Refactor SOCKS socket code

Separate sending cmd and receiving reply out as they are shared in
procedures.
Change returns of start* method.
pull/1857/head
myl7 2021-12-28 16:33:35 +08:00
parent ddabffd443
commit 6ab8af1ef5
No known key found for this signature in database
GPG Key ID: 04F1013B67177C88
3 changed files with 75 additions and 56 deletions

View File

@ -63,15 +63,15 @@ bool DHTConnectionSocksProxyImpl::startProxy(const std::string& host,
// Authentication negotiation
bool noAuth = user.empty() || passwd.empty();
if (noAuth) {
int authMethod =
socket_->negotiateAuth(std::vector<uint8_t>{SOCKS_AUTH_NO_AUTH});
int authMethod = socket_->negotiateAuth(
std::vector<SocksProxyAuthMethod>{SOCKS_AUTH_NO_AUTH});
if (authMethod < 0) {
return false;
}
}
else {
int authMethod = socket_->negotiateAuth(
std::vector<uint8_t>{SOCKS_AUTH_NO_AUTH, SOCKS_AUTH_USERPASS});
int authMethod = socket_->negotiateAuth(std::vector<SocksProxyAuthMethod>{
SOCKS_AUTH_NO_AUTH, SOCKS_AUTH_USERPASS});
if (authMethod < 0) {
return false;
}
@ -86,9 +86,9 @@ bool DHTConnectionSocksProxyImpl::startProxy(const std::string& host,
}
// UDP associate
ssize_t i = socket_->startUdpAssociate(listenAddr, listenPort,
std::make_pair(&bndAddr_, &bndPort_));
if (i < 0) {
int i =
socket_->startUdpAssociate(listenAddr, listenPort, bndAddr_, bndPort_);
if (i != 0) {
return false;
}
return true;

View File

@ -45,15 +45,17 @@ const char C_SOCKS_VER = '\x05';
const char C_AUTH_NONE = '\xff';
const char C_AUTH_USERPASS_VER = '\x01';
const char C_AUTH_USERPASS_OK = '\x00';
const char C_CMD_UDP_ASSOCIATE = '\x03';
const char C_ADDR_INET = '\x01';
const char C_ADDR_DOMAIN = '\x03';
const char C_ADDR_INET6 = '\x04';
const char C_OK = '\x00';
} // namespace
namespace aria2 {
enum SocksProxyAddrType {
SOCKS_ADDR_INET = 1,
SOCKS_ADDR_DOMAIN = 3,
SOCKS_ADDR_INET6 = 4,
};
SocksProxySocket::SocksProxySocket(int family) : family_(family) {}
SocksProxySocket::~SocksProxySocket() = default;
@ -70,13 +72,13 @@ void SocksProxySocket::establish(std::unique_ptr<SocketCore> socket)
socket_ = std::move(socket);
}
int SocksProxySocket::negotiateAuth(std::vector<uint8_t> expected)
int SocksProxySocket::negotiateAuth(std::vector<SocksProxyAuthMethod> expected)
{
std::stringstream req;
req << C_SOCKS_VER;
req << static_cast<char>(expected.size());
for (auto c : expected) {
req << c;
req << static_cast<char>(c);
}
socket_->writeData(req.str());
@ -109,77 +111,81 @@ char SocksProxySocket::authByUserpass(const std::string& user,
return res[1];
}
ssize_t
SocksProxySocket::startUdpAssociate(const std::string& listenAddr,
uint16_t listenPort,
std::pair<std::string*, uint16_t*> bnd)
void SocksProxySocket::sendCmd(SocksProxyCmd cmd, const std::string& dstAddr,
uint16_t dstPort, bool allowEmpty)
{
std::stringstream req;
req << C_SOCKS_VER << C_CMD_UDP_ASSOCIATE << '\x00';
req << C_SOCKS_VER << static_cast<char>(cmd) << '\x00';
if (family_ == AF_INET) {
if (!listenAddr.empty()) {
if (!allowEmpty || !dstAddr.empty()) {
char addrBuf[10];
net::getBinAddr(addrBuf, listenAddr);
req << C_ADDR_INET << std::string(addrBuf, 4);
net::getBinAddr(addrBuf, dstAddr);
req << static_cast<char>(SOCKS_ADDR_INET) << std::string(addrBuf, 4);
}
else {
req << std::string(4, '\x00');
}
}
else {
if (!listenAddr.empty()) {
if (!allowEmpty || !dstAddr.empty()) {
char addrBuf[20];
net::getBinAddr(addrBuf, listenAddr);
req << C_ADDR_INET6 << std::string(addrBuf, 16);
net::getBinAddr(addrBuf, dstAddr);
req << static_cast<char>(SOCKS_ADDR_INET6) << std::string(addrBuf, 16);
}
else {
req << std::string(16, '\x00');
}
}
if (listenPort) {
uint16_t listenPortBuf = htons(listenPort);
if (dstPort) {
uint16_t listenPortBuf = htons(dstPort);
req << std::string(reinterpret_cast<const char*>(&listenPortBuf), 2);
}
else {
req << std::string(2, '\x00');
}
socket_->writeData(req.str());
}
int SocksProxySocket::receiveReply(int& bndFamily, std::string& bndAddr,
uint16_t& bndPort)
{
char res[5];
size_t resLen = sizeof(res);
socket_->readData(res, resLen);
if (res[1] != C_OK) {
int rep = res[1];
if (rep != C_OK) {
socket_->closeConnection();
return -1;
return rep;
}
std::string bndAddr;
uint16_t bndPort;
if (res[3] == C_ADDR_INET) {
if (res[3] == SOCKS_ADDR_INET) {
char addrBuf[6];
addrBuf[0] = res[4];
size_t addrLen = sizeof(addrBuf) - 1;
socket_->readData(addrBuf + 1, addrLen);
char addrStrBuf[20];
inetNtop(AF_INET, addrBuf, addrStrBuf, 20);
bndFamily = AF_INET;
bndAddr = std::string(addrStrBuf);
bndPort = ntohs(*reinterpret_cast<uint16_t*>(addrBuf + 4));
}
else if (res[3] == C_ADDR_INET6) {
else if (res[3] == SOCKS_ADDR_INET6) {
char addrBuf[18];
addrBuf[0] = res[4];
size_t addrLen = sizeof(addrBuf) - 1;
socket_->readData(addrBuf + 1, addrLen);
char addrStrBuf[50];
inetNtop(AF_INET6, addrBuf, addrStrBuf, 50);
bndFamily = AF_INET6;
bndAddr = std::string(addrStrBuf);
bndPort = ntohs(*reinterpret_cast<uint16_t*>(addrBuf + 16));
}
else if (res[3] == C_ADDR_DOMAIN) {
else if (res[3] == SOCKS_ADDR_DOMAIN) {
// 2 more bytes to hold port temporarily.
size_t resLen = res[4] + 2;
bndAddr = std::string(resLen, '\x00');
socket_->readData(&bndAddr[0], resLen);
bndFamily = AF_INET + AF_INET6;
bndPort = ntohs(*reinterpret_cast<uint16_t*>(&bndAddr[0] + res[4]));
bndAddr.resize(res[4]);
}
@ -187,15 +193,26 @@ SocksProxySocket::startUdpAssociate(const std::string& listenAddr,
socket_->closeConnection();
return -1;
}
return rep;
}
ssize_t i = static_cast<ssize_t>(bndAddrs_.size());
bndAddrs_.push_back(bndAddr);
bndPorts_.push_back(bndPort);
if (bnd.first && bnd.second) {
*(bnd.first) = bndAddr;
*(bnd.second) = bndPort;
int SocksProxySocket::startUdpAssociate(const std::string& listenAddr,
uint16_t listenPort,
std::string& bndAddr, uint16_t& bndPort)
{
sendCmd(SOCKS_CMD_UDP_ASSOCIATE, listenAddr, listenPort, true);
int bFamily;
std::string bAddr;
uint16_t bPort;
int rep = receiveReply(bFamily, bAddr, bPort);
if (rep != C_OK) {
return rep;
}
return i;
bndAddr = bAddr;
bndPort = bPort;
return rep;
}
} // namespace aria2

View File

@ -58,8 +58,20 @@ private:
// The socket is not shared because as it is used as some kind of controller,
// when it is closed, all related proxy connections are closed.
std::unique_ptr<SocketCore> socket_;
std::vector<std::string> bndAddrs_;
std::vector<uint16_t> bndPorts_;
enum SocksProxyCmd {
SOCKS_CMD_CONNECT = 1,
SOCKS_CMD_BIND = 2,
SOCKS_CMD_UDP_ASSOCIATE = 3,
};
// When allowEmtpy is true, allow dst* to be empty.
void sendCmd(SocksProxyCmd cmd, const std::string& dstAddr, uint16_t dstPort,
bool allowEmpty);
// Returns status replied from proxy server. 0 is OK. > 0 with error messages.
// < 0 for invalid replies from server.
// bndFamily may be AF_INET + AF_INET6 to indicate domain format.
int receiveReply(int& bndFamily, std::string& bndAddr, uint16_t& bndPort);
public:
SocksProxySocket(int family);
@ -75,10 +87,8 @@ public:
// Negotiate authentication that returns selected auth method in 0-255.
// When no auth method is selected, return -1.
// Auth methods in expected should be from enum SocksProxyAuthMethod,
// which has its auth handlers.
// Returned auth method SHOULD be in expected but it is not checked.
int negotiateAuth(std::vector<uint8_t> expected);
int negotiateAuth(std::vector<SocksProxyAuthMethod> expected);
// Username/Password authentication.
// user and pass should not be empty.
@ -87,17 +97,9 @@ public:
// Create an UDP association to start UDP proxy.
// Leave listen host and port empty / 0 to indicate no receiving from proxy.
// Returns -1 when error, otherwise the index to get the bnd addr and port.
// Set bndAddrPtr and bndPortPtr to directly get the result bnd addr and port.
ssize_t startUdpAssociate(const std::string& listenAddr, uint16_t listenPort,
std::pair<std::string*, uint16_t*> bnd = {});
// Get bnd addr and port via index i.
// i is not checked and should be got from start*Proxy methods.
std::pair<std::string, uint16_t> getBnd(size_t i)
{
return std::make_pair(bndAddrs_[i], bndPorts_[i]);
}
// Returns status replied from proxy server. 0 is OK.
int startUdpAssociate(const std::string& listenAddr, uint16_t listenPort,
std::string& bndAddr, uint16_t& bndPort);
};
} // namespace aria2