WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Affero General Public License for more details.
-
+
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
SPDX-License-Identifier: AGPL3.0-or-later
-*/
+ */
/**
* @file src/nat/gnunet-helper-nat-server-windows.c
*/
#define _GNU_SOURCE
/* Instead of including gnunet_common.h */
-#define GNUNET_memcpy(dst,src,n) do { if (0 != n) { (void) memcpy (dst,src,n); } } while (0)
+#define GNUNET_memcpy(dst, src, n) do { if (0 != n) { (void)memcpy(dst, src, n); } } while (0)
#define FD_SETSIZE 1024
#include <winsock2.h>
/**
* IPv4 header.
*/
-struct ip_header
-{
-
+struct ip_header {
/**
* Version (4 bits) + Internet header length (4 bits)
*/
/**
* Format of ICMP packet.
*/
-struct icmp_ttl_exceeded_header
-{
+struct icmp_ttl_exceeded_header {
uint8_t type;
uint8_t code;
/* followed by original payload */
};
-struct icmp_echo_header
-{
+struct icmp_echo_header {
uint8_t type;
uint8_t code;
/**
* Beginning of UDP packet.
*/
-struct udp_header
-{
+struct udp_header {
uint16_t src_port;
uint16_t dst_port;
* @return the CRC 16.
*/
static uint16_t
-calc_checksum (const uint16_t * data, unsigned int bytes)
+calc_checksum(const uint16_t * data, unsigned int bytes)
{
uint32_t sum;
unsigned int i;
for (i = 0; i < bytes / 2; i++)
sum += data[i];
sum = (sum & 0xffff) + (sum >> 16);
- sum = htons (0xffff - sum);
+ sum = htons(0xffff - sum);
return sum;
}
* @return 1 on success
*/
static int
-inet_pton (int af, const char *cp, struct in_addr *buf)
+inet_pton(int af, const char *cp, struct in_addr *buf)
{
- buf->s_addr = inet_addr (cp);
+ buf->s_addr = inet_addr(cp);
if (buf->s_addr == INADDR_NONE)
- {
- fprintf (stderr, "Error %d handling address %s", WSAGetLastError (), cp);
- return 0;
- }
+ {
+ fprintf(stderr, "Error %d handling address %s", WSAGetLastError(), cp);
+ return 0;
+ }
return 1;
}
* @param my_ip source address (our ip address)
*/
static void
-send_icmp_echo (const struct in_addr *my_ip)
+send_icmp_echo(const struct in_addr *my_ip)
{
- char packet[sizeof (struct ip_header) + sizeof (struct icmp_echo_header)];
+ char packet[sizeof(struct ip_header) + sizeof(struct icmp_echo_header)];
struct icmp_echo_header icmp_echo;
struct ip_header ip_pkt;
struct sockaddr_in dst;
off = 0;
ip_pkt.vers_ihl = 0x45;
ip_pkt.tos = 0;
- ip_pkt.pkt_len = htons (sizeof (packet));
- ip_pkt.id = htons (PACKET_ID);
+ ip_pkt.pkt_len = htons(sizeof(packet));
+ ip_pkt.id = htons(PACKET_ID);
ip_pkt.flags_frag_offset = 0;
ip_pkt.ttl = IPDEFTTL;
ip_pkt.proto = IPPROTO_ICMP;
ip_pkt.src_ip = my_ip->s_addr;
ip_pkt.dst_ip = dummy.s_addr;
ip_pkt.checksum =
- htons (calc_checksum ((uint16_t *) & ip_pkt, sizeof (struct ip_header)));
- GNUNET_memcpy (&packet[off], &ip_pkt, sizeof (struct ip_header));
- off += sizeof (struct ip_header);
+ htons(calc_checksum((uint16_t *)&ip_pkt, sizeof(struct ip_header)));
+ GNUNET_memcpy(&packet[off], &ip_pkt, sizeof(struct ip_header));
+ off += sizeof(struct ip_header);
icmp_echo.type = ICMP_ECHO;
icmp_echo.code = 0;
icmp_echo.reserved = 0;
icmp_echo.checksum = 0;
icmp_echo.checksum =
- htons (calc_checksum
- ((uint16_t *) & icmp_echo, sizeof (struct icmp_echo_header)));
- GNUNET_memcpy (&packet[off], &icmp_echo, sizeof (struct icmp_echo_header));
- off += sizeof (struct icmp_echo_header);
+ htons(calc_checksum
+ ((uint16_t *)&icmp_echo, sizeof(struct icmp_echo_header)));
+ GNUNET_memcpy(&packet[off], &icmp_echo, sizeof(struct icmp_echo_header));
+ off += sizeof(struct icmp_echo_header);
- memset (&dst, 0, sizeof (dst));
+ memset(&dst, 0, sizeof(dst));
dst.sin_family = AF_INET;
dst.sin_addr = dummy;
err =
- sendto (rawsock, packet, off, 0, (struct sockaddr *) &dst, sizeof (dst));
+ sendto(rawsock, packet, off, 0, (struct sockaddr *)&dst, sizeof(dst));
if (err < 0)
- {
+ {
#if VERBOSE
- fprintf (stderr, "sendto failed: %s\n", strerror (errno));
+ fprintf(stderr, "sendto failed: %s\n", strerror(errno));
#endif
- }
+ }
else if (err != off)
- {
- fprintf (stderr, "Error: partial send of ICMP message\n");
- }
+ {
+ fprintf(stderr, "Error: partial send of ICMP message\n");
+ }
}
* Send a UDP message to the dummy IP.
*/
static void
-send_udp ()
+send_udp()
{
struct sockaddr_in dst;
ssize_t err;
- memset (&dst, 0, sizeof (dst));
+ memset(&dst, 0, sizeof(dst));
dst.sin_family = AF_INET;
dst.sin_addr = dummy;
- dst.sin_port = htons (NAT_TRAV_PORT);
- err = sendto (udpsock, NULL, 0, 0, (struct sockaddr *) &dst, sizeof (dst));
+ dst.sin_port = htons(NAT_TRAV_PORT);
+ err = sendto(udpsock, NULL, 0, 0, (struct sockaddr *)&dst, sizeof(dst));
if (err < 0)
- {
+ {
#if VERBOSE
- fprintf (stderr, "sendto failed: %s\n", strerror (errno));
+ fprintf(stderr, "sendto failed: %s\n", strerror(errno));
#endif
- }
+ }
else if (0 != err)
- {
- fprintf (stderr, "Error: partial send of ICMP message\n");
- }
+ {
+ fprintf(stderr, "Error: partial send of ICMP message\n");
+ }
}
* We've received an ICMP response. Process it.
*/
static void
-process_icmp_response ()
+process_icmp_response()
{
char buf[65536];
ssize_t have;
uint16_t port;
DWORD ssize;
- have = read (icmpsock, buf, sizeof (buf));
+ have = read(icmpsock, buf, sizeof(buf));
if (have == -1)
- {
- fprintf (stderr, "Error reading raw socket: %s\n", strerror (errno));
- return;
- }
+ {
+ fprintf(stderr, "Error reading raw socket: %s\n", strerror(errno));
+ return;
+ }
#if VERBOSE
- fprintf (stderr, "Received message of %u bytes\n", (unsigned int) have);
+ fprintf(stderr, "Received message of %u bytes\n", (unsigned int)have);
#endif
if (have <
- (ssize_t) (sizeof (struct ip_header) +
- sizeof (struct icmp_ttl_exceeded_header) +
- sizeof (struct ip_header)))
- {
- /* malformed */
- return;
- }
+ (ssize_t)(sizeof(struct ip_header) +
+ sizeof(struct icmp_ttl_exceeded_header) +
+ sizeof(struct ip_header)))
+ {
+ /* malformed */
+ return;
+ }
off = 0;
- GNUNET_memcpy (&ip_pkt, &buf[off], sizeof (struct ip_header));
- off += sizeof (struct ip_header);
- GNUNET_memcpy (&source_ip, &ip_pkt.src_ip, sizeof (source_ip));
- GNUNET_memcpy (&icmp_ttl, &buf[off], sizeof (struct icmp_ttl_exceeded_header));
- off += sizeof (struct icmp_ttl_exceeded_header);
+ GNUNET_memcpy(&ip_pkt, &buf[off], sizeof(struct ip_header));
+ off += sizeof(struct ip_header);
+ GNUNET_memcpy(&source_ip, &ip_pkt.src_ip, sizeof(source_ip));
+ GNUNET_memcpy(&icmp_ttl, &buf[off], sizeof(struct icmp_ttl_exceeded_header));
+ off += sizeof(struct icmp_ttl_exceeded_header);
if ((ICMP_TIME_EXCEEDED != icmp_ttl.type) || (0 != icmp_ttl.code))
- {
- /* different type than what we want */
- return;
- }
- /* skip 2nd IP header */
- GNUNET_memcpy (&ip_pkt, &buf[off], sizeof (struct ip_header));
- off += sizeof (struct ip_header);
-
- switch (ip_pkt.proto)
- {
- case IPPROTO_ICMP:
- if (have !=
- (sizeof (struct ip_header) * 2 +
- sizeof (struct icmp_ttl_exceeded_header) +
- sizeof (struct icmp_echo_header)))
{
- /* malformed */
+ /* different type than what we want */
return;
}
- /* grab ICMP ECHO content */
- GNUNET_memcpy (&icmp_echo, &buf[off], sizeof (struct icmp_echo_header));
- port = (uint16_t) ntohl (icmp_echo.reserved);
- break;
- case IPPROTO_UDP:
- if (have !=
- (sizeof (struct ip_header) * 2 +
- sizeof (struct icmp_ttl_exceeded_header) + sizeof (struct udp_header)))
+ /* skip 2nd IP header */
+ GNUNET_memcpy(&ip_pkt, &buf[off], sizeof(struct ip_header));
+ off += sizeof(struct ip_header);
+
+ switch (ip_pkt.proto)
{
- /* malformed */
+ case IPPROTO_ICMP:
+ if (have !=
+ (sizeof(struct ip_header) * 2 +
+ sizeof(struct icmp_ttl_exceeded_header) +
+ sizeof(struct icmp_echo_header)))
+ {
+ /* malformed */
+ return;
+ }
+ /* grab ICMP ECHO content */
+ GNUNET_memcpy(&icmp_echo, &buf[off], sizeof(struct icmp_echo_header));
+ port = (uint16_t)ntohl(icmp_echo.reserved);
+ break;
+
+ case IPPROTO_UDP:
+ if (have !=
+ (sizeof(struct ip_header) * 2 +
+ sizeof(struct icmp_ttl_exceeded_header) + sizeof(struct udp_header)))
+ {
+ /* malformed */
+ return;
+ }
+ /* grab UDP content */
+ GNUNET_memcpy(&udp_pkt, &buf[off], sizeof(struct udp_header));
+ port = ntohs(udp_pkt.length);
+ break;
+
+ default:
+ /* different type than what we want */
return;
}
- /* grab UDP content */
- GNUNET_memcpy (&udp_pkt, &buf[off], sizeof (struct udp_header));
- port = ntohs (udp_pkt.length);
- break;
- default:
- /* different type than what we want */
- return;
- }
-
- ssize = sizeof (buf);
- WSAAddressToString ((LPSOCKADDR) & source_ip, sizeof (source_ip), NULL, buf,
- &ssize);
+
+ ssize = sizeof(buf);
+ WSAAddressToString((LPSOCKADDR)&source_ip, sizeof(source_ip), NULL, buf,
+ &ssize);
if (port == 0)
- fprintf (stdout, "%s\n", buf);
+ fprintf(stdout, "%s\n", buf);
else
- fprintf (stdout, "%s:%u\n", buf, (unsigned int) port);
- fflush (stdout);
+ fprintf(stdout, "%s:%u\n", buf, (unsigned int)port);
+ fflush(stdout);
}
* @return INVALID_SOCKET on error
*/
static SOCKET
-make_icmp_socket ()
+make_icmp_socket()
{
SOCKET ret;
- ret = socket (AF_INET, SOCK_RAW, IPPROTO_ICMP);
+ ret = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP);
if (INVALID_SOCKET == ret)
- {
- fprintf (stderr, "Error opening RAW socket: %s\n", strerror (errno));
- return INVALID_SOCKET;
- }
+ {
+ fprintf(stderr, "Error opening RAW socket: %s\n", strerror(errno));
+ return INVALID_SOCKET;
+ }
return ret;
}
* @return INVALID_SOCKET on error
*/
static SOCKET
-make_raw_socket ()
+make_raw_socket()
{
DWORD bOptVal = TRUE;
- int bOptLen = sizeof (bOptVal);
+ int bOptLen = sizeof(bOptVal);
- rawsock = socket (AF_INET, SOCK_RAW, IPPROTO_ICMP);
+ rawsock = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP);
if (INVALID_SOCKET == rawsock)
- {
- fprintf (stderr, "Error opening RAW socket: %s\n", strerror (errno));
- return INVALID_SOCKET;
- }
+ {
+ fprintf(stderr, "Error opening RAW socket: %s\n", strerror(errno));
+ return INVALID_SOCKET;
+ }
if (0 !=
- setsockopt (rawsock, SOL_SOCKET, SO_BROADCAST, (char *) &bOptVal,
- bOptLen))
- {
- fprintf (stderr, "Error setting SO_BROADCAST to ON: %s\n",
- strerror (errno));
- closesocket (rawsock);
- return INVALID_SOCKET;
- }
+ setsockopt(rawsock, SOL_SOCKET, SO_BROADCAST, (char *)&bOptVal,
+ bOptLen))
+ {
+ fprintf(stderr, "Error setting SO_BROADCAST to ON: %s\n",
+ strerror(errno));
+ closesocket(rawsock);
+ return INVALID_SOCKET;
+ }
if (0 !=
- setsockopt (rawsock, IPPROTO_IP, IP_HDRINCL, (char *) &bOptVal, bOptLen))
- {
- fprintf (stderr, "Error setting IP_HDRINCL to ON: %s\n", strerror (errno));
- closesocket (rawsock);
- return INVALID_SOCKET;
- }
+ setsockopt(rawsock, IPPROTO_IP, IP_HDRINCL, (char *)&bOptVal, bOptLen))
+ {
+ fprintf(stderr, "Error setting IP_HDRINCL to ON: %s\n", strerror(errno));
+ closesocket(rawsock);
+ return INVALID_SOCKET;
+ }
return rawsock;
}
* @return INVALID_SOCKET on error
*/
static SOCKET
-make_udp_socket (const struct in_addr *my_ip)
+make_udp_socket(const struct in_addr *my_ip)
{
SOCKET ret;
struct sockaddr_in addr;
- ret = socket (AF_INET, SOCK_DGRAM, 0);
+ ret = socket(AF_INET, SOCK_DGRAM, 0);
if (INVALID_SOCKET == ret)
- {
- fprintf (stderr, "Error opening UDP socket: %s\n", strerror (errno));
- return INVALID_SOCKET;
- }
- memset (&addr, 0, sizeof (addr));
+ {
+ fprintf(stderr, "Error opening UDP socket: %s\n", strerror(errno));
+ return INVALID_SOCKET;
+ }
+ memset(&addr, 0, sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_addr = *my_ip;
- addr.sin_port = htons (NAT_TRAV_PORT);
- if (0 != bind (ret, (struct sockaddr *) &addr, sizeof (addr)))
- {
- fprintf (stderr, "Error binding UDP socket to port %u: %s\n", NAT_TRAV_PORT,
- strerror (errno));
- /* likely problematic, but not certain, try to continue */
- }
+ addr.sin_port = htons(NAT_TRAV_PORT);
+ if (0 != bind(ret, (struct sockaddr *)&addr, sizeof(addr)))
+ {
+ fprintf(stderr, "Error binding UDP socket to port %u: %s\n", NAT_TRAV_PORT,
+ strerror(errno));
+ /* likely problematic, but not certain, try to continue */
+ }
return ret;
}
int
-main (int argc, char *const *argv)
+main(int argc, char *const *argv)
{
struct in_addr external;
fd_set rs;
WSADATA wsaData;
unsigned int alt = 0;
- if ( (argc > 1) && (0 != strcmp (argv[1], "-d")))
- {
- privilege_testing = TRUE;
- fprintf (stderr,
- "%s",
- "DEBUG: Running binary in privilege testing mode.");
- argv++;
- argc--;
- }
+ if ((argc > 1) && (0 != strcmp(argv[1], "-d")))
+ {
+ privilege_testing = TRUE;
+ fprintf(stderr,
+ "%s",
+ "DEBUG: Running binary in privilege testing mode.");
+ argv++;
+ argc--;
+ }
if (2 != argc)
- {
- fprintf (stderr,
- "This program must be started with our (internal NAT) IP as the only argument.\n");
- return 1;
- }
- if (1 != inet_pton (AF_INET, argv[1], &external))
- {
- fprintf (stderr, "Error parsing IPv4 address: %s, error %s\n", argv[1],
- strerror (errno));
- return 1;
- }
- if (1 != inet_pton (AF_INET, DUMMY_IP, &dummy))
- {
- fprintf (stderr, "Internal error converting dummy IP to binary.\n");
- return 2;
- }
- if (WSAStartup (MAKEWORD (2, 1), &wsaData) != 0)
- {
- fprintf (stderr, "Failed to find Winsock 2.1 or better.\n");
- return 2;
- }
- if (INVALID_SOCKET == (icmpsock = make_icmp_socket ()))
- {
- return 3;
- }
- if (INVALID_SOCKET == (make_raw_socket ()))
- {
- closesocket (icmpsock);
- return 3;
- }
- if (INVALID_SOCKET == (udpsock = make_udp_socket (&external)))
- {
- closesocket (icmpsock);
- closesocket (rawsock);
- return 3;
- }
-
- while ( ! privilege_testing)
- {
- FD_ZERO (&rs);
- FD_SET (icmpsock, &rs);
- tv.tv_sec = 0;
- tv.tv_usec = ICMP_SEND_FREQUENCY_MS * 1000;
- if (-1 == select (icmpsock + 1, &rs, NULL, NULL, &tv))
{
- if (errno == EINTR)
- continue;
- fprintf (stderr, "select failed: %s\n", strerror (errno));
- break;
+ fprintf(stderr,
+ "This program must be started with our (internal NAT) IP as the only argument.\n");
+ return 1;
+ }
+ if (1 != inet_pton(AF_INET, argv[1], &external))
+ {
+ fprintf(stderr, "Error parsing IPv4 address: %s, error %s\n", argv[1],
+ strerror(errno));
+ return 1;
+ }
+ if (1 != inet_pton(AF_INET, DUMMY_IP, &dummy))
+ {
+ fprintf(stderr, "Internal error converting dummy IP to binary.\n");
+ return 2;
+ }
+ if (WSAStartup(MAKEWORD(2, 1), &wsaData) != 0)
+ {
+ fprintf(stderr, "Failed to find Winsock 2.1 or better.\n");
+ return 2;
+ }
+ if (INVALID_SOCKET == (icmpsock = make_icmp_socket()))
+ {
+ return 3;
+ }
+ if (INVALID_SOCKET == (make_raw_socket()))
+ {
+ closesocket(icmpsock);
+ return 3;
+ }
+ if (INVALID_SOCKET == (udpsock = make_udp_socket(&external)))
+ {
+ closesocket(icmpsock);
+ closesocket(rawsock);
+ return 3;
+ }
+
+ while (!privilege_testing)
+ {
+ FD_ZERO(&rs);
+ FD_SET(icmpsock, &rs);
+ tv.tv_sec = 0;
+ tv.tv_usec = ICMP_SEND_FREQUENCY_MS * 1000;
+ if (-1 == select(icmpsock + 1, &rs, NULL, NULL, &tv))
+ {
+ if (errno == EINTR)
+ continue;
+ fprintf(stderr, "select failed: %s\n", strerror(errno));
+ break;
+ }
+ if (FD_ISSET(icmpsock, &rs))
+ process_icmp_response();
+ if (0 == (++alt % 2))
+ send_icmp_echo(&external);
+ else
+ send_udp();
}
- if (FD_ISSET (icmpsock, &rs))
- process_icmp_response ();
- if (0 == (++alt % 2))
- send_icmp_echo (&external);
- else
- send_udp ();
- }
/* select failed (internal error or OS out of resources) */
- closesocket (icmpsock);
- closesocket (rawsock);
- closesocket (udpsock);
- WSACleanup ();
+ closesocket(icmpsock);
+ closesocket(rawsock);
+ closesocket(udpsock);
+ WSACleanup();
if (privilege_testing)
return 0;
return 4;