version 1.1, 2000/10/10 05:23:21 |
version 1.10, 2000/12/14 01:41:03 |
|
|
/* -*- mode: C; coding: euc-japan -*- */ |
/* -*- mode: C; coding: euc-japan -*- */ |
/* $OpenXM$ */ |
/* $OpenXM: OpenXM/src/ox_toolkit/oxf.c,v 1.9 2000/12/03 16:15:03 ohara Exp $ */ |
|
|
/* |
/* |
This module includes functions for sending/receiveng CMO's. |
This module includes functions for sending/receiveng CMO's. |
Some commnets is written in Japanese by the EUC-JP coded |
Some commnets are written in Japanese by the EUC-JP coded |
character set. |
character set. |
*/ |
*/ |
|
|
|
|
#include <stdlib.h> |
#include <stdlib.h> |
#include <string.h> |
#include <string.h> |
#include <unistd.h> |
#include <unistd.h> |
#include <errno.h> |
|
#include <fcntl.h> |
#include <fcntl.h> |
#include <sys/file.h> |
#include <sys/file.h> |
#include <sys/param.h> |
#include <sys/param.h> |
|
|
#include "mysocket.h" |
#include "mysocket.h" |
#include "ox_toolkit.h" |
#include "ox_toolkit.h" |
|
|
|
static mathcap *oxf_mathcap(OXFILE *oxfp); |
|
|
|
static int send_int32_lbo(OXFILE *oxfp, int int32); |
|
static int send_int32_nbo(OXFILE *oxfp, int int32); |
|
static int receive_int32_lbo(OXFILE *oxfp); |
|
static int receive_int32_nbo(OXFILE *oxfp); |
|
|
|
int oxf_read(void *buffer, size_t size, size_t num, OXFILE *oxfp) |
|
{ |
|
int n = read(oxfp->fd, buffer, size*num); |
|
if (n <= 0) { |
|
oxfp->error = 1; |
|
} |
|
return n; |
|
} |
|
|
|
int oxf_write(void *buffer, size_t size, size_t num, OXFILE *oxfp) |
|
{ |
|
return write(oxfp->fd, buffer, size*num); |
|
} |
|
|
|
/* sending an object of int32 type with Network Byte Order. |
|
(not equal to cmo_int32 type) */ |
|
static int send_int32_nbo(OXFILE *oxfp, int int32) |
|
{ |
|
int32 = htonl(int32); |
|
return oxf_write(&int32, sizeof(int), 1, oxfp); |
|
} |
|
|
|
/* sending an object of int32 type with Local Byte Order. |
|
(not equal to cmo_int32 type) */ |
|
static int send_int32_lbo(OXFILE *oxfp, int int32) |
|
{ |
|
return oxf_write(&int32, sizeof(int), 1, oxfp); |
|
} |
|
|
|
/* receiving an object of int32 type with Network Byte Order. |
|
(not equal to cmo_int32 type) */ |
|
static int receive_int32_nbo(OXFILE *oxfp) |
|
{ |
|
int tag; |
|
oxf_read(&tag, sizeof(int), 1, oxfp); |
|
return ntohl(tag); |
|
} |
|
|
|
/* receiving an object of int32 type with Local Byte Order. |
|
(not equal to cmo_int32 type) */ |
|
static int receive_int32_lbo(OXFILE *oxfp) |
|
{ |
|
int tag; |
|
oxf_read(&tag, sizeof(int), 1, oxfp); |
|
return tag; |
|
} |
|
|
|
/* (1) getting the fd by socket(2). |
|
(2) preparing a buffer by fdopen(fd, "a+"). (not "w+") |
|
(3) determing the byte order of the OX connection. |
|
(4) setting function pointers by oxf_setopt(). |
|
*/ |
OXFILE *oxf_open(int fd) |
OXFILE *oxf_open(int fd) |
{ |
{ |
OXFILE *oxfp = (OXFILE *)malloc(sizeof(OXFILE)); |
OXFILE *oxfp = (OXFILE *)malloc(sizeof(OXFILE)); |
oxfp->fd = fd; |
oxfp->fd = fd; |
oxfp->send_int32 = send_int32_nbo; |
oxfp->send_int32 = send_int32_nbo; |
oxfp->receive_int32 = receive_int32_nbo; |
oxfp->receive_int32 = receive_int32_nbo; |
oxfp->control = NULL; |
oxfp->serial_number = 0; |
|
oxfp->control = NULL; |
|
oxfp->error = 0; |
|
oxfp->mathcap = NULL; |
return oxfp; |
return oxfp; |
/* oxfp->fp = fdopen(fd, "a+"); */ |
/* oxfp->fp = fdopen(fd, "a+"); */ |
/* return (oxfp->fp != NULL)? oxfp: NULL; */ |
/* return (oxfp->fp != NULL)? oxfp: NULL; */ |
} |
} |
|
|
|
int oxf_fileno(OXFILE *oxfp) |
|
{ |
|
return oxfp->fd; |
|
} |
|
|
OXFILE *oxf_control(OXFILE *oxfp) |
OXFILE *oxf_control(OXFILE *oxfp) |
{ |
{ |
return oxfp->control; |
return oxfp->control; |
} |
} |
|
|
/* The function determines a byte order of integer on the OpenXM |
/* The function determines a byte order of integer on the OpenXM |
Line 54 void oxf_determine_byteorder_client(OXFILE *oxfp) |
|
Line 120 void oxf_determine_byteorder_client(OXFILE *oxfp) |
|
oxf_setopt(oxfp, mode); |
oxf_setopt(oxfp, mode); |
} |
} |
|
|
/* Server 側ではこちらを用いる */ |
/* If the program is an OX server, then you must use this function. */ |
/* いまの実装は dup されていることが前提になっている */ |
|
void oxf_determine_byteorder_server(OXFILE *oxfp) |
void oxf_determine_byteorder_server(OXFILE *oxfp) |
{ |
{ |
int offer = OX_BYTE_LITTLE_ENDIAN; |
int offer = OX_BYTE_LITTLE_ENDIAN; |
Line 93 void oxf_setopt(OXFILE *oxfp, int mode) |
|
Line 158 void oxf_setopt(OXFILE *oxfp, int mode) |
|
} |
} |
} |
} |
|
|
|
int oxf_listen(short *portp) |
|
{ |
|
char localhost[MAXHOSTNAMELEN]; |
|
if (gethostname(localhost, MAXHOSTNAMELEN)==0) { |
|
return mysocketListen(localhost, portp); |
|
} |
|
return -1; |
|
} |
|
|
OXFILE *oxf_connect_active(char *hostname, short port) |
OXFILE *oxf_connect_active(char *hostname, short port) |
{ |
{ |
int fd = mysocketOpen(hostname, port); |
int fd = mysocketOpen(hostname, port); |
Line 110 OXFILE *oxf_connect_passive(int listened) |
|
Line 184 OXFILE *oxf_connect_passive(int listened) |
|
/* a password generator. */ |
/* a password generator. */ |
char *generate_otp() |
char *generate_otp() |
{ |
{ |
static char crypto[] = "%.,^_+-=/@0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; |
static char crypto[] = "%.,^_+-=/@0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; |
static char otp[LENGTH_OF_ONETIME_PASSWORD+1] = {0}; |
static char otp[LENGTH_OF_ONETIME_PASSWORD+1] = {0}; |
int i; |
int i; |
|
|
Line 138 int oxf_confirm_server(OXFILE *oxfp, char *passwd) |
|
Line 212 int oxf_confirm_server(OXFILE *oxfp, char *passwd) |
|
return oxf_write(passwd, 1, strlen(passwd)+1, oxfp); |
return oxf_write(passwd, 1, strlen(passwd)+1, oxfp); |
} |
} |
|
|
|
__inline__ |
|
static mathcap *oxf_mathcap(OXFILE *oxfp) |
|
{ |
|
if (oxfp->mathcap == NULL) { |
|
oxfp->mathcap = new_mathcap(); |
|
} |
|
return oxfp->mathcap; |
|
} |
|
|
|
cmo_mathcap *oxf_cmo_mathcap(OXFILE *oxfp) |
|
{ |
|
return mathcap_get(oxf_mathcap(oxfp)); |
|
} |
|
|
|
void oxf_mathcap_update(OXFILE *oxfp, cmo_mathcap *ob) |
|
{ |
|
mathcap_update(oxf_mathcap(oxfp), ob); |
|
} |
|
|
/* example: which("xterm", getenv("PATH")); */ |
/* example: which("xterm", getenv("PATH")); */ |
char *which(char *exe, const char *env) |
char *which(char *exe, const char *env) |
{ |
{ |
Line 165 int oxc_start(char *remote_host, short port, char *pas |
|
Line 258 int oxc_start(char *remote_host, short port, char *pas |
|
char localhost[MAXHOSTNAMELEN]; |
char localhost[MAXHOSTNAMELEN]; |
char ports[128]; |
char ports[128]; |
int pid = 0; |
int pid = 0; |
char *cmd = "echo"; |
char *cmd = "oxc"; |
/* char *cmd = "oxc"; */ |
|
|
|
if (gethostname(localhost, MAXHOSTNAMELEN)==0) { |
if (gethostname(localhost, MAXHOSTNAMELEN)==0) { |
if ((pid = fork()) == 0) { |
if ((pid = fork()) == 0) { |
Line 179 int oxc_start(char *remote_host, short port, char *pas |
|
Line 271 int oxc_start(char *remote_host, short port, char *pas |
|
} |
} |
} |
} |
return pid; |
return pid; |
|
} |
|
|
|
/* Remarks: ssh determines remote host by his name, i.e. by arg[0]. */ |
|
int oxc_start_with_pipe(char *remote_host, int port, char *passwd) |
|
{ |
|
char localhost[MAXHOSTNAMELEN]; |
|
char ports[128]; |
|
int pid = 0; |
|
char *cmd = "oxc"; |
|
int pipefd[2]; |
|
|
|
if (gethostname(localhost, MAXHOSTNAMELEN)==0) { |
|
if (pipe(pipefd) < 0) { |
|
return -1; |
|
} |
|
if ((pid = fork()) == 0) { |
|
dup2(pipefd[1], 0); |
|
close(pipefd[0]); |
|
close(pipefd[1]); |
|
execlp("ssh", remote_host, cmd, NULL); |
|
exit(1); |
|
} |
|
close(pipefd[1]); |
|
pipe_send_info(pipefd[0], localhost, port, passwd); |
|
} |
|
return pid; |
|
} |
|
|
|
static void pipe_send_string(int fd, char *s) |
|
{ |
|
int len = strlen(s); |
|
int lenN = htonl(len); |
|
write(fd, &lenN, sizeof(int)); |
|
write(fd, s, len+1); |
|
} |
|
|
|
static char *pipe_read_string() |
|
{ |
|
int len; |
|
char *s; |
|
read(0, &len, sizeof(int)); |
|
len = ntohl(len)+1; |
|
s = malloc(len); |
|
read(0, s, len); |
|
return s; |
|
} |
|
|
|
/* The data format used by pipe_send_info() is defined in OX-RFC-101. */ |
|
void pipe_send_info(int fd, char *hostname, int port, char *password) |
|
{ |
|
port = htonl(port); |
|
write(fd, &port, sizeof(int)); |
|
pipe_send_string(fd, hostname); |
|
pipe_send_string(fd, password); |
|
} |
|
|
|
void pipe_read_info(char **hostname, int *port, char **password) |
|
{ |
|
if (read(0, port, sizeof(int)) > 0) { |
|
*port = ntohl(*port); |
|
*hostname = pipe_read_string(); |
|
*password = pipe_read_string(); |
|
return 0; |
|
} |
|
return -1; |
|
} |
|
|
|
/* Example: oxf_execute_cmd(oxfp, "ox_sm1"); */ |
|
OXFILE *oxf_execute_cmd(OXFILE *oxfp, char *cmd) |
|
{ |
|
short port = 0; |
|
int listened; |
|
|
|
if ((listened = oxf_listen(&port)) != -1) { |
|
cmo_list *args = list_appendl(NULL, list_append(new_cmo_list(), new_cmo_int32(port)), new_cmo_string(cmd), NULL); |
|
send_ox_cmo(oxfp, (cmo *)args); |
|
send_ox_command(oxfp, SM_control_spawn_server); |
|
return oxf_connect_passive(listened); |
|
} |
|
return NULL; |
} |
} |