|
@@ -1,514 +1,514 @@
|
|
|
-/*
|
|
|
- This file is part of GNUnet.
|
|
|
- Copyright (C) 2009, 2015 Christian Grothoff (and other contributing authors)
|
|
|
-
|
|
|
- GNUnet is free software; you can redistribute it and/or modify
|
|
|
- it under the terms of the GNU General Public License as published
|
|
|
- by the Free Software Foundation; either version 3, or (at your
|
|
|
- option) any later version.
|
|
|
-
|
|
|
- GNUnet is distributed in the hope that it will be useful, but
|
|
|
- WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
- General Public License for more details.
|
|
|
-
|
|
|
- You should have received a copy of the GNU General Public License
|
|
|
- along with GNUnet; see the file COPYING. If not, write to the
|
|
|
- Free Software Foundation, Inc., 59 Temple Place - Suite 330,
|
|
|
- Boston, MA 02111-1307, USA.
|
|
|
-*/
|
|
|
-
|
|
|
-/**
|
|
|
- * Testcase for STUN server resolution
|
|
|
- *
|
|
|
- * @file nat/test_stun.c
|
|
|
- * @brief Testcase for STUN library
|
|
|
- * @author Bruno Souza Cabral
|
|
|
- * @autor Mark Spencer (Original code borrowed from Asterisk)
|
|
|
- *
|
|
|
- */
|
|
|
-
|
|
|
-
|
|
|
-#include "platform.h"
|
|
|
-#include "gnunet_util_lib.h"
|
|
|
-#include "gnunet_program_lib.h"
|
|
|
-#include "gnunet_scheduler_lib.h"
|
|
|
-#include "gnunet_nat_lib.h"
|
|
|
-
|
|
|
-
|
|
|
-#include "test_stun.h"
|
|
|
-
|
|
|
-
|
|
|
-/**
|
|
|
- * The port the test service is running on (default 7895)
|
|
|
- */
|
|
|
-static unsigned long port = 7895;
|
|
|
-
|
|
|
-static int ret = 1;
|
|
|
-
|
|
|
-/**
|
|
|
- * The listen socket of the service for IPv4
|
|
|
- */
|
|
|
-static struct GNUNET_NETWORK_Handle *lsock4;
|
|
|
-
|
|
|
-
|
|
|
-/**
|
|
|
- * The listen task ID for IPv4
|
|
|
- */
|
|
|
-static struct GNUNET_SCHEDULER_Task * ltask4;
|
|
|
-
|
|
|
-
|
|
|
-static char *stun_server = STUN_SERVER;
|
|
|
-static int stun_port = STUN_PORT;
|
|
|
-
|
|
|
-static int stun_debug = 1;
|
|
|
-
|
|
|
-
|
|
|
-struct stun_strings {
|
|
|
- const int value;
|
|
|
- const char *name;
|
|
|
-};
|
|
|
-
|
|
|
-
|
|
|
-static inline int stun_msg2class(int msg)
|
|
|
-{
|
|
|
- return ((msg & 0x0010) >> 4) | ((msg & 0x0100) >> 7);
|
|
|
-}
|
|
|
-
|
|
|
-static inline int stun_msg2method(int msg)
|
|
|
-{
|
|
|
- return (msg & 0x000f) | ((msg & 0x00e0) >> 1) | ((msg & 0x3e00) >> 2);
|
|
|
-}
|
|
|
-
|
|
|
-static inline int stun_msg2type(int class, int method)
|
|
|
-{
|
|
|
- return ((class & 1) << 4) | ((class & 2) << 7) |
|
|
|
- (method & 0x000f) | ((method & 0x0070) << 1) | ((method & 0x0f800) << 2);
|
|
|
-}
|
|
|
-
|
|
|
-/* helper function to print message names */
|
|
|
-static const char *stun_msg2str(int msg)
|
|
|
-{
|
|
|
- static const struct stun_strings classes[] = {
|
|
|
- { STUN_REQUEST, "Request" },
|
|
|
- { STUN_INDICATION, "Indication" },
|
|
|
- { STUN_RESPONSE, "Response" },
|
|
|
- { STUN_ERROR_RESPONSE, "Error Response" },
|
|
|
- { 0, NULL }
|
|
|
-};
|
|
|
- static const struct stun_strings methods[] = {
|
|
|
- { STUN_BINDING, "Binding" },
|
|
|
- { 0, NULL }
|
|
|
-};
|
|
|
- static char result[32];
|
|
|
- const char *class = NULL, *method = NULL;
|
|
|
- int i, value;
|
|
|
-
|
|
|
- value = stun_msg2class(msg);
|
|
|
- for (i = 0; classes[i].name; i++) {
|
|
|
- class = classes[i].name;
|
|
|
- if (classes[i].value == value)
|
|
|
- break;
|
|
|
- }
|
|
|
- value = stun_msg2method(msg);
|
|
|
- for (i = 0; methods[i].name; i++) {
|
|
|
- method = methods[i].name;
|
|
|
- if (methods[i].value == value)
|
|
|
- break;
|
|
|
- }
|
|
|
- snprintf(result, sizeof(result), "%s %s",
|
|
|
- method ? : "Unknown Method",
|
|
|
- class ? : "Unknown Class Message");
|
|
|
- return result;
|
|
|
-}
|
|
|
-
|
|
|
-/* helper function to print attribute names */
|
|
|
-static const char *stun_attr2str(int msg)
|
|
|
-{
|
|
|
- static const struct stun_strings attrs[] = {
|
|
|
- { STUN_MAPPED_ADDRESS, "Mapped Address" },
|
|
|
- { STUN_RESPONSE_ADDRESS, "Response Address" },
|
|
|
- { STUN_CHANGE_ADDRESS, "Change Address" },
|
|
|
- { STUN_SOURCE_ADDRESS, "Source Address" },
|
|
|
- { STUN_CHANGED_ADDRESS, "Changed Address" },
|
|
|
- { STUN_USERNAME, "Username" },
|
|
|
- { STUN_PASSWORD, "Password" },
|
|
|
- { STUN_MESSAGE_INTEGRITY, "Message Integrity" },
|
|
|
- { STUN_ERROR_CODE, "Error Code" },
|
|
|
- { STUN_UNKNOWN_ATTRIBUTES, "Unknown Attributes" },
|
|
|
- { STUN_REFLECTED_FROM, "Reflected From" },
|
|
|
- { STUN_REALM, "Realm" },
|
|
|
- { STUN_NONCE, "Nonce" },
|
|
|
- { STUN_XOR_MAPPED_ADDRESS, "XOR Mapped Address" },
|
|
|
- { STUN_MS_VERSION, "MS Version" },
|
|
|
- { STUN_MS_XOR_MAPPED_ADDRESS, "MS XOR Mapped Address" },
|
|
|
- { STUN_SOFTWARE, "Software" },
|
|
|
- { STUN_ALTERNATE_SERVER, "Alternate Server" },
|
|
|
- { STUN_FINGERPRINT, "Fingerprint" },
|
|
|
- { 0, NULL }
|
|
|
-};
|
|
|
- int i;
|
|
|
-
|
|
|
- for (i = 0; attrs[i].name; i++) {
|
|
|
- if (attrs[i].value == msg)
|
|
|
- return attrs[i].name;
|
|
|
- }
|
|
|
- return "Unknown Attribute";
|
|
|
-}
|
|
|
-
|
|
|
-/* here we store credentials extracted from a message */
|
|
|
-struct stun_state {
|
|
|
- unsigned short attr;
|
|
|
-};
|
|
|
-
|
|
|
-static int stun_process_attr(struct stun_state *state, struct stun_attr *attr)
|
|
|
-{
|
|
|
- if (stun_debug)
|
|
|
- fprintf(stderr, "Found STUN Attribute %s (%04x), length %d\n",
|
|
|
- stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr), ntohs(attr->len));
|
|
|
- switch (ntohs(attr->attr)) {
|
|
|
- case STUN_MAPPED_ADDRESS:
|
|
|
- case STUN_XOR_MAPPED_ADDRESS:
|
|
|
- case STUN_MS_XOR_MAPPED_ADDRESS:
|
|
|
- break;
|
|
|
- default:
|
|
|
- if (stun_debug)
|
|
|
- fprintf(stderr, "Ignoring STUN Attribute %s (%04x), length %d\n",
|
|
|
- stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr), ntohs(attr->len));
|
|
|
- }
|
|
|
- return 0;
|
|
|
-}
|
|
|
-
|
|
|
-/* append a string to an STUN message */
|
|
|
-static void append_attr_string(struct stun_attr **attr, int attrval, const char *s, int *len, int *left)
|
|
|
-{
|
|
|
- int str_length = strlen(s);
|
|
|
- int attr_length = str_length + ((~(str_length - 1)) & 0x3);
|
|
|
- int size = sizeof(**attr) + attr_length;
|
|
|
- if (*left > size) {
|
|
|
- (*attr)->attr = htons(attrval);
|
|
|
- (*attr)->len = htons(attr_length);
|
|
|
- memcpy((*attr)->value, s, str_length);
|
|
|
- memset((*attr)->value + str_length, 0, attr_length - str_length);
|
|
|
- (*attr) = (struct stun_attr *)((*attr)->value + attr_length);
|
|
|
- *len += size;
|
|
|
- *left -= size;
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
-/* helper function to generate a random request id */
|
|
|
-static void stun_req_id(struct stun_header *req)
|
|
|
-{
|
|
|
- int x;
|
|
|
- srand(time(0));
|
|
|
- req->magic = htonl(STUN_MAGIC_COOKIE);
|
|
|
- for (x = 0; x < 3; x++)
|
|
|
- req->id.id[x] = rand();
|
|
|
-}
|
|
|
-
|
|
|
-/* callback type to be invoked on stun responses. */
|
|
|
-typedef int (stun_cb_f)(struct stun_state *st, struct stun_attr *attr, void *arg, unsigned int magic);
|
|
|
-
|
|
|
-/* handle an incoming STUN message.
|
|
|
- *
|
|
|
- * Do some basic sanity checks on packet size and content,
|
|
|
- * try to extract a bit of information, and possibly reply.
|
|
|
- * At the moment this only processes BIND requests, and returns
|
|
|
- * the externally visible address of the request.
|
|
|
- * If a callback is specified, invoke it with the attribute.
|
|
|
- */
|
|
|
-static int stun_handle_packet(unsigned char *data, size_t len, stun_cb_f *stun_cb, void *arg)
|
|
|
-{
|
|
|
- struct stun_header *hdr = (struct stun_header *)data;
|
|
|
- struct stun_attr *attr;
|
|
|
- struct stun_state st;
|
|
|
- int ret = STUN_IGNORE;
|
|
|
- int x;
|
|
|
-
|
|
|
- /* On entry, 'len' is the length of the udp payload. After the
|
|
|
- * initial checks it becomes the size of unprocessed options,
|
|
|
- * while 'data' is advanced accordingly.
|
|
|
- */
|
|
|
- if (len < sizeof(struct stun_header)) {
|
|
|
- fprintf(stderr, "Runt STUN packet (only %d, wanting at least %d)\n", (int) len, (int) sizeof(struct stun_header));
|
|
|
- return -1;
|
|
|
- }
|
|
|
- len -= sizeof(struct stun_header);
|
|
|
- data += sizeof(struct stun_header);
|
|
|
- x = ntohs(hdr->msglen); /* len as advertised in the message */
|
|
|
- if (stun_debug)
|
|
|
- fprintf(stderr, "STUN Packet, msg %s (%04x), length: %d\n", stun_msg2str(ntohs(hdr->msgtype)), ntohs(hdr->msgtype), x);
|
|
|
- if (x > len) {
|
|
|
- fprintf(stderr, "Scrambled STUN packet length (got %d, expecting %d)\n", x, (int)len);
|
|
|
- } else
|
|
|
- len = x;
|
|
|
- memset(&st,0, sizeof(st));
|
|
|
-
|
|
|
- while (len) {
|
|
|
- if (len < sizeof(struct stun_attr)) {
|
|
|
- fprintf(stderr, "Runt Attribute (got %d, expecting %d)\n", (int)len, (int) sizeof(struct stun_attr));
|
|
|
- break;
|
|
|
- }
|
|
|
- attr = (struct stun_attr *)data;
|
|
|
-
|
|
|
- /* compute total attribute length */
|
|
|
- x = ntohs(attr->len) + sizeof(struct stun_attr);
|
|
|
- if (x > len) {
|
|
|
- fprintf(stderr, "Inconsistent Attribute (length %d exceeds remaining msg len %d)\n", x, (int)len);
|
|
|
- break;
|
|
|
- }
|
|
|
- if (stun_cb)
|
|
|
- stun_cb(&st, attr, arg, hdr->magic);
|
|
|
- if (stun_process_attr(&st, attr)) {
|
|
|
- fprintf(stderr, "Failed to handle attribute %s (%04x)\n", stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr));
|
|
|
- break;
|
|
|
- }
|
|
|
- /* Clear attribute id: in case previous entry was a string,
|
|
|
- * this will act as the terminator for the string.
|
|
|
- */
|
|
|
- attr->attr = 0;
|
|
|
- data += x;
|
|
|
- len -= x;
|
|
|
- }
|
|
|
- /* Null terminate any string.
|
|
|
- * XXX NOTE, we write past the size of the buffer passed by the
|
|
|
- * caller, so this is potentially dangerous. The only thing that
|
|
|
- * saves us is that usually we read the incoming message in a
|
|
|
- * much larger buffer
|
|
|
- */
|
|
|
- *data = '\0';
|
|
|
-
|
|
|
- return ret;
|
|
|
-}
|
|
|
-
|
|
|
-/* Extract the STUN_MAPPED_ADDRESS from the stun response.
|
|
|
- * This is used as a callback for stun_handle_response
|
|
|
- * when called from stun_request.
|
|
|
- */
|
|
|
-static int stun_get_mapped(struct stun_state *st, struct stun_attr *attr, void *arg, unsigned int magic)
|
|
|
-{
|
|
|
- struct stun_addr *returned_addr = (struct stun_addr *)(attr + 1);
|
|
|
- struct sockaddr_in *sa = (struct sockaddr_in *)arg;
|
|
|
- unsigned short type = ntohs(attr->attr);
|
|
|
-
|
|
|
- switch (type) {
|
|
|
- case STUN_MAPPED_ADDRESS:
|
|
|
- if (st->attr == STUN_XOR_MAPPED_ADDRESS ||
|
|
|
- st->attr == STUN_MS_XOR_MAPPED_ADDRESS)
|
|
|
- return 1;
|
|
|
- magic = 0;
|
|
|
- break;
|
|
|
- case STUN_MS_XOR_MAPPED_ADDRESS:
|
|
|
- if (st->attr == STUN_XOR_MAPPED_ADDRESS)
|
|
|
- return 1;
|
|
|
- break;
|
|
|
- case STUN_XOR_MAPPED_ADDRESS:
|
|
|
- break;
|
|
|
- default:
|
|
|
- return 1;
|
|
|
- }
|
|
|
- if (ntohs(attr->len) < 8 && returned_addr->family != 1)
|
|
|
- return 1;
|
|
|
-
|
|
|
- st->attr = type;
|
|
|
- sa->sin_port = returned_addr->port ^ htons(ntohl(magic) >> 16);
|
|
|
- sa->sin_addr.s_addr = returned_addr->addr ^ magic;
|
|
|
- return 0;
|
|
|
-}
|
|
|
-
|
|
|
-/* Generic STUN request
|
|
|
- * Send a generic stun request to the server specified,
|
|
|
- * possibly waiting for a reply and filling the 'reply' field with
|
|
|
- * the externally visible address.
|
|
|
-
|
|
|
- * \param s the socket used to send the request
|
|
|
- * \return 0 on success, other values on error.
|
|
|
- */
|
|
|
-int stun_request(struct GNUNET_NETWORK_Handle * sock)
|
|
|
-{
|
|
|
- struct stun_header *req;
|
|
|
- unsigned char reqdata[1024];
|
|
|
- int reqlen, reqleft;
|
|
|
- struct stun_attr *attr;
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
- struct sockaddr_in server;
|
|
|
- struct hostent *hostinfo = gethostbyname(stun_server);
|
|
|
- if (!hostinfo) {
|
|
|
- fprintf(stderr, "Error resolving host %s\n", stun_server);
|
|
|
- return -1;
|
|
|
- }
|
|
|
- memset(&server,0, sizeof(server));
|
|
|
- server.sin_family = AF_INET;
|
|
|
- server.sin_addr = *(struct in_addr*) hostinfo->h_addr;
|
|
|
- server.sin_port = htons(stun_port);
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
- req = (struct stun_header *)reqdata;
|
|
|
- stun_req_id(req);
|
|
|
- reqlen = 0;
|
|
|
- reqleft = sizeof(reqdata) - sizeof(struct stun_header);
|
|
|
- req->msgtype = 0;
|
|
|
- req->msglen = 0;
|
|
|
- attr = (struct stun_attr *)req->ies;
|
|
|
-
|
|
|
- append_attr_string(&attr, STUN_SOFTWARE, PACKAGE " v" VERSION_PACKAGE, &reqlen, &reqleft);
|
|
|
- req->msglen = htons(reqlen);
|
|
|
- req->msgtype = htons(stun_msg2type(STUN_REQUEST, STUN_BINDING));
|
|
|
-
|
|
|
-
|
|
|
- if (-1 == GNUNET_NETWORK_socket_sendto (sock, req, ntohs(req->msglen) + sizeof(*req),
|
|
|
- (const struct sockaddr *) &server, sizeof (server)))
|
|
|
- {
|
|
|
- GNUNET_log_strerror (GNUNET_ERROR_TYPE_WARNING, "sendto");
|
|
|
- }
|
|
|
-
|
|
|
- return -1;
|
|
|
-}
|
|
|
-
|
|
|
-static void print_answer(struct sockaddr_in* answer)
|
|
|
-{
|
|
|
- printf("External IP is: %s , with port %d\n", inet_ntoa(answer->sin_addr), ntohs(answer->sin_port));
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
-/**
|
|
|
- * Activity on our incoming socket. Read data from the
|
|
|
- * incoming connection.
|
|
|
- *
|
|
|
- * @param cls
|
|
|
- * @param tc scheduler context
|
|
|
- */
|
|
|
-static void
|
|
|
-do_udp_read (void *cls,
|
|
|
- const struct GNUNET_SCHEDULER_TaskContext *tc)
|
|
|
-{
|
|
|
- //struct GNUNET_NAT_Test *tst = cls;
|
|
|
- unsigned char reply_buf[1024];
|
|
|
- ssize_t rlen;
|
|
|
- struct sockaddr_in answer;
|
|
|
-
|
|
|
-
|
|
|
- if ((0 != (tc->reason & GNUNET_SCHEDULER_REASON_READ_READY)) &&
|
|
|
- (GNUNET_NETWORK_fdset_isset (tc->read_ready,
|
|
|
- lsock4)))
|
|
|
- {
|
|
|
- rlen = GNUNET_NETWORK_socket_recv (lsock4, reply_buf, sizeof (reply_buf));
|
|
|
- printf("Recivied something of size %d", rlen);
|
|
|
-
|
|
|
- //Lets handle the packet
|
|
|
- memset(&answer, 0, sizeof(struct sockaddr_in));
|
|
|
- stun_handle_packet(reply_buf, rlen, stun_get_mapped, &answer);
|
|
|
- //Print the anser
|
|
|
- //TODO: Delete the object
|
|
|
- ret = 0;
|
|
|
- print_answer(&answer);
|
|
|
-
|
|
|
-
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
-/**
|
|
|
- * Create an IPv4 listen socket bound to our port.
|
|
|
- *
|
|
|
- * @return NULL on error
|
|
|
- */
|
|
|
-static struct GNUNET_NETWORK_Handle *
|
|
|
- bind_v4 ()
|
|
|
-{
|
|
|
- struct GNUNET_NETWORK_Handle *ls;
|
|
|
- struct sockaddr_in sa4;
|
|
|
- int eno;
|
|
|
-
|
|
|
- memset (&sa4, 0, sizeof (sa4));
|
|
|
- sa4.sin_family = AF_INET;
|
|
|
- sa4.sin_port = htons (port);
|
|
|
-#if HAVE_SOCKADDR_IN_SIN_LEN
|
|
|
- sa4.sin_len = sizeof (sa4);
|
|
|
-#endif
|
|
|
- ls = GNUNET_NETWORK_socket_create (AF_INET,
|
|
|
- SOCK_DGRAM,
|
|
|
- 0);
|
|
|
- if (NULL == ls)
|
|
|
- return NULL;
|
|
|
- if (GNUNET_OK !=
|
|
|
- GNUNET_NETWORK_socket_bind (ls, (const struct sockaddr *) &sa4,
|
|
|
- sizeof (sa4)))
|
|
|
- {
|
|
|
- eno = errno;
|
|
|
- GNUNET_NETWORK_socket_close (ls);
|
|
|
- errno = eno;
|
|
|
- return NULL;
|
|
|
- }
|
|
|
- return ls;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
-/**
|
|
|
- * Main function run with scheduler.
|
|
|
- */
|
|
|
-
|
|
|
-
|
|
|
-static void
|
|
|
-run (void *cls, char *const *args, const char *cfgfile,
|
|
|
- const struct GNUNET_CONFIGURATION_Handle *cfg)
|
|
|
-{
|
|
|
-
|
|
|
-
|
|
|
- //Lets create the socket
|
|
|
- lsock4 = bind_v4 ();
|
|
|
- if (NULL == lsock4)
|
|
|
- {
|
|
|
- GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, "bind");
|
|
|
- }
|
|
|
- else
|
|
|
- {
|
|
|
- printf("Binded, now will call add_read\n");
|
|
|
- //Lets call our function now when it accepts
|
|
|
- ltask4 = GNUNET_SCHEDULER_add_read_net (GNUNET_TIME_UNIT_FOREVER_REL,
|
|
|
- lsock4, &do_udp_read, NULL);
|
|
|
-
|
|
|
- }
|
|
|
- if(NULL == lsock4 )
|
|
|
- {
|
|
|
- GNUNET_SCHEDULER_shutdown ();
|
|
|
- return;
|
|
|
- }
|
|
|
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
|
|
- "Service listens on port %u\n",
|
|
|
- port);
|
|
|
- printf("Start main event\n");
|
|
|
- stun_request(lsock4);
|
|
|
- //Main event
|
|
|
- //main_task = GNUNET_SCHEDULER_add_delayed (timeout, &do_timeout, nh);
|
|
|
-
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
-int
|
|
|
-main (int argc, char *const argv[])
|
|
|
-{
|
|
|
- struct GNUNET_GETOPT_CommandLineOption options[] = {
|
|
|
- GNUNET_GETOPT_OPTION_END
|
|
|
- };
|
|
|
-
|
|
|
- char *const argv_prog[] = {
|
|
|
- "test-stun",
|
|
|
- NULL
|
|
|
- };
|
|
|
- GNUNET_log_setup ("test-stun",
|
|
|
- "WARNING",
|
|
|
- NULL);
|
|
|
-
|
|
|
- GNUNET_PROGRAM_run (1, argv_prog, "test-stun", "nohelp", options, &run, NULL);
|
|
|
-
|
|
|
- return ret;
|
|
|
-}
|
|
|
-
|
|
|
-/* end of test_nat.c */
|
|
|
+/*
|
|
|
+ This file is part of GNUnet.
|
|
|
+ Copyright (C) 2009, 2015 Christian Grothoff (and other contributing authors)
|
|
|
+
|
|
|
+ GNUnet is free software; you can redistribute it and/or modify
|
|
|
+ it under the terms of the GNU General Public License as published
|
|
|
+ by the Free Software Foundation; either version 3, or (at your
|
|
|
+ option) any later version.
|
|
|
+
|
|
|
+ GNUnet is distributed in the hope that it will be useful, but
|
|
|
+ WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
+ General Public License for more details.
|
|
|
+
|
|
|
+ You should have received a copy of the GNU General Public License
|
|
|
+ along with GNUnet; see the file COPYING. If not, write to the
|
|
|
+ Free Software Foundation, Inc., 59 Temple Place - Suite 330,
|
|
|
+ Boston, MA 02111-1307, USA.
|
|
|
+*/
|
|
|
+
|
|
|
+/**
|
|
|
+ * Testcase for STUN server resolution
|
|
|
+ *
|
|
|
+ * @file nat/test_stun.c
|
|
|
+ * @brief Testcase for STUN library
|
|
|
+ * @author Bruno Souza Cabral
|
|
|
+ * @autor Mark Spencer (Original code borrowed from Asterisk)
|
|
|
+ *
|
|
|
+ */
|
|
|
+
|
|
|
+
|
|
|
+#include "platform.h"
|
|
|
+#include "gnunet_util_lib.h"
|
|
|
+#include "gnunet_program_lib.h"
|
|
|
+#include "gnunet_scheduler_lib.h"
|
|
|
+#include "gnunet_nat_lib.h"
|
|
|
+
|
|
|
+
|
|
|
+#include "test_stun.h"
|
|
|
+
|
|
|
+
|
|
|
+/**
|
|
|
+ * The port the test service is running on (default 7895)
|
|
|
+ */
|
|
|
+static unsigned long port = 7895;
|
|
|
+
|
|
|
+static int ret = 1;
|
|
|
+
|
|
|
+/**
|
|
|
+ * The listen socket of the service for IPv4
|
|
|
+ */
|
|
|
+static struct GNUNET_NETWORK_Handle *lsock4;
|
|
|
+
|
|
|
+
|
|
|
+/**
|
|
|
+ * The listen task ID for IPv4
|
|
|
+ */
|
|
|
+static struct GNUNET_SCHEDULER_Task * ltask4;
|
|
|
+
|
|
|
+
|
|
|
+static char *stun_server = STUN_SERVER;
|
|
|
+static int stun_port = STUN_PORT;
|
|
|
+
|
|
|
+static int stun_debug = 1;
|
|
|
+
|
|
|
+
|
|
|
+struct stun_strings {
|
|
|
+ const int value;
|
|
|
+ const char *name;
|
|
|
+};
|
|
|
+
|
|
|
+
|
|
|
+static inline int stun_msg2class(int msg)
|
|
|
+{
|
|
|
+ return ((msg & 0x0010) >> 4) | ((msg & 0x0100) >> 7);
|
|
|
+}
|
|
|
+
|
|
|
+static inline int stun_msg2method(int msg)
|
|
|
+{
|
|
|
+ return (msg & 0x000f) | ((msg & 0x00e0) >> 1) | ((msg & 0x3e00) >> 2);
|
|
|
+}
|
|
|
+
|
|
|
+static inline int stun_msg2type(int class, int method)
|
|
|
+{
|
|
|
+ return ((class & 1) << 4) | ((class & 2) << 7) |
|
|
|
+ (method & 0x000f) | ((method & 0x0070) << 1) | ((method & 0x0f800) << 2);
|
|
|
+}
|
|
|
+
|
|
|
+/* helper function to print message names */
|
|
|
+static const char *stun_msg2str(int msg)
|
|
|
+{
|
|
|
+ static const struct stun_strings classes[] = {
|
|
|
+ { STUN_REQUEST, "Request" },
|
|
|
+ { STUN_INDICATION, "Indication" },
|
|
|
+ { STUN_RESPONSE, "Response" },
|
|
|
+ { STUN_ERROR_RESPONSE, "Error Response" },
|
|
|
+ { 0, NULL }
|
|
|
+};
|
|
|
+ static const struct stun_strings methods[] = {
|
|
|
+ { STUN_BINDING, "Binding" },
|
|
|
+ { 0, NULL }
|
|
|
+};
|
|
|
+ static char result[32];
|
|
|
+ const char *class = NULL, *method = NULL;
|
|
|
+ int i, value;
|
|
|
+
|
|
|
+ value = stun_msg2class(msg);
|
|
|
+ for (i = 0; classes[i].name; i++) {
|
|
|
+ class = classes[i].name;
|
|
|
+ if (classes[i].value == value)
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ value = stun_msg2method(msg);
|
|
|
+ for (i = 0; methods[i].name; i++) {
|
|
|
+ method = methods[i].name;
|
|
|
+ if (methods[i].value == value)
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ snprintf(result, sizeof(result), "%s %s",
|
|
|
+ method ? : "Unknown Method",
|
|
|
+ class ? : "Unknown Class Message");
|
|
|
+ return result;
|
|
|
+}
|
|
|
+
|
|
|
+/* helper function to print attribute names */
|
|
|
+static const char *stun_attr2str(int msg)
|
|
|
+{
|
|
|
+ static const struct stun_strings attrs[] = {
|
|
|
+ { STUN_MAPPED_ADDRESS, "Mapped Address" },
|
|
|
+ { STUN_RESPONSE_ADDRESS, "Response Address" },
|
|
|
+ { STUN_CHANGE_ADDRESS, "Change Address" },
|
|
|
+ { STUN_SOURCE_ADDRESS, "Source Address" },
|
|
|
+ { STUN_CHANGED_ADDRESS, "Changed Address" },
|
|
|
+ { STUN_USERNAME, "Username" },
|
|
|
+ { STUN_PASSWORD, "Password" },
|
|
|
+ { STUN_MESSAGE_INTEGRITY, "Message Integrity" },
|
|
|
+ { STUN_ERROR_CODE, "Error Code" },
|
|
|
+ { STUN_UNKNOWN_ATTRIBUTES, "Unknown Attributes" },
|
|
|
+ { STUN_REFLECTED_FROM, "Reflected From" },
|
|
|
+ { STUN_REALM, "Realm" },
|
|
|
+ { STUN_NONCE, "Nonce" },
|
|
|
+ { STUN_XOR_MAPPED_ADDRESS, "XOR Mapped Address" },
|
|
|
+ { STUN_MS_VERSION, "MS Version" },
|
|
|
+ { STUN_MS_XOR_MAPPED_ADDRESS, "MS XOR Mapped Address" },
|
|
|
+ { STUN_SOFTWARE, "Software" },
|
|
|
+ { STUN_ALTERNATE_SERVER, "Alternate Server" },
|
|
|
+ { STUN_FINGERPRINT, "Fingerprint" },
|
|
|
+ { 0, NULL }
|
|
|
+};
|
|
|
+ int i;
|
|
|
+
|
|
|
+ for (i = 0; attrs[i].name; i++) {
|
|
|
+ if (attrs[i].value == msg)
|
|
|
+ return attrs[i].name;
|
|
|
+ }
|
|
|
+ return "Unknown Attribute";
|
|
|
+}
|
|
|
+
|
|
|
+/* here we store credentials extracted from a message */
|
|
|
+struct stun_state {
|
|
|
+ unsigned short attr;
|
|
|
+};
|
|
|
+
|
|
|
+static int stun_process_attr(struct stun_state *state, struct stun_attr *attr)
|
|
|
+{
|
|
|
+ if (stun_debug)
|
|
|
+ fprintf(stderr, "Found STUN Attribute %s (%04x), length %d\n",
|
|
|
+ stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr), ntohs(attr->len));
|
|
|
+ switch (ntohs(attr->attr)) {
|
|
|
+ case STUN_MAPPED_ADDRESS:
|
|
|
+ case STUN_XOR_MAPPED_ADDRESS:
|
|
|
+ case STUN_MS_XOR_MAPPED_ADDRESS:
|
|
|
+ break;
|
|
|
+ default:
|
|
|
+ if (stun_debug)
|
|
|
+ fprintf(stderr, "Ignoring STUN Attribute %s (%04x), length %d\n",
|
|
|
+ stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr), ntohs(attr->len));
|
|
|
+ }
|
|
|
+ return 0;
|
|
|
+}
|
|
|
+
|
|
|
+/* append a string to an STUN message */
|
|
|
+static void append_attr_string(struct stun_attr **attr, int attrval, const char *s, int *len, int *left)
|
|
|
+{
|
|
|
+ int str_length = strlen(s);
|
|
|
+ int attr_length = str_length + ((~(str_length - 1)) & 0x3);
|
|
|
+ int size = sizeof(**attr) + attr_length;
|
|
|
+ if (*left > size) {
|
|
|
+ (*attr)->attr = htons(attrval);
|
|
|
+ (*attr)->len = htons(attr_length);
|
|
|
+ memcpy((*attr)->value, s, str_length);
|
|
|
+ memset((*attr)->value + str_length, 0, attr_length - str_length);
|
|
|
+ (*attr) = (struct stun_attr *)((*attr)->value + attr_length);
|
|
|
+ *len += size;
|
|
|
+ *left -= size;
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/* helper function to generate a random request id */
|
|
|
+static void stun_req_id(struct stun_header *req)
|
|
|
+{
|
|
|
+ int x;
|
|
|
+ srand(time(0));
|
|
|
+ req->magic = htonl(STUN_MAGIC_COOKIE);
|
|
|
+ for (x = 0; x < 3; x++)
|
|
|
+ req->id.id[x] = rand();
|
|
|
+}
|
|
|
+
|
|
|
+/* callback type to be invoked on stun responses. */
|
|
|
+typedef int (stun_cb_f)(struct stun_state *st, struct stun_attr *attr, void *arg, unsigned int magic);
|
|
|
+
|
|
|
+/* handle an incoming STUN message.
|
|
|
+ *
|
|
|
+ * Do some basic sanity checks on packet size and content,
|
|
|
+ * try to extract a bit of information, and possibly reply.
|
|
|
+ * At the moment this only processes BIND requests, and returns
|
|
|
+ * the externally visible address of the request.
|
|
|
+ * If a callback is specified, invoke it with the attribute.
|
|
|
+ */
|
|
|
+static int stun_handle_packet(unsigned char *data, size_t len, stun_cb_f *stun_cb, void *arg)
|
|
|
+{
|
|
|
+ struct stun_header *hdr = (struct stun_header *)data;
|
|
|
+ struct stun_attr *attr;
|
|
|
+ struct stun_state st;
|
|
|
+ int ret = STUN_IGNORE;
|
|
|
+ int x;
|
|
|
+
|
|
|
+ /* On entry, 'len' is the length of the udp payload. After the
|
|
|
+ * initial checks it becomes the size of unprocessed options,
|
|
|
+ * while 'data' is advanced accordingly.
|
|
|
+ */
|
|
|
+ if (len < sizeof(struct stun_header)) {
|
|
|
+ fprintf(stderr, "Runt STUN packet (only %d, wanting at least %d)\n", (int) len, (int) sizeof(struct stun_header));
|
|
|
+ return -1;
|
|
|
+ }
|
|
|
+ len -= sizeof(struct stun_header);
|
|
|
+ data += sizeof(struct stun_header);
|
|
|
+ x = ntohs(hdr->msglen); /* len as advertised in the message */
|
|
|
+ if (stun_debug)
|
|
|
+ fprintf(stderr, "STUN Packet, msg %s (%04x), length: %d\n", stun_msg2str(ntohs(hdr->msgtype)), ntohs(hdr->msgtype), x);
|
|
|
+ if (x > len) {
|
|
|
+ fprintf(stderr, "Scrambled STUN packet length (got %d, expecting %d)\n", x, (int)len);
|
|
|
+ } else
|
|
|
+ len = x;
|
|
|
+ memset(&st,0, sizeof(st));
|
|
|
+
|
|
|
+ while (len) {
|
|
|
+ if (len < sizeof(struct stun_attr)) {
|
|
|
+ fprintf(stderr, "Runt Attribute (got %d, expecting %d)\n", (int)len, (int) sizeof(struct stun_attr));
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ attr = (struct stun_attr *)data;
|
|
|
+
|
|
|
+ /* compute total attribute length */
|
|
|
+ x = ntohs(attr->len) + sizeof(struct stun_attr);
|
|
|
+ if (x > len) {
|
|
|
+ fprintf(stderr, "Inconsistent Attribute (length %d exceeds remaining msg len %d)\n", x, (int)len);
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ if (stun_cb)
|
|
|
+ stun_cb(&st, attr, arg, hdr->magic);
|
|
|
+ if (stun_process_attr(&st, attr)) {
|
|
|
+ fprintf(stderr, "Failed to handle attribute %s (%04x)\n", stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr));
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ /* Clear attribute id: in case previous entry was a string,
|
|
|
+ * this will act as the terminator for the string.
|
|
|
+ */
|
|
|
+ attr->attr = 0;
|
|
|
+ data += x;
|
|
|
+ len -= x;
|
|
|
+ }
|
|
|
+ /* Null terminate any string.
|
|
|
+ * XXX NOTE, we write past the size of the buffer passed by the
|
|
|
+ * caller, so this is potentially dangerous. The only thing that
|
|
|
+ * saves us is that usually we read the incoming message in a
|
|
|
+ * much larger buffer
|
|
|
+ */
|
|
|
+ *data = '\0';
|
|
|
+
|
|
|
+ return ret;
|
|
|
+}
|
|
|
+
|
|
|
+/* Extract the STUN_MAPPED_ADDRESS from the stun response.
|
|
|
+ * This is used as a callback for stun_handle_response
|
|
|
+ * when called from stun_request.
|
|
|
+ */
|
|
|
+static int stun_get_mapped(struct stun_state *st, struct stun_attr *attr, void *arg, unsigned int magic)
|
|
|
+{
|
|
|
+ struct stun_addr *returned_addr = (struct stun_addr *)(attr + 1);
|
|
|
+ struct sockaddr_in *sa = (struct sockaddr_in *)arg;
|
|
|
+ unsigned short type = ntohs(attr->attr);
|
|
|
+
|
|
|
+ switch (type) {
|
|
|
+ case STUN_MAPPED_ADDRESS:
|
|
|
+ if (st->attr == STUN_XOR_MAPPED_ADDRESS ||
|
|
|
+ st->attr == STUN_MS_XOR_MAPPED_ADDRESS)
|
|
|
+ return 1;
|
|
|
+ magic = 0;
|
|
|
+ break;
|
|
|
+ case STUN_MS_XOR_MAPPED_ADDRESS:
|
|
|
+ if (st->attr == STUN_XOR_MAPPED_ADDRESS)
|
|
|
+ return 1;
|
|
|
+ break;
|
|
|
+ case STUN_XOR_MAPPED_ADDRESS:
|
|
|
+ break;
|
|
|
+ default:
|
|
|
+ return 1;
|
|
|
+ }
|
|
|
+ if (ntohs(attr->len) < 8 && returned_addr->family != 1)
|
|
|
+ return 1;
|
|
|
+
|
|
|
+ st->attr = type;
|
|
|
+ sa->sin_port = returned_addr->port ^ htons(ntohl(magic) >> 16);
|
|
|
+ sa->sin_addr.s_addr = returned_addr->addr ^ magic;
|
|
|
+ return 0;
|
|
|
+}
|
|
|
+
|
|
|
+/* Generic STUN request
|
|
|
+ * Send a generic stun request to the server specified,
|
|
|
+ * possibly waiting for a reply and filling the 'reply' field with
|
|
|
+ * the externally visible address.
|
|
|
+
|
|
|
+ * \param s the socket used to send the request
|
|
|
+ * \return 0 on success, other values on error.
|
|
|
+ */
|
|
|
+int stun_request(struct GNUNET_NETWORK_Handle * sock)
|
|
|
+{
|
|
|
+ struct stun_header *req;
|
|
|
+ unsigned char reqdata[1024];
|
|
|
+ int reqlen, reqleft;
|
|
|
+ struct stun_attr *attr;
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+ struct sockaddr_in server;
|
|
|
+ struct hostent *hostinfo = gethostbyname(stun_server);
|
|
|
+ if (!hostinfo) {
|
|
|
+ fprintf(stderr, "Error resolving host %s\n", stun_server);
|
|
|
+ return -1;
|
|
|
+ }
|
|
|
+ memset(&server,0, sizeof(server));
|
|
|
+ server.sin_family = AF_INET;
|
|
|
+ server.sin_addr = *(struct in_addr*) hostinfo->h_addr;
|
|
|
+ server.sin_port = htons(stun_port);
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+ req = (struct stun_header *)reqdata;
|
|
|
+ stun_req_id(req);
|
|
|
+ reqlen = 0;
|
|
|
+ reqleft = sizeof(reqdata) - sizeof(struct stun_header);
|
|
|
+ req->msgtype = 0;
|
|
|
+ req->msglen = 0;
|
|
|
+ attr = (struct stun_attr *)req->ies;
|
|
|
+
|
|
|
+ append_attr_string(&attr, STUN_SOFTWARE, PACKAGE " v" VERSION_PACKAGE, &reqlen, &reqleft);
|
|
|
+ req->msglen = htons(reqlen);
|
|
|
+ req->msgtype = htons(stun_msg2type(STUN_REQUEST, STUN_BINDING));
|
|
|
+
|
|
|
+
|
|
|
+ if (-1 == GNUNET_NETWORK_socket_sendto (sock, req, ntohs(req->msglen) + sizeof(*req),
|
|
|
+ (const struct sockaddr *) &server, sizeof (server)))
|
|
|
+ {
|
|
|
+ GNUNET_log_strerror (GNUNET_ERROR_TYPE_WARNING, "sendto");
|
|
|
+ }
|
|
|
+
|
|
|
+ return -1;
|
|
|
+}
|
|
|
+
|
|
|
+static void print_answer(struct sockaddr_in* answer)
|
|
|
+{
|
|
|
+ printf("External IP is: %s , with port %d\n", inet_ntoa(answer->sin_addr), ntohs(answer->sin_port));
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/**
|
|
|
+ * Activity on our incoming socket. Read data from the
|
|
|
+ * incoming connection.
|
|
|
+ *
|
|
|
+ * @param cls
|
|
|
+ * @param tc scheduler context
|
|
|
+ */
|
|
|
+static void
|
|
|
+do_udp_read (void *cls,
|
|
|
+ const struct GNUNET_SCHEDULER_TaskContext *tc)
|
|
|
+{
|
|
|
+ //struct GNUNET_NAT_Test *tst = cls;
|
|
|
+ unsigned char reply_buf[1024];
|
|
|
+ ssize_t rlen;
|
|
|
+ struct sockaddr_in answer;
|
|
|
+
|
|
|
+
|
|
|
+ if ((0 != (tc->reason & GNUNET_SCHEDULER_REASON_READ_READY)) &&
|
|
|
+ (GNUNET_NETWORK_fdset_isset (tc->read_ready,
|
|
|
+ lsock4)))
|
|
|
+ {
|
|
|
+ rlen = GNUNET_NETWORK_socket_recv (lsock4, reply_buf, sizeof (reply_buf));
|
|
|
+ printf("Recivied something of size %d", rlen);
|
|
|
+
|
|
|
+ //Lets handle the packet
|
|
|
+ memset(&answer, 0, sizeof(struct sockaddr_in));
|
|
|
+ stun_handle_packet(reply_buf, rlen, stun_get_mapped, &answer);
|
|
|
+ //Print the anser
|
|
|
+ //TODO: Delete the object
|
|
|
+ ret = 0;
|
|
|
+ print_answer(&answer);
|
|
|
+
|
|
|
+
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/**
|
|
|
+ * Create an IPv4 listen socket bound to our port.
|
|
|
+ *
|
|
|
+ * @return NULL on error
|
|
|
+ */
|
|
|
+static struct GNUNET_NETWORK_Handle *
|
|
|
+ bind_v4 ()
|
|
|
+{
|
|
|
+ struct GNUNET_NETWORK_Handle *ls;
|
|
|
+ struct sockaddr_in sa4;
|
|
|
+ int eno;
|
|
|
+
|
|
|
+ memset (&sa4, 0, sizeof (sa4));
|
|
|
+ sa4.sin_family = AF_INET;
|
|
|
+ sa4.sin_port = htons (port);
|
|
|
+#if HAVE_SOCKADDR_IN_SIN_LEN
|
|
|
+ sa4.sin_len = sizeof (sa4);
|
|
|
+#endif
|
|
|
+ ls = GNUNET_NETWORK_socket_create (AF_INET,
|
|
|
+ SOCK_DGRAM,
|
|
|
+ 0);
|
|
|
+ if (NULL == ls)
|
|
|
+ return NULL;
|
|
|
+ if (GNUNET_OK !=
|
|
|
+ GNUNET_NETWORK_socket_bind (ls, (const struct sockaddr *) &sa4,
|
|
|
+ sizeof (sa4)))
|
|
|
+ {
|
|
|
+ eno = errno;
|
|
|
+ GNUNET_NETWORK_socket_close (ls);
|
|
|
+ errno = eno;
|
|
|
+ return NULL;
|
|
|
+ }
|
|
|
+ return ls;
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+/**
|
|
|
+ * Main function run with scheduler.
|
|
|
+ */
|
|
|
+
|
|
|
+
|
|
|
+static void
|
|
|
+run (void *cls, char *const *args, const char *cfgfile,
|
|
|
+ const struct GNUNET_CONFIGURATION_Handle *cfg)
|
|
|
+{
|
|
|
+
|
|
|
+
|
|
|
+ //Lets create the socket
|
|
|
+ lsock4 = bind_v4 ();
|
|
|
+ if (NULL == lsock4)
|
|
|
+ {
|
|
|
+ GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, "bind");
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ printf("Binded, now will call add_read\n");
|
|
|
+ //Lets call our function now when it accepts
|
|
|
+ ltask4 = GNUNET_SCHEDULER_add_read_net (GNUNET_TIME_UNIT_FOREVER_REL,
|
|
|
+ lsock4, &do_udp_read, NULL);
|
|
|
+
|
|
|
+ }
|
|
|
+ if(NULL == lsock4 )
|
|
|
+ {
|
|
|
+ GNUNET_SCHEDULER_shutdown ();
|
|
|
+ return;
|
|
|
+ }
|
|
|
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
|
|
+ "Service listens on port %u\n",
|
|
|
+ port);
|
|
|
+ printf("Start main event\n");
|
|
|
+ stun_request(lsock4);
|
|
|
+ //Main event
|
|
|
+ //main_task = GNUNET_SCHEDULER_add_delayed (timeout, &do_timeout, nh);
|
|
|
+
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+int
|
|
|
+main (int argc, char *const argv[])
|
|
|
+{
|
|
|
+ struct GNUNET_GETOPT_CommandLineOption options[] = {
|
|
|
+ GNUNET_GETOPT_OPTION_END
|
|
|
+ };
|
|
|
+
|
|
|
+ char *const argv_prog[] = {
|
|
|
+ "test-stun",
|
|
|
+ NULL
|
|
|
+ };
|
|
|
+ GNUNET_log_setup ("test-stun",
|
|
|
+ "WARNING",
|
|
|
+ NULL);
|
|
|
+
|
|
|
+ GNUNET_PROGRAM_run (1, argv_prog, "test-stun", "nohelp", options, &run, NULL);
|
|
|
+
|
|
|
+ return ret;
|
|
|
+}
|
|
|
+
|
|
|
+/* end of test_nat.c */
|