X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fnetutl.c;h=4d91bf4460cb1e40662e0c47c915cf4f804b27ed;hp=2ad30fc6b057458b6a5ea5fd64975ec047a09fc2;hb=d333fca4d611b85dd922ddf35bd9eddcb8095c85;hpb=c2b9c06062d36bde859b630b99a08c7b7428e721 diff --git a/src/netutl.c b/src/netutl.c index 2ad30fc6..4d91bf44 100644 --- a/src/netutl.c +++ b/src/netutl.c @@ -17,7 +17,7 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: netutl.c,v 1.12.4.24 2002/02/18 16:25:16 guus Exp $ + $Id: netutl.c,v 1.12.4.37 2002/06/07 11:14:05 wsl Exp $ */ #include "config.h" @@ -27,6 +27,9 @@ #include #include #include +#ifndef HAVE_NETBSD + #include +#endif #include #include #include @@ -101,9 +104,10 @@ void sockaddr2str(sockaddr_t *sa, char **addrstr, char **portstr) { char address[NI_MAXHOST]; char port[NI_MAXSERV]; + char *scopeid; int err; cp - if((err = getnameinfo((struct sockaddr *)sa, sizeof(sockaddr_t), address, sizeof(address), port, sizeof(port), NI_NUMERICHOST|NI_NUMERICSERV))) + if((err = getnameinfo(&sa->sa, SALEN(sa->sa), address, sizeof(address), port, sizeof(port), NI_NUMERICHOST|NI_NUMERICSERV))) { syslog(LOG_ERR, _("Error while translating addresses: %s"), gai_strerror(err)); cp_trace(); @@ -111,6 +115,11 @@ cp exit(0); } +#ifdef HAVE_LINUX + if((scopeid = strchr(address, '%'))) + *scopeid = '\0'; /* Descope. */ +#endif + *addrstr = xstrdup(address); *portstr = xstrdup(port); cp @@ -123,7 +132,7 @@ char *sockaddr2hostname(sockaddr_t *sa) char port[NI_MAXSERV] = "unknown"; int err; cp - if((err = getnameinfo((struct sockaddr *)sa, sizeof(sockaddr_t), address, sizeof(address), port, sizeof(port), hostnames?0:(NI_NUMERICHOST|NI_NUMERICSERV)))) + if((err = getnameinfo(&sa->sa, SALEN(sa->sa), address, sizeof(address), port, sizeof(port), hostnames?0:(NI_NUMERICHOST|NI_NUMERICSERV)))) { syslog(LOG_ERR, _("Error while looking up hostname: %s"), gai_strerror(err)); } @@ -147,9 +156,15 @@ cp case AF_UNSPEC: return 0; case AF_INET: - return memcmp(&a->in, &b->in, sizeof(a->in)); + result = memcmp(&a->in.sin_addr, &b->in.sin_addr, sizeof(a->in.sin_addr)); + if(result) + return result; + return memcmp(&a->in.sin_port, &b->in.sin_port, sizeof(a->in.sin_port)); case AF_INET6: - return memcmp(&a->in6, &b->in6, sizeof(a->in6)); + result = memcmp(&a->in6.sin6_addr, &b->in6.sin6_addr, sizeof(a->in6.sin6_addr)); + if(result) + return result; + return memcmp(&a->in6.sin6_port, &b->in6.sin6_port, sizeof(a->in6.sin6_port)); default: syslog(LOG_ERR, _("sockaddrcmp() was called with unknown address family %d, exitting!"), a->sa.sa_family); cp_trace(); @@ -159,18 +174,27 @@ cp cp } +void sockaddrunmap(sockaddr_t *sa) +{ + if(sa->sa.sa_family == AF_INET6 && IN6_IS_ADDR_V4MAPPED(&sa->in6.sin6_addr)) + { + sa->in.sin_addr.s_addr = ((uint32_t *)&sa->in6.sin6_addr)[3]; + sa->in.sin_family = AF_INET; + } +} + /* Subnet mask handling */ int maskcmp(char *a, char *b, int masklen, int len) { int i, m, result; cp - for(m = masklen, i = 0; m > 8; m -= 8, i++) + for(m = masklen, i = 0; m >= 8; m -= 8, i++) if((result = a[i] - b[i])) return result; if(m) - return (a[i] & (0x100 - (m << 1))) - (b[i] & (0x100 - (m << 1))); + return (a[i] & (0x100 - (1 << (8 - m)))) - (b[i] & (0x100 - (1 << (8 - m)))); return 0; } @@ -183,7 +207,7 @@ cp masklen %= 8; if(masklen) - a[i++] &= (0x100 - (masklen << 1)); + a[i++] &= (0x100 - (1 << masklen)); for(; i < len; i++) a[i] = 0; @@ -193,12 +217,12 @@ void maskcpy(char *a, char *b, int masklen, int len) { int i, m; cp - for(m = masklen, i = 0; m > 8; m -= 8, i++) + for(m = masklen, i = 0; m >= 8; m -= 8, i++) a[i] = b[i]; if(m) { - a[i] = b[i] & (0x100 - (m << 1)); + a[i] = b[i] & (0x100 - (1 << m)); i++; } @@ -212,14 +236,13 @@ int maskcheck(char *a, int masklen, int len) cp i = masklen / 8; masklen %= 8; - - if(masklen) - if(a[i++] & ~(0x100 - (masklen << 1))) - return -1; - + + if(a[i++] & (0xff >> masklen)) + return -1; + for(; i < len; i++) if(a[i] != 0) - return -1; + return -2; return 0; }