Full Code of rofl0r/proxychains-ng for AI

master 78ead0eca16b cached
50 files
161.7 KB
50.6k tokens
209 symbols
1 requests
Download .txt
Repository: rofl0r/proxychains-ng
Branch: master
Commit: 78ead0eca16b
Files: 50
Total size: 161.7 KB

Directory structure:
gitextract_lvzudl7q/

├── .gitignore
├── AUTHORS
├── COPYING
├── Makefile
├── README
├── TODO
├── VERSION
├── completions/
│   └── zsh/
│       └── _proxychains4
├── configure
├── src/
│   ├── allocator_thread.c
│   ├── allocator_thread.h
│   ├── common.c
│   ├── common.h
│   ├── core.c
│   ├── core.h
│   ├── daemon/
│   │   ├── daemon.c
│   │   ├── hsearch.c
│   │   ├── hsearch.h
│   │   ├── sblist.c
│   │   ├── sblist.h
│   │   ├── sblist_delete.c
│   │   ├── udpclient.c
│   │   ├── udpserver.c
│   │   └── udpserver.h
│   ├── debug.c
│   ├── debug.h
│   ├── hash.c
│   ├── hash.h
│   ├── hostsreader.c
│   ├── ip_type.h
│   ├── libproxychains.c
│   ├── main.c
│   ├── mutex.h
│   ├── proxychains.conf
│   ├── proxyresolv
│   ├── rdns.c
│   ├── rdns.h
│   ├── remotedns.h
│   └── version.c
├── tests/
│   ├── test_getaddrinfo.c
│   ├── test_gethostbyname.c
│   ├── test_gethostent.c
│   ├── test_gethostent_r.c
│   ├── test_getnameinfo.c
│   ├── test_proxy_gethostbyname.c
│   ├── test_sendto.c
│   ├── test_shm.c
│   └── test_v4_in_v6.c
└── tools/
    ├── install.sh
    └── version.sh

================================================
FILE CONTENTS
================================================

================================================
FILE: .gitignore
================================================
proxychains4
proxychains4-daemon
*.bz2
*.xz
*.o
*.so
*.la
*.lo
.deps/
.libs/
*.rcb
*.out
*~
*.patch
version.h

# Autoconf stuff 
libtool
config.*
stamp-h


================================================
FILE: AUTHORS
================================================
original code up to version 3.1
N3E7CR34TUR3.
http://proxychains.sourceforge.net
netcreature@users.sourceforge.net

main.c, remote-dns, thread safety, bugfixes, build system, 
cleanups, mac support
rofl0r.
https://github.com/rofl0r/proxychains-ng

localnet, bugfixes
jianing yang.
https://github.com/jianingy/proxychains
https://sourceforge.net/projects/proxychains/forums/forum/644747/topic/3498696

round-robin
crass.
https://github.com/crass/proxychains-ng

poll_retry (fixes for signal handling)
colin cross.
https://sourceforge.net/projects/proxychains/forums/forum/644747/topic/2367923

collecting patches from px forum and putting it into a repo
adam hamsik.
https://github.com/haad/proxychains



================================================
FILE: COPYING
================================================
		    GNU GENERAL PUBLIC LICENSE
		       Version 2, June 1991

 Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
 Everyone is permitted to copy and distribute verbatim copies
 of this license document, but changing it is not allowed.

			    Preamble

  The licenses for most software are designed to take away your
freedom to share and change it.  By contrast, the GNU General Public
License is intended to guarantee your freedom to share and change free
software--to make sure the software is free for all its users.  This
General Public License applies to most of the Free Software
Foundation's software and to any other program whose authors commit to
using it.  (Some other Free Software Foundation software is covered by
the GNU Library General Public License instead.)  You can apply it to
your programs, too.

  When we speak of free software, we are referring to freedom, not
price.  Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
this service if you wish), that you receive source code or can get it
if you want it, that you can change the software or use pieces of it
in new free programs; and that you know you can do these things.

  To protect your rights, we need to make restrictions that forbid
anyone to deny you these rights or to ask you to surrender the rights.
These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.

  For example, if you distribute copies of such a program, whether
gratis or for a fee, you must give the recipients all the rights that
you have.  You must make sure that they, too, receive or can get the
source code.  And you must show them these terms so they know their
rights.

  We protect your rights with two steps: (1) copyright the software, and
(2) offer you this license which gives you legal permission to copy,
distribute and/or modify the software.

  Also, for each author's protection and ours, we want to make certain
that everyone understands that there is no warranty for this free
software.  If the software is modified by someone else and passed on, we
want its recipients to know that what they have is not the original, so
that any problems introduced by others will not reflect on the original
authors' reputations.

  Finally, any free program is threatened constantly by software
patents.  We wish to avoid the danger that redistributors of a free
program will individually obtain patent licenses, in effect making the
program proprietary.  To prevent this, we have made it clear that any
patent must be licensed for everyone's free use or not licensed at all.

  The precise terms and conditions for copying, distribution and
modification follow.

		    GNU GENERAL PUBLIC LICENSE
   TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

  0. This License applies to any program or other work which contains
a notice placed by the copyright holder saying it may be distributed
under the terms of this General Public License.  The "Program", below,
refers to any such program or work, and a "work based on the Program"
means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it,
either verbatim or with modifications and/or translated into another
language.  (Hereinafter, translation is included without limitation in
the term "modification".)  Each licensee is addressed as "you".

Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope.  The act of
running the Program is not restricted, and the output from the Program
is covered only if its contents constitute a work based on the
Program (independent of having been made by running the Program).
Whether that is true depends on what the Program does.

  1. You may copy and distribute verbatim copies of the Program's
source code as you receive it, in any medium, provided that you
conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the
notices that refer to this License and to the absence of any warranty;
and give any other recipients of the Program a copy of this License
along with the Program.

You may charge a fee for the physical act of transferring a copy, and
you may at your option offer warranty protection in exchange for a fee.

  2. You may modify your copy or copies of the Program or any portion
of it, thus forming a work based on the Program, and copy and
distribute such modifications or work under the terms of Section 1
above, provided that you also meet all of these conditions:

    a) You must cause the modified files to carry prominent notices
    stating that you changed the files and the date of any change.

    b) You must cause any work that you distribute or publish, that in
    whole or in part contains or is derived from the Program or any
    part thereof, to be licensed as a whole at no charge to all third
    parties under the terms of this License.

    c) If the modified program normally reads commands interactively
    when run, you must cause it, when started running for such
    interactive use in the most ordinary way, to print or display an
    announcement including an appropriate copyright notice and a
    notice that there is no warranty (or else, saying that you provide
    a warranty) and that users may redistribute the program under
    these conditions, and telling the user how to view a copy of this
    License.  (Exception: if the Program itself is interactive but
    does not normally print such an announcement, your work based on
    the Program is not required to print an announcement.)

These requirements apply to the modified work as a whole.  If
identifiable sections of that work are not derived from the Program,
and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those
sections when you distribute them as separate works.  But when you
distribute the same sections as part of a whole which is a work based
on the Program, the distribution of the whole must be on the terms of
this License, whose permissions for other licensees extend to the
entire whole, and thus to each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim rights or contest
your rights to work written entirely by you; rather, the intent is to
exercise the right to control the distribution of derivative or
collective works based on the Program.

In addition, mere aggregation of another work not based on the Program
with the Program (or with a work based on the Program) on a volume of
a storage or distribution medium does not bring the other work under
the scope of this License.

  3. You may copy and distribute the Program (or a work based on it,
under Section 2) in object code or executable form under the terms of
Sections 1 and 2 above provided that you also do one of the following:

    a) Accompany it with the complete corresponding machine-readable
    source code, which must be distributed under the terms of Sections
    1 and 2 above on a medium customarily used for software interchange; or,

    b) Accompany it with a written offer, valid for at least three
    years, to give any third party, for a charge no more than your
    cost of physically performing source distribution, a complete
    machine-readable copy of the corresponding source code, to be
    distributed under the terms of Sections 1 and 2 above on a medium
    customarily used for software interchange; or,

    c) Accompany it with the information you received as to the offer
    to distribute corresponding source code.  (This alternative is
    allowed only for noncommercial distribution and only if you
    received the program in object code or executable form with such
    an offer, in accord with Subsection b above.)

The source code for a work means the preferred form of the work for
making modifications to it.  For an executable work, complete source
code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to
control compilation and installation of the executable.  However, as a
special exception, the source code distributed need not include
anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the
operating system on which the executable runs, unless that component
itself accompanies the executable.

If distribution of executable or object code is made by offering
access to copy from a designated place, then offering equivalent
access to copy the source code from the same place counts as
distribution of the source code, even though third parties are not
compelled to copy the source along with the object code.

  4. You may not copy, modify, sublicense, or distribute the Program
except as expressly provided under this License.  Any attempt
otherwise to copy, modify, sublicense or distribute the Program is
void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under
this License will not have their licenses terminated so long as such
parties remain in full compliance.

  5. You are not required to accept this License, since you have not
signed it.  However, nothing else grants you permission to modify or
distribute the Program or its derivative works.  These actions are
prohibited by law if you do not accept this License.  Therefore, by
modifying or distributing the Program (or any work based on the
Program), you indicate your acceptance of this License to do so, and
all its terms and conditions for copying, distributing or modifying
the Program or works based on it.

  6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the
original licensor to copy, distribute or modify the Program subject to
these terms and conditions.  You may not impose any further
restrictions on the recipients' exercise of the rights granted herein.
You are not responsible for enforcing compliance by third parties to
this License.

  7. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues),
conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License.  If you cannot
distribute so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you
may not distribute the Program at all.  For example, if a patent
license would not permit royalty-free redistribution of the Program by
all those who receive copies directly or indirectly through you, then
the only way you could satisfy both it and this License would be to
refrain entirely from distribution of the Program.

If any portion of this section is held invalid or unenforceable under
any particular circumstance, the balance of the section is intended to
apply and the section as a whole is intended to apply in other
circumstances.

It is not the purpose of this section to induce you to infringe any
patents or other property right claims or to contest validity of any
such claims; this section has the sole purpose of protecting the
integrity of the free software distribution system, which is
implemented by public license practices.  Many people have made
generous contributions to the wide range of software distributed
through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing
to distribute software through any other system and a licensee cannot
impose that choice.

This section is intended to make thoroughly clear what is believed to
be a consequence of the rest of this License.

  8. If the distribution and/or use of the Program is restricted in
certain countries either by patents or by copyrighted interfaces, the
original copyright holder who places the Program under this License
may add an explicit geographical distribution limitation excluding
those countries, so that distribution is permitted only in or among
countries not thus excluded.  In such case, this License incorporates
the limitation as if written in the body of this License.

  9. The Free Software Foundation may publish revised and/or new versions
of the General Public License from time to time.  Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.

Each version is given a distinguishing version number.  If the Program
specifies a version number of this License which applies to it and "any
later version", you have the option of following the terms and conditions
either of that version or of any later version published by the Free
Software Foundation.  If the Program does not specify a version number of
this License, you may choose any version ever published by the Free Software
Foundation.

  10. If you wish to incorporate parts of the Program into other free
programs whose distribution conditions are different, write to the author
to ask for permission.  For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes
make exceptions for this.  Our decision will be guided by the two goals
of preserving the free status of all derivatives of our free software and
of promoting the sharing and reuse of software generally.

			    NO WARRANTY

  11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.

  12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.

		     END OF TERMS AND CONDITIONS


================================================
FILE: Makefile
================================================
#
# Makefile for proxychains (requires GNU make), stolen from musl
#
# Use config.mak to override any of the following variables.
# Do not make changes here.
#

exec_prefix = /usr/local
bindir = $(exec_prefix)/bin

prefix = /usr/local/
includedir = $(prefix)/include
libdir = $(prefix)/lib
sysconfdir = $(prefix)/etc
zshcompletiondir = $(prefix)/share/zsh/site-functions

OBJS = src/common.o src/main.o

DOBJS = src/daemon/hsearch.o \
        src/daemon/sblist.o src/daemon/sblist_delete.o \
        src/daemon/daemon.o src/daemon/udpserver.o

LOBJS = src/version.o \
        src/core.o src/common.o src/libproxychains.o \
        src/allocator_thread.o src/rdns.o \
        src/hostsreader.o src/hash.o src/debug.o


GENH = src/version.h

CFLAGS  += -Wall -O0 -g -std=c99 -D_GNU_SOURCE -pipe
NO_AS_NEEDED = -Wl,--no-as-needed
LDFLAGS = -fPIC $(NO_AS_NEEDED) $(LIBDL) $(PTHREAD)
INC     = 
PIC     = -fPIC
AR      = $(CROSS_COMPILE)ar
RANLIB  = $(CROSS_COMPILE)ranlib
SOCKET_LIBS =

LDSO_SUFFIX = so
LD_SET_SONAME = -Wl,-soname=
INSTALL = ./tools/install.sh

LDSO_PATHNAME = libproxychains4.$(LDSO_SUFFIX)

SHARED_LIBS = $(LDSO_PATHNAME)
ALL_LIBS = $(SHARED_LIBS)
PXCHAINS = proxychains4
PXCHAINS_D = proxychains4-daemon
ALL_TOOLS = $(PXCHAINS) $(PXCHAINS_D)
ALL_CONFIGS = src/proxychains.conf
ZSH_COMPLETION = completions/zsh/_proxychains4

-include config.mak

CFLAGS+=$(USER_CFLAGS) $(MAC_CFLAGS)
CFLAGS_MAIN=-DLIB_DIR=\"$(libdir)\" -DSYSCONFDIR=\"$(sysconfdir)\" -DDLL_NAME=\"$(LDSO_PATHNAME)\"


all: $(ALL_LIBS) $(ALL_TOOLS)

install: install-libs install-tools

$(DESTDIR)$(bindir)/%: %
	$(INSTALL) -D -m 755 $< $@

$(DESTDIR)$(libdir)/%: %
	$(INSTALL) -D -m 644 $< $@

$(DESTDIR)$(sysconfdir)/%: src/%
	$(INSTALL) -D -m 644 $< $@

$(DESTDIR)$(zshcompletiondir)/%: completions/zsh/%
	$(INSTALL) -D -m 644 $< $@

install-libs: $(ALL_LIBS:%=$(DESTDIR)$(libdir)/%)
install-tools: $(ALL_TOOLS:%=$(DESTDIR)$(bindir)/%)
install-config: $(ALL_CONFIGS:src/%=$(DESTDIR)$(sysconfdir)/%)
install-zsh-completion: $(ZSH_COMPLETION:completions/zsh/%=$(DESTDIR)$(zshcompletiondir)/%)

clean:
	rm -f $(ALL_LIBS)
	rm -f $(ALL_TOOLS)
	rm -f $(OBJS) $(LOBJS) $(DOBJS)
	rm -f $(GENH)

src/version.h: $(wildcard VERSION .git)
	printf '#define VERSION "%s"\n' "$$(sh tools/version.sh)" > $@

src/version.o: src/version.h

%.o: %.c
	$(CC) $(CPPFLAGS) $(CFLAGS) $(CFLAGS_MAIN) $(INC) $(PIC) -c -o $@ $<

$(LDSO_PATHNAME): $(LOBJS)
	$(CC) $(LDFLAGS) $(FAT_LDFLAGS) $(LD_SET_SONAME)$(LDSO_PATHNAME) \
		$(USER_LDFLAGS) -shared -o $@ $^ $(SOCKET_LIBS)

$(PXCHAINS): $(OBJS)
	$(CC) $^ $(FAT_BIN_LDFLAGS) $(USER_LDFLAGS) $(LIBDL) -o $@

$(PXCHAINS_D): $(DOBJS)
	$(CC) $^ $(FAT_BIN_LDFLAGS) $(USER_LDFLAGS) -o $@


.PHONY: all clean install install-config install-libs install-tools install-zsh-completion


================================================
FILE: README
================================================
ProxyChains-NG ver 4.17 README
=============================

  ProxyChains is a UNIX program, that hooks network-related libc functions
  in DYNAMICALLY LINKED programs via a preloaded DLL (dlsym(), LD_PRELOAD)
  and redirects the connections through SOCKS4a/5 or HTTP proxies.
  It supports TCP only (no UDP/ICMP etc).

  The way it works is basically a HACK; so it is possible that it doesn't
  work with your program, especially when it's a script, or starts
  numerous processes like background daemons or uses dlopen() to load
  "modules" (bug in glibc dynlinker).
  It should work with simple compiled (C/C++) dynamically linked programs
  though.

  If your program doesn't work with proxychains, consider using an
  iptables based solution instead; this is much more robust.

  Supported Platforms: Linux, BSD, Mac, Haiku.


*********** ATTENTION ***********

  this program can be used to circumvent censorship.
  doing so can be VERY DANGEROUS in certain countries.

  ALWAYS MAKE SURE THAT PROXYCHAINS WORKS AS EXPECTED
  BEFORE USING IT FOR ANYTHING SERIOUS.

  this involves both the program and the proxy that you're going to
  use.

  for example, you can connect to some "what is my ip" service
  like ifconfig.me to make sure that it's not using your real ip.

  ONLY USE PROXYCHAINS IF YOU KNOW WHAT YOU'RE DOING.

  THE AUTHORS AND MAINTAINERS OF PROXYCHAINS DO NOT TAKE ANY
  RESPONSIBILITY FOR ANY ABUSE OR MISUSE OF THIS SOFTWARE AND
  THE RESULTING CONSEQUENCES.

*** Installation ***

  # needs a working C compiler, preferably gcc
  ./configure --prefix=/usr --sysconfdir=/etc
  make
  [optional] sudo make install
  [optional] sudo make install-config (installs proxychains.conf)

  if you dont install, you can use proxychains from the build directory
  like this: ./proxychains4 -f src/proxychains.conf telnet google.com 80

Changelog:
----------
Version 4.17
- add hook for close_range function, fixing newer versions of openssh
- fat-binary-m1 option for mac
- fix DNS error handling in proxy_dns_old
- simplify init code
- fix openbsd preloading
- fix double-close in multithreaded apps
- various improvements to configure script

Version 4.16
- fix regression in configure script linker flag detection
- remove 10 year old workaround for wrong glibc getnameinfo signature
- support for new DYLD hooking method for OSX Monterey
- netbsd compilation fix
- support IPv6 localnets
- more user-friendly error message when execvp fails
- proxy_getaddrinfo(): fill in ai_socktype if requested

Version 4.15
- fix configure script for buggy binutils version
- initialize rand_seed with nano-second granularity
- add support for numeric ipv6 in getaddrinfo
- fix bug in getaddrinfo when node is null and !passive
- add dnat feature
- add raw proxy type
- add haiku support
- add proxy_dns_old to emulate proxychains 3.1 behaviour
- add new proxy_dns_daemon feature (experimental)
- various other fixes

Version 4.14
- allow alternative proto://user:pass@ip:port syntax for proxylist
- fix endless loop in round robin mode when all proxies are down (#147)
- fix compilation on android (#265)
- fix fd leak in forked processes (#273)
- skip connection attempt to nullrouted ips
- allow hostnames for proxylist under specific circumstances

Version 4.13
- fix robustness of DNS lookup thread and a segfault
- fix socks5 user/pass auth on non-conforming servers
- fix memory leak
- add support for Solaris

Version 4.12
- fix several build issues
  - for MAC
  - with -pie
  - with custom CC
- compatibility fix for some GUI apps (8870140)
- compatibility fix for some HTTP proxies (cf9a16d)
- fix several warnings for cleaner build on debian
- fix random_chain on OSX (0f6b226)

Version 4.11
- preliminary IPv6 support
- fixed bug in hostsreader
- preliminary support for usage on OpenBSD (caveat emptor)

Version 4.10
- fix regression in linking order with custom LDFLAGS
- fix segfault in DNS mapping code in programs with > ~400 different lookups

Version 4.9
- fix a security issue CVE-2015-3887
- add sendto hook to handle MSG_FASTOPEN flag
- replace problematic hostentdb with hostsreader
- fix compilation on OpenBSD (although doesn't work there)

Version 4.8.1:
- fix regression in 4.8 install-config Makefile target

Version 4.8:
- fix for odd cornercase where getaddrinfo was used with AI_NUMERICHOST
  to test for a numeric ip instead of resolving it (fixes nmap).
- allow usage with programs that rely on LD_PRELOAD themselves
- reject wrong entries in config file
- print version number on startup

Version 4.7:
- new round_robin chaintype by crass.
- fix bug with lazy allocation when GCC constructor was not used.
- new configure flag --fat-binary to create a "fat" binary/library on OS X
- return EBADF rather than EINTR in close hook.
  it's legal for a program to retry close() calls when they receive
  EINTR, which could cause an infinite loop, as seen in chromium.

Version 4.6:
- some cosmetic fixes to Makefile, fix a bug when non-numeric ip was
  used as proxy server address.

Version 4.5:
- hook close() to prevent OpenSSH from messing with internal infrastructure.
  this caused ssh client to segfault when proxified.

Version 4.4:
- FreeBSD port
- fixes some installation issues on Debian and Mac.

Version 4.3:
- fixes programs that do dns-lookups in child processes (fork()ed),
  like irssi. to achieve this, support for compilation without pthreads
  was sacrified.
- fixes thread safety for gethostent() calls.
- improved DNS handling speed, since hostent db is cached.

Version 4.2:
- fixes compilation issues with ubuntu 12.04 toolchain
- fixes segfault in rare codepath

Version 4.1
- support for mac os x (all archs)
- all internal functions are threadsafe when compiled with -DTHREAD_SAFE
  (default).

Version 4.0
- replaced dnsresolver script (which required a dynamically linked "dig"
  binary to be present) with remote DNS lookup.
  this speeds up any operation involving DNS, as the old script had to use TCP.
  additionally it allows to use .onion urls when used with TOR.
- removed broken autoconf build system with a simple Makefile.
  there's a ./configure script though for convenience.
  it also adds support for a config file passed via command line switches/
  environment variables.

Version 3.0
- support for DNS resolving through proxy
  supports SOCKS4, SOCKS5 and HTTP CONNECT proxy servers.
  Auth-types: socks - "user/pass" , http - "basic".

When to use it ?
1) When the only way to get "outside" from your LAN is through proxy server.
2) To get out from behind restrictive firewall which filters outgoing ports.
3) To use two (or more) proxies in chain:
	like: your_host <--> proxy1 <--> proxy2 <--> target_host
4) To "proxify" some program with no proxy support built-in (like telnet)
5) Access intranet from outside via proxy.
6) To use DNS behind proxy.
7) To access hidden tor onion services.

Some cool features:

* This program can mix different proxy types in the same chain
	like: your_host <-->socks5 <--> http <--> socks4 <--> target_host
* Different chaining options supported
	random order from the list ( user defined length of chain ).
	exact order  (as they appear in the list )
	dynamic order (smart exclude dead proxies from chain)
* You can use it with most TCP client applications, possibly even network
	scanners, as long as they use standard libc functionality.
	pcap based scanning does not work.
* You can use it with servers, like squid, sendmail, or whatever.
* DNS resolving through proxy.


Configuration:
--------------

proxychains looks for config file in following order:
1)	file listed in environment variable PROXYCHAINS_CONF_FILE or
	provided as a -f argument to proxychains script or binary.
2)	./proxychains.conf
3)	$(HOME)/.proxychains/proxychains.conf
4)	$(sysconfdir)/proxychains.conf  **

** usually /etc/proxychains.conf

Usage Example:

	$ proxychains telnet targethost.com

in this example it will run telnet through proxy(or chained proxies)
specified by proxychains.conf

Usage Example:

	$ proxychains -f /etc/proxychains-other.conf telnet targethost2.com

in this example it will use different configuration file then proxychains.conf
to connect to targethost2.com host.

Usage Example:

	$ proxyresolv targethost.com

in this example it will resolve targethost.com through proxy(or chained proxies)
specified by proxychains.conf

Known Problems:
---------------
- newer versions of nmap try to determine the network interface to use
  even if it's not needed (like when doing simple syn scans which use the
  standard POSIX socket API. this results in errors when proxychains hands
  out an ip address to a reserved address space.
  possible workarounds: disable proxy_dns, use a numeric ip, or use nmap's
  native support for SOCKS proxies.

- Mac OS X 10.11 (El Capitan) ships with a new security feature called SIP
  that prevents hooking of system apps.
  workarounds are to partially disable SIP by issuing
  csrutil enable --without debug in recovery mode,
  or to copy the system binary into the home directory and run it from there.
  see github issue #78 for details.

- the glibc dynlinker has a bug or security feature that inhibits dlopen()ed
  modules from being subject to the same dlsym hooks as installed for the main
  program. this mainly affects scripting languages such as perl or python
  that heavily rely on dlopen() for modules written in C to work.
  there are unconfirmed reports that it works as root though.
  musl libc is unaffected from the bug.


Community:
----------
#proxychains on irc.libera.chat

Donations:
----------
bitcoins donations are welcome - please send to this address:
1C9LBpuy56veBqw5N33sZMoZW8mwCw3tPh



================================================
FILE: TODO
================================================
ProxyChains ver 4.0 TODO
===================

	
   hooks for reentrant dns functions, i.e. gethostbyaddr_r




================================================
FILE: VERSION
================================================
4.17


================================================
FILE: completions/zsh/_proxychains4
================================================
#compdef proxychains4

_arguments \
  '(- : *)--help[More help in README file]' \
  '-q[makes proxychains quiet - this overrides the config setting]' \
  '-f[allows one to manually specify a configfile to use]: :_files' \
  '(-)1: :{_command_names -e}' \
  '*:: :_normal'


================================================
FILE: configure
================================================
#!/bin/sh

prefix=/usr/local
OUR_CPPFLAGS=

# Get a temporary filename
fail() { printf "%s\n" "$1" >&2 ; exit 1 ; }
i=0
set -C
while : ; do i=$(($i+1))
tmpc="./conf$$-$PPID-$i.c"
2>|/dev/null > "$tmpc" && break
test "$i" -gt 50 && fail "$0: cannot create temporary file $tmpc"
done
set +C
trap 'rm "$tmpc"' EXIT INT QUIT TERM HUP

check_compile() {
	printf "checking %s ... " "$1"
	printf "$3" > "$tmpc"
	local res=0
	$CC $OUR_CPPFLAGS $CPPFLAGS $2 $CFLAGS "$tmpc" -o "$tmpc".out >/dev/null 2>&1 \
	|| res=1
	test x$res = x0 && \
	{ printf "yes\n" ; test x"$2" = x || OUR_CPPFLAGS="$OUR_CPPFLAGS $2" ; } \
	|| printf "no\n"
	rm -f "$tmpc".out
	return $res
}

get_define() {
	$CC $OUR_CPPFLAGS $CPPFLAGS $CFLAGS -dM -E - </dev/null | grep "$1"
}

get_define_stripped() {
	local output=$(get_define "$1")
	test "$?" = 0 || return 1
	printf "%s\n" "$output" | sed 's/^.* .* //'
}

check_define() {
	printf "checking whether \$CC defines %s ... " "$1"
	local res=1
	get_define "$1" >/dev/null && res=0
	test x$res = x0 && printf "yes\n" || printf "no\n"
	return $res
}

check_compile_run() {
	printf "checking %s ... " "$1"
	printf "$2" > "$tmpc"
	local res=0
	$CC $OUR_CPPFLAGS $CPPFLAGS $CFLAGS "$tmpc" -o "$tmpc".out >/dev/null 2>&1 \
	|| res=1
	test x$res = x0 && { "$tmpc".out || res=1 ; }
	rm -f "$tmpc".out
	test x$res = x0 && printf "yes\n" || printf "no\n"
	return $res
}

check_link_silent() {
	printf "$2" > "$tmpc"
	local res=0
	$CC $OUR_CPPFLAGS $CPPFLAGS $1 $CFLAGS "$tmpc" -o "$tmpc".out  >/dev/null 2>&1 || res=1
	rm -f "$tmpc".out
	return $res
}

check_link() {
	printf "checking %s ... " "$1"
	local res=0
	check_link_silent "$2" "$3" || res=1
	test x$res = x0 && printf "yes\n" || printf "no\n"
	return $res
}

usage() {
	echo "supported arguments"
	echo "--prefix=/path            default: $prefix"
	echo "--exec_prefix=/path       default: $prefix/bin"
	echo "--bindir=/path            default: $prefix/bin"
	echo "--libdir=/path            default: $prefix/lib"
	echo "--includedir=/path        default: $prefix/include"
	echo "--sysconfdir=/path        default: $prefix/etc"
	echo "--ignore-cve              default: no"
	echo "	if set to yes ignores CVE-2015-3887 and makes it possible"
	echo "	to preload from current dir (possibly insecure, but handy)"
	echo "--fat-binary : build for both i386 and x86_64 architectures on 64-bit Macs"
	echo "--fat-binary-m1 : build for both arm64e and x86_64 architectures on M1 Macs"
	echo "--fat-binary-m2 : build for arm64, arm64e and x86_64 architectures on M2+ Macs"
	echo "--hookmethod=dlsym|dyld   hook method for osx. default: auto"
	echo "  if OSX >= 12 is detected, dyld method will be used if auto."
	echo "--help : show this text"
	exit 1
}

spliteq() {
	arg=$1
	echo "${arg#*=}"
	#alternatives echo "$arg" | cut -d= -f2-
	# or echo "$arg" | sed 's/[^=]*=//'
}

fat_binary=
fat_binary_m1=
fat_binary_m2=
ignore_cve=no
hookmethod=auto

parsearg() {
	case "$1" in
	--prefix=*) prefix=`spliteq $1`;;
	--exec_prefix=*) exec_prefix=`spliteq $1`;;
	--bindir=*) bindir=`spliteq $1`;;
	--libdir=*) libdir=`spliteq $1`;;
	--includedir=*) includedir=`spliteq $1`;;
	--sysconfdir=*) sysconfdir=`spliteq $1`;;
	--ignore-cve) ignore_cve=1;;
	--ignore-cve=*) ignore_cve=`spliteq $1`;;
	--hookmethod=*) hookmethod=`spliteq $1`;;
	--fat-binary) fat_binary=1;;
	--fat-binary-m1) fat_binary_m1=1;;
	--fat-binary-m2) fat_binary_m2=1;;
	--help) usage;;
	esac
}

while true ; do
	case $1 in
	-*) parsearg "$1"; shift;;
	*) break ;;
	esac
done

if [ -z "$exec_prefix" ] ; then
	exec_prefix=$prefix
fi

if [ -z "$libdir" ] ; then
	libdir=$prefix/lib
fi

if [ -z "$includedir" ] ; then
	includedir=$prefix/include
fi

if [ -z "$sysconfdir" ] ; then
	sysconfdir=$prefix/etc
fi

if [ -z "$bindir" ] ; then
	bindir=$exec_prefix/bin
fi

if [ -z "$CC" ] ; then
	CC=cc
fi

echo > config.mak

bsd_detected=false
isbsd() {
	$bsd_detected
}
mac_detected=false
ismac() {
	$mac_detected
}
mac_64=false
ismac64() {
	$mac_64
}
solaris_detected=false
issolaris() {
	$solaris_detected
}
haiku_detected=false
ishaiku() {
	$haiku_detected
}

check_compile 'whether C compiler works' '' 'int main() {return 0;}' || fail 'error: install a C compiler and library'
check_compile 'whether libc headers are complete' '' '#include <netdb.h>\nint main() {return 0;}' || fail 'error: necessary libc headers are not installed'
check_compile 'whether C compiler understands -Wno-unknown-pragmas' '-Wno-unknown-pragmas' 'int main() {return 0;}'
check_compile 'whether C compiler understands -Werror=implicit-function-declaration' '-Werror=implicit-function-declaration' 'int main() {return 0;}'

if ! check_compile 'whether getnameinfo() servlen argument is POSIX compliant (socklen_t)' "-DGN_NODELEN_T=socklen_t -DGN_SERVLEN_T=socklen_t -DGN_FLAGS_T=int" \
'#define _GNU_SOURCE\n#include <netdb.h>\nint getnameinfo(const struct sockaddr *, socklen_t, char *, socklen_t, char *, socklen_t, int);int main() {\nreturn 0;}' ; then
 # GLIBC < 2.14
 if ! check_compile 'whether getnameinfo() flags argument is unsigned' "-DGN_NODELEN_T=socklen_t -DGN_SERVLEN_T=socklen_t -DGN_FLAGS_T=unsigned" \
  '#define _GNU_SOURCE\n#include <netdb.h>\nint getnameinfo(const struct sockaddr *, socklen_t, char *, socklen_t, char *, socklen_t, unsigned);int main() {\nreturn 0;}' ; then
  if ! check_compile 'whether getnameinfo() servlen argument is size_t' "-DGN_NODELEN_T=socklen_t -DGN_SERVLEN_T=size_t -DGN_FLAGS_T=int" \
   '#define _GNU_SOURCE\n#include <netdb.h>\nint getnameinfo(const struct sockaddr *, socklen_t, char *, socklen_t, char *, size_t, int);int main() {\nreturn 0;}' ; then
   # OpenBSD & FreeBSD
   if ! check_compile 'whether getnameinfo() servlen and nodelen argument is size_t' "-DGN_NODELEN_T=size_t -DGN_SERVLEN_T=size_t -DGN_FLAGS_T=int" \
    '#define _GNU_SOURCE\n#include <netdb.h>\nint getnameinfo(const struct sockaddr *, socklen_t, char *, size_t, char *, size_t, int);int main() {\nreturn 0;}' ; then
     fail "failed to detect getnameinfo signature"
   fi
  fi
 fi
fi

check_compile 'whether we have GNU-style getservbyname_r()' "-DHAVE_GNU_GETSERVBYNAME_R" \
'#define _GNU_SOURCE\n#include <netdb.h>\nint main() {\nstruct servent *se = 0;struct servent se_buf;char buf[1024];\ngetservbyname_r("foo", (void*) 0, &se_buf, buf, sizeof(buf), &se);\nreturn 0;}'

check_compile 'whether we have pipe2() and O_CLOEXEC' "-DHAVE_PIPE2" \
'#define _GNU_SOURCE\n#include <fcntl.h>\n#include <unistd.h>\nint main() {\nint pipefd[2];\npipe2(pipefd, O_CLOEXEC);\nreturn 0;}'

check_compile 'whether we have SOCK_CLOEXEC' "-DHAVE_SOCK_CLOEXEC" \
'#define _GNU_SOURCE\n#include <sys/socket.h>\nint main() {\nreturn socket(AF_INET, SOCK_DGRAM|SOCK_CLOEXEC, 0);}'

check_compile 'whether we have clock_gettime' "-DHAVE_CLOCK_GETTIME" \
'#define _GNU_SOURCE\n#include <time.h>\nint main() {\nstruct timespec now;clock_gettime(CLOCK_REALTIME, &now);\nreturn now.tv_sec ^ now.tv_nsec;}'

check_define __APPLE__ && {
	mac_detected=true
	check_define __x86_64__ && mac_64=true
	if test "$hookmethod" = auto ; then
		osver=$(get_define_stripped __ENVIRONMENT_MAC_OS_X_VERSION_MIN_REQUIRED__ 2>/dev/null)
		test "$osver" -gt $((120000 - 1)) && hookmethod=dyld
	fi
}
check_define __FreeBSD__ && bsd_detected=true
check_define __NetBSD__ && bsd_detected=true
check_define __OpenBSD__ && {
bsd_detected=true
echo "CFLAGS+=-DIS_OPENBSD">>config.mak
check_compile_run 'whether OpenBSDs fclose() (illegally) calls close()' \
'#include <stdio.h>\n#include<stdlib.h>\nint close(int x){exit(0);}int main(){fclose(stdin);return 1;}' && \
OUR_CPPFLAGS="$OUR_CPPFLAGS -DBROKEN_FCLOSE"
}
check_define __sun && check_define __SVR4 && solaris_detected=true
check_define __HAIKU__ && haiku_detected=true

echo "CC=$CC">>config.mak
[ -z "$CPPFLAGS" ] || echo "CPPFLAGS=$CPPFLAGS">>config.mak
[ -z "$CFLAGS" ] || echo "USER_CFLAGS=$CFLAGS">>config.mak
[ -z "$LDFLAGS" ] || echo "USER_LDFLAGS=$LDFLAGS">>config.mak
echo prefix=$prefix>>config.mak
echo exec_prefix=$exec_prefix>>config.mak
echo bindir=$bindir>>config.mak
echo libdir=$libdir>>config.mak
echo includedir=$includedir>>config.mak
echo sysconfdir=$sysconfdir>>config.mak
[ "$ignore_cve" = "no" ] && echo "CPPFLAGS+= -DSUPER_SECURE">>config.mak
[ -z "$OUR_CPPFLAGS" ] || echo "CPPFLAGS+= $OUR_CPPFLAGS" >>config.mak

check_link "whether we can use -Wl,--no-as-needed" "-Wl,--no-as-needed" \
"int main() { return 0; }" || echo NO_AS_NEEDED= >> config.mak

LD_SONAME_FLAG=
printf "checking what's the option to use in linker to set library name ... "
for o in --soname -h -soname -install_name; do
	check_link_silent "-shared -Wl,$o,libconftest.so" "void test_func(void) {}" && LD_SONAME_FLAG=$o && break
done
if [ -z "$LD_SONAME_FLAG" ]; then
	printf '\ncannot find an option to set library name\n'
	exit 1
fi
echo "$LD_SONAME_FLAG"
echo "LD_SET_SONAME = -Wl,$LD_SONAME_FLAG," >> config.mak

if check_link "checking whether we can use -ldl" "-ldl" \
"int main(){return 0;}" ; then
echo "LIBDL = -ldl" >> config.mak
fi

if check_link "checking whether we can use -lpthread" "-lpthread" \
"int main(){return 0;}" ; then
echo "PTHREAD = -lpthread" >> config.mak
else
check_link "checking whether we can use -pthread" "-pthread" \
"int main(){return 0;}" || fail "no pthread support detected"
echo "PTHREAD = -pthread" >> config.mak
fi

make_cmd=make
if ismac ; then
	echo LDSO_SUFFIX=dylib>>config.mak
	echo MAC_CFLAGS+=-DIS_MAC=1>>config.mak
	if test "$hookmethod" = dyld ; then
		echo "using Monterey style DYLD hooking"
		echo "CFLAGS+=-DMONTEREY_HOOKING">>config.mak
	fi
	if ismac64 && [ "$fat_binary" = 1 ] ; then
		echo "Configuring a fat binary for i386 and x86_64"
		echo "MAC_CFLAGS+=-arch i386 -arch x86_64">>config.mak
		echo "FAT_LDFLAGS=-arch i386 -arch x86_64">>config.mak
		echo "FAT_BIN_LDFLAGS=-arch i386 -arch x86_64">>config.mak
	fi
	if [ "$fat_binary_m1" = 1 ] ; then
		echo "Configuring a fat binary for arm64[e] and x86_64"
		echo "MAC_CFLAGS+=-arch arm64 -arch arm64e -arch x86_64">>config.mak
		echo "FAT_LDFLAGS=-arch arm64 -arch arm64e -arch x86_64">>config.mak
		echo "FAT_BIN_LDFLAGS=-arch arm64 -arch x86_64">>config.mak
	fi
	if [ "$fat_binary_m2" = 1 ] ; then
		echo "Configuring a fat binary for arm64[e] and x86_64"
		echo "MAC_CFLAGS+=-arch arm64 -arch arm64e -arch x86_64">>config.mak
		echo "FAT_LDFLAGS=-arch arm64 -arch arm64e -arch x86_64">>config.mak
		echo "FAT_BIN_LDFLAGS=-arch arm64 -arch arm64e -arch x86_64">>config.mak
	fi
elif isbsd ; then
	echo LIBDL=>>config.mak
	echo "CFLAGS+=-DIS_BSD">>config.mak
	make_cmd=gmake
elif issolaris; then
	echo "CFLAGS+=-DIS_SOLARIS -D__EXTENSIONS__" >> config.mak
	echo "SOCKET_LIBS=-lsocket -lnsl" >> config.mak
elif ishaiku ; then
	echo LIBDL=>>config.mak
	echo "CFLAGS+=-DIS_HAIKU" >> config.mak
fi

echo "Done, now run $make_cmd && $make_cmd install"
if [ "$fat_binary_m2" = 1 ] ; then
echo "Don't forget to run csrutil disable and sudo nvram boot-args=-arm64e_preview_abi"
fi


================================================
FILE: src/allocator_thread.c
================================================
#undef _GNU_SOURCE
#define _GNU_SOURCE
#undef _POSIX_C_SOURCE
#define _DARWIN_C_SOURCE
#include <limits.h>
#include <pthread.h>
#include <unistd.h>
#include <fcntl.h>
#include <stdlib.h>
#include <stdio.h>
#include <sys/select.h>
#include <assert.h>
#include <string.h>
#include <stdint.h>
#include <stddef.h>
#include <errno.h>
#include <sys/mman.h>
#include "allocator_thread.h"
#include "debug.h"
#include "ip_type.h"
#include "mutex.h"
#include "hash.h"
#include "remotedns.h"

/* stuff for our internal translation table */

typedef struct {
	uint32_t hash;
	char* string;
} string_hash_tuple;

typedef struct {
	uint32_t counter;
	uint32_t capa;
	string_hash_tuple** list;
} internal_ip_lookup_table;

static void *dumpstring(char* s, size_t len) {
	char* p = malloc(len);
	if(p) memcpy(p, s, len);
	return p;
}

static pthread_mutex_t *internal_ips_lock;
static internal_ip_lookup_table *internal_ips;

uint32_t index_from_internal_ip(ip_type4 internalip) {
	PFUNC();
	ip_type4 tmp = internalip;
	uint32_t ret;
	ret = tmp.octet[3] + (tmp.octet[2] << 8) + (tmp.octet[1] << 16);
	ret -= 1;
	return ret;
}

char *string_from_internal_ip(ip_type4 internalip) {
	PFUNC();
	char *res = NULL;
	uint32_t index = index_from_internal_ip(internalip);
	if(index < internal_ips->counter)
		res = internal_ips->list[index]->string;
	return res;
}

extern unsigned int remote_dns_subnet;
ip_type4 make_internal_ip(uint32_t index) {
	ip_type4 ret;
	index++; // so we can start at .0.0.1
	if(index > 0xFFFFFF)
		return IPT4_INVALID;
	ret.octet[0] = remote_dns_subnet & 0xFF;
	ret.octet[1] = (index & 0xFF0000) >> 16;
	ret.octet[2] = (index & 0xFF00) >> 8;
	ret.octet[3] = index & 0xFF;
	return ret;
}

static ip_type4 ip_from_internal_list(char* name, size_t len) {
	uint32_t hash = dalias_hash((char *) name);
	size_t i;
	ip_type4 res;
	void* new_mem;
	// see if we already have this dns entry saved.
	if(internal_ips->counter) {
		for(i = 0; i < internal_ips->counter; i++) {
			if(internal_ips->list[i]->hash == hash && !strcmp(name, internal_ips->list[i]->string)) {
				res = make_internal_ip(i);
				PDEBUG("got cached ip for %s\n", name);
				goto have_ip;
			}
		}
	}
	// grow list if needed.
	if(internal_ips->capa < internal_ips->counter + 1) {
		PDEBUG("realloc\n");
		new_mem = realloc(internal_ips->list, (internal_ips->capa + 16) * sizeof(void *));
		if(new_mem) {
			internal_ips->capa += 16;
			internal_ips->list = new_mem;
		} else {
	oom:
			PDEBUG("out of mem\n");
			goto err_plus_unlock;
		}
	}

	res = make_internal_ip(internal_ips->counter);
	if(res.as_int == IPT4_INVALID.as_int)
		goto err_plus_unlock;

	string_hash_tuple tmp = { 0 };
	new_mem = dumpstring((char*) &tmp, sizeof(string_hash_tuple));
	if(!new_mem)
		goto oom;

	PDEBUG("creating new entry %d for ip of %s\n", (int) internal_ips->counter, name);

	internal_ips->list[internal_ips->counter] = new_mem;
	internal_ips->list[internal_ips->counter]->hash = hash;

	new_mem = dumpstring((char*) name, len);

	if(!new_mem) {
		internal_ips->list[internal_ips->counter] = 0;
		goto oom;
	}
	internal_ips->list[internal_ips->counter]->string = new_mem;

	internal_ips->counter += 1;

	have_ip:

	return res;
	err_plus_unlock:

	PDEBUG("return err\n");
	return IPT4_INVALID;
}

/* stuff for communication with the allocator thread */

enum at_direction {
	ATD_SERVER = 0,
	ATD_CLIENT,
	ATD_MAX,
};

static pthread_t allocator_thread;
int req_pipefd[2];
int resp_pipefd[2];

static int wait_data(int readfd) {
	PFUNC();
	fd_set fds;
	FD_ZERO(&fds);
	FD_SET(readfd, &fds);
	int ret;
	while((ret = select(readfd+1, &fds, NULL, NULL, NULL)) <= 0) {
		if(ret < 0) {
			int e = errno;
			if(e == EINTR) continue;
#ifdef __GLIBC__
			char emsg[1024];
			char* x = strerror_r(errno, emsg, sizeof emsg);
			dprintf(2, "select2: %s\n", x);
#endif
			return 0;
		}
	}
	return 1;
}

static int trywrite(int fd, void* buf, size_t bytes) {
	ssize_t ret;
	unsigned char *out = buf;
again:
	ret = write(fd, out, bytes);
	switch(ret) {
		case -1:
			if(errno == EINTR) goto again;
		case  0:
			return 0;
		default:
			if(ret == bytes || !bytes) return 1;
			out += ret;
			bytes -= ret;
			goto again;
	}
}

static int sendmessage(enum at_direction dir, struct at_msg *msg) {
	static int* destfd[ATD_MAX] = { [ATD_SERVER] = &req_pipefd[1], [ATD_CLIENT] = &resp_pipefd[1] };
	assert(msg->h.datalen <= MSG_LEN_MAX);
	int ret = trywrite(*destfd[dir], msg, sizeof (msg->h)+msg->h.datalen);
	assert(msg->h.datalen <= MSG_LEN_MAX);
	return ret;
}

static int tryread(int fd, void* buf, size_t bytes) {
	ssize_t ret;
	unsigned char *out = buf;
again:
	ret = read(fd, out, bytes);
	switch(ret) {
		case -1:
			if(errno == EINTR) goto again;
		case  0:
			return 0;
		default:
			if(ret == bytes || !bytes) return 1;
			out += ret;
			bytes -= ret;
			goto again;
	}
}
static int readmsg(int fd, struct at_msg *msg) {
	int ret = tryread(fd, msg, sizeof(msg->h));
	if(ret != 1) return ret;
	return tryread(fd, &msg->m, msg->h.datalen);
}

static int getmessage(enum at_direction dir, struct at_msg *msg) {
	static int* readfd[ATD_MAX] = { [ATD_SERVER] = &req_pipefd[0], [ATD_CLIENT] = &resp_pipefd[0] };
	ssize_t ret;
	if((ret = wait_data(*readfd[dir]))) {
		if(!readmsg(*readfd[dir], msg))
			return 0;
		assert(msg->h.datalen <= MSG_LEN_MAX);
	}
	return ret;
}

static void* threadfunc(void* x) {
	(void) x;
	int ret;
	struct at_msg msg;
	while((ret = getmessage(ATD_SERVER, &msg))) {
		switch(msg.h.msgtype) {
			case ATM_GETIP:
				/* client wants an ip for a DNS name. iterate our list and check if we have an existing entry.
					* if not, create a new one. */
				msg.m.ip = ip_from_internal_list(msg.m.host, msg.h.datalen);
				msg.h.datalen = sizeof(ip_type4);
				break;
			case ATM_GETNAME: {
				char *host = string_from_internal_ip(msg.m.ip);
				if(host) {
					size_t l = strlen(host);
					assert(l+1 < MSG_LEN_MAX);
					memcpy(msg.m.host, host, l + 1);
					msg.h.datalen = l + 1;
				} else {
					msg.h.datalen = 0;
				}
				break;
			}
			case ATM_EXIT:
				return 0;
			default:
				abort();
		}
		ret = sendmessage(ATD_CLIENT, &msg);
	}
	return 0;
}

/* API to access the internal ip mapping */

ip_type4 at_get_ip_for_host(char* host, size_t len) {
	ip_type4 readbuf;
	MUTEX_LOCK(internal_ips_lock);
	if(len > MSG_LEN_MAX) goto inv;
	struct at_msg msg = {.h.msgtype = ATM_GETIP, .h.datalen = len + 1 };
	memcpy(msg.m.host, host, len+1);
	if(sendmessage(ATD_SERVER, &msg) &&
	   getmessage(ATD_CLIENT, &msg)) readbuf = msg.m.ip;
	else {
		inv:
		readbuf = IPT4_INVALID;
	}
	assert(msg.h.msgtype == ATM_GETIP);
	MUTEX_UNLOCK(internal_ips_lock);
	return readbuf;
}

size_t at_get_host_for_ip(ip_type4 ip, char* readbuf) {
	struct at_msg msg = {.h.msgtype = ATM_GETNAME, .h.datalen = sizeof(ip_type4), .m.ip = ip };
	size_t res = 0;
	MUTEX_LOCK(internal_ips_lock);
	if(sendmessage(ATD_SERVER, &msg) && getmessage(ATD_CLIENT, &msg)) {
		if((int16_t) msg.h.datalen <= 0) res = 0;
		else {
			memcpy(readbuf, msg.m.host, msg.h.datalen);
			res = msg.h.datalen - 1;
		}
	}
	assert(msg.h.msgtype == ATM_GETNAME);
	MUTEX_UNLOCK(internal_ips_lock);
	return res;
}


static void initpipe(int* fds) {
	int retval;

#ifdef HAVE_PIPE2
	retval = pipe2(fds, O_CLOEXEC);
#else
	retval = pipe(fds);
	if(retval == 0) {
		fcntl(fds[0], F_SETFD, FD_CLOEXEC);
		fcntl(fds[1], F_SETFD, FD_CLOEXEC);
	}
#endif
	if(retval == -1) {
		perror("pipe");
		exit(1);
	}
}

#ifndef MAX
#define MAX(x, y) ((x) > (y) ? (x) : (y))
#endif

#if !defined(PTHREAD_STACK_MIN) || defined(__APPLE__)
/* MAC says its min is 8KB, but then crashes in our face. thx hunkOLard */
#define PTHREAD_STACK_MIN 64*1024
#endif

/* initialize with pointers to shared memory. these will
 * be used to place responses and arguments */
void at_init(void) {
	PFUNC();
	void *shm = mmap(0, 4096, PROT_WRITE|PROT_READ, MAP_ANON|MAP_SHARED, -1, 0);
	assert(shm);
	internal_ips_lock = shm;
	internal_ips = (void*)((char*)shm + 2048);

	MUTEX_INIT(internal_ips_lock);
	memset(internal_ips, 0, sizeof *internal_ips);
	initpipe(req_pipefd);
	initpipe(resp_pipefd);
	pthread_attr_t allocator_thread_attr;
	pthread_attr_init(&allocator_thread_attr);
	pthread_attr_setstacksize(&allocator_thread_attr, MAX(16 * 1024, PTHREAD_STACK_MIN));
	pthread_create(&allocator_thread, &allocator_thread_attr, threadfunc, 0);
	pthread_attr_destroy(&allocator_thread_attr);
}

void at_close(void) {
	PFUNC();
	const int msg = ATM_EXIT;
	write(req_pipefd[1], &msg, sizeof(int));
	pthread_join(allocator_thread, NULL);
	close(req_pipefd[0]);
	close(req_pipefd[1]);
	close(resp_pipefd[0]);
	close(resp_pipefd[1]);
	MUTEX_DESTROY(internal_ips_lock);
}


================================================
FILE: src/allocator_thread.h
================================================
#ifndef ALLOCATOR_THREAD_H
#define ALLOCATOR_THREAD_H

#include <unistd.h>
#include "ip_type.h"

extern int req_pipefd[2];
extern int resp_pipefd[2];

void at_init(void);
void at_close(void);
size_t at_get_host_for_ip(ip_type4 ip, char* readbuf);
ip_type4 at_get_ip_for_host(char* host, size_t len);

//RcB: DEP "allocator_thread.c"
#endif



================================================
FILE: src/common.c
================================================
#include "common.h"
#include <stdlib.h>
#include <unistd.h>
#include <stdio.h>

const char *proxy_type_strmap[] = {
    "http",
    "socks4",
    "socks5",
};

const char *chain_type_strmap[] = {
    "dynamic_chain",
    "strict_chain",
    "random_chain",
    "round_robin_chain",
};

const char *proxy_state_strmap[] = {
    "play",
    "down",
    "blocked",
    "busy",
};

/* isnumericipv4() taken from libulz */
int pc_isnumericipv4(const char* ipstring) {
	size_t x = 0, n = 0, d = 0;
	int wasdot = 0;
	while(1) {
		switch(ipstring[x]) {
			case 0: goto done;
			case '.':
				if(!n || wasdot) return 0;
				d++;
				wasdot = 1;
				break;
			case '0': case '1': case '2': case '3': case '4':
			case '5': case '6': case '7': case '8': case '9':
				n++;
				wasdot = 0;
				break;
			default:
				return 0;
		}
		x++;
	}
	done:
	if(d == 3 && n >= 4 && n <= 12) return 1;
	return 0;
}

// stolen from libulz (C) rofl0r
void pc_stringfromipv4(unsigned char *ip_buf_4_bytes, char *outbuf_16_bytes) {
	unsigned char *p;
	char *o = outbuf_16_bytes;
	unsigned char n;
	for(p = ip_buf_4_bytes; p < ip_buf_4_bytes + 4; p++) {
		n = *p;
		if(*p >= 100) {
			if(*p >= 200)
				*(o++) = '2';
			else
				*(o++) = '1';
			n %= 100;
		}
		if(*p >= 10) {
			*(o++) = (n / 10) + '0';
			n %= 10;
		}
		*(o++) = n + '0';
		*(o++) = '.';
	}
	o[-1] = 0;
}

static int check_path(char *path) {
	if(!path)
		return 0;
	return access(path, R_OK) != -1;
}

char *get_config_path(char* default_path, char* pbuf, size_t bufsize) {
	char buf[512];
	// top priority: user defined path
	char *path = default_path;
	if(check_path(path))
		goto have;

	// priority 1: env var PROXYCHAINS_CONF_FILE
	path = getenv(PROXYCHAINS_CONF_FILE_ENV_VAR);
	if(check_path(path))
		goto have;

	// priority 2; proxychains conf in actual dir
	path = getcwd(buf, sizeof(buf));
	snprintf(pbuf, bufsize, "%s/%s", path, PROXYCHAINS_CONF_FILE);
	path = pbuf;
	if(check_path(path))
		goto have;

	// priority 3; $HOME/.proxychains/proxychains.conf
	path = getenv("HOME");
	snprintf(pbuf, bufsize, "%s/.proxychains/%s", path, PROXYCHAINS_CONF_FILE);
	path = pbuf;
	if(check_path(path))
		goto have;
    
    // priority 3b: ~/config/settings/proxychains.conf (for haiku)
	path = getenv("HOME");
	snprintf(pbuf, bufsize, "%s/config/settings/%s", path, PROXYCHAINS_CONF_FILE);
	path = pbuf;
	if(check_path(path))
		goto have;

	// priority 4: $SYSCONFDIR/proxychains.conf
	path = SYSCONFDIR "/" PROXYCHAINS_CONF_FILE;
	if(check_path(path))
		goto have;

	// priority 5: /etc/proxychains.conf
	path = "/etc/" PROXYCHAINS_CONF_FILE;
	if(check_path(path))
		goto have;

	perror("couldnt find configuration file");
	exit(1);

	return NULL;
	have:
	return path;
}


================================================
FILE: src/common.h
================================================
#ifndef COMMON_H
#define COMMON_H

#define PROXYCHAINS_CONF_FILE_ENV_VAR "PROXYCHAINS_CONF_FILE"
#define PROXYCHAINS_QUIET_MODE_ENV_VAR "PROXYCHAINS_QUIET_MODE"
#define PROXYCHAINS_CONF_FILE "proxychains.conf"
#define LOG_PREFIX "[proxychains] "
#ifndef SYSCONFDIR
#define SYSCONFDIR "/etc"
#endif

#include <stddef.h>

extern const char *proxy_type_strmap[];
extern const char *chain_type_strmap[];
extern const char *proxy_state_strmap[];

char *get_config_path(char* default_path, char* pbuf, size_t bufsize);
void pc_stringfromipv4(unsigned char *ip_buf_4_bytes, char *outbuf_16_bytes);
int pc_isnumericipv4(const char* ipstring);

//RcB: DEP "common.c"
#endif


================================================
FILE: src/core.c
================================================
/***************************************************************************
                          core.c  -  description
                             -------------------
    begin                : Tue May 14 2002
    copyright            :  netcreature (C) 2002
    email                : netcreature@users.sourceforge.net
 ***************************************************************************
 *     GPL *
 ***************************************************************************
 *                                                                         *
 *   This program is free software; you can redistribute it and/or modify  *
 *   it under the terms of the GNU General Public License as published by  *
 *   the Free Software Foundation; either version 2 of the License, or     *
 *   (at your option) any later version.                                   *
 *                                                                         *
 ***************************************************************************/

#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <netdb.h>

#include <sys/utsname.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <poll.h>
#include <sys/wait.h>
#include <fcntl.h>
#include <time.h>
#include <sys/time.h>
#include <stdarg.h>
#include <assert.h>

#include "core.h"
#include "common.h"
#include "rdns.h"
#include "mutex.h"

extern int tcp_read_time_out;
extern int tcp_connect_time_out;
extern int proxychains_quiet_mode;
extern unsigned int proxychains_proxy_offset;
extern unsigned int remote_dns_subnet;

static int poll_retry(struct pollfd *fds, nfds_t nfsd, int timeout) {
	int ret;
	int time_remain = timeout;
	int time_elapsed = 0;

	struct timeval start_time;
	struct timeval tv;

	gettimeofday(&start_time, NULL);

	do {
		//printf("Retry %d\n", time_remain);
		ret = poll(fds, nfsd, time_remain);
		gettimeofday(&tv, NULL);
		time_elapsed = ((tv.tv_sec - start_time.tv_sec) * 1000 + (tv.tv_usec - start_time.tv_usec) / 1000);
		//printf("Time elapsed %d\n", time_elapsed);
		time_remain = timeout - time_elapsed;
	} while(ret == -1 && errno == EINTR && time_remain > 0);

	//if (ret == -1)
	//printf("Return %d %d %s\n", ret, errno, strerror(errno));
	return ret;
}

static void encode_base_64(char *src, char *dest, int max_len) {
	static const char base64[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
	int n, l, i;
	l = strlen(src);
	max_len = (max_len - 1) / 4;
	for(i = 0; i < max_len; i++, src += 3, l -= 3) {
		switch (l) {
			case 0:
				break;
			case 1:
				n = src[0] << 16;
				*dest++ = base64[(n >> 18) & 077];
				*dest++ = base64[(n >> 12) & 077];
				*dest++ = '=';
				*dest++ = '=';
				break;
			case 2:
				n = src[0] << 16 | src[1] << 8;
				*dest++ = base64[(n >> 18) & 077];
				*dest++ = base64[(n >> 12) & 077];
				*dest++ = base64[(n >> 6) & 077];
				*dest++ = '=';
				break;
			default:
				n = src[0] << 16 | src[1] << 8 | src[2];
				*dest++ = base64[(n >> 18) & 077];
				*dest++ = base64[(n >> 12) & 077];
				*dest++ = base64[(n >> 6) & 077];
				*dest++ = base64[n & 077];
		}
		if(l < 3)
			break;
	}
	*dest++ = 0;
}

void proxychains_write_log(char *str, ...) {
	char buff[1024*4];
	va_list arglist;
	if(!proxychains_quiet_mode) {
		va_start(arglist, str);
		vsnprintf(buff, sizeof(buff), str, arglist);
		va_end(arglist);
		fprintf(stderr, "%s", buff);
		fflush(stderr);
	}
}

static int write_n_bytes(int fd, char *buff, size_t size) {
	int i = 0;
	size_t wrote = 0;
	for(;;) {
		i = write(fd, &buff[wrote], size - wrote);
		if(i <= 0)
			return i;
		wrote += i;
		if(wrote == size)
			return wrote;
	}
}

static int read_n_bytes(int fd, char *buff, size_t size) {
	int ready;
	size_t i;
	struct pollfd pfd[1];

	pfd[0].fd = fd;
	pfd[0].events = POLLIN;
	for(i = 0; i < size; i++) {
		pfd[0].revents = 0;
		ready = poll_retry(pfd, 1, tcp_read_time_out);
		if(ready != 1 || !(pfd[0].revents & POLLIN) || 1 != read(fd, &buff[i], 1))
			return -1;
	}
	return (int) size;
}

static int timed_connect(int sock, const struct sockaddr *addr, socklen_t len) {
	int ret, value;
	socklen_t value_len;
	struct pollfd pfd[1];
	PFUNC();

	pfd[0].fd = sock;
	pfd[0].events = POLLOUT;
	fcntl(sock, F_SETFL, O_NONBLOCK);
	ret = true_connect(sock, addr, len);
	PDEBUG("\nconnect ret=%d\n", ret);
	
	if(ret == -1 && errno == EINPROGRESS) {
		ret = poll_retry(pfd, 1, tcp_connect_time_out);
		PDEBUG("\npoll ret=%d\n", ret);
		if(ret == 1) {
			value_len = sizeof(socklen_t);
			getsockopt(sock, SOL_SOCKET, SO_ERROR, &value, &value_len);
			PDEBUG("\nvalue=%d\n", value);
			if(!value)
				ret = 0;
			else
				ret = -1;
		} else {
			ret = -1;
		}
	} else {
#ifdef DEBUG
		if(ret == -1)
			perror("true_connect");
#endif
		if(ret != 0)
			ret = -1;
	}

	fcntl(sock, F_SETFL, !O_NONBLOCK);
	return ret;
}


#define INVALID_INDEX 0xFFFFFFFFU
#define BUFF_SIZE 1024  // used to read responses from proxies.
static int tunnel_to(int sock, ip_type ip, unsigned short port, proxy_type pt, char *user, char *pass) {
	char *dns_name = NULL;
	char hostnamebuf[MSG_LEN_MAX];
	size_t dns_len = 0;

	PFUNC();

	// we use ip addresses with 224.* to lookup their dns name in our table, to allow remote DNS resolution
	// the range 224-255.* is reserved, and it won't go outside (unless the app does some other stuff with
	// the results returned from gethostbyname et al.)
	// the hardcoded number 224 can now be changed using the config option remote_dns_subnet to i.e. 127
	if(!ip.is_v6 && proxychains_resolver >= DNSLF_RDNS_START && ip.addr.v4.octet[0] == remote_dns_subnet) {
		dns_len = rdns_get_host_for_ip(ip.addr.v4, hostnamebuf);
		if(!dns_len) goto err;
		else dns_name = hostnamebuf;
	}
	
	PDEBUG("host dns %s\n", dns_name ? dns_name : "<NULL>");

	size_t ulen = strlen(user);
	size_t passlen = strlen(pass);

	if(ulen > 0xFF || passlen > 0xFF || dns_len > 0xFF) {
		proxychains_write_log(LOG_PREFIX "error: maximum size of 255 for user/pass or domain name!\n");
		goto err;
	}

	int len;
	unsigned char buff[BUFF_SIZE];
	char ip_buf[INET6_ADDRSTRLEN];
	int v6 = ip.is_v6;
	
	switch (pt) {
		case RAW_TYPE: {
			return SUCCESS;
		}
		break;
		case HTTP_TYPE:{
			if(!dns_len) {
				if(!inet_ntop(v6?AF_INET6:AF_INET,ip.addr.v6,ip_buf,sizeof ip_buf)) {
					proxychains_write_log(LOG_PREFIX "error: ip address conversion failed\n");
					goto err;
				}
				dns_name = ip_buf;
			}
			#define HTTP_AUTH_MAX ((0xFF * 2) + 1 + 1) /* 2 * 0xff: username and pass, plus 1 for ':' and 1 for zero terminator. */
			char src[HTTP_AUTH_MAX];
			char dst[(4 * HTTP_AUTH_MAX)];
			if(ulen) {
				snprintf(src, sizeof(src), "%s:%s", user, pass);
				encode_base_64(src, dst, sizeof(dst));
			} else dst[0] = 0;

			uint16_t hs_port = ntohs(port);
			len = snprintf((char *) buff, sizeof(buff),
			               "CONNECT %s:%d HTTP/1.0\r\nHost: %s:%d\r\n%s%s%s\r\n",
			                dns_name, hs_port,
			                dns_name, hs_port,
			                ulen ? "Proxy-Authorization: Basic " : dst,
			                dst, ulen ? "\r\n" : dst);

			if(len < 0 || len != send(sock, buff, len, 0))
				goto err;

			len = 0;
			// read header byte by byte.
			while(len < BUFF_SIZE) {
				if(1 == read_n_bytes(sock, (char *) (buff + len), 1))
					len++;
				else
					goto err;
				if(len > 4 &&
				   buff[len - 1] == '\n' &&
				   buff[len - 2] == '\r' && buff[len - 3] == '\n' && buff[len - 4] == '\r')
					break;
			}

			// if not ok (200) or response greather than BUFF_SIZE return BLOCKED;
			if(len == BUFF_SIZE || !(buff[9] == '2' && buff[10] == '0' && buff[11] == '0')) {
				PDEBUG("HTTP proxy blocked: buff=\"%s\"\n", buff);
				return BLOCKED;
			}

			return SUCCESS;
		}
		break;
		case SOCKS4_TYPE:{
			if(v6) {
				proxychains_write_log(LOG_PREFIX "error: SOCKS4 doesn't support ipv6 addresses\n");
				goto err;
			}
			buff[0] = 4;	// socks version
			buff[1] = 1;	// connect command
			memcpy(&buff[2], &port, 2);	// dest port
			if(dns_len) {
				ip.addr.v4.octet[0] = 0;
				ip.addr.v4.octet[1] = 0;
				ip.addr.v4.octet[2] = 0;
				ip.addr.v4.octet[3] = 1;
			}
			memcpy(&buff[4], &ip.addr.v4, 4);	// dest host
			len = ulen + 1;	// username
			if(len > 1)
				memcpy(&buff[8], user, len);
			else {
				buff[8] = 0;
			}

			// do socksv4a dns resolution on the server
			if(dns_len) {
				memcpy(&buff[8 + len], dns_name, dns_len + 1);
				len += dns_len + 1;
			}

			if((len + 8) != write_n_bytes(sock, (char *) buff, (8 + len)))
				goto err;

			if(8 != read_n_bytes(sock, (char *) buff, 8))
				goto err;

			if(buff[0] != 0 || buff[1] != 90)
				return BLOCKED;

			return SUCCESS;
		}
		break;
		case SOCKS5_TYPE:{
			int n_methods = ulen ? 2 : 1;
			buff[0] = 5;	// version
			buff[1] = n_methods ;	// number of methods
			buff[2] = 0;	// no auth method
			if(ulen) buff[3] = 2;    /// auth method -> username / password
			if(2+n_methods != write_n_bytes(sock, (char *) buff, 2+n_methods))
				goto err;

			if(2 != read_n_bytes(sock, (char *) buff, 2))
				goto err;

			if(buff[0] != 5 || (buff[1] != 0 && buff[1] != 2)) {
				if(buff[0] == 5 && buff[1] == 0xFF)
					return BLOCKED;
				else
					goto err;
			}

			if(buff[1] == 2) {
				// authentication
				char in[2];
				char out[515];
				char *cur = out;
				size_t c;
				*cur++ = 1;	// version
				c = ulen & 0xFF;
				*cur++ = c;
				memcpy(cur, user, c);
				cur += c;
				c = passlen & 0xFF;
				*cur++ = c;
				memcpy(cur, pass, c);
				cur += c;

				if((cur - out) != write_n_bytes(sock, out, cur - out))
					goto err;


				if(2 != read_n_bytes(sock, in, 2))
					goto err;
	/* according to RFC 1929 the version field for the user/pass auth sub-
	   negotiation should be 1, which is kinda counter-intuitive, so there
	   are some socks5 proxies that return 5 instead. other programs like
	   curl work fine when the version is 5, so let's do the same and accept
	   either of them. */
				if(!(in[0] == 5 || in[0] == 1))
					goto err;
				if(in[1] != 0)
					return BLOCKED;
			}
			int buff_iter = 0;
			buff[buff_iter++] = 5;	// version
			buff[buff_iter++] = 1;	// connect
			buff[buff_iter++] = 0;	// reserved

			if(!dns_len) {
				buff[buff_iter++] = v6 ? 4 : 1;	// ip v4/v6
				memcpy(buff + buff_iter, ip.addr.v6, v6?16:4);	// dest host
				buff_iter += v6?16:4;
			} else {
				buff[buff_iter++] = 3;	//dns
				buff[buff_iter++] = dns_len & 0xFF;
				memcpy(buff + buff_iter, dns_name, dns_len);
				buff_iter += dns_len;
			}

			memcpy(buff + buff_iter, &port, 2);	// dest port
			buff_iter += 2;


			if(buff_iter != write_n_bytes(sock, (char *) buff, buff_iter))
				goto err;

			if(4 != read_n_bytes(sock, (char *) buff, 4))
				goto err;

			if(buff[0] != 5 || buff[1] != 0)
				goto err;

			switch (buff[3]) {
				case 1:
					len = 4;
					break;
				case 4:
					len = 16;
					break;
				case 3:
					len = 0;
					if(1 != read_n_bytes(sock, (char *) &len, 1))
						goto err;
					break;
				default:
					goto err;
			}

			if(len + 2 != read_n_bytes(sock, (char *) buff, len + 2))
				goto err;

			return SUCCESS;
		}
		break;
	}

	err:
	return SOCKET_ERROR;
}

#define TP " ... "
#define DT "Dynamic chain"
#define ST "Strict chain"
#define RT "Random chain"
#define RRT "Round Robin chain"

static int start_chain(int *fd, proxy_data * pd, char *begin_mark) {
	int v6 = pd->ip.is_v6;

	*fd = socket(v6?PF_INET6:PF_INET, SOCK_STREAM, 0);
	if(*fd == -1)
		goto error;
	
	char ip_buf[INET6_ADDRSTRLEN];
	if(!inet_ntop(v6?AF_INET6:AF_INET,pd->ip.addr.v6,ip_buf,sizeof ip_buf))
		goto error;

	proxychains_write_log(LOG_PREFIX "%s " TP " %s:%d ",
			      begin_mark, ip_buf, htons(pd->port));
	pd->ps = PLAY_STATE;
	struct sockaddr_in addr = {
		.sin_family = AF_INET,
		.sin_port = pd->port,
		.sin_addr.s_addr = (in_addr_t) pd->ip.addr.v4.as_int
	};
	struct sockaddr_in6 addr6 = {
		.sin6_family = AF_INET6,
		.sin6_port = pd->port,
	};
	if(v6) memcpy(&addr6.sin6_addr.s6_addr, pd->ip.addr.v6, 16);
	if(timed_connect(*fd, (struct sockaddr *) (v6?(void*)&addr6:(void*)&addr), v6?sizeof(addr6):sizeof(addr))) {
		pd->ps = DOWN_STATE;
		goto error1;
	}
	pd->ps = BUSY_STATE;
	return SUCCESS;
	error1:
	proxychains_write_log(TP " timeout\n");
	error:
	if(*fd != -1) {
		close(*fd);
		*fd = -1;
	}
	return SOCKET_ERROR;
}

static proxy_data *select_proxy(select_type how, proxy_data * pd, unsigned int proxy_count, unsigned int *offset) {
	unsigned int i = 0, k = 0;
	if(*offset >= proxy_count)
		return NULL;
	switch (how) {
		case RANDOMLY:
			do {
				k++;
				i = rand() % proxy_count;
			} while(pd[i].ps != PLAY_STATE && k < proxy_count * 100);
			break;
		case FIFOLY:
			for(i = *offset; i < proxy_count; i++) {
				if(pd[i].ps == PLAY_STATE) {
					*offset = i;
					break;
				}
			}
		default:
			break;
	}
	if(i >= proxy_count)
		i = 0;
	return (pd[i].ps == PLAY_STATE) ? &pd[i] : NULL;
}


static void release_all(proxy_data * pd, unsigned int proxy_count) {
	unsigned int i;
	for(i = 0; i < proxy_count; i++)
		pd[i].ps = PLAY_STATE;
	return;
}

static void release_busy(proxy_data * pd, unsigned int proxy_count) {
	unsigned int i;
	for(i = 0; i < proxy_count; i++)
		if(pd[i].ps == BUSY_STATE)
			pd[i].ps = PLAY_STATE;
	return;
}

static unsigned int calc_alive(proxy_data * pd, unsigned int proxy_count) {
	unsigned int i;
	int alive_count = 0;
	release_busy(pd, proxy_count);
	for(i = 0; i < proxy_count; i++)
		if(pd[i].ps == PLAY_STATE)
			alive_count++;
	return alive_count;
}


static int chain_step(int *ns, proxy_data * pfrom, proxy_data * pto) {
	int retcode = -1;
	char *hostname, *errmsg = 0;
	char hostname_buf[MSG_LEN_MAX];
	char ip_buf[INET6_ADDRSTRLEN];
	int v6 = pto->ip.is_v6;

	PFUNC();

	if(!v6 && proxychains_resolver >= DNSLF_RDNS_START && pto->ip.addr.v4.octet[0] == remote_dns_subnet) {
		if(!rdns_get_host_for_ip(pto->ip.addr.v4, hostname_buf)) goto usenumericip;
		else hostname = hostname_buf;
	} else {
	usenumericip:
		if(!inet_ntop(v6?AF_INET6:AF_INET,pto->ip.addr.v6,ip_buf,sizeof ip_buf)) {
			pto->ps = DOWN_STATE;
			errmsg = "<--ip conversion error!\n";
			retcode = SOCKET_ERROR;
			goto err;
		}
		hostname = ip_buf;
	}

	proxychains_write_log(TP " %s:%d ", hostname, htons(pto->port));
	retcode = tunnel_to(*ns, pto->ip, pto->port, pfrom->pt, pfrom->user, pfrom->pass);
	switch (retcode) {
		case SUCCESS:
			pto->ps = BUSY_STATE;
			break;
		case BLOCKED:
			pto->ps = BLOCKED_STATE;
			errmsg = "<--denied\n";
			goto err;
		case SOCKET_ERROR:
			pto->ps = DOWN_STATE;
			errmsg = "<--socket error or timeout!\n";
			goto err;
	}
	return retcode;
err:
	if(errmsg) proxychains_write_log(errmsg);
	if(*ns != -1) close(*ns);
	*ns = -1;
	return retcode;
}

int connect_proxy_chain(int sock, ip_type target_ip,
			unsigned short target_port, proxy_data * pd,
			unsigned int proxy_count, chain_type ct, unsigned int max_chain) {
	proxy_data p4;
	proxy_data *p1, *p2, *p3;
	int ns = -1;
	int rc = -1;
	unsigned int offset = 0;
	unsigned int alive_count = 0;
	unsigned int curr_len = 0;
	unsigned int looped = 0; // went back to start of list in RR mode
	unsigned int rr_loop_max = 14;

	p3 = &p4;

	PFUNC();

	again:
	rc = -1;
	DUMP_PROXY_CHAIN(pd, proxy_count);

	switch (ct) {
		case DYNAMIC_TYPE:
			alive_count = calc_alive(pd, proxy_count);
			offset = 0;
			do {
				if(!(p1 = select_proxy(FIFOLY, pd, proxy_count, &offset)))
					goto error_more;
			} while(SUCCESS != start_chain(&ns, p1, DT) && offset < proxy_count);
			for(;;) {
				p2 = select_proxy(FIFOLY, pd, proxy_count, &offset);
				if(!p2)
					break;
				if(SUCCESS != chain_step(&ns, p1, p2)) {
					PDEBUG("GOTO AGAIN 1\n");
					goto again;
				}
				p1 = p2;
			}
			//proxychains_write_log(TP);
			p3->ip = target_ip;
			p3->port = target_port;
			if(SUCCESS != chain_step(&ns, p1, p3))
				goto error;
			break;

		case ROUND_ROBIN_TYPE:
			alive_count = calc_alive(pd, proxy_count);
			offset = proxychains_proxy_offset;
			if(alive_count < max_chain)
				goto error_more;
			PDEBUG("1:rr_offset = %d\n", offset);
			/* Check from current RR offset til end */
			for (;rc != SUCCESS;) {
				if (!(p1 = select_proxy(FIFOLY, pd, proxy_count, &offset))) {
					/* We've reached the end of the list, go to the start */
 					offset = 0;
					looped++;
					if (looped > rr_loop_max) {
						proxychains_proxy_offset = 0;
						goto error_more;
					} else {
						PDEBUG("rr_type all proxies down, release all\n");
						release_all(pd, proxy_count);
						/* Each loop we wait 10ms more */
						usleep(10000 * looped);
						continue;
					}
				}
 				PDEBUG("2:rr_offset = %d\n", offset);
 				rc=start_chain(&ns, p1, RRT);
			}
			/* Create rest of chain using RR */
			for(curr_len = 1; curr_len < max_chain;) {
				PDEBUG("3:rr_offset = %d, curr_len = %d, max_chain = %d\n", offset, curr_len, max_chain);
				p2 = select_proxy(FIFOLY, pd, proxy_count, &offset);
				if(!p2) {
					/* Try from the beginning to where we started */
					offset = 0;
					continue;
				} else if(SUCCESS != chain_step(&ns, p1, p2)) {
					PDEBUG("GOTO AGAIN 1\n");
					goto again;
				} else
					p1 = p2;
				curr_len++;
			}
			//proxychains_write_log(TP);
			p3->ip = target_ip;
			p3->port = target_port;
			proxychains_proxy_offset = offset+1;
			PDEBUG("pd_offset = %d, curr_len = %d\n", proxychains_proxy_offset, curr_len);
			if(SUCCESS != chain_step(&ns, p1, p3))
				goto error;
			break;

		case STRICT_TYPE:
			alive_count = calc_alive(pd, proxy_count);
			offset = 0;
			if(!(p1 = select_proxy(FIFOLY, pd, proxy_count, &offset))) {
				PDEBUG("select_proxy failed\n");
				goto error_strict;
			}
			if(SUCCESS != start_chain(&ns, p1, ST)) {
				PDEBUG("start_chain failed\n");
				goto error_strict;
			}
			while(offset < proxy_count) {
				if(!(p2 = select_proxy(FIFOLY, pd, proxy_count, &offset)))
					break;
				if(SUCCESS != chain_step(&ns, p1, p2)) {
					PDEBUG("chain_step failed\n");
					goto error_strict;
				}
				p1 = p2;
			}
			//proxychains_write_log(TP);
			p3->ip = target_ip;
			p3->port = target_port;
			if(SUCCESS != chain_step(&ns, p1, p3))
				goto error;
			break;

		case RANDOM_TYPE:
			alive_count = calc_alive(pd, proxy_count);
			if(alive_count < max_chain)
				goto error_more;
			curr_len = offset = 0;
			do {
				if(!(p1 = select_proxy(RANDOMLY, pd, proxy_count, &offset)))
					goto error_more;
			} while(SUCCESS != start_chain(&ns, p1, RT) && offset < max_chain);
			while(++curr_len < max_chain) {
				if(!(p2 = select_proxy(RANDOMLY, pd, proxy_count, &offset)))
					goto error_more;
				if(SUCCESS != chain_step(&ns, p1, p2)) {
					PDEBUG("GOTO AGAIN 2\n");
					goto again;
				}
				p1 = p2;
			}
			//proxychains_write_log(TP);
			p3->ip = target_ip;
			p3->port = target_port;
			if(SUCCESS != chain_step(&ns, p1, p3))
				goto error;

	}

	proxychains_write_log(TP " OK\n");
	dup2(ns, sock);
	close(ns);
	return 0;
	error:
	if(ns != -1)
		close(ns);
	errno = ECONNREFUSED;	// for nmap ;)
	return -1;

	error_more:
	proxychains_write_log("\n!!!need more proxies!!!\n");
	error_strict:
	PDEBUG("error\n");
	
	release_all(pd, proxy_count);
	if(ns != -1)
		close(ns);
	errno = ETIMEDOUT;
	return -1;
}

static pthread_mutex_t servbyname_lock;
void core_initialize(void) {
	MUTEX_INIT(&servbyname_lock);
}

void core_unload(void) {
	MUTEX_DESTROY(&servbyname_lock);
}

static void gethostbyname_data_setstring(struct gethostbyname_data* data, char* name) {
	snprintf(data->addr_name, sizeof(data->addr_name), "%s", name);
	data->hostent_space.h_name = data->addr_name;
}

extern ip_type4 hostsreader_get_numeric_ip_for_name(const char* name);
struct hostent* proxy_gethostbyname_old(const char *name)
{
	static struct hostent hostent_space;
	static in_addr_t resolved_addr;
	static char* resolved_addr_p;
	static char addr_name[256];

	int pipe_fd[2];
	char buff[256];
	in_addr_t addr;
	pid_t pid;
	int status, ret;
	size_t l;
	struct hostent* hp;

	hostent_space.h_addr_list = &resolved_addr_p;
	*hostent_space.h_addr_list = (char*)&resolved_addr;
	resolved_addr = 0;

	if(pc_isnumericipv4(name)) {
		strcpy(buff, name);
		goto got_buff;
	}

	gethostname(buff,sizeof(buff));
	if(!strcmp(buff,name))
		goto got_buff;

	memset(buff, 0, sizeof(buff));

	// TODO: this works only once, so cache it  ...
	// 	 later
	while ((hp=gethostent()))
		if (!strcmp(hp->h_name,name))
			return hp;
#ifdef HAVE_PIPE2
	ret = pipe2(pipe_fd, O_CLOEXEC);
#else
	ret = pipe(pipe_fd);
	if(ret == 0) {
		fcntl(pipe_fd[0], F_SETFD, FD_CLOEXEC);
		fcntl(pipe_fd[1], F_SETFD, FD_CLOEXEC);
	}
#endif

	if(ret)
		goto err;
	pid = fork();
	switch(pid) {

		case 0: // child
			proxychains_write_log("|DNS-request| %s \n", name);
			close(pipe_fd[0]);
			dup2(pipe_fd[1],1);
			close(pipe_fd[1]);

		//	putenv("LD_PRELOAD=");
			execlp("proxyresolv","proxyresolv",name,NULL);
			perror("can't exec proxyresolv");
			exit(2);

		case -1: //error
			close(pipe_fd[0]);
			close(pipe_fd[1]);
			perror("can't fork");
			goto err;

		default:
			close(pipe_fd[1]);
			waitpid(pid, &status, 0);
			buff[0] = 0;
			read(pipe_fd[0],&buff,sizeof(buff));
			close(pipe_fd[0]);
got_buff:
			l = strlen(buff);
			if (!l) goto err_dns;
			if (buff[l-1] == '\n') buff[l-1] = 0;
			addr = inet_addr(buff);
			if (addr == (in_addr_t) (-1))
				goto err_dns;
			memcpy(*(hostent_space.h_addr_list),
						&addr ,sizeof(struct in_addr));
			hostent_space.h_name = addr_name;
			snprintf(addr_name, sizeof addr_name, "%s", buff);
			hostent_space.h_length = sizeof (in_addr_t);
			hostent_space.h_addrtype = AF_INET;
	}
	proxychains_write_log("|DNS-response| %s is %s\n",
			name, inet_ntoa(*(struct in_addr*)&addr));
	return &hostent_space;
err_dns:
	proxychains_write_log("|DNS-response|: %s lookup error\n", name);
err:
	return NULL;
}

struct hostent *proxy_gethostbyname(const char *name, struct gethostbyname_data* data) {
	PFUNC();
	char buff[256];

	data->resolved_addr_p[0] = (char *) &data->resolved_addr;
	data->resolved_addr_p[1] = NULL;

	data->hostent_space.h_addr_list = data->resolved_addr_p;
	// let aliases point to the NULL member, mimicking an empty list.
	data->hostent_space.h_aliases = &data->resolved_addr_p[1];

	data->resolved_addr = 0;
	data->hostent_space.h_addrtype = AF_INET;
	data->hostent_space.h_length = sizeof(in_addr_t);

	if(pc_isnumericipv4(name)) {
		data->resolved_addr = inet_addr(name);
		goto retname;
	}

	gethostname(buff, sizeof(buff));

	if(!strcmp(buff, name)) {
		data->resolved_addr = inet_addr(buff);
		if(data->resolved_addr == (in_addr_t) (-1))
			data->resolved_addr = (in_addr_t) (IPT4_LOCALHOST.as_int);
		goto retname;
	}

	// this iterates over the "known hosts" db, usually /etc/hosts
	ip_type4 hdb_res = hostsreader_get_numeric_ip_for_name(name);
	if(hdb_res.as_int != IPT4_INVALID.as_int) {
		data->resolved_addr = hdb_res.as_int;
		goto retname;
	}
	
	data->resolved_addr = rdns_get_ip_for_host((char*) name, strlen(name)).as_int;
	if(data->resolved_addr == (in_addr_t) IPT4_INVALID.as_int) return NULL;

	retname:

	gethostbyname_data_setstring(data, (char*) name);
	
	PDEBUG("return hostent space\n");
	
	return &data->hostent_space;
}

struct addrinfo_data {
	struct addrinfo addrinfo_space;
	struct sockaddr_storage sockaddr_space;
	char addr_name[256];
};

void proxy_freeaddrinfo(struct addrinfo *res) {
	PFUNC();
	free(res);
}

static int mygetservbyname_r(const char* name, const char* proto, struct servent* result_buf,
			   char* buf, size_t buflen, struct servent** result) {
	PFUNC();
#ifdef HAVE_GNU_GETSERVBYNAME_R
	PDEBUG("using host getservbyname_r\n");
	return getservbyname_r(name, proto, result_buf, buf, buflen, result);
#endif
	struct servent *res;
	int ret;
	(void) buf; (void) buflen;
	MUTEX_LOCK(&servbyname_lock);
	res = getservbyname(name, proto);
	if(res) {
		*result_buf = *res;
		*result = result_buf;
		ret = 0;
	} else {
		*result = NULL;
		ret = ENOENT;
	}
	MUTEX_UNLOCK(&servbyname_lock);
	return ret;
}

static int looks_like_numeric_ipv6(const char *node)
{
	if(!strchr(node, ':')) return 0;
	const char* p= node;
	while(1) switch(*(p++)) {
		case 0: return 1;
		case ':': case '.':
		case '0': case '1': case '2': case '3': case '4':
		case '5': case '6': case '7': case '8': case '9':
		case 'A': case 'B': case 'C': case 'D': case 'E': case 'F':
		case 'a': case 'b': case 'c': case 'd': case 'e': case 'f':
			break;
		default: return 0;
	}
}

static int my_inet_aton(const char *node, struct addrinfo_data* space)
{
	int ret;
	((struct sockaddr_in *) &space->sockaddr_space)->sin_family = AF_INET;
	ret = inet_aton(node, &((struct sockaddr_in *) &space->sockaddr_space)->sin_addr);
	if(ret || !looks_like_numeric_ipv6(node)) return ret;
	ret = inet_pton(AF_INET6, node, &((struct sockaddr_in6 *) &space->sockaddr_space)->sin6_addr);
	if(ret) ((struct sockaddr_in6 *) &space->sockaddr_space)->sin6_family = AF_INET6;
	return ret;
}

int proxy_getaddrinfo(const char *node, const char *service, const struct addrinfo *hints, struct addrinfo **res) {
	struct gethostbyname_data ghdata;
	struct addrinfo_data *space;
	struct servent *se = NULL;
	struct hostent *hp = NULL;
	struct servent se_buf;
	struct addrinfo *p;
	char buf[1024];
	int port, af = AF_INET;

	PDEBUG("proxy_getaddrinfo node:%s service: %s, flags: %d\n",
		node?node:"",service?service:"",hints?(int)hints->ai_flags:0);

	space = calloc(1, sizeof(struct addrinfo_data));
	if(!space) return EAI_MEMORY;

	if(node && !my_inet_aton(node, space)) {
		/* some folks (nmap) use getaddrinfo() with AI_NUMERICHOST to check whether a string
		   containing a numeric ip was passed. we must return failure in that case. */
		if(hints && (hints->ai_flags & AI_NUMERICHOST)) {
err_nn:
			free(space);
			return EAI_NONAME;
		}
		if(proxychains_resolver == DNSLF_FORKEXEC)
			hp = proxy_gethostbyname_old(node);
		else
			hp = proxy_gethostbyname(node, &ghdata);

		if(hp)
			memcpy(&((struct sockaddr_in *) &space->sockaddr_space)->sin_addr,
			       *(hp->h_addr_list), sizeof(in_addr_t));
		else
			goto err_nn;
	} else if(node) {
		af = ((struct sockaddr_in *) &space->sockaddr_space)->sin_family;
	} else if(!node && !(hints->ai_flags & AI_PASSIVE)) {
		af = ((struct sockaddr_in *) &space->sockaddr_space)->sin_family = AF_INET;
		memcpy(&((struct sockaddr_in *) &space->sockaddr_space)->sin_addr,
		       "\177\0\0\1", 4);
	}
	if(service) mygetservbyname_r(service, NULL, &se_buf, buf, sizeof(buf), &se);

	port = se ? se->s_port : htons(atoi(service ? service : "0"));
	if(af == AF_INET)
		((struct sockaddr_in *) &space->sockaddr_space)->sin_port = port;
	else
		((struct sockaddr_in6 *) &space->sockaddr_space)->sin6_port = port;

	*res = p = &space->addrinfo_space;
	assert((size_t)p == (size_t) space);

	p->ai_addr = (void*) &space->sockaddr_space;
	if(node)
		snprintf(space->addr_name, sizeof(space->addr_name), "%s", node);
	p->ai_canonname = space->addr_name;
	p->ai_next = NULL;
	p->ai_family = space->sockaddr_space.ss_family = af;
	p->ai_addrlen = af == AF_INET ? sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6);

	if(hints) {
		p->ai_socktype = hints->ai_socktype;
		p->ai_flags = hints->ai_flags;
		p->ai_protocol = hints->ai_protocol;
		if(!p->ai_socktype && p->ai_protocol == IPPROTO_TCP)
			p->ai_socktype = SOCK_STREAM;
	} else {
#ifndef AI_V4MAPPED
#define AI_V4MAPPED 0
#endif
		p->ai_flags = (AI_V4MAPPED | AI_ADDRCONFIG);
	}
	return 0;
}


================================================
FILE: src/core.h
================================================
/***************************************************************************
                          core.h  -  description
                             -------------------
    begin                : Tue May 14 2002
    copyright          :  netcreature (C) 2002
    email                 : netcreature@users.sourceforge.net
 ***************************************************************************
 ***************************************************************************
 *                                                                         *
 *   This program is free software; you can redistribute it and/or modify  *
 *   it under the terms of the GNU General Public License as published by  *
 *   the Free Software Foundation; either version 2 of the License, or     *
 *   (at your option) any later version.                                   *
 *                                                                         *
 ***************************************************************************/

#include <unistd.h>
#include <stdint.h>
#include <netinet/in.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netdb.h>

#ifndef __CORE_HEADER
#define __CORE_HEADER
#define     MAX_LOCALNET 64
#define     MAX_DNAT 64

#include "ip_type.h"

/*error codes*/
typedef enum {
	SUCCESS=0,
	MEMORY_FAIL,        // malloc failed
	SOCKET_ERROR,  // look errno for more
	CHAIN_DOWN,    // no proxy in chain responds to tcp
	CHAIN_EMPTY,   //  if proxy_count = 0
	BLOCKED  //  target's port blocked on last proxy in the chain
} ERR_CODE;

typedef enum {
	HTTP_TYPE,
	SOCKS4_TYPE,
	SOCKS5_TYPE,
	RAW_TYPE
} proxy_type;

typedef enum {
	DYNAMIC_TYPE,
	STRICT_TYPE,
	RANDOM_TYPE,
	ROUND_ROBIN_TYPE
} chain_type;

typedef enum {
	PLAY_STATE,
	DOWN_STATE,
	BLOCKED_STATE,
	BUSY_STATE
} proxy_state;

typedef enum {
	RANDOMLY,
	FIFOLY
} select_type;

typedef struct {
	sa_family_t family;
	unsigned short port;
	union {
		struct {
			struct in_addr in_addr;
			struct in_addr in_mask;
		};
		struct {
			struct in6_addr in6_addr;
			unsigned char in6_prefix;
		};
	};
} localaddr_arg;

typedef struct {
	struct in_addr orig_dst, new_dst;
	unsigned short orig_port, new_port;
} dnat_arg;

typedef struct {
	ip_type ip;
	unsigned short port;
	proxy_type pt;
	proxy_state ps;
	char user[256];
	char pass[256];
} proxy_data;

int connect_proxy_chain (int sock, ip_type target_ip, unsigned short target_port,
			 proxy_data * pd, unsigned int proxy_count, chain_type ct,
			 unsigned int max_chain );

void proxychains_write_log(char *str, ...);

typedef int (*close_t)(int);
typedef int (*close_range_t)(unsigned, unsigned, int);
typedef int (*connect_t)(int, const struct sockaddr *, socklen_t);
typedef struct hostent* (*gethostbyname_t)(const char *);
typedef void (*freeaddrinfo_t)(struct addrinfo *);
typedef struct hostent *(*gethostbyaddr_t) (const void *, socklen_t, int);

typedef int (*getaddrinfo_t)(const char *, const char *, const struct addrinfo *, 
			     struct addrinfo **);

typedef int (*getnameinfo_t) (const struct sockaddr *, socklen_t, char *, 
			      GN_NODELEN_T, char *, GN_SERVLEN_T, GN_FLAGS_T);

typedef ssize_t (*sendto_t) (int sockfd, const void *buf, size_t len, int flags,
			     const struct sockaddr *dest_addr, socklen_t addrlen);



extern connect_t true_connect;
extern gethostbyname_t true_gethostbyname;
extern getaddrinfo_t true_getaddrinfo;
extern freeaddrinfo_t true_freeaddrinfo;
extern getnameinfo_t true_getnameinfo;
extern gethostbyaddr_t true_gethostbyaddr;

struct gethostbyname_data {
	struct hostent hostent_space;
	in_addr_t resolved_addr;
	char *resolved_addr_p[2];
	char addr_name[256];
};

struct hostent* proxy_gethostbyname(const char *name, struct gethostbyname_data *data);
struct hostent* proxy_gethostbyname_old(const char *name);

int proxy_getaddrinfo(const char *node, const char *service, 
		      const struct addrinfo *hints, struct addrinfo **res);
void proxy_freeaddrinfo(struct addrinfo *res);

void core_initialize(void);
void core_unload(void);

#include "debug.h"

#endif

//RcB: DEP "core.c"
//RcB: DEP "libproxychains.c"
//RcB: LINK "-Wl,--no-as-needed -ldl -lpthread"



================================================
FILE: src/daemon/daemon.c
================================================
/*
   proxychains-ng DNS daemon

   Copyright (C) 2020 rofl0r.

*/

#undef _GNU_SOURCE
#define _GNU_SOURCE
#include <unistd.h>
#define _POSIX_C_SOURCE 200809L
#include <stdlib.h>
#include <string.h>
#include <stdio.h>
#include <pthread.h>
#include <signal.h>
#include <sys/select.h>
#include <arpa/inet.h>
#include <errno.h>
#include <limits.h>
#include "udpserver.h"
#include "sblist.h"
#include "hsearch.h"
#include "../remotedns.h"
#include "../ip_type.h"

#ifndef MAX
#define MAX(x, y) ((x) > (y) ? (x) : (y))
#endif

static struct htab *ip_lookup_table;
static sblist *hostnames;
static unsigned remote_subnet;
static const struct server* server;

#ifndef CONFIG_LOG
#define CONFIG_LOG 1
#endif
#if CONFIG_LOG
/* we log to stderr because it's not using line buffering, i.e. malloc which would need
   locking when called from different threads. for the same reason we use dprintf,
   which writes directly to an fd. */
#define dolog(...) dprintf(2, __VA_ARGS__)
#else
static void dolog(const char* fmt, ...) { }
#endif

static char* my_inet_ntoa(unsigned char *ip_buf_4_bytes, char *outbuf_16_bytes) {
	unsigned char *p;
	char *o = outbuf_16_bytes;
	unsigned char n;
	for(p = ip_buf_4_bytes; p < ip_buf_4_bytes + 4; p++) {
		n = *p;
		if(*p >= 100) {
			if(*p >= 200)
				*(o++) = '2';
			else
				*(o++) = '1';
			n %= 100;
		}
		if(*p >= 10) {
			*(o++) = (n / 10) + '0';
			n %= 10;
		}
		*(o++) = n + '0';
		*(o++) = '.';
	}
	o[-1] = 0;
	return outbuf_16_bytes;
}


/* buf needs to be long enough for an ipv6 addr, i.e. INET6_ADDRSTRLEN + 1 */
static char* ipstr(union sockaddr_union *su, char* buf) {
	int af = SOCKADDR_UNION_AF(su);
	void *ipdata = SOCKADDR_UNION_ADDRESS(su);
	inet_ntop(af, ipdata, buf, INET6_ADDRSTRLEN+1);
	char portbuf[7];
	snprintf(portbuf, sizeof portbuf, ":%u", (unsigned) ntohs(SOCKADDR_UNION_PORT(su)));
	strcat(buf, portbuf);
	return buf;
}

static int usage(char *a0) {
	dprintf(2,
		"Proxychains-NG remote dns daemon\n"
		"--------------------------------\n"
		"usage: %s -i listenip -p port -r remotesubnet\n"
		"all arguments are optional.\n"
		"by default listenip is 127.0.0.1, port 1053 and remotesubnet 224.\n\n", a0
	);
	return 1;
}

unsigned index_from_ip(ip_type4 internalip) {
	ip_type4 tmp = internalip;
	uint32_t ret;
	ret = tmp.octet[3] + (tmp.octet[2] << 8) + (tmp.octet[1] << 16);
	ret -= 1;
	return ret;
}

char *host_from_ip(ip_type4 internalip) {
	char *res = NULL;
	unsigned index = index_from_ip(internalip);
	if(index < sblist_getsize(hostnames)) {
		char **tmp = sblist_get(hostnames, index);
		if(tmp && *tmp) res = *tmp;
	}
	return res;
}

ip_type4 get_ip_from_index(unsigned index) {
	ip_type4 ret;
	index++; // so we can start at .0.0.1
	if(index > 0xFFFFFF)
		return IPT4_INVALID;
	ret.octet[0] = remote_subnet & 0xFF;
	ret.octet[1] = (index & 0xFF0000) >> 16;
	ret.octet[2] = (index & 0xFF00) >> 8;
	ret.octet[3] = index & 0xFF;
	return ret;
}

ip_type4 get_ip(char* hn) {
	htab_value *v = htab_find(ip_lookup_table, hn);
	if(v) return get_ip_from_index(v->n);
	char *n = strdup(hn);
	if(!n) return IPT4_INVALID;
	if(!sblist_add(hostnames, &n)) {
	o_out:;
		free(n);
		return IPT4_INVALID;
	}
	if(!htab_insert(ip_lookup_table, n, HTV_N(sblist_getsize(hostnames)-1))) {
		sblist_delete(hostnames, sblist_getsize(hostnames)-1);
		goto o_out;
	}
	return get_ip_from_index(sblist_getsize(hostnames)-1);
}

int main(int argc, char** argv) {
	int ch;
	const char *listenip = "127.0.0.1";
	unsigned port = 1053;
	remote_subnet = 224;
	while((ch = getopt(argc, argv, ":r:i:p:")) != -1) {
		switch(ch) {
			case 'r':
				remote_subnet = atoi(optarg);
				break;
			case 'i':
				listenip = optarg;
				break;
			case 'p':
				port = atoi(optarg);
				break;
			case ':':
				dprintf(2, "error: option -%c requires an operand\n", optopt);
				/* fall through */
			case '?':
				return usage(argv[0]);
		}
	}
	signal(SIGPIPE, SIG_IGN);
	struct server s;
	if(server_setup(&s, listenip, port)) {
		perror("server_setup");
		return 1;
	}
	server = &s;

	ip_lookup_table = htab_create(64);
	hostnames = sblist_new(sizeof(char*), 64);

	while(1) {
		struct client c;
		char ipstr_buf[INET6_ADDRSTRLEN+6+1];
		char ip4str_buf[16];
		struct at_msg msg, out;
		size_t msgl = sizeof(msg);
		int failed = 0;

#define FAIL() do { failed=1; goto sendresp; } while(0)

		if(server_waitclient(&s, &c, &msg, &msgl)) continue;
		msg.h.datalen = ntohs(msg.h.datalen);
		if(msgl != sizeof(msg.h)+msg.h.datalen) {
			dolog("%s: invalid datalen\n", ipstr(&c.addr, ipstr_buf));
			FAIL();
		}

		out.h.msgtype = msg.h.msgtype;
		if(msg.h.msgtype == ATM_GETIP) {
			if(!memchr(msg.m.host, 0, msg.h.datalen)) {
				dolog("%s: nul terminator missing\n", ipstr(&c.addr, ipstr_buf));
				FAIL();
			}
			out.h.datalen = sizeof(ip_type4);
			out.m.ip = get_ip(msg.m.host);
			failed = !memcmp(&out.m.ip, &IPT4_INVALID, 4);
			dolog("%s requested ip for %s (%s)\n", ipstr(&c.addr, ipstr_buf),
			      msg.m.host, failed?"FAIL":my_inet_ntoa((void*)&out.m.ip, ip4str_buf));
			if(failed) FAIL();
		} else if (msg.h.msgtype == ATM_GETNAME) {
			if(msg.h.datalen != 4) {
				dolog("%s: invalid len for getname request\n", ipstr(&c.addr, ipstr_buf));
				FAIL();
			}
			char *hn = host_from_ip(msg.m.ip);
			if(hn) {
				size_t l = strlen(hn);
				memcpy(out.m.host, hn, l+1);
				out.h.datalen = l+1;
			}
			dolog("%s requested name for %s (%s)\n", ipstr(&c.addr, ipstr_buf),
			      my_inet_ntoa((void*) &msg.m.ip, ip4str_buf), hn?hn:"FAIL");
			if(!hn) FAIL();
		} else {
			dolog("%s: unknown request %u\n", ipstr(&c.addr, ipstr_buf),
			      (unsigned) msg.h.msgtype);
		}
	sendresp:;
		if(failed) {
			out.h.msgtype = ATM_FAIL;
			out.h.datalen = 0;
		}
		unsigned short dlen = out.h.datalen;
		out.h.datalen = htons(dlen);
		sendto(server->fd, &out, sizeof(out.h)+dlen, 0, (void*) &c.addr, SOCKADDR_UNION_LENGTH(&c.addr));
	}
}


================================================
FILE: src/daemon/hsearch.c
================================================
/*
musl license, hsearch.c originally written by Szabolcs Nagy

Copyright © 2005-2020 Rich Felker, et al.

Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to
the following conditions:

The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/

#include <stdlib.h>
#include <string.h>
#include "hsearch.h"

/*
open addressing hash table with 2^n table size
quadratic probing is used in case of hash collision
tab indices and hash are size_t
after resize fails with ENOMEM the state of tab is still usable
*/

typedef struct htab_entry {
	char *key;
	htab_value data;
} htab_entry;

struct elem {
	htab_entry item;
	size_t hash;
};

struct htab {
	struct elem *elems;
	size_t mask;
	size_t used;
};

#define MINSIZE 8
#define MAXSIZE ((size_t)-1/2 + 1)

static size_t keyhash(char *k)
{
	unsigned char *p = (void *)k;
	size_t h = 0;

	while (*p)
		h = 31*h + *p++;
	return h;
}

static int resize(struct htab *htab, size_t nel)
{
	size_t newsize;
	size_t i, j;
	struct elem *e, *newe;
	struct elem *oldtab = htab->elems;
	struct elem *oldend = htab->elems + htab->mask + 1;

	if (nel > MAXSIZE)
		nel = MAXSIZE;
	for (newsize = MINSIZE; newsize < nel; newsize *= 2);
	htab->elems = calloc(newsize, sizeof *htab->elems);
	if (!htab->elems) {
		htab->elems = oldtab;
		return 0;
	}
	htab->mask = newsize - 1;
	if (!oldtab)
		return 1;
	for (e = oldtab; e < oldend; e++)
		if (e->item.key) {
			for (i=e->hash,j=1; ; i+=j++) {
				newe = htab->elems + (i & htab->mask);
				if (!newe->item.key)
					break;
			}
			*newe = *e;
		}
	free(oldtab);
	return 1;
}

static struct elem *lookup(struct htab *htab, char *key, size_t hash)
{
	size_t i, j;
	struct elem *e;

	for (i=hash,j=1; ; i+=j++) {
		e = htab->elems + (i & htab->mask);
		if (!e->item.key ||
		    (e->hash==hash && strcmp(e->item.key, key)==0))
			break;
	}
	return e;
}

struct htab *htab_create(size_t nel)
{
	struct htab *r = calloc(1, sizeof *r);
	if(r && !resize(r, nel)) {
		free(r);
		r = 0;
	}
	return r;
}

void htab_destroy(struct htab *htab)
{
	free(htab->elems);
	free(htab);
}

static htab_entry *htab_find_item(struct htab *htab, char* key)
{
	size_t hash = keyhash(key);
	struct elem *e = lookup(htab, key, hash);

	if (e->item.key) {
		return &e->item;
	}
	return 0;
}

htab_value* htab_find(struct htab *htab, char* key)
{
	htab_entry *i = htab_find_item(htab, key);
	if(i) return &i->data;
	return 0;
}

int htab_delete(struct htab *htab, char* key)
{
	htab_entry *i = htab_find_item(htab, key);
	if(!i) return 0;
	i->key = 0;
	return 1;
}

int htab_insert(struct htab *htab, char* key, htab_value value)
{
	size_t hash = keyhash(key);
	struct elem *e = lookup(htab, key, hash);
	if(e->item.key) {
		/* it's not allowed to overwrite existing data */
		return 0;
	}

	e->item.key = key;
	e->item.data = value;
	e->hash = hash;
	if (++htab->used > htab->mask - htab->mask/4) {
		if (!resize(htab, 2*htab->used)) {
			htab->used--;
			e->item.key = 0;
			return 0;
		}
	}
	return 1;
}

size_t htab_next(struct htab *htab, size_t iterator, char** key, htab_value **v)
{
	size_t i;
	for(i=iterator;i<htab->mask+1;++i) {
		struct elem *e = htab->elems + i;
		if(e->item.key) {
			*key = e->item.key;
			*v = &e->item.data;
			return i+1;
		}
	}
	return 0;
}


================================================
FILE: src/daemon/hsearch.h
================================================
#ifndef HSEARCH_H
#define HSEARCH_H

#include <stdlib.h>

typedef union htab_value {
	void *p;
	size_t n;
} htab_value;

#define HTV_N(N) (htab_value) {.n = N}
#define HTV_P(P) (htab_value) {.p = P}

struct htab * htab_create(size_t);
void htab_destroy(struct htab *);
htab_value* htab_find(struct htab *, char* key);
int htab_insert(struct htab *, char*, htab_value);
int htab_delete(struct htab *htab, char* key);
size_t htab_next(struct htab *, size_t iterator, char** key, htab_value **v);

#endif


================================================
FILE: src/daemon/sblist.c
================================================
#undef _POSIX_C_SOURCE
#define _POSIX_C_SOURCE 200809L
#include "sblist.h"
#include <limits.h>
#include <stdlib.h>
#include <string.h>
#define MY_PAGE_SIZE 4096

sblist* sblist_new(size_t itemsize, size_t blockitems) {
	sblist* ret = (sblist*) malloc(sizeof(sblist));
	sblist_init(ret, itemsize, blockitems);
	return ret;
}

static void sblist_clear(sblist* l) {
	l->items = NULL;
	l->capa = 0;
	l->count = 0;
}

void sblist_init(sblist* l, size_t itemsize, size_t blockitems) {
	if(l) {
		l->blockitems = blockitems ? blockitems : MY_PAGE_SIZE / itemsize;
		l->itemsize = itemsize;
		sblist_clear(l);
	}
}

void sblist_free_items(sblist* l) {
	if(l) {
		if(l->items) free(l->items);
		sblist_clear(l);
	}
}

void sblist_free(sblist* l) {
	if(l) {
		sblist_free_items(l);
		free(l);
	}
}

char* sblist_item_from_index(sblist* l, size_t idx) {
	return l->items + (idx * l->itemsize);
}

void* sblist_get(sblist* l, size_t item) {
	if(item < l->count) return (void*) sblist_item_from_index(l, item);
	return NULL;
}

int sblist_set(sblist* l, void* item, size_t pos) {
	if(pos >= l->count) return 0;
	memcpy(sblist_item_from_index(l, pos), item, l->itemsize);
	return 1;
}

int sblist_grow_if_needed(sblist* l) {
	char* temp;
	if(l->count == l->capa) {
		temp = realloc(l->items, (l->capa + l->blockitems) * l->itemsize);
		if(!temp) return 0;
		l->capa += l->blockitems;
		l->items = temp;
	}
	return 1;
}

int sblist_add(sblist* l, void* item) {
	if(!sblist_grow_if_needed(l)) return 0;
	l->count++;
	return sblist_set(l, item, l->count - 1);
}


================================================
FILE: src/daemon/sblist.h
================================================
#ifndef SBLIST_H
#define SBLIST_H

/* this file is part of libulz, as of commit 8ab361a27743aaf025323ee43b8b8876dc054fdd
   modified for direct inclusion in microsocks. */


#ifdef __cplusplus
extern "C" {
#endif

#include <stddef.h>
/*
 * simple buffer list.
 * 
 * this thing here is basically a generic dynamic array
 * will realloc after every blockitems inserts
 * can store items of any size.
 * 
 * so think of it as a by-value list, as opposed to a typical by-ref list.
 * you typically use it by having some struct on the stack, and pass a pointer
 * to sblist_add, which will copy the contents into its internal memory.
 * 
 */

typedef struct {
	size_t itemsize;
	size_t blockitems;
	size_t count;
	size_t capa;
	char* items;
} sblist;

#define sblist_getsize(X) ((X)->count)
#define sblist_get_count(X) ((X)->count)
#define sblist_empty(X) ((X)->count == 0)

// for dynamic style
sblist* sblist_new(size_t itemsize, size_t blockitems);
void sblist_free(sblist* l);

//for static style
void sblist_init(sblist* l, size_t itemsize, size_t blockitems);
void sblist_free_items(sblist* l);

// accessors
void* sblist_get(sblist* l, size_t item);
// returns 1 on success, 0 on OOM
int sblist_add(sblist* l, void* item);
int sblist_set(sblist* l, void* item, size_t pos);
void sblist_delete(sblist* l, size_t item);
char* sblist_item_from_index(sblist* l, size_t idx);
int sblist_grow_if_needed(sblist* l);
int sblist_insert(sblist* l, void* item, size_t pos);
/* same as sblist_add, but returns list index of new item, or -1 */
size_t sblist_addi(sblist* l, void* item);
void sblist_sort(sblist *l, int (*compar)(const void *, const void *));
/* insert element into presorted list, returns listindex of new entry or -1*/
size_t sblist_insert_sorted(sblist* l, void* o, int (*compar)(const void *, const void *));

#ifndef __COUNTER__
#define __COUNTER__ __LINE__
#endif

#define __sblist_concat_impl( x, y ) x##y
#define __sblist_macro_concat( x, y ) __sblist_concat_impl( x, y )
#define __sblist_iterator_name __sblist_macro_concat(sblist_iterator, __COUNTER__)

// use with custom iterator variable
#define sblist_iter_counter(LIST, ITER, PTR) \
	for(size_t ITER = 0; (PTR = sblist_get(LIST, ITER)), ITER < sblist_getsize(LIST); ITER++)

// use with custom iterator variable, which is predeclared
#define sblist_iter_counter2(LIST, ITER, PTR) \
	for(ITER = 0; (PTR = sblist_get(LIST, ITER)), ITER < sblist_getsize(LIST); ITER++)

// use with custom iterator variable, which is predeclared and signed
// useful for a loop which can delete items from the list, and then decrease the iterator var.
#define sblist_iter_counter2s(LIST, ITER, PTR) \
	for(ITER = 0; (PTR = sblist_get(LIST, ITER)), ITER < (ssize_t) sblist_getsize(LIST); ITER++)


// uses "magic" iterator variable
#define sblist_iter(LIST, PTR) sblist_iter_counter(LIST, __sblist_iterator_name, PTR)

#ifdef __cplusplus
}
#endif

#pragma RcB2 DEP "sblist.c" "sblist_delete.c"

#endif


================================================
FILE: src/daemon/sblist_delete.c
================================================
#include "sblist.h"
#include <string.h>

void sblist_delete(sblist* l, size_t item) {
	if (l->count && item < l->count) {
		memmove(sblist_item_from_index(l, item), sblist_item_from_index(l, item + 1), (sblist_getsize(l) - (item + 1)) * l->itemsize);
		l->count--;
	}
}


================================================
FILE: src/daemon/udpclient.c
================================================
#include <stdio.h>
#include <string.h>
#include <ctype.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include "../remotedns.h"
#include "../ip_type.h"

int main() {
	int fd;
	int port = 1053;
	char srvn[] = "127.0.0.1";
	struct sockaddr_in srva = {.sin_family = AF_INET, .sin_port = htons(port)};
	inet_pton(AF_INET, srvn, &srva.sin_addr);
	fd = socket(AF_INET, SOCK_DGRAM, 0);
	char namebuf[260];
	while(fgets(namebuf, sizeof namebuf, stdin)) {
		size_t l = strlen(namebuf);
		if(namebuf[l-1] == '\n') {
			l--;
			namebuf[l] = 0;
		}
		struct at_msg msg = {0};
		unsigned msglen;
		if(isdigit(namebuf[0])) {
			msglen = 4;
			msg.h.msgtype = ATM_GETNAME;
			inet_aton(namebuf, (void*) &msg.m.ip);
		} else {
			msglen = l+1;
			msg.h.msgtype = ATM_GETIP;
			memcpy(msg.m.host, namebuf, msglen);
		}
		msg.h.datalen = htons(msglen);
		sendto(fd, &msg, sizeof(msg.h)+msglen, 0, (void*)&srva, sizeof(srva));
		char rcvbuf[512];
		recvfrom(fd, rcvbuf, sizeof rcvbuf, 0, (void*)0, (void*)0);
	}
}


================================================
FILE: src/daemon/udpserver.c
================================================
#include "udpserver.h"
#include <stdio.h>
#include <string.h>
#include <unistd.h>

int resolve(const char *host, unsigned short port, struct addrinfo** addr) {
	struct addrinfo hints = {
		.ai_family = AF_UNSPEC,
		.ai_socktype = SOCK_STREAM,
		.ai_flags = AI_PASSIVE,
	};
	char port_buf[8];
	snprintf(port_buf, sizeof port_buf, "%u", port);
	return getaddrinfo(host, port_buf, &hints, addr);
}

int resolve_sa(const char *host, unsigned short port, union sockaddr_union *res) {
	struct addrinfo *ainfo = 0;
	int ret;
	SOCKADDR_UNION_AF(res) = AF_UNSPEC;
	if((ret = resolve(host, port, &ainfo))) return ret;
	memcpy(res, ainfo->ai_addr, ainfo->ai_addrlen);
	freeaddrinfo(ainfo);
	return 0;
}

int bindtoip(int fd, union sockaddr_union *bindaddr) {
	socklen_t sz = SOCKADDR_UNION_LENGTH(bindaddr);
	if(sz)
		return bind(fd, (struct sockaddr*) bindaddr, sz);
	return 0;
}

int server_waitclient(struct server *server, struct client* client, void* buf, size_t *buflen) {
	socklen_t clen = sizeof client->addr;
	ssize_t ret = recvfrom(server->fd, buf, *buflen, 0, (void*)&client->addr, &clen);
	if(ret >= 0) {
		*buflen = ret;
		return 0;
	}
	return ret;
}

int server_setup(struct server *server, const char* listenip, unsigned short port) {
	struct addrinfo *ainfo = 0;
	if(resolve(listenip, port, &ainfo)) return -1;
	struct addrinfo* p;
	int listenfd = -1;
	for(p = ainfo; p; p = p->ai_next) {
		if((listenfd = socket(p->ai_family, SOCK_DGRAM, 0)) < 0)
			continue;
		int yes = 1;
		setsockopt(listenfd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(int));
		if(bind(listenfd, p->ai_addr, p->ai_addrlen) < 0) {
			close(listenfd);
			listenfd = -1;
			continue;
		}
		break;
	}
	freeaddrinfo(ainfo);
	if(listenfd < 0) return -2;
	server->fd = listenfd;
	return 0;
}


================================================
FILE: src/daemon/udpserver.h
================================================
#ifndef SERVER_H
#define SERVER_H

#undef _POSIX_C_SOURCE
#define _POSIX_C_SOURCE 200809L

#include <sys/socket.h>
#include <netdb.h>
#include <netinet/in.h>

#pragma RcB2 DEP "udpserver.c"

union sockaddr_union {
	struct sockaddr_in  v4;
	struct sockaddr_in6 v6;
};

#define SOCKADDR_UNION_AF(PTR) (PTR)->v4.sin_family

#define SOCKADDR_UNION_LENGTH(PTR) ( \
	( SOCKADDR_UNION_AF(PTR) == AF_INET  ) ? sizeof((PTR)->v4) : ( \
	( SOCKADDR_UNION_AF(PTR) == AF_INET6 ) ? sizeof((PTR)->v6) : 0 ) )

#define SOCKADDR_UNION_ADDRESS(PTR) ( \
	( SOCKADDR_UNION_AF(PTR) == AF_INET  ) ? (void*) &(PTR)->v4.sin_addr  : ( \
	( SOCKADDR_UNION_AF(PTR) == AF_INET6 ) ? (void*) &(PTR)->v6.sin6_addr : (void*) 0 ) )

#define SOCKADDR_UNION_PORT(PTR) ( \
	( SOCKADDR_UNION_AF(PTR) == AF_INET  ) ? (PTR)->v4.sin_port  : ( \
	( SOCKADDR_UNION_AF(PTR) == AF_INET6 ) ? (PTR)->v6.sin6_port : 0 ) )

struct client {
	union sockaddr_union addr;
};

struct server {
	int fd;
};

int resolve(const char *host, unsigned short port, struct addrinfo** addr);
int resolve_sa(const char *host, unsigned short port, union sockaddr_union *res);
int bindtoip(int fd, union sockaddr_union *bindaddr);

int server_waitclient(struct server *server, struct client* client, void* buf, size_t *buflen);
int server_setup(struct server *server, const char* listenip, unsigned short port);

#endif



================================================
FILE: src/debug.c
================================================

#ifdef DEBUG
# include "core.h"
# include "common.h"
# include "debug.h"
#include <arpa/inet.h>

void dump_proxy_chain(proxy_data *pchain, unsigned int count) {
	char ip_buf[INET6_ADDRSTRLEN];
	for (; count; pchain++, count--) {
		if(!inet_ntop(pchain->ip.is_v6?AF_INET6:AF_INET,pchain->ip.addr.v6,ip_buf,sizeof ip_buf)) {
			proxychains_write_log(LOG_PREFIX "error: ip address conversion failed\n");
			continue;
		}
		PDEBUG("[%s] %s %s:%d", proxy_state_strmap[pchain->ps],
		       proxy_type_strmap[pchain->pt], 
		       ip_buf, htons(pchain->port));
		if (*pchain->user || *pchain->pass) {
			PSTDERR(" [u=%s,p=%s]", pchain->user, pchain->pass);
		}
		PSTDERR("\n");
	}
}

#else

// Do not allow this translation unit to end up empty
// for non-DEBUG builds, to satisfy ISO C standards.
typedef int __appease_iso_compilers__;

#endif


================================================
FILE: src/debug.h
================================================
#ifndef DEBUG_H
#define DEBUG_H

# include <stdio.h>

#ifdef DEBUG
# define PSTDERR(fmt, args...) do { dprintf(2,fmt, ## args); } while(0)
# define PDEBUG(fmt, args...) PSTDERR("DEBUG:pid[%d]:" fmt, getpid(), ## args)
# define DEBUGDECL(args...) args
# define DUMP_PROXY_CHAIN(A, B) dump_proxy_chain(A, B)
#else
# define PDEBUG(fmt, args...) do {} while (0)
# define DEBUGDECL(args...)
# define DUMP_PROXY_CHAIN(args...) do {} while (0)
#endif

# define PFUNC() do { PDEBUG("%s()\n", __FUNCTION__); } while(0)

#include "core.h"
void dump_proxy_chain(proxy_data *pchain, unsigned int count);


#endif



================================================
FILE: src/hash.c
================================================
#include "hash.h"

/* dalias' version of the elf hash */
uint32_t dalias_hash(char *s0) {
	unsigned char *s = (void *) s0;
	uint_fast32_t h = 0;
	while(*s) {
		h = 16 * h + *s++;
		h ^= h >> 24 & 0xf0;
	}
	return h & 0xfffffff;
}


================================================
FILE: src/hash.h
================================================
#ifndef HASH_H
#define HASH_H

#include <stdint.h>

uint32_t dalias_hash(char *s0);

//RcB: DEP "hash.c"

#endif


================================================
FILE: src/hostsreader.c
================================================
#include <stdio.h>
#include <ctype.h>
#include <string.h>
#include "common.h"

/*
   simple reader for /etc/hosts
   it only supports comments, blank lines and lines consisting of an ipv4 hostname pair.
   this is required so we can return entries from the host db without messing up the
   non-thread-safe state of libc's gethostent().

*/

struct hostsreader {
	FILE *f;
	char* ip, *name;
};

int hostsreader_open(struct hostsreader *ctx) {
	if(!(ctx->f = fopen("/etc/hosts", "r"))) return 0;
	return 1;
}

void hostsreader_close(struct hostsreader *ctx) {
	fclose(ctx->f);
}

int hostsreader_get(struct hostsreader *ctx, char* buf, size_t bufsize) {
	while(1) {
		if(!fgets(buf, bufsize, ctx->f)) return 0;
		if(*buf == '#') continue;
		char *p = buf;
		size_t l = bufsize;
		ctx->ip = p;
		while(*p && !isspace(*p) && l) {
			p++;
			l--;
		}
		if(!l || !*p || p == ctx->ip) continue;
		*p = 0;
		p++;
		while(*p && isspace(*p) && l) {
			p++;
			l--;
		}
		if(!l || !*p) continue;
		ctx->name = p;
		while(*p && !isspace(*p) && l) {
			p++;
			l--;
		}
		if(!l || !*p) continue;
		*p = 0;
		if(pc_isnumericipv4(ctx->ip)) return 1;
	}
}

char* hostsreader_get_ip_for_name(const char* name, char* buf, size_t bufsize) {
	struct hostsreader ctx;
	char *res = 0;
	if(!hostsreader_open(&ctx)) return 0;
	while(hostsreader_get(&ctx, buf, bufsize)) {
		if(!strcmp(ctx.name, name)) {
			res = ctx.ip;
			break;
		}
	}
	hostsreader_close(&ctx);
	return res;
}

#include "ip_type.h"
#include <netinet/in.h>
#include <sys/socket.h>
#include <arpa/inet.h>
ip_type4 hostsreader_get_numeric_ip_for_name(const char* name) {
	char *hres;
	char buf[320];
	if((hres = hostsreader_get_ip_for_name(name, buf, sizeof buf))) {
		struct in_addr c;
		inet_aton(hres, &c);
		ip_type4 res;
		memcpy(res.octet, &c.s_addr, 4);
		return res;
	} else return IPT4_INVALID;
}

#ifdef HOSTSREADER_TEST
#include "ip_type.c"
int main(int a, char**b) {
	char buf[256];
	if(a != 2) return 1;
	char * ret = hostsreader_get_ip_for_name(b[1], buf, sizeof buf);
	printf("%s\n", ret ? ret : "null");
}
#endif


================================================
FILE: src/ip_type.h
================================================
#ifndef IP_TYPE_H
#define IP_TYPE_H

#include <stdint.h>

typedef union {
	unsigned char octet[4];
	uint32_t as_int;
} ip_type4;

typedef struct {
	union {
		ip_type4 v4;
		unsigned char v6[16];
	} addr;
	char is_v6;
} ip_type;

#define IPT4_INT(X) (ip_type4){.as_int = (X)}
#define IPT4_INVALID IPT4_INT(-1)

#define IPT4_BYTES(A,B,C,D) (ip_type4){.octet = {(A), (B), (C), (D)} }
#define IPT4_LOCALHOST IPT4_BYTES(127,0,0,1)

#endif


================================================
FILE: src/libproxychains.c
================================================
/***************************************************************************
                          libproxychains.c  -  description
                             -------------------
    begin                : Tue May 14 2002
    copyright          :  netcreature (C) 2002
    email                 : netcreature@users.sourceforge.net
 ***************************************************************************/
 /*     GPL */
/***************************************************************************
 *                                                                         *
 *   This program is free software; you can redistribute it and/or modify  *
 *   it under the terms of the GNU General Public License as published by  *
 *   the Free Software Foundation; either version 2 of the License, or     *
 *   (at your option) any later version.                                   *
 *                                                                         *
 ***************************************************************************/

#undef _GNU_SOURCE
#define _GNU_SOURCE

#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
#include <limits.h>
#include <ctype.h>
#include <errno.h>
#include <assert.h>
#include <netdb.h>

#include <netinet/in.h>
#include <arpa/inet.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <fcntl.h>
#include <dlfcn.h>
#include <pthread.h>


#include "core.h"
#include "common.h"
#include "rdns.h"

#undef 		satosin
#define     satosin(x)      ((struct sockaddr_in *) &(x))
#define     SOCKADDR(x)     (satosin(x)->sin_addr.s_addr)
#define     SOCKADDR_2(x)     (satosin(x)->sin_addr)
#define     SOCKPORT(x)     (satosin(x)->sin_port)
#define     SOCKFAMILY(x)     (satosin(x)->sin_family)
#define     MAX_CHAIN 512

#ifdef IS_SOLARIS
#undef connect
int __xnet_connect(int sock, const struct sockaddr *addr, unsigned int len);
connect_t true___xnet_connect;
#endif

close_t true_close;
close_range_t true_close_range;
connect_t true_connect;
gethostbyname_t true_gethostbyname;
getaddrinfo_t true_getaddrinfo;
freeaddrinfo_t true_freeaddrinfo;
getnameinfo_t true_getnameinfo;
gethostbyaddr_t true_gethostbyaddr;
sendto_t true_sendto;

int tcp_read_time_out;
int tcp_connect_time_out;
chain_type proxychains_ct;
proxy_data proxychains_pd[MAX_CHAIN];
unsigned int proxychains_proxy_count = 0;
unsigned int proxychains_proxy_offset = 0;
int proxychains_got_chain_data = 0;
unsigned int proxychains_max_chain = 1;
int proxychains_quiet_mode = 0;
enum dns_lookup_flavor proxychains_resolver = DNSLF_LIBC;
localaddr_arg localnet_addr[MAX_LOCALNET];
size_t num_localnet_addr = 0;
dnat_arg dnats[MAX_DNAT];
size_t num_dnats = 0;
unsigned int remote_dns_subnet = 224;

pthread_once_t init_once = PTHREAD_ONCE_INIT;

static int init_l = 0;

static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_type * ct);

static void* load_sym(char* symname, void* proxyfunc, int is_mandatory) {
	void *funcptr = dlsym(RTLD_NEXT, symname);

	if(is_mandatory && !funcptr) {
		fprintf(stderr, "Cannot load symbol '%s' %s\n", symname, dlerror());
		exit(1);
	} else if (!funcptr) {
		return funcptr;
	} else {
		PDEBUG("loaded symbol '%s'" " real addr %p  wrapped addr %p\n", symname, funcptr, proxyfunc);
	}
	if(funcptr == proxyfunc) {
		PDEBUG("circular reference detected, aborting!\n");
		abort();
	}
	return funcptr;
}

#include "allocator_thread.h"

const char *proxychains_get_version(void);

static void setup_hooks(void);

typedef struct {
	unsigned int first, last, flags;
} close_range_args_t;

/* If there is some `close` or `close_range` system call before do_init, 
   we buffer it, and actually execute them in do_init. */
static int close_fds[16];
static int close_fds_cnt = 0;
static close_range_args_t close_range_buffer[16];
static int close_range_buffer_cnt = 0;

static unsigned get_rand_seed(void) {
#ifdef HAVE_CLOCK_GETTIME
	struct timespec now;
	clock_gettime(CLOCK_REALTIME, &now);
	return now.tv_sec ^ now.tv_nsec;
#else
	return time(NULL);
#endif
}

static void do_init(void) {
	char *env;

	srand(get_rand_seed());
	core_initialize();

	env = getenv(PROXYCHAINS_QUIET_MODE_ENV_VAR);
	if(env && *env == '1')
		proxychains_quiet_mode = 1;

	proxychains_write_log(LOG_PREFIX "DLL init: proxychains-ng %s\n", proxychains_get_version());

	setup_hooks();

	/* read the config file */
	get_chain_data(proxychains_pd, &proxychains_proxy_count, &proxychains_ct);
	DUMP_PROXY_CHAIN(proxychains_pd, proxychains_proxy_count);

	while(close_fds_cnt) true_close(close_fds[--close_fds_cnt]);
	while(close_range_buffer_cnt) {
		int i = --close_range_buffer_cnt;
		true_close_range(close_range_buffer[i].first, close_range_buffer[i].last, close_range_buffer[i].flags);
	}
	init_l = 1;

	rdns_init(proxychains_resolver);
}

static void init_lib_wrapper(const char* caller) {
#ifndef DEBUG
	(void) caller;
#endif
	if(!init_l) PDEBUG("%s called from %s\n", __FUNCTION__,  caller);
	pthread_once(&init_once, do_init);
}

/* if we use gcc >= 3, we can instruct the dynamic loader
 * to call init_lib at link time. otherwise it gets loaded
 * lazily, which has the disadvantage that there's a potential
 * race condition if 2 threads call it before init_l is set
 * and PTHREAD support was disabled */
#if __GNUC__+0 > 2
__attribute__((constructor))
static void gcc_init(void) {
	init_lib_wrapper(__FUNCTION__);
}
#define INIT() do {} while(0)
#else
#define INIT() init_lib_wrapper(__FUNCTION__)
#endif


typedef enum {
	RS_PT_NONE = 0,
	RS_PT_SOCKS4,
	RS_PT_SOCKS5,
	RS_PT_HTTP
} rs_proxyType;

/*
  proxy_from_string() taken from rocksock network I/O library (C) rofl0r
  valid inputs:
	socks5://user:password@proxy.domain.com:port
	socks5://proxy.domain.com:port
	socks4://proxy.domain.com:port
	http://user:password@proxy.domain.com:port
	http://proxy.domain.com:port

	supplying port number is obligatory.
	user:pass@ part is optional for http and socks5.
	however, user:pass authentication is currently not implemented for http proxies.
  return 1 on success, 0 on error.
*/
static int proxy_from_string(const char *proxystring,
	char *type_buf,
	char* host_buf,
	int *port_n,
	char *user_buf,
	char* pass_buf)
{
	const char* p;
	rs_proxyType proxytype;

	size_t next_token = 6, ul = 0, pl = 0, hl;
	if(!proxystring[0] || !proxystring[1] || !proxystring[2] || !proxystring[3] || !proxystring[4] || !proxystring[5]) goto inv_string;
	if(*proxystring == 's') {
		switch(proxystring[5]) {
			case '5': proxytype = RS_PT_SOCKS5; break;
			case '4': proxytype = RS_PT_SOCKS4; break;
			default: goto inv_string;
		}
	} else if(*proxystring == 'h') {
		proxytype = RS_PT_HTTP;
		next_token = 4;
	} else goto inv_string;
	if(
	   proxystring[next_token++] != ':' ||
	   proxystring[next_token++] != '/' ||
	   proxystring[next_token++] != '/') goto inv_string;
	const char *at = strrchr(proxystring+next_token, '@');
	if(at) {
		if(proxytype == RS_PT_SOCKS4)
			return 0;
		p = strchr(proxystring+next_token, ':');
		if(!p || p >= at) goto inv_string;
		const char *u = proxystring+next_token;
		ul = p-u;
		p++;
		pl = at-p;
		if(ul > 255 || pl > 255)
			return 0;
		memcpy(user_buf, u, ul);
		user_buf[ul]=0;
		memcpy(pass_buf, p, pl);
		pass_buf[pl]=0;
		next_token += 2+ul+pl;
	} else {
		user_buf[0]=0;
		pass_buf[0]=0;
	}
	const char* h = proxystring+next_token;
	p = strchr(h, ':');
	if(!p) goto inv_string;
	hl = p-h;
	if(hl > 255)
		return 0;
	memcpy(host_buf, h, hl);
	host_buf[hl]=0;
	*port_n = atoi(p+1);
	switch(proxytype) {
		case RS_PT_SOCKS4:
			strcpy(type_buf, "socks4");
			break;
		case RS_PT_SOCKS5:
			strcpy(type_buf, "socks5");
			break;
		case RS_PT_HTTP:
			strcpy(type_buf, "http");
			break;
		default:
			return 0;
	}
	return 1;
inv_string:
	return 0;
}

static const char* bool_str(int bool_val) {
	if(bool_val) return "true";
	return "false";
}

#define STR_STARTSWITH(P, LIT) (!strncmp(P, LIT, sizeof(LIT)-1))
/* get configuration from config file */
static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_type * ct) {
	int count = 0, port_n = 0, list = 0;
	char buf[1024], type[1024], host[1024], user[1024];
	char *buff, *env, *p;
	char local_addr_port[64], local_addr[64], local_netmask[32];
	char dnat_orig_addr_port[32], dnat_new_addr_port[32];
	char dnat_orig_addr[32], dnat_orig_port[32], dnat_new_addr[32], dnat_new_port[32];
	char rdnsd_addr[32], rdnsd_port[8];
	FILE *file = NULL;

	if(proxychains_got_chain_data)
		return;

	PFUNC();

	//Some defaults
	tcp_read_time_out = 4 * 1000;
	tcp_connect_time_out = 10 * 1000;
	*ct = DYNAMIC_TYPE;

	env = get_config_path(getenv(PROXYCHAINS_CONF_FILE_ENV_VAR), buf, sizeof(buf));
	if( ( file = fopen(env, "r") ) == NULL )
	{
	        perror("couldnt read configuration file");
        	exit(1);
	}

	while(fgets(buf, sizeof(buf), file)) {
		buff = buf;
		/* remove leading whitespace */
		while(isspace(*buff)) buff++;
		/* remove trailing '\n' */
		if((p = strrchr(buff, '\n'))) *p = 0;
		p = buff + strlen(buff)-1;
		/* remove trailing whitespace */
		while(p >= buff && isspace(*p)) *(p--) = 0;
		if(!*buff || *buff == '#') continue; /* skip empty lines and comments */
		if(1) {
			/* proxylist has to come last */
			if(list) {
				if(count >= MAX_CHAIN)
					break;

				memset(&pd[count], 0, sizeof(proxy_data));

				pd[count].ps = PLAY_STATE;
				port_n = 0;

				int ret = sscanf(buff, "%s %s %d %s %s", type, host, &port_n, pd[count].user, pd[count].pass);
				if(ret < 3 || ret == EOF) {
					if(!proxy_from_string(buff, type, host, &port_n, pd[count].user, pd[count].pass)) {
						inv:
						fprintf(stderr, "error: invalid item in proxylist section: %s", buff);
						exit(1);
					}
				}

				memset(&pd[count].ip, 0, sizeof(pd[count].ip));
				pd[count].ip.is_v6 = !!strchr(host, ':');
				pd[count].port = htons((unsigned short) port_n);
				ip_type* host_ip = &pd[count].ip;
				if(1 != inet_pton(host_ip->is_v6 ? AF_INET6 : AF_INET, host, host_ip->addr.v6)) {
					if(*ct == STRICT_TYPE && proxychains_resolver >= DNSLF_RDNS_START && count > 0) {
						/* we can allow dns hostnames for all but the first proxy in the list if chaintype is strict, as remote lookup can be done */
						rdns_init(proxychains_resolver);
						ip_type4 internal_ip = rdns_get_ip_for_host(host, strlen(host));
						pd[count].ip.is_v6 = 0;
						host_ip->addr.v4 = internal_ip;
						if(internal_ip.as_int == IPT4_INVALID.as_int)
							goto inv_host;
					} else {
inv_host:
						fprintf(stderr, "proxy %s has invalid value or is not numeric\n", host);
						fprintf(stderr, "non-numeric ips are only allowed under the following circumstances:\n");
						fprintf(stderr, "chaintype == strict (%s), proxy is not first in list (%s), proxy_dns active (%s)\n\n", bool_str(*ct == STRICT_TYPE), bool_str(count > 0), rdns_resolver_string(proxychains_resolver));
						exit(1);
					}
				}

				if(!strcmp(type, "http")) {
					pd[count].pt = HTTP_TYPE;
				} else if(!strcmp(type, "raw")) {
					pd[count].pt = RAW_TYPE;
				} else if(!strcmp(type, "socks4")) {
					pd[count].pt = SOCKS4_TYPE;
				} else if(!strcmp(type, "socks5")) {
					pd[count].pt = SOCKS5_TYPE;
				} else
					goto inv;

				if(port_n)
					count++;
			} else {
				if(!strcmp(buff, "[ProxyList]")) {
					list = 1;
				} else if(!strcmp(buff, "random_chain")) {
					*ct = RANDOM_TYPE;
				} else if(!strcmp(buff, "strict_chain")) {
					*ct = STRICT_TYPE;
				} else if(!strcmp(buff, "dynamic_chain")) {
					*ct = DYNAMIC_TYPE;
				} else if(!strcmp(buff, "round_robin_chain")) {
					*ct = ROUND_ROBIN_TYPE;
				} else if(STR_STARTSWITH(buff, "tcp_read_time_out")) {
					sscanf(buff, "%s %d", user, &tcp_read_time_out);
				} else if(STR_STARTSWITH(buff, "tcp_connect_time_out")) {
					sscanf(buff, "%s %d", user, &tcp_connect_time_out);
				} else if(STR_STARTSWITH(buff, "remote_dns_subnet")) {
					sscanf(buff, "%s %u", user, &remote_dns_subnet);
					if(remote_dns_subnet >= 256) {
						fprintf(stderr,
							"remote_dns_subnet: invalid value. requires a number between 0 and 255.\n");
						exit(1);
					}
				} else if(STR_STARTSWITH(buff, "localnet")) {
					char colon, extra, right_bracket[2];
					unsigned short local_port = 0, local_prefix;
					int local_family, n, valid;
					if(sscanf(buff, "%s %53[^/]/%15s%c", user, local_addr_port, local_netmask, &extra) != 3) {
						fprintf(stderr, "localnet format error");
						exit(1);
					}
					p = strchr(local_addr_port, ':');
					if(!p || p == strrchr(local_addr_port, ':')) {
						local_family = AF_INET;
						n = sscanf(local_addr_port, "%15[^:]%c%5hu%c", local_addr, &colon, &local_port, &extra);
						valid = n == 1 || (n == 3 && colon == ':');
					} else if(local_addr_port[0] == '[') {
						local_family = AF_INET6;
						n = sscanf(local_addr_port, "[%45[^][]%1[]]%c%5hu%c", local_addr, right_bracket, &colon, &local_port, &extra);
						valid = n == 2 || (n == 4 && colon == ':');
					} else {
						local_family = AF_INET6;
						valid = sscanf(local_addr_port, "%45[^][]%c", local_addr, &extra) == 1;
					}
					if(!valid) {
						fprintf(stderr, "localnet address or port error\n");
						exit(1);
					}
					if(local_port) {
						PDEBUG("added localnet: netaddr=%s, port=%u, netmask=%s\n",
						       local_addr, local_port, local_netmask);
					} else {
						PDEBUG("added localnet: netaddr=%s, netmask=%s\n",
						       local_addr, local_netmask);
					}
					if(num_localnet_addr < MAX_LOCALNET) {
						localnet_addr[num_localnet_addr].family = local_family;
						localnet_addr[num_localnet_addr].port = local_port;
						valid = 0;
						if (local_family == AF_INET) {
							valid =
							    inet_pton(local_family, local_addr,
							              &localnet_addr[num_localnet_addr].in_addr) > 0;
						} else if(local_family == AF_INET6) {
							valid =
							    inet_pton(local_family, local_addr,
							              &localnet_addr[num_localnet_addr].in6_addr) > 0;
						}
						if(!valid) {
							fprintf(stderr, "localnet address error\n");
							exit(1);
						}
						if(local_family == AF_INET && strchr(local_netmask, '.')) {
							valid =
							    inet_pton(local_family, local_netmask,
							              &localnet_addr[num_localnet_addr].in_mask) > 0;
						} else {
							valid = sscanf(local_netmask, "%hu%c", &local_prefix, &extra) == 1;
							if (valid) {
								if(local_family == AF_INET && local_prefix <= 32) {
									localnet_addr[num_localnet_addr].in_mask.s_addr =
										htonl(0xFFFFFFFFu << (32u - local_prefix));
								} else if(local_family == AF_INET6 && local_prefix <= 128) {
									localnet_addr[num_localnet_addr].in6_prefix =
										local_prefix;
								} else {
									valid = 0;
								}
							}
						}
						if(!valid) {
							fprintf(stderr, "localnet netmask error\n");
							exit(1);
						}
						++num_localnet_addr;
					} else {
						fprintf(stderr, "# of localnet exceed %d.\n", MAX_LOCALNET);
					}
				} else if(STR_STARTSWITH(buff, "chain_len")) {
					char *pc;
					int len;
					pc = strchr(buff, '=');
					if(!pc) {
						fprintf(stderr, "error: missing equals sign '=' in chain_len directive.\n");
						exit(1);
					}
					len = atoi(++pc);
					proxychains_max_chain = (len ? len : 1);
				} else if(!strcmp(buff, "quiet_mode")) {
					proxychains_quiet_mode = 1;
				} else if(!strcmp(buff, "proxy_dns_old")) {
					proxychains_resolver = DNSLF_FORKEXEC;
				} else if(!strcmp(buff, "proxy_dns")) {
					proxychains_resolver = DNSLF_RDNS_THREAD;
				} else if(STR_STARTSWITH(buff, "proxy_dns_daemon")) {
					struct sockaddr_in rdns_server_buffer;

					if(sscanf(buff, "%s %15[^:]:%5s", user, rdnsd_addr, rdnsd_port) < 3) {
						fprintf(stderr, "proxy_dns_daemon format error\n");
						exit(1);
					}
					rdns_server_buffer.sin_family = AF_INET;
					int error = inet_pton(AF_INET, rdnsd_addr, &rdns_server_buffer.sin_addr);
					if(error <= 0) {
						fprintf(stderr, "bogus proxy_dns_daemon address\n");
						exit(1);
					}
					rdns_server_buffer.sin_port = htons(atoi(rdnsd_port));
					proxychains_resolver = DNSLF_RDNS_DAEMON;
					rdns_set_daemon(&rdns_server_buffer);
				} else if(STR_STARTSWITH(buff, "dnat")) {
					if(sscanf(buff, "%s %21[^ ] %21s\n", user, dnat_orig_addr_port, dnat_new_addr_port) < 3) {
						fprintf(stderr, "dnat format error");
						exit(1);
					}
					/* clean previously used buffer */
					memset(dnat_orig_port, 0, sizeof(dnat_orig_port) / sizeof(dnat_orig_port[0]));
					memset(dnat_new_port, 0, sizeof(dnat_new_port) / sizeof(dnat_new_port[0]));

					(void)sscanf(dnat_orig_addr_port, "%15[^:]:%5s", dnat_orig_addr, dnat_orig_port);
					(void)sscanf(dnat_new_addr_port, "%15[^:]:%5s", dnat_new_addr, dnat_new_port);

					if(num_dnats < MAX_DNAT) {
						int error;
						error =
						    inet_pton(AF_INET, dnat_orig_addr,
							      &dnats[num_dnats].orig_dst);
						if(error <= 0) {
							fprintf(stderr, "dnat original destination address error\n");
							exit(1);
						}

						error =
						    inet_pton(AF_INET, dnat_new_addr,
							      &dnats[num_dnats].new_dst);
						if(error <= 0) {
							fprintf(stderr, "dnat effective destination address error\n");
							exit(1);
						}

						if(dnat_orig_port[0]) {
							dnats[num_dnats].orig_port =
							    (short) atoi(dnat_orig_port);
						} else {
							dnats[num_dnats].orig_port = 0;
						}

						if(dnat_new_port[0]) {
							dnats[num_dnats].new_port =
							    (short) atoi(dnat_new_port);
						} else {
							dnats[num_dnats].new_port = 0;
						}

						PDEBUG("added dnat: orig-dst=%s orig-port=%d new-dst=%s new-port=%d\n", dnat_orig_addr, dnats[num_dnats].orig_port, dnat_new_addr, dnats[num_dnats].new_port);
						++num_dnats;
					} else {
						fprintf(stderr, "# of dnat exceed %d.\n", MAX_DNAT);
					}
				}
			}
		}
	}
#ifndef BROKEN_FCLOSE
	fclose(file);
#endif
	if(!count) {
		fprintf(stderr, "error: no valid proxy found in config\n");
		exit(1);
	}
	*proxy_count = count;
	proxychains_got_chain_data = 1;
	PDEBUG("proxy_dns: %s\n", rdns_resolver_string(proxychains_resolver));
}

/*******  HOOK FUNCTIONS  *******/

#define EXPAND( args...) args
#ifdef MONTEREY_HOOKING
#define HOOKFUNC(R, N, args...) R pxcng_ ## N ( EXPAND(args) )
#else
#define HOOKFUNC(R, N, args...) R N ( EXPAND(args) )
#endif

HOOKFUNC(int, close, int fd) {
	if(!init_l) {
		if(close_fds_cnt>=(sizeof close_fds/sizeof close_fds[0])) goto err;
		close_fds[close_fds_cnt++] = fd;
		errno = 0;
		return 0;
	}
	if(proxychains_resolver != DNSLF_RDNS_THREAD) return true_close(fd);

	/* prevent rude programs (like ssh) from closing our pipes */
	if(fd != req_pipefd[0]  && fd != req_pipefd[1] &&
	   fd != resp_pipefd[0] && fd != resp_pipefd[1]) {
		return true_close(fd);
	}
	err:
	errno = EBADF;
	return -1;
}
static int is_v4inv6(const struct in6_addr *a) {
	return !memcmp(a->s6_addr, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12);
}

static void intsort(int *a, int n) {
	int i, j, s;
	for(i=0; i<n; ++i)
		for(j=i+1; j<n; ++j)
			if(a[j] < a[i]) {
				s = a[i];
				a[i] = a[j];
				a[j] = s;
			}
}

/* Warning: Linux manual says the third arg is `unsigned int`, but unistd.h says `int`. */
HOOKFUNC(int, close_range, unsigned first, unsigned last, int flags) {
	if(true_close_range == NULL) {
		fprintf(stderr, "Calling close_range, but this platform does not provide this system call. ");
		return -1;
	}
	if(!init_l) {
		/* push back to cache, and delay the execution. */
		if(close_range_buffer_cnt >= (sizeof close_range_buffer / sizeof close_range_buffer[0])) {
			errno = ENOMEM;
			return -1;
		}
		int i = close_range_buffer_cnt++;
		close_range_buffer[i].first = first;
		close_range_buffer[i].last = last;
		close_range_buffer[i].flags = flags;
		return errno = 0;
	}
	if(proxychains_resolver != DNSLF_RDNS_THREAD) return true_close_range(first, last, flags);

	/* prevent rude programs (like ssh) from closing our pipes */
	int res = 0, uerrno = 0, i;
	int protected_fds[] = {req_pipefd[0], req_pipefd[1], resp_pipefd[0], resp_pipefd[1]};
	intsort(protected_fds, 4);
	/* We are skipping protected_fds while calling true_close_range()
	 * If protected_fds cut the range into some sub-ranges, we close sub-ranges BEFORE cut point in the loop. 
	 * [first, cut1-1] , [cut1+1, cut2-1] , [cut2+1, cut3-1]
	 * Finally, we delete the remaining sub-range, outside the loop. [cut3+1, tail]
	 */
	int next_fd_to_close = first;
	for(i = 0; i < 4; ++i) {
		if(protected_fds[i] < first || protected_fds[i] > last)
			continue;
		int prev = (i == 0 || protected_fds[i-1] < first) ? first : protected_fds[i-1]+1;
		if(prev != protected_fds[i]) {
			if(-1 == true_close_range(prev, protected_fds[i]-1, flags)) {
				res = -1;
				uerrno = errno;
			}
		}
		next_fd_to_close = protected_fds[i]+1;
	}
	if(next_fd_to_close <= last) {
		if(-1 == true_close_range(next_fd_to_close, last, flags)) {
			res = -1;
			uerrno = errno;
		}
	}
	errno = uerrno;
	return res;
}

HOOKFUNC(int, connect, int sock, const struct sockaddr *addr, unsigned int len) {
	INIT();
	PFUNC();

	int socktype = 0, flags = 0, ret = 0;
	socklen_t optlen = 0;
	ip_type dest_ip;
	DEBUGDECL(char str[256]);

	struct in_addr *p_addr_in;
	struct in6_addr *p_addr_in6;
	dnat_arg *dnat = NULL;
	unsigned short port;
	size_t i;
	int remote_dns_connect = 0;
	optlen = sizeof(socktype);
	sa_family_t fam = SOCKFAMILY(*addr);
	getsockopt(sock, SOL_SOCKET, SO_TYPE, &socktype, &optlen);
	if(!((fam  == AF_INET || fam == AF_INET6) && socktype == SOCK_STREAM))
		return true_connect(sock, addr, len);

	int v6 = dest_ip.is_v6 = fam == AF_INET6;

	p_addr_in = &((struct sockaddr_in *) addr)->sin_addr;
	p_addr_in6 = &((struct sockaddr_in6 *) addr)->sin6_addr;
	port = !v6 ? ntohs(((struct sockaddr_in *) addr)->sin_port)
	           : ntohs(((struct sockaddr_in6 *) addr)->sin6_port);
	struct in_addr v4inv6;
	if(v6 && is_v4inv6(p_addr_in6)) {
		memcpy(&v4inv6.s_addr, &p_addr_in6->s6_addr[12], 4);
		v6 = dest_ip.is_v6 = 0;
		p_addr_in = &v4inv6;
	}
	if(!v6 && !memcmp(p_addr_in, "\0\0\0\0", 4)) {
		errno = ECONNREFUSED;
		return -1;
	}

//      PDEBUG("localnet: %s; ", inet_ntop(AF_INET,&in_addr_localnet, str, sizeof(str)));
//      PDEBUG("netmask: %s; " , inet_ntop(AF_INET, &in_addr_netmask, str, sizeof(str)));
	PDEBUG("target: %s\n", inet_ntop(v6 ? AF_INET6 : AF_INET, v6 ? (void*)p_addr_in6 : (void*)p_addr_in, str, sizeof(str)));
	PDEBUG("port: %d\n", port);

	// check if connect called from proxydns
        remote_dns_connect = !v6 && (ntohl(p_addr_in->s_addr) >> 24 == remote_dns_subnet);

	// more specific first
	if (!v6) for(i = 0; i < num_dnats && !remote_dns_connect && !dnat; i++)
		if(dnats[i].orig_dst.s_addr == p_addr_in->s_addr)
			if(dnats[i].orig_port && (dnats[i].orig_port == port))
				dnat = &dnats[i];

	if (!v6) for(i = 0; i < num_dnats && !remote_dns_connect && !dnat; i++)
		if(dnats[i].orig_dst.s_addr == p_addr_in->s_addr)
			if(!dnats[i].orig_port)
				dnat = &dnats[i];

	if (dnat) {
		p_addr_in = &dnat->new_dst;
		if (dnat->new_port)
			port = dnat->new_port;
	}

	for(i = 0; i < num_localnet_addr && !remote_dns_connect; i++) {
		if (localnet_addr[i].port && localnet_addr[i].port != port)
			continue;
		if (localnet_addr[i].family != (v6 ? AF_INET6 : AF_INET))
			continue;
		if (v6) {
			size_t prefix_bytes = localnet_addr[i].in6_prefix / CHAR_BIT;
			size_t prefix_bits = localnet_addr[i].in6_prefix % CHAR_BIT;
			if (prefix_bytes && memcmp(p_addr_in6->s6_addr, localnet_addr[i].in6_addr.s6_addr, prefix_bytes) != 0)
				continue;
			if (prefix_bits && (p_addr_in6->s6_addr[prefix_bytes] ^ localnet_addr[i].in6_addr.s6_addr[prefix_bytes]) >> (CHAR_BIT - prefix_bits))
				continue;
		} else {
			if((p_addr_in->s_addr ^ localnet_addr[i].in_addr.s_addr) & localnet_addr[i].in_mask.s_addr)
				continue;
		}
		PDEBUG("accessing localnet using true_connect\n");
		return true_connect(sock, addr, len);
	}

	flags = fcntl(sock, F_GETFL, 0);
	if(flags & O_NONBLOCK)
		fcntl(sock, F_SETFL, !O_NONBLOCK);

	memcpy(dest_ip.addr.v6, v6 ? (void*)p_addr_in6 : (void*)p_addr_in, v6?16:4);

	ret = connect_proxy_chain(sock,
				  dest_ip,
				  htons(port),
				  proxychains_pd, proxychains_proxy_count, proxychains_ct, proxychains_max_chain);

	fcntl(sock, F_SETFL, flags);
	if(ret != SUCCESS)
		errno = ECONNREFUSED;
	return ret;
}

#ifdef IS_SOLARIS
HOOKFUNC(int, __xnet_connect, int sock, const struct sockaddr *addr, unsigned int len) {
	return connect(sock, addr, len);
}
#endif

static struct gethostbyname_data ghbndata;
HOOKFUNC(struct hostent*, gethostbyname, const char *name) {
	INIT();
	PDEBUG("gethostbyname: %s\n", name);

	if(proxychains_resolver == DNSLF_FORKEXEC)
		return proxy_gethostbyname_old(name);
	else if(proxychains_resolver == DNSLF_LIBC)
		return true_gethostbyname(name);
	else
		return proxy_gethostbyname(name, &ghbndata);

	return NULL;
}

HOOKFUNC(int, getaddrinfo, const char *node, const char *service, const struct addrinfo *hints, struct addrinfo **res) {
	INIT();
	PDEBUG("getaddrinfo: %s %s\n", node ? node : "null", service ? service : "null");

	if(proxychains_resolver != DNSLF_LIBC)
		return proxy_getaddrinfo(node, service, hints, res);
	else
		return true_getaddrinfo(node, service, hints, res);
}

HOOKFUNC(void, freeaddrinfo, struct addrinfo *res) {
	INIT();
	PDEBUG("freeaddrinfo %p \n", (void *) res);

	if(proxychains_resolver == DNSLF_LIBC)
		true_freeaddrinfo(res);
	else
		proxy_freeaddrinfo(res);
}

HOOKFUNC(int, getnameinfo, const struct sockaddr *sa, socklen_t salen,
	           char *host, GN_NODELEN_T hostlen, char *serv,
	           GN_SERVLEN_T servlen, GN_FLAGS_T flags)
{
	INIT();
	PFUNC();

	if(proxychains_resolver == DNSLF_LIBC) {
		return true_getnameinfo(sa, salen, host, hostlen, serv, servlen, flags);
	} else {
		if(!salen || !(SOCKFAMILY(*sa) == AF_INET || SOCKFAMILY(*sa) == AF_INET6))
			return EAI_FAMILY;
		int v6 = SOCKFAMILY(*sa) == AF_INET6;
		if(salen < (v6?sizeof(struct sockaddr_in6):sizeof(struct sockaddr_in)))
			return EAI_FAMILY;
		if(hostlen) {
			unsigned char v4inv6buf[4];
			const void *ip = v6 ? (void*)&((struct sockaddr_in6*)sa)->sin6_addr
			                    : (void*)&((struct sockaddr_in*)sa)->sin_addr;
			unsigned scopeid = 0;
			if(v6) {
				if(is_v4inv6(&((struct sockaddr_in6*)sa)->sin6_addr)) {
					memcpy(v4inv6buf, &((struct sockaddr_in6*)sa)->sin6_addr.s6_addr[12], 4);
					ip = v4inv6buf;
					v6 = 0;
				} else
					scopeid = ((struct sockaddr_in6 *)sa)->sin6_scope_id;
			}
			if(!inet_ntop(v6?AF_INET6:AF_INET,ip,host,hostlen))
				return EAI_OVERFLOW;
			if(scopeid) {
				size_t l = strlen(host);
				if(snprintf(host+l, hostlen-l, "%%%u", scopeid) >= hostlen-l)
					return EAI_OVERFLOW;
			}
		}
		if(servlen) {
			if(snprintf(serv, servlen, "%d", ntohs(SOCKPORT(*sa))) >= servlen)
				return EAI_OVERFLOW;
		}
	}
	return 0;
}

HOOKFUNC(struct hostent*, gethostbyaddr, const void *addr, socklen_t len, int type) {
	INIT();
	PDEBUG("TODO: proper gethostbyaddr hook\n");

	static char buf[16];
	static char ipv4[4];
	static char *list[2];
	static char *aliases[1];
	static struct hostent he;

	if(proxychains_resolver == DNSLF_LIBC)
		return true_gethostbyaddr(addr, len, type);
	else {

		PDEBUG("len %u\n", len);
		if(len != 4)
			return NULL;
		he.h_name = buf;
		memcpy(ipv4, addr, 4);
		list[0] = ipv4;
		list[1] = NULL;
		he.h_addr_list = list;
		he.h_addrtype = AF_INET;
		aliases[0] = NULL;
		he.h_aliases = aliases;
		he.h_length = 4;
		pc_stringfromipv4((unsigned char *) addr, buf);
		return &he;
	}
	return NULL;
}

#ifndef MSG_FASTOPEN
#   define MSG_FASTOPEN 0x20000000
#endif

HOOKFUNC(ssize_t, sendto, int sockfd, const void *buf, size_t len, int flags,
	       const struct sockaddr *dest_addr, socklen_t addrlen) {
	INIT();
	PFUNC();
	if (flags & MSG_FASTOPEN) {
		if (!connect(sockfd, dest_addr, addrlen) && errno != EINPROGRESS) {
			return -1;
		}
		dest_addr = NULL;
		addrlen = 0;
		flags &= ~MSG_FASTOPEN;
	}
	return true_sendto(sockfd, buf, len, flags, dest_addr, addrlen);
}

#ifdef MONTEREY_HOOKING
#define SETUP_SYM(X) do { if (! true_ ## X ) true_ ## X = &X; } while(0)
#define SETUP_SYM_OPTIONAL(X)
#else
#define SETUP_SYM_IMPL(X, IS_MANDATORY) do { if (! true_ ## X ) true_ ## X = load_sym( # X, X, IS_MANDATORY ); } while(0)
#define SETUP_SYM(X) SETUP_SYM_IMPL(X, 1)
#define SETUP_SYM_OPTIONAL(X) SETUP_SYM_IMPL(X, 0)
#endif

static void setup_hooks(void) {
	SETUP_SYM(connect);
	SETUP_SYM(sendto);
	SETUP_SYM(gethostbyname);
	SETUP_SYM(getaddrinfo);
	SETUP_SYM(freeaddrinfo);
	SETUP_SYM(gethostbyaddr);
	SETUP_SYM(getnameinfo);
#ifdef IS_SOLARIS
	SETUP_SYM(__xnet_connect);
#endif
	SETUP_SYM(close);
	SETUP_SYM_OPTIONAL(close_range);
}

#ifdef MONTEREY_HOOKING

#define DYLD_INTERPOSE(_replacement,_replacee) \
   __attribute__((used)) static struct{ const void* replacement; const void* replacee; } _interpose_##_replacee \
   __attribute__((section ("__DATA,__interpose"))) = { (const void*)(unsigned long)&_replacement, (const void*)(unsigned long)&_replacee };
#define DYLD_HOOK(F) DYLD_INTERPOSE(pxcng_ ## F, F)

DYLD_HOOK(connect);
DYLD_HOOK(sendto);
DYLD_HOOK(gethostbyname);
DYLD_HOOK(getaddrinfo);
DYLD_HOOK(freeaddrinfo);
DYLD_HOOK(gethostbyaddr);
DYLD_HOOK(getnameinfo);
DYLD_HOOK(close);

#endif


================================================
FILE: src/main.c
================================================
/*   (C) 2011, 2012 rofl0r
 *                                                                         *
 *   This program is free software; you can redistribute it and/or modify  *
 *   it under the terms of the GNU General Public License as published by  *
 *   the Free Software Foundation; either version 2 of the License, or     *
 *   (at your option) any later version.                                   *
 *                                                                         *
 ***************************************************************************/

#define _DEFAULT_SOURCE
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/wait.h>

#ifdef IS_MAC
#define _DARWIN_C_SOURCE
#endif
#include <dlfcn.h>

#include "common.h"

static int usage(char **argv) {
	printf("\nUsage:\t%s -q -f config_file program_name [arguments]\n"
	       "\t-q makes proxychains quiet - this overrides the config setting\n"
	       "\t-f allows one to manually specify a configfile to use\n"
	       "\tfor example : proxychains telnet somehost.com\n" "More help in README file\n\n", argv[0]);
	return EXIT_FAILURE;
}

static const char *dll_name = DLL_NAME;

static char own_dir[256];
static const char *dll_dirs[] = {
#ifndef SUPER_SECURE /* CVE-2015-3887 */
	".",
#endif
	own_dir,
	LIB_DIR,
	"/lib",
	"/usr/lib",
	"/usr/local/lib",
	"/lib64",
	NULL
};

static void set_own_dir(const char *argv0) {
	size_t l = strlen(argv0);
	while(l && argv0[l - 1] != '/')
		l--;
	if(l == 0 || l >= sizeof(own_dir))
#ifdef SUPER_SECURE
		memcpy(own_dir, "/dev/null/", 11);
#else
		memcpy(own_dir, ".", 2);
#endif
	else {
		memcpy(own_dir, argv0, l - 1);
		own_dir[l] = 0;
	}
}

#define MAX_COMMANDLINE_FLAGS 2

int main(int argc, char *argv[]) {
	char *path = NULL;
	char buf[256];
	char pbuf[256];
	int start_argv = 1;
	int quiet = 0;
	size_t i;
	const char *prefix = NULL;

	if(argc == 2 && !strcmp(argv[1], "--help"))
		return usage(argv);

	for(i = 0; i < MAX_COMMANDLINE_FLAGS; i++) {
		if(start_argv < argc && argv[start_argv][0] == '-') {
			if(argv[start_argv][1] == 'q') {
				quiet = 1;
				start_argv++;
			} else if(argv[start_argv][1] == 'f') {

				if(start_argv + 1 < argc)
					path = argv[start_argv + 1];
				else
					return usage(argv);

				start_argv += 2;
			}
		} else
			break;
	}

	if(start_argv >= argc)
		return usage(argv);

	/* check if path of config file has not been passed via command line */
	path = get_config_path(path, pbuf, sizeof(pbuf));

	if(!quiet)
		fprintf(stderr, LOG_PREFIX "config file found: %s\n", path);

	/* Set PROXYCHAINS_CONF_FILE to get proxychains lib to use new config file. */
	setenv(PROXYCHAINS_CONF_FILE_ENV_VAR, path, 1);

	if(quiet)
		setenv(PROXYCHAINS_QUIET_MODE_ENV_VAR, "1", 1);


	// search DLL

	Dl_info dli;
	dladdr(own_dir, &dli);
	set_own_dir(dli.dli_fname);

	i = 0;

	while(dll_dirs[i]) {
		snprintf(buf, sizeof(buf), "%s/%s", dll_dirs[i], dll_name);
		if(access(buf, R_OK) != -1) {
			prefix = dll_dirs[i];
			break;
		}
		i++;
	}

	if(!prefix) {
		fprintf(stderr, "couldnt locate %s\n", dll_name);
		return EXIT_FAILURE;
	}
	if(!quiet)
		fprintf(stderr, LOG_PREFIX "preloading %s/%s\n", prefix, dll_name);

#if defined(IS_MAC) || defined(IS_OPENBSD)
#define LD_PRELOAD_SEP ":"
#else
/* Dynlinkers for Linux and most BSDs seem to support space
   as LD_PRELOAD separator, with colon added only recently.
   We use the old syntax for maximum compat */
#define LD_PRELOAD_SEP " "
#endif

#ifdef IS_MAC
	putenv("DYLD_FORCE_FLAT_NAMESPACE=1");
#define LD_PRELOAD_ENV "DYLD_INSERT_LIBRARIES"
#else
#define LD_PRELOAD_ENV "LD_PRELOAD"
#endif
	char *old_val = getenv(LD_PRELOAD_ENV);
	snprintf(buf, sizeof(buf), LD_PRELOAD_ENV "=%s/%s%s%s",
	         prefix, dll_name,
	         /* append previous LD_PRELOAD content, if existent */
	         old_val ? LD_PRELOAD_SEP : "",
	         old_val ? old_val : "");
	putenv(buf);
	execvp(argv[start_argv], &argv[start_argv]);
	fprintf(stderr, "proxychains: can't load process '%s'.", argv[start_argv]);
	perror(" (hint: it's probably a typo)");

	return EXIT_FAILURE;
}


================================================
FILE: src/mutex.h
================================================
#ifndef MUTEX_H
#define MUTEX_H

#include <pthread.h>
# define MUTEX_LOCK(x) pthread_mutex_lock(x)
# define MUTEX_UNLOCK(x) pthread_mutex_unlock(x)
# define MUTEX_INIT(x) pthread_mutex_init(x, NULL)
# define MUTEX_DESTROY(x) pthread_mutex_destroy(x)

#endif


================================================
FILE: src/proxychains.conf
================================================
# proxychains.conf  VER 4.x
#
#        HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS.


# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
#
#dynamic_chain
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app
#
strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
#round_robin_chain
#
# Round Robin - Each connection will be done via chained proxies
# of chain_len length
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped).
# the start of the current proxy chain is the proxy after the last
# proxy in the previously invoked proxy chain.
# if the end of the proxy chain is reached while looking for proxies
# start at the beginning again.
# otherwise EINTR is returned to the app
# These semantics are not guaranteed in a multithreaded environment.
#
#random_chain
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see  chain_len) from the list.
# this option is good to test your IDS :)

# Make sense only if random_chain or round_robin_chain
#chain_len = 2

# Quiet mode (no output from library)
#quiet_mode

## Proxy DNS requests - no leak for DNS data
# (disable all of the 3 items below to not proxy your DNS requests)

# method 1. this uses the proxychains4 style method to do remote dns:
# a thread is spawned that serves DNS requests and hands down an ip
# assigned from an internal list (via remote_dns_subnet).
# this is the easiest (setup-wise) and fastest method, however on
# systems with buggy libcs and very complex software like webbrowsers
# this might not work and/or cause crashes.
proxy_dns

# method 2. use the old proxyresolv script to proxy DNS requests
# in proxychains 3.1 style. requires `proxyresolv` in $PATH
# plus a dynamically linked `dig` binary.
# this is a lot slower than `proxy_dns`, doesn't support .onion URLs,
# but might be more compatible with complex software like webbrowsers.
#proxy_dns_old

# method 3. use proxychains4-daemon process to serve remote DNS requests.
# this is similar to the threaded `proxy_dns` method, however it requires
# that proxychains4-daemon is already running on the specified address.
# on the plus side it doesn't do malloc/threads so it should be quite
# compatible with complex, async-unsafe software.
# note that if you don't start proxychains4-daemon before using this,
# the process will simply hang.
#proxy_dns_daemon 127.0.0.1:1053

# set the class A subnet number to use for the internal remote DNS mapping
# we use the reserved 224.x.x.x range by default,
# if the proxified app does a DNS request, we will return an IP from that range.
# on further accesses to this ip we will send the saved DNS name to the proxy.
# in case some control-freak app checks the returned ip, and denies to 
# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
# of course you should make sure that the proxified app does not need
# *real* access to this subnet. 
# i.e. dont use the same subnet then in the localnet section
#remote_dns_subnet 127 
#remote_dns_subnet 10
remote_dns_subnet 224

# Some timeouts in milliseconds
tcp_read_time_out 15000
tcp_connect_time_out 8000

### Examples for localnet exclusion
## localnet ranges will *not* use a proxy to connect.
## note that localnet works only when plain IP addresses are passed to the app,
## the hostname resolves via /etc/hosts, or proxy_dns is disabled or proxy_dns_old used.

## Exclude connections to 192.168.1.0/24 with port 80
# localnet 192.168.1.0:80/255.255.255.0

## Exclude connections to 192.168.100.0/24
# localnet 192.168.100.0/255.255.255.0

## Exclude connections to ANYwhere with port 80
# localnet 0.0.0.0:80/0.0.0.0
# localnet [::]:80/0

## RFC6890 Loopback address range
## if you enable this, you have to make sure remote_dns_subnet is not 127
## you'll need to enable it if you want to use an application that 
## connects to localhost.
# localnet 127.0.0.0/255.0.0.0
# localnet ::1/128

## RFC1918 Private Address Ranges
# localnet 10.0.0.0/255.0.0.0
# localnet 172.16.0.0/255.240.0.0
# localnet 192.168.0.0/255.255.0.0

### Examples for dnat
## Trying to proxy connections to destinations which are dnatted,
## will result in proxying connections to the new given destinations.
## Whenever I connect to 1.1.1.1 on port 1234 actually connect to 1.1.1.2 on port 443
# dnat 1.1.1.1:1234  1.1.1.2:443

## Whenever I connect to 1.1.1.1 on port 443 actually connect to 1.1.1.2 on port 443
## (no need to write :443 again)
# dnat 1.1.1.2:443  1.1.1.2

## No matter what port I connect to on 1.1.1.1 port actually connect to 1.1.1.2 on port 443
# dnat 1.1.1.1  1.1.1.2:443

## Always, instead of connecting to 1.1.1.1, connect to 1.1.1.2
# dnat 1.1.1.1  1.1.1.2

# ProxyList format
#       type  ip  port [user pass]
#       (values separated by 'tab' or 'blank')
#
#       only numeric ipv4 addresses are valid
#
#
#        Examples:
#
#            	socks5	192.168.67.78	1080	lamer	secret
#		http	192.168.89.3	8080	justu	hidden
#	 	socks4	192.168.1.49	1080
#	        http	192.168.39.93	8080	
#		
#
#       proxy types: http, socks4, socks5, raw
#         * raw: The traffic is simply forwarded to the proxy without modification.
#        ( auth types supported: "basic"-http  "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks4 	127.0.0.1 9050



================================================
FILE: src/proxyresolv
================================================
#!/bin/sh
# This is a legacy script that uses "dig" or "drill" to do DNS lookups via TCP.

# DNS server used to resolve names
test -z "$DNS_SERVER" && DNS_SERVER=8.8.8.8


if [ $# = 0 ] ; then
	echo "	usage:"
	echo "		proxyresolv <hostname> "
	exit
fi


test -z $LD_PRELOAD && export LD_PRELOAD=libproxychains4.so

if type dig 1>/dev/null 2>&1 ; then
dig       $1 @$DNS_SERVER +tcp | awk '/A.?[0-9]+\.[0-9]+\.[0-9]/{print $5;}'
elif type drill 1>/dev/null 2>&1 ; then
drill -t4 $1 @$DNS_SERVER      | awk '/A.+[0-9]+\.[0-9]+\.[0-9]/{print $5;}'
else
echo "error: neither dig nor drill found" >&2
fi


================================================
FILE: src/rdns.c
================================================
#include <sys/socket.h>
#include <stdlib.h>
#include <string.h>

#include "rdns.h"
#include "allocator_thread.h"
#include "remotedns.h"

#ifndef HAVE_SOCK_CLOEXEC
#define SOCK_CLOEXEC 0
#endif

//static enum dns_lookup_flavor dns_flavor;
#define dns_flavor rdns_get_flavor()

static struct sockaddr_in rdns_server;

size_t rdns_daemon_get_host_for_ip(ip_type4 ip, char* readbuf) {
	struct at_msg msg = {
		.h.msgtype = ATM_GETNAME,
		.h.datalen = htons(4),
		.m.ip = ip,
	};
	int fd = socket(AF_INET, SOCK_DGRAM|SOCK_CLOEXEC, 0);
	sendto(fd, &msg, sizeof(msg.h)+4, 0, (void*)&rdns_server, sizeof(rdns_server));
	recvfrom(fd, &msg, sizeof msg, 0, (void*)0, (void*)0);
	close(fd);
	msg.h.datalen = ntohs(msg.h.datalen);
	if(!msg.h.datalen || msg.h.datalen > 256) return 0;
	memcpy(readbuf, msg.m.host, msg.h.datalen);
	return msg.h.datalen - 1;
}

static ip_type4 rdns_daemon_get_ip_for_host(char* host, size_t len) {
	struct at_msg msg = {
		.h.msgtype = ATM_GETIP,
	};
	if(len >= 256) return IPT4_INT(-1);
	memcpy(msg.m.host, host, len+1);
	msg.h.datalen = htons(len+1);
	int fd = socket(AF_INET, SOCK_DGRAM|SOCK_CLOEXEC, 0);
	sendto(fd, &msg, sizeof(msg.h)+len+1, 0, (void*)&rdns_server, sizeof(rdns_server));
	recvfrom(fd, &msg, sizeof msg, 0, (void*)0, (void*)0);
	close(fd);
	if(ntohs(msg.h.datalen) != 4) return IPT4_INT(-1);
	return msg.m.ip;
}

const char *rdns_resolver_string(enum dns_lookup_flavor flavor) {
	static const char tab[][7] = {
		[DNSLF_LIBC] = "off",
		[DNSLF_FORKEXEC] = "old",
		[DNSLF_RDNS_THREAD] = "thread",
		[DNSLF_RDNS_DAEMON] = "daemon",
	};
	return tab[flavor];
}

void rdns_init(enum dns_lookup_flavor flavor) {
	static int init_done = 0;
	if(!init_done) switch(flavor) {
		case DNSLF_RDNS_THREAD:
			at_init();
			break;
		case DNSLF_RDNS_DAEMON:
		default:
			break;
	}
	init_done = 1;
}

void rdns_set_daemon(struct sockaddr_in* addr) {
	rdns_server = *addr;
}

#if 0
enum dns_lookup_flavor rdns_get_flavor(void) {
	return dns_flavor;
}
#endif

size_t rdns_get_host_for_ip(ip_type4 ip, char* readbuf) {
	switch(dns_flavor) {
		case DNSLF_RDNS_THREAD: return at_get_host_for_ip(ip, readbuf);
		case DNSLF_RDNS_DAEMON: return rdns_daemon_get_host_for_ip(ip, readbuf);
		default:
			abort();
	}
}

ip_type4 rdns_get_ip_for_host(char* host, size_t len) {
	switch(dns_flavor) {
		case DNSLF_RDNS_THREAD: return at_get_ip_for_host(host, len);
		case DNSLF_RDNS_DAEMON: return rdns_daemon_get_ip_for_host(host, len);
		default:
			abort();
	}
}



================================================
FILE: src/rdns.h
================================================
#ifndef RDNS_H
#define RDNS_H

#include <unistd.h>
#include <netinet/in.h>
#include "ip_type.h"
#include "remotedns.h"

enum dns_lookup_flavor {
	DNSLF_LIBC = 0,
	DNSLF_FORKEXEC,

	DNSLF_RDNS_START,
	DNSLF_RDNS_THREAD = DNSLF_RDNS_START,
	DNSLF_RDNS_DAEMON,
};

void rdns_init(enum dns_lookup_flavor flavor);
void rdns_set_daemon(struct sockaddr_in* addr);
const char *rdns_resolver_string(enum dns_lookup_flavor flavor);
size_t rdns_get_host_for_ip(ip_type4 ip, char* readbuf);
ip_type4 rdns_get_ip_for_host(char* host, size_t len);

//enum dns_lookup_flavor rdns_get_flavor(void);
#define rdns_get_flavor() proxychains_resolver
extern enum dns_lookup_flavor proxychains_resolver;

#endif


================================================
FILE: src/remotedns.h
================================================
#ifndef REMOTEDNS_H
#define REMOTEDNS_H

#include <unistd.h>
#include "ip_type.h"

#define MSG_LEN_MAX 256

enum at_msgtype {
	ATM_GETIP = 0,
	ATM_GETNAME,
	ATM_FAIL,
	ATM_EXIT,
};

struct at_msghdr {
	unsigned char msgtype; /* at_msgtype */
	char reserved;
	unsigned short datalen;
};

struct at_msg {
	struct at_msghdr h;
	union {
		char host[260];
		ip_type4 ip;
	} m;
};

#endif



================================================
FILE: src/version.c
================================================
#include "version.h"
static const char version[] = VERSION;
const char *proxychains_get_version(void) {
	return version;
}



================================================
FILE: tests/test_getaddrinfo.c
================================================
#include <stdio.h>
#include <stdlib.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <assert.h>
#include <string.h>

#ifndef   NI_MAXHOST
#define   NI_MAXHOST 1025
#endif

static int doit(const char* host, const char* service) {
	struct addrinfo *result;
	struct addrinfo *res;
	int error;

	/* resolve the domain name into a list of addresses */
	error = getaddrinfo(host, service, NULL, &result);
	if (error != 0)
	{
		fprintf(stderr, "error in getaddrinfo: %s\n", gai_strerror(error));
		return EXIT_FAILURE;
	}

	/* loop over all returned results and do inverse lookup */
	for (res = result; res != NULL; res = res->ai_next)
	{
		char hostname[NI_MAXHOST] = "";

		error = getnameinfo(res->ai_addr, res->ai_addrlen, hostname, NI_MAXHOST, NULL, 0, 0);
		if (error != 0)
		{
		fprintf(stderr, "error in getnameinfo: %s\n", gai_strerror(error));
		continue;
		}
		int port = 0;
		if(res->ai_family == AF_INET) port = ((struct sockaddr_in*)res->ai_addr)->sin_port;
		else if(res->ai_family == AF_INET6) port = ((struct sockaddr_in6*)res->ai_addr)->sin6_port;
		port = ntohs(port);
		printf("hostname: %s, port: %d\n", hostname, port);
	}

	freeaddrinfo(result);
	return EXIT_SUCCESS;
}

/* reproduce use of getaddrinfo as used by nmap 7.91's canonicalize_address */
int canonicalize_address(struct sockaddr_storage *ss, struct sockaddr_storage *output) {
	char canonical_ip_string[NI_MAXHOST];
	struct addrinfo *ai;
	int rc;
	/* Convert address to string. */
	rc = getnameinfo((struct sockaddr *) ss, sizeof(*ss),
		canonical_ip_string, sizeof(canonical_ip_string), NULL, 0, NI_NUMERICHOST);
	assert(rc == 0);
	struct addrinfo hints = {
		.ai_family = ss->ss_family,
		.ai_socktype = SOCK_DGRAM,
		.ai_flags = AI_NUMERICHOST,
	};
	rc = getaddrinfo(canonical_ip_string, NULL, &hints, &ai);
	if (rc != 0 || ai == NULL)
		return -1;
	assert(ai->ai_addrlen > 0 && ai->ai_addrlen <= (int) sizeof(*output));
	memcpy(output, ai->ai_addr, ai->ai_addrlen);
	freeaddrinfo(ai);
	return 0;
}

int main(void) {
	int ret;
	ret = doit("www.example.com", NULL);
	ret = doit("www.example.com", "80");
	struct sockaddr_storage o, ss = {.ss_family = PF_INET};
	struct sockaddr_in *v4 = &ss;
	struct sockaddr_in6 *v6 = &ss;
	memcpy(&v4->sin_addr, "\x7f\0\0\1", 4);
	ret = canonicalize_address(&ss, &o);
	assert (ret == 0);
	ss.ss_family = PF_INET6;
	memcpy(&v6->sin6_addr, "\0\0\0\0" "\0\0\0\0" "\0\0\0\0""\0\0\0\1", 16);
	ret = canonicalize_address(&ss, &o);
	assert (ret == 0);
	return ret;
}


================================================
FILE: tests/test_gethostbyname.c
================================================
#include <stdio.h>
#include <netdb.h>
#include "../src/common.c"

void printhostent(struct hostent *hp) {
	char ipbuf[16];
	pc_stringfromipv4(hp->h_addr_list[0], ipbuf);
	printf("alias: %p, len: %d, name: %s, addrlist: %p, addrtype: %d, ip: %s\n", 
		hp->h_aliases, 
		hp->h_length,
		hp->h_name,
		hp->h_addr_list,
		hp->h_addrtype,
		ipbuf
	);
}
int main(int argc, char**argv) {
	struct hostent* ret;
	if(argc == 1) return 1;
	ret = gethostbyname(argv[1]);
	if(ret) printhostent(ret);
	return 0;
}


================================================
FILE: tests/test_gethostent.c
================================================
#include <netdb.h>
#include <stdio.h>
#include "../src/common.c"

void printhostent(struct hostent *hp) {
	char ipbuf[16];
	pc_stringfromipv4(hp->h_addr_list[0], ipbuf);
	printf("alias: %p, len: %d, name: %s, addrlist: %p, addrtype: %d, ip: %s\n", 
		hp->h_aliases, 
		hp->h_length,
		hp->h_name,
		hp->h_addr_list,
		hp->h_addrtype,
		ipbuf
	);
}

int main(int argc, char** argv) {
	struct hostent *hp;
	while((hp = gethostent())) {
		printhostent(hp);
	}
	return 0;
}


================================================
FILE: tests/test_gethostent_r.c
================================================
#include <netdb.h>
#include <stdio.h>
#include <errno.h>
#include "../src/common.h"

/*
int gethostent_r( 
        struct hostent *ret, char *buf, size_t buflen,
        struct hostent **result, int *h_errnop);

Glibc2 also has reentrant versions gethostent_r(), gethostbyaddr_r(),
gethostbyname_r() and gethostbyname2_r(). 

The caller supplies a hostent structure ret which will be filled in on success, 
and a temporary work buffer buf of size buflen. 
After the call, result will point to the result on success. 
In case of an error or if no entry is found result will be NULL. 
The functions return 0 on success and a nonzero error number on failure. 
In addition to the errors returned by the nonreentrant versions of these functions, 
if buf is too small, the functions will return ERANGE, and the call should be retried 
with a larger buffer. 
The global variable h_errno is not modified, but the address of a variable in which 
to store error numbers is passed in h_errnop.
*/

void printhostent(struct hostent *hp) {
	char ipbuf[16];
	pc_stringfromipv4(hp->h_addr_list[0], ipbuf);
	printf("alias: %p, len: %d, name: %s, addrlist: %p, addrtype: %d, ip: %s\n", 
		hp->h_aliases, 
		hp->h_length,
		hp->h_name,
		hp->h_addr_list,
		hp->h_addrtype,
		ipbuf
	);
}

int main(int argc, char** argv) {
	struct hostent he_buf;
	struct hostent *he_res;
	char h_buf[1024];
	int ch_errno;
	int ret;
	do {
		ret = gethostent_r(&he_buf, h_buf, sizeof(h_buf), &he_res, &ch_errno);
		printf("ret: %d, h_errno: %d\n", ret, ch_errno);
		if(ret != 0) {
			errno = ret;
			ret = -1;
		}
		if(ret == -1) {
			perror("gethostent_r");
			break;
		}
		if(he_res) {
			printhostent(he_res);
		}
	} while (he_res);
	return 0;
}

================================================
FILE: tests/test_getnameinfo.c
================================================
#include <netdb.h>
#include <stdio.h>
#include <string.h>
#include <assert.h>
#include <sys/socket.h>
#include <netinet/in.h>

#define     satosin(x)      ((struct sockaddr_in *) &(x))
#define     SOCKADDR(x)     (satosin(x)->sin_addr.s_addr)
#define     SOCKADDR_2(x)     (satosin(x)->sin_addr)
#define     SOCKPORT(x)     (satosin(x)->sin_port)
#define     SOCKFAMILY(x)     (satosin(x)->sin_family)

#define ASSERT(X) { if(!(X)) printf("ASSERTION FAILED: %s @%s:%d\n", # X, __FILE__, __LINE__); }
#define CLR() { hbuf[0] = 0; sbuf[0] = 0; }

int main() {
	struct sockaddr_in a = {0}, *sa = &a;
	char hbuf[NI_MAXHOST], sbuf[NI_MAXSERV];
	a.sin_port = htons(80);
	memcpy(  &a.sin_addr   , (char[]) {127,0,0,1}, 4);

	int ret;

	if ((ret = getnameinfo((void*)sa, 0, hbuf, sizeof(hbuf), sbuf,
	    sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == EAI_FAMILY);
	CLR();

	if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, sizeof(hbuf), sbuf,
	    sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == EAI_FAMILY);
	CLR();

	SOCKFAMILY(a) = AF_INET;

	if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, 1, sbuf,
	    sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == EAI_OVERFLOW);
	CLR();

	if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, 0, sbuf,
	    1, NI_NUMERICHOST | NI_NUMERICSERV)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == EAI_OVERFLOW);
	CLR();

	if ((ret = getnameinfo((void*)sa, sizeof(a) - 1, hbuf, 0, sbuf,
	    sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == EAI_FAMILY);
	CLR();

	if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, 0, sbuf,
	    sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == 0 && !strcmp("80", sbuf));
	CLR();

	if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, sizeof hbuf, sbuf,
	    0, NI_NUMERICHOST | NI_NUMERICSERV)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == 0 && !strcmp("127.0.0.1",hbuf));
	CLR();


	if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, sizeof(hbuf), sbuf,
	    sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == 0 && !strcmp("127.0.0.1",hbuf) && !strcmp("80", sbuf));
	CLR();

	struct sockaddr_in6 b = {0}, *sb = &b;
	b.sin6_port = htons(8080);
	b.sin6_family = AF_INET6;

	memcpy(&b.sin6_addr,"\0\0\0\0\0\0\0\0\0\0\xff\xff\xc0\xa8\1\2", 16);

	if ((ret = getnameinfo((void*)sb, sizeof b, hbuf, sizeof(hbuf), sbuf,
	    sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == 0 && !strcmp("192.168.1.2",hbuf) && !strcmp("8080", sbuf));
	CLR();

	b.sin6_scope_id = 3;
	memcpy(&b.sin6_addr,"\0\0\xaa\0\0\0\0\0\0\0\0\xff\xc0\xa8\1\2", 16);

	if ((ret = getnameinfo((void*)sb, sizeof b, hbuf, sizeof(hbuf), sbuf,
	    sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV | NI_NUMERICSCOPE)) == 0)
		printf("host=%s, serv=%s\n", hbuf, sbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == 0);

	b.sin6_port = 0;
	b.sin6_scope_id = 0;
	memcpy(&b.sin6_addr,"\0\0\0\0" "\0\0\0\0" "\0\0\0\0" "\0\0\0\1", 16);

	if ((ret = getnameinfo((void*)sb, sizeof b, hbuf, sizeof(hbuf), NULL,
	    0, NI_NUMERICHOST)) == 0)
		printf("host=%s\n", hbuf);
	else
		printf("%s\n", gai_strerror(ret));

	ASSERT(ret == 0);

	return 0;
}


================================================
FILE: tests/test_proxy_gethostbyname.c
================================================
#include "../src/core.h"
#include "../src/common.h"
#include <stdio.h>

void printhostent(struct hostent *hp) {
	char ipbuf[16];
	pc_stringfromipv4(hp->h_addr_list[0], ipbuf);
	printf("alias: %p, len: %d, name: %s, addrlist: %p, addrtype: %d, ip: %s\n", 
		hp->h_aliases, 
		hp->h_length,
		hp->h_name,
		hp->h_addr_list,
		hp->h_addrtype,
		ipbuf
	);
}
int main(int argc, char**argv) {
	struct hostent* ret;
	struct gethostbyname_data data;
	if(argc == 1) return 1;
	ret = proxy_gethostbyname(argv[1], &data);
	if(ret) printhostent(ret);
	return 0;
}

================================================
FILE: tests/test_sendto.c
================================================
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>

#ifndef MSG_FASTOPEN
#   define MSG_FASTOPEN 0x20000000
#endif

void error(const char *msg)
{
	perror(msg);
	exit(1);
}

int main(int argc, char *argv[])
{
	if (argc < 4) {
		printf("Usage: %s host port method(connect or sendto)\n", argv[0]);
		return 1;
	}
	const char *hostname = argv[1];
	const int portno = atoi(argv[2]);
	const char *method = argv[3];
	char request[BUFSIZ];
	sprintf(request, "GET / HTTP/1.0\r\nHost: %s\r\n\r\n", hostname);
	int sockfd, n;
	struct sockaddr_in serv_addr;
	struct hostent *server;

	char buffer[BUFSIZ];
	sockfd = socket(AF_INET, SOCK_STREAM, 0);
	if (sockfd < 0) error("ERROR opening socket");
	server = gethostbyname(hostname);
	if (server == NULL) {
		fprintf(stderr, "%s: no such host\n", hostname);
		return 1;
	}
	memset(&serv_addr, 0, sizeof(serv_addr));
	serv_addr.sin_family = AF_INET;
	memcpy(&serv_addr.sin_addr.s_addr, server->h_addr, server->h_length);
	serv_addr.sin_port = htons(portno);
	if (!strcmp(method, "connect")) {
	  if (connect(sockfd, (struct sockaddr *)&serv_addr, sizeof(serv_addr)) < 0)
		  error("connect");
	  n = send(sockfd, request, strlen(request), 0);
	} else if (!strcmp(method, "sendto")) {
	  n = sendto(sockfd, request, strlen(request), MSG_FASTOPEN, (struct sockaddr *)&serv_addr, sizeof(serv_addr));
	} else {
	  printf("Unknown method %s\n", method);
	  return 1;
	}
	if (n < 0)
		 error("send");
	memset(buffer, 0, BUFSIZ);
	n = read(sockfd, buffer, BUFSIZ - 1);
	if (n < 0)
		 error("ERROR reading from socket");
	printf("%s\n", buffer);
	close(sockfd);
	return 0;
}


================================================
FILE: tests/test_shm.c
================================================
#include "../src/shm.h"
#include <assert.h>

#define s(A) (sizeof(A) - 1)
#define ss(A) (A), s(A)

int main() {
	char buf4096[4096];
	struct stringpool sp;
	stringpool_init(&sp);
	char *r;
	size_t pos = 0;
	r = stringpool_add(&sp, ss("AAAAA"));
	assert(r == sp.start);
	
	pos += s("AAAAA");
	assert(sp.alloced == 4096);
	assert(sp.used == pos);
	
	r = stringpool_add(&sp, buf4096, sizeof(buf4096));
	assert(r == sp.start + pos);
	
	pos += sizeof(buf4096);
	assert(sp.alloced == 4096 * 2);
	assert(sp.used == pos);
	
	r = stringpool_add(&sp, buf4096, 4096 - s("AAAAA"));
	assert(r == sp.start + pos);
	pos += 4096 - s("AAAAA");
	assert(pos == 4096 * 2);

	assert(sp.alloced == 4096 * 2);
	assert(sp.used == pos);
	
	
	
	return 0;
	
}

================================================
FILE: tests/test_v4_in_v6.c
================================================
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>

static void v4_to_v6(const struct in_addr *v4, struct in6_addr *v6) {
	memset(v6, 0, sizeof(*v6));
	v6->s6_addr[10]=0xff;
	v6->s6_addr[11]=0xff;
	memcpy(&v6->s6_addr[12], &v4->s_addr, 4);
}

int main(void) {
	struct addrinfo *result;
	struct addrinfo *res;
	const struct addrinfo hints = { .ai_family = AF_INET };
	int error, sock;

	/* resolve the domain name into a list of addresses */
	error = getaddrinfo("www.example.com", NULL, &hints, &result);
	if (error != 0)	{
		fprintf(stderr, "error in getaddrinfo: %s\n", gai_strerror(error));
		return EXIT_FAILURE;
	}
	if((sock=socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) {
		perror("socket");
		return EXIT_FAILURE;
	}
	struct sockaddr_in6 a = { .sin6_family = AF_INET6,
	                          .sin6_port = htons(80) };
	v4_to_v6(&((struct sockaddr_in *)result->ai_addr)->sin_addr, &a.sin6_addr);
	freeaddrinfo(result);

	if((error = connect(sock, (struct sockaddr *)&a, sizeof(a))) == -1) {
		perror("connect");
		return EXIT_FAILURE;
	}

	return EXIT_SUCCESS;
}


================================================
FILE: tools/install.sh
================================================
#!/bin/sh
#
# This is an actually-safe install command which installs the new
# file atomically in the new location, rather than overwriting
# existing files.
#

usage() {
printf "usage: %s [-D] [-l] [-m mode] src dest\n" "$0" 1>&2
exit 1
}

mkdirp=
symlink=
mode=755

while getopts Dlm: name ; do
case "$name" in
D) mkdirp=yes ;;
l) symlink=yes ;;
m) mode=$OPTARG ;;
?) usage ;;
esac
done
shift $(($OPTIND - 1))

test "$#" -eq 2 || usage
src=$1
dst=$2
tmp="$dst.tmp.$$"

case "$dst" in
*/) printf "%s: %s ends in /\n", "$0" "$dst" 1>&2 ; exit 1 ;;
esac

set -C
set -e

if test "$mkdirp" ; then
umask 022
case "$2" in
*/*) mkdir -p "${dst%/*}" ;;
esac
fi

trap 'rm -f "$tmp"' EXIT INT QUIT TERM HUP

umask 077

if test "$symlink" ; then
ln -s "$1" "$tmp"
else
cat < "$1" > "$tmp"
chmod "$mode" "$tmp"
fi

mv -f "$tmp" "$2"
test -d "$2" && {
rm -f "$2/$tmp"
printf "%s: %s is a directory\n" "$0" "$dst" 1>&2
exit 1
}

exit 0


================================================
FILE: tools/version.sh
================================================
#!/bin/sh

if test -d .git ; then
if type git >/dev/null 2>&1 ; then
git describe --tags --match 'v[0-9]*' 2>/dev/null \
| sed -e 's/^v//' -e 's/-/-git-/'
else
sed 's/$/-git/' < VERSION
fi
else
cat VERSION
fi
Download .txt
gitextract_lvzudl7q/

├── .gitignore
├── AUTHORS
├── COPYING
├── Makefile
├── README
├── TODO
├── VERSION
├── completions/
│   └── zsh/
│       └── _proxychains4
├── configure
├── src/
│   ├── allocator_thread.c
│   ├── allocator_thread.h
│   ├── common.c
│   ├── common.h
│   ├── core.c
│   ├── core.h
│   ├── daemon/
│   │   ├── daemon.c
│   │   ├── hsearch.c
│   │   ├── hsearch.h
│   │   ├── sblist.c
│   │   ├── sblist.h
│   │   ├── sblist_delete.c
│   │   ├── udpclient.c
│   │   ├── udpserver.c
│   │   └── udpserver.h
│   ├── debug.c
│   ├── debug.h
│   ├── hash.c
│   ├── hash.h
│   ├── hostsreader.c
│   ├── ip_type.h
│   ├── libproxychains.c
│   ├── main.c
│   ├── mutex.h
│   ├── proxychains.conf
│   ├── proxyresolv
│   ├── rdns.c
│   ├── rdns.h
│   ├── remotedns.h
│   └── version.c
├── tests/
│   ├── test_getaddrinfo.c
│   ├── test_gethostbyname.c
│   ├── test_gethostent.c
│   ├── test_gethostent_r.c
│   ├── test_getnameinfo.c
│   ├── test_proxy_gethostbyname.c
│   ├── test_sendto.c
│   ├── test_shm.c
│   └── test_v4_in_v6.c
└── tools/
    ├── install.sh
    └── version.sh
Download .txt
SYMBOL INDEX (209 symbols across 31 files)

FILE: src/allocator_thread.c
  type string_hash_tuple (line 27) | typedef struct {
  type internal_ip_lookup_table (line 32) | typedef struct {
  function index_from_internal_ip (line 47) | uint32_t index_from_internal_ip(ip_type4 internalip) {
  function ip_type4 (line 66) | ip_type4 make_internal_ip(uint32_t index) {
  function ip_type4 (line 78) | static ip_type4 ip_from_internal_list(char* name, size_t len) {
  type at_direction (line 142) | enum at_direction {
  function wait_data (line 152) | static int wait_data(int readfd) {
  function trywrite (line 173) | static int trywrite(int fd, void* buf, size_t bytes) {
  function sendmessage (line 191) | static int sendmessage(enum at_direction dir, struct at_msg *msg) {
  function tryread (line 199) | static int tryread(int fd, void* buf, size_t bytes) {
  function readmsg (line 216) | static int readmsg(int fd, struct at_msg *msg) {
  function getmessage (line 222) | static int getmessage(enum at_direction dir, struct at_msg *msg) {
  type at_msg (line 236) | struct at_msg
  function ip_type4 (line 269) | ip_type4 at_get_ip_for_host(char* host, size_t len) {
  function at_get_host_for_ip (line 286) | size_t at_get_host_for_ip(ip_type4 ip, char* readbuf) {
  function initpipe (line 303) | static void initpipe(int* fds) {
  function at_init (line 332) | void at_init(void) {
  function at_close (line 350) | void at_close(void) {

FILE: src/common.c
  function pc_isnumericipv4 (line 27) | int pc_isnumericipv4(const char* ipstring) {
  function pc_stringfromipv4 (line 54) | void pc_stringfromipv4(unsigned char *ip_buf_4_bytes, char *outbuf_16_by...
  function check_path (line 77) | static int check_path(char *path) {

FILE: src/core.c
  function poll_retry (line 49) | static int poll_retry(struct pollfd *fds, nfds_t nfsd, int timeout) {
  function encode_base_64 (line 73) | static void encode_base_64(char *src, char *dest, int max_len) {
  function proxychains_write_log (line 109) | void proxychains_write_log(char *str, ...) {
  function write_n_bytes (line 121) | static int write_n_bytes(int fd, char *buff, size_t size) {
  function read_n_bytes (line 134) | static int read_n_bytes(int fd, char *buff, size_t size) {
  function timed_connect (line 150) | static int timed_connect(int sock, const struct sockaddr *addr, socklen_...
  function tunnel_to (line 192) | static int tunnel_to(int sock, ip_type ip, unsigned short port, proxy_ty...
  function start_chain (line 432) | static int start_chain(int *fd, proxy_data * pd, char *begin_mark) {
  function proxy_data (line 472) | static proxy_data *select_proxy(select_type how, proxy_data * pd, unsign...
  function release_all (line 499) | static void release_all(proxy_data * pd, unsigned int proxy_count) {
  function release_busy (line 506) | static void release_busy(proxy_data * pd, unsigned int proxy_count) {
  function calc_alive (line 514) | static unsigned int calc_alive(proxy_data * pd, unsigned int proxy_count) {
  function chain_step (line 525) | static int chain_step(int *ns, proxy_data * pfrom, proxy_data * pto) {
  function connect_proxy_chain (line 571) | int connect_proxy_chain(int sock, ip_type target_ip,
  function core_initialize (line 743) | void core_initialize(void) {
  function core_unload (line 747) | void core_unload(void) {
  function gethostbyname_data_setstring (line 751) | static void gethostbyname_data_setstring(struct gethostbyname_data* data...
  type hostent (line 757) | struct hostent
  type hostent (line 759) | struct hostent
  type hostent (line 770) | struct hostent
  type in_addr (line 838) | struct in_addr
  type in_addr (line 845) | struct in_addr
  type hostent (line 853) | struct hostent
  type gethostbyname_data (line 853) | struct gethostbyname_data
  type addrinfo_data (line 901) | struct addrinfo_data {
  function proxy_freeaddrinfo (line 907) | void proxy_freeaddrinfo(struct addrinfo *res) {
  function mygetservbyname_r (line 912) | static int mygetservbyname_r(const char* name, const char* proto, struct...
  function looks_like_numeric_ipv6 (line 936) | static int looks_like_numeric_ipv6(const char *node)
  function my_inet_aton (line 952) | static int my_inet_aton(const char *node, struct addrinfo_data* space)
  function proxy_getaddrinfo (line 963) | int proxy_getaddrinfo(const char *node, const char *service, const struc...

FILE: src/core.h
  type ERR_CODE (line 32) | typedef enum {
  type proxy_type (line 41) | typedef enum {
  type chain_type (line 48) | typedef enum {
  type proxy_state (line 55) | typedef enum {
  type select_type (line 62) | typedef enum {
  type localaddr_arg (line 67) | typedef struct {
  type dnat_arg (line 82) | typedef struct {
  type proxy_data (line 87) | typedef struct {
  type sockaddr (line 104) | struct sockaddr
  type hostent (line 105) | struct hostent
  type addrinfo (line 106) | struct addrinfo
  type hostent (line 107) | struct hostent
  type addrinfo (line 109) | struct addrinfo
  type addrinfo (line 110) | struct addrinfo
  type sockaddr (line 112) | struct sockaddr
  type sockaddr (line 116) | struct sockaddr
  type gethostbyname_data (line 127) | struct gethostbyname_data {
  type hostent (line 134) | struct hostent
  type gethostbyname_data (line 134) | struct gethostbyname_data
  type hostent (line 135) | struct hostent
  type addrinfo (line 138) | struct addrinfo
  type addrinfo (line 138) | struct addrinfo
  type addrinfo (line 139) | struct addrinfo

FILE: src/daemon/daemon.c
  type htab (line 31) | struct htab
  type server (line 34) | struct server
  function dolog (line 45) | static void dolog(const char* fmt, ...) { }
  function usage (line 84) | static int usage(char *a0) {
  function index_from_ip (line 95) | unsigned index_from_ip(ip_type4 internalip) {
  function ip_type4 (line 113) | ip_type4 get_ip_from_index(unsigned index) {
  function ip_type4 (line 125) | ip_type4 get_ip(char* hn) {
  function main (line 142) | int main(int argc, char** argv) {

FILE: src/daemon/hsearch.c
  type htab_entry (line 37) | typedef struct htab_entry {
  type elem (line 42) | struct elem {
  type htab (line 47) | struct htab {
  function keyhash (line 56) | static size_t keyhash(char *k)
  function resize (line 66) | static int resize(struct htab *htab, size_t nel)
  type elem (line 98) | struct elem
  type htab (line 98) | struct htab
  type elem (line 101) | struct elem
  type htab (line 112) | struct htab
  type htab (line 114) | struct htab
  function htab_destroy (line 122) | void htab_destroy(struct htab *htab)
  function htab_entry (line 128) | static htab_entry *htab_find_item(struct htab *htab, char* key)
  function htab_value (line 139) | htab_value* htab_find(struct htab *htab, char* key)
  function htab_delete (line 146) | int htab_delete(struct htab *htab, char* key)
  function htab_insert (line 154) | int htab_insert(struct htab *htab, char* key, htab_value value)
  function htab_next (line 176) | size_t htab_next(struct htab *htab, size_t iterator, char** key, htab_va...

FILE: src/daemon/hsearch.h
  type htab_value (line 6) | typedef union htab_value {
  type htab (line 14) | struct htab
  type htab (line 15) | struct htab
  type htab (line 16) | struct htab
  type htab (line 17) | struct htab
  type htab (line 18) | struct htab
  type htab (line 19) | struct htab

FILE: src/daemon/sblist.c
  function sblist (line 9) | sblist* sblist_new(size_t itemsize, size_t blockitems) {
  function sblist_clear (line 15) | static void sblist_clear(sblist* l) {
  function sblist_init (line 21) | void sblist_init(sblist* l, size_t itemsize, size_t blockitems) {
  function sblist_free_items (line 29) | void sblist_free_items(sblist* l) {
  function sblist_free (line 36) | void sblist_free(sblist* l) {
  function sblist_set (line 52) | int sblist_set(sblist* l, void* item, size_t pos) {
  function sblist_grow_if_needed (line 58) | int sblist_grow_if_needed(sblist* l) {
  function sblist_add (line 69) | int sblist_add(sblist* l, void* item) {

FILE: src/daemon/sblist.h
  type sblist (line 26) | typedef struct {

FILE: src/daemon/sblist_delete.c
  function sblist_delete (line 4) | void sblist_delete(sblist* l, size_t item) {

FILE: src/daemon/udpclient.c
  function main (line 11) | int main() {

FILE: src/daemon/udpserver.c
  function resolve (line 6) | int resolve(const char *host, unsigned short port, struct addrinfo** add...
  function resolve_sa (line 17) | int resolve_sa(const char *host, unsigned short port, union sockaddr_uni...
  function bindtoip (line 27) | int bindtoip(int fd, union sockaddr_union *bindaddr) {
  function server_waitclient (line 34) | int server_waitclient(struct server *server, struct client* client, void...
  function server_setup (line 44) | int server_setup(struct server *server, const char* listenip, unsigned s...

FILE: src/daemon/udpserver.h
  type sockaddr_in (line 14) | struct sockaddr_in
  type sockaddr_in6 (line 15) | struct sockaddr_in6
  type client (line 32) | struct client {
  type server (line 36) | struct server {
  type addrinfo (line 40) | struct addrinfo
  type server (line 44) | struct server
  type client (line 44) | struct client
  type server (line 45) | struct server

FILE: src/debug.c
  function dump_proxy_chain (line 8) | void dump_proxy_chain(proxy_data *pchain, unsigned int count) {
  type __appease_iso_compilers__ (line 29) | typedef int __appease_iso_compilers__;

FILE: src/hash.c
  function dalias_hash (line 4) | uint32_t dalias_hash(char *s0) {

FILE: src/hostsreader.c
  type hostsreader (line 14) | struct hostsreader {
  function hostsreader_open (line 19) | int hostsreader_open(struct hostsreader *ctx) {
  function hostsreader_close (line 24) | void hostsreader_close(struct hostsreader *ctx) {
  function hostsreader_get (line 28) | int hostsreader_get(struct hostsreader *ctx, char* buf, size_t bufsize) {
  type hostsreader (line 59) | struct hostsreader
  function ip_type4 (line 76) | ip_type4 hostsreader_get_numeric_ip_for_name(const char* name) {
  function main (line 90) | int main(int a, char**b) {

FILE: src/ip_type.h
  type ip_type4 (line 6) | typedef union {
  type ip_type (line 11) | typedef struct {

FILE: src/libproxychains.c
  type sockaddr (line 54) | struct sockaddr
  type dns_lookup_flavor (line 77) | enum dns_lookup_flavor
  type close_range_args_t (line 114) | typedef struct {
  function get_rand_seed (line 125) | static unsigned get_rand_seed(void) {
  function do_init (line 135) | static void do_init(void) {
  function init_lib_wrapper (line 163) | static void init_lib_wrapper(const char* caller) {
  function gcc_init (line 177) | __attribute__((constructor))
  type rs_proxyType (line 187) | typedef enum {
  function proxy_from_string (line 208) | static int proxy_from_string(const char *proxystring,
  function get_chain_data (line 289) | static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, c...
  function is_v4inv6 (line 602) | static int is_v4inv6(const struct in6_addr *a) {
  function intsort (line 606) | static void intsort(int *a, int n) {
  type in_addr (line 678) | struct in_addr
  type in6_addr (line 679) | struct in6_addr
  type sockaddr_in (line 692) | struct sockaddr_in
  type sockaddr_in6 (line 693) | struct sockaddr_in6
  type sockaddr_in (line 694) | struct sockaddr_in
  type sockaddr_in6 (line 695) | struct sockaddr_in6
  type in_addr (line 696) | struct in_addr
  type gethostbyname_data (line 775) | struct gethostbyname_data
  type hostent (line 776) | struct hostent
  type sockaddr_in6 (line 823) | struct sockaddr_in6
  type sockaddr_in (line 823) | struct sockaddr_in
  type sockaddr_in6 (line 827) | struct sockaddr_in6
  type sockaddr_in (line 828) | struct sockaddr_in
  type sockaddr_in6 (line 831) | struct sockaddr_in6
  type sockaddr_in6 (line 832) | struct sockaddr_in6
  type sockaddr_in6 (line 836) | struct sockaddr_in6
  type hostent (line 854) | struct hostent
  type hostent (line 862) | struct hostent
  function setup_hooks (line 914) | static void setup_hooks(void) {

FILE: src/main.c
  function usage (line 26) | static int usage(char **argv) {
  function set_own_dir (line 50) | static void set_own_dir(const char *argv0) {
  function main (line 68) | int main(int argc, char *argv[]) {

FILE: src/rdns.c
  type sockaddr_in (line 16) | struct sockaddr_in
  function rdns_daemon_get_host_for_ip (line 18) | size_t rdns_daemon_get_host_for_ip(ip_type4 ip, char* readbuf) {
  function ip_type4 (line 34) | static ip_type4 rdns_daemon_get_ip_for_host(char* host, size_t len) {
  type dns_lookup_flavor (line 49) | enum dns_lookup_flavor
  function rdns_init (line 59) | void rdns_init(enum dns_lookup_flavor flavor) {
  function rdns_set_daemon (line 72) | void rdns_set_daemon(struct sockaddr_in* addr) {
  function rdns_get_flavor (line 77) | enum dns_lookup_flavor rdns_get_flavor(void) {
  function rdns_get_host_for_ip (line 82) | size_t rdns_get_host_for_ip(ip_type4 ip, char* readbuf) {
  function ip_type4 (line 91) | ip_type4 rdns_get_ip_for_host(char* host, size_t len) {

FILE: src/rdns.h
  type dns_lookup_flavor (line 9) | enum dns_lookup_flavor {
  type dns_lookup_flavor (line 18) | enum dns_lookup_flavor
  type sockaddr_in (line 19) | struct sockaddr_in
  type dns_lookup_flavor (line 20) | enum dns_lookup_flavor
  type dns_lookup_flavor (line 26) | enum dns_lookup_flavor

FILE: src/remotedns.h
  type at_msgtype (line 9) | enum at_msgtype {
  type at_msghdr (line 16) | struct at_msghdr {
  type at_msg (line 22) | struct at_msg {

FILE: tests/test_getaddrinfo.c
  function doit (line 13) | static int doit(const char* host, const char* service) {
  function canonicalize_address (line 49) | int canonicalize_address(struct sockaddr_storage *ss, struct sockaddr_st...
  function main (line 71) | int main(void) {

FILE: tests/test_gethostbyname.c
  function printhostent (line 5) | void printhostent(struct hostent *hp) {
  function main (line 17) | int main(int argc, char**argv) {

FILE: tests/test_gethostent.c
  function printhostent (line 5) | void printhostent(struct hostent *hp) {
  function main (line 18) | int main(int argc, char** argv) {

FILE: tests/test_gethostent_r.c
  function printhostent (line 26) | void printhostent(struct hostent *hp) {
  function main (line 39) | int main(int argc, char** argv) {

FILE: tests/test_getnameinfo.c
  function main (line 17) | int main() {

FILE: tests/test_proxy_gethostbyname.c
  function printhostent (line 5) | void printhostent(struct hostent *hp) {
  function main (line 17) | int main(int argc, char**argv) {

FILE: tests/test_sendto.c
  function error (line 14) | void error(const char *msg)
  function main (line 20) | int main(int argc, char *argv[])

FILE: tests/test_shm.c
  function main (line 7) | int main() {

FILE: tests/test_v4_in_v6.c
  function v4_to_v6 (line 8) | static void v4_to_v6(const struct in_addr *v4, struct in6_addr *v6) {
  function main (line 15) | int main(void) {
Condensed preview — 50 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (181K chars).
[
  {
    "path": ".gitignore",
    "chars": 154,
    "preview": "proxychains4\nproxychains4-daemon\n*.bz2\n*.xz\n*.o\n*.so\n*.la\n*.lo\n.deps/\n.libs/\n*.rcb\n*.out\n*~\n*.patch\nversion.h\n\n# Autocon"
  },
  {
    "path": "AUTHORS",
    "chars": 703,
    "preview": "original code up to version 3.1\nN3E7CR34TUR3.\nhttp://proxychains.sourceforge.net\nnetcreature@users.sourceforge.net\n\nmain"
  },
  {
    "path": "COPYING",
    "chars": 15127,
    "preview": "\t\t    GNU GENERAL PUBLIC LICENSE\n\t\t       Version 2, June 1991\n\n Copyright (C) 1989, 1991 Free Software Foundation, Inc."
  },
  {
    "path": "Makefile",
    "chars": 2783,
    "preview": "#\n# Makefile for proxychains (requires GNU make), stolen from musl\n#\n# Use config.mak to override any of the following v"
  },
  {
    "path": "README",
    "chars": 9682,
    "preview": "ProxyChains-NG ver 4.17 README\n=============================\n\n  ProxyChains is a UNIX program, that hooks network-relate"
  },
  {
    "path": "TODO",
    "chars": 109,
    "preview": "ProxyChains ver 4.0 TODO\n===================\n\n\t\n   hooks for reentrant dns functions, i.e. gethostbyaddr_r\n\n\n"
  },
  {
    "path": "VERSION",
    "chars": 5,
    "preview": "4.17\n"
  },
  {
    "path": "completions/zsh/_proxychains4",
    "chars": 272,
    "preview": "#compdef proxychains4\n\n_arguments \\\n  '(- : *)--help[More help in README file]' \\\n  '-q[makes proxychains quiet - this o"
  },
  {
    "path": "configure",
    "chars": 10913,
    "preview": "#!/bin/sh\n\nprefix=/usr/local\nOUR_CPPFLAGS=\n\n# Get a temporary filename\nfail() { printf \"%s\\n\" \"$1\" >&2 ; exit 1 ; }\ni=0\n"
  },
  {
    "path": "src/allocator_thread.c",
    "chars": 8634,
    "preview": "#undef _GNU_SOURCE\n#define _GNU_SOURCE\n#undef _POSIX_C_SOURCE\n#define _DARWIN_C_SOURCE\n#include <limits.h>\n#include <pth"
  },
  {
    "path": "src/allocator_thread.h",
    "chars": 341,
    "preview": "#ifndef ALLOCATOR_THREAD_H\n#define ALLOCATOR_THREAD_H\n\n#include <unistd.h>\n#include \"ip_type.h\"\n\nextern int req_pipefd[2"
  },
  {
    "path": "src/common.c",
    "chars": 2715,
    "preview": "#include \"common.h\"\n#include <stdlib.h>\n#include <unistd.h>\n#include <stdio.h>\n\nconst char *proxy_type_strmap[] = {\n    "
  },
  {
    "path": "src/common.h",
    "chars": 665,
    "preview": "#ifndef COMMON_H\n#define COMMON_H\n\n#define PROXYCHAINS_CONF_FILE_ENV_VAR \"PROXYCHAINS_CONF_FILE\"\n#define PROXYCHAINS_QUI"
  },
  {
    "path": "src/core.c",
    "chars": 27401,
    "preview": "/***************************************************************************\n                          core.c  -  descri"
  },
  {
    "path": "src/core.h",
    "chars": 4161,
    "preview": "/***************************************************************************\n                          core.h  -  descri"
  },
  {
    "path": "src/daemon/daemon.c",
    "chars": 5865,
    "preview": "/*\n   proxychains-ng DNS daemon\n\n   Copyright (C) 2020 rofl0r.\n\n*/\n\n#undef _GNU_SOURCE\n#define _GNU_SOURCE\n#include <uni"
  },
  {
    "path": "src/daemon/hsearch.c",
    "chars": 4118,
    "preview": "/*\nmusl license, hsearch.c originally written by Szabolcs Nagy\n\nCopyright © 2005-2020 Rich Felker, et al.\n\nPermission is"
  },
  {
    "path": "src/daemon/hsearch.h",
    "chars": 502,
    "preview": "#ifndef HSEARCH_H\n#define HSEARCH_H\n\n#include <stdlib.h>\n\ntypedef union htab_value {\n\tvoid *p;\n\tsize_t n;\n} htab_value;\n"
  },
  {
    "path": "src/daemon/sblist.c",
    "chars": 1545,
    "preview": "#undef _POSIX_C_SOURCE\n#define _POSIX_C_SOURCE 200809L\n#include \"sblist.h\"\n#include <limits.h>\n#include <stdlib.h>\n#incl"
  },
  {
    "path": "src/daemon/sblist.h",
    "chars": 2952,
    "preview": "#ifndef SBLIST_H\n#define SBLIST_H\n\n/* this file is part of libulz, as of commit 8ab361a27743aaf025323ee43b8b8876dc054fdd"
  },
  {
    "path": "src/daemon/sblist_delete.c",
    "chars": 270,
    "preview": "#include \"sblist.h\"\n#include <string.h>\n\nvoid sblist_delete(sblist* l, size_t item) {\n\tif (l->count && item < l->count) "
  },
  {
    "path": "src/daemon/udpclient.c",
    "chars": 1045,
    "preview": "#include <stdio.h>\n#include <string.h>\n#include <ctype.h>\n#include <sys/types.h>\n#include <sys/socket.h>\n#include <netin"
  },
  {
    "path": "src/daemon/udpserver.c",
    "chars": 1759,
    "preview": "#include \"udpserver.h\"\n#include <stdio.h>\n#include <string.h>\n#include <unistd.h>\n\nint resolve(const char *host, unsigne"
  },
  {
    "path": "src/daemon/udpserver.h",
    "chars": 1355,
    "preview": "#ifndef SERVER_H\n#define SERVER_H\n\n#undef _POSIX_C_SOURCE\n#define _POSIX_C_SOURCE 200809L\n\n#include <sys/socket.h>\n#incl"
  },
  {
    "path": "src/debug.c",
    "chars": 841,
    "preview": "\n#ifdef DEBUG\n# include \"core.h\"\n# include \"common.h\"\n# include \"debug.h\"\n#include <arpa/inet.h>\n\nvoid dump_proxy_chain("
  },
  {
    "path": "src/debug.h",
    "chars": 602,
    "preview": "#ifndef DEBUG_H\n#define DEBUG_H\n\n# include <stdio.h>\n\n#ifdef DEBUG\n# define PSTDERR(fmt, args...) do { dprintf(2,fmt, ##"
  },
  {
    "path": "src/hash.c",
    "chars": 230,
    "preview": "#include \"hash.h\"\n\n/* dalias' version of the elf hash */\nuint32_t dalias_hash(char *s0) {\n\tunsigned char *s = (void *) s"
  },
  {
    "path": "src/hash.h",
    "chars": 113,
    "preview": "#ifndef HASH_H\n#define HASH_H\n\n#include <stdint.h>\n\nuint32_t dalias_hash(char *s0);\n\n//RcB: DEP \"hash.c\"\n\n#endif\n"
  },
  {
    "path": "src/hostsreader.c",
    "chars": 2072,
    "preview": "#include <stdio.h>\n#include <ctype.h>\n#include <string.h>\n#include \"common.h\"\n\n/*\n   simple reader for /etc/hosts\n   it "
  },
  {
    "path": "src/ip_type.h",
    "chars": 434,
    "preview": "#ifndef IP_TYPE_H\n#define IP_TYPE_H\n\n#include <stdint.h>\n\ntypedef union {\n\tunsigned char octet[4];\n\tuint32_t as_int;\n} i"
  },
  {
    "path": "src/libproxychains.c",
    "chars": 29235,
    "preview": "/***************************************************************************\n                          libproxychains.c "
  },
  {
    "path": "src/main.c",
    "chars": 4145,
    "preview": "/*   (C) 2011, 2012 rofl0r\n *                                                                         *\n *   This progra"
  },
  {
    "path": "src/mutex.h",
    "chars": 258,
    "preview": "#ifndef MUTEX_H\n#define MUTEX_H\n\n#include <pthread.h>\n# define MUTEX_LOCK(x) pthread_mutex_lock(x)\n# define MUTEX_UNLOCK"
  },
  {
    "path": "src/proxychains.conf",
    "chars": 5847,
    "preview": "# proxychains.conf  VER 4.x\n#\n#        HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS.\n\n\n# The option below identifi"
  },
  {
    "path": "src/proxyresolv",
    "chars": 599,
    "preview": "#!/bin/sh\n# This is a legacy script that uses \"dig\" or \"drill\" to do DNS lookups via TCP.\n\n# DNS server used to resolve "
  },
  {
    "path": "src/rdns.c",
    "chars": 2476,
    "preview": "#include <sys/socket.h>\n#include <stdlib.h>\n#include <string.h>\n\n#include \"rdns.h\"\n#include \"allocator_thread.h\"\n#includ"
  },
  {
    "path": "src/rdns.h",
    "chars": 690,
    "preview": "#ifndef RDNS_H\n#define RDNS_H\n\n#include <unistd.h>\n#include <netinet/in.h>\n#include \"ip_type.h\"\n#include \"remotedns.h\"\n\n"
  },
  {
    "path": "src/remotedns.h",
    "chars": 384,
    "preview": "#ifndef REMOTEDNS_H\n#define REMOTEDNS_H\n\n#include <unistd.h>\n#include \"ip_type.h\"\n\n#define MSG_LEN_MAX 256\n\nenum at_msgt"
  },
  {
    "path": "src/version.c",
    "chars": 124,
    "preview": "#include \"version.h\"\nstatic const char version[] = VERSION;\nconst char *proxychains_get_version(void) {\n\treturn version;"
  },
  {
    "path": "tests/test_getaddrinfo.c",
    "chars": 2505,
    "preview": "#include <stdio.h>\n#include <stdlib.h>\n#include <netdb.h>\n#include <netinet/in.h>\n#include <sys/socket.h>\n#include <asse"
  },
  {
    "path": "tests/test_gethostbyname.c",
    "chars": 500,
    "preview": "#include <stdio.h>\n#include <netdb.h>\n#include \"../src/common.c\"\n\nvoid printhostent(struct hostent *hp) {\n\tchar ipbuf[16"
  },
  {
    "path": "tests/test_gethostent.c",
    "chars": 470,
    "preview": "#include <netdb.h>\n#include <stdio.h>\n#include \"../src/common.c\"\n\nvoid printhostent(struct hostent *hp) {\n\tchar ipbuf[16"
  },
  {
    "path": "tests/test_gethostent_r.c",
    "chars": 1711,
    "preview": "#include <netdb.h>\n#include <stdio.h>\n#include <errno.h>\n#include \"../src/common.h\"\n\n/*\nint gethostent_r( \n        struc"
  },
  {
    "path": "tests/test_getnameinfo.c",
    "chars": 3946,
    "preview": "#include <netdb.h>\n#include <stdio.h>\n#include <string.h>\n#include <assert.h>\n#include <sys/socket.h>\n#include <netinet/"
  },
  {
    "path": "tests/test_proxy_gethostbyname.c",
    "chars": 551,
    "preview": "#include \"../src/core.h\"\n#include \"../src/common.h\"\n#include <stdio.h>\n\nvoid printhostent(struct hostent *hp) {\n\tchar ip"
  },
  {
    "path": "tests/test_sendto.c",
    "chars": 1720,
    "preview": "#include <stdio.h>\n#include <stdlib.h>\n#include <unistd.h>\n#include <string.h>\n#include <sys/types.h>\n#include <sys/sock"
  },
  {
    "path": "tests/test_shm.c",
    "chars": 732,
    "preview": "#include \"../src/shm.h\"\n#include <assert.h>\n\n#define s(A) (sizeof(A) - 1)\n#define ss(A) (A), s(A)\n\nint main() {\n\tchar bu"
  },
  {
    "path": "tests/test_v4_in_v6.c",
    "chars": 1152,
    "preview": "#include <stdio.h>\n#include <string.h>\n#include <stdlib.h>\n#include <netdb.h>\n#include <netinet/in.h>\n#include <sys/sock"
  },
  {
    "path": "tools/install.sh",
    "chars": 924,
    "preview": "#!/bin/sh\n#\n# This is an actually-safe install command which installs the new\n# file atomically in the new location, rat"
  },
  {
    "path": "tools/version.sh",
    "chars": 209,
    "preview": "#!/bin/sh\n\nif test -d .git ; then\nif type git >/dev/null 2>&1 ; then\ngit describe --tags --match 'v[0-9]*' 2>/dev/null \\"
  }
]

About this extraction

This page contains the full source code of the rofl0r/proxychains-ng GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 50 files (161.7 KB), approximately 50.6k tokens, and a symbol index with 209 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!