1 | /*
|
---|
2 | Unix SMB/CIFS implementation.
|
---|
3 | Socket functions
|
---|
4 | Copyright (C) Andrew Tridgell 1992-1998
|
---|
5 | Copyright (C) Tim Potter 2000-2001
|
---|
6 | Copyright (C) Stefan Metzmacher 2004
|
---|
7 |
|
---|
8 | This program is free software; you can redistribute it and/or modify
|
---|
9 | it under the terms of the GNU General Public License as published by
|
---|
10 | the Free Software Foundation; either version 3 of the License, or
|
---|
11 | (at your option) any later version.
|
---|
12 |
|
---|
13 | This program is distributed in the hope that it will be useful,
|
---|
14 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
15 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
16 | GNU General Public License for more details.
|
---|
17 |
|
---|
18 | You should have received a copy of the GNU General Public License
|
---|
19 | along with this program. If not, see <http://www.gnu.org/licenses/>.
|
---|
20 | */
|
---|
21 |
|
---|
22 | #include "includes.h"
|
---|
23 | #include "lib/socket/socket.h"
|
---|
24 | #include "system/filesys.h"
|
---|
25 | #include "system/network.h"
|
---|
26 | #include "param/param.h"
|
---|
27 | #include "../lib/tsocket/tsocket.h"
|
---|
28 | #include "lib/util/util_net.h"
|
---|
29 |
|
---|
30 | /*
|
---|
31 | auto-close sockets on free
|
---|
32 | */
|
---|
33 | static int socket_destructor(struct socket_context *sock)
|
---|
34 | {
|
---|
35 | if (sock->ops->fn_close &&
|
---|
36 | !(sock->flags & SOCKET_FLAG_NOCLOSE)) {
|
---|
37 | sock->ops->fn_close(sock);
|
---|
38 | }
|
---|
39 | return 0;
|
---|
40 | }
|
---|
41 |
|
---|
42 | _PUBLIC_ void socket_tevent_fd_close_fn(struct tevent_context *ev,
|
---|
43 | struct tevent_fd *fde,
|
---|
44 | int fd,
|
---|
45 | void *private_data)
|
---|
46 | {
|
---|
47 | /* this might be the socket_wrapper swrap_close() */
|
---|
48 | close(fd);
|
---|
49 | }
|
---|
50 |
|
---|
51 | _PUBLIC_ NTSTATUS socket_create_with_ops(TALLOC_CTX *mem_ctx, const struct socket_ops *ops,
|
---|
52 | struct socket_context **new_sock,
|
---|
53 | enum socket_type type, uint32_t flags)
|
---|
54 | {
|
---|
55 | NTSTATUS status;
|
---|
56 |
|
---|
57 | (*new_sock) = talloc(mem_ctx, struct socket_context);
|
---|
58 | if (!(*new_sock)) {
|
---|
59 | return NT_STATUS_NO_MEMORY;
|
---|
60 | }
|
---|
61 |
|
---|
62 | (*new_sock)->type = type;
|
---|
63 | (*new_sock)->state = SOCKET_STATE_UNDEFINED;
|
---|
64 | (*new_sock)->flags = flags;
|
---|
65 |
|
---|
66 | (*new_sock)->fd = -1;
|
---|
67 |
|
---|
68 | (*new_sock)->private_data = NULL;
|
---|
69 | (*new_sock)->ops = ops;
|
---|
70 | (*new_sock)->backend_name = NULL;
|
---|
71 |
|
---|
72 | status = (*new_sock)->ops->fn_init((*new_sock));
|
---|
73 | if (!NT_STATUS_IS_OK(status)) {
|
---|
74 | talloc_free(*new_sock);
|
---|
75 | return status;
|
---|
76 | }
|
---|
77 |
|
---|
78 | /* by enabling "testnonblock" mode, all socket receive and
|
---|
79 | send calls on non-blocking sockets will randomly recv/send
|
---|
80 | less data than requested */
|
---|
81 |
|
---|
82 | if (!(flags & SOCKET_FLAG_BLOCK) &&
|
---|
83 | type == SOCKET_TYPE_STREAM &&
|
---|
84 | getenv("SOCKET_TESTNONBLOCK") != NULL) {
|
---|
85 | (*new_sock)->flags |= SOCKET_FLAG_TESTNONBLOCK;
|
---|
86 | }
|
---|
87 |
|
---|
88 | /* we don't do a connect() on dgram sockets, so need to set
|
---|
89 | non-blocking at socket create time */
|
---|
90 | if (!(flags & SOCKET_FLAG_BLOCK) && type == SOCKET_TYPE_DGRAM) {
|
---|
91 | set_blocking(socket_get_fd(*new_sock), false);
|
---|
92 | }
|
---|
93 |
|
---|
94 | talloc_set_destructor(*new_sock, socket_destructor);
|
---|
95 |
|
---|
96 | return NT_STATUS_OK;
|
---|
97 | }
|
---|
98 |
|
---|
99 | _PUBLIC_ NTSTATUS socket_create(const char *name, enum socket_type type,
|
---|
100 | struct socket_context **new_sock, uint32_t flags)
|
---|
101 | {
|
---|
102 | const struct socket_ops *ops;
|
---|
103 |
|
---|
104 | ops = socket_getops_byname(name, type);
|
---|
105 | if (!ops) {
|
---|
106 | return NT_STATUS_INVALID_PARAMETER;
|
---|
107 | }
|
---|
108 |
|
---|
109 | return socket_create_with_ops(NULL, ops, new_sock, type, flags);
|
---|
110 | }
|
---|
111 |
|
---|
112 | _PUBLIC_ NTSTATUS socket_connect(struct socket_context *sock,
|
---|
113 | const struct socket_address *my_address,
|
---|
114 | const struct socket_address *server_address,
|
---|
115 | uint32_t flags)
|
---|
116 | {
|
---|
117 | if (sock == NULL) {
|
---|
118 | return NT_STATUS_CONNECTION_DISCONNECTED;
|
---|
119 | }
|
---|
120 | if (sock->state != SOCKET_STATE_UNDEFINED) {
|
---|
121 | return NT_STATUS_INVALID_PARAMETER;
|
---|
122 | }
|
---|
123 |
|
---|
124 | if (!sock->ops->fn_connect) {
|
---|
125 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
126 | }
|
---|
127 |
|
---|
128 | return sock->ops->fn_connect(sock, my_address, server_address, flags);
|
---|
129 | }
|
---|
130 |
|
---|
131 | _PUBLIC_ NTSTATUS socket_connect_complete(struct socket_context *sock, uint32_t flags)
|
---|
132 | {
|
---|
133 | if (!sock->ops->fn_connect_complete) {
|
---|
134 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
135 | }
|
---|
136 | return sock->ops->fn_connect_complete(sock, flags);
|
---|
137 | }
|
---|
138 |
|
---|
139 | _PUBLIC_ NTSTATUS socket_listen(struct socket_context *sock,
|
---|
140 | const struct socket_address *my_address,
|
---|
141 | int queue_size, uint32_t flags)
|
---|
142 | {
|
---|
143 | if (sock == NULL) {
|
---|
144 | return NT_STATUS_CONNECTION_DISCONNECTED;
|
---|
145 | }
|
---|
146 | if (sock->state != SOCKET_STATE_UNDEFINED) {
|
---|
147 | return NT_STATUS_INVALID_PARAMETER;
|
---|
148 | }
|
---|
149 |
|
---|
150 | if (!sock->ops->fn_listen) {
|
---|
151 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
152 | }
|
---|
153 |
|
---|
154 | return sock->ops->fn_listen(sock, my_address, queue_size, flags);
|
---|
155 | }
|
---|
156 |
|
---|
157 | _PUBLIC_ NTSTATUS socket_accept(struct socket_context *sock, struct socket_context **new_sock)
|
---|
158 | {
|
---|
159 | NTSTATUS status;
|
---|
160 |
|
---|
161 | if (sock == NULL) {
|
---|
162 | return NT_STATUS_CONNECTION_DISCONNECTED;
|
---|
163 | }
|
---|
164 | if (sock->type != SOCKET_TYPE_STREAM) {
|
---|
165 | return NT_STATUS_INVALID_PARAMETER;
|
---|
166 | }
|
---|
167 |
|
---|
168 | if (sock->state != SOCKET_STATE_SERVER_LISTEN) {
|
---|
169 | return NT_STATUS_INVALID_PARAMETER;
|
---|
170 | }
|
---|
171 |
|
---|
172 | if (!sock->ops->fn_accept) {
|
---|
173 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
174 | }
|
---|
175 |
|
---|
176 | status = sock->ops->fn_accept(sock, new_sock);
|
---|
177 |
|
---|
178 | if (NT_STATUS_IS_OK(status)) {
|
---|
179 | talloc_set_destructor(*new_sock, socket_destructor);
|
---|
180 | (*new_sock)->flags = 0;
|
---|
181 | }
|
---|
182 |
|
---|
183 | return status;
|
---|
184 | }
|
---|
185 |
|
---|
186 | _PUBLIC_ NTSTATUS socket_recv(struct socket_context *sock, void *buf,
|
---|
187 | size_t wantlen, size_t *nread)
|
---|
188 | {
|
---|
189 | if (sock == NULL) {
|
---|
190 | return NT_STATUS_CONNECTION_DISCONNECTED;
|
---|
191 | }
|
---|
192 | if (sock->state != SOCKET_STATE_CLIENT_CONNECTED &&
|
---|
193 | sock->state != SOCKET_STATE_SERVER_CONNECTED &&
|
---|
194 | sock->type != SOCKET_TYPE_DGRAM) {
|
---|
195 | return NT_STATUS_INVALID_PARAMETER;
|
---|
196 | }
|
---|
197 |
|
---|
198 | if (!sock->ops->fn_recv) {
|
---|
199 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
200 | }
|
---|
201 |
|
---|
202 | if ((sock->flags & SOCKET_FLAG_TESTNONBLOCK)
|
---|
203 | && wantlen > 1) {
|
---|
204 |
|
---|
205 | if (random() % 10 == 0) {
|
---|
206 | *nread = 0;
|
---|
207 | return STATUS_MORE_ENTRIES;
|
---|
208 | }
|
---|
209 | return sock->ops->fn_recv(sock, buf, 1+(random() % wantlen), nread);
|
---|
210 | }
|
---|
211 | return sock->ops->fn_recv(sock, buf, wantlen, nread);
|
---|
212 | }
|
---|
213 |
|
---|
214 | _PUBLIC_ NTSTATUS socket_recvfrom(struct socket_context *sock, void *buf,
|
---|
215 | size_t wantlen, size_t *nread,
|
---|
216 | TALLOC_CTX *mem_ctx, struct socket_address **src_addr)
|
---|
217 | {
|
---|
218 | if (sock == NULL) {
|
---|
219 | return NT_STATUS_CONNECTION_DISCONNECTED;
|
---|
220 | }
|
---|
221 | if (sock->type != SOCKET_TYPE_DGRAM) {
|
---|
222 | return NT_STATUS_INVALID_PARAMETER;
|
---|
223 | }
|
---|
224 |
|
---|
225 | if (!sock->ops->fn_recvfrom) {
|
---|
226 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
227 | }
|
---|
228 |
|
---|
229 | return sock->ops->fn_recvfrom(sock, buf, wantlen, nread,
|
---|
230 | mem_ctx, src_addr);
|
---|
231 | }
|
---|
232 |
|
---|
233 | _PUBLIC_ NTSTATUS socket_send(struct socket_context *sock,
|
---|
234 | const DATA_BLOB *blob, size_t *sendlen)
|
---|
235 | {
|
---|
236 | if (sock == NULL) {
|
---|
237 | return NT_STATUS_CONNECTION_DISCONNECTED;
|
---|
238 | }
|
---|
239 | if (sock->state != SOCKET_STATE_CLIENT_CONNECTED &&
|
---|
240 | sock->state != SOCKET_STATE_SERVER_CONNECTED) {
|
---|
241 | return NT_STATUS_INVALID_PARAMETER;
|
---|
242 | }
|
---|
243 |
|
---|
244 | if (!sock->ops->fn_send) {
|
---|
245 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
246 | }
|
---|
247 |
|
---|
248 | if ((sock->flags & SOCKET_FLAG_TESTNONBLOCK)
|
---|
249 | && blob->length > 1) {
|
---|
250 | DATA_BLOB blob2 = *blob;
|
---|
251 | if (random() % 10 == 0) {
|
---|
252 | *sendlen = 0;
|
---|
253 | return STATUS_MORE_ENTRIES;
|
---|
254 | }
|
---|
255 | /* The random size sends are incompatible with TLS and SASL
|
---|
256 | * sockets, which require re-sends to be consistant */
|
---|
257 | if (!(sock->flags & SOCKET_FLAG_ENCRYPT)) {
|
---|
258 | blob2.length = 1+(random() % blob2.length);
|
---|
259 | } else {
|
---|
260 | /* This is particularly stressful on buggy
|
---|
261 | * LDAP clients, that don't expect on LDAP
|
---|
262 | * packet in many SASL packets */
|
---|
263 | blob2.length = 1 + blob2.length/2;
|
---|
264 | }
|
---|
265 | return sock->ops->fn_send(sock, &blob2, sendlen);
|
---|
266 | }
|
---|
267 | return sock->ops->fn_send(sock, blob, sendlen);
|
---|
268 | }
|
---|
269 |
|
---|
270 |
|
---|
271 | _PUBLIC_ NTSTATUS socket_sendto(struct socket_context *sock,
|
---|
272 | const DATA_BLOB *blob, size_t *sendlen,
|
---|
273 | const struct socket_address *dest_addr)
|
---|
274 | {
|
---|
275 | if (sock == NULL) {
|
---|
276 | return NT_STATUS_CONNECTION_DISCONNECTED;
|
---|
277 | }
|
---|
278 | if (sock->type != SOCKET_TYPE_DGRAM) {
|
---|
279 | return NT_STATUS_INVALID_PARAMETER;
|
---|
280 | }
|
---|
281 |
|
---|
282 | if (sock->state == SOCKET_STATE_CLIENT_CONNECTED ||
|
---|
283 | sock->state == SOCKET_STATE_SERVER_CONNECTED) {
|
---|
284 | return NT_STATUS_INVALID_PARAMETER;
|
---|
285 | }
|
---|
286 |
|
---|
287 | if (!sock->ops->fn_sendto) {
|
---|
288 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
289 | }
|
---|
290 |
|
---|
291 | return sock->ops->fn_sendto(sock, blob, sendlen, dest_addr);
|
---|
292 | }
|
---|
293 |
|
---|
294 |
|
---|
295 | /*
|
---|
296 | ask for the number of bytes in a pending incoming packet
|
---|
297 | */
|
---|
298 | _PUBLIC_ NTSTATUS socket_pending(struct socket_context *sock, size_t *npending)
|
---|
299 | {
|
---|
300 | if (sock == NULL) {
|
---|
301 | return NT_STATUS_CONNECTION_DISCONNECTED;
|
---|
302 | }
|
---|
303 | if (!sock->ops->fn_pending) {
|
---|
304 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
305 | }
|
---|
306 | return sock->ops->fn_pending(sock, npending);
|
---|
307 | }
|
---|
308 |
|
---|
309 |
|
---|
310 | _PUBLIC_ NTSTATUS socket_set_option(struct socket_context *sock, const char *option, const char *val)
|
---|
311 | {
|
---|
312 | if (sock == NULL) {
|
---|
313 | return NT_STATUS_CONNECTION_DISCONNECTED;
|
---|
314 | }
|
---|
315 | if (!sock->ops->fn_set_option) {
|
---|
316 | return NT_STATUS_NOT_IMPLEMENTED;
|
---|
317 | }
|
---|
318 |
|
---|
319 | return sock->ops->fn_set_option(sock, option, val);
|
---|
320 | }
|
---|
321 |
|
---|
322 | _PUBLIC_ char *socket_get_peer_name(struct socket_context *sock, TALLOC_CTX *mem_ctx)
|
---|
323 | {
|
---|
324 | if (!sock->ops->fn_get_peer_name) {
|
---|
325 | return NULL;
|
---|
326 | }
|
---|
327 |
|
---|
328 | return sock->ops->fn_get_peer_name(sock, mem_ctx);
|
---|
329 | }
|
---|
330 |
|
---|
331 | _PUBLIC_ struct socket_address *socket_get_peer_addr(struct socket_context *sock, TALLOC_CTX *mem_ctx)
|
---|
332 | {
|
---|
333 | if (!sock->ops->fn_get_peer_addr) {
|
---|
334 | return NULL;
|
---|
335 | }
|
---|
336 |
|
---|
337 | return sock->ops->fn_get_peer_addr(sock, mem_ctx);
|
---|
338 | }
|
---|
339 |
|
---|
340 | _PUBLIC_ struct socket_address *socket_get_my_addr(struct socket_context *sock, TALLOC_CTX *mem_ctx)
|
---|
341 | {
|
---|
342 | if (!sock->ops->fn_get_my_addr) {
|
---|
343 | return NULL;
|
---|
344 | }
|
---|
345 |
|
---|
346 | return sock->ops->fn_get_my_addr(sock, mem_ctx);
|
---|
347 | }
|
---|
348 |
|
---|
349 | _PUBLIC_ struct tsocket_address *socket_address_to_tsocket_address(TALLOC_CTX *mem_ctx,
|
---|
350 | const struct socket_address *a)
|
---|
351 | {
|
---|
352 | struct tsocket_address *r;
|
---|
353 | int ret;
|
---|
354 |
|
---|
355 | if (a->sockaddr) {
|
---|
356 | ret = tsocket_address_bsd_from_sockaddr(mem_ctx,
|
---|
357 | a->sockaddr,
|
---|
358 | a->sockaddrlen,
|
---|
359 | &r);
|
---|
360 | } else {
|
---|
361 | ret = tsocket_address_inet_from_strings(mem_ctx,
|
---|
362 | a->family,
|
---|
363 | a->addr,
|
---|
364 | a->port,
|
---|
365 | &r);
|
---|
366 | }
|
---|
367 |
|
---|
368 | if (ret != 0) {
|
---|
369 | return NULL;
|
---|
370 | }
|
---|
371 |
|
---|
372 | return r;
|
---|
373 | }
|
---|
374 |
|
---|
375 | _PUBLIC_ void socket_address_set_port(struct socket_address *a,
|
---|
376 | uint16_t port)
|
---|
377 | {
|
---|
378 | if (a->sockaddr) {
|
---|
379 | set_sockaddr_port(a->sockaddr, port);
|
---|
380 | } else {
|
---|
381 | a->port = port;
|
---|
382 | }
|
---|
383 |
|
---|
384 | }
|
---|
385 |
|
---|
386 | _PUBLIC_ struct socket_address *tsocket_address_to_socket_address(TALLOC_CTX *mem_ctx,
|
---|
387 | const struct tsocket_address *a)
|
---|
388 | {
|
---|
389 | ssize_t ret;
|
---|
390 | struct sockaddr_storage ss;
|
---|
391 | size_t sslen = sizeof(ss);
|
---|
392 |
|
---|
393 | ret = tsocket_address_bsd_sockaddr(a, (struct sockaddr *)(void *)&ss, sslen);
|
---|
394 | if (ret < 0) {
|
---|
395 | return NULL;
|
---|
396 | }
|
---|
397 |
|
---|
398 | return socket_address_from_sockaddr(mem_ctx, (struct sockaddr *)(void *)&ss, ret);
|
---|
399 | }
|
---|
400 |
|
---|
401 | _PUBLIC_ struct tsocket_address *socket_get_remote_addr(struct socket_context *sock, TALLOC_CTX *mem_ctx)
|
---|
402 | {
|
---|
403 | struct socket_address *a;
|
---|
404 | struct tsocket_address *r;
|
---|
405 |
|
---|
406 | a = socket_get_peer_addr(sock, mem_ctx);
|
---|
407 | if (a == NULL) {
|
---|
408 | return NULL;
|
---|
409 | }
|
---|
410 |
|
---|
411 | r = socket_address_to_tsocket_address(mem_ctx, a);
|
---|
412 | talloc_free(a);
|
---|
413 | return r;
|
---|
414 | }
|
---|
415 |
|
---|
416 | _PUBLIC_ struct tsocket_address *socket_get_local_addr(struct socket_context *sock, TALLOC_CTX *mem_ctx)
|
---|
417 | {
|
---|
418 | struct socket_address *a;
|
---|
419 | struct tsocket_address *r;
|
---|
420 |
|
---|
421 | a = socket_get_my_addr(sock, mem_ctx);
|
---|
422 | if (a == NULL) {
|
---|
423 | return NULL;
|
---|
424 | }
|
---|
425 |
|
---|
426 | r = socket_address_to_tsocket_address(mem_ctx, a);
|
---|
427 | talloc_free(a);
|
---|
428 | return r;
|
---|
429 | }
|
---|
430 |
|
---|
431 | _PUBLIC_ int socket_get_fd(struct socket_context *sock)
|
---|
432 | {
|
---|
433 | if (!sock->ops->fn_get_fd) {
|
---|
434 | return -1;
|
---|
435 | }
|
---|
436 |
|
---|
437 | return sock->ops->fn_get_fd(sock);
|
---|
438 | }
|
---|
439 |
|
---|
440 | /*
|
---|
441 | call dup() on a socket, and close the old fd. This is used to change
|
---|
442 | the fd to the lowest available number, to make select() more
|
---|
443 | efficient (select speed depends on the maxiumum fd number passed to
|
---|
444 | it)
|
---|
445 | */
|
---|
446 | _PUBLIC_ NTSTATUS socket_dup(struct socket_context *sock)
|
---|
447 | {
|
---|
448 | int fd;
|
---|
449 | if (sock->fd == -1) {
|
---|
450 | return NT_STATUS_INVALID_HANDLE;
|
---|
451 | }
|
---|
452 | fd = dup(sock->fd);
|
---|
453 | if (fd == -1) {
|
---|
454 | return map_nt_error_from_unix(errno);
|
---|
455 | }
|
---|
456 | close(sock->fd);
|
---|
457 | sock->fd = fd;
|
---|
458 | return NT_STATUS_OK;
|
---|
459 |
|
---|
460 | }
|
---|
461 |
|
---|
462 | /* Create a new socket_address. The type must match the socket type.
|
---|
463 | * The host parameter may be an IP or a hostname
|
---|
464 | */
|
---|
465 |
|
---|
466 | _PUBLIC_ struct socket_address *socket_address_from_strings(TALLOC_CTX *mem_ctx,
|
---|
467 | const char *family,
|
---|
468 | const char *host,
|
---|
469 | int port)
|
---|
470 | {
|
---|
471 | struct socket_address *addr = talloc(mem_ctx, struct socket_address);
|
---|
472 | if (!addr) {
|
---|
473 | return NULL;
|
---|
474 | }
|
---|
475 |
|
---|
476 | addr->family = family;
|
---|
477 | addr->addr = talloc_strdup(addr, host);
|
---|
478 | if (!addr->addr) {
|
---|
479 | talloc_free(addr);
|
---|
480 | return NULL;
|
---|
481 | }
|
---|
482 | addr->port = port;
|
---|
483 | addr->sockaddr = NULL;
|
---|
484 | addr->sockaddrlen = 0;
|
---|
485 |
|
---|
486 | return addr;
|
---|
487 | }
|
---|
488 |
|
---|
489 | /* Create a new socket_address. Copy the struct sockaddr into the new
|
---|
490 | * structure. Used for hooks in the kerberos libraries, where they
|
---|
491 | * supply only a struct sockaddr */
|
---|
492 |
|
---|
493 | _PUBLIC_ struct socket_address *socket_address_from_sockaddr(TALLOC_CTX *mem_ctx,
|
---|
494 | struct sockaddr *sockaddr,
|
---|
495 | size_t sockaddrlen)
|
---|
496 | {
|
---|
497 | struct socket_address *addr = talloc(mem_ctx, struct socket_address);
|
---|
498 | if (!addr) {
|
---|
499 | return NULL;
|
---|
500 | }
|
---|
501 | addr->family = NULL;
|
---|
502 | addr->addr = NULL;
|
---|
503 | addr->port = 0;
|
---|
504 | addr->sockaddr = (struct sockaddr *)talloc_memdup(addr, sockaddr, sockaddrlen);
|
---|
505 | if (!addr->sockaddr) {
|
---|
506 | talloc_free(addr);
|
---|
507 | return NULL;
|
---|
508 | }
|
---|
509 | addr->sockaddrlen = sockaddrlen;
|
---|
510 | return addr;
|
---|
511 | }
|
---|
512 |
|
---|
513 | /* Copy a socket_address structure */
|
---|
514 | struct socket_address *socket_address_copy(TALLOC_CTX *mem_ctx,
|
---|
515 | const struct socket_address *oaddr)
|
---|
516 | {
|
---|
517 | struct socket_address *addr = talloc_zero(mem_ctx, struct socket_address);
|
---|
518 | if (!addr) {
|
---|
519 | return NULL;
|
---|
520 | }
|
---|
521 | addr->family = oaddr->family;
|
---|
522 | if (oaddr->addr) {
|
---|
523 | addr->addr = talloc_strdup(addr, oaddr->addr);
|
---|
524 | if (!addr->addr) {
|
---|
525 | goto nomem;
|
---|
526 | }
|
---|
527 | }
|
---|
528 | addr->port = oaddr->port;
|
---|
529 | if (oaddr->sockaddr) {
|
---|
530 | addr->sockaddr = (struct sockaddr *)talloc_memdup(addr,
|
---|
531 | oaddr->sockaddr,
|
---|
532 | oaddr->sockaddrlen);
|
---|
533 | if (!addr->sockaddr) {
|
---|
534 | goto nomem;
|
---|
535 | }
|
---|
536 | addr->sockaddrlen = oaddr->sockaddrlen;
|
---|
537 | }
|
---|
538 |
|
---|
539 | return addr;
|
---|
540 |
|
---|
541 | nomem:
|
---|
542 | talloc_free(addr);
|
---|
543 | return NULL;
|
---|
544 | }
|
---|
545 |
|
---|
546 | _PUBLIC_ const struct socket_ops *socket_getops_byname(const char *family, enum socket_type type)
|
---|
547 | {
|
---|
548 | extern const struct socket_ops *socket_ipv4_ops(enum socket_type);
|
---|
549 | extern const struct socket_ops *socket_ipv6_ops(enum socket_type);
|
---|
550 | extern const struct socket_ops *socket_unixdom_ops(enum socket_type);
|
---|
551 |
|
---|
552 | if (strcmp("ip", family) == 0 ||
|
---|
553 | strcmp("ipv4", family) == 0) {
|
---|
554 | return socket_ipv4_ops(type);
|
---|
555 | }
|
---|
556 |
|
---|
557 | #if HAVE_IPV6
|
---|
558 | if (strcmp("ipv6", family) == 0) {
|
---|
559 | return socket_ipv6_ops(type);
|
---|
560 | }
|
---|
561 | #endif
|
---|
562 |
|
---|
563 | if (strcmp("unix", family) == 0) {
|
---|
564 | return socket_unixdom_ops(type);
|
---|
565 | }
|
---|
566 |
|
---|
567 | return NULL;
|
---|
568 | }
|
---|
569 |
|
---|
570 | enum SOCK_OPT_TYPES {OPT_BOOL,OPT_INT,OPT_ON};
|
---|
571 |
|
---|
572 | static const struct {
|
---|
573 | const char *name;
|
---|
574 | int level;
|
---|
575 | int option;
|
---|
576 | int value;
|
---|
577 | int opttype;
|
---|
578 | } socket_options[] = {
|
---|
579 | {"SO_KEEPALIVE", SOL_SOCKET, SO_KEEPALIVE, 0, OPT_BOOL},
|
---|
580 | {"SO_REUSEADDR", SOL_SOCKET, SO_REUSEADDR, 0, OPT_BOOL},
|
---|
581 | {"SO_BROADCAST", SOL_SOCKET, SO_BROADCAST, 0, OPT_BOOL},
|
---|
582 | #ifdef TCP_NODELAY
|
---|
583 | {"TCP_NODELAY", IPPROTO_TCP, TCP_NODELAY, 0, OPT_BOOL},
|
---|
584 | #endif
|
---|
585 | #ifdef IPTOS_LOWDELAY
|
---|
586 | {"IPTOS_LOWDELAY", IPPROTO_IP, IP_TOS, IPTOS_LOWDELAY, OPT_ON},
|
---|
587 | #endif
|
---|
588 | #ifdef IPTOS_THROUGHPUT
|
---|
589 | {"IPTOS_THROUGHPUT", IPPROTO_IP, IP_TOS, IPTOS_THROUGHPUT, OPT_ON},
|
---|
590 | #endif
|
---|
591 | #ifdef SO_REUSEPORT
|
---|
592 | {"SO_REUSEPORT", SOL_SOCKET, SO_REUSEPORT, 0, OPT_BOOL},
|
---|
593 | #endif
|
---|
594 | #ifdef SO_SNDBUF
|
---|
595 | {"SO_SNDBUF", SOL_SOCKET, SO_SNDBUF, 0, OPT_INT},
|
---|
596 | #endif
|
---|
597 | #ifdef SO_RCVBUF
|
---|
598 | {"SO_RCVBUF", SOL_SOCKET, SO_RCVBUF, 0, OPT_INT},
|
---|
599 | #endif
|
---|
600 | #ifdef SO_SNDLOWAT
|
---|
601 | {"SO_SNDLOWAT", SOL_SOCKET, SO_SNDLOWAT, 0, OPT_INT},
|
---|
602 | #endif
|
---|
603 | #ifdef SO_RCVLOWAT
|
---|
604 | {"SO_RCVLOWAT", SOL_SOCKET, SO_RCVLOWAT, 0, OPT_INT},
|
---|
605 | #endif
|
---|
606 | #ifdef SO_SNDTIMEO
|
---|
607 | {"SO_SNDTIMEO", SOL_SOCKET, SO_SNDTIMEO, 0, OPT_INT},
|
---|
608 | #endif
|
---|
609 | #ifdef SO_RCVTIMEO
|
---|
610 | {"SO_RCVTIMEO", SOL_SOCKET, SO_RCVTIMEO, 0, OPT_INT},
|
---|
611 | #endif
|
---|
612 | {NULL,0,0,0,0}};
|
---|
613 |
|
---|
614 |
|
---|
615 | /**
|
---|
616 | Set user socket options.
|
---|
617 | **/
|
---|
618 | _PUBLIC_ void set_socket_options(int fd, const char *options)
|
---|
619 | {
|
---|
620 | const char **options_list = (const char **)str_list_make(NULL, options, " \t,");
|
---|
621 | int j;
|
---|
622 |
|
---|
623 | if (!options_list)
|
---|
624 | return;
|
---|
625 |
|
---|
626 | for (j = 0; options_list[j]; j++) {
|
---|
627 | const char *tok = options_list[j];
|
---|
628 | int ret=0,i;
|
---|
629 | int value = 1;
|
---|
630 | char *p;
|
---|
631 | bool got_value = false;
|
---|
632 |
|
---|
633 | if ((p = strchr(tok,'='))) {
|
---|
634 | *p = 0;
|
---|
635 | value = atoi(p+1);
|
---|
636 | got_value = true;
|
---|
637 | }
|
---|
638 |
|
---|
639 | for (i=0;socket_options[i].name;i++)
|
---|
640 | if (strequal(socket_options[i].name,tok))
|
---|
641 | break;
|
---|
642 |
|
---|
643 | if (!socket_options[i].name) {
|
---|
644 | DEBUG(0,("Unknown socket option %s\n",tok));
|
---|
645 | continue;
|
---|
646 | }
|
---|
647 |
|
---|
648 | switch (socket_options[i].opttype) {
|
---|
649 | case OPT_BOOL:
|
---|
650 | case OPT_INT:
|
---|
651 | ret = setsockopt(fd,socket_options[i].level,
|
---|
652 | socket_options[i].option,(char *)&value,sizeof(int));
|
---|
653 | break;
|
---|
654 |
|
---|
655 | case OPT_ON:
|
---|
656 | if (got_value)
|
---|
657 | DEBUG(0,("syntax error - %s does not take a value\n",tok));
|
---|
658 |
|
---|
659 | {
|
---|
660 | int on = socket_options[i].value;
|
---|
661 | ret = setsockopt(fd,socket_options[i].level,
|
---|
662 | socket_options[i].option,(char *)&on,sizeof(int));
|
---|
663 | }
|
---|
664 | break;
|
---|
665 | }
|
---|
666 |
|
---|
667 | if (ret != 0)
|
---|
668 | DEBUG(0,("Failed to set socket option %s (Error %s)\n",tok, strerror(errno) ));
|
---|
669 | }
|
---|
670 |
|
---|
671 | talloc_free(options_list);
|
---|
672 | }
|
---|
673 |
|
---|
674 | /*
|
---|
675 | set some flags on a socket
|
---|
676 | */
|
---|
677 | void socket_set_flags(struct socket_context *sock, unsigned flags)
|
---|
678 | {
|
---|
679 | sock->flags |= flags;
|
---|
680 | }
|
---|