1 /*****************************************************************************
3 *****************************************************************************
4 * Copyright (C) 2004-2005 the VideoLAN team
5 * Copyright (C) 2005-2006 Rémi Denis-Courmont
8 * Authors: Laurent Aimar <fenrir@videolan.org>
9 * Rémi Denis-Courmont <rem # videolan.org>
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
24 *****************************************************************************/
26 /*****************************************************************************
28 *****************************************************************************/
37 #ifdef HAVE_SYS_TIME_H
38 # include <sys/time.h>
44 #include <vlc_network.h>
45 #if defined (WIN32) || defined (UNDER_CE)
47 # define EINPROGRESS WSAEWOULDBLOCK
49 # define EINTR WSAEINTR
51 # define ETIMEDOUT WSAETIMEDOUT
54 static int SocksNegociate( vlc_object_t *, int fd, int i_socks_version,
55 char *psz_socks_user, char *psz_socks_passwd );
56 static int SocksHandshakeTCP( vlc_object_t *,
57 int fd, int i_socks_version,
58 char *psz_socks_user, char *psz_socks_passwd,
59 const char *psz_host, int i_port );
60 extern int net_Socket( vlc_object_t *p_this, int i_family, int i_socktype,
63 /*****************************************************************************
65 *****************************************************************************
66 * Open a TCP connection and return a handle
67 *****************************************************************************/
68 int __net_ConnectTCP( vlc_object_t *p_this, const char *psz_host, int i_port )
70 struct addrinfo hints, *res, *ptr;
71 const char *psz_realhost;
73 int i_realport, i_val, i_handle = -1, i_saved_errno = 0;
74 unsigned u_errstep = 0;
77 i_port = 80; /* historical VLC thing */
79 memset( &hints, 0, sizeof( hints ) );
80 hints.ai_socktype = SOCK_STREAM;
82 psz_socks = var_CreateGetString( p_this, "socks" );
83 if( *psz_socks && *psz_socks != ':' )
85 char *psz = strchr( psz_socks, ':' );
90 psz_realhost = psz_socks;
91 i_realport = ( psz != NULL ) ? atoi( psz ) : 1080;
93 msg_Dbg( p_this, "net: connecting to %s port %d for %s port %d",
94 psz_realhost, i_realport, psz_host, i_port );
98 psz_realhost = psz_host;
101 msg_Dbg( p_this, "net: connecting to %s port %d", psz_realhost,
105 i_val = vlc_getaddrinfo( p_this, psz_realhost, i_realport, &hints, &res );
108 msg_Err( p_this, "cannot resolve %s port %d : %s", psz_realhost,
109 i_realport, vlc_gai_strerror( i_val ) );
114 for( ptr = res; ptr != NULL; ptr = ptr->ai_next )
116 int fd = net_Socket( p_this, ptr->ai_family, ptr->ai_socktype,
123 i_saved_errno = net_errno;
125 msg_Dbg( p_this, "socket error: %s", strerror( net_errno ) );
129 if( connect( fd, ptr->ai_addr, ptr->ai_addrlen ) )
131 socklen_t i_val_size = sizeof( i_val );
136 if( net_errno != EINPROGRESS )
141 i_saved_errno = net_errno;
143 msg_Dbg( p_this, "connect error: %s", strerror( net_errno ) );
147 var_Create( p_this, "ipv4-timeout",
148 VLC_VAR_INTEGER | VLC_VAR_DOINHERIT );
149 var_Get( p_this, "ipv4-timeout", &timeout );
150 if( timeout.i_int < 0 )
152 msg_Err( p_this, "invalid negative value for ipv4-timeout" );
155 d = div( timeout.i_int, 100 );
157 msg_Dbg( p_this, "connection in progress" );
165 msg_Dbg( p_this, "connection aborted" );
167 vlc_freeaddrinfo( res );
172 /* Initialize file descriptor set */
177 * We'll wait 0.1 second if nothing happens
179 * time out will be shortened if we catch a signal (EINTR)
182 tv.tv_usec = (d.quot > 0) ? 100000 : (1000 * d.rem);
184 i_ret = select( fd + 1, NULL, &fds, NULL, &tv );
188 if( ( i_ret == -1 ) && ( net_errno != EINTR ) )
190 msg_Warn( p_this, "select error: %s",
191 strerror( net_errno ) );
197 msg_Dbg( p_this, "select timed out" );
201 i_saved_errno = ETIMEDOUT;
209 #if !defined( SYS_BEOS ) && !defined( UNDER_CE )
210 if( getsockopt( fd, SOL_SOCKET, SO_ERROR, (void*)&i_val,
211 &i_val_size ) == -1 || i_val != 0 )
214 i_saved_errno = i_val;
215 msg_Dbg( p_this, "connect error (via getsockopt): %s",
216 net_strerror( i_val ) );
222 i_handle = fd; /* success! */
225 next_ai: /* failure */
230 vlc_freeaddrinfo( res );
234 msg_Err( p_this, "Connection to %s port %d failed: %s", psz_host,
235 i_port, net_strerror( i_saved_errno ) );
240 if( *psz_socks && *psz_socks != ':' )
242 char *psz_user = var_CreateGetString( p_this, "socks-user" );
243 char *psz_pwd = var_CreateGetString( p_this, "socks-pwd" );
245 if( SocksHandshakeTCP( p_this, i_handle, 5, psz_user, psz_pwd,
248 msg_Err( p_this, "Failed to use the SOCKS server" );
249 net_Close( i_handle );
262 /*****************************************************************************
264 *****************************************************************************
265 * Open TCP passive "listening" socket(s)
266 * This function returns NULL in case of error.
267 *****************************************************************************/
268 int *__net_ListenTCP (vlc_object_t *p_this, const char *psz_host, int i_port)
270 return net_Listen (p_this, psz_host, i_port, AF_UNSPEC, SOCK_STREAM,
274 /*****************************************************************************
276 *****************************************************************************
277 * Accept a connection on a set of listening sockets and return it
278 *****************************************************************************/
279 int __net_Accept( vlc_object_t *p_this, int *pi_fd, mtime_t i_wait )
281 vlc_bool_t b_die = p_this->b_die, b_block = (i_wait < 0);
283 while( p_this->b_die == b_die )
285 int i_val = -1, *pi, *pi_end;
286 struct timeval timeout;
291 /* Initialize file descriptor set */
295 for( pi = pi_fd; *pi != -1; pi++ )
302 FD_SET( i_fd, &fds_r );
303 FD_SET( i_fd, &fds_e );
308 timeout.tv_usec = b_block ? 500000 : i_wait;
310 i_val = select( i_val + 1, &fds_r, NULL, &fds_e, &timeout );
311 if( ( ( i_val < 0 ) && ( net_errno == EINTR ) ) || i_val == 0 )
320 msg_Err( p_this, "network select error (%s)",
321 net_strerror( net_errno ) );
325 for( pi = pi_fd; *pi != -1; pi++ )
329 if( !FD_ISSET( i_fd, &fds_r ) && !FD_ISSET( i_fd, &fds_e ) )
332 i_val = accept( i_fd, NULL, 0 );
334 msg_Err( p_this, "accept failed (%s)",
335 net_strerror( net_errno ) );
339 setsockopt( i_fd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof( yes ));
341 fcntl( i_fd, F_SETFD, FD_CLOEXEC );
344 * This round-robin trick ensures that the first sockets in
345 * pi_fd won't prevent the last ones from getting accept'ed.
348 memmove( pi, pi + 1, pi_end - pi );
359 /*****************************************************************************
361 *****************************************************************************
362 * Negociate authentication with a SOCKS server.
363 *****************************************************************************/
364 static int SocksNegociate( vlc_object_t *p_obj,
365 int fd, int i_socks_version,
366 char *psz_socks_user,
367 char *psz_socks_passwd )
369 uint8_t buffer[128+2*256];
371 vlc_bool_t b_auth = VLC_FALSE;
373 if( i_socks_version != 5 )
376 /* We negociate authentication */
378 if( psz_socks_user && psz_socks_passwd &&
379 *psz_socks_user && *psz_socks_passwd )
382 buffer[0] = i_socks_version; /* SOCKS version */
385 buffer[1] = 2; /* Number of methods */
386 buffer[2] = 0x00; /* - No auth required */
387 buffer[3] = 0x02; /* - USer/Password */
392 buffer[1] = 1; /* Number of methods */
393 buffer[2] = 0x00; /* - No auth required */
397 if( net_Write( p_obj, fd, NULL, buffer, i_len ) != i_len )
399 if( net_Read( p_obj, fd, NULL, buffer, 2, VLC_TRUE ) != 2 )
402 msg_Dbg( p_obj, "socks: v=%d method=%x", buffer[0], buffer[1] );
404 if( buffer[1] == 0x00 )
406 msg_Dbg( p_obj, "socks: no authentication required" );
408 else if( buffer[1] == 0x02 )
410 int i_len1 = __MIN( strlen(psz_socks_user), 255 );
411 int i_len2 = __MIN( strlen(psz_socks_passwd), 255 );
412 msg_Dbg( p_obj, "socks: username/password authentication" );
414 /* XXX: we don't support user/pwd > 255 (truncated)*/
415 buffer[0] = i_socks_version; /* Version */
416 buffer[1] = i_len1; /* User length */
417 memcpy( &buffer[2], psz_socks_user, i_len1 );
418 buffer[2+i_len1] = i_len2; /* Password length */
419 memcpy( &buffer[2+i_len1+1], psz_socks_passwd, i_len2 );
421 i_len = 3 + i_len1 + i_len2;
423 if( net_Write( p_obj, fd, NULL, buffer, i_len ) != i_len )
426 if( net_Read( p_obj, fd, NULL, buffer, 2, VLC_TRUE ) != 2 )
429 msg_Dbg( p_obj, "socks: v=%d status=%x", buffer[0], buffer[1] );
430 if( buffer[1] != 0x00 )
432 msg_Err( p_obj, "socks: authentication rejected" );
439 msg_Err( p_obj, "socks: unsupported authentication method %x",
442 msg_Err( p_obj, "socks: authentification needed" );
449 /*****************************************************************************
451 *****************************************************************************
452 * Open a TCP connection using a SOCKS server and return a handle (RFC 1928)
453 *****************************************************************************/
454 static int SocksHandshakeTCP( vlc_object_t *p_obj,
457 char *psz_socks_user, char *psz_socks_passwd,
458 const char *psz_host, int i_port )
460 uint8_t buffer[128+2*256];
462 if( i_socks_version != 4 && i_socks_version != 5 )
464 msg_Warn( p_obj, "invalid socks protocol version %d", i_socks_version );
468 if( i_socks_version == 5 &&
469 SocksNegociate( p_obj, fd, i_socks_version,
470 psz_socks_user, psz_socks_passwd ) )
473 if( i_socks_version == 4 )
475 struct addrinfo hints, *p_res;
477 /* v4 only support ipv4 */
478 memset (&hints, 0, sizeof (hints));
479 hints.ai_family = AF_INET;
480 if( vlc_getaddrinfo( p_obj, psz_host, 0, &hints, &p_res ) )
483 buffer[0] = i_socks_version;
484 buffer[1] = 0x01; /* CONNECT */
485 SetWBE( &buffer[2], i_port ); /* Port */
486 memcpy( &buffer[4], /* Address */
487 &((struct sockaddr_in *)(p_res->ai_addr))->sin_addr, 4 );
488 vlc_freeaddrinfo( p_res );
490 buffer[8] = 0; /* Empty user id */
492 if( net_Write( p_obj, fd, NULL, buffer, 9 ) != 9 )
494 if( net_Read( p_obj, fd, NULL, buffer, 8, VLC_TRUE ) != 8 )
497 msg_Dbg( p_obj, "socks: v=%d cd=%d",
498 buffer[0], buffer[1] );
500 if( buffer[1] != 90 )
503 else if( i_socks_version == 5 )
505 int i_hlen = __MIN(strlen( psz_host ), 255);
508 buffer[0] = i_socks_version; /* Version */
509 buffer[1] = 0x01; /* Cmd: connect */
510 buffer[2] = 0x00; /* Reserved */
511 buffer[3] = 3; /* ATYP: for now domainname */
514 memcpy( &buffer[5], psz_host, i_hlen );
515 SetWBE( &buffer[5+i_hlen], i_port );
517 i_len = 5 + i_hlen + 2;
520 if( net_Write( p_obj, fd, NULL, buffer, i_len ) != i_len )
523 /* Read the header */
524 if( net_Read( p_obj, fd, NULL, buffer, 5, VLC_TRUE ) != 5 )
527 msg_Dbg( p_obj, "socks: v=%d rep=%d atyp=%d",
528 buffer[0], buffer[1], buffer[3] );
530 if( buffer[1] != 0x00 )
532 msg_Err( p_obj, "socks: CONNECT request failed\n" );
536 /* Read the remaining bytes */
537 if( buffer[3] == 0x01 )
539 else if( buffer[3] == 0x03 )
540 i_len = buffer[4] + 2;
541 else if( buffer[3] == 0x04 )
546 if( net_Read( p_obj, fd, NULL, buffer, i_len, VLC_TRUE ) != i_len )
553 void net_ListenClose( int *pi_fd )
559 for( pi = pi_fd; *pi != -1; pi++ )