]>
git.saurik.com Git - apple/ipsec.git/blob - ipsec-tools/racoon/sockmisc.c
2bb1bef7c4bf6f9e2925f5e5703adc5d192c1f3c
1 /* $Id: sockmisc.c,v 1.17.4.4 2005/10/04 09:54:27 manubsd Exp $ */
4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include <sys/types.h>
35 #include <sys/param.h>
36 #include <sys/socket.h>
39 #include <netinet/in.h>
40 #ifndef HAVE_NETINET6_IPSEC
41 #include <netinet/ipsec.h>
43 #include <netinet6/ipsec.h>
46 #if defined(INET6) && !defined(INET6_ADVAPI) && \
47 defined(IP_RECVDSTADDR) && !defined(IPV6_RECVDSTADDR)
48 #define IPV6_RECVDSTADDR IP_RECVDSTADDR
68 #ifndef IP_IPSEC_POLICY
69 #define IP_IPSEC_POLICY 16 /* XXX: from linux/in.h */
72 #ifndef IPV6_IPSEC_POLICY
73 #define IPV6_IPSEC_POLICY 34 /* XXX: from linux/???.h per
74 "Tom Lendacky" <toml@us.ibm.com> */
77 const int niflags
= 0;
80 * compare two sockaddr without port number.
85 cmpsaddrwop(addr1
, addr2
)
86 const struct sockaddr_storage
*addr1
;
87 const struct sockaddr_storage
*addr2
;
91 if (addr1
== 0 && addr2
== 0)
93 if (addr1
== 0 || addr2
== 0)
96 if (addr1
->ss_len
!= addr2
->ss_len
97 || addr1
->ss_family
!= addr2
->ss_family
)
99 switch (addr1
->ss_family
) {
101 sa1
= (caddr_t
)&((struct sockaddr_in
*)addr1
)->sin_addr
;
102 sa2
= (caddr_t
)&((struct sockaddr_in
*)addr2
)->sin_addr
;
103 if (memcmp(sa1
, sa2
, sizeof(struct in_addr
)) != 0)
108 sa1
= (caddr_t
)&((struct sockaddr_in6
*)addr1
)->sin6_addr
;
109 sa2
= (caddr_t
)&((struct sockaddr_in6
*)addr2
)->sin6_addr
;
110 if (memcmp(sa1
, sa2
, sizeof(struct in6_addr
)) != 0)
112 if (((struct sockaddr_in6
*)addr1
)->sin6_scope_id
!=
113 ((struct sockaddr_in6
*)addr2
)->sin6_scope_id
)
125 * compare two sockaddr without port number using prefix.
130 cmpsaddrwop_withprefix(const struct sockaddr_storage
*addr1
, const struct sockaddr_storage
*addr2
, int prefix
)
135 if (addr1
== 0 && addr2
== 0)
137 if (addr1
== 0 || addr2
== 0)
140 if (addr1
->ss_len
!= addr2
->ss_len
141 || addr1
->ss_family
!= addr2
->ss_family
)
143 switch (addr1
->ss_family
) {
147 if ((((struct sockaddr_in
*)addr1
)->sin_addr
.s_addr
& htonl(mask
)) !=
148 (((struct sockaddr_in
*)addr2
)->sin_addr
.s_addr
& htonl(mask
)))
153 for (i
= 0; i
< 4; i
++) {
157 } else if (prefix
== 0)
164 if ((((struct sockaddr_in6
*)addr1
)->sin6_addr
.__u6_addr
.__u6_addr32
[i
] & htonl(mask
)) !=
165 (((struct sockaddr_in6
*)addr2
)->sin6_addr
.__u6_addr
.__u6_addr32
[i
] & htonl(mask
)))
168 if (((struct sockaddr_in6
*)addr1
)->sin6_scope_id
!=
169 ((struct sockaddr_in6
*)addr2
)->sin6_scope_id
)
182 * compare two sockaddr with port, taking care wildcard.
183 * addr1 is a subject address, addr2 is in a database entry.
188 cmpsaddrwild(addr1
, addr2
)
189 const struct sockaddr_storage
*addr1
;
190 const struct sockaddr_storage
*addr2
;
193 u_short port1
, port2
;
195 if (addr1
== 0 && addr2
== 0)
197 if (addr1
== 0 || addr2
== 0)
200 if (addr1
->ss_len
!= addr2
->ss_len
201 || addr1
->ss_family
!= addr2
->ss_family
)
204 switch (addr1
->ss_family
) {
206 sa1
= (caddr_t
)&((struct sockaddr_in
*)addr1
)->sin_addr
;
207 sa2
= (caddr_t
)&((struct sockaddr_in
*)addr2
)->sin_addr
;
208 port1
= ((struct sockaddr_in
*)addr1
)->sin_port
;
209 port2
= ((struct sockaddr_in
*)addr2
)->sin_port
;
210 if (!(port1
== IPSEC_PORT_ANY
||
211 port2
== IPSEC_PORT_ANY
||
214 if (memcmp(sa1
, sa2
, sizeof(struct in_addr
)) != 0)
219 sa1
= (caddr_t
)&((struct sockaddr_in6
*)addr1
)->sin6_addr
;
220 sa2
= (caddr_t
)&((struct sockaddr_in6
*)addr2
)->sin6_addr
;
221 port1
= ((struct sockaddr_in6
*)addr1
)->sin6_port
;
222 port2
= ((struct sockaddr_in6
*)addr2
)->sin6_port
;
223 if (!(port1
== IPSEC_PORT_ANY
||
224 port2
== IPSEC_PORT_ANY
||
227 if (memcmp(sa1
, sa2
, sizeof(struct in6_addr
)) != 0)
229 if (((struct sockaddr_in6
*)addr1
)->sin6_scope_id
!=
230 ((struct sockaddr_in6
*)addr2
)->sin6_scope_id
)
242 * compare two sockaddr with strict match on port.
247 cmpsaddrstrict(const struct sockaddr_storage
*addr1
, const struct sockaddr_storage
*addr2
)
250 u_short port1
, port2
;
252 if (addr1
== 0 && addr2
== 0)
254 if (addr1
== 0 || addr2
== 0)
257 if (addr1
->ss_len
!= addr2
->ss_len
258 || addr1
->ss_family
!= addr2
->ss_family
)
261 switch (addr1
->ss_family
) {
263 sa1
= (caddr_t
)&((struct sockaddr_in
*)addr1
)->sin_addr
;
264 sa2
= (caddr_t
)&((struct sockaddr_in
*)addr2
)->sin_addr
;
265 port1
= ((struct sockaddr_in
*)addr1
)->sin_port
;
266 port2
= ((struct sockaddr_in
*)addr2
)->sin_port
;
269 if (memcmp(sa1
, sa2
, sizeof(struct in_addr
)) != 0)
274 sa1
= (caddr_t
)&((struct sockaddr_in6
*)addr1
)->sin6_addr
;
275 sa2
= (caddr_t
)&((struct sockaddr_in6
*)addr2
)->sin6_addr
;
276 port1
= ((struct sockaddr_in6
*)addr1
)->sin6_port
;
277 port2
= ((struct sockaddr_in6
*)addr2
)->sin6_port
;
280 if (memcmp(sa1
, sa2
, sizeof(struct in6_addr
)) != 0)
282 if (((struct sockaddr_in6
*)addr1
)->sin6_scope_id
!=
283 ((struct sockaddr_in6
*)addr2
)->sin6_scope_id
)
295 * compare two sockaddr with strict match on port using prefix.
300 cmpsaddrstrict_withprefix(const struct sockaddr_storage
*addr1
, const struct sockaddr_storage
*addr2
, int prefix
)
302 u_short port1
, port2
;
306 if (addr1
== 0 && addr2
== 0)
308 if (addr1
== 0 || addr2
== 0)
311 if (addr1
->ss_len
!= addr2
->ss_len
312 || addr1
->ss_family
!= addr2
->ss_family
)
315 switch (addr1
->ss_family
) {
317 port1
= ((struct sockaddr_in
*)addr1
)->sin_port
;
318 port2
= ((struct sockaddr_in
*)addr2
)->sin_port
;
323 if ((((struct sockaddr_in
*)addr1
)->sin_addr
.s_addr
& htonl(mask
)) !=
324 (((struct sockaddr_in
*)addr2
)->sin_addr
.s_addr
& htonl(mask
)))
329 port1
= ((struct sockaddr_in6
*)addr1
)->sin6_port
;
330 port2
= ((struct sockaddr_in6
*)addr2
)->sin6_port
;
333 for (i
= 0; i
< 4; i
++) {
337 } else if (prefix
== 0)
344 if ((((struct sockaddr_in6
*)addr1
)->sin6_addr
.__u6_addr
.__u6_addr32
[i
] & htonl(mask
)) !=
345 (((struct sockaddr_in6
*)addr2
)->sin6_addr
.__u6_addr
.__u6_addr32
[i
] & htonl(mask
)))
348 if (((struct sockaddr_in6
*)addr1
)->sin6_scope_id
!=
349 ((struct sockaddr_in6
*)addr2
)->sin6_scope_id
)
361 /* get local address against the destination. */
362 struct sockaddr_storage
*
363 getlocaladdr(struct sockaddr
*remote
)
365 struct sockaddr_storage
*local
;
366 u_int local_len
= sizeof(struct sockaddr_storage
);
367 int s
; /* for dummy connection */
369 /* allocate buffer */
370 if ((local
= racoon_calloc(1, local_len
)) == NULL
) {
372 "failed to get address buffer.\n");
376 /* get real interface received packet */
377 if ((s
= socket(remote
->sa_family
, SOCK_DGRAM
, 0)) < 0) {
379 "socket (%s)\n", strerror(errno
));
383 if (fcntl(s
, F_SETFL
, O_NONBLOCK
) == -1) {
384 plog(ASL_LEVEL_ERR
, "failed to put localaddr socket in non-blocking mode\n");
387 setsockopt_bypass(s
, remote
->sa_family
);
389 if (connect(s
, remote
, sysdep_sa_len(remote
)) < 0) {
391 "connect (%s)\n", strerror(errno
));
396 if (getsockname(s
, (struct sockaddr
*)local
, &local_len
) < 0) {
398 "getsockname (%s)\n", strerror(errno
));
413 * Receive packet, with src/dst information. It is assumed that necessary
414 * setsockopt() have already performed on socket.
421 struct sockaddr_storage
*from
,
423 struct sockaddr_storage
*to
,
428 struct sockaddr_storage ss
;
430 struct cmsghdr
*cm
, *cm_prev
;
432 u_int32_t cmsgbuf
[256/sizeof(u_int32_t
)]; // Wcast-align fix - force 32 bit alignment
433 #if defined(INET6) && defined(INET6_ADVAPI)
434 struct in6_pktinfo
*pi
;
435 #endif /*INET6_ADVAPI*/
436 struct sockaddr_in
*sin
;
438 struct sockaddr_in6
*sin6
;
442 if (getsockname(s
, (struct sockaddr
*)&ss
, (socklen_t
*)&len
) < 0) {
444 "getsockname (%s)\n", strerror(errno
));
448 m
.msg_name
= (caddr_t
)from
;
449 m
.msg_namelen
= *fromlen
;
450 iov
[0].iov_base
= (caddr_t
)buf
;
451 iov
[0].iov_len
= buflen
;
454 memset(cmsgbuf
, 0, sizeof(cmsgbuf
));
455 cm
= (struct cmsghdr
*)cmsgbuf
;
456 m
.msg_control
= (caddr_t
)cm
;
457 m
.msg_controllen
= sizeof(cmsgbuf
);
458 while ((len
= recvmsg(s
, &m
, flags
)) < 0) {
461 plog(ASL_LEVEL_ERR
, "recvmsg (%s)\n", strerror(errno
));
467 *fromlen
= m
.msg_namelen
;
471 for (cm
= (struct cmsghdr
*)CMSG_FIRSTHDR(&m
), cm_prev
= NULL
;
472 m
.msg_controllen
!= 0 && cm
&& cm
!= cm_prev
;
473 cm_prev
= cm
, cm
= (struct cmsghdr
*)CMSG_NXTHDR(&m
, cm
)) {
476 "cmsg %d %d\n", cm
->cmsg_level
, cm
->cmsg_type
);)
478 #if defined(INET6) && defined(INET6_ADVAPI)
479 if (ss
.ss_family
== AF_INET6
480 && cm
->cmsg_level
== IPPROTO_IPV6
481 && cm
->cmsg_type
== IPV6_PKTINFO
482 && otolen
>= sizeof(*sin6
)) {
483 pi
= ALIGNED_CAST(struct in6_pktinfo
*)(CMSG_DATA(cm
));
484 *tolen
= sizeof(*sin6
);
485 sin6
= (struct sockaddr_in6
*)to
;
486 memset(sin6
, 0, sizeof(*sin6
));
487 sin6
->sin6_family
= AF_INET6
;
488 sin6
->sin6_len
= sizeof(*sin6
);
489 memcpy(&sin6
->sin6_addr
, &pi
->ipi6_addr
,
490 sizeof(sin6
->sin6_addr
));
491 /* XXX other cases, such as site-local? */
492 if (IN6_IS_ADDR_LINKLOCAL(&sin6
->sin6_addr
))
493 sin6
->sin6_scope_id
= pi
->ipi6_ifindex
;
495 sin6
->sin6_scope_id
= 0;
497 ((struct sockaddr_in6
*)&ss
)->sin6_port
;
498 otolen
= -1; /* "to" already set */
502 #if defined(INET6) && defined(IPV6_RECVDSTADDR)
503 if (ss
.ss_family
== AF_INET6
504 && cm
->cmsg_level
== IPPROTO_IPV6
505 && cm
->cmsg_type
== IPV6_RECVDSTADDR
506 && otolen
>= sizeof(*sin6
)) {
507 *tolen
= sizeof(*sin6
);
508 sin6
= (struct sockaddr_in6
*)to
;
509 memset(sin6
, 0, sizeof(*sin6
));
510 sin6
->sin6_family
= AF_INET6
;
511 sin6
->sin6_len
= sizeof(*sin6
);
512 memcpy(&sin6
->sin6_addr
, CMSG_DATA(cm
),
513 sizeof(sin6
->sin6_addr
));
515 ((struct sockaddr_in6
*)&ss
)->sin6_port
;
516 otolen
= -1; /* "to" already set */
520 if (ss
.ss_family
== AF_INET
521 && cm
->cmsg_level
== IPPROTO_IP
522 && cm
->cmsg_type
== IP_RECVDSTADDR
523 && otolen
>= sizeof(*sin
)) {
524 *tolen
= sizeof(*sin
);
525 sin
= (struct sockaddr_in
*)to
;
526 memset(sin
, 0, sizeof(*sin
));
527 sin
->sin_family
= AF_INET
;
528 sin
->sin_len
= sizeof(*sin
);
529 memcpy(&sin
->sin_addr
, CMSG_DATA(cm
),
530 sizeof(sin
->sin_addr
));
531 sin
->sin_port
= ((struct sockaddr_in
*)&ss
)->sin_port
;
532 otolen
= -1; /* "to" already set */
536 plogdump(ASL_LEVEL_DEBUG
, buf
, buflen
, "@@@@@@ data from readmsg:\n");
540 /* send packet, with fixing src/dst address pair. */
542 sendfromto(s
, buf
, buflen
, src
, dst
, cnt
)
546 struct sockaddr_storage
*src
;
547 struct sockaddr_storage
*dst
;
549 struct sockaddr_storage ss
;
553 if (src
->ss_family
!= dst
->ss_family
) {
555 "address family mismatch\n");
560 if (getsockname(s
, (struct sockaddr
*)&ss
, (socklen_t
*)&len
) < 0) {
562 "getsockname (%s)\n", strerror(errno
));
566 plog(ASL_LEVEL_DEBUG
,
567 "sockname %s\n", saddr2str((struct sockaddr
*)&ss
));
568 plog(ASL_LEVEL_DEBUG
,
569 "send packet from %s\n", saddr2str((struct sockaddr
*)src
));
570 plog(ASL_LEVEL_DEBUG
,
571 "send packet to %s\n", saddr2str((struct sockaddr
*)dst
));
573 if (src
->ss_family
!= ss
.ss_family
) {
575 "address family mismatch\n");
579 switch (src
->ss_family
) {
580 #if defined(INET6) && defined(INET6_ADVAPI)
586 u_int32_t cmsgbuf
[256/sizeof(u_int32_t
)]; // Wcast-align fix - force 32 bit alignment
587 struct in6_pktinfo
*pi
;
589 struct sockaddr_in6 src6
, dst6
;
591 memcpy(&src6
, src
, sizeof(src6
));
592 memcpy(&dst6
, dst
, sizeof(dst6
));
594 /* XXX take care of other cases, such as site-local */
596 if (IN6_IS_ADDR_LINKLOCAL(&src6
.sin6_addr
)
597 || IN6_IS_ADDR_MULTICAST(&src6
.sin6_addr
)) {
598 ifindex
= src6
.sin6_scope_id
; /*???*/
601 /* XXX some sanity check on dst6.sin6_scope_id */
603 /* flowinfo for IKE? mmm, maybe useful but for now make it 0 */
604 src6
.sin6_flowinfo
= dst6
.sin6_flowinfo
= 0;
606 memset(&m
, 0, sizeof(m
));
607 m
.msg_name
= (caddr_t
)&dst6
;
608 m
.msg_namelen
= sizeof(dst6
);
609 iov
[0].iov_base
= (char *)buf
;
610 iov
[0].iov_len
= buflen
;
614 memset(cmsgbuf
, 0, sizeof(cmsgbuf
));
615 cm
= (struct cmsghdr
*)cmsgbuf
;
616 m
.msg_control
= (caddr_t
)cm
;
617 m
.msg_controllen
= CMSG_SPACE(sizeof(struct in6_pktinfo
));
619 cm
->cmsg_len
= CMSG_LEN(sizeof(struct in6_pktinfo
));
620 cm
->cmsg_level
= IPPROTO_IPV6
;
621 cm
->cmsg_type
= IPV6_PKTINFO
;
622 pi
= ALIGNED_CAST(struct in6_pktinfo
*)CMSG_DATA(cm
);
623 memcpy(&pi
->ipi6_addr
, &src6
.sin6_addr
, sizeof(src6
.sin6_addr
));
624 pi
->ipi6_ifindex
= ifindex
;
626 plog(ASL_LEVEL_DEBUG
,
628 saddr2str((struct sockaddr
*)&src6
),
630 plog(ASL_LEVEL_DEBUG
,
632 saddr2str((struct sockaddr
*)&dst6
),
635 for (i
= 0; i
< cnt
; i
++) {
636 len
= sendmsg(s
, &m
, 0 /*MSG_DONTROUTE*/);
639 "sendmsg (%s)\n", strerror(errno
));
640 if (errno
!= EHOSTUNREACH
&& errno
!= ENETDOWN
&& errno
!= ENETUNREACH
) {
643 // <rdar://problem/6609744> treat these failures like
644 // packet loss, in case the network interface is flaky
647 plog(ASL_LEVEL_DEBUG
,
648 "%d times of %d bytes message will be sent "
650 i
+ 1, len
, saddr2str((struct sockaddr
*)dst
));
661 if (ss
.ss_family
== src
->ss_family
&& memcmp(&ss
, src
, sysdep_sa_len((struct sockaddr
*)src
)) == 0) {
667 * Use newly opened socket for sending packets.
668 * NOTE: this is unsafe, because if the peer is quick enough
669 * the packet from the peer may be queued into sendsock.
670 * Better approach is to prepare bind'ed udp sockets for
671 * each of the interface addresses.
673 sendsock
= socket(src
->ss_family
, SOCK_DGRAM
, 0);
676 "socket (%s)\n", strerror(errno
));
679 if (fcntl(sendsock
, F_SETFL
, O_NONBLOCK
) == -1) {
680 plog(ASL_LEVEL_ERR
, "failed to put sendsock socket in non-blocking mode\n");
682 if (setsockopt(sendsock
, SOL_SOCKET
,
684 (void *)&yes
, sizeof(yes
)) < 0) {
686 "setsockopt SO_REUSEPORT (%s)\n",
691 #ifdef IPV6_USE_MIN_MTU
692 if (src
->ss_family
== AF_INET6
&&
693 setsockopt(sendsock
, IPPROTO_IPV6
, IPV6_USE_MIN_MTU
,
694 (void *)&yes
, sizeof(yes
)) < 0) {
696 "setsockopt IPV6_USE_MIN_MTU (%s)\n",
702 if (setsockopt_bypass(sendsock
, src
->ss_family
) < 0) {
707 if (bind(sendsock
, (struct sockaddr
*)src
, sysdep_sa_len((struct sockaddr
*)src
)) < 0) {
709 "bind 1 (%s)\n", strerror(errno
));
716 plogdump(ASL_LEVEL_DEBUG
, (void*)buf
, buflen
, "@@@@@@ data being sent:\n");
718 for (i
= 0; i
< cnt
; i
++) {
719 len
= sendto(sendsock
, buf
, buflen
, 0, (struct sockaddr
*)dst
, sysdep_sa_len((struct sockaddr
*)dst
));
722 "sendto (%s)\n", strerror(errno
));
723 if (errno
!= EHOSTUNREACH
&& errno
!= ENETDOWN
&& errno
!= ENETUNREACH
) {
729 "treating socket error (%s) like packet loss\n", strerror(errno
));
730 // else treat these failures like a packet loss
733 plog(ASL_LEVEL_DEBUG
,
734 "%d times of %d bytes message will be sent "
736 i
+ 1, len
, saddr2str((struct sockaddr
*)dst
));
738 //plog(ASL_LEVEL_DEBUG, "sent %d bytes", buflen);
749 setsockopt_bypass(int so
, int family
)
761 level
= IPPROTO_IPV6
;
766 "unsupported address family %d\n", family
);
770 policy
= "in bypass";
771 buf
= ipsec_set_policy(policy
, strlen(policy
));
774 "ipsec_set_policy (%s)\n",
778 if (setsockopt(so
, level
,
779 (level
== IPPROTO_IP
?
780 IP_IPSEC_POLICY
: IPV6_IPSEC_POLICY
),
781 buf
, ipsec_get_policylen(buf
)) < 0) {
783 "setsockopt IP_IPSEC_POLICY (%s)\n",
789 policy
= "out bypass";
790 buf
= ipsec_set_policy(policy
, strlen(policy
));
793 "ipsec_set_policy (%s)\n",
797 if (setsockopt(so
, level
,
798 (level
== IPPROTO_IP
?
799 IP_IPSEC_POLICY
: IPV6_IPSEC_POLICY
),
800 buf
, ipsec_get_policylen(buf
)) < 0) {
802 "setsockopt IP_IPSEC_POLICY (%s)\n",
811 struct sockaddr_storage
*
814 struct sockaddr_storage
*new;
816 if ((new = racoon_calloc(1, sizeof(*new))) == NULL
) {
818 "%s\n", strerror(errno
));
827 struct sockaddr_storage
*
828 dupsaddr(struct sockaddr_storage
*addr
)
830 struct sockaddr_storage
*new;
832 new = racoon_calloc(1, sizeof(*new));
834 plog(ASL_LEVEL_ERR
, "%s\n", strerror(errno
));
838 memcpy(new, addr
, addr
->ss_len
);
844 saddr2str(const struct sockaddr
*saddr
)
846 static char buf
[NI_MAXHOST
+ NI_MAXSERV
+ 10];
847 char addr
[NI_MAXHOST
], port
[NI_MAXSERV
];
854 if (saddr
->sa_family
== AF_UNSPEC
)
855 snprintf (buf
, sizeof(buf
), "%s", "anonymous");
857 GETNAMEINFO(saddr
, addr
, port
);
858 snprintf(buf
, sizeof(buf
), "%s[%s]", addr
, port
);
865 saddr2str_with_prefix(const struct sockaddr
*saddr
, int prefix
)
867 static char buf
[NI_MAXHOST
+ NI_MAXSERV
+ 10];
868 char addr
[NI_MAXHOST
], port
[NI_MAXSERV
];
875 if (saddr
->sa_family
== AF_UNSPEC
)
876 snprintf (buf
, sizeof(buf
), "%s", "anonymous");
878 GETNAMEINFO(saddr
, addr
, port
);
879 snprintf(buf
, sizeof(buf
), "%s/%d[%s]", addr
, prefix
, port
);
887 saddrwop2str(const struct sockaddr
*saddr
)
889 static char buf
[NI_MAXHOST
+ NI_MAXSERV
+ 10];
890 char addr
[NI_MAXHOST
];
897 GETNAMEINFO_NULL(saddr
, addr
);
898 snprintf(buf
, sizeof(buf
), "%s", addr
);
904 naddrwop2str(const struct netaddr
*naddr
)
906 static char buf
[NI_MAXHOST
+ 10];
907 static const struct sockaddr sa_any
; /* this is initialized to all zeros */
914 if (memcmp(&naddr
->sa
, &sa_any
, sizeof(sa_any
)) == 0)
915 snprintf(buf
, sizeof(buf
), "%s", "any");
917 snprintf(buf
, sizeof(buf
), "%s", saddrwop2str((struct sockaddr
*)&naddr
->sa
.sa
));
918 snprintf(&buf
[strlen(buf
)], sizeof(buf
) - strlen(buf
), "/%ld", naddr
->prefix
);
924 naddrwop2str_fromto(const char *format
, const struct netaddr
*saddr
,
925 const struct netaddr
*daddr
)
927 static char buf
[2*(NI_MAXHOST
+ NI_MAXSERV
+ 10) + 100];
930 src
= racoon_strdup(naddrwop2str(saddr
));
931 dst
= racoon_strdup(naddrwop2str(daddr
));
934 /* WARNING: Be careful about the format string! Don't
935 ever pass in something that a user can modify!!! */
936 snprintf (buf
, sizeof(buf
), format
, src
, dst
);
944 saddr2str_fromto(format
, saddr
, daddr
)
946 const struct sockaddr
*saddr
;
947 const struct sockaddr
*daddr
;
949 static char buf
[2*(NI_MAXHOST
+ NI_MAXSERV
+ 10) + 100];
953 src
= racoon_strdup(saddr2str(saddr
));
959 dst
= racoon_strdup(saddr2str(daddr
));
964 /* WARNING: Be careful about the format string! Don't
965 ever pass in something that a user can modify!!! */
966 snprintf (buf
, sizeof(buf
), format
, src
? src
:"[null]", dst
? dst
:"[null]");
977 struct sockaddr_storage
*
978 str2saddr(char *host
, char *port
)
980 struct addrinfo hints
, *res
;
981 struct sockaddr_storage
*saddr
;
984 memset(&hints
, 0, sizeof(hints
));
985 hints
.ai_family
= PF_UNSPEC
;
986 hints
.ai_socktype
= SOCK_DGRAM
;
987 hints
.ai_flags
= AI_NUMERICHOST
;
988 error
= getaddrinfo(host
, port
, &hints
, &res
);
991 "getaddrinfo(%s%s%s): %s\n",
992 host
, port
? "," : "", port
? port
: "",
993 gai_strerror(error
));
996 if (res
->ai_next
!= NULL
) {
997 plog(ASL_LEVEL_WARNING
,
998 "getaddrinfo(%s%s%s): "
999 "resolved to multiple address, "
1000 "taking the first one\n",
1001 host
, port
? "," : "", port
? port
: "");
1003 saddr
= newsaddr(sizeof(*saddr
));
1004 if (saddr
== NULL
) {
1006 "failed to allocate buffer.\n");
1010 memcpy(saddr
, res
->ai_addr
, res
->ai_addrlen
);
1017 mask_sockaddr(a
, b
, l
)
1018 struct sockaddr_storage
*a
;
1019 const struct sockaddr_storage
*b
;
1025 switch (b
->ss_family
) {
1027 alen
= sizeof(struct in_addr
);
1028 p
= (u_int8_t
*)&((struct sockaddr_in
*)a
)->sin_addr
;
1032 alen
= sizeof(struct in6_addr
);
1033 p
= (u_int8_t
*)&((struct sockaddr_in6
*)a
)->sin6_addr
;
1038 "invalid address family: %d\n", b
->ss_family
);
1042 if ((alen
<< 3) < l
) {
1044 "unexpected inconsistency: %d %zu\n", b
->ss_family
, l
);
1048 memcpy(a
, b
, sysdep_sa_len((struct sockaddr
*)b
));
1049 p
[l
/ 8] &= (0xff00 >> (l
% 8)) & 0xff;
1050 for (i
= l
/ 8 + 1; i
< alen
; i
++)
1054 /* Compute a score describing how "accurate" a netaddr is for a given sockaddr.
1056 * Return values for address 10.20.30.40 [port 500] and given netaddresses...
1057 * 10.10.0.0/16 => -1 ... doesn't match
1058 * 0.0.0.0/0 => 0 ... matches, but only 0 bits.
1059 * 10.20.0.0/16 => 16 ... 16 bits match
1060 * 10.20.30.0/24 => 24 ... guess what ;-)
1061 * 10.20.30.40/32 => 32 ... whole address match
1062 * 10.20.30.40:500 => 33 ... both address and port match
1063 * 10.20.30.40:501 => -1 ... port doesn't match and isn't 0 (=any)
1066 naddr_score(const struct netaddr
*naddr
, const struct sockaddr_storage
*saddr
)
1068 static const struct netaddr naddr_any
; /* initialized to all-zeros */
1069 struct sockaddr_storage sa
;
1070 u_int16_t naddr_port
, saddr_port
;
1073 if (!naddr
|| !saddr
) {
1075 "Call with null args: naddr=%p, saddr=%p\n",
1080 /* Wildcard address matches, but only 0 bits. */
1081 if (memcmp(naddr
, &naddr_any
, sizeof(naddr_any
)) == 0)
1084 /* If families don't match we really can't do much... */
1085 if (naddr
->sa
.sa
.ss_family
!= saddr
->ss_family
)
1088 /* If port check fail don't bother to check addresses. */
1089 naddr_port
= extract_port(&naddr
->sa
.sa
);
1090 saddr_port
= extract_port(saddr
);
1091 if (naddr_port
== 0 || saddr_port
== 0) /* wildcard match */
1093 else if (naddr_port
== saddr_port
) /* exact match */
1095 else /* mismatch :-) */
1098 /* Here it comes - compare network addresses. */
1099 mask_sockaddr(&sa
, saddr
, naddr
->prefix
);
1100 if (loglevel
>= ASL_LEVEL_DEBUG
) { /* debug only */
1102 a1
= racoon_strdup(naddrwop2str(naddr
));
1103 a2
= racoon_strdup(saddrwop2str((struct sockaddr
*)saddr
));
1104 a3
= racoon_strdup(saddrwop2str((struct sockaddr
*)&sa
));
1108 plog(ASL_LEVEL_DEBUG
,
1109 "naddr=%s, saddr=%s (masked=%s)\n",
1115 if (cmpsaddrwop(&sa
, &naddr
->sa
.sa
) == 0)
1116 return naddr
->prefix
+ port_score
;
1121 /* Some useful functions for sockaddr_storage port manipulations. */
1123 extract_port (const struct sockaddr_storage
*addr
)
1125 u_int16_t port
= -1;
1130 switch (addr
->ss_family
) {
1132 port
= ((struct sockaddr_in
*)addr
)->sin_port
;
1135 port
= ((struct sockaddr_in6
*)addr
)->sin6_port
;
1138 plog(ASL_LEVEL_ERR
, "unknown AF: %u\n", addr
->ss_family
);
1146 get_port_ptr (struct sockaddr_storage
*addr
)
1148 u_int16_t
*port_ptr
;
1153 switch (addr
->ss_family
) {
1155 port_ptr
= &(((struct sockaddr_in
*)addr
)->sin_port
);
1158 port_ptr
= &(((struct sockaddr_in6
*)addr
)->sin6_port
);
1161 plog(ASL_LEVEL_ERR
, "unknown AF: %u\n", addr
->ss_family
);
1170 set_port (struct sockaddr_storage
*addr
, u_int16_t new_port
)
1172 u_int16_t
*port_ptr
;
1174 port_ptr
= get_port_ptr (addr
);
1177 *port_ptr
= htons(new_port
);