#include "stun.h"
|
|
|
|
#include <sys/types.h>
|
|
#include <string.h>
|
|
#include <sys/socket.h>
|
|
|
|
#include "str.h"
|
|
#include "aux.h"
|
|
|
|
struct stun {
|
|
u_int16_t msg_type;
|
|
u_int16_t msg_len;
|
|
u_int32_t cookie;
|
|
unsigned char transaction[12];
|
|
} __attribute__ ((packed));
|
|
|
|
struct tlv {
|
|
u_int16_t type;
|
|
u_int16_t len;
|
|
} __attribute__ ((packed));
|
|
|
|
struct stun_attrs {
|
|
str username;
|
|
str msg_integrity;
|
|
u_int32_t priority;
|
|
int use:1,
|
|
controlled:1,
|
|
controlling:1;
|
|
};
|
|
|
|
struct stun_error {
|
|
struct stun stun;
|
|
struct tlv error_code;
|
|
u_int32_t codes;
|
|
};
|
|
|
|
|
|
|
|
static int stun_attributes(struct stun_attrs *out, str *s) {
|
|
struct tlv *tlv;
|
|
int len;
|
|
str attr;
|
|
|
|
ZERO(*out);
|
|
|
|
while (1) {
|
|
if (!s->len)
|
|
return 0;
|
|
|
|
tlv = (void *) s->s;
|
|
if (str_shift(s, sizeof(*tlv)))
|
|
return -1;
|
|
|
|
len = ntohs(tlv->len);
|
|
attr = *s;
|
|
attr.len = len;
|
|
|
|
len = (len + 3) & 0xfffc;
|
|
if (str_shift(s, len))
|
|
return -1;
|
|
|
|
switch (ntohs(tlv->type)) {
|
|
case 0x0006: /* username */
|
|
out->username = attr;
|
|
break;
|
|
case 0x0008: /* message-integrity */
|
|
out->msg_integrity = attr;
|
|
goto out;
|
|
|
|
case 0x0025: /* use-candidate */
|
|
out->use = 1;
|
|
break;
|
|
case 0x8029: /* ice-controlled */
|
|
out->controlled = 1;
|
|
break;
|
|
case 0x802a: /* ice-controlling */
|
|
out->controlling = 1;
|
|
break;
|
|
|
|
case 0x0024: /* priority */
|
|
if (attr.len != 4)
|
|
return -1;
|
|
out->priority = ntohl(*((u_int32_t *) attr.s));
|
|
break;
|
|
}
|
|
}
|
|
|
|
out:
|
|
return 0;
|
|
}
|
|
|
|
static inline void stun_error_len(int fd, struct sockaddr_in6 *sin, struct stun *req,
|
|
int code, char *reason, int len)
|
|
{
|
|
struct stun_error err;
|
|
struct msghdr mh;
|
|
struct iovec iov[2];
|
|
|
|
err.stun.msg_type = htons(0x0111); /* binding error response */
|
|
err.stun.cookie = htonl(STUN_COOKIE);
|
|
memcpy(&err.stun.transaction, &req->transaction, sizeof(err.stun.transaction));
|
|
err.error_code.type = htons(0x0009); /* error-code */
|
|
err.error_code.len = htons(len + sizeof(err.codes));
|
|
err.codes = htonl(((code / 100) << 8) | (code % 100));
|
|
|
|
ZERO(mh);
|
|
ZERO(iov);
|
|
|
|
iov[0].iov_base = &err;
|
|
iov[0].iov_len = sizeof(err);
|
|
iov[1].iov_base = reason;
|
|
iov[1].iov_len = (len + 3) & 0xfffc;
|
|
|
|
err.stun.msg_len = htons(iov[1].iov_len + sizeof(err.codes) + sizeof(err.error_code));
|
|
|
|
mh.msg_name = sin;
|
|
mh.msg_namelen = sizeof(*sin);
|
|
mh.msg_iov = iov;
|
|
mh.msg_iovlen = 2;
|
|
|
|
sendmsg(fd, &mh, 0);
|
|
}
|
|
|
|
#define stun_error(fd, sin, str, code, reason) \
|
|
stun_error_len(fd, sin, str, code, reason "\0\0\0", strlen(reason))
|
|
|
|
/* XXX add error reporting */
|
|
int stun(str *b, struct streamrelay *sr, struct sockaddr_in6 *sin) {
|
|
struct stun *s = (void *) b->s;
|
|
int msglen, method, class;
|
|
str attr_str;
|
|
struct stun_attrs attrs;
|
|
|
|
msglen = ntohs(s->msg_len);
|
|
if (msglen + 20 > b->len || msglen < 0)
|
|
return -1;
|
|
|
|
class = method = ntohs(s->msg_type);
|
|
class = ((class & 0x10) >> 4) | ((class & 0x100) >> 7);
|
|
method = (method & 0xf) | ((method & 0xe0) >> 1) | ((method & 0x3e00) >> 2);
|
|
if (method != 0x1) /* binding */
|
|
return -1;
|
|
|
|
attr_str.s = &b->s[20];
|
|
attr_str.len = b->len - 20;
|
|
if (stun_attributes(&attrs, &attr_str))
|
|
return -1;
|
|
|
|
if (class == 0x0) { /* request */
|
|
if (!attrs.username.s || !attrs.msg_integrity.s)
|
|
goto bad_req;
|
|
}
|
|
|
|
return 0;
|
|
|
|
bad_req:
|
|
stun_error(sr->fd.fd, sin, s, 400, "Bad request");
|
|
return 0;
|
|
}
|