1 /*****************************************************************************
3 *****************************************************************************
4 * Copyright (C) 2004-2005 VLC authors and VideoLAN
5 * Copyright (C) 2005-2006 Rémi Denis-Courmont
8 * Authors: Laurent Aimar <fenrir@videolan.org>
9 * Rémi Denis-Courmont <rem # videolan.org>
11 * This program is free software; you can redistribute it and/or modify it
12 * under the terms of the GNU Lesser General Public License as published by
13 * the Free Software Foundation; either version 2.1 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU Lesser General Public License for more details.
21 * You should have received a copy of the GNU Lesser General Public License
22 * along with this program; if not, write to the Free Software Foundation,
23 * Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
24 *****************************************************************************/
26 /*****************************************************************************
28 *****************************************************************************/
33 #include <vlc_common.h>
45 #include <vlc_network.h>
46 #if defined (WIN32) || defined (UNDER_CE)
48 # define EINPROGRESS WSAEWOULDBLOCK
50 # define EWOULDBLOCK WSAEWOULDBLOCK
52 # define EINTR WSAEINTR
54 # define ETIMEDOUT WSAETIMEDOUT
57 #include "libvlc.h" /* vlc_object_waitpipe */
59 static int SocksNegotiate( vlc_object_t
*, int fd
, int i_socks_version
,
60 const char *psz_user
, const char *psz_passwd
);
61 static int SocksHandshakeTCP( vlc_object_t
*,
62 int fd
, int i_socks_version
,
63 const char *psz_user
, const char *psz_passwd
,
64 const char *psz_host
, int i_port
);
65 extern int net_Socket( vlc_object_t
*p_this
, int i_family
, int i_socktype
,
69 /*****************************************************************************
71 *****************************************************************************
72 * Open a network connection.
73 * @return socket handler or -1 on error.
74 *****************************************************************************/
75 int net_Connect( vlc_object_t
*p_this
, const char *psz_host
, int i_port
,
78 struct addrinfo hints
, *res
, *ptr
;
79 const char *psz_realhost
;
81 int i_realport
, i_val
, i_handle
= -1;
83 int evfd
= vlc_object_waitpipe (p_this
);
87 memset( &hints
, 0, sizeof( hints
) );
88 hints
.ai_socktype
= type
;
89 hints
.ai_protocol
= proto
;
91 psz_socks
= var_InheritString( p_this
, "socks" );
92 if( psz_socks
!= NULL
)
94 char *psz
= strchr( psz_socks
, ':' );
99 psz_realhost
= psz_socks
;
100 i_realport
= ( psz
!= NULL
) ? atoi( psz
) : 1080;
101 hints
.ai_flags
&= ~AI_NUMERICHOST
;
103 msg_Dbg( p_this
, "net: connecting to %s port %d (SOCKS) "
104 "for %s port %d", psz_realhost
, i_realport
,
107 /* We only implement TCP with SOCKS */
115 msg_Err( p_this
, "Socket type not supported through SOCKS" );
126 msg_Err( p_this
, "Transport not supported through SOCKS" );
133 psz_realhost
= psz_host
;
136 msg_Dbg( p_this
, "net: connecting to %s port %d", psz_realhost
,
140 i_val
= vlc_getaddrinfo( p_this
, psz_realhost
, i_realport
, &hints
, &res
);
145 msg_Err( p_this
, "cannot resolve %s port %d : %s", psz_realhost
,
146 i_realport
, gai_strerror( i_val
) );
150 int timeout
= var_InheritInteger (p_this
, "ipv4-timeout");
154 for( ptr
= res
; ptr
!= NULL
; ptr
= ptr
->ai_next
)
156 int fd
= net_Socket( p_this
, ptr
->ai_family
,
157 ptr
->ai_socktype
, ptr
->ai_protocol
);
160 msg_Dbg( p_this
, "socket error: %m" );
164 if( connect( fd
, ptr
->ai_addr
, ptr
->ai_addrlen
) )
168 if( net_errno
!= EINPROGRESS
&& net_errno
!= EINTR
)
170 msg_Err( p_this
, "connection failed: %m" );
174 struct pollfd ufd
[2] = {
175 { .fd
= fd
, .events
= POLLOUT
},
176 { .fd
= evfd
, .events
= POLLIN
},
180 /* NOTE: timeout screwed up if we catch a signal (EINTR) */
181 val
= poll (ufd
, sizeof (ufd
) / sizeof (ufd
[0]), timeout
);
182 while ((val
== -1) && (net_errno
== EINTR
));
187 msg_Err (p_this
, "connection polling error: %m");
190 case 0: /* timeout */
191 msg_Warn (p_this
, "connection timed out");
194 default: /* something happended */
196 goto next_ai
; /* LibVLC object killed */
199 /* There is NO WAY around checking SO_ERROR.
200 * Don't ifdef it out!!! */
201 if (getsockopt (fd
, SOL_SOCKET
, SO_ERROR
, &val
,
202 &(socklen_t
){ sizeof (val
) }) || val
)
205 msg_Err (p_this
, "connection failed: %m");
210 msg_Dbg( p_this
, "connection succeeded (socket = %d)", fd
);
211 i_handle
= fd
; /* success! */
214 next_ai
: /* failure */
224 if( psz_socks
!= NULL
)
226 /* NOTE: psz_socks already free'd! */
227 char *psz_user
= var_InheritString( p_this
, "socks-user" );
228 char *psz_pwd
= var_InheritString( p_this
, "socks-pwd" );
230 if( SocksHandshakeTCP( p_this
, i_handle
, 5, psz_user
, psz_pwd
,
233 msg_Err( p_this
, "SOCKS handshake failed" );
234 net_Close( i_handle
);
246 int net_AcceptSingle (vlc_object_t
*obj
, int lfd
)
248 int fd
= vlc_accept (lfd
, NULL
, NULL
, true);
251 if (net_errno
!= EAGAIN
&& net_errno
!= EWOULDBLOCK
)
252 msg_Err (obj
, "accept failed (from socket %d): %m", lfd
);
256 msg_Dbg (obj
, "accepted socket %d (from socket %d)", fd
, lfd
);
257 setsockopt (fd
, SOL_SOCKET
, SO_REUSEADDR
, &(int){ 1 }, sizeof(int));
264 * Accepts an new connection on a set of listening sockets.
265 * If there are no pending connections, this function will wait.
266 * @note If the thread needs to handle events other than incoming connections,
267 * you need to use poll() and net_AcceptSingle() instead.
269 * @param p_this VLC object for logging and object kill signal
270 * @param pi_fd listening socket set
271 * @return -1 on error (may be transient error due to network issues),
272 * a new socket descriptor on success.
274 int net_Accept (vlc_object_t
*p_this
, int *pi_fd
)
276 int evfd
= vlc_object_waitpipe (p_this
);
278 assert (pi_fd
!= NULL
);
281 while (pi_fd
[n
] != -1)
283 struct pollfd ufd
[n
+ 1];
285 /* Initialize file descriptor set */
286 for (unsigned i
= 0; i
<= n
; i
++)
288 ufd
[i
].fd
= (i
< n
) ? pi_fd
[i
] : evfd
;
289 ufd
[i
].events
= POLLIN
;
295 while (poll (ufd
, n
+ (evfd
!= -1), -1) == -1)
297 if (net_errno
!= EINTR
)
299 msg_Err (p_this
, "poll error: %m");
304 for (unsigned i
= 0; i
< n
; i
++)
306 if (ufd
[i
].revents
== 0)
310 int fd
= net_AcceptSingle (p_this
, sfd
);
315 * Move listening socket to the end to let the others in the
316 * set a chance next time.
318 memmove (pi_fd
+ i
, pi_fd
+ i
+ 1, n
- (i
+ 1));
333 /*****************************************************************************
335 *****************************************************************************
336 * Negotiate authentication with a SOCKS server.
337 *****************************************************************************/
338 static int SocksNegotiate( vlc_object_t
*p_obj
,
339 int fd
, int i_socks_version
,
340 const char *psz_socks_user
,
341 const char *psz_socks_passwd
)
343 uint8_t buffer
[128+2*256];
347 if( i_socks_version
!= 5 )
350 /* We negotiate authentication */
352 if( ( psz_socks_user
== NULL
) && ( psz_socks_passwd
== NULL
) )
355 buffer
[0] = i_socks_version
; /* SOCKS version */
358 buffer
[1] = 2; /* Number of methods */
359 buffer
[2] = 0x00; /* - No auth required */
360 buffer
[3] = 0x02; /* - USer/Password */
365 buffer
[1] = 1; /* Number of methods */
366 buffer
[2] = 0x00; /* - No auth required */
370 if( net_Write( p_obj
, fd
, NULL
, buffer
, i_len
) != i_len
)
372 if( net_Read( p_obj
, fd
, NULL
, buffer
, 2, true ) != 2 )
375 msg_Dbg( p_obj
, "socks: v=%d method=%x", buffer
[0], buffer
[1] );
377 if( buffer
[1] == 0x00 )
379 msg_Dbg( p_obj
, "socks: no authentication required" );
381 else if( buffer
[1] == 0x02 )
383 int i_len1
= __MIN( strlen(psz_socks_user
), 255 );
384 int i_len2
= __MIN( strlen(psz_socks_passwd
), 255 );
385 msg_Dbg( p_obj
, "socks: username/password authentication" );
387 /* XXX: we don't support user/pwd > 255 (truncated)*/
388 buffer
[0] = i_socks_version
; /* Version */
389 buffer
[1] = i_len1
; /* User length */
390 memcpy( &buffer
[2], psz_socks_user
, i_len1
);
391 buffer
[2+i_len1
] = i_len2
; /* Password length */
392 memcpy( &buffer
[2+i_len1
+1], psz_socks_passwd
, i_len2
);
394 i_len
= 3 + i_len1
+ i_len2
;
396 if( net_Write( p_obj
, fd
, NULL
, buffer
, i_len
) != i_len
)
399 if( net_Read( p_obj
, fd
, NULL
, buffer
, 2, true ) != 2 )
402 msg_Dbg( p_obj
, "socks: v=%d status=%x", buffer
[0], buffer
[1] );
403 if( buffer
[1] != 0x00 )
405 msg_Err( p_obj
, "socks: authentication rejected" );
412 msg_Err( p_obj
, "socks: unsupported authentication method %x",
415 msg_Err( p_obj
, "socks: authentication needed" );
422 /*****************************************************************************
424 *****************************************************************************
425 * Open a TCP connection using a SOCKS server and return a handle (RFC 1928)
426 *****************************************************************************/
427 static int SocksHandshakeTCP( vlc_object_t
*p_obj
,
430 const char *psz_user
, const char *psz_passwd
,
431 const char *psz_host
, int i_port
)
433 uint8_t buffer
[128+2*256];
435 if( i_socks_version
!= 4 && i_socks_version
!= 5 )
437 msg_Warn( p_obj
, "invalid socks protocol version %d", i_socks_version
);
441 if( i_socks_version
== 5 &&
442 SocksNegotiate( p_obj
, fd
, i_socks_version
,
443 psz_user
, psz_passwd
) )
446 if( i_socks_version
== 4 )
448 struct addrinfo hints
, *p_res
;
450 /* v4 only support ipv4 */
451 memset (&hints
, 0, sizeof (hints
));
452 hints
.ai_family
= AF_INET
;
453 hints
.ai_socktype
= SOCK_STREAM
;
454 hints
.ai_protocol
= IPPROTO_TCP
;
455 if( vlc_getaddrinfo( p_obj
, psz_host
, 0, &hints
, &p_res
) )
458 buffer
[0] = i_socks_version
;
459 buffer
[1] = 0x01; /* CONNECT */
460 SetWBE( &buffer
[2], i_port
); /* Port */
461 memcpy( &buffer
[4], /* Address */
462 &((struct sockaddr_in
*)(p_res
->ai_addr
))->sin_addr
, 4 );
463 freeaddrinfo( p_res
);
465 buffer
[8] = 0; /* Empty user id */
467 if( net_Write( p_obj
, fd
, NULL
, buffer
, 9 ) != 9 )
469 if( net_Read( p_obj
, fd
, NULL
, buffer
, 8, true ) != 8 )
472 msg_Dbg( p_obj
, "socks: v=%d cd=%d",
473 buffer
[0], buffer
[1] );
475 if( buffer
[1] != 90 )
478 else if( i_socks_version
== 5 )
480 int i_hlen
= __MIN(strlen( psz_host
), 255);
483 buffer
[0] = i_socks_version
; /* Version */
484 buffer
[1] = 0x01; /* Cmd: connect */
485 buffer
[2] = 0x00; /* Reserved */
486 buffer
[3] = 3; /* ATYP: for now domainname */
489 memcpy( &buffer
[5], psz_host
, i_hlen
);
490 SetWBE( &buffer
[5+i_hlen
], i_port
);
492 i_len
= 5 + i_hlen
+ 2;
495 if( net_Write( p_obj
, fd
, NULL
, buffer
, i_len
) != i_len
)
498 /* Read the header */
499 if( net_Read( p_obj
, fd
, NULL
, buffer
, 5, true ) != 5 )
502 msg_Dbg( p_obj
, "socks: v=%d rep=%d atyp=%d",
503 buffer
[0], buffer
[1], buffer
[3] );
505 if( buffer
[1] != 0x00 )
507 msg_Err( p_obj
, "socks: CONNECT request failed" );
511 /* Read the remaining bytes */
512 if( buffer
[3] == 0x01 )
514 else if( buffer
[3] == 0x03 )
515 i_len
= buffer
[4] + 2;
516 else if( buffer
[3] == 0x04 )
521 if( net_Read( p_obj
, fd
, NULL
, buffer
, i_len
, true ) != i_len
)
528 void net_ListenClose( int *pi_fd
)
534 for( pi
= pi_fd
; *pi
!= -1; pi
++ )