2002-10-31 22:49:52 +03:00
|
|
|
/*
|
|
|
|
* Unix networking abstraction.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/tcp.h>
|
|
|
|
#include <netdb.h>
|
2004-05-31 18:01:52 +04:00
|
|
|
#include <sys/un.h>
|
2015-05-18 15:57:45 +03:00
|
|
|
#include <pwd.h>
|
|
|
|
#include <grp.h>
|
2002-10-31 22:49:52 +03:00
|
|
|
|
|
|
|
#define DEFINE_PLUG_METHOD_MACROS
|
|
|
|
#include "putty.h"
|
|
|
|
#include "network.h"
|
|
|
|
#include "tree234.h"
|
|
|
|
|
2005-04-25 22:51:15 +04:00
|
|
|
/* Solaris needs <sys/sockio.h> for SIOCATMARK. */
|
2005-05-06 02:47:30 +04:00
|
|
|
#ifndef SIOCATMARK
|
2005-04-25 22:51:15 +04:00
|
|
|
#include <sys/sockio.h>
|
|
|
|
#endif
|
|
|
|
|
2004-05-31 18:01:52 +04:00
|
|
|
#ifndef X11_UNIX_PATH
|
|
|
|
# define X11_UNIX_PATH "/tmp/.X11-unix/X"
|
|
|
|
#endif
|
|
|
|
|
2009-08-07 02:12:05 +04:00
|
|
|
/*
|
|
|
|
* Access to sockaddr types without breaking C strict aliasing rules.
|
|
|
|
*/
|
|
|
|
union sockaddr_union {
|
|
|
|
struct sockaddr_storage storage;
|
|
|
|
struct sockaddr sa;
|
|
|
|
struct sockaddr_in sin;
|
2016-01-29 00:22:07 +03:00
|
|
|
#ifndef NO_IPV6
|
|
|
|
struct sockaddr_in6 sin6;
|
|
|
|
#endif
|
2009-08-07 02:55:15 +04:00
|
|
|
struct sockaddr_un su;
|
2009-08-07 02:12:05 +04:00
|
|
|
};
|
|
|
|
|
2008-08-21 02:21:04 +04:00
|
|
|
/*
|
|
|
|
* We used to typedef struct Socket_tag *Socket.
|
|
|
|
*
|
|
|
|
* Since we have made the networking abstraction slightly more
|
|
|
|
* abstract, Socket no longer means a tcp socket (it could mean
|
|
|
|
* an ssl socket). So now we must use Actual_Socket when we know
|
|
|
|
* we are talking about a tcp socket.
|
|
|
|
*/
|
|
|
|
typedef struct Socket_tag *Actual_Socket;
|
|
|
|
|
2008-11-08 19:45:45 +03:00
|
|
|
/*
|
|
|
|
* Mutable state that goes with a SockAddr: stores information
|
|
|
|
* about where in the list of candidate IP(v*) addresses we've
|
|
|
|
* currently got to.
|
|
|
|
*/
|
|
|
|
typedef struct SockAddrStep_tag SockAddrStep;
|
|
|
|
struct SockAddrStep_tag {
|
|
|
|
#ifndef NO_IPV6
|
|
|
|
struct addrinfo *ai; /* steps along addr->ais */
|
|
|
|
#endif
|
|
|
|
int curraddr;
|
|
|
|
};
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
struct Socket_tag {
|
|
|
|
struct socket_function_table *fn;
|
|
|
|
/* the above variable absolutely *must* be the first in this structure */
|
2003-05-04 18:18:18 +04:00
|
|
|
const char *error;
|
2002-10-31 22:49:52 +03:00
|
|
|
int s;
|
|
|
|
Plug plug;
|
|
|
|
bufchain output_data;
|
2005-02-16 14:44:44 +03:00
|
|
|
int connected; /* irrelevant for listening sockets */
|
2002-10-31 22:49:52 +03:00
|
|
|
int writable;
|
|
|
|
int frozen; /* this causes readability notifications to be ignored */
|
|
|
|
int localhost_only; /* for listening sockets */
|
|
|
|
char oobdata[1];
|
|
|
|
int sending_oob;
|
|
|
|
int oobpending; /* is there OOB data available to read? */
|
|
|
|
int oobinline;
|
2011-09-13 15:44:03 +04:00
|
|
|
enum { EOF_NO, EOF_PENDING, EOF_SENT } outgoingeof;
|
|
|
|
int incomingeof;
|
2002-10-31 22:49:52 +03:00
|
|
|
int pending_error; /* in case send() returns error */
|
|
|
|
int listener;
|
2005-01-16 17:29:34 +03:00
|
|
|
int nodelay, keepalive; /* for connect()-type sockets */
|
|
|
|
int privport, port; /* and again */
|
|
|
|
SockAddr addr;
|
2008-11-08 19:45:45 +03:00
|
|
|
SockAddrStep step;
|
2008-08-21 02:21:04 +04:00
|
|
|
/*
|
|
|
|
* We sometimes need pairs of Socket structures to be linked:
|
|
|
|
* if we are listening on the same IPv6 and v4 port, for
|
|
|
|
* example. So here we define `parent' and `child' pointers to
|
|
|
|
* track this link.
|
|
|
|
*/
|
|
|
|
Actual_Socket parent, child;
|
2002-10-31 22:49:52 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
struct SockAddr_tag {
|
2008-11-08 19:58:55 +03:00
|
|
|
int refcount;
|
2003-05-04 18:18:18 +04:00
|
|
|
const char *error;
|
2008-11-08 19:45:45 +03:00
|
|
|
enum { UNRESOLVED, UNIX, IP } superfamily;
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2005-01-16 17:29:34 +03:00
|
|
|
struct addrinfo *ais; /* Addresses IPv6 style. */
|
2003-04-17 03:33:44 +04:00
|
|
|
#else
|
2005-01-16 17:29:34 +03:00
|
|
|
unsigned long *addresses; /* Addresses IPv4 style. */
|
2008-11-08 19:45:45 +03:00
|
|
|
int naddresses;
|
2002-10-31 22:49:52 +03:00
|
|
|
#endif
|
2002-12-18 19:23:11 +03:00
|
|
|
char hostname[512]; /* Store an unresolved host name. */
|
2002-10-31 22:49:52 +03:00
|
|
|
};
|
|
|
|
|
2008-11-08 19:45:45 +03:00
|
|
|
/*
|
|
|
|
* Which address family this address belongs to. AF_INET for IPv4;
|
|
|
|
* AF_INET6 for IPv6; AF_UNSPEC indicates that name resolution has
|
|
|
|
* not been done and a simple host name is held in this SockAddr
|
|
|
|
* structure.
|
|
|
|
*/
|
|
|
|
#ifndef NO_IPV6
|
|
|
|
#define SOCKADDR_FAMILY(addr, step) \
|
|
|
|
((addr)->superfamily == UNRESOLVED ? AF_UNSPEC : \
|
|
|
|
(addr)->superfamily == UNIX ? AF_UNIX : \
|
|
|
|
(step).ai ? (step).ai->ai_family : AF_INET)
|
|
|
|
#else
|
2014-02-06 01:51:25 +04:00
|
|
|
/* Here we gratuitously reference 'step' to avoid gcc warnings about
|
|
|
|
* 'set but not used' when compiling -DNO_IPV6 */
|
2008-11-08 19:45:45 +03:00
|
|
|
#define SOCKADDR_FAMILY(addr, step) \
|
|
|
|
((addr)->superfamily == UNRESOLVED ? AF_UNSPEC : \
|
2014-02-06 01:51:25 +04:00
|
|
|
(addr)->superfamily == UNIX ? AF_UNIX : \
|
|
|
|
(step).curraddr ? AF_INET : AF_INET)
|
2008-11-08 19:45:45 +03:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Start a SockAddrStep structure to step through multiple
|
|
|
|
* addresses.
|
|
|
|
*/
|
|
|
|
#ifndef NO_IPV6
|
|
|
|
#define START_STEP(addr, step) \
|
|
|
|
((step).ai = (addr)->ais, (step).curraddr = 0)
|
|
|
|
#else
|
|
|
|
#define START_STEP(addr, step) \
|
|
|
|
((step).curraddr = 0)
|
|
|
|
#endif
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
static tree234 *sktree;
|
|
|
|
|
2003-03-29 19:47:06 +03:00
|
|
|
static void uxsel_tell(Actual_Socket s);
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
static int cmpfortree(void *av, void *bv)
|
|
|
|
{
|
|
|
|
Actual_Socket a = (Actual_Socket) av, b = (Actual_Socket) bv;
|
|
|
|
int as = a->s, bs = b->s;
|
|
|
|
if (as < bs)
|
|
|
|
return -1;
|
|
|
|
if (as > bs)
|
|
|
|
return +1;
|
2007-11-28 23:45:50 +03:00
|
|
|
if (a < b)
|
|
|
|
return -1;
|
|
|
|
if (a > b)
|
|
|
|
return +1;
|
2002-10-31 22:49:52 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cmpforsearch(void *av, void *bv)
|
|
|
|
{
|
|
|
|
Actual_Socket b = (Actual_Socket) bv;
|
2003-05-10 12:35:54 +04:00
|
|
|
int as = *(int *)av, bs = b->s;
|
2002-10-31 22:49:52 +03:00
|
|
|
if (as < bs)
|
|
|
|
return -1;
|
|
|
|
if (as > bs)
|
|
|
|
return +1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void sk_init(void)
|
|
|
|
{
|
|
|
|
sktree = newtree234(cmpfortree);
|
|
|
|
}
|
|
|
|
|
|
|
|
void sk_cleanup(void)
|
|
|
|
{
|
|
|
|
Actual_Socket s;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (sktree) {
|
|
|
|
for (i = 0; (s = index234(sktree, i)) != NULL; i++) {
|
|
|
|
close(s->s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-12-30 19:45:11 +03:00
|
|
|
SockAddr sk_namelookup(const char *host, char **canonicalname, int address_family)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
2003-03-29 19:14:26 +03:00
|
|
|
SockAddr ret = snew(struct SockAddr_tag);
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2003-04-17 03:33:44 +04:00
|
|
|
struct addrinfo hints;
|
|
|
|
int err;
|
|
|
|
#else
|
2002-10-31 22:49:52 +03:00
|
|
|
unsigned long a;
|
|
|
|
struct hostent *h = NULL;
|
2005-01-16 17:29:34 +03:00
|
|
|
int n;
|
2003-04-17 03:33:44 +04:00
|
|
|
#endif
|
2002-10-31 22:49:52 +03:00
|
|
|
char realhost[8192];
|
|
|
|
|
|
|
|
/* Clear the structure and default to IPv4. */
|
|
|
|
memset(ret, 0, sizeof(struct SockAddr_tag));
|
2008-11-08 19:45:45 +03:00
|
|
|
ret->superfamily = UNRESOLVED;
|
2002-10-31 22:49:52 +03:00
|
|
|
*realhost = '\0';
|
|
|
|
ret->error = NULL;
|
2008-11-08 19:58:55 +03:00
|
|
|
ret->refcount = 1;
|
2002-10-31 22:49:52 +03:00
|
|
|
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2003-04-17 03:33:44 +04:00
|
|
|
hints.ai_flags = AI_CANONNAME;
|
2005-01-09 17:55:55 +03:00
|
|
|
hints.ai_family = (address_family == ADDRTYPE_IPV4 ? AF_INET :
|
|
|
|
address_family == ADDRTYPE_IPV6 ? AF_INET6 :
|
|
|
|
AF_UNSPEC);
|
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
2003-04-17 03:33:44 +04:00
|
|
|
hints.ai_protocol = 0;
|
|
|
|
hints.ai_addrlen = 0;
|
|
|
|
hints.ai_addr = NULL;
|
|
|
|
hints.ai_canonname = NULL;
|
|
|
|
hints.ai_next = NULL;
|
2014-01-25 19:58:54 +04:00
|
|
|
{
|
|
|
|
char *trimmed_host = host_strduptrim(host); /* strip [] on literals */
|
|
|
|
err = getaddrinfo(trimmed_host, NULL, &hints, &ret->ais);
|
|
|
|
sfree(trimmed_host);
|
|
|
|
}
|
2003-04-17 03:33:44 +04:00
|
|
|
if (err != 0) {
|
|
|
|
ret->error = gai_strerror(err);
|
|
|
|
return ret;
|
|
|
|
}
|
2008-11-08 19:45:45 +03:00
|
|
|
ret->superfamily = IP;
|
2003-04-17 03:33:44 +04:00
|
|
|
*realhost = '\0';
|
2008-11-08 19:45:45 +03:00
|
|
|
if (ret->ais->ai_canonname != NULL)
|
|
|
|
strncat(realhost, ret->ais->ai_canonname, sizeof(realhost) - 1);
|
2003-04-17 03:33:44 +04:00
|
|
|
else
|
|
|
|
strncat(realhost, host, sizeof(realhost) - 1);
|
|
|
|
#else
|
2005-01-14 22:28:18 +03:00
|
|
|
if ((a = inet_addr(host)) == (unsigned long)(in_addr_t)(-1)) {
|
2003-04-17 03:33:44 +04:00
|
|
|
/*
|
|
|
|
* Otherwise use the IPv4-only gethostbyname... (NOTE:
|
|
|
|
* we don't use gethostbyname as a fallback!)
|
|
|
|
*/
|
2008-11-08 19:45:45 +03:00
|
|
|
if (ret->superfamily == UNRESOLVED) {
|
2005-01-16 17:29:34 +03:00
|
|
|
/*debug(("Resolving \"%s\" with gethostbyname() (IPv4 only)...\n", host)); */
|
|
|
|
if ( (h = gethostbyname(host)) )
|
2008-11-08 19:45:45 +03:00
|
|
|
ret->superfamily = IP;
|
2003-04-17 03:33:44 +04:00
|
|
|
}
|
2008-11-08 19:45:45 +03:00
|
|
|
if (ret->superfamily == UNRESOLVED) {
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->error = (h_errno == HOST_NOT_FOUND ||
|
|
|
|
h_errno == NO_DATA ||
|
|
|
|
h_errno == NO_ADDRESS ? "Host does not exist" :
|
|
|
|
h_errno == TRY_AGAIN ?
|
|
|
|
"Temporary name service failure" :
|
|
|
|
"gethostbyname: unknown error");
|
|
|
|
return ret;
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
2003-04-17 03:33:44 +04:00
|
|
|
/* This way we are always sure the h->h_name is valid :) */
|
|
|
|
strncpy(realhost, h->h_name, sizeof(realhost));
|
2005-01-16 17:29:34 +03:00
|
|
|
for (n = 0; h->h_addr_list[n]; n++);
|
|
|
|
ret->addresses = snewn(n, unsigned long);
|
|
|
|
ret->naddresses = n;
|
|
|
|
for (n = 0; n < ret->naddresses; n++) {
|
|
|
|
memcpy(&a, h->h_addr_list[n], sizeof(a));
|
|
|
|
ret->addresses[n] = ntohl(a);
|
|
|
|
}
|
2002-10-31 22:49:52 +03:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* This must be a numeric IPv4 address because it caused a
|
|
|
|
* success return from inet_addr.
|
|
|
|
*/
|
2008-11-08 19:45:45 +03:00
|
|
|
ret->superfamily = IP;
|
2002-10-31 22:49:52 +03:00
|
|
|
strncpy(realhost, host, sizeof(realhost));
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->addresses = snew(unsigned long);
|
|
|
|
ret->naddresses = 1;
|
|
|
|
ret->addresses[0] = ntohl(a);
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
2003-04-17 03:33:44 +04:00
|
|
|
#endif
|
2002-10-31 22:49:52 +03:00
|
|
|
realhost[lenof(realhost)-1] = '\0';
|
2003-03-29 19:14:26 +03:00
|
|
|
*canonicalname = snewn(1+strlen(realhost), char);
|
2002-10-31 22:49:52 +03:00
|
|
|
strcpy(*canonicalname, realhost);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2003-01-12 18:26:10 +03:00
|
|
|
SockAddr sk_nonamelookup(const char *host)
|
2002-12-18 19:23:11 +03:00
|
|
|
{
|
2003-03-29 19:14:26 +03:00
|
|
|
SockAddr ret = snew(struct SockAddr_tag);
|
2003-01-02 13:07:50 +03:00
|
|
|
ret->error = NULL;
|
2008-11-08 19:45:45 +03:00
|
|
|
ret->superfamily = UNRESOLVED;
|
2002-12-18 19:23:11 +03:00
|
|
|
strncpy(ret->hostname, host, lenof(ret->hostname));
|
|
|
|
ret->hostname[lenof(ret->hostname)-1] = '\0';
|
2005-01-04 20:39:35 +03:00
|
|
|
#ifndef NO_IPV6
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->ais = NULL;
|
|
|
|
#else
|
|
|
|
ret->addresses = NULL;
|
2005-01-04 20:39:35 +03:00
|
|
|
#endif
|
2008-11-08 19:58:55 +03:00
|
|
|
ret->refcount = 1;
|
2002-12-18 19:23:11 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2008-11-08 19:45:45 +03:00
|
|
|
static int sk_nextaddr(SockAddr addr, SockAddrStep *step)
|
2005-01-16 17:29:34 +03:00
|
|
|
{
|
|
|
|
#ifndef NO_IPV6
|
2008-11-08 19:45:45 +03:00
|
|
|
if (step->ai && step->ai->ai_next) {
|
|
|
|
step->ai = step->ai->ai_next;
|
2005-01-16 17:29:34 +03:00
|
|
|
return TRUE;
|
|
|
|
} else
|
|
|
|
return FALSE;
|
|
|
|
#else
|
2008-11-08 19:45:45 +03:00
|
|
|
if (step->curraddr+1 < addr->naddresses) {
|
|
|
|
step->curraddr++;
|
2005-01-16 17:29:34 +03:00
|
|
|
return TRUE;
|
|
|
|
} else {
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
void sk_getaddr(SockAddr addr, char *buf, int buflen)
|
|
|
|
{
|
2013-11-17 18:04:29 +04:00
|
|
|
if (addr->superfamily == UNRESOLVED || addr->superfamily == UNIX) {
|
2003-04-17 03:33:44 +04:00
|
|
|
strncpy(buf, addr->hostname, buflen);
|
|
|
|
buf[buflen-1] = '\0';
|
|
|
|
} else {
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2008-11-08 19:45:45 +03:00
|
|
|
if (getnameinfo(addr->ais->ai_addr, addr->ais->ai_addrlen, buf, buflen,
|
2003-04-17 03:33:44 +04:00
|
|
|
NULL, 0, NI_NUMERICHOST) != 0) {
|
|
|
|
buf[0] = '\0';
|
|
|
|
strncat(buf, "<unknown>", buflen - 1);
|
|
|
|
}
|
|
|
|
#else
|
2002-10-31 22:49:52 +03:00
|
|
|
struct in_addr a;
|
2014-02-06 01:51:25 +04:00
|
|
|
SockAddrStep step;
|
|
|
|
START_STEP(addr, step);
|
|
|
|
assert(SOCKADDR_FAMILY(addr, step) == AF_INET);
|
2008-11-08 19:45:45 +03:00
|
|
|
a.s_addr = htonl(addr->addresses[0]);
|
2002-10-31 22:49:52 +03:00
|
|
|
strncpy(buf, inet_ntoa(a), buflen);
|
2002-12-18 19:23:11 +03:00
|
|
|
buf[buflen-1] = '\0';
|
2003-04-17 03:33:44 +04:00
|
|
|
#endif
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-17 18:05:41 +04:00
|
|
|
int sk_addr_needs_port(SockAddr addr)
|
|
|
|
{
|
|
|
|
if (addr->superfamily == UNRESOLVED || addr->superfamily == UNIX) {
|
|
|
|
return FALSE;
|
|
|
|
} else {
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-27 22:35:48 +04:00
|
|
|
int sk_hostname_is_local(const char *name)
|
2002-12-18 15:18:54 +03:00
|
|
|
{
|
2009-01-05 05:45:38 +03:00
|
|
|
return !strcmp(name, "localhost") ||
|
|
|
|
!strcmp(name, "::1") ||
|
|
|
|
!strncmp(name, "127.", 4);
|
2002-12-18 15:18:54 +03:00
|
|
|
}
|
|
|
|
|
2005-01-26 23:18:33 +03:00
|
|
|
#define ipv4_is_loopback(addr) \
|
|
|
|
(((addr).s_addr & htonl(0xff000000)) == htonl(0x7f000000))
|
|
|
|
|
|
|
|
static int sockaddr_is_loopback(struct sockaddr *sa)
|
|
|
|
{
|
2009-08-07 02:12:05 +04:00
|
|
|
union sockaddr_union *u = (union sockaddr_union *)sa;
|
|
|
|
switch (u->sa.sa_family) {
|
2005-01-26 23:18:33 +03:00
|
|
|
case AF_INET:
|
2009-08-07 02:12:05 +04:00
|
|
|
return ipv4_is_loopback(u->sin.sin_addr);
|
2005-01-26 23:18:33 +03:00
|
|
|
#ifndef NO_IPV6
|
|
|
|
case AF_INET6:
|
2009-08-07 02:12:05 +04:00
|
|
|
return IN6_IS_ADDR_LOOPBACK(&u->sin6.sin6_addr);
|
2005-01-26 23:18:33 +03:00
|
|
|
#endif
|
2005-01-28 14:47:33 +03:00
|
|
|
case AF_UNIX:
|
2005-01-26 23:18:33 +03:00
|
|
|
return TRUE;
|
|
|
|
default:
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-12-18 15:18:54 +03:00
|
|
|
int sk_address_is_local(SockAddr addr)
|
|
|
|
{
|
2008-11-08 19:45:45 +03:00
|
|
|
if (addr->superfamily == UNRESOLVED)
|
2003-04-17 03:33:44 +04:00
|
|
|
return 0; /* we don't know; assume not */
|
2009-01-06 02:36:14 +03:00
|
|
|
else if (addr->superfamily == UNIX)
|
|
|
|
return 1;
|
2003-04-17 03:33:44 +04:00
|
|
|
else {
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2008-11-08 19:45:45 +03:00
|
|
|
return sockaddr_is_loopback(addr->ais->ai_addr);
|
2003-04-17 03:33:44 +04:00
|
|
|
#else
|
2002-12-18 15:18:54 +03:00
|
|
|
struct in_addr a;
|
2014-02-06 01:51:25 +04:00
|
|
|
SockAddrStep step;
|
|
|
|
START_STEP(addr, step);
|
|
|
|
assert(SOCKADDR_FAMILY(addr, step) == AF_INET);
|
2008-11-08 19:45:45 +03:00
|
|
|
a.s_addr = htonl(addr->addresses[0]);
|
2002-12-18 15:18:54 +03:00
|
|
|
return ipv4_is_loopback(a);
|
2003-04-17 03:33:44 +04:00
|
|
|
#endif
|
2002-12-18 15:18:54 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-17 00:15:51 +04:00
|
|
|
int sk_address_is_special_local(SockAddr addr)
|
|
|
|
{
|
|
|
|
return addr->superfamily == UNIX;
|
|
|
|
}
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
int sk_addrtype(SockAddr addr)
|
|
|
|
{
|
2014-02-06 01:51:25 +04:00
|
|
|
SockAddrStep step;
|
2008-11-08 19:45:45 +03:00
|
|
|
int family;
|
2014-02-06 01:51:25 +04:00
|
|
|
START_STEP(addr, step);
|
|
|
|
family = SOCKADDR_FAMILY(addr, step);
|
2008-11-08 19:45:45 +03:00
|
|
|
|
|
|
|
return (family == AF_INET ? ADDRTYPE_IPV4 :
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2008-11-08 19:45:45 +03:00
|
|
|
family == AF_INET6 ? ADDRTYPE_IPV6 :
|
2002-12-18 19:23:11 +03:00
|
|
|
#endif
|
|
|
|
ADDRTYPE_NAME);
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void sk_addrcopy(SockAddr addr, char *buf)
|
|
|
|
{
|
2008-11-08 19:45:45 +03:00
|
|
|
SockAddrStep step;
|
|
|
|
int family;
|
|
|
|
START_STEP(addr, step);
|
|
|
|
family = SOCKADDR_FAMILY(addr, step);
|
2003-04-17 03:33:44 +04:00
|
|
|
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2008-11-08 19:45:45 +03:00
|
|
|
if (family == AF_INET)
|
|
|
|
memcpy(buf, &((struct sockaddr_in *)step.ai->ai_addr)->sin_addr,
|
2003-04-17 03:33:44 +04:00
|
|
|
sizeof(struct in_addr));
|
2008-11-08 19:45:45 +03:00
|
|
|
else if (family == AF_INET6)
|
|
|
|
memcpy(buf, &((struct sockaddr_in6 *)step.ai->ai_addr)->sin6_addr,
|
2003-04-17 03:33:44 +04:00
|
|
|
sizeof(struct in6_addr));
|
|
|
|
else
|
|
|
|
assert(FALSE);
|
|
|
|
#else
|
|
|
|
struct in_addr a;
|
|
|
|
|
2008-11-08 19:45:45 +03:00
|
|
|
assert(family == AF_INET);
|
|
|
|
a.s_addr = htonl(addr->addresses[step.curraddr]);
|
2003-04-17 03:33:44 +04:00
|
|
|
memcpy(buf, (char*) &a.s_addr, 4);
|
2002-10-31 22:49:52 +03:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void sk_addr_free(SockAddr addr)
|
|
|
|
{
|
2008-11-08 19:58:55 +03:00
|
|
|
if (--addr->refcount > 0)
|
|
|
|
return;
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2005-01-16 17:29:34 +03:00
|
|
|
if (addr->ais != NULL)
|
|
|
|
freeaddrinfo(addr->ais);
|
|
|
|
#else
|
|
|
|
sfree(addr->addresses);
|
2003-04-17 03:33:44 +04:00
|
|
|
#endif
|
2002-10-31 22:49:52 +03:00
|
|
|
sfree(addr);
|
|
|
|
}
|
|
|
|
|
2008-11-08 19:58:55 +03:00
|
|
|
SockAddr sk_addr_dup(SockAddr addr)
|
|
|
|
{
|
|
|
|
addr->refcount++;
|
|
|
|
return addr;
|
|
|
|
}
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
static Plug sk_tcp_plug(Socket sock, Plug p)
|
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket) sock;
|
|
|
|
Plug ret = s->plug;
|
|
|
|
if (p)
|
|
|
|
s->plug = p;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sk_tcp_flush(Socket s)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* We send data to the socket as soon as we can anyway,
|
|
|
|
* so we don't need to do anything here. :-)
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sk_tcp_close(Socket s);
|
2003-01-10 21:33:35 +03:00
|
|
|
static int sk_tcp_write(Socket s, const char *data, int len);
|
|
|
|
static int sk_tcp_write_oob(Socket s, const char *data, int len);
|
2011-09-13 15:44:03 +04:00
|
|
|
static void sk_tcp_write_eof(Socket s);
|
2002-10-31 22:49:52 +03:00
|
|
|
static void sk_tcp_set_frozen(Socket s, int is_frozen);
|
2015-05-18 15:57:45 +03:00
|
|
|
static char *sk_tcp_peer_info(Socket s);
|
2003-05-04 18:18:18 +04:00
|
|
|
static const char *sk_tcp_socket_error(Socket s);
|
2002-10-31 22:49:52 +03:00
|
|
|
|
2003-01-11 12:31:54 +03:00
|
|
|
static struct socket_function_table tcp_fn_table = {
|
|
|
|
sk_tcp_plug,
|
|
|
|
sk_tcp_close,
|
|
|
|
sk_tcp_write,
|
|
|
|
sk_tcp_write_oob,
|
2011-09-13 15:44:03 +04:00
|
|
|
sk_tcp_write_eof,
|
2003-01-11 12:31:54 +03:00
|
|
|
sk_tcp_flush,
|
|
|
|
sk_tcp_set_frozen,
|
2015-05-18 15:57:45 +03:00
|
|
|
sk_tcp_socket_error,
|
|
|
|
sk_tcp_peer_info,
|
2003-01-11 12:31:54 +03:00
|
|
|
};
|
|
|
|
|
2013-11-17 18:03:55 +04:00
|
|
|
static Socket sk_tcp_accept(accept_ctx_t ctx, Plug plug)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
2013-11-17 18:03:55 +04:00
|
|
|
int sockfd = ctx.i;
|
2002-10-31 22:49:52 +03:00
|
|
|
Actual_Socket ret;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create Socket structure.
|
|
|
|
*/
|
2003-03-29 19:14:26 +03:00
|
|
|
ret = snew(struct Socket_tag);
|
2003-01-11 12:31:54 +03:00
|
|
|
ret->fn = &tcp_fn_table;
|
2002-10-31 22:49:52 +03:00
|
|
|
ret->error = NULL;
|
|
|
|
ret->plug = plug;
|
|
|
|
bufchain_init(&ret->output_data);
|
|
|
|
ret->writable = 1; /* to start with */
|
|
|
|
ret->sending_oob = 0;
|
|
|
|
ret->frozen = 1;
|
|
|
|
ret->localhost_only = 0; /* unused, but best init anyway */
|
|
|
|
ret->pending_error = 0;
|
|
|
|
ret->oobpending = FALSE;
|
2011-09-13 15:44:03 +04:00
|
|
|
ret->outgoingeof = EOF_NO;
|
|
|
|
ret->incomingeof = FALSE;
|
2002-10-31 22:49:52 +03:00
|
|
|
ret->listener = 0;
|
2008-08-21 02:21:04 +04:00
|
|
|
ret->parent = ret->child = NULL;
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->addr = NULL;
|
2005-02-14 18:30:09 +03:00
|
|
|
ret->connected = 1;
|
2002-10-31 22:49:52 +03:00
|
|
|
|
2003-05-10 12:35:54 +04:00
|
|
|
ret->s = sockfd;
|
2002-10-31 22:49:52 +03:00
|
|
|
|
|
|
|
if (ret->s < 0) {
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->error = strerror(errno);
|
2002-10-31 22:49:52 +03:00
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret->oobinline = 0;
|
|
|
|
|
2003-03-29 19:47:06 +03:00
|
|
|
uxsel_tell(ret);
|
2002-10-31 22:49:52 +03:00
|
|
|
add234(sktree, ret);
|
|
|
|
|
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
static int try_connect(Actual_Socket sock)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
|
|
|
int s;
|
2009-08-07 02:55:15 +04:00
|
|
|
union sockaddr_union u;
|
|
|
|
const union sockaddr_union *sa;
|
2005-01-16 17:29:34 +03:00
|
|
|
int err = 0;
|
2002-10-31 22:49:52 +03:00
|
|
|
short localport;
|
2013-07-19 22:10:02 +04:00
|
|
|
int salen, family;
|
2002-10-31 22:49:52 +03:00
|
|
|
|
2007-11-28 23:45:50 +03:00
|
|
|
/*
|
|
|
|
* Remove the socket from the tree before we overwrite its
|
|
|
|
* internal socket id, because that forms part of the tree's
|
|
|
|
* sorting criterion. We'll add it back before exiting this
|
|
|
|
* function, whether we changed anything or not.
|
|
|
|
*/
|
|
|
|
del234(sktree, sock);
|
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
if (sock->s >= 0)
|
|
|
|
close(sock->s);
|
|
|
|
|
|
|
|
plug_log(sock->plug, 0, sock->addr, sock->port, NULL, 0);
|
2002-10-31 22:49:52 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Open socket.
|
|
|
|
*/
|
2008-11-08 19:45:45 +03:00
|
|
|
family = SOCKADDR_FAMILY(sock->addr, sock->step);
|
|
|
|
assert(family != AF_UNSPEC);
|
|
|
|
s = socket(family, SOCK_STREAM, 0);
|
2005-01-16 17:29:34 +03:00
|
|
|
sock->s = s;
|
2002-10-31 22:49:52 +03:00
|
|
|
|
|
|
|
if (s < 0) {
|
2005-01-16 17:29:34 +03:00
|
|
|
err = errno;
|
|
|
|
goto ret;
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
2006-12-09 18:44:31 +03:00
|
|
|
cloexec(s);
|
2006-11-23 17:32:11 +03:00
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
if (sock->oobinline) {
|
2002-10-31 22:49:52 +03:00
|
|
|
int b = TRUE;
|
2013-07-19 21:45:01 +04:00
|
|
|
if (setsockopt(s, SOL_SOCKET, SO_OOBINLINE,
|
|
|
|
(void *) &b, sizeof(b)) < 0) {
|
|
|
|
err = errno;
|
|
|
|
close(s);
|
|
|
|
goto ret;
|
|
|
|
}
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
if (sock->nodelay) {
|
2002-10-31 22:49:52 +03:00
|
|
|
int b = TRUE;
|
2013-07-19 21:45:01 +04:00
|
|
|
if (setsockopt(s, IPPROTO_TCP, TCP_NODELAY,
|
|
|
|
(void *) &b, sizeof(b)) < 0) {
|
|
|
|
err = errno;
|
|
|
|
close(s);
|
|
|
|
goto ret;
|
|
|
|
}
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
if (sock->keepalive) {
|
2004-06-20 21:07:38 +04:00
|
|
|
int b = TRUE;
|
2013-07-19 21:45:01 +04:00
|
|
|
if (setsockopt(s, SOL_SOCKET, SO_KEEPALIVE,
|
|
|
|
(void *) &b, sizeof(b)) < 0) {
|
|
|
|
err = errno;
|
|
|
|
close(s);
|
|
|
|
goto ret;
|
|
|
|
}
|
2004-06-20 21:07:38 +04:00
|
|
|
}
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
/*
|
|
|
|
* Bind to local address.
|
|
|
|
*/
|
2005-01-16 17:29:34 +03:00
|
|
|
if (sock->privport)
|
2002-10-31 22:49:52 +03:00
|
|
|
localport = 1023; /* count from 1023 downwards */
|
|
|
|
else
|
|
|
|
localport = 0; /* just use port 0 (ie kernel picks) */
|
|
|
|
|
2004-02-03 17:47:43 +03:00
|
|
|
/* BSD IP stacks need sockaddr_in zeroed before filling in */
|
2009-08-07 02:55:15 +04:00
|
|
|
memset(&u,'\0',sizeof(u));
|
2004-05-31 18:01:52 +04:00
|
|
|
|
|
|
|
/* We don't try to bind to a local address for UNIX domain sockets. (Why
|
|
|
|
* do we bother doing the bind when localport == 0 anyway?) */
|
2008-11-08 19:45:45 +03:00
|
|
|
if (family != AF_UNIX) {
|
2004-05-31 18:01:52 +04:00
|
|
|
/* Loop round trying to bind */
|
|
|
|
while (1) {
|
|
|
|
int retcode;
|
2002-10-31 22:49:52 +03:00
|
|
|
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2008-11-08 19:45:45 +03:00
|
|
|
if (family == AF_INET6) {
|
2004-05-31 18:01:52 +04:00
|
|
|
/* XXX use getaddrinfo to get a local address? */
|
2009-08-07 02:55:15 +04:00
|
|
|
u.sin6.sin6_family = AF_INET6;
|
|
|
|
u.sin6.sin6_addr = in6addr_any;
|
|
|
|
u.sin6.sin6_port = htons(localport);
|
|
|
|
retcode = bind(s, &u.sa, sizeof(u.sin6));
|
2004-05-31 18:01:52 +04:00
|
|
|
} else
|
2002-10-31 22:49:52 +03:00
|
|
|
#endif
|
2004-05-31 18:01:52 +04:00
|
|
|
{
|
2008-11-08 19:45:45 +03:00
|
|
|
assert(family == AF_INET);
|
2009-08-07 02:55:15 +04:00
|
|
|
u.sin.sin_family = AF_INET;
|
|
|
|
u.sin.sin_addr.s_addr = htonl(INADDR_ANY);
|
|
|
|
u.sin.sin_port = htons(localport);
|
|
|
|
retcode = bind(s, &u.sa, sizeof(u.sin));
|
2004-05-31 18:01:52 +04:00
|
|
|
}
|
|
|
|
if (retcode >= 0) {
|
|
|
|
err = 0;
|
|
|
|
break; /* done */
|
|
|
|
} else {
|
|
|
|
err = errno;
|
|
|
|
if (err != EADDRINUSE) /* failed, for a bad reason */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (localport == 0)
|
|
|
|
break; /* we're only looping once */
|
|
|
|
localport--;
|
|
|
|
if (localport == 0)
|
|
|
|
break; /* we might have got to the end */
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
2004-05-31 18:01:52 +04:00
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
if (err)
|
|
|
|
goto ret;
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Connect to remote address.
|
|
|
|
*/
|
2008-11-08 19:45:45 +03:00
|
|
|
switch(family) {
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2004-05-31 18:01:52 +04:00
|
|
|
case AF_INET:
|
|
|
|
/* XXX would be better to have got getaddrinfo() to fill in the port. */
|
2008-11-08 19:45:45 +03:00
|
|
|
((struct sockaddr_in *)sock->step.ai->ai_addr)->sin_port =
|
2005-01-16 17:29:34 +03:00
|
|
|
htons(sock->port);
|
2009-08-07 02:55:15 +04:00
|
|
|
sa = (const union sockaddr_union *)sock->step.ai->ai_addr;
|
2008-11-08 19:45:45 +03:00
|
|
|
salen = sock->step.ai->ai_addrlen;
|
2004-05-31 18:01:52 +04:00
|
|
|
break;
|
|
|
|
case AF_INET6:
|
2008-11-08 19:45:45 +03:00
|
|
|
((struct sockaddr_in *)sock->step.ai->ai_addr)->sin_port =
|
2005-01-16 17:29:34 +03:00
|
|
|
htons(sock->port);
|
2009-08-07 02:55:15 +04:00
|
|
|
sa = (const union sockaddr_union *)sock->step.ai->ai_addr;
|
2008-11-08 19:45:45 +03:00
|
|
|
salen = sock->step.ai->ai_addrlen;
|
2004-05-31 18:01:52 +04:00
|
|
|
break;
|
2003-04-17 03:33:44 +04:00
|
|
|
#else
|
2004-05-31 18:01:52 +04:00
|
|
|
case AF_INET:
|
2009-08-07 02:55:15 +04:00
|
|
|
u.sin.sin_family = AF_INET;
|
|
|
|
u.sin.sin_addr.s_addr = htonl(sock->addr->addresses[sock->step.curraddr]);
|
|
|
|
u.sin.sin_port = htons((short) sock->port);
|
|
|
|
sa = &u;
|
|
|
|
salen = sizeof u.sin;
|
2004-05-31 18:01:52 +04:00
|
|
|
break;
|
2003-04-17 03:33:44 +04:00
|
|
|
#endif
|
2004-05-31 18:01:52 +04:00
|
|
|
case AF_UNIX:
|
2005-01-16 17:29:34 +03:00
|
|
|
assert(sock->port == 0); /* to catch confused people */
|
2009-08-07 02:55:15 +04:00
|
|
|
assert(strlen(sock->addr->hostname) < sizeof u.su.sun_path);
|
|
|
|
u.su.sun_family = AF_UNIX;
|
|
|
|
strcpy(u.su.sun_path, sock->addr->hostname);
|
|
|
|
sa = &u;
|
|
|
|
salen = sizeof u.su;
|
2004-05-31 18:01:52 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
assert(0 && "unknown address family");
|
2005-04-24 18:43:00 +04:00
|
|
|
exit(1); /* XXX: GCC doesn't understand assert() on some systems. */
|
2004-05-31 18:01:52 +04:00
|
|
|
}
|
2003-04-17 03:58:59 +04:00
|
|
|
|
2013-07-19 22:10:02 +04:00
|
|
|
nonblock(s);
|
2003-01-09 21:14:24 +03:00
|
|
|
|
2009-08-07 02:55:15 +04:00
|
|
|
if ((connect(s, &(sa->sa), salen)) < 0) {
|
2003-01-09 21:14:24 +03:00
|
|
|
if ( errno != EINPROGRESS ) {
|
2005-01-16 17:29:34 +03:00
|
|
|
err = errno;
|
|
|
|
goto ret;
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* If we _don't_ get EWOULDBLOCK, the connect has completed
|
|
|
|
* and we should set the socket as connected and writable.
|
|
|
|
*/
|
2005-01-16 17:29:34 +03:00
|
|
|
sock->connected = 1;
|
|
|
|
sock->writable = 1;
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
uxsel_tell(sock);
|
|
|
|
|
|
|
|
ret:
|
2007-11-28 23:45:50 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* No matter what happened, put the socket back in the tree.
|
|
|
|
*/
|
|
|
|
add234(sktree, sock);
|
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
if (err)
|
|
|
|
plug_log(sock->plug, 1, sock->addr, sock->port, strerror(err), err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
Socket sk_new(SockAddr addr, int port, int privport, int oobinline,
|
|
|
|
int nodelay, int keepalive, Plug plug)
|
|
|
|
{
|
|
|
|
Actual_Socket ret;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create Socket structure.
|
|
|
|
*/
|
|
|
|
ret = snew(struct Socket_tag);
|
|
|
|
ret->fn = &tcp_fn_table;
|
|
|
|
ret->error = NULL;
|
|
|
|
ret->plug = plug;
|
|
|
|
bufchain_init(&ret->output_data);
|
|
|
|
ret->connected = 0; /* to start with */
|
|
|
|
ret->writable = 0; /* to start with */
|
|
|
|
ret->sending_oob = 0;
|
|
|
|
ret->frozen = 0;
|
|
|
|
ret->localhost_only = 0; /* unused, but best init anyway */
|
|
|
|
ret->pending_error = 0;
|
2008-08-21 02:21:04 +04:00
|
|
|
ret->parent = ret->child = NULL;
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->oobpending = FALSE;
|
2011-09-13 15:44:03 +04:00
|
|
|
ret->outgoingeof = EOF_NO;
|
|
|
|
ret->incomingeof = FALSE;
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->listener = 0;
|
|
|
|
ret->addr = addr;
|
2008-11-08 19:45:45 +03:00
|
|
|
START_STEP(ret->addr, ret->step);
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->s = -1;
|
|
|
|
ret->oobinline = oobinline;
|
|
|
|
ret->nodelay = nodelay;
|
|
|
|
ret->keepalive = keepalive;
|
|
|
|
ret->privport = privport;
|
|
|
|
ret->port = port;
|
|
|
|
|
|
|
|
err = 0;
|
|
|
|
do {
|
|
|
|
err = try_connect(ret);
|
2008-11-08 19:45:45 +03:00
|
|
|
} while (err && sk_nextaddr(ret->addr, &ret->step));
|
2002-10-31 22:49:52 +03:00
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
if (err)
|
|
|
|
ret->error = strerror(err);
|
2003-08-07 20:04:33 +04:00
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
Socket sk_newlistener(const char *srcaddr, int port, Plug plug,
|
|
|
|
int local_host_only, int orig_address_family)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
|
|
|
int s;
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2014-12-20 19:54:28 +03:00
|
|
|
struct addrinfo hints, *ai = NULL;
|
2003-04-17 03:33:44 +04:00
|
|
|
char portstr[6];
|
2002-10-31 22:49:52 +03:00
|
|
|
#endif
|
2009-08-07 02:55:15 +04:00
|
|
|
union sockaddr_union u;
|
|
|
|
union sockaddr_union *addr;
|
2005-01-16 15:37:19 +03:00
|
|
|
int addrlen;
|
2002-10-31 22:49:52 +03:00
|
|
|
Actual_Socket ret;
|
|
|
|
int retcode;
|
2008-08-21 02:21:04 +04:00
|
|
|
int address_family;
|
2002-10-31 22:49:52 +03:00
|
|
|
int on = 1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create Socket structure.
|
|
|
|
*/
|
2003-03-29 19:14:26 +03:00
|
|
|
ret = snew(struct Socket_tag);
|
2003-01-11 12:31:54 +03:00
|
|
|
ret->fn = &tcp_fn_table;
|
2002-10-31 22:49:52 +03:00
|
|
|
ret->error = NULL;
|
|
|
|
ret->plug = plug;
|
|
|
|
bufchain_init(&ret->output_data);
|
|
|
|
ret->writable = 0; /* to start with */
|
|
|
|
ret->sending_oob = 0;
|
|
|
|
ret->frozen = 0;
|
|
|
|
ret->localhost_only = local_host_only;
|
|
|
|
ret->pending_error = 0;
|
2008-08-21 02:21:04 +04:00
|
|
|
ret->parent = ret->child = NULL;
|
2002-10-31 22:49:52 +03:00
|
|
|
ret->oobpending = FALSE;
|
2011-09-13 15:44:03 +04:00
|
|
|
ret->outgoingeof = EOF_NO;
|
|
|
|
ret->incomingeof = FALSE;
|
2002-10-31 22:49:52 +03:00
|
|
|
ret->listener = 1;
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->addr = NULL;
|
2013-11-17 18:04:33 +04:00
|
|
|
ret->s = -1;
|
2002-10-31 22:49:52 +03:00
|
|
|
|
2004-12-30 19:45:11 +03:00
|
|
|
/*
|
|
|
|
* Translate address_family from platform-independent constants
|
|
|
|
* into local reality.
|
|
|
|
*/
|
2008-08-21 02:21:04 +04:00
|
|
|
address_family = (orig_address_family == ADDRTYPE_IPV4 ? AF_INET :
|
2005-09-13 23:54:01 +04:00
|
|
|
#ifndef NO_IPV6
|
2008-08-21 02:21:04 +04:00
|
|
|
orig_address_family == ADDRTYPE_IPV6 ? AF_INET6 :
|
2005-09-13 23:54:01 +04:00
|
|
|
#endif
|
|
|
|
AF_UNSPEC);
|
2004-12-30 19:45:11 +03:00
|
|
|
|
|
|
|
#ifndef NO_IPV6
|
|
|
|
/* Let's default to IPv6.
|
|
|
|
* If the stack doesn't support IPv6, we will fall back to IPv4. */
|
|
|
|
if (address_family == AF_UNSPEC) address_family = AF_INET6;
|
|
|
|
#else
|
|
|
|
/* No other choice, default to IPv4 */
|
|
|
|
if (address_family == AF_UNSPEC) address_family = AF_INET;
|
|
|
|
#endif
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
/*
|
|
|
|
* Open socket.
|
|
|
|
*/
|
2004-12-30 19:45:11 +03:00
|
|
|
s = socket(address_family, SOCK_STREAM, 0);
|
|
|
|
|
2005-09-13 23:54:01 +04:00
|
|
|
#ifndef NO_IPV6
|
2004-12-30 19:45:11 +03:00
|
|
|
/* If the host doesn't support IPv6 try fallback to IPv4. */
|
|
|
|
if (s < 0 && address_family == AF_INET6) {
|
|
|
|
address_family = AF_INET;
|
|
|
|
s = socket(address_family, SOCK_STREAM, 0);
|
|
|
|
}
|
2005-09-13 23:54:01 +04:00
|
|
|
#endif
|
2002-10-31 22:49:52 +03:00
|
|
|
|
|
|
|
if (s < 0) {
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->error = strerror(errno);
|
2002-10-31 22:49:52 +03:00
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
2006-12-09 18:44:31 +03:00
|
|
|
cloexec(s);
|
2006-11-23 17:32:11 +03:00
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
ret->oobinline = 0;
|
|
|
|
|
2013-07-19 21:45:01 +04:00
|
|
|
if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR,
|
|
|
|
(const char *)&on, sizeof(on)) < 0) {
|
|
|
|
ret->error = strerror(errno);
|
|
|
|
close(s);
|
|
|
|
return (Socket) ret;
|
|
|
|
}
|
2002-10-31 22:49:52 +03:00
|
|
|
|
2005-01-16 15:37:19 +03:00
|
|
|
retcode = -1;
|
|
|
|
addr = NULL; addrlen = -1; /* placate optimiser */
|
|
|
|
|
|
|
|
if (srcaddr != NULL) {
|
2004-12-30 19:45:11 +03:00
|
|
|
#ifndef NO_IPV6
|
2005-01-16 15:37:19 +03:00
|
|
|
hints.ai_flags = AI_NUMERICHOST;
|
|
|
|
hints.ai_family = address_family;
|
2005-01-22 18:32:10 +03:00
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
2005-01-16 15:37:19 +03:00
|
|
|
hints.ai_protocol = 0;
|
|
|
|
hints.ai_addrlen = 0;
|
|
|
|
hints.ai_addr = NULL;
|
|
|
|
hints.ai_canonname = NULL;
|
|
|
|
hints.ai_next = NULL;
|
2005-01-27 02:49:56 +03:00
|
|
|
assert(port >= 0 && port <= 99999);
|
2005-01-16 15:37:19 +03:00
|
|
|
sprintf(portstr, "%d", port);
|
2014-01-25 19:58:54 +04:00
|
|
|
{
|
|
|
|
char *trimmed_addr = host_strduptrim(srcaddr);
|
|
|
|
retcode = getaddrinfo(trimmed_addr, portstr, &hints, &ai);
|
|
|
|
sfree(trimmed_addr);
|
|
|
|
}
|
2005-01-22 18:20:35 +03:00
|
|
|
if (retcode == 0) {
|
2009-08-07 02:55:15 +04:00
|
|
|
addr = (union sockaddr_union *)ai->ai_addr;
|
2005-01-22 18:19:21 +03:00
|
|
|
addrlen = ai->ai_addrlen;
|
|
|
|
}
|
2005-01-16 15:37:19 +03:00
|
|
|
#else
|
2009-08-07 02:55:15 +04:00
|
|
|
memset(&u,'\0',sizeof u);
|
|
|
|
u.sin.sin_family = AF_INET;
|
|
|
|
u.sin.sin_port = htons(port);
|
|
|
|
u.sin.sin_addr.s_addr = inet_addr(srcaddr);
|
|
|
|
if (u.sin.sin_addr.s_addr != (in_addr_t)(-1)) {
|
2005-01-16 15:37:19 +03:00
|
|
|
/* Override localhost_only with specified listen addr. */
|
2009-08-07 02:55:15 +04:00
|
|
|
ret->localhost_only = ipv4_is_loopback(u.sin.sin_addr);
|
2005-01-16 15:37:19 +03:00
|
|
|
}
|
2009-08-07 02:55:15 +04:00
|
|
|
addr = &u;
|
|
|
|
addrlen = sizeof(u.sin);
|
2005-01-16 15:37:19 +03:00
|
|
|
retcode = 0;
|
2002-10-31 22:49:52 +03:00
|
|
|
#endif
|
2005-01-16 15:37:19 +03:00
|
|
|
}
|
2002-12-18 14:39:25 +03:00
|
|
|
|
2005-01-16 15:37:19 +03:00
|
|
|
if (retcode != 0) {
|
2009-08-07 02:55:15 +04:00
|
|
|
memset(&u,'\0',sizeof u);
|
2005-01-16 15:37:19 +03:00
|
|
|
#ifndef NO_IPV6
|
|
|
|
if (address_family == AF_INET6) {
|
2009-08-07 02:55:15 +04:00
|
|
|
u.sin6.sin6_family = AF_INET6;
|
|
|
|
u.sin6.sin6_port = htons(port);
|
2005-01-16 15:37:19 +03:00
|
|
|
if (local_host_only)
|
2009-08-07 02:55:15 +04:00
|
|
|
u.sin6.sin6_addr = in6addr_loopback;
|
2005-01-16 15:37:19 +03:00
|
|
|
else
|
2009-08-07 02:55:15 +04:00
|
|
|
u.sin6.sin6_addr = in6addr_any;
|
|
|
|
addr = &u;
|
|
|
|
addrlen = sizeof(u.sin6);
|
2005-01-16 15:37:19 +03:00
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
{
|
2009-08-07 02:55:15 +04:00
|
|
|
u.sin.sin_family = AF_INET;
|
|
|
|
u.sin.sin_port = htons(port);
|
2002-12-18 14:39:25 +03:00
|
|
|
if (local_host_only)
|
2009-08-07 02:55:15 +04:00
|
|
|
u.sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
|
2002-12-18 14:39:25 +03:00
|
|
|
else
|
2009-08-07 02:55:15 +04:00
|
|
|
u.sin.sin_addr.s_addr = htonl(INADDR_ANY);
|
|
|
|
addr = &u;
|
|
|
|
addrlen = sizeof(u.sin);
|
2005-01-16 15:37:19 +03:00
|
|
|
}
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
2009-08-07 02:55:15 +04:00
|
|
|
retcode = bind(s, &addr->sa, addrlen);
|
2014-12-20 19:54:28 +03:00
|
|
|
|
|
|
|
#ifndef NO_IPV6
|
|
|
|
if (ai)
|
|
|
|
freeaddrinfo(ai);
|
|
|
|
#endif
|
|
|
|
|
2005-01-16 15:37:19 +03:00
|
|
|
if (retcode < 0) {
|
|
|
|
close(s);
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->error = strerror(errno);
|
2002-10-31 22:49:52 +03:00
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (listen(s, SOMAXCONN) < 0) {
|
|
|
|
close(s);
|
2005-01-16 17:29:34 +03:00
|
|
|
ret->error = strerror(errno);
|
2002-10-31 22:49:52 +03:00
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
2008-08-21 02:21:04 +04:00
|
|
|
#ifndef NO_IPV6
|
|
|
|
/*
|
|
|
|
* If we were given ADDRTYPE_UNSPEC, we must also create an
|
|
|
|
* IPv4 listening socket and link it to this one.
|
|
|
|
*/
|
|
|
|
if (address_family == AF_INET6 && orig_address_family == ADDRTYPE_UNSPEC) {
|
|
|
|
Actual_Socket other;
|
|
|
|
|
|
|
|
other = (Actual_Socket) sk_newlistener(srcaddr, port, plug,
|
|
|
|
local_host_only, ADDRTYPE_IPV4);
|
|
|
|
|
|
|
|
if (other) {
|
|
|
|
if (!other->error) {
|
|
|
|
other->parent = ret;
|
|
|
|
ret->child = other;
|
|
|
|
} else {
|
|
|
|
/* If we couldn't create a listening socket on IPv4 as well
|
|
|
|
* as IPv6, we must return an error overall. */
|
|
|
|
close(s);
|
|
|
|
sfree(ret);
|
|
|
|
return (Socket) other;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2005-01-16 15:37:19 +03:00
|
|
|
ret->s = s;
|
|
|
|
|
2003-03-29 19:47:06 +03:00
|
|
|
uxsel_tell(ret);
|
2002-10-31 22:49:52 +03:00
|
|
|
add234(sktree, ret);
|
|
|
|
|
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sk_tcp_close(Socket sock)
|
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket) sock;
|
|
|
|
|
2008-08-21 02:21:04 +04:00
|
|
|
if (s->child)
|
|
|
|
sk_tcp_close((Socket)s->child);
|
|
|
|
|
2003-03-29 19:47:06 +03:00
|
|
|
uxsel_del(s->s);
|
2002-10-31 22:49:52 +03:00
|
|
|
del234(sktree, s);
|
|
|
|
close(s->s);
|
2005-01-16 17:29:34 +03:00
|
|
|
if (s->addr)
|
|
|
|
sk_addr_free(s->addr);
|
2002-10-31 22:49:52 +03:00
|
|
|
sfree(s);
|
|
|
|
}
|
|
|
|
|
2005-01-28 14:39:45 +03:00
|
|
|
void *sk_getxdmdata(void *sock, int *lenp)
|
2003-01-11 12:31:54 +03:00
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket) sock;
|
2009-08-07 02:12:05 +04:00
|
|
|
union sockaddr_union u;
|
2003-01-11 12:31:54 +03:00
|
|
|
socklen_t addrlen;
|
2005-01-28 14:39:45 +03:00
|
|
|
char *buf;
|
|
|
|
static unsigned int unix_addr = 0xFFFFFFFF;
|
2003-01-11 12:31:54 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We must check that this socket really _is_ an Actual_Socket.
|
|
|
|
*/
|
|
|
|
if (s->fn != &tcp_fn_table)
|
2005-01-28 14:39:45 +03:00
|
|
|
return NULL; /* failure */
|
2003-01-11 12:31:54 +03:00
|
|
|
|
2009-08-07 02:12:05 +04:00
|
|
|
addrlen = sizeof(u);
|
|
|
|
if (getsockname(s->s, &u.sa, &addrlen) < 0)
|
2005-01-28 14:39:45 +03:00
|
|
|
return NULL;
|
2009-08-07 02:12:05 +04:00
|
|
|
switch(u.sa.sa_family) {
|
2004-05-31 18:01:52 +04:00
|
|
|
case AF_INET:
|
2005-01-28 14:39:45 +03:00
|
|
|
*lenp = 6;
|
|
|
|
buf = snewn(*lenp, char);
|
2009-08-07 02:12:05 +04:00
|
|
|
PUT_32BIT_MSB_FIRST(buf, ntohl(u.sin.sin_addr.s_addr));
|
|
|
|
PUT_16BIT_MSB_FIRST(buf+4, ntohs(u.sin.sin_port));
|
2004-05-31 18:01:52 +04:00
|
|
|
break;
|
2005-01-28 14:39:45 +03:00
|
|
|
#ifndef NO_IPV6
|
|
|
|
case AF_INET6:
|
|
|
|
*lenp = 6;
|
|
|
|
buf = snewn(*lenp, char);
|
2009-08-07 02:12:05 +04:00
|
|
|
if (IN6_IS_ADDR_V4MAPPED(&u.sin6.sin6_addr)) {
|
|
|
|
memcpy(buf, u.sin6.sin6_addr.s6_addr + 12, 4);
|
|
|
|
PUT_16BIT_MSB_FIRST(buf+4, ntohs(u.sin6.sin6_port));
|
2005-01-28 14:39:45 +03:00
|
|
|
} else
|
|
|
|
/* This is stupid, but it's what XLib does. */
|
|
|
|
memset(buf, 0, 6);
|
|
|
|
break;
|
|
|
|
#endif
|
2004-05-31 18:01:52 +04:00
|
|
|
case AF_UNIX:
|
2005-01-28 14:39:45 +03:00
|
|
|
*lenp = 6;
|
|
|
|
buf = snewn(*lenp, char);
|
|
|
|
PUT_32BIT_MSB_FIRST(buf, unix_addr--);
|
|
|
|
PUT_16BIT_MSB_FIRST(buf+4, getpid());
|
2004-05-31 18:01:52 +04:00
|
|
|
break;
|
2003-01-11 12:31:54 +03:00
|
|
|
|
2004-05-31 18:01:52 +04:00
|
|
|
/* XXX IPV6 */
|
|
|
|
|
|
|
|
default:
|
2005-01-28 14:39:45 +03:00
|
|
|
return NULL;
|
2004-05-31 18:01:52 +04:00
|
|
|
}
|
2003-01-11 12:31:54 +03:00
|
|
|
|
2005-01-28 14:39:45 +03:00
|
|
|
return buf;
|
2003-01-11 12:31:54 +03:00
|
|
|
}
|
|
|
|
|
2013-08-17 20:06:27 +04:00
|
|
|
/*
|
|
|
|
* Deal with socket errors detected in try_send().
|
|
|
|
*/
|
|
|
|
static void socket_error_callback(void *vs)
|
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket)vs;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Just in case other socket work has caused this socket to vanish
|
|
|
|
* or become somehow non-erroneous before this callback arrived...
|
|
|
|
*/
|
|
|
|
if (!find234(sktree, s, NULL) || !s->pending_error)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* An error has occurred on this socket. Pass it to the plug.
|
|
|
|
*/
|
|
|
|
plug_closing(s->plug, strerror(s->pending_error), s->pending_error, 0);
|
|
|
|
}
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
/*
|
|
|
|
* The function which tries to send on a socket once it's deemed
|
|
|
|
* writable.
|
|
|
|
*/
|
|
|
|
void try_send(Actual_Socket s)
|
|
|
|
{
|
|
|
|
while (s->sending_oob || bufchain_size(&s->output_data) > 0) {
|
|
|
|
int nsent;
|
|
|
|
int err;
|
|
|
|
void *data;
|
|
|
|
int len, urgentflag;
|
|
|
|
|
|
|
|
if (s->sending_oob) {
|
|
|
|
urgentflag = MSG_OOB;
|
|
|
|
len = s->sending_oob;
|
|
|
|
data = &s->oobdata;
|
|
|
|
} else {
|
|
|
|
urgentflag = 0;
|
|
|
|
bufchain_prefix(&s->output_data, &data, &len);
|
|
|
|
}
|
|
|
|
nsent = send(s->s, data, len, urgentflag);
|
|
|
|
noise_ultralight(nsent);
|
|
|
|
if (nsent <= 0) {
|
|
|
|
err = (nsent < 0 ? errno : 0);
|
|
|
|
if (err == EWOULDBLOCK) {
|
|
|
|
/*
|
|
|
|
* Perfectly normal: we've sent all we can for the moment.
|
|
|
|
*/
|
|
|
|
s->writable = FALSE;
|
|
|
|
return;
|
2005-02-23 02:30:09 +03:00
|
|
|
} else {
|
2002-10-31 22:49:52 +03:00
|
|
|
/*
|
2005-02-23 02:30:09 +03:00
|
|
|
* We unfortunately can't just call plug_closing(),
|
2002-10-31 22:49:52 +03:00
|
|
|
* because it's quite likely that we're currently
|
|
|
|
* _in_ a call from the code we'd be calling back
|
|
|
|
* to, so we'd have to make half the SSH code
|
|
|
|
* reentrant. Instead we flag a pending error on
|
|
|
|
* the socket, to be dealt with (by calling
|
|
|
|
* plug_closing()) at some suitable future moment.
|
|
|
|
*/
|
|
|
|
s->pending_error = err;
|
2011-12-08 23:15:57 +04:00
|
|
|
/*
|
|
|
|
* Immediately cease selecting on this socket, so that
|
|
|
|
* we don't tight-loop repeatedly trying to do
|
|
|
|
* whatever it was that went wrong.
|
|
|
|
*/
|
|
|
|
uxsel_tell(s);
|
|
|
|
/*
|
2013-08-17 20:06:27 +04:00
|
|
|
* Arrange to be called back from the top level to
|
|
|
|
* deal with the error condition on this socket.
|
2011-12-08 23:15:57 +04:00
|
|
|
*/
|
2013-08-17 20:06:27 +04:00
|
|
|
queue_toplevel_callback(socket_error_callback, s);
|
2002-10-31 22:49:52 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (s->sending_oob) {
|
|
|
|
if (nsent < len) {
|
|
|
|
memmove(s->oobdata, s->oobdata+nsent, len-nsent);
|
|
|
|
s->sending_oob = len - nsent;
|
|
|
|
} else {
|
|
|
|
s->sending_oob = 0;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
bufchain_consume(&s->output_data, nsent);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2011-09-13 15:44:03 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If we reach here, we've finished sending everything we might
|
|
|
|
* have needed to send. Send EOF, if we need to.
|
|
|
|
*/
|
|
|
|
if (s->outgoingeof == EOF_PENDING) {
|
|
|
|
shutdown(s->s, SHUT_WR);
|
|
|
|
s->outgoingeof = EOF_SENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Also update the select status, because we don't need to select
|
|
|
|
* for writing any more.
|
|
|
|
*/
|
2003-03-29 19:47:06 +03:00
|
|
|
uxsel_tell(s);
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
2003-01-10 21:33:35 +03:00
|
|
|
static int sk_tcp_write(Socket sock, const char *buf, int len)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket) sock;
|
|
|
|
|
2011-09-13 15:44:03 +04:00
|
|
|
assert(s->outgoingeof == EOF_NO);
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
/*
|
|
|
|
* Add the data to the buffer list on the socket.
|
|
|
|
*/
|
|
|
|
bufchain_add(&s->output_data, buf, len);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now try sending from the start of the buffer list.
|
|
|
|
*/
|
|
|
|
if (s->writable)
|
|
|
|
try_send(s);
|
|
|
|
|
2003-04-18 13:00:37 +04:00
|
|
|
/*
|
|
|
|
* Update the select() status to correctly reflect whether or
|
|
|
|
* not we should be selecting for write.
|
|
|
|
*/
|
|
|
|
uxsel_tell(s);
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
return bufchain_size(&s->output_data);
|
|
|
|
}
|
|
|
|
|
2003-01-10 21:33:35 +03:00
|
|
|
static int sk_tcp_write_oob(Socket sock, const char *buf, int len)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket) sock;
|
|
|
|
|
2011-09-13 15:44:03 +04:00
|
|
|
assert(s->outgoingeof == EOF_NO);
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
/*
|
|
|
|
* Replace the buffer list on the socket with the data.
|
|
|
|
*/
|
|
|
|
bufchain_clear(&s->output_data);
|
|
|
|
assert(len <= sizeof(s->oobdata));
|
|
|
|
memcpy(s->oobdata, buf, len);
|
|
|
|
s->sending_oob = len;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now try sending from the start of the buffer list.
|
|
|
|
*/
|
|
|
|
if (s->writable)
|
|
|
|
try_send(s);
|
|
|
|
|
2003-04-18 13:00:37 +04:00
|
|
|
/*
|
|
|
|
* Update the select() status to correctly reflect whether or
|
|
|
|
* not we should be selecting for write.
|
|
|
|
*/
|
|
|
|
uxsel_tell(s);
|
|
|
|
|
2002-10-31 22:49:52 +03:00
|
|
|
return s->sending_oob;
|
|
|
|
}
|
|
|
|
|
2011-09-13 15:44:03 +04:00
|
|
|
static void sk_tcp_write_eof(Socket sock)
|
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket) sock;
|
|
|
|
|
|
|
|
assert(s->outgoingeof == EOF_NO);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Mark the socket as pending outgoing EOF.
|
|
|
|
*/
|
|
|
|
s->outgoingeof = EOF_PENDING;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now try sending from the start of the buffer list.
|
|
|
|
*/
|
|
|
|
if (s->writable)
|
|
|
|
try_send(s);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Update the select() status to correctly reflect whether or
|
|
|
|
* not we should be selecting for write.
|
|
|
|
*/
|
|
|
|
uxsel_tell(s);
|
|
|
|
}
|
|
|
|
|
2003-03-29 19:47:06 +03:00
|
|
|
static int net_select_result(int fd, int event)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
char buf[20480]; /* nice big buffer for plenty of speed */
|
|
|
|
Actual_Socket s;
|
|
|
|
u_long atmark;
|
|
|
|
|
|
|
|
/* Find the Socket structure */
|
2003-05-10 12:35:54 +04:00
|
|
|
s = find234(sktree, &fd, cmpforsearch);
|
2002-10-31 22:49:52 +03:00
|
|
|
if (!s)
|
|
|
|
return 1; /* boggle */
|
|
|
|
|
|
|
|
noise_ultralight(event);
|
|
|
|
|
|
|
|
switch (event) {
|
|
|
|
case 4: /* exceptional */
|
|
|
|
if (!s->oobinline) {
|
|
|
|
/*
|
|
|
|
* On a non-oobinline socket, this indicates that we
|
|
|
|
* can immediately perform an OOB read and get back OOB
|
|
|
|
* data, which we will send to the back end with
|
|
|
|
* type==2 (urgent data).
|
|
|
|
*/
|
|
|
|
ret = recv(s->s, buf, sizeof(buf), MSG_OOB);
|
|
|
|
noise_ultralight(ret);
|
|
|
|
if (ret <= 0) {
|
2005-02-23 02:30:09 +03:00
|
|
|
return plug_closing(s->plug,
|
|
|
|
ret == 0 ? "Internal networking trouble" :
|
|
|
|
strerror(errno), errno, 0);
|
2002-10-31 22:49:52 +03:00
|
|
|
} else {
|
2005-01-16 17:29:34 +03:00
|
|
|
/*
|
|
|
|
* Receiving actual data on a socket means we can
|
|
|
|
* stop falling back through the candidate
|
|
|
|
* addresses to connect to.
|
|
|
|
*/
|
|
|
|
if (s->addr) {
|
|
|
|
sk_addr_free(s->addr);
|
|
|
|
s->addr = NULL;
|
|
|
|
}
|
2002-10-31 22:49:52 +03:00
|
|
|
return plug_receive(s->plug, 2, buf, ret);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we reach here, this is an oobinline socket, which
|
2002-11-01 16:36:48 +03:00
|
|
|
* means we should set s->oobpending and then deal with it
|
|
|
|
* when we get called for the readability event (which
|
|
|
|
* should also occur).
|
2002-10-31 22:49:52 +03:00
|
|
|
*/
|
|
|
|
s->oobpending = TRUE;
|
2002-11-01 16:36:48 +03:00
|
|
|
break;
|
2002-10-31 22:49:52 +03:00
|
|
|
case 1: /* readable; also acceptance */
|
|
|
|
if (s->listener) {
|
|
|
|
/*
|
|
|
|
* On a listening socket, the readability event means a
|
|
|
|
* connection is ready to be accepted.
|
|
|
|
*/
|
2009-08-07 02:55:15 +04:00
|
|
|
union sockaddr_union su;
|
|
|
|
socklen_t addrlen = sizeof(su);
|
2013-11-17 18:03:55 +04:00
|
|
|
accept_ctx_t actx;
|
2002-10-31 22:49:52 +03:00
|
|
|
int t; /* socket of connection */
|
|
|
|
|
2009-08-07 02:55:15 +04:00
|
|
|
memset(&su, 0, addrlen);
|
|
|
|
t = accept(s->s, &su.sa, &addrlen);
|
2002-10-31 22:49:52 +03:00
|
|
|
if (t < 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2013-07-19 22:10:02 +04:00
|
|
|
nonblock(t);
|
2013-11-17 18:03:55 +04:00
|
|
|
actx.i = t;
|
2008-02-21 12:18:24 +03:00
|
|
|
|
2013-11-17 18:04:29 +04:00
|
|
|
if ((!s->addr || s->addr->superfamily != UNIX) &&
|
|
|
|
s->localhost_only && !sockaddr_is_loopback(&su.sa)) {
|
2002-10-31 22:49:52 +03:00
|
|
|
close(t); /* someone let nonlocal through?! */
|
2013-11-17 18:03:55 +04:00
|
|
|
} else if (plug_accepting(s->plug, sk_tcp_accept, actx)) {
|
2002-10-31 22:49:52 +03:00
|
|
|
close(t); /* denied or error */
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we reach here, this is not a listening socket, so
|
|
|
|
* readability really means readability.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* In the case the socket is still frozen, we don't even bother */
|
2013-07-21 11:40:36 +04:00
|
|
|
if (s->frozen)
|
2002-10-31 22:49:52 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We have received data on the socket. For an oobinline
|
|
|
|
* socket, this might be data _before_ an urgent pointer,
|
|
|
|
* in which case we send it to the back end with type==1
|
|
|
|
* (data prior to urgent).
|
|
|
|
*/
|
|
|
|
if (s->oobinline && s->oobpending) {
|
|
|
|
atmark = 1;
|
|
|
|
if (ioctl(s->s, SIOCATMARK, &atmark) == 0 && atmark)
|
|
|
|
s->oobpending = FALSE; /* clear this indicator */
|
|
|
|
} else
|
|
|
|
atmark = 1;
|
|
|
|
|
2002-11-01 16:36:48 +03:00
|
|
|
ret = recv(s->s, buf, s->oobpending ? 1 : sizeof(buf), 0);
|
2002-10-31 22:49:52 +03:00
|
|
|
noise_ultralight(ret);
|
|
|
|
if (ret < 0) {
|
|
|
|
if (errno == EWOULDBLOCK) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ret < 0) {
|
2005-01-16 17:29:34 +03:00
|
|
|
/*
|
|
|
|
* An error at this point _might_ be an error reported
|
|
|
|
* by a non-blocking connect(). So before we return a
|
|
|
|
* panic status to the user, let's just see whether
|
|
|
|
* that's the case.
|
|
|
|
*/
|
|
|
|
int err = errno;
|
|
|
|
if (s->addr) {
|
|
|
|
plug_log(s->plug, 1, s->addr, s->port, strerror(err), err);
|
2017-01-23 20:51:03 +03:00
|
|
|
while (err && s->addr && sk_nextaddr(s->addr, &s->step)) {
|
2005-01-16 17:29:34 +03:00
|
|
|
err = try_connect(s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (err != 0)
|
|
|
|
return plug_closing(s->plug, strerror(err), err, 0);
|
2002-10-31 22:49:52 +03:00
|
|
|
} else if (0 == ret) {
|
2011-09-13 15:44:03 +04:00
|
|
|
s->incomingeof = TRUE; /* stop trying to read now */
|
|
|
|
uxsel_tell(s);
|
2002-10-31 22:49:52 +03:00
|
|
|
return plug_closing(s->plug, NULL, 0, 0);
|
|
|
|
} else {
|
2005-01-16 17:29:34 +03:00
|
|
|
/*
|
|
|
|
* Receiving actual data on a socket means we can
|
|
|
|
* stop falling back through the candidate
|
|
|
|
* addresses to connect to.
|
|
|
|
*/
|
|
|
|
if (s->addr) {
|
|
|
|
sk_addr_free(s->addr);
|
|
|
|
s->addr = NULL;
|
|
|
|
}
|
2002-10-31 22:49:52 +03:00
|
|
|
return plug_receive(s->plug, atmark ? 0 : 1, buf, ret);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 2: /* writable */
|
2003-01-09 21:14:24 +03:00
|
|
|
if (!s->connected) {
|
|
|
|
/*
|
|
|
|
* select() reports a socket as _writable_ when an
|
|
|
|
* asynchronous connection is completed.
|
|
|
|
*/
|
|
|
|
s->connected = s->writable = 1;
|
2003-03-29 19:47:06 +03:00
|
|
|
uxsel_tell(s);
|
2003-01-09 21:14:24 +03:00
|
|
|
break;
|
|
|
|
} else {
|
2002-10-31 22:49:52 +03:00
|
|
|
int bufsize_before, bufsize_after;
|
|
|
|
s->writable = 1;
|
|
|
|
bufsize_before = s->sending_oob + bufchain_size(&s->output_data);
|
|
|
|
try_send(s);
|
|
|
|
bufsize_after = s->sending_oob + bufchain_size(&s->output_data);
|
|
|
|
if (bufsize_after < bufsize_before)
|
|
|
|
plug_sent(s->plug, bufsize_after);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Special error values are returned from sk_namelookup and sk_new
|
|
|
|
* if there's a problem. These functions extract an error message,
|
|
|
|
* or return NULL if there's no problem.
|
|
|
|
*/
|
2003-05-04 18:18:18 +04:00
|
|
|
const char *sk_addr_error(SockAddr addr)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
|
|
|
return addr->error;
|
|
|
|
}
|
2003-05-04 18:18:18 +04:00
|
|
|
static const char *sk_tcp_socket_error(Socket sock)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket) sock;
|
|
|
|
return s->error;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sk_tcp_set_frozen(Socket sock, int is_frozen)
|
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket) sock;
|
|
|
|
if (s->frozen == is_frozen)
|
|
|
|
return;
|
|
|
|
s->frozen = is_frozen;
|
2003-03-29 19:47:06 +03:00
|
|
|
uxsel_tell(s);
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
2015-05-18 15:57:45 +03:00
|
|
|
static char *sk_tcp_peer_info(Socket sock)
|
|
|
|
{
|
|
|
|
Actual_Socket s = (Actual_Socket) sock;
|
2016-01-29 00:22:07 +03:00
|
|
|
union sockaddr_union addr;
|
2015-05-18 15:57:45 +03:00
|
|
|
socklen_t addrlen = sizeof(addr);
|
2016-01-29 00:22:07 +03:00
|
|
|
#ifndef NO_IPV6
|
2015-05-18 15:57:45 +03:00
|
|
|
char buf[INET6_ADDRSTRLEN];
|
2016-01-29 00:22:07 +03:00
|
|
|
#endif
|
2015-05-18 15:57:45 +03:00
|
|
|
|
2016-01-29 00:22:07 +03:00
|
|
|
if (getpeername(s->s, &addr.sa, &addrlen) < 0)
|
2015-05-18 15:57:45 +03:00
|
|
|
return NULL;
|
2016-01-29 00:22:07 +03:00
|
|
|
if (addr.storage.ss_family == AF_INET) {
|
2015-05-18 15:57:45 +03:00
|
|
|
return dupprintf
|
|
|
|
("%s:%d",
|
2016-01-29 00:22:07 +03:00
|
|
|
inet_ntoa(addr.sin.sin_addr),
|
|
|
|
(int)ntohs(addr.sin.sin_port));
|
2015-05-18 15:57:45 +03:00
|
|
|
#ifndef NO_IPV6
|
2016-01-29 00:22:07 +03:00
|
|
|
} else if (addr.storage.ss_family == AF_INET6) {
|
2015-05-18 15:57:45 +03:00
|
|
|
return dupprintf
|
|
|
|
("[%s]:%d",
|
2016-01-29 00:22:07 +03:00
|
|
|
inet_ntop(AF_INET6, &addr.sin6.sin6_addr, buf, sizeof(buf)),
|
|
|
|
(int)ntohs(addr.sin6.sin6_port));
|
2015-05-18 15:57:45 +03:00
|
|
|
#endif
|
2016-01-29 00:22:07 +03:00
|
|
|
} else if (addr.storage.ss_family == AF_UNIX) {
|
2015-05-18 15:57:45 +03:00
|
|
|
/*
|
|
|
|
* For Unix sockets, the source address is unlikely to be
|
|
|
|
* helpful. Instead, we try SO_PEERCRED and try to get the
|
|
|
|
* source pid.
|
|
|
|
*/
|
|
|
|
int pid, uid, gid;
|
|
|
|
if (so_peercred(s->s, &pid, &uid, &gid)) {
|
|
|
|
char uidbuf[64], gidbuf[64];
|
|
|
|
sprintf(uidbuf, "%d", uid);
|
|
|
|
sprintf(gidbuf, "%d", gid);
|
|
|
|
struct passwd *pw = getpwuid(uid);
|
|
|
|
struct group *gr = getgrgid(gid);
|
|
|
|
return dupprintf("pid %d (%s:%s)", pid,
|
|
|
|
pw ? pw->pw_name : uidbuf,
|
|
|
|
gr ? gr->gr_name : gidbuf);
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
} else {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-03-29 19:47:06 +03:00
|
|
|
static void uxsel_tell(Actual_Socket s)
|
2002-10-31 22:49:52 +03:00
|
|
|
{
|
2003-03-29 19:47:06 +03:00
|
|
|
int rwx = 0;
|
2011-12-08 23:15:57 +04:00
|
|
|
if (!s->pending_error) {
|
|
|
|
if (s->listener) {
|
|
|
|
rwx |= 1; /* read == accept */
|
|
|
|
} else {
|
|
|
|
if (!s->connected)
|
|
|
|
rwx |= 2; /* write == connect */
|
|
|
|
if (s->connected && !s->frozen && !s->incomingeof)
|
|
|
|
rwx |= 1 | 4; /* read, except */
|
|
|
|
if (bufchain_size(&s->output_data))
|
|
|
|
rwx |= 2; /* write */
|
|
|
|
}
|
2005-02-16 14:44:44 +03:00
|
|
|
}
|
2003-03-29 19:47:06 +03:00
|
|
|
uxsel_set(s->s, rwx, net_select_result);
|
2002-10-31 22:49:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
int net_service_lookup(char *service)
|
|
|
|
{
|
|
|
|
struct servent *se;
|
|
|
|
se = getservbyname(service, NULL);
|
|
|
|
if (se != NULL)
|
|
|
|
return ntohs(se->s_port);
|
|
|
|
else
|
|
|
|
return 0;
|
|
|
|
}
|
2004-05-31 18:01:52 +04:00
|
|
|
|
Since r8305, Unix PuTTY has always "upgraded" an X11 display like "localhost:0"
to a Unix-domain socket. This typically works fine when PuTTY is run on the
same machine as the X server, but it's broken multi-hop X forwarding through
OpenSSH; when OpenSSH creates a proxy X server "localhost:10", it only listens
on TCP, not on a Unix-domain socket.
Instead, when deciding on the details of the display, we actively probe to see
if there's a Unix-domain socket we can use instead, and only use it if it's
there, falling back to the specified IP "localhost" if not.
Independently, when looking for local auth details in Xauthority for a
"localhost" TCP display, we prefer a matching Unix-domain entry, but will fall
back to an IP "localhost" entry (which would be unusual, but we don't trust a
Windows X server not to do it) -- this is a generalisation of the special case
added in r2538 (but removed in r8305, as the automatic upgrade masked the need
for it).
(This is now done in platform-independent code, so a side-effect is that
get_hostname() is now part of the networking abstraction on all platforms.)
[originally from svn r8462]
[r2538 == fda998324345ba50a913655754303ce8f0a4cfde]
[r8305 == ca6fc3a4daf51166a15693feffc967bee9e3f59a]
2009-02-24 04:01:23 +03:00
|
|
|
char *get_hostname(void)
|
|
|
|
{
|
|
|
|
int len = 128;
|
|
|
|
char *hostname = NULL;
|
|
|
|
do {
|
|
|
|
len *= 2;
|
|
|
|
hostname = sresize(hostname, len, char);
|
|
|
|
if ((gethostname(hostname, len) < 0) &&
|
|
|
|
(errno != ENAMETOOLONG)) {
|
|
|
|
sfree(hostname);
|
|
|
|
hostname = NULL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} while (strlen(hostname) >= len-1);
|
|
|
|
return hostname;
|
|
|
|
}
|
|
|
|
|
2008-11-17 21:38:09 +03:00
|
|
|
SockAddr platform_get_x11_unix_address(const char *sockpath, int displaynum)
|
2004-05-31 18:01:52 +04:00
|
|
|
{
|
|
|
|
SockAddr ret = snew(struct SockAddr_tag);
|
|
|
|
int n;
|
|
|
|
|
|
|
|
memset(ret, 0, sizeof *ret);
|
2008-11-08 19:45:45 +03:00
|
|
|
ret->superfamily = UNIX;
|
2008-05-28 23:23:57 +04:00
|
|
|
/*
|
2008-11-17 21:38:09 +03:00
|
|
|
* In special circumstances (notably Mac OS X Leopard), we'll
|
|
|
|
* have been passed an explicit Unix socket path.
|
2008-05-28 23:23:57 +04:00
|
|
|
*/
|
2008-11-17 21:38:09 +03:00
|
|
|
if (sockpath) {
|
2008-05-28 23:23:57 +04:00
|
|
|
n = snprintf(ret->hostname, sizeof ret->hostname,
|
2008-11-17 21:38:09 +03:00
|
|
|
"%s", sockpath);
|
2008-05-28 23:23:57 +04:00
|
|
|
} else {
|
|
|
|
n = snprintf(ret->hostname, sizeof ret->hostname,
|
|
|
|
"%s%d", X11_UNIX_PATH, displaynum);
|
|
|
|
}
|
2008-11-17 21:38:09 +03:00
|
|
|
|
|
|
|
if (n < 0)
|
2004-05-31 18:01:52 +04:00
|
|
|
ret->error = "snprintf failed";
|
2008-11-17 21:38:09 +03:00
|
|
|
else if (n >= sizeof ret->hostname)
|
2004-05-31 18:01:52 +04:00
|
|
|
ret->error = "X11 UNIX name too long";
|
2008-11-17 21:38:09 +03:00
|
|
|
|
2005-01-16 17:29:34 +03:00
|
|
|
#ifndef NO_IPV6
|
2008-11-08 19:45:45 +03:00
|
|
|
ret->ais = NULL;
|
2005-01-16 17:29:34 +03:00
|
|
|
#else
|
|
|
|
ret->addresses = NULL;
|
2008-11-08 19:45:45 +03:00
|
|
|
ret->naddresses = 0;
|
2005-01-16 17:29:34 +03:00
|
|
|
#endif
|
2008-11-08 19:58:55 +03:00
|
|
|
ret->refcount = 1;
|
2004-05-31 18:01:52 +04:00
|
|
|
return ret;
|
|
|
|
}
|
2013-11-17 18:04:29 +04:00
|
|
|
|
|
|
|
SockAddr unix_sock_addr(const char *path)
|
|
|
|
{
|
|
|
|
SockAddr ret = snew(struct SockAddr_tag);
|
|
|
|
int n;
|
|
|
|
|
|
|
|
memset(ret, 0, sizeof *ret);
|
|
|
|
ret->superfamily = UNIX;
|
|
|
|
n = snprintf(ret->hostname, sizeof ret->hostname, "%s", path);
|
|
|
|
|
|
|
|
if (n < 0)
|
|
|
|
ret->error = "snprintf failed";
|
|
|
|
else if (n >= sizeof ret->hostname)
|
|
|
|
ret->error = "socket pathname too long";
|
|
|
|
|
|
|
|
#ifndef NO_IPV6
|
|
|
|
ret->ais = NULL;
|
|
|
|
#else
|
|
|
|
ret->addresses = NULL;
|
|
|
|
ret->naddresses = 0;
|
|
|
|
#endif
|
|
|
|
ret->refcount = 1;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
Socket new_unix_listener(SockAddr listenaddr, Plug plug)
|
|
|
|
{
|
|
|
|
int s;
|
|
|
|
union sockaddr_union u;
|
|
|
|
union sockaddr_union *addr;
|
|
|
|
int addrlen;
|
|
|
|
Actual_Socket ret;
|
|
|
|
int retcode;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create Socket structure.
|
|
|
|
*/
|
|
|
|
ret = snew(struct Socket_tag);
|
|
|
|
ret->fn = &tcp_fn_table;
|
|
|
|
ret->error = NULL;
|
|
|
|
ret->plug = plug;
|
|
|
|
bufchain_init(&ret->output_data);
|
|
|
|
ret->writable = 0; /* to start with */
|
|
|
|
ret->sending_oob = 0;
|
|
|
|
ret->frozen = 0;
|
|
|
|
ret->localhost_only = TRUE;
|
|
|
|
ret->pending_error = 0;
|
|
|
|
ret->parent = ret->child = NULL;
|
|
|
|
ret->oobpending = FALSE;
|
|
|
|
ret->outgoingeof = EOF_NO;
|
|
|
|
ret->incomingeof = FALSE;
|
|
|
|
ret->listener = 1;
|
|
|
|
ret->addr = listenaddr;
|
2013-11-17 18:04:33 +04:00
|
|
|
ret->s = -1;
|
2013-11-17 18:04:29 +04:00
|
|
|
|
|
|
|
assert(listenaddr->superfamily == UNIX);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Open socket.
|
|
|
|
*/
|
|
|
|
s = socket(AF_UNIX, SOCK_STREAM, 0);
|
|
|
|
if (s < 0) {
|
|
|
|
ret->error = strerror(errno);
|
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
cloexec(s);
|
|
|
|
|
|
|
|
ret->oobinline = 0;
|
|
|
|
|
|
|
|
memset(&u, '\0', sizeof(u));
|
|
|
|
u.su.sun_family = AF_UNIX;
|
|
|
|
strncpy(u.su.sun_path, listenaddr->hostname, sizeof(u.su.sun_path)-1);
|
|
|
|
addr = &u;
|
|
|
|
addrlen = sizeof(u.su);
|
|
|
|
|
|
|
|
if (unlink(u.su.sun_path) < 0 && errno != ENOENT) {
|
|
|
|
close(s);
|
|
|
|
ret->error = strerror(errno);
|
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
retcode = bind(s, &addr->sa, addrlen);
|
|
|
|
if (retcode < 0) {
|
|
|
|
close(s);
|
|
|
|
ret->error = strerror(errno);
|
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (listen(s, SOMAXCONN) < 0) {
|
|
|
|
close(s);
|
|
|
|
ret->error = strerror(errno);
|
|
|
|
return (Socket) ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret->s = s;
|
|
|
|
|
|
|
|
uxsel_tell(ret);
|
|
|
|
add234(sktree, ret);
|
|
|
|
|
|
|
|
return (Socket) ret;
|
|
|
|
}
|