2 netutl.c -- some supporting network utility code
3 Copyright (C) 1998-2005 Ivo Timmermans
4 2000-2009 Guus Sliepen <guus@tinc-vpn.org>
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License along
17 with this program; if not, write to the Free Software Foundation, Inc.,
18 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
29 bool hostnames = false;
32 Turn a string into a struct addrinfo.
33 Return NULL on failure.
35 struct addrinfo *str2addrinfo(const char *address, const char *service, int socktype) {
36 struct addrinfo *ai, hint = {0};
41 hint.ai_family = addressfamily;
42 hint.ai_socktype = socktype;
44 err = getaddrinfo(address, service, &hint, &ai);
47 logger(LOG_WARNING, _("Error looking up %s port %s: %s"), address,
48 service, gai_strerror(err));
55 sockaddr_t str2sockaddr(const char *address, const char *port) {
56 struct addrinfo *ai, hint = {0};
62 hint.ai_family = AF_UNSPEC;
63 hint.ai_flags = AI_NUMERICHOST;
64 hint.ai_socktype = SOCK_STREAM;
66 err = getaddrinfo(address, port, &hint, &ai);
70 logger(LOG_DEBUG, "Unknown type address %s port %s", address, port);
71 result.sa.sa_family = AF_UNKNOWN;
72 result.unknown.address = xstrdup(address);
73 result.unknown.port = xstrdup(port);
77 memcpy(&result, ai->ai_addr, ai->ai_addrlen);
83 void sockaddr2str(const sockaddr_t *sa, char **addrstr, char **portstr) {
84 char address[NI_MAXHOST];
85 char port[NI_MAXSERV];
91 if(sa->sa.sa_family == AF_UNKNOWN) {
92 *addrstr = xstrdup(sa->unknown.address);
93 *portstr = xstrdup(sa->unknown.port);
97 err = getnameinfo(&sa->sa, SALEN(sa->sa), address, sizeof(address), port, sizeof(port), NI_NUMERICHOST | NI_NUMERICSERV);
100 logger(LOG_ERR, _("Error while translating addresses: %s"),
107 scopeid = strchr(address, '%');
110 *scopeid = '\0'; /* Descope. */
112 *addrstr = xstrdup(address);
113 *portstr = xstrdup(port);
116 char *sockaddr2hostname(const sockaddr_t *sa) {
118 char address[NI_MAXHOST] = "unknown";
119 char port[NI_MAXSERV] = "unknown";
124 if(sa->sa.sa_family == AF_UNKNOWN) {
125 xasprintf(&str, _("%s port %s"), sa->unknown.address, sa->unknown.port);
129 err = getnameinfo(&sa->sa, SALEN(sa->sa), address, sizeof(address), port, sizeof(port),
130 hostnames ? 0 : (NI_NUMERICHOST | NI_NUMERICSERV));
132 logger(LOG_ERR, _("Error while looking up hostname: %s"),
136 xasprintf(&str, _("%s port %s"), address, port);
141 int sockaddrcmp_noport(const sockaddr_t *a, const sockaddr_t *b) {
146 result = a->sa.sa_family - b->sa.sa_family;
151 switch (a->sa.sa_family) {
156 return strcmp(a->unknown.address, b->unknown.address);
159 return memcmp(&a->in.sin_addr, &b->in.sin_addr, sizeof(a->in.sin_addr));
162 return memcmp(&a->in6.sin6_addr, &b->in6.sin6_addr, sizeof(a->in6.sin6_addr));
165 logger(LOG_ERR, _("sockaddrcmp() was called with unknown address family %d, exitting!"),
173 int sockaddrcmp(const sockaddr_t *a, const sockaddr_t *b) {
178 result = a->sa.sa_family - b->sa.sa_family;
183 switch (a->sa.sa_family) {
188 result = strcmp(a->unknown.address, b->unknown.address);
193 return strcmp(a->unknown.port, b->unknown.port);
196 result = memcmp(&a->in.sin_addr, &b->in.sin_addr, sizeof(a->in.sin_addr));
201 return memcmp(&a->in.sin_port, &b->in.sin_port, sizeof(a->in.sin_port));
204 result = memcmp(&a->in6.sin6_addr, &b->in6.sin6_addr, sizeof(a->in6.sin6_addr));
209 return memcmp(&a->in6.sin6_port, &b->in6.sin6_port, sizeof(a->in6.sin6_port));
212 logger(LOG_ERR, _("sockaddrcmp() was called with unknown address family %d, exitting!"),
220 void sockaddrcpy(sockaddr_t *a, const sockaddr_t *b) {
223 if(b->sa.sa_family != AF_UNKNOWN) {
226 a->unknown.family = AF_UNKNOWN;
227 a->unknown.address = xstrdup(b->unknown.address);
228 a->unknown.port = xstrdup(b->unknown.port);
232 void sockaddrfree(sockaddr_t *a) {
235 if(a->sa.sa_family == AF_UNKNOWN) {
236 free(a->unknown.address);
237 free(a->unknown.port);
241 void sockaddrunmap(sockaddr_t *sa) {
244 if(sa->sa.sa_family == AF_INET6 && IN6_IS_ADDR_V4MAPPED(&sa->in6.sin6_addr)) {
245 sa->in.sin_addr.s_addr = ((uint32_t *) & sa->in6.sin6_addr)[3];
246 sa->in.sin_family = AF_INET;
250 /* Subnet mask handling */
252 int maskcmp(const void *va, const void *vb, int masklen) {
259 for(m = masklen, i = 0; m >= 8; m -= 8, i++) {
260 result = a[i] - b[i];
266 return (a[i] & (0x100 - (1 << (8 - m)))) -
267 (b[i] & (0x100 - (1 << (8 - m))));
272 void mask(void *va, int masklen, int len) {
282 a[i++] &= (0x100 - (1 << (8 - masklen)));
288 void maskcpy(void *va, const void *vb, int masklen, int len) {
295 for(m = masklen, i = 0; m >= 8; m -= 8, i++)
299 a[i] = b[i] & (0x100 - (1 << (8 - m)));
307 bool maskcheck(const void *va, int masklen, int len) {
316 if(masklen && a[i++] & (0xff >> masklen))