diff --git a/src/or/proto_socks.c b/src/or/proto_socks.c
index e9ea453fa2..97297428ed 100644
--- a/src/or/proto_socks.c
+++ b/src/or/proto_socks.c
@@ -21,7 +21,7 @@ static void socks_request_set_socks5_error(socks_request_t *req,
socks5_reply_status_t reason);
static int parse_socks(const char *data, size_t datalen, socks_request_t *req,
- int log_sockstype, int safe_socks, ssize_t *drain_out,
+ int log_sockstype, int safe_socks, size_t *drain_out,
size_t *want_length_out);
static int parse_socks_client(const uint8_t *data, size_t datalen,
int state, char **reason,
@@ -88,13 +88,19 @@ socks_request_free_(socks_request_t *req)
static int
parse_socks4_request(const uint8_t *raw_data, socks_request_t *req,
- size_t datalen, int *is_socks4a)
+ size_t datalen, int *is_socks4a, size_t *drain_out)
{
// http://ss5.sourceforge.net/socks4.protocol.txt
// http://ss5.sourceforge.net/socks4A.protocol.txt
int res = 1;
tor_addr_t destaddr;
+ tor_assert(is_socks4a);
+ tor_assert(drain_out);
+
+ *is_socks4a = 0;
+ *drain_out = 0;
+
req->socks_version = 4;
socks4_client_request_t *trunnel_req;
@@ -115,6 +121,9 @@ parse_socks4_request(const uint8_t *raw_data, socks_request_t *req,
goto end;
}
+ tor_assert(parsed >= 0);
+ *drain_out = (size_t)parsed;
+
uint8_t command = socks4_client_request_get_command(trunnel_req);
req->command = command;
@@ -172,6 +181,7 @@ parse_socks4_request(const uint8_t *raw_data, socks_request_t *req,
}
}
+
end:
socks4_client_request_free(trunnel_req);
@@ -261,6 +271,9 @@ parse_socks5_methods_request(const uint8_t *raw_data, socks_request_t *req,
goto end;
}
+ tor_assert(parsed >= 0);
+ *drain_out = (size_t)parsed;
+
size_t n_methods = (size_t)socks5_client_version_get_n_methods(trunnel_req);
if (n_methods == 0) {
res = -1;
@@ -282,7 +295,6 @@ parse_socks5_methods_request(const uint8_t *raw_data, socks_request_t *req,
}
end:
- *drain_out = (size_t)parsed;
socks5_client_version_free(trunnel_req);
return res;
@@ -342,49 +354,13 @@ process_socks5_methods_request(socks_request_t *req, int have_user_pass,
return res;
}
-/** There is a (possibly incomplete) socks handshake on buf, of one
- * of the forms
- * - socks4: "socksheader username\\0"
- * - socks4a: "socksheader username\\0 destaddr\\0"
- * - socks5 phase one: "version #methods methods"
- * - socks5 phase two: "version command 0 addresstype..."
- * If it's a complete and valid handshake, and destaddr fits in
- * MAX_SOCKS_ADDR_LEN bytes, then pull the handshake off the buf,
- * assign to req, and return 1.
- *
- * If it's invalid or too big, return -1.
- *
- * Else it's not all there yet, leave buf alone and return 0.
- *
- * If you want to specify the socks reply, write it into req->reply
- * and set req->replylen, else leave req->replylen alone.
- *
- * If log_sockstype is non-zero, then do a notice-level log of whether
- * the connection is possibly leaking DNS requests locally or not.
- *
- * If safe_socks is true, then reject unsafe socks protocols.
- *
- * If returning 0 or -1, req->address and req->port are
- * undefined.
- */
-int
-fetch_from_buf_socks(buf_t *buf, socks_request_t *req,
- int log_sockstype, int safe_socks)
+static int
+handle_socks_message(const uint8_t *raw_data, size_t datalen, socks_request_t *req,
+ int log_sockstype, int safe_socks, size_t *drain_out)
{
int res = 0;
- size_t datalen = buf_datalen(buf);
- uint8_t *raw_data;
- uint8_t *raw_ptr;
- uint8_t socks_version;
- raw_data = tor_malloc(datalen);
- memset(raw_data, 0, datalen);
-
- buf_peek(buf, (char *)raw_data, datalen);
-
- raw_ptr = raw_data;
-
- socks_version = (uint8_t)raw_data[0];
+ uint8_t socks_version = raw_data[0];
if (socks_version == 4) {
if (datalen < SOCKS4_NETWORK_LEN) {
@@ -395,7 +371,7 @@ fetch_from_buf_socks(buf_t *buf, socks_request_t *req,
int is_socks4a = 0;
int parse_status =
parse_socks4_request((const uint8_t *)raw_data, req, datalen,
- &is_socks4a);
+ &is_socks4a, drain_out);
if (parse_status != 1) {
res = parse_status;
@@ -411,7 +387,6 @@ fetch_from_buf_socks(buf_t *buf, socks_request_t *req,
goto end;
}
- buf_clear(buf);
res = 1;
goto end;
} else if (socks_version == 5) {
@@ -447,15 +422,47 @@ fetch_from_buf_socks(buf_t *buf, socks_request_t *req,
goto end;
}
- buf_drain(buf, n_drain); // TODO: do it like this for SOCKS4/4a as well
- raw_ptr += n_drain;
- datalen -= n_drain;
res = 0;
goto end;
}
}
- ssize_t n_drain;
+ end:
+ return res;
+}
+
+/** There is a (possibly incomplete) socks handshake on buf, of one
+ * of the forms
+ * - socks4: "socksheader username\\0"
+ * - socks4a: "socksheader username\\0 destaddr\\0"
+ * - socks5 phase one: "version #methods methods"
+ * - socks5 phase two: "version command 0 addresstype..."
+ * If it's a complete and valid handshake, and destaddr fits in
+ * MAX_SOCKS_ADDR_LEN bytes, then pull the handshake off the buf,
+ * assign to req, and return 1.
+ *
+ * If it's invalid or too big, return -1.
+ *
+ * Else it's not all there yet, leave buf alone and return 0.
+ *
+ * If you want to specify the socks reply, write it into req->reply
+ * and set req->replylen, else leave req->replylen alone.
+ *
+ * If log_sockstype is non-zero, then do a notice-level log of whether
+ * the connection is possibly leaking DNS requests locally or not.
+ *
+ * If safe_socks is true, then reject unsafe socks protocols.
+ *
+ * If returning 0 or -1, req->address and req->port are
+ * undefined.
+ */
+int
+fetch_from_buf_socks(buf_t *buf, socks_request_t *req,
+ int log_sockstype, int safe_socks)
+{
+ int res = 0;
+ size_t datalen = buf_datalen(buf);
+ size_t n_drain;
size_t want_length = 128;
const char *head = NULL;
@@ -464,25 +471,27 @@ fetch_from_buf_socks(buf_t *buf, socks_request_t *req,
goto end;
}
+ buf_pullup(buf, datalen, &head, &datalen); // XXX
+
do {
n_drain = 0;
- buf_pullup(buf, want_length, &head, &datalen);
+ //buf_pullup(buf, want_length, &head, &datalen);
tor_assert(head && datalen >= 2);
want_length = 0;
res = parse_socks(head, datalen, req, log_sockstype,
safe_socks, &n_drain, &want_length);
- if (n_drain < 0)
+ if (res == -1)
buf_clear(buf);
else if (n_drain > 0)
buf_drain(buf, n_drain);
+ datalen = buf_datalen(buf);
} while (res == 0 && head && want_length < buf_datalen(buf) &&
buf_datalen(buf) >= 2);
end:
- tor_free(raw_data);
return res;
}
@@ -536,7 +545,7 @@ static const char SOCKS_PROXY_IS_NOT_AN_HTTP_PROXY_MSG[] =
* we'd like to see in the input buffer, if they're available. */
static int
parse_socks(const char *data, size_t datalen, socks_request_t *req,
- int log_sockstype, int safe_socks, ssize_t *drain_out,
+ int log_sockstype, int safe_socks, size_t *drain_out,
size_t *want_length_out)
{
unsigned int len;
@@ -551,6 +560,15 @@ parse_socks(const char *data, size_t datalen, socks_request_t *req,
return 0;
}
+ socksver = get_uint8(data);
+
+ if ((socksver == 5 && req->socks_version != 5) ||
+ socksver == 4) {
+ *want_length_out = 128; // TODO remove this arg later
+ return handle_socks_message((const uint8_t *)data, datalen, req,
+ log_sockstype, safe_socks, drain_out);
+ }
+
if (req->socks_version == 5 && !req->got_auth) {
/* See if we have received authentication. Strictly speaking, we should
also check whether we actually negotiated username/password
@@ -597,8 +615,6 @@ parse_socks(const char *data, size_t datalen, socks_request_t *req,
}
}
- socksver = *data;
-
switch (socksver) { /* which version of socks? */
case 5: /* socks5 */
@@ -783,6 +799,9 @@ parse_socks(const char *data, size_t datalen, socks_request_t *req,
}
return -1;
}
+
+ tor_assert_unreached();
+ return -1;
}
/** Inspect a reply from SOCKS server stored in buf according