X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fnetutl.c;h=ea4839f077b984fc4ddc474dfb41bef32933aee2;hp=e9f74d08ee55a226f6128ff34f8afe7baa83ea5c;hb=e8e69460a7090aaf6ecda8970d3060695de81b00;hpb=d3f889c8076dff9c00ebfe1459cb36425f8da41d diff --git a/src/netutl.c b/src/netutl.c index e9f74d08..ea4839f0 100644 --- a/src/netutl.c +++ b/src/netutl.c @@ -1,7 +1,7 @@ /* netutl.c -- some supporting network utility code - Copyright (C) 1998-2001 Ivo Timmermans - 2000,2001 Guus Sliepen + Copyright (C) 1998-2002 Ivo Timmermans + 2000-2002 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -17,19 +17,21 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: netutl.c,v 1.12.4.18 2001/01/07 17:09:02 guus Exp $ + $Id: netutl.c,v 1.12.4.25 2002/02/20 17:15:33 guus Exp $ */ #include "config.h" -#include +#include #include #include #include #include #include +#include #include #include +#include #include #include @@ -41,75 +43,183 @@ #include "system.h" -char *hostlookup(unsigned long addr) +int hostnames = 0; + +/* + Turn a string into a struct addrinfo. + Return NULL on failure. +*/ +struct addrinfo *str2addrinfo(char *address, char *service, int socktype) { - char *name; - struct hostent *host = NULL; - struct in_addr in; - config_t const *cfg; - int lookup_hostname; + struct addrinfo hint, *ai; + int err; cp - in.s_addr = addr; - - lookup_hostname = 0; - if((cfg = get_config_val(config, config_hostnames)) != NULL) - if(cfg->data.val == stupid_true) - lookup_hostname = 1; + memset(&hint, 0, sizeof(hint)); - if(lookup_hostname) - host = gethostbyaddr((char *)&in, sizeof(in), AF_INET); + hint.ai_family = addressfamily; + hint.ai_socktype = socktype; - if(!lookup_hostname || !host) + if((err = getaddrinfo(address, service, &hint, &ai))) { - asprintf(&name, "%s", inet_ntoa(in)); + if(debug_lvl >= DEBUG_ERROR) + syslog(LOG_WARNING, _("Error looking up %s port %s: %s\n"), address, service, gai_strerror(err)); + cp_trace(); + return NULL; } - else + +cp + return ai; +} + +sockaddr_t str2sockaddr(char *address, char *port) +{ + struct addrinfo hint, *ai; + sockaddr_t result; + int err; +cp + memset(&hint, 0, sizeof(hint)); + + hint.ai_family = AF_UNSPEC; + hint.ai_flags = AI_NUMERICHOST; + hint.ai_socktype = SOCK_STREAM; + + if((err = getaddrinfo(address, port, &hint, &ai) || !ai)) { - asprintf(&name, "%s", host->h_name); + syslog(LOG_ERR, _("Error looking up %s port %s: %s\n"), address, port, gai_strerror(err)); + cp_trace(); + raise(SIGFPE); + exit(0); } + + result = *(sockaddr_t *)ai->ai_addr; + freeaddrinfo(ai); cp - return name; + return result; } -/* - Turn a string into an IP addy with netmask - return NULL on failure -*/ -ip_mask_t *strtoip(char *str) +void sockaddr2str(sockaddr_t *sa, char **addrstr, char **portstr) { - ip_mask_t *ip; - int masker; - char *q, *p; - struct hostent *h; + char address[NI_MAXHOST]; + char port[NI_MAXSERV]; + int err; cp - p = str; - if((q = strchr(p, '/'))) + if((err = getnameinfo((struct sockaddr *)sa, sizeof(sockaddr_t), address, sizeof(address), port, sizeof(port), NI_NUMERICHOST|NI_NUMERICSERV))) { - *q = '\0'; - q++; /* q now points to netmask part, or NULL if no mask */ + syslog(LOG_ERR, _("Error while translating addresses: %s"), gai_strerror(err)); + cp_trace(); + raise(SIGFPE); + exit(0); } - if(!(h = gethostbyname(p))) + *addrstr = xstrdup(address); + *portstr = xstrdup(port); +cp +} + +char *sockaddr2hostname(sockaddr_t *sa) +{ + char *str; + char address[NI_MAXHOST] = "unknown"; + char port[NI_MAXSERV] = "unknown"; + int err; +cp + if((err = getnameinfo((struct sockaddr *)sa, sizeof(sockaddr_t), address, sizeof(address), port, sizeof(port), hostnames?0:(NI_NUMERICHOST|NI_NUMERICSERV)))) { - if(debug_lvl >= DEBUG_ERROR) - syslog(LOG_WARNING, _("Error looking up `%s': %s\n"), p, strerror(errno)); - - return NULL; + syslog(LOG_ERR, _("Error while looking up hostname: %s"), gai_strerror(err)); } - masker = 0; - if(q) + asprintf(&str, _("%s port %s"), address, port); +cp + return str; +} + +int sockaddrcmp(sockaddr_t *a, sockaddr_t *b) +{ + int result; +cp + result = a->sa.sa_family - b->sa.sa_family; + + if(result) + return result; + + switch(a->sa.sa_family) { - masker = strtol(q, &p, 10); - if(q == p || (*p)) - return NULL; + case AF_UNSPEC: + return 0; + case AF_INET: + return memcmp(&a->in, &b->in, sizeof(a->in)); + case AF_INET6: + return memcmp(&a->in6, &b->in6, sizeof(a->in6)); + default: + syslog(LOG_ERR, _("sockaddrcmp() was called with unknown address family %d, exitting!"), a->sa.sa_family); + cp_trace(); + raise(SIGFPE); + exit(0); } +cp +} - ip = xmalloc(sizeof(*ip)); - ip->address = ntohl(*((ip_t*)(h->h_addr_list[0]))); +/* Subnet mask handling */ - ip->mask = masker ? ~((1 << (32 - masker)) - 1) : 0; +int maskcmp(char *a, char *b, int masklen, int len) +{ + int i, m, result; cp - return ip; + for(m = masklen, i = 0; m >= 8; m -= 8, i++) + if((result = a[i] - b[i])) + return result; + + if(m) + return (a[i] & (0x100 - (m << 1))) - (b[i] & (0x100 - (m << 1))); + + return 0; } +void mask(char *a, int masklen, int len) +{ + int i; +cp + i = masklen / 8; + masklen %= 8; + + if(masklen) + a[i++] &= (0x100 - (masklen << 1)); + + for(; i < len; i++) + a[i] = 0; +} + +void maskcpy(char *a, char *b, int masklen, int len) +{ + int i, m; +cp + for(m = masklen, i = 0; m >= 8; m -= 8, i++) + a[i] = b[i]; + + if(m) + { + a[i] = b[i] & (0x100 - (m << 1)); + i++; + } + + for(; i < len; i++) + a[i] = 0; +} + +int maskcheck(char *a, int masklen, int len) +{ + int i; +cp + i = masklen / 8; + masklen %= 8; + + if(masklen) + if(a[i++] & ~(0x100 - (masklen << 1))) + return -1; + + for(; i < len; i++) + if(a[i] != 0) + return -1; + + return 0; +}