1 /*****************************************************************************
3 *****************************************************************************
4 * Copyright (C) 2004-2005 the VideoLAN team
5 * Copyright (C) 2005-2006 Rémi Denis-Courmont
8 * Authors: Laurent Aimar <fenrir@videolan.org>
9 * Rémi Denis-Courmont <rem # videolan.org>
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
24 *****************************************************************************/
26 /*****************************************************************************
28 *****************************************************************************/
36 #ifdef HAVE_SYS_TIME_H
37 # include <sys/time.h>
46 #include <vlc_network.h>
47 #if defined (WIN32) || defined (UNDER_CE)
49 # define EINPROGRESS WSAEWOULDBLOCK
51 # define EINTR WSAEINTR
53 # define ETIMEDOUT WSAETIMEDOUT
56 static int SocksNegociate( vlc_object_t *, int fd, int i_socks_version,
57 const char *psz_user, const char *psz_passwd );
58 static int SocksHandshakeTCP( vlc_object_t *,
59 int fd, int i_socks_version,
60 const char *psz_user, const char *psz_passwd,
61 const char *psz_host, int i_port );
62 extern int net_Socket( vlc_object_t *p_this, int i_family, int i_socktype,
65 /*****************************************************************************
67 *****************************************************************************
68 * Open a network connection.
69 * @return socket handler or -1 on error.
70 *****************************************************************************/
71 int __net_Connect( vlc_object_t *p_this, const char *psz_host, int i_port,
74 struct addrinfo hints, *res, *ptr;
75 const char *psz_realhost;
77 int i_realport, i_val, i_handle = -1;
80 i_port = 80; /* historical VLC thing */
82 memset( &hints, 0, sizeof( hints ) );
83 hints.ai_socktype = SOCK_STREAM;
85 psz_socks = var_CreateGetNonEmptyString( p_this, "socks" );
86 if( psz_socks != NULL )
88 char *psz = strchr( psz_socks, ':' );
93 psz_realhost = psz_socks;
94 i_realport = ( psz != NULL ) ? atoi( psz ) : 1080;
95 hints.ai_flags &= ~AI_NUMERICHOST;
97 msg_Dbg( p_this, "net: connecting to %s port %d (SOCKS) "
98 "for %s port %d", psz_realhost, i_realport,
101 /* We only implement TCP with SOCKS */
109 msg_Err( p_this, "Socket type not supported through SOCKS" );
120 msg_Err( p_this, "Transport not supported through SOCKS" );
127 psz_realhost = psz_host;
130 msg_Dbg( p_this, "net: connecting to %s port %d", psz_realhost,
134 i_val = vlc_getaddrinfo( p_this, psz_realhost, i_realport, &hints, &res );
139 msg_Err( p_this, "cannot resolve %s port %d : %s", psz_realhost,
140 i_realport, vlc_gai_strerror( i_val ) );
144 for( ptr = res; ptr != NULL; ptr = ptr->ai_next )
146 int fd = net_Socket( p_this, ptr->ai_family, type ?: ptr->ai_socktype,
147 proto ?: ptr->ai_protocol );
150 msg_Dbg( p_this, "socket error: %m" );
154 if( connect( fd, ptr->ai_addr, ptr->ai_addrlen ) )
156 socklen_t i_val_size = sizeof( i_val );
160 if( net_errno != EINPROGRESS )
162 msg_Err( p_this, "connection failed: %m" );
165 msg_Dbg( p_this, "connection: %m" );
167 var_Create( p_this, "ipv4-timeout",
168 VLC_VAR_INTEGER | VLC_VAR_DOINHERIT );
169 var_Get( p_this, "ipv4-timeout", &timeout );
170 if( timeout.i_int < 0 )
172 msg_Err( p_this, "invalid negative value for ipv4-timeout" );
175 d = div( timeout.i_int, 100 );
179 struct pollfd ufd = { .fd = fd, .events = POLLOUT };
184 msg_Dbg( p_this, "connection aborted" );
186 vlc_freeaddrinfo( res );
191 * We'll wait 0.1 second if nothing happens
193 * time out will be shortened if we catch a signal (EINTR)
195 i_ret = poll (&ufd, 1, (d.quot > 0) ? 100 : d.rem);
199 if( ( i_ret == -1 ) && ( net_errno != EINTR ) )
201 msg_Err( p_this, "connection polling error: %m" );
207 msg_Warn( p_this, "connection timed out" );
214 #if !defined( SYS_BEOS ) && !defined( UNDER_CE )
215 if( getsockopt( fd, SOL_SOCKET, SO_ERROR, (void*)&i_val,
216 &i_val_size ) == -1 || i_val != 0 )
219 msg_Err( p_this, "connection failed: %m" );
225 msg_Dbg( p_this, "connection succeeded (socket = %d)", fd );
226 i_handle = fd; /* success! */
229 next_ai: /* failure */
234 vlc_freeaddrinfo( res );
239 if( psz_socks != NULL )
241 /* NOTE: psz_socks already free'd! */
242 char *psz_user = var_CreateGetNonEmptyString( p_this, "socks-user" );
243 char *psz_pwd = var_CreateGetNonEmptyString( p_this, "socks-pwd" );
245 if( SocksHandshakeTCP( p_this, i_handle, 5, psz_user, psz_pwd,
248 msg_Err( p_this, "SOCKS handshake failed" );
249 net_Close( i_handle );
261 int net_AcceptSingle (vlc_object_t *obj, int lfd)
263 int fd = accept (lfd, NULL, NULL);
266 if (net_errno != EAGAIN)
267 msg_Err (obj, "accept failed (from socket %d): %m", lfd);
271 msg_Dbg (obj, "accepted socket %d (from socket %d)", fd, lfd);
272 net_SetupSocket (fd);
277 /*****************************************************************************
279 *****************************************************************************
280 * Accept a connection on a set of listening sockets and return it
281 *****************************************************************************/
282 int __net_Accept( vlc_object_t *p_this, int *pi_fd, mtime_t i_wait )
284 int timeout = (i_wait < 0) ? -1 : i_wait / 1000;
287 assert( pi_fd != NULL );
289 vlc_object_lock (p_this);
290 evfd = vlc_object_waitpipe (p_this);
292 while (vlc_object_alive (p_this))
295 while (pi_fd[n] != -1)
297 struct pollfd ufd[n + 1];
299 /* Initialize file descriptor set */
300 for (unsigned i = 0; i <= n; i++)
302 ufd[i].fd = (i < n) ? pi_fd[i] : evfd;
303 ufd[i].events = POLLIN;
307 vlc_object_unlock (p_this);
308 switch (poll (ufd, n, timeout))
311 if (net_errno != EINTR)
312 msg_Err (p_this, "poll error: %m");
314 return -1; /* NOTE: p_this already unlocked */
316 vlc_object_lock (p_this);
320 vlc_object_wait (p_this);
325 for (unsigned i = 0; i < n; i++)
327 if (ufd[i].revents == 0)
331 int fd = net_AcceptSingle (p_this, sfd);
336 * Move listening socket to the end to let the others in the
337 * set a chance next time.
339 memmove (pi_fd + i, pi_fd + i + 1, n - (i + 1));
341 vlc_object_unlock (p_this);
345 vlc_object_unlock (p_this);
350 /*****************************************************************************
352 *****************************************************************************
353 * Negociate authentication with a SOCKS server.
354 *****************************************************************************/
355 static int SocksNegociate( vlc_object_t *p_obj,
356 int fd, int i_socks_version,
357 const char *psz_socks_user,
358 const char *psz_socks_passwd )
360 uint8_t buffer[128+2*256];
362 vlc_bool_t b_auth = VLC_FALSE;
364 if( i_socks_version != 5 )
367 /* We negociate authentication */
369 if( ( psz_socks_user == NULL ) && ( psz_socks_passwd == NULL ) )
372 buffer[0] = i_socks_version; /* SOCKS version */
375 buffer[1] = 2; /* Number of methods */
376 buffer[2] = 0x00; /* - No auth required */
377 buffer[3] = 0x02; /* - USer/Password */
382 buffer[1] = 1; /* Number of methods */
383 buffer[2] = 0x00; /* - No auth required */
387 if( net_Write( p_obj, fd, NULL, buffer, i_len ) != i_len )
389 if( net_Read( p_obj, fd, NULL, buffer, 2, VLC_TRUE ) != 2 )
392 msg_Dbg( p_obj, "socks: v=%d method=%x", buffer[0], buffer[1] );
394 if( buffer[1] == 0x00 )
396 msg_Dbg( p_obj, "socks: no authentication required" );
398 else if( buffer[1] == 0x02 )
400 int i_len1 = __MIN( strlen(psz_socks_user), 255 );
401 int i_len2 = __MIN( strlen(psz_socks_passwd), 255 );
402 msg_Dbg( p_obj, "socks: username/password authentication" );
404 /* XXX: we don't support user/pwd > 255 (truncated)*/
405 buffer[0] = i_socks_version; /* Version */
406 buffer[1] = i_len1; /* User length */
407 memcpy( &buffer[2], psz_socks_user, i_len1 );
408 buffer[2+i_len1] = i_len2; /* Password length */
409 memcpy( &buffer[2+i_len1+1], psz_socks_passwd, i_len2 );
411 i_len = 3 + i_len1 + i_len2;
413 if( net_Write( p_obj, fd, NULL, buffer, i_len ) != i_len )
416 if( net_Read( p_obj, fd, NULL, buffer, 2, VLC_TRUE ) != 2 )
419 msg_Dbg( p_obj, "socks: v=%d status=%x", buffer[0], buffer[1] );
420 if( buffer[1] != 0x00 )
422 msg_Err( p_obj, "socks: authentication rejected" );
429 msg_Err( p_obj, "socks: unsupported authentication method %x",
432 msg_Err( p_obj, "socks: authentification needed" );
439 /*****************************************************************************
441 *****************************************************************************
442 * Open a TCP connection using a SOCKS server and return a handle (RFC 1928)
443 *****************************************************************************/
444 static int SocksHandshakeTCP( vlc_object_t *p_obj,
447 const char *psz_user, const char *psz_passwd,
448 const char *psz_host, int i_port )
450 uint8_t buffer[128+2*256];
452 if( i_socks_version != 4 && i_socks_version != 5 )
454 msg_Warn( p_obj, "invalid socks protocol version %d", i_socks_version );
458 if( i_socks_version == 5 &&
459 SocksNegociate( p_obj, fd, i_socks_version,
460 psz_user, psz_passwd ) )
463 if( i_socks_version == 4 )
465 struct addrinfo hints, *p_res;
467 /* v4 only support ipv4 */
468 memset (&hints, 0, sizeof (hints));
469 hints.ai_family = AF_INET;
470 if( vlc_getaddrinfo( p_obj, psz_host, 0, &hints, &p_res ) )
473 buffer[0] = i_socks_version;
474 buffer[1] = 0x01; /* CONNECT */
475 SetWBE( &buffer[2], i_port ); /* Port */
476 memcpy( &buffer[4], /* Address */
477 &((struct sockaddr_in *)(p_res->ai_addr))->sin_addr, 4 );
478 vlc_freeaddrinfo( p_res );
480 buffer[8] = 0; /* Empty user id */
482 if( net_Write( p_obj, fd, NULL, buffer, 9 ) != 9 )
484 if( net_Read( p_obj, fd, NULL, buffer, 8, VLC_TRUE ) != 8 )
487 msg_Dbg( p_obj, "socks: v=%d cd=%d",
488 buffer[0], buffer[1] );
490 if( buffer[1] != 90 )
493 else if( i_socks_version == 5 )
495 int i_hlen = __MIN(strlen( psz_host ), 255);
498 buffer[0] = i_socks_version; /* Version */
499 buffer[1] = 0x01; /* Cmd: connect */
500 buffer[2] = 0x00; /* Reserved */
501 buffer[3] = 3; /* ATYP: for now domainname */
504 memcpy( &buffer[5], psz_host, i_hlen );
505 SetWBE( &buffer[5+i_hlen], i_port );
507 i_len = 5 + i_hlen + 2;
510 if( net_Write( p_obj, fd, NULL, buffer, i_len ) != i_len )
513 /* Read the header */
514 if( net_Read( p_obj, fd, NULL, buffer, 5, VLC_TRUE ) != 5 )
517 msg_Dbg( p_obj, "socks: v=%d rep=%d atyp=%d",
518 buffer[0], buffer[1], buffer[3] );
520 if( buffer[1] != 0x00 )
522 msg_Err( p_obj, "socks: CONNECT request failed\n" );
526 /* Read the remaining bytes */
527 if( buffer[3] == 0x01 )
529 else if( buffer[3] == 0x03 )
530 i_len = buffer[4] + 2;
531 else if( buffer[3] == 0x04 )
536 if( net_Read( p_obj, fd, NULL, buffer, i_len, VLC_TRUE ) != i_len )
543 void net_ListenClose( int *pi_fd )
549 for( pi = pi_fd; *pi != -1; pi++ )