Chat-O-Matic/libs/libgloox/socks5bytestreamserver.cpp

247 lines
6.6 KiB
C++
Raw Normal View History

/*
2015-06-24 10:52:32 -05:00
Copyright (c) 2007-2015 by Jakob Schröter <js@camaya.net>
This file is part of the gloox library. http://camaya.net/gloox
This software is distributed under a license. The full license
agreement can be found in the file LICENSE in this distribution.
This software may not be copied, modified, sold or distributed
other than expressed in the named license agreement.
This software is distributed without any warranty.
*/
#include "socks5bytestreamserver.h"
#include "mutexguard.h"
#include "util.h"
namespace gloox
{
SOCKS5BytestreamServer::SOCKS5BytestreamServer( const LogSink& logInstance, int port,
const std::string& ip )
: m_tcpServer( 0 ), m_logInstance( logInstance ), m_ip( ip ), m_port( port )
{
m_tcpServer = new ConnectionTCPServer( this, m_logInstance, m_ip, m_port );
}
SOCKS5BytestreamServer::~SOCKS5BytestreamServer()
{
if( m_tcpServer )
delete m_tcpServer;
2015-06-24 10:52:32 -05:00
m_tcpServer = 0;
2015-06-24 10:52:32 -05:00
m_mutex.lock();
ConnectionMap::const_iterator it = m_connections.begin();
for( ; it != m_connections.end(); ++it )
delete (*it).first;
2015-06-24 10:52:32 -05:00
m_connections.clear();
util::clearList( m_oldConnections );
m_mutex.unlock();
}
ConnectionError SOCKS5BytestreamServer::listen()
{
if( m_tcpServer )
return m_tcpServer->connect();
return ConnNotConnected;
}
ConnectionError SOCKS5BytestreamServer::recv( int timeout )
{
if( !m_tcpServer )
return ConnNotConnected;
ConnectionError ce = m_tcpServer->recv( timeout );
if( ce != ConnNoError )
return ce;
2015-06-24 10:52:32 -05:00
// First take a snapshot of our connections, and then iterate the snapshot
// (so that the live map can be modified by an erase while we
// iterate the snapshot of the map)
ConnectionMap connectionsSnapshot;
m_mutex.lock();
connectionsSnapshot.insert( m_connections.begin(), m_connections.end() );
m_mutex.unlock();
ConnectionMap::const_iterator it = connectionsSnapshot.begin();
for( ; it != connectionsSnapshot.end(); ++it )
{
2015-06-24 10:52:32 -05:00
(*it).first->recv( timeout );
}
2015-06-24 10:52:32 -05:00
connectionsSnapshot.clear();
2015-06-24 10:52:32 -05:00
m_mutex.lock();
util::clearList( m_oldConnections );
2015-06-24 10:52:32 -05:00
m_mutex.unlock();
return ConnNoError;
}
void SOCKS5BytestreamServer::stop()
{
if( m_tcpServer )
{
m_tcpServer->disconnect();
m_tcpServer->cleanup();
}
}
int SOCKS5BytestreamServer::localPort() const
{
if( m_tcpServer )
return m_tcpServer->localPort();
return m_port;
}
const std::string SOCKS5BytestreamServer::localInterface() const
{
if( m_tcpServer )
return m_tcpServer->localInterface();
return m_ip;
}
ConnectionBase* SOCKS5BytestreamServer::getConnection( const std::string& hash )
{
util::MutexGuard mg( m_mutex );
ConnectionMap::iterator it = m_connections.begin();
for( ; it != m_connections.end(); ++it )
{
if( (*it).second.hash == hash )
{
ConnectionBase* conn = (*it).first;
conn->registerConnectionDataHandler( 0 );
m_connections.erase( it );
return conn;
}
}
return 0;
}
void SOCKS5BytestreamServer::registerHash( const std::string& hash )
{
util::MutexGuard mg( m_mutex );
m_hashes.push_back( hash );
}
void SOCKS5BytestreamServer::removeHash( const std::string& hash )
{
util::MutexGuard mg( m_mutex );
m_hashes.remove( hash );
}
void SOCKS5BytestreamServer::handleIncomingConnection( ConnectionBase* /*server*/, ConnectionBase* connection )
{
connection->registerConnectionDataHandler( this );
ConnectionInfo ci;
ci.state = StateUnnegotiated;
2015-06-24 10:52:32 -05:00
m_mutex.lock();
m_connections[connection] = ci;
2015-06-24 10:52:32 -05:00
m_mutex.unlock();
}
void SOCKS5BytestreamServer::handleReceivedData( const ConnectionBase* connection,
const std::string& data )
{
2015-06-24 10:52:32 -05:00
m_mutex.lock();
ConnectionMap::iterator it = m_connections.find( const_cast<ConnectionBase*>( connection ) );
if( it == m_connections.end() )
2015-06-24 10:52:32 -05:00
{
m_mutex.unlock();
return;
2015-06-24 10:52:32 -05:00
}
m_mutex.unlock();
switch( (*it).second.state )
{
case StateDisconnected:
(*it).first->disconnect();
break;
case StateUnnegotiated:
{
char c[2];
c[0] = 0x05;
c[1] = (char)(unsigned char)0xFF;
(*it).second.state = StateDisconnected;
if( data.length() >= 3 && data[0] == 0x05 )
{
unsigned int sz = ( data.length() - 2 < static_cast<unsigned int>( data[1] ) )
? static_cast<unsigned int>( data.length() - 2 )
: static_cast<unsigned int>( data[1] );
for( unsigned int i = 2; i < sz + 2; ++i )
{
if( data[i] == 0x00 )
{
c[1] = 0x00;
(*it).second.state = StateAuthAccepted;
break;
}
}
}
(*it).first->send( std::string( c, 2 ) );
break;
}
case StateAuthmethodAccepted:
// place to implement any future auth support
break;
case StateAuthAccepted:
{
std::string reply = data;
if( reply.length() < 2 )
reply.resize( 2 );
reply[0] = 0x05;
reply[1] = 0x01; // general SOCKS server failure
(*it).second.state = StateDisconnected;
if( data.length() == 47 && data[0] == 0x05 && data[1] == 0x01 && data[2] == 0x00
&& data[3] == 0x03 && data[4] == 0x28 && data[45] == 0x00 && data[46] == 0x00 )
{
const std::string hash = data.substr( 5, 40 );
2015-06-24 10:52:32 -05:00
m_mutex.lock();
HashMap::const_iterator ith = m_hashes.begin();
for( ; ith != m_hashes.end() && (*ith) != hash; ++ith )
;
if( ith != m_hashes.end() )
{
reply[1] = 0x00;
(*it).second.hash = hash;
(*it).second.state = StateDestinationAccepted;
}
2015-06-24 10:52:32 -05:00
m_mutex.unlock();
}
(*it).first->send( reply );
break;
}
case StateDestinationAccepted:
case StateActive:
// should not happen
break;
}
}
void SOCKS5BytestreamServer::handleConnect( const ConnectionBase* /*connection*/ )
{
// should never happen, TCP connection is already established
}
void SOCKS5BytestreamServer::handleDisconnect( const ConnectionBase* connection,
ConnectionError /*reason*/ )
{
2015-06-24 10:52:32 -05:00
util::MutexGuard mg( m_mutex );
m_connections.erase( const_cast<ConnectionBase*>( connection ) );
m_oldConnections.push_back( connection );
}
}