You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

TcpSocket.cxx 18KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750
  1. /* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
  2. *
  3. * This is free software; you can redistribute it and/or modify
  4. * it under the terms of the GNU General Public License as published by
  5. * the Free Software Foundation; either version 2 of the License, or
  6. * (at your option) any later version.
  7. *
  8. * This software is distributed in the hope that it will be useful,
  9. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. * GNU General Public License for more details.
  12. *
  13. * You should have received a copy of the GNU General Public License
  14. * along with this software; if not, write to the Free Software
  15. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
  16. * USA.
  17. */
  18. #ifdef HAVE_CONFIG_H
  19. #include <config.h>
  20. #endif
  21. #ifdef WIN32
  22. //#include <io.h>
  23. #include <winsock2.h>
  24. #include <ws2tcpip.h>
  25. #define errorNumber WSAGetLastError()
  26. #else
  27. #define errorNumber errno
  28. #define closesocket close
  29. #include <sys/socket.h>
  30. #include <arpa/inet.h>
  31. #include <netinet/tcp.h>
  32. #include <netdb.h>
  33. #include <errno.h>
  34. #endif
  35. #include <stdlib.h>
  36. #include <unistd.h>
  37. #include <network/TcpSocket.h>
  38. #include <rfb/LogWriter.h>
  39. #include <rfb/Configuration.h>
  40. #include <rfb/util.h>
  41. #ifdef WIN32
  42. #include <os/winerrno.h>
  43. #endif
  44. #ifndef INADDR_NONE
  45. #define INADDR_NONE ((unsigned long)-1)
  46. #endif
  47. #ifndef INADDR_LOOPBACK
  48. #define INADDR_LOOPBACK ((unsigned long)0x7F000001)
  49. #endif
  50. #ifndef IN6_ARE_ADDR_EQUAL
  51. #define IN6_ARE_ADDR_EQUAL(a,b) \
  52. (memcmp ((const void*)(a), (const void*)(b), sizeof (struct in6_addr)) == 0)
  53. #endif
  54. // Missing on older Windows and OS X
  55. #ifndef AI_NUMERICSERV
  56. #define AI_NUMERICSERV 0
  57. #endif
  58. using namespace network;
  59. using namespace rdr;
  60. static rfb::LogWriter vlog("TcpSocket");
  61. static rfb::BoolParameter UseIPv4("UseIPv4", "Use IPv4 for incoming and outgoing connections.", true);
  62. static rfb::BoolParameter UseIPv6("UseIPv6", "Use IPv6 for incoming and outgoing connections.", true);
  63. /* Tunnelling support. */
  64. int network::findFreeTcpPort (void)
  65. {
  66. int sock;
  67. struct sockaddr_in addr;
  68. memset(&addr, 0, sizeof(addr));
  69. addr.sin_family = AF_INET;
  70. addr.sin_addr.s_addr = INADDR_ANY;
  71. if ((sock = socket (AF_INET, SOCK_STREAM, 0)) < 0)
  72. throw SocketException ("unable to create socket", errorNumber);
  73. addr.sin_port = 0;
  74. if (bind (sock, (struct sockaddr *)&addr, sizeof (addr)) < 0)
  75. throw SocketException ("unable to find free port", errorNumber);
  76. socklen_t n = sizeof(addr);
  77. if (getsockname (sock, (struct sockaddr *)&addr, &n) < 0)
  78. throw SocketException ("unable to get port number", errorNumber);
  79. closesocket (sock);
  80. return ntohs(addr.sin_port);
  81. }
  82. int network::getSockPort(int sock)
  83. {
  84. vnc_sockaddr_t sa;
  85. socklen_t sa_size = sizeof(sa);
  86. if (getsockname(sock, &sa.u.sa, &sa_size) < 0)
  87. return 0;
  88. switch (sa.u.sa.sa_family) {
  89. case AF_INET6:
  90. return ntohs(sa.u.sin6.sin6_port);
  91. default:
  92. return ntohs(sa.u.sin.sin_port);
  93. }
  94. }
  95. // -=- TcpSocket
  96. TcpSocket::TcpSocket(int sock) : Socket(sock)
  97. {
  98. // Disable Nagle's algorithm, to reduce latency
  99. enableNagles(false);
  100. }
  101. TcpSocket::TcpSocket(const char *host, int port)
  102. {
  103. int sock, err, result;
  104. struct addrinfo *ai, *current, hints;
  105. // - Create a socket
  106. memset(&hints, 0, sizeof(struct addrinfo));
  107. hints.ai_family = AF_UNSPEC;
  108. hints.ai_socktype = SOCK_STREAM;
  109. hints.ai_canonname = NULL;
  110. hints.ai_addr = NULL;
  111. hints.ai_next = NULL;
  112. if ((result = getaddrinfo(host, NULL, &hints, &ai)) != 0) {
  113. throw GAIException("unable to resolve host by name", result);
  114. }
  115. sock = -1;
  116. err = 0;
  117. for (current = ai; current != NULL; current = current->ai_next) {
  118. int family;
  119. vnc_sockaddr_t sa;
  120. socklen_t salen;
  121. char ntop[NI_MAXHOST];
  122. family = current->ai_family;
  123. switch (family) {
  124. case AF_INET:
  125. if (!UseIPv4)
  126. continue;
  127. break;
  128. case AF_INET6:
  129. if (!UseIPv6)
  130. continue;
  131. break;
  132. default:
  133. continue;
  134. }
  135. salen = current->ai_addrlen;
  136. memcpy(&sa, current->ai_addr, salen);
  137. if (family == AF_INET)
  138. sa.u.sin.sin_port = htons(port);
  139. else
  140. sa.u.sin6.sin6_port = htons(port);
  141. getnameinfo(&sa.u.sa, salen, ntop, sizeof(ntop), NULL, 0, NI_NUMERICHOST);
  142. vlog.debug("Connecting to %s [%s] port %d", host, ntop, port);
  143. sock = socket (family, SOCK_STREAM, 0);
  144. if (sock == -1) {
  145. err = errorNumber;
  146. freeaddrinfo(ai);
  147. throw SocketException("unable to create socket", err);
  148. }
  149. /* Attempt to connect to the remote host */
  150. while ((result = connect(sock, &sa.u.sa, salen)) == -1) {
  151. err = errorNumber;
  152. #ifndef WIN32
  153. if (err == EINTR)
  154. continue;
  155. #endif
  156. vlog.debug("Failed to connect to address %s port %d: %d",
  157. ntop, port, err);
  158. closesocket(sock);
  159. sock = -1;
  160. break;
  161. }
  162. if (result == 0)
  163. break;
  164. }
  165. freeaddrinfo(ai);
  166. if (sock == -1) {
  167. if (err == 0)
  168. throw Exception("No useful address for host");
  169. else
  170. throw SocketException("unable to connect to socket", err);
  171. }
  172. // Take proper ownership of the socket
  173. setFd(sock);
  174. // Disable Nagle's algorithm, to reduce latency
  175. enableNagles(false);
  176. }
  177. const char* TcpSocket::getPeerAddress() {
  178. vnc_sockaddr_t sa;
  179. socklen_t sa_size = sizeof(sa);
  180. if (getpeername(getFd(), &sa.u.sa, &sa_size) != 0) {
  181. vlog.error("unable to get peer name for socket");
  182. return "(N/A)";
  183. }
  184. if (sa.u.sa.sa_family == AF_INET6) {
  185. static char buffer[INET6_ADDRSTRLEN + 2];
  186. int ret;
  187. buffer[0] = '[';
  188. ret = getnameinfo(&sa.u.sa, sizeof(sa.u.sin6),
  189. buffer + 1, sizeof(buffer) - 2, NULL, 0,
  190. NI_NUMERICHOST);
  191. if (ret != 0) {
  192. vlog.error("unable to convert peer name to a string");
  193. return "(N/A)";
  194. }
  195. strcat(buffer, "]");
  196. return buffer;
  197. }
  198. if (sa.u.sa.sa_family == AF_INET) {
  199. char *name;
  200. name = inet_ntoa(sa.u.sin.sin_addr);
  201. if (name == NULL) {
  202. vlog.error("unable to convert peer name to a string");
  203. return "(N/A)";
  204. }
  205. return name;
  206. }
  207. vlog.error("unknown address family for socket");
  208. return "";
  209. }
  210. const char* TcpSocket::getPeerEndpoint() {
  211. static char buffer[INET6_ADDRSTRLEN + 2 + 32];
  212. vnc_sockaddr_t sa;
  213. socklen_t sa_size = sizeof(sa);
  214. int port;
  215. getpeername(getFd(), &sa.u.sa, &sa_size);
  216. if (sa.u.sa.sa_family == AF_INET6)
  217. port = ntohs(sa.u.sin6.sin6_port);
  218. else if (sa.u.sa.sa_family == AF_INET)
  219. port = ntohs(sa.u.sin.sin_port);
  220. else
  221. port = 0;
  222. sprintf(buffer, "%s::%d", getPeerAddress(), port);
  223. return buffer;
  224. }
  225. bool TcpSocket::enableNagles(bool enable) {
  226. int one = enable ? 0 : 1;
  227. if (setsockopt(getFd(), IPPROTO_TCP, TCP_NODELAY,
  228. (char *)&one, sizeof(one)) < 0) {
  229. int e = errorNumber;
  230. vlog.error("unable to setsockopt TCP_NODELAY: %d", e);
  231. return false;
  232. }
  233. return true;
  234. }
  235. TcpListener::TcpListener(int sock) : SocketListener(sock)
  236. {
  237. }
  238. TcpListener::TcpListener(const struct sockaddr *listenaddr,
  239. socklen_t listenaddrlen)
  240. {
  241. int one = 1;
  242. vnc_sockaddr_t sa;
  243. int sock;
  244. if ((sock = socket (listenaddr->sa_family, SOCK_STREAM, 0)) < 0)
  245. throw SocketException("unable to create listening socket", errorNumber);
  246. memcpy (&sa, listenaddr, listenaddrlen);
  247. #ifdef IPV6_V6ONLY
  248. if (listenaddr->sa_family == AF_INET6) {
  249. if (setsockopt (sock, IPPROTO_IPV6, IPV6_V6ONLY, (char*)&one, sizeof(one))) {
  250. int e = errorNumber;
  251. closesocket(sock);
  252. throw SocketException("unable to set IPV6_V6ONLY", e);
  253. }
  254. }
  255. #endif /* defined(IPV6_V6ONLY) */
  256. #ifdef FD_CLOEXEC
  257. // - By default, close the socket on exec()
  258. fcntl(sock, F_SETFD, FD_CLOEXEC);
  259. #endif
  260. // SO_REUSEADDR is broken on Windows. It allows binding to a port
  261. // that already has a listening socket on it. SO_EXCLUSIVEADDRUSE
  262. // might do what we want, but requires investigation.
  263. #ifndef WIN32
  264. if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
  265. (char *)&one, sizeof(one)) < 0) {
  266. int e = errorNumber;
  267. closesocket(sock);
  268. throw SocketException("unable to create listening socket", e);
  269. }
  270. #endif
  271. if (bind(sock, &sa.u.sa, listenaddrlen) == -1) {
  272. int e = errorNumber;
  273. closesocket(sock);
  274. throw SocketException("failed to bind socket", e);
  275. }
  276. listen(sock);
  277. }
  278. Socket* TcpListener::createSocket(int fd) {
  279. return new TcpSocket(fd);
  280. }
  281. std::list<std::string> TcpListener::getMyAddresses() {
  282. struct addrinfo *ai, *current, hints;
  283. std::list<std::string> result;
  284. initSockets();
  285. memset(&hints, 0, sizeof(struct addrinfo));
  286. hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
  287. hints.ai_family = AF_UNSPEC;
  288. hints.ai_socktype = SOCK_STREAM;
  289. hints.ai_canonname = NULL;
  290. hints.ai_addr = NULL;
  291. hints.ai_next = NULL;
  292. // Windows doesn't like NULL for service, so specify something
  293. if ((getaddrinfo(NULL, "1", &hints, &ai)) != 0)
  294. return result;
  295. for (current= ai; current != NULL; current = current->ai_next) {
  296. char addr[INET6_ADDRSTRLEN];
  297. switch (current->ai_family) {
  298. case AF_INET:
  299. if (!UseIPv4)
  300. continue;
  301. break;
  302. case AF_INET6:
  303. if (!UseIPv6)
  304. continue;
  305. break;
  306. default:
  307. continue;
  308. }
  309. getnameinfo(current->ai_addr, current->ai_addrlen, addr, INET6_ADDRSTRLEN,
  310. NULL, 0, NI_NUMERICHOST);
  311. result.push_back(addr);
  312. }
  313. freeaddrinfo(ai);
  314. return result;
  315. }
  316. int TcpListener::getMyPort() {
  317. return getSockPort(getFd());
  318. }
  319. void network::createLocalTcpListeners(std::list<SocketListener*> *listeners,
  320. int port)
  321. {
  322. struct addrinfo ai[2];
  323. vnc_sockaddr_t sa[2];
  324. memset(ai, 0, sizeof(ai));
  325. memset(sa, 0, sizeof(sa));
  326. sa[0].u.sin.sin_family = AF_INET;
  327. sa[0].u.sin.sin_port = htons (port);
  328. sa[0].u.sin.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
  329. ai[0].ai_family = sa[0].u.sin.sin_family;
  330. ai[0].ai_addr = &sa[0].u.sa;
  331. ai[0].ai_addrlen = sizeof(sa[0].u.sin);
  332. ai[0].ai_next = &ai[1];
  333. sa[1].u.sin6.sin6_family = AF_INET6;
  334. sa[1].u.sin6.sin6_port = htons (port);
  335. sa[1].u.sin6.sin6_addr = in6addr_loopback;
  336. ai[1].ai_family = sa[1].u.sin6.sin6_family;
  337. ai[1].ai_addr = &sa[1].u.sa;
  338. ai[1].ai_addrlen = sizeof(sa[1].u.sin6);
  339. ai[1].ai_next = NULL;
  340. createTcpListeners(listeners, ai);
  341. }
  342. void network::createTcpListeners(std::list<SocketListener*> *listeners,
  343. const char *addr,
  344. int port)
  345. {
  346. struct addrinfo *ai, hints;
  347. char service[16];
  348. int result;
  349. initSockets();
  350. memset(&hints, 0, sizeof(struct addrinfo));
  351. hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
  352. hints.ai_family = AF_UNSPEC;
  353. hints.ai_socktype = SOCK_STREAM;
  354. hints.ai_canonname = NULL;
  355. hints.ai_addr = NULL;
  356. hints.ai_next = NULL;
  357. snprintf (service, sizeof (service) - 1, "%d", port);
  358. service[sizeof (service) - 1] = '\0';
  359. if ((result = getaddrinfo(addr, service, &hints, &ai)) != 0)
  360. throw GAIException("unable to resolve listening address", result);
  361. try {
  362. createTcpListeners(listeners, ai);
  363. } catch(...) {
  364. freeaddrinfo(ai);
  365. throw;
  366. }
  367. freeaddrinfo(ai);
  368. }
  369. void network::createTcpListeners(std::list<SocketListener*> *listeners,
  370. const struct addrinfo *ai)
  371. {
  372. const struct addrinfo *current;
  373. std::list<SocketListener*> new_listeners;
  374. initSockets();
  375. for (current = ai; current != NULL; current = current->ai_next) {
  376. switch (current->ai_family) {
  377. case AF_INET:
  378. if (!UseIPv4)
  379. continue;
  380. break;
  381. case AF_INET6:
  382. if (!UseIPv6)
  383. continue;
  384. break;
  385. default:
  386. continue;
  387. }
  388. try {
  389. new_listeners.push_back(new TcpListener(current->ai_addr,
  390. current->ai_addrlen));
  391. } catch (SocketException& e) {
  392. // Ignore this if it is due to lack of address family support on
  393. // the interface or on the system
  394. if (e.err != EADDRNOTAVAIL && e.err != EAFNOSUPPORT) {
  395. // Otherwise, report the error
  396. while (!new_listeners.empty()) {
  397. delete new_listeners.back();
  398. new_listeners.pop_back();
  399. }
  400. throw;
  401. }
  402. }
  403. }
  404. if (new_listeners.empty ())
  405. throw SocketException("createTcpListeners: no addresses available",
  406. EADDRNOTAVAIL);
  407. listeners->splice (listeners->end(), new_listeners);
  408. }
  409. TcpFilter::TcpFilter(const char* spec) {
  410. std::vector<std::string> patterns;
  411. patterns = rfb::strSplit(spec, ',');
  412. for (size_t i = 0; i < patterns.size(); i++) {
  413. if (!patterns[i].empty())
  414. filter.push_back(parsePattern(patterns[i].c_str()));
  415. }
  416. }
  417. TcpFilter::~TcpFilter() {
  418. }
  419. static bool
  420. patternMatchIP(const TcpFilter::Pattern& pattern, vnc_sockaddr_t *sa) {
  421. switch (pattern.address.u.sa.sa_family) {
  422. unsigned long address;
  423. case AF_INET:
  424. if (sa->u.sa.sa_family != AF_INET)
  425. return false;
  426. address = sa->u.sin.sin_addr.s_addr;
  427. if (address == htonl (INADDR_NONE)) return false;
  428. return ((pattern.address.u.sin.sin_addr.s_addr &
  429. pattern.mask.u.sin.sin_addr.s_addr) ==
  430. (address & pattern.mask.u.sin.sin_addr.s_addr));
  431. case AF_INET6:
  432. if (sa->u.sa.sa_family != AF_INET6)
  433. return false;
  434. for (unsigned int n = 0; n < 16; n++) {
  435. unsigned int bits = (n + 1) * 8;
  436. unsigned int mask;
  437. if (pattern.prefixlen > bits)
  438. mask = 0xff;
  439. else {
  440. unsigned int lastbits = 0xff;
  441. lastbits <<= bits - pattern.prefixlen;
  442. mask = lastbits & 0xff;
  443. }
  444. if ((pattern.address.u.sin6.sin6_addr.s6_addr[n] & mask) !=
  445. (sa->u.sin6.sin6_addr.s6_addr[n] & mask))
  446. return false;
  447. if (mask < 0xff)
  448. break;
  449. }
  450. return true;
  451. case AF_UNSPEC:
  452. // Any address matches
  453. return true;
  454. default:
  455. break;
  456. }
  457. return false;
  458. }
  459. bool
  460. TcpFilter::verifyConnection(Socket* s) {
  461. vnc_sockaddr_t sa;
  462. socklen_t sa_size = sizeof(sa);
  463. if (getpeername(s->getFd(), &sa.u.sa, &sa_size) != 0)
  464. return false;
  465. std::list<TcpFilter::Pattern>::iterator i;
  466. for (i=filter.begin(); i!=filter.end(); i++) {
  467. if (patternMatchIP(*i, &sa)) {
  468. switch ((*i).action) {
  469. case Accept:
  470. vlog.debug("ACCEPT %s", s->getPeerAddress());
  471. return true;
  472. case Query:
  473. vlog.debug("QUERY %s", s->getPeerAddress());
  474. s->setRequiresQuery();
  475. return true;
  476. case Reject:
  477. vlog.debug("REJECT %s", s->getPeerAddress());
  478. return false;
  479. }
  480. }
  481. }
  482. vlog.debug("[REJECT] %s", s->getPeerAddress());
  483. return false;
  484. }
  485. TcpFilter::Pattern TcpFilter::parsePattern(const char* p) {
  486. TcpFilter::Pattern pattern;
  487. std::vector<std::string> parts;
  488. int family;
  489. initSockets();
  490. parts = rfb::strSplit(&p[1], '/');
  491. if (parts.size() > 2)
  492. throw Exception("invalid filter specified");
  493. if (parts[0].empty()) {
  494. // Match any address
  495. memset (&pattern.address, 0, sizeof (pattern.address));
  496. pattern.address.u.sa.sa_family = AF_UNSPEC;
  497. pattern.prefixlen = 0;
  498. } else {
  499. struct addrinfo hints;
  500. struct addrinfo *ai;
  501. int result;
  502. memset (&hints, 0, sizeof (hints));
  503. hints.ai_family = AF_UNSPEC;
  504. hints.ai_flags = AI_NUMERICHOST;
  505. // Take out brackets, if present
  506. if (parts[0][0] == '[') {
  507. parts[0].erase(0, 1);
  508. if (!parts[0].empty() && parts[0][parts.size()-1] == ']')
  509. parts[0].erase(parts.size()-1, 1);
  510. }
  511. if ((result = getaddrinfo (parts[0].c_str(), NULL, &hints, &ai)) != 0) {
  512. throw GAIException("unable to resolve host by name", result);
  513. }
  514. memcpy (&pattern.address.u.sa, ai->ai_addr, ai->ai_addrlen);
  515. freeaddrinfo (ai);
  516. family = pattern.address.u.sa.sa_family;
  517. if (parts.size() > 1) {
  518. if (family == AF_INET &&
  519. (parts[1].find('.') != std::string::npos)) {
  520. throw Exception("mask no longer supported for filter, "
  521. "use prefix instead");
  522. }
  523. pattern.prefixlen = (unsigned int) atoi(parts[1].c_str());
  524. } else {
  525. switch (family) {
  526. case AF_INET:
  527. pattern.prefixlen = 32;
  528. break;
  529. case AF_INET6:
  530. pattern.prefixlen = 128;
  531. break;
  532. default:
  533. throw Exception("unknown address family");
  534. }
  535. }
  536. }
  537. family = pattern.address.u.sa.sa_family;
  538. if (pattern.prefixlen > (family == AF_INET ? 32: 128))
  539. throw Exception("invalid prefix length for filter address: %u",
  540. pattern.prefixlen);
  541. // Compute mask from address and prefix length
  542. memset (&pattern.mask, 0, sizeof (pattern.mask));
  543. switch (family) {
  544. unsigned long mask;
  545. case AF_INET:
  546. mask = 0;
  547. for (unsigned int i=0; i<pattern.prefixlen; i++)
  548. mask |= 1<<(31-i);
  549. pattern.mask.u.sin.sin_addr.s_addr = htonl(mask);
  550. break;
  551. case AF_INET6:
  552. for (unsigned int n = 0; n < 16; n++) {
  553. unsigned int bits = (n + 1) * 8;
  554. if (pattern.prefixlen > bits)
  555. pattern.mask.u.sin6.sin6_addr.s6_addr[n] = 0xff;
  556. else {
  557. unsigned int lastbits = 0xff;
  558. lastbits <<= bits - pattern.prefixlen;
  559. pattern.mask.u.sin6.sin6_addr.s6_addr[n] = lastbits & 0xff;
  560. break;
  561. }
  562. }
  563. break;
  564. case AF_UNSPEC:
  565. // No mask to compute
  566. break;
  567. default:
  568. ; /* not reached */
  569. }
  570. switch(p[0]) {
  571. case '+': pattern.action = TcpFilter::Accept; break;
  572. case '-': pattern.action = TcpFilter::Reject; break;
  573. case '?': pattern.action = TcpFilter::Query; break;
  574. };
  575. return pattern;
  576. }
  577. std::string TcpFilter::patternToStr(const TcpFilter::Pattern& p) {
  578. char addr[INET6_ADDRSTRLEN + 2];
  579. if (p.address.u.sa.sa_family == AF_INET) {
  580. getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin),
  581. addr, sizeof(addr), NULL, 0, NI_NUMERICHOST);
  582. } else if (p.address.u.sa.sa_family == AF_INET6) {
  583. addr[0] = '[';
  584. getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin6),
  585. addr + 1, sizeof(addr) - 2, NULL, 0, NI_NUMERICHOST);
  586. strcat(addr, "]");
  587. } else
  588. addr[0] = '\0';
  589. char action;
  590. switch (p.action) {
  591. case Accept: action = '+'; break;
  592. case Reject: action = '-'; break;
  593. default:
  594. case Query: action = '?'; break;
  595. };
  596. size_t resultlen = (1 // action
  597. + strlen (addr) // address
  598. + 1 // slash
  599. + 3 // prefix length, max 128
  600. + 1); // terminating nul
  601. char* result = new char[resultlen];
  602. if (addr[0] == '\0')
  603. snprintf(result, resultlen, "%c", action);
  604. else
  605. snprintf(result, resultlen, "%c%s/%u", action, addr, p.prefixlen);
  606. std::string out = result;
  607. delete [] result;
  608. return out;
  609. }