source: MondoRescue/branches/2.2.9/mindi-busybox/libbb/xconnect.c@ 2725

Last change on this file since 2725 was 2725, checked in by Bruno Cornec, 13 years ago
  • Update mindi-busybox to 1.18.3 to avoid problems with the tar command which is now failing on recent versions with busybox 1.7.3
File size: 12.3 KB
RevLine 
[821]1/* vi: set sw=4 ts=4: */
2/*
3 * Utility routines.
4 *
5 * Connect to host at port using address resolution from getaddrinfo
6 *
[2725]7 * Licensed under GPLv2, see file LICENSE in this source tree.
[821]8 */
9
[2725]10#include <sys/types.h>
11#include <sys/socket.h> /* netinet/in.h needs it */
[821]12#include <netinet/in.h>
[2725]13#include <net/if.h>
14#include <sys/un.h>
[821]15#include "libbb.h"
16
[2725]17void FAST_FUNC setsockopt_reuseaddr(int fd)
[1765]18{
19 setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &const_int_1, sizeof(const_int_1));
20}
[2725]21int FAST_FUNC setsockopt_broadcast(int fd)
[1765]22{
23 return setsockopt(fd, SOL_SOCKET, SO_BROADCAST, &const_int_1, sizeof(const_int_1));
24}
25
[2725]26#ifdef SO_BINDTODEVICE
27int FAST_FUNC setsockopt_bindtodevice(int fd, const char *iface)
[1765]28{
[2725]29 int r;
30 struct ifreq ifr;
31 strncpy_IFNAMSIZ(ifr.ifr_name, iface);
32 /* NB: passing (iface, strlen(iface) + 1) does not work!
33 * (maybe it works on _some_ kernels, but not on 2.6.26)
34 * Actually, ifr_name is at offset 0, and in practice
35 * just giving char[IFNAMSIZ] instead of struct ifreq works too.
36 * But just in case it's not true on some obscure arch... */
37 r = setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr));
38 if (r)
39 bb_perror_msg("can't bind to interface %s", iface);
40 return r;
41}
42#else
43int FAST_FUNC setsockopt_bindtodevice(int fd UNUSED_PARAM,
44 const char *iface UNUSED_PARAM)
45{
46 bb_error_msg("SO_BINDTODEVICE is not supported on this system");
47 return -1;
48}
49#endif
50
51static len_and_sockaddr* get_lsa(int fd, int (*get_name)(int fd, struct sockaddr *addr, socklen_t *addrlen))
52{
53 len_and_sockaddr lsa;
54 len_and_sockaddr *lsa_ptr;
55
56 lsa.len = LSA_SIZEOF_SA;
57 if (get_name(fd, &lsa.u.sa, &lsa.len) != 0)
58 return NULL;
59
60 lsa_ptr = xzalloc(LSA_LEN_SIZE + lsa.len);
61 if (lsa.len > LSA_SIZEOF_SA) { /* rarely (if ever) happens */
62 lsa_ptr->len = lsa.len;
63 get_name(fd, &lsa_ptr->u.sa, &lsa_ptr->len);
64 } else {
65 memcpy(lsa_ptr, &lsa, LSA_LEN_SIZE + lsa.len);
66 }
67 return lsa_ptr;
68}
69
70len_and_sockaddr* FAST_FUNC get_sock_lsa(int fd)
71{
72 return get_lsa(fd, getsockname);
73}
74
75len_and_sockaddr* FAST_FUNC get_peer_lsa(int fd)
76{
77 return get_lsa(fd, getpeername);
78}
79
80void FAST_FUNC xconnect(int s, const struct sockaddr *s_addr, socklen_t addrlen)
81{
[1765]82 if (connect(s, s_addr, addrlen) < 0) {
83 if (ENABLE_FEATURE_CLEAN_UP)
84 close(s);
85 if (s_addr->sa_family == AF_INET)
86 bb_perror_msg_and_die("%s (%s)",
[2725]87 "can't connect to remote host",
[1765]88 inet_ntoa(((struct sockaddr_in *)s_addr)->sin_addr));
[2725]89 bb_perror_msg_and_die("can't connect to remote host");
[1765]90 }
91}
92
93/* Return port number for a service.
[821]94 * If "port" is a number use it as the port.
[2725]95 * If "port" is a name it is looked up in /etc/services,
96 * if it isnt found return default_port
97 */
98unsigned FAST_FUNC bb_lookup_port(const char *port, const char *protocol, unsigned default_port)
[821]99{
[1765]100 unsigned port_nr = default_port;
[821]101 if (port) {
102 int old_errno;
103
104 /* Since this is a lib function, we're not allowed to reset errno to 0.
105 * Doing so could break an app that is deferring checking of errno. */
106 old_errno = errno;
[1765]107 port_nr = bb_strtou(port, NULL, 10);
108 if (errno || port_nr > 65535) {
[821]109 struct servent *tserv = getservbyname(port, protocol);
[1765]110 port_nr = default_port;
111 if (tserv)
112 port_nr = ntohs(tserv->s_port);
[821]113 }
114 errno = old_errno;
115 }
[1765]116 return (uint16_t)port_nr;
[821]117}
118
[1765]119
120/* "New" networking API */
121
122
[2725]123int FAST_FUNC get_nport(const struct sockaddr *sa)
[1765]124{
125#if ENABLE_FEATURE_IPV6
126 if (sa->sa_family == AF_INET6) {
127 return ((struct sockaddr_in6*)sa)->sin6_port;
128 }
129#endif
130 if (sa->sa_family == AF_INET) {
131 return ((struct sockaddr_in*)sa)->sin_port;
132 }
133 /* What? UNIX socket? IPX?? :) */
134 return -1;
135}
136
[2725]137void FAST_FUNC set_nport(len_and_sockaddr *lsa, unsigned port)
[1765]138{
139#if ENABLE_FEATURE_IPV6
[2725]140 if (lsa->u.sa.sa_family == AF_INET6) {
141 lsa->u.sin6.sin6_port = port;
[1765]142 return;
143 }
144#endif
[2725]145 if (lsa->u.sa.sa_family == AF_INET) {
146 lsa->u.sin.sin_port = port;
[1765]147 return;
148 }
149 /* What? UNIX socket? IPX?? :) */
150}
151
152/* We hijack this constant to mean something else */
153/* It doesn't hurt because we will remove this bit anyway */
154#define DIE_ON_ERROR AI_CANONNAME
155
156/* host: "1.2.3.4[:port]", "www.google.com[:port]"
157 * port: if neither of above specifies port # */
158static len_and_sockaddr* str2sockaddr(
159 const char *host, int port,
[2725]160IF_FEATURE_IPV6(sa_family_t af,)
[1765]161 int ai_flags)
162{
[2725]163IF_NOT_FEATURE_IPV6(sa_family_t af = AF_INET;)
[1765]164 int rc;
[2725]165 len_and_sockaddr *r;
[1765]166 struct addrinfo *result = NULL;
[2725]167 struct addrinfo *used_res;
[1765]168 const char *org_host = host; /* only for error msg */
169 const char *cp;
170 struct addrinfo hint;
171
[2725]172 if (ENABLE_FEATURE_UNIX_LOCAL && strncmp(host, "local:", 6) == 0) {
173 struct sockaddr_un *sun;
174
175 r = xzalloc(LSA_LEN_SIZE + sizeof(struct sockaddr_un));
176 r->len = sizeof(struct sockaddr_un);
177 r->u.sa.sa_family = AF_UNIX;
178 sun = (struct sockaddr_un *)&r->u.sa;
179 safe_strncpy(sun->sun_path, host + 6, sizeof(sun->sun_path));
180 return r;
181 }
182
183 r = NULL;
184
[1765]185 /* Ugly parsing of host:addr */
186 if (ENABLE_FEATURE_IPV6 && host[0] == '[') {
[2725]187 /* Even uglier parsing of [xx]:nn */
[1765]188 host++;
189 cp = strchr(host, ']');
[2725]190 if (!cp || (cp[1] != ':' && cp[1] != '\0')) {
191 /* Malformed: must be [xx]:nn or [xx] */
192 bb_error_msg("bad address '%s'", org_host);
193 if (ai_flags & DIE_ON_ERROR)
194 xfunc_die();
195 return NULL;
196 }
[1765]197 } else {
198 cp = strrchr(host, ':');
199 if (ENABLE_FEATURE_IPV6 && cp && strchr(host, ':') != cp) {
200 /* There is more than one ':' (e.g. "::1") */
201 cp = NULL; /* it's not a port spec */
202 }
203 }
[2725]204 if (cp) { /* points to ":" or "]:" */
[1765]205 int sz = cp - host + 1;
[2725]206
[1765]207 host = safe_strncpy(alloca(sz), host, sz);
[2725]208 if (ENABLE_FEATURE_IPV6 && *cp != ':') {
[1765]209 cp++; /* skip ']' */
[2725]210 if (*cp == '\0') /* [xx] without port */
211 goto skip;
212 }
[1765]213 cp++; /* skip ':' */
[2725]214 port = bb_strtou(cp, NULL, 10);
215 if (errno || (unsigned)port > 0xffff) {
216 bb_error_msg("bad port spec '%s'", org_host);
217 if (ai_flags & DIE_ON_ERROR)
218 xfunc_die();
219 return NULL;
220 }
221 skip: ;
[1765]222 }
223
[2725]224 /* Next two if blocks allow to skip getaddrinfo()
225 * in case host name is a numeric IP(v6) address.
226 * getaddrinfo() initializes DNS resolution machinery,
227 * scans network config and such - tens of syscalls.
228 */
229 /* If we were not asked specifically for IPv6,
230 * check whether this is a numeric IPv4 */
231 IF_FEATURE_IPV6(if(af != AF_INET6)) {
232 struct in_addr in4;
233 if (inet_aton(host, &in4) != 0) {
234 r = xzalloc(LSA_LEN_SIZE + sizeof(struct sockaddr_in));
235 r->len = sizeof(struct sockaddr_in);
236 r->u.sa.sa_family = AF_INET;
237 r->u.sin.sin_addr = in4;
238 goto set_port;
239 }
240 }
241#if ENABLE_FEATURE_IPV6
242 /* If we were not asked specifically for IPv4,
243 * check whether this is a numeric IPv6 */
244 if (af != AF_INET) {
245 struct in6_addr in6;
246 if (inet_pton(AF_INET6, host, &in6) > 0) {
247 r = xzalloc(LSA_LEN_SIZE + sizeof(struct sockaddr_in6));
248 r->len = sizeof(struct sockaddr_in6);
249 r->u.sa.sa_family = AF_INET6;
250 r->u.sin6.sin6_addr = in6;
251 goto set_port;
252 }
253 }
254#endif
255
[1765]256 memset(&hint, 0 , sizeof(hint));
257 hint.ai_family = af;
258 /* Needed. Or else we will get each address thrice (or more)
259 * for each possible socket type (tcp,udp,raw...): */
260 hint.ai_socktype = SOCK_STREAM;
261 hint.ai_flags = ai_flags & ~DIE_ON_ERROR;
262 rc = getaddrinfo(host, NULL, &hint, &result);
263 if (rc || !result) {
264 bb_error_msg("bad address '%s'", org_host);
265 if (ai_flags & DIE_ON_ERROR)
266 xfunc_die();
267 goto ret;
268 }
[2725]269 used_res = result;
270#if ENABLE_FEATURE_PREFER_IPV4_ADDRESS
271 while (1) {
272 if (used_res->ai_family == AF_INET)
273 break;
274 used_res = used_res->ai_next;
275 if (!used_res) {
276 used_res = result;
277 break;
278 }
279 }
280#endif
281 r = xmalloc(LSA_LEN_SIZE + used_res->ai_addrlen);
282 r->len = used_res->ai_addrlen;
283 memcpy(&r->u.sa, used_res->ai_addr, used_res->ai_addrlen);
284
285 set_port:
[1765]286 set_nport(r, htons(port));
287 ret:
288 freeaddrinfo(result);
289 return r;
290}
291#if !ENABLE_FEATURE_IPV6
292#define str2sockaddr(host, port, af, ai_flags) str2sockaddr(host, port, ai_flags)
293#endif
294
295#if ENABLE_FEATURE_IPV6
[2725]296len_and_sockaddr* FAST_FUNC host_and_af2sockaddr(const char *host, int port, sa_family_t af)
[1765]297{
298 return str2sockaddr(host, port, af, 0);
299}
300
[2725]301len_and_sockaddr* FAST_FUNC xhost_and_af2sockaddr(const char *host, int port, sa_family_t af)
[1765]302{
303 return str2sockaddr(host, port, af, DIE_ON_ERROR);
304}
305#endif
306
[2725]307len_and_sockaddr* FAST_FUNC host2sockaddr(const char *host, int port)
[1765]308{
309 return str2sockaddr(host, port, AF_UNSPEC, 0);
310}
311
[2725]312len_and_sockaddr* FAST_FUNC xhost2sockaddr(const char *host, int port)
[1765]313{
314 return str2sockaddr(host, port, AF_UNSPEC, DIE_ON_ERROR);
315}
316
[2725]317len_and_sockaddr* FAST_FUNC xdotted2sockaddr(const char *host, int port)
[1765]318{
319 return str2sockaddr(host, port, AF_UNSPEC, AI_NUMERICHOST | DIE_ON_ERROR);
320}
321
[2725]322#undef xsocket_type
323int FAST_FUNC xsocket_type(len_and_sockaddr **lsap, IF_FEATURE_IPV6(int family,) int sock_type)
[1765]324{
[2725]325 IF_NOT_FEATURE_IPV6(enum { family = AF_INET };)
[1765]326 len_and_sockaddr *lsa;
327 int fd;
328 int len;
329
330#if ENABLE_FEATURE_IPV6
331 if (family == AF_UNSPEC) {
332 fd = socket(AF_INET6, sock_type, 0);
333 if (fd >= 0) {
334 family = AF_INET6;
335 goto done;
336 }
337 family = AF_INET;
338 }
339#endif
340 fd = xsocket(family, sock_type, 0);
341 len = sizeof(struct sockaddr_in);
342#if ENABLE_FEATURE_IPV6
343 if (family == AF_INET6) {
344 done:
345 len = sizeof(struct sockaddr_in6);
346 }
347#endif
[2725]348 lsa = xzalloc(LSA_LEN_SIZE + len);
[1765]349 lsa->len = len;
[2725]350 lsa->u.sa.sa_family = family;
[1765]351 *lsap = lsa;
352 return fd;
353}
354
[2725]355int FAST_FUNC xsocket_stream(len_and_sockaddr **lsap)
[1765]356{
[2725]357 return xsocket_type(lsap, IF_FEATURE_IPV6(AF_UNSPEC,) SOCK_STREAM);
[1765]358}
359
360static int create_and_bind_or_die(const char *bindaddr, int port, int sock_type)
361{
362 int fd;
363 len_and_sockaddr *lsa;
364
365 if (bindaddr && bindaddr[0]) {
366 lsa = xdotted2sockaddr(bindaddr, port);
367 /* user specified bind addr dictates family */
[2725]368 fd = xsocket(lsa->u.sa.sa_family, sock_type, 0);
[1765]369 } else {
[2725]370 fd = xsocket_type(&lsa, IF_FEATURE_IPV6(AF_UNSPEC,) sock_type);
[1765]371 set_nport(lsa, htons(port));
372 }
373 setsockopt_reuseaddr(fd);
[2725]374 xbind(fd, &lsa->u.sa, lsa->len);
[1765]375 free(lsa);
376 return fd;
377}
378
[2725]379int FAST_FUNC create_and_bind_stream_or_die(const char *bindaddr, int port)
[1765]380{
381 return create_and_bind_or_die(bindaddr, port, SOCK_STREAM);
382}
383
[2725]384int FAST_FUNC create_and_bind_dgram_or_die(const char *bindaddr, int port)
[1765]385{
386 return create_and_bind_or_die(bindaddr, port, SOCK_DGRAM);
387}
388
389
[2725]390int FAST_FUNC create_and_connect_stream_or_die(const char *peer, int port)
[1765]391{
392 int fd;
393 len_and_sockaddr *lsa;
394
395 lsa = xhost2sockaddr(peer, port);
[2725]396 fd = xsocket(lsa->u.sa.sa_family, SOCK_STREAM, 0);
[1765]397 setsockopt_reuseaddr(fd);
[2725]398 xconnect(fd, &lsa->u.sa, lsa->len);
[1765]399 free(lsa);
400 return fd;
401}
402
[2725]403int FAST_FUNC xconnect_stream(const len_and_sockaddr *lsa)
[1765]404{
[2725]405 int fd = xsocket(lsa->u.sa.sa_family, SOCK_STREAM, 0);
406 xconnect(fd, &lsa->u.sa, lsa->len);
[1765]407 return fd;
408}
409
410/* We hijack this constant to mean something else */
411/* It doesn't hurt because we will add this bit anyway */
412#define IGNORE_PORT NI_NUMERICSERV
[2725]413static char* FAST_FUNC sockaddr2str(const struct sockaddr *sa, int flags)
[1765]414{
415 char host[128];
416 char serv[16];
417 int rc;
418 socklen_t salen;
419
[2725]420 if (ENABLE_FEATURE_UNIX_LOCAL && sa->sa_family == AF_UNIX) {
421 struct sockaddr_un *sun = (struct sockaddr_un *)sa;
422 return xasprintf("local:%.*s",
423 (int) sizeof(sun->sun_path),
424 sun->sun_path);
425 }
426
[1765]427 salen = LSA_SIZEOF_SA;
428#if ENABLE_FEATURE_IPV6
429 if (sa->sa_family == AF_INET)
430 salen = sizeof(struct sockaddr_in);
431 if (sa->sa_family == AF_INET6)
432 salen = sizeof(struct sockaddr_in6);
433#endif
434 rc = getnameinfo(sa, salen,
435 host, sizeof(host),
436 /* can do ((flags & IGNORE_PORT) ? NULL : serv) but why bother? */
437 serv, sizeof(serv),
438 /* do not resolve port# into service _name_ */
439 flags | NI_NUMERICSERV
440 );
441 if (rc)
442 return NULL;
443 if (flags & IGNORE_PORT)
444 return xstrdup(host);
445#if ENABLE_FEATURE_IPV6
446 if (sa->sa_family == AF_INET6) {
447 if (strchr(host, ':')) /* heh, it's not a resolved hostname */
448 return xasprintf("[%s]:%s", host, serv);
449 /*return xasprintf("%s:%s", host, serv);*/
450 /* - fall through instead */
451 }
452#endif
453 /* For now we don't support anything else, so it has to be INET */
454 /*if (sa->sa_family == AF_INET)*/
455 return xasprintf("%s:%s", host, serv);
456 /*return xstrdup(host);*/
457}
458
[2725]459char* FAST_FUNC xmalloc_sockaddr2host(const struct sockaddr *sa)
[1765]460{
461 return sockaddr2str(sa, 0);
462}
463
[2725]464char* FAST_FUNC xmalloc_sockaddr2host_noport(const struct sockaddr *sa)
[1765]465{
466 return sockaddr2str(sa, IGNORE_PORT);
467}
468
[2725]469char* FAST_FUNC xmalloc_sockaddr2hostonly_noport(const struct sockaddr *sa)
[1765]470{
471 return sockaddr2str(sa, NI_NAMEREQD | IGNORE_PORT);
472}
[2725]473char* FAST_FUNC xmalloc_sockaddr2dotted(const struct sockaddr *sa)
[1765]474{
475 return sockaddr2str(sa, NI_NUMERICHOST);
476}
477
[2725]478char* FAST_FUNC xmalloc_sockaddr2dotted_noport(const struct sockaddr *sa)
[1765]479{
480 return sockaddr2str(sa, NI_NUMERICHOST | IGNORE_PORT);
481}
Note: See TracBrowser for help on using the repository browser.