Monday, December 14, 2009

Sending ICMP request using C program

/**********************************************************************************
* AUTHOR : Chaitanya bhargav M
* Date : 14/10/2009
* description : To send an icmp request to specified host via specified
* Interface.
* License : Never mind to do any thing with this code.But, it might be unreliable
* *********************************************************************************
* CopyLeft(c) Chaitanya bhargav M 2009
***********************************************************************************/
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include

typedef unsigned long int uint32;
typedef unsigned short int uint16;
typedef unsigned char uint8;

#define ETHER_TYPE_FOR_IP 0x0800
#define PROTOCOL_ICMP 0x01

// For proper memory allocation for each packet
#pragma pack(1)
// Ethernet header
typedef struct eth_hdr
{
uint8 dest_mac[6];
uint8 src_mac[6];
uint16 ether_type;
}ETH_HDR;
// 802.1Q Header
typedef struct vlan_hdr
{
uint16 type;
uint16 vlanID;
}VLAN_HDR;
// IP Header without options
typedef struct ip_hdr
{
uint8 version_headerlen;
uint8 diffserv;
uint16 total_len;
uint16 ident;
uint8 flags;
uint8 frag_offset;
uint8 ttl;
uint8 protocol;
uint16 checksum;
uint32 src_addr;
uint32 dest_addr;
}IP_HDR;
// ICMP Header
typedef struct icmp_hdr
{
uint8 type;
uint8 code;
uint16 checksum;
uint16 ident;
uint16 seq_no;
}ICMP_HDR;
// My own ICMP packet
typedef struct icmp_packet
{
ETH_HDR eth;
IP_HDR ip;
ICMP_HDR icmp;
uint8 data[32];
}ICMP_PKT;

// Function prototypes to calculate checksum and to print packet
unsigned short int header_checksum(char *, unsigned short int );
int print_pkt( char *, unsigned short int );

int main(int argc, char *argv[])
{
struct sockaddr_in *sin;
struct ifreq ifr;
struct sockaddr_ll sa;
int if_fd,icmp_fd,retVal,arp_flagg = 1;
unsigned long int ipAddr,IfIndex;
unsigned char IfMac[6];
ICMP_PKT pkt;
// It's my gateway. So, i am hardcoding
unsigned char gateway[7] = { 0x00,0x1A,0x6D,0x2B,0x89,0x29 };

if(argc != 3)
{
printf("Usage:\n ./icmp_req \n");
exit(1);
}

if(getuid() && geteuid())
{
printf("Oops!\n No Super user right\n");
exit(1);
}

// Check for default gateway
if(!strcmp(argv[1],"eth0"))
{
arp_flagg = 0;
}

if_fd = socket(AF_INET, SOCK_DGRAM, 0);
if( if_fd < 0 )
{
perror("If Socket");
exit(1);
}

//==============================Interface related data======================
// provide Interface name
strcpy(ifr.ifr_name,argv[1]);

// IP address
retVal = ioctl( if_fd, SIOCGIFADDR, &ifr, sizeof(ifr));
if( retVal < 0 )
{
perror("IFADDR IOCTL");
close(if_fd);
exit(1);
}
sin = (struct sockaddr_in *)&ifr.ifr_addr;
ipAddr = ntohl(sin->sin_addr.s_addr);

#ifdef DBG_ICMP
printf("IpAddr = %s\n",inet_ntoa(sin->sin_addr));
#endif

// MAC address
retVal = ioctl(if_fd, SIOCGIFHWADDR, &ifr, sizeof(ifr));
if( retVal < 0)
{
perror("IFHWADDR IOCTL");
close(if_fd);
exit(1);
}
memcpy(IfMac, ifr.ifr_hwaddr.sa_data, 6 * sizeof(unsigned char));

#ifdef DBG_ICMP
printf("MAC = %02x:%02x:%02x:%02x:%02x:%02x\n", IfMac[0],IfMac[1],IfMac[2],IfMac[3],IfMac[4],IfMac[5]);
#endif

// Interface index
retVal = ioctl(if_fd, SIOCGIFINDEX, &ifr, sizeof(ifr));
if( retVal < 0)
{
perror("IFINDEX");
close(if_fd);
exit(1);
}

#ifdef DBG_ICMP
printf("IfIndex = %d\n",ifr.ifr_ifindex);
#endif

IfIndex = ifr.ifr_ifindex;
//==============================Interface related data=====================

//==============================Packet socket==============================

icmp_fd = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_IP));
if(icmp_fd < 0 )
{
perror("ICMP Socket");
close(if_fd);
exit(1);
}

//=============================Frame the packet============================
// Ethernet header
if(!arp_flagg) // If sending via gateway
{
memcpy(pkt.eth.dest_mac, gateway, 6 * sizeof(unsigned char));
}
else // If sending via private interface
{
memset(pkt.eth.dest_mac, 0xFF, 6 * sizeof(unsigned char));
}
memcpy(pkt.eth.src_mac, IfMac, 6 * sizeof(unsigned char));
pkt.eth.ether_type = htons(ETHER_TYPE_FOR_IP);

// IP header
pkt.ip.version_headerlen = 0x45; // version = IPv4, len = 5 (x 32 = 160)
pkt.ip.diffserv = 0x00; // Best effort
pkt.ip.total_len = htons(0x003C); // 20 IP header + 8 UDP header + 32 data
pkt.ip.ident = htons(0xa9b1); // just to identify reply
pkt.ip.flags = 0x00; // no fragmentation
pkt.ip.frag_offset = htons(0x0000); // no fragmentaion
pkt.ip.ttl = 0x80; // let's give 128
pkt.ip.protocol = PROTOCOL_ICMP; // ICMP protocol inside IP
pkt.ip.checksum = htons(0x0000); // Will be found out after framing full header
pkt.ip.src_addr = htonl(ipAddr); // inet address of given Interface
pkt.ip.dest_addr = inet_addr(argv[2]);// to whom shall we send

pkt.ip.checksum = htons(header_checksum( (char *)&pkt.ip.version_headerlen, 20));

// ICMP header
pkt.icmp.type = 0x08; // ICMP request
pkt.icmp.code = 0x00; // Code for ICMP request
pkt.icmp.checksum = htons(0x0000); // Will be filled after framing full header
pkt.icmp.ident = htons(0x0300); // anything
pkt.icmp.seq_no = htons(0xC000); // anything

pkt.icmp.checksum = htons(header_checksum( (char *)&pkt.icmp.type, 8));

// Data padding
memset(pkt.data, 0, 32 * sizeof(unsigned char));// Windows(R) Style

#ifndef DBG_ICMP
print_pkt((char *)&pkt, sizeof(pkt));
#endif

//======================Ok, Now send it!================

// We need this to send the packet
sa.sll_family = AF_PACKET; // AF_PACKET is a must
sa.sll_ifindex = ifr.ifr_ifindex; // chosen if. index number
sa.sll_protocol = htons(ETH_P_IP); // protocol of interest

// Now send it!
retVal = sendto(icmp_fd, &pkt, sizeof(pkt), 0, (struct sockaddr *)&sa, sizeof(sa));
if(retVal < 0 )
{
perror("send to");
close(icmp_fd);
close(if_fd);
exit(1);
}

return 0;
}

/***********************************************************
* To find the checksum of any header
* Description:
* - add two bytes at a time till the end
* - add the overflow till you come up with a 2-byte result
* - take a 1's compliment
***********************************************************/
unsigned short int header_checksum(char *buf, unsigned short int len)
{
unsigned char *header;

unsigned short int low16 = 0,i = 0;
unsigned long int checksum_32 =0;

// add 2 bytes at a time
for(i = 0; i < len; i+=2 )
{
low16 = (buf[i] << 8)&0xFF00 | buf[i+1]&0xFF ;
checksum_32 = checksum_32 + low16;
}

// Append the overflow -- 2 times for safety
if(checksum_32 >> 16)
{
checksum_32 = (checksum_32 & 0xFFFF) + (checksum_32 >> 16);
}
if(checksum_32 >> 16)
{
checksum_32 = (checksum_32 & 0xFFFF) + (checksum_32 >> 16);
}
// One's compliment
checksum_32 = ~checksum_32;

return (checksum_32&0xFFFF);
}

/**********************************************
* To Print the packet *
**********************************************/
int print_pkt( char *buf, unsigned short int len)
{
int i = 0;

printf("Size of packet = %d\n",len);
for( i = 0; i < len ; i++)
{
if(i%16 == 0)
printf("\n");

printf("%02x ",buf[i]&0xff);
}
printf("\n");
return 0;
}

Sunday, December 6, 2009

Reading routing table using C program

#include"sys/socket.h"
#include"sys/types.h"
#include"unistd.h"
#include"stdio.h"
#include"stdlib.h"
#include"string.h"
#include"asm/types.h"
#include"linux/netlink.h"
#include"linux/rtnetlink.h"
#include"sys/ioctl.h"
#include"net/if.h"
#include"net/route.h"

#pragma pack(2)
// Structure for sending the request
typedef struct
{
struct nlmsghdr nlMsgHdr;
struct rtmsg rtMsg;
char buf[1024];
}route_request;

// Structure for storing routes
struct RouteInfo
{
unsigned long dstAddr;
unsigned long mask;
unsigned long gateWay;
unsigned long flags;
unsigned long srcAddr;
unsigned char proto;
char ifName[IF_NAMESIZE];
};

// Function for accessing interface name
int ifname(int ,char *);

int main(int argc, char *argv[])
{
int route_sock,i,j;
route_request *request = (route_request *)malloc(sizeof(route_request));
int retValue = -1,nbytes = 0,reply_len = 0;
char reply_ptr[1024];
ssize_t counter = 1024;
int count =0;
struct rtmsg *rtp;
struct rtattr *rtap;
struct nlmsghdr *nlp;
int rtl;
struct RouteInfo route[24];
char* buf = reply_ptr;
unsigned long bufsize ;

if( argc > 1)
{
if(getuid() && geteuid())
{
printf("Oops!\n Need SuperUser rights!\n");
}
exit(1);
}

route_sock = socket(PF_NETLINK, SOCK_RAW, NETLINK_ROUTE);

bzero(request,sizeof(route_request));

// Fill in the NETLINK header
request->nlMsgHdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
request->nlMsgHdr.nlmsg_type = RTM_GETROUTE;
request->nlMsgHdr.nlmsg_flags = NLM_F_REQUEST | NLM_F_DUMP;

// set the routing message header
request->rtMsg.rtm_family = AF_INET;
request->rtMsg.rtm_table = 254;

// Send routing request
if ((retValue = send(route_sock, request, sizeof(route_request), 0)) < 0)
{
perror("send");
exit(1);
}

for(;;)
{
if( counter < sizeof( struct nlmsghdr))
{
printf("Routing table is bigger than 1024\n");
exit(1);
}

nbytes = recv(route_sock, &reply_ptr[reply_len], counter, 0);

if(nbytes < 0 )
{
printf("Error in recv\n");
break;
}

if(nbytes == 0)
printf("EOF in netlink\n");

nlp = (struct nlmsghdr*)(&reply_ptr[reply_len]);

if (nlp->nlmsg_type == NLMSG_DONE)
{
// All data has been received.
// Truncate the reply to exclude this message,
// i.e. do not increase reply_len.
break;
}

if (nlp->nlmsg_type == NLMSG_ERROR)
{
printf("Error in msg\n");
exit(1);
}

reply_len += nbytes;
counter -= nbytes;
}

/*======================================================*/
bufsize = reply_len;
// string to hold content of the route
// table (i.e. one entry)
unsigned int flags;

// outer loop: loops thru all the NETLINK
// headers that also include the route entry
// header
nlp = (struct nlmsghdr *) buf;

for(i= -1; NLMSG_OK(nlp, bufsize); nlp=NLMSG_NEXT(nlp, bufsize))
{
// get route entry header
rtp = (struct rtmsg *) NLMSG_DATA(nlp);
// we are only concerned about the
// tableId route table
if(rtp->rtm_table != 254)
continue;
i++;
// init all the strings
bzero(&route[i], sizeof(struct RouteInfo));
flags = rtp->rtm_flags;
route[i].proto = rtp->rtm_protocol;

// inner loop: loop thru all the attributes of
// one route entry
rtap = (struct rtattr *) RTM_RTA(rtp);
rtl = RTM_PAYLOAD(nlp);
for( ; RTA_OK(rtap, rtl); rtap = RTA_NEXT(rtap, rtl))
{
switch(rtap->rta_type)
{
// destination IPv4 address
case RTA_DST:
count = 32 - rtp->rtm_dst_len;

route[i].dstAddr = *(unsigned long *) RTA_DATA(rtap);

route[i].mask = 0xffffffff;
for (; count!=0 ;count--)
route[i].mask = route[i].mask << 1;

//printf("dst:%s \tmask:0x%x \t",inet_ntoa(route[i].dstAddr), route[i].mask);
break;
case RTA_GATEWAY:
route[i].gateWay = *(unsigned long *) RTA_DATA(rtap);
//printf("gw:%s\t",inet_ntoa(route[i].gateWay));
break;
case RTA_PREFSRC:
route[i].srcAddr = *(unsigned long *) RTA_DATA(rtap);
//printf("src:%s\t", inet_ntoa(route[i].srcAddr));
break;
// unique ID associated with the network
// interface
case RTA_OIF:
ifname(*((int *) RTA_DATA(rtap)),route[i].ifName);
//printf( "ifname %s\n", route[i].ifName);
break;
default:
break;
}

}
//set Flags

//[TODO]: UP hardcoded?!
route[i].flags|=RTF_UP;
if (route[i].gateWay != 0)
route[i].flags|=RTF_GATEWAY;
if (route[i].mask == 0xFFFFFFFF)
route[i].flags|=RTF_HOST;
}

// Print the route records
printf("Destination\tGateway \tNetmask \tflags \tIfname \n");
printf("-----------\t------- \t--------\t------\t------ \n");
for( j = 0; j<= i; j++)
{
printf("%s \t0x%08x\t0x%08x \t%d \t%s\n",
inet_ntoa(route[j].dstAddr),
ntohl(route[j].gateWay),
route[j].mask,
route[j].flags,
route[j].ifName);
}
return 0;
}

/*--------------------------------------------------------------
* To get the name of the interface provided the interface index
*--------------------------------------------------------------*/
int ifname(int if_index,char *ifName)
{
int fd,retVal = -1;
struct sockaddr_in *sin;
struct ifreq ifr;


fd = socket(AF_INET, SOCK_DGRAM, 0);
if(fd == -1)
{
perror("socket");
exit(1);
}

ifr.ifr_ifindex = if_index;

if(ioctl(fd, SIOCGIFNAME, &ifr, sizeof(ifr)))
{
perror("ioctl");
exit(1);
}

strcpy(ifName, ifr.ifr_name);
return ;
}

Friday, October 9, 2009

Sending ARP request in LINUX using C

#include "sys/socket.h"
#include "sys/types.h"
#include "stdio.h"
#include "unistd.h"
#include "string.h"
#include "net/if.h"
#include "stdlib.h"
#include "arpa/inet.h"
#include "netinet/in.h"
#include "sys/ioctl.h"
#include "netpacket/packet.h"
#include "net/ethernet.h"
#include "netdb.h

#define ETHER_TYPE_FOR_ARP 0x0806
#define HW_TYPE_FOR_ETHER 0x0001
#define OP_CODE_FOR_ARP_REQ 0x0001
#define HW_LEN_FOR_ETHER 0x06
#define HW_LEN_FOR_IP 0x04
#define PROTO_TYPE_FOR_IP 0x0800

typedef unsigned char byte1;
typedef unsigned short int byte2;
typedef unsigned long int byte4;

// For Proper memory allocation in the structure
#pragma pack(1)
typedef struct arp_packet
{
// ETH Header
byte1 dest_mac[6];
byte1 src_mac[6];
byte2 ether_type;
// ARP Header
byte2 hw_type;
byte2 proto_type;
byte1 hw_size;
byte1 proto_size;
byte2 arp_opcode;
byte1 sender_mac[6];
byte4 sender_ip;
byte1 target_mac[6];
byte4 target_ip;
// Paddign
char padding[18];
}ARP_PKT;

int print_pkt(char *, int len);

int main(int argc, char *argv[])
{
int arp_fd,if_fd,retVal;
struct sockaddr_in *sin;
struct sockaddr_ll sa;
struct ifreq ifr;
ARP_PKT pkt;
unsigned long int ipAddr;

if( argc != 3 )
{
printf("Usage: ./arp \n");
exit(1);
}
else if( getuid() && geteuid())
{
printf("Oops!\nDude you need SuperUser rights!\n");
exit(1);
}

/*=============================START of IP, MAC ADDRESS ACCESS========================*/

/* Open socket for accessing the IPv4 address of specified Interface */
if_fd = socket(AF_INET, SOCK_STREAM, 0);
if( if_fd < 0 )
{
perror("IF Socket");
exit(1);
}

/* provide interface name to ifreq structure */
memcpy(ifr.ifr_name, argv[1], IF_NAMESIZE);
/* IOCTL to get ip address */
retVal = ioctl(if_fd, SIOCGIFADDR, &ifr, sizeof(ifr));
if( retVal < 0 )
{
perror("IOCTL");
close(if_fd);
exit(1);
}

/* Simple typecasting for easy access to ip address */
sin = (struct sockaddr_in *)&ifr.ifr_addr;
ipAddr = ntohl(sin->sin_addr.s_addr);
#ifdef DBG_ARP
printf("IF Name: %s IP Address: %s ",argv[1], inet_ntoa(sin->sin_addr));
printf("IP = 0x%x\n",ipAddr);
#endif

retVal = ioctl(if_fd, SIOCGIFHWADDR, &ifr, sizeof(ifr));
if( retVal < 0 )
{
perror("IOCTL");
close(if_fd);
exit(1);
}
#ifdef DBG_ARP
printf("MAC address: %s is %02x:%02x:%02x:%02x:%02x:%02x \n",
argv[1],
ifr.ifr_hwaddr.sa_data[0]&0xFF,
ifr.ifr_hwaddr.sa_data[1]&0xFF,
ifr.ifr_hwaddr.sa_data[2]&0xFF,
ifr.ifr_hwaddr.sa_data[3]&0xFF,
ifr.ifr_hwaddr.sa_data[4]&0xFF,
ifr.ifr_hwaddr.sa_data[5]&0xFF);
#endif

/*-----------------------------END of IP,MAC ADDRESS ACCESS------------------------*/

/*=============================Start of ARP request sending====================*/
// Socket to send ARP packet
arp_fd = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ARP));
if( arp_fd == -1 )
{
perror("ARP Socket");
close(if_fd);
exit(1);
}

//====================== Formulate the ARP Packet ============================
// Ethernet Header
memset(pkt.dest_mac, 0xFF, (6 * sizeof(byte1)));
memset(pkt.src_mac, (ifr.ifr_hwaddr.sa_data[0]&0xFF), sizeof(byte1));
memset(pkt.src_mac+1, (ifr.ifr_hwaddr.sa_data[1]&0xFF), sizeof(byte1));
memset(pkt.src_mac+2, (ifr.ifr_hwaddr.sa_data[2]&0xFF), sizeof(byte1));
memset(pkt.src_mac+3, (ifr.ifr_hwaddr.sa_data[3]&0xFF), sizeof(byte1));
memset(pkt.src_mac+4, (ifr.ifr_hwaddr.sa_data[4]&0xFF), sizeof(byte1));
memset(pkt.src_mac+5, (ifr.ifr_hwaddr.sa_data[5]&0xFF), sizeof(byte1));
pkt.ether_type = htons(ETHER_TYPE_FOR_ARP);
// ARP Header
pkt.hw_type = htons(HW_TYPE_FOR_ETHER);
pkt.proto_type = htons(PROTO_TYPE_FOR_IP);
pkt.hw_size = HW_LEN_FOR_ETHER;
pkt.proto_size = HW_LEN_FOR_IP;
pkt.arp_opcode = htons(OP_CODE_FOR_ARP_REQ);
memcpy(pkt.sender_mac, pkt.src_mac, (6 * sizeof(byte1)));
pkt.sender_ip = htonl(ipAddr);
memset(pkt.target_mac, 0 , (6 * sizeof(byte1)));
pkt.target_ip = inet_addr(argv[2]);
// Padding
memset(pkt.padding, 0 , 18 * sizeof(byte1));


// For sending the packet We need it!
retVal = ioctl(if_fd, SIOCGIFINDEX, &ifr, sizeof(ifr));
if( retVal < 0 )
{
perror("IOCTL");
close(arp_fd);
close(if_fd);
exit(1);
}
sa.sll_family = AF_PACKET;
sa.sll_ifindex = ifr.ifr_ifindex;
sa.sll_protocol = htons(ETH_P_ARP);

/* Send it! */
retVal = sendto(arp_fd, &pkt, sizeof(pkt), 0,(struct sockaddr *)&sa, sizeof(sa));
if( retVal < 0 )
{
perror("sendto");
close(arp_fd);
close(if_fd);
exit(1);
}

#ifdef DBG_ARP
printf("\n=========PACKET=========\n");
print_pkt((void *)&pkt, sizeof(pkt));
#endif
return 0;
}

int print_pkt(char *buf, int len)
{
int j = 0;
for(j = 0; j < len; j++ )
{
if((j%16) == 0 && j != 0 )
printf("\n");
printf("%02x ",*(buf+j)& 0xFF );
}
printf("\n");
return 0;
}

Tuesday, September 29, 2009

Read ARP entry Linux

/******************************************************
Author : Chaitu
Date : 29/09/2009
Description : Reading MAC address from kernel arp table
in Linux
*******************************************************/
#include "sys/types.h"
#include "sys/socket.h"
#include "sys/time.h"
#include "sys/ioctl.h"
#include "net/route.h"
#include "stdio.h"
#include "errno.h"
#include "stdlib.h"
#include "string.h"
#include "unistd.h"
#include "arpa/inet.h"
#include "netinet/ether.h"
#include "netpacket/packet.h"
#include "net/if.h"

int main(int argc, char **argv)
{
struct sockaddr_in *sin;
struct arpreq myreq;
int sockfd;

if(argc != 3)
{
printf("Usage:./mac \n");
exit(1);
}
/* Initialize the structure */
memset(&myreq, '\0', sizeof(myreq));

/* AF_INET family is must */
sin = (struct sockaddr_in *)&myreq.arp_pa;
sin->sin_family = AF_INET;
sin->sin_addr.s_addr = inet_addr(argv[2]); // Give the IP for which MAC is needed

sin = (struct sockaddr_in *)&myreq.arp_ha;
sin->sin_family = AF_INET;

memcpy(myreq.arp_dev,argv[1],IFNAMSIZ - 1);

/* Open socket for IOCTL operation */
if((sockfd = socket(AF_INET, SOCK_DGRAM, 0)) == -1)
{
perror("socket");
exit(1);
}

/* IOCTL for accessing the MAC address */
if((ioctl(sockfd, SIOCGARP,&myreq, sizeof(myreq)) < 0))
{
perror("ioctl");
close(sockfd);
exit(1);
}

printf("mac address of IP:%s is %02x:%02x:%02x:%02x:%02x:%02x\n", argv[2],( myreq.arp_ha.sa_data[0]&0xFF),
(myreq.arp_ha.sa_data[1]&0xFF),
(myreq.arp_ha.sa_data[2]&0xFF),
(myreq.arp_ha.sa_data[3]&0xFF),
(myreq.arp_ha.sa_data[4]&0xFF),
(myreq.arp_ha.sa_data[5]&0xFF));

return 0;
}

Sunday, August 30, 2009

example for multi processing in linux

/*SERVER PROGRAM*/



#include
#include
#include
#include
#include
#include
#include
#include
#include

struct sockaddr_in add2,add1;

socklen_t len,len1;

int i,j,k,l,z;

int fm2[10];

int fd[2];

int ff1,ff2;
int status;
int pid,n;
int sock2;


void sigchld_handler()
{
read(fd[0],&j,sizeof(int));
read(fd[0],&k,sizeof(int));

i--;

fm2[j]=0; //SETTING FIFO STATUS 0 FOR IDLE 1 FOR BUSY
fm2[k]=0; //SETTING FIFO STATUS 0 FOR IDLE 1 FOR BUSY


printf("\nStatus Array at exit and i is %d\n",i);
for(l=0;l<10;l++)
printf("%d\n",fm2[l]);

}


void sigint_handler()
{
printf("\nSERVER is being terminated........\n");
if(pid!=getpid())
{

printf("\nClient Process with pid is %u Terminating\n",getpid())
;

n=1;
write(ff2,&n,sizeof(int));

sleep(1);
n=0;
write(sock2,&n,sizeof(int));

shutdown(sock2,SHUT_RDWR);
}

sleep(1);
exit(0);
}


void sigpipe_handler()
{
write(fd[1],&j,sizeof(int));
write(fd[1],&k,sizeof(int));
exit(0);
}



main()
{

int bin,sock,tmp;
char ch='t';

char fm1[10][3]={"f0","f1","f2","f3","f4","f5","f6","f7","f8","f9"};


//HANDLING CHILD PROCESS TERMINATION WHICH IS KILLED OR STOPPED

signal(SIGCHLD,sigchld_handler);

//HANDLING CTRL+Ci

signal(SIGINT,sigint_handler);

signal(SIGPIPE,sigpipe_handler);

signal(SIGQUIT,sigint_handler);
//PIPE CREATION FOR SENDING THE FIFO ARRAY STATUS

pipe(fd);

//SERVER SOCKET CREATION

sock=socket(AF_INET,SOCK_STREAM,0);
if(sock<0)
{
perror("Server Socket Creation Error\n");
exit(1);
}

add1.sin_port=htons(4500);
add1.sin_addr.s_addr=INADDR_ANY;
add1.sin_family=AF_INET;

//BINDING SERVER SOCKET.

if(bind(sock,(struct sockaddr *)&add1,sizeof(add1))<0)
{
perror("Binding Error\n");
exit(1);
}

//LISTENING FOR CONNECTIONS.

i=listen(sock,5);
if(i<0)
{
perror("Listen error\n");
exit(1);
}

pid=getpid();

printf("\nServer Process id is %u\n",getpid());
//SETTING FIFO ARRAY STATUS AS IDLE BEFORE ACCEPTING CLIENT CONNECTIONS

for(i=0;i<10;i++)
fm2[i]=0;

//i VALUE MAINTAINS NUMBER OF CONNECTIONS

i=0;
while(1)
{

if(i<5)
{

//ACCEPT SIGNAL

sock2=accept(sock,(struct sockaddr *)&add2,&len1);
if(sock2<0)
{
perror("Accept Error\n");
exit(1);
}

// printf("\nI value is %d\n",i);

//i VALUE IS INCREMENTED AS A NEW CLIENT CONNECTION ACCEPTED.

i++;

//FIFO MANAGEMENTSTARTING

j=0;
while(fm2[j]!=0)
{
j++;
}
fm2[j]=1;


k=0;
while(fm2[k]!=0)
{
k++;
}
fm2[k]=1;



printf("\nStatus Array before and i is %d\n",i);
for(l=0;l<10;l++)
printf("%d\n",fm2[l]);
//FIFO MANAGEMENT CLOSED

//SPAWNING A NEW PROCESS FOR EACH AND EVERY NEW CLIENT CONNECTION


pid=fork();
if(pid==-1)
{
perror("FORK error\n");
}

//EXECUTING THE CHILD PROCESS

if(pid==0)
{

//SENDING THE FIFO NAMES TO CLIENT THROUGH WHICH COMMUNICATION HAS TO BE DONE.

write(sock2,&fm1[j],2);
write(sock2,&fm1[k],2);

ff1=open(fm1[j],O_RDONLY);
if(ff1==-1)
{
perror("OPENING FIRST FIFO\n");
}

ff2=open(fm1[k],O_WRONLY);
if(ff2==-1)
{
perror("OPENING SECOND FIFO\n ");
}

//SERVER DATA INTERFACE MODULE STARTS.


printf("pid is %u\n",getpid());

while(1)
{

read(ff1,&ch,sizeof(char));

//ENCRYPTION PART STARTS
// ch=ch ^ 'a' ;
//ENCRYPTION PART ENDS
n=1;
write(sock2,&n,sizeof(int));

if(ch==0)
{
break;
}

sleep(1);
write(ff2,&ch,sizeof(char));
}

//SERVER DATA INTERFACE MODULE ENDS.

close(ff1);
close(ff2);


write(fd[1],&j,sizeof(int));
write(fd[1],&k,sizeof(int));
// write(fd[1],&z,sizeof(int));


shutdown(sock2,SHUT_RDWR);

exit(0);
}

}

}

shutdown(sock,SHUT_RDWR);

}


/*CLIENT PROGRAM*/


#include
#include
#include
#include
#include
#include
#include
#include

struct sockaddr_in add;

void onerror(char *);

int sd,i,n;

int fd1, fd2;
int ff1,ff2,z;

char *j;
char ch='a';


void sigint_handler()
{

i=0;
write(ff1,&i,sizeof(int));

close(fd1);
close(fd2);

close(ff1);
close(ff2);

unlink(j);

shutdown(sd,SHUT_RDWR);

printf("\nChild process terminated because of SIGINT\n");

exit(0);
}



void sigpipe_handler()
{
printf("\nPIPE BROKEN\n");
exit(0);
}


main(int argc, char *argv[])
{

int bin,tmp,i=0,jk;

char f1n[3],f2n[3];

char s[10], *k=".";

//Signal Mechanisms for ctrl+c i.e SIGINT

signal(SIGINT,sigint_handler);

//Signal Mechanisms for broken pipe i.e SIGPIPE

signal(SIGPIPE,sigpipe_handler);

//Signal Mechanisms for ctrl+\ i.e SIGQUIT

signal(SIGQUIT,sigint_handler);

//Checking for number of input arguments provided during runtime.

if(argc<3)
{
printf("No Sufficient arguments supplied \n");
printf("Please provide full path for the file\n");
exit(0);
}

//CREATING CLIENT SOCKET

sd=socket(AF_INET,SOCK_STREAM,0);
if(sd<0)
{
perror("Client Socket Creation Error\n");
exit(1);
}


add.sin_port=htons(4500);
add.sin_addr.s_addr=inet_addr("127.0.0.1");
add.sin_family=AF_INET;

//CONNECTING CLIENT SOCKET
if(connect(sd,(struct sockaddr *)&add,sizeof(add))<0)
{
perror("Connection Error\n");
exit(1);
}


for(i=0;i<3;i++)
{
f1n[i]='\0';
f2n[i]='\0';
}

//READING FIFO NAMES FROM SERVER THROUGH WHICH COMMUNICATION PROCEEDS IN FUTURE.

if(read(sd,f1n,2)<0)
{
onerror("FIFO1 Error\n");
}
if(read(sd,f2n,2)<0)
{
onerror("FIFO2 Error\n");
}

printf("FIFO1 is %s\n",f1n);
printf("FIFO2 is %s\n",f2n);

//OPENING SENDER FIFO THROUGH WHICH DATA IS SENT TO SERVER

ff1=open(f1n,O_RDWR);
if(ff1==-1)
{
onerror("FIFO1 opening ERROR");
}

//OPENING RECEIVER FIFO THROUGH WHICH CLIENT RECEIVES ENCRYPTED DATA

ff2=open(f2n,O_RDWR);
if(ff2==-1)
{
onerror("FIFO2 opening ERROR\n");
}


//OPENING THE SOURCE FILE WHICH CONTAINS DATA TO BE ENCRYPTED

fd1=open(argv[1],O_RDONLY);
if(fd1<0)
{
onerror("Input File doesn't Exist\n");

}

//Mechanism to produce output filename as .

i=getpid();
z=strlen(argv[2]);

j=(char *)malloc(z);
strcpy(j,argv[2]);

sprintf(s,"%d",i);
strcat(j,k);
strcat(j,s);

//j contains output file name

//OPENING OUTPUT FILE INTO WHICH ENCRYPTED DATA IS STORED.

fd2=open(j,O_WRONLY|O_CREAT,0666);
if(fd2<0)
{
onerror("Opening Encryption File Error\n");
}


while(1)
{

// printf("\nSTART\n");

z=read(fd1,&ch,sizeof(char));
if(z==-1)
{
onerror("Read from Input file Error\n");
}


if(z==0)
{
write(ff1,&z,sizeof(int));
break;
}


else if(write(ff1,&ch,sizeof(char))<0)
{
onerror("Write into FIFO Error\n");
}


// printf("\nMIDDLE\n");


if(read(sd,&n,sizeof(int))<0)
{
onerror("\nRead from Socket Error\n");
}


if(n!=0)
{
// printf("\nInside If\n");


if(read(ff2,&ch,sizeof(char))<0)
{
onerror("Read from FIFO Error\n");
}

if(write(fd2,&ch,sizeof(char))<0)
{
onerror("Write into Encrypted File Error\n");
}
}

else
{

printf("\nInside else\n");
close(fd1);
close(fd2);

close(ff1);
close(ff2);

unlink(j);
exit(0);
}

// printf("\nEND\n");
}


close(fd1);
close(fd2);

close(ff1);
close(ff2);

shutdown(sd,SHUT_RDWR);

printf("\n\nSocket connection with Server closed Successfully\n");
}


void onerror(char *msg)
{

printf("\nERROR!! %s\n",msg);

shutdown(sd,SHUT_RDWR);
printf("\nSocket Connection Closed Abruptly\n");
exit(0);
}