oftp.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274
  1. package main
  2. import (
  3. "crypto/tls"
  4. "encoding/binary"
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "net"
  9. "os"
  10. "strconv"
  11. "time"
  12. )
  13. func (o *Oftp) New(filename string) error {
  14. // Set default values
  15. newOftp := Oftp{
  16. LocalCode: "LOCALCODE",
  17. LocalPassword: "LOCALPWD",
  18. PartnerCode: "1234567890CODE",
  19. PartnerPassword: "SUPERSECRET",
  20. OftpLevel: 4,
  21. OftpBuffer: 512,
  22. OftpDuplex: "S",
  23. OftpCompression: "N",
  24. OftpRestart: "N",
  25. OftpCredit: 7,
  26. OftpAuthentication: "N",
  27. NetworkHost: "localhost",
  28. NetworkPort: 3305,
  29. NetworkTimeout: 10,
  30. NetworkTLS: false,
  31. }
  32. f, err := os.Open(filename)
  33. if err != nil {
  34. return err
  35. }
  36. defer f.Close()
  37. d := json.NewDecoder(f)
  38. if err := d.Decode(&newOftp); err != nil {
  39. return err
  40. }
  41. *o = newOftp
  42. return nil
  43. }
  44. func (o Oftp) Call() error {
  45. // 1. Open connection
  46. // 2. Wait for SSRM
  47. // 3. Send SSID
  48. // 4. Wait for SSID
  49. // 5. Validate SSID
  50. // 6. Send ESID
  51. // 1. Open connection
  52. var conn net.Conn
  53. var err error
  54. if o.NetworkTLS {
  55. /*
  56. netDialer := &net.Dialer{
  57. Timeout: time.Duration(o.NetworkTimeout) * time.Second,
  58. }
  59. */
  60. tlsConfig := &tls.Config{
  61. InsecureSkipVerify: true,
  62. }
  63. //conn, err = tls.DialWithDialer(netDialer, "tcp", fmt.Sprintf("%s:%d", o.NetworkHost, o.NetworkPort), tlsConfig)
  64. conn, err = tls.Dial("tcp", fmt.Sprintf("%s:%d", o.NetworkHost, o.NetworkPort), tlsConfig)
  65. if err != nil {
  66. return err
  67. }
  68. defer conn.Close()
  69. } else {
  70. conn, err = net.DialTimeout("tcp", fmt.Sprintf("%s:%d", o.NetworkHost, o.NetworkPort), time.Duration(o.NetworkTimeout)*time.Second)
  71. if err != nil {
  72. return err
  73. }
  74. defer conn.Close()
  75. }
  76. fmt.Printf("Connected to %s:%d\n", o.NetworkHost, o.NetworkPort)
  77. // 2. Wait for SSRM
  78. headerBuf := make([]byte, 4)
  79. dataBuf := make([]byte, o.OftpBuffer)
  80. // Read STH (header)
  81. readCnt, err := conn.Read(headerBuf)
  82. if err != nil {
  83. conn.Close()
  84. return err
  85. }
  86. _, err = parseSTH(headerBuf[:4])
  87. if err != nil {
  88. conn.Close()
  89. return err
  90. }
  91. // Read OFTP command
  92. readCnt, err = conn.Read(dataBuf)
  93. if err != nil {
  94. conn.Close()
  95. return err
  96. }
  97. if string(dataBuf[:readCnt]) != "IODETTE FTP READY \r" && string(dataBuf[:readCnt]) != "IODETTE FTP READY \n" {
  98. conn.Close()
  99. return errors.New(fmt.Sprintf("Expected SSRM (%x), got %x", "IODETTE FTP READY \r", dataBuf[:readCnt]))
  100. }
  101. fmt.Printf("Received SSRM (%d)\n", readCnt)
  102. // 3. Send SSID
  103. writtenCnt, err := conn.Write(o.LocalSSID())
  104. if err != nil {
  105. conn.Close()
  106. return err
  107. }
  108. fmt.Printf("Sent SSID (%d)\n", writtenCnt)
  109. // 4. Wait for SSID
  110. // Read STH (header)
  111. readCnt, err = conn.Read(headerBuf)
  112. if err != nil {
  113. conn.Close()
  114. return err
  115. }
  116. _, err = parseSTH(headerBuf[:4])
  117. if err != nil {
  118. conn.Close()
  119. return err
  120. }
  121. // Read OFTP command
  122. readCnt, err = conn.Read(dataBuf)
  123. if err != nil {
  124. conn.Close()
  125. return err
  126. }
  127. // 5. Validate SSID
  128. ESIDCode := o.ValidateSSID(dataBuf[:readCnt])
  129. if ESIDCode < 0 {
  130. fmt.Println(ESIDCode)
  131. var err error
  132. if ESIDCode > -100 {
  133. // ESID error, disconnect
  134. err = errors.New(fmt.Sprintf("Received negative ESID with reason code %d", ESIDCode*-1))
  135. } else {
  136. err = errors.New("Bad non-ESID reply to SSID")
  137. }
  138. conn.Close()
  139. return err
  140. }
  141. fmt.Printf("Received SSID (%d)\n", readCnt)
  142. // 6. Send ESID
  143. writtenCnt, err = conn.Write(o.ESID(ESIDCode))
  144. if err != nil {
  145. conn.Close()
  146. return err
  147. }
  148. fmt.Printf("Sent ESID (%d) with code %d\n", writtenCnt, ESIDCode)
  149. // Wait for partner to disconnect
  150. conn.SetReadDeadline(time.Now().Add(10 * time.Second))
  151. conn.Read(dataBuf)
  152. conn.Close()
  153. fmt.Println("Disconnected")
  154. if ESIDCode != 0 {
  155. return errors.New(fmt.Sprintf("Ended session with ESID reason code %d", ESIDCode))
  156. }
  157. return nil
  158. }
  159. func (o Oftp) LocalSSID() []byte {
  160. dataBuf := [61]byte{}
  161. copy(dataBuf[0:1], "X")
  162. copy(dataBuf[1:2], fmt.Sprintf("%d", o.OftpLevel))
  163. copy(dataBuf[2:27], o.LocalCode)
  164. copy(dataBuf[27:35], o.LocalPassword)
  165. copy(dataBuf[35:40], fmt.Sprintf("%05d", o.OftpBuffer))
  166. copy(dataBuf[40:41], o.OftpDuplex)
  167. copy(dataBuf[41:42], o.OftpCompression)
  168. copy(dataBuf[42:43], o.OftpRestart)
  169. copy(dataBuf[43:44], "N")
  170. copy(dataBuf[44:47], fmt.Sprintf("%03d", o.OftpCredit))
  171. copy(dataBuf[47:48], o.OftpAuthentication)
  172. copy(dataBuf[60:61], "\r")
  173. sth := buildSTH(len(dataBuf))
  174. stb := []byte{}
  175. stb = append(stb, sth...)
  176. stb = append(stb, dataBuf[:]...)
  177. return stb
  178. }
  179. func (o Oftp) ESID(code int) []byte {
  180. dataBuf := [7]byte{}
  181. copy(dataBuf[0:1], "F")
  182. copy(dataBuf[1:3], fmt.Sprintf("%02d", code))
  183. copy(dataBuf[3:6], fmt.Sprintf("%03d", 0))
  184. copy(dataBuf[6:7], "\r")
  185. sth := buildSTH(len(dataBuf))
  186. stb := []byte{}
  187. stb = append(stb, sth...)
  188. stb = append(stb, dataBuf[:]...)
  189. return stb
  190. }
  191. func (o Oftp) ValidateSSID(SSIDBytes []byte) int {
  192. // Validate cmd, code and password only
  193. cmdByte := string(SSIDBytes[0:1])
  194. if cmdByte == "F" {
  195. ESIDCodeStr := string(SSIDBytes[1:3])
  196. ESIDCodeInt, _ := strconv.Atoi(ESIDCodeStr)
  197. return -1 * ESIDCodeInt
  198. }
  199. if cmdByte != "X" {
  200. return -100
  201. }
  202. codeBytes := string(SSIDBytes[2:27])
  203. if codeBytes != fmt.Sprintf("%-25s", o.PartnerCode) {
  204. return 3
  205. }
  206. passwordBytes := string(SSIDBytes[27:35])
  207. if passwordBytes != fmt.Sprintf("%-8s", o.PartnerPassword) {
  208. return 4
  209. }
  210. return 0
  211. }
  212. func parseSTH(sth []byte) (int32, error) {
  213. sth[0] = 0
  214. length := binary.BigEndian.Uint32(sth)
  215. return int32(length), nil
  216. }
  217. func buildSTH(length int) []byte {
  218. sth := make([]byte, 4)
  219. sth[0] = 16
  220. lengthBytes := make([]byte, 4)
  221. binary.BigEndian.PutUint32(lengthBytes, uint32(length+4))
  222. copy(sth[1:4], lengthBytes[1:4])
  223. return sth
  224. }