipConnectedflag[i]=0;
|
EquipRealAlarmConnectedflag[i]=0;
|
sock_upper[i]= -1;
|
sock_down[i] = -1;
|
rsock_down[i] = -1;
|
}
|
|
/*Install timer_handler as th siganl handler for SIGVTALRM */
|
memset(&sa,0,sizeof(sa));
|
sa.sa_handler=&timer_handler;
|
sigaction(SIGVTALRM,&sa,NULL);
|
/* Configure the timer to expire after 250msec..*/
|
timer.it_value.tv_sec=0;
|
timer.it_value.tv_usec=250000;
|
/*...and every 250 msec after that.*/
|
timer.it_interval.tv_sec=0;
|
timer.it_interval.tv_usec=250000;
|
/*Start a virtual timer.It counts down whenever this process is executing.*/
|
|
setitimer(ITIMER_VIRTUAL,&timer,NULL);
|
while(1);
|
|
}
|
|
//=================================================================
|
void* createServerthread(void* arg)
|
{
|
int sidx = (int)arg;
|
int length=0;
|
char buff[102400];
|
|
puts("Step.1 ========>Server Thread is strarted......");
|
unsigned char data[4096];
|
//=======================================equipment data================================
|
int idx=0;
|
int i;
|
data[idx++]=0x68;
|
data[idx++]=0x05;
|
for(i=0;i<NUM;i++){
|
data[idx++]=strlen(equipments[i].ip);
|
memcpy(&data[idx],equipments[i].ip,strlen(equipments[i].ip));idx+=strlen(equipments[i].ip);
|
data[idx++]=atoi(equipments[i].port)/256;
|
data[idx++]=atoi(equipments[i].port)%256;
|
data[idx++]=strlen(equipments[i].user);
|
memcpy(&data[idx],equipments[i].user,strlen(equipments[i].user));idx+=strlen(equipments[i].user);
|
data[idx++]=strlen(equipments[i].pass);
|
memcpy(&data[idx],equipments[i].pass,strlen(equipments[i].pass));idx+=strlen(equipments[i].pass);
|
}
|
data[idx++]=0x16;
|
write(sock_upper[sidx],&data,idx);//send to equipment;순환문
|
printf("Send equipment's info to Server OK! len=:%d\n",idx);
|
//=======================================data================================================
|
while(1)
|
{
|
int j;
|
length=read(sock_upper[sidx],&buff,sizeof(buff)-1);
|
printf("from Server received data===============:%d\n",length);
|
if(length<=0)
|
{
|
printf(" Upper Socket closed \n");
|
break;
|
}
|
else {
|
//====analysis
|
// if(buff[0]==0x68 && buff[1]==0x07) {
|
// focusServer =-1;
|
// printf("from Server received data===============:%d%d\n",buff[0],buff[1]);
|
// memcpy(buff,&buff[3],length-3);
|
// length-=3;
|
// if(length<=0) continue;
|
//}
|
|
if(buff[0]==0x68 && buff[1]==0x03 )
|
{
|
|
printf("=========================buffer=====%s\n",buff);
|
|
int index=buff[2];
|
char DownIP[32];
|
char Downport[10];
|
int result=-1;
|
memcpy(&DownIP[0],&buff[3],index);
|
int port=buff[index+3]*256+(unsigned char)buff[index+4];
|
sprintf(Downport,"%d",port);
|
if(buff[index+5]==0x16)
|
{
|
result=net_test(DownIP,Downport);
|
printf("Result=%s:%d:%d \n",DownIP,port,result);
|
if(result>0)
|
{
|
//response[0]=0x68;
|
//response[1]=0x03;
|
//response[2]=0x00;
|
//write(sock_upper[sidx],response,3);
|
focusServer = sidx;
|
for(j=0;j<NUM;j++) {
|
if(strcmp(DownIP,equipments[j].ip)==0 && strcmp(Downport,equipments[j].port)==0)
|
{
|
focusEquip = j;
|
break;
|
}
|
}
|
continue;
|
}
|
else{
|
//response[0]=0x68;
|
//response[1]=0x03;
|
//response[2]=0x01;
|
//write(sock_upper[sidx],response,3);
|
continue;
|
}
|
// memcpy(buff,&buff[index+6],length-(index+6));
|
// length-=index+6;
|
// if(length<=0) continue;
|
}
|
}
|
if(focusServer>=0)
|
{
|
if(focusEquip>=0 && sock_down[focusEquip]>0 ){
|
write(sock_down[focusEquip],buff,length);
|
printf("Directly down to Equipment data===============:%d\n",length);
|
}
|
else{
|
printf("Saved to Equipment data=========================:%d\n",length);
|
memcpy(DownBuffer[focusEquip],buff,length);//send to equipment;
|
DownCount[focusEquip] = length;
|
}
|
}
|
continue;
|
}
|
}
|
puts("Server Thread is stoped..");
|
close(sock_upper[sidx]);
|
sock_upper[sidx] = -1;
|
SupperConnectedflag[sidx]=0;//?
|
pthread_exit((void*)thread_no[sidx]);
|
}
|
|
void* createEquipmentthread(void* arg)
|
{
|
int eidx = (int)arg;
|
printf("Step.2 ===%d=====>Equipment Thread is strarted......\n",eidx);
|
|
int length=0;
|
char buff[102400];
|
while(1)
|
{
|
if(DownCount[eidx]>0) {
|
write(sock_down[eidx],DownBuffer[eidx],DownCount[eidx]);//?
|
printf("down to Equipment data=============:%d\n",DownCount[eidx]);
|
DownCount[eidx]=0;
|
}
|
memset(buff,0,sizeof(buff));
|
length=read(sock_down[eidx],&buff,sizeof(buff)-1);
|
if(length<=0)
|
{
|
printf(" Down Socket closed \n");
|
break;
|
}
|
else if(length>0){
|
if( focusServer>=0){
|
printf("Received data from Equipment length==========:%d\n",length);
|
if(sock_upper[focusServer] >0)
|
{
|
write(sock_upper[focusServer],buff,length);//send to equipment;
|
printf("send data to length Sever ===============:%d\n",length);
|
}
|
}
|
|
}
|
}
|
close(sock_down[eidx]);
|
sock_down[eidx]=-1;
|
puts("Equipment Thread is stoped..");
|
EquipConnectedflag[eidx]=0;
|
CommandKind[CommandEquipIdx]=0;
|
pthread_exit((void*)thread_noEQ[eidx]);
|
}
|
//=====================Reatime thread realstart=========================
|
void* MyEquipmentthread(void* arg)
|
{
|
int eidx = (int)arg;
|
printf("Step.3 ===%d=====>RealTimeEvent Thread is strarted......\n",eidx);
|
|
int length=0;
|
char buff[102400];
|
while(1)
|
{
|
memset(buff,0,sizeof(buff));
|
length=read(rsock_down[eidx],&buff,sizeof(buff)-1);
|
if(length<=0)
|
{
|
printf(" Down Socket closed \n");
|
break;
|
}
|
else if(length>0){
|
if(gCapturing[eidx]==1){
|
int k;
|
for(k=0;k<16;k++){
|
if(SupperConnectedflag[k]==1){
|
write(sock_upper[k],buff,strlen(buff));
|
printf("======>>>>>>>upper send length====%d======\n",strlen(buff));
|
printf("=============================================================\n");
|
//printf("%s",buff);
|
}
|
}
|
continue;
|
}
|
}
|
}
|
close(rsock_down[eidx]);
|
rsock_down[eidx]=-1;
|
EquipRealAlarmConnectedflag[eidx]=0;
|
puts("RealTimeEvent Thread is stoped..");
|
pthread_exit((void*)thread_Real[eidx]);
|
}
|
|
int Read_MysqlData()
|
{
|
static sockinfo equipments_config[1] = {
|
//{
|
// .m_id = 1,
|
// .ip = "192.168.1.5", // equipmentip (analizer)
|
// .port = "80", // equipmentport
|
// .user = "supervisor", // equipment username
|
// .pass = "supervisor", // equipment password
|
// .serverIP = "192.168.1.2", // serverip
|
// .serverport = "5015", // serverport
|
// .reboot = 0
|
//},
|
|
//{ .m_id = 1, .ip = "192.168.1.5", .port = "80", .user = "supervisor", .pass = "supervisor", .serverIP = "192.168.1.2", .serverport = "5015", .reboot = 0 },
|
};
|
|
equipments_config[0].m_id = 1;
|
strcpy(equipments_config[0].ip, "192.168.1.5");
|
strcpy(equipments_config[0].port, "80");
|
strcpy(equipments_config[0].user, "supervisor");
|
strcpy(equipments_config[0].pass, "supervisor");
|
strcpy(equipments_config[0].serverIP, "192.168.1.2");
|
strcpy(equipments_config[0].serverport, "5015");
|
equipments_config[0].reboot = 0;
|
|
memcpy(equipments, equipments_config, sizeof(equipments_config));
|
NUM = sizeof(equipments_config) / sizeof(sockinfo);
|
|
return 1;
|
}
|
|
/*
|
int Read_MysqlData(){
|
int ret=0;
|
MYSQL *conn;
|
MYSQL_RES *res;
|
MYSQL_ROW row;
|
char *server="localhost";
|
char *user="root";
|
char *password="123";
|
char *database="opentutorials";
|
if(!(conn=mysql_init((MYSQL*)NULL))){
|
printf("init fail\n");
|
exit(1);
|
}
|
if(!mysql_real_connect(conn,server,user,password,NULL,3306,NULL,0)){
|
printf("connect error.\n");
|
exit(1);
|
}
|
if(mysql_select_db(conn,database)!=0){
|
mysql_close(conn);
|
printf("select_db_fail.\n");
|
exit(1);
|
}
|
if(mysql_query(conn,"select * from tbl_deviceinfo")){
|
printf("query fail\n");
|
exit(1);
|
}
|
res=mysql_store_result(conn);
|
NUM=0;
|
while((row=mysql_fetch_row(res))!=NULL){
|
equipments[NUM].m_id=atoi(row[0]);//id
|
// printf("====%s:%s",row[0],row[11]); //sprintf(equipments[NUM].m_id,"%d",row[0]);
|
if(strcmp(equipments[NUM].ip,row[1])!=0) ret = 1;
|
if(strcmp(equipments[NUM].port,row[2])!=0) ret = 1;
|
if(strcmp(equipments[NUM].serverIP,row[3])!=0) ret = 1;
|
if(strcmp(equipments[NUM].serverport,row[4])!=0) ret = 1;
|
if(strcmp(equipments[NUM].pass,row[5])!=0) ret = 1;
|
if(strcmp(equipments[NUM].user,row[6])!=0) ret = 1;
|
|
|
memset(equipments[NUM].ip,0,32);
|
strcpy(equipments[NUM].ip,row[1]);//equipIP
|
memset(equipments[NUM].port,0,10);
|
strcpy(equipments[NUM].port,row[2]);//equipPort
|
|
memset(equipments[NUM].serverIP,0,32);
|
strcpy(equipments[NUM].serverIP,row[3]);//ServerIP
|
memset(equipments[NUM].serverport,0,10);
|
strcpy(equipments[NUM].serverport,row[4]);//ServerPort
|
|
memset(equipments[NUM].user,0,64);
|
strcpy(equipments[NUM].user,row[6]);//equipUser
|
memset(equipments[NUM].pass,0,64);
|
strcpy(equipments[NUM].pass,row[5]);//equipPass
|
|
equipments[NUM].reboot=atoi(row[11]);//reboot option.
|
NUM++;
|
}
|
mysql_close(conn);
|
puts("Step.0 ========>MySQL is getting ok");
|
return ret;
|
|
}
|
int UpdateMysqData(int key){
|
int ret=0;
|
MYSQL *conn;
|
char *server="localhost";
|
char *user="root";
|
char *password="123";
|
char *database="opentutorials";
|
char query[255];
|
puts("Step.0 ========>MySQL is getting......");
|
if(!(conn=mysql_init((MYSQL*)NULL))){
|
printf("init fail\n");
|
exit(1);
|
}
|
if(!mysql_real_connect(conn,server,user,password,NULL,3306,NULL,0)){
|
printf("connect error.\n");
|
exit(1);
|
}
|
if(mysql_select_db(conn,database)!=0){
|
mysql_close(conn);
|
printf("select_db_fail.\n");
|
exit(1);
|
}
|
sprintf(query,"UPDATE tbl_deviceinfo SET reboot=0 where id=%d",key);
|
if(mysql_query(conn,query)){
|
printf("query fail\n");
|
exit(1);
|
}
|
mysql_close(conn);
|
return ret;
|
|
}*/
|
|
int net_test(char* serverIP,char* port){
|
struct sockaddr_in servaddr;
|
int strlen=sizeof(servaddr);
|
int sockfdd;
|
if((sockfdd=socket(PF_INET,SOCK_STREAM,0))<0){
|
perror("socket fail");
|
close(sockfdd);
|
return -1;
|
}
|
memset(&servaddr,0,strlen);
|
servaddr.sin_family=AF_INET;
|
inet_pton(AF_INET,serverIP,&servaddr.sin_addr);
|
servaddr.sin_port=htons(atoi(port));
|
if(connect(sockfdd,(struct sockaddr*)&servaddr,strlen)<0){
|
// perror("connect fail-3");
|
close(sockfdd);
|
return -1;
|
}
|
close(sockfdd);
|
return 1;
|
}
|
void GPIOinit(void)
|
{
|
int retVal = -1;
|
int PortNum = 0xA06;
|
unsigned char wVal = 0x15;
|
retVal = GPIO_OPEN(PortNum);
|
printf("GPIO OPEN RES = %d \n",retVal);
|
GPIO_WRITE(PortNum,wVal);
|
printf("GPIO WRITE VALUE = 0x%X \n", wVal);
|
|
retVal = GPIO_READ(PortNum);
|
printf("GPIO READ VALUE 02 = 0x%X \n",retVal);
|
|
GPIO_CLOSE(PortNum);
|
}
|
int GPIOoutput(int no)
|
{
|
int PortNum = 0xA06;
|
switch(no){
|
case 0:
|
GPIO_WRITE(PortNum,0x15);
|
return 0;
|
case 1:
|
GPIO_WRITE(PortNum,0x57);
|
return 0;
|
case 2:
|
GPIO_WRITE(PortNum,0x5D);
|
return 0;
|
case 3:
|
GPIO_WRITE(PortNum,0x5F);
|
return 0;
|
case 4:
|
GPIO_WRITE(PortNum,0x75);
|
return 0;
|
case 5:
|
GPIO_WRITE(PortNum,0x77);
|
return 0;
|
case 6:
|
GPIO_WRITE(PortNum,0x7D);
|
return 0;
|
case 7:
|
GPIO_WRITE(PortNum,0x7F);
|
return 0;
|
case 8:
|
GPIO_WRITE(PortNum,0xD5);
|
return 0;
|
case 9:
|
GPIO_WRITE(PortNum,0xD7);
|
return 0;
|
case 10:
|
GPIO_WRITE(PortNum,0xDD);
|
return 0;
|
case 11:
|
GPIO_WRITE(PortNum,0xDF);
|
return 0;
|
case 12:
|
GPIO_WRITE(PortNum,0xF5);
|
return 0;
|
case 13:
|
GPIO_WRITE(PortNum,0xF7);
|
return 0;
|
case 14:
|
GPIO_WRITE(PortNum,0xFD);
|
return 0;
|
case 15:
|
GPIO_WRITE(PortNum,0xFF);
|
return 0;
|
}
|
return -1;
|
}
|
int GPIO_OPEN(int PortNum)
|
{
|
return ioperm(PortNum, 0x01, 0x01);
|
}
|
|
void GPIO_CLOSE(int PortNum)
|
{
|
ioperm(PortNum, 0x01, 0x00);
|
}
|
|
int GPIO_READ(int PortNum)
|
{
|
return inb(PortNum);
|
}
|
|
void GPIO_WRITE(int PortNum,unsigned char DATA)
|
{
|
outb(DATA,PortNum);
|
}
|
|
void EquipCheckGPIOOut(void)
|
{
|
|
int PortNum = 0xA06;
|
int i;
|
int retVal;
|
int result;
|
printf("Step.3 ========>GPIO manupulation===> AnalyEquipmentNum=%d \n",equip_num);
|
for(i=0;i<equip_num;i++)
|
{
|
retVal = -1;
|
result=-1;
|
printf("=============================:%d \n",equipments[i].reboot);
|
result=net_test(equipments[i].ip,equipments[i].port);
|
if(result<0)
|
{
|
printf("Equipment(%d) check=%s:%s\n",i+1,equipments[i].ip,equipments[i].port);
|
retVal = GPIO_OPEN(PortNum);
|
if(retVal == 0)
|
{
|
retVal = GPIOoutput(i+1);
|
if(retVal==0) printf("GPIO output OK! \n");
|
GPIO_CLOSE(PortNum);
|
}
|
else printf("GPIO OPEN FAIL! \n");
|
}
|
else printf("Equipment(%d) Check Success!=%s:%s\n",i+1,equipments[i].ip,equipments[i].port);
|
}
|
}
|
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
/////////////////////////// added on 2016.11.21
|
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
int memorycmp(unsigned char* src ,int slen, char* token, int len)
|
{
|
int start=0,k,i,klen=strlen(token);
|
lp1:
|
for(i=start;i<slen;i++) if(src[i]==token[0]) break;
|
if (i>=slen) return -1;
|
k=i;
|
for(i=0;i<klen;i++)
|
{
|
if(src[k+i]!=token[i])
|
{
|
start=k+i;
|
goto lp1;
|
}
|
}
|
if(i>=klen) return k;
|
return -1;
|
}
|
int stringcmp(char* src ,char* token, int len)
|
{
|
int start=0,k,i,slen=strlen(src);
|
lp:
|
for(i=start;i<slen;i++) if(src[i]==token[0]) break;
|
if (i>=slen) return -1;
|
k=i;
|
for(i=0;i<len;i++)
|
{
|
if(src[k+i]!=token[i])
|
{
|
start=k+i;
|
goto lp;
|
}
|
}
|
if(i>=len) return k;
|
return -1;
|
}
|
|
void AurhorizationResponseBytesReal(char* byte_array_out,int * byte_array_length_out,char *Myuri, char *nonce,const char *cnonce,char *response)
|
{
|
// Authorization: Digest username="supervisor", realm="VideoIQ", nonce="n99u1VYBAABAf0HT+h92EO4hT2CzmfxG", uri="/PSIA/VIQ/Event/metadata/0/files", response="7d8d929e39655ad9f3e6e94e9004792e", qop=auth, nc=00000001, cnonce="0d2175d8cdb63f84f18894200e129ace", algorithm="MD5"
|
int idx=0,len;
|
idx = sprintf(byte_array_out,"%s","Authorization: Digest username=");
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s","supervisor");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s",",realm=");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s","VideoIQ");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s",",nonce=");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx], "%s",nonce);idx+=len;//"n99u1VYBAABAf0HT+h92EO4hT2CzmfxG"
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s",",uri=");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s",Myuri);idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s",",algorithm=");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s","MD5");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s",",cnonce=");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s",cnonce);idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s",",nc=00000001,qop=");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s","auth");idx+=len;//cnonce
|
byte_array_out[idx++]=0x22;//'"'
|
|
len = sprintf(&byte_array_out[idx],"%s",",response=");idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
len = sprintf(&byte_array_out[idx],"%s",response);idx+=len;
|
byte_array_out[idx++]=0x22;//'"'
|
*byte_array_length_out = idx;
|
}
|
int CharToByte(char* chars, char* bytes, unsigned int count,char* ptr1,char* ptr2,char* ptr3,char* ptr4,unsigned char* number){
|
int p=0;
|
int n=0;
|
int i=0;
|
unsigned char temp;
|
for(i = 0; i < count; i++)
|
{
|
temp = (unsigned char)chars[i];
|
if (p==1)
|
{
|
if (temp!=0x22)
|
{
|
bytes[n++]=(unsigned char)chars[i];
|
}
|
}
|
if (temp==0x22)
|
{
|
p=p+1;
|
}
|
if (p==2)
|
{
|
bytes[n++]=0x2C;
|
p=0;
|
}
|
|
}
|
char* token=NULL;
|
char s[]=",";
|
token=strtok(bytes,s);
|
number[0]=strlen(token);
|
memcpy(ptr1,token,strlen(token));
|
int nn=0;
|
while(token!=NULL)
|
{
|
token=strtok(NULL,s);
|
nn=nn+1;
|
if (nn==1)
|
{
|
number[1]=strlen(token);
|
memcpy(ptr2,token,strlen(token));
|
}
|
if (nn==2)
|
{
|
//ptr3=new char[strlen(token)];
|
number[2]=strlen(token);
|
memcpy(ptr3,token,strlen(token));
|
}
|
if (nn==3)
|
{
|
if(token!=NULL)
|
{
|
number[3]=strlen(token);
|
memcpy(ptr4,token,strlen(token));
|
}//ptr3=new char[strlen(token)];
|
|
}
|
}
|
return n;
|
}
|
//for real event
|
void MakeAuthorizedPacketReal(char* buff,int length, char* Method,char* uri,int Idx)
|
{
|
char Device[150] ;
|
char Realm_buf1[512] ;
|
char nonce_buf2[512] ;
|
char auth_buf3[512] ;
|
char domain_buf4[512] ;
|
unsigned char len[4];
|
|
memset(Device,0,150);
|
memset(domain_buf4,0,512);
|
|
CharToByte((char*)buff, Device, length,Realm_buf1,nonce_buf2,auth_buf3,domain_buf4, len);
|
const char* cnonce_buf="163acd0e58793a190f29ee879d4b224f";//"08a9d86c1b5e45963cf82f43dca59c51";
|
Realm_buf1[len[0]]=0;
|
nonce_buf2[len[1]]=0;
|
auth_buf3[len[2]]=0;
|
const char* nc="00000001";
|
//CString qop;qop=auth_buf3;/////////////////////////////
|
char User[200];
|
memset(User,0,200);
|
sprintf(User,"%s:%s:%s",equipments[Idx].user,Realm_buf1,equipments[Idx].pass);
|
|
char urii[200];
|
int kk=sprintf(urii,"%s:%s",Method,uri);//PUT:/PSIA/System/reboot";
|
urii[kk]=0;
|
char* A1 = MDString(User);
|
char AA1[33];
|
memset(AA1,0,33);
|
memcpy(AA1,A1,strlen(A1));
|
char* A2 = MDString(urii);
|
char AA2[33];
|
memset(AA2,0,33);
|
memcpy(AA2,A2,strlen(A2));
|
char rrr[200];
|
memset(rrr,0,200);
|
sprintf(rrr,"%s:%s:%s:%s:auth:%s",AA1,nonce_buf2,nc,cnonce_buf,AA2);
|
// printf("%s:%s:%s:%s:auth:%s\n",AA1,nonce_buf2,nc,cnonce_buf,AA2);
|
char* response = MDString(rrr);
|
char res[33];
|
memset(res,0,33);
|
memcpy(res,response,strlen(response));
|
|
//// 第二次 发送
|
char byte_arrayxxx[2600];
|
int lengthxxx = 0;
|
int iidx = 0;
|
AurhorizationResponseBytesReal(byte_arrayxxx,&lengthxxx,uri,nonce_buf2,cnonce_buf,res);
|
|
int llen = sprintf(byte_array,"%s %s HTTP/1.1\r\n",Method,uri); iidx+=llen;
|
llen = sprintf(&byte_array[iidx],"Content-Type: text/xml\r\n"); iidx+=llen;
|
strncpy(&byte_array[iidx],byte_arrayxxx,lengthxxx); iidx+=lengthxxx;
|
byte_array[iidx]=0x0d; iidx+=1;
|
byte_array[iidx]=0x0a; iidx+=1;
|
llen = sprintf(&byte_array[iidx],"Host: %s\r\n",equipments[Idx].ip); iidx+=llen;
|
llen = sprintf(&byte_array[iidx],"Content-Length: 0\r\n"); iidx+=llen;
|
// llen = sprintf(&byte_array[iidx],"%s","Connection: Keep_Alive\r\n"); iidx+=llen;
|
byte_array[iidx]=0x0d; iidx+=1;
|
byte_array[iidx]=0x0a; iidx+=1;
|
byte_array[iidx]=0;
|
|
}
|
|
//// 功能:开始查看实时监控
|
//// 输入:分析器IP,用户,密码
|
//// 输出:0(成功), -1(初始化失败),-2(连接失败)
|
int RealEventStart(int Idx)
|
{
|
|
char buff[10240];
|
int bbbb=0;
|
if(equipments[Idx].ip==NULL || equipments[Idx].ip[0]==0) return -1;
|
|
struct sockaddr_in servaddr;
|
int strlen1=sizeof(servaddr);
|
if((rsock_down[Idx]=socket(PF_INET,SOCK_STREAM,0))<0){
|
perror("socket fail2");
|
return -1;
|
}
|
memset(&servaddr,0,strlen1);
|
servaddr.sin_family=AF_INET;
|
inet_pton(AF_INET,equipments[Idx].ip,&servaddr.sin_addr);
|
servaddr.sin_port=htons(atoi(equipments[Idx].port));
|
|
sigset(SIGALRM, u_alarm_handler);//add 2016.11.22
|
alarm(2);
|
int rt = connect(rsock_down[Idx],(struct sockaddr*)&servaddr,strlen1);
|
alarm(0);
|
sigrelse(SIGALRM);
|
if(rt<0){
|
printf("Equipment connect fail-%s:%s\n",equipments[Idx].ip,equipments[Idx].port);
|
close(rsock_down[Idx]);
|
return -1;
|
}
|
|
int length = 0;
|
length = sprintf(byte_array,"POST /PSIA/VIQ/System/sessions/permanent HTTP/1.1\r\nContent-Type: text/xml\r\nHost: %s\r\nContent-Length: 0\r\nConnection: Keep-Alive\r\n\r\n",equipments[Idx].ip);
|
write(rsock_down[Idx],byte_array,length);
|
printf("%s",byte_array);
|
while(1){
|
memset(buff,0,sizeof(buff));
|
sigset(SIGALRM, u_alarm_handler);//add 2016.11.22
|
alarm(2);
|
length=read(rsock_down[Idx],&buff,sizeof(buff));
|
alarm(0);
|
sigrelse(SIGALRM);
|
printf("Myequipment connect ==================length =%d:\n",length);
|
if(length<=0)
|
{
|
close(rsock_down[Idx]);
|
return -1;
|
}
|
if(memorycmp((unsigned char*)buff,length, "WWW-Authenticate:",17)>0 && bbbb==0)
|
{
|
// analyse reception
|
MakeAuthorizedPacketReal(buff,length,"POST","/PSIA/VIQ/System/sessions/permanent",Idx);
|
zclock_sleep(100);
|
write(rsock_down[Idx],byte_array,strlen(byte_array));
|
// printf("%s\n",(char*)byte_array);
|
bbbb=1;
|
continue;
|
}
|
if(bbbb==1){
|
int sidx = stringcmp((char*)buff,"<urn:id>",8);
|
if(sidx >=0){//<urn:ViqDateTimeInterval urn:version="1.0" xmlns:urn="urn:videoiq-com"><urn:startTime urn:version="1.0"><urn:date>2016-08-18T01:07:20.749</urn:date><urn:offset>0</urn:offset></urn:startTime><urn:endTime urn:version="1.0"><urn:date>2016-08-29T08:33:48.231</urn:date><urn:offset>0</urn:offset></urn:endTime></urn:ViqDateTimeInterval>
|
int eidx = stringcmp((char*)buff,"</urn:id>",9);
|
if(eidx>=0 && sidx+8<eidx){
|
memcpy(sessions[Idx],&buff[sidx+8],eidx-sidx-8);
|
bbbb=2;
|
printf("SessionID =======> %s\n",(char*)sessions[Idx]);
|
break;
|
}
|
}
|
}
|
}
|
close(rsock_down[Idx]);
|
|
if((rsock_down[Idx]=socket(PF_INET,SOCK_STREAM,0))<0){
|
perror("socket fail2");
|
return -1;
|
}
|
memset(&servaddr,0,strlen1);
|
servaddr.sin_family=AF_INET;
|
inet_pton(AF_INET,equipments[Idx].ip,&servaddr.sin_addr);
|
servaddr.sin_port=htons(80);
|
sigset(SIGALRM, u_alarm_handler);//add 2016.11.22
|
alarm(2);
|
rt = connect(rsock_down[Idx],(struct sockaddr*)&servaddr,strlen1);
|
alarm(0);
|
sigrelse(SIGALRM);
|
if(rt<0){
|
printf("Equipment connect fail-%s:%d\n",equipments[Idx].ip,80);
|
close(rsock_down[Idx]);
|
return -2;
|
}
|
char uri[200];
|
sprintf(uri,"/PSIA/Custom/Event/notification/notificationStream?sessionId=%s",sessions[Idx]);
|
length = sprintf(byte_array,"GET %s HTTP/1.1\r\nContent-Type: text/xml\r\nHost: %s\r\nContent-Length: 0\r\nConnection: Keep-Alive\r\n\r\n",uri,equipments[Idx].ip);
|
write(rsock_down[Idx],byte_array,strlen(byte_array));
|
while(1){
|
memset(buff,0,sizeof(buff));
|
sigset(SIGALRM, u_alarm_handler);//add 2016.11.22
|
alarm(2);
|
length=read(rsock_down[Idx],&buff,sizeof(buff));
|
alarm(0);
|
sigrelse(SIGALRM);
|
if(length<=0)
|
{
|
close(rsock_down[Idx]);
|
break;
|
}
|
if(memorycmp((unsigned char*)buff,length, "WWW-Authenticate:",17)>0 && bbbb==2)
|
{
|
char uri[200];
|
sprintf(uri,"/PSIA/Custom/Event/notification/notificationStream?sessionId=%s",sessions[Idx]);
|
MakeAuthorizedPacketReal(buff,length,"GET",uri,Idx);
|
write(rsock_down[Idx],byte_array,strlen(byte_array));
|
// printf("%s\n",(char*)byte_array);
|
bbbb=3;
|
continue;
|
}
|
if(stringcmp(buff,"multipart/text; boundary=VIQeventEVENTeventVIQ",46)>0 && bbbb==3)
|
{
|
pthread_create(&thread_Real[Idx],NULL,&MyEquipmentthread,(void*)Idx);//super(void*)(&equipments[0])
|
gCapturing[Idx]=1;
|
printf("%s\n","QQQQQQQQQQQQQQQQQQQQ Capturing...");
|
//printf("%s\n",buff);
|
return 0;
|
}
|
}
|
return -2;
|
}
|
|
|
|
|
|