You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

TcpSocket.cxx 19KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758
  1. /* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
  2. *
  3. * This is free software; you can redistribute it and/or modify
  4. * it under the terms of the GNU General Public License as published by
  5. * the Free Software Foundation; either version 2 of the License, or
  6. * (at your option) any later version.
  7. *
  8. * This software is distributed in the hope that it will be useful,
  9. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. * GNU General Public License for more details.
  12. *
  13. * You should have received a copy of the GNU General Public License
  14. * along with this software; if not, write to the Free Software
  15. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
  16. * USA.
  17. */
  18. #ifdef HAVE_CONFIG_H
  19. #include <config.h>
  20. #endif
  21. #ifdef WIN32
  22. //#include <io.h>
  23. #include <winsock2.h>
  24. #include <ws2tcpip.h>
  25. #define errorNumber WSAGetLastError()
  26. #else
  27. #define errorNumber errno
  28. #define closesocket close
  29. #include <sys/socket.h>
  30. #include <arpa/inet.h>
  31. #include <netinet/tcp.h>
  32. #include <netdb.h>
  33. #include <errno.h>
  34. #endif
  35. #include <stdlib.h>
  36. #include <unistd.h>
  37. #include <network/TcpSocket.h>
  38. #include <rfb/LogWriter.h>
  39. #include <rfb/Configuration.h>
  40. #ifdef WIN32
  41. #include <os/winerrno.h>
  42. #endif
  43. #ifndef INADDR_NONE
  44. #define INADDR_NONE ((unsigned long)-1)
  45. #endif
  46. #ifndef INADDR_LOOPBACK
  47. #define INADDR_LOOPBACK ((unsigned long)0x7F000001)
  48. #endif
  49. #ifndef IN6_ARE_ADDR_EQUAL
  50. #define IN6_ARE_ADDR_EQUAL(a,b) \
  51. (memcmp ((const void*)(a), (const void*)(b), sizeof (struct in6_addr)) == 0)
  52. #endif
  53. // Missing on older Windows and OS X
  54. #ifndef AI_NUMERICSERV
  55. #define AI_NUMERICSERV 0
  56. #endif
  57. using namespace network;
  58. using namespace rdr;
  59. static rfb::LogWriter vlog("TcpSocket");
  60. static rfb::BoolParameter UseIPv4("UseIPv4", "Use IPv4 for incoming and outgoing connections.", true);
  61. static rfb::BoolParameter UseIPv6("UseIPv6", "Use IPv6 for incoming and outgoing connections.", true);
  62. /* Tunnelling support. */
  63. int network::findFreeTcpPort (void)
  64. {
  65. int sock;
  66. struct sockaddr_in addr;
  67. memset(&addr, 0, sizeof(addr));
  68. addr.sin_family = AF_INET;
  69. addr.sin_addr.s_addr = INADDR_ANY;
  70. if ((sock = socket (AF_INET, SOCK_STREAM, 0)) < 0)
  71. throw SocketException ("unable to create socket", errorNumber);
  72. addr.sin_port = 0;
  73. if (bind (sock, (struct sockaddr *)&addr, sizeof (addr)) < 0)
  74. throw SocketException ("unable to find free port", errorNumber);
  75. socklen_t n = sizeof(addr);
  76. if (getsockname (sock, (struct sockaddr *)&addr, &n) < 0)
  77. throw SocketException ("unable to get port number", errorNumber);
  78. closesocket (sock);
  79. return ntohs(addr.sin_port);
  80. }
  81. int network::getSockPort(int sock)
  82. {
  83. vnc_sockaddr_t sa;
  84. socklen_t sa_size = sizeof(sa);
  85. if (getsockname(sock, &sa.u.sa, &sa_size) < 0)
  86. return 0;
  87. switch (sa.u.sa.sa_family) {
  88. case AF_INET6:
  89. return ntohs(sa.u.sin6.sin6_port);
  90. default:
  91. return ntohs(sa.u.sin.sin_port);
  92. }
  93. }
  94. // -=- TcpSocket
  95. TcpSocket::TcpSocket(int sock) : Socket(sock)
  96. {
  97. // Disable Nagle's algorithm, to reduce latency
  98. enableNagles(false);
  99. }
  100. TcpSocket::TcpSocket(const char *host, int port)
  101. {
  102. int sock, err, result;
  103. struct addrinfo *ai, *current, hints;
  104. // - Create a socket
  105. memset(&hints, 0, sizeof(struct addrinfo));
  106. hints.ai_family = AF_UNSPEC;
  107. hints.ai_socktype = SOCK_STREAM;
  108. hints.ai_canonname = NULL;
  109. hints.ai_addr = NULL;
  110. hints.ai_next = NULL;
  111. if ((result = getaddrinfo(host, NULL, &hints, &ai)) != 0) {
  112. throw GAIException("unable to resolve host by name", result);
  113. }
  114. sock = -1;
  115. err = 0;
  116. for (current = ai; current != NULL; current = current->ai_next) {
  117. int family;
  118. vnc_sockaddr_t sa;
  119. socklen_t salen;
  120. char ntop[NI_MAXHOST];
  121. family = current->ai_family;
  122. switch (family) {
  123. case AF_INET:
  124. if (!UseIPv4)
  125. continue;
  126. break;
  127. case AF_INET6:
  128. if (!UseIPv6)
  129. continue;
  130. break;
  131. default:
  132. continue;
  133. }
  134. salen = current->ai_addrlen;
  135. memcpy(&sa, current->ai_addr, salen);
  136. if (family == AF_INET)
  137. sa.u.sin.sin_port = htons(port);
  138. else
  139. sa.u.sin6.sin6_port = htons(port);
  140. getnameinfo(&sa.u.sa, salen, ntop, sizeof(ntop), NULL, 0, NI_NUMERICHOST);
  141. vlog.debug("Connecting to %s [%s] port %d", host, ntop, port);
  142. sock = socket (family, SOCK_STREAM, 0);
  143. if (sock == -1) {
  144. err = errorNumber;
  145. freeaddrinfo(ai);
  146. throw SocketException("unable to create socket", err);
  147. }
  148. /* Attempt to connect to the remote host */
  149. while ((result = connect(sock, &sa.u.sa, salen)) == -1) {
  150. err = errorNumber;
  151. #ifndef WIN32
  152. if (err == EINTR)
  153. continue;
  154. #endif
  155. vlog.debug("Failed to connect to address %s port %d: %d",
  156. ntop, port, err);
  157. closesocket(sock);
  158. sock = -1;
  159. break;
  160. }
  161. if (result == 0)
  162. break;
  163. }
  164. freeaddrinfo(ai);
  165. if (sock == -1) {
  166. if (err == 0)
  167. throw Exception("No useful address for host");
  168. else
  169. throw SocketException("unable to connect to socket", err);
  170. }
  171. // Take proper ownership of the socket
  172. setFd(sock);
  173. // Disable Nagle's algorithm, to reduce latency
  174. enableNagles(false);
  175. }
  176. char* TcpSocket::getPeerAddress() {
  177. vnc_sockaddr_t sa;
  178. socklen_t sa_size = sizeof(sa);
  179. if (getpeername(getFd(), &sa.u.sa, &sa_size) != 0) {
  180. vlog.error("unable to get peer name for socket");
  181. return rfb::strDup("");
  182. }
  183. if (sa.u.sa.sa_family == AF_INET6) {
  184. char buffer[INET6_ADDRSTRLEN + 2];
  185. int ret;
  186. buffer[0] = '[';
  187. ret = getnameinfo(&sa.u.sa, sizeof(sa.u.sin6),
  188. buffer + 1, sizeof(buffer) - 2, NULL, 0,
  189. NI_NUMERICHOST);
  190. if (ret != 0) {
  191. vlog.error("unable to convert peer name to a string");
  192. return rfb::strDup("");
  193. }
  194. strcat(buffer, "]");
  195. return rfb::strDup(buffer);
  196. }
  197. if (sa.u.sa.sa_family == AF_INET) {
  198. char *name;
  199. name = inet_ntoa(sa.u.sin.sin_addr);
  200. if (name == NULL) {
  201. vlog.error("unable to convert peer name to a string");
  202. return rfb::strDup("");
  203. }
  204. return rfb::strDup(name);
  205. }
  206. vlog.error("unknown address family for socket");
  207. return rfb::strDup("");
  208. }
  209. char* TcpSocket::getPeerEndpoint() {
  210. rfb::CharArray address; address.buf = getPeerAddress();
  211. vnc_sockaddr_t sa;
  212. socklen_t sa_size = sizeof(sa);
  213. int port;
  214. getpeername(getFd(), &sa.u.sa, &sa_size);
  215. if (sa.u.sa.sa_family == AF_INET6)
  216. port = ntohs(sa.u.sin6.sin6_port);
  217. else if (sa.u.sa.sa_family == AF_INET)
  218. port = ntohs(sa.u.sin.sin_port);
  219. else
  220. port = 0;
  221. int buflen = strlen(address.buf) + 32;
  222. char* buffer = new char[buflen];
  223. sprintf(buffer, "%s::%d", address.buf, port);
  224. return buffer;
  225. }
  226. bool TcpSocket::enableNagles(bool enable) {
  227. int one = enable ? 0 : 1;
  228. if (setsockopt(getFd(), IPPROTO_TCP, TCP_NODELAY,
  229. (char *)&one, sizeof(one)) < 0) {
  230. int e = errorNumber;
  231. vlog.error("unable to setsockopt TCP_NODELAY: %d", e);
  232. return false;
  233. }
  234. return true;
  235. }
  236. bool TcpSocket::cork(bool enable) {
  237. #ifndef TCP_CORK
  238. return false;
  239. #else
  240. int one = enable ? 1 : 0;
  241. if (setsockopt(getFd(), IPPROTO_TCP, TCP_CORK, (char *)&one, sizeof(one)) < 0)
  242. return false;
  243. return true;
  244. #endif
  245. }
  246. TcpListener::TcpListener(int sock) : SocketListener(sock)
  247. {
  248. }
  249. TcpListener::TcpListener(const struct sockaddr *listenaddr,
  250. socklen_t listenaddrlen)
  251. {
  252. int one = 1;
  253. vnc_sockaddr_t sa;
  254. int sock;
  255. if ((sock = socket (listenaddr->sa_family, SOCK_STREAM, 0)) < 0)
  256. throw SocketException("unable to create listening socket", errorNumber);
  257. memcpy (&sa, listenaddr, listenaddrlen);
  258. #ifdef IPV6_V6ONLY
  259. if (listenaddr->sa_family == AF_INET6) {
  260. if (setsockopt (sock, IPPROTO_IPV6, IPV6_V6ONLY, (char*)&one, sizeof(one))) {
  261. int e = errorNumber;
  262. closesocket(sock);
  263. throw SocketException("unable to set IPV6_V6ONLY", e);
  264. }
  265. }
  266. #endif /* defined(IPV6_V6ONLY) */
  267. #ifdef FD_CLOEXEC
  268. // - By default, close the socket on exec()
  269. fcntl(sock, F_SETFD, FD_CLOEXEC);
  270. #endif
  271. // SO_REUSEADDR is broken on Windows. It allows binding to a port
  272. // that already has a listening socket on it. SO_EXCLUSIVEADDRUSE
  273. // might do what we want, but requires investigation.
  274. #ifndef WIN32
  275. if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
  276. (char *)&one, sizeof(one)) < 0) {
  277. int e = errorNumber;
  278. closesocket(sock);
  279. throw SocketException("unable to create listening socket", e);
  280. }
  281. #endif
  282. if (bind(sock, &sa.u.sa, listenaddrlen) == -1) {
  283. int e = errorNumber;
  284. closesocket(sock);
  285. throw SocketException("failed to bind socket", e);
  286. }
  287. listen(sock);
  288. }
  289. Socket* TcpListener::createSocket(int fd) {
  290. return new TcpSocket(fd);
  291. }
  292. void TcpListener::getMyAddresses(std::list<char*>* result) {
  293. struct addrinfo *ai, *current, hints;
  294. initSockets();
  295. memset(&hints, 0, sizeof(struct addrinfo));
  296. hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
  297. hints.ai_family = AF_UNSPEC;
  298. hints.ai_socktype = SOCK_STREAM;
  299. hints.ai_canonname = NULL;
  300. hints.ai_addr = NULL;
  301. hints.ai_next = NULL;
  302. // Windows doesn't like NULL for service, so specify something
  303. if ((getaddrinfo(NULL, "1", &hints, &ai)) != 0)
  304. return;
  305. for (current= ai; current != NULL; current = current->ai_next) {
  306. switch (current->ai_family) {
  307. case AF_INET:
  308. if (!UseIPv4)
  309. continue;
  310. break;
  311. case AF_INET6:
  312. if (!UseIPv6)
  313. continue;
  314. break;
  315. default:
  316. continue;
  317. }
  318. char *addr = new char[INET6_ADDRSTRLEN];
  319. getnameinfo(current->ai_addr, current->ai_addrlen, addr, INET6_ADDRSTRLEN,
  320. NULL, 0, NI_NUMERICHOST);
  321. result->push_back(addr);
  322. }
  323. freeaddrinfo(ai);
  324. }
  325. int TcpListener::getMyPort() {
  326. return getSockPort(getFd());
  327. }
  328. void network::createLocalTcpListeners(std::list<SocketListener*> *listeners,
  329. int port)
  330. {
  331. struct addrinfo ai[2];
  332. vnc_sockaddr_t sa[2];
  333. memset(ai, 0, sizeof(ai));
  334. memset(sa, 0, sizeof(sa));
  335. sa[0].u.sin.sin_family = AF_INET;
  336. sa[0].u.sin.sin_port = htons (port);
  337. sa[0].u.sin.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
  338. ai[0].ai_family = sa[0].u.sin.sin_family;
  339. ai[0].ai_addr = &sa[0].u.sa;
  340. ai[0].ai_addrlen = sizeof(sa[0].u.sin);
  341. ai[0].ai_next = &ai[1];
  342. sa[1].u.sin6.sin6_family = AF_INET6;
  343. sa[1].u.sin6.sin6_port = htons (port);
  344. sa[1].u.sin6.sin6_addr = in6addr_loopback;
  345. ai[1].ai_family = sa[1].u.sin6.sin6_family;
  346. ai[1].ai_addr = &sa[1].u.sa;
  347. ai[1].ai_addrlen = sizeof(sa[1].u.sin6);
  348. ai[1].ai_next = NULL;
  349. createTcpListeners(listeners, ai);
  350. }
  351. void network::createTcpListeners(std::list<SocketListener*> *listeners,
  352. const char *addr,
  353. int port)
  354. {
  355. struct addrinfo *ai, hints;
  356. char service[16];
  357. int result;
  358. initSockets();
  359. memset(&hints, 0, sizeof(struct addrinfo));
  360. hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
  361. hints.ai_family = AF_UNSPEC;
  362. hints.ai_socktype = SOCK_STREAM;
  363. hints.ai_canonname = NULL;
  364. hints.ai_addr = NULL;
  365. hints.ai_next = NULL;
  366. snprintf (service, sizeof (service) - 1, "%d", port);
  367. service[sizeof (service) - 1] = '\0';
  368. if ((result = getaddrinfo(addr, service, &hints, &ai)) != 0)
  369. throw GAIException("unable to resolve listening address", result);
  370. try {
  371. createTcpListeners(listeners, ai);
  372. } catch(...) {
  373. freeaddrinfo(ai);
  374. throw;
  375. }
  376. }
  377. void network::createTcpListeners(std::list<SocketListener*> *listeners,
  378. const struct addrinfo *ai)
  379. {
  380. const struct addrinfo *current;
  381. std::list<SocketListener*> new_listeners;
  382. initSockets();
  383. for (current = ai; current != NULL; current = current->ai_next) {
  384. switch (current->ai_family) {
  385. case AF_INET:
  386. if (!UseIPv4)
  387. continue;
  388. break;
  389. case AF_INET6:
  390. if (!UseIPv6)
  391. continue;
  392. break;
  393. default:
  394. continue;
  395. }
  396. try {
  397. new_listeners.push_back(new TcpListener(current->ai_addr,
  398. current->ai_addrlen));
  399. } catch (SocketException& e) {
  400. // Ignore this if it is due to lack of address family support on
  401. // the interface or on the system
  402. if (e.err != EADDRNOTAVAIL && e.err != EAFNOSUPPORT) {
  403. // Otherwise, report the error
  404. while (!new_listeners.empty()) {
  405. delete new_listeners.back();
  406. new_listeners.pop_back();
  407. }
  408. throw;
  409. }
  410. }
  411. }
  412. if (new_listeners.empty ())
  413. throw SocketException("createTcpListeners: no addresses available",
  414. EADDRNOTAVAIL);
  415. listeners->splice (listeners->end(), new_listeners);
  416. }
  417. TcpFilter::TcpFilter(const char* spec) {
  418. rfb::CharArray tmp;
  419. tmp.buf = rfb::strDup(spec);
  420. while (tmp.buf) {
  421. rfb::CharArray first;
  422. rfb::strSplit(tmp.buf, ',', &first.buf, &tmp.buf);
  423. if (strlen(first.buf))
  424. filter.push_back(parsePattern(first.buf));
  425. }
  426. }
  427. TcpFilter::~TcpFilter() {
  428. }
  429. static bool
  430. patternMatchIP(const TcpFilter::Pattern& pattern, vnc_sockaddr_t *sa) {
  431. switch (pattern.address.u.sa.sa_family) {
  432. unsigned long address;
  433. case AF_INET:
  434. if (sa->u.sa.sa_family != AF_INET)
  435. return false;
  436. address = sa->u.sin.sin_addr.s_addr;
  437. if (address == htonl (INADDR_NONE)) return false;
  438. return ((pattern.address.u.sin.sin_addr.s_addr &
  439. pattern.mask.u.sin.sin_addr.s_addr) ==
  440. (address & pattern.mask.u.sin.sin_addr.s_addr));
  441. case AF_INET6:
  442. if (sa->u.sa.sa_family != AF_INET6)
  443. return false;
  444. for (unsigned int n = 0; n < 16; n++) {
  445. unsigned int bits = (n + 1) * 8;
  446. unsigned int mask;
  447. if (pattern.prefixlen > bits)
  448. mask = 0xff;
  449. else {
  450. unsigned int lastbits = 0xff;
  451. lastbits <<= bits - pattern.prefixlen;
  452. mask = lastbits & 0xff;
  453. }
  454. if ((pattern.address.u.sin6.sin6_addr.s6_addr[n] & mask) !=
  455. (sa->u.sin6.sin6_addr.s6_addr[n] & mask))
  456. return false;
  457. if (mask < 0xff)
  458. break;
  459. }
  460. return true;
  461. case AF_UNSPEC:
  462. // Any address matches
  463. return true;
  464. default:
  465. break;
  466. }
  467. return false;
  468. }
  469. bool
  470. TcpFilter::verifyConnection(Socket* s) {
  471. rfb::CharArray name;
  472. vnc_sockaddr_t sa;
  473. socklen_t sa_size = sizeof(sa);
  474. if (getpeername(s->getFd(), &sa.u.sa, &sa_size) != 0)
  475. return false;
  476. name.buf = s->getPeerAddress();
  477. std::list<TcpFilter::Pattern>::iterator i;
  478. for (i=filter.begin(); i!=filter.end(); i++) {
  479. if (patternMatchIP(*i, &sa)) {
  480. switch ((*i).action) {
  481. case Accept:
  482. vlog.debug("ACCEPT %s", name.buf);
  483. return true;
  484. case Query:
  485. vlog.debug("QUERY %s", name.buf);
  486. s->setRequiresQuery();
  487. return true;
  488. case Reject:
  489. vlog.debug("REJECT %s", name.buf);
  490. return false;
  491. }
  492. }
  493. }
  494. vlog.debug("[REJECT] %s", name.buf);
  495. return false;
  496. }
  497. TcpFilter::Pattern TcpFilter::parsePattern(const char* p) {
  498. TcpFilter::Pattern pattern;
  499. rfb::CharArray addr, pref;
  500. bool prefix_specified;
  501. int family;
  502. initSockets();
  503. prefix_specified = rfb::strSplit(&p[1], '/', &addr.buf, &pref.buf);
  504. if (addr.buf[0] == '\0') {
  505. // Match any address
  506. memset (&pattern.address, 0, sizeof (pattern.address));
  507. pattern.address.u.sa.sa_family = AF_UNSPEC;
  508. pattern.prefixlen = 0;
  509. } else {
  510. struct addrinfo hints;
  511. struct addrinfo *ai;
  512. char *p = addr.buf;
  513. int result;
  514. memset (&hints, 0, sizeof (hints));
  515. hints.ai_family = AF_UNSPEC;
  516. hints.ai_flags = AI_NUMERICHOST;
  517. // Take out brackets, if present
  518. if (*p == '[') {
  519. size_t len;
  520. p++;
  521. len = strlen (p);
  522. if (len > 0 && p[len - 1] == ']')
  523. p[len - 1] = '\0';
  524. }
  525. if ((result = getaddrinfo (p, NULL, &hints, &ai)) != 0) {
  526. throw GAIException("unable to resolve host by name", result);
  527. }
  528. memcpy (&pattern.address.u.sa, ai->ai_addr, ai->ai_addrlen);
  529. freeaddrinfo (ai);
  530. family = pattern.address.u.sa.sa_family;
  531. if (prefix_specified) {
  532. if (family == AF_INET &&
  533. rfb::strContains(pref.buf, '.')) {
  534. throw Exception("mask no longer supported for filter, "
  535. "use prefix instead");
  536. }
  537. pattern.prefixlen = (unsigned int) atoi(pref.buf);
  538. } else {
  539. switch (family) {
  540. case AF_INET:
  541. pattern.prefixlen = 32;
  542. break;
  543. case AF_INET6:
  544. pattern.prefixlen = 128;
  545. break;
  546. default:
  547. throw Exception("unknown address family");
  548. }
  549. }
  550. }
  551. family = pattern.address.u.sa.sa_family;
  552. if (pattern.prefixlen > (family == AF_INET ? 32: 128))
  553. throw Exception("invalid prefix length for filter address: %u",
  554. pattern.prefixlen);
  555. // Compute mask from address and prefix length
  556. memset (&pattern.mask, 0, sizeof (pattern.mask));
  557. switch (family) {
  558. unsigned long mask;
  559. case AF_INET:
  560. mask = 0;
  561. for (unsigned int i=0; i<pattern.prefixlen; i++)
  562. mask |= 1<<(31-i);
  563. pattern.mask.u.sin.sin_addr.s_addr = htonl(mask);
  564. break;
  565. case AF_INET6:
  566. for (unsigned int n = 0; n < 16; n++) {
  567. unsigned int bits = (n + 1) * 8;
  568. if (pattern.prefixlen > bits)
  569. pattern.mask.u.sin6.sin6_addr.s6_addr[n] = 0xff;
  570. else {
  571. unsigned int lastbits = 0xff;
  572. lastbits <<= bits - pattern.prefixlen;
  573. pattern.mask.u.sin6.sin6_addr.s6_addr[n] = lastbits & 0xff;
  574. break;
  575. }
  576. }
  577. break;
  578. case AF_UNSPEC:
  579. // No mask to compute
  580. break;
  581. default:
  582. ; /* not reached */
  583. }
  584. switch(p[0]) {
  585. case '+': pattern.action = TcpFilter::Accept; break;
  586. case '-': pattern.action = TcpFilter::Reject; break;
  587. case '?': pattern.action = TcpFilter::Query; break;
  588. };
  589. return pattern;
  590. }
  591. char* TcpFilter::patternToStr(const TcpFilter::Pattern& p) {
  592. rfb::CharArray addr;
  593. char buffer[INET6_ADDRSTRLEN + 2];
  594. if (p.address.u.sa.sa_family == AF_INET) {
  595. getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin),
  596. buffer, sizeof (buffer), NULL, 0, NI_NUMERICHOST);
  597. addr.buf = rfb::strDup(buffer);
  598. } else if (p.address.u.sa.sa_family == AF_INET6) {
  599. buffer[0] = '[';
  600. getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin6),
  601. buffer + 1, sizeof (buffer) - 2, NULL, 0, NI_NUMERICHOST);
  602. strcat(buffer, "]");
  603. addr.buf = rfb::strDup(buffer);
  604. } else
  605. addr.buf = rfb::strDup("");
  606. char action;
  607. switch (p.action) {
  608. case Accept: action = '+'; break;
  609. case Reject: action = '-'; break;
  610. default:
  611. case Query: action = '?'; break;
  612. };
  613. size_t resultlen = (1 // action
  614. + strlen (addr.buf) // address
  615. + 1 // slash
  616. + 3 // prefix length, max 128
  617. + 1); // terminating nul
  618. char* result = new char[resultlen];
  619. if (addr.buf[0] == '\0')
  620. snprintf(result, resultlen, "%c", action);
  621. else
  622. snprintf(result, resultlen, "%c%s/%u", action, addr.buf, p.prefixlen);
  623. return result;
  624. }