/* $Id$ */ /* * Copyright (C) 2003-2007 Benny Prijono * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ #include #include #include #define THIS_FILE "client_main.c" #define LOCAL_PORT 1998 #define BANDWIDTH 64 /* -1 to disable */ #define LIFETIME 600 /* -1 to disable */ #define REQ_TRANSPORT -1 /* 0: udp, 1: tcp, -1: disable */ #define REQ_PORT_PROPS -1 /* -1 to disable */ #define REQ_IP 0 /* IP address string */ //#define OPTIONS PJ_STUN_NO_AUTHENTICATE #define OPTIONS 0 static struct global { pj_stun_config stun_config; pj_pool_t *pool; pj_caching_pool cp; pj_timer_heap_t *th; pj_stun_session *sess; pj_sock_t sock; pj_sock_t peer_sock; pj_thread_t *thread; pj_bool_t quit; pj_sockaddr_in peer_addr; pj_sockaddr_in srv_addr; pj_sockaddr_in relay_addr; char data_buf[256]; char *data; pj_bool_t detect; pj_status_t detect_result; } g; static struct options { char *srv_addr; char *srv_port; char *realm; char *user_name; char *password; char *nonce; char *peer_addr; pj_bool_t use_fingerprint; } o; static pj_status_t parse_addr(const char *input, pj_sockaddr_in *addr); static void my_perror(const char *title, pj_status_t status) { char errmsg[PJ_ERR_MSG_SIZE]; pj_strerror(status, errmsg, sizeof(errmsg)); PJ_LOG(3,(THIS_FILE, "%s: %s", title, errmsg)); } static pj_status_t on_send_msg(pj_stun_session *sess, const void *pkt, pj_size_t pkt_size, const pj_sockaddr_t *srv_addr, unsigned addr_len) { pj_ssize_t len; pj_status_t status; len = pkt_size; status = pj_sock_sendto(g.sock, pkt, &len, 0, srv_addr, addr_len); if (status != PJ_SUCCESS) my_perror("Error sending packet", status); return status; } static void on_request_complete(pj_stun_session *sess, pj_status_t status, pj_stun_tx_data *tdata, const pj_stun_msg *response, const pj_sockaddr_t *src_addr, unsigned src_addr_len) { PJ_UNUSED_ARG(src_addr); PJ_UNUSED_ARG(src_addr_len); if (status == PJ_SUCCESS) { switch (response->hdr.type) { case PJ_STUN_ALLOCATE_RESPONSE: { pj_stun_relay_addr_attr *ar; pj_stun_lifetime_attr *al; al = (pj_stun_lifetime_attr*) pj_stun_msg_find_attr(response, PJ_STUN_ATTR_LIFETIME, 0); if (!al) { PJ_LOG(1,(THIS_FILE, "Error: LIFETIME attribute not present")); return; } ar = (pj_stun_relay_addr_attr*) pj_stun_msg_find_attr(response, PJ_STUN_ATTR_RELAY_ADDR, 0); if (ar) { pj_memcpy(&g.relay_addr, &ar->sockaddr.ipv4, sizeof(pj_sockaddr_in)); PJ_LOG(3,(THIS_FILE, "Relay address is %s:%d", pj_inet_ntoa(g.relay_addr.sin_addr), (int)pj_ntohs(g.relay_addr.sin_port))); } else { pj_memset(&g.relay_addr, 0, sizeof(g.relay_addr)); } if (al->value == 0) { PJ_LOG(3,(THIS_FILE, "Relay deallocated")); } } break; } } else { my_perror("Client transaction error", status); } } static int worker_thread(void *unused) { PJ_UNUSED_ARG(unused); while (!g.quit) { pj_time_val timeout = {0, 50}; pj_fd_set_t readset; int n; pj_timer_heap_poll(g.th, NULL); pj_ioqueue_poll(g.stun_config.ioqueue, &timeout); PJ_FD_ZERO(&readset); PJ_FD_SET(g.sock, &readset); PJ_FD_SET(g.peer_sock, &readset); n = (g.peer_sock > g.sock) ? g.peer_sock : g.sock; n = pj_sock_select(n+1, &readset, NULL, NULL, &timeout); if (n > 0) { if (PJ_FD_ISSET(g.sock, &readset)) { pj_uint8_t buffer[512]; pj_ssize_t len; pj_sockaddr_in addr; int addrlen; pj_status_t rc; len = sizeof(buffer); addrlen = sizeof(addr); rc = pj_sock_recvfrom(g.sock, buffer, &len, 0, &addr, &addrlen); if (rc != PJ_SUCCESS || len <= 0) continue; if (pj_stun_msg_check(buffer, len, PJ_STUN_IS_DATAGRAM)==PJ_SUCCESS) { rc = pj_stun_session_on_rx_pkt(g.sess, buffer, len, OPTIONS, NULL, &addr, addrlen); if (rc != PJ_SUCCESS) my_perror("Error processing packet", rc); } else { buffer[len] = '\0'; PJ_LOG(3,(THIS_FILE, "Received data on client sock: %s", (char*)buffer)); } } else if (PJ_FD_ISSET(g.peer_sock, &readset)) { pj_uint8_t buffer[512]; pj_ssize_t len; pj_sockaddr_in addr; int addrlen; pj_status_t rc; len = sizeof(buffer); addrlen = sizeof(addr); rc = pj_sock_recvfrom(g.peer_sock, buffer, &len, 0, &addr, &addrlen); if (rc != PJ_SUCCESS || len <= 0) continue; buffer[len] = '\0'; if (pj_stun_msg_check(buffer, len, PJ_STUN_IS_DATAGRAM)==PJ_SUCCESS) { pj_stun_msg *msg; rc = pj_stun_msg_decode(g.pool, (pj_uint8_t*)buffer, len, 0, &msg, NULL, NULL); if (rc != PJ_SUCCESS) { my_perror("Error decoding packet on peer sock", rc); } else { pj_stun_msg_dump(msg, (char*)buffer, sizeof(buffer), NULL); PJ_LOG(3,(THIS_FILE, "Received STUN packet on peer sock: %s", buffer)); } } else { PJ_LOG(3,(THIS_FILE, "Received data on peer sock: %s", (char*)buffer)); } } } else if (n < 0) pj_thread_sleep(50); } return 0; } static int init() { pj_sockaddr addr; pj_stun_session_cb stun_cb; int len; pj_status_t status; g.sock = PJ_INVALID_SOCKET; status = pj_init(); status = pjlib_util_init(); status = pjnath_init(); pj_caching_pool_init(&g.cp, &pj_pool_factory_default_policy, 0); if (o.srv_addr) { pj_str_t s; pj_uint16_t port; if (o.srv_port) port = (pj_uint16_t) atoi(o.srv_port); else port = PJ_STUN_PORT; status = pj_sockaddr_in_init(&g.srv_addr, pj_cstr(&s, o.srv_addr), port); if (status != PJ_SUCCESS) { my_perror("Invalid address", status); return status; } printf("Destination address set to %s:%d\n", o.srv_addr, (int)port); } else { printf("Error: address must be specified\n"); return PJ_EINVAL; } g.pool = pj_pool_create(&g.cp.factory, NULL, 1000, 1000, NULL); status = pj_timer_heap_create(g.pool, 1000, &g.th); pj_assert(status == PJ_SUCCESS); pj_stun_config_init(&g.stun_config, &g.cp.factory, 0, NULL, g.th); pj_assert(status == PJ_SUCCESS); status = pj_sock_socket(pj_AF_INET(), pj_SOCK_DGRAM(), 0, &g.peer_sock); pj_assert(status == PJ_SUCCESS); status = pj_sock_bind_in(g.peer_sock, 0, 0); pj_assert(status == PJ_SUCCESS); status = pj_sock_socket(pj_AF_INET(), pj_SOCK_DGRAM(), 0, &g.sock); pj_assert(status == PJ_SUCCESS); status = pj_sockaddr_in_init(&addr.ipv4, NULL, 0); pj_assert(status == PJ_SUCCESS); addr.ipv4.sin_port = pj_htons((pj_uint16_t)LOCAL_PORT); status = pj_sock_bind(g.sock, &addr, sizeof(addr)); pj_assert(status == PJ_SUCCESS); len = sizeof(addr); status = pj_sock_getsockname(g.sock, &addr, &len); pj_assert(status == PJ_SUCCESS); PJ_LOG(3,(THIS_FILE, "Listening on port %d", (int)pj_ntohs(addr.ipv4.sin_port))); len = sizeof(g.peer_addr); status = pj_sock_getsockname(g.peer_sock, &g.peer_addr, &len); if (g.peer_addr.sin_addr.s_addr == 0) pj_gethostip(pj_AF_INET(), (pj_sockaddr*)&g.peer_addr.sin_addr); PJ_LOG(3,(THIS_FILE, "Peer is on port %d", (int)pj_ntohs(g.peer_addr.sin_port))); pj_memset(&stun_cb, 0, sizeof(stun_cb)); stun_cb.on_send_msg = &on_send_msg; stun_cb.on_request_complete = &on_request_complete; status = pj_stun_session_create(&g.stun_config, NULL, &stun_cb, o.use_fingerprint!=0, &g.sess); pj_assert(status == PJ_SUCCESS); if (o.user_name) { pj_stun_auth_cred cred; pj_bzero(&cred, sizeof(cred)); cred.type = PJ_STUN_AUTH_CRED_STATIC; cred.data.static_cred.realm = pj_str(o.realm); cred.data.static_cred.username = pj_str(o.user_name); cred.data.static_cred.data_type = 0; cred.data.static_cred.data = pj_str(o.password); cred.data.static_cred.nonce = pj_str(o.nonce); pj_stun_session_set_credential(g.sess, &cred); puts("Session credential set"); } else { puts("Credential not set"); } if (o.peer_addr) { if (parse_addr(o.peer_addr, &g.peer_addr)!=PJ_SUCCESS) return -1; } status = pj_ioqueue_create(g.pool, 16, &g.stun_config.ioqueue); if (status != PJ_SUCCESS) return status; status = pj_thread_create(g.pool, "stun", &worker_thread, NULL, 0, 0, &g.thread); if (status != PJ_SUCCESS) return status; return PJ_SUCCESS; } static int shutdown() { if (g.thread) { g.quit = 1; pj_thread_join(g.thread); pj_thread_destroy(g.thread); g.thread = NULL; } if (g.sess) pj_stun_session_destroy(g.sess); if (g.sock != PJ_INVALID_SOCKET) pj_sock_close(g.sock); if (g.th) pj_timer_heap_destroy(g.th); if (g.pool) pj_pool_release(g.pool); pj_pool_factory_dump(&g.cp.factory, PJ_TRUE); pj_caching_pool_destroy(&g.cp); return PJ_SUCCESS; } static void send_bind_request(void) { pj_stun_tx_data *tdata; pj_status_t rc; rc = pj_stun_session_create_req(g.sess, PJ_STUN_BINDING_REQUEST, PJ_STUN_MAGIC, NULL, &tdata); pj_assert(rc == PJ_SUCCESS); rc = pj_stun_session_send_msg(g.sess, PJ_FALSE, &g.srv_addr, sizeof(g.srv_addr), tdata); if (rc != PJ_SUCCESS) my_perror("Error sending STUN request", rc); } static void send_allocate_request(pj_bool_t allocate) { pj_stun_tx_data *tdata; pj_status_t rc; rc = pj_stun_session_create_req(g.sess, PJ_STUN_ALLOCATE_REQUEST, PJ_STUN_MAGIC, NULL, &tdata); pj_assert(rc == PJ_SUCCESS); if (BANDWIDTH != -1) { pj_stun_msg_add_uint_attr(tdata->pool, tdata->msg, PJ_STUN_ATTR_BANDWIDTH, BANDWIDTH); } if (!allocate) { pj_stun_msg_add_uint_attr(tdata->pool, tdata->msg, PJ_STUN_ATTR_LIFETIME, 0); } else { if (LIFETIME != -1) { pj_stun_msg_add_uint_attr(tdata->pool, tdata->msg, PJ_STUN_ATTR_LIFETIME, LIFETIME); } if (REQ_TRANSPORT != -1) { pj_stun_msg_add_uint_attr(tdata->pool, tdata->msg, PJ_STUN_ATTR_REQ_TRANSPORT, REQ_TRANSPORT); } if (REQ_PORT_PROPS != -1) { pj_stun_msg_add_uint_attr(tdata->pool, tdata->msg, PJ_STUN_ATTR_REQ_PORT_PROPS, REQ_PORT_PROPS); } if (REQ_IP) { pj_sockaddr_in addr; pj_str_t tmp; pj_sockaddr_in_init(&addr, pj_cstr(&tmp, REQ_IP), 0); pj_stun_msg_add_sockaddr_attr(tdata->pool, tdata->msg, PJ_STUN_ATTR_REQ_IP, PJ_FALSE, &addr, sizeof(addr)); } } rc = pj_stun_session_send_msg(g.sess, PJ_FALSE, &g.srv_addr, sizeof(g.srv_addr), tdata); pj_assert(rc == PJ_SUCCESS); } static void send_sad_request(pj_bool_t set) { pj_stun_tx_data *tdata; pj_status_t rc; if (g.peer_addr.sin_addr.s_addr == 0 || g.peer_addr.sin_port == 0) { puts("Error: peer address is not set"); return; } rc = pj_stun_session_create_req(g.sess, PJ_STUN_SET_ACTIVE_DESTINATION_REQUEST, PJ_STUN_MAGIC, NULL, &tdata); pj_assert(rc == PJ_SUCCESS); if (set) { pj_stun_msg_add_sockaddr_attr(tdata->pool, tdata->msg, PJ_STUN_ATTR_REMOTE_ADDR, PJ_FALSE, &g.peer_addr, sizeof(g.peer_addr)); } rc = pj_stun_session_send_msg(g.sess, PJ_FALSE, &g.srv_addr, sizeof(g.srv_addr), tdata); pj_assert(rc == PJ_SUCCESS); } static void send_send_ind(void) { pj_stun_tx_data *tdata; int len; pj_status_t rc; if (g.peer_addr.sin_addr.s_addr == 0 || g.peer_addr.sin_port == 0) { puts("Error: peer address is not set"); return; } len = strlen(g.data); if (len==0) { puts("Error: data is not set"); return; } rc = pj_stun_session_create_ind(g.sess, PJ_STUN_SEND_INDICATION, &tdata); pj_assert(rc == PJ_SUCCESS); pj_stun_msg_add_sockaddr_attr(tdata->pool, tdata->msg, PJ_STUN_ATTR_REMOTE_ADDR, PJ_FALSE, &g.peer_addr, sizeof(g.peer_addr)); pj_stun_msg_add_binary_attr(tdata->pool, tdata->msg, PJ_STUN_ATTR_DATA, (pj_uint8_t*)g.data, len); rc = pj_stun_session_send_msg(g.sess, PJ_FALSE, &g.srv_addr, sizeof(g.srv_addr), tdata); pj_assert(rc == PJ_SUCCESS); } static void send_raw_data_to_srv(void) { pj_ssize_t len; if (g.srv_addr.sin_addr.s_addr == 0 || g.srv_addr.sin_port == 0) { puts("Error: server address is not set"); return; } len = strlen(g.data); if (len==0) { puts("Error: data is not set"); return; } len = strlen(g.data); pj_sock_sendto(g.sock, g.data, &len, 0, &g.srv_addr, sizeof(g.srv_addr)); } static void send_raw_data_to_relay(void) { pj_ssize_t len; if (g.relay_addr.sin_addr.s_addr == 0 || g.relay_addr.sin_port == 0) { puts("Error: relay address is not set"); return; } len = strlen(g.data); if (len==0) { puts("Error: data is not set"); return; } len = strlen(g.data); pj_sock_sendto(g.peer_sock, g.data, &len, 0, &g.relay_addr, sizeof(g.relay_addr)); } static pj_status_t parse_addr(const char *input, pj_sockaddr_in *addr) { const char *pos; pj_str_t ip; pj_uint16_t port; pj_sockaddr tmp_addr; pos = pj_ansi_strchr(input, ':'); if (pos==NULL) { puts("Invalid format"); return -1; } ip.ptr = (char*)input; ip.slen = pos - input; port = (pj_uint16_t)atoi(pos+1); if (port==0) { puts("Invalid port"); return -1; } if (pj_sockaddr_in_init(&tmp_addr.ipv4, &ip, port)!=PJ_SUCCESS) { puts("Invalid address"); return -1; } pj_memcpy(addr, &tmp_addr, sizeof(pj_sockaddr_in)); return PJ_SUCCESS; } static void set_peer_addr(void) { char addr[64]; printf("Current peer address: %s:%d\n", pj_inet_ntoa(g.peer_addr.sin_addr), pj_ntohs(g.peer_addr.sin_port)); printf("Input peer address in IP:PORT format: "); fflush(stdout); fgets(addr, sizeof(addr), stdin); if (parse_addr(addr, &g.peer_addr) != PJ_SUCCESS) { return; } } static void nat_detect_cb(void *user_data, const pj_stun_nat_detect_result *res) { g.detect_result = res->status; if (res->status == PJ_SUCCESS) { PJ_LOG(3,(THIS_FILE, "NAT successfully detected as %s", res->nat_type_name)); } else { PJ_LOG(2,(THIS_FILE, "Error detecting NAT type: %s", res->status_text)); } } static pj_status_t perform_detection() { pj_status_t status; g.detect_result = PJ_EPENDING; status = pj_stun_detect_nat_type(&g.srv_addr, &g.stun_config, NULL, &nat_detect_cb); if (status != PJ_SUCCESS) return status; while (g.detect_result == PJ_EPENDING) pj_thread_sleep(100); status = g.detect_result; return status; } static void menu(void) { puts("Menu:"); puts(" d Perform NAT detection"); printf(" pr Set peer address (currently %s:%d)\n", pj_inet_ntoa(g.peer_addr.sin_addr), pj_ntohs(g.peer_addr.sin_port)); printf(" dt Set data (currently \"%s\")\n", g.data); puts(" br Send Bind request"); puts(" ar Send Allocate request"); puts(" dr Send de-Allocate request"); puts(" sr Send Set Active Destination request"); puts(" cr Send clear Active Destination request"); puts(" si Send data with Send Indication"); puts(" rw Send raw data to TURN server"); puts(" rW Send raw data to relay address"); puts(" q Quit"); puts(""); printf("Choice: "); } static void console_main(void) { while (!g.quit) { char input[10]; menu(); fgets(input, sizeof(input), stdin); if (input[0] == 'd' && (input[1]=='\r' || input[1]=='\n')) { perform_detection(); } else if (input[0]=='d' && input[1]=='t') { printf("Input data: "); fgets(g.data, sizeof(g.data_buf), stdin); } else if (input[0]=='p' && input[1]=='r') { set_peer_addr(); } else if (input[0]=='b' && input[1]=='r') { send_bind_request(); } else if (input[0]=='a' && input[1]=='r') { send_allocate_request(PJ_TRUE); } else if (input[0]=='d' && input[1]=='r') { send_allocate_request(PJ_FALSE); } else if (input[0]=='s' && input[1]=='r') { send_sad_request(PJ_TRUE); } else if (input[0]=='c' && input[1]=='r') { send_sad_request(PJ_FALSE); } else if (input[0]=='s' && input[1]=='i') { send_send_ind(); } else if (input[0]=='r' && input[1]=='w') { send_raw_data_to_srv(); } else if (input[0]=='r' && input[1]=='W') { send_raw_data_to_relay(); } else if (input[0]=='q') { g.quit = 1; } } } static void usage(void) { puts("Usage: pjstun_client TARGET [OPTIONS]"); puts(""); puts("where TARGET is \"host[:port]\""); puts(""); puts("and OPTIONS:"); puts(" --detect, -d Perform NAT type detection first"); puts(" --realm, -r Set realm of the credential"); puts(" --username, -u Set username of the credential"); puts(" --password, -p Set password of the credential"); puts(" --nonce, -N Set NONCE"); puts(" --fingerprint, -F Use fingerprint for outgoing requests"); puts(" --peer, -P Set peer address (address is in HOST:PORT format)"); puts(" --data, -D Set data"); puts(" --help, -h"); } int main(int argc, char *argv[]) { struct pj_getopt_option long_options[] = { { "detect", 0, 0, 'd'}, { "realm", 1, 0, 'r'}, { "username", 1, 0, 'u'}, { "password", 1, 0, 'p'}, { "nonce", 1, 0, 'N'}, { "fingerprint",0, 0, 'F'}, { "peer", 1, 0, 'P'}, { "data", 1, 0, 'D'}, { "help", 0, 0, 'h'} }; int c, opt_id; char *pos; pj_status_t status; g.data = g.data_buf; pj_ansi_strcpy(g.data, "Hello world"); while((c=pj_getopt_long(argc,argv, "r:u:p:N:dhF", long_options, &opt_id))!=-1) { switch (c) { case 'd': g.detect = PJ_TRUE; break; case 'r': o.realm = pj_optarg; break; case 'u': o.user_name = pj_optarg; break; case 'p': o.password = pj_optarg; break; case 'N': o.nonce = pj_optarg; break; case 'h': usage(); return 0; case 'F': o.use_fingerprint = PJ_TRUE; break; case 'P': o.peer_addr = pj_optarg; break; case 'D': g.data = pj_optarg; break; default: printf("Argument \"%s\" is not valid. Use -h to see help", argv[pj_optind]); return 1; } } if (pj_optind == argc) { puts("Error: TARGET is needed"); return 1; } if ((pos=pj_ansi_strchr(argv[pj_optind], ':')) != NULL) { o.srv_addr = argv[pj_optind]; *pos = '\0'; o.srv_port = pos+1; } else { o.srv_addr = argv[pj_optind]; } status = init(); if (status != PJ_SUCCESS) goto on_return; if (g.detect) { status = perform_detection(); if (status != PJ_SUCCESS) goto on_return; } console_main(); on_return: shutdown(); return status ? 1 : 0; }