source: roaraudio/libroar/socket.c @ 509:17952ed84309

Last change on this file since 509:17952ed84309 was 509:17952ed84309, checked in by phi, 16 years ago

started with IPv6 support

File size: 10.9 KB
Line 
1//socket.c:
2
3#include "libroar.h"
4
5#define MODE_LISTEN  ROAR_SOCKET_MODE_LISTEN
6#define MODE_CONNECT ROAR_SOCKET_MODE_CONNECT
7
8int roar_socket_new_tcp (void) {
9 int fh;
10 int opt = IPTOS_LOWDELAY;
11
12 fh = socket(PF_INET, SOCK_STREAM, 0);
13
14 setsockopt(fh, IPPROTO_IP, IP_TOS, &opt, sizeof(int));
15
16 return fh;
17}
18
19int roar_socket_new_udp (void) {
20 int fh;
21 int opt = IPTOS_LOWDELAY;
22
23 fh = socket(PF_INET, SOCK_DGRAM, 0);
24
25 setsockopt(fh, IPPROTO_IP, IP_TOS, &opt, sizeof(int));
26
27 return fh;
28}
29
30int roar_socket_new_tcp6 (void) {
31#ifdef PF_INET6
32 int fh;
33 int opt = IPTOS_LOWDELAY;
34
35 fh = socket(PF_INET6, SOCK_STREAM, 0);
36
37 setsockopt(fh, IPPROTO_IP, IP_TOS, &opt, sizeof(int));
38
39 return fh;
40#else
41 return -1;
42#endif
43}
44
45int roar_socket_new_udp6 (void) {
46#ifdef PF_INET6
47 int fh;
48 int opt = IPTOS_LOWDELAY;
49
50 fh = socket(PF_INET6, SOCK_DGRAM, 0);
51
52 setsockopt(fh, IPPROTO_IP, IP_TOS, &opt, sizeof(int));
53
54 return fh;
55#else
56 return -1;
57#endif
58}
59
60int roar_socket_new_unix (void) {
61 int fh;
62#ifdef SO_PEERCRED
63 int opt = 1;
64#endif
65
66 fh = socket(AF_UNIX, SOCK_STREAM, 0);
67
68#ifdef SO_PEERCRED
69 setsockopt(fh, SOL_SOCKET, SO_PASSCRED, &opt, sizeof(int));
70#endif
71
72 return fh;
73}
74
75int roar_socket_new_decnet_seqpacket (void) {
76#ifdef ROAR_HAVE_LIBDNET
77 int fh;
78
79 fh = socket(AF_DECnet, SOCK_SEQPACKET, DNPROTO_NSP);
80
81 return fh;
82#else
83 return -1;
84#endif
85}
86
87
88int roar_socket_new_decnet_stream (void) {
89#ifdef ROAR_HAVE_LIBDNET
90 int fh;
91
92 fh = socket(AF_DECnet, SOCK_STREAM, DNPROTO_NSP);
93
94 return fh;
95#else
96 return -1;
97#endif
98}
99
100
101int roar_socket_nonblock(int fh, int state) {
102 int flags;
103
104 if ( (flags = fcntl(fh, F_GETFL, 0)) == -1 ) {
105  ROAR_ERR("roar_socket_nonblock(fh=%i, state=%i): Can not read flags: %s", fh, state, strerror(errno));
106  ROAR_DBG("roar_socket_nonblock(fh=%i, state=%i) = -1", fh, state);
107  return -1;
108 }
109
110 flags |= O_NONBLOCK;
111
112 if ( state == ROAR_SOCKET_BLOCK )
113  flags -= O_NONBLOCK;
114
115 if ( fcntl(fh, F_SETFL, flags) == -1 ) {
116  ROAR_ERR("roar_socket_nonblock(fh=%i, state=%i): Can not set flags: %s", fh, state, strerror(errno));
117  ROAR_DBG("roar_socket_nonblock(fh=%i, state=%i) = -1", fh, state);
118  return -1;
119 }
120
121 ROAR_DBG("roar_socket_nonblock(fh=%i, state=%i) = 0", fh, state);
122 return 0;
123}
124
125int roar_socket_dup_udp_local_end (int fh) {
126 int                  n              = -1;
127 int                  flags          = -1;
128 struct sockaddr_in   socket_addr;
129 socklen_t            len            = sizeof(struct sockaddr_in);
130
131 if ( (flags = fcntl(fh, F_GETFL, 0)) == -1 ) {
132  ROAR_WARN("roar_socket_dup_udp_local_end(fh=%i): Can not read flags: %s", fh, strerror(errno));
133 }
134
135 if ( getsockname(fh, (struct sockaddr *)&socket_addr, &len) == -1 ) {
136  return -1;
137 }
138
139 if ( socket_addr.sin_family != AF_INET ) {
140  return -1;
141 }
142
143 n = roar_socket_new_udp();
144
145 if ( n == -1 )
146  return -1;
147
148//  if ( mode_func(fh, (struct sockaddr *)&socket_addr, sizeof(struct sockaddr_in)) == -1 ) {
149 if ( bind(n, (struct sockaddr *)&socket_addr, len) == -1 ) {
150  close(n);
151  return -1;
152 }
153
154 if ( flags != -1 ) {
155  if ( fcntl(fh, F_SETFL, flags) == -1 ) {
156   ROAR_WARN("roar_socket_dup_udp_local_end(fh=%i): Can not set flags: %s", fh, strerror(errno));
157   return -1;
158  }
159 }
160
161
162 return n;
163}
164
165int roar_socket_listen  (int type, char * host, int port) {
166 return roar_socket_open(MODE_LISTEN, type, host, port);
167}
168
169int roar_socket_connect (char * host, int port) {
170 char * proxy_type = getenv("ROAR_PROXY");
171
172 if ( proxy_type == NULL || strcmp(proxy_type, "") == 0 ) {
173  return roar_socket_open(MODE_CONNECT, ROAR_SOCKET_TYPE_UNKNOWN, host, port);
174 } else {
175  return roar_socket_open_proxy(MODE_CONNECT, ROAR_SOCKET_TYPE_UNKNOWN, host, port, proxy_type);
176 }
177}
178
179
180int roar_socket_listen_decnet (char * object, int num) {
181#ifdef ROAR_HAVE_LIBDNET
182 int fh = roar_socket_new_decnet_stream();
183 struct sockaddr_dn bind_sockaddr;
184
185 if ( fh == -1 )
186  return -1;
187
188 if ( !*object )
189  object = NULL;
190
191 if ( (object && num) || (!*object && !num) ) {
192  ROAR_WARN("roar_socket_listen_decnet(object='%s', num=%i): illegal address!", object, num);
193  close(fh);
194  return -1;
195 }
196
197 memset((void*)&bind_sockaddr, 0, sizeof(struct sockaddr_dn));
198
199 bind_sockaddr.sdn_family    = AF_DECnet;
200 bind_sockaddr.sdn_flags     = 0;
201 bind_sockaddr.sdn_objnum    = num;
202
203 if ( num ) {
204  bind_sockaddr.sdn_objnamel = 0;
205 } else {
206  bind_sockaddr.sdn_objnamel  = ROAR_dn_htons(strlen(object));
207  strcpy((char*)bind_sockaddr.sdn_objname, object); // FIXME: shouldn't we use strncpy()?
208 }
209
210 if ( bind(fh, (struct sockaddr *) &bind_sockaddr, sizeof(bind_sockaddr)) == -1 ) {
211  close(fh);
212  return -1;
213 }
214
215 if ( listen(fh, 8) == -1 ) {
216  close(fh);
217  return -1;
218 }
219
220 return fh;
221#else
222 return -1;
223#endif
224}
225
226int roar_socket_open (int mode, int type, char * host, int port) {
227// int type = ROAR_SOCKET_TYPE_INET;
228 int fh;
229 struct sockaddr_in   socket_addr;
230 struct sockaddr_un   socket_addr_un;
231 struct hostent     * he;
232 //unsigned int host_div = 0;
233 int (*mode_func)(int sockfd, const struct sockaddr *serv_addr, socklen_t addrlen) = connect; // default is to connect
234#ifdef ROAR_HAVE_LIBDNET
235 char obj[80];
236 char * del;
237#endif
238
239 if ( mode == MODE_LISTEN )
240  mode_func = bind;
241
242 if ( type == ROAR_SOCKET_TYPE_UNKNOWN ) {
243  type = ROAR_SOCKET_TYPE_INET;
244  if ( *host == '/' ) {
245   type = ROAR_SOCKET_TYPE_UNIX;
246  } else if ( strcmp(host, "+fork") == 0 ) {
247   type = ROAR_SOCKET_TYPE_FORK;
248  } else if ( strstr(host, "::") != NULL ) {
249   type = ROAR_SOCKET_TYPE_DECNET;
250  }
251 }
252
253
254 ROAR_DBG("roar_socket_open(*): type=%s, host='%s', port=%i",
255             type == ROAR_SOCKET_TYPE_UNIX ? "UNIX" : "INET", host, port);
256
257 if ( type == ROAR_SOCKET_TYPE_DECNET ) {
258#ifdef ROAR_HAVE_LIBDNET
259   ROAR_DBG("roar_socket_open(*): hostname for DECnet: host(%p)=%s", host, host);
260   del = strstr(host, "::");
261   ROAR_DBG("roar_socket_open(*): hostname for DECnet: del(%p)=%s", del, del);
262
263   if ( del == NULL ) {
264    ROAR_WARN("roar_socket_open(*): invalid hostname for DECnet: %s", host);
265    return -1;
266   }
267
268   *del = 0;
269
270   if ( *(del+2) == '#' ) { // assume we have node::#num
271    port = atoi(del+2);
272   }
273
274   if ( port ) {
275    sprintf(obj, "%i", port); // no need for snprintf() as dec(port) is smaller than obj[]
276   } else {
277    *obj = 0;
278    strncat(obj, del+2, 79);
279   }
280
281  if ( mode == MODE_LISTEN ) {
282   fh = roar_socket_listen_decnet(obj, port);
283   *del = ':';
284   return fh;
285//   return -1; // listen sockets on DECnet are not supportet at the moment
286  } else {
287   // There is nothing wrong in this case to use dnet_conn() so we do.
288   fh = dnet_conn(host, obj, SOCK_STREAM, 0 ,0 ,0 , 0);
289   *del = ':';
290   return fh;
291#else
292   return -1; // no decnet support
293#endif
294  }
295 }
296
297 memset(&socket_addr   , 0, sizeof(socket_addr));
298 memset(&socket_addr_un, 0, sizeof(socket_addr_un));
299 memset(&he,             0, sizeof(he));               // FIXME: we have a valid pointer in here????
300
301
302 if ( type == ROAR_SOCKET_TYPE_INET ) {
303
304  if ( (he = gethostbyname(host)) == NULL ) {
305   ROAR_ERR("roar_socket_open(*): Can\'t resolve host name '%s'",
306                     host);
307   return -1;
308  }
309
310  memcpy((struct in_addr *)&socket_addr.sin_addr, he->h_addr, sizeof(struct in_addr));
311
312  /* set the connect information */
313  socket_addr.sin_family = AF_INET;
314  socket_addr.sin_port = htons( port );
315
316  fh = roar_socket_new_tcp();
317
318  if ( mode_func(fh, (struct sockaddr *)&socket_addr, sizeof(struct sockaddr_in)) == -1 ) {
319   ROAR_DBG("roar_socket_open(*): Can not connect/bind: %s", strerror(errno));
320   close(fh);
321   return -1;
322  }
323  // hey! we have a socket...
324 } else if ( type == ROAR_SOCKET_TYPE_UNIX ) {
325  socket_addr_un.sun_family = AF_UNIX;
326  strncpy(socket_addr_un.sun_path, host, sizeof(socket_addr_un.sun_path) - 1);
327
328  fh = roar_socket_new_unix();
329
330  if ( mode_func(fh, (struct sockaddr *)&socket_addr_un, sizeof(struct sockaddr_un)) == -1 ) {
331   ROAR_DBG("roar_socket_open(*): Can not connect/bind: %s", strerror(errno));
332   close(fh);
333   return -1;
334  }
335 } else if ( type == ROAR_SOCKET_TYPE_FORK ) {
336  return roar_socket_open_fork(mode, host, port);
337 } else if ( type == ROAR_SOCKET_TYPE_FILE ) {
338  return roar_socket_open_file(mode, host, port);
339 } else {
340  return -1;
341 }
342
343 if ( mode == MODE_LISTEN )
344  if ( listen(fh, ROAR_SOCKET_QUEUE_LEN) == -1 ) {
345   close(fh);
346   return -1;
347  }
348
349 return fh;
350}
351
352int roar_socket_open_fork  (int mode, char * host, int port) {
353 int socks[2];
354 int r;
355 char fhstr[8];
356
357 if ( mode == MODE_LISTEN )
358  return -1;
359
360 if ( socketpair(AF_UNIX, SOCK_STREAM, 0, socks) == -1 ) {
361  return -1;
362 }
363
364 r = fork();
365
366 if ( r == -1 ) { // error!
367  ROAR_ERR("roar_socket_open_fork(*): Can not fork: %s", strerror(errno));
368  close(socks[0]);
369  close(socks[1]);
370  return -1;
371 } else if ( r == 0 ) { // we are the child
372  close(socks[0]);
373
374  close(ROAR_STDIN ); // we do not want roard to have any standard input
375  close(ROAR_STDOUT); // STDOUT is also not needed, so we close it,
376                      // but STDERR we keep open for error messages.
377
378  snprintf(fhstr, 7, "%i", socks[1]);
379
380  execlp("roard", "roard", "--terminate", "--no-listen", "--client-fh", fhstr, NULL);
381
382  // we are still alive?
383  ROAR_ERR("roar_socket_open_fork(*): alive after exec(), that's bad!");
384  _exit(1);
385 } else { // we are the parent
386  close(socks[1]);
387  return socks[0];
388 }
389
390 return -1;
391}
392
393int roar_socket_open_file  (int mode, char * host, int port) {
394 int fh;
395
396 if ( mode == MODE_LISTEN )
397  return -1;
398
399 if ( (fh = open(host, O_RDONLY, 0644)) == -1 ) {
400  ROAR_ERR("roar_socket_open_file(*): Can not open file %s: %s", host, strerror(errno));
401 }
402
403 return fh;
404}
405
406// --- [ PROXY CODE ] ---
407
408// generic proxy code:
409
410int roar_socket_open_proxy (int mode, int type, char * host, int port, char * proxy_type) {
411 int    proxy_port;
412 char   proxy_host[ROAR_SOCKET_MAX_HOSTNAMELEN];
413 char * proxy_addr;
414 int    i;
415 int    fh;
416
417 // TODO: change this so we support listen() proxys (ssh -R)
418 if ( mode != MODE_CONNECT )
419  return -1;
420
421 if ( !strcmp(proxy_type, "socks4a") ) { // for TOR, the only supported type at the moment
422  proxy_addr = getenv("socks_proxy");
423
424  proxy_port = 9050; // TOR's default port
425
426  if ( proxy_addr == NULL )
427   return -1;
428
429  for (i = 0; proxy_addr[i] != 0 && proxy_addr[i] != ':' && i < ROAR_SOCKET_MAX_HOSTNAMELEN; i++)
430   proxy_host[i] = proxy_addr[i];
431  proxy_host[i] = 0;
432
433  if ( i == 0 ) // no hostname found
434   return -1;
435
436  if ( proxy_addr[i] == ':' )
437   proxy_port = atoi(&proxy_addr[i+1]);
438
439  if ( (fh = roar_socket_open(mode, type, proxy_host, proxy_port)) == -1) {
440   return -1;
441  }
442
443  if ( roar_socket_open_socks4a(mode, fh, host, port) == -1 ) {
444   close(fh);
445   return -1;
446  }
447
448  return fh;
449 } else {
450  return -1; // unknown type
451 }
452}
453
454// protocoll dependet proxy code:
455
456int roar_socket_open_socks4a(int mode, int fh, char * host, int port) {
457 char buf[9];
458 int  len;
459
460 buf[0] = 0x04;
461 buf[1] = mode == MODE_CONNECT ? 0x01 : 0x02;
462 *((uint16_t*)&buf[2]) = htons(port);
463 buf[4] = 0x00;
464 buf[5] = 0x00;
465 buf[6] = 0x00;
466 buf[7] = 0x01;
467 buf[8] = 0x00;
468
469 if ( write(fh, buf, 9) != 9 )
470  return -1;
471
472 len = strlen(host);
473
474 if ( write(fh, host, len) != len )
475  return -1;
476
477 if ( write(fh, "\0", 1) != 1 )
478  return -1;
479
480 if ( read(fh, buf, 8) != 8 )
481  return -1;
482
483 if ( buf[1] != 0x5a )
484  return -1;
485
486 return 0;
487}
488
489//ll
Note: See TracBrowser for help on using the repository browser.