gaim/gaim

Make this sucker compile again!!
draft default tip
2022-03-31, Gary Kramlich
ea0a68c3b8a8
Make this sucker compile again!!
/**
* @file proxy.c Proxy API
* @ingroup core
*
* gaim
*
* Gaim is the legal property of its developers, whose names are too numerous
* to list here. Please refer to the COPYRIGHT file distributed with this
* source distribution.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*
*/
/* this is a little piece of code to handle proxy connection */
/* it is intended to : 1st handle http proxy, using the CONNECT command
, 2nd provide an easy way to add socks support
, 3rd draw women to it like flies to honey */
#include "internal.h"
#include "cipher.h"
#include "debug.h"
#include "notify.h"
#include "ntlm.h"
#include "prefs.h"
#include "proxy.h"
#include "util.h"
static GaimProxyInfo *global_proxy_info = NULL;
struct PHB {
GaimInputFunction func;
gpointer data;
char *host;
int port;
gint inpa;
GaimProxyInfo *gpi;
GaimAccount *account;
GSList *hosts;
guchar *write_buffer;
gsize write_buf_len;
gsize written_len;
GaimInputFunction read_cb;
guchar *read_buffer;
gsize read_buf_len;
gsize read_len;
};
static void try_connect(struct PHB *);
static const char *socks5errors[] = {
"succeeded\n",
"general SOCKS server failure\n",
"connection not allowed by ruleset\n",
"Network unreachable\n",
"Host unreachable\n",
"Connection refused\n",
"TTL expired\n",
"Command not supported\n",
"Address type not supported\n"
};
/**************************************************************************
* Proxy structure API
**************************************************************************/
GaimProxyInfo *
gaim_proxy_info_new(void)
{
return g_new0(GaimProxyInfo, 1);
}
void
gaim_proxy_info_destroy(GaimProxyInfo *info)
{
g_return_if_fail(info != NULL);
if (info->host != NULL) g_free(info->host);
if (info->username != NULL) g_free(info->username);
if (info->password != NULL) g_free(info->password);
g_free(info);
}
void
gaim_proxy_info_set_type(GaimProxyInfo *info, GaimProxyType type)
{
g_return_if_fail(info != NULL);
info->type = type;
}
void
gaim_proxy_info_set_host(GaimProxyInfo *info, const char *host)
{
g_return_if_fail(info != NULL);
if (info->host != NULL)
g_free(info->host);
info->host = (host == NULL ? NULL : g_strdup(host));
}
void
gaim_proxy_info_set_port(GaimProxyInfo *info, int port)
{
g_return_if_fail(info != NULL);
info->port = port;
}
void
gaim_proxy_info_set_username(GaimProxyInfo *info, const char *username)
{
g_return_if_fail(info != NULL);
if (info->username != NULL)
g_free(info->username);
info->username = (username == NULL ? NULL : g_strdup(username));
}
void
gaim_proxy_info_set_password(GaimProxyInfo *info, const char *password)
{
g_return_if_fail(info != NULL);
if (info->password != NULL)
g_free(info->password);
info->password = (password == NULL ? NULL : g_strdup(password));
}
GaimProxyType
gaim_proxy_info_get_type(const GaimProxyInfo *info)
{
g_return_val_if_fail(info != NULL, GAIM_PROXY_NONE);
return info->type;
}
const char *
gaim_proxy_info_get_host(const GaimProxyInfo *info)
{
g_return_val_if_fail(info != NULL, NULL);
return info->host;
}
int
gaim_proxy_info_get_port(const GaimProxyInfo *info)
{
g_return_val_if_fail(info != NULL, 0);
return info->port;
}
const char *
gaim_proxy_info_get_username(const GaimProxyInfo *info)
{
g_return_val_if_fail(info != NULL, NULL);
return info->username;
}
const char *
gaim_proxy_info_get_password(const GaimProxyInfo *info)
{
g_return_val_if_fail(info != NULL, NULL);
return info->password;
}
/**************************************************************************
* Global Proxy API
**************************************************************************/
GaimProxyInfo *
gaim_global_proxy_get_info(void)
{
return global_proxy_info;
}
static GaimProxyInfo *
gaim_gnome_proxy_get_info(void)
{
static GaimProxyInfo info = {0, NULL, 0, NULL, NULL};
gchar *path;
if ((path = g_find_program_in_path("gconftool-2"))) {
gchar *tmp;
g_free(path);
/* See whether to use a proxy. */
if (!g_spawn_command_line_sync("gconftool-2 -g /system/http_proxy/use_http_proxy", &tmp,
NULL, NULL, NULL))
return gaim_global_proxy_get_info();
if (!strcmp(tmp, "false\n")) {
info.type = GAIM_PROXY_NONE;
g_free(tmp);
return &info;
} else if (strcmp(tmp, "true\n")) {
g_free(tmp);
return gaim_global_proxy_get_info();
}
g_free(tmp);
info.type = GAIM_PROXY_HTTP;
/* Free the old fields */
if (info.host) {
g_free(info.host);
info.host = NULL;
}
if (info.username) {
g_free(info.username);
info.username = NULL;
}
if (info.password) {
g_free(info.password);
info.password = NULL;
}
/* Get the new ones */
if (!g_spawn_command_line_sync("gconftool-2 -g /system/http_proxy/host", &info.host,
NULL, NULL, NULL))
return gaim_global_proxy_get_info();
g_strchomp(info.host);
if (!g_spawn_command_line_sync("gconftool-2 -g /system/http_proxy/authentication_user", &info.username,
NULL, NULL, NULL))
return gaim_global_proxy_get_info();
g_strchomp(info.username);
if (!g_spawn_command_line_sync("gconftool-2 -g /system/http_proxy/authentication_password", &info.password,
NULL, NULL, NULL))
return gaim_global_proxy_get_info();
g_strchomp(info.password);
if (!g_spawn_command_line_sync("gconftool-2 -g /system/http_proxy/port", &tmp,
NULL, NULL, NULL))
return gaim_global_proxy_get_info();
info.port = atoi(tmp);
g_free(tmp);
return &info;
}
return gaim_global_proxy_get_info();
}
/**************************************************************************
* Proxy API
**************************************************************************/
#ifdef __unix__
/*
* This structure represents both a pending DNS request and
* a free child process.
*/
typedef struct {
char *host;
int port;
dns_callback_t callback;
gpointer data;
gint inpa;
int fd_in, fd_out;
pid_t dns_pid;
} pending_dns_request_t;
static GSList *free_dns_children = NULL;
static GQueue *queued_requests = NULL;
static int number_of_dns_children = 0;
static const int MAX_DNS_CHILDREN = 2;
typedef struct {
char hostname[512];
int port;
} dns_params_t;
typedef struct {
dns_params_t params;
dns_callback_t callback;
gpointer data;
} queued_dns_request_t;
/*
* Begin the DNS resolver child process functions.
*/
#ifdef HAVE_SIGNAL_H
static void
trap_gdb_bug()
{
const char *message =
"Gaim's DNS child got a SIGTRAP signal. \n"
"This can be caused by trying to run gaim inside gdb.\n"
"There is a known gdb bug which prevents this. Supposedly gaim\n"
"should have detected you were using gdb and used an ugly hack,\n"
"check cope_with_gdb_brokenness() in proxy.c.\n\n"
"For more info about this bug, see http://sources.redhat.com/ml/gdb/2001-07/msg00349.html\n";
fputs("\n* * *\n",stderr);
fputs(message,stderr);
fputs("* * *\n\n",stderr);
execlp("xmessage","xmessage","-center", message, NULL);
_exit(1);
}
#endif
static void
cope_with_gdb_brokenness()
{
#ifdef __linux__
static gboolean already_done = FALSE;
char s[256], e[512];
int n;
pid_t ppid;
if(already_done)
return;
already_done = TRUE;
ppid = getppid();
snprintf(s, sizeof(s), "/proc/%d/exe", ppid);
n = readlink(s, e, sizeof(e));
if(n < 0)
return;
e[MIN(n,sizeof(e)-1)] = '\0';
if(strstr(e,"gdb")) {
gaim_debug_info("dns",
"Debugger detected, performing useless query...\n");
gethostbyname("x.x.x.x.x");
}
#endif
}
static void
gaim_dns_resolverthread(int child_out, int child_in, gboolean show_debug)
{
dns_params_t dns_params;
const size_t zero = 0;
int rc;
#ifdef HAVE_GETADDRINFO
struct addrinfo hints, *res, *tmp;
char servname[20];
#else
struct sockaddr_in sin;
const size_t addrlen = sizeof(sin);
#endif
#ifdef HAVE_SIGNAL_H
signal(SIGHUP, SIG_DFL);
signal(SIGINT, SIG_DFL);
signal(SIGQUIT, SIG_DFL);
signal(SIGCHLD, SIG_DFL);
signal(SIGTERM, SIG_DFL);
signal(SIGTRAP, trap_gdb_bug);
#endif
/*
* We resolve 1 host name for each iteration of this
* while loop.
*
* The top half of this reads in the hostname and port
* number from the socket with our parent. The bottom
* half of this resolves the IP (blocking) and sends
* the result back to our parent, when finished.
*/
while (1) {
const char ch = 'Y';
fd_set fds;
struct timeval tv = { .tv_sec = 40 , .tv_usec = 0 };
FD_ZERO(&fds);
FD_SET(child_in, &fds);
rc = select(child_in + 1, &fds, NULL, NULL, &tv);
if (!rc) {
if (show_debug)
fprintf(stderr,"dns[%d]: nobody needs me... =(\n", getpid());
break;
}
rc = read(child_in, &dns_params, sizeof(dns_params_t));
if (rc < 0) {
perror("read()");
break;
}
if (rc == 0) {
if (show_debug)
fprintf(stderr,"dns[%d]: Oops, father has gone, wait for me, wait...!\n", getpid());
_exit(0);
}
if (dns_params.hostname[0] == '\0') {
fprintf(stderr, "dns[%d]: hostname = \"\" (port = %d)!!!\n", getpid(), dns_params.port);
_exit(1);
}
/* Tell our parent that we read the data successfully */
write(child_out, &ch, sizeof(ch));
/* We have the hostname and port, now resolve the IP */
#ifdef HAVE_GETADDRINFO
g_snprintf(servname, sizeof(servname), "%d", dns_params.port);
memset(&hints, 0, sizeof(hints));
/* This is only used to convert a service
* name to a port number. As we know we are
* passing a number already, we know this
* value will not be really used by the C
* library.
*/
hints.ai_socktype = SOCK_STREAM;
rc = getaddrinfo(dns_params.hostname, servname, &hints, &res);
write(child_out, &rc, sizeof(rc));
if (rc != 0) {
close(child_out);
if (show_debug)
fprintf(stderr,"dns[%d] Error: getaddrinfo returned %d\n",
getpid(), rc);
dns_params.hostname[0] = '\0';
continue;
}
tmp = res;
while (res) {
size_t ai_addrlen = res->ai_addrlen;
write(child_out, &ai_addrlen, sizeof(ai_addrlen));
write(child_out, res->ai_addr, res->ai_addrlen);
res = res->ai_next;
}
freeaddrinfo(tmp);
write(child_out, &zero, sizeof(zero));
#else
if (!inet_aton(dns_params.hostname, &sin.sin_addr)) {
struct hostent *hp;
if (!(hp = gethostbyname(dns_params.hostname))) {
write(child_out, &h_errno, sizeof(int));
close(child_out);
if (show_debug)
fprintf(stderr,"DNS Error: %d\n", h_errno);
_exit(0);
}
memset(&sin, 0, sizeof(struct sockaddr_in));
memcpy(&sin.sin_addr.s_addr, hp->h_addr, hp->h_length);
sin.sin_family = hp->h_addrtype;
} else
sin.sin_family = AF_INET;
sin.sin_port = htons(dns_params.port);
write(child_out, &addrlen, sizeof(addrlen));
write(child_out, &sin, addrlen);
write(child_out, &zero, sizeof(zero));
#endif
dns_params.hostname[0] = '\0';
}
close(child_out);
close(child_in);
_exit(0);
}
static pending_dns_request_t *
gaim_dns_new_resolverthread(gboolean show_debug)
{
pending_dns_request_t *req;
int child_out[2], child_in[2];
/* Create pipes for communicating with the child process */
if (pipe(child_out) || pipe(child_in)) {
gaim_debug_error("dns",
"Could not create pipes: %s\n", strerror(errno));
return NULL;
}
req = g_new(pending_dns_request_t, 1);
cope_with_gdb_brokenness();
/* Fork! */
req->dns_pid = fork();
/* If we are the child process... */
if (req->dns_pid == 0) {
/* We should not access the parent's side of the pipes, so close them */
close(child_out[0]);
close(child_in[1]);
gaim_dns_resolverthread(child_out[1], child_in[0], show_debug);
/* The thread calls _exit() rather than returning, so we never get here */
}
/* We should not access the child's side of the pipes, so close them */
close(child_out[1]);
close(child_in[0]);
if (req->dns_pid == -1) {
gaim_debug_error("dns",
"Could not create child process for DNS: %s\n",
strerror(errno));
g_free(req);
return NULL;
}
req->fd_out = child_out[0];
req->fd_in = child_in[1];
number_of_dns_children++;
gaim_debug_info("dns",
"Created new DNS child %d, there are now %d children.\n",
req->dns_pid, number_of_dns_children);
return req;
}
/*
* End the DNS resolver child process functions.
*/
/*
* Begin the functions for dealing with the DNS child processes.
*/
static void
req_free(pending_dns_request_t *req)
{
g_return_if_fail(req != NULL);
close(req->fd_in);
close(req->fd_out);
g_free(req->host);
g_free(req);
number_of_dns_children--;
}
static int
send_dns_request_to_child(pending_dns_request_t *req, dns_params_t *dns_params)
{
char ch;
int rc;
pid_t pid;
/* This waitpid might return the child's PID if it has recently
* exited, or it might return an error if it exited "long
* enough" ago that it has already been reaped; in either
* instance, we can't use it. */
if ((pid = waitpid (req->dns_pid, NULL, WNOHANG)) > 0) {
gaim_debug_warning("dns",
"DNS child %d no longer exists\n", req->dns_pid);
return -1;
} else if (pid < 0) {
gaim_debug_warning("dns",
"Wait for DNS child %d failed: %s\n",
req->dns_pid, strerror(errno));
return -1;
}
/* Let's contact this lost child! */
rc = write(req->fd_in, dns_params, sizeof(*dns_params));
if (rc < 0) {
gaim_debug_error("dns",
"Unable to write to DNS child %d: %d\n",
req->dns_pid, strerror(errno));
close(req->fd_in);
return -1;
}
g_return_val_if_fail(rc == sizeof(*dns_params), -1);
/* Did you hear me? (This avoids some race conditions) */
rc = read(req->fd_out, &ch, sizeof(ch));
if (rc != 1 || ch != 'Y')
{
gaim_debug_warning("dns",
"DNS child %d not responding. Killing it!\n",
req->dns_pid);
kill(req->dns_pid, SIGKILL);
return -1;
}
gaim_debug_info("dns",
"Successfully sent DNS request to child %d\n", req->dns_pid);
return 0;
}
static void
host_resolved(gpointer data, gint source, GaimInputCondition cond);
static void
release_dns_child(pending_dns_request_t *req)
{
g_free(req->host);
req->host = NULL;
if (queued_requests && !g_queue_is_empty(queued_requests)) {
queued_dns_request_t *r = g_queue_pop_head(queued_requests);
req->host = g_strdup(r->params.hostname);
req->port = r->params.port;
req->callback = r->callback;
req->data = r->data;
gaim_debug_info("dns",
"Processing queued DNS query for '%s' with child %d\n",
req->host, req->dns_pid);
if (send_dns_request_to_child(req, &(r->params)) != 0) {
req_free(req);
req = NULL;
gaim_debug_warning("dns",
"Intent of process queued query of '%s' failed, "
"requeueing...\n", r->params.hostname);
g_queue_push_head(queued_requests, r);
} else {
req->inpa = gaim_input_add(req->fd_out, GAIM_INPUT_READ, host_resolved, req);
g_free(r);
}
} else {
req->host = NULL;
req->callback = NULL;
req->data = NULL;
free_dns_children = g_slist_append(free_dns_children, req);
}
}
static void
host_resolved(gpointer data, gint source, GaimInputCondition cond)
{
pending_dns_request_t *req = (pending_dns_request_t*)data;
int rc, err;
GSList *hosts = NULL;
struct sockaddr *addr = NULL;
size_t addrlen;
gaim_debug_info("dns", "Got response for '%s'\n", req->host);
gaim_input_remove(req->inpa);
rc = read(req->fd_out, &err, sizeof(err));
if ((rc == 4) && (err != 0))
{
char message[1024];
#ifdef HAVE_GETADDRINFO
g_snprintf(message, sizeof(message), "DNS error: %s (pid=%d)",
gai_strerror(err), req->dns_pid);
#else
g_snprintf(message, sizeof(message), "DNS error: %d (pid=%d)",
err, req->dns_pid);
#endif
gaim_debug_error("dns", "%s\n", message);
req->callback(NULL, req->data, message);
release_dns_child(req);
return;
}
if (rc > 0)
{
while (rc > 0) {
rc = read(req->fd_out, &addrlen, sizeof(addrlen));
if (rc > 0 && addrlen > 0) {
addr = g_malloc(addrlen);
rc = read(req->fd_out, addr, addrlen);
hosts = g_slist_append(hosts, GINT_TO_POINTER(addrlen));
hosts = g_slist_append(hosts, addr);
} else {
break;
}
}
} else if (rc == -1) {
char message[1024];
g_snprintf(message, sizeof(message), "Error reading from DNS child: %s",strerror(errno));
gaim_debug_error("dns", "%s\n", message);
req->callback(NULL, req->data, message);
req_free(req);
return;
} else if (rc == 0) {
char message[1024];
g_snprintf(message, sizeof(message), "EOF reading from DNS child");
close(req->fd_out);
gaim_debug_error("dns", "%s\n", message);
req->callback(NULL, req->data, message);
req_free(req);
return;
}
/* wait4(req->dns_pid, NULL, WNOHANG, NULL); */
req->callback(hosts, req->data, NULL);
release_dns_child(req);
}
/*
* End the functions for dealing with the DNS child processes.
*/
int
gaim_gethostbyname_async(const char *hostname, int port, dns_callback_t callback, gpointer data)
{
pending_dns_request_t *req = NULL;
dns_params_t dns_params;
gchar *host_temp;
gboolean show_debug;
show_debug = gaim_debug_is_enabled();
host_temp = g_strstrip(g_strdup(hostname));
strncpy(dns_params.hostname, host_temp, sizeof(dns_params.hostname) - 1);
g_free(host_temp);
dns_params.hostname[sizeof(dns_params.hostname) - 1] = '\0';
dns_params.port = port;
/*
* If we have any children, attempt to have them perform the DNS
* query. If we're able to send the query to a child, then req
* will be set to the pending_dns_request_t. Otherwise, req will
* be NULL and we'll need to create a new DNS request child.
*/
while (free_dns_children != NULL) {
req = free_dns_children->data;
free_dns_children = g_slist_remove(free_dns_children, req);
if (send_dns_request_to_child(req, &dns_params) == 0)
/* We found an acceptable child, yay */
break;
req_free(req);
req = NULL;
}
/* We need to create a new DNS request child */
if (req == NULL) {
if (number_of_dns_children >= MAX_DNS_CHILDREN) {
queued_dns_request_t *r = g_new(queued_dns_request_t, 1);
memcpy(&(r->params), &dns_params, sizeof(dns_params));
r->callback = callback;
r->data = data;
if (!queued_requests)
queued_requests = g_queue_new();
g_queue_push_tail(queued_requests, r);
gaim_debug_info("dns",
"DNS query for '%s' queued\n", dns_params.hostname);
return 0;
}
req = gaim_dns_new_resolverthread(show_debug);
if (req == NULL)
{
gaim_debug_error("proxy", "oh dear, this is going to explode, I give up\n");
return -1;
}
send_dns_request_to_child(req, &dns_params);
}
req->host = g_strdup(hostname);
req->port = port;
req->callback = callback;
req->data = data;
req->inpa = gaim_input_add(req->fd_out, GAIM_INPUT_READ, host_resolved, req);
return 0;
}
#elif defined _WIN32 /* end __unix__ */
typedef struct _dns_tdata {
char *hostname;
int port;
dns_callback_t callback;
gpointer data;
GSList *hosts;
char *errmsg;
} dns_tdata;
static gboolean dns_main_thread_cb(gpointer data) {
dns_tdata *td = (dns_tdata*)data;
if (td->errmsg != NULL) {
gaim_debug_info("dns", "%s\n", td->errmsg);
}
td->callback(td->hosts, td->data, td->errmsg);
g_free(td->hostname);
g_free(td->errmsg);
g_free(td);
return FALSE;
}
static gpointer dns_thread(gpointer data) {
#ifdef HAVE_GETADDRINFO
int rc;
struct addrinfo hints, *res, *tmp;
char servname[20];
#else
struct sockaddr_in sin;
struct hostent *hp;
#endif
dns_tdata *td = (dns_tdata*)data;
#ifdef HAVE_GETADDRINFO
g_snprintf(servname, sizeof(servname), "%d", td->port);
memset(&hints,0,sizeof(hints));
/* This is only used to convert a service
* name to a port number. As we know we are
* passing a number already, we know this
* value will not be really used by the C
* library.
*/
hints.ai_socktype = SOCK_STREAM;
if ((rc = getaddrinfo(td->hostname, servname, &hints, &res)) == 0) {
tmp = res;
while(res) {
td->hosts = g_slist_append(td->hosts,
GSIZE_TO_POINTER(res->ai_addrlen));
td->hosts = g_slist_append(td->hosts,
g_memdup(res->ai_addr, res->ai_addrlen));
res = res->ai_next;
}
freeaddrinfo(tmp);
} else {
td->errmsg = g_strdup_printf("DNS getaddrinfo(\"%s\", \"%s\") error: %d", td->hostname, servname, rc);
}
#else
if ((hp = gethostbyname(td->hostname))) {
memset(&sin, 0, sizeof(struct sockaddr_in));
memcpy(&sin.sin_addr.s_addr, hp->h_addr, hp->h_length);
sin.sin_family = hp->h_addrtype;
sin.sin_port = htons(td->port);
td->hosts = g_slist_append(td->hosts,
GSIZE_TO_POINTER(sizeof(sin)));
td->hosts = g_slist_append(td->hosts,
g_memdup(&sin, sizeof(sin)));
} else {
td->errmsg = g_strdup_printf("DNS gethostbyname(\"%s\") error: %d", td->hostname, h_errno);
}
#endif
/* back to main thread */
g_idle_add(dns_main_thread_cb, td);
return 0;
}
int
gaim_gethostbyname_async(const char *hostname, int port,
dns_callback_t callback, gpointer data)
{
dns_tdata *td;
struct sockaddr_in sin;
GError* err = NULL;
if(inet_aton(hostname, &sin.sin_addr)) {
GSList *hosts = NULL;
sin.sin_family = AF_INET;
sin.sin_port = htons(port);
hosts = g_slist_append(hosts, GINT_TO_POINTER(sizeof(sin)));
hosts = g_slist_append(hosts, g_memdup(&sin, sizeof(sin)));
callback(hosts, data, NULL);
return 0;
}
gaim_debug_info("dns", "DNS Lookup for: %s\n", hostname);
td = g_new0(dns_tdata, 1);
td->hostname = g_strdup(hostname);
td->port = port;
td->callback = callback;
td->data = data;
if(!g_thread_create(dns_thread, td, FALSE, &err)) {
gaim_debug_error("dns", "DNS thread create failure: %s\n", err?err->message:"");
g_error_free(err);
g_free(td->hostname);
g_free(td);
return -1;
}
return 0;
}
#else /* not __unix__ or _WIN32 */
typedef struct {
gpointer data;
size_t addrlen;
struct sockaddr *addr;
dns_callback_t callback;
} pending_dns_request_t;
static gboolean host_resolved(gpointer data)
{
pending_dns_request_t *req = (pending_dns_request_t*)data;
GSList *hosts = NULL;
hosts = g_slist_append(hosts, GINT_TO_POINTER(req->addrlen));
hosts = g_slist_append(hosts, req->addr);
req->callback(hosts, req->data, NULL);
g_free(req);
return FALSE;
}
int
gaim_gethostbyname_async(const char *hostname, int port,
dns_callback_t callback, gpointer data)
{
struct sockaddr_in sin;
pending_dns_request_t *req;
if (!inet_aton(hostname, &sin.sin_addr)) {
struct hostent *hp;
if(!(hp = gethostbyname(hostname))) {
gaim_debug_error("dns",
"gaim_gethostbyname(\"%s\", %d) failed: %d\n",
hostname, port, h_errno);
return -1;
}
memset(&sin, 0, sizeof(struct sockaddr_in));
memcpy(&sin.sin_addr.s_addr, hp->h_addr, hp->h_length);
sin.sin_family = hp->h_addrtype;
} else
sin.sin_family = AF_INET;
sin.sin_port = htons(port);
req = g_new(pending_dns_request_t, 1);
req->addr = (struct sockaddr*) g_memdup(&sin, sizeof(sin));
req->addrlen = sizeof(sin);
req->data = data;
req->callback = callback;
gaim_timeout_add(10, host_resolved, req);
return 0;
}
#endif /* not __unix__ or _WIN32 */
static void
no_one_calls(gpointer data, gint source, GaimInputCondition cond)
{
struct PHB *phb = data;
socklen_t len;
int error=0, ret;
gaim_debug_info("proxy", "Connected.\n");
len = sizeof(error);
/*
* getsockopt after a non-blocking connect returns -1 if something is
* really messed up (bad descriptor, usually). Otherwise, it returns 0 and
* error holds what connect would have returned if it blocked until now.
* Thus, error == 0 is success, error == EINPROGRESS means "try again",
* and anything else is a real error.
*
* (error == EINPROGRESS can happen after a select because the kernel can
* be overly optimistic sometimes. select is just a hint that you might be
* able to do something.)
*/
ret = getsockopt(source, SOL_SOCKET, SO_ERROR, &error, &len);
if (ret == 0 && error == EINPROGRESS)
return; /* we'll be called again later */
if (ret < 0 || error != 0) {
if(ret!=0) error = errno;
close(source);
gaim_input_remove(phb->inpa);
gaim_debug_error("proxy",
"getsockopt SO_ERROR check: %s\n", strerror(error));
try_connect(phb);
return;
}
gaim_input_remove(phb->inpa);
if (phb->account == NULL ||
gaim_account_get_connection(phb->account) != NULL) {
phb->func(phb->data, source, GAIM_INPUT_READ);
}
g_free(phb->host);
g_free(phb);
}
static gboolean clean_connect(gpointer data)
{
struct PHB *phb = data;
if (phb->account == NULL ||
gaim_account_get_connection(phb->account) != NULL) {
phb->func(phb->data, phb->port, GAIM_INPUT_READ);
}
g_free(phb->host);
g_free(phb);
return FALSE;
}
static int
proxy_connect_none(struct PHB *phb, struct sockaddr *addr, socklen_t addrlen)
{
int fd = -1;
gaim_debug_info("proxy",
"Connecting to %s:%d with no proxy\n", phb->host, phb->port);
if ((fd = socket(addr->sa_family, SOCK_STREAM, 0)) < 0) {
gaim_debug_error("proxy",
"Unable to create socket: %s\n", strerror(errno));
return -1;
}
fcntl(fd, F_SETFL, O_NONBLOCK);
#ifndef _WIN32
fcntl(fd, F_SETFD, FD_CLOEXEC);
#endif
if (connect(fd, (struct sockaddr *)addr, addrlen) < 0) {
if ((errno == EINPROGRESS) || (errno == EINTR)) {
gaim_debug_warning("proxy",
"Connect would have blocked.\n");
phb->inpa = gaim_input_add(fd, GAIM_INPUT_WRITE, no_one_calls, phb);
}
else {
gaim_debug_error("proxy",
"Connect failed: %s\n", strerror(errno));
close(fd);
return -1;
}
}
else {
socklen_t len;
int error = ETIMEDOUT;
gaim_debug_misc("proxy", "Connect didn't block.\n");
len = sizeof(error);
if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
gaim_debug_error("proxy", "getsockopt failed.\n");
close(fd);
return -1;
}
phb->port = fd; /* bleh */
gaim_timeout_add(50, clean_connect, phb); /* we do this because we never
want to call our callback
before we return. */
}
return fd;
}
static void
proxy_do_write(gpointer data, gint source, GaimInputCondition cond)
{
struct PHB *phb = data;
const guchar *request = phb->write_buffer + phb->written_len;
gsize request_len = phb->write_buf_len - phb->written_len;
int ret = write(source, request, request_len);
if(ret < 0 && errno == EAGAIN)
return;
else if(ret < 0) {
gaim_input_remove(phb->inpa);
close(source);
g_free(phb->write_buffer);
phb->write_buffer = NULL;
try_connect(phb);
return;
} else if (ret < request_len) {
phb->written_len += ret;
return;
}
gaim_input_remove(phb->inpa);
g_free(phb->write_buffer);
phb->write_buffer = NULL;
/* register the response handler for the response */
phb->inpa = gaim_input_add(source, GAIM_INPUT_READ, phb->read_cb, phb);
}
#define HTTP_GOODSTRING "HTTP/1.0 200"
#define HTTP_GOODSTRING2 "HTTP/1.1 200"
static void
http_complete(struct PHB *phb, gint source)
{
gaim_debug_info("http proxy", "proxy connection established\n");
if(!phb->account || phb->account->gc) {
phb->func(phb->data, source, GAIM_INPUT_READ);
}
g_free(phb->host);
g_free(phb);
}
/* read the response to the CONNECT request, if we are requesting a non-port-80 tunnel */
static void
http_canread(gpointer data, gint source, GaimInputCondition cond)
{
int len, headers_len, status = 0;
gboolean error;
struct PHB *phb = data;
guchar *p;
gsize max_read;
if(phb->read_buffer == NULL) {
phb->read_buf_len = 8192;
phb->read_buffer = g_malloc(phb->read_buf_len);
phb->read_len = 0;
}
p = phb->read_buffer + phb->read_len;
max_read = phb->read_buf_len - phb->read_len - 1;
len = read(source, p, max_read);
if(len < 0 && errno == EAGAIN)
return;
else if(len < 0) {
close(source);
source = -1;
g_free(phb->read_buffer);
phb->read_buffer = NULL;
gaim_input_remove(phb->inpa);
phb->inpa = 0;
http_complete(phb, source);
return;
} else {
phb->read_len += len;
}
p[len] = '\0';
if((p = (guchar *)g_strstr_len((const gchar *)phb->read_buffer, phb->read_len, "\r\n\r\n"))) {
*p = '\0';
headers_len = (p - phb->read_buffer) + 4;
} else if(len == max_read)
headers_len = len;
else
return;
error = strncmp((const char *)phb->read_buffer, "HTTP/", 5) != 0;
if(!error) {
int major;
p = phb->read_buffer + 5;
major = strtol((const char *)p, (char **)&p, 10);
error = (major == 0) || (*p != '.');
if(!error) {
int minor;
p++;
minor = strtol((const char *)p, (char **)&p, 10);
error = (*p != ' ');
if(!error) {
p++;
status = strtol((const char *)p, (char **)&p, 10);
error = (*p != ' ');
}
}
}
/* Read the contents */
p = (guchar *)g_strrstr((const gchar *)phb->read_buffer, "Content-Length: ");
if(p != NULL) {
gchar *tmp;
int len = 0;
char tmpc;
p += strlen("Content-Length: ");
tmp = strchr((const char *)p, '\r');
if(tmp)
*tmp = '\0';
len = atoi((const char *)p);
if(tmp)
*tmp = '\r';
/* Compensate for what has already been read */
len -= phb->read_len - headers_len;
/* I'm assuming that we're doing this to prevent the server from
complaining / breaking since we don't read the whole page */
while(len--) {
/* TODO: deal with EAGAIN (and other errors) better */
if (read(source, &tmpc, 1) < 0 && errno != EAGAIN)
break;
}
}
if(error) {
gaim_debug_error("proxy",
"Unable to parse proxy's response: %s\n",
phb->read_buffer);
close(source);
source = -1;
g_free(phb->read_buffer);
phb->read_buffer = NULL;
gaim_input_remove(phb->inpa);
phb->inpa = 0;
http_complete(phb, source);
return;
} else if(status != 200) {
gaim_debug_error("proxy",
"Proxy server replied with:\n%s\n",
phb->read_buffer);
/* XXX: why in the hell are we calling gaim_connection_error() here? */
if(status == 407 /* Proxy Auth */) {
gchar *ntlm;
if((ntlm = g_strrstr((const gchar *)phb->read_buffer, "Proxy-Authenticate: NTLM "))) { /* Check for Type-2 */
gchar *nonce = ntlm;
gchar *domain = (gchar*)gaim_proxy_info_get_username(phb->gpi);
gchar *username;
gchar *request;
gchar *response;
if(!(username = strchr(domain, '\\'))) {
char *msg = g_strdup_printf(_("Proxy connection error %d"), status);
close(source);
source = -1;
if(phb->account)
gaim_connection_error(phb->account->gc, msg);
else
gaim_debug_error("http proxy", "%s\n", msg);
g_free(msg);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
g_free(phb->host);
g_free(phb);
return;
}
*username = '\0';
username++;
ntlm += strlen("Proxy-Authenticate: NTLM ");
while(*nonce != '\r' && *nonce != '\0') nonce ++;
*nonce = '\0';
nonce = gaim_ntlm_parse_type2(ntlm, NULL);
response = gaim_ntlm_gen_type3(username,
(gchar*) gaim_proxy_info_get_password(phb->gpi),
(gchar*) gaim_proxy_info_get_host(phb->gpi),
domain, nonce, NULL);
username--;
*username = '\\';
request = g_strdup_printf(
"CONNECT %s:%d HTTP/1.1\r\n"
"Host: %s:%d\r\n"
"Proxy-Authorization: NTLM %s\r\n"
"Proxy-Connection: Keep-Alive\r\n\r\n",
phb->host, phb->port, phb->host,
phb->port, response);
g_free(response);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
phb->write_buffer = (guchar *)request;
phb->write_buf_len = strlen(request);
phb->written_len = 0;
phb->read_cb = http_canread;
phb->inpa = gaim_input_add(source,
GAIM_INPUT_WRITE, proxy_do_write, phb);
proxy_do_write(phb, source, cond);
return;
} else if((ntlm = g_strrstr((const char *)phb->read_buffer, "Proxy-Authenticate: NTLM"))) { /* Empty message */
gchar request[2048];
gchar *domain = (gchar*) gaim_proxy_info_get_username(phb->gpi);
gchar *username;
int request_len;
if(!(username = strchr(domain, '\\'))) {
char *msg = g_strdup_printf(_("Proxy connection error %d"), status);
close(source);
source = -1;
if(phb->account)
gaim_connection_error(phb->account->gc, msg);
else
gaim_debug_error("http proxy", "%s\n", msg);
g_free(msg);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
g_free(phb->host);
g_free(phb);
return;
}
*username = '\0';
request_len = g_snprintf(request, sizeof(request),
"CONNECT %s:%d HTTP/1.1\r\n"
"Host: %s:%d\r\n",
phb->host, phb->port,
phb->host, phb->port);
g_return_if_fail(request_len < sizeof(request));
request_len += g_snprintf(request + request_len,
sizeof(request) - request_len,
"Proxy-Authorization: NTLM %s\r\n"
"Proxy-Connection: Keep-Alive\r\n\r\n",
gaim_ntlm_gen_type1(
(gchar*) gaim_proxy_info_get_host(phb->gpi),
domain));
*username = '\\';
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
phb->write_buffer = g_memdup(request, request_len);
phb->write_buf_len = request_len;
phb->written_len = 0;
phb->read_cb = http_canread;
phb->inpa = gaim_input_add(source,
GAIM_INPUT_WRITE, proxy_do_write, phb);
proxy_do_write(phb, source, cond);
return;
} else {
char *msg = g_strdup_printf(_("Proxy connection error %d"), status);
close(source);
source = -1;
if(phb->account)
gaim_connection_error(phb->account->gc, msg);
else
gaim_debug_error("http proxy", "%s\n", msg);
g_free(msg);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
g_free(phb->host);
g_free(phb);
return;
}
}
if(status == 403 /* Forbidden */ ) {
gchar *msg = g_strdup_printf(_("Access denied: proxy server forbids port %d tunnelling."), phb->port);
if(phb->account)
gaim_connection_error(phb->account->gc, msg);
else
gaim_debug_error("http proxy", "%s\n", msg);
g_free(msg);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
g_free(phb->host);
g_free(phb);
} else {
char *msg = g_strdup_printf(_("Proxy connection error %d"), status);
if(phb->account)
gaim_connection_error(phb->account->gc, msg);
else
gaim_debug_error("http proxy", "%s\n", msg);
g_free(msg);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
g_free(phb->host);
g_free(phb);
}
} else {
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
http_complete(phb, source);
return;
}
}
static void
http_canwrite(gpointer data, gint source, GaimInputCondition cond)
{
char request[8192];
int request_len = 0;
struct PHB *phb = data;
socklen_t len;
int error = ETIMEDOUT;
gaim_debug_info("http proxy", "Connected.\n");
if (phb->inpa > 0)
gaim_input_remove(phb->inpa);
len = sizeof(error);
if (getsockopt(source, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
close(source);
try_connect(phb);
return;
}
gaim_debug_info("proxy", "using CONNECT tunnelling for %s:%d\n",
phb->host, phb->port);
request_len = g_snprintf(request, sizeof(request),
"CONNECT %s:%d HTTP/1.1\r\nHost: %s:%d\r\n",
phb->host, phb->port, phb->host, phb->port);
if (gaim_proxy_info_get_username(phb->gpi) != NULL) {
char *t1, *t2;
t1 = g_strdup_printf("%s:%s",
gaim_proxy_info_get_username(phb->gpi),
gaim_proxy_info_get_password(phb->gpi) ?
gaim_proxy_info_get_password(phb->gpi) : "");
t2 = gaim_base64_encode((const guchar *)t1, strlen(t1));
g_free(t1);
g_return_if_fail(request_len < sizeof(request));
request_len += g_snprintf(request + request_len,
sizeof(request) - request_len,
"Proxy-Authorization: Basic %s\r\n"
"Proxy-Authorization: NTLM %s\r\n"
"Proxy-Connection: Keep-Alive\r\n", t2,
gaim_ntlm_gen_type1(
(gchar*)gaim_proxy_info_get_host(phb->gpi),""));
g_free(t2);
}
g_return_if_fail(request_len < sizeof(request));
strcpy(request + request_len, "\r\n");
request_len += 2;
phb->write_buffer = g_memdup(request, request_len);
phb->write_buf_len = request_len;
phb->written_len = 0;
phb->read_cb = http_canread;
phb->inpa = gaim_input_add(source, GAIM_INPUT_WRITE, proxy_do_write,
phb);
proxy_do_write(phb, source, cond);
}
static int
proxy_connect_http(struct PHB *phb, struct sockaddr *addr, socklen_t addrlen)
{
int fd = -1;
gaim_debug_info("http proxy",
"Connecting to %s:%d via %s:%d using HTTP\n",
(phb->host ? phb->host : "(null)"), phb->port,
(gaim_proxy_info_get_host(phb->gpi) ? gaim_proxy_info_get_host(phb->gpi) : "(null)"),
gaim_proxy_info_get_port(phb->gpi));
if ((fd = socket(addr->sa_family, SOCK_STREAM, 0)) < 0) {
return -1;
}
fcntl(fd, F_SETFL, O_NONBLOCK);
#ifndef _WIN32
fcntl(fd, F_SETFD, FD_CLOEXEC);
#endif
if (connect(fd, addr, addrlen) < 0) {
if ((errno == EINPROGRESS) || (errno == EINTR)) {
gaim_debug_warning("http proxy",
"Connect would have blocked.\n");
if (phb->port != 80) {
/* we need to do CONNECT first */
phb->inpa = gaim_input_add(fd, GAIM_INPUT_WRITE,
http_canwrite, phb);
} else {
http_complete(phb, fd);
}
} else {
close(fd);
return -1;
}
}
else {
socklen_t len;
int error = ETIMEDOUT;
gaim_debug_misc("http proxy",
"Connect didn't block.\n");
len = sizeof(error);
if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
close(fd);
return -1;
}
http_canwrite(phb, fd, GAIM_INPUT_WRITE);
}
return fd;
}
static void
s4_canread(gpointer data, gint source, GaimInputCondition cond)
{
struct PHB *phb = data;
guchar *buf;
int len, max_read;
/* This is really not going to block under normal circumstances, but to
* be correct, we deal with the unlikely scenario */
if (phb->read_buffer == NULL) {
phb->read_buf_len = 12;
phb->read_buffer = g_malloc(phb->read_buf_len);
phb->read_len = 0;
}
buf = phb->read_buffer + phb->read_len;
max_read = phb->read_buf_len - phb->read_len;
len = read(source, buf, max_read);
if ((len < 0 && errno == EAGAIN) || len + phb->read_len < 4)
return;
else if (len + phb->read_len >= 4) {
if (phb->read_buffer[1] == 90) {
if (phb->account == NULL ||
gaim_account_get_connection(phb->account) != NULL) {
phb->func(phb->data, source, GAIM_INPUT_READ);
}
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
g_free(phb->host);
g_free(phb);
return;
}
}
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
close(source);
try_connect(phb);
}
static void
s4_canwrite(gpointer data, gint source, GaimInputCondition cond)
{
unsigned char packet[9];
struct hostent *hp;
struct PHB *phb = data;
socklen_t len;
int error = ETIMEDOUT;
gaim_debug_info("socks4 proxy", "Connected.\n");
if (phb->inpa > 0)
gaim_input_remove(phb->inpa);
len = sizeof(error);
if (getsockopt(source, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
close(source);
try_connect(phb);
return;
}
/*
* The socks4 spec doesn't include support for doing host name
* lookups by the proxy. Some socks4 servers do this via
* extensions to the protocol. Since we don't know if a
* server supports this, it would need to be implemented
* with an option, or some detection mechanism - in the
* meantime, stick with plain old SOCKS4.
*/
if (!(hp = gethostbyname(phb->host))) {
close(source);
try_connect(phb);
return;
}
packet[0] = 4;
packet[1] = 1;
packet[2] = phb->port >> 8;
packet[3] = phb->port & 0xff;
packet[4] = (unsigned char)(hp->h_addr_list[0])[0];
packet[5] = (unsigned char)(hp->h_addr_list[0])[1];
packet[6] = (unsigned char)(hp->h_addr_list[0])[2];
packet[7] = (unsigned char)(hp->h_addr_list[0])[3];
packet[8] = 0;
phb->write_buffer = g_memdup(packet, sizeof(packet));
phb->write_buf_len = sizeof(packet);
phb->written_len = 0;
phb->read_cb = s4_canread;
phb->inpa = gaim_input_add(source, GAIM_INPUT_WRITE, proxy_do_write, phb);
proxy_do_write(phb, source, cond);
}
static int
proxy_connect_socks4(struct PHB *phb, struct sockaddr *addr, socklen_t addrlen)
{
int fd = -1;
gaim_debug_info("socks4 proxy",
"Connecting to %s:%d via %s:%d using SOCKS4\n",
phb->host, phb->port,
gaim_proxy_info_get_host(phb->gpi),
gaim_proxy_info_get_port(phb->gpi));
if ((fd = socket(addr->sa_family, SOCK_STREAM, 0)) < 0)
return -1;
fcntl(fd, F_SETFL, O_NONBLOCK);
#ifndef _WIN32
fcntl(fd, F_SETFD, FD_CLOEXEC);
#endif
if (connect(fd, addr, addrlen) < 0) {
if ((errno == EINPROGRESS) || (errno == EINTR)) {
gaim_debug_warning("socks4 proxy",
"Connect would have blocked.\n");
phb->inpa = gaim_input_add(fd, GAIM_INPUT_WRITE, s4_canwrite, phb);
}
else {
close(fd);
return -1;
}
} else {
socklen_t len;
int error = ETIMEDOUT;
gaim_debug_misc("socks4 proxy",
"Connect didn't block.\n");
len = sizeof(error);
if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
close(fd);
return -1;
}
s4_canwrite(phb, fd, GAIM_INPUT_WRITE);
}
return fd;
}
static void
s5_canread_again(gpointer data, gint source, GaimInputCondition cond)
{
guchar *dest, *buf;
struct PHB *phb = data;
int len;
if (phb->read_buffer == NULL) {
phb->read_buf_len = 512;
phb->read_buffer = g_malloc(phb->read_buf_len);
phb->read_len = 0;
}
dest = phb->read_buffer + phb->read_len;
buf = phb->read_buffer;
gaim_debug_info("socks5 proxy", "Able to read again.\n");
len = read(source, dest, (phb->read_buf_len - phb->read_len));
if(len < 0 && errno == EAGAIN)
return;
else if(len < 0) {
gaim_debug_warning("socks5 proxy", "or not...\n");
close(source);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
phb->read_len += len;
if(phb->read_len < 4)
return;
if ((buf[0] != 0x05) || (buf[1] != 0x00)) {
if ((buf[0] == 0x05) && (buf[1] < 0x09))
gaim_debug_error("socks5 proxy", socks5errors[buf[1]]);
else
gaim_debug_error("socks5 proxy", "Bad data.\n");
close(source);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
/* Skip past BND.ADDR */
switch(buf[3]) {
case 0x01: /* the address is a version-4 IP address, with a length of 4 octets */
if(phb->read_len < 4 + 4)
return;
buf += 4 + 4;
break;
case 0x03: /* the address field contains a fully-qualified domain name. The first
octet of the address field contains the number of octets of name that
follow, there is no terminating NUL octet. */
if(phb->read_len < 4 + 1)
return;
buf += 4 + 1;
if(phb->read_len < 4 + 1 + buf[0])
return;
buf += buf[0];
break;
case 0x04: /* the address is a version-6 IP address, with a length of 16 octets */
if(phb->read_len < 4 + 16)
return;
buf += 4 + 16;
break;
}
if(phb->read_len < (buf - phb->read_buffer) + 2)
return;
/* Skip past BND.PORT */
buf += 2;
if (phb->account == NULL ||
gaim_account_get_connection(phb->account) != NULL) {
phb->func(phb->data, source, GAIM_INPUT_READ);
}
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
g_free(phb->host);
g_free(phb);
}
static void
s5_sendconnect(gpointer data, gint source)
{
struct PHB *phb = data;
int hlen = strlen(phb->host);
phb->write_buf_len = 5 + hlen + 1;
phb->write_buffer = g_malloc(phb->write_buf_len);
phb->written_len = 0;
phb->write_buffer[0] = 0x05;
phb->write_buffer[1] = 0x01; /* CONNECT */
phb->write_buffer[2] = 0x00; /* reserved */
phb->write_buffer[3] = 0x03; /* address type -- host name */
phb->write_buffer[4] = hlen;
memcpy(phb->write_buffer + 5, phb->host, hlen);
phb->write_buffer[5 + hlen] = phb->port >> 8;
phb->write_buffer[5 + hlen + 1] = phb->port & 0xff;
phb->read_cb = s5_canread_again;
phb->inpa = gaim_input_add(source, GAIM_INPUT_WRITE, proxy_do_write, phb);
proxy_do_write(phb, source, GAIM_INPUT_WRITE);
}
static void
s5_readauth(gpointer data, gint source, GaimInputCondition cond)
{
struct PHB *phb = data;
int len;
if (phb->read_buffer == NULL) {
phb->read_buf_len = 2;
phb->read_buffer = g_malloc(phb->read_buf_len);
phb->read_len = 0;
}
gaim_debug_info("socks5 proxy", "Got auth response.\n");
len = read(source, phb->read_buffer + phb->read_len,
phb->read_buf_len - phb->read_len);
if(len < 0 && errno == EAGAIN)
return;
else if(len < 0) {
close(source);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
phb->read_len += len;
if (phb->read_len < 2)
return;
gaim_input_remove(phb->inpa);
if ((phb->read_buffer[0] != 0x01) || (phb->read_buffer[1] != 0x00)) {
close(source);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
g_free(phb->read_buffer);
phb->read_buffer = NULL;
s5_sendconnect(phb, source);
}
static void hmacmd5_chap(const unsigned char * challenge, int challen, const char * passwd, unsigned char * response)
{
GaimCipher *cipher;
GaimCipherContext *ctx;
int i;
unsigned char Kxoripad[65];
unsigned char Kxoropad[65];
int pwlen;
cipher = gaim_ciphers_find_cipher("md5");
ctx = gaim_cipher_context_new(cipher, NULL);
memset(Kxoripad,0,sizeof(Kxoripad));
memset(Kxoropad,0,sizeof(Kxoropad));
pwlen=strlen(passwd);
if (pwlen>64) {
gaim_cipher_context_append(ctx, (const guchar *)passwd, strlen(passwd));
gaim_cipher_context_digest(ctx, sizeof(Kxoripad), Kxoripad, NULL);
pwlen=16;
} else {
memcpy(Kxoripad, passwd, pwlen);
}
memcpy(Kxoropad,Kxoripad,pwlen);
for (i=0;i<64;i++) {
Kxoripad[i]^=0x36;
Kxoropad[i]^=0x5c;
}
gaim_cipher_context_reset(ctx, NULL);
gaim_cipher_context_append(ctx, Kxoripad, 64);
gaim_cipher_context_append(ctx, challenge, challen);
gaim_cipher_context_digest(ctx, sizeof(Kxoripad), Kxoripad, NULL);
gaim_cipher_context_reset(ctx, NULL);
gaim_cipher_context_append(ctx, Kxoropad, 64);
gaim_cipher_context_append(ctx, Kxoripad, 16);
gaim_cipher_context_digest(ctx, 16, response, NULL);
gaim_cipher_context_destroy(ctx);
}
static void
s5_readchap(gpointer data, gint source, GaimInputCondition cond)
{
guchar *cmdbuf, *buf;
struct PHB *phb = data;
int len, navas, currentav;
gaim_debug(GAIM_DEBUG_INFO, "socks5 proxy", "Got CHAP response.\n");
if (phb->read_buffer == NULL) {
phb->read_buf_len = 20;
phb->read_buffer = g_malloc(phb->read_buf_len);
phb->read_len = 0;
}
len = read(source, phb->read_buffer + phb->read_len,
phb->read_buf_len - phb->read_len);
if(len < 0 && errno == EAGAIN)
return;
else if(len < 0) {
close(source);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
phb->read_len += len;
if (phb->read_len < 2)
return;
cmdbuf = phb->read_buffer;
if (*cmdbuf != 0x01) {
close(source);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
cmdbuf++;
navas = *cmdbuf;
cmdbuf++;
for (currentav = 0; currentav < navas; currentav++) {
if (phb->read_len - (cmdbuf - phb->read_buffer) < 2)
return;
if (phb->read_len - (cmdbuf - phb->read_buffer) < cmdbuf[1])
return;
buf = cmdbuf + 2;
switch (cmdbuf[0]) {
case 0x00:
/* Did auth work? */
if (buf[0] == 0x00) {
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
/* Success */
s5_sendconnect(phb, source);
return;
} else {
/* Failure */
gaim_debug_warning("proxy",
"socks5 CHAP authentication "
"failed. Disconnecting...");
close(source);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
break;
case 0x03:
/* Server wants our credentials */
phb->write_buf_len = 16 + 4;
phb->write_buffer = g_malloc(phb->write_buf_len);
phb->written_len = 0;
hmacmd5_chap(buf, cmdbuf[1],
gaim_proxy_info_get_password(phb->gpi),
phb->write_buffer + 4);
phb->write_buffer[0] = 0x01;
phb->write_buffer[1] = 0x01;
phb->write_buffer[2] = 0x04;
phb->write_buffer[3] = 0x10;
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
phb->read_cb = s5_readchap;
phb->inpa = gaim_input_add(source,
GAIM_INPUT_WRITE, proxy_do_write, phb);
proxy_do_write(phb, source, GAIM_INPUT_WRITE);
break;
case 0x11:
/* Server wants to select an algorithm */
if (buf[0] != 0x85) {
/* Only currently support HMAC-MD5 */
gaim_debug_warning("proxy",
"Server tried to select an "
"algorithm that we did not advertise "
"as supporting. This is a violation "
"of the socks5 CHAP specification. "
"Disconnecting...");
close(source);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
break;
}
cmdbuf = buf + cmdbuf[1];
}
/* Fell through. We ran out of CHAP events to process, but haven't
* succeeded or failed authentication - there may be more to come.
* If this is the case, come straight back here. */
}
static void
s5_canread(gpointer data, gint source, GaimInputCondition cond)
{
struct PHB *phb = data;
int len;
if (phb->read_buffer == NULL) {
phb->read_buf_len = 2;
phb->read_buffer = g_malloc(phb->read_buf_len);
phb->read_len = 0;
}
gaim_debug_info("socks5 proxy", "Able to read.\n");
len = read(source, phb->read_buffer + phb->read_len,
phb->read_buf_len - phb->read_len);
if(len < 0 && errno == EAGAIN)
return;
else if(len < 0) {
close(source);
gaim_input_remove(phb->inpa);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
phb->read_len += len;
if (phb->read_len < 2)
return;
gaim_input_remove(phb->inpa);
if ((phb->read_buffer[0] != 0x05) || (phb->read_buffer[1] == 0xff)) {
close(source);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
try_connect(phb);
return;
}
if (phb->read_buffer[1] == 0x02) {
gsize i, j;
const char *u, *p;
u = gaim_proxy_info_get_username(phb->gpi);
p = gaim_proxy_info_get_password(phb->gpi);
i = (u == NULL) ? 0 : strlen(u);
j = (p == NULL) ? 0 : strlen(p);
phb->write_buf_len = 1 + 1 + i + 1 + j;
phb->write_buffer = g_malloc(phb->write_buf_len);
phb->written_len = 0;
phb->write_buffer[0] = 0x01; /* version 1 */
phb->write_buffer[1] = i;
if (u != NULL)
memcpy(phb->write_buffer + 2, u, i);
phb->write_buffer[2 + i] = j;
if (p != NULL)
memcpy(phb->write_buffer + 2 + i + 1, p, j);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
phb->read_cb = s5_readauth;
phb->inpa = gaim_input_add(source, GAIM_INPUT_WRITE,
proxy_do_write, phb);
proxy_do_write(phb, source, GAIM_INPUT_WRITE);
return;
} else if (phb->read_buffer[1] == 0x03) {
gsize userlen;
userlen = strlen(gaim_proxy_info_get_username(phb->gpi));
phb->write_buf_len = 7 + userlen;
phb->write_buffer = g_malloc(phb->write_buf_len);
phb->written_len = 0;
phb->write_buffer[0] = 0x01;
phb->write_buffer[1] = 0x02;
phb->write_buffer[2] = 0x11;
phb->write_buffer[3] = 0x01;
phb->write_buffer[4] = 0x85;
phb->write_buffer[5] = 0x02;
phb->write_buffer[6] = userlen;
memcpy(phb->write_buffer + 7,
gaim_proxy_info_get_username(phb->gpi), userlen);
g_free(phb->read_buffer);
phb->read_buffer = NULL;
phb->read_cb = s5_readchap;
phb->inpa = gaim_input_add(source, GAIM_INPUT_WRITE,
proxy_do_write, phb);
proxy_do_write(phb, source, GAIM_INPUT_WRITE);
return;
} else {
g_free(phb->read_buffer);
phb->read_buffer = NULL;
s5_sendconnect(phb, source);
}
}
static void
s5_canwrite(gpointer data, gint source, GaimInputCondition cond)
{
unsigned char buf[5];
int i;
struct PHB *phb = data;
socklen_t len;
int error = ETIMEDOUT;
gaim_debug_info("socks5 proxy", "Connected.\n");
if (phb->inpa > 0)
gaim_input_remove(phb->inpa);
len = sizeof(error);
if (getsockopt(source, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
close(source);
try_connect(phb);
return;
}
i = 0;
buf[0] = 0x05; /* SOCKS version 5 */
if (gaim_proxy_info_get_username(phb->gpi) != NULL) {
buf[1] = 0x03; /* three methods */
buf[2] = 0x00; /* no authentication */
buf[3] = 0x03; /* CHAP authentication */
buf[4] = 0x02; /* username/password authentication */
i = 5;
}
else {
buf[1] = 0x01;
buf[2] = 0x00;
i = 3;
}
phb->write_buf_len = i;
phb->write_buffer = g_malloc(phb->write_buf_len);
memcpy(phb->write_buffer, buf, i);
phb->read_cb = s5_canread;
phb->inpa = gaim_input_add(source, GAIM_INPUT_WRITE, proxy_do_write, phb);
proxy_do_write(phb, source, GAIM_INPUT_WRITE);
}
static int
proxy_connect_socks5(struct PHB *phb, struct sockaddr *addr, socklen_t addrlen)
{
int fd = -1;
gaim_debug_info("socks5 proxy",
"Connecting to %s:%d via %s:%d using SOCKS5\n",
phb->host, phb->port,
gaim_proxy_info_get_host(phb->gpi),
gaim_proxy_info_get_port(phb->gpi));
if ((fd = socket(addr->sa_family, SOCK_STREAM, 0)) < 0)
return -1;
fcntl(fd, F_SETFL, O_NONBLOCK);
#ifndef _WIN32
fcntl(fd, F_SETFD, FD_CLOEXEC);
#endif
if (connect(fd, addr, addrlen) < 0) {
if ((errno == EINPROGRESS) || (errno == EINTR)) {
gaim_debug_warning("socks5 proxy",
"Connect would have blocked.\n");
phb->inpa = gaim_input_add(fd, GAIM_INPUT_WRITE, s5_canwrite, phb);
}
else {
close(fd);
return -1;
}
}
else {
socklen_t len;
int error = ETIMEDOUT;
gaim_debug_misc("socks5 proxy",
"Connect didn't block.\n");
len = sizeof(error);
if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
close(fd);
return -1;
}
s5_canwrite(phb, fd, GAIM_INPUT_WRITE);
}
return fd;
}
static void try_connect(struct PHB *phb)
{
size_t addrlen;
struct sockaddr *addr;
int ret = -1;
while (phb->hosts) {
addrlen = GPOINTER_TO_INT(phb->hosts->data);
phb->hosts = g_slist_remove(phb->hosts, phb->hosts->data);
addr = phb->hosts->data;
phb->hosts = g_slist_remove(phb->hosts, phb->hosts->data);
switch (gaim_proxy_info_get_type(phb->gpi)) {
case GAIM_PROXY_NONE:
ret = proxy_connect_none(phb, addr, addrlen);
break;
case GAIM_PROXY_HTTP:
ret = proxy_connect_http(phb, addr, addrlen);
break;
case GAIM_PROXY_SOCKS4:
ret = proxy_connect_socks4(phb, addr, addrlen);
break;
case GAIM_PROXY_SOCKS5:
ret = proxy_connect_socks5(phb, addr, addrlen);
break;
case GAIM_PROXY_USE_ENVVAR:
ret = proxy_connect_http(phb, addr, addrlen);
break;
default:
break;
}
g_free(addr);
if (ret > 0)
break;
}
if (ret < 0) {
if (phb->account == NULL ||
gaim_account_get_connection(phb->account) != NULL) {
phb->func(phb->data, -1, GAIM_INPUT_READ);
}
g_free(phb->host);
g_free(phb);
}
}
static void
connection_host_resolved(GSList *hosts, gpointer data,
const char *error_message)
{
struct PHB *phb = (struct PHB*)data;
phb->hosts = hosts;
try_connect(phb);
}
GaimProxyInfo *
gaim_proxy_get_setup(GaimAccount *account)
{
GaimProxyInfo *gpi;
const gchar *tmp;
if (account && gaim_account_get_proxy_info(account) != NULL)
gpi = gaim_account_get_proxy_info(account);
else if (gaim_running_gnome())
gpi = gaim_gnome_proxy_get_info();
else
gpi = gaim_global_proxy_get_info();
if (gaim_proxy_info_get_type(gpi) == GAIM_PROXY_USE_ENVVAR) {
if ((tmp = g_getenv("HTTP_PROXY")) != NULL ||
(tmp = g_getenv("http_proxy")) != NULL ||
(tmp = g_getenv("HTTPPROXY")) != NULL) {
char *proxyhost,*proxypath,*proxyuser,*proxypasswd;
int proxyport;
/* http_proxy-format:
* export http_proxy="http://user:passwd@your.proxy.server:port/"
*/
if(gaim_url_parse(tmp, &proxyhost, &proxyport, &proxypath, &proxyuser, &proxypasswd)) {
gaim_proxy_info_set_host(gpi, proxyhost);
g_free(proxyhost);
g_free(proxypath);
if (proxyuser != NULL) {
gaim_proxy_info_set_username(gpi, proxyuser);
g_free(proxyuser);
}
if (proxypasswd != NULL) {
gaim_proxy_info_set_password(gpi, proxypasswd);
g_free(proxypasswd);
}
/* only for backward compatibility */
if (proxyport == 80 &&
((tmp = g_getenv("HTTP_PROXY_PORT")) != NULL ||
(tmp = g_getenv("http_proxy_port")) != NULL ||
(tmp = g_getenv("HTTPPROXYPORT")) != NULL))
proxyport = atoi(tmp);
gaim_proxy_info_set_port(gpi, proxyport);
}
} else {
/* no proxy environment variable found, don't use a proxy */
gaim_debug_info("proxy", "No environment settings found, not using a proxy\n");
gaim_proxy_info_set_type(gpi, GAIM_PROXY_NONE);
}
/* XXX: Do we want to skip this step if user/password were part of url? */
if ((tmp = g_getenv("HTTP_PROXY_USER")) != NULL ||
(tmp = g_getenv("http_proxy_user")) != NULL ||
(tmp = g_getenv("HTTPPROXYUSER")) != NULL)
gaim_proxy_info_set_username(gpi, tmp);
if ((tmp = g_getenv("HTTP_PROXY_PASS")) != NULL ||
(tmp = g_getenv("http_proxy_pass")) != NULL ||
(tmp = g_getenv("HTTPPROXYPASS")) != NULL)
gaim_proxy_info_set_password(gpi, tmp);
}
return gpi;
}
int
gaim_proxy_connect(GaimAccount *account, const char *host, int port,
GaimInputFunction func, gpointer data)
{
const char *connecthost = host;
int connectport = port;
struct PHB *phb;
g_return_val_if_fail(host != NULL, -1);
g_return_val_if_fail(port != 0 && port != -1, -1);
g_return_val_if_fail(func != NULL, -1);
phb = g_new0(struct PHB, 1);
phb->func = func;
phb->data = data;
phb->host = g_strdup(host);
phb->port = port;
phb->account = account;
phb->gpi = gaim_proxy_get_setup(account);
if ((gaim_proxy_info_get_type(phb->gpi) != GAIM_PROXY_NONE) &&
(gaim_proxy_info_get_host(phb->gpi) == NULL ||
gaim_proxy_info_get_port(phb->gpi) <= 0)) {
gaim_notify_error(NULL, NULL, _("Invalid proxy settings"), _("Either the host name or port number specified for your given proxy type is invalid."));
g_free(phb->host);
g_free(phb);
return -1;
}
switch (gaim_proxy_info_get_type(phb->gpi))
{
case GAIM_PROXY_NONE:
break;
case GAIM_PROXY_HTTP:
case GAIM_PROXY_SOCKS4:
case GAIM_PROXY_SOCKS5:
case GAIM_PROXY_USE_ENVVAR:
connecthost = gaim_proxy_info_get_host(phb->gpi);
connectport = gaim_proxy_info_get_port(phb->gpi);
break;
default:
g_free(phb->host);
g_free(phb);
return -1;
}
return gaim_gethostbyname_async(connecthost, connectport,
connection_host_resolved, phb);
}
int
gaim_proxy_connect_socks5(GaimProxyInfo *gpi, const char *host, int port,
GaimInputFunction func, gpointer data)
{
struct PHB *phb;
phb = g_new0(struct PHB, 1);
phb->gpi = gpi;
phb->func = func;
phb->data = data;
phb->host = g_strdup(host);
phb->port = port;
return gaim_gethostbyname_async(gaim_proxy_info_get_host(gpi),
gaim_proxy_info_get_port(gpi), connection_host_resolved, phb);
}
static void
proxy_pref_cb(const char *name, GaimPrefType type,
gconstpointer value, gpointer data)
{
GaimProxyInfo *info = gaim_global_proxy_get_info();
if (!strcmp(name, "/core/proxy/type")) {
int proxytype;
const char *type = value;
if (!strcmp(type, "none"))
proxytype = GAIM_PROXY_NONE;
else if (!strcmp(type, "http"))
proxytype = GAIM_PROXY_HTTP;
else if (!strcmp(type, "socks4"))
proxytype = GAIM_PROXY_SOCKS4;
else if (!strcmp(type, "socks5"))
proxytype = GAIM_PROXY_SOCKS5;
else if (!strcmp(type, "envvar"))
proxytype = GAIM_PROXY_USE_ENVVAR;
else
proxytype = -1;
gaim_proxy_info_set_type(info, proxytype);
} else if (!strcmp(name, "/core/proxy/host"))
gaim_proxy_info_set_host(info, value);
else if (!strcmp(name, "/core/proxy/port"))
gaim_proxy_info_set_port(info, GPOINTER_TO_INT(value));
else if (!strcmp(name, "/core/proxy/username"))
gaim_proxy_info_set_username(info, value);
else if (!strcmp(name, "/core/proxy/password"))
gaim_proxy_info_set_password(info, value);
}
void
gaim_proxy_init(void)
{
void *handle;
/* Initialize a default proxy info struct. */
global_proxy_info = gaim_proxy_info_new();
/* Proxy */
gaim_prefs_add_none("/core/proxy");
gaim_prefs_add_string("/core/proxy/type", "none");
gaim_prefs_add_string("/core/proxy/host", "");
gaim_prefs_add_int("/core/proxy/port", 0);
gaim_prefs_add_string("/core/proxy/username", "");
gaim_prefs_add_string("/core/proxy/password", "");
/* Setup callbacks for the preferences. */
handle = gaim_proxy_get_handle();
gaim_prefs_connect_callback(handle, "/core/proxy/type", proxy_pref_cb,
NULL);
gaim_prefs_connect_callback(handle, "/core/proxy/host", proxy_pref_cb,
NULL);
gaim_prefs_connect_callback(handle, "/core/proxy/port", proxy_pref_cb,
NULL);
gaim_prefs_connect_callback(handle, "/core/proxy/username",
proxy_pref_cb, NULL);
gaim_prefs_connect_callback(handle, "/core/proxy/password",
proxy_pref_cb, NULL);
#ifdef _WIN32
if(!g_thread_supported())
g_thread_init(NULL);
#endif
}
void *
gaim_proxy_get_handle()
{
static int handle;
return &handle;
}