Annotation of ChivanetAimPidgin/oscarprpl/src/c/peer_proxy.c, revision 1.1
1.1 ! snw 1: /*
! 2: * Purple's oscar protocol plugin
! 3: * This file is the legal property of its developers.
! 4: * Please see the AUTHORS file distributed alongside this file.
! 5: *
! 6: * This library is free software; you can redistribute it and/or
! 7: * modify it under the terms of the GNU Lesser General Public
! 8: * License as published by the Free Software Foundation; either
! 9: * version 2 of the License, or (at your option) any later version.
! 10: *
! 11: * This library is distributed in the hope that it will be useful,
! 12: * but WITHOUT ANY WARRANTY; without even the implied warranty of
! 13: * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
! 14: * Lesser General Public License for more details.
! 15: *
! 16: * You should have received a copy of the GNU Lesser General Public
! 17: * License along with this library; if not, write to the Free Software
! 18: * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02111-1301 USA
! 19: */
! 20:
! 21: #ifdef HAVE_CONFIG_H
! 22: #include <config.h>
! 23: #endif
! 24:
! 25: #include "oscar.h"
! 26: #include "peer.h"
! 27:
! 28: static void
! 29: peer_proxy_send(PeerConnection *conn, ProxyFrame *frame)
! 30: {
! 31: size_t length;
! 32: ByteStream bs;
! 33:
! 34: purple_debug_info("oscar", "Outgoing peer proxy frame with "
! 35: "type=0x%04hx, unknown=0x%08x, flags=0x%04hx, and "
! 36: "payload length=%" G_GSIZE_FORMAT "\n",
! 37: frame->type, frame->unknown,
! 38: frame->flags, frame->payload.len);
! 39:
! 40: length = 12 + frame->payload.len;
! 41: byte_stream_new(&bs, length);
! 42: byte_stream_put16(&bs, length - 2);
! 43: byte_stream_put16(&bs, PEER_PROXY_PACKET_VERSION);
! 44: byte_stream_put16(&bs, frame->type);
! 45: byte_stream_put32(&bs, frame->unknown);
! 46: byte_stream_put16(&bs, frame->flags);
! 47: byte_stream_putraw(&bs, frame->payload.data, frame->payload.len);
! 48:
! 49: peer_connection_send(conn, &bs);
! 50:
! 51: byte_stream_destroy(&bs);
! 52: }
! 53:
! 54: /**
! 55: * Create a rendezvous "init send" packet and send it on its merry way.
! 56: * This is the first packet sent to the proxy server by the first client
! 57: * to indicate that this will be a proxied connection
! 58: *
! 59: * @param conn The peer connection.
! 60: */
! 61: static void
! 62: peer_proxy_send_create_new_conn(PeerConnection *conn)
! 63: {
! 64: ProxyFrame frame;
! 65: PurpleAccount *account;
! 66: const gchar *bn;
! 67: guint8 bn_length;
! 68:
! 69: memset(&frame, 0, sizeof(ProxyFrame));
! 70: frame.type = PEER_PROXY_TYPE_CREATE;
! 71: frame.flags = 0x0000;
! 72:
! 73: account = purple_connection_get_account(conn->od->gc);
! 74: bn = purple_account_get_username(account);
! 75: bn_length = strlen(bn);
! 76: byte_stream_new(&frame.payload, 1 + bn_length + 8 + 20);
! 77: byte_stream_put8(&frame.payload, bn_length);
! 78: byte_stream_putraw(&frame.payload, (const guint8 *)bn, bn_length);
! 79: byte_stream_putraw(&frame.payload, conn->cookie, 8);
! 80:
! 81: byte_stream_put16(&frame.payload, 0x0001); /* Type */
! 82: byte_stream_put16(&frame.payload, 16); /* Length */
! 83: byte_stream_putcaps(&frame.payload, conn->type); /* Value */
! 84:
! 85: peer_proxy_send(conn, &frame);
! 86:
! 87: byte_stream_destroy(&frame.payload);
! 88: }
! 89:
! 90: /**
! 91: * Create a rendezvous "init recv" packet and send it on its merry way.
! 92: * This is the first packet sent to the proxy server by the second client
! 93: * involved in this rendezvous proxy session.
! 94: *
! 95: * @param conn The peer connection.
! 96: * @param pin The 2 byte PIN sent to us by the other user. This acts
! 97: * as our passcode when establishing the proxy session.
! 98: */
! 99: static void
! 100: peer_proxy_send_join_existing_conn(PeerConnection *conn, guint16 pin)
! 101: {
! 102: ProxyFrame frame;
! 103: PurpleAccount *account;
! 104: const gchar *bn;
! 105: guint8 bn_length;
! 106:
! 107: memset(&frame, 0, sizeof(ProxyFrame));
! 108: frame.type = PEER_PROXY_TYPE_JOIN;
! 109: frame.flags = 0x0000;
! 110:
! 111: account = purple_connection_get_account(conn->od->gc);
! 112: bn = purple_account_get_username(account);
! 113: bn_length = strlen(bn);
! 114: byte_stream_new(&frame.payload, 1 + bn_length + 2 + 8 + 20);
! 115: byte_stream_put8(&frame.payload, bn_length);
! 116: byte_stream_putraw(&frame.payload, (const guint8 *)bn, bn_length);
! 117: byte_stream_put16(&frame.payload, pin);
! 118: byte_stream_putraw(&frame.payload, conn->cookie, 8);
! 119:
! 120: byte_stream_put16(&frame.payload, 0x0001); /* Type */
! 121: byte_stream_put16(&frame.payload, 16); /* Length */
! 122: byte_stream_putcaps(&frame.payload, conn->type); /* Value */
! 123:
! 124: peer_proxy_send(conn, &frame);
! 125:
! 126: byte_stream_destroy(&frame.payload);
! 127: }
! 128:
! 129: /**
! 130: * Handle an incoming peer proxy negotiation frame.
! 131: */
! 132: static void
! 133: peer_proxy_recv_frame(PeerConnection *conn, ProxyFrame *frame)
! 134: {
! 135: purple_debug_info("oscar", "Incoming peer proxy frame with "
! 136: "type=0x%04hx, unknown=0x%08x, flags=0x%04hx, and "
! 137: "payload length=%" G_GSIZE_FORMAT "\n", frame->type,
! 138: frame->unknown, frame->flags, frame->payload.len);
! 139:
! 140: if (frame->type == PEER_PROXY_TYPE_CREATED)
! 141: {
! 142: /*
! 143: * Read in 2 byte port then 4 byte IP and tell the
! 144: * remote user to connect to it by sending an ICBM.
! 145: */
! 146: guint16 pin;
! 147: int i;
! 148: guint8 ip[4];
! 149:
! 150: pin = byte_stream_get16(&frame->payload);
! 151: for (i = 0; i < 4; i++)
! 152: ip[i] = byte_stream_get8(&frame->payload);
! 153: if (conn->type == OSCAR_CAPABILITY_DIRECTIM)
! 154: aim_im_sendch2_odc_requestproxy(conn->od,
! 155: conn->cookie,
! 156: conn->bn, ip, pin, ++conn->lastrequestnumber);
! 157: else if (conn->type == OSCAR_CAPABILITY_SENDFILE)
! 158: {
! 159: aim_im_sendch2_sendfile_requestproxy(conn->od,
! 160: conn->cookie, conn->bn,
! 161: ip, pin, ++conn->lastrequestnumber,
! 162: (const gchar *)conn->xferdata.name,
! 163: conn->xferdata.size, conn->xferdata.totfiles);
! 164: }
! 165: }
! 166: else if (frame->type == PEER_PROXY_TYPE_READY)
! 167: {
! 168: purple_input_remove(conn->watcher_incoming);
! 169: conn->watcher_incoming = 0;
! 170:
! 171: peer_connection_finalize_connection(conn);
! 172: }
! 173: else if (frame->type == PEER_PROXY_TYPE_ERROR)
! 174: {
! 175: if (byte_stream_bytes_left(&frame->payload) >= 2)
! 176: {
! 177: guint16 error;
! 178: const char *msg;
! 179: error = byte_stream_get16(&frame->payload);
! 180: if (error == 0x000d)
! 181: msg = "bad request";
! 182: else if (error == 0x0010)
! 183: msg = "initial request timed out";
! 184: else if (error == 0x001a)
! 185: msg ="accept period timed out";
! 186: else
! 187: msg = "unknown reason";
! 188: purple_debug_info("oscar", "Proxy negotiation failed with "
! 189: "error 0x%04hx: %s\n", error, msg);
! 190: }
! 191: else
! 192: {
! 193: purple_debug_warning("oscar", "Proxy negotiation failed with "
! 194: "an unknown error\n");
! 195: }
! 196: peer_connection_trynext(conn);
! 197: }
! 198: else
! 199: {
! 200: purple_debug_warning("oscar", "Unknown peer proxy frame type 0x%04hx.\n",
! 201: frame->type);
! 202: }
! 203: }
! 204:
! 205: static void
! 206: peer_proxy_connection_recv_cb(gpointer data, gint source, PurpleInputCondition cond)
! 207: {
! 208: PeerConnection *conn;
! 209: gssize read;
! 210: ProxyFrame *frame;
! 211:
! 212: conn = data;
! 213: frame = conn->frame;
! 214:
! 215: /* Start reading a new proxy frame */
! 216: if (frame == NULL)
! 217: {
! 218: /* Read the first 12 bytes (frame length and header) */
! 219: read = recv(conn->fd, conn->proxy_header + conn->proxy_header_received,
! 220: 12 - conn->proxy_header_received, 0);
! 221:
! 222: /* Check if the proxy server closed the connection */
! 223: if (read == 0)
! 224: {
! 225: purple_debug_info("oscar", "Peer proxy server closed connection\n");
! 226: peer_connection_trynext(conn);
! 227: return;
! 228: }
! 229:
! 230: /* If there was an error then close the connection */
! 231: if (read < 0)
! 232: {
! 233: if ((errno == EAGAIN) || (errno == EWOULDBLOCK))
! 234: /* No worries */
! 235: return;
! 236:
! 237: purple_debug_info("oscar", "Lost connection with peer proxy server\n");
! 238: peer_connection_trynext(conn);
! 239: return;
! 240: }
! 241:
! 242: conn->lastactivity = time(NULL);
! 243:
! 244: /* If we don't even have the first 12 bytes then do nothing */
! 245: conn->proxy_header_received += read;
! 246: if (conn->proxy_header_received < 12)
! 247: return;
! 248:
! 249: /* We only support a specific version of the proxy protocol */
! 250: if (aimutil_get16(&conn->proxy_header[2]) != PEER_PROXY_PACKET_VERSION)
! 251: {
! 252: purple_debug_warning("oscar", "Expected peer proxy protocol "
! 253: "version %u but received version %u. Closing "
! 254: "connection.\n", PEER_PROXY_PACKET_VERSION,
! 255: aimutil_get16(&conn->proxy_header[2]));
! 256: peer_connection_trynext(conn);
! 257: return;
! 258: }
! 259:
! 260: /* Initialize a new temporary ProxyFrame for incoming data */
! 261: frame = g_new0(ProxyFrame, 1);
! 262: frame->payload.len = aimutil_get16(&conn->proxy_header[0]) - 10;
! 263: frame->version = aimutil_get16(&conn->proxy_header[2]);
! 264: frame->type = aimutil_get16(&conn->proxy_header[4]);
! 265: frame->unknown = aimutil_get16(&conn->proxy_header[6]);
! 266: frame->flags = aimutil_get16(&conn->proxy_header[10]);
! 267: if (frame->payload.len > 0)
! 268: frame->payload.data = g_new(guint8, frame->payload.len);
! 269: conn->frame = frame;
! 270: }
! 271:
! 272: /* If this frame has a payload then attempt to read it */
! 273: if (frame->payload.len - frame->payload.offset > 0)
! 274: {
! 275: /* Read data into the temporary buffer until it is complete */
! 276: read = recv(conn->fd,
! 277: &frame->payload.data[frame->payload.offset],
! 278: frame->payload.len - frame->payload.offset,
! 279: 0);
! 280:
! 281: /* Check if the proxy server closed the connection */
! 282: if (read == 0)
! 283: {
! 284: purple_debug_info("oscar", "Peer proxy server closed connection\n");
! 285: g_free(frame->payload.data);
! 286: g_free(frame);
! 287: conn->frame = NULL;
! 288: peer_connection_trynext(conn);
! 289: return;
! 290: }
! 291:
! 292: /* If there was an error then close the connection */
! 293: if (read < 0)
! 294: {
! 295: if ((errno == EAGAIN) || (errno == EWOULDBLOCK))
! 296: /* No worries */
! 297: return;
! 298:
! 299: purple_debug_info("oscar", "Lost connection with peer proxy server\n");
! 300: g_free(frame->payload.data);
! 301: g_free(frame);
! 302: conn->frame = NULL;
! 303: peer_connection_trynext(conn);
! 304: return;
! 305: }
! 306:
! 307: frame->payload.offset += read;
! 308: }
! 309:
! 310: conn->lastactivity = time(NULL);
! 311: if (frame->payload.offset < frame->payload.len)
! 312: /* Waiting for more data to arrive */
! 313: return;
! 314:
! 315: /* We have a complete proxy frame! Handle it and continue reading */
! 316: conn->frame = NULL;
! 317: byte_stream_rewind(&frame->payload);
! 318: peer_proxy_recv_frame(conn, frame);
! 319:
! 320: g_free(frame->payload.data);
! 321: g_free(frame);
! 322:
! 323: conn->proxy_header_received = 0;
! 324: }
! 325:
! 326: /**
! 327: * We tried to make an outgoing connection to a proxy server. It
! 328: * either connected or failed to connect.
! 329: */
! 330: void
! 331: peer_proxy_connection_established_cb(gpointer data, gint source, const gchar *error_message)
! 332: {
! 333: PeerConnection *conn;
! 334:
! 335: conn = data;
! 336:
! 337: conn->verified_connect_data = NULL;
! 338:
! 339: if (source < 0)
! 340: {
! 341: peer_connection_trynext(conn);
! 342: return;
! 343: }
! 344:
! 345: conn->fd = source;
! 346: conn->watcher_incoming = purple_input_add(conn->fd,
! 347: PURPLE_INPUT_READ, peer_proxy_connection_recv_cb, conn);
! 348:
! 349: if (conn->proxyip != NULL)
! 350: /* Connect to the session created by the remote user */
! 351: peer_proxy_send_join_existing_conn(conn, conn->port);
! 352: else
! 353: /* Create a new session */
! 354: peer_proxy_send_create_new_conn(conn);
! 355: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>