2008-01-28 21:37:16 +00:00
|
|
|
/* source: xio-rawip.c */
|
2016-07-22 06:54:31 +00:00
|
|
|
/* Copyright Gerhard Rieger and contributors (see file CHANGES) */
|
2008-01-27 12:00:08 +00:00
|
|
|
/* Published under the GNU General Public License V.2, see file COPYING */
|
|
|
|
|
|
|
|
/* this file contains the source for opening addresses of raw IP type */
|
|
|
|
|
|
|
|
#include "xiosysincludes.h"
|
|
|
|
|
|
|
|
#if (WITH_IP4 || WITH_IP6) && WITH_RAWIP
|
|
|
|
|
|
|
|
#include "xioopen.h"
|
|
|
|
#include "xio-socket.h"
|
|
|
|
#include "xio-ip.h"
|
|
|
|
#include "xio-ip6.h"
|
|
|
|
#include "xio-tcpwrap.h"
|
|
|
|
|
|
|
|
#include "xio-rawip.h"
|
|
|
|
|
|
|
|
|
|
|
|
static
|
|
|
|
int xioopen_rawip_sendto(int argc, const char *argv[], struct opt *opts,
|
2023-06-14 09:41:44 +00:00
|
|
|
int xioflags, xiofile_t *fd, groups_t groups, int pf,
|
2008-01-27 12:00:08 +00:00
|
|
|
int dummy2, int dummy3);
|
|
|
|
static
|
|
|
|
int xioopen_rawip_datagram(int argc, const char *argv[], struct opt *opts,
|
2023-06-14 09:41:44 +00:00
|
|
|
int xioflags, xiofile_t *fd, groups_t groups, int pf,
|
2008-01-27 12:00:08 +00:00
|
|
|
int dummy2, int dummy3);
|
|
|
|
static
|
|
|
|
int xioopen_rawip_recvfrom(int argc, const char *argv[], struct opt *opts,
|
2023-06-14 09:41:44 +00:00
|
|
|
int xioflags, xiofile_t *xfd, groups_t groups,
|
2008-01-29 21:11:28 +00:00
|
|
|
int pf, int socktype, int dummy3);
|
2008-01-27 12:00:08 +00:00
|
|
|
static
|
|
|
|
int xioopen_rawip_recv(int argc, const char *argv[], struct opt *opts,
|
2023-06-14 09:41:44 +00:00
|
|
|
int xioflags, xiofile_t *xfd, groups_t groups,
|
2008-01-27 12:00:08 +00:00
|
|
|
int pf, int socktype, int ipproto);
|
|
|
|
|
|
|
|
static
|
|
|
|
int _xioopen_rawip_sendto(const char *hostname, const char *protname,
|
|
|
|
struct opt *opts, int xioflags,
|
2023-06-14 09:41:44 +00:00
|
|
|
xiofile_t *xxfd, groups_t groups, int *pf);
|
2008-01-27 12:00:08 +00:00
|
|
|
|
|
|
|
const struct addrdesc addr_rawip_sendto = { "ip-sendto", 3, xioopen_rawip_sendto, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_SOCK_IP6, PF_UNSPEC, 0, 0 HELP(":<host>:<protocol>") };
|
|
|
|
const struct addrdesc addr_rawip_datagram= { "ip-datagram", 3, xioopen_rawip_datagram, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_SOCK_IP6|GROUP_RANGE, PF_UNSPEC, 0, 0 HELP(":<host>:<protocol>") };
|
|
|
|
const struct addrdesc addr_rawip_recvfrom= { "ip-recvfrom", 3, xioopen_rawip_recvfrom, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_SOCK_IP6|GROUP_CHILD|GROUP_RANGE, PF_UNSPEC, SOCK_RAW, 0 HELP(":<protocol>") };
|
|
|
|
const struct addrdesc addr_rawip_recv = { "ip-recv", 1, xioopen_rawip_recv, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_SOCK_IP6|GROUP_RANGE, PF_UNSPEC, SOCK_RAW, 0 HELP(":<protocol>") };
|
|
|
|
|
|
|
|
#if WITH_IP4
|
|
|
|
const struct addrdesc addr_rawip4_sendto = { "ip4-sendto", 3, xioopen_rawip_sendto, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4, PF_INET, 0, 0 HELP(":<host>:<protocol>") };
|
|
|
|
const struct addrdesc addr_rawip4_datagram= { "ip4-datagram", 3, xioopen_rawip_datagram, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_RANGE, PF_INET, 0, 0 HELP(":<host>:<protocol>") };
|
|
|
|
const struct addrdesc addr_rawip4_recvfrom= { "ip4-recvfrom", 3, xioopen_rawip_recvfrom, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_CHILD|GROUP_RANGE, PF_INET, SOCK_RAW, 0 HELP(":<protocol>") };
|
|
|
|
const struct addrdesc addr_rawip4_recv = { "ip4-recv", 1, xioopen_rawip_recv, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_RANGE, PF_INET, SOCK_RAW, 0 HELP(":<protocol>") };
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if WITH_IP6
|
|
|
|
const struct addrdesc addr_rawip6_sendto = { "ip6-sendto", 3, xioopen_rawip_sendto, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP6, PF_INET6, 0, 0 HELP(":<host>:<protocol>") };
|
|
|
|
const struct addrdesc addr_rawip6_datagram= { "ip6-datagram", 3, xioopen_rawip_datagram, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP6|GROUP_RANGE, PF_INET6, 0, 0 HELP(":<host>:<protocol>") };
|
|
|
|
const struct addrdesc addr_rawip6_recvfrom= { "ip6-recvfrom", 3, xioopen_rawip_recvfrom, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP6|GROUP_CHILD|GROUP_RANGE, PF_INET6, SOCK_RAW, 0 HELP(":<protocol>") };
|
|
|
|
const struct addrdesc addr_rawip6_recv = { "ip6-recv", 1, xioopen_rawip_recv, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP6|GROUP_RANGE, PF_INET6, SOCK_RAW, 0 HELP(":<protocol>") };
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
/* we expect the form: host:protocol */
|
|
|
|
/* struct sockaddr_in sa;*/
|
|
|
|
/* socklen_t salen;*/
|
|
|
|
static
|
|
|
|
int xioopen_rawip_sendto(int argc, const char *argv[], struct opt *opts,
|
2023-06-14 09:41:44 +00:00
|
|
|
int xioflags, xiofile_t *xxfd, groups_t groups,
|
2008-01-27 12:00:08 +00:00
|
|
|
int pf, int dummy2, int dummy3) {
|
|
|
|
int result;
|
|
|
|
|
|
|
|
if (argc != 3) {
|
|
|
|
Error2("%s: wrong number of parameters (%d instead of 2)",
|
|
|
|
argv[0], argc-1);
|
|
|
|
return STAT_NORETRY;
|
|
|
|
}
|
|
|
|
if ((result = _xioopen_rawip_sendto(argv[1], argv[2], opts, xioflags, xxfd,
|
2008-09-20 21:47:06 +00:00
|
|
|
groups, &pf)) != STAT_OK) {
|
2008-01-27 12:00:08 +00:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
_xio_openlate(&xxfd->stream, opts);
|
|
|
|
return STAT_OK;
|
|
|
|
}
|
|
|
|
|
2008-09-20 21:47:06 +00:00
|
|
|
/*
|
2023-06-12 21:01:54 +00:00
|
|
|
applies and consumes the following options:
|
2008-09-20 21:47:06 +00:00
|
|
|
PH_PASTSOCKET, PH_FD, PH_PREBIND, PH_BIND, PH_PASTBIND, PH_CONNECTED, PH_LATE
|
|
|
|
OFUNC_OFFSET
|
|
|
|
OPT_PROTOCOL_FAMILY, OPT_BIND, OPT_SO_TYPE, OPT_SO_PROTOTYPE, OPT_USER,
|
|
|
|
OPT_GROUP, OPT_CLOEXEC
|
|
|
|
*/
|
2008-01-27 12:00:08 +00:00
|
|
|
static
|
|
|
|
int _xioopen_rawip_sendto(const char *hostname, const char *protname,
|
|
|
|
struct opt *opts, int xioflags, xiofile_t *xxfd,
|
2023-06-14 09:41:44 +00:00
|
|
|
groups_t groups, int *pf) {
|
2008-01-27 12:00:08 +00:00
|
|
|
char *garbage;
|
|
|
|
xiosingle_t *xfd = &xxfd->stream;
|
|
|
|
union sockaddr_union us;
|
|
|
|
socklen_t uslen;
|
|
|
|
int feats = 1; /* option bind supports only address, not port */
|
|
|
|
int socktype = SOCK_RAW;
|
|
|
|
int ipproto;
|
|
|
|
bool needbind = false;
|
|
|
|
int result;
|
|
|
|
|
|
|
|
if ((ipproto = strtoul(protname, &garbage, 0)) >= 256) {
|
|
|
|
Error3("xioopen_rawip_sendto(\"%s:%s\",,): protocol number exceeds 255 (%u)",
|
|
|
|
hostname, protname, ipproto);
|
|
|
|
return STAT_NORETRY;
|
|
|
|
} else if (*garbage) {
|
|
|
|
Warn2("xioopen_rawip_sendto(\"%s:%s\",,): trailing garbage in protocol specification",
|
|
|
|
hostname, protname);
|
|
|
|
/*return STAT_NORETRY;*/
|
|
|
|
}
|
|
|
|
|
|
|
|
xfd->howtoend = END_SHUTDOWN;
|
2008-09-20 21:47:06 +00:00
|
|
|
retropt_int(opts, OPT_PROTOCOL_FAMILY, pf);
|
2008-01-27 12:00:08 +00:00
|
|
|
|
|
|
|
/* ...res_opts[] */
|
|
|
|
if (applyopts_single(xfd, opts, PH_INIT) < 0) return -1;
|
|
|
|
applyopts(-1, opts, PH_INIT);
|
|
|
|
|
|
|
|
xfd->salen = sizeof(xfd->peersa);
|
|
|
|
if ((result =
|
2008-09-20 21:47:06 +00:00
|
|
|
xiogetaddrinfo(hostname, NULL, *pf, socktype, ipproto,
|
2008-01-27 12:00:08 +00:00
|
|
|
&xfd->peersa, &xfd->salen,
|
|
|
|
xfd->para.socket.ip.res_opts[0],
|
|
|
|
xfd->para.socket.ip.res_opts[1]))
|
|
|
|
!= STAT_OK) {
|
|
|
|
return result;
|
|
|
|
}
|
2008-09-20 21:47:06 +00:00
|
|
|
if (*pf == PF_UNSPEC) {
|
|
|
|
*pf = xfd->peersa.soa.sa_family;
|
2008-01-27 12:00:08 +00:00
|
|
|
}
|
|
|
|
|
2008-09-20 21:47:06 +00:00
|
|
|
uslen = socket_init(*pf, &us);
|
2008-01-27 12:00:08 +00:00
|
|
|
|
|
|
|
xfd->dtype = XIODATA_RECVFROM_SKIPIP;
|
|
|
|
|
2008-09-20 21:47:06 +00:00
|
|
|
if (retropt_bind(opts, *pf, socktype, ipproto, &us.soa, &uslen, feats,
|
2008-01-27 12:00:08 +00:00
|
|
|
xfd->para.socket.ip.res_opts[0],
|
|
|
|
xfd->para.socket.ip.res_opts[1]) != STAT_NOACTION) {
|
|
|
|
needbind = true;
|
|
|
|
}
|
|
|
|
return
|
|
|
|
_xioopen_dgram_sendto(needbind?&us:NULL, uslen,
|
2022-07-27 07:17:04 +00:00
|
|
|
opts, xioflags, xfd, groups, *pf, socktype, ipproto, 0);
|
2008-01-27 12:00:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* we expect the form: address:protocol */
|
|
|
|
static
|
|
|
|
int xioopen_rawip_datagram(int argc, const char *argv[], struct opt *opts,
|
2023-06-14 09:41:44 +00:00
|
|
|
int xioflags, xiofile_t *xxfd, groups_t groups,
|
2008-01-27 12:00:08 +00:00
|
|
|
int pf, int dummy2, int dummy3) {
|
|
|
|
xiosingle_t *xfd = &xxfd->stream;
|
|
|
|
char *rangename;
|
|
|
|
int result;
|
|
|
|
|
|
|
|
if (argc != 3) {
|
|
|
|
Error2("%s: wrong number of parameters (%d instead of 2)",
|
|
|
|
argv[0], argc-1);
|
|
|
|
return STAT_NORETRY;
|
|
|
|
}
|
|
|
|
if ((result =
|
|
|
|
_xioopen_rawip_sendto(argv[1], argv[2], opts, xioflags, xxfd,
|
2008-09-20 21:47:06 +00:00
|
|
|
groups, &pf)) != STAT_OK) {
|
2008-01-27 12:00:08 +00:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
xfd->dtype = XIOREAD_RECV|XIOWRITE_SENDTO;
|
|
|
|
if (pf == PF_INET) {
|
|
|
|
xfd->dtype |= XIOREAD_RECV_SKIPIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
xfd->para.socket.la.soa.sa_family = xfd->peersa.soa.sa_family;
|
|
|
|
|
|
|
|
/* which reply packets will be accepted - determine by range option */
|
|
|
|
if (retropt_string(opts, OPT_RANGE, &rangename) >= 0) {
|
2008-08-17 21:28:11 +00:00
|
|
|
if (xioparserange(rangename, pf, &xfd->para.socket.range) < 0) {
|
2008-01-27 12:00:08 +00:00
|
|
|
free(rangename);
|
|
|
|
return STAT_NORETRY;
|
|
|
|
}
|
|
|
|
xfd->para.socket.dorange = true;
|
|
|
|
xfd->dtype |= XIOREAD_RECV_CHECKRANGE;
|
|
|
|
free(rangename);
|
|
|
|
}
|
|
|
|
|
|
|
|
#if WITH_LIBWRAP
|
|
|
|
xio_retropt_tcpwrap(xfd, opts);
|
|
|
|
#endif /* WITH_LIBWRAP */
|
|
|
|
|
|
|
|
_xio_openlate(xfd, opts);
|
|
|
|
return STAT_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static
|
|
|
|
int xioopen_rawip_recvfrom(int argc, const char *argv[], struct opt *opts,
|
2023-06-14 09:41:44 +00:00
|
|
|
int xioflags, xiofile_t *xfd, groups_t groups,
|
2008-01-27 12:00:08 +00:00
|
|
|
int pf, int socktype, int dummy3) {
|
|
|
|
const char *protname = argv[1];
|
|
|
|
char *garbage;
|
|
|
|
union sockaddr_union us;
|
|
|
|
socklen_t uslen = sizeof(us);
|
|
|
|
int ipproto;
|
|
|
|
bool needbind = false;
|
|
|
|
int result;
|
|
|
|
|
|
|
|
if (argc != 2) {
|
|
|
|
Error2("%s: wrong number of parameters (%d instead of 1)",
|
|
|
|
argv[0], argc-1);
|
|
|
|
return STAT_NORETRY;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((ipproto = strtoul(protname, &garbage, 0)) >= 256) {
|
|
|
|
Error2("xioopen_rawip_recvfrom(\"%s\",,): protocol number exceeds 255 (%u)",
|
|
|
|
protname, ipproto);
|
|
|
|
return STAT_NORETRY;
|
|
|
|
} else if (*garbage) {
|
|
|
|
Warn1("xioopen_rawip_recvfrom(\"%s\",,): trailing garbage in protocol specification",
|
|
|
|
protname);
|
|
|
|
/*return STAT_NORETRY;*/
|
|
|
|
}
|
|
|
|
xfd->stream.howtoend = END_NONE;
|
|
|
|
|
|
|
|
retropt_socket_pf(opts, &pf);
|
|
|
|
if (pf == PF_UNSPEC) {
|
|
|
|
#if WITH_IP4 && WITH_IP6
|
2023-06-23 14:21:05 +00:00
|
|
|
pf = xioparms.default_ip=='6'?PF_INET6:PF_INET;
|
2008-01-27 12:00:08 +00:00
|
|
|
#elif WITH_IP6
|
|
|
|
pf = PF_INET6;
|
|
|
|
#else
|
|
|
|
pf = PF_INET;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
if (retropt_bind(opts, pf, socktype, ipproto, &us.soa, &uslen, 1,
|
|
|
|
xfd->stream.para.socket.ip.res_opts[0],
|
|
|
|
xfd->stream.para.socket.ip.res_opts[1]) != STAT_NOACTION) {
|
|
|
|
needbind = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
xfd->stream.dtype = XIODATA_RECVFROM_SKIPIP_ONE;
|
|
|
|
if ((result =
|
|
|
|
_xioopen_dgram_recvfrom(&xfd->stream, xioflags, needbind?&us.soa:NULL,
|
|
|
|
uslen, opts, pf, socktype, ipproto, E_ERROR))
|
|
|
|
!= STAT_OK) {
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
_xio_openlate(&xfd->stream, opts);
|
|
|
|
return STAT_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static
|
|
|
|
int xioopen_rawip_recv(int argc, const char *argv[], struct opt *opts,
|
2023-06-14 09:41:44 +00:00
|
|
|
int xioflags, xiofile_t *xfd, groups_t groups,
|
2008-01-29 21:11:28 +00:00
|
|
|
int pf, int socktype, int dummy3) {
|
2008-01-27 12:00:08 +00:00
|
|
|
const char *protname = argv[1];
|
|
|
|
char *garbage;
|
2008-05-22 08:02:04 +00:00
|
|
|
bool needbind = false;
|
2008-01-27 12:00:08 +00:00
|
|
|
union sockaddr_union us;
|
|
|
|
socklen_t uslen = sizeof(us);
|
2008-01-29 21:11:28 +00:00
|
|
|
int ipproto;
|
2008-01-27 12:00:08 +00:00
|
|
|
int result;
|
|
|
|
|
|
|
|
if (argc != 2) {
|
|
|
|
Error2("%s: wrong number of parameters (%d instead of 1)",
|
|
|
|
argv[0], argc-1);
|
|
|
|
return STAT_NORETRY;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((ipproto = strtoul(protname, &garbage, 0)) >= 256) {
|
2008-01-29 21:11:28 +00:00
|
|
|
Error2("xioopen_rawip_recv(\"%s\",,): protocol number exceeds 255 (%u)",
|
2008-01-27 12:00:08 +00:00
|
|
|
protname, ipproto);
|
|
|
|
return STAT_NORETRY;
|
|
|
|
} else if (*garbage) {
|
2008-01-29 21:11:28 +00:00
|
|
|
Warn1("xioopen_rawip_recv(\"%s\",,): trailing garbage in protocol specification",
|
2008-01-27 12:00:08 +00:00
|
|
|
protname);
|
|
|
|
/*return STAT_NORETRY;*/
|
|
|
|
}
|
|
|
|
|
|
|
|
retropt_socket_pf(opts, &pf);
|
|
|
|
if (pf == PF_UNSPEC) {
|
|
|
|
#if WITH_IP4 && WITH_IP6
|
2023-06-23 14:21:05 +00:00
|
|
|
pf = xioparms.default_ip=='6'?PF_INET6:PF_INET;
|
2008-01-27 12:00:08 +00:00
|
|
|
#elif WITH_IP6
|
|
|
|
pf = PF_INET6;
|
|
|
|
#else
|
|
|
|
pf = PF_INET;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2008-08-17 21:28:11 +00:00
|
|
|
if (retropt_bind(opts, pf, socktype, ipproto,
|
|
|
|
&/*us.soa*/xfd->stream.para.socket.la.soa, &uslen, 1,
|
2008-01-27 12:00:08 +00:00
|
|
|
xfd->stream.para.socket.ip.res_opts[0],
|
2008-05-22 08:02:04 +00:00
|
|
|
xfd->stream.para.socket.ip.res_opts[1]) ==
|
2008-01-27 12:00:08 +00:00
|
|
|
STAT_OK) {
|
2008-05-22 08:02:04 +00:00
|
|
|
needbind = true;
|
|
|
|
} else {
|
2008-01-27 12:00:08 +00:00
|
|
|
/* pf is required during xioread checks */
|
|
|
|
xfd->stream.para.socket.la.soa.sa_family = pf;
|
|
|
|
}
|
|
|
|
|
|
|
|
xfd->stream.dtype = XIODATA_RECV_SKIPIP;
|
2008-09-14 16:33:28 +00:00
|
|
|
result =
|
|
|
|
_xioopen_dgram_recv(&xfd->stream, xioflags,
|
2008-08-17 21:28:11 +00:00
|
|
|
needbind?&/*us.soa*/xfd->stream.para.socket.la.soa:NULL,
|
|
|
|
uslen,
|
2008-09-14 16:33:28 +00:00
|
|
|
opts, pf, socktype, ipproto, E_ERROR);
|
2008-01-27 12:00:08 +00:00
|
|
|
_xio_openlate(&xfd->stream, opts);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* (WITH_IP4 || WITH_IP6) && WITH_RAWIP */
|