mirror of
				https://github.com/taigrr/tplinkController
				synced 2025-01-18 04:43:13 -08:00 
			
		
		
		
	C99 -> ANSI for comms.c, handlers.c
This commit is contained in:
		
							parent
							
								
									80581e5c9c
								
							
						
					
					
						commit
						c57babc9b1
					
				
							
								
								
									
										55
									
								
								comms.c
									
									
									
									
									
								
							
							
						
						
									
										55
									
								
								comms.c
									
									
									
									
									
								
							| @ -10,6 +10,9 @@ | |||||||
| 
 | 
 | ||||||
| bool hs100_encrypt(uint8_t *d, uint8_t *s, size_t len) | bool hs100_encrypt(uint8_t *d, uint8_t *s, size_t len) | ||||||
| { | { | ||||||
|  | 	uint8_t key, temp; | ||||||
|  | 	size_t i; | ||||||
|  | 
 | ||||||
| 	if (d == NULL) | 	if (d == NULL) | ||||||
| 		return false; | 		return false; | ||||||
| 	if (s == NULL) | 	if (s == NULL) | ||||||
| @ -17,9 +20,9 @@ bool hs100_encrypt(uint8_t *d, uint8_t *s, size_t len) | |||||||
| 	if (len == 0) | 	if (len == 0) | ||||||
| 		return false; | 		return false; | ||||||
| 
 | 
 | ||||||
| 	uint8_t key = 0xab; | 	key = 0xab; | ||||||
| 	for (size_t i = 0; i < len; i++) { | 	for (i = 0; i < len; i++) { | ||||||
| 		uint8_t temp = key ^ s[i]; | 		temp = key ^ s[i]; | ||||||
| 		key = temp; | 		key = temp; | ||||||
| 		d[i] = temp; | 		d[i] = temp; | ||||||
| 	} | 	} | ||||||
| @ -28,6 +31,9 @@ bool hs100_encrypt(uint8_t *d, uint8_t *s, size_t len) | |||||||
| 
 | 
 | ||||||
| bool hs100_decrypt(uint8_t *d, uint8_t *s, size_t len) | bool hs100_decrypt(uint8_t *d, uint8_t *s, size_t len) | ||||||
| { | { | ||||||
|  | 	uint8_t key, temp; | ||||||
|  | 	size_t i; | ||||||
|  | 
 | ||||||
| 	if (d == NULL) | 	if (d == NULL) | ||||||
| 		return false; | 		return false; | ||||||
| 	if (s == NULL) | 	if (s == NULL) | ||||||
| @ -35,9 +41,9 @@ bool hs100_decrypt(uint8_t *d, uint8_t *s, size_t len) | |||||||
| 	if (len == 0) | 	if (len == 0) | ||||||
| 		return false; | 		return false; | ||||||
| 
 | 
 | ||||||
| 	uint8_t key = 0xab; | 	key = 0xab; | ||||||
| 	for (size_t i = 0; i < len; i++) { | 	for (i = 0; i < len; i++) { | ||||||
| 		uint8_t temp = key ^ s[i]; | 		temp = key ^ s[i]; | ||||||
| 		key = s[i]; | 		key = s[i]; | ||||||
| 		d[i] = temp; | 		d[i] = temp; | ||||||
| 	} | 	} | ||||||
| @ -46,19 +52,23 @@ bool hs100_decrypt(uint8_t *d, uint8_t *s, size_t len) | |||||||
| 
 | 
 | ||||||
| uint8_t *hs100_encode(size_t *outlen, char *srcmsg) | uint8_t *hs100_encode(size_t *outlen, char *srcmsg) | ||||||
| { | { | ||||||
|  | 	size_t srcmsg_len; | ||||||
|  | 	uint8_t *d; | ||||||
|  | 	uint32_t temp; | ||||||
|  | 
 | ||||||
| 	if (srcmsg == NULL) | 	if (srcmsg == NULL) | ||||||
| 		return NULL; | 		return NULL; | ||||||
| 
 | 
 | ||||||
| 	size_t srcmsg_len = strlen(srcmsg); | 	srcmsg_len = strlen(srcmsg); | ||||||
| 	*outlen = srcmsg_len + 4; | 	*outlen = srcmsg_len + 4; | ||||||
| 	uint8_t *d = calloc(1, *outlen); | 	d = calloc(1, *outlen); | ||||||
| 	if (d == NULL) | 	if (d == NULL) | ||||||
| 		return NULL; | 		return NULL; | ||||||
| 	if (!hs100_encrypt(d + 4, (uint8_t *) srcmsg, srcmsg_len)) { | 	if (!hs100_encrypt(d + 4, (uint8_t *) srcmsg, srcmsg_len)) { | ||||||
| 		free(d); | 		free(d); | ||||||
| 		return NULL; | 		return NULL; | ||||||
| 	} | 	} | ||||||
| 	uint32_t temp = htonl(srcmsg_len); | 	temp = htonl(srcmsg_len); | ||||||
| 	memcpy(d, &temp, 4); | 	memcpy(d, &temp, 4); | ||||||
| 
 | 
 | ||||||
| 	return d; | 	return d; | ||||||
| @ -66,20 +76,22 @@ uint8_t *hs100_encode(size_t *outlen, char *srcmsg) | |||||||
| 
 | 
 | ||||||
| char *hs100_decode(uint8_t *s, size_t s_len) | char *hs100_decode(uint8_t *s, size_t s_len) | ||||||
| { | { | ||||||
|  | 	uint32_t in_s_len; | ||||||
|  | 	char *outbuf; | ||||||
|  | 
 | ||||||
| 	if (s == NULL) | 	if (s == NULL) | ||||||
| 		return NULL; | 		return NULL; | ||||||
| 	if (s_len <= 4) | 	if (s_len <= 4) | ||||||
| 		return NULL; | 		return NULL; | ||||||
| 
 | 
 | ||||||
| 	uint32_t in_s_len; |  | ||||||
| 	memcpy(&in_s_len, s, 4); | 	memcpy(&in_s_len, s, 4); | ||||||
| 	in_s_len = ntohl(in_s_len); | 	in_s_len = ntohl(in_s_len); | ||||||
| 	if ((s_len - 4) < in_s_len) { | 	if ((s_len - 4) < in_s_len) { | ||||||
| 		// packet was cut short- adjust in_s_len
 | 		/* packet was cut short- adjust in_s_len */ | ||||||
| 		in_s_len = s_len - 4; | 		in_s_len = s_len - 4; | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	char *outbuf = calloc(1, in_s_len + 1); | 	outbuf = calloc(1, in_s_len + 1); | ||||||
| 
 | 
 | ||||||
| 	if (!hs100_decrypt((uint8_t *) outbuf, s + 4, in_s_len)) { | 	if (!hs100_decrypt((uint8_t *) outbuf, s + 4, in_s_len)) { | ||||||
| 		free(outbuf); | 		free(outbuf); | ||||||
| @ -92,15 +104,21 @@ char *hs100_decode(uint8_t *s, size_t s_len) | |||||||
| char *hs100_send(char *servaddr, char *msg) | char *hs100_send(char *servaddr, char *msg) | ||||||
| { | { | ||||||
| 	size_t s_len; | 	size_t s_len; | ||||||
| 	uint8_t *s = hs100_encode(&s_len, msg); | 	int sock; | ||||||
|  | 	uint8_t *s, *recvbuf; | ||||||
|  | 	struct sockaddr_in address; | ||||||
|  | 	uint32_t msglen; | ||||||
|  | 	size_t recvsize; | ||||||
|  | 	char *recvmsg; | ||||||
|  | 
 | ||||||
|  | 	s = hs100_encode(&s_len, msg); | ||||||
| 	if (s == NULL) | 	if (s == NULL) | ||||||
| 		return NULL; | 		return NULL; | ||||||
| 
 | 
 | ||||||
| 	int sock = socket(AF_INET, SOCK_STREAM, 0); | 	sock = socket(AF_INET, SOCK_STREAM, 0); | ||||||
| 	if (sock < 0) | 	if (sock < 0) | ||||||
| 		return NULL; | 		return NULL; | ||||||
| 
 | 
 | ||||||
| 	struct sockaddr_in address; |  | ||||||
| 	memset(&address, '0', sizeof(struct sockaddr_in)); | 	memset(&address, '0', sizeof(struct sockaddr_in)); | ||||||
| 
 | 
 | ||||||
| 	address.sin_family = AF_INET; | 	address.sin_family = AF_INET; | ||||||
| @ -115,16 +133,15 @@ char *hs100_send(char *servaddr, char *msg) | |||||||
| 
 | 
 | ||||||
| 	send(sock, s, s_len, 0); | 	send(sock, s, s_len, 0); | ||||||
| 	free(s); | 	free(s); | ||||||
| 	uint32_t msglen; | 	recvsize = recv(sock, &msglen, sizeof(msglen), MSG_PEEK); | ||||||
| 	size_t recvsize = recv(sock, &msglen, sizeof(msglen), MSG_PEEK); |  | ||||||
| 	if (recvsize != sizeof(msglen)) { | 	if (recvsize != sizeof(msglen)) { | ||||||
| 		return NULL; | 		return NULL; | ||||||
| 	} | 	} | ||||||
| 	msglen = ntohl(msglen) + 4; | 	msglen = ntohl(msglen) + 4; | ||||||
| 	uint8_t *recvbuf = calloc(1, (size_t) msglen); | 	recvbuf = calloc(1, (size_t) msglen); | ||||||
| 	recvsize = recv(sock, recvbuf, msglen, MSG_WAITALL); | 	recvsize = recv(sock, recvbuf, msglen, MSG_WAITALL); | ||||||
| 	close(sock); | 	close(sock); | ||||||
| 	char *recvmsg = hs100_decode(recvbuf, msglen); | 	recvmsg = hs100_decode(recvbuf, msglen); | ||||||
| 	free(recvbuf); | 	free(recvbuf); | ||||||
| 	return recvmsg; | 	return recvmsg; | ||||||
| } | } | ||||||
|  | |||||||
							
								
								
									
										50
									
								
								handlers.c
									
									
									
									
									
								
							
							
						
						
									
										50
									
								
								handlers.c
									
									
									
									
									
								
							| @ -6,58 +6,60 @@ | |||||||
| 
 | 
 | ||||||
| char *handler_associate(int argc, char *argv[]) | char *handler_associate(int argc, char *argv[]) | ||||||
| { | { | ||||||
| 	if (argc < 6) { | 	const char *template = | ||||||
| 		fprintf(stderr, "not enough arguments\n"); | 		"{\"netif\":{\"set_stainfo\":{\"ssid\":\"%s\",\"password\":" | ||||||
| 		exit(1); | 		"\"%s\",\"key_type\":%d}}}"; | ||||||
| 	} |  | ||||||
| 	char *plug_addr = argv[1]; | 	char *plug_addr = argv[1]; | ||||||
| 	char *ssid = argv[3]; | 	char *ssid = argv[3]; | ||||||
| 	char *password = argv[4]; | 	char *password = argv[4]; | ||||||
| 	char *key_type = argv[5]; | 	char *key_type = argv[5]; | ||||||
|  | 	char *endptr, *msg, *response; | ||||||
|  | 	int key_type_num; | ||||||
|  | 	size_t len; | ||||||
| 
 | 
 | ||||||
|  | 	if (argc < 6) { | ||||||
|  | 		fprintf(stderr, "not enough arguments\n"); | ||||||
|  | 		exit(1); | ||||||
|  | 	} | ||||||
| 	errno = 0; | 	errno = 0; | ||||||
| 	char *endptr; | 	key_type_num = (int)strtol(key_type, &endptr, 10); | ||||||
| 	int key_type_num = (int)strtol(key_type, &endptr, 10); |  | ||||||
| 	if (errno || endptr == key_type) { | 	if (errno || endptr == key_type) { | ||||||
| 		fprintf(stderr, "invalid key type: %s\n", key_type); | 		fprintf(stderr, "invalid key type: %s\n", key_type); | ||||||
| 		exit(1); | 		exit(1); | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	const char *template = | 	len = snprintf(NULL, 0, template, ssid, password, | ||||||
| 		"{\"netif\":{\"set_stainfo\":{\"ssid\":\"%s\",\"password\":" |  | ||||||
| 		"\"%s\",\"key_type\":%d}}}"; |  | ||||||
| 
 |  | ||||||
| 	size_t len = snprintf(NULL, 0, template, ssid, password, |  | ||||||
| 			key_type_num); | 			key_type_num); | ||||||
| 	len++;	// snprintf does not count the null terminator
 | 	len++;	/* snprintf does not count the null terminator */ | ||||||
| 
 | 
 | ||||||
| 	char *msg = calloc(1, len); | 	msg = calloc(1, len); | ||||||
| 	snprintf(msg, len, template, ssid, password, key_type_num); | 	snprintf(msg, len, template, ssid, password, key_type_num); | ||||||
| 
 | 
 | ||||||
| 	char *response = hs100_send(plug_addr, msg); | 	response = hs100_send(plug_addr, msg); | ||||||
| 
 | 
 | ||||||
| 	return response; | 	return response; | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| char *handler_set_server(int argc, char *argv[]) | char *handler_set_server(int argc, char *argv[]) | ||||||
| { | { | ||||||
|  | 	const char *template = | ||||||
|  | 		"{\"cnCloud\":{\"set_server_url\":{\"server\":\"%s\"}}}"; | ||||||
|  | 	char *plug_addr = argv[1]; | ||||||
|  | 	char *server = argv[3]; | ||||||
|  | 	size_t len; | ||||||
|  | 	char *msg, *response; | ||||||
|  | 
 | ||||||
| 	if (argc < 4) { | 	if (argc < 4) { | ||||||
| 		fprintf(stderr, "not enough arguments\n"); | 		fprintf(stderr, "not enough arguments\n"); | ||||||
| 		exit(1); | 		exit(1); | ||||||
| 	} | 	} | ||||||
| 	char *plug_addr = argv[1]; | 	len = snprintf(NULL, 0, template, server); | ||||||
| 	char *server = argv[3]; | 	len++;	/* snprintf does not count the null terminator */ | ||||||
| 
 | 
 | ||||||
| 	const char *template = | 	msg = calloc(1, len); | ||||||
| 		"{\"cnCloud\":{\"set_server_url\":{\"server\":\"%s\"}}}"; |  | ||||||
| 
 |  | ||||||
| 	size_t len = snprintf(NULL, 0, template, server); |  | ||||||
| 	len++;	// snprintf does not count the null terminator
 |  | ||||||
| 
 |  | ||||||
| 	char *msg = calloc(1, len); |  | ||||||
| 	snprintf(msg, len, template, server); | 	snprintf(msg, len, template, server); | ||||||
| 
 | 
 | ||||||
| 	char *response = hs100_send(plug_addr, msg); | 	response = hs100_send(plug_addr, msg); | ||||||
| 
 | 
 | ||||||
| 	return response; | 	return response; | ||||||
| } | } | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user