You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
149 lines
3.9 KiB
149 lines
3.9 KiB
#include "tunala.h" |
|
|
|
#ifndef NO_IP |
|
|
|
# define IP_LISTENER_BACKLOG 511/* So if it gets masked by 256 or some other |
|
* such value it'll still be respectable */ |
|
|
|
/* Any IP-related initialisations. For now, this means blocking SIGPIPE */ |
|
int ip_initialise(void) |
|
{ |
|
struct sigaction sa; |
|
|
|
sa.sa_handler = SIG_IGN; |
|
sa.sa_flags = 0; |
|
sigemptyset(&sa.sa_mask); |
|
if (sigaction(SIGPIPE, &sa, NULL) != 0) |
|
return 0; |
|
return 1; |
|
} |
|
|
|
int ip_create_listener_split(const char *ip, unsigned short port) |
|
{ |
|
struct sockaddr_in in_addr; |
|
int fd = -1; |
|
int reuseVal = 1; |
|
|
|
/* Create the socket */ |
|
if ((fd = socket(PF_INET, SOCK_STREAM, 0)) == -1) |
|
goto err; |
|
/* Set the SO_REUSEADDR flag - servers act weird without it */ |
|
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (char *)(&reuseVal), |
|
sizeof(reuseVal)) != 0) |
|
goto err; |
|
/* Prepare the listen address stuff */ |
|
in_addr.sin_family = AF_INET; |
|
memcpy(&in_addr.sin_addr.s_addr, ip, 4); |
|
in_addr.sin_port = htons(port); |
|
/* Bind to the required port/address/interface */ |
|
if (bind(fd, (struct sockaddr *)&in_addr, sizeof(struct sockaddr_in)) != |
|
0) |
|
goto err; |
|
/* Start "listening" */ |
|
if (listen(fd, IP_LISTENER_BACKLOG) != 0) |
|
goto err; |
|
return fd; |
|
err: |
|
if (fd != -1) |
|
close(fd); |
|
return -1; |
|
} |
|
|
|
int ip_create_connection_split(const char *ip, unsigned short port) |
|
{ |
|
struct sockaddr_in in_addr; |
|
int flags, fd = -1; |
|
|
|
/* Create the socket */ |
|
if ((fd = socket(PF_INET, SOCK_STREAM, 0)) == -1) |
|
goto err; |
|
/* Make it non-blocking */ |
|
if (((flags = fcntl(fd, F_GETFL, 0)) < 0) || |
|
(fcntl(fd, F_SETFL, flags | O_NONBLOCK) < 0)) |
|
goto err; |
|
/* Prepare the connection address stuff */ |
|
in_addr.sin_family = AF_INET; |
|
memcpy(&in_addr.sin_addr.s_addr, ip, 4); |
|
in_addr.sin_port = htons(port); |
|
/* Start a connect (non-blocking, in all likelihood) */ |
|
if ((connect(fd, (struct sockaddr *)&in_addr, |
|
sizeof(struct sockaddr_in)) != 0) && (errno != EINPROGRESS)) |
|
goto err; |
|
return fd; |
|
err: |
|
if (fd != -1) |
|
close(fd); |
|
return -1; |
|
} |
|
|
|
static char all_local_ip[] = { 0x00, 0x00, 0x00, 0x00 }; |
|
|
|
int ip_parse_address(const char *address, const char **parsed_ip, |
|
unsigned short *parsed_port, int accept_all_ip) |
|
{ |
|
char buf[256]; |
|
struct hostent *lookup; |
|
unsigned long port; |
|
const char *ptr = strstr(address, ":"); |
|
const char *ip = all_local_ip; |
|
|
|
if (!ptr) { |
|
/* |
|
* We assume we're listening on all local interfaces and have only |
|
* specified a port. |
|
*/ |
|
if (!accept_all_ip) |
|
return 0; |
|
ptr = address; |
|
goto determine_port; |
|
} |
|
if ((ptr - address) > 255) |
|
return 0; |
|
memset(buf, 0, 256); |
|
memcpy(buf, address, ptr - address); |
|
ptr++; |
|
if ((lookup = gethostbyname(buf)) == NULL) { |
|
/* |
|
* Spit a message to differentiate between lookup failures and bad |
|
* strings. |
|
*/ |
|
fprintf(stderr, "hostname lookup for '%s' failed\n", buf); |
|
return 0; |
|
} |
|
ip = lookup->h_addr_list[0]; |
|
determine_port: |
|
if (strlen(ptr) < 1) |
|
return 0; |
|
if (!int_strtoul(ptr, &port) || (port > 65535)) |
|
return 0; |
|
*parsed_ip = ip; |
|
*parsed_port = (unsigned short)port; |
|
return 1; |
|
} |
|
|
|
int ip_create_listener(const char *address) |
|
{ |
|
const char *ip; |
|
unsigned short port; |
|
|
|
if (!ip_parse_address(address, &ip, &port, 1)) |
|
return -1; |
|
return ip_create_listener_split(ip, port); |
|
} |
|
|
|
int ip_create_connection(const char *address) |
|
{ |
|
const char *ip; |
|
unsigned short port; |
|
|
|
if (!ip_parse_address(address, &ip, &port, 0)) |
|
return -1; |
|
return ip_create_connection_split(ip, port); |
|
} |
|
|
|
int ip_accept_connection(int listen_fd) |
|
{ |
|
return accept(listen_fd, NULL, NULL); |
|
} |
|
|
|
#endif /* !defined(NO_IP) */
|
|
|