2002-07-03 17:21:44 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
|
|
|
/*
|
|
|
|
* Utility routines.
|
|
|
|
*
|
2004-04-14 23:21:38 +05:30
|
|
|
* Connect to host at port using address resolution from getaddrinfo
|
2002-07-03 17:21:44 +05:30
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2007-01-10 14:58:01 +05:30
|
|
|
#include <netinet/in.h>
|
2002-07-03 17:21:44 +05:30
|
|
|
#include "libbb.h"
|
|
|
|
|
2007-01-10 14:58:01 +05:30
|
|
|
int setsockopt_reuseaddr(int fd)
|
|
|
|
{
|
2007-01-22 19:42:08 +05:30
|
|
|
return setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &const_int_1, sizeof(const_int_1));
|
2007-01-10 14:58:01 +05:30
|
|
|
}
|
|
|
|
int setsockopt_broadcast(int fd)
|
|
|
|
{
|
2007-01-22 19:42:08 +05:30
|
|
|
return setsockopt(fd, SOL_SOCKET, SO_BROADCAST, &const_int_1, sizeof(const_int_1));
|
2007-01-10 14:58:01 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
void xconnect(int s, const struct sockaddr *s_addr, socklen_t addrlen)
|
|
|
|
{
|
|
|
|
if (connect(s, s_addr, addrlen) < 0) {
|
|
|
|
if (ENABLE_FEATURE_CLEAN_UP)
|
|
|
|
close(s);
|
|
|
|
if (s_addr->sa_family == AF_INET)
|
|
|
|
bb_perror_msg_and_die("%s (%s)",
|
|
|
|
"cannot connect to remote host",
|
|
|
|
inet_ntoa(((struct sockaddr_in *)s_addr)->sin_addr));
|
|
|
|
bb_perror_msg_and_die("cannot connect to remote host");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-01-13 02:29:31 +05:30
|
|
|
/* Return port number for a service.
|
2003-12-20 07:17:18 +05:30
|
|
|
* If "port" is a number use it as the port.
|
|
|
|
* If "port" is a name it is looked up in /etc/services, if it isnt found return
|
2007-01-10 14:58:01 +05:30
|
|
|
* default_port */
|
|
|
|
unsigned bb_lookup_port(const char *port, const char *protocol, unsigned default_port)
|
2002-07-03 17:21:44 +05:30
|
|
|
{
|
2007-01-12 16:05:23 +05:30
|
|
|
unsigned port_nr = default_port;
|
2003-12-20 07:17:18 +05:30
|
|
|
if (port) {
|
2003-12-24 02:07:23 +05:30
|
|
|
int old_errno;
|
2002-07-03 17:21:44 +05:30
|
|
|
|
2003-12-24 02:07:23 +05:30
|
|
|
/* Since this is a lib function, we're not allowed to reset errno to 0.
|
|
|
|
* Doing so could break an app that is deferring checking of errno. */
|
|
|
|
old_errno = errno;
|
2007-01-10 14:58:01 +05:30
|
|
|
port_nr = bb_strtou(port, NULL, 10);
|
|
|
|
if (errno || port_nr > 65535) {
|
2004-01-17 10:33:31 +05:30
|
|
|
struct servent *tserv = getservbyname(port, protocol);
|
2007-01-14 02:35:38 +05:30
|
|
|
port_nr = default_port;
|
2007-01-10 14:58:01 +05:30
|
|
|
if (tserv)
|
2007-01-12 16:05:23 +05:30
|
|
|
port_nr = ntohs(tserv->s_port);
|
2003-12-20 07:17:18 +05:30
|
|
|
}
|
2003-12-24 02:07:23 +05:30
|
|
|
errno = old_errno;
|
2002-07-03 17:21:44 +05:30
|
|
|
}
|
2007-01-12 16:05:23 +05:30
|
|
|
return (uint16_t)port_nr;
|
2003-10-31 15:01:46 +05:30
|
|
|
}
|
2002-07-03 17:21:44 +05:30
|
|
|
|
2007-01-10 14:58:01 +05:30
|
|
|
|
|
|
|
/* "Old" networking API - only IPv4 */
|
|
|
|
|
2007-01-22 15:06:41 +05:30
|
|
|
/*
|
2003-12-20 07:17:18 +05:30
|
|
|
void bb_lookup_host(struct sockaddr_in *s_in, const char *host)
|
2003-10-31 15:01:46 +05:30
|
|
|
{
|
|
|
|
struct hostent *he;
|
2002-07-03 17:21:44 +05:30
|
|
|
|
2003-10-31 15:01:46 +05:30
|
|
|
memset(s_in, 0, sizeof(struct sockaddr_in));
|
|
|
|
s_in->sin_family = AF_INET;
|
2002-07-03 17:21:44 +05:30
|
|
|
he = xgethostbyname(host);
|
2003-10-31 15:01:46 +05:30
|
|
|
memcpy(&(s_in->sin_addr), he->h_addr_list[0], he->h_length);
|
|
|
|
}
|
|
|
|
|
2007-01-22 15:06:41 +05:30
|
|
|
|
2006-10-26 06:39:46 +05:30
|
|
|
int xconnect_tcp_v4(struct sockaddr_in *s_addr)
|
|
|
|
{
|
|
|
|
int s = xsocket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
xconnect(s, (struct sockaddr*) s_addr, sizeof(*s_addr));
|
2002-07-03 17:21:44 +05:30
|
|
|
return s;
|
|
|
|
}
|
2007-01-22 15:06:41 +05:30
|
|
|
*/
|
2006-11-23 04:52:06 +05:30
|
|
|
|
2007-01-10 14:58:01 +05:30
|
|
|
/* "New" networking API */
|
2006-11-22 21:40:39 +05:30
|
|
|
|
|
|
|
|
2007-01-13 02:29:31 +05:30
|
|
|
int get_nport(len_and_sockaddr *lsa)
|
|
|
|
{
|
|
|
|
#if ENABLE_FEATURE_IPV6
|
|
|
|
if (lsa->sa.sa_family == AF_INET6) {
|
|
|
|
return lsa->sin6.sin6_port;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (lsa->sa.sa_family == AF_INET) {
|
|
|
|
return lsa->sin.sin_port;
|
|
|
|
}
|
|
|
|
/* What? UNIX socket? IPX?? :) */
|
2007-01-22 15:06:41 +05:30
|
|
|
return -1;
|
2007-01-13 02:29:31 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
void set_nport(len_and_sockaddr *lsa, unsigned port)
|
2007-01-11 22:20:23 +05:30
|
|
|
{
|
|
|
|
#if ENABLE_FEATURE_IPV6
|
|
|
|
if (lsa->sa.sa_family == AF_INET6) {
|
|
|
|
lsa->sin6.sin6_port = port;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (lsa->sa.sa_family == AF_INET) {
|
|
|
|
lsa->sin.sin_port = port;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
/* What? UNIX socket? IPX?? :) */
|
|
|
|
}
|
2007-01-10 14:58:01 +05:30
|
|
|
|
2007-01-22 15:06:41 +05:30
|
|
|
/* host: "1.2.3.4[:port]", "www.google.com[:port]"
|
2007-01-11 01:49:56 +05:30
|
|
|
* port: if neither of above specifies port #
|
2007-01-10 14:58:01 +05:30
|
|
|
*/
|
2007-01-23 04:15:27 +05:30
|
|
|
static len_and_sockaddr* str2sockaddr(
|
|
|
|
const char *host, int port,
|
|
|
|
USE_FEATURE_IPV6(sa_family_t af,)
|
|
|
|
int ai_flags)
|
2007-01-10 14:58:01 +05:30
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
len_and_sockaddr *r; // = NULL;
|
|
|
|
struct addrinfo *result = NULL;
|
|
|
|
const char *org_host = host; /* only for error msg */
|
|
|
|
const char *cp;
|
|
|
|
struct addrinfo hint;
|
|
|
|
|
|
|
|
/* Ugly parsing of host:addr */
|
|
|
|
if (ENABLE_FEATURE_IPV6 && host[0] == '[') {
|
|
|
|
host++;
|
|
|
|
cp = strchr(host, ']');
|
|
|
|
if (!cp || cp[1] != ':') /* Malformed: must have [xx]:nn */
|
|
|
|
bb_error_msg_and_die("bad address '%s'", org_host);
|
|
|
|
//return r; /* return NULL */
|
|
|
|
} else {
|
|
|
|
cp = strrchr(host, ':');
|
|
|
|
if (ENABLE_FEATURE_IPV6 && cp && strchr(host, ':') != cp) {
|
|
|
|
/* There is more than one ':' (e.g. "::1") */
|
|
|
|
cp = NULL; /* it's not a port spec */
|
|
|
|
}
|
2006-11-22 21:40:39 +05:30
|
|
|
}
|
2007-01-10 14:58:01 +05:30
|
|
|
if (cp) {
|
2007-01-11 01:49:56 +05:30
|
|
|
int sz = cp - host + 1;
|
|
|
|
host = safe_strncpy(alloca(sz), host, sz);
|
2007-01-10 14:58:01 +05:30
|
|
|
if (ENABLE_FEATURE_IPV6 && *cp != ':')
|
|
|
|
cp++; /* skip ']' */
|
|
|
|
cp++; /* skip ':' */
|
2007-01-11 22:20:23 +05:30
|
|
|
port = xatou16(cp);
|
2007-01-10 14:58:01 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
memset(&hint, 0 , sizeof(hint));
|
|
|
|
#if !ENABLE_FEATURE_IPV6
|
|
|
|
hint.ai_family = AF_INET; /* do not try to find IPv6 */
|
2007-01-23 04:15:27 +05:30
|
|
|
#else
|
|
|
|
hint.ai_family = af;
|
2007-01-10 14:58:01 +05:30
|
|
|
#endif
|
|
|
|
/* Needed. Or else we will get each address thrice (or more)
|
|
|
|
* for each possible socket type (tcp,udp,raw...): */
|
|
|
|
hint.ai_socktype = SOCK_STREAM;
|
2007-01-11 22:20:23 +05:30
|
|
|
hint.ai_flags = ai_flags;
|
|
|
|
rc = getaddrinfo(host, NULL, &hint, &result);
|
2007-01-10 14:58:01 +05:30
|
|
|
if (rc || !result)
|
|
|
|
bb_error_msg_and_die("bad address '%s'", org_host);
|
|
|
|
r = xmalloc(offsetof(len_and_sockaddr, sa) + result->ai_addrlen);
|
|
|
|
r->len = result->ai_addrlen;
|
|
|
|
memcpy(&r->sa, result->ai_addr, result->ai_addrlen);
|
2007-01-13 02:29:31 +05:30
|
|
|
set_nport(r, htons(port));
|
2007-01-10 14:58:01 +05:30
|
|
|
freeaddrinfo(result);
|
|
|
|
return r;
|
|
|
|
}
|
2007-01-23 04:15:27 +05:30
|
|
|
#if !ENABLE_FEATURE_IPV6
|
|
|
|
#define str2sockaddr(host, port, af, ai_flags) str2sockaddr(host, port, ai_flags)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if ENABLE_FEATURE_IPV6
|
|
|
|
len_and_sockaddr* host_and_af2sockaddr(const char *host, int port, sa_family_t af)
|
|
|
|
{
|
|
|
|
return str2sockaddr(host, port, af, 0);
|
|
|
|
}
|
|
|
|
#endif
|
2007-01-10 14:58:01 +05:30
|
|
|
|
2007-01-11 01:49:56 +05:30
|
|
|
len_and_sockaddr* host2sockaddr(const char *host, int port)
|
2007-01-10 14:58:01 +05:30
|
|
|
{
|
2007-01-23 04:15:27 +05:30
|
|
|
return str2sockaddr(host, port, AF_UNSPEC, 0);
|
2007-01-10 14:58:01 +05:30
|
|
|
}
|
|
|
|
|
2007-01-11 01:49:56 +05:30
|
|
|
static len_and_sockaddr* dotted2sockaddr(const char *host, int port)
|
2007-01-10 14:58:01 +05:30
|
|
|
{
|
2007-01-23 04:15:27 +05:30
|
|
|
return str2sockaddr(host, port, AF_UNSPEC, NI_NUMERICHOST);
|
2006-11-22 21:40:39 +05:30
|
|
|
}
|
|
|
|
|
2007-01-13 02:29:31 +05:30
|
|
|
int xsocket_stream(len_and_sockaddr **lsap)
|
2006-11-22 21:40:39 +05:30
|
|
|
{
|
2007-01-13 02:29:31 +05:30
|
|
|
len_and_sockaddr *lsa;
|
2006-11-22 21:40:39 +05:30
|
|
|
int fd;
|
2007-01-13 02:29:31 +05:30
|
|
|
int len = sizeof(struct sockaddr_in);
|
|
|
|
int family = AF_INET;
|
|
|
|
|
2006-11-22 21:40:39 +05:30
|
|
|
#if ENABLE_FEATURE_IPV6
|
|
|
|
fd = socket(AF_INET6, SOCK_STREAM, 0);
|
2007-01-13 02:29:31 +05:30
|
|
|
if (fd >= 0) {
|
|
|
|
len = sizeof(struct sockaddr_in6);
|
|
|
|
family = AF_INET6;
|
|
|
|
} else
|
2006-11-22 21:40:39 +05:30
|
|
|
#endif
|
2007-01-13 02:29:31 +05:30
|
|
|
{
|
|
|
|
fd = xsocket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
}
|
|
|
|
lsa = xzalloc(offsetof(len_and_sockaddr, sa) + len);
|
|
|
|
lsa->len = len;
|
|
|
|
lsa->sa.sa_family = family;
|
|
|
|
*lsap = lsa;
|
2006-11-22 21:40:39 +05:30
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2007-01-10 14:58:01 +05:30
|
|
|
int create_and_bind_stream_or_die(const char *bindaddr, int port)
|
2006-11-22 21:40:39 +05:30
|
|
|
{
|
|
|
|
int fd;
|
2007-01-10 14:58:01 +05:30
|
|
|
len_and_sockaddr *lsa;
|
2006-11-22 21:40:39 +05:30
|
|
|
|
2007-01-11 01:49:56 +05:30
|
|
|
if (bindaddr && bindaddr[0]) {
|
2007-01-10 14:58:01 +05:30
|
|
|
lsa = dotted2sockaddr(bindaddr, port);
|
|
|
|
/* currently NULL check is in str2sockaddr */
|
|
|
|
//if (!lsa)
|
|
|
|
// bb_error_msg_and_die("bad address '%s'", bindaddr);
|
2006-11-22 21:40:39 +05:30
|
|
|
/* user specified bind addr dictates family */
|
2007-01-10 14:58:01 +05:30
|
|
|
fd = xsocket(lsa->sa.sa_family, SOCK_STREAM, 0);
|
|
|
|
} else {
|
2007-01-13 02:29:31 +05:30
|
|
|
fd = xsocket_stream(&lsa);
|
2007-01-14 02:35:38 +05:30
|
|
|
set_nport(lsa, htons(port));
|
2007-01-10 14:58:01 +05:30
|
|
|
}
|
2006-11-23 04:52:06 +05:30
|
|
|
setsockopt_reuseaddr(fd);
|
2007-01-10 14:58:01 +05:30
|
|
|
xbind(fd, &lsa->sa, lsa->len);
|
|
|
|
free(lsa);
|
|
|
|
return fd;
|
|
|
|
}
|
2006-11-22 21:40:39 +05:30
|
|
|
|
2007-01-10 14:58:01 +05:30
|
|
|
int create_and_connect_stream_or_die(const char *peer, int port)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
len_and_sockaddr *lsa;
|
2006-11-22 21:40:39 +05:30
|
|
|
|
2007-01-10 14:58:01 +05:30
|
|
|
lsa = host2sockaddr(peer, port);
|
|
|
|
/* currently NULL check is in str2sockaddr */
|
|
|
|
//if (!lsa)
|
|
|
|
// bb_error_msg_and_die("bad address '%s'", peer);
|
|
|
|
fd = xsocket(lsa->sa.sa_family, SOCK_STREAM, 0);
|
|
|
|
setsockopt_reuseaddr(fd);
|
|
|
|
xconnect(fd, &lsa->sa, lsa->len);
|
|
|
|
free(lsa);
|
2006-11-22 21:40:39 +05:30
|
|
|
return fd;
|
|
|
|
}
|
2007-01-11 22:20:23 +05:30
|
|
|
|
|
|
|
int xconnect_stream(const len_and_sockaddr *lsa)
|
|
|
|
{
|
|
|
|
int fd = xsocket(lsa->sa.sa_family, SOCK_STREAM, 0);
|
|
|
|
xconnect(fd, &lsa->sa, lsa->len);
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2007-01-23 04:13:05 +05:30
|
|
|
/* We hijack this constant to mean something else */
|
|
|
|
/* It doesn't hurt because we will add this bit anyway */
|
|
|
|
#define IGNORE_PORT NI_NUMERICSERV
|
2007-01-11 22:20:23 +05:30
|
|
|
static char* sockaddr2str(const struct sockaddr *sa, socklen_t salen, int flags)
|
|
|
|
{
|
|
|
|
char host[128];
|
|
|
|
char serv[16];
|
|
|
|
int rc = getnameinfo(sa, salen,
|
|
|
|
host, sizeof(host),
|
2007-01-23 04:13:05 +05:30
|
|
|
/* can do ((flags & IGNORE_PORT) ? NULL : serv) but why bother? */
|
2007-01-11 22:20:23 +05:30
|
|
|
serv, sizeof(serv),
|
2007-01-22 15:06:41 +05:30
|
|
|
/* do not resolve port# into service _name_ */
|
|
|
|
flags | NI_NUMERICSERV
|
2007-01-11 22:20:23 +05:30
|
|
|
);
|
2007-01-22 15:06:41 +05:30
|
|
|
if (rc)
|
|
|
|
return NULL;
|
2007-01-23 04:13:05 +05:30
|
|
|
if (flags & IGNORE_PORT)
|
|
|
|
return xstrdup(host);
|
2007-01-22 15:06:41 +05:30
|
|
|
#if ENABLE_FEATURE_IPV6
|
2007-01-23 04:13:05 +05:30
|
|
|
if (sa->sa_family == AF_INET6) {
|
|
|
|
if (strchr(host, ':')) /* heh, it's not a resolved hostname */
|
|
|
|
return xasprintf("[%s]:%s", host, serv);
|
|
|
|
/*return xasprintf("%s:%s", host, serv);*/
|
|
|
|
/* - fall through instead */
|
|
|
|
}
|
2007-01-22 15:06:41 +05:30
|
|
|
#endif
|
|
|
|
/* For now we don't support anything else, so it has to be INET */
|
|
|
|
/*if (sa->sa_family == AF_INET)*/
|
|
|
|
return xasprintf("%s:%s", host, serv);
|
2007-01-23 04:13:05 +05:30
|
|
|
/*return xstrdup(host);*/
|
2007-01-11 22:20:23 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
char* xmalloc_sockaddr2host(const struct sockaddr *sa, socklen_t salen)
|
|
|
|
{
|
|
|
|
return sockaddr2str(sa, salen, 0);
|
|
|
|
}
|
|
|
|
|
2007-01-23 04:15:27 +05:30
|
|
|
char* xmalloc_sockaddr2host_noport(const struct sockaddr *sa, socklen_t salen)
|
|
|
|
{
|
|
|
|
return sockaddr2str(sa, salen, IGNORE_PORT);
|
|
|
|
}
|
|
|
|
|
2007-01-23 04:13:05 +05:30
|
|
|
char* xmalloc_sockaddr2hostonly_noport(const struct sockaddr *sa, socklen_t salen)
|
|
|
|
{
|
|
|
|
return sockaddr2str(sa, salen, NI_NAMEREQD | IGNORE_PORT);
|
|
|
|
}
|
2007-01-11 22:20:23 +05:30
|
|
|
char* xmalloc_sockaddr2dotted(const struct sockaddr *sa, socklen_t salen)
|
|
|
|
{
|
|
|
|
return sockaddr2str(sa, salen, NI_NUMERICHOST);
|
|
|
|
}
|
2007-01-23 04:13:05 +05:30
|
|
|
|
|
|
|
char* xmalloc_sockaddr2dotted_noport(const struct sockaddr *sa, socklen_t salen)
|
|
|
|
{
|
|
|
|
return sockaddr2str(sa, salen, NI_NUMERICHOST | IGNORE_PORT);
|
|
|
|
}
|