/src/open5gs/lib/core/ogs-sockaddr.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* Licensed to the Apache Software Foundation (ASF) under one or more |
2 | | * contributor license agreements. See the NOTICE file distributed with |
3 | | * this work for additional information regarding copyright ownership. |
4 | | * The ASF licenses this file to You under the Apache License, Version 2.0 |
5 | | * (the "License"); you may not use this file except in compliance with |
6 | | * the License. You may obtain a copy of the License at |
7 | | * |
8 | | * http://www.apache.org/licenses/LICENSE-2.0 |
9 | | * |
10 | | * Unless required by applicable law or agreed to in writing, software |
11 | | * distributed under the License is distributed on an "AS IS" BASIS, |
12 | | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
13 | | * See the License for the specific language governing permissions and |
14 | | * limitations under the License. |
15 | | */ |
16 | | |
17 | | /* |
18 | | * Copyright (C) 2019 by Sukchan Lee <acetcom@gmail.com> |
19 | | * |
20 | | * This file is part of Open5GS. |
21 | | * |
22 | | * Licensed under the Apache License, Version 2.0 (the "License"); |
23 | | * you may not use this file except in compliance with the License. |
24 | | * You may obtain a copy of the License at |
25 | | * |
26 | | * http://www.apache.org/licenses/LICENSE-2.0 |
27 | | * |
28 | | * Unless required by applicable law or agreed to in writing, software |
29 | | * distributed under the License is distributed on an "AS IS" BASIS, |
30 | | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
31 | | * See the License for the specific language governing permissions and |
32 | | * limitations under the License. |
33 | | */ |
34 | | |
35 | | #include "core-config-private.h" |
36 | | |
37 | | #if HAVE_ARPA_INET_H |
38 | | #include <arpa/inet.h> |
39 | | #endif |
40 | | |
41 | | #if HAVE_CTYPE_H |
42 | | #include <ctype.h> |
43 | | #endif |
44 | | |
45 | | #if HAVE_IFADDRS_H |
46 | | #include <ifaddrs.h> |
47 | | #endif |
48 | | |
49 | | #if HAVE_NETDB_H |
50 | | #include <netdb.h> |
51 | | #endif |
52 | | |
53 | | #include "ogs-core.h" |
54 | | |
55 | | #undef OGS_LOG_DOMAIN |
56 | 0 | #define OGS_LOG_DOMAIN __ogs_sock_domain |
57 | | |
58 | | static bool ogs_sockaddr_compare(const ogs_sockaddr_t *a, |
59 | | const ogs_sockaddr_t *b, |
60 | | bool compare_port); |
61 | | |
62 | | /* If you want to use getnameinfo, |
63 | | * you need to consider DNS query delay (about 10 seconds) */ |
64 | | #if 0 |
65 | | int ogs_getnameinfo( |
66 | | char *hostname, socklen_t hostname_len, ogs_sockaddr_t *addr, int flags) |
67 | | { |
68 | | ogs_assert(hostname); |
69 | | ogs_assert(addr); |
70 | | |
71 | | return getnameinfo(&addr->sa, ogs_sockaddr_len(addr), |
72 | | hostname, hostname_len, |
73 | | NULL, 0, flags != 0 ? flags : NI_NAMEREQD); |
74 | | } |
75 | | #endif |
76 | | |
77 | | int ogs_getaddrinfo(ogs_sockaddr_t **sa_list, |
78 | | int family, const char *hostname, uint16_t port, int flags) |
79 | 0 | { |
80 | 0 | *sa_list = NULL; |
81 | 0 | return ogs_addaddrinfo(sa_list, family, hostname, port, flags); |
82 | 0 | } |
83 | | |
84 | | int ogs_freeaddrinfo(ogs_sockaddr_t *sa_list) |
85 | 0 | { |
86 | 0 | ogs_sockaddr_t *next = NULL, *addr = NULL; |
87 | |
|
88 | 0 | addr = sa_list; |
89 | 0 | while (addr) { |
90 | 0 | next = addr->next; |
91 | 0 | if (addr->hostname) |
92 | 0 | ogs_free(addr->hostname); |
93 | 0 | ogs_free(addr); |
94 | 0 | addr = next; |
95 | 0 | } |
96 | |
|
97 | 0 | return OGS_OK; |
98 | 0 | } |
99 | | |
100 | | int ogs_addaddrinfo(ogs_sockaddr_t **sa_list, |
101 | | int family, const char *hostname, uint16_t port, int flags) |
102 | 0 | { |
103 | 0 | int rc; |
104 | 0 | char service[NI_MAXSERV]; |
105 | 0 | struct addrinfo hints, *ai, *ai_list; |
106 | 0 | ogs_sockaddr_t *prev; |
107 | 0 | char buf[OGS_ADDRSTRLEN]; |
108 | |
|
109 | 0 | ogs_assert(sa_list); |
110 | | |
111 | 0 | memset(&hints, 0, sizeof(hints)); |
112 | 0 | hints.ai_family = family; |
113 | 0 | hints.ai_socktype = SOCK_STREAM; |
114 | 0 | hints.ai_flags = flags; |
115 | |
|
116 | 0 | ogs_snprintf(service, sizeof(service), "%u", port); |
117 | |
|
118 | 0 | rc = getaddrinfo(hostname, service, &hints, &ai_list); |
119 | 0 | if (rc != 0) { |
120 | 0 | ogs_log_message(OGS_LOG_ERROR, ogs_socket_errno, |
121 | 0 | "getaddrinfo(%d:%s:%d:0x%x) failed", |
122 | 0 | family, hostname, port, flags); |
123 | 0 | return OGS_ERROR; |
124 | 0 | } |
125 | | |
126 | 0 | prev = NULL; |
127 | 0 | if (*sa_list) { |
128 | 0 | prev = *sa_list; |
129 | 0 | while(prev->next) prev = prev->next; |
130 | 0 | } |
131 | 0 | for (ai = ai_list; ai; ai = ai->ai_next) { |
132 | 0 | ogs_sockaddr_t *new, tmp; |
133 | 0 | if (ai->ai_family != AF_INET && ai->ai_family != AF_INET6) |
134 | 0 | continue; |
135 | | |
136 | 0 | new = ogs_calloc(1, sizeof(ogs_sockaddr_t)); |
137 | 0 | if (!new) { |
138 | 0 | ogs_error("ogs_calloc() failed"); |
139 | 0 | return OGS_ERROR; |
140 | 0 | } |
141 | 0 | memcpy(&new->sa, ai->ai_addr, ai->ai_addrlen); |
142 | 0 | new->ogs_sin_port = htobe16(port); |
143 | |
|
144 | 0 | if (hostname) { |
145 | 0 | if (ogs_inet_pton(ai->ai_family, hostname, &tmp) == OGS_OK) { |
146 | | /* It's a valid IP address */ |
147 | 0 | ogs_debug("addr:%s, port:%d", OGS_ADDR(new, buf), port); |
148 | 0 | } else { |
149 | | /* INVALID IP address! We assume it is a hostname */ |
150 | 0 | new->hostname = ogs_strdup(hostname); |
151 | 0 | ogs_assert(new->hostname); |
152 | 0 | ogs_debug("name:%s, port:%d", new->hostname, port); |
153 | 0 | } |
154 | 0 | } |
155 | | |
156 | 0 | if (!prev) |
157 | 0 | *sa_list = new; |
158 | 0 | else |
159 | 0 | prev->next = new; |
160 | |
|
161 | 0 | prev = new; |
162 | 0 | } |
163 | | |
164 | 0 | freeaddrinfo(ai_list); |
165 | |
|
166 | 0 | if (prev == NULL) { |
167 | 0 | ogs_log_message(OGS_LOG_ERROR, ogs_socket_errno, |
168 | 0 | "ogs_getaddrinfo(%d:%s:%d:%d) failed", |
169 | 0 | family, hostname, port, flags); |
170 | 0 | return OGS_ERROR; |
171 | 0 | } |
172 | | |
173 | 0 | return OGS_OK; |
174 | 0 | } |
175 | | |
176 | | int ogs_filteraddrinfo(ogs_sockaddr_t **sa_list, int family) |
177 | 0 | { |
178 | 0 | ogs_sockaddr_t *addr = NULL, *prev = NULL, *next = NULL; |
179 | |
|
180 | 0 | ogs_assert(sa_list); |
181 | | |
182 | 0 | prev = NULL; |
183 | 0 | addr = *sa_list; |
184 | 0 | while (addr) { |
185 | 0 | next = addr->next; |
186 | |
|
187 | 0 | if (addr->ogs_sa_family != family) { |
188 | 0 | if (prev) |
189 | 0 | prev->next = addr->next; |
190 | 0 | else |
191 | 0 | *sa_list = addr->next; |
192 | 0 | if (addr->hostname) |
193 | 0 | ogs_free(addr->hostname); |
194 | 0 | ogs_free(addr); |
195 | |
|
196 | 0 | } else { |
197 | 0 | prev = addr; |
198 | 0 | } |
199 | |
|
200 | 0 | addr = next; |
201 | 0 | } |
202 | |
|
203 | 0 | return OGS_OK; |
204 | 0 | } |
205 | | |
206 | | int ogs_copyaddrinfo(ogs_sockaddr_t **dst, const ogs_sockaddr_t *src) |
207 | 0 | { |
208 | 0 | ogs_sockaddr_t *d; |
209 | 0 | const ogs_sockaddr_t *s; |
210 | |
|
211 | 0 | for (*dst = d = NULL, s = src; s; s = s->next) { |
212 | 0 | if (!d) { |
213 | 0 | *dst = d = ogs_memdup(s, sizeof *s); |
214 | 0 | if (!(*dst)) { |
215 | 0 | ogs_error("ogs_memdup() failed"); |
216 | 0 | return OGS_ERROR; |
217 | 0 | } |
218 | 0 | } else { |
219 | 0 | d = d->next = ogs_memdup(s, sizeof *s); |
220 | 0 | if (!d) { |
221 | 0 | ogs_error("ogs_memdup() failed"); |
222 | 0 | return OGS_ERROR; |
223 | 0 | } |
224 | 0 | } |
225 | 0 | if (s->hostname) { |
226 | 0 | if (s == src || s->hostname != src->hostname) { |
227 | 0 | d->hostname = ogs_strdup(s->hostname); |
228 | 0 | if (!d->hostname) { |
229 | 0 | ogs_error("ogs_memdup() failed"); |
230 | 0 | return OGS_ERROR; |
231 | 0 | } |
232 | 0 | } else { |
233 | 0 | d->hostname = (*dst)->hostname; |
234 | 0 | } |
235 | 0 | } |
236 | 0 | } |
237 | | |
238 | 0 | return OGS_OK; |
239 | 0 | } |
240 | | |
241 | | int ogs_sortaddrinfo(ogs_sockaddr_t **sa_list, int family) |
242 | 0 | { |
243 | 0 | ogs_sockaddr_t *head = NULL, *addr = NULL, *new = NULL, *old = NULL; |
244 | |
|
245 | 0 | ogs_assert(sa_list); |
246 | | |
247 | 0 | old = *sa_list; |
248 | 0 | while (old) { |
249 | 0 | addr = old; |
250 | |
|
251 | 0 | old = old->next; |
252 | |
|
253 | 0 | if (head == NULL || addr->ogs_sa_family == family) { |
254 | 0 | addr->next = head; |
255 | 0 | head = addr; |
256 | 0 | } else { |
257 | 0 | new = head; |
258 | 0 | while(new->next != NULL && new->next->ogs_sa_family != family) { |
259 | 0 | new = new->next; |
260 | 0 | } |
261 | 0 | addr->next = new->next; |
262 | 0 | new->next = addr; |
263 | 0 | } |
264 | 0 | } |
265 | |
|
266 | 0 | *sa_list = head; |
267 | |
|
268 | 0 | return OGS_OK; |
269 | 0 | } |
270 | | |
271 | | /*-------------------------------------------------------------------------- |
272 | | * Merge a single node if not already in "dest" list |
273 | | *-------------------------------------------------------------------------- |
274 | | */ |
275 | | void ogs_merge_single_addrinfo( |
276 | | ogs_sockaddr_t **dest, const ogs_sockaddr_t *item) |
277 | 0 | { |
278 | 0 | ogs_sockaddr_t *p; |
279 | 0 | ogs_sockaddr_t *new_sa; |
280 | |
|
281 | 0 | ogs_assert(dest); |
282 | 0 | ogs_assert(item); |
283 | | |
284 | 0 | p = *dest; |
285 | |
|
286 | 0 | while (p) { |
287 | 0 | if (ogs_sockaddr_is_equal(p, item)) { |
288 | | /* Already exists */ |
289 | 0 | return; |
290 | 0 | } |
291 | 0 | p = p->next; |
292 | 0 | } |
293 | 0 | new_sa = (ogs_sockaddr_t *)ogs_malloc(sizeof(*new_sa)); |
294 | 0 | ogs_assert(new_sa); |
295 | 0 | memcpy(new_sa, item, sizeof(*new_sa)); |
296 | 0 | if (item->hostname) { |
297 | 0 | new_sa->hostname = ogs_strdup(item->hostname); |
298 | 0 | ogs_assert(new_sa->hostname); |
299 | 0 | } |
300 | 0 | new_sa->next = NULL; |
301 | 0 | if (!(*dest)) { |
302 | 0 | *dest = new_sa; |
303 | 0 | } else { |
304 | 0 | p = *dest; |
305 | 0 | while (p->next) |
306 | 0 | p = p->next; |
307 | 0 | p->next = new_sa; |
308 | 0 | } |
309 | 0 | } |
310 | | |
311 | | /*-------------------------------------------------------------------------- |
312 | | * Merge an entire src list into dest |
313 | | *-------------------------------------------------------------------------- |
314 | | */ |
315 | | void ogs_merge_addrinfo(ogs_sockaddr_t **dest, const ogs_sockaddr_t *src) |
316 | 0 | { |
317 | 0 | const ogs_sockaddr_t *cur; |
318 | 0 | cur = src; |
319 | 0 | while (cur) { |
320 | 0 | ogs_merge_single_addrinfo(dest, cur); |
321 | 0 | cur = cur->next; |
322 | 0 | } |
323 | 0 | } |
324 | | |
325 | | ogs_sockaddr_t *ogs_link_local_addr(const char *dev, const ogs_sockaddr_t *sa) |
326 | 0 | { |
327 | 0 | #if defined(HAVE_GETIFADDRS) |
328 | 0 | struct ifaddrs *iflist, *cur; |
329 | 0 | int rc; |
330 | |
|
331 | 0 | rc = getifaddrs(&iflist); |
332 | 0 | if (rc != 0) { |
333 | 0 | ogs_log_message(OGS_LOG_ERROR, ogs_socket_errno, "getifaddrs failed"); |
334 | 0 | return NULL; |
335 | 0 | } |
336 | | |
337 | 0 | for (cur = iflist; cur != NULL; cur = cur->ifa_next) { |
338 | 0 | ogs_sockaddr_t *ifa_addr = NULL; |
339 | 0 | ogs_sockaddr_t *addr = NULL; |
340 | |
|
341 | 0 | ifa_addr = (ogs_sockaddr_t *)cur->ifa_addr; |
342 | |
|
343 | 0 | if (ifa_addr == NULL) /* may happen with ppp interfaces */ |
344 | 0 | continue; |
345 | | |
346 | 0 | if (ifa_addr->ogs_sa_family == AF_INET) |
347 | 0 | continue; |
348 | | |
349 | 0 | if (!IN6_IS_ADDR_LINKLOCAL(&ifa_addr->sin6.sin6_addr)) |
350 | 0 | continue; |
351 | | |
352 | 0 | if (dev && strcmp(dev, cur->ifa_name) != 0) |
353 | 0 | continue; |
354 | | |
355 | 0 | if (sa && memcmp(&sa->sin6.sin6_addr, |
356 | 0 | &ifa_addr->sin6.sin6_addr, sizeof(struct in6_addr)) != 0) |
357 | 0 | continue; |
358 | | |
359 | 0 | addr = ogs_calloc(1, sizeof(ogs_sockaddr_t)); |
360 | 0 | if (!addr) { |
361 | 0 | ogs_error("ogs_calloc() failed"); |
362 | 0 | return NULL; |
363 | 0 | } |
364 | 0 | ogs_assert(addr); |
365 | 0 | memcpy(&addr->sa, cur->ifa_addr, ogs_sockaddr_len(cur->ifa_addr)); |
366 | |
|
367 | 0 | freeifaddrs(iflist); |
368 | 0 | return addr; |
369 | 0 | } |
370 | | |
371 | 0 | freeifaddrs(iflist); |
372 | 0 | #endif |
373 | 0 | return NULL; |
374 | 0 | } |
375 | | |
376 | | ogs_sockaddr_t *ogs_link_local_addr_by_dev(const char *dev) |
377 | 0 | { |
378 | 0 | ogs_assert(dev); |
379 | 0 | return ogs_link_local_addr(dev, NULL); |
380 | 0 | } |
381 | | |
382 | | ogs_sockaddr_t *ogs_link_local_addr_by_sa(const ogs_sockaddr_t *sa) |
383 | 0 | { |
384 | 0 | ogs_assert(sa); |
385 | 0 | return ogs_link_local_addr(NULL, sa); |
386 | 0 | } |
387 | | |
388 | | int ogs_filter_ip_version(ogs_sockaddr_t **addr, |
389 | | int no_ipv4, int no_ipv6, int prefer_ipv4) |
390 | 0 | { |
391 | 0 | int rv; |
392 | |
|
393 | 0 | if (no_ipv4 == 1) { |
394 | 0 | rv = ogs_filteraddrinfo(addr, AF_INET6); |
395 | 0 | ogs_assert(rv == OGS_OK); |
396 | 0 | } |
397 | 0 | if (no_ipv6 == 1) { |
398 | 0 | rv = ogs_filteraddrinfo(addr, AF_INET); |
399 | 0 | ogs_assert(rv == OGS_OK); |
400 | 0 | } |
401 | | |
402 | 0 | if (prefer_ipv4 == 1) { |
403 | 0 | rv = ogs_sortaddrinfo(addr, AF_INET); |
404 | 0 | ogs_assert(rv == OGS_OK); |
405 | 0 | } else { |
406 | 0 | rv = ogs_sortaddrinfo(addr, AF_INET6); |
407 | 0 | ogs_assert(rv == OGS_OK); |
408 | 0 | } |
409 | | |
410 | 0 | return OGS_OK; |
411 | 0 | } |
412 | | |
413 | | |
414 | | const char *ogs_inet_ntop(void *sa, char *buf, int buflen) |
415 | 0 | { |
416 | 0 | int family; |
417 | 0 | ogs_sockaddr_t *sockaddr = NULL; |
418 | |
|
419 | 0 | sockaddr = sa; |
420 | 0 | ogs_assert(sockaddr); |
421 | 0 | ogs_assert(buf); |
422 | 0 | ogs_assert(buflen >= OGS_ADDRSTRLEN); |
423 | | |
424 | 0 | family = sockaddr->ogs_sa_family; |
425 | 0 | switch (family) { |
426 | 0 | case AF_INET: |
427 | 0 | return inet_ntop(family, &sockaddr->sin.sin_addr, buf, |
428 | 0 | INET_ADDRSTRLEN); |
429 | 0 | case AF_INET6: |
430 | 0 | return inet_ntop(family, &sockaddr->sin6.sin6_addr, buf, |
431 | 0 | INET6_ADDRSTRLEN); |
432 | 0 | default: |
433 | 0 | ogs_fatal("Unknown family(%d)", family); |
434 | 0 | ogs_abort(); |
435 | 0 | return NULL; |
436 | 0 | } |
437 | 0 | } |
438 | | |
439 | | int ogs_inet_pton(int family, const char *src, void *sa) |
440 | 0 | { |
441 | 0 | ogs_sockaddr_t *dst = NULL; |
442 | |
|
443 | 0 | ogs_assert(src); |
444 | 0 | dst = sa; |
445 | 0 | ogs_assert(dst); |
446 | | |
447 | 0 | dst->ogs_sa_family = family; |
448 | 0 | switch(family) { |
449 | 0 | case AF_INET: |
450 | 0 | return inet_pton(family, src, &dst->sin.sin_addr) == 1 ? |
451 | 0 | OGS_OK : OGS_ERROR; |
452 | 0 | case AF_INET6: |
453 | 0 | return inet_pton(family, src, &dst->sin6.sin6_addr) == 1 ? |
454 | 0 | OGS_OK : OGS_ERROR; |
455 | 0 | default: |
456 | 0 | ogs_fatal("Unknown family(%d)", family); |
457 | 0 | ogs_abort(); |
458 | 0 | return OGS_ERROR; |
459 | 0 | } |
460 | 0 | } |
461 | | |
462 | | socklen_t ogs_sockaddr_len(const void *sa) |
463 | 0 | { |
464 | 0 | const ogs_sockaddr_t *sockaddr = sa; |
465 | |
|
466 | 0 | ogs_assert(sa); |
467 | | |
468 | 0 | switch(sockaddr->ogs_sa_family) { |
469 | 0 | case AF_INET: |
470 | 0 | return sizeof(struct sockaddr_in); |
471 | 0 | case AF_INET6: |
472 | 0 | return sizeof(struct sockaddr_in6); |
473 | 0 | default: |
474 | 0 | ogs_fatal("Unknown family(%d)", sockaddr->ogs_sa_family); |
475 | 0 | ogs_abort(); |
476 | 0 | return OGS_ERROR; |
477 | 0 | } |
478 | 0 | } |
479 | | |
480 | | /* |
481 | | * Helper function to compare two addresses. |
482 | | * If compare_port is true, compare both port and address. |
483 | | * Otherwise, compare address only. |
484 | | */ |
485 | | static bool ogs_sockaddr_compare(const ogs_sockaddr_t *a, |
486 | | const ogs_sockaddr_t *b, |
487 | | bool compare_port) |
488 | 0 | { |
489 | 0 | ogs_assert(a); |
490 | 0 | ogs_assert(b); |
491 | | |
492 | 0 | if (a->ogs_sa_family != b->ogs_sa_family) |
493 | 0 | return false; |
494 | | |
495 | 0 | switch (a->ogs_sa_family) { |
496 | 0 | case AF_INET: |
497 | 0 | if (compare_port && (a->sin.sin_port != b->sin.sin_port)) |
498 | 0 | return false; |
499 | 0 | if (memcmp(&a->sin.sin_addr, &b->sin.sin_addr, |
500 | 0 | sizeof(struct in_addr)) != 0) |
501 | 0 | return false; |
502 | 0 | return true; |
503 | 0 | case AF_INET6: |
504 | 0 | if (compare_port && (a->sin6.sin6_port != b->sin6.sin6_port)) |
505 | 0 | return false; |
506 | 0 | if (memcmp(&a->sin6.sin6_addr, &b->sin6.sin6_addr, |
507 | 0 | sizeof(struct in6_addr)) != 0) |
508 | 0 | return false; |
509 | 0 | return true; |
510 | 0 | default: |
511 | 0 | ogs_error("Unexpected address family %u", a->ogs_sa_family); |
512 | 0 | ogs_abort(); |
513 | 0 | return false; /* Defensive return */ |
514 | 0 | } |
515 | 0 | } |
516 | | |
517 | | /* Compare addresses including port */ |
518 | | bool ogs_sockaddr_is_equal(const void *p, const void *q) |
519 | 0 | { |
520 | 0 | const ogs_sockaddr_t *a = (const ogs_sockaddr_t *)p; |
521 | 0 | const ogs_sockaddr_t *b = (const ogs_sockaddr_t *)q; |
522 | 0 | return ogs_sockaddr_compare(a, b, true); |
523 | 0 | } |
524 | | |
525 | | /* Compare addresses without considering port */ |
526 | | bool ogs_sockaddr_is_equal_addr(const void *p, const void *q) |
527 | 0 | { |
528 | 0 | const ogs_sockaddr_t *a = (const ogs_sockaddr_t *)p; |
529 | 0 | const ogs_sockaddr_t *b = (const ogs_sockaddr_t *)q; |
530 | 0 | return ogs_sockaddr_compare(a, b, false); |
531 | 0 | } |
532 | | |
533 | | bool ogs_sockaddr_check_any_match( |
534 | | ogs_sockaddr_t *base, |
535 | | ogs_sockaddr_t *list, const ogs_sockaddr_t *single, bool compare_port) |
536 | 0 | { |
537 | 0 | ogs_sockaddr_t *p = NULL; |
538 | |
|
539 | 0 | while (list) { |
540 | 0 | p = base; |
541 | 0 | while (p) { |
542 | 0 | if (ogs_sockaddr_compare(p, list, compare_port) == true) |
543 | 0 | return true; |
544 | 0 | p = p->next; |
545 | 0 | } |
546 | 0 | list = list->next; |
547 | 0 | } |
548 | 0 | if (single) { |
549 | 0 | p = base; |
550 | 0 | while (p) { |
551 | 0 | if (ogs_sockaddr_compare(p, single, compare_port) == true) |
552 | 0 | return true; |
553 | 0 | p = p->next; |
554 | 0 | } |
555 | 0 | } |
556 | 0 | return false; |
557 | 0 | } |
558 | | |
559 | | static int parse_network(ogs_ipsubnet_t *ipsub, const char *network) |
560 | 0 | { |
561 | | /* legacy syntax for ip addrs: a.b.c. ==> a.b.c.0/24 for example */ |
562 | 0 | int shift; |
563 | 0 | char *s, *t; |
564 | 0 | int octet; |
565 | 0 | char buf[sizeof "255.255.255.255"]; |
566 | |
|
567 | 0 | if (strlen(network) < sizeof buf) |
568 | 0 | strcpy(buf, network); |
569 | 0 | else |
570 | 0 | return OGS_ERROR; |
571 | | |
572 | | /* parse components */ |
573 | 0 | s = buf; |
574 | 0 | ipsub->sub[0] = 0; |
575 | 0 | ipsub->mask[0] = 0; |
576 | 0 | shift = 24; |
577 | 0 | while (*s) { |
578 | 0 | t = s; |
579 | 0 | if (!isdigit(*t)) |
580 | 0 | return OGS_ERROR; |
581 | | |
582 | 0 | while (isdigit(*t)) |
583 | 0 | ++t; |
584 | |
|
585 | 0 | if (*t == '.') |
586 | 0 | *t++ = 0; |
587 | 0 | else if (*t) |
588 | 0 | return OGS_ERROR; |
589 | | |
590 | 0 | if (shift < 0) |
591 | 0 | return OGS_ERROR; |
592 | | |
593 | 0 | octet = atoi(s); |
594 | 0 | if (octet < 0 || octet > 255) |
595 | 0 | return OGS_ERROR; |
596 | | |
597 | 0 | ipsub->sub[0] |= octet << shift; |
598 | 0 | ipsub->mask[0] |= 0xFFUL << shift; |
599 | 0 | s = t; |
600 | 0 | shift -= 8; |
601 | 0 | } |
602 | 0 | ipsub->sub[0] = be32toh(ipsub->sub[0]); |
603 | 0 | ipsub->mask[0] = be32toh(ipsub->mask[0]); |
604 | 0 | ipsub->family = AF_INET; |
605 | |
|
606 | 0 | return OGS_OK; |
607 | 0 | } |
608 | | |
609 | | /* return values: |
610 | | * CORE_EINVAL not an IP address; caller should see |
611 | | * if it is something else |
612 | | * CORE_BADIP IP address portion is is not valid |
613 | | * CORE_BADMASK mask portion is not valid |
614 | | */ |
615 | | static int parse_ip( |
616 | | ogs_ipsubnet_t *ipsub, const char *ipstr, int network_allowed) |
617 | 0 | { |
618 | | /* supported flavors of IP: |
619 | | * |
620 | | * . IPv6 numeric address string (e.g., "fe80::1") |
621 | | * |
622 | | * IMPORTANT: Don't store IPv4-mapped IPv6 address as an IPv6 address. |
623 | | * |
624 | | * . IPv4 numeric address string (e.g., "127.0.0.1") |
625 | | * |
626 | | * . IPv4 network string (e.g., "9.67") |
627 | | * |
628 | | * IMPORTANT: This network form is only allowed if network_allowed is on. |
629 | | */ |
630 | 0 | int rc; |
631 | |
|
632 | 0 | rc = inet_pton(AF_INET6, ipstr, ipsub->sub); |
633 | 0 | if (rc == 1) { |
634 | 0 | if (IN6_IS_ADDR_V4MAPPED((struct in6_addr *)ipsub->sub)) { |
635 | | /* ipsubnet_test() assumes that we don't create IPv4-mapped IPv6 |
636 | | * addresses; this of course forces the user to specify |
637 | | * IPv4 addresses in a.b.c.d style instead of ::ffff:a.b.c.d style. |
638 | | */ |
639 | 0 | ogs_error("Cannot support IPv4-mapped IPv6: " |
640 | 0 | "Use IPv4 address in a.b.c.d style " |
641 | 0 | "instead of ::ffff:a.b.c.d style"); |
642 | 0 | return OGS_ERROR; |
643 | 0 | } |
644 | 0 | ipsub->family = AF_INET6; |
645 | 0 | } else { |
646 | 0 | rc = inet_pton(AF_INET, ipstr, ipsub->sub); |
647 | 0 | if (rc == 1) { |
648 | 0 | ipsub->family = AF_INET; |
649 | 0 | } |
650 | 0 | } |
651 | | |
652 | 0 | if (rc != 1) { |
653 | 0 | if (network_allowed) |
654 | 0 | return parse_network(ipsub, ipstr); |
655 | 0 | else |
656 | 0 | return OGS_ERROR; |
657 | 0 | } |
658 | 0 | return OGS_OK; |
659 | 0 | } |
660 | | |
661 | | static int looks_like_ip(const char *ipstr) |
662 | 0 | { |
663 | 0 | if (strlen(ipstr) == 0) |
664 | 0 | return 0; |
665 | | |
666 | 0 | if (strchr(ipstr, ':')) { |
667 | | /* definitely not a hostname; |
668 | | * assume it is intended to be an IPv6 address */ |
669 | 0 | return 1; |
670 | 0 | } |
671 | | |
672 | | /* simple IPv4 address string check */ |
673 | 0 | while ((*ipstr == '.') || isdigit(*ipstr)) |
674 | 0 | ipstr++; |
675 | |
|
676 | 0 | return (*ipstr == '\0'); |
677 | 0 | } |
678 | | |
679 | | static void fix_subnet(ogs_ipsubnet_t *ipsub) |
680 | 0 | { |
681 | | /* in case caller specified more bits in network address than are |
682 | | * valid according to the mask, turn off the extra bits |
683 | | */ |
684 | 0 | int i; |
685 | |
|
686 | 0 | for (i = 0; i < sizeof ipsub->mask / sizeof(int32_t); i++) |
687 | 0 | ipsub->sub[i] &= ipsub->mask[i]; |
688 | 0 | } |
689 | | |
690 | | /* be sure not to store any IPv4 address as a v4-mapped IPv6 address */ |
691 | | int ogs_ipsubnet(ogs_ipsubnet_t *ipsub, |
692 | | const char *ipstr, const char *mask_or_numbits) |
693 | 0 | { |
694 | 0 | int rv; |
695 | 0 | char *endptr; |
696 | 0 | long bits, maxbits = 32; |
697 | |
|
698 | 0 | ogs_assert(ipsub); |
699 | 0 | ogs_assert(ipstr); |
700 | | |
701 | | /* filter out stuff which doesn't look remotely like an IP address; |
702 | | * this helps callers like mod_access which have a syntax allowing |
703 | | * hostname or IP address; |
704 | | * CORE_EINVAL tells the caller that it was probably not intended |
705 | | * to be an IP address |
706 | | */ |
707 | 0 | if (!looks_like_ip(ipstr)) { |
708 | 0 | ogs_error("looks_like_ip(%s, %s) failed", ipstr, mask_or_numbits); |
709 | 0 | return OGS_ERROR; |
710 | 0 | } |
711 | | |
712 | | /* assume ipstr is an individual IP address, not a subnet */ |
713 | 0 | memset(ipsub->mask, 0xFF, sizeof ipsub->mask); |
714 | |
|
715 | 0 | rv = parse_ip(ipsub, ipstr, mask_or_numbits == NULL); |
716 | 0 | if (rv != OGS_OK) { |
717 | 0 | ogs_error("parse_ip(%s, %s) failed", ipstr, mask_or_numbits); |
718 | 0 | return rv; |
719 | 0 | } |
720 | | |
721 | 0 | if (mask_or_numbits) { |
722 | 0 | if (ipsub->family == AF_INET6) { |
723 | 0 | maxbits = 128; |
724 | 0 | } |
725 | 0 | bits = strtol(mask_or_numbits, &endptr, 10); |
726 | 0 | if (*endptr == '\0' && bits > 0 && bits <= maxbits) { |
727 | | /* valid num-bits string; fill in mask appropriately */ |
728 | 0 | int cur_entry = 0; |
729 | 0 | int32_t cur_bit_value; |
730 | |
|
731 | 0 | memset(ipsub->mask, 0, sizeof ipsub->mask); |
732 | 0 | while (bits > 32) { |
733 | 0 | ipsub->mask[cur_entry] = 0xFFFFFFFF; /* all 32 bits */ |
734 | 0 | bits -= 32; |
735 | 0 | ++cur_entry; |
736 | 0 | } |
737 | 0 | cur_bit_value = 0x80000000; |
738 | 0 | while (bits) { |
739 | 0 | ipsub->mask[cur_entry] |= cur_bit_value; |
740 | 0 | --bits; |
741 | 0 | cur_bit_value /= 2; |
742 | 0 | } |
743 | 0 | ipsub->mask[cur_entry] = htobe32(ipsub->mask[cur_entry]); |
744 | 0 | } |
745 | 0 | else if (inet_pton(AF_INET, mask_or_numbits, ipsub->mask) == 1 && |
746 | 0 | ipsub->family == AF_INET) { |
747 | | /* valid IPv4 netmask */ |
748 | 0 | } else { |
749 | 0 | ogs_error("Bad netmask %s", mask_or_numbits); |
750 | 0 | return OGS_ERROR; |
751 | 0 | } |
752 | 0 | } |
753 | | |
754 | 0 | fix_subnet(ipsub); |
755 | |
|
756 | 0 | return OGS_OK; |
757 | 0 | } |
758 | | |
759 | | char *ogs_gethostname(ogs_sockaddr_t *addr) |
760 | 0 | { |
761 | 0 | return addr->hostname; |
762 | 0 | } |
763 | | |
764 | | char *ogs_ipstrdup(ogs_sockaddr_t *addr) |
765 | 0 | { |
766 | 0 | char buf[OGS_ADDRSTRLEN + 1]; |
767 | |
|
768 | 0 | ogs_assert(addr); |
769 | 0 | memset(buf, 0, sizeof(buf)); |
770 | |
|
771 | 0 | OGS_ADDR(addr, buf); |
772 | |
|
773 | 0 | return ogs_strdup(buf); |
774 | 0 | } |
775 | | |
776 | | char *ogs_sockaddr_to_string_static(ogs_sockaddr_t *sa_list) |
777 | 0 | { |
778 | 0 | static char dumpstr[OGS_HUGE_LEN] = { 0, }; |
779 | 0 | char *p, *last; |
780 | 0 | ogs_sockaddr_t *addr = NULL; |
781 | |
|
782 | 0 | last = dumpstr + OGS_HUGE_LEN; |
783 | 0 | p = dumpstr; |
784 | |
|
785 | 0 | addr = (ogs_sockaddr_t *)sa_list; |
786 | 0 | while (addr) { |
787 | 0 | char buf[OGS_ADDRSTRLEN]; |
788 | 0 | p = ogs_slprintf(p, last, "[%s]:%d ", |
789 | 0 | OGS_ADDR(addr, buf), OGS_PORT(addr)); |
790 | 0 | addr = addr->next; |
791 | 0 | } |
792 | |
|
793 | 0 | if (p > dumpstr) { |
794 | | /* If there is more than one addr, remove the last character */ |
795 | 0 | *(p-1) = 0; |
796 | |
|
797 | 0 | return dumpstr; |
798 | 0 | } |
799 | | |
800 | | /* No address */ |
801 | 0 | return NULL; |
802 | 0 | } |