sockmap.c 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265
  1. /*
  2. 3APA3A simpliest proxy server
  3. (c) 2002-2008 by ZARAZA <3APA3A@security.nnov.ru>
  4. please read License Agreement
  5. $Id: sockmap.c,v 1.64 2014-04-07 20:35:09 vlad Exp $
  6. */
  7. #include "proxy.h"
  8. #define BUFSIZE (param->srv->bufsize?param->srv->bufsize:((param->service == S_UDPPM)?UDPBUFSIZE:TCPBUFSIZE))
  9. int sockmap(struct clientparam * param, int timeo){
  10. int res=0;
  11. uint64_t sent=0, received=0;
  12. SASIZETYPE sasize;
  13. struct pollfd fds[2];
  14. int sleeptime = 0, stop = 0;
  15. unsigned minsize;
  16. unsigned bufsize;
  17. FILTER_ACTION action;
  18. int retcode = 0;
  19. bufsize = BUFSIZE;
  20. minsize = (param->service == S_UDPPM || param->service == S_TCPPM)? bufsize - 1 : (bufsize>>2);
  21. fds[0].fd = param->clisock;
  22. fds[1].fd = param->remsock;
  23. #if DEBUGLEVEL > 2
  24. (*param->srv->logfunc)(param, "Starting sockets mapping");
  25. #endif
  26. if(!param->waitclient64){
  27. if(!param->srvbuf && (!(param->srvbuf=myalloc(bufsize)) || !(param->srvbufsize = bufsize))){
  28. return (21);
  29. }
  30. }
  31. if(!param->waitserver64){
  32. if(!param->clibuf && (!(param->clibuf=myalloc(bufsize)) || !(param->clibufsize = bufsize))){
  33. return (21);
  34. }
  35. }
  36. action = handlepredatflt(param);
  37. if(action == HANDLED){
  38. return 0;
  39. }
  40. if(action != PASS) return 19;
  41. if(!param->nolongdatfilter){
  42. if(param->cliinbuf > param->clioffset){
  43. action = handledatfltcli(param, &param->clibuf, &param->clibufsize, param->clioffset, &param->cliinbuf);
  44. if(action == HANDLED){
  45. return 0;
  46. }
  47. if(action != PASS) return 19;
  48. }
  49. if(param->srvinbuf > param->srvoffset){
  50. action = handledatfltsrv(param, &param->srvbuf, &param->srvbufsize, param->srvoffset, &param->srvinbuf);
  51. if(action == HANDLED){
  52. return 0;
  53. }
  54. if(action != PASS) return 19;
  55. }
  56. }
  57. while (!stop&&!conf.timetoexit){
  58. sasize = sizeof(struct sockaddr_in);
  59. if((param->maxtrafin64 && param->statssrv64 >= param->maxtrafin64) || (param->maxtrafout64 && param->statscli64 >= param->maxtrafout64)){
  60. return (10);
  61. }
  62. if((param->srv->logdumpsrv && (param->statssrv64 > param->srv->logdumpsrv)) ||
  63. (param->srv->logdumpcli && (param->statscli64 > param->srv->logdumpcli)))
  64. (*param->srv->logfunc)(param, NULL);
  65. fds[0].events = fds[1].events = 0;
  66. if(param->srvinbuf > param->srvoffset && !param->waitclient64) {
  67. #if DEBUGLEVEL > 2
  68. (*param->srv->logfunc)(param, "will send to client");
  69. #endif
  70. fds[0].events |= POLLOUT;
  71. }
  72. if((param->srvbufsize - param->srvinbuf) > minsize && !param->waitclient64 && (!param->waitserver64 ||(received + param->srvinbuf - param->srvoffset < param->waitserver64))) {
  73. #if DEBUGLEVEL > 2
  74. (*param->srv->logfunc)(param, "Will recv from server");
  75. #endif
  76. fds[1].events |= POLLIN;
  77. }
  78. if(param->cliinbuf > param->clioffset && !param->waitserver64) {
  79. #if DEBUGLEVEL > 2
  80. (*param->srv->logfunc)(param, "Will send to server");
  81. #endif
  82. fds[1].events |= POLLOUT;
  83. }
  84. if((param->clibufsize - param->cliinbuf) > minsize && !param->waitserver64 &&(!param->srv->singlepacket || param->service != S_UDPPM) ) {
  85. #if DEBUGLEVEL > 2
  86. (*param->srv->logfunc)(param, "Will recv from client");
  87. #endif
  88. fds[0].events |= POLLIN;
  89. }
  90. if(!fds[0].events && !fds[1].events) return 666;
  91. res = so._poll(fds, 2, timeo*1000);
  92. if(res < 0){
  93. if(errno != EAGAIN && errno != EINTR) return 91;
  94. if(errno == EINTR) usleep(SLEEPTIME);
  95. continue;
  96. }
  97. if(res < 1){
  98. return 92;
  99. }
  100. if( (fds[0].revents & (POLLERR|POLLHUP|POLLNVAL)) && !(fds[0].revents & POLLIN)) {
  101. fds[0].revents = 0;
  102. stop = 1;
  103. retcode = 90;
  104. }
  105. if( (fds[1].revents & (POLLERR|POLLHUP|POLLNVAL)) && !(fds[1].revents & POLLIN)){
  106. fds[1].revents = 0;
  107. stop = 1;
  108. retcode = 90;
  109. }
  110. if((fds[0].revents & POLLOUT)){
  111. #if DEBUGLEVEL > 2
  112. (*param->srv->logfunc)(param, "send to client");
  113. #endif
  114. if(param->bandlimfunc) {
  115. sleeptime = (*param->bandlimfunc)(param, param->srvinbuf - param->srvoffset, 0);
  116. }
  117. res = so._sendto(param->clisock, param->srvbuf + param->srvoffset,(!param->waitserver64 || (param->waitserver64 - received) > (param->srvinbuf - param->srvoffset))? param->srvinbuf - param->srvoffset : (int)(param->waitserver64 - received), 0, (struct sockaddr*)&param->sinc, sasize);
  118. if(res < 0) {
  119. if(errno != EAGAIN) return 96;
  120. continue;
  121. }
  122. param->srvoffset += res;
  123. received += res;
  124. if(param->srvoffset == param->srvinbuf) param->srvoffset = param->srvinbuf = 0;
  125. if(param->waitserver64 && param->waitserver64<= received){
  126. return (98);
  127. }
  128. if(param->service == S_UDPPM && param->srv->singlepacket) {
  129. stop = 1;
  130. }
  131. }
  132. if((fds[1].revents & POLLOUT)){
  133. #if DEBUGLEVEL > 2
  134. (*param->srv->logfunc)(param, "send to server");
  135. #endif
  136. if(param->bandlimfunc) {
  137. int sl1;
  138. sl1 = (*param->bandlimfunc)(param, 0, param->cliinbuf - param->clioffset);
  139. if(sl1 > sleeptime) sleeptime = sl1;
  140. }
  141. res = so._sendto(param->remsock, param->clibuf + param->clioffset, (!param->waitclient64 || (param->waitclient64 - sent) > (param->cliinbuf - param->clioffset))? param->cliinbuf - param->clioffset : (int)(param->waitclient64 - sent), 0, (struct sockaddr*)&param->sins, sasize);
  142. if(res < 0) {
  143. if(errno != EAGAIN) return 97;
  144. continue;
  145. }
  146. param->clioffset += res;
  147. if(param->clioffset == param->cliinbuf) param->clioffset = param->cliinbuf = 0;
  148. sent += res;
  149. param->nwrites++;
  150. param->statscli64 += res;
  151. if(param->waitclient64 && param->waitclient64<= sent) {
  152. return (99);
  153. }
  154. }
  155. if ((fds[0].revents & POLLIN)) {
  156. #if DEBUGLEVEL > 2
  157. (*param->srv->logfunc)(param, "recv from client");
  158. #endif
  159. res = so._recvfrom(param->clisock, param->clibuf + param->cliinbuf, param->clibufsize - param->cliinbuf, 0, (struct sockaddr *)&param->sinc, &sasize);
  160. if (res==0) {
  161. so._shutdown(param->clisock, SHUT_RDWR);
  162. so._closesocket(param->clisock);
  163. fds[0].fd = param->clisock = INVALID_SOCKET;
  164. stop = 1;
  165. }
  166. else {
  167. if (res < 0){
  168. if( errno != EAGAIN) return (94);
  169. continue;
  170. }
  171. param->cliinbuf += res;
  172. if(!param->nolongdatfilter){
  173. action = handledatfltcli(param, &param->clibuf, &param->clibufsize, param->cliinbuf - res, &param->cliinbuf);
  174. if(action == HANDLED){
  175. return 0;
  176. }
  177. if(action != PASS) return 19;
  178. }
  179. }
  180. }
  181. if (!stop && (fds[1].revents & POLLIN)) {
  182. struct sockaddr_in sin;
  183. #if DEBUGLEVEL > 2
  184. (*param->srv->logfunc)(param, "recv from server");
  185. #endif
  186. sasize = sizeof(sin);
  187. res = so._recvfrom(param->remsock, param->srvbuf + param->srvinbuf, param->srvbufsize - param->srvinbuf, 0, (struct sockaddr *)&sin, &sasize);
  188. if (res==0) {
  189. so._shutdown(param->remsock, SHUT_RDWR);
  190. so._closesocket(param->remsock);
  191. fds[1].fd = param->remsock = INVALID_SOCKET;
  192. stop = 2;
  193. }
  194. else {
  195. if (res < 0){
  196. if( errno != EAGAIN) return (93);
  197. continue;
  198. }
  199. param->srvinbuf += res;
  200. param->nreads++;
  201. param->statssrv64 += res;
  202. if(!param->nolongdatfilter){
  203. action = handledatfltsrv(param, &param->srvbuf, &param->srvbufsize, param->srvinbuf - res, &param->srvinbuf);
  204. if(action == HANDLED){
  205. return 0;
  206. }
  207. if(action != PASS) return 19;
  208. }
  209. }
  210. }
  211. if(sleeptime > 0) {
  212. if(sleeptime > (timeo * 1000)){return (95);}
  213. usleep(sleeptime * SLEEPTIME);
  214. sleeptime = 0;
  215. }
  216. }
  217. if(conf.timetoexit) return 89;
  218. #if DEBUGLEVEL > 2
  219. (*param->srv->logfunc)(param, "finished with mapping");
  220. #endif
  221. while(!param->waitclient64 && param->srvinbuf > param->srvoffset && param->clisock != INVALID_SOCKET){
  222. #if DEBUGLEVEL > 2
  223. (*param->srv->logfunc)(param, "flushing buffer to client");
  224. #endif
  225. res = socksendto(param->clisock, &param->sinc, param->srvbuf + param->srvoffset, param->srvinbuf - param->srvoffset, conf.timeouts[STRING_S] * 1000);
  226. if(res > 0){
  227. param->srvoffset += res;
  228. param->statssrv64 += res;
  229. if(param->srvoffset == param->srvinbuf) param->srvoffset = param->srvinbuf = 0;
  230. }
  231. else break;
  232. }
  233. while(!param->waitserver64 && param->cliinbuf > param->clioffset && param->remsock != INVALID_SOCKET){
  234. #if DEBUGLEVEL > 2
  235. (*param->srv->logfunc)(param, "flushing buffer to server");
  236. #endif
  237. res = socksendto(param->remsock, &param->sins, param->clibuf + param->clioffset, param->cliinbuf - param->clioffset, conf.timeouts[STRING_S] * 1000);
  238. if(res > 0){
  239. param->clioffset += res;
  240. param->statscli64 += res;
  241. if(param->cliinbuf == param->clioffset) param->cliinbuf = param->clioffset = 0;
  242. }
  243. else break;
  244. }
  245. return retcode;
  246. }