netutl.c 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347
  1. /*
  2. netutl.c -- some supporting network utility code
  3. Copyright (C) 1998-2005 Ivo Timmermans
  4. 2000-2016 Guus Sliepen <guus@tinc-vpn.org>
  5. This program is free software; you can redistribute it and/or modify
  6. it under the terms of the GNU General Public License as published by
  7. the Free Software Foundation; either version 2 of the License, or
  8. (at your option) any later version.
  9. This program is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License along
  14. with this program; if not, write to the Free Software Foundation, Inc.,
  15. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  16. */
  17. #include "system.h"
  18. #include "net.h"
  19. #include "netutl.h"
  20. #include "logger.h"
  21. #include "utils.h"
  22. #include "xalloc.h"
  23. bool hostnames = false;
  24. /*
  25. Turn a string into a struct addrinfo.
  26. Return NULL on failure.
  27. */
  28. struct addrinfo *str2addrinfo(const char *address, const char *service, int socktype) {
  29. struct addrinfo *ai = NULL, hint = {0};
  30. int err;
  31. hint.ai_family = addressfamily;
  32. hint.ai_socktype = socktype;
  33. #if HAVE_DECL_RES_INIT
  34. // ensure glibc reloads /etc/resolv.conf.
  35. res_init();
  36. #endif
  37. err = getaddrinfo(address, service, &hint, &ai);
  38. if(err) {
  39. logger(LOG_WARNING, "Error looking up %s port %s: %s", address,
  40. service, gai_strerror(err));
  41. return NULL;
  42. }
  43. return ai;
  44. }
  45. sockaddr_t str2sockaddr(const char *address, const char *port) {
  46. struct addrinfo *ai = NULL, hint = {0};
  47. sockaddr_t result;
  48. int err;
  49. hint.ai_family = AF_UNSPEC;
  50. hint.ai_flags = AI_NUMERICHOST;
  51. hint.ai_socktype = SOCK_STREAM;
  52. err = getaddrinfo(address, port, &hint, &ai);
  53. if(err || !ai) {
  54. ifdebug(SCARY_THINGS)
  55. logger(LOG_DEBUG, "Unknown type address %s port %s", address, port);
  56. result.sa.sa_family = AF_UNKNOWN;
  57. result.unknown.address = xstrdup(address);
  58. result.unknown.port = xstrdup(port);
  59. return result;
  60. }
  61. memcpy(&result, ai->ai_addr, ai->ai_addrlen);
  62. freeaddrinfo(ai);
  63. return result;
  64. }
  65. void sockaddr2str(const sockaddr_t *sa, char **addrstr, char **portstr) {
  66. char address[NI_MAXHOST];
  67. char port[NI_MAXSERV];
  68. char *scopeid;
  69. int err;
  70. if(sa->sa.sa_family == AF_UNKNOWN) {
  71. if(addrstr) {
  72. *addrstr = xstrdup(sa->unknown.address);
  73. }
  74. if(portstr) {
  75. *portstr = xstrdup(sa->unknown.port);
  76. }
  77. return;
  78. }
  79. err = getnameinfo(&sa->sa, SALEN(sa->sa), address, sizeof(address), port, sizeof(port), NI_NUMERICHOST | NI_NUMERICSERV);
  80. if(err) {
  81. logger(LOG_ERR, "Error while translating addresses: %s",
  82. gai_strerror(err));
  83. abort();
  84. }
  85. scopeid = strchr(address, '%');
  86. if(scopeid) {
  87. *scopeid = '\0'; /* Descope. */
  88. }
  89. if(addrstr) {
  90. *addrstr = xstrdup(address);
  91. }
  92. if(portstr) {
  93. *portstr = xstrdup(port);
  94. }
  95. }
  96. char *sockaddr2hostname(const sockaddr_t *sa) {
  97. char *str;
  98. char address[NI_MAXHOST] = "unknown";
  99. char port[NI_MAXSERV] = "unknown";
  100. int err;
  101. if(sa->sa.sa_family == AF_UNKNOWN) {
  102. xasprintf(&str, "%s port %s", sa->unknown.address, sa->unknown.port);
  103. return str;
  104. }
  105. err = getnameinfo(&sa->sa, SALEN(sa->sa), address, sizeof(address), port, sizeof(port),
  106. hostnames ? 0 : (NI_NUMERICHOST | NI_NUMERICSERV));
  107. if(err) {
  108. logger(LOG_ERR, "Error while looking up hostname: %s",
  109. gai_strerror(err));
  110. }
  111. xasprintf(&str, "%s port %s", address, port);
  112. return str;
  113. }
  114. int sockaddrcmp_noport(const sockaddr_t *a, const sockaddr_t *b) {
  115. int result;
  116. result = a->sa.sa_family - b->sa.sa_family;
  117. if(result) {
  118. return result;
  119. }
  120. switch(a->sa.sa_family) {
  121. case AF_UNSPEC:
  122. return 0;
  123. case AF_UNKNOWN:
  124. return strcmp(a->unknown.address, b->unknown.address);
  125. case AF_INET:
  126. return memcmp(&a->in.sin_addr, &b->in.sin_addr, sizeof(a->in.sin_addr));
  127. case AF_INET6:
  128. return memcmp(&a->in6.sin6_addr, &b->in6.sin6_addr, sizeof(a->in6.sin6_addr));
  129. default:
  130. logger(LOG_ERR, "sockaddrcmp() was called with unknown address family %d, exitting!",
  131. a->sa.sa_family);
  132. abort();
  133. }
  134. }
  135. int sockaddrcmp(const sockaddr_t *a, const sockaddr_t *b) {
  136. int result;
  137. result = a->sa.sa_family - b->sa.sa_family;
  138. if(result) {
  139. return result;
  140. }
  141. switch(a->sa.sa_family) {
  142. case AF_UNSPEC:
  143. return 0;
  144. case AF_UNKNOWN:
  145. result = strcmp(a->unknown.address, b->unknown.address);
  146. if(result) {
  147. return result;
  148. }
  149. return strcmp(a->unknown.port, b->unknown.port);
  150. case AF_INET:
  151. result = memcmp(&a->in.sin_addr, &b->in.sin_addr, sizeof(a->in.sin_addr));
  152. if(result) {
  153. return result;
  154. }
  155. return memcmp(&a->in.sin_port, &b->in.sin_port, sizeof(a->in.sin_port));
  156. case AF_INET6:
  157. result = memcmp(&a->in6.sin6_addr, &b->in6.sin6_addr, sizeof(a->in6.sin6_addr));
  158. if(result) {
  159. return result;
  160. }
  161. return memcmp(&a->in6.sin6_port, &b->in6.sin6_port, sizeof(a->in6.sin6_port));
  162. default:
  163. logger(LOG_ERR, "sockaddrcmp() was called with unknown address family %d, exitting!",
  164. a->sa.sa_family);
  165. abort();
  166. }
  167. }
  168. void sockaddrcpy(sockaddr_t *a, const sockaddr_t *b) {
  169. if(b->sa.sa_family != AF_UNKNOWN) {
  170. *a = *b;
  171. } else {
  172. a->unknown.family = AF_UNKNOWN;
  173. a->unknown.address = xstrdup(b->unknown.address);
  174. a->unknown.port = xstrdup(b->unknown.port);
  175. }
  176. }
  177. void sockaddrfree(sockaddr_t *a) {
  178. if(a->sa.sa_family == AF_UNKNOWN) {
  179. free(a->unknown.address);
  180. free(a->unknown.port);
  181. }
  182. }
  183. void sockaddrunmap(sockaddr_t *sa) {
  184. if(sa->sa.sa_family == AF_INET6 && IN6_IS_ADDR_V4MAPPED(&sa->in6.sin6_addr)) {
  185. sa->in.sin_addr.s_addr = ((uint32_t *) & sa->in6.sin6_addr)[3];
  186. sa->in.sin_family = AF_INET;
  187. }
  188. }
  189. void sockaddr_setport(sockaddr_t *sa, const char *port) {
  190. uint16_t portnum = htons(atoi(port));
  191. if(!portnum) {
  192. return;
  193. }
  194. switch(sa->sa.sa_family) {
  195. case AF_INET:
  196. sa->in.sin_port = portnum;
  197. break;
  198. case AF_INET6:
  199. sa->in6.sin6_port = portnum;
  200. break;
  201. case AF_UNKNOWN:
  202. free(sa->unknown.port);
  203. sa->unknown.port = xstrdup(port);
  204. default:
  205. return;
  206. }
  207. }
  208. /* Subnet mask handling */
  209. int maskcmp(const void *va, const void *vb, int masklen) {
  210. int i, m, result;
  211. const char *a = va;
  212. const char *b = vb;
  213. for(m = masklen, i = 0; m >= 8; m -= 8, i++) {
  214. result = a[i] - b[i];
  215. if(result) {
  216. return result;
  217. }
  218. }
  219. if(m)
  220. return (a[i] & (0x100 - (1 << (8 - m)))) -
  221. (b[i] & (0x100 - (1 << (8 - m))));
  222. return 0;
  223. }
  224. void mask(void *va, int masklen, int len) {
  225. int i;
  226. char *a = va;
  227. i = masklen / 8;
  228. masklen %= 8;
  229. if(masklen) {
  230. a[i++] &= (0x100 - (1 << (8 - masklen)));
  231. }
  232. for(; i < len; i++) {
  233. a[i] = 0;
  234. }
  235. }
  236. void maskcpy(void *va, const void *vb, int masklen, int len) {
  237. int i, m;
  238. char *a = va;
  239. const char *b = vb;
  240. for(m = masklen, i = 0; m >= 8; m -= 8, i++) {
  241. a[i] = b[i];
  242. }
  243. if(m) {
  244. a[i] = b[i] & (0x100 - (1 << (8 - m)));
  245. i++;
  246. }
  247. for(; i < len; i++) {
  248. a[i] = 0;
  249. }
  250. }
  251. bool maskcheck(const void *va, int masklen, int len) {
  252. int i;
  253. const char *a = va;
  254. i = masklen / 8;
  255. masklen %= 8;
  256. if(masklen && a[i++] & (0xff >> masklen)) {
  257. return false;
  258. }
  259. for(; i < len; i++)
  260. if(a[i] != 0) {
  261. return false;
  262. }
  263. return true;
  264. }