You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

TcpSocket.cxx 18KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750
  1. /* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
  2. *
  3. * This is free software; you can redistribute it and/or modify
  4. * it under the terms of the GNU General Public License as published by
  5. * the Free Software Foundation; either version 2 of the License, or
  6. * (at your option) any later version.
  7. *
  8. * This software is distributed in the hope that it will be useful,
  9. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. * GNU General Public License for more details.
  12. *
  13. * You should have received a copy of the GNU General Public License
  14. * along with this software; if not, write to the Free Software
  15. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
  16. * USA.
  17. */
  18. #ifdef HAVE_CONFIG_H
  19. #include <config.h>
  20. #endif
  21. #ifdef WIN32
  22. //#include <io.h>
  23. #include <winsock2.h>
  24. #include <ws2tcpip.h>
  25. #define errorNumber WSAGetLastError()
  26. #else
  27. #define errorNumber errno
  28. #define closesocket close
  29. #include <sys/socket.h>
  30. #include <arpa/inet.h>
  31. #include <netinet/tcp.h>
  32. #include <netdb.h>
  33. #include <errno.h>
  34. #endif
  35. #include <stdlib.h>
  36. #include <unistd.h>
  37. #include <network/TcpSocket.h>
  38. #include <rfb/LogWriter.h>
  39. #include <rfb/Configuration.h>
  40. #ifdef WIN32
  41. #include <os/winerrno.h>
  42. #endif
  43. #ifndef INADDR_NONE
  44. #define INADDR_NONE ((unsigned long)-1)
  45. #endif
  46. #ifndef INADDR_LOOPBACK
  47. #define INADDR_LOOPBACK ((unsigned long)0x7F000001)
  48. #endif
  49. #ifndef IN6_ARE_ADDR_EQUAL
  50. #define IN6_ARE_ADDR_EQUAL(a,b) \
  51. (memcmp ((const void*)(a), (const void*)(b), sizeof (struct in6_addr)) == 0)
  52. #endif
  53. // Missing on older Windows and OS X
  54. #ifndef AI_NUMERICSERV
  55. #define AI_NUMERICSERV 0
  56. #endif
  57. using namespace network;
  58. using namespace rdr;
  59. static rfb::LogWriter vlog("TcpSocket");
  60. static rfb::BoolParameter UseIPv4("UseIPv4", "Use IPv4 for incoming and outgoing connections.", true);
  61. static rfb::BoolParameter UseIPv6("UseIPv6", "Use IPv6 for incoming and outgoing connections.", true);
  62. /* Tunnelling support. */
  63. int network::findFreeTcpPort (void)
  64. {
  65. int sock;
  66. struct sockaddr_in addr;
  67. memset(&addr, 0, sizeof(addr));
  68. addr.sin_family = AF_INET;
  69. addr.sin_addr.s_addr = INADDR_ANY;
  70. if ((sock = socket (AF_INET, SOCK_STREAM, 0)) < 0)
  71. throw SocketException ("unable to create socket", errorNumber);
  72. addr.sin_port = 0;
  73. if (bind (sock, (struct sockaddr *)&addr, sizeof (addr)) < 0)
  74. throw SocketException ("unable to find free port", errorNumber);
  75. socklen_t n = sizeof(addr);
  76. if (getsockname (sock, (struct sockaddr *)&addr, &n) < 0)
  77. throw SocketException ("unable to get port number", errorNumber);
  78. closesocket (sock);
  79. return ntohs(addr.sin_port);
  80. }
  81. int network::getSockPort(int sock)
  82. {
  83. vnc_sockaddr_t sa;
  84. socklen_t sa_size = sizeof(sa);
  85. if (getsockname(sock, &sa.u.sa, &sa_size) < 0)
  86. return 0;
  87. switch (sa.u.sa.sa_family) {
  88. case AF_INET6:
  89. return ntohs(sa.u.sin6.sin6_port);
  90. default:
  91. return ntohs(sa.u.sin.sin_port);
  92. }
  93. }
  94. // -=- TcpSocket
  95. TcpSocket::TcpSocket(int sock) : Socket(sock)
  96. {
  97. // Disable Nagle's algorithm, to reduce latency
  98. enableNagles(false);
  99. }
  100. TcpSocket::TcpSocket(const char *host, int port)
  101. {
  102. int sock, err, result;
  103. struct addrinfo *ai, *current, hints;
  104. // - Create a socket
  105. memset(&hints, 0, sizeof(struct addrinfo));
  106. hints.ai_family = AF_UNSPEC;
  107. hints.ai_socktype = SOCK_STREAM;
  108. hints.ai_canonname = NULL;
  109. hints.ai_addr = NULL;
  110. hints.ai_next = NULL;
  111. if ((result = getaddrinfo(host, NULL, &hints, &ai)) != 0) {
  112. throw GAIException("unable to resolve host by name", result);
  113. }
  114. sock = -1;
  115. err = 0;
  116. for (current = ai; current != NULL; current = current->ai_next) {
  117. int family;
  118. vnc_sockaddr_t sa;
  119. socklen_t salen;
  120. char ntop[NI_MAXHOST];
  121. family = current->ai_family;
  122. switch (family) {
  123. case AF_INET:
  124. if (!UseIPv4)
  125. continue;
  126. break;
  127. case AF_INET6:
  128. if (!UseIPv6)
  129. continue;
  130. break;
  131. default:
  132. continue;
  133. }
  134. salen = current->ai_addrlen;
  135. memcpy(&sa, current->ai_addr, salen);
  136. if (family == AF_INET)
  137. sa.u.sin.sin_port = htons(port);
  138. else
  139. sa.u.sin6.sin6_port = htons(port);
  140. getnameinfo(&sa.u.sa, salen, ntop, sizeof(ntop), NULL, 0, NI_NUMERICHOST);
  141. vlog.debug("Connecting to %s [%s] port %d", host, ntop, port);
  142. sock = socket (family, SOCK_STREAM, 0);
  143. if (sock == -1) {
  144. err = errorNumber;
  145. freeaddrinfo(ai);
  146. throw SocketException("unable to create socket", err);
  147. }
  148. /* Attempt to connect to the remote host */
  149. while ((result = connect(sock, &sa.u.sa, salen)) == -1) {
  150. err = errorNumber;
  151. #ifndef WIN32
  152. if (err == EINTR)
  153. continue;
  154. #endif
  155. vlog.debug("Failed to connect to address %s port %d: %d",
  156. ntop, port, err);
  157. closesocket(sock);
  158. sock = -1;
  159. break;
  160. }
  161. if (result == 0)
  162. break;
  163. }
  164. freeaddrinfo(ai);
  165. if (sock == -1) {
  166. if (err == 0)
  167. throw Exception("No useful address for host");
  168. else
  169. throw SocketException("unable to connect to socket", err);
  170. }
  171. // Take proper ownership of the socket
  172. setFd(sock);
  173. // Disable Nagle's algorithm, to reduce latency
  174. enableNagles(false);
  175. }
  176. const char* TcpSocket::getPeerAddress() {
  177. vnc_sockaddr_t sa;
  178. socklen_t sa_size = sizeof(sa);
  179. if (getpeername(getFd(), &sa.u.sa, &sa_size) != 0) {
  180. vlog.error("unable to get peer name for socket");
  181. return "(N/A)";
  182. }
  183. if (sa.u.sa.sa_family == AF_INET6) {
  184. static char buffer[INET6_ADDRSTRLEN + 2];
  185. int ret;
  186. buffer[0] = '[';
  187. ret = getnameinfo(&sa.u.sa, sizeof(sa.u.sin6),
  188. buffer + 1, sizeof(buffer) - 2, NULL, 0,
  189. NI_NUMERICHOST);
  190. if (ret != 0) {
  191. vlog.error("unable to convert peer name to a string");
  192. return "(N/A)";
  193. }
  194. strcat(buffer, "]");
  195. return buffer;
  196. }
  197. if (sa.u.sa.sa_family == AF_INET) {
  198. char *name;
  199. name = inet_ntoa(sa.u.sin.sin_addr);
  200. if (name == NULL) {
  201. vlog.error("unable to convert peer name to a string");
  202. return "(N/A)";
  203. }
  204. return name;
  205. }
  206. vlog.error("unknown address family for socket");
  207. return "";
  208. }
  209. const char* TcpSocket::getPeerEndpoint() {
  210. static char buffer[INET6_ADDRSTRLEN + 2 + 32];
  211. vnc_sockaddr_t sa;
  212. socklen_t sa_size = sizeof(sa);
  213. int port;
  214. getpeername(getFd(), &sa.u.sa, &sa_size);
  215. if (sa.u.sa.sa_family == AF_INET6)
  216. port = ntohs(sa.u.sin6.sin6_port);
  217. else if (sa.u.sa.sa_family == AF_INET)
  218. port = ntohs(sa.u.sin.sin_port);
  219. else
  220. port = 0;
  221. sprintf(buffer, "%s::%d", getPeerAddress(), port);
  222. return buffer;
  223. }
  224. bool TcpSocket::enableNagles(bool enable) {
  225. int one = enable ? 0 : 1;
  226. if (setsockopt(getFd(), IPPROTO_TCP, TCP_NODELAY,
  227. (char *)&one, sizeof(one)) < 0) {
  228. int e = errorNumber;
  229. vlog.error("unable to setsockopt TCP_NODELAY: %d", e);
  230. return false;
  231. }
  232. return true;
  233. }
  234. TcpListener::TcpListener(int sock) : SocketListener(sock)
  235. {
  236. }
  237. TcpListener::TcpListener(const struct sockaddr *listenaddr,
  238. socklen_t listenaddrlen)
  239. {
  240. int one = 1;
  241. vnc_sockaddr_t sa;
  242. int sock;
  243. if ((sock = socket (listenaddr->sa_family, SOCK_STREAM, 0)) < 0)
  244. throw SocketException("unable to create listening socket", errorNumber);
  245. memcpy (&sa, listenaddr, listenaddrlen);
  246. #ifdef IPV6_V6ONLY
  247. if (listenaddr->sa_family == AF_INET6) {
  248. if (setsockopt (sock, IPPROTO_IPV6, IPV6_V6ONLY, (char*)&one, sizeof(one))) {
  249. int e = errorNumber;
  250. closesocket(sock);
  251. throw SocketException("unable to set IPV6_V6ONLY", e);
  252. }
  253. }
  254. #endif /* defined(IPV6_V6ONLY) */
  255. #ifdef FD_CLOEXEC
  256. // - By default, close the socket on exec()
  257. fcntl(sock, F_SETFD, FD_CLOEXEC);
  258. #endif
  259. // SO_REUSEADDR is broken on Windows. It allows binding to a port
  260. // that already has a listening socket on it. SO_EXCLUSIVEADDRUSE
  261. // might do what we want, but requires investigation.
  262. #ifndef WIN32
  263. if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
  264. (char *)&one, sizeof(one)) < 0) {
  265. int e = errorNumber;
  266. closesocket(sock);
  267. throw SocketException("unable to create listening socket", e);
  268. }
  269. #endif
  270. if (bind(sock, &sa.u.sa, listenaddrlen) == -1) {
  271. int e = errorNumber;
  272. closesocket(sock);
  273. throw SocketException("failed to bind socket", e);
  274. }
  275. listen(sock);
  276. }
  277. Socket* TcpListener::createSocket(int fd) {
  278. return new TcpSocket(fd);
  279. }
  280. std::list<std::string> TcpListener::getMyAddresses() {
  281. struct addrinfo *ai, *current, hints;
  282. std::list<std::string> result;
  283. initSockets();
  284. memset(&hints, 0, sizeof(struct addrinfo));
  285. hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
  286. hints.ai_family = AF_UNSPEC;
  287. hints.ai_socktype = SOCK_STREAM;
  288. hints.ai_canonname = NULL;
  289. hints.ai_addr = NULL;
  290. hints.ai_next = NULL;
  291. // Windows doesn't like NULL for service, so specify something
  292. if ((getaddrinfo(NULL, "1", &hints, &ai)) != 0)
  293. return result;
  294. for (current= ai; current != NULL; current = current->ai_next) {
  295. char addr[INET6_ADDRSTRLEN];
  296. switch (current->ai_family) {
  297. case AF_INET:
  298. if (!UseIPv4)
  299. continue;
  300. break;
  301. case AF_INET6:
  302. if (!UseIPv6)
  303. continue;
  304. break;
  305. default:
  306. continue;
  307. }
  308. getnameinfo(current->ai_addr, current->ai_addrlen, addr, INET6_ADDRSTRLEN,
  309. NULL, 0, NI_NUMERICHOST);
  310. result.push_back(addr);
  311. }
  312. freeaddrinfo(ai);
  313. return result;
  314. }
  315. int TcpListener::getMyPort() {
  316. return getSockPort(getFd());
  317. }
  318. void network::createLocalTcpListeners(std::list<SocketListener*> *listeners,
  319. int port)
  320. {
  321. struct addrinfo ai[2];
  322. vnc_sockaddr_t sa[2];
  323. memset(ai, 0, sizeof(ai));
  324. memset(sa, 0, sizeof(sa));
  325. sa[0].u.sin.sin_family = AF_INET;
  326. sa[0].u.sin.sin_port = htons (port);
  327. sa[0].u.sin.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
  328. ai[0].ai_family = sa[0].u.sin.sin_family;
  329. ai[0].ai_addr = &sa[0].u.sa;
  330. ai[0].ai_addrlen = sizeof(sa[0].u.sin);
  331. ai[0].ai_next = &ai[1];
  332. sa[1].u.sin6.sin6_family = AF_INET6;
  333. sa[1].u.sin6.sin6_port = htons (port);
  334. sa[1].u.sin6.sin6_addr = in6addr_loopback;
  335. ai[1].ai_family = sa[1].u.sin6.sin6_family;
  336. ai[1].ai_addr = &sa[1].u.sa;
  337. ai[1].ai_addrlen = sizeof(sa[1].u.sin6);
  338. ai[1].ai_next = NULL;
  339. createTcpListeners(listeners, ai);
  340. }
  341. void network::createTcpListeners(std::list<SocketListener*> *listeners,
  342. const char *addr,
  343. int port)
  344. {
  345. struct addrinfo *ai, hints;
  346. char service[16];
  347. int result;
  348. initSockets();
  349. memset(&hints, 0, sizeof(struct addrinfo));
  350. hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
  351. hints.ai_family = AF_UNSPEC;
  352. hints.ai_socktype = SOCK_STREAM;
  353. hints.ai_canonname = NULL;
  354. hints.ai_addr = NULL;
  355. hints.ai_next = NULL;
  356. snprintf (service, sizeof (service) - 1, "%d", port);
  357. service[sizeof (service) - 1] = '\0';
  358. if ((result = getaddrinfo(addr, service, &hints, &ai)) != 0)
  359. throw GAIException("unable to resolve listening address", result);
  360. try {
  361. createTcpListeners(listeners, ai);
  362. } catch(...) {
  363. freeaddrinfo(ai);
  364. throw;
  365. }
  366. freeaddrinfo(ai);
  367. }
  368. void network::createTcpListeners(std::list<SocketListener*> *listeners,
  369. const struct addrinfo *ai)
  370. {
  371. const struct addrinfo *current;
  372. std::list<SocketListener*> new_listeners;
  373. initSockets();
  374. for (current = ai; current != NULL; current = current->ai_next) {
  375. switch (current->ai_family) {
  376. case AF_INET:
  377. if (!UseIPv4)
  378. continue;
  379. break;
  380. case AF_INET6:
  381. if (!UseIPv6)
  382. continue;
  383. break;
  384. default:
  385. continue;
  386. }
  387. try {
  388. new_listeners.push_back(new TcpListener(current->ai_addr,
  389. current->ai_addrlen));
  390. } catch (SocketException& e) {
  391. // Ignore this if it is due to lack of address family support on
  392. // the interface or on the system
  393. if (e.err != EADDRNOTAVAIL && e.err != EAFNOSUPPORT) {
  394. // Otherwise, report the error
  395. while (!new_listeners.empty()) {
  396. delete new_listeners.back();
  397. new_listeners.pop_back();
  398. }
  399. throw;
  400. }
  401. }
  402. }
  403. if (new_listeners.empty ())
  404. throw SocketException("createTcpListeners: no addresses available",
  405. EADDRNOTAVAIL);
  406. listeners->splice (listeners->end(), new_listeners);
  407. }
  408. TcpFilter::TcpFilter(const char* spec) {
  409. rfb::CharArray tmp;
  410. tmp.buf = rfb::strDup(spec);
  411. while (tmp.buf) {
  412. rfb::CharArray first;
  413. rfb::strSplit(tmp.buf, ',', &first.buf, &tmp.buf);
  414. if (strlen(first.buf))
  415. filter.push_back(parsePattern(first.buf));
  416. }
  417. }
  418. TcpFilter::~TcpFilter() {
  419. }
  420. static bool
  421. patternMatchIP(const TcpFilter::Pattern& pattern, vnc_sockaddr_t *sa) {
  422. switch (pattern.address.u.sa.sa_family) {
  423. unsigned long address;
  424. case AF_INET:
  425. if (sa->u.sa.sa_family != AF_INET)
  426. return false;
  427. address = sa->u.sin.sin_addr.s_addr;
  428. if (address == htonl (INADDR_NONE)) return false;
  429. return ((pattern.address.u.sin.sin_addr.s_addr &
  430. pattern.mask.u.sin.sin_addr.s_addr) ==
  431. (address & pattern.mask.u.sin.sin_addr.s_addr));
  432. case AF_INET6:
  433. if (sa->u.sa.sa_family != AF_INET6)
  434. return false;
  435. for (unsigned int n = 0; n < 16; n++) {
  436. unsigned int bits = (n + 1) * 8;
  437. unsigned int mask;
  438. if (pattern.prefixlen > bits)
  439. mask = 0xff;
  440. else {
  441. unsigned int lastbits = 0xff;
  442. lastbits <<= bits - pattern.prefixlen;
  443. mask = lastbits & 0xff;
  444. }
  445. if ((pattern.address.u.sin6.sin6_addr.s6_addr[n] & mask) !=
  446. (sa->u.sin6.sin6_addr.s6_addr[n] & mask))
  447. return false;
  448. if (mask < 0xff)
  449. break;
  450. }
  451. return true;
  452. case AF_UNSPEC:
  453. // Any address matches
  454. return true;
  455. default:
  456. break;
  457. }
  458. return false;
  459. }
  460. bool
  461. TcpFilter::verifyConnection(Socket* s) {
  462. vnc_sockaddr_t sa;
  463. socklen_t sa_size = sizeof(sa);
  464. if (getpeername(s->getFd(), &sa.u.sa, &sa_size) != 0)
  465. return false;
  466. std::list<TcpFilter::Pattern>::iterator i;
  467. for (i=filter.begin(); i!=filter.end(); i++) {
  468. if (patternMatchIP(*i, &sa)) {
  469. switch ((*i).action) {
  470. case Accept:
  471. vlog.debug("ACCEPT %s", s->getPeerAddress());
  472. return true;
  473. case Query:
  474. vlog.debug("QUERY %s", s->getPeerAddress());
  475. s->setRequiresQuery();
  476. return true;
  477. case Reject:
  478. vlog.debug("REJECT %s", s->getPeerAddress());
  479. return false;
  480. }
  481. }
  482. }
  483. vlog.debug("[REJECT] %s", s->getPeerAddress());
  484. return false;
  485. }
  486. TcpFilter::Pattern TcpFilter::parsePattern(const char* p) {
  487. TcpFilter::Pattern pattern;
  488. rfb::CharArray addr, pref;
  489. bool prefix_specified;
  490. int family;
  491. initSockets();
  492. prefix_specified = rfb::strSplit(&p[1], '/', &addr.buf, &pref.buf);
  493. if (addr.buf[0] == '\0') {
  494. // Match any address
  495. memset (&pattern.address, 0, sizeof (pattern.address));
  496. pattern.address.u.sa.sa_family = AF_UNSPEC;
  497. pattern.prefixlen = 0;
  498. } else {
  499. struct addrinfo hints;
  500. struct addrinfo *ai;
  501. char *p = addr.buf;
  502. int result;
  503. memset (&hints, 0, sizeof (hints));
  504. hints.ai_family = AF_UNSPEC;
  505. hints.ai_flags = AI_NUMERICHOST;
  506. // Take out brackets, if present
  507. if (*p == '[') {
  508. size_t len;
  509. p++;
  510. len = strlen (p);
  511. if (len > 0 && p[len - 1] == ']')
  512. p[len - 1] = '\0';
  513. }
  514. if ((result = getaddrinfo (p, NULL, &hints, &ai)) != 0) {
  515. throw GAIException("unable to resolve host by name", result);
  516. }
  517. memcpy (&pattern.address.u.sa, ai->ai_addr, ai->ai_addrlen);
  518. freeaddrinfo (ai);
  519. family = pattern.address.u.sa.sa_family;
  520. if (prefix_specified) {
  521. if (family == AF_INET &&
  522. rfb::strContains(pref.buf, '.')) {
  523. throw Exception("mask no longer supported for filter, "
  524. "use prefix instead");
  525. }
  526. pattern.prefixlen = (unsigned int) atoi(pref.buf);
  527. } else {
  528. switch (family) {
  529. case AF_INET:
  530. pattern.prefixlen = 32;
  531. break;
  532. case AF_INET6:
  533. pattern.prefixlen = 128;
  534. break;
  535. default:
  536. throw Exception("unknown address family");
  537. }
  538. }
  539. }
  540. family = pattern.address.u.sa.sa_family;
  541. if (pattern.prefixlen > (family == AF_INET ? 32: 128))
  542. throw Exception("invalid prefix length for filter address: %u",
  543. pattern.prefixlen);
  544. // Compute mask from address and prefix length
  545. memset (&pattern.mask, 0, sizeof (pattern.mask));
  546. switch (family) {
  547. unsigned long mask;
  548. case AF_INET:
  549. mask = 0;
  550. for (unsigned int i=0; i<pattern.prefixlen; i++)
  551. mask |= 1<<(31-i);
  552. pattern.mask.u.sin.sin_addr.s_addr = htonl(mask);
  553. break;
  554. case AF_INET6:
  555. for (unsigned int n = 0; n < 16; n++) {
  556. unsigned int bits = (n + 1) * 8;
  557. if (pattern.prefixlen > bits)
  558. pattern.mask.u.sin6.sin6_addr.s6_addr[n] = 0xff;
  559. else {
  560. unsigned int lastbits = 0xff;
  561. lastbits <<= bits - pattern.prefixlen;
  562. pattern.mask.u.sin6.sin6_addr.s6_addr[n] = lastbits & 0xff;
  563. break;
  564. }
  565. }
  566. break;
  567. case AF_UNSPEC:
  568. // No mask to compute
  569. break;
  570. default:
  571. ; /* not reached */
  572. }
  573. switch(p[0]) {
  574. case '+': pattern.action = TcpFilter::Accept; break;
  575. case '-': pattern.action = TcpFilter::Reject; break;
  576. case '?': pattern.action = TcpFilter::Query; break;
  577. };
  578. return pattern;
  579. }
  580. std::string TcpFilter::patternToStr(const TcpFilter::Pattern& p) {
  581. char addr[INET6_ADDRSTRLEN + 2];
  582. if (p.address.u.sa.sa_family == AF_INET) {
  583. getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin),
  584. addr, sizeof(addr), NULL, 0, NI_NUMERICHOST);
  585. } else if (p.address.u.sa.sa_family == AF_INET6) {
  586. addr[0] = '[';
  587. getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin6),
  588. addr + 1, sizeof(addr) - 2, NULL, 0, NI_NUMERICHOST);
  589. strcat(addr, "]");
  590. } else
  591. addr[0] = '\0';
  592. char action;
  593. switch (p.action) {
  594. case Accept: action = '+'; break;
  595. case Reject: action = '-'; break;
  596. default:
  597. case Query: action = '?'; break;
  598. };
  599. size_t resultlen = (1 // action
  600. + strlen (addr) // address
  601. + 1 // slash
  602. + 3 // prefix length, max 128
  603. + 1); // terminating nul
  604. char* result = new char[resultlen];
  605. if (addr[0] == '\0')
  606. snprintf(result, resultlen, "%c", action);
  607. else
  608. snprintf(result, resultlen, "%c%s/%u", action, addr, p.prefixlen);
  609. std::string out = result;
  610. delete [] result;
  611. return out;
  612. }