]>
git.proxmox.com Git - mirror_frr.git/blob - lib/sockunion.c
1 /* Socket union related function.
2 * Copyright (c) 1997, 98 Kunihiro Ishiguro
4 * This file is part of GNU Zebra.
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
25 #include "sockunion.h"
29 #include "lib_errors.h"
31 DEFINE_MTYPE_STATIC(LIB
, SOCKUNION
, "Socket union")
33 const char *inet_sutop(const union sockunion
*su
, char *str
)
35 switch (su
->sa
.sa_family
) {
37 inet_ntop(AF_INET
, &su
->sin
.sin_addr
, str
, INET_ADDRSTRLEN
);
40 inet_ntop(AF_INET6
, &su
->sin6
.sin6_addr
, str
, INET6_ADDRSTRLEN
);
46 int str2sockunion(const char *str
, union sockunion
*su
)
53 memset(su
, 0, sizeof(union sockunion
));
55 ret
= inet_pton(AF_INET
, str
, &su
->sin
.sin_addr
);
56 if (ret
> 0) /* Valid IPv4 address format. */
58 su
->sin
.sin_family
= AF_INET
;
59 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
60 su
->sin
.sin_len
= sizeof(struct sockaddr_in
);
61 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
64 ret
= inet_pton(AF_INET6
, str
, &su
->sin6
.sin6_addr
);
65 if (ret
> 0) /* Valid IPv6 address format. */
67 su
->sin6
.sin6_family
= AF_INET6
;
69 su
->sin6
.sin6_len
= sizeof(struct sockaddr_in6
);
76 const char *sockunion2str(const union sockunion
*su
, char *buf
, size_t len
)
78 switch (sockunion_family(su
)) {
80 snprintf(buf
, len
, "(unspec)");
83 return inet_ntop(AF_INET
, &su
->sin
.sin_addr
, buf
, len
);
85 return inet_ntop(AF_INET6
, &su
->sin6
.sin6_addr
, buf
, len
);
87 snprintf(buf
, len
, "(af %d)", sockunion_family(su
));
91 union sockunion
*sockunion_str2su(const char *str
)
93 union sockunion
*su
= XCALLOC(MTYPE_SOCKUNION
, sizeof(union sockunion
));
95 if (!str2sockunion(str
, su
))
98 XFREE(MTYPE_SOCKUNION
, su
);
102 /* Convert IPv4 compatible IPv6 address to IPv4 address. */
103 static void sockunion_normalise_mapped(union sockunion
*su
)
105 struct sockaddr_in sin
;
107 if (su
->sa
.sa_family
== AF_INET6
108 && IN6_IS_ADDR_V4MAPPED(&su
->sin6
.sin6_addr
)) {
109 memset(&sin
, 0, sizeof(struct sockaddr_in
));
110 sin
.sin_family
= AF_INET
;
111 sin
.sin_port
= su
->sin6
.sin6_port
;
112 memcpy(&sin
.sin_addr
, ((char *)&su
->sin6
.sin6_addr
) + 12, 4);
113 memcpy(su
, &sin
, sizeof(struct sockaddr_in
));
117 /* return sockunion structure : this function should be revised. */
118 static const char *sockunion_log(const union sockunion
*su
, char *buf
,
121 switch (su
->sa
.sa_family
) {
123 return inet_ntop(AF_INET
, &su
->sin
.sin_addr
, buf
, len
);
126 return inet_ntop(AF_INET6
, &(su
->sin6
.sin6_addr
), buf
, len
);
130 snprintf(buf
, len
, "af_unknown %d ", su
->sa
.sa_family
);
135 /* Return socket of sockunion. */
136 int sockunion_socket(const union sockunion
*su
)
140 sock
= socket(su
->sa
.sa_family
, SOCK_STREAM
, 0);
142 char buf
[SU_ADDRSTRLEN
];
143 zlog_warn("Can't make socket for %s : %s",
144 sockunion_log(su
, buf
, SU_ADDRSTRLEN
),
145 safe_strerror(errno
));
152 /* Return accepted new socket file descriptor. */
153 int sockunion_accept(int sock
, union sockunion
*su
)
158 len
= sizeof(union sockunion
);
159 client_sock
= accept(sock
, (struct sockaddr
*)su
, &len
);
161 sockunion_normalise_mapped(su
);
165 /* Return sizeof union sockunion. */
166 static int sockunion_sizeof(const union sockunion
*su
)
171 switch (su
->sa
.sa_family
) {
173 ret
= sizeof(struct sockaddr_in
);
176 ret
= sizeof(struct sockaddr_in6
);
182 /* Performs a non-blocking connect(). */
183 enum connect_result
sockunion_connect(int fd
, const union sockunion
*peersu
,
184 unsigned short port
, ifindex_t ifindex
)
189 memcpy(&su
, peersu
, sizeof(union sockunion
));
191 switch (su
.sa
.sa_family
) {
193 su
.sin
.sin_port
= port
;
196 su
.sin6
.sin6_port
= port
;
198 if (IN6_IS_ADDR_LINKLOCAL(&su
.sin6
.sin6_addr
) && ifindex
) {
199 su
.sin6
.sin6_scope_id
= ifindex
;
200 SET_IN6_LINKLOCAL_IFINDEX(su
.sin6
.sin6_addr
, ifindex
);
206 /* Call connect function. */
207 ret
= connect(fd
, (struct sockaddr
*)&su
, sockunion_sizeof(&su
));
209 /* Immediate success */
211 return connect_success
;
213 /* If connect is in progress then return 1 else it's real error. */
215 if (errno
!= EINPROGRESS
) {
216 char str
[SU_ADDRSTRLEN
];
217 zlog_info("can't connect to %s fd %d : %s",
218 sockunion_log(&su
, str
, sizeof str
), fd
,
219 safe_strerror(errno
));
220 return connect_error
;
224 return connect_in_progress
;
227 /* Make socket from sockunion union. */
228 int sockunion_stream_socket(union sockunion
*su
)
232 if (su
->sa
.sa_family
== 0)
233 su
->sa
.sa_family
= AF_INET_UNION
;
235 sock
= socket(su
->sa
.sa_family
, SOCK_STREAM
, 0);
238 zlog_warn("can't make socket sockunion_stream_socket");
243 /* Bind socket to specified address. */
244 int sockunion_bind(int sock
, union sockunion
*su
, unsigned short port
,
245 union sockunion
*su_addr
)
250 if (su
->sa
.sa_family
== AF_INET
) {
251 size
= sizeof(struct sockaddr_in
);
252 su
->sin
.sin_port
= htons(port
);
253 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
254 su
->sin
.sin_len
= size
;
255 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
257 sockunion2ip(su
) = htonl(INADDR_ANY
);
258 } else if (su
->sa
.sa_family
== AF_INET6
) {
259 size
= sizeof(struct sockaddr_in6
);
260 su
->sin6
.sin6_port
= htons(port
);
262 su
->sin6
.sin6_len
= size
;
263 #endif /* SIN6_LEN */
264 if (su_addr
== NULL
) {
266 memset(&su
->sin6
.sin6_addr
, 0, sizeof(struct in6_addr
));
268 su
->sin6
.sin6_addr
= in6addr_any
;
269 #endif /* LINUX_IPV6 */
273 ret
= bind(sock
, (struct sockaddr
*)su
, size
);
275 char buf
[SU_ADDRSTRLEN
];
276 zlog_warn("can't bind socket for %s : %s",
277 sockunion_log(su
, buf
, SU_ADDRSTRLEN
),
278 safe_strerror(errno
));
284 int sockopt_reuseaddr(int sock
)
289 ret
= setsockopt(sock
, SOL_SOCKET
, SO_REUSEADDR
, (void *)&on
,
292 zlog_warn("can't set sockopt SO_REUSEADDR to socket %d", sock
);
299 int sockopt_reuseport(int sock
)
304 ret
= setsockopt(sock
, SOL_SOCKET
, SO_REUSEPORT
, (void *)&on
,
307 zlog_warn("can't set sockopt SO_REUSEPORT to socket %d", sock
);
313 int sockopt_reuseport(int sock
)
319 int sockopt_ttl(int family
, int sock
, int ttl
)
324 if (family
== AF_INET
) {
325 ret
= setsockopt(sock
, IPPROTO_IP
, IP_TTL
, (void *)&ttl
,
328 zlog_warn("can't set sockopt IP_TTL %d to socket %d",
335 if (family
== AF_INET6
) {
336 ret
= setsockopt(sock
, IPPROTO_IPV6
, IPV6_UNICAST_HOPS
,
337 (void *)&ttl
, sizeof(int));
340 "can't set sockopt IPV6_UNICAST_HOPS %d to socket %d",
350 * This function called setsockopt(.., TCP_CORK,...)
351 * Which on linux is a no-op since it is enabled by
352 * default and on BSD it uses TCP_NOPUSH to do
353 * the same thing( which it was not configured to
354 * use). This cleanup of the api occured on 8/1/17
355 * I imagine if after more than 1 year of no-one
356 * complaining, and a major upgrade release we
357 * can deprecate and remove this function call
359 int sockopt_cork(int sock
, int onoff
)
364 int sockopt_mark_default(int sock
, int mark
, struct zebra_privs_t
*cap
)
369 if (cap
->change(ZPRIVS_RAISE
))
370 flog_err(LIB_ERR_PRIVILEGES
,
371 "routing_socket: Can't raise privileges");
373 ret
= setsockopt(sock
, SOL_SOCKET
, SO_MARK
, &mark
, sizeof(mark
));
375 if (cap
->change(ZPRIVS_LOWER
))
376 flog_err(LIB_ERR_PRIVILEGES
,
377 "routing_socket: Can't lower privileges");
385 int sockopt_minttl(int family
, int sock
, int minttl
)
388 if (family
== AF_INET
) {
389 int ret
= setsockopt(sock
, IPPROTO_IP
, IP_MINTTL
, &minttl
,
393 "can't set sockopt IP_MINTTL to %d on socket %d: %s",
394 minttl
, sock
, safe_strerror(errno
));
397 #endif /* IP_MINTTL */
398 #ifdef IPV6_MINHOPCOUNT
399 if (family
== AF_INET6
) {
400 int ret
= setsockopt(sock
, IPPROTO_IPV6
, IPV6_MINHOPCOUNT
,
401 &minttl
, sizeof(minttl
));
404 "can't set sockopt IPV6_MINHOPCOUNT to %d on socket %d: %s",
405 minttl
, sock
, safe_strerror(errno
));
414 int sockopt_v6only(int family
, int sock
)
419 if (family
== AF_INET6
) {
420 ret
= setsockopt(sock
, IPPROTO_IPV6
, IPV6_V6ONLY
, (void *)&on
,
424 "can't set sockopt IPV6_V6ONLY "
431 #endif /* IPV6_V6ONLY */
435 /* If same family and same prefix return 1. */
436 int sockunion_same(const union sockunion
*su1
, const union sockunion
*su2
)
440 if (su1
->sa
.sa_family
!= su2
->sa
.sa_family
)
443 switch (su1
->sa
.sa_family
) {
445 ret
= memcmp(&su1
->sin
.sin_addr
, &su2
->sin
.sin_addr
,
446 sizeof(struct in_addr
));
449 ret
= memcmp(&su1
->sin6
.sin6_addr
, &su2
->sin6
.sin6_addr
,
450 sizeof(struct in6_addr
));
451 if ((ret
== 0) && IN6_IS_ADDR_LINKLOCAL(&su1
->sin6
.sin6_addr
)) {
452 /* compare interface indices */
453 if (su1
->sin6
.sin6_scope_id
&& su2
->sin6
.sin6_scope_id
)
454 ret
= (su1
->sin6
.sin6_scope_id
455 == su2
->sin6
.sin6_scope_id
)
467 unsigned int sockunion_hash(const union sockunion
*su
)
469 switch (sockunion_family(su
)) {
471 return jhash_1word(su
->sin
.sin_addr
.s_addr
, 0);
473 return jhash2(su
->sin6
.sin6_addr
.s6_addr32
,
474 ZEBRA_NUM_OF(su
->sin6
.sin6_addr
.s6_addr32
), 0);
479 size_t family2addrsize(int family
)
483 return sizeof(struct in_addr
);
485 return sizeof(struct in6_addr
);
490 size_t sockunion_get_addrlen(const union sockunion
*su
)
492 return family2addrsize(sockunion_family(su
));
495 const uint8_t *sockunion_get_addr(const union sockunion
*su
)
497 switch (sockunion_family(su
)) {
499 return (const uint8_t *)&su
->sin
.sin_addr
.s_addr
;
501 return (const uint8_t *)&su
->sin6
.sin6_addr
;
506 void sockunion_set(union sockunion
*su
, int family
, const uint8_t *addr
,
509 if (family2addrsize(family
) != bytes
)
512 sockunion_family(su
) = family
;
515 memcpy(&su
->sin
.sin_addr
.s_addr
, addr
, bytes
);
518 memcpy(&su
->sin6
.sin6_addr
, addr
, bytes
);
523 /* After TCP connection is established. Get local address and port. */
524 union sockunion
*sockunion_getsockname(int fd
)
530 struct sockaddr_in sin
;
531 struct sockaddr_in6 sin6
;
532 char tmp_buffer
[128];
536 memset(&name
, 0, sizeof name
);
539 ret
= getsockname(fd
, (struct sockaddr
*)&name
, &len
);
541 zlog_warn("Can't get local address and port by getsockname: %s",
542 safe_strerror(errno
));
546 if (name
.sa
.sa_family
== AF_INET
) {
547 su
= XCALLOC(MTYPE_SOCKUNION
, sizeof(union sockunion
));
548 memcpy(su
, &name
, sizeof(struct sockaddr_in
));
551 if (name
.sa
.sa_family
== AF_INET6
) {
552 su
= XCALLOC(MTYPE_SOCKUNION
, sizeof(union sockunion
));
553 memcpy(su
, &name
, sizeof(struct sockaddr_in6
));
554 sockunion_normalise_mapped(su
);
560 /* After TCP connection is established. Get remote address and port. */
561 union sockunion
*sockunion_getpeername(int fd
)
567 struct sockaddr_in sin
;
568 struct sockaddr_in6 sin6
;
569 char tmp_buffer
[128];
573 memset(&name
, 0, sizeof name
);
575 ret
= getpeername(fd
, (struct sockaddr
*)&name
, &len
);
577 zlog_warn("Can't get remote address and port: %s",
578 safe_strerror(errno
));
582 if (name
.sa
.sa_family
== AF_INET
) {
583 su
= XCALLOC(MTYPE_SOCKUNION
, sizeof(union sockunion
));
584 memcpy(su
, &name
, sizeof(struct sockaddr_in
));
587 if (name
.sa
.sa_family
== AF_INET6
) {
588 su
= XCALLOC(MTYPE_SOCKUNION
, sizeof(union sockunion
));
589 memcpy(su
, &name
, sizeof(struct sockaddr_in6
));
590 sockunion_normalise_mapped(su
);
596 /* Print sockunion structure */
597 static void __attribute__((unused
)) sockunion_print(const union sockunion
*su
)
602 switch (su
->sa
.sa_family
) {
604 printf("%s\n", inet_ntoa(su
->sin
.sin_addr
));
607 char buf
[SU_ADDRSTRLEN
];
609 printf("%s\n", inet_ntop(AF_INET6
, &(su
->sin6
.sin6_addr
), buf
,
615 struct sockaddr_dl
*sdl
;
617 sdl
= (struct sockaddr_dl
*)&(su
->sa
);
618 printf("link#%d\n", sdl
->sdl_index
);
622 printf("af_unknown %d\n", su
->sa
.sa_family
);
627 static int in6addr_cmp(const struct in6_addr
*addr1
,
628 const struct in6_addr
*addr2
)
631 const uint8_t *p1
, *p2
;
633 p1
= (const uint8_t *)addr1
;
634 p2
= (const uint8_t *)addr2
;
636 for (i
= 0; i
< sizeof(struct in6_addr
); i
++) {
639 else if (p1
[i
] < p2
[i
])
645 int sockunion_cmp(const union sockunion
*su1
, const union sockunion
*su2
)
647 if (su1
->sa
.sa_family
> su2
->sa
.sa_family
)
649 if (su1
->sa
.sa_family
< su2
->sa
.sa_family
)
652 if (su1
->sa
.sa_family
== AF_INET
) {
653 if (ntohl(sockunion2ip(su1
)) == ntohl(sockunion2ip(su2
)))
655 if (ntohl(sockunion2ip(su1
)) > ntohl(sockunion2ip(su2
)))
660 if (su1
->sa
.sa_family
== AF_INET6
)
661 return in6addr_cmp(&su1
->sin6
.sin6_addr
, &su2
->sin6
.sin6_addr
);
665 /* Duplicate sockunion. */
666 union sockunion
*sockunion_dup(const union sockunion
*su
)
668 union sockunion
*dup
=
669 XCALLOC(MTYPE_SOCKUNION
, sizeof(union sockunion
));
670 memcpy(dup
, su
, sizeof(union sockunion
));
674 void sockunion_free(union sockunion
*su
)
676 XFREE(MTYPE_SOCKUNION
, su
);
679 void sockunion_init(union sockunion
*su
)
681 memset(su
, 0, sizeof(union sockunion
));