>> class DEMO {
>> struct DEMO *array = (DEMO *) malloc ((str+1) * sizeof(DEMO));
>> free(DEMO)
> Честно сказать, вы меня лично запутали. Можете дать (copy&paste) полный код чтобы
> понять, хотя бы, чего вы добиваетесь этим?
> P.S.: А ещё советую приноровиться к valgrind. ;) fd_set active_fd_set;
FD_ZERO (&active_fd_set);
FD_SET (server, &active_fd_set);
DWORD d_child;
HANDLE child;
int event = 0;
while(1)
{
if ((event = select (FD_SETSIZE, &active_fd_set, NULL, NULL, NULL)) < 0)
{
printf("Error select\n");
closesocket(server);
WSACleanup();
return -1;
}
if ( event )
{
int client = accept(server,(struct sockaddr*)&from, &fromlen);
if ( client != INVALID_SOCKET )
{
child = CreateThread( NULL, 0, start_child_client, (void*) client, 0, &d_child);
if (child == NULL)
{
printf("Error CreateThread\n");
shutdown (client, 2);
closesocket(client);
ExitProcess(3);
}
CloseHandle(child);
}
}
}
-------------------------------
DWORD WINAPI start_child_client( void * Param )
{
int remote_client = (int) Param;
int RsaKeySizeDefault=_key_rsa_size(PUBFILE);
HANDLE hStdOut = GetStdHandle(STD_OUTPUT_HANDLE);
SetConsoleTextAttribute(hStdOut,FOREGROUND_INTENSITY);
struct Server *Settings = (struct Server *) malloc(sizeof(struct Server));
zero_server_child_struct(Settings);
if ( load_server_config_crypt("OPTIONS\\server.bio",Settings, RsaKeySizeDefault) > 1 )
{
struct Client *Info = (struct Client *) malloc(2 * sizeof(struct Client));
zero_client_child_struct(&Info[0]);
zero_client_child_struct(&Info[1]);
recv_client_packet(remote_client,RsaKeySizeDefault,&Info[0]);
analize_pacet_recv(remote_client,RsaKeySizeDefault,&Info[0],Settings);
printf("- %s\n",Info[0].ClientLocalMashineName);
printf("- %s\n",Info[0].ClientLocalUserName);
printf("- %s\n",Info[0].ClientIpAddress);
printf("- %s\n",Info[0].ClientMaskAddress);
printf("- %s\n",Info[0].ClientGateAddress);
printf("- %s\n",Info[0].ClientMacAddress);
printf("- %s\n",Info[0].ClientVpnUserName);
printf("- %s\n",Info[0].ClientAdapterName);
printf("- %s\n",Info[0].ClientVpnPassworda);
printf("- %s\n",Info[0].ClientVpnPasswordb);
printf("- %i\n",Info[0].ClientEventId);
printf("%s\n", Settings->ServerVpnPassworda);
printf("%s\n", Settings->ServerVpnPasswordb);
printf("%s\n", Settings->ServerVpnUserName);
printf("%i\n", Settings->ServerEventId);
free(Info);
}
free(Settings);
shutdown (remote_client, 2);
closesocket(remote_client);
return 0;
}
int _read_client_crypt_data(int remote_client,int RsaKeySizeDefault,unsigned char *out_data,int type,unsigned char * key, unsigned char * iv, int seconds)
{
int n = 0,c = 0;
unsigned char *cryptText;
cryptText =(unsigned char *) malloc(RsaKeySizeDefault*2);
if ( cryptText == NULL ) { insert_log_error("Error -- malloc ",0); return 0; }
memset(cryptText,0,RsaKeySizeDefault*2);
char ch;
while ( (c = xrecv(remote_client, &ch, 1, seconds)) != SOCKET_ERROR)
{
n+=c;
cryptText[n-1]=ch;
if ( n == RsaKeySizeDefault || n == 0 || c == 0) { c=0; break; }
}
if ( n == SOCKET_ERROR ) { insert_log_error("Error recv packet size -1",0); free(cryptText); return 0; }
if ( n == RsaKeySizeDefault )
{
if (( n = decrypt_init_all(cryptText, out_data, RsaKeySizeDefault, type, key, iv, n)) == 0 )
{
insert_log_error("Error decript",0);
memset(out_data,0,strlen((char*)out_data));
free(cryptText);
return 0;
}
}else{
insert_log_error("Error decript recv size != key",0); n = 0;
}
free(cryptText);
return n;
}