1 /*****************************************************************************
3 *****************************************************************************
4 * Copyright (C) 2004-2005 VLC authors and VideoLAN
5 * Copyright (C) 2005-2006 Rémi Denis-Courmont
8 * Authors: Laurent Aimar <fenrir@videolan.org>
9 * Rémi Denis-Courmont <rem # videolan.org>
11 * This program is free software; you can redistribute it and/or modify it
12 * under the terms of the GNU Lesser General Public License as published by
13 * the Free Software Foundation; either version 2.1 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU Lesser General Public License for more details.
21 * You should have received a copy of the GNU Lesser General Public License
22 * along with this program; if not, write to the Free Software Foundation,
23 * Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
24 *****************************************************************************/
26 /*****************************************************************************
28 *****************************************************************************/
33 #include <vlc_common.h>
42 #include <vlc_network.h>
45 # define EINPROGRESS WSAEWOULDBLOCK
47 # define EWOULDBLOCK WSAEWOULDBLOCK
49 # define EAGAIN WSAEWOULDBLOCK
51 # define EINTR WSAEINTR
54 #include "libvlc.h" /* vlc_object_waitpipe */
56 static int SocksNegotiate( vlc_object_t *, int fd, int i_socks_version,
57 const char *psz_user, const char *psz_passwd );
58 static int SocksHandshakeTCP( vlc_object_t *,
59 int fd, int i_socks_version,
60 const char *psz_user, const char *psz_passwd,
61 const char *psz_host, int i_port );
62 extern int net_Socket( vlc_object_t *p_this, int i_family, int i_socktype,
66 /*****************************************************************************
68 *****************************************************************************
69 * Open a network connection.
70 * @return socket handler or -1 on error.
71 *****************************************************************************/
72 int net_Connect( vlc_object_t *p_this, const char *psz_host, int i_port,
75 const char *psz_realhost;
77 int i_realport, i_handle = -1;
79 int evfd = vlc_object_waitpipe (p_this);
83 psz_socks = var_InheritString( p_this, "socks" );
84 if( psz_socks != NULL )
86 char *psz = strchr( psz_socks, ':' );
91 psz_realhost = psz_socks;
92 i_realport = ( psz != NULL ) ? atoi( psz ) : 1080;
94 msg_Dbg( p_this, "net: connecting to %s port %d (SOCKS) "
95 "for %s port %d", psz_realhost, i_realport,
98 /* We only implement TCP with SOCKS */
106 msg_Err( p_this, "Socket type not supported through SOCKS" );
117 msg_Err( p_this, "Transport not supported through SOCKS" );
124 psz_realhost = psz_host;
127 msg_Dbg( p_this, "net: connecting to %s port %d", psz_realhost,
131 struct addrinfo hints = {
133 .ai_protocol = proto,
134 .ai_flags = AI_NUMERICSERV | AI_IDN,
137 int val = vlc_getaddrinfo (psz_realhost, i_realport, &hints, &res);
140 msg_Err (p_this, "cannot resolve %s port %d : %s", psz_realhost,
141 i_realport, gai_strerror (val));
147 int timeout = var_InheritInteger (p_this, "ipv4-timeout");
151 for (struct addrinfo *ptr = res; ptr != NULL; ptr = ptr->ai_next)
153 int fd = net_Socket( p_this, ptr->ai_family,
154 ptr->ai_socktype, ptr->ai_protocol );
157 msg_Dbg( p_this, "socket error: %s", vlc_strerror_c(net_errno) );
161 if( connect( fd, ptr->ai_addr, ptr->ai_addrlen ) )
163 if( net_errno != EINPROGRESS && net_errno != EINTR )
165 msg_Err( p_this, "connection failed: %s",
166 vlc_strerror_c(net_errno) );
170 struct pollfd ufd[2] = {
171 { .fd = fd, .events = POLLOUT },
172 { .fd = evfd, .events = POLLIN },
176 /* NOTE: timeout screwed up if we catch a signal (EINTR) */
177 val = poll (ufd, sizeof (ufd) / sizeof (ufd[0]), timeout);
178 while ((val == -1) && (net_errno == EINTR));
183 msg_Err (p_this, "polling error: %s",
184 vlc_strerror_c(net_errno));
187 case 0: /* timeout */
188 msg_Warn (p_this, "connection timed out");
191 default: /* something happended */
193 goto next_ai; /* LibVLC object killed */
196 /* There is NO WAY around checking SO_ERROR.
197 * Don't ifdef it out!!! */
198 if (getsockopt (fd, SOL_SOCKET, SO_ERROR, &val,
199 &(socklen_t){ sizeof (val) }) || val)
201 msg_Err (p_this, "connection failed: %s",
202 vlc_strerror_c(val));
207 msg_Dbg( p_this, "connection succeeded (socket = %d)", fd );
208 i_handle = fd; /* success! */
211 next_ai: /* failure */
220 if( psz_socks != NULL )
222 /* NOTE: psz_socks already free'd! */
223 char *psz_user = var_InheritString( p_this, "socks-user" );
224 char *psz_pwd = var_InheritString( p_this, "socks-pwd" );
226 if( SocksHandshakeTCP( p_this, i_handle, 5, psz_user, psz_pwd,
229 msg_Err( p_this, "SOCKS handshake failed" );
230 net_Close( i_handle );
242 int net_AcceptSingle (vlc_object_t *obj, int lfd)
244 int fd = vlc_accept (lfd, NULL, NULL, true);
247 if (net_errno != EAGAIN && net_errno != EWOULDBLOCK)
248 msg_Err (obj, "accept failed (from socket %d): %s", lfd,
249 vlc_strerror_c(net_errno));
253 msg_Dbg (obj, "accepted socket %d (from socket %d)", fd, lfd);
254 setsockopt (fd, SOL_SOCKET, SO_REUSEADDR, &(int){ 1 }, sizeof(int));
261 * Accepts an new connection on a set of listening sockets.
262 * If there are no pending connections, this function will wait.
263 * @note If the thread needs to handle events other than incoming connections,
264 * you need to use poll() and net_AcceptSingle() instead.
266 * @param p_this VLC object for logging and object kill signal
267 * @param pi_fd listening socket set
268 * @return -1 on error (may be transient error due to network issues),
269 * a new socket descriptor on success.
271 int net_Accept (vlc_object_t *p_this, int *pi_fd)
273 int evfd = vlc_object_waitpipe (p_this);
275 assert (pi_fd != NULL);
278 while (pi_fd[n] != -1)
280 struct pollfd ufd[n + 1];
282 /* Initialize file descriptor set */
283 for (unsigned i = 0; i <= n; i++)
285 ufd[i].fd = (i < n) ? pi_fd[i] : evfd;
286 ufd[i].events = POLLIN;
292 while (poll (ufd, n + (evfd != -1), -1) == -1)
294 if (net_errno != EINTR)
296 msg_Err (p_this, "poll error: %s", vlc_strerror_c(net_errno));
301 for (unsigned i = 0; i < n; i++)
303 if (ufd[i].revents == 0)
307 int fd = net_AcceptSingle (p_this, sfd);
312 * Move listening socket to the end to let the others in the
313 * set a chance next time.
315 memmove (pi_fd + i, pi_fd + i + 1, n - (i + 1));
330 /*****************************************************************************
332 *****************************************************************************
333 * Negotiate authentication with a SOCKS server.
334 *****************************************************************************/
335 static int SocksNegotiate( vlc_object_t *p_obj,
336 int fd, int i_socks_version,
337 const char *psz_socks_user,
338 const char *psz_socks_passwd )
340 uint8_t buffer[128+2*256];
344 if( i_socks_version != 5 )
347 /* We negotiate authentication */
348 buffer[0] = i_socks_version; /* SOCKS version */
349 if( psz_socks_user != NULL && psz_socks_passwd != NULL )
351 buffer[1] = 2; /* Number of methods */
352 buffer[2] = 0x00; /* - No auth required */
353 buffer[3] = 0x02; /* - USer/Password */
359 buffer[1] = 1; /* Number of methods */
360 buffer[2] = 0x00; /* - No auth required */
364 if( net_Write( p_obj, fd, NULL, buffer, i_len ) != i_len )
366 if( net_Read( p_obj, fd, NULL, buffer, 2, true ) != 2 )
369 msg_Dbg( p_obj, "socks: v=%d method=%x", buffer[0], buffer[1] );
371 if( buffer[1] == 0x00 )
373 msg_Dbg( p_obj, "socks: no authentication required" );
375 else if( buffer[1] == 0x02 )
377 int i_len1 = __MIN( strlen(psz_socks_user), 255 );
378 int i_len2 = __MIN( strlen(psz_socks_passwd), 255 );
379 msg_Dbg( p_obj, "socks: username/password authentication" );
381 /* XXX: we don't support user/pwd > 255 (truncated)*/
382 buffer[0] = i_socks_version; /* Version */
383 buffer[1] = i_len1; /* User length */
384 memcpy( &buffer[2], psz_socks_user, i_len1 );
385 buffer[2+i_len1] = i_len2; /* Password length */
386 memcpy( &buffer[2+i_len1+1], psz_socks_passwd, i_len2 );
388 i_len = 3 + i_len1 + i_len2;
390 if( net_Write( p_obj, fd, NULL, buffer, i_len ) != i_len )
393 if( net_Read( p_obj, fd, NULL, buffer, 2, true ) != 2 )
396 msg_Dbg( p_obj, "socks: v=%d status=%x", buffer[0], buffer[1] );
397 if( buffer[1] != 0x00 )
399 msg_Err( p_obj, "socks: authentication rejected" );
406 msg_Err( p_obj, "socks: unsupported authentication method %x",
409 msg_Err( p_obj, "socks: authentication needed" );
416 /*****************************************************************************
418 *****************************************************************************
419 * Open a TCP connection using a SOCKS server and return a handle (RFC 1928)
420 *****************************************************************************/
421 static int SocksHandshakeTCP( vlc_object_t *p_obj,
424 const char *psz_user, const char *psz_passwd,
425 const char *psz_host, int i_port )
427 uint8_t buffer[128+2*256];
429 if( i_socks_version != 4 && i_socks_version != 5 )
431 msg_Warn( p_obj, "invalid socks protocol version %d", i_socks_version );
435 if( i_socks_version == 5 &&
436 SocksNegotiate( p_obj, fd, i_socks_version,
437 psz_user, psz_passwd ) )
440 if( i_socks_version == 4 )
442 /* v4 only support ipv4 */
443 static const struct addrinfo hints = {
444 .ai_family = AF_INET,
445 .ai_socktype = SOCK_STREAM,
446 .ai_protocol = IPPROTO_TCP,
449 struct addrinfo *res;
451 if (vlc_getaddrinfo (psz_host, 0, &hints, &res))
454 buffer[0] = i_socks_version;
455 buffer[1] = 0x01; /* CONNECT */
456 SetWBE( &buffer[2], i_port ); /* Port */
457 memcpy (&buffer[4], /* Address */
458 &((struct sockaddr_in *)(res->ai_addr))->sin_addr, 4);
461 buffer[8] = 0; /* Empty user id */
463 if( net_Write( p_obj, fd, NULL, buffer, 9 ) != 9 )
465 if( net_Read( p_obj, fd, NULL, buffer, 8, true ) != 8 )
468 msg_Dbg( p_obj, "socks: v=%d cd=%d",
469 buffer[0], buffer[1] );
471 if( buffer[1] != 90 )
474 else if( i_socks_version == 5 )
476 int i_hlen = __MIN(strlen( psz_host ), 255);
479 buffer[0] = i_socks_version; /* Version */
480 buffer[1] = 0x01; /* Cmd: connect */
481 buffer[2] = 0x00; /* Reserved */
482 buffer[3] = 3; /* ATYP: for now domainname */
485 memcpy( &buffer[5], psz_host, i_hlen );
486 SetWBE( &buffer[5+i_hlen], i_port );
488 i_len = 5 + i_hlen + 2;
491 if( net_Write( p_obj, fd, NULL, buffer, i_len ) != i_len )
494 /* Read the header */
495 if( net_Read( p_obj, fd, NULL, buffer, 5, true ) != 5 )
498 msg_Dbg( p_obj, "socks: v=%d rep=%d atyp=%d",
499 buffer[0], buffer[1], buffer[3] );
501 if( buffer[1] != 0x00 )
503 msg_Err( p_obj, "socks: CONNECT request failed" );
507 /* Read the remaining bytes */
508 if( buffer[3] == 0x01 )
510 else if( buffer[3] == 0x03 )
511 i_len = buffer[4] + 2;
512 else if( buffer[3] == 0x04 )
517 if( net_Read( p_obj, fd, NULL, buffer, i_len, true ) != i_len )
524 void net_ListenClose( int *pi_fd )
530 for( pi = pi_fd; *pi != -1; pi++ )