oftp.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273
  1. package main
  2. import (
  3. "crypto/tls"
  4. "encoding/binary"
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "net"
  9. "os"
  10. "strconv"
  11. "time"
  12. )
  13. func (o *Oftp) New(filename string) error {
  14. // Set default values
  15. newOftp := Oftp{
  16. LocalCode: "LOCALCODE",
  17. LocalPassword: "LOCALPWD",
  18. PartnerCode: "1234567890CODE",
  19. PartnerPassword: "SUPERSECRET",
  20. OftpLevel: 4,
  21. OftpBuffer: 512,
  22. OftpDuplex: "S",
  23. OftpCompression: "N",
  24. OftpRestart: "N",
  25. OftpCredit: 7,
  26. OftpAuthentication: "N",
  27. NetworkHost: "localhost",
  28. NetworkPort: 3305,
  29. NetworkTimeout: 10,
  30. NetworkTLS: false,
  31. }
  32. f, err := os.Open(filename)
  33. if err != nil {
  34. return err
  35. }
  36. defer f.Close()
  37. d := json.NewDecoder(f)
  38. if err := d.Decode(&newOftp); err != nil {
  39. return err
  40. }
  41. *o = newOftp
  42. return nil
  43. }
  44. func (o Oftp) Call() error {
  45. // 1. Open connection
  46. // 2. Wait for SSRM
  47. // 3. Send SSID
  48. // 4. Wait for SSID
  49. // 5. Validate SSID
  50. // 6. Send ESID
  51. // 1. Open connection
  52. var conn net.Conn
  53. var err error
  54. if o.NetworkTLS {
  55. netDialer := &net.Dialer{
  56. Timeout: time.Duration(o.NetworkTimeout) * time.Second,
  57. }
  58. tlsConfig := &tls.Config{
  59. InsecureSkipVerify: true,
  60. }
  61. conn, err = tls.DialWithDialer(netDialer, "tcp", fmt.Sprintf("%s:%d", o.NetworkHost, o.NetworkPort), tlsConfig)
  62. if err != nil {
  63. return err
  64. }
  65. defer conn.Close()
  66. } else {
  67. conn, err = net.DialTimeout("tcp", fmt.Sprintf("%s:%d", o.NetworkHost, o.NetworkPort), time.Duration(o.NetworkTimeout)*time.Second)
  68. if err != nil {
  69. return err
  70. }
  71. defer conn.Close()
  72. }
  73. fmt.Printf("Connected to %s:%d\n", o.NetworkHost, o.NetworkPort)
  74. // 2. Wait for SSRM
  75. headerBuf := make([]byte, 4)
  76. dataBuf := make([]byte, o.OftpBuffer)
  77. // Read STH (header)
  78. readCnt, err := conn.Read(headerBuf)
  79. if err != nil {
  80. conn.Close()
  81. return err
  82. }
  83. _, err = parseSTH(headerBuf[:4])
  84. if err != nil {
  85. conn.Close()
  86. return err
  87. }
  88. // Read OFTP command
  89. readCnt, err = conn.Read(dataBuf)
  90. if err != nil {
  91. conn.Close()
  92. return err
  93. }
  94. if string(dataBuf[:readCnt]) != "IODETTE FTP READY \r" && string(dataBuf[:readCnt]) != "IODETTE FTP READY \n" {
  95. conn.Close()
  96. return errors.New(fmt.Sprintf("Expected SSRM (%x), got %x", "IODETTE FTP READY \r", dataBuf[:readCnt]))
  97. }
  98. fmt.Printf("Received SSRM (%d)\n", readCnt)
  99. // 3. Send SSID
  100. writtenCnt, err := conn.Write(o.LocalSSID())
  101. if err != nil {
  102. conn.Close()
  103. return err
  104. }
  105. fmt.Printf("Sent SSID (%d)\n", writtenCnt)
  106. // 4. Wait for SSID
  107. // Read STH (header)
  108. readCnt, err = conn.Read(headerBuf)
  109. if err != nil {
  110. conn.Close()
  111. return err
  112. }
  113. _, err = parseSTH(headerBuf[:4])
  114. if err != nil {
  115. conn.Close()
  116. return err
  117. }
  118. // Read OFTP command
  119. readCnt, err = conn.Read(dataBuf)
  120. if err != nil {
  121. conn.Close()
  122. return err
  123. }
  124. // 5. Validate SSID
  125. ESIDCode := o.ValidateSSID(dataBuf[:readCnt])
  126. if ESIDCode < 0 {
  127. fmt.Println(ESIDCode)
  128. var err error
  129. if ESIDCode > -100 {
  130. // ESID error, disconnect
  131. err = errors.New(fmt.Sprintf("Received negative ESID with reason code %d", ESIDCode*-1))
  132. } else {
  133. err = errors.New("Bad non-ESID reply to SSID")
  134. }
  135. conn.Close()
  136. return err
  137. }
  138. fmt.Printf("Received SSID (%d)\n", readCnt)
  139. // 6. Send ESID
  140. writtenCnt, err = conn.Write(o.ESID(ESIDCode))
  141. if err != nil {
  142. conn.Close()
  143. return err
  144. }
  145. fmt.Printf("Sent ESID (%d) with code %d\n", writtenCnt, ESIDCode)
  146. // Wait for partner to disconnect
  147. conn.SetReadDeadline(time.Now().Add(10 * time.Second))
  148. conn.Read(dataBuf)
  149. conn.Close()
  150. fmt.Println("Disconnected")
  151. if ESIDCode != 0 {
  152. return errors.New(fmt.Sprintf("Ended session with ESID reason code %d", ESIDCode))
  153. }
  154. return nil
  155. }
  156. func (o Oftp) LocalSSID() []byte {
  157. dataBuf := [61]byte{}
  158. copy(dataBuf[0:1], "X")
  159. copy(dataBuf[1:2], fmt.Sprintf("%d", o.OftpLevel))
  160. copy(dataBuf[2:27], o.LocalCode)
  161. copy(dataBuf[27:35], o.LocalPassword)
  162. copy(dataBuf[35:40], fmt.Sprintf("%05d", o.OftpBuffer))
  163. copy(dataBuf[40:41], o.OftpDuplex)
  164. copy(dataBuf[41:42], o.OftpCompression)
  165. copy(dataBuf[42:43], o.OftpRestart)
  166. copy(dataBuf[43:44], "N")
  167. copy(dataBuf[44:47], fmt.Sprintf("%03d", o.OftpCredit))
  168. copy(dataBuf[47:48], o.OftpAuthentication)
  169. copy(dataBuf[60:61], "\r")
  170. sth := buildSTH(len(dataBuf))
  171. stb := []byte{}
  172. stb = append(stb, sth...)
  173. stb = append(stb, dataBuf[:]...)
  174. return stb
  175. }
  176. func (o Oftp) ESID(code int) []byte {
  177. dataBuf := [7]byte{}
  178. copy(dataBuf[0:1], "F")
  179. copy(dataBuf[1:3], fmt.Sprintf("%02d", code))
  180. copy(dataBuf[3:6], fmt.Sprintf("%03d", 0))
  181. copy(dataBuf[6:7], "\r")
  182. sth := buildSTH(len(dataBuf))
  183. stb := []byte{}
  184. stb = append(stb, sth...)
  185. stb = append(stb, dataBuf[:]...)
  186. return stb
  187. }
  188. func (o Oftp) ValidateSSID(SSIDBytes []byte) int {
  189. // Validate cmd, code and password only
  190. cmdByte := string(SSIDBytes[0:1])
  191. if cmdByte == "F" {
  192. ESIDCodeStr := string(SSIDBytes[1:3])
  193. ESIDCodeInt, _ := strconv.Atoi(ESIDCodeStr)
  194. return -1 * ESIDCodeInt
  195. }
  196. if cmdByte != "X" {
  197. return -100
  198. }
  199. codeBytes := string(SSIDBytes[2:27])
  200. if codeBytes != fmt.Sprintf("%-25s", o.PartnerCode) {
  201. return 3
  202. }
  203. passwordBytes := string(SSIDBytes[27:35])
  204. if passwordBytes != fmt.Sprintf("%-8s", o.PartnerPassword) {
  205. return 4
  206. }
  207. return 0
  208. }
  209. func parseSTH(sth []byte) (int32, error) {
  210. sth[0] = 0
  211. length := binary.BigEndian.Uint32(sth)
  212. return int32(length), nil
  213. }
  214. func buildSTH(length int) []byte {
  215. sth := make([]byte, 4)
  216. sth[0] = 16
  217. lengthBytes := make([]byte, 4)
  218. binary.BigEndian.PutUint32(lengthBytes, uint32(length+4))
  219. copy(sth[1:4], lengthBytes[1:4])
  220. return sth
  221. }