source: roaraudio/libroar/socket.c @ 512:8fb7528db636

Last change on this file since 512:8fb7528db636 was 512:8fb7528db636, checked in by phi, 16 years ago

use an union for all the sockaddr_*s

File size: 10.9 KB
Line 
1//socket.c:
2
3#include "libroar.h"
4
5#define MODE_LISTEN  ROAR_SOCKET_MODE_LISTEN
6#define MODE_CONNECT ROAR_SOCKET_MODE_CONNECT
7
8int roar_socket_new_tcp (void) {
9 int fh;
10 int opt = IPTOS_LOWDELAY;
11
12 fh = socket(PF_INET, SOCK_STREAM, 0);
13
14 setsockopt(fh, IPPROTO_IP, IP_TOS, &opt, sizeof(int));
15
16 return fh;
17}
18
19int roar_socket_new_udp (void) {
20 int fh;
21 int opt = IPTOS_LOWDELAY;
22
23 fh = socket(PF_INET, SOCK_DGRAM, 0);
24
25 setsockopt(fh, IPPROTO_IP, IP_TOS, &opt, sizeof(int));
26
27 return fh;
28}
29
30int roar_socket_new_tcp6 (void) {
31#ifdef PF_INET6
32 int fh;
33 int opt = IPTOS_LOWDELAY;
34
35 fh = socket(PF_INET6, SOCK_STREAM, 0);
36
37 setsockopt(fh, IPPROTO_IP, IP_TOS, &opt, sizeof(int));
38
39 return fh;
40#else
41 return -1;
42#endif
43}
44
45int roar_socket_new_udp6 (void) {
46#ifdef PF_INET6
47 int fh;
48 int opt = IPTOS_LOWDELAY;
49
50 fh = socket(PF_INET6, SOCK_DGRAM, 0);
51
52 setsockopt(fh, IPPROTO_IP, IP_TOS, &opt, sizeof(int));
53
54 return fh;
55#else
56 return -1;
57#endif
58}
59
60int roar_socket_new_unix (void) {
61 int fh;
62#ifdef SO_PEERCRED
63 int opt = 1;
64#endif
65
66 fh = socket(AF_UNIX, SOCK_STREAM, 0);
67
68#ifdef SO_PEERCRED
69 setsockopt(fh, SOL_SOCKET, SO_PASSCRED, &opt, sizeof(int));
70#endif
71
72 return fh;
73}
74
75int roar_socket_new_decnet_seqpacket (void) {
76#ifdef ROAR_HAVE_LIBDNET
77 int fh;
78
79 fh = socket(AF_DECnet, SOCK_SEQPACKET, DNPROTO_NSP);
80
81 return fh;
82#else
83 return -1;
84#endif
85}
86
87
88int roar_socket_new_decnet_stream (void) {
89#ifdef ROAR_HAVE_LIBDNET
90 int fh;
91
92 fh = socket(AF_DECnet, SOCK_STREAM, DNPROTO_NSP);
93
94 return fh;
95#else
96 return -1;
97#endif
98}
99
100
101int roar_socket_nonblock(int fh, int state) {
102 int flags;
103
104 if ( (flags = fcntl(fh, F_GETFL, 0)) == -1 ) {
105  ROAR_ERR("roar_socket_nonblock(fh=%i, state=%i): Can not read flags: %s", fh, state, strerror(errno));
106  ROAR_DBG("roar_socket_nonblock(fh=%i, state=%i) = -1", fh, state);
107  return -1;
108 }
109
110 flags |= O_NONBLOCK;
111
112 if ( state == ROAR_SOCKET_BLOCK )
113  flags -= O_NONBLOCK;
114
115 if ( fcntl(fh, F_SETFL, flags) == -1 ) {
116  ROAR_ERR("roar_socket_nonblock(fh=%i, state=%i): Can not set flags: %s", fh, state, strerror(errno));
117  ROAR_DBG("roar_socket_nonblock(fh=%i, state=%i) = -1", fh, state);
118  return -1;
119 }
120
121 ROAR_DBG("roar_socket_nonblock(fh=%i, state=%i) = 0", fh, state);
122 return 0;
123}
124
125int roar_socket_dup_udp_local_end (int fh) {
126 int                  n              = -1;
127 int                  flags          = -1;
128 struct sockaddr_in   socket_addr;
129 socklen_t            len            = sizeof(struct sockaddr_in);
130
131 if ( (flags = fcntl(fh, F_GETFL, 0)) == -1 ) {
132  ROAR_WARN("roar_socket_dup_udp_local_end(fh=%i): Can not read flags: %s", fh, strerror(errno));
133 }
134
135 if ( getsockname(fh, (struct sockaddr *)&socket_addr, &len) == -1 ) {
136  return -1;
137 }
138
139 if ( socket_addr.sin_family != AF_INET ) {
140  return -1;
141 }
142
143 n = roar_socket_new_udp();
144
145 if ( n == -1 )
146  return -1;
147
148//  if ( mode_func(fh, (struct sockaddr *)&socket_addr, sizeof(struct sockaddr_in)) == -1 ) {
149 if ( bind(n, (struct sockaddr *)&socket_addr, len) == -1 ) {
150  close(n);
151  return -1;
152 }
153
154 if ( flags != -1 ) {
155  if ( fcntl(fh, F_SETFL, flags) == -1 ) {
156   ROAR_WARN("roar_socket_dup_udp_local_end(fh=%i): Can not set flags: %s", fh, strerror(errno));
157   return -1;
158  }
159 }
160
161
162 return n;
163}
164
165int roar_socket_listen  (int type, char * host, int port) {
166 return roar_socket_open(MODE_LISTEN, type, host, port);
167}
168
169int roar_socket_connect (char * host, int port) {
170 char * proxy_type = getenv("ROAR_PROXY");
171
172 if ( proxy_type == NULL || strcmp(proxy_type, "") == 0 ) {
173  return roar_socket_open(MODE_CONNECT, ROAR_SOCKET_TYPE_UNKNOWN, host, port);
174 } else {
175  return roar_socket_open_proxy(MODE_CONNECT, ROAR_SOCKET_TYPE_UNKNOWN, host, port, proxy_type);
176 }
177}
178
179
180int roar_socket_listen_decnet (char * object, int num) {
181#ifdef ROAR_HAVE_LIBDNET
182 int fh = roar_socket_new_decnet_stream();
183 struct sockaddr_dn bind_sockaddr;
184
185 if ( fh == -1 )
186  return -1;
187
188 if ( !*object )
189  object = NULL;
190
191 if ( (object && num) || (!*object && !num) ) {
192  ROAR_WARN("roar_socket_listen_decnet(object='%s', num=%i): illegal address!", object, num);
193  close(fh);
194  return -1;
195 }
196
197 memset((void*)&bind_sockaddr, 0, sizeof(struct sockaddr_dn));
198
199 bind_sockaddr.sdn_family    = AF_DECnet;
200 bind_sockaddr.sdn_flags     = 0;
201 bind_sockaddr.sdn_objnum    = num;
202
203 if ( num ) {
204  bind_sockaddr.sdn_objnamel = 0;
205 } else {
206  bind_sockaddr.sdn_objnamel  = ROAR_dn_htons(strlen(object));
207  strcpy((char*)bind_sockaddr.sdn_objname, object); // FIXME: shouldn't we use strncpy()?
208 }
209
210 if ( bind(fh, (struct sockaddr *) &bind_sockaddr, sizeof(bind_sockaddr)) == -1 ) {
211  close(fh);
212  return -1;
213 }
214
215 if ( listen(fh, 8) == -1 ) {
216  close(fh);
217  return -1;
218 }
219
220 return fh;
221#else
222 return -1;
223#endif
224}
225
226int roar_socket_open (int mode, int type, char * host, int port) {
227// int type = ROAR_SOCKET_TYPE_INET;
228 int fh;
229 union {
230  struct sockaddr_in  in;
231  struct sockaddr_un  un;
232 } socket_addr;
233 struct hostent     * he;
234 //unsigned int host_div = 0;
235 int (*mode_func)(int sockfd, const struct sockaddr *serv_addr, socklen_t addrlen) = connect; // default is to connect
236#ifdef ROAR_HAVE_LIBDNET
237 char obj[80];
238 char * del;
239#endif
240
241 if ( mode == MODE_LISTEN )
242  mode_func = bind;
243
244 if ( type == ROAR_SOCKET_TYPE_UNKNOWN ) {
245  type = ROAR_SOCKET_TYPE_INET;
246  if ( *host == '/' ) {
247   type = ROAR_SOCKET_TYPE_UNIX;
248  } else if ( strcmp(host, "+fork") == 0 ) {
249   type = ROAR_SOCKET_TYPE_FORK;
250  } else if ( strstr(host, "::") != NULL ) {
251   type = ROAR_SOCKET_TYPE_DECNET;
252  }
253 }
254
255
256 ROAR_DBG("roar_socket_open(*): type=%s, host='%s', port=%i",
257             type == ROAR_SOCKET_TYPE_UNIX ? "UNIX" : "INET", host, port);
258
259 if ( type == ROAR_SOCKET_TYPE_DECNET ) {
260#ifdef ROAR_HAVE_LIBDNET
261   ROAR_DBG("roar_socket_open(*): hostname for DECnet: host(%p)=%s", host, host);
262   del = strstr(host, "::");
263   ROAR_DBG("roar_socket_open(*): hostname for DECnet: del(%p)=%s", del, del);
264
265   if ( del == NULL ) {
266    ROAR_WARN("roar_socket_open(*): invalid hostname for DECnet: %s", host);
267    return -1;
268   }
269
270   *del = 0;
271
272   if ( *(del+2) == '#' ) { // assume we have node::#num
273    port = atoi(del+2);
274   }
275
276   if ( port ) {
277    sprintf(obj, "%i", port); // no need for snprintf() as dec(port) is smaller than obj[]
278   } else {
279    *obj = 0;
280    strncat(obj, del+2, 79);
281   }
282
283  if ( mode == MODE_LISTEN ) {
284   fh = roar_socket_listen_decnet(obj, port);
285   *del = ':';
286   return fh;
287//   return -1; // listen sockets on DECnet are not supportet at the moment
288  } else {
289   // There is nothing wrong in this case to use dnet_conn() so we do.
290   fh = dnet_conn(host, obj, SOCK_STREAM, 0 ,0 ,0 , 0);
291   *del = ':';
292   return fh;
293#else
294   return -1; // no decnet support
295#endif
296  }
297 }
298
299 memset(&socket_addr,    0, sizeof(socket_addr));
300 memset(&he,             0, sizeof(he));               // FIXME: we have a valid pointer in here????
301
302
303 if ( type == ROAR_SOCKET_TYPE_INET ) {
304
305  if ( (he = gethostbyname(host)) == NULL ) {
306   ROAR_ERR("roar_socket_open(*): Can\'t resolve host name '%s'",
307                     host);
308   return -1;
309  }
310
311  memcpy((struct in_addr *)&socket_addr.in.sin_addr, he->h_addr, sizeof(struct in_addr));
312
313  /* set the connect information */
314  socket_addr.in.sin_family = AF_INET;
315  socket_addr.in.sin_port = htons( port );
316
317  fh = roar_socket_new_tcp();
318
319  if ( mode_func(fh, (struct sockaddr *)&socket_addr.in, sizeof(struct sockaddr_in)) == -1 ) {
320   ROAR_DBG("roar_socket_open(*): Can not connect/bind: %s", strerror(errno));
321   close(fh);
322   return -1;
323  }
324  // hey! we have a socket...
325 } else if ( type == ROAR_SOCKET_TYPE_UNIX ) {
326  socket_addr.un.sun_family = AF_UNIX;
327  strncpy(socket_addr.un.sun_path, host, sizeof(socket_addr.un.sun_path) - 1);
328
329  fh = roar_socket_new_unix();
330
331  if ( mode_func(fh, (struct sockaddr *)&socket_addr.un, sizeof(struct sockaddr_un)) == -1 ) {
332   ROAR_DBG("roar_socket_open(*): Can not connect/bind: %s", strerror(errno));
333   close(fh);
334   return -1;
335  }
336 } else if ( type == ROAR_SOCKET_TYPE_FORK ) {
337  return roar_socket_open_fork(mode, host, port);
338 } else if ( type == ROAR_SOCKET_TYPE_FILE ) {
339  return roar_socket_open_file(mode, host, port);
340 } else {
341  return -1;
342 }
343
344 if ( mode == MODE_LISTEN )
345  if ( listen(fh, ROAR_SOCKET_QUEUE_LEN) == -1 ) {
346   close(fh);
347   return -1;
348  }
349
350 return fh;
351}
352
353int roar_socket_open_fork  (int mode, char * host, int port) {
354 int socks[2];
355 int r;
356 char fhstr[8];
357
358 if ( mode == MODE_LISTEN )
359  return -1;
360
361 if ( socketpair(AF_UNIX, SOCK_STREAM, 0, socks) == -1 ) {
362  return -1;
363 }
364
365 r = fork();
366
367 if ( r == -1 ) { // error!
368  ROAR_ERR("roar_socket_open_fork(*): Can not fork: %s", strerror(errno));
369  close(socks[0]);
370  close(socks[1]);
371  return -1;
372 } else if ( r == 0 ) { // we are the child
373  close(socks[0]);
374
375  close(ROAR_STDIN ); // we do not want roard to have any standard input
376  close(ROAR_STDOUT); // STDOUT is also not needed, so we close it,
377                      // but STDERR we keep open for error messages.
378
379  snprintf(fhstr, 7, "%i", socks[1]);
380
381  execlp("roard", "roard", "--terminate", "--no-listen", "--client-fh", fhstr, NULL);
382
383  // we are still alive?
384  ROAR_ERR("roar_socket_open_fork(*): alive after exec(), that's bad!");
385  _exit(1);
386 } else { // we are the parent
387  close(socks[1]);
388  return socks[0];
389 }
390
391 return -1;
392}
393
394int roar_socket_open_file  (int mode, char * host, int port) {
395 int fh;
396
397 if ( mode == MODE_LISTEN )
398  return -1;
399
400 if ( (fh = open(host, O_RDONLY, 0644)) == -1 ) {
401  ROAR_ERR("roar_socket_open_file(*): Can not open file %s: %s", host, strerror(errno));
402 }
403
404 return fh;
405}
406
407// --- [ PROXY CODE ] ---
408
409// generic proxy code:
410
411int roar_socket_open_proxy (int mode, int type, char * host, int port, char * proxy_type) {
412 int    proxy_port;
413 char   proxy_host[ROAR_SOCKET_MAX_HOSTNAMELEN];
414 char * proxy_addr;
415 int    i;
416 int    fh;
417
418 // TODO: change this so we support listen() proxys (ssh -R)
419 if ( mode != MODE_CONNECT )
420  return -1;
421
422 if ( !strcmp(proxy_type, "socks4a") ) { // for TOR, the only supported type at the moment
423  proxy_addr = getenv("socks_proxy");
424
425  proxy_port = 9050; // TOR's default port
426
427  if ( proxy_addr == NULL )
428   return -1;
429
430  for (i = 0; proxy_addr[i] != 0 && proxy_addr[i] != ':' && i < ROAR_SOCKET_MAX_HOSTNAMELEN; i++)
431   proxy_host[i] = proxy_addr[i];
432  proxy_host[i] = 0;
433
434  if ( i == 0 ) // no hostname found
435   return -1;
436
437  if ( proxy_addr[i] == ':' )
438   proxy_port = atoi(&proxy_addr[i+1]);
439
440  if ( (fh = roar_socket_open(mode, type, proxy_host, proxy_port)) == -1) {
441   return -1;
442  }
443
444  if ( roar_socket_open_socks4a(mode, fh, host, port) == -1 ) {
445   close(fh);
446   return -1;
447  }
448
449  return fh;
450 } else {
451  return -1; // unknown type
452 }
453}
454
455// protocoll dependet proxy code:
456
457int roar_socket_open_socks4a(int mode, int fh, char * host, int port) {
458 char buf[9];
459 int  len;
460
461 buf[0] = 0x04;
462 buf[1] = mode == MODE_CONNECT ? 0x01 : 0x02;
463 *((uint16_t*)&buf[2]) = htons(port);
464 buf[4] = 0x00;
465 buf[5] = 0x00;
466 buf[6] = 0x00;
467 buf[7] = 0x01;
468 buf[8] = 0x00;
469
470 if ( write(fh, buf, 9) != 9 )
471  return -1;
472
473 len = strlen(host);
474
475 if ( write(fh, host, len) != len )
476  return -1;
477
478 if ( write(fh, "\0", 1) != 1 )
479  return -1;
480
481 if ( read(fh, buf, 8) != 8 )
482  return -1;
483
484 if ( buf[1] != 0x5a )
485  return -1;
486
487 return 0;
488}
489
490//ll
Note: See TracBrowser for help on using the repository browser.