#define CS_CORE
#include "globals.h"
#ifdef CS_WITH_GBOX
# include "csgbox/gbox.h"
# define CS_VERSION_X CS_VERSION "-gbx-" GBXVERSION
#else
# define CS_VERSION_X CS_VERSION
#endif
/*****************************************************************************
Globals
*****************************************************************************/
int pfd=0; // Primary FD, must be closed on exit
int mfdr=0; // Master FD (read)
int fd_m2c=0; // FD Master -> Client (for clients / read )
int fd_c2m=0; // FD Client -> Master (for clients / write )
int fd_c2l=0; // FD Client -> Logger (for clients / write )
int cs_dblevel=0; // Debug Level (TODO !!)
int cs_idx=0; // client index (0=master, ...)
int cs_ptyp=0; // process-type
struct s_module ph[CS_MAX_MOD]; // Protocols
int maxph=0; // Protocols used
int cs_hw=0; // hardware autodetect
int is_server=0; // used in modules to specify function
pid_t master_pid=0; // master pid OUTSIDE shm
ushort len4caid[256]; // table for guessing caid (by len)
char cs_confdir[128]=CS_CONFDIR;
uchar mbuf[1024]; // global buffer
ECM_REQUEST *ecmtask;
#ifdef CS_ANTICASC
struct s_acasc ac_stat[CS_MAXPID];
#endif
/*****************************************************************************
Shared Memory
*****************************************************************************/
int *ecmidx; // Shared Memory
int *logidx; // Shared Memory
int *oscam_sem; // sem (multicam.o)
int *c_start; // idx of 1st client
int *log_fd; // log-process is running
struct s_ecm *ecmcache; // Shared Memory
struct s_client *client; // Shared Memory
struct s_reader *reader; // Shared Memory
struct card_struct *Cards; // Shared Memory
struct idstore_struct *idstore; // Shared Memory
unsigned long *IgnoreList; // Shared Memory
struct s_config *cfg; // Shared Memory
#ifdef CS_ANTICASC
struct s_acasc_shm *acasc; // anti-cascading table indexed by account.ac_idx
#endif
#ifdef CS_LOGHISTORY
int *loghistidx; // ptr to current entry
char *loghist; // ptr of log-history
#endif
int *mcl=0; // Master close log?
static int shmsize = CS_ECMCACHESIZE*(sizeof(struct s_ecm)) +
CS_MAXPID*(sizeof(struct s_client)) +
CS_MAXREADER*(sizeof(struct s_reader)) +
#ifdef CS_WITH_GBOX
CS_MAXCARDS*(sizeof(struct card_struct))+
CS_MAXIGNORE*(sizeof(long))+
CS_MAXPID*(sizeof(struct idstore_struct))+
#endif
#ifdef CS_ANTICASC
CS_MAXPID*(sizeof(struct s_acasc_shm)) +
#endif
#ifdef CS_LOGHISTORY
CS_MAXLOGHIST*CS_LOGHISTSIZE + sizeof(int) +
#endif
sizeof(struct s_config)+(6*sizeof(int));
#ifdef CS_NOSHM
char cs_memfile[128]=CS_MMAPFILE;
#endif
/*****************************************************************************
Statics
*****************************************************************************/
static char mloc[128]={0};
static int shmid=0; // Shared Memory ID
static int cs_last_idx=0; // client index of last fork (master only)
static char *logo = " ___ ____ ___ \n / _ \\/ ___| / __|__ _ _ __ ___ \n| | | \\___ \\| | / _` | '_ ` _ \\ \n| |_| |___) | |_| (_| | | | | | |\n \\___/|____/ \\___\\__,_|_| |_| |_|\n";
static void cs_set_mloc(int ato, char *txt)
{
if (ato>=0)
alarm(ato);
if (txt)
strcpy(mloc, txt);
}
char *cs_platform(char *buf)
{
static char *hw=NULL;
if (!hw)
{
#ifdef TUXBOX
struct stat st;
cs_hw=CS_HW_DBOX2; // dbox2, default for now
if (!stat("/dev/sci0", &st)) cs_hw=CS_HW_DREAM; // dreambox
#ifdef TRIPLEDRAGON
if (!stat("/dev/stb/tdsc0", &st)) cs_hw=CS_HW_DRAGON; // tripledragon
#endif
switch(cs_hw)
{
#ifdef PPC
case CS_HW_DBOX2: hw="dbox2" ; break;
#endif
case CS_HW_DREAM: hw="dreambox"; break;
case CS_HW_DRAGON: hw="tripledragon"; break;
}
#endif
if (!hw) hw=CS_OS_HW;
}
sprintf(buf, "%s-%s-%s", CS_OS_CPU, hw, CS_OS_SYS);
return(buf);
}
static void usage()
{
fprintf(stderr, "%s\n\n", logo);
fprintf(stderr, "OSCam cardserver v%s, build #%s (%s) - (w) 2009-2010 streamboard SVN\n", CS_VERSION_X, CS_SVN_VERSION, CS_OSTYPE);
fprintf(stderr, "\tsee http://streamboard.gmc.to:8001/wiki/ for more details\n");
fprintf(stderr, "\tbased on OSCam 0.99.x, (w) 2010 streamboard SVN\n");
fprintf(stderr, "\tbased on streamboard mp-cardserver v0.9d - (w) 2004-2007 by dukat\n");
fprintf(stderr, "\tinbuilt modules: ");
#ifdef HAVE_DVBAPI
fprintf(stderr, "dvbapi ");
#endif
#ifdef WEBIF
fprintf(stderr, "webinterface ");
#endif
#ifdef CS_ANTICASC
fprintf(stderr, "anticascading ");
#endif
#ifdef LIBUSB
fprintf(stderr, "smartreader ");
#endif
#ifdef HAVE_PCSC
fprintf(stderr, "pcsc ");
#endif
#ifdef CS_WITH_GBOX
fprintf(stderr, "gbox ");
#endif
#ifdef IRDETO_GUESSING
fprintf(stderr, "irdeto-guessing ");
#endif
fprintf(stderr, "\n\n");
fprintf(stderr, "oscam [-b] [-c config-dir] [-d]");
#ifdef CS_NOSHM
fprintf(stderr, " [-m memory-file]");
#endif
fprintf(stderr, "\n\n\t-b : start in background\n");
fprintf(stderr, "\t-c
: read configuration from \n");
fprintf(stderr, "\t default = %s\n", CS_CONFDIR);
fprintf(stderr, "\t-d : debug level mask\n");
fprintf(stderr, "\t 0 = no debugging (default)\n");
fprintf(stderr, "\t 1 = detailed error messages\n");
fprintf(stderr, "\t 2 = ATR parsing info, ECM, EMM and CW dumps\n");
fprintf(stderr, "\t 4 = traffic from/to the reader\n");
fprintf(stderr, "\t 8 = traffic from/to the clients\n");
fprintf(stderr, "\t 16 = traffic to the reader-device on IFD layer\n");
fprintf(stderr, "\t 32 = traffic to the reader-device on I/O layer\n");
fprintf(stderr, "\t 64 = EMM logging\n");
fprintf(stderr, "\t 255 = debug all\n");
#ifdef CS_NOSHM
fprintf(stderr, "\t-m : use as mmaped memory file\n");
fprintf(stderr, "\t default = %s\n", CS_MMAPFILE);
#endif
fprintf(stderr, "\n");
exit(1);
}
#ifdef NEED_DAEMON
#ifdef OS_MACOSX
// this is done because daemon is being deprecated starting with 10.5 and -Werror will always trigger an error
static int daemon_compat(int nochdir, int noclose)
#else
static int daemon(int nochdir, int noclose)
#endif
{
int fd;
switch (fork())
{
case -1: return (-1);
case 0: break;
default: _exit(0);
}
if (setsid()==(-1))
return(-1);
if (!nochdir)
(void)chdir("/");
if (!noclose && (fd=open("/dev/null", O_RDWR, 0)) != -1)
{
(void)dup2(fd, STDIN_FILENO);
(void)dup2(fd, STDOUT_FILENO);
(void)dup2(fd, STDERR_FILENO);
if (fd>2)
(void)close(fd);
}
return(0);
}
#endif
int recv_from_udpipe(uchar *buf)
{
unsigned short n;
if (!pfd) return(-9);
if (!read(pfd, buf, 3)) cs_exit(1);
if (buf[0]!='U')
{
cs_log("INTERNAL PIPE-ERROR");
cs_exit(1);
}
memcpy(&n, buf+1, 2);
return(read(pfd, buf, n));
}
char *username(int idx)
{
if (client[idx].usr[0])
return(client[idx].usr);
else
return("anonymous");
}
static int idx_from_ip(in_addr_t ip, in_port_t port)
{
int i, idx;
for (i=idx=0; (imask[n]) == ctab->caid[n])
rc=ctab->cmap[n] ? ctab->cmap[n] : caid;
return(rc);
}
int chk_bcaid(ECM_REQUEST *er, CAIDTAB *ctab)
{
long caid;
if ((caid=chk_caid(er->caid, ctab))<0)
return(0);
er->caid=caid;
return(1);
}
/*
* void set_signal_handler(int sig, int flags, void (*sighandler)(int))
* flags: 1 = restart, 2 = don't modify if SIG_IGN, may be combined
*/
void set_signal_handler(int sig, int flags, void (*sighandler)(int))
{
#ifdef CS_SIGBSD
if ((signal(sig, sighandler)==SIG_IGN) && (flags & 2))
{
signal(sig, SIG_IGN);
siginterrupt(sig, 0);
}
else
siginterrupt(sig, (flags & 1) ? 0 : 1);
#else
struct sigaction sa;
sigaction(sig, (struct sigaction *) 0, &sa);
if (!((flags & 2) && (sa.sa_handler==SIG_IGN)))
{
sigemptyset(&sa.sa_mask);
sa.sa_flags=(flags & 1) ? SA_RESTART : 0;
sa.sa_handler=sighandler;
sigaction(sig, &sa, (struct sigaction *) 0);
}
#endif
}
static void cs_alarm()
{
cs_debug("Got alarm signal");
cs_log("disconnect from %s (deadlock!)", cs_inet_ntoa(client[cs_idx].ip));
cs_exit(0);
}
static void cs_master_alarm()
{
cs_log("PANIC: master deadlock! last location: %s", mloc);
fprintf(stderr, "PANIC: master deadlock! last location: %s", mloc);
fflush(stderr);
cs_exit(0);
}
static void cs_sigpipe()
{
if ((cs_idx) && (master_pid!=getppid()))
cs_exit(0);
cs_log("Got sigpipe signal -> captured");
}
void cs_exit(int sig)
{
int i;
set_signal_handler(SIGCHLD, 1, SIG_IGN);
set_signal_handler(SIGHUP , 1, SIG_IGN);
if (sig && (sig!=SIGQUIT))
cs_log("exit with signal %d", sig);
switch(client[cs_idx].typ)
{
case 'c': cs_statistics(cs_idx);
case 'm': break;
case 'n': *log_fd=0;
break;
case 's': *log_fd=0;
for (i=1; iaccount; (account) ; account = account->next)
if (!strcmp(client[i].usr, account->usr))
break;
if (account && client[i].pcrc == crc32(0L, MD5((uchar *)account->pwd, strlen(account->pwd), NULL), 16)) {
client[i].grp = account->grp;
client[i].au = account->au;
client[i].autoau = account->autoau;
client[i].expirationdate = account->expirationdate;
client[i].ncd_keepalive = account->ncd_keepalive;
client[i].c35_suppresscmd08 = account->c35_suppresscmd08;
client[i].tosleep = (60*account->tosleep);
client[i].monlvl = account->monlvl;
client[i].disabled = account->disabled;
client[i].fchid = account->fchid; // CHID filters
client[i].cltab = account->cltab; // Class
// newcamd module dosent like ident reloading
if(!client[i].ncd_server)
client[i].ftab = account->ftab; // Ident
client[i].sidtabok = account->sidtabok; // services
client[i].sidtabno = account->sidtabno; // services
memcpy(&client[i].ctab, &account->ctab, sizeof(client[i].ctab));
memcpy(&client[i].ttab, &account->ttab, sizeof(client[i].ttab));
#ifdef CS_ANTICASC
client[i].ac_idx = account->ac_idx;
client[i].ac_penalty= account->ac_penalty;
client[i].ac_limit = (account->ac_users * 100 + 80) * cfg->ac_stime;
#endif
} else {
if (ph[client[i].ctyp].type & MOD_CONN_NET) {
cs_debug("client '%s', pid=%d not found in db (or password changed)", client[i].usr, client[i].pid);
kill(client[i].pid, SIGQUIT);
}
}
}
}
static void cs_sighup()
{
uchar dummy[1]={0x00};
write_to_pipe(fd_c2m, PIP_ID_HUP, dummy, 1);
}
static void cs_accounts_chk()
{
int i;
init_userdb();
cs_reinit_clients();
#ifdef CS_ANTICASC
for (i=0; idebuglvl == cs_dblevel) {
switch (cs_dblevel) {
case 0:
cs_dblevel = 1;
break;
case 64:
cs_dblevel = 255;
break;
case 255:
cs_dblevel = 0;
break;
default:
cs_dblevel <<= 1;
}
} else {
cs_dblevel = cfg->debuglvl;
}
cfg->debuglvl = cs_dblevel;
if (master_pid == getpid())
for (i=0; i0);
for (i=1; iac_enabled )
{
cs_strncpy(usr, client[i].usr, sizeof(usr));
ac_idx = client[i].ac_idx;
ac_limit = client[i].ac_limit;
ac_penalty = client[i].ac_penalty;
}
#endif
if (client[i].fd_m2c) close(client[i].fd_m2c);
if (client[i].ufd) close(client[i].ufd);
memset(&client[i], 0, sizeof(struct s_client));
#ifdef CS_ANTICASC
if( cfg->ac_enabled )
{
client[i].ac_idx = ac_idx;
client[i].ac_limit = ac_limit;
client[i].ac_penalty = ac_penalty;
strcpy(client[i].usr, usr);
}
#endif
client[i].au=(-1);
}
}
return;
}
int cs_fork(in_addr_t ip, in_port_t port)
{
int i;
pid_t pid;
for (i=1; (iresolvedelay);
cdiff=i;
break;
case 97: client[i].typ='l'; // logger
client[i].ip=client[0].ip;
strcpy(client[i].usr, client[0].usr);
cs_log("logger started (pid=%d)", pid);
cdiff=i;
break;
#ifdef CS_ANTICASC
case 96: client[i].typ='a';
client[i].ip=client[0].ip;
strcpy(client[i].usr, client[0].usr);
cs_log("anticascader started (pid=%d, delay=%d min)",
pid, cfg->ac_stime);
cdiff=i;
break;
#endif
#ifdef WEBIF
case 95: client[i].typ='h'; // http
client[i].ip=client[0].ip;
strcpy(client[i].usr, client[0].usr);
cs_log("http started (pid=%d)",pid);
cdiff=i;
break;
#endif
default: client[i].typ='c'; // static client
client[i].ip=client[0].ip;
client[i].ctyp=port;
cs_log("%s: initialized (pid=%d%s)", ph[port].desc,
pid, ph[port].logtxt ? ph[port].logtxt : "");
break;
}
}
client[i].login=client[i].last=time((time_t *)0);
client[i].pid=pid; // MUST be last -> wait4master()
cs_last_idx=i;
i=0;
}
}
else
{
cs_log("max connections reached -> reject client %s", cs_inet_ntoa(ip));
i=(-1);
}
return(i);
}
static void init_signal()
{
int i;
for (i=1; iptab->ports[port_idx].s_port)
{
cs_log("%s: disabled", ph->desc);
return(0);
}
is_udp=(ph->type==MOD_CONN_UDP);
memset((char *)&sad,0,sizeof(sad)); /* clear sockaddr structure */
sad.sin_family = AF_INET; /* set family to Internet */
if (!ph->s_ip)
ph->s_ip=cfg->srvip;
if (ph->s_ip)
{
sad.sin_addr.s_addr=ph->s_ip;
sprintf(ptxt[0], ", ip=%s", inet_ntoa(sad.sin_addr));
}
else
sad.sin_addr.s_addr=INADDR_ANY;
timeout=cfg->bindwait;
//ph->fd=0;
ph->ptab->ports[port_idx].fd = 0;
if (ph->ptab->ports[port_idx].s_port > 0) /* test for illegal value */
sad.sin_port = htons((u_short)ph->ptab->ports[port_idx].s_port);
else
{
cs_log("%s: Bad port %d", ph->desc, ph->ptab->ports[port_idx].s_port);
return(0);
}
/* Map transport protocol name to protocol number */
if( (ptrp=getprotobyname(is_udp ? "udp" : "tcp")) )
ov=ptrp->p_proto;
else
ov=(is_udp) ? 17 : 6; // use defaults on error
if ((ph->ptab->ports[port_idx].fd=socket(PF_INET,is_udp ? SOCK_DGRAM : SOCK_STREAM, ov))<0)
{
cs_log("%s: Cannot create socket (errno=%d)", ph->desc, errno);
return(0);
}
ov=1;
if (setsockopt(ph->ptab->ports[port_idx].fd, SOL_SOCKET, SO_REUSEADDR, (void *)&ov, sizeof(ov))<0)
{
cs_log("%s: setsockopt failed (errno=%d)", ph->desc, errno);
close(ph->ptab->ports[port_idx].fd);
return(ph->ptab->ports[port_idx].fd=0);
}
#ifdef SO_REUSEPORT
setsockopt(ph->ptab->ports[port_idx].fd, SOL_SOCKET, SO_REUSEPORT, (void *)&ov, sizeof(ov));
#endif
#ifdef SO_PRIORITY
if (cfg->netprio)
if (!setsockopt(ph->ptab->ports[port_idx].fd, SOL_SOCKET, SO_PRIORITY, (void *)&cfg->netprio, sizeof(ulong)))
sprintf(ptxt[1], ", prio=%ld", cfg->netprio);
#endif
if( !is_udp )
{
ulong keep_alive = 1;
setsockopt(ph->ptab->ports[port_idx].fd, SOL_SOCKET, SO_KEEPALIVE,
(void *)&keep_alive, sizeof(ulong));
}
while (timeout--)
{
if (bind(ph->ptab->ports[port_idx].fd, (struct sockaddr *)&sad, sizeof (sad))<0)
{
if (timeout)
{
cs_log("%s: Bind request failed, waiting another %d seconds",
ph->desc, timeout);
cs_sleepms(1000);
}
else
{
cs_log("%s: Bind request failed, giving up", ph->desc);
close(ph->ptab->ports[port_idx].fd);
return(ph->ptab->ports[port_idx].fd=0);
}
}
else timeout=0;
}
if (!is_udp)
if (listen(ph->ptab->ports[port_idx].fd, CS_QLEN)<0)
{
cs_log("%s: Cannot start listen mode (errno=%d)", ph->desc, errno);
close(ph->ptab->ports[port_idx].fd);
return(ph->ptab->ports[port_idx].fd=0);
}
cs_log("%s: initialized (fd=%d, port=%d%s%s%s)",
ph->desc, ph->ptab->ports[port_idx].fd,
ph->ptab->ports[port_idx].s_port,
ptxt[0], ptxt[1], ph->logtxt ? ph->logtxt : "");
for( i=0; iptab->ports[port_idx].ftab.nfilts; i++ ) {
int j;
cs_log("CAID: %04X", ph->ptab->ports[port_idx].ftab.filts[i].caid );
for( j=0; jptab->ports[port_idx].ftab.filts[i].nprids; j++ )
cs_log("provid #%d: %06X", j, ph->ptab->ports[port_idx].ftab.filts[i].prids[j]);
}
return(ph->ptab->ports[port_idx].fd);
}
static void cs_client_resolve()
{
while (1)
{
struct hostent *rht;
struct s_auth *account;
struct sockaddr_in udp_sa;
for (account=cfg->account; account; account=account->next)
if (account->dyndns[0])
{
rht=gethostbyname((const char *)account->dyndns);
if (rht)
{
memcpy(&udp_sa.sin_addr, rht->h_addr, sizeof(udp_sa.sin_addr));
account->dynip=cs_inet_order(udp_sa.sin_addr.s_addr);
}
else
cs_log("can't resolve hostname %s (user: %s)", account->dyndns, account->usr);
client[cs_idx].last=time((time_t)0);
}
sleep(cfg->resolvedelay);
}
}
static void start_client_resolver()
{
int i;
pthread_t tid;
i=pthread_create(&tid, (pthread_attr_t *)0, (void *)&cs_client_resolve, (void *) 0);
if (i)
cs_log("ERROR: can't create resolver-thread (err=%d)", i);
else
{
cs_log("resolver thread started");
pthread_detach(tid);
}
}
void cs_resolve()
{
int i, idx;
struct hostent *rht;
struct s_auth;
for (i=0; ih_addr,
sizeof(client[idx].udp_sa.sin_addr));
client[idx].ip=cs_inet_order(client[idx].udp_sa.sin_addr.s_addr);
}
else
cs_log("can't resolve %s", reader[i].device);
client[cs_idx].last=time((time_t)0);
}
}
static void cs_logger(void)
{
*log_fd=client[cs_idx].fd_m2c;
while(1)
{
uchar *ptr;
//struct timeval tv;
fd_set fds;
FD_ZERO(&fds);
FD_SET(fd_m2c, &fds);
select(fd_m2c+1, &fds, 0, 0, 0);
if (master_pid!=getppid())
cs_exit(0);
if (FD_ISSET(fd_m2c, &fds))
{
int n;
// switch(n=read_from_pipe(fd_m2c, &ptr, 1))
n=read_from_pipe(fd_m2c, &ptr, 1);
//if (n!=PIP_ID_NUL) printf("received %d bytes\n", n); fflush(stdout);
switch(n)
{
case PIP_ID_LOG:
cs_write_log((char *)ptr);
break;
}
}
}
}
static void start_resolver()
{
int i;
cs_sleepms(1000); // wait for reader
while(1)
{
if (master_pid!=getppid())
cs_exit(0);
cs_resolve();
for (i=0; iresolvedelay; i++)
if (master_pid!=getppid())
cs_exit(0);
else
cs_sleepms(1000);
// sleep(cfg->resolvedelay);
}
}
#ifdef CS_ANTICASC
static void start_anticascader()
{
int i;
use_ac_log=1;
set_signal_handler(SIGHUP, 1, ac_init_stat);
ac_init_stat();
while(1)
{
for( i=0; iac_stime*60; i++ )
if( master_pid!=getppid() )
cs_exit(0);
else
cs_sleepms(1000);
if (master_pid!=getppid())
cs_exit(0);
ac_do_stat();
}
}
#endif
#ifdef WEBIF
static void cs_http()
{
http_srv();
}
#endif
static void init_cardreader()
{
for (ridx=0; ridx Ports)
*
* Uniq = 3: only one connection per user, but only the last
* login will survive (old mpcs behavior)
*
* Uniq = 4: set user only to fake if source ip is
* different, but only the last login will survive
*/
int i;
for (i=cdiff+1; idyndns[0])
if (client[cs_idx].ip != account->dynip)
rc=2;
if (!rc)
{
client[cs_idx].dup=0;
if (client[cs_idx].typ=='c')
{
client[cs_idx].expirationdate=account->expirationdate;
client[cs_idx].disabled=account->disabled;
client[cs_idx].c35_suppresscmd08 = account->c35_suppresscmd08;
client[cs_idx].ncd_keepalive = account->ncd_keepalive;
client[cs_idx].grp=account->grp;
client[cs_idx].au=account->au;
client[cs_idx].autoau=account->autoau;
client[cs_idx].tosleep=(60*account->tosleep);
memcpy(&client[cs_idx].ctab, &account->ctab, sizeof(client[cs_idx].ctab));
if (account->uniq)
cs_fake_client(account->usr, account->uniq, client[cs_idx].ip);
client[cs_idx].ftab = account->ftab; // IDENT filter
client[cs_idx].cltab = account->cltab; // CLASS filter
client[cs_idx].fchid = account->fchid; // CHID filter
client[cs_idx].sidtabok= account->sidtabok; // services
client[cs_idx].sidtabno= account->sidtabno; // services
client[cs_idx].pcrc = crc32(0L, MD5((uchar *)account->pwd, strlen(account->pwd), NULL), 16);
memcpy(&client[cs_idx].ttab, &account->ttab, sizeof(client[cs_idx].ttab));
#ifdef CS_ANTICASC
ac_init_client(account);
#endif
}
}
client[cs_idx].monlvl=account->monlvl;
strcpy(client[cs_idx].usr, account->usr);
case -1: // anonymous grant access
if (rc)
t_grant=t_reject;
else
{
if (client[cs_idx].typ=='m')
sprintf(t_msg[0], "lvl=%d", client[cs_idx].monlvl);
else
{
if(client[cs_idx].autoau)
{
if(client[cs_idx].ncd_server)
{
int r=0;
for(r=0;rncd_ptab.ports[client[cs_idx].port_idx].ftab.filts[0].caid)
{
client[cs_idx].au=r;
break;
}
}
if(client[cs_idx].au<0) sprintf(t_msg[0], "au(auto)=%d", client[cs_idx].au+1);
else sprintf(t_msg[0], "au(auto)=%s", reader[client[cs_idx].au].label);
}
else
{
sprintf(t_msg[0], "au=auto");
}
}
else
{
if(client[cs_idx].au<0) sprintf(t_msg[0], "au=%d", client[cs_idx].au+1);
else sprintf(t_msg[0], "au=%s", reader[client[cs_idx].au].label);
}
}
}
if(client[cs_idx].ncd_server)
{
cs_log("%s %s:%d-client %s%s (%s, %s)",
client[cs_idx].crypted ? t_crypt : t_plain,
e_txt ? e_txt : ph[client[cs_idx].ctyp].desc,
cfg->ncd_ptab.ports[client[cs_idx].port_idx].s_port,
client[cs_idx].ip ? cs_inet_ntoa(client[cs_idx].ip) : "",
client[cs_idx].ip ? t_grant : t_grant+1,
username(cs_idx), t_msg[rc]);
}
else
{
cs_log("%s %s-client %s%s (%s, %s)",
client[cs_idx].crypted ? t_crypt : t_plain,
e_txt ? e_txt : ph[client[cs_idx].ctyp].desc,
client[cs_idx].ip ? cs_inet_ntoa(client[cs_idx].ip) : "",
client[cs_idx].ip ? t_grant : t_grant+1,
username(cs_idx), t_msg[rc]);
}
break;
}
return(rc);
}
void cs_disconnect_client(void)
{
char buf[32]={0};
if (client[cs_idx].ip)
sprintf(buf, " from %s", cs_inet_ntoa(client[cs_idx].ip));
cs_log("%s disconnected%s", username(cs_idx), buf);
cs_exit(0);
}
int check_ecmcache(ECM_REQUEST *er, ulong grp)
{
int i;
// cs_ddump(ecmd5, CS_ECMSTORESIZE, "ECM search");
//cs_log("cache CHECK: grp=%lX", grp);
for(i=0; icaid &&
(!memcmp(ecmcache[i].ecmd5, er->ecmd5, CS_ECMSTORESIZE)))
{
//cs_log("cache found: grp=%lX cgrp=%lX", grp, ecmcache[i].grp);
memcpy(er->cw, ecmcache[i].cw, 16);
return(1);
}
return(0);
}
static void store_ecm(ECM_REQUEST *er)
{
int rc;
rc=*ecmidx;
*ecmidx=(*ecmidx+1) % CS_ECMCACHESIZE;
//cs_log("store ecm from reader %d", er->reader[0]);
memcpy(ecmcache[rc].ecmd5, er->ecmd5, CS_ECMSTORESIZE);
memcpy(ecmcache[rc].cw, er->cw, 16);
ecmcache[rc].caid = er->caid;
ecmcache[rc].grp = reader[er->reader[0]].grp;
//cs_ddump(ecmcache[*ecmidx].ecmd5, CS_ECMSTORESIZE, "ECM stored (idx=%d)", *ecmidx);
}
void store_logentry(char *txt)
{
#ifdef CS_LOGHISTORY
char *ptr;
ptr=(char *)(loghist+(*loghistidx*CS_LOGHISTSIZE));
ptr[0]='\1'; // make username unusable
ptr[1]='\0';
if ((client[cs_idx].typ=='c') || (client[cs_idx].typ=='m'))
cs_strncpy(ptr, client[cs_idx].usr, 31);
cs_strncpy(ptr+32, txt, CS_LOGHISTSIZE-33);
*loghistidx=(*loghistidx+1) % CS_MAXLOGHIST;
#endif
}
/*
* write_to_pipe():
* write all kind of data to pipe specified by fd
*/
int write_to_pipe(int fd, int id, uchar *data, int n)
{
uchar buf[1024+3+sizeof(int)];
//printf("WRITE_START pid=%d", getpid()); fflush(stdout);
if ((id<0) || (id>PIP_ID_MAX))
return(PIP_ID_ERR);
memcpy(buf, PIP_ID_TXT[id], 3);
memcpy(buf+3, &n, sizeof(int));
memcpy(buf+3+sizeof(int), data, n);
n+=3+sizeof(int);
//n=write(fd, buf, n);
//printf("WRITE_END pid=%d", getpid()); fflush(stdout);
//return(n);
if( !fd )
cs_log("write_to_pipe: fd==0");
return(write(fd, buf, n));
}
/*
* read_from_pipe():
* read all kind of data from pipe specified by fd
* special-flag redir: if set AND data is ECM: this will redirected to appr. client
*/
int read_from_pipe(int fd, uchar **data, int redir)
{
int rc;
static int hdr=0;
static uchar buf[1024+1+3+sizeof(int)];
*data=(uchar *)0;
rc=PIP_ID_NUL;
if (!hdr)
{
if (bytes_available(fd))
{
if (read(fd, buf, 3+sizeof(int))==3+sizeof(int))
memcpy(&hdr, buf+3, sizeof(int));
else
cs_log("WARNING: pipe header to small !");
}
}
if (hdr)
{
int l;
for (l=0; (rc<0) && (PIP_ID_TXT[l]); l++)
if (!memcmp(buf, PIP_ID_TXT[l], 3))
rc=l;
if (rc<0)
{
fprintf(stderr, "WARNING: pipe garbage");
fflush(stderr);
cs_log("WARNING: pipe garbage");
rc=PIP_ID_ERR;
}
else
{
l=hdr;
if ((l+3-1+sizeof(int))>sizeof(buf))
{
cs_log("WARNING: packet size (%d) to large", l);
l=sizeof(buf)+3-1+sizeof(int);
}
if (!bytes_available(fd))
return(PIP_ID_NUL);
hdr=0;
if (read(fd, buf+3+sizeof(int), l)==l)
*data=buf+3+sizeof(int);
else
{
cs_log("WARNING: pipe data to small !");
return(PIP_ID_ERR);
}
buf[l+3+sizeof(int)]=0;
if ((redir) && (rc==PIP_ID_ECM))
{
//int idx;
ECM_REQUEST *er;
er=(ECM_REQUEST *)(buf+3+sizeof(int));
if( er->cidx && client[er->cidx].fd_m2c )
if (!write(client[er->cidx].fd_m2c, buf, l+3+sizeof(int))) cs_exit(1);
rc=PIP_ID_DIR;
}
}
}
return(rc);
}
/*
* write_ecm_request():
*/
int write_ecm_request(int fd, ECM_REQUEST *er)
{
return(write_to_pipe(fd, PIP_ID_ECM, (uchar *) er, sizeof(ECM_REQUEST)));
}
int write_ecm_DCW(int fd, ECM_REQUEST *er)
{
return(write_to_pipe(fd, PIP_ID_DCW, (uchar *) er, sizeof(ECM_REQUEST)));
}
/*
* This function writes the current CW from ECM struct to a cwl file.
* The filename is re-calculated and file re-opened every time.
* This will consume a bit cpu time, but nothing has to be stored between
* each call. If not file exists, a header is prepended
*/
void logCWtoFile(ECM_REQUEST *er)
{
FILE *pfCWL;
char srvname[128];
/* %s / %s _I %04X _ %s .cwl */
char buf[256 + sizeof(srvname)];
char date[7];
unsigned char i, parity, writeheader = 0;
time_t t;
struct tm *timeinfo;
struct s_srvid *this;
/*
* search service name for that id and change characters
* causing problems in file name
*/
srvname[0] = 0;
for (this=cfg->srvid; this; this = this->next) {
if (this->srvid == er->srvid) {
cs_strncpy(srvname, this->name, sizeof(srvname));
srvname[sizeof(srvname)-1] = 0;
for (i = 0; srvname[i]; i++)
if (srvname[i] == ' ') srvname[i] = '_';
break;
}
}
/* calc log file name */
time(&t);
timeinfo = localtime(&t);
strftime(date, sizeof(date), "%y%m%d", timeinfo);
sprintf(buf, "%s/%s_I%04X_%s.cwl", cfg->cwlogdir, date, er->srvid, srvname);
/* open failed, assuming file does not exist, yet */
if((pfCWL = fopen(buf, "r")) == NULL) {
writeheader = 1;
} else {
/* we need to close the file if it was opened correctly */
fclose(pfCWL);
}
if ((pfCWL = fopen(buf, "a+")) == NULL) {
/* maybe this fails because the subdir does not exist. Is there a common function to create it?
for the moment do not print to log on every ecm
cs_log(""error opening cw logfile for writing: %s (errno %d)", buf, errno); */
return;
}
if (writeheader) {
/* no global macro for cardserver name :( */
fprintf(pfCWL, "# OSCam cardserver v%s - http://streamboard.gmc.to:8001/oscam/wiki\n", CS_VERSION_X);
fprintf(pfCWL, "# control word log file for use with tsdec offline decrypter\n");
strftime(buf, sizeof(buf),"DATE %Y-%m-%d, TIME %H:%M:%S, TZ %Z\n", timeinfo);
fprintf(pfCWL, "# %s", buf);
fprintf(pfCWL, "# CAID 0x%04X, SID 0x%04X, SERVICE \"%s\"\n", er->caid, er->srvid, srvname);
}
parity = er->ecm[0]&1;
fprintf(pfCWL, "%d ", parity);
for (i = parity * 8; i < 8 + parity * 8; i++)
fprintf(pfCWL, "%02X ", er->cw[i]);
/* better use incoming time er->tps rather than current time? */
strftime(buf,sizeof(buf),"%H:%M:%S\n", timeinfo);
fprintf(pfCWL, "# %s", buf);
fflush(pfCWL);
fclose(pfCWL);
}
int write_ecm_answer(int fd, ECM_REQUEST *er)
{
int i;
uchar c;
for (i=0; i<16; i+=4)
{
c=((er->cw[i]+er->cw[i+1]+er->cw[i+2]) & 0xff);
if (er->cw[i+3]!=c)
{
cs_debug("notice: changed dcw checksum byte cw[%i] from %02x to %02x", i+3, er->cw[i+3],c);
er->cw[i+3]=c;
}
}
er->reader[0]=ridx;
//cs_log("answer from reader %d (rc=%d)", er->reader[0], er->rc);
er->caid=er->ocaid;
#ifdef CS_WITH_GBOX
if (er->rc==1||(er->gbxRidx&&er->rc==0)) {
#else
if (er->rc==1) {
#endif
store_ecm(er);
/* CWL logging only if cwlogdir is set in config */
if (cfg->cwlogdir != NULL)
logCWtoFile(er);
}
return(write_ecm_request(fd, er));
}
/*
static int cs_read_timer(int fd, uchar *buf, int l, int msec)
{
struct timeval tv;
fd_set fds;
int rc;
if (!fd) return(-1);
tv.tv_sec = msec / 1000;
tv.tv_usec = (msec % 1000) * 1000;
FD_ZERO(&fds);
FD_SET(pfd, &fds);
select(fd+1, &fds, 0, 0, &tv);
rc=0;
if (FD_ISSET(pfd, &fds))
if (!(rc=read(fd, buf, l)))
rc=-1;
return(rc);
}*/
ECM_REQUEST *get_ecmtask()
{
int i, n;
ECM_REQUEST *er=0;
if (!ecmtask)
{
n=(ph[client[cs_idx].ctyp].multi)?CS_MAXPENDING:1;
if( (ecmtask=(ECM_REQUEST *)malloc(n*sizeof(ECM_REQUEST))) )
memset(ecmtask, 0, n*sizeof(ECM_REQUEST));
}
n=(-1);
if (!ecmtask)
{
cs_log("Cannot allocate memory (errno=%d)", errno);
n=(-2);
}
else
if (ph[client[cs_idx].ctyp].multi)
{
for (i=0; (n<0) && (irc=100;
er->cpti=n;
er->cidx=cs_idx;
cs_ftime(&er->tps);
}
return(er);
}
int send_dcw(ECM_REQUEST *er)
{
static char *stxt[]={"found", "cache1", "cache2", "emu",
"not found", "timeout", "sleeping",
"fake", "invalid", "corrupt", "no card", "expdate", "disabled"};
static char *stxtEx[]={"", "group", "caid", "ident", "class", "chid", "queue", "peer"};
static char *stxtWh[]={"", "user ", "reader ", "server ", "lserver "};
char sby[32]="";
char erEx[32]="";
char uname[38]="";
struct timeb tpe;
ushort lc, *lp;
for (lp=(ushort *)er->ecm+(er->l>>2), lc=0; lp>=(ushort *)er->ecm; lp--)
lc^=*lp;
cs_ftime(&tpe);
#ifdef CS_WITH_GBOX
if(er->gbxFrom)
snprintf(uname,sizeof(uname)-1, "%s(%04X)", username(cs_idx), er->gbxFrom);
else
#endif
snprintf(uname,sizeof(uname)-1, "%s", username(cs_idx));
if (er->rc==0)
{
#ifdef CS_WITH_GBOX
if(reader[er->reader[0]].typ==R_GBOX)
snprintf(sby, sizeof(sby)-1, " by %s(%04X)", reader[er->reader[0]].label,er->gbxCWFrom);
else
#endif
// add marker to reader if ECM_REQUEST was betatunneled
if(er->btun)
snprintf(sby, sizeof(sby)-1, " by %s(btun)", reader[er->reader[0]].label);
else
snprintf(sby, sizeof(sby)-1, " by %s", reader[er->reader[0]].label);
}
if (er->rc<4) er->rcEx=0;
if (er->rcEx)
snprintf(erEx, sizeof(erEx)-1, "rejected %s%s", stxtWh[er->rcEx>>4],
stxtEx[er->rcEx&0xf]);
client[cs_idx].cwlastresptime = 1000*(tpe.time-er->tps.time)+tpe.millitm-er->tps.millitm;
if(cfg->mon_appendchaninfo)
cs_log("%s (%04X&%06X/%04X/%02X:%04X): %s (%d ms)%s - %s",
uname, er->caid, er->prid, er->srvid, er->l, lc,
er->rcEx?erEx:stxt[er->rc], client[cs_idx].cwlastresptime, sby, monitor_get_srvname(er->srvid, er->caid));
else
cs_log("%s (%04X&%06X/%04X/%02X:%04X): %s (%d ms)%s",
uname, er->caid, er->prid, er->srvid, er->l, lc,
er->rcEx?erEx:stxt[er->rc], client[cs_idx].cwlastresptime, sby);
if(!client[cs_idx].ncd_server && client[cs_idx].autoau && er->rcEx==0)
{
if(client[cs_idx].au>=0 && er->caid!=reader[client[cs_idx].au].caid[0])
{
client[cs_idx].au=(-1);
}
client[cs_idx].au=er->reader[0];
if(client[cs_idx].au<0)
{
int r=0;
for(r=0;rcaid==reader[r].caid[0])
{
client[cs_idx].au=r;
break;
}
}
if(r==CS_MAXREADER)
{
client[cs_idx].au=(-1);
}
}
}
er->caid = er->ocaid;
switch(er->rc) {
case 0:
case 3:
// 0 - found
// 3 - emu FIXME: obsolete ?
client[cs_idx].cwfound++;
break;
case 1:
case 2:
// 1 - cache1
// 2 - cache2
client[cs_idx].cwcache++;
break;
case 4:
case 9:
case 10:
// 4 - not found
// 9 - corrupt
// 10 - no card
if (er->rcEx)
client[cs_idx].cwignored++;
else
client[cs_idx].cwnot++;
break;
case 5:
// 5 - timeout
client[cs_idx].cwtout++;
break;
default:
client[cs_idx].cwignored++;
}
#ifdef CS_ANTICASC
ac_chk(er, 1);
#endif
cs_ddump_mask (D_ATR, er->cw, 16, "cw:");
if (er->rc==7) er->rc=0;
ph[client[cs_idx].ctyp].send_dcw(er);
return 0;
}
void chk_dcw(int fd)
{
ECM_REQUEST *er, *ert;
if (read_from_pipe(fd, (uchar **)&er, 0)!=PIP_ID_ECM)
return;
//cs_log("dcw check from reader %d for idx %d (rc=%d)", er->reader[0], er->cpti, er->rc);
ert=&ecmtask[er->cpti];
if (ert->rc<100)
return; // already done
if( (er->caid!=ert->caid) || memcmp(er->ecm , ert->ecm , sizeof(er->ecm)) )
return; // obsolete
ert->rcEx=er->rcEx;
if (er->rc>0) // found
{
switch(er->rc)
{
case 2:
ert->rc=2;
break;
case 3:
ert->rc=3;
break;
default:
ert->rc=0;
}
ert->rcEx=0;
ert->reader[0]=er->reader[0];
memcpy(ert->cw , er->cw , sizeof(er->cw));
#ifdef CS_WITH_GBOX
ert->gbxCWFrom=er->gbxCWFrom;
#endif
}
else // not found (from ONE of the readers !)
{
int i;
ert->reader[er->reader[0]]=0;
for (i=0; (ert) && (ireader[i]) // we have still another chance
ert=(ECM_REQUEST *)0;
if (ert) ert->rc=4;
}
if (ert) send_dcw(ert);
return;
}
ulong chk_provid(uchar *ecm, ushort caid)
{
int i;
ulong provid=0;
switch(caid)
{
case 0x100: // seca
provid=b2i(2, ecm+3);
break;
case 0x500: // viaccess
i=(ecm[4]==0xD2) ? ecm[5] + 2 : 0; // skip d2 nano
if ((ecm[5+i]==3) && ((ecm[4+i]==0x90) || (ecm[4+i]==0x40)))
provid=(b2i(3, ecm+6+i) & 0xFFFFF0);
default:
// cryptoworks ?
if( caid&0x0d00 && ecm[8]==0x83 && ecm[9]==1 )
provid=(ulong)ecm[10];
}
return(provid);
}
#ifdef IRDETO_GUESSING
void guess_irdeto(ECM_REQUEST *er)
{
uchar b3;
int b47;
//ushort chid;
struct s_irdeto_quess *ptr;
b3 = er->ecm[3];
ptr = cfg->itab[b3];
if( !ptr ) {
cs_debug("unknown irdeto byte 3: %02X", b3);
return;
}
b47 = b2i(4, er->ecm+4);
//chid = b2i(2, er->ecm+6);
//cs_debug("ecm: b47=%08X, ptr->b47=%08X, ptr->caid=%04X", b47, ptr->b47, ptr->caid);
while( ptr )
{
if( b47==ptr->b47 )
{
if( er->srvid && (er->srvid!=ptr->sid) )
{
cs_debug("sid mismatched (ecm: %04X, guess: %04X), wrong oscam.ird file?",
er->srvid, ptr->sid);
return;
}
er->caid=ptr->caid;
er->srvid=ptr->sid;
er->chid=(ushort)ptr->b47;
// cs_debug("quess_irdeto() found caid=%04X, sid=%04X, chid=%04X",
// er->caid, er->srvid, er->chid);
return;
}
ptr=ptr->next;
}
}
#endif
void cs_betatunnel(ECM_REQUEST *er)
{
int n;
ulong mask_all = 0xFFFF;
TUNTAB *ttab;
ttab = &client[cs_idx].ttab;
for (n = 0; (n < CS_MAXTUNTAB); n++) {
if ((er->caid==ttab->bt_caidfrom[n]) && ((er->srvid==ttab->bt_srvid[n]) || (ttab->bt_srvid[n])==mask_all)) {
uchar hack_n3[13] = {0x70, 0x51, 0xc7, 0x00, 0x00, 0x00, 0x01, 0x10, 0x10, 0x00, 0x87, 0x12, 0x07};
uchar hack_n2[13] = {0x70, 0x51, 0xc9, 0x00, 0x00, 0x00, 0x01, 0x10, 0x10, 0x00, 0x48, 0x12, 0x07};
er->caid = ttab->bt_caidto[n];
er->prid = 0;
er->l = (er->ecm[2]+3);
memmove(er->ecm+14, er->ecm+4, er->l-1);
if (er->l > 0x88) {
memcpy(er->ecm+1, hack_n3, 13);
if (er->ecm[0] == 0x81)
er->ecm[12] += 1;
}
else {
memcpy(er->ecm+1, hack_n2, 13);
}
er->l += 10;
er->ecm[2] = er->l-3;
er->btun = 1;
client[cs_idx].cwtun++;
cs_debug("ECM converted from: 0x%X to BetaCrypt: 0x%X for service id:0x%X",
ttab->bt_caidfrom[n], ttab->bt_caidto[n], ttab->bt_srvid[n]);
}
}
}
void guess_cardsystem(ECM_REQUEST *er)
{
ushort last_hope=0;
// viaccess - check by provid-search
if( (er->prid=chk_provid(er->ecm, 0x500)) )
er->caid=0x500;
// nagra
// is ecm[1] always 0x30 ?
// is ecm[3] always 0x07 ?
if ((er->ecm[6]==1) && (er->ecm[4]==er->ecm[2]-2))
er->caid=0x1801;
// seca2 - very poor
if ((er->ecm[8]==0x10) && ((er->ecm[9]&0xF1)==1))
last_hope=0x100;
// is cryptoworks, but which caid ?
if ((er->ecm[3]==0x81) && (er->ecm[4]==0xFF) &&
(!er->ecm[5]) && (!er->ecm[6]) && (er->ecm[7]==er->ecm[2]-5))
last_hope=0xd00;
#ifdef IRDETO_GUESSING
if (!er->caid && er->ecm[2]==0x31 && er->ecm[0x0b]==0x28)
guess_irdeto(er);
#endif
if (!er->caid) // guess by len ..
er->caid=len4caid[er->ecm[2]+3];
if (!er->caid)
er->caid=last_hope;
}
void request_cw(ECM_REQUEST *er, int flag, int reader_types)
{
int i;
if ((reader_types == 0) || (reader_types == 2))
er->level=flag;
flag=(flag)?3:1; // flag specifies with/without fallback-readers
for (i=0; ireader[i]&flag){
write_ecm_request(reader[i].fd, er);
}
break;
// only local cards
case 1:
if (!(reader[i].typ & R_IS_NETWORK))
if (er->reader[i]&flag)
write_ecm_request(reader[i].fd, er);
break;
// only network
case 2:
if ((reader[i].typ & R_IS_NETWORK))
if (er->reader[i]&flag)
write_ecm_request(reader[i].fd, er);
break;
}
}
}
void get_cw(ECM_REQUEST *er)
{
int i, j, m;
time_t now = time((time_t)0);
client[cs_idx].lastecm = now;
if (!er->caid)
guess_cardsystem(er);
/* Quickfix Area */
if( (er->caid & 0xFF00) == 0x600 && !er->chid )
er->chid = (er->ecm[6]<<8)|er->ecm[7];
// quickfix for 0100:000065
if (er->caid == 0x100 && er->prid == 0x65 && er->srvid == 0)
er->srvid = 0x0642;
// Quickfixes for Opticum/Globo HD9500
// Quickfix for 0500:030300
if (er->caid == 0x500 && er->prid == 0x030300)
er->prid = 0x030600;
// Quickfix for 0500:D20200
if (er->caid == 0x500 && er->prid == 0xD20200)
er->prid = 0x030600;
/* END quickfixes */
if (!er->prid)
er->prid = chk_provid(er->ecm, er->caid);
// Set providerid for newcamd clients if none is given
if( (!er->prid) && client[cs_idx].ncd_server ) {
int pi = client[cs_idx].port_idx;
if( pi >= 0 && cfg->ncd_ptab.nports && cfg->ncd_ptab.nports >= pi )
er->prid = cfg->ncd_ptab.ports[pi].ftab.filts[0].prids[0];
}
// CAID not supported or found
if (!er->caid) {
er->rc = 8;
er->rcEx = E2_CAID;
}
// user expired
if(client[cs_idx].expirationdate && client[cs_idx].expirationdate < client[cs_idx].lastecm)
er->rc = 11;
// user disabled
if(client[cs_idx].disabled != 0)
er->rc = 12;
// rc<100 -> ecm error
if (er->rc > 99) {
m = er->caid;
er->ocaid = er->caid;
i = er->srvid;
if ((i != client[cs_idx].last_srvid) || (!client[cs_idx].lastswitch)) {
client[cs_idx].lastswitch = now;
if(cfg->usrfileflag)
cs_statistics(cs_idx);
}
// user sleeping
if ((client[cs_idx].tosleep) && (now - client[cs_idx].lastswitch > client[cs_idx].tosleep))
er->rc = 6;
client[cs_idx].last_srvid = i;
client[cs_idx].last_caid = m;
for (j = 0; (j < 6) && (er->rc > 99); j++)
{
switch(j) {
case 0:
// fake (uniq)
if (client[cs_idx].dup)
er->rc = 7;
break;
case 1:
// invalid (caid)
if (!chk_bcaid(er, &client[cs_idx].ctab)) {
er->rc = 8;
er->rcEx = E2_CAID;
}
break;
case 2:
// invalid (srvid)
if (!chk_srvid(er, cs_idx))
er->rc = 8;
break;
case 3:
// invalid (ufilters)
if (!chk_ufilters(er))
er->rc = 8;
break;
case 4:
// invalid (sfilter)
if (!chk_sfilter(er, ph[client[cs_idx].ctyp].ptab))
er->rc = 8;
break;
case 5:
// corrupt
if( (i = er->l - (er->ecm[2] + 3)) ) {
if (i > 0) {
cs_debug("warning: ecm size adjusted from 0x%X to 0x%X",
er->l, er->ecm[2] + 3);
er->l = (er->ecm[2] + 3);
}
else
er->rc = 9;
}
break;
}
}
/*BetaCrypt tunneling
*moved behind the check routines,
*because newcamd ECM will fail
*if ECM is converted before
*/
if (&client[cs_idx].ttab)
cs_betatunnel(er);
// store ECM in cache
memcpy(er->ecmd5, MD5(er->ecm, er->l, NULL), CS_ECMSTORESIZE);
// cache1
if (check_ecmcache(er, client[cs_idx].grp))
er->rc = 1;
#ifdef CS_ANTICASC
ac_chk(er, 0);
#endif
}
if(er->rc > 99 && er->rc != 1) {
for (i = m = 0; i < CS_MAXREADER; i++)
if (matching_reader(er, &reader[i]) && (i != ridx))
m|=er->reader[i] = (reader[i].fallback)? 2: 1;
switch(m) {
// no reader -> not found
case 0:
er->rc = 4;
if (!er->rcEx)
er->rcEx = E2_GROUP;
break;
// fallbacks only, switch them
case 2:
for (i = 0; i < CS_MAXREADER; i++)
er->reader[i]>>=1;
}
}
if (er->rc < 100) {
if (cfg->delay)
cs_sleepms(cfg->delay);
send_dcw(er);
return;
}
er->rcEx = 0;
request_cw(er, 0, cfg->preferlocalcards ? 1 : 0);
}
void log_emm_request(int auidx)
{
// cs_log("%s send emm-request (reader=%s, caid=%04X)",
// cs_inet_ntoa(client[cs_idx].ip), reader[auidx].label, reader[auidx].caid[0]);
cs_log("%s emm-request sent (reader=%s, caid=%04X)",
username(cs_idx), reader[auidx].label, reader[auidx].caid[0]);
}
void do_emm(EMM_PACKET *ep)
{
int au;
au = client[cs_idx].au;
cs_ddump_mask(D_ATR, ep->emm, ep->l, "emm:");
if ((au < 0) || (au >= CS_MAXREADER))
return;
if (!reader_get_emm_type(ep, &reader[au])) //decodes ep->type and ep->hexserial from the EMM
return;
cs_ddump_mask(D_EMM, ep->hexserial, 8, "emm UA/SA:");
switch (ep->type) {
case UNKNOWN:
cs_debug_mask(D_EMM, "emmtype UNKNOWN. Reader %s has serial %s.", reader[au].label, cs_hexdump(0, reader[au].hexserial, 8));
if (reader[au].blockemm_unknown) return;
break;
case UNIQUE:
cs_debug_mask(D_EMM, "emmtype UNIQUE. Reader %s has serial %s.", reader[au].label, cs_hexdump(0, reader[au].hexserial, 8));
if (reader[au].blockemm_u) return;
break;
case SHARED:
cs_debug_mask(D_EMM, "emmtype SHARED. Reader %s has serial %s.", reader[au].label, cs_hexdump(0, reader[au].hexserial, 8));
if (reader[au].blockemm_s) return;
break;
// FIXME only camd33 delivers hexserial from the net, newcamd, camd35 copy
// cardreader hexserial in; reader_get_emm_type overwrites this with real SA value if known!
case GLOBAL:
cs_debug_mask(D_EMM, "emmtype GLOBAL. Reader %s has serial %s.", reader[au].label, cs_hexdump(0, reader[au].hexserial, 8));
if (reader[au].blockemm_g) return;
break;
}
client[cs_idx].lastemm = time((time_t)0);
cs_ddump_mask(D_EMM, ep->emm, ep->l, "emm:");
if ((!reader[au].fd) || // reader has no fd
(reader[au].caid[0] != b2i(2,ep->caid))) { // wrong caid
#ifdef WEBIF
client[cs_idx].emmnok++;
#endif
return;
}
#ifdef WEBIF
client[cs_idx].emmok++;
#endif
ep->cidx = cs_idx;
cs_debug_mask(D_EMM, "emm is being sent to reader %s.", reader[au].label);
write_to_pipe(reader[au].fd, PIP_ID_EMM, (uchar *) ep, sizeof(EMM_PACKET));
}
static int comp_timeb(struct timeb *tpa, struct timeb *tpb)
{
if (tpa->time>tpb->time) return(1);
if (tpa->timetime) return(-1);
if (tpa->millitm>tpb->millitm) return(1);
if (tpa->millitmmillitm) return(-1);
return(0);
}
static void build_delay(struct timeb *tpe, struct timeb *tpc)
{
if (comp_timeb(tpe, tpc)>0)
{
tpe->time=tpc->time;
tpe->millitm=tpc->millitm;
}
}
struct timeval *chk_pending(struct timeb tp_ctimeout)
{
int i;
ulong td;
struct timeb tpn, tpe, tpc; // ow, nd, heck
static struct timeval tv;
ECM_REQUEST *er;
cs_ftime(&tpn);
tpe=tp_ctimeout; // latest delay -> disconnect
if (ecmtask)
i=(ph[client[cs_idx].ctyp].multi)?CS_MAXPENDING:1;
else
i=0;
//cs_log("num pend=%d", i);
for (--i; i>=0; i--)
if (ecmtask[i].rc>=100) // check all pending ecm-requests
{
int act, j;
er=&ecmtask[i];
tpc=er->tps;
tpc.millitm += (er->stage) ? cfg->ctimeout : cfg->ftimeout;
tpc.time += tpc.millitm / 1000;
tpc.millitm = tpc.millitm % 1000;
if (!er->stage)
{
for (j=0, act=1; (act) && (jpreferlocalcards && !er->locals_done)
{
if ((er->reader[j]&1) && !(reader[j].typ & R_IS_NETWORK))
act=0;
}
else if (cfg->preferlocalcards && er->locals_done)
{
if ((er->reader[j]&1) && (reader[j].typ & R_IS_NETWORK))
act=0;
}
else
{
if (er->reader[j]&1)
act=0;
}
}
//cs_log("stage 0, act=%d r0=%d, r1=%d, r2=%d, r3=%d, r4=%d r5=%d", act,
// er->reader[0], er->reader[1], er->reader[2],
// er->reader[3], er->reader[4], er->reader[5]);
if (act)
{
int inc_stage = 1;
if (cfg->preferlocalcards && !er->locals_done)
{
int i;
er->locals_done = 1;
for (i = 0; i < CS_MAXREADER; i++)
{
if (reader[i].typ & R_IS_NETWORK)
{
inc_stage = 0;
}
}
}
if (!inc_stage)
{
request_cw(er, er->stage, 2);
tpc.millitm += 1000 * (tpn.time - er->tps.time) + tpn.millitm - er->tps.millitm;
tpc.time += tpc.millitm / 1000;
tpc.millitm = tpc.millitm % 1000;
}
else
{
er->locals_done = 0;
er->stage++;
request_cw(er, er->stage, cfg->preferlocalcards ? 1 : 0);
tpc.millitm += (cfg->ctimeout-cfg->ftimeout);
tpc.time += tpc.millitm / 1000;
tpc.millitm = tpc.millitm % 1000;
}
}
}
if (comp_timeb(&tpn, &tpc)>0) // action needed
{
//cs_log("Action now %d.%03d", tpn.time, tpn.millitm);
//cs_log(" %d.%03d", tpc.time, tpc.millitm);
if (er->stage)
{
er->rc=5; // timeout
send_dcw(er);
continue;
}
else
{
er->stage++;
request_cw(er, er->stage, 0);
tpc.millitm += (cfg->ctimeout-cfg->ftimeout);
tpc.time += tpc.millitm / 1000;
tpc.millitm = tpc.millitm % 1000;
}
}
build_delay(&tpe, &tpc);
}
td=(tpe.time-tpn.time)*1000+(tpe.millitm-tpn.millitm)+5;
tv.tv_sec = td/1000;
tv.tv_usec = (td%1000)*1000;
//cs_log("delay %d.%06d", tv.tv_sec, tv.tv_usec);
return(&tv);
}
int process_input(uchar *buf, int l, int timeout)
{
int rc;
fd_set fds;
struct timeb tp;
if (master_pid!=getppid()) cs_exit(0);
if (!pfd) return(-1);
cs_ftime(&tp);
tp.time+=timeout;
if (ph[client[cs_idx].ctyp].watchdog)
alarm(cfg->cmaxidle + (cfg->ctimeout + 500) / 1000 + 1);
while (1)
{
FD_ZERO(&fds);
FD_SET(pfd, &fds);
FD_SET(fd_m2c, &fds);
rc=select(((pfd>fd_m2c)?pfd:fd_m2c)+1, &fds, 0, 0, chk_pending(tp));
if (master_pid!=getppid()) cs_exit(0);
if (rc<0)
{
if (errno==EINTR) continue;
else return(0);
}
if (FD_ISSET(fd_m2c, &fds)) // read from pipe
chk_dcw(fd_m2c);
if (FD_ISSET(pfd, &fds)) // read from client
{
rc=ph[client[cs_idx].ctyp].recv(buf, l);
break;
}
if (tp.time<=time((time_t *)0)) // client maxidle reached
{
rc=(-9);
break;
}
}
if (ph[client[cs_idx].ctyp].watchdog)
alarm(cfg->cmaxidle + (cfg->ctimeout + 500) / 1000 + 1);
return(rc);
}
static void process_master_pipe()
{
int n;
uchar *ptr;
switch(n=read_from_pipe(mfdr, &ptr, 1))
{
case PIP_ID_LOG:
cs_write_log((char *)ptr);
break;
case PIP_ID_HUP:
cs_accounts_chk();
break;
}
}
void cs_log_config()
{
uchar buf[2048];
if (cfg->nice!=99)
sprintf((char *)buf, ", nice=%d", cfg->nice);
else
buf[0]='\0';
cs_log("version=%s, build #%s, system=%s%s", CS_VERSION_X, CS_SVN_VERSION, cs_platform((char *)buf+64), buf);
cs_log("max. clients=%d, client max. idle=%d sec",
#ifdef CS_ANTICASC
CS_MAXPID-3, cfg->cmaxidle);
#else
CS_MAXPID-2, cfg->cmaxidle);
#endif
if( cfg->max_log_size )
sprintf((char *)buf, "%d Kb", cfg->max_log_size);
else
strcpy((char *)buf, "unlimited");
cs_log("max. logsize=%s", buf);
cs_log("client timeout=%lu ms, fallback timeout=%lu ms, cache delay=%d ms",
cfg->ctimeout, cfg->ftimeout, cfg->delay);
#ifdef CS_NOSHM
cs_log("shared memory initialized (size=%d, fd=%d)", shmsize, shmid);
#else
cs_log("shared memory initialized (size=%d, id=%d)", shmsize, shmid);
#endif
}
void cs_waitforcardinit()
{
if (cfg->waitforcards)
{
int card_init_done, i;
cs_sleepms(3000); // short sleep for card detect to work proberly
do {
card_init_done = 1;
for (i = 0; i < CS_MAXREADER; i++) {
if (reader[i].card_status == CARD_NEED_INIT) {
card_init_done = 0;
break;
}
}
cs_sleepms(300); // wait a little bit
alarm(cfg->cmaxidle + cfg->ctimeout / 1000 + 1);
} while (!card_init_done);
}
}
int main (int argc, char *argv[])
{
struct sockaddr_in cad; /* structure to hold client's address */
int scad; /* length of address */
//int fd; /* socket descriptors */
int i, j, n;
int bg=0;
int gfd; //nph,
int fdp[2];
uchar buf[2048];
void (*mod_def[])(struct s_module *)=
{
module_monitor,
module_camd33,
module_camd35,
module_camd35_tcp,
module_newcamd,
module_cccam,
#ifdef CS_WITH_GBOX
module_gbox,
#endif
module_radegast,
module_oscam_ser,
#ifdef HAVE_DVBAPI
module_dvbapi,
#endif
0
};
while ((i=getopt(argc, argv, "bc:d:hm:"))!=EOF)
{
switch(i)
{
case 'b': bg=1;
break;
case 'c': cs_strncpy(cs_confdir, optarg, sizeof(cs_confdir));
break;
case 'd': cs_dblevel=atoi(optarg);
break;
case 'm':
#ifdef CS_NOSHM
cs_strncpy(cs_memfile, optarg, sizeof(cs_memfile));
break;
#endif
case 'h':
default : usage();
}
}
if (cs_confdir[strlen(cs_confdir)]!='/') strcat(cs_confdir, "/");
init_shm();
init_config();
cfg->debuglvl = cs_dblevel; // give static debuglevel to outer world
for (i=0; mod_def[i]; i++) // must be later BEFORE init_config()
{
memset(&ph[i], 0, sizeof(struct s_module));
mod_def[i](&ph[i]);
}
cs_log("auth size=%d", sizeof(struct s_auth));
init_sidtab();
init_readerdb();
init_userdb();
init_signal();
cs_set_mloc(30, "init");
init_srvid();
init_len4caid();
#ifdef IRDETO_GUESSING
init_irdeto_guess_tab();
#endif
cs_init_statistics(cfg->usrfile);
if (pipe(fdp))
{
cs_log("Cannot create pipe (errno=%d)", errno);
cs_exit(1);
}
mfdr=fdp[0];
fd_c2m=fdp[1];
gfd=mfdr+1;
#ifdef OS_MACOSX
if (bg && daemon_compat(1,0))
#else
if (bg && daemon(1,0))
#endif
{
cs_log("Error starting in background (errno=%d)", errno);
cs_exit(1);
}
master_pid=client[0].pid=getpid();
if (cfg->pidfile != NULL)
{
FILE *fp;
if (!(fp=fopen(cfg->pidfile, "w")))
{
cs_log("Cannot open pid-file (errno=%d)", errno);
cs_exit(1);
}
fprintf(fp, "%d\n", getpid());
fclose(fp);
}
for (i=0; inports; j++)
{
start_listener(&ph[i], j);
if( ph[i].ptab->ports[j].fd+1>gfd )
gfd=ph[i].ptab->ports[j].fd+1;
}
//set time for server to now to avoid 0 in monitor/webif
client[0].last=time((time_t *)0);
if(cfg->clientdyndns)
start_client_resolver();
init_service(97); // logger
init_service(98); // resolver
#ifdef WEBIF
init_service(95); // http
#endif
init_cardreader();
cs_log("waiting for local card init");
cs_waitforcardinit();
cs_log("init for all local cards done");
#ifdef CS_ANTICASC
if( !cfg->ac_enabled )
cs_log("anti cascading disabled");
else
{
init_ac();
init_service(96);
}
#endif
for (i=0; inports; j++)
if (ph[i].ptab->ports[j].fd)
FD_SET(ph[i].ptab->ports[j].fd, &fds);
errno=0;
cs_set_mloc(0, "before select");
select(gfd, &fds, 0, 0, 0);
cs_set_mloc(60, "after select");
} while (errno==EINTR);
cs_set_mloc(-1, "event (global)");
client[0].last=time((time_t *)0);
scad = sizeof(cad);
if (FD_ISSET(mfdr, &fds))
{
cs_set_mloc(-1, "event: master-pipe");
process_master_pipe();
}
for (i=0; inports; j++ )
{
if( ph[i].ptab->ports[j].fd && FD_ISSET(ph[i].ptab->ports[j].fd, &fds) )
{
if (ph[i].type==MOD_CONN_UDP)
{
cs_set_mloc(-1, "event: udp-socket");
if ((n=recvfrom(ph[i].ptab->ports[j].fd, buf+3, sizeof(buf)-3, 0, (struct sockaddr *)&cad, (socklen_t *)&scad))>0)
{
int idx;
idx=idx_from_ip(cs_inet_order(cad.sin_addr.s_addr), ntohs(cad.sin_port));
if (!idx)
{
if (pipe(fdp))
{
cs_log("Cannot create pipe (errno=%d)", errno);
cs_exit(1);
}
switch(cs_fork(cs_inet_order(cad.sin_addr.s_addr), ntohs(cad.sin_port)))
{
case -1:
close(fdp[0]);
close(fdp[1]);
break;
case 0:
client[idx=cs_last_idx].ufd=fdp[1];
close(fdp[0]);
break;
default:
// close(fdp[1]); // now used to simulate event
pfd=fdp[0];
wait4master();
client[cs_idx].ctyp=i;
client[cs_idx].port_idx=j;
client[cs_idx].udp_fd=ph[i].ptab->ports[j].fd;
client[cs_idx].udp_sa=cad;
if (ph[client[cs_idx].ctyp].watchdog)
alarm(cfg->cmaxidle + cfg->ctimeout / 1000 + 1);
ph[i].s_handler(cad); // never return
}
}
if (idx)
{
unsigned short rl;
rl=n;
buf[0]='U';
memcpy(buf+1, &rl, 2);
if (!write(client[idx].ufd, buf, n+3)) cs_exit(1);
}
}
}
else
{
cs_set_mloc(-1, "event: tcp-socket");
if ((pfd=accept(ph[i].ptab->ports[j].fd, (struct sockaddr *)&cad, (socklen_t *)&scad))>0)
{
switch(cs_fork(cs_inet_order(cad.sin_addr.s_addr), ntohs(cad.sin_port)))
{
case -1:
case 0:
close(pfd);
break;
default:
wait4master();
client[cs_idx].ctyp=i;
client[cs_idx].udp_fd=pfd;
client[cs_idx].port_idx=j;
if (ph[client[cs_idx].ctyp].watchdog)
alarm(cfg->cmaxidle + cfg->ctimeout / 1000 + 1);
ph[i].s_handler();
}
}
}
}
}
} // if (ph[i].type & MOD_CONN_NET)
}
}
cs_exit(1);
}