You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

TcpSocket.cxx 19KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761
  1. /* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
  2. *
  3. * This is free software; you can redistribute it and/or modify
  4. * it under the terms of the GNU General Public License as published by
  5. * the Free Software Foundation; either version 2 of the License, or
  6. * (at your option) any later version.
  7. *
  8. * This software is distributed in the hope that it will be useful,
  9. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. * GNU General Public License for more details.
  12. *
  13. * You should have received a copy of the GNU General Public License
  14. * along with this software; if not, write to the Free Software
  15. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
  16. * USA.
  17. */
  18. #ifdef HAVE_CONFIG_H
  19. #include <config.h>
  20. #endif
  21. #ifdef WIN32
  22. //#include <io.h>
  23. #include <winsock2.h>
  24. #include <ws2tcpip.h>
  25. #define errorNumber WSAGetLastError()
  26. #else
  27. #define errorNumber errno
  28. #define closesocket close
  29. #include <sys/socket.h>
  30. #include <arpa/inet.h>
  31. #include <netinet/tcp.h>
  32. #include <netdb.h>
  33. #include <errno.h>
  34. #endif
  35. #include <stdlib.h>
  36. #include <unistd.h>
  37. #include <network/TcpSocket.h>
  38. #include <rfb/LogWriter.h>
  39. #include <rfb/Configuration.h>
  40. #ifdef WIN32
  41. #include <os/winerrno.h>
  42. #endif
  43. #ifndef INADDR_NONE
  44. #define INADDR_NONE ((unsigned long)-1)
  45. #endif
  46. #ifndef INADDR_LOOPBACK
  47. #define INADDR_LOOPBACK ((unsigned long)0x7F000001)
  48. #endif
  49. #ifndef IN6_ARE_ADDR_EQUAL
  50. #define IN6_ARE_ADDR_EQUAL(a,b) \
  51. (memcmp ((const void*)(a), (const void*)(b), sizeof (struct in6_addr)) == 0)
  52. #endif
  53. // Missing on older Windows and OS X
  54. #ifndef AI_NUMERICSERV
  55. #define AI_NUMERICSERV 0
  56. #endif
  57. using namespace network;
  58. using namespace rdr;
  59. static rfb::LogWriter vlog("TcpSocket");
  60. static rfb::BoolParameter UseIPv4("UseIPv4", "Use IPv4 for incoming and outgoing connections.", true);
  61. static rfb::BoolParameter UseIPv6("UseIPv6", "Use IPv6 for incoming and outgoing connections.", true);
  62. /* Tunnelling support. */
  63. int network::findFreeTcpPort (void)
  64. {
  65. int sock;
  66. struct sockaddr_in addr;
  67. memset(&addr, 0, sizeof(addr));
  68. addr.sin_family = AF_INET;
  69. addr.sin_addr.s_addr = INADDR_ANY;
  70. if ((sock = socket (AF_INET, SOCK_STREAM, 0)) < 0)
  71. throw SocketException ("unable to create socket", errorNumber);
  72. addr.sin_port = 0;
  73. if (bind (sock, (struct sockaddr *)&addr, sizeof (addr)) < 0)
  74. throw SocketException ("unable to find free port", errorNumber);
  75. socklen_t n = sizeof(addr);
  76. if (getsockname (sock, (struct sockaddr *)&addr, &n) < 0)
  77. throw SocketException ("unable to get port number", errorNumber);
  78. closesocket (sock);
  79. return ntohs(addr.sin_port);
  80. }
  81. int network::getSockPort(int sock)
  82. {
  83. vnc_sockaddr_t sa;
  84. socklen_t sa_size = sizeof(sa);
  85. if (getsockname(sock, &sa.u.sa, &sa_size) < 0)
  86. return 0;
  87. switch (sa.u.sa.sa_family) {
  88. case AF_INET6:
  89. return ntohs(sa.u.sin6.sin6_port);
  90. default:
  91. return ntohs(sa.u.sin.sin_port);
  92. }
  93. }
  94. // -=- TcpSocket
  95. TcpSocket::TcpSocket(int sock) : Socket(sock)
  96. {
  97. // Disable Nagle's algorithm, to reduce latency
  98. enableNagles(false);
  99. }
  100. TcpSocket::TcpSocket(const char *host, int port)
  101. {
  102. int sock, err, result;
  103. struct addrinfo *ai, *current, hints;
  104. // - Create a socket
  105. memset(&hints, 0, sizeof(struct addrinfo));
  106. hints.ai_family = AF_UNSPEC;
  107. hints.ai_socktype = SOCK_STREAM;
  108. hints.ai_canonname = NULL;
  109. hints.ai_addr = NULL;
  110. hints.ai_next = NULL;
  111. if ((result = getaddrinfo(host, NULL, &hints, &ai)) != 0) {
  112. throw Exception("unable to resolve host by name: %s",
  113. gai_strerror(result));
  114. }
  115. sock = -1;
  116. err = 0;
  117. for (current = ai; current != NULL; current = current->ai_next) {
  118. int family;
  119. vnc_sockaddr_t sa;
  120. socklen_t salen;
  121. char ntop[NI_MAXHOST];
  122. family = current->ai_family;
  123. switch (family) {
  124. case AF_INET:
  125. if (!UseIPv4)
  126. continue;
  127. break;
  128. case AF_INET6:
  129. if (!UseIPv6)
  130. continue;
  131. break;
  132. default:
  133. continue;
  134. }
  135. salen = current->ai_addrlen;
  136. memcpy(&sa, current->ai_addr, salen);
  137. if (family == AF_INET)
  138. sa.u.sin.sin_port = htons(port);
  139. else
  140. sa.u.sin6.sin6_port = htons(port);
  141. getnameinfo(&sa.u.sa, salen, ntop, sizeof(ntop), NULL, 0, NI_NUMERICHOST);
  142. vlog.debug("Connecting to %s [%s] port %d", host, ntop, port);
  143. sock = socket (family, SOCK_STREAM, 0);
  144. if (sock == -1) {
  145. err = errorNumber;
  146. freeaddrinfo(ai);
  147. throw SocketException("unable to create socket", err);
  148. }
  149. /* Attempt to connect to the remote host */
  150. while ((result = connect(sock, &sa.u.sa, salen)) == -1) {
  151. err = errorNumber;
  152. #ifndef WIN32
  153. if (err == EINTR)
  154. continue;
  155. #endif
  156. vlog.debug("Failed to connect to address %s port %d: %d",
  157. ntop, port, err);
  158. closesocket(sock);
  159. sock = -1;
  160. break;
  161. }
  162. if (result == 0)
  163. break;
  164. }
  165. freeaddrinfo(ai);
  166. if (sock == -1) {
  167. if (err == 0)
  168. throw Exception("No useful address for host");
  169. else
  170. throw SocketException("unable connect to socket", err);
  171. }
  172. // Take proper ownership of the socket
  173. setFd(sock);
  174. // Disable Nagle's algorithm, to reduce latency
  175. enableNagles(false);
  176. }
  177. char* TcpSocket::getPeerAddress() {
  178. vnc_sockaddr_t sa;
  179. socklen_t sa_size = sizeof(sa);
  180. if (getpeername(getFd(), &sa.u.sa, &sa_size) != 0) {
  181. vlog.error("unable to get peer name for socket");
  182. return rfb::strDup("");
  183. }
  184. if (sa.u.sa.sa_family == AF_INET6) {
  185. char buffer[INET6_ADDRSTRLEN + 2];
  186. int ret;
  187. buffer[0] = '[';
  188. ret = getnameinfo(&sa.u.sa, sizeof(sa.u.sin6),
  189. buffer + 1, sizeof(buffer) - 2, NULL, 0,
  190. NI_NUMERICHOST);
  191. if (ret != 0) {
  192. vlog.error("unable to convert peer name to a string");
  193. return rfb::strDup("");
  194. }
  195. strcat(buffer, "]");
  196. return rfb::strDup(buffer);
  197. }
  198. if (sa.u.sa.sa_family == AF_INET) {
  199. char *name;
  200. name = inet_ntoa(sa.u.sin.sin_addr);
  201. if (name == NULL) {
  202. vlog.error("unable to convert peer name to a string");
  203. return rfb::strDup("");
  204. }
  205. return rfb::strDup(name);
  206. }
  207. vlog.error("unknown address family for socket");
  208. return rfb::strDup("");
  209. }
  210. char* TcpSocket::getPeerEndpoint() {
  211. rfb::CharArray address; address.buf = getPeerAddress();
  212. vnc_sockaddr_t sa;
  213. socklen_t sa_size = sizeof(sa);
  214. int port;
  215. getpeername(getFd(), &sa.u.sa, &sa_size);
  216. if (sa.u.sa.sa_family == AF_INET6)
  217. port = ntohs(sa.u.sin6.sin6_port);
  218. else if (sa.u.sa.sa_family == AF_INET)
  219. port = ntohs(sa.u.sin.sin_port);
  220. else
  221. port = 0;
  222. int buflen = strlen(address.buf) + 32;
  223. char* buffer = new char[buflen];
  224. sprintf(buffer, "%s::%d", address.buf, port);
  225. return buffer;
  226. }
  227. bool TcpSocket::enableNagles(bool enable) {
  228. int one = enable ? 0 : 1;
  229. if (setsockopt(getFd(), IPPROTO_TCP, TCP_NODELAY,
  230. (char *)&one, sizeof(one)) < 0) {
  231. int e = errorNumber;
  232. vlog.error("unable to setsockopt TCP_NODELAY: %d", e);
  233. return false;
  234. }
  235. return true;
  236. }
  237. bool TcpSocket::cork(bool enable) {
  238. #ifndef TCP_CORK
  239. return false;
  240. #else
  241. int one = enable ? 1 : 0;
  242. if (setsockopt(getFd(), IPPROTO_TCP, TCP_CORK, (char *)&one, sizeof(one)) < 0)
  243. return false;
  244. return true;
  245. #endif
  246. }
  247. TcpListener::TcpListener(int sock) : SocketListener(sock)
  248. {
  249. }
  250. TcpListener::TcpListener(const struct sockaddr *listenaddr,
  251. socklen_t listenaddrlen)
  252. {
  253. int one = 1;
  254. vnc_sockaddr_t sa;
  255. int sock;
  256. if ((sock = socket (listenaddr->sa_family, SOCK_STREAM, 0)) < 0)
  257. throw SocketException("unable to create listening socket", errorNumber);
  258. memcpy (&sa, listenaddr, listenaddrlen);
  259. #ifdef IPV6_V6ONLY
  260. if (listenaddr->sa_family == AF_INET6) {
  261. if (setsockopt (sock, IPPROTO_IPV6, IPV6_V6ONLY, (char*)&one, sizeof(one))) {
  262. int e = errorNumber;
  263. closesocket(sock);
  264. throw SocketException("unable to set IPV6_V6ONLY", e);
  265. }
  266. }
  267. #endif /* defined(IPV6_V6ONLY) */
  268. #ifdef FD_CLOEXEC
  269. // - By default, close the socket on exec()
  270. fcntl(sock, F_SETFD, FD_CLOEXEC);
  271. #endif
  272. // SO_REUSEADDR is broken on Windows. It allows binding to a port
  273. // that already has a listening socket on it. SO_EXCLUSIVEADDRUSE
  274. // might do what we want, but requires investigation.
  275. #ifndef WIN32
  276. if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
  277. (char *)&one, sizeof(one)) < 0) {
  278. int e = errorNumber;
  279. closesocket(sock);
  280. throw SocketException("unable to create listening socket", e);
  281. }
  282. #endif
  283. if (bind(sock, &sa.u.sa, listenaddrlen) == -1) {
  284. int e = errorNumber;
  285. closesocket(sock);
  286. throw SocketException("failed to bind socket", e);
  287. }
  288. listen(sock);
  289. }
  290. Socket* TcpListener::createSocket(int fd) {
  291. return new TcpSocket(fd);
  292. }
  293. void TcpListener::getMyAddresses(std::list<char*>* result) {
  294. struct addrinfo *ai, *current, hints;
  295. initSockets();
  296. memset(&hints, 0, sizeof(struct addrinfo));
  297. hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
  298. hints.ai_family = AF_UNSPEC;
  299. hints.ai_socktype = SOCK_STREAM;
  300. hints.ai_canonname = NULL;
  301. hints.ai_addr = NULL;
  302. hints.ai_next = NULL;
  303. // Windows doesn't like NULL for service, so specify something
  304. if ((getaddrinfo(NULL, "1", &hints, &ai)) != 0)
  305. return;
  306. for (current= ai; current != NULL; current = current->ai_next) {
  307. switch (current->ai_family) {
  308. case AF_INET:
  309. if (!UseIPv4)
  310. continue;
  311. break;
  312. case AF_INET6:
  313. if (!UseIPv6)
  314. continue;
  315. break;
  316. default:
  317. continue;
  318. }
  319. char *addr = new char[INET6_ADDRSTRLEN];
  320. getnameinfo(current->ai_addr, current->ai_addrlen, addr, INET6_ADDRSTRLEN,
  321. NULL, 0, NI_NUMERICHOST);
  322. result->push_back(addr);
  323. }
  324. freeaddrinfo(ai);
  325. }
  326. int TcpListener::getMyPort() {
  327. return getSockPort(getFd());
  328. }
  329. void network::createLocalTcpListeners(std::list<SocketListener*> *listeners,
  330. int port)
  331. {
  332. struct addrinfo ai[2];
  333. vnc_sockaddr_t sa[2];
  334. memset(ai, 0, sizeof(ai));
  335. memset(sa, 0, sizeof(sa));
  336. sa[0].u.sin.sin_family = AF_INET;
  337. sa[0].u.sin.sin_port = htons (port);
  338. sa[0].u.sin.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
  339. ai[0].ai_family = sa[0].u.sin.sin_family;
  340. ai[0].ai_addr = &sa[0].u.sa;
  341. ai[0].ai_addrlen = sizeof(sa[0].u.sin);
  342. ai[0].ai_next = &ai[1];
  343. sa[1].u.sin6.sin6_family = AF_INET6;
  344. sa[1].u.sin6.sin6_port = htons (port);
  345. sa[1].u.sin6.sin6_addr = in6addr_loopback;
  346. ai[1].ai_family = sa[1].u.sin6.sin6_family;
  347. ai[1].ai_addr = &sa[1].u.sa;
  348. ai[1].ai_addrlen = sizeof(sa[1].u.sin6);
  349. ai[1].ai_next = NULL;
  350. createTcpListeners(listeners, ai);
  351. }
  352. void network::createTcpListeners(std::list<SocketListener*> *listeners,
  353. const char *addr,
  354. int port)
  355. {
  356. struct addrinfo *ai, hints;
  357. char service[16];
  358. int result;
  359. initSockets();
  360. memset(&hints, 0, sizeof(struct addrinfo));
  361. hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
  362. hints.ai_family = AF_UNSPEC;
  363. hints.ai_socktype = SOCK_STREAM;
  364. hints.ai_canonname = NULL;
  365. hints.ai_addr = NULL;
  366. hints.ai_next = NULL;
  367. snprintf (service, sizeof (service) - 1, "%d", port);
  368. service[sizeof (service) - 1] = '\0';
  369. if ((result = getaddrinfo(addr, service, &hints, &ai)) != 0)
  370. throw rdr::Exception("unable to resolve listening address: %s",
  371. gai_strerror(result));
  372. try {
  373. createTcpListeners(listeners, ai);
  374. } catch(...) {
  375. freeaddrinfo(ai);
  376. throw;
  377. }
  378. }
  379. void network::createTcpListeners(std::list<SocketListener*> *listeners,
  380. const struct addrinfo *ai)
  381. {
  382. const struct addrinfo *current;
  383. std::list<SocketListener*> new_listeners;
  384. initSockets();
  385. for (current = ai; current != NULL; current = current->ai_next) {
  386. switch (current->ai_family) {
  387. case AF_INET:
  388. if (!UseIPv4)
  389. continue;
  390. break;
  391. case AF_INET6:
  392. if (!UseIPv6)
  393. continue;
  394. break;
  395. default:
  396. continue;
  397. }
  398. try {
  399. new_listeners.push_back(new TcpListener(current->ai_addr,
  400. current->ai_addrlen));
  401. } catch (SocketException& e) {
  402. // Ignore this if it is due to lack of address family support on
  403. // the interface or on the system
  404. if (e.err != EADDRNOTAVAIL && e.err != EAFNOSUPPORT) {
  405. // Otherwise, report the error
  406. while (!new_listeners.empty()) {
  407. delete new_listeners.back();
  408. new_listeners.pop_back();
  409. }
  410. throw;
  411. }
  412. }
  413. }
  414. if (new_listeners.empty ())
  415. throw SocketException("createTcpListeners: no addresses available",
  416. EADDRNOTAVAIL);
  417. listeners->splice (listeners->end(), new_listeners);
  418. }
  419. TcpFilter::TcpFilter(const char* spec) {
  420. rfb::CharArray tmp;
  421. tmp.buf = rfb::strDup(spec);
  422. while (tmp.buf) {
  423. rfb::CharArray first;
  424. rfb::strSplit(tmp.buf, ',', &first.buf, &tmp.buf);
  425. if (strlen(first.buf))
  426. filter.push_back(parsePattern(first.buf));
  427. }
  428. }
  429. TcpFilter::~TcpFilter() {
  430. }
  431. static bool
  432. patternMatchIP(const TcpFilter::Pattern& pattern, vnc_sockaddr_t *sa) {
  433. switch (pattern.address.u.sa.sa_family) {
  434. unsigned long address;
  435. case AF_INET:
  436. if (sa->u.sa.sa_family != AF_INET)
  437. return false;
  438. address = sa->u.sin.sin_addr.s_addr;
  439. if (address == htonl (INADDR_NONE)) return false;
  440. return ((pattern.address.u.sin.sin_addr.s_addr &
  441. pattern.mask.u.sin.sin_addr.s_addr) ==
  442. (address & pattern.mask.u.sin.sin_addr.s_addr));
  443. case AF_INET6:
  444. if (sa->u.sa.sa_family != AF_INET6)
  445. return false;
  446. for (unsigned int n = 0; n < 16; n++) {
  447. unsigned int bits = (n + 1) * 8;
  448. unsigned int mask;
  449. if (pattern.prefixlen > bits)
  450. mask = 0xff;
  451. else {
  452. unsigned int lastbits = 0xff;
  453. lastbits <<= bits - pattern.prefixlen;
  454. mask = lastbits & 0xff;
  455. }
  456. if ((pattern.address.u.sin6.sin6_addr.s6_addr[n] & mask) !=
  457. (sa->u.sin6.sin6_addr.s6_addr[n] & mask))
  458. return false;
  459. if (mask < 0xff)
  460. break;
  461. }
  462. return true;
  463. case AF_UNSPEC:
  464. // Any address matches
  465. return true;
  466. default:
  467. break;
  468. }
  469. return false;
  470. }
  471. bool
  472. TcpFilter::verifyConnection(Socket* s) {
  473. rfb::CharArray name;
  474. vnc_sockaddr_t sa;
  475. socklen_t sa_size = sizeof(sa);
  476. if (getpeername(s->getFd(), &sa.u.sa, &sa_size) != 0)
  477. return false;
  478. name.buf = s->getPeerAddress();
  479. std::list<TcpFilter::Pattern>::iterator i;
  480. for (i=filter.begin(); i!=filter.end(); i++) {
  481. if (patternMatchIP(*i, &sa)) {
  482. switch ((*i).action) {
  483. case Accept:
  484. vlog.debug("ACCEPT %s", name.buf);
  485. return true;
  486. case Query:
  487. vlog.debug("QUERY %s", name.buf);
  488. s->setRequiresQuery();
  489. return true;
  490. case Reject:
  491. vlog.debug("REJECT %s", name.buf);
  492. return false;
  493. }
  494. }
  495. }
  496. vlog.debug("[REJECT] %s", name.buf);
  497. return false;
  498. }
  499. TcpFilter::Pattern TcpFilter::parsePattern(const char* p) {
  500. TcpFilter::Pattern pattern;
  501. rfb::CharArray addr, pref;
  502. bool prefix_specified;
  503. int family;
  504. initSockets();
  505. prefix_specified = rfb::strSplit(&p[1], '/', &addr.buf, &pref.buf);
  506. if (addr.buf[0] == '\0') {
  507. // Match any address
  508. memset (&pattern.address, 0, sizeof (pattern.address));
  509. pattern.address.u.sa.sa_family = AF_UNSPEC;
  510. pattern.prefixlen = 0;
  511. } else {
  512. struct addrinfo hints;
  513. struct addrinfo *ai;
  514. char *p = addr.buf;
  515. int result;
  516. memset (&hints, 0, sizeof (hints));
  517. hints.ai_family = AF_UNSPEC;
  518. hints.ai_flags = AI_NUMERICHOST;
  519. // Take out brackets, if present
  520. if (*p == '[') {
  521. size_t len;
  522. p++;
  523. len = strlen (p);
  524. if (len > 0 && p[len - 1] == ']')
  525. p[len - 1] = '\0';
  526. }
  527. if ((result = getaddrinfo (p, NULL, &hints, &ai)) != 0) {
  528. throw Exception("unable to resolve host by name: %s",
  529. gai_strerror(result));
  530. }
  531. memcpy (&pattern.address.u.sa, ai->ai_addr, ai->ai_addrlen);
  532. freeaddrinfo (ai);
  533. family = pattern.address.u.sa.sa_family;
  534. if (prefix_specified) {
  535. if (family == AF_INET &&
  536. rfb::strContains(pref.buf, '.')) {
  537. throw Exception("mask no longer supported for filter, "
  538. "use prefix instead");
  539. }
  540. pattern.prefixlen = (unsigned int) atoi(pref.buf);
  541. } else {
  542. switch (family) {
  543. case AF_INET:
  544. pattern.prefixlen = 32;
  545. break;
  546. case AF_INET6:
  547. pattern.prefixlen = 128;
  548. break;
  549. default:
  550. throw Exception("unknown address family");
  551. }
  552. }
  553. }
  554. family = pattern.address.u.sa.sa_family;
  555. if (pattern.prefixlen > (family == AF_INET ? 32: 128))
  556. throw Exception("invalid prefix length for filter address: %u",
  557. pattern.prefixlen);
  558. // Compute mask from address and prefix length
  559. memset (&pattern.mask, 0, sizeof (pattern.mask));
  560. switch (family) {
  561. unsigned long mask;
  562. case AF_INET:
  563. mask = 0;
  564. for (unsigned int i=0; i<pattern.prefixlen; i++)
  565. mask |= 1<<(31-i);
  566. pattern.mask.u.sin.sin_addr.s_addr = htonl(mask);
  567. break;
  568. case AF_INET6:
  569. for (unsigned int n = 0; n < 16; n++) {
  570. unsigned int bits = (n + 1) * 8;
  571. if (pattern.prefixlen > bits)
  572. pattern.mask.u.sin6.sin6_addr.s6_addr[n] = 0xff;
  573. else {
  574. unsigned int lastbits = 0xff;
  575. lastbits <<= bits - pattern.prefixlen;
  576. pattern.mask.u.sin6.sin6_addr.s6_addr[n] = lastbits & 0xff;
  577. break;
  578. }
  579. }
  580. break;
  581. case AF_UNSPEC:
  582. // No mask to compute
  583. break;
  584. default:
  585. ; /* not reached */
  586. }
  587. switch(p[0]) {
  588. case '+': pattern.action = TcpFilter::Accept; break;
  589. case '-': pattern.action = TcpFilter::Reject; break;
  590. case '?': pattern.action = TcpFilter::Query; break;
  591. };
  592. return pattern;
  593. }
  594. char* TcpFilter::patternToStr(const TcpFilter::Pattern& p) {
  595. rfb::CharArray addr;
  596. char buffer[INET6_ADDRSTRLEN + 2];
  597. if (p.address.u.sa.sa_family == AF_INET) {
  598. getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin),
  599. buffer, sizeof (buffer), NULL, 0, NI_NUMERICHOST);
  600. addr.buf = rfb::strDup(buffer);
  601. } else if (p.address.u.sa.sa_family == AF_INET6) {
  602. buffer[0] = '[';
  603. getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin6),
  604. buffer + 1, sizeof (buffer) - 2, NULL, 0, NI_NUMERICHOST);
  605. strcat(buffer, "]");
  606. addr.buf = rfb::strDup(buffer);
  607. } else if (p.address.u.sa.sa_family == AF_UNSPEC)
  608. addr.buf = rfb::strDup("");
  609. char action;
  610. switch (p.action) {
  611. case Accept: action = '+'; break;
  612. case Reject: action = '-'; break;
  613. default:
  614. case Query: action = '?'; break;
  615. };
  616. size_t resultlen = (1 // action
  617. + strlen (addr.buf) // address
  618. + 1 // slash
  619. + 3 // prefix length, max 128
  620. + 1); // terminating nul
  621. char* result = new char[resultlen];
  622. if (addr.buf[0] == '\0')
  623. snprintf(result, resultlen, "%c", action);
  624. else
  625. snprintf(result, resultlen, "%c%s/%u", action, addr.buf, p.prefixlen);
  626. return result;
  627. }