view src/proxy.c @ 956:0f9fc69a1f3b

[gaim-migrate @ 966] gdb is a wonderful tool ;) committer: Tailor Script <tailor@pidgin.im>
author Todd Kulesza <fflewddur>
date Sun, 08 Oct 2000 04:29:34 +0000
parents b1b77b39a1fa
children d50d3abb9eb7
line wrap: on
line source

/*
 * gaim
 *
 * Copyright (C) 1998-1999, Mark Spencer <markster@marko.net>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 *
 */

/* this is a little piece of code to handle proxy connection */
/* it is intended to : 1st handle http proxy, using the CONNECT command
 , 2nd provide an easy way to add socks support */

#ifdef HAVE_CONFIG_H
#include "../config.h"
#endif
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netdb.h>
#include <netinet/in.h>
#include <gtk/gtk.h>
#include "gaim.h"
#include "proxy.h"


/* static int proxy_inited=0; */
int proxy_type = 0;
char proxy_host[256];
int proxy_port = 3128;
char *proxy_realhost = NULL;

/* this code is borrowed from cvs 1.10 */
static int
proxy_recv_line (int sock, char **resultp)
{
    int c;
    char *result;
    size_t input_index = 0;
    size_t result_size = 80;

    result = g_malloc (result_size);

    while (1)
    {
	char ch;
	if (recv (sock, &ch, 1, 0) < 0)
	    fprintf (stderr, "recv() error from  proxy server\n");
	c = ch;

	if (c == EOF)
	{
	    g_free (result);

	    /* It's end of file.  */
	    fprintf(stderr, "end of file from  server\n");
	}

	if (c == '\012')
	    break;

	result[input_index++] = c;
	while (input_index + 1 >= result_size)
	{
	    result_size *= 2;
	    result = (char *) g_realloc (result, result_size);
	}
    }

    if (resultp)
	*resultp = result;

    /* Terminate it just for kicks, but we *can* deal with embedded NULs.  */
    result[input_index] = '\0';

    if (resultp == NULL)
	g_free (result);
    return input_index;
}


struct hostent *proxy_gethostbyname(char *host)
{
    
        if (proxy_type == PROXY_NONE)
                return (gethostbyname(host));

        if (proxy_realhost != NULL)
                g_free(proxy_realhost);

        /* we keep the real host name for the Connect command */
        proxy_realhost = (char *) strdup(host);
        
        return (gethostbyname(proxy_host));
    
}


int proxy_connect(int  sockfd, struct sockaddr *serv_addr, int
                  addrlen )
{
        struct sockaddr_in name;
        int ret;

        switch (proxy_type) {
        case PROXY_NONE:
                /* normal use */
                return (connect(sockfd,serv_addr,addrlen));
                break;
        case PROXY_HTTP:  /* Http proxy */
                /* do the  tunneling */
                /* step one : connect to  proxy */
                {
                        struct hostent *hostinfo;
                        unsigned short shortport = proxy_port;

                        memset (&name, 0, sizeof (name));
                        name.sin_family = AF_INET;
                        name.sin_port = htons (shortport);
                        hostinfo = gethostbyname (proxy_host);
                        if (hostinfo == NULL) {
                                fprintf (stderr, "Unknown host %s.\n", proxy_host);
                                return (-1);
                        }
                        name.sin_addr = *(struct in_addr *) hostinfo->h_addr;
                }
                sprintf(debug_buff,"Trying to connect ...\n");
                debug_print(debug_buff);
                if ((ret = connect(sockfd,(struct sockaddr *)&name,sizeof(name)))<0)
                        return(ret);
    
                /* step two : do  proxy tunneling init */
                {
                        char cmd[80];
                        char *inputline;
                        unsigned short realport=ntohs(((struct sockaddr_in *)serv_addr)->sin_port);
                        sprintf(cmd,"CONNECT %s:%d HTTP/1.1\n\r\n\r",proxy_realhost,realport);
                        sprintf(debug_buff,"<%s>\n",cmd);
                        debug_print(debug_buff);
                        if (send(sockfd,cmd,strlen(cmd),0)<0)
                                return(-1);
                        if (proxy_recv_line(sockfd,&inputline) < 0) {
                                return(-1);
                        }
                        sprintf(debug_buff,"<%s>\n",inputline);
                        debug_print(debug_buff);
                        if (memcmp("HTTP/1.0 200 Connection established",inputline,35))
                                if (memcmp("HTTP/1.1 200 Connection established",inputline,35)) {
                                        free(inputline);
                                        return(-1);
                                }

                        while (strlen(inputline)>1) {
                                free(inputline);
                                if (proxy_recv_line(sockfd,&inputline) < 0) {
                                        return(-1);
                                }
                                sprintf(debug_buff,"<%s>\n",inputline);
                                debug_print(debug_buff);
                        }
                        free(inputline);
                }
	        
                return 0;
                break;
        case PROXY_SOCKS4:
		/* code shamelessly stolen from everybuddy */
	{
		struct sockaddr_in sa;
		unsigned char packet[12];
		struct hostent *hp;

		debug_print("connecting with socks4.\n");

		if (!(hp = gethostbyname(proxy_host)))
			return -1;

		bzero(&sa, sizeof(sa));
		sa.sin_family = AF_INET;
		sa.sin_port = htons(proxy_port);
		bcopy(hp->h_addr, (char *) &sa.sin_addr, hp->h_length);

		if (connect(sockfd, (struct sockaddr *) &sa, sizeof (sa)) != -1) {
			unsigned short realport = htons(((struct sockaddr_in *)serv_addr)->sin_port);
			
			if (!(hp = gethostbyname(proxy_realhost)))
				return -1;
			packet[0] = 4;
			packet[1] = 1;
			packet[2] = (((unsigned short) realport) >> 8);
			packet[3] = (((unsigned short) realport) & 0xff);
			packet[4] = (unsigned char) (hp->h_addr_list[0])[0];
			packet[5] = (unsigned char) (hp->h_addr_list[0])[1];
			packet[6] = (unsigned char) (hp->h_addr_list[0])[2];
			packet[7] = (unsigned char) (hp->h_addr_list[0])[3];
			packet[8] = 0;
			if (write(sockfd, packet, 9) == 9) {
				bzero(packet, sizeof(packet));
				if (read(sockfd, packet, 9) >= 4 && packet[1] == 90)
					return 0;
			}
			close(sockfd);
		}
		return -1;
	}
		break;
	case PROXY_SOCKS5:
	{
		struct sockaddr_in sin;
		struct hostent *hostinfo;
		char buff[11];

		sethostent(0);
		hostinfo = gethostbyname(proxy_host);
		if (!hostinfo) return -1;

		sin.sin_addr.s_addr = atol(hostinfo->h_addr);
		sin.sin_family = AF_INET;
		sin.sin_port = htons(proxy_port);

		if (connect(sockfd, (struct sockaddr *)&sin, sizeof(sin)) < 0)
			return -1;

		buff[0] = 5;
		buff[1] = 1;
		buff[2] = 0;

		write(sockfd, buff, 3);
		read(sockfd, buff, 2);

		if (buff[1]) return -1;

		hostinfo = gethostbyname(proxy_realhost);
		if (!hostinfo) return -1;

		buff[0] = 5;
		buff[1] = 1;
		buff[2] = 0;
		buff[3] = 1;
		buff[4] = (unsigned char) (hostinfo->h_addr_list[0])[0];
		buff[5] = (unsigned char) (hostinfo->h_addr_list[0])[1];
		buff[6] = (unsigned char) (hostinfo->h_addr_list[0])[2];
		buff[7] = (unsigned char) (hostinfo->h_addr_list[0])[3];
		memcpy(buff+8, &((struct sockaddr_in *)serv_addr)->sin_port, 2);

		write(sockfd, buff, 10);
		read(sockfd, buff, 10);

		if (buff[1]) return -1;

		return 0;
	}
		break;
        default:
                fprintf(stderr,"Unknown proxy type : %d.\n",proxy_type);
                break;
        }
        return(-1);
}