summaryrefslogtreecommitdiffstats
path: root/sesman/libscp/libscp_v1s.c
diff options
context:
space:
mode:
Diffstat (limited to 'sesman/libscp/libscp_v1s.c')
-rw-r--r--sesman/libscp/libscp_v1s.c1197
1 files changed, 615 insertions, 582 deletions
diff --git a/sesman/libscp/libscp_v1s.c b/sesman/libscp/libscp_v1s.c
index e10af26c..69997ab2 100644
--- a/sesman/libscp/libscp_v1s.c
+++ b/sesman/libscp/libscp_v1s.c
@@ -1,21 +1,20 @@
-/*
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 2 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program; if not, write to the Free Software
- Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-
- xrdp: A Remote Desktop Protocol server.
- Copyright (C) Jay Sorg 2005-2010
-*/
+/**
+ * xrdp: A Remote Desktop Protocol server.
+ *
+ * Copyright (C) Jay Sorg 2004-2012
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
/**
*
@@ -33,634 +32,668 @@
//extern struct log_config* s_log;
/* server API */
-enum SCP_SERVER_STATES_E scp_v1s_accept(struct SCP_CONNECTION* c, struct SCP_SESSION** s, int skipVchk)
+enum SCP_SERVER_STATES_E scp_v1s_accept(struct SCP_CONNECTION *c, struct SCP_SESSION **s, int skipVchk)
{
- struct SCP_SESSION* session;
- tui32 version;
- tui32 size;
- tui16 cmdset;
- tui16 cmd;
- tui8 sz;
- char buf[257];
-
- if (!skipVchk)
- {
-
- if (0 == scp_tcp_force_recv(c->in_sck, c->in_s->data, 8))
- {
- in_uint32_be(c->in_s, version);
- if (version != 1)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: version error", __LINE__);
- return SCP_SERVER_STATE_VERSION_ERR;
- }
- }
- else
+ struct SCP_SESSION *session;
+ tui32 version;
+ tui32 size;
+ tui16 cmdset;
+ tui16 cmd;
+ tui8 sz;
+ char buf[257];
+
+ if (!skipVchk)
{
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
- }
-
- in_uint32_be(c->in_s, size);
- if (size < 12)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: size error", __LINE__);
- return SCP_SERVER_STATE_SIZE_ERR;
- }
-
- init_stream(c->in_s, c->in_s->size);
- if (0 != scp_tcp_force_recv(c->in_sck, c->in_s->data, (size-8)))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- /* reading command set */
- in_uint16_be(c->in_s, cmdset);
-
- /* if we are starting a management session */
- if (cmdset == SCP_COMMAND_SET_MANAGE)
- {
- log_message(LOG_LEVEL_DEBUG, "[v1s:%d] requested management connection", __LINE__);
- /* should return SCP_SERVER_STATE_START_MANAGE */
- return scp_v1s_mng_accept(c, s);
- }
-
- /* if we started with resource sharing... */
- if (cmdset == SCP_COMMAND_SET_RSR)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
- return SCP_SERVER_STATE_SEQUENCE_ERR;
- }
-
- /* reading command */
- in_uint16_be(c->in_s, cmd);
- if (cmd != 1)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
- return SCP_SERVER_STATE_SEQUENCE_ERR;
- }
-
- session = scp_session_create();
- if (0 == session)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error (malloc returned NULL)", __LINE__);
- return SCP_SERVER_STATE_INTERNAL_ERR;
- }
- scp_session_set_version(session, 1);
-
- in_uint8(c->in_s, sz);
- if ((sz != SCP_SESSION_TYPE_XVNC) && (sz != SCP_SESSION_TYPE_XRDP))
- {
- scp_session_destroy(session);
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: unknown session type", __LINE__);
- return SCP_SERVER_STATE_SESSION_TYPE_ERR;
- }
- scp_session_set_type(session, sz);
-
- in_uint16_be(c->in_s, cmd);
- scp_session_set_height(session, cmd);
- in_uint16_be(c->in_s, cmd);
- scp_session_set_height(session, cmd);
- in_uint8(c->in_s, sz);
- scp_session_set_bpp(session, sz);
- in_uint8(c->in_s, sz);
- scp_session_set_rsr(session, sz);
- in_uint8a(c->in_s, buf, 17);
- buf[17]='\0';
- scp_session_set_locale(session, buf);
-
- in_uint8(c->in_s, sz);
- if (sz == SCP_ADDRESS_TYPE_IPV4)
- {
+
+ if (0 == scp_tcp_force_recv(c->in_sck, c->in_s->data, 8))
+ {
+ in_uint32_be(c->in_s, version);
+
+ if (version != 1)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: version error", __LINE__);
+ return SCP_SERVER_STATE_VERSION_ERR;
+ }
+ }
+ else
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+ }
+
in_uint32_be(c->in_s, size);
- scp_session_set_addr(session, SCP_ADDRESS_TYPE_IPV4_BIN, &size);
- }
- else if (sz == SCP_ADDRESS_TYPE_IPV6)
- {
- in_uint8a(c->in_s, buf, 16);
- scp_session_set_addr(session, SCP_ADDRESS_TYPE_IPV6_BIN, buf);
- }
-
- buf[256] = '\0';
- /* reading hostname */
- in_uint8(c->in_s, sz);
- buf[sz]='\0';
- in_uint8a(c->in_s, buf, sz);
- if (0 != scp_session_set_hostname(session, buf))
- {
- scp_session_destroy(session);
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
- return SCP_SERVER_STATE_INTERNAL_ERR;
- }
-
- /* reading username */
- in_uint8(c->in_s, sz);
- buf[sz]='\0';
- in_uint8a(c->in_s, buf, sz);
- if (0 != scp_session_set_username(session, buf))
- {
- scp_session_destroy(session);
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
- return SCP_SERVER_STATE_INTERNAL_ERR;
- }
-
- /* reading password */
- in_uint8(c->in_s, sz);
- buf[sz]='\0';
- in_uint8a(c->in_s, buf, sz);
- if (0 != scp_session_set_password(session, buf))
- {
- scp_session_destroy(session);
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
- return SCP_SERVER_STATE_INTERNAL_ERR;
- }
- /* returning the struct */
- (*s)=session;
+ if (size < 12)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: size error", __LINE__);
+ return SCP_SERVER_STATE_SIZE_ERR;
+ }
+
+ init_stream(c->in_s, c->in_s->size);
+
+ if (0 != scp_tcp_force_recv(c->in_sck, c->in_s->data, (size - 8)))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+
+ /* reading command set */
+ in_uint16_be(c->in_s, cmdset);
+
+ /* if we are starting a management session */
+ if (cmdset == SCP_COMMAND_SET_MANAGE)
+ {
+ log_message(LOG_LEVEL_DEBUG, "[v1s:%d] requested management connection", __LINE__);
+ /* should return SCP_SERVER_STATE_START_MANAGE */
+ return scp_v1s_mng_accept(c, s);
+ }
+
+ /* if we started with resource sharing... */
+ if (cmdset == SCP_COMMAND_SET_RSR)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
+ return SCP_SERVER_STATE_SEQUENCE_ERR;
+ }
+
+ /* reading command */
+ in_uint16_be(c->in_s, cmd);
+
+ if (cmd != 1)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
+ return SCP_SERVER_STATE_SEQUENCE_ERR;
+ }
+
+ session = scp_session_create();
+
+ if (0 == session)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error (malloc returned NULL)", __LINE__);
+ return SCP_SERVER_STATE_INTERNAL_ERR;
+ }
+
+ scp_session_set_version(session, 1);
- return SCP_SERVER_STATE_OK;
+ in_uint8(c->in_s, sz);
+
+ if ((sz != SCP_SESSION_TYPE_XVNC) && (sz != SCP_SESSION_TYPE_XRDP))
+ {
+ scp_session_destroy(session);
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: unknown session type", __LINE__);
+ return SCP_SERVER_STATE_SESSION_TYPE_ERR;
+ }
+
+ scp_session_set_type(session, sz);
+
+ in_uint16_be(c->in_s, cmd);
+ scp_session_set_height(session, cmd);
+ in_uint16_be(c->in_s, cmd);
+ scp_session_set_height(session, cmd);
+ in_uint8(c->in_s, sz);
+ scp_session_set_bpp(session, sz);
+ in_uint8(c->in_s, sz);
+ scp_session_set_rsr(session, sz);
+ in_uint8a(c->in_s, buf, 17);
+ buf[17] = '\0';
+ scp_session_set_locale(session, buf);
+
+ in_uint8(c->in_s, sz);
+
+ if (sz == SCP_ADDRESS_TYPE_IPV4)
+ {
+ in_uint32_be(c->in_s, size);
+ scp_session_set_addr(session, SCP_ADDRESS_TYPE_IPV4_BIN, &size);
+ }
+ else if (sz == SCP_ADDRESS_TYPE_IPV6)
+ {
+ in_uint8a(c->in_s, buf, 16);
+ scp_session_set_addr(session, SCP_ADDRESS_TYPE_IPV6_BIN, buf);
+ }
+
+ buf[256] = '\0';
+ /* reading hostname */
+ in_uint8(c->in_s, sz);
+ buf[sz] = '\0';
+ in_uint8a(c->in_s, buf, sz);
+
+ if (0 != scp_session_set_hostname(session, buf))
+ {
+ scp_session_destroy(session);
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
+ return SCP_SERVER_STATE_INTERNAL_ERR;
+ }
+
+ /* reading username */
+ in_uint8(c->in_s, sz);
+ buf[sz] = '\0';
+ in_uint8a(c->in_s, buf, sz);
+
+ if (0 != scp_session_set_username(session, buf))
+ {
+ scp_session_destroy(session);
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
+ return SCP_SERVER_STATE_INTERNAL_ERR;
+ }
+
+ /* reading password */
+ in_uint8(c->in_s, sz);
+ buf[sz] = '\0';
+ in_uint8a(c->in_s, buf, sz);
+
+ if (0 != scp_session_set_password(session, buf))
+ {
+ scp_session_destroy(session);
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
+ return SCP_SERVER_STATE_INTERNAL_ERR;
+ }
+
+ /* returning the struct */
+ (*s) = session;
+
+ return SCP_SERVER_STATE_OK;
}
enum SCP_SERVER_STATES_E
-scp_v1s_deny_connection(struct SCP_CONNECTION* c, char* reason)
+scp_v1s_deny_connection(struct SCP_CONNECTION *c, char *reason)
{
- int rlen;
-
- init_stream(c->out_s,c->out_s->size);
-
- /* forcing message not to exceed 64k */
- rlen = g_strlen(reason);
- if (rlen > 65535)
- {
- rlen = 65535;
- }
-
- out_uint32_be(c->out_s, 1);
- /* packet size: 4 + 4 + 2 + 2 + 2 + strlen(reason)*/
- /* version + size + cmdset + cmd + msglen + msg */
- out_uint32_be(c->out_s, rlen+14);
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
- out_uint16_be(c->out_s, 2);
- out_uint16_be(c->out_s, rlen);
- out_uint8p(c->out_s, reason, rlen);
-
- if (0!=scp_tcp_force_send(c->in_sck, c->out_s->data, rlen+14))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- return SCP_SERVER_STATE_END;
+ int rlen;
+
+ init_stream(c->out_s, c->out_s->size);
+
+ /* forcing message not to exceed 64k */
+ rlen = g_strlen(reason);
+
+ if (rlen > 65535)
+ {
+ rlen = 65535;
+ }
+
+ out_uint32_be(c->out_s, 1);
+ /* packet size: 4 + 4 + 2 + 2 + 2 + strlen(reason)*/
+ /* version + size + cmdset + cmd + msglen + msg */
+ out_uint32_be(c->out_s, rlen + 14);
+ out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
+ out_uint16_be(c->out_s, 2);
+ out_uint16_be(c->out_s, rlen);
+ out_uint8p(c->out_s, reason, rlen);
+
+ if (0 != scp_tcp_force_send(c->in_sck, c->out_s->data, rlen + 14))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+
+ return SCP_SERVER_STATE_END;
}
enum SCP_SERVER_STATES_E
-scp_v1s_request_password(struct SCP_CONNECTION* c, struct SCP_SESSION* s, char* reason)
+scp_v1s_request_password(struct SCP_CONNECTION *c, struct SCP_SESSION *s, char *reason)
{
- tui8 sz;
- tui32 version;
- tui32 size;
- tui16 cmdset;
- tui16 cmd;
- int rlen;
- char buf[257];
-
- init_stream(c->in_s, c->in_s->size);
- init_stream(c->out_s, c->out_s->size);
-
- /* forcing message not to exceed 64k */
- rlen = g_strlen(reason);
- if (rlen > 65535)
- {
- rlen = 65535;
- }
-
- /* send password request */
- version=1;
- cmd=3;
-
- out_uint32_be(c->out_s, version); /* version */
- out_uint32_be(c->out_s, 14+rlen); /* size */
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
- out_uint16_be(c->out_s, cmd); /* cmd */
-
- out_uint16_be(c->out_s, rlen);
- out_uint8p(c->out_s, reason, rlen);
-
- if (0!=scp_tcp_force_send(c->in_sck, c->out_s->data, 14+rlen))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- /* receive password & username */
- if (0!=scp_tcp_force_recv(c->in_sck, c->in_s->data, 8))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- in_uint32_be(c->in_s, version);
- if (version!=1)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: version error", __LINE__);
- return SCP_SERVER_STATE_VERSION_ERR;
- }
-
- in_uint32_be(c->in_s, size);
- if (size<12)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: size error", __LINE__);
- return SCP_SERVER_STATE_SIZE_ERR;
- }
-
- init_stream(c->in_s, c->in_s->size);
- if (0!=scp_tcp_force_recv(c->in_sck, c->in_s->data, (size-8)))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- in_uint16_be(c->in_s, cmdset);
- if (cmdset != SCP_COMMAND_SET_DEFAULT)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
- return SCP_SERVER_STATE_SEQUENCE_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd != 4)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
- return SCP_SERVER_STATE_SEQUENCE_ERR;
- }
-
- buf[256] = '\0';
- /* reading username */
- in_uint8(c->in_s, sz);
- buf[sz] = '\0';
- in_uint8a(c->in_s, buf, sz);
- if (0 != scp_session_set_username(s, buf))
- {
- scp_session_destroy(s);
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
- return SCP_SERVER_STATE_INTERNAL_ERR;
- }
-
- /* reading password */
- in_uint8(c->in_s, sz);
- buf[sz]='\0';
- in_uint8a(c->in_s, buf, sz);
- if (0 != scp_session_set_password(s, buf))
- {
- scp_session_destroy(s);
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
- return SCP_SERVER_STATE_INTERNAL_ERR;
- }
+ tui8 sz;
+ tui32 version;
+ tui32 size;
+ tui16 cmdset;
+ tui16 cmd;
+ int rlen;
+ char buf[257];
+
+ init_stream(c->in_s, c->in_s->size);
+ init_stream(c->out_s, c->out_s->size);
+
+ /* forcing message not to exceed 64k */
+ rlen = g_strlen(reason);
+
+ if (rlen > 65535)
+ {
+ rlen = 65535;
+ }
+
+ /* send password request */
+ version = 1;
+ cmd = 3;
+
+ out_uint32_be(c->out_s, version); /* version */
+ out_uint32_be(c->out_s, 14 + rlen); /* size */
+ out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
+ out_uint16_be(c->out_s, cmd); /* cmd */
+
+ out_uint16_be(c->out_s, rlen);
+ out_uint8p(c->out_s, reason, rlen);
+
+ if (0 != scp_tcp_force_send(c->in_sck, c->out_s->data, 14 + rlen))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+
+ /* receive password & username */
+ if (0 != scp_tcp_force_recv(c->in_sck, c->in_s->data, 8))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+
+ in_uint32_be(c->in_s, version);
+
+ if (version != 1)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: version error", __LINE__);
+ return SCP_SERVER_STATE_VERSION_ERR;
+ }
+
+ in_uint32_be(c->in_s, size);
+
+ if (size < 12)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: size error", __LINE__);
+ return SCP_SERVER_STATE_SIZE_ERR;
+ }
+
+ init_stream(c->in_s, c->in_s->size);
+
+ if (0 != scp_tcp_force_recv(c->in_sck, c->in_s->data, (size - 8)))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+
+ in_uint16_be(c->in_s, cmdset);
- return SCP_SERVER_STATE_OK;
+ if (cmdset != SCP_COMMAND_SET_DEFAULT)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
+ return SCP_SERVER_STATE_SEQUENCE_ERR;
+ }
+
+ in_uint16_be(c->in_s, cmd);
+
+ if (cmd != 4)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
+ return SCP_SERVER_STATE_SEQUENCE_ERR;
+ }
+
+ buf[256] = '\0';
+ /* reading username */
+ in_uint8(c->in_s, sz);
+ buf[sz] = '\0';
+ in_uint8a(c->in_s, buf, sz);
+
+ if (0 != scp_session_set_username(s, buf))
+ {
+ scp_session_destroy(s);
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
+ return SCP_SERVER_STATE_INTERNAL_ERR;
+ }
+
+ /* reading password */
+ in_uint8(c->in_s, sz);
+ buf[sz] = '\0';
+ in_uint8a(c->in_s, buf, sz);
+
+ if (0 != scp_session_set_password(s, buf))
+ {
+ scp_session_destroy(s);
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error", __LINE__);
+ return SCP_SERVER_STATE_INTERNAL_ERR;
+ }
+
+ return SCP_SERVER_STATE_OK;
}
/* 020 */
enum SCP_SERVER_STATES_E
-scp_v1s_request_pwd_change(struct SCP_CONNECTION* c, char* reason, char* npw)
+scp_v1s_request_pwd_change(struct SCP_CONNECTION *c, char *reason, char *npw)
{
- return SCP_SERVER_STATE_INTERNAL_ERR;
+ return SCP_SERVER_STATE_INTERNAL_ERR;
}
/* 023 */
enum SCP_SERVER_STATES_E
-scp_v1s_pwd_change_error(struct SCP_CONNECTION* c, char* error, int retry, char* npw)
+scp_v1s_pwd_change_error(struct SCP_CONNECTION *c, char *error, int retry, char *npw)
{
- return SCP_SERVER_STATE_INTERNAL_ERR;
+ return SCP_SERVER_STATE_INTERNAL_ERR;
}
/* 030 */
enum SCP_SERVER_STATES_E
-scp_v1s_connect_new_session(struct SCP_CONNECTION* c, SCP_DISPLAY d)
+scp_v1s_connect_new_session(struct SCP_CONNECTION *c, SCP_DISPLAY d)
{
- /* send password request */
- tui32 version=1;
- tui32 size=14;
- tui16 cmd=30;
+ /* send password request */
+ tui32 version = 1;
+ tui32 size = 14;
+ tui16 cmd = 30;
- init_stream(c->out_s, c->out_s->size);
+ init_stream(c->out_s, c->out_s->size);
- out_uint32_be(c->out_s, version); /* version */
- out_uint32_be(c->out_s, size); /* size */
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
- out_uint16_be(c->out_s, cmd); /* cmd */
+ out_uint32_be(c->out_s, version); /* version */
+ out_uint32_be(c->out_s, size); /* size */
+ out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
+ out_uint16_be(c->out_s, cmd); /* cmd */
- out_uint16_be(c->out_s, d); /* display */
+ out_uint16_be(c->out_s, d); /* display */
- if (0!=scp_tcp_force_send(c->in_sck, c->out_s->data, 14))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
+ if (0 != scp_tcp_force_send(c->in_sck, c->out_s->data, 14))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
- return SCP_SERVER_STATE_OK;
+ return SCP_SERVER_STATE_OK;
}
/* 032 */
enum SCP_SERVER_STATES_E
-scp_v1s_connection_error(struct SCP_CONNECTION* c, char* error)
+scp_v1s_connection_error(struct SCP_CONNECTION *c, char *error)
{
- tui16 len;
+ tui16 len;
- len = g_strlen(error);
- init_stream(c->out_s,c->out_s->size);
+ len = g_strlen(error);
+ init_stream(c->out_s, c->out_s->size);
- out_uint32_be(c->out_s, 1);
- /* packet size: 4 + 4 + 2 + 2 + len */
- /* version + size + cmdset + cmd */
- out_uint32_be(c->out_s, (12 + len));
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
- out_uint16_be(c->out_s, SCP_CMD_CONN_ERROR);
+ out_uint32_be(c->out_s, 1);
+ /* packet size: 4 + 4 + 2 + 2 + len */
+ /* version + size + cmdset + cmd */
+ out_uint32_be(c->out_s, (12 + len));
+ out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
+ out_uint16_be(c->out_s, SCP_CMD_CONN_ERROR);
- if (0 != scp_tcp_force_send(c->in_sck, c->out_s->data, (12 + len)))
- {
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
+ if (0 != scp_tcp_force_send(c->in_sck, c->out_s->data, (12 + len)))
+ {
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
- return SCP_SERVER_STATE_END;
+ return SCP_SERVER_STATE_END;
}
/* 040 */
enum SCP_SERVER_STATES_E
-scp_v1s_list_sessions(struct SCP_CONNECTION* c, int sescnt, struct SCP_DISCONNECTED_SESSION* ds, SCP_SID* sid)
+scp_v1s_list_sessions(struct SCP_CONNECTION *c, int sescnt, struct SCP_DISCONNECTED_SESSION *ds, SCP_SID *sid)
{
- tui32 version=1;
- tui32 size=12;
- tui16 cmd=40;
- int pktcnt;
- int idx;
- int sidx;
- int pidx;
- struct SCP_DISCONNECTED_SESSION* cds;
-
- /* first we send a notice that we have some disconnected sessions */
- init_stream(c->out_s, c->out_s->size);
-
- out_uint32_be(c->out_s, version); /* version */
- out_uint32_be(c->out_s, size); /* size */
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
- out_uint16_be(c->out_s, cmd); /* cmd */
-
- if (0!=scp_tcp_force_send(c->in_sck, c->out_s->data, size))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- /* then we wait for client ack */
+ tui32 version = 1;
+ tui32 size = 12;
+ tui16 cmd = 40;
+ int pktcnt;
+ int idx;
+ int sidx;
+ int pidx;
+ struct SCP_DISCONNECTED_SESSION *cds;
+
+ /* first we send a notice that we have some disconnected sessions */
+ init_stream(c->out_s, c->out_s->size);
+
+ out_uint32_be(c->out_s, version); /* version */
+ out_uint32_be(c->out_s, size); /* size */
+ out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
+ out_uint16_be(c->out_s, cmd); /* cmd */
+
+ if (0 != scp_tcp_force_send(c->in_sck, c->out_s->data, size))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+
+ /* then we wait for client ack */
#warning maybe this message could say if the session should be resized on
#warning server side or client side
- init_stream(c->in_s, c->in_s->size);
- if (0!=scp_tcp_force_recv(c->in_sck, c->in_s->data, 8))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- in_uint32_be(c->in_s, version);
- if (version!=1)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: version error", __LINE__);
- return SCP_SERVER_STATE_VERSION_ERR;
- }
-
- in_uint32_be(c->in_s, size);
- if (size<12)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: size error", __LINE__);
- return SCP_SERVER_STATE_SIZE_ERR;
- }
-
- init_stream(c->in_s, c->in_s->size);
- if (0!=scp_tcp_force_recv(c->in_sck, c->in_s->data, (size-8)))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd != SCP_COMMAND_SET_DEFAULT)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
- return SCP_SERVER_STATE_SEQUENCE_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd != 41)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
- return SCP_SERVER_STATE_SEQUENCE_ERR;
- }
-
- /* calculating the number of packets to send */
- pktcnt=sescnt/SCP_SERVER_MAX_LIST_SIZE;
- if ((sescnt%SCP_SERVER_MAX_LIST_SIZE)!=0)
- {
- pktcnt++;
- }
-
- for (idx=0; idx<pktcnt; idx++)
- {
- /* ok, we send session session list */
- init_stream(c->out_s, c->out_s->size);
+ init_stream(c->in_s, c->in_s->size);
- /* size: ver+size+cmdset+cmd+sescnt+continue+count */
- size=4+4+2+2+4+1+1;
+ if (0 != scp_tcp_force_recv(c->in_sck, c->in_s->data, 8))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
- /* header */
- cmd=42;
- s_push_layer(c->out_s, channel_hdr, 8);
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
- out_uint16_be(c->out_s, cmd);
+ in_uint32_be(c->in_s, version);
- /* session count */
- out_uint32_be(c->out_s, sescnt);
+ if (version != 1)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: version error", __LINE__);
+ return SCP_SERVER_STATE_VERSION_ERR;
+ }
- /* setting the continue flag */
- if ((idx+1)*SCP_SERVER_MAX_LIST_SIZE >= sescnt)
+ in_uint32_be(c->in_s, size);
+
+ if (size < 12)
{
- out_uint8(c->out_s, 0);
- /* setting session count for this packet */
- pidx=sescnt-(idx*SCP_SERVER_MAX_LIST_SIZE);
- out_uint8(c->out_s, pidx);
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: size error", __LINE__);
+ return SCP_SERVER_STATE_SIZE_ERR;
}
- else
+
+ init_stream(c->in_s, c->in_s->size);
+
+ if (0 != scp_tcp_force_recv(c->in_sck, c->in_s->data, (size - 8)))
{
- out_uint8(c->out_s, 1);
- /* setting session count for this packet */
- pidx=SCP_SERVER_MAX_LIST_SIZE;
- out_uint8(c->out_s, pidx);
- }
-
- /* adding session descriptors */
- for (sidx=0; sidx<pidx; sidx++)
- {
- /* shortcut to the current session to send */
- cds=ds+((idx)*SCP_SERVER_MAX_LIST_SIZE)+sidx;
-
- /* session data */
- out_uint32_be(c->out_s, cds->SID); /* session id */
- out_uint8(c->out_s, cds->type);
- out_uint16_be(c->out_s, cds->height);
- out_uint16_be(c->out_s, cds->width);
- out_uint8(c->out_s, cds->bpp);
- out_uint8(c->out_s, cds->idle_days);
- out_uint8(c->out_s, cds->idle_hours);
- out_uint8(c->out_s, cds->idle_minutes);
- size += 13;
-
- out_uint16_be(c->out_s, cds->conn_year);
- out_uint8(c->out_s, cds->conn_month);
- out_uint8(c->out_s, cds->conn_day);
- out_uint8(c->out_s, cds->conn_hour);
- out_uint8(c->out_s, cds->conn_minute);
- out_uint8(c->out_s, cds->addr_type);
- size += 7;
-
- if (cds->addr_type == SCP_ADDRESS_TYPE_IPV4)
- {
- in_uint32_be(c->out_s, cds->ipv4addr);
- size += 4;
- }
- else if (cds->addr_type == SCP_ADDRESS_TYPE_IPV6)
- {
- in_uint8a(c->out_s, cds->ipv6addr, 16);
- size += 16;
- }
- }
-
- s_pop_layer(c->out_s, channel_hdr);
- out_uint32_be(c->out_s, version);
- out_uint32_be(c->out_s, size);
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
- if (0 != scp_tcp_force_send(c->in_sck, c->out_s->data, size))
+ in_uint16_be(c->in_s, cmd);
+
+ if (cmd != SCP_COMMAND_SET_DEFAULT)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
+ return SCP_SERVER_STATE_SEQUENCE_ERR;
+ }
+
+ in_uint16_be(c->in_s, cmd);
+
+ if (cmd != 41)
{
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
- }
-
- /* we get the response */
- init_stream(c->in_s, c->in_s->size);
- if (0!=scp_tcp_force_recv(c->in_sck, c->in_s->data, (8)))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- in_uint32_be(c->in_s, version);
- if (version != 1)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: version error", __LINE__);
- return SCP_SERVER_STATE_VERSION_ERR;
- }
-
- in_uint32_be(c->in_s, size);
- if (size < 12)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: size error", __LINE__);
- return SCP_SERVER_STATE_SIZE_ERR;
- }
-
- /* rest of the packet */
- init_stream(c->in_s, c->in_s->size);
- if (0!=scp_tcp_force_recv(c->in_sck, c->in_s->data, (size-8)))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd != SCP_COMMAND_SET_DEFAULT)
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
- return SCP_SERVER_STATE_SEQUENCE_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd == 43)
- {
- /* select session */
- in_uint32_be(c->in_s, (*sid));
-
- /* checking sid value */
- for (idx=0; idx<sescnt; idx++)
- {
- /* the sid is valid */
- if (ds[idx].SID==(*sid))
- {
- /* ok, session selected */
- return SCP_SERVER_STATE_OK;
- }
- }
-
- /* if we got here, the requested sid wasn't one from the list we sent */
- /* we should kill the connection */
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error (no such session in list)", __LINE__);
- return SCP_CLIENT_STATE_INTERNAL_ERR;
- }
- else if (cmd == 44)
- {
- /* cancel connection */
- return SCP_SERVER_STATE_SELECTION_CANCEL;
- }
-// else if (cmd == 45)
-// {
-// /* force new connection */
-// return SCP_SERVER_STATE_FORCE_NEW;
-// }
- else
- {
- /* wrong response */
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
- return SCP_SERVER_STATE_SEQUENCE_ERR;
- }
-
- return SCP_SERVER_STATE_OK;
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
+ return SCP_SERVER_STATE_SEQUENCE_ERR;
+ }
+
+ /* calculating the number of packets to send */
+ pktcnt = sescnt / SCP_SERVER_MAX_LIST_SIZE;
+
+ if ((sescnt % SCP_SERVER_MAX_LIST_SIZE) != 0)
+ {
+ pktcnt++;
+ }
+
+ for (idx = 0; idx < pktcnt; idx++)
+ {
+ /* ok, we send session session list */
+ init_stream(c->out_s, c->out_s->size);
+
+ /* size: ver+size+cmdset+cmd+sescnt+continue+count */
+ size = 4 + 4 + 2 + 2 + 4 + 1 + 1;
+
+ /* header */
+ cmd = 42;
+ s_push_layer(c->out_s, channel_hdr, 8);
+ out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
+ out_uint16_be(c->out_s, cmd);
+
+ /* session count */
+ out_uint32_be(c->out_s, sescnt);
+
+ /* setting the continue flag */
+ if ((idx + 1)*SCP_SERVER_MAX_LIST_SIZE >= sescnt)
+ {
+ out_uint8(c->out_s, 0);
+ /* setting session count for this packet */
+ pidx = sescnt - (idx * SCP_SERVER_MAX_LIST_SIZE);
+ out_uint8(c->out_s, pidx);
+ }
+ else
+ {
+ out_uint8(c->out_s, 1);
+ /* setting session count for this packet */
+ pidx = SCP_SERVER_MAX_LIST_SIZE;
+ out_uint8(c->out_s, pidx);
+ }
+
+ /* adding session descriptors */
+ for (sidx = 0; sidx < pidx; sidx++)
+ {
+ /* shortcut to the current session to send */
+ cds = ds + ((idx) * SCP_SERVER_MAX_LIST_SIZE) + sidx;
+
+ /* session data */
+ out_uint32_be(c->out_s, cds->SID); /* session id */
+ out_uint8(c->out_s, cds->type);
+ out_uint16_be(c->out_s, cds->height);
+ out_uint16_be(c->out_s, cds->width);
+ out_uint8(c->out_s, cds->bpp);
+ out_uint8(c->out_s, cds->idle_days);
+ out_uint8(c->out_s, cds->idle_hours);
+ out_uint8(c->out_s, cds->idle_minutes);
+ size += 13;
+
+ out_uint16_be(c->out_s, cds->conn_year);
+ out_uint8(c->out_s, cds->conn_month);
+ out_uint8(c->out_s, cds->conn_day);
+ out_uint8(c->out_s, cds->conn_hour);
+ out_uint8(c->out_s, cds->conn_minute);
+ out_uint8(c->out_s, cds->addr_type);
+ size += 7;
+
+ if (cds->addr_type == SCP_ADDRESS_TYPE_IPV4)
+ {
+ in_uint32_be(c->out_s, cds->ipv4addr);
+ size += 4;
+ }
+ else if (cds->addr_type == SCP_ADDRESS_TYPE_IPV6)
+ {
+ in_uint8a(c->out_s, cds->ipv6addr, 16);
+ size += 16;
+ }
+ }
+
+ s_pop_layer(c->out_s, channel_hdr);
+ out_uint32_be(c->out_s, version);
+ out_uint32_be(c->out_s, size);
+
+ if (0 != scp_tcp_force_send(c->in_sck, c->out_s->data, size))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+ }
+
+ /* we get the response */
+ init_stream(c->in_s, c->in_s->size);
+
+ if (0 != scp_tcp_force_recv(c->in_sck, c->in_s->data, (8)))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+
+ in_uint32_be(c->in_s, version);
+
+ if (version != 1)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: version error", __LINE__);
+ return SCP_SERVER_STATE_VERSION_ERR;
+ }
+
+ in_uint32_be(c->in_s, size);
+
+ if (size < 12)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: size error", __LINE__);
+ return SCP_SERVER_STATE_SIZE_ERR;
+ }
+
+ /* rest of the packet */
+ init_stream(c->in_s, c->in_s->size);
+
+ if (0 != scp_tcp_force_recv(c->in_sck, c->in_s->data, (size - 8)))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+
+ in_uint16_be(c->in_s, cmd);
+
+ if (cmd != SCP_COMMAND_SET_DEFAULT)
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
+ return SCP_SERVER_STATE_SEQUENCE_ERR;
+ }
+
+ in_uint16_be(c->in_s, cmd);
+
+ if (cmd == 43)
+ {
+ /* select session */
+ in_uint32_be(c->in_s, (*sid));
+
+ /* checking sid value */
+ for (idx = 0; idx < sescnt; idx++)
+ {
+ /* the sid is valid */
+ if (ds[idx].SID == (*sid))
+ {
+ /* ok, session selected */
+ return SCP_SERVER_STATE_OK;
+ }
+ }
+
+ /* if we got here, the requested sid wasn't one from the list we sent */
+ /* we should kill the connection */
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: internal error (no such session in list)", __LINE__);
+ return SCP_CLIENT_STATE_INTERNAL_ERR;
+ }
+ else if (cmd == 44)
+ {
+ /* cancel connection */
+ return SCP_SERVER_STATE_SELECTION_CANCEL;
+ }
+ // else if (cmd == 45)
+ // {
+ // /* force new connection */
+ // return SCP_SERVER_STATE_FORCE_NEW;
+ // }
+ else
+ {
+ /* wrong response */
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: sequence error", __LINE__);
+ return SCP_SERVER_STATE_SEQUENCE_ERR;
+ }
+
+ return SCP_SERVER_STATE_OK;
}
/* 046 was: 031 struct SCP_DISCONNECTED_SESSION* ds, */
enum SCP_SERVER_STATES_E
-scp_v1s_reconnect_session(struct SCP_CONNECTION* c, SCP_DISPLAY d)
+scp_v1s_reconnect_session(struct SCP_CONNECTION *c, SCP_DISPLAY d)
{
- tui32 version = 1;
- tui32 size = 14;
- tui16 cmd = 46;
-
- /* ok, we send session data and display */
- init_stream(c->out_s, c->out_s->size);
-
- /* header */
- out_uint32_be(c->out_s, version);
- out_uint32_be(c->out_s, size);
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
- out_uint16_be(c->out_s, cmd);
-
- /* session data */
- out_uint16_be(c->out_s, d); /* session display */
- /*out_uint8(c->out_s, ds->type);
- out_uint16_be(c->out_s, ds->height);
- out_uint16_be(c->out_s, ds->width);
- out_uint8(c->out_s, ds->bpp);
- out_uint8(c->out_s, ds->idle_days);
- out_uint8(c->out_s, ds->idle_hours);
- out_uint8(c->out_s, ds->idle_minutes);*/
- /* these last three are not really needed... */
-
- if (0!=scp_tcp_force_send(c->in_sck, c->out_s->data, size))
- {
- log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
- return SCP_SERVER_STATE_NETWORK_ERR;
- }
-
- return SCP_SERVER_STATE_OK;
+ tui32 version = 1;
+ tui32 size = 14;
+ tui16 cmd = 46;
+
+ /* ok, we send session data and display */
+ init_stream(c->out_s, c->out_s->size);
+
+ /* header */
+ out_uint32_be(c->out_s, version);
+ out_uint32_be(c->out_s, size);
+ out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
+ out_uint16_be(c->out_s, cmd);
+
+ /* session data */
+ out_uint16_be(c->out_s, d); /* session display */
+ /*out_uint8(c->out_s, ds->type);
+ out_uint16_be(c->out_s, ds->height);
+ out_uint16_be(c->out_s, ds->width);
+ out_uint8(c->out_s, ds->bpp);
+ out_uint8(c->out_s, ds->idle_days);
+ out_uint8(c->out_s, ds->idle_hours);
+ out_uint8(c->out_s, ds->idle_minutes);*/
+ /* these last three are not really needed... */
+
+ if (0 != scp_tcp_force_send(c->in_sck, c->out_s->data, size))
+ {
+ log_message(LOG_LEVEL_WARNING, "[v1s:%d] connection aborted: network error", __LINE__);
+ return SCP_SERVER_STATE_NETWORK_ERR;
+ }
+
+ return SCP_SERVER_STATE_OK;
}
#endif