aboutsummaryrefslogtreecommitdiff
path: root/client.c
blob: 243950d0cca8a4c269dfa8ac3229251fe05f4883 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
#include <stdio.h>
#include <signal.h>
#include <string.h>
#include <fcntl.h>

#include <sys/time.h>
#include <sys/socket.h>

#include <netinet/in.h>

#include <linux/kd.h>

#define CLK_FREQ 1193180

int term;
static int ident = 0x42454550;

enum cmd_t {CMD_KA, CMD_PING, CMD_QUIT, CMD_PLAY, CMD_CAPS};

struct cmd_buffer {
	int cmd;
	union {
		int data[8];
		char string[8*sizeof(int)];
	};
};

void sigalrm(int sig) {
	ioctl(term, KIOCSOUND, 0);
}

int main(int argc, char **argv) {
	struct sockaddr_in addr, remote;
	int sock, rlen = sizeof(remote), i, len_uid = 0;
	struct itimerval tmr;
	struct cmd_buffer cmd;
	struct sigaction sa;

	if(argc > 1) {
		len_uid = strlen(argv[1]);
	}

	if((term = open("/dev/console", O_WRONLY)) < 0) {
		perror("open");
		return 1;
	}
	if((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
		perror("socket");
		return 1;
	}

	memset(&addr, 0, sizeof(addr));
	addr.sin_family = AF_INET;
	addr.sin_addr.s_addr = htonl(INADDR_ANY);
	addr.sin_port = htons(13676);
	if((bind(sock, (struct sockaddr *) &addr, sizeof(addr))) < 0) {
		perror("bind");
		return 1;
	}

	sa.sa_handler = sigalrm;
	sa.sa_flags = SA_NODEFER | SA_RESTART;
	sigemptyset(&sa.sa_mask);
	sigaction(SIGALRM, &sa, NULL);

	printf("Ready to begin (listening on 13676)\n");
	memset(&tmr, 0, sizeof(tmr));
	while(1) {
		if(recvfrom(sock, &cmd, sizeof(cmd), 0, (struct sockaddr *) &remote, &rlen) < 0) {
			perror("recvfrom");
			return 1;
		}
		cmd.cmd = ntohl(cmd.cmd);
		for(i = 0; i < 8; i++) cmd.data[i] = ntohl(cmd.data[i]);
		/* printf("From %s:%d, cmd %d\n", inet_ntoa(remote.sin_addr.s_addr), remote.sin_port, cmd.cmd); */
		switch((enum cmd_t) cmd.cmd) {
			case CMD_QUIT:
				return 0;
				break;

			case CMD_PING:
				sendto(sock, &cmd, sizeof(cmd), 0, (struct sockaddr *) &remote, rlen);
				break;

			case CMD_PLAY:
				tmr.it_value.tv_sec = cmd.data[0];
				tmr.it_value.tv_usec = cmd.data[1];
				setitimer(ITIMER_REAL, &tmr, NULL);
				ioctl(term, KIOCSOUND, (int) (CLK_FREQ / cmd.data[2]));
				break;

			case CMD_CAPS:
				cmd.cmd = htonl(cmd.cmd);
				cmd.data[0] = htonl(1);
				cmd.data[1] = htonl(ident);
				for(i = 0; i < 6 * sizeof(int); i++) {
					if(argc > 1 && i < len_uid) {
						cmd.string[i+8] = argv[1][i];
					} else {
						cmd.string[i+8] = '\0';
					}
				}
				sendto(sock, &cmd, sizeof(cmd), 0, (struct sockaddr *) &remote, rlen);
				break;
		
			default:
				printf("WARNING: Unknown cmd %d\n", cmd.cmd);
			case CMD_KA: 
				break;
		}
	}
}