2 This file is part of GNUnet.
3 Copyright (C) 2009, 2015 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * Testcase for STUN server resolution
24 * @file nat/test_stun.c
25 * @brief Testcase for STUN library
26 * @author Bruno Souza Cabral
27 * @autor Mark Spencer (Original code borrowed from Asterisk)
33 #include "gnunet_util_lib.h"
34 #include "gnunet_program_lib.h"
35 #include "gnunet_scheduler_lib.h"
36 #include "gnunet_nat_lib.h"
39 #include "test_stun.h"
43 * The port the test service is running on (default 7895)
45 static unsigned long port = 7895;
50 * The listen socket of the service for IPv4
52 static struct GNUNET_NETWORK_Handle *lsock4;
56 * The listen task ID for IPv4
58 static struct GNUNET_SCHEDULER_Task * ltask4;
61 static char *stun_server = STUN_SERVER;
62 static int stun_port = STUN_PORT;
64 static int stun_debug = 1;
73 static inline int stun_msg2class(int msg)
75 return ((msg & 0x0010) >> 4) | ((msg & 0x0100) >> 7);
78 static inline int stun_msg2method(int msg)
80 return (msg & 0x000f) | ((msg & 0x00e0) >> 1) | ((msg & 0x3e00) >> 2);
83 static inline int stun_msg2type(int class, int method)
85 return ((class & 1) << 4) | ((class & 2) << 7) |
86 (method & 0x000f) | ((method & 0x0070) << 1) | ((method & 0x0f800) << 2);
89 /* helper function to print message names */
90 static const char *stun_msg2str(int msg)
92 static const struct stun_strings classes[] = {
93 { STUN_REQUEST, "Request" },
94 { STUN_INDICATION, "Indication" },
95 { STUN_RESPONSE, "Response" },
96 { STUN_ERROR_RESPONSE, "Error Response" },
99 static const struct stun_strings methods[] = {
100 { STUN_BINDING, "Binding" },
103 static char result[32];
104 const char *class = NULL, *method = NULL;
107 value = stun_msg2class(msg);
108 for (i = 0; classes[i].name; i++) {
109 class = classes[i].name;
110 if (classes[i].value == value)
113 value = stun_msg2method(msg);
114 for (i = 0; methods[i].name; i++) {
115 method = methods[i].name;
116 if (methods[i].value == value)
119 snprintf(result, sizeof(result), "%s %s",
120 method ? : "Unknown Method",
121 class ? : "Unknown Class Message");
125 /* helper function to print attribute names */
126 static const char *stun_attr2str(int msg)
128 static const struct stun_strings attrs[] = {
129 { STUN_MAPPED_ADDRESS, "Mapped Address" },
130 { STUN_RESPONSE_ADDRESS, "Response Address" },
131 { STUN_CHANGE_ADDRESS, "Change Address" },
132 { STUN_SOURCE_ADDRESS, "Source Address" },
133 { STUN_CHANGED_ADDRESS, "Changed Address" },
134 { STUN_USERNAME, "Username" },
135 { STUN_PASSWORD, "Password" },
136 { STUN_MESSAGE_INTEGRITY, "Message Integrity" },
137 { STUN_ERROR_CODE, "Error Code" },
138 { STUN_UNKNOWN_ATTRIBUTES, "Unknown Attributes" },
139 { STUN_REFLECTED_FROM, "Reflected From" },
140 { STUN_REALM, "Realm" },
141 { STUN_NONCE, "Nonce" },
142 { STUN_XOR_MAPPED_ADDRESS, "XOR Mapped Address" },
143 { STUN_MS_VERSION, "MS Version" },
144 { STUN_MS_XOR_MAPPED_ADDRESS, "MS XOR Mapped Address" },
145 { STUN_SOFTWARE, "Software" },
146 { STUN_ALTERNATE_SERVER, "Alternate Server" },
147 { STUN_FINGERPRINT, "Fingerprint" },
152 for (i = 0; attrs[i].name; i++) {
153 if (attrs[i].value == msg)
154 return attrs[i].name;
156 return "Unknown Attribute";
159 /* here we store credentials extracted from a message */
164 static int stun_process_attr(struct stun_state *state, struct stun_attr *attr)
167 fprintf(stderr, "Found STUN Attribute %s (%04x), length %d\n",
168 stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr), ntohs(attr->len));
169 switch (ntohs(attr->attr)) {
170 case STUN_MAPPED_ADDRESS:
171 case STUN_XOR_MAPPED_ADDRESS:
172 case STUN_MS_XOR_MAPPED_ADDRESS:
176 fprintf(stderr, "Ignoring STUN Attribute %s (%04x), length %d\n",
177 stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr), ntohs(attr->len));
182 /* append a string to an STUN message */
183 static void append_attr_string(struct stun_attr **attr, int attrval, const char *s, int *len, int *left)
185 int str_length = strlen(s);
186 int attr_length = str_length + ((~(str_length - 1)) & 0x3);
187 int size = sizeof(**attr) + attr_length;
189 (*attr)->attr = htons(attrval);
190 (*attr)->len = htons(attr_length);
191 memcpy((*attr)->value, s, str_length);
192 memset((*attr)->value + str_length, 0, attr_length - str_length);
193 (*attr) = (struct stun_attr *)((*attr)->value + attr_length);
200 /* helper function to generate a random request id */
201 static void stun_req_id(struct stun_header *req)
205 req->magic = htonl(STUN_MAGIC_COOKIE);
206 for (x = 0; x < 3; x++)
207 req->id.id[x] = rand();
210 /* callback type to be invoked on stun responses. */
211 typedef int (stun_cb_f)(struct stun_state *st, struct stun_attr *attr, void *arg, unsigned int magic);
213 /* handle an incoming STUN message.
215 * Do some basic sanity checks on packet size and content,
216 * try to extract a bit of information, and possibly reply.
217 * At the moment this only processes BIND requests, and returns
218 * the externally visible address of the request.
219 * If a callback is specified, invoke it with the attribute.
221 static int stun_handle_packet(unsigned char *data, size_t len, stun_cb_f *stun_cb, void *arg)
223 struct stun_header *hdr = (struct stun_header *)data;
224 struct stun_attr *attr;
225 struct stun_state st;
226 int ret = STUN_IGNORE;
229 /* On entry, 'len' is the length of the udp payload. After the
230 * initial checks it becomes the size of unprocessed options,
231 * while 'data' is advanced accordingly.
233 if (len < sizeof(struct stun_header)) {
234 fprintf(stderr, "Runt STUN packet (only %d, wanting at least %d)\n", (int) len, (int) sizeof(struct stun_header));
237 len -= sizeof(struct stun_header);
238 data += sizeof(struct stun_header);
239 x = ntohs(hdr->msglen); /* len as advertised in the message */
241 fprintf(stderr, "STUN Packet, msg %s (%04x), length: %d\n", stun_msg2str(ntohs(hdr->msgtype)), ntohs(hdr->msgtype), x);
243 fprintf(stderr, "Scrambled STUN packet length (got %d, expecting %d)\n", x, (int)len);
246 memset(&st,0, sizeof(st));
249 if (len < sizeof(struct stun_attr)) {
250 fprintf(stderr, "Runt Attribute (got %d, expecting %d)\n", (int)len, (int) sizeof(struct stun_attr));
253 attr = (struct stun_attr *)data;
255 /* compute total attribute length */
256 x = ntohs(attr->len) + sizeof(struct stun_attr);
258 fprintf(stderr, "Inconsistent Attribute (length %d exceeds remaining msg len %d)\n", x, (int)len);
262 stun_cb(&st, attr, arg, hdr->magic);
263 if (stun_process_attr(&st, attr)) {
264 fprintf(stderr, "Failed to handle attribute %s (%04x)\n", stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr));
267 /* Clear attribute id: in case previous entry was a string,
268 * this will act as the terminator for the string.
274 /* Null terminate any string.
275 * XXX NOTE, we write past the size of the buffer passed by the
276 * caller, so this is potentially dangerous. The only thing that
277 * saves us is that usually we read the incoming message in a
285 /* Extract the STUN_MAPPED_ADDRESS from the stun response.
286 * This is used as a callback for stun_handle_response
287 * when called from stun_request.
289 static int stun_get_mapped(struct stun_state *st, struct stun_attr *attr, void *arg, unsigned int magic)
291 struct stun_addr *returned_addr = (struct stun_addr *)(attr + 1);
292 struct sockaddr_in *sa = (struct sockaddr_in *)arg;
293 unsigned short type = ntohs(attr->attr);
296 case STUN_MAPPED_ADDRESS:
297 if (st->attr == STUN_XOR_MAPPED_ADDRESS ||
298 st->attr == STUN_MS_XOR_MAPPED_ADDRESS)
302 case STUN_MS_XOR_MAPPED_ADDRESS:
303 if (st->attr == STUN_XOR_MAPPED_ADDRESS)
306 case STUN_XOR_MAPPED_ADDRESS:
311 if (ntohs(attr->len) < 8 && returned_addr->family != 1)
315 sa->sin_port = returned_addr->port ^ htons(ntohl(magic) >> 16);
316 sa->sin_addr.s_addr = returned_addr->addr ^ magic;
320 /* Generic STUN request
321 * Send a generic stun request to the server specified,
322 * possibly waiting for a reply and filling the 'reply' field with
323 * the externally visible address.
325 * \param s the socket used to send the request
326 * \return 0 on success, other values on error.
328 int stun_request(struct GNUNET_NETWORK_Handle * sock)
330 struct stun_header *req;
331 unsigned char reqdata[1024];
333 struct stun_attr *attr;
338 struct sockaddr_in server;
339 struct hostent *hostinfo = gethostbyname(stun_server);
341 fprintf(stderr, "Error resolving host %s\n", stun_server);
344 memset(&server,0, sizeof(server));
345 server.sin_family = AF_INET;
346 server.sin_addr = *(struct in_addr*) hostinfo->h_addr;
347 server.sin_port = htons(stun_port);
351 req = (struct stun_header *)reqdata;
354 reqleft = sizeof(reqdata) - sizeof(struct stun_header);
357 attr = (struct stun_attr *)req->ies;
359 append_attr_string(&attr, STUN_SOFTWARE, PACKAGE " v" VERSION_PACKAGE, &reqlen, &reqleft);
360 req->msglen = htons(reqlen);
361 req->msgtype = htons(stun_msg2type(STUN_REQUEST, STUN_BINDING));
364 if (-1 == GNUNET_NETWORK_socket_sendto (sock, req, ntohs(req->msglen) + sizeof(*req),
365 (const struct sockaddr *) &server, sizeof (server)))
367 GNUNET_log_strerror (GNUNET_ERROR_TYPE_WARNING, "sendto");
373 static void print_answer(struct sockaddr_in* answer)
375 printf("External IP is: %s , with port %d\n", inet_ntoa(answer->sin_addr), ntohs(answer->sin_port));
380 * Activity on our incoming socket. Read data from the
381 * incoming connection.
384 * @param tc scheduler context
387 do_udp_read (void *cls,
388 const struct GNUNET_SCHEDULER_TaskContext *tc)
390 //struct GNUNET_NAT_Test *tst = cls;
391 unsigned char reply_buf[1024];
393 struct sockaddr_in answer;
396 if ((0 != (tc->reason & GNUNET_SCHEDULER_REASON_READ_READY)) &&
397 (GNUNET_NETWORK_fdset_isset (tc->read_ready,
400 rlen = GNUNET_NETWORK_socket_recv (lsock4, reply_buf, sizeof (reply_buf));
401 printf("Recivied something of size %d", rlen);
403 //Lets handle the packet
404 memset(&answer, 0, sizeof(struct sockaddr_in));
405 stun_handle_packet(reply_buf, rlen, stun_get_mapped, &answer);
407 //TODO: Delete the object
409 print_answer(&answer);
417 * Create an IPv4 listen socket bound to our port.
419 * @return NULL on error
421 static struct GNUNET_NETWORK_Handle *
424 struct GNUNET_NETWORK_Handle *ls;
425 struct sockaddr_in sa4;
428 memset (&sa4, 0, sizeof (sa4));
429 sa4.sin_family = AF_INET;
430 sa4.sin_port = htons (port);
431 #if HAVE_SOCKADDR_IN_SIN_LEN
432 sa4.sin_len = sizeof (sa4);
434 ls = GNUNET_NETWORK_socket_create (AF_INET,
440 GNUNET_NETWORK_socket_bind (ls, (const struct sockaddr *) &sa4,
444 GNUNET_NETWORK_socket_close (ls);
454 * Main function run with scheduler.
459 run (void *cls, char *const *args, const char *cfgfile,
460 const struct GNUNET_CONFIGURATION_Handle *cfg)
464 //Lets create the socket
468 GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, "bind");
472 printf("Binded, now will call add_read\n");
473 //Lets call our function now when it accepts
474 ltask4 = GNUNET_SCHEDULER_add_read_net (GNUNET_TIME_UNIT_FOREVER_REL,
475 lsock4, &do_udp_read, NULL);
480 GNUNET_SCHEDULER_shutdown ();
483 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
484 "Service listens on port %u\n",
486 printf("Start main event\n");
487 stun_request(lsock4);
489 //main_task = GNUNET_SCHEDULER_add_delayed (timeout, &do_timeout, nh);
495 main (int argc, char *const argv[])
497 struct GNUNET_GETOPT_CommandLineOption options[] = {
498 GNUNET_GETOPT_OPTION_END
501 char *const argv_prog[] = {
505 GNUNET_log_setup ("test-stun",
509 GNUNET_PROGRAM_run (1, argv_prog, "test-stun", "nohelp", options, &run, NULL);
514 /* end of test_nat.c */