1998-11-09 19:40:38 +03:00
/*
Unix SMB / Netbios implementation .
Version 1.9 .
Samba utility functions
Copyright ( C ) Andrew Tridgell 1992 - 1998
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
# ifdef WITH_SSL
# include <ssl.h>
# undef Realloc /* SSLeay defines this and samba has a function of this name */
extern SSL * ssl ;
extern int sslFd ;
# endif /* WITH_SSL */
extern int DEBUGLEVEL ;
/* the last IP received from */
struct in_addr lastip ;
/* the last port received from */
int lastport = 0 ;
int smb_read_error = 0 ;
/****************************************************************************
1999-12-13 16:27:58 +03:00
Determine if a file descriptor is in fact a socket .
1998-11-09 19:40:38 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
BOOL is_a_socket ( int fd )
{
int v , l ;
l = sizeof ( int ) ;
return ( getsockopt ( fd , SOL_SOCKET , SO_TYPE , ( char * ) & v , & l ) = = 0 ) ;
}
enum SOCK_OPT_TYPES { OPT_BOOL , OPT_INT , OPT_ON } ;
2000-10-07 01:12:25 +04:00
typedef struct smb_socket_option
1998-11-09 19:40:38 +03:00
{
char * name ;
int level ;
int option ;
int value ;
int opttype ;
2000-10-07 01:12:25 +04:00
} smb_socket_option ;
smb_socket_option socket_options [ ] = {
1998-11-09 19:40:38 +03:00
{ " SO_KEEPALIVE " , SOL_SOCKET , SO_KEEPALIVE , 0 , OPT_BOOL } ,
{ " SO_REUSEADDR " , SOL_SOCKET , SO_REUSEADDR , 0 , OPT_BOOL } ,
{ " SO_BROADCAST " , SOL_SOCKET , SO_BROADCAST , 0 , OPT_BOOL } ,
# ifdef TCP_NODELAY
{ " TCP_NODELAY " , IPPROTO_TCP , TCP_NODELAY , 0 , OPT_BOOL } ,
# endif
# ifdef IPTOS_LOWDELAY
{ " IPTOS_LOWDELAY " , IPPROTO_IP , IP_TOS , IPTOS_LOWDELAY , OPT_ON } ,
# endif
# ifdef IPTOS_THROUGHPUT
{ " IPTOS_THROUGHPUT " , IPPROTO_IP , IP_TOS , IPTOS_THROUGHPUT , OPT_ON } ,
# endif
2000-02-17 01:48:19 +03:00
# ifdef SO_REUSEPORT
{ " SO_REUSEPORT " , SOL_SOCKET , SO_REUSEPORT , 0 , OPT_BOOL } ,
# endif
1998-11-09 19:40:38 +03:00
# ifdef SO_SNDBUF
{ " SO_SNDBUF " , SOL_SOCKET , SO_SNDBUF , 0 , OPT_INT } ,
# endif
# ifdef SO_RCVBUF
{ " SO_RCVBUF " , SOL_SOCKET , SO_RCVBUF , 0 , OPT_INT } ,
# endif
# ifdef SO_SNDLOWAT
{ " SO_SNDLOWAT " , SOL_SOCKET , SO_SNDLOWAT , 0 , OPT_INT } ,
# endif
# ifdef SO_RCVLOWAT
{ " SO_RCVLOWAT " , SOL_SOCKET , SO_RCVLOWAT , 0 , OPT_INT } ,
# endif
# ifdef SO_SNDTIMEO
{ " SO_SNDTIMEO " , SOL_SOCKET , SO_SNDTIMEO , 0 , OPT_INT } ,
# endif
# ifdef SO_RCVTIMEO
{ " SO_RCVTIMEO " , SOL_SOCKET , SO_RCVTIMEO , 0 , OPT_INT } ,
# endif
{ NULL , 0 , 0 , 0 , 0 } } ;
2000-10-07 01:12:25 +04:00
/****************************************************************************
Print socket options .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static void print_socket_options ( int s )
{
int value , vlen = 4 ;
smb_socket_option * p = & socket_options [ 0 ] ;
for ( ; p - > name ! = NULL ; p + + ) {
if ( getsockopt ( s , p - > level , p - > option , ( void * ) & value , & vlen ) = = - 1 ) {
2001-05-10 04:35:24 +04:00
DEBUG ( 5 , ( " Could not test socket option %s. \n " , p - > name ) ) ;
2000-10-07 01:12:25 +04:00
} else {
2001-05-10 04:35:24 +04:00
DEBUG ( 5 , ( " socket option %s = %d \n " , p - > name , value ) ) ;
2000-10-07 01:12:25 +04:00
}
}
}
1998-11-09 19:40:38 +03:00
/****************************************************************************
1999-12-13 16:27:58 +03:00
Set user socket options .
1998-11-09 19:40:38 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
void set_socket_options ( int fd , char * options )
{
1999-12-13 16:27:58 +03:00
fstring tok ;
while ( next_token ( & options , tok , " \t , " , sizeof ( tok ) ) ) {
int ret = 0 , i ;
int value = 1 ;
char * p ;
BOOL got_value = False ;
2001-07-04 11:36:09 +04:00
if ( ( p = strchr_m ( tok , ' = ' ) ) ) {
1999-12-13 16:27:58 +03:00
* p = 0 ;
value = atoi ( p + 1 ) ;
got_value = True ;
}
1998-11-09 19:40:38 +03:00
1999-12-13 16:27:58 +03:00
for ( i = 0 ; socket_options [ i ] . name ; i + + )
if ( strequal ( socket_options [ i ] . name , tok ) )
break ;
1998-11-09 19:40:38 +03:00
1999-12-13 16:27:58 +03:00
if ( ! socket_options [ i ] . name ) {
DEBUG ( 0 , ( " Unknown socket option %s \n " , tok ) ) ;
continue ;
}
1998-11-09 19:40:38 +03:00
1999-12-13 16:27:58 +03:00
switch ( socket_options [ i ] . opttype ) {
case OPT_BOOL :
case OPT_INT :
ret = setsockopt ( fd , socket_options [ i ] . level ,
socket_options [ i ] . option , ( char * ) & value , sizeof ( int ) ) ;
break ;
case OPT_ON :
if ( got_value )
DEBUG ( 0 , ( " syntax error - %s does not take a value \n " , tok ) ) ;
{
int on = socket_options [ i ] . value ;
ret = setsockopt ( fd , socket_options [ i ] . level ,
socket_options [ i ] . option , ( char * ) & on , sizeof ( int ) ) ;
}
break ;
}
1998-11-09 19:40:38 +03:00
1999-12-13 16:27:58 +03:00
if ( ret ! = 0 )
DEBUG ( 0 , ( " Failed to set socket option %s (Error %s) \n " , tok , strerror ( errno ) ) ) ;
}
2000-10-07 01:12:25 +04:00
print_socket_options ( fd ) ;
1998-11-09 19:40:38 +03:00
}
/****************************************************************************
1999-12-13 16:27:58 +03:00
Read from a socket .
1998-11-09 19:40:38 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
ssize_t read_udp_socket ( int fd , char * buf , size_t len )
{
2001-06-27 21:26:29 +04:00
ssize_t ret ;
struct sockaddr_in sock ;
socklen_t socklen = sizeof ( sock ) ;
memset ( ( char * ) & sock , ' \0 ' , socklen ) ;
memset ( ( char * ) & lastip , ' \0 ' , sizeof ( lastip ) ) ;
ret = ( ssize_t ) recvfrom ( fd , buf , len , 0 , ( struct sockaddr * ) & sock , & socklen ) ;
if ( ret < = 0 ) {
DEBUG ( 2 , ( " read socket failed. ERRNO=%s \n " , strerror ( errno ) ) ) ;
return ( 0 ) ;
}
lastip = sock . sin_addr ;
lastport = ntohs ( sock . sin_port ) ;
DEBUG ( 10 , ( " read_udp_socket: lastip %s lastport %d read: %d \n " ,
inet_ntoa ( lastip ) , lastport , ret ) ) ;
return ( ret ) ;
1998-11-09 19:40:38 +03:00
}
/****************************************************************************
1999-12-13 16:27:58 +03:00
Read data from a socket with a timout in msec .
mincount = if timeout , minimum to read before returning
maxcount = number to be read .
time_out = timeout in milliseconds
1998-11-09 19:40:38 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
static ssize_t read_socket_with_timeout ( int fd , char * buf , size_t mincnt , size_t maxcnt , unsigned int time_out )
1998-11-09 19:40:38 +03:00
{
fd_set fds ;
int selrtn ;
ssize_t readret ;
size_t nread = 0 ;
struct timeval timeout ;
/* just checking .... */
1999-12-13 16:27:58 +03:00
if ( maxcnt < = 0 )
return ( 0 ) ;
1998-11-09 19:40:38 +03:00
smb_read_error = 0 ;
/* Blocking read */
if ( time_out < = 0 ) {
if ( mincnt = = 0 ) mincnt = maxcnt ;
while ( nread < mincnt ) {
# ifdef WITH_SSL
if ( fd = = sslFd ) {
readret = SSL_read ( ssl , buf + nread , maxcnt - nread ) ;
} else {
readret = read ( fd , buf + nread , maxcnt - nread ) ;
}
# else /* WITH_SSL */
readret = read ( fd , buf + nread , maxcnt - nread ) ;
# endif /* WITH_SSL */
if ( readret = = 0 ) {
1999-12-13 16:27:58 +03:00
DEBUG ( 5 , ( " read_socket_with_timeout: blocking read. EOF from client. \n " ) ) ;
1998-11-09 19:40:38 +03:00
smb_read_error = READ_EOF ;
return - 1 ;
}
if ( readret = = - 1 ) {
1999-12-13 16:27:58 +03:00
DEBUG ( 0 , ( " read_socket_with_timeout: read error = %s. \n " , strerror ( errno ) ) ) ;
1998-11-09 19:40:38 +03:00
smb_read_error = READ_ERROR ;
return - 1 ;
}
nread + = readret ;
}
return ( ( ssize_t ) nread ) ;
}
/* Most difficult - timeout read */
/* If this is ever called on a disk file and
mincnt is greater then the filesize then
system performance will suffer severely as
select always returns true on disk files */
/* Set initial timeout */
timeout . tv_sec = ( time_t ) ( time_out / 1000 ) ;
timeout . tv_usec = ( long ) ( 1000 * ( time_out % 1000 ) ) ;
1999-12-13 16:27:58 +03:00
for ( nread = 0 ; nread < mincnt ; ) {
1998-11-09 19:40:38 +03:00
FD_ZERO ( & fds ) ;
FD_SET ( fd , & fds ) ;
2000-06-11 09:57:58 +04:00
selrtn = sys_select_intr ( fd + 1 , & fds , & timeout ) ;
1998-11-09 19:40:38 +03:00
/* Check if error */
if ( selrtn = = - 1 ) {
/* something is wrong. Maybe the socket is dead? */
1999-12-13 16:27:58 +03:00
DEBUG ( 0 , ( " read_socket_with_timeout: timeout read. select error = %s. \n " , strerror ( errno ) ) ) ;
1998-11-09 19:40:38 +03:00
smb_read_error = READ_ERROR ;
return - 1 ;
}
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
/* Did we timeout ? */
if ( selrtn = = 0 ) {
1999-12-13 16:27:58 +03:00
DEBUG ( 10 , ( " read_socket_with_timeout: timeout read. select timed out. \n " ) ) ;
1998-11-09 19:40:38 +03:00
smb_read_error = READ_TIMEOUT ;
return - 1 ;
}
# ifdef WITH_SSL
if ( fd = = sslFd ) {
readret = SSL_read ( ssl , buf + nread , maxcnt - nread ) ;
} else {
readret = read ( fd , buf + nread , maxcnt - nread ) ;
}
# else /* WITH_SSL */
readret = read ( fd , buf + nread , maxcnt - nread ) ;
# endif /* WITH_SSL */
if ( readret = = 0 ) {
/* we got EOF on the file descriptor */
1999-12-13 16:27:58 +03:00
DEBUG ( 5 , ( " read_socket_with_timeout: timeout read. EOF from client. \n " ) ) ;
1998-11-09 19:40:38 +03:00
smb_read_error = READ_EOF ;
return - 1 ;
}
if ( readret = = - 1 ) {
/* the descriptor is probably dead */
1999-12-13 16:27:58 +03:00
DEBUG ( 0 , ( " read_socket_with_timeout: timeout read. read error = %s. \n " , strerror ( errno ) ) ) ;
1998-11-09 19:40:38 +03:00
smb_read_error = READ_ERROR ;
return - 1 ;
}
nread + = readret ;
}
/* Return the number we got */
return ( ( ssize_t ) nread ) ;
}
1999-12-13 16:27:58 +03:00
/****************************************************************************
Read data from a fd with a timout in msec .
mincount = if timeout , minimum to read before returning
maxcount = number to be read .
time_out = timeout in milliseconds
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
ssize_t read_with_timeout ( int fd , char * buf , size_t mincnt , size_t maxcnt , unsigned int time_out )
{
fd_set fds ;
int selrtn ;
ssize_t readret ;
size_t nread = 0 ;
struct timeval timeout ;
/* just checking .... */
if ( maxcnt < = 0 )
return ( 0 ) ;
/* Blocking read */
if ( time_out < = 0 ) {
if ( mincnt = = 0 ) mincnt = maxcnt ;
while ( nread < mincnt ) {
# ifdef WITH_SSL
if ( fd = = sslFd ) {
readret = SSL_read ( ssl , buf + nread , maxcnt - nread ) ;
} else {
readret = read ( fd , buf + nread , maxcnt - nread ) ;
}
# else /* WITH_SSL */
readret = read ( fd , buf + nread , maxcnt - nread ) ;
# endif /* WITH_SSL */
if ( readret < = 0 )
return readret ;
nread + = readret ;
}
return ( ( ssize_t ) nread ) ;
}
/* Most difficult - timeout read */
/* If this is ever called on a disk file and
mincnt is greater then the filesize then
system performance will suffer severely as
select always returns true on disk files */
/* Set initial timeout */
timeout . tv_sec = ( time_t ) ( time_out / 1000 ) ;
timeout . tv_usec = ( long ) ( 1000 * ( time_out % 1000 ) ) ;
for ( nread = 0 ; nread < mincnt ; ) {
FD_ZERO ( & fds ) ;
FD_SET ( fd , & fds ) ;
2000-06-11 09:57:58 +04:00
selrtn = sys_select_intr ( fd + 1 , & fds , & timeout ) ;
1999-12-13 16:27:58 +03:00
if ( selrtn < = 0 )
return selrtn ;
# ifdef WITH_SSL
if ( fd = = sslFd ) {
readret = SSL_read ( ssl , buf + nread , maxcnt - nread ) ;
} else {
readret = read ( fd , buf + nread , maxcnt - nread ) ;
}
# else /* WITH_SSL */
readret = read ( fd , buf + nread , maxcnt - nread ) ;
# endif /* WITH_SSL */
if ( readret < = 0 )
return readret ;
nread + = readret ;
}
/* Return the number we got */
return ( ( ssize_t ) nread ) ;
}
1998-11-09 19:40:38 +03:00
/****************************************************************************
send a keepalive packet ( rfc1002 )
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
BOOL send_keepalive ( int client )
{
unsigned char buf [ 4 ] ;
buf [ 0 ] = 0x85 ;
buf [ 1 ] = buf [ 2 ] = buf [ 3 ] = 0 ;
1999-12-13 16:27:58 +03:00
return ( write_socket_data ( client , ( char * ) buf , 4 ) = = 4 ) ;
1998-11-09 19:40:38 +03:00
}
/****************************************************************************
read data from the client , reading exactly N bytes .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
ssize_t read_data ( int fd , char * buffer , size_t N )
{
ssize_t ret ;
size_t total = 0 ;
smb_read_error = 0 ;
while ( total < N )
{
# ifdef WITH_SSL
if ( fd = = sslFd ) {
ret = SSL_read ( ssl , buffer + total , N - total ) ;
} else {
ret = read ( fd , buffer + total , N - total ) ;
}
# else /* WITH_SSL */
ret = read ( fd , buffer + total , N - total ) ;
# endif /* WITH_SSL */
if ( ret = = 0 )
{
1999-12-13 16:27:58 +03:00
DEBUG ( 10 , ( " read_data: read of %d returned 0. Error = %s \n " , ( int ) ( N - total ) , strerror ( errno ) ) ) ;
1998-11-09 19:40:38 +03:00
smb_read_error = READ_EOF ;
return 0 ;
}
if ( ret = = - 1 )
{
1999-12-13 16:27:58 +03:00
DEBUG ( 0 , ( " read_data: read failure for %d. Error = %s \n " , ( int ) ( N - total ) , strerror ( errno ) ) ) ;
1998-11-09 19:40:38 +03:00
smb_read_error = READ_ERROR ;
return - 1 ;
}
total + = ret ;
}
return ( ssize_t ) total ;
}
1999-12-13 16:27:58 +03:00
/****************************************************************************
Read data from a socket , reading exactly N bytes .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static ssize_t read_socket_data ( int fd , char * buffer , size_t N )
{
ssize_t ret ;
size_t total = 0 ;
smb_read_error = 0 ;
while ( total < N )
{
# ifdef WITH_SSL
if ( fd = = sslFd ) {
ret = SSL_read ( ssl , buffer + total , N - total ) ;
} else {
ret = read ( fd , buffer + total , N - total ) ;
}
# else /* WITH_SSL */
ret = read ( fd , buffer + total , N - total ) ;
# endif /* WITH_SSL */
if ( ret = = 0 )
{
DEBUG ( 10 , ( " read_socket_data: recv of %d returned 0. Error = %s \n " , ( int ) ( N - total ) , strerror ( errno ) ) ) ;
smb_read_error = READ_EOF ;
return 0 ;
}
if ( ret = = - 1 )
{
DEBUG ( 0 , ( " read_socket_data: recv failure for %d. Error = %s \n " , ( int ) ( N - total ) , strerror ( errno ) ) ) ;
smb_read_error = READ_ERROR ;
return - 1 ;
}
total + = ret ;
}
return ( ssize_t ) total ;
}
1998-11-09 19:40:38 +03:00
/****************************************************************************
1999-12-13 16:27:58 +03:00
Write data to a fd .
1998-11-09 19:40:38 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
ssize_t write_data ( int fd , char * buffer , size_t N )
{
size_t total = 0 ;
ssize_t ret ;
while ( total < N )
{
# ifdef WITH_SSL
if ( fd = = sslFd ) {
ret = SSL_write ( ssl , buffer + total , N - total ) ;
} else {
ret = write ( fd , buffer + total , N - total ) ;
}
# else /* WITH_SSL */
ret = write ( fd , buffer + total , N - total ) ;
# endif /* WITH_SSL */
1999-12-13 16:27:58 +03:00
if ( ret = = - 1 ) {
DEBUG ( 0 , ( " write_data: write failure. Error = %s \n " , strerror ( errno ) ) ) ;
return - 1 ;
}
if ( ret = = 0 ) return total ;
total + = ret ;
}
return ( ssize_t ) total ;
}
/****************************************************************************
Write data to a socket - use send rather than write .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
ssize_t write_socket_data ( int fd , char * buffer , size_t N )
{
size_t total = 0 ;
ssize_t ret ;
while ( total < N )
{
# ifdef WITH_SSL
if ( fd = = sslFd ) {
ret = SSL_write ( ssl , buffer + total , N - total ) ;
} else {
ret = send ( fd , buffer + total , N - total , 0 ) ;
}
# else /* WITH_SSL */
ret = send ( fd , buffer + total , N - total , 0 ) ;
# endif /* WITH_SSL */
if ( ret = = - 1 ) {
DEBUG ( 0 , ( " write_socket_data: write failure. Error = %s \n " , strerror ( errno ) ) ) ;
return - 1 ;
}
1998-11-09 19:40:38 +03:00
if ( ret = = 0 ) return total ;
total + = ret ;
}
return ( ssize_t ) total ;
}
1999-12-13 16:27:58 +03:00
/****************************************************************************
write to a socket
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-11-09 19:40:38 +03:00
1999-12-13 16:27:58 +03:00
ssize_t write_socket ( int fd , char * buf , size_t len )
{
ssize_t ret = 0 ;
DEBUG ( 6 , ( " write_socket(%d,%d) \n " , fd , ( int ) len ) ) ;
ret = write_socket_data ( fd , buf , len ) ;
DEBUG ( 6 , ( " write_socket(%d,%d) wrote %d \n " , fd , ( int ) len , ( int ) ret ) ) ;
if ( ret < = 0 )
DEBUG ( 0 , ( " write_socket: Error writing %d bytes to socket %d: ERRNO = %s \n " ,
( int ) len , fd , strerror ( errno ) ) ) ;
return ( ret ) ;
}
1998-11-09 19:40:38 +03:00
/****************************************************************************
read 4 bytes of a smb packet and return the smb length of the packet
store the result in the buffer
This version of the function will return a length of zero on receiving
a keepalive packet .
timeout is in milliseconds .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
static ssize_t read_smb_length_return_keepalive ( int fd , char * inbuf , unsigned int timeout )
{
ssize_t len = 0 ;
int msg_type ;
BOOL ok = False ;
while ( ! ok )
{
if ( timeout > 0 )
1999-12-13 16:27:58 +03:00
ok = ( read_socket_with_timeout ( fd , inbuf , 4 , 4 , timeout ) = = 4 ) ;
1998-11-09 19:40:38 +03:00
else
1999-12-13 16:27:58 +03:00
ok = ( read_socket_data ( fd , inbuf , 4 ) = = 4 ) ;
1998-11-09 19:40:38 +03:00
if ( ! ok )
return ( - 1 ) ;
len = smb_len ( inbuf ) ;
msg_type = CVAL ( inbuf , 0 ) ;
if ( msg_type = = 0x85 )
DEBUG ( 5 , ( " Got keepalive packet \n " ) ) ;
}
DEBUG ( 10 , ( " got smb length of %d \n " , len ) ) ;
return ( len ) ;
}
/****************************************************************************
read 4 bytes of a smb packet and return the smb length of the packet
store the result in the buffer . This version of the function will
never return a session keepalive ( length of zero ) .
timeout is in milliseconds .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
ssize_t read_smb_length ( int fd , char * inbuf , unsigned int timeout )
{
ssize_t len ;
for ( ; ; )
{
len = read_smb_length_return_keepalive ( fd , inbuf , timeout ) ;
if ( len < 0 )
return len ;
/* Ignore session keepalives. */
if ( CVAL ( inbuf , 0 ) ! = 0x85 )
break ;
}
1999-12-13 16:27:58 +03:00
DEBUG ( 10 , ( " read_smb_length: got smb length of %d \n " , len ) ) ;
1998-11-09 19:40:38 +03:00
return len ;
}
/****************************************************************************
read an smb from a fd . Note that the buffer * MUST * be of size
BUFFER_SIZE + SAFETY_MARGIN .
The timeout is in milliseconds .
This function will return on a
receipt of a session keepalive packet .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
BOOL receive_smb ( int fd , char * buffer , unsigned int timeout )
{
2001-05-24 23:28:22 +04:00
ssize_t len , ret ;
1998-11-09 19:40:38 +03:00
2001-05-24 23:28:22 +04:00
smb_read_error = 0 ;
1998-11-09 19:40:38 +03:00
2001-05-24 23:28:22 +04:00
memset ( buffer , ' \0 ' , smb_size + 100 ) ;
1998-11-09 19:40:38 +03:00
2001-05-24 23:28:22 +04:00
len = read_smb_length_return_keepalive ( fd , buffer , timeout ) ;
if ( len < 0 ) {
DEBUG ( 10 , ( " receive_smb: length < 0! \n " ) ) ;
return ( False ) ;
}
1998-11-09 19:40:38 +03:00
2001-05-24 23:28:22 +04:00
/*
* A WRITEX with CAP_LARGE_WRITEX can be 64 k worth of data plus 65 bytes
* of header . Don ' t print the error if this fits . . . . JRA .
*/
1998-11-09 19:40:38 +03:00
2001-05-24 23:28:22 +04:00
if ( len > ( BUFFER_SIZE + LARGE_WRITEX_HDR_SIZE ) ) {
DEBUG ( 0 , ( " Invalid packet length! (%d bytes). \n " , len ) ) ;
2001-06-09 05:38:54 +04:00
if ( len > BUFFER_SIZE + ( SAFETY_MARGIN / 2 ) ) {
smb_read_error = READ_ERROR ;
return False ;
}
2001-05-24 23:28:22 +04:00
}
if ( len > 0 ) {
ret = read_socket_data ( fd , buffer + 4 , len ) ;
if ( ret ! = len ) {
smb_read_error = READ_ERROR ;
return False ;
}
}
return ( True ) ;
1998-11-09 19:40:38 +03:00
}
/****************************************************************************
read an smb from a fd ignoring all keepalive packets . Note that the buffer
* MUST * be of size BUFFER_SIZE + SAFETY_MARGIN .
The timeout is in milliseconds
This is exactly the same as receive_smb except that it never returns
a session keepalive packet ( just as receive_smb used to do ) .
receive_smb was changed to return keepalives as the oplock processing means this call
should never go into a blocking read .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
BOOL client_receive_smb ( int fd , char * buffer , unsigned int timeout )
{
BOOL ret ;
for ( ; ; )
{
ret = receive_smb ( fd , buffer , timeout ) ;
if ( ! ret )
{
DEBUG ( 10 , ( " client_receive_smb failed \n " ) ) ;
show_msg ( buffer ) ;
return ret ;
}
/* Ignore session keepalive packets. */
1999-12-13 16:27:58 +03:00
if ( CVAL ( buffer , 0 ) ! = 0x85 )
1998-11-09 19:40:38 +03:00
break ;
}
show_msg ( buffer ) ;
return ret ;
}
/****************************************************************************
send an smb to a fd
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
BOOL send_smb ( int fd , char * buffer )
{
2001-06-09 05:38:54 +04:00
size_t len ;
size_t nwritten = 0 ;
ssize_t ret ;
len = smb_len ( buffer ) + 4 ;
while ( nwritten < len ) {
ret = write_socket ( fd , buffer + nwritten , len - nwritten ) ;
if ( ret < = 0 ) {
DEBUG ( 0 , ( " Error writing %d bytes to client. %d. (%s) \n " ,
( int ) len , ( int ) ret , strerror ( errno ) ) ) ;
return False ;
}
nwritten + = ret ;
}
1998-11-09 19:40:38 +03:00
2001-06-09 05:38:54 +04:00
return True ;
1998-11-09 19:40:38 +03:00
}
/****************************************************************************
send a single packet to a port on another machine
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
BOOL send_one_packet ( char * buf , int len , struct in_addr ip , int port , int type )
{
BOOL ret ;
int out_fd ;
struct sockaddr_in sock_out ;
/* create a socket to write to */
out_fd = socket ( AF_INET , type , 0 ) ;
if ( out_fd = = - 1 )
{
DEBUG ( 0 , ( " socket failed " ) ) ;
return False ;
}
/* set the address and port */
1999-12-13 16:27:58 +03:00
memset ( ( char * ) & sock_out , ' \0 ' , sizeof ( sock_out ) ) ;
1998-11-09 19:40:38 +03:00
putip ( ( char * ) & sock_out . sin_addr , ( char * ) & ip ) ;
sock_out . sin_port = htons ( port ) ;
sock_out . sin_family = AF_INET ;
if ( DEBUGLEVEL > 0 )
DEBUG ( 3 , ( " sending a packet of len %d to (%s) on port %d of type %s \n " ,
len , inet_ntoa ( ip ) , port , type = = SOCK_DGRAM ? " DGRAM " : " STREAM " ) ) ;
/* send it */
ret = ( sendto ( out_fd , buf , len , 0 , ( struct sockaddr * ) & sock_out , sizeof ( sock_out ) ) > = 0 ) ;
if ( ! ret )
DEBUG ( 0 , ( " Packet send to %s(%d) failed ERRNO=%s \n " ,
inet_ntoa ( ip ) , port , strerror ( errno ) ) ) ;
close ( out_fd ) ;
return ( ret ) ;
}
/****************************************************************************
open a socket of the specified type , port and address for incoming data
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
int open_socket_in ( int type , int port , int dlevel , uint32 socket_addr , BOOL rebind )
1998-11-09 19:40:38 +03:00
{
struct hostent * hp ;
struct sockaddr_in sock ;
pstring host_name ;
int res ;
/* get my host name */
if ( gethostname ( host_name , MAXHOSTNAMELEN ) = = - 1 )
{ DEBUG ( 0 , ( " gethostname failed \n " ) ) ; return - 1 ; }
/* get host info */
2001-06-18 09:42:18 +04:00
if ( ( hp = sys_gethostbyname ( host_name ) ) = = 0 )
1998-11-09 19:40:38 +03:00
{
2001-06-18 09:42:18 +04:00
DEBUG ( 0 , ( " sys_gethostbyname: Unknown host %s \n " , host_name ) ) ;
1998-11-09 19:40:38 +03:00
return - 1 ;
}
1999-12-13 16:27:58 +03:00
memset ( ( char * ) & sock , ' \0 ' , sizeof ( sock ) ) ;
1998-11-09 19:40:38 +03:00
memcpy ( ( char * ) & sock . sin_addr , ( char * ) hp - > h_addr , hp - > h_length ) ;
# ifdef HAVE_SOCK_SIN_LEN
sock . sin_len = sizeof ( sock ) ;
# endif
sock . sin_port = htons ( port ) ;
sock . sin_family = hp - > h_addrtype ;
sock . sin_addr . s_addr = socket_addr ;
res = socket ( hp - > h_addrtype , type , 0 ) ;
if ( res = = - 1 )
{ DEBUG ( 0 , ( " socket failed \n " ) ) ; return - 1 ; }
{
1999-12-13 16:27:58 +03:00
int val = 1 ;
if ( rebind )
val = 1 ;
else
val = 0 ;
2000-02-17 01:48:19 +03:00
if ( setsockopt ( res , SOL_SOCKET , SO_REUSEADDR , ( char * ) & val , sizeof ( val ) ) = = - 1 )
DEBUG ( dlevel , ( " setsockopt: SO_REUSEADDR=%d on port %d failed with error = %s \n " ,
val , port , strerror ( errno ) ) ) ;
# ifdef SO_REUSEPORT
if ( setsockopt ( res , SOL_SOCKET , SO_REUSEPORT , ( char * ) & val , sizeof ( val ) ) = = - 1 )
DEBUG ( dlevel , ( " setsockopt: SO_REUSEPORT=%d on port %d failed with error = %s \n " ,
val , port , strerror ( errno ) ) ) ;
# endif /* SO_REUSEPORT */
1998-11-09 19:40:38 +03:00
}
/* now we've got a socket - we need to bind it */
if ( bind ( res , ( struct sockaddr * ) & sock , sizeof ( sock ) ) < 0 )
{
if ( port ) {
if ( port = = SMB_PORT | | port = = NMB_PORT )
DEBUG ( dlevel , ( " bind failed on port %d socket_addr=%s (%s) \n " ,
port , inet_ntoa ( sock . sin_addr ) , strerror ( errno ) ) ) ;
close ( res ) ;
if ( dlevel > 0 & & port < 1000 )
port = 7999 ;
if ( port > = 1000 & & port < 9000 )
1999-12-13 16:27:58 +03:00
return ( open_socket_in ( type , port + 1 , dlevel , socket_addr , rebind ) ) ;
1998-11-09 19:40:38 +03:00
}
return ( - 1 ) ;
}
DEBUG ( 3 , ( " bind succeeded on port %d \n " , port ) ) ;
return res ;
}
/****************************************************************************
1999-12-13 16:27:58 +03:00
create an outgoing socket . timeout is in milliseconds .
1998-11-09 19:40:38 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-11-09 19:40:38 +03:00
int open_socket_out ( int type , struct in_addr * addr , int port , int timeout )
{
struct sockaddr_in sock_out ;
int res , ret ;
int connect_loop = 250 ; /* 250 milliseconds */
1999-12-13 16:27:58 +03:00
int loops = ( timeout ) / connect_loop ;
1998-11-09 19:40:38 +03:00
/* create a socket to write to */
res = socket ( PF_INET , type , 0 ) ;
if ( res = = - 1 )
{ DEBUG ( 0 , ( " socket error \n " ) ) ; return - 1 ; }
if ( type ! = SOCK_STREAM ) return ( res ) ;
1999-12-13 16:27:58 +03:00
memset ( ( char * ) & sock_out , ' \0 ' , sizeof ( sock_out ) ) ;
1998-11-09 19:40:38 +03:00
putip ( ( char * ) & sock_out . sin_addr , ( char * ) addr ) ;
sock_out . sin_port = htons ( port ) ;
sock_out . sin_family = PF_INET ;
/* set it non-blocking */
set_blocking ( res , False ) ;
DEBUG ( 3 , ( " Connecting to %s at port %d \n " , inet_ntoa ( * addr ) , port ) ) ;
/* and connect it to the destination */
connect_again :
ret = connect ( res , ( struct sockaddr * ) & sock_out , sizeof ( sock_out ) ) ;
/* Some systems return EAGAIN when they mean EINPROGRESS */
if ( ret < 0 & & ( errno = = EINPROGRESS | | errno = = EALREADY | |
errno = = EAGAIN ) & & loops - - ) {
msleep ( connect_loop ) ;
goto connect_again ;
}
if ( ret < 0 & & ( errno = = EINPROGRESS | | errno = = EALREADY | |
errno = = EAGAIN ) ) {
DEBUG ( 1 , ( " timeout connecting to %s:%d \n " , inet_ntoa ( * addr ) , port ) ) ;
close ( res ) ;
return - 1 ;
}
# ifdef EISCONN
if ( ret < 0 & & errno = = EISCONN ) {
errno = 0 ;
ret = 0 ;
}
# endif
if ( ret < 0 ) {
DEBUG ( 1 , ( " error connecting to %s:%d (%s) \n " ,
inet_ntoa ( * addr ) , port , strerror ( errno ) ) ) ;
close ( res ) ;
return - 1 ;
}
/* set it blocking again */
set_blocking ( res , True ) ;
return res ;
}
2000-04-11 17:55:53 +04:00
/* the following 3 client_*() functions are nasty ways of allowing
some generic functions to get info that really should be hidden in
particular modules */
static int client_fd = - 1 ;
void client_setfd ( int fd )
{
client_fd = fd ;
}
char * client_name ( void )
{
return get_socket_name ( client_fd ) ;
}
char * client_addr ( void )
{
return get_socket_addr ( client_fd ) ;
}
1998-11-09 19:40:38 +03:00
/*******************************************************************
2000-04-11 17:55:53 +04:00
matchname - determine if host name matches IP address . Used to
confirm a hostname lookup to prevent spoof attacks
1998-11-09 19:40:38 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-04-11 17:55:53 +04:00
static BOOL matchname ( char * remotehost , struct in_addr addr )
1998-11-09 19:40:38 +03:00
{
struct hostent * hp ;
2000-04-11 17:55:53 +04:00
int i ;
1998-11-09 19:40:38 +03:00
2001-06-18 09:42:18 +04:00
if ( ( hp = sys_gethostbyname ( remotehost ) ) = = 0 ) {
DEBUG ( 0 , ( " sys_gethostbyname(%s): lookup failure. \n " , remotehost ) ) ;
2000-04-11 17:55:53 +04:00
return False ;
}
/*
* Make sure that gethostbyname ( ) returns the " correct " host name .
* Unfortunately , gethostbyname ( " localhost " ) sometimes yields
* " localhost.domain " . Since the latter host name comes from the
* local DNS , we just have to trust it ( all bets are off if the local
* DNS is perverted ) . We always check the address list , though .
*/
1998-11-09 19:40:38 +03:00
2000-04-11 17:55:53 +04:00
if ( strcasecmp ( remotehost , hp - > h_name )
& & strcasecmp ( remotehost , " localhost " ) ) {
DEBUG ( 0 , ( " host name/name mismatch: %s != %s \n " ,
remotehost , hp - > h_name ) ) ;
return False ;
1998-11-09 19:40:38 +03:00
}
2000-04-11 17:55:53 +04:00
/* Look up the host address in the address list we just got. */
for ( i = 0 ; hp - > h_addr_list [ i ] ; i + + ) {
if ( memcmp ( hp - > h_addr_list [ i ] , ( caddr_t ) & addr , sizeof ( addr ) ) = = 0 )
return True ;
1998-11-09 19:40:38 +03:00
}
2000-04-11 17:55:53 +04:00
/*
* The host name does not map to the original host address . Perhaps
* someone has compromised a name server . More likely someone botched
* it , but that could be dangerous , too .
*/
DEBUG ( 0 , ( " host name/address mismatch: %s != %s \n " ,
inet_ntoa ( addr ) , hp - > h_name ) ) ;
return False ;
}
/*******************************************************************
return the DNS name of the remote end of a socket
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
char * get_socket_name ( int fd )
{
static pstring name_buf ;
static fstring addr_buf ;
struct hostent * hp ;
struct in_addr addr ;
char * p ;
p = get_socket_addr ( fd ) ;
/* it might be the same as the last one - save some DNS work */
if ( strcmp ( p , addr_buf ) = = 0 ) return name_buf ;
pstrcpy ( name_buf , " UNKNOWN " ) ;
if ( fd = = - 1 ) return name_buf ;
fstrcpy ( addr_buf , p ) ;
2000-04-14 08:34:08 +04:00
addr = * interpret_addr2 ( p ) ;
2000-04-11 17:55:53 +04:00
1998-11-09 19:40:38 +03:00
/* Look up the remote host name. */
2000-04-11 17:55:53 +04:00
if ( ( hp = gethostbyaddr ( ( char * ) & addr . s_addr , sizeof ( addr . s_addr ) , AF_INET ) ) = = 0 ) {
DEBUG ( 1 , ( " Gethostbyaddr failed for %s \n " , p ) ) ;
pstrcpy ( name_buf , p ) ;
1998-11-09 19:40:38 +03:00
} else {
2000-04-11 17:55:53 +04:00
pstrcpy ( name_buf , ( char * ) hp - > h_name ) ;
if ( ! matchname ( name_buf , addr ) ) {
DEBUG ( 0 , ( " Matchname failed on %s %s \n " , name_buf , p ) ) ;
1998-11-09 19:40:38 +03:00
pstrcpy ( name_buf , " UNKNOWN " ) ;
}
}
return name_buf ;
}
/*******************************************************************
2000-04-11 17:55:53 +04:00
return the IP addr of the remote end of a socket as a string
1998-11-09 19:40:38 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-04-11 17:55:53 +04:00
char * get_socket_addr ( int fd )
1998-11-09 19:40:38 +03:00
{
struct sockaddr sa ;
struct sockaddr_in * sockin = ( struct sockaddr_in * ) ( & sa ) ;
int length = sizeof ( sa ) ;
static fstring addr_buf ;
fstrcpy ( addr_buf , " 0.0.0.0 " ) ;
if ( fd = = - 1 ) {
return addr_buf ;
}
if ( getpeername ( fd , & sa , & length ) < 0 ) {
1998-11-13 05:07:07 +03:00
DEBUG ( 0 , ( " getpeername failed. Error was %s \n " , strerror ( errno ) ) ) ;
1998-11-09 19:40:38 +03:00
return addr_buf ;
}
fstrcpy ( addr_buf , ( char * ) inet_ntoa ( sockin - > sin_addr ) ) ;
return addr_buf ;
}
2000-01-03 22:19:48 +03:00
/*******************************************************************
opens and connects to a unix pipe socket
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
int open_pipe_sock ( char * path )
{
int sock ;
struct sockaddr_un sa ;
sock = socket ( AF_UNIX , SOCK_STREAM , 0 ) ;
if ( sock < 0 )
{
DEBUG ( 0 , ( " unix socket open failed \n " ) ) ;
return sock ;
}
ZERO_STRUCT ( sa ) ;
sa . sun_family = AF_UNIX ;
safe_strcpy ( sa . sun_path , path , sizeof ( sa . sun_path ) - 1 ) ;
DEBUG ( 10 , ( " socket open succeeded. file name: %s \n " , sa . sun_path ) ) ;
if ( connect ( sock , ( struct sockaddr * ) & sa , sizeof ( sa ) ) < 0 )
{
DEBUG ( 0 , ( " socket connect to %s failed \n " , sa . sun_path ) ) ;
close ( sock ) ;
return - 1 ;
}
return sock ;
}
int create_pipe_socket ( char * dir , int dir_perms ,
char * path , int path_perms )
{
int s ;
struct sockaddr_un sa ;
DEBUG ( 0 , ( " create_pipe_socket: %s %d %s %d \n " ,
dir , dir_perms , path , path_perms ) ) ;
DEBUG ( 0 , ( " *** RACE CONDITION. PLEASE SOMEONE EXAMINE create_pipe_Socket AND FIX IT *** \n " ) ) ;
mkdir ( dir , dir_perms ) ;
if ( chmod ( dir , dir_perms ) < 0 )
{
DEBUG ( 0 , ( " chmod on %s failed \n " , dir ) ) ;
return - 1 ;
}
if ( ! remove ( path ) )
{
DEBUG ( 0 , ( " remove on %s failed \n " , path ) ) ;
}
/* start listening on unix socket */
s = socket ( AF_UNIX , SOCK_STREAM , 0 ) ;
if ( s < 0 )
{
DEBUG ( 0 , ( " socket open failed \n " ) ) ;
return - 1 ;
}
ZERO_STRUCT ( sa ) ;
sa . sun_family = AF_UNIX ;
safe_strcpy ( sa . sun_path , path , sizeof ( sa . sun_path ) - 1 ) ;
if ( bind ( s , ( struct sockaddr * ) & sa , sizeof ( sa ) ) < 0 )
{
DEBUG ( 0 , ( " socket bind to %s failed \n " , sa . sun_path ) ) ;
close ( s ) ;
remove ( path ) ;
return - 1 ;
}
if ( s = = - 1 )
{
DEBUG ( 0 , ( " bind failed \n " ) ) ;
remove ( path ) ;
return - 1 ;
}
if ( path_perms ! = 0 )
{
chmod ( path , path_perms ) ;
}
if ( listen ( s , 5 ) = = - 1 )
{
DEBUG ( 0 , ( " listen failed \n " ) ) ;
return - 1 ;
}
DEBUG ( 5 , ( " unix socket opened: %s \n " , path ) ) ;
return s ;
}
2001-06-22 19:14:45 +04:00
/*******************************************************************
this is like socketpair but uses tcp . It is used by the Samba
2001-06-25 04:46:34 +04:00
regression test code
The function guarantees that nobody else can attach to the socket ,
or if they do that this function fails and the socket gets closed
returns 0 on success , - 1 on failure
the resulting file descriptors are symmetrical
2001-06-22 19:14:45 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static int socketpair_tcp ( int fd [ 2 ] )
{
int listener ;
2001-07-03 07:56:49 +04:00
struct sockaddr_in sock ;
2001-06-27 17:58:44 +04:00
struct sockaddr_in sock2 ;
2001-06-22 19:14:45 +04:00
socklen_t socklen = sizeof ( sock ) ;
int connect_done = 0 ;
2001-06-25 04:46:34 +04:00
2001-06-22 19:14:45 +04:00
fd [ 0 ] = fd [ 1 ] = listener = - 1 ;
memset ( & sock , 0 , sizeof ( sock ) ) ;
if ( ( listener = socket ( PF_INET , SOCK_STREAM , 0 ) ) = = - 1 ) goto failed ;
2001-06-27 17:58:44 +04:00
memset ( & sock2 , 0 , sizeof ( sock2 ) ) ;
# ifdef HAVE_SOCK_SIN_LEN
sock2 . sin_len = sizeof ( sock2 ) ;
# endif
sock2 . sin_family = PF_INET ;
bind ( listener , ( struct sockaddr * ) & sock2 , sizeof ( sock2 ) ) ;
2001-06-22 19:14:45 +04:00
if ( listen ( listener , 1 ) ! = 0 ) goto failed ;
2001-07-03 07:56:49 +04:00
if ( getsockname ( listener , ( struct sockaddr * ) & sock , & socklen ) ! = 0 ) goto failed ;
2001-06-22 19:14:45 +04:00
if ( ( fd [ 1 ] = socket ( PF_INET , SOCK_STREAM , 0 ) ) = = - 1 ) goto failed ;
set_blocking ( fd [ 1 ] , 0 ) ;
2001-07-03 07:56:49 +04:00
sock . sin_addr . s_addr = htonl ( INADDR_LOOPBACK ) ;
2001-06-22 19:14:45 +04:00
if ( connect ( fd [ 1 ] , ( struct sockaddr * ) & sock , sizeof ( sock ) ) = = - 1 ) {
if ( errno ! = EINPROGRESS ) goto failed ;
} else {
connect_done = 1 ;
}
2001-07-03 07:56:49 +04:00
if ( ( fd [ 0 ] = accept ( listener , ( struct sockaddr * ) & sock , & socklen ) ) = = - 1 ) goto failed ;
2001-06-22 19:14:45 +04:00
close ( listener ) ;
if ( connect_done = = 0 ) {
2001-06-27 14:44:14 +04:00
if ( connect ( fd [ 1 ] , ( struct sockaddr * ) & sock , sizeof ( sock ) ) ! = 0
& & errno ! = EISCONN ) goto failed ;
2001-06-22 19:14:45 +04:00
}
set_blocking ( fd [ 1 ] , 1 ) ;
/* all OK! */
return 0 ;
failed :
if ( fd [ 0 ] ! = - 1 ) close ( fd [ 0 ] ) ;
if ( fd [ 1 ] ! = - 1 ) close ( fd [ 1 ] ) ;
if ( listener ! = - 1 ) close ( listener ) ;
return - 1 ;
}
/*******************************************************************
run a program on a local tcp socket , this is used to launch smbd
2001-06-25 04:46:34 +04:00
when regression testing
the return value is a socket which is attached to a subprocess
running " prog " . stdin and stdout are attached . stderr is left
attached to the original stderr
2001-06-22 19:14:45 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2001-06-25 04:46:34 +04:00
int sock_exec ( const char * prog )
2001-06-22 19:14:45 +04:00
{
int fd [ 2 ] ;
2001-07-03 07:56:49 +04:00
if ( socketpair_tcp ( fd ) ! = 0 ) {
DEBUG ( 0 , ( " socketpair_tcp failed (%s) \n " , strerror ( errno ) ) ) ;
return - 1 ;
}
2001-06-22 19:14:45 +04:00
if ( fork ( ) = = 0 ) {
close ( fd [ 0 ] ) ;
close ( 0 ) ;
close ( 1 ) ;
dup ( fd [ 1 ] ) ;
dup ( fd [ 1 ] ) ;
exit ( system ( prog ) ) ;
}
close ( fd [ 1 ] ) ;
return fd [ 0 ] ;
}
2001-06-25 04:46:34 +04:00