// The input to this program looks like this: // // // ... // // ... // // // x // x // // ... (data) // // The return looks like // // 0 // or // 2 // bad file size #include #include #include #include #include "parse.h" #include "crypt.h" #define MAX_FILES 32 struct FILE_INFO { char name[256]; double max_nbytes; char* xml_signature; char* signed_xml; int parse(FILE*); }; int FILE_INFO::parse(FILE* in) { char buf[256]; int retval; assert(in!=NULL); memset(this, 0, sizeof(FILE_INFO)); signed_xml = strdup(""); while (fgets(buf, 256, in)) { if (match_tag(buf, "")) return 0; else if (match_tag(buf, "")) { retval = dup_element_contents(in, "", &xml_signature); if (retval) return retval; continue; } strcatdup(signed_xml, buf); if (parse_str(buf, "", name)) continue; if (parse_double(buf, "", max_nbytes)) continue; //fprintf(stderr, "file_upload_handler: FILE_INFO::parse: unrecognized: %s \n", buf); } return 1; } int print_status(int status, char* message) { printf("Content-type: text/plain\n\n%d\n", status); if (message) printf("%s\n", message); #if 0 fprintf(stderr, "Content-type: text/plain\n\n%d\n", status); if (message) fprintf(stderr, "%s\n", message); #endif return 0; } #define BLOCK_SIZE 16382 // read from socket, write to file // int copy_socket_to_file(FILE* in, char* path, double offset, double nbytes) { unsigned char buf[BLOCK_SIZE]; FILE* out; int retval, n, m; double bytes_left; assert(in!=NULL); assert(path!=NULL); assert(offset>=0); assert(nbytes>=0); out = fopen(path, "wb"); if (!out) { print_status(-1, "can't open file"); return -1; } // TODO: use a 64-bit variant retval = fseek(out, (long)offset, SEEK_SET); if (retval) { fclose(out); print_status(-1, "can't fseek file"); return retval; } bytes_left = nbytes - offset; while (1) { m = BLOCK_SIZE; if (m > bytes_left) m = (int)bytes_left; n = fread(buf, 1, m, in); if (n <= 0) { print_status(-1, "can't fread socket"); return -1; } m = fwrite(buf, 1, n, out); if (m != n) { print_status(-1, "can't fwrite file"); return -1; } bytes_left -= n; if (bytes_left == 0) break; } fclose(out); return 0; } int handle_request(FILE* in, R_RSA_PUBLIC_KEY& key) { char buf[256]; double nbytes=0, offset=0; char path[256]; FILE_INFO file_info; int retval; bool is_valid; assert(in!=NULL); while (fgets(buf, 256, in)) { if (match_tag(buf, "")) { retval = file_info.parse(in); if (retval) return retval; retval = verify_string( file_info.signed_xml, file_info.xml_signature, key, is_valid ); if (retval || !is_valid) { print_status(-1, "invalid XML signature"); return -1; } continue; } else if (parse_double(buf, "", offset)) continue; else if (parse_double(buf, "", nbytes)) continue; else if (match_tag(buf, "")) { if (nbytes == 0) { print_status(-1, "nbytes missing"); return -1; } // enforce limits in signed XML if (nbytes > file_info.max_nbytes) { sprintf(buf, "nbytes too large: %f > %f", nbytes, file_info.max_nbytes ); print_status(-1, buf); return -1; } sprintf(path, "%s/%s", BOINC_UPLOAD_DIR, file_info.name); retval = copy_socket_to_file(in, path, offset, nbytes); break; } } return 0; } int get_key(R_RSA_PUBLIC_KEY& key) { FILE* f; int retval; char buf[256]; sprintf(buf, "%s/upload_public", BOINC_KEY_DIR); f = fopen(buf, "r"); if (!f) return -1; retval = scan_key_hex(f, (KEY*)&key, sizeof(key)); fclose(f); if (retval) return retval; return 0; } int main() { int retval; R_RSA_PUBLIC_KEY key; retval = get_key(key); if (retval) { fprintf(stderr, "file_upload_handler: can't read key file\n"); print_status(-1, "can't read key file"); exit(0); } retval = handle_request(stdin, key); if (retval) { fprintf(stderr, "file_upload_handler: handle_request: %d\n", retval); } else { //fprintf(stderr, "file_upload_handler: handle_request: %d\n", retval); print_status(0, 0); } return 0; }