- int numbytes, i, received, ret;
- struct hostent *he;
- struct sockaddr_in their_addr;
- char *command = NULL;
- char buf[8192];
- char *auth_str;
- long unsigned challenge_nr;
- unsigned char rc4_buf[2 * RC4_KEY_LEN] = "";
-
- ret = client_parse_config(argc, argv, &pcd);
- if (ret < 0)
- goto out;
- if (pcd->conf.loglevel_arg <= NOTICE)
- cmdline_parser_print_version();
- PARA_INFO_LOG(
- "current loglevel: %d\n"
- "using config_file: %s\n"
- "using key_file: %s\n"
- "connecting to %s:%d\n",
- pcd->conf.loglevel_arg,
- pcd->config_file,
- pcd->key_file,
- pcd->conf.hostname_arg,
- pcd->conf.server_port_arg
- );
- /* concat args */
- for (i = 0; i < pcd->conf.inputs_num; i++)
- append_str(&command, pcd->conf.inputs[i]);
- /* get the host info */
- PARA_NOTICE_LOG("getting host info of %s\n",
- pcd->conf.hostname_arg);
- ret = get_host_info(pcd->conf.hostname_arg, &he);
- if (ret < 0)
- goto out;
- /* get new socket */
- ret = get_socket();
- if (ret < 0)
- goto out;
- pcd->fd = ret;
- /* init their_addr */
- init_sockaddr(&their_addr, pcd->conf.server_port_arg, he);
- /* connect */
- PARA_NOTICE_LOG("connecting to %s\n", pcd->conf.hostname_arg);
- ret = para_connect(pcd->fd, &their_addr);
- if (ret < 0)
- goto out;
- /* receive welcome message */
- ret = recv_buffer(pcd->fd, buf, sizeof(buf));
- if (ret < 0)
- goto out;
- /* send auth command */
- auth_str = make_message("auth %s%s", pcd->conf.plain_given? "" : "rc4 ",
- pcd->user);
- PARA_INFO_LOG("<-- %s--> %s\n", buf, auth_str);
- ret = send_buffer(pcd->fd, auth_str);
- if (ret < 0)
- goto out;
- /* receive challenge number */
- ret = recv_buffer(pcd->fd, buf, sizeof(buf));
- if (ret < 0)
- goto out;
- if (ret != 64) {
- ret = -E_INVALID_CHALLENGE;
- PARA_ERROR_LOG("received the following: %s\n", buf);
- goto out;
- }
- PARA_INFO_LOG("%s", "<-- [challenge]\n");
- /* decrypt challenge number */
- ret = para_decrypt_challenge(pcd->key_file, &challenge_nr,
- (unsigned char *) buf, 64);
- if (ret < 0)
- goto out;
- /* send decrypted challenge */
- PARA_INFO_LOG("--> %lu\n", challenge_nr);
- ret = send_va_buffer(pcd->fd, "%s%lu", CHALLENGE_RESPONSE_MSG, challenge_nr);
- if (ret < 0)
- goto out;
- /* wait for approval */
- PARA_NOTICE_LOG("%s", "waiting for approval from server\n");
- ret = recv_buffer(pcd->fd, buf, sizeof(buf));
- if (ret < 0)
- goto out;
- numbytes = ret;
- PARA_INFO_LOG("++++ server info ++++\n%s\n++++ end of server "
- "info ++++\n", buf);
- /* check if server has sent "Proceed" message */
- ret = -E_CLIENT_AUTH;
- if (!strstr(buf, PROCEED_MSG))
- goto out;
- if (numbytes >= PROCEED_MSG_LEN + 32) {
- PARA_INFO_LOG("%s", "decrypting session key\n");
- ret = para_decrypt_buffer(pcd->key_file, rc4_buf,
- (unsigned char *)buf + PROCEED_MSG_LEN + 1,
- numbytes - PROCEED_MSG_LEN - 1);
- if (ret < 0)
- goto out;
- RC4_set_key(&pcd->rc4_send_key, RC4_KEY_LEN, rc4_buf);
- RC4_set_key(&pcd->rc4_recv_key, RC4_KEY_LEN, rc4_buf + RC4_KEY_LEN);
- PARA_INFO_LOG("rc4 encryption activated: %x:%x:%x:%x\n",
- rc4_buf[0], rc4_buf[1], rc4_buf[2], rc4_buf[3]);
- enable_crypt(pcd->fd, rc4_recv, rc4_send);
- }
- /* send command */
- PARA_INFO_LOG("--> %s\n", command);
- ret = send_buffer(pcd->fd, command);
- if (ret < 0)
- goto out;
- free(command);
- command = NULL;
- ret = send_buffer(pcd->fd, EOC_MSG "\n");