/* * proxyserver.c * * Created on: Oct 9, 2016 * Author: JKM */ #include #include #include #include #include #include #include #include //#include "/usr/include/mysql/mysql.h" #include #include #include #include #include #include #include #include "MD5Linux.h" #define MAX_NUM 16 #define MAX 1024 #define fileread_buf 128 typedef struct{ int m_id; char serverIP[32]; char serverport[10]; char port[10]; char ip[32]; char user[64]; char pass[64]; int reboot; }sockinfo,*lpsockinfo; pthread_t thread_no[MAX_NUM]; pthread_t thread_noEQ[MAX_NUM]; pthread_t thread_Real[MAX_NUM]; sockinfo equipments[16]; int sock_upper[16],sock_down[16]; int rsock_down[16]; char byte_array[2600]; int bbbbb=0; int CommandEquipIdx=0; int CommandKind[16]; char sessionIDs[16][5]; char linkequip_ip[32]; char linkequip_port[10]; int focusServer=-1; int focusEquip=-1; int NUM=0,equip_num=0; int SupperConnectedflag[16]={0,},EquipConnectedflag[16]={0,},serverflag=0,GPIO_flag=0; int EquipRealAlarmConnectedflag[16]; timer_t* timerID; int Read_MysqlData(); int UpdateMysqData(int key); void* createServerthread(void* arg); void* createEquipmentthread(void* arg); void* MyEquipmentthread(void* arg); int net_test(char* serverIP,char* port); void EquipCheckGPIOOut(void); void GPIOinit(void); int GPIOoutput(int no); int time_lock(int year,int month,int day,int hour,int min,int sec,int during); int GPIO_OPEN(int PortNum); void GPIO_CLOSE(int PortNum); int GPIO_READ(int PortNum); void GPIO_WRITE(int PortNum,unsigned char DATA); int RealEventStart(int Idx); int gCapturing[16]; char sessions[16][10]; int n=0,m=0,k=0; unsigned char DownBuffer[16][614000]; int DownCount[16]; int gCount=0; int gCount30s=0; int gCount2s=0; void zclock_sleep (int msecs); void zclock_sleep (int msecs) { struct timespec t; t.tv_sec = msecs / 1000; t.tv_nsec = (msecs % 1000) * 1000000; nanosleep (&t, NULL); } void u_alarm_handler(int) { //printf("connect fail=============="); } void timer_handler(int signum) { int i,j; ////////////// added on 2016.11.8 ////////////////// gCount2s++; if(gCount2s>=8){ gCount2s=0; for(;CommandEquipIdx<16;CommandEquipIdx++){//connected if(EquipConnectedflag[CommandEquipIdx]>0) break; } if(CommandEquipIdx>=16){ CommandEquipIdx = 0; } } ///////////////////////////////////////////////////// gCount30s++; if(gCount30s>=120){//4*30=30s gCount30s=0; if(NUM>0){ EquipCheckGPIOOut();//GPIO Watchdog_Timer } } gCount++; if(gCount>=4){//1s gCount = 0; Read_MysqlData(); equip_num=NUM; //time_lock(2016,10,28,10,10,10,30); } //serverthread for(i=0;iServer Thread is strarted......"); unsigned char data[4096]; //=======================================equipment data================================ int idx=0; int i; data[idx++]=0x68; data[idx++]=0x05; for(i=0;i0) { //response[0]=0x68; //response[1]=0x03; //response[2]=0x00; //write(sock_upper[sidx],response,3); focusServer = sidx; for(j=0;j=0) { if(focusEquip>=0 && sock_down[focusEquip]>0 ){ write(sock_down[focusEquip],buff,length); printf("Directly down to Equipment data===============:%d\n",length); } else{ printf("Saved to Equipment data=========================:%d\n",length); memcpy(DownBuffer[focusEquip],buff,length);//send to equipment; DownCount[focusEquip] = length; } } continue; } } puts("Server Thread is stoped.."); close(sock_upper[sidx]); sock_upper[sidx] = -1; SupperConnectedflag[sidx]=0;//? pthread_exit((void*)thread_no[sidx]); } void* createEquipmentthread(void* arg) { int eidx = (int)arg; printf("Step.2 ===%d=====>Equipment Thread is strarted......\n",eidx); int length=0; char buff[102400]; while(1) { if(DownCount[eidx]>0) { write(sock_down[eidx],DownBuffer[eidx],DownCount[eidx]);//? printf("down to Equipment data=============:%d\n",DownCount[eidx]); DownCount[eidx]=0; } memset(buff,0,sizeof(buff)); length=read(sock_down[eidx],&buff,sizeof(buff)-1); if(length<=0) { printf(" Down Socket closed \n"); break; } else if(length>0){ if( focusServer>=0){ printf("Received data from Equipment length==========:%d\n",length); if(sock_upper[focusServer] >0) { write(sock_upper[focusServer],buff,length);//send to equipment; printf("send data to length Sever ===============:%d\n",length); } } } } close(sock_down[eidx]); sock_down[eidx]=-1; puts("Equipment Thread is stoped.."); EquipConnectedflag[eidx]=0; CommandKind[CommandEquipIdx]=0; pthread_exit((void*)thread_noEQ[eidx]); } //=====================Reatime thread realstart========================= void* MyEquipmentthread(void* arg) { int eidx = (int)arg; printf("Step.3 ===%d=====>RealTimeEvent Thread is strarted......\n",eidx); int length=0; char buff[102400]; while(1) { memset(buff,0,sizeof(buff)); length=read(rsock_down[eidx],&buff,sizeof(buff)-1); if(length<=0) { printf(" Down Socket closed \n"); break; } else if(length>0){ if(gCapturing[eidx]==1){ int k; for(k=0;k<16;k++){ if(SupperConnectedflag[k]==1){ write(sock_upper[k],buff,strlen(buff)); printf("======>>>>>>>upper send length====%d======\n",strlen(buff)); printf("=============================================================\n"); //printf("%s",buff); } } continue; } } } close(rsock_down[eidx]); rsock_down[eidx]=-1; EquipRealAlarmConnectedflag[eidx]=0; puts("RealTimeEvent Thread is stoped.."); pthread_exit((void*)thread_Real[eidx]); } int Read_MysqlData() { static sockinfo equipments_config[1] = { //{ // .m_id = 1, // .ip = "192.168.1.5", // equipmentip (analizer) // .port = "80", // equipmentport // .user = "supervisor", // equipment username // .pass = "supervisor", // equipment password // .serverIP = "192.168.1.2", // serverip // .serverport = "5015", // serverport // .reboot = 0 //}, //{ .m_id = 1, .ip = "192.168.1.5", .port = "80", .user = "supervisor", .pass = "supervisor", .serverIP = "192.168.1.2", .serverport = "5015", .reboot = 0 }, }; equipments_config[0].m_id = 1; strcpy(equipments_config[0].ip, "192.168.1.5"); strcpy(equipments_config[0].port, "80"); strcpy(equipments_config[0].user, "supervisor"); strcpy(equipments_config[0].pass, "supervisor"); strcpy(equipments_config[0].serverIP, "192.168.1.2"); strcpy(equipments_config[0].serverport, "5015"); equipments_config[0].reboot = 0; memcpy(equipments, equipments_config, sizeof(equipments_config)); NUM = sizeof(equipments_config) / sizeof(sockinfo); return 1; } /* int Read_MysqlData(){ int ret=0; MYSQL *conn; MYSQL_RES *res; MYSQL_ROW row; char *server="localhost"; char *user="root"; char *password="123"; char *database="opentutorials"; if(!(conn=mysql_init((MYSQL*)NULL))){ printf("init fail\n"); exit(1); } if(!mysql_real_connect(conn,server,user,password,NULL,3306,NULL,0)){ printf("connect error.\n"); exit(1); } if(mysql_select_db(conn,database)!=0){ mysql_close(conn); printf("select_db_fail.\n"); exit(1); } if(mysql_query(conn,"select * from tbl_deviceinfo")){ printf("query fail\n"); exit(1); } res=mysql_store_result(conn); NUM=0; while((row=mysql_fetch_row(res))!=NULL){ equipments[NUM].m_id=atoi(row[0]);//id // printf("====%s:%s",row[0],row[11]); //sprintf(equipments[NUM].m_id,"%d",row[0]); if(strcmp(equipments[NUM].ip,row[1])!=0) ret = 1; if(strcmp(equipments[NUM].port,row[2])!=0) ret = 1; if(strcmp(equipments[NUM].serverIP,row[3])!=0) ret = 1; if(strcmp(equipments[NUM].serverport,row[4])!=0) ret = 1; if(strcmp(equipments[NUM].pass,row[5])!=0) ret = 1; if(strcmp(equipments[NUM].user,row[6])!=0) ret = 1; memset(equipments[NUM].ip,0,32); strcpy(equipments[NUM].ip,row[1]);//equipIP memset(equipments[NUM].port,0,10); strcpy(equipments[NUM].port,row[2]);//equipPort memset(equipments[NUM].serverIP,0,32); strcpy(equipments[NUM].serverIP,row[3]);//ServerIP memset(equipments[NUM].serverport,0,10); strcpy(equipments[NUM].serverport,row[4]);//ServerPort memset(equipments[NUM].user,0,64); strcpy(equipments[NUM].user,row[6]);//equipUser memset(equipments[NUM].pass,0,64); strcpy(equipments[NUM].pass,row[5]);//equipPass equipments[NUM].reboot=atoi(row[11]);//reboot option. NUM++; } mysql_close(conn); puts("Step.0 ========>MySQL is getting ok"); return ret; } int UpdateMysqData(int key){ int ret=0; MYSQL *conn; char *server="localhost"; char *user="root"; char *password="123"; char *database="opentutorials"; char query[255]; puts("Step.0 ========>MySQL is getting......"); if(!(conn=mysql_init((MYSQL*)NULL))){ printf("init fail\n"); exit(1); } if(!mysql_real_connect(conn,server,user,password,NULL,3306,NULL,0)){ printf("connect error.\n"); exit(1); } if(mysql_select_db(conn,database)!=0){ mysql_close(conn); printf("select_db_fail.\n"); exit(1); } sprintf(query,"UPDATE tbl_deviceinfo SET reboot=0 where id=%d",key); if(mysql_query(conn,query)){ printf("query fail\n"); exit(1); } mysql_close(conn); return ret; }*/ int net_test(char* serverIP,char* port){ struct sockaddr_in servaddr; int strlen=sizeof(servaddr); int sockfdd; if((sockfdd=socket(PF_INET,SOCK_STREAM,0))<0){ perror("socket fail"); close(sockfdd); return -1; } memset(&servaddr,0,strlen); servaddr.sin_family=AF_INET; inet_pton(AF_INET,serverIP,&servaddr.sin_addr); servaddr.sin_port=htons(atoi(port)); if(connect(sockfdd,(struct sockaddr*)&servaddr,strlen)<0){ // perror("connect fail-3"); close(sockfdd); return -1; } close(sockfdd); return 1; } void GPIOinit(void) { int retVal = -1; int PortNum = 0xA06; unsigned char wVal = 0x15; retVal = GPIO_OPEN(PortNum); printf("GPIO OPEN RES = %d \n",retVal); GPIO_WRITE(PortNum,wVal); printf("GPIO WRITE VALUE = 0x%X \n", wVal); retVal = GPIO_READ(PortNum); printf("GPIO READ VALUE 02 = 0x%X \n",retVal); GPIO_CLOSE(PortNum); } int GPIOoutput(int no) { int PortNum = 0xA06; switch(no){ case 0: GPIO_WRITE(PortNum,0x15); return 0; case 1: GPIO_WRITE(PortNum,0x57); return 0; case 2: GPIO_WRITE(PortNum,0x5D); return 0; case 3: GPIO_WRITE(PortNum,0x5F); return 0; case 4: GPIO_WRITE(PortNum,0x75); return 0; case 5: GPIO_WRITE(PortNum,0x77); return 0; case 6: GPIO_WRITE(PortNum,0x7D); return 0; case 7: GPIO_WRITE(PortNum,0x7F); return 0; case 8: GPIO_WRITE(PortNum,0xD5); return 0; case 9: GPIO_WRITE(PortNum,0xD7); return 0; case 10: GPIO_WRITE(PortNum,0xDD); return 0; case 11: GPIO_WRITE(PortNum,0xDF); return 0; case 12: GPIO_WRITE(PortNum,0xF5); return 0; case 13: GPIO_WRITE(PortNum,0xF7); return 0; case 14: GPIO_WRITE(PortNum,0xFD); return 0; case 15: GPIO_WRITE(PortNum,0xFF); return 0; } return -1; } int GPIO_OPEN(int PortNum) { return ioperm(PortNum, 0x01, 0x01); } void GPIO_CLOSE(int PortNum) { ioperm(PortNum, 0x01, 0x00); } int GPIO_READ(int PortNum) { return inb(PortNum); } void GPIO_WRITE(int PortNum,unsigned char DATA) { outb(DATA,PortNum); } void EquipCheckGPIOOut(void) { int PortNum = 0xA06; int i; int retVal; int result; printf("Step.3 ========>GPIO manupulation===> AnalyEquipmentNum=%d \n",equip_num); for(i=0;i=slen) return -1; k=i; for(i=0;i=klen) return k; return -1; } int stringcmp(char* src ,char* token, int len) { int start=0,k,i,slen=strlen(src); lp: for(i=start;i=slen) return -1; k=i; for(i=0;i=len) return k; return -1; } void AurhorizationResponseBytesReal(char* byte_array_out,int * byte_array_length_out,char *Myuri, char *nonce,const char *cnonce,char *response) { // Authorization: Digest username="supervisor", realm="VideoIQ", nonce="n99u1VYBAABAf0HT+h92EO4hT2CzmfxG", uri="/PSIA/VIQ/Event/metadata/0/files", response="7d8d929e39655ad9f3e6e94e9004792e", qop=auth, nc=00000001, cnonce="0d2175d8cdb63f84f18894200e129ace", algorithm="MD5" int idx=0,len; idx = sprintf(byte_array_out,"%s","Authorization: Digest username="); byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s","supervisor");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",",realm=");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s","VideoIQ");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",",nonce=");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx], "%s",nonce);idx+=len;//"n99u1VYBAABAf0HT+h92EO4hT2CzmfxG" byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",",uri=");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",Myuri);idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",",algorithm=");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s","MD5");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",",cnonce=");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",cnonce);idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",",nc=00000001,qop=");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s","auth");idx+=len;//cnonce byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",",response=");idx+=len; byte_array_out[idx++]=0x22;//'"' len = sprintf(&byte_array_out[idx],"%s",response);idx+=len; byte_array_out[idx++]=0x22;//'"' *byte_array_length_out = idx; } int CharToByte(char* chars, char* bytes, unsigned int count,char* ptr1,char* ptr2,char* ptr3,char* ptr4,unsigned char* number){ int p=0; int n=0; int i=0; unsigned char temp; for(i = 0; i < count; i++) { temp = (unsigned char)chars[i]; if (p==1) { if (temp!=0x22) { bytes[n++]=(unsigned char)chars[i]; } } if (temp==0x22) { p=p+1; } if (p==2) { bytes[n++]=0x2C; p=0; } } char* token=NULL; char s[]=","; token=strtok(bytes,s); number[0]=strlen(token); memcpy(ptr1,token,strlen(token)); int nn=0; while(token!=NULL) { token=strtok(NULL,s); nn=nn+1; if (nn==1) { number[1]=strlen(token); memcpy(ptr2,token,strlen(token)); } if (nn==2) { //ptr3=new char[strlen(token)]; number[2]=strlen(token); memcpy(ptr3,token,strlen(token)); } if (nn==3) { if(token!=NULL) { number[3]=strlen(token); memcpy(ptr4,token,strlen(token)); }//ptr3=new char[strlen(token)]; } } return n; } //for real event void MakeAuthorizedPacketReal(char* buff,int length, char* Method,char* uri,int Idx) { char Device[150] ; char Realm_buf1[512] ; char nonce_buf2[512] ; char auth_buf3[512] ; char domain_buf4[512] ; unsigned char len[4]; memset(Device,0,150); memset(domain_buf4,0,512); CharToByte((char*)buff, Device, length,Realm_buf1,nonce_buf2,auth_buf3,domain_buf4, len); const char* cnonce_buf="163acd0e58793a190f29ee879d4b224f";//"08a9d86c1b5e45963cf82f43dca59c51"; Realm_buf1[len[0]]=0; nonce_buf2[len[1]]=0; auth_buf3[len[2]]=0; const char* nc="00000001"; //CString qop;qop=auth_buf3;///////////////////////////// char User[200]; memset(User,0,200); sprintf(User,"%s:%s:%s",equipments[Idx].user,Realm_buf1,equipments[Idx].pass); char urii[200]; int kk=sprintf(urii,"%s:%s",Method,uri);//PUT:/PSIA/System/reboot"; urii[kk]=0; char* A1 = MDString(User); char AA1[33]; memset(AA1,0,33); memcpy(AA1,A1,strlen(A1)); char* A2 = MDString(urii); char AA2[33]; memset(AA2,0,33); memcpy(AA2,A2,strlen(A2)); char rrr[200]; memset(rrr,0,200); sprintf(rrr,"%s:%s:%s:%s:auth:%s",AA1,nonce_buf2,nc,cnonce_buf,AA2); // printf("%s:%s:%s:%s:auth:%s\n",AA1,nonce_buf2,nc,cnonce_buf,AA2); char* response = MDString(rrr); char res[33]; memset(res,0,33); memcpy(res,response,strlen(response)); //// 第二次 发送 char byte_arrayxxx[2600]; int lengthxxx = 0; int iidx = 0; AurhorizationResponseBytesReal(byte_arrayxxx,&lengthxxx,uri,nonce_buf2,cnonce_buf,res); int llen = sprintf(byte_array,"%s %s HTTP/1.1\r\n",Method,uri); iidx+=llen; llen = sprintf(&byte_array[iidx],"Content-Type: text/xml\r\n"); iidx+=llen; strncpy(&byte_array[iidx],byte_arrayxxx,lengthxxx); iidx+=lengthxxx; byte_array[iidx]=0x0d; iidx+=1; byte_array[iidx]=0x0a; iidx+=1; llen = sprintf(&byte_array[iidx],"Host: %s\r\n",equipments[Idx].ip); iidx+=llen; llen = sprintf(&byte_array[iidx],"Content-Length: 0\r\n"); iidx+=llen; // llen = sprintf(&byte_array[iidx],"%s","Connection: Keep_Alive\r\n"); iidx+=llen; byte_array[iidx]=0x0d; iidx+=1; byte_array[iidx]=0x0a; iidx+=1; byte_array[iidx]=0; } //// 功能:开始查看实时监控 //// 输入:分析器IP,用户,密码 //// 输出:0(成功), -1(初始化失败),-2(连接失败) int RealEventStart(int Idx) { char buff[10240]; int bbbb=0; if(equipments[Idx].ip==NULL || equipments[Idx].ip[0]==0) return -1; struct sockaddr_in servaddr; int strlen1=sizeof(servaddr); if((rsock_down[Idx]=socket(PF_INET,SOCK_STREAM,0))<0){ perror("socket fail2"); return -1; } memset(&servaddr,0,strlen1); servaddr.sin_family=AF_INET; inet_pton(AF_INET,equipments[Idx].ip,&servaddr.sin_addr); servaddr.sin_port=htons(atoi(equipments[Idx].port)); sigset(SIGALRM, u_alarm_handler);//add 2016.11.22 alarm(2); int rt = connect(rsock_down[Idx],(struct sockaddr*)&servaddr,strlen1); alarm(0); sigrelse(SIGALRM); if(rt<0){ printf("Equipment connect fail-%s:%s\n",equipments[Idx].ip,equipments[Idx].port); close(rsock_down[Idx]); return -1; } int length = 0; length = sprintf(byte_array,"POST /PSIA/VIQ/System/sessions/permanent HTTP/1.1\r\nContent-Type: text/xml\r\nHost: %s\r\nContent-Length: 0\r\nConnection: Keep-Alive\r\n\r\n",equipments[Idx].ip); write(rsock_down[Idx],byte_array,length); printf("%s",byte_array); while(1){ memset(buff,0,sizeof(buff)); sigset(SIGALRM, u_alarm_handler);//add 2016.11.22 alarm(2); length=read(rsock_down[Idx],&buff,sizeof(buff)); alarm(0); sigrelse(SIGALRM); printf("Myequipment connect ==================length =%d:\n",length); if(length<=0) { close(rsock_down[Idx]); return -1; } if(memorycmp((unsigned char*)buff,length, "WWW-Authenticate:",17)>0 && bbbb==0) { // analyse reception MakeAuthorizedPacketReal(buff,length,"POST","/PSIA/VIQ/System/sessions/permanent",Idx); zclock_sleep(100); write(rsock_down[Idx],byte_array,strlen(byte_array)); // printf("%s\n",(char*)byte_array); bbbb=1; continue; } if(bbbb==1){ int sidx = stringcmp((char*)buff,"",8); if(sidx >=0){//2016-08-18T01:07:20.74902016-08-29T08:33:48.2310 int eidx = stringcmp((char*)buff,"",9); if(eidx>=0 && sidx+8 %s\n",(char*)sessions[Idx]); break; } } } } close(rsock_down[Idx]); if((rsock_down[Idx]=socket(PF_INET,SOCK_STREAM,0))<0){ perror("socket fail2"); return -1; } memset(&servaddr,0,strlen1); servaddr.sin_family=AF_INET; inet_pton(AF_INET,equipments[Idx].ip,&servaddr.sin_addr); servaddr.sin_port=htons(80); sigset(SIGALRM, u_alarm_handler);//add 2016.11.22 alarm(2); rt = connect(rsock_down[Idx],(struct sockaddr*)&servaddr,strlen1); alarm(0); sigrelse(SIGALRM); if(rt<0){ printf("Equipment connect fail-%s:%d\n",equipments[Idx].ip,80); close(rsock_down[Idx]); return -2; } char uri[200]; sprintf(uri,"/PSIA/Custom/Event/notification/notificationStream?sessionId=%s",sessions[Idx]); length = sprintf(byte_array,"GET %s HTTP/1.1\r\nContent-Type: text/xml\r\nHost: %s\r\nContent-Length: 0\r\nConnection: Keep-Alive\r\n\r\n",uri,equipments[Idx].ip); write(rsock_down[Idx],byte_array,strlen(byte_array)); while(1){ memset(buff,0,sizeof(buff)); sigset(SIGALRM, u_alarm_handler);//add 2016.11.22 alarm(2); length=read(rsock_down[Idx],&buff,sizeof(buff)); alarm(0); sigrelse(SIGALRM); if(length<=0) { close(rsock_down[Idx]); break; } if(memorycmp((unsigned char*)buff,length, "WWW-Authenticate:",17)>0 && bbbb==2) { char uri[200]; sprintf(uri,"/PSIA/Custom/Event/notification/notificationStream?sessionId=%s",sessions[Idx]); MakeAuthorizedPacketReal(buff,length,"GET",uri,Idx); write(rsock_down[Idx],byte_array,strlen(byte_array)); // printf("%s\n",(char*)byte_array); bbbb=3; continue; } if(stringcmp(buff,"multipart/text; boundary=VIQeventEVENTeventVIQ",46)>0 && bbbb==3) { pthread_create(&thread_Real[Idx],NULL,&MyEquipmentthread,(void*)Idx);//super(void*)(&equipments[0]) gCapturing[Idx]=1; printf("%s\n","QQQQQQQQQQQQQQQQQQQQ Capturing..."); //printf("%s\n",buff); return 0; } } return -2; }