git-svn-id: svn://svn.code.sf.net/p/bitchx/code/trunk@225 13b04d17-f746-0410-82c6-800466cd88b0
224 lines
6.2 KiB
C
224 lines
6.2 KiB
C
/*
|
|
* gaim
|
|
*
|
|
* Copyright (C) 1998-1999, Mark Spencer <markster@marko.net>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*
|
|
*/
|
|
|
|
|
|
/*
|
|
* Modified by Nadeem Riaz (nads@bleh.org) (just rewrote the get_address function)
|
|
* for use in libtoc
|
|
*/
|
|
|
|
#include <netdb.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <string.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <time.h>
|
|
#include <sys/socket.h>
|
|
#include "toc.h"
|
|
#include "proxy.h"
|
|
|
|
int proxy_type = 0;
|
|
char proxy_host[256];
|
|
int proxy_port = 3128;
|
|
char *proxy_realhost = NULL;
|
|
|
|
unsigned int *get_address(char *hostname)
|
|
{
|
|
struct hostent *hp;
|
|
unsigned int *sin=NULL;
|
|
if ((hp = proxy_gethostbyname(hostname))) {
|
|
sin = (unsigned int *) malloc(sizeof(unsigned int));
|
|
bcopy((char *)(*(hp->h_addr_list)),(char *)sin,sizeof(hp->h_addr_list));
|
|
}
|
|
return sin;
|
|
}
|
|
|
|
|
|
int connect_address(unsigned int addy, unsigned short port)
|
|
{
|
|
int fd;
|
|
struct sockaddr_in sin;
|
|
|
|
sin.sin_addr.s_addr = addy;
|
|
sin.sin_family = AF_INET;
|
|
sin.sin_port = htons(port);
|
|
|
|
fd = socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
if (fd > -1) {
|
|
quad_addr=strdup(inet_ntoa(sin.sin_addr));
|
|
if (proxy_connect(fd, (struct sockaddr *)&sin, sizeof(sin)) > -1) {
|
|
return fd;
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
|
|
/*
|
|
* Proxy stuff
|
|
*/
|
|
|
|
/* this code is borrowed from cvs 1.10 */
|
|
static int
|
|
proxy_recv_line (int sock, char **resultp)
|
|
{
|
|
int c;
|
|
char *result;
|
|
size_t input_index = 0;
|
|
size_t result_size = 80;
|
|
|
|
result = (char *) malloc (result_size);
|
|
|
|
while (1)
|
|
{
|
|
char ch;
|
|
if (recv (sock, &ch, 1, 0) < 0)
|
|
fprintf (stderr, "recv() error from proxy server\n");
|
|
c = ch;
|
|
|
|
if (c == EOF)
|
|
{
|
|
free (result);
|
|
|
|
/* It's end of file. */
|
|
fprintf(stderr, "end of file from server\n");
|
|
}
|
|
|
|
if (c == '\012')
|
|
break;
|
|
|
|
result[input_index++] = c;
|
|
while (input_index + 1 >= result_size)
|
|
{
|
|
result_size *= 2;
|
|
result = (char *) realloc (result, result_size);
|
|
}
|
|
}
|
|
|
|
if (resultp)
|
|
*resultp = result;
|
|
|
|
/* Terminate it just for kicks, but we *can* deal with embedded NULs. */
|
|
result[input_index] = '\0';
|
|
|
|
if (resultp == NULL)
|
|
free (result);
|
|
return input_index;
|
|
}
|
|
|
|
|
|
struct hostent *proxy_gethostbyname(char *host)
|
|
{
|
|
|
|
if (proxy_type == PROXY_NONE)
|
|
return (gethostbyname(host));
|
|
|
|
if (proxy_realhost != NULL)
|
|
free(proxy_realhost);
|
|
|
|
/* we keep the real host name for the Connect command */
|
|
proxy_realhost = (char *) strdup(host);
|
|
|
|
return (gethostbyname(proxy_host));
|
|
|
|
}
|
|
|
|
|
|
int proxy_connect(int sockfd, struct sockaddr *serv_addr, int
|
|
addrlen )
|
|
{
|
|
struct sockaddr_in name;
|
|
int ret;
|
|
|
|
switch (proxy_type) {
|
|
case PROXY_NONE:
|
|
/* normal use */
|
|
return (connect(sockfd,serv_addr,addrlen));
|
|
break;
|
|
case PROXY_HTTP: /* Http proxy */
|
|
/* do the tunneling */
|
|
/* step one : connect to proxy */
|
|
{
|
|
struct hostent *hostinfo;
|
|
unsigned short shortport = proxy_port;
|
|
|
|
memset (&name, 0, sizeof (name));
|
|
name.sin_family = AF_INET;
|
|
name.sin_port = htons (shortport);
|
|
hostinfo = gethostbyname (proxy_host);
|
|
if (hostinfo == NULL) {
|
|
fprintf (stderr, "Unknown host %s.\n", proxy_host);
|
|
return (-1);
|
|
}
|
|
name.sin_addr = *(struct in_addr *) hostinfo->h_addr;
|
|
}
|
|
toc_debug_printf("Trying to connect ...\n");
|
|
if ((ret = connect(sockfd,(struct sockaddr *)&name,sizeof(name)))<0)
|
|
return(ret);
|
|
|
|
/* step two : do proxy tunneling init */
|
|
{
|
|
char cmd[80];
|
|
char *inputline;
|
|
unsigned short realport=ntohs(((struct sockaddr_in *)serv_addr)->sin_port);
|
|
sprintf(cmd,"CONNECT %s:%d HTTP/1.1\n\r\n\r",proxy_realhost,realport);
|
|
toc_debug_printf("<%s>\n",cmd);
|
|
if (send(sockfd,cmd,strlen(cmd),0)<0)
|
|
return(-1);
|
|
if (proxy_recv_line(sockfd,&inputline) < 0) {
|
|
return(-1);
|
|
}
|
|
toc_debug_printf("<%s>\n",inputline);
|
|
if (memcmp("HTTP/1.0 200 Connection established",inputline,35))
|
|
if (memcmp("HTTP/1.1 200 Connection established",inputline,35)) {
|
|
free(inputline);
|
|
return(-1);
|
|
}
|
|
|
|
while (strlen(inputline)>1) {
|
|
free(inputline);
|
|
if (proxy_recv_line(sockfd,&inputline) < 0) {
|
|
return(-1);
|
|
}
|
|
toc_debug_printf("<%s>\n",inputline);
|
|
}
|
|
free(inputline);
|
|
}
|
|
|
|
return ret;
|
|
break;
|
|
case PROXY_SOCKS:
|
|
fprintf(stderr,"Socks proxy is not yet implemented.\n");
|
|
return(-1);
|
|
break;
|
|
default:
|
|
fprintf(stderr,"Unknown proxy type : %d.\n",proxy_type);
|
|
break;
|
|
}
|
|
return(-1);
|
|
}
|
|
|
|
|