Mercurial > pidgin.yaz
view src/stun.c @ 11335:59aa7080eb2d
[gaim-migrate @ 13548]
Added DES to ciphers. It is needed for NTLM
committer: Tailor Script <tailor@pidgin.im>
author | Thomas Butter <tbutter> |
---|---|
date | Wed, 24 Aug 2005 19:02:59 +0000 |
parents | dd1a5969b2e5 |
children | 7d7dd22215ec |
line wrap: on
line source
/** * @file stun.c STUN (RFC3489) Implementation * @ingroup core * * gaim * * Gaim is the legal property of its developers, whose names are too numerous * to list here. Please refer to the COPYRIGHT file distributed with this * source distribution. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * * TODO: currently only detects if there is a NAT and not the type of NAT */ #include <sys/socket.h> #include <ifaddrs.h> #include <net/if.h> #include <sys/ioctl.h> #include <resolv.h> #include "internal.h" #include "debug.h" #include "account.h" #include "stun.h" #include "prefs.h" struct stun_nattype nattype = {-1, 0, "\0"}; static gint transid[4]; static GSList *callbacks = 0; static int fd = -1; gint incb = -1; static void do_callbacks() { while(callbacks) { StunCallback cb = callbacks->data; cb(&nattype); callbacks = g_slist_remove(callbacks, cb); } } static void reply_cb(gpointer data, gint source, GaimInputCondition cond) { char buffer[10240]; char *tmp; int len; struct in_addr in; struct stun_attrib *attrib; struct stun_header *hdr; struct ifconf ifc; struct ifreq *ifr; struct sockaddr_in *sinptr; len = recv(source, buffer, 10240, 0); hdr = (struct stun_header*)buffer; if(hdr->transid[0]!=transid[0] || hdr->transid[1]!=transid[1] || hdr->transid[2]!=transid[2] || hdr->transid[3]!=transid[3]) { // wrong transaction gaim_debug_info("simple", "got wrong transid\n"); return; } tmp = buffer + sizeof(struct stun_header); while(buffer+len > tmp) { attrib = (struct stun_attrib*) tmp; if(attrib->type == htons(0x0001) && attrib->len == htons(8)) { memcpy(&in.s_addr, tmp+sizeof(struct stun_attrib)+2+2, 4); strcpy(nattype.publicip, inet_ntoa(in)); } tmp += sizeof(struct stun_attrib) + attrib->len; } gaim_debug_info("simple", "got public ip %s\n",nattype.publicip); nattype.status = 2; nattype.type = 1; // is it a NAT? ifc.ifc_len = sizeof(buffer); ifc.ifc_req = (struct ifreq *) buffer; ioctl(source, SIOCGIFCONF, &ifc); tmp = buffer; while(tmp < buffer + ifc.ifc_len) { ifr = (struct ifreq *) tmp; len = sizeof(struct sockaddr); tmp += sizeof(ifr->ifr_name) + len; if(ifr->ifr_addr.sa_family == AF_INET) { // we only care about ipv4 interfaces sinptr = (struct sockaddr_in *) &ifr->ifr_addr; if(sinptr->sin_addr.s_addr == in.s_addr) { // no NAT gaim_debug_info("simple","no nat"); nattype.type = 0; } } } do_callbacks(); gaim_input_remove(incb); } struct stun_nattype *gaim_stun_discover(StunCallback cb) { struct sockaddr_in addr; struct stun_header data; int ret = 0; const char *ip = gaim_prefs_get_string("/core/network/stun_ip"); int port = gaim_prefs_get_int("/core/network/stun_port"); if(nattype.status == 1) { // currently discovering callbacks = g_slist_append(callbacks, cb); return NULL; } if(nattype.status == 2 || nattype.status == 0) { // already discovered cb(&nattype); return &nattype; } if((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) { nattype.status = 0; cb(&nattype); return &nattype; } addr.sin_family = AF_INET; addr.sin_port = htons(12108); addr.sin_addr.s_addr = INADDR_ANY; while( ((ret = bind(fd, (struct sockaddr *)&addr, sizeof(struct sockaddr_in))) < 0 ) && ntohs(addr.sin_port) < 12208) { addr.sin_port = htons(ntohs(addr.sin_port)+1); } if( ret < 0 ) { nattype.status = 0; cb(&nattype); return &nattype; } incb = gaim_input_add(fd, GAIM_INPUT_READ, reply_cb, NULL); if(port == 0 || ip == NULL || ip[0] == '\0') return NULL; addr.sin_family = AF_INET; addr.sin_port = htons(port); addr.sin_addr.s_addr = inet_addr(ip); data.type = htons(0x0001); data.len = 0; transid[0] = data.transid[0] = rand(); transid[1] = data.transid[1] = ntohl(((int)'g' << 24) + ((int)'a' << 16) + ((int)'i' << 8) + (int)'m'); transid[2] = data.transid[2] = rand(); transid[3] = data.transid[3] = rand(); if( sendto(fd, &data, sizeof(struct stun_header), 0, (struct sockaddr *)&addr, sizeof(struct sockaddr_in)) < sizeof(struct stun_header)) { nattype.status = 0; cb(&nattype); return &nattype; } return NULL; }