Mercurial > dovecot > core-2.2
annotate src/lib/network.c @ 680:84e398270f7f HEAD
net_accept() returns now -2 for fatal failures.
author | Timo Sirainen <tss@iki.fi> |
---|---|
date | Tue, 26 Nov 2002 15:27:13 +0200 |
parents | e4aba04143ad |
children | 1cc947617c8b |
rev | line source |
---|---|
0 | 1 /* |
2 network.c : Network stuff with IPv6 support | |
3 | |
4 Copyright (c) 1999-2002 Timo Sirainen | |
5 | |
6 Permission is hereby granted, free of charge, to any person obtaining | |
7 a copy of this software and associated documentation files (the | |
8 "Software"), to deal in the Software without restriction, including | |
9 without limitation the rights to use, copy, modify, merge, publish, | |
10 distribute, sublicense, and/or sell copies of the Software, and to | |
11 permit persons to whom the Software is furnished to do so, subject to | |
12 the following conditions: | |
13 | |
14 The above copyright notice and this permission notice shall be | |
15 included in all copies or substantial portions of the Software. | |
16 | |
17 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS | |
18 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF | |
19 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. | |
20 IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY | |
21 CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, | |
22 TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE | |
23 SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. | |
24 */ | |
25 | |
26 #include "lib.h" | |
27 #include "network.h" | |
28 | |
29 #include <unistd.h> | |
30 #include <fcntl.h> | |
31 #include <ctype.h> | |
32 #include <sys/un.h> | |
33 #include <netinet/tcp.h> | |
34 | |
35 #define LISTEN_BACKLOG 8 | |
36 | |
37 union sockaddr_union { | |
38 struct sockaddr sa; | |
39 struct sockaddr_in sin; | |
40 #ifdef HAVE_IPV6 | |
41 struct sockaddr_in6 sin6; | |
42 #endif | |
43 }; | |
44 | |
45 #ifdef HAVE_IPV6 | |
46 # define SIZEOF_SOCKADDR(so) ((so).sa.sa_family == AF_INET6 ? \ | |
47 sizeof(so.sin6) : sizeof(so.sin)) | |
48 #else | |
49 # define SIZEOF_SOCKADDR(so) (sizeof(so.sin)) | |
50 #endif | |
51 | |
52 int net_ip_compare(IPADDR *ip1, IPADDR *ip2) | |
53 { | |
54 if (ip1->family != ip2->family) | |
55 return 0; | |
56 | |
57 #ifdef HAVE_IPV6 | |
58 if (ip1->family == AF_INET6) | |
59 return memcmp(&ip1->ip, &ip2->ip, sizeof(ip1->ip)) == 0; | |
60 #endif | |
61 | |
62 return memcmp(&ip1->ip, &ip2->ip, 4) == 0; | |
63 } | |
64 | |
65 | |
66 /* copy IP to sockaddr */ | |
67 static inline void sin_set_ip(union sockaddr_union *so, const IPADDR *ip) | |
68 { | |
69 if (ip == NULL) { | |
70 #ifdef HAVE_IPV6 | |
71 so->sin6.sin6_family = AF_INET6; | |
72 so->sin6.sin6_addr = in6addr_any; | |
73 #else | |
74 so->sin.sin_family = AF_INET; | |
75 so->sin.sin_addr.s_addr = INADDR_ANY; | |
76 #endif | |
77 return; | |
78 } | |
79 | |
80 so->sin.sin_family = ip->family; | |
81 #ifdef HAVE_IPV6 | |
82 if (ip->family == AF_INET6) | |
83 memcpy(&so->sin6.sin6_addr, &ip->ip, sizeof(ip->ip)); | |
84 else | |
85 #endif | |
86 memcpy(&so->sin.sin_addr, &ip->ip, 4); | |
87 } | |
88 | |
89 static inline void sin_get_ip(const union sockaddr_union *so, IPADDR *ip) | |
90 { | |
91 ip->family = so->sin.sin_family; | |
92 | |
93 #ifdef HAVE_IPV6 | |
94 if (ip->family == AF_INET6) | |
95 memcpy(&ip->ip, &so->sin6.sin6_addr, sizeof(ip->ip)); | |
96 else | |
97 #endif | |
98 memcpy(&ip->ip, &so->sin.sin_addr, 4); | |
99 } | |
100 | |
349 | 101 static inline void sin_set_port(union sockaddr_union *so, unsigned int port) |
0 | 102 { |
103 #ifdef HAVE_IPV6 | |
104 if (so->sin.sin_family == AF_INET6) | |
105 so->sin6.sin6_port = htons((unsigned short) port); | |
106 else | |
107 #endif | |
108 so->sin.sin_port = htons((unsigned short) port); | |
109 } | |
110 | |
349 | 111 static inline unsigned int sin_get_port(union sockaddr_union *so) |
0 | 112 { |
113 #ifdef HAVE_IPV6 | |
114 if (so->sin.sin_family == AF_INET6) | |
115 return ntohs(so->sin6.sin6_port); | |
116 #endif | |
117 return ntohs(so->sin.sin_port); | |
118 } | |
119 | |
120 static inline void close_save_errno(int fd) | |
121 { | |
122 int old_errno = errno; | |
123 close(fd); | |
124 errno = old_errno; | |
125 } | |
126 | |
127 /* Connect to socket with ip address */ | |
349 | 128 int net_connect_ip(IPADDR *ip, unsigned int port, IPADDR *my_ip) |
0 | 129 { |
130 union sockaddr_union so; | |
131 int fd, ret, opt = 1; | |
132 | |
133 if (my_ip != NULL && ip->family != my_ip->family) { | |
134 i_warning("net_connect_ip(): ip->family != my_ip->family"); | |
135 my_ip = NULL; | |
136 } | |
137 | |
138 /* create the socket */ | |
139 memset(&so, 0, sizeof(so)); | |
140 so.sin.sin_family = ip->family; | |
141 fd = socket(ip->family, SOCK_STREAM, 0); | |
142 | |
143 if (fd == -1) | |
144 return -1; | |
145 | |
146 /* set socket options */ | |
147 net_set_nonblock(fd, TRUE); | |
148 setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &opt, sizeof(opt)); | |
149 setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &opt, sizeof(opt)); | |
150 | |
151 /* set our own address */ | |
152 if (my_ip != NULL) { | |
153 sin_set_ip(&so, my_ip); | |
154 if (bind(fd, &so.sa, SIZEOF_SOCKADDR(so)) == -1) { | |
155 /* failed, set it back to INADDR_ANY */ | |
156 sin_set_ip(&so, NULL); | |
157 bind(fd, &so.sa, SIZEOF_SOCKADDR(so)); | |
158 } | |
159 } | |
160 | |
161 /* connect */ | |
162 sin_set_ip(&so, ip); | |
163 sin_set_port(&so, port); | |
164 ret = connect(fd, &so.sa, SIZEOF_SOCKADDR(so)); | |
165 | |
166 #ifndef WIN32 | |
167 if (ret < 0 && errno != EINPROGRESS) | |
168 #else | |
169 if (ret < 0 && WSAGetLastError() != WSAEWOULDBLOCK) | |
170 #endif | |
171 { | |
172 close_save_errno(fd); | |
173 return -1; | |
174 } | |
175 | |
176 return fd; | |
177 } | |
178 | |
179 int net_connect_unix(const char *path) | |
180 { | |
181 struct sockaddr_un sa; | |
182 int fd, ret; | |
183 | |
184 if (strlen(path) > sizeof(sa.sun_path)-1) { | |
185 /* too long path */ | |
186 errno = EINVAL; | |
187 return -1; | |
188 } | |
189 | |
190 /* create the socket */ | |
191 fd = socket(PF_UNIX, SOCK_STREAM, 0); | |
192 if (fd == -1) | |
193 return -1; | |
194 | |
195 /* set socket options */ | |
196 net_set_nonblock(fd, TRUE); | |
197 | |
198 /* connect */ | |
199 memset(&sa, 0, sizeof(sa)); | |
200 sa.sun_family = AF_UNIX; | |
201 strcpy(sa.sun_path, path); | |
202 | |
203 ret = connect(fd, (struct sockaddr *) &sa, sizeof(sa)); | |
204 if (ret < 0 && errno != EINPROGRESS) { | |
205 close_save_errno(fd); | |
206 return -1; | |
207 } | |
208 | |
209 return fd; | |
210 } | |
211 | |
212 /* Disconnect socket */ | |
213 void net_disconnect(int fd) | |
214 { | |
388
792fc5b3daa4
Send error message if close() fails in net_disconnect().
Timo Sirainen <tss@iki.fi>
parents:
349
diff
changeset
|
215 if (close(fd) < 0) |
792fc5b3daa4
Send error message if close() fails in net_disconnect().
Timo Sirainen <tss@iki.fi>
parents:
349
diff
changeset
|
216 i_error("net_disconnect() failed: %m"); |
0 | 217 } |
218 | |
219 /* Set socket blocking/nonblocking */ | |
34
a3d77e73f99b
fixed compile warnings with some systems
Timo Sirainen <tss@iki.fi>
parents:
0
diff
changeset
|
220 void net_set_nonblock(int fd __attr_unused__, int nonblock __attr_unused__) |
0 | 221 { |
222 #ifdef HAVE_FCNTL | |
223 if (fcntl(fd, F_SETFL, nonblock ? O_NONBLOCK : 0) < 0) | |
628 | 224 i_fatal("net_set_nonblock() failed: %m"); |
0 | 225 #endif |
226 } | |
227 | |
410
1f0e7229ee58
Split IOBuffer into mmaped IBuffer, file IBuffer, memory data IBuffer and
Timo Sirainen <tss@iki.fi>
parents:
404
diff
changeset
|
228 int net_set_cork(int fd __attr_unused__, int cork __attr_unused__) |
0 | 229 { |
230 #ifdef TCP_CORK | |
410
1f0e7229ee58
Split IOBuffer into mmaped IBuffer, file IBuffer, memory data IBuffer and
Timo Sirainen <tss@iki.fi>
parents:
404
diff
changeset
|
231 return setsockopt(fd, SOL_TCP, TCP_CORK, &cork, sizeof(cork)); |
1f0e7229ee58
Split IOBuffer into mmaped IBuffer, file IBuffer, memory data IBuffer and
Timo Sirainen <tss@iki.fi>
parents:
404
diff
changeset
|
232 #else |
1f0e7229ee58
Split IOBuffer into mmaped IBuffer, file IBuffer, memory data IBuffer and
Timo Sirainen <tss@iki.fi>
parents:
404
diff
changeset
|
233 errno = ENOPROTOOPT; |
1f0e7229ee58
Split IOBuffer into mmaped IBuffer, file IBuffer, memory data IBuffer and
Timo Sirainen <tss@iki.fi>
parents:
404
diff
changeset
|
234 return -1; |
0 | 235 #endif |
236 } | |
237 | |
238 /* Listen for connections on a socket. if `my_ip' is NULL, listen in any | |
239 address. */ | |
349 | 240 int net_listen(IPADDR *my_ip, unsigned int *port) |
0 | 241 { |
242 union sockaddr_union so; | |
243 int ret, fd, opt = 1; | |
244 socklen_t len; | |
245 | |
246 i_assert(port != NULL); | |
247 | |
248 memset(&so, 0, sizeof(so)); | |
249 sin_set_port(&so, *port); | |
250 sin_set_ip(&so, my_ip); | |
251 | |
252 /* create the socket */ | |
253 fd = socket(so.sin.sin_family, SOCK_STREAM, 0); | |
254 #ifdef HAVE_IPV6 | |
255 if (fd == -1 && (errno == EINVAL || errno == EAFNOSUPPORT)) { | |
256 /* IPv6 is not supported by OS */ | |
257 so.sin.sin_family = AF_INET; | |
258 so.sin.sin_addr.s_addr = INADDR_ANY; | |
259 | |
260 fd = socket(AF_INET, SOCK_STREAM, 0); | |
261 } | |
262 #endif | |
263 if (fd == -1) | |
264 return -1; | |
265 | |
266 /* set socket options */ | |
267 net_set_nonblock(fd, TRUE); | |
268 setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &opt, sizeof(opt)); | |
269 setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &opt, sizeof(opt)); | |
270 | |
271 /* specify the address/port we want to listen in */ | |
272 ret = bind(fd, &so.sa, SIZEOF_SOCKADDR(so)); | |
273 if (ret >= 0) { | |
274 /* get the actual port we started listen */ | |
275 len = SIZEOF_SOCKADDR(so); | |
276 ret = getsockname(fd, &so.sa, &len); | |
277 if (ret >= 0) { | |
278 *port = sin_get_port(&so); | |
279 | |
280 /* start listening */ | |
281 if (listen(fd, LISTEN_BACKLOG) >= 0) | |
282 return fd; | |
283 } | |
284 | |
285 } | |
286 | |
287 /* error */ | |
288 close_save_errno(fd); | |
289 return -1; | |
290 } | |
291 | |
292 int net_listen_unix(const char *path) | |
293 { | |
294 struct sockaddr_un sa; | |
295 int fd; | |
296 | |
297 if (strlen(path) > sizeof(sa.sun_path)-1) { | |
298 /* too long path */ | |
299 errno = EINVAL; | |
300 return -1; | |
301 } | |
302 | |
303 /* create the socket */ | |
304 fd = socket(PF_UNIX, SOCK_STREAM, 0); | |
305 if (fd == -1) | |
306 return -1; | |
307 | |
308 /* set socket options */ | |
309 net_set_nonblock(fd, TRUE); | |
310 | |
311 /* bind */ | |
312 memset(&sa, 0, sizeof(sa)); | |
313 sa.sun_family = AF_UNIX; | |
314 strcpy(sa.sun_path, path); | |
315 | |
316 if (bind(fd, (struct sockaddr *) &sa, sizeof(sa)) == 0) { | |
317 /* start listening */ | |
318 if (listen(fd, LISTEN_BACKLOG) == 0) | |
319 return fd; | |
320 } | |
321 | |
322 close_save_errno(fd); | |
323 return -1; | |
324 } | |
325 | |
326 /* Accept a connection on a socket */ | |
349 | 327 int net_accept(int fd, IPADDR *addr, unsigned int *port) |
0 | 328 { |
329 union sockaddr_union so; | |
330 int ret; | |
331 socklen_t addrlen; | |
332 | |
333 i_assert(fd >= 0); | |
334 | |
335 addrlen = sizeof(so); | |
336 ret = accept(fd, &so.sa, &addrlen); | |
337 | |
680
84e398270f7f
net_accept() returns now -2 for fatal failures.
Timo Sirainen <tss@iki.fi>
parents:
628
diff
changeset
|
338 if (ret < 0) { |
84e398270f7f
net_accept() returns now -2 for fatal failures.
Timo Sirainen <tss@iki.fi>
parents:
628
diff
changeset
|
339 if (errno == EBADF || errno == ENOTSOCK || |
84e398270f7f
net_accept() returns now -2 for fatal failures.
Timo Sirainen <tss@iki.fi>
parents:
628
diff
changeset
|
340 errno == EOPNOTSUPP || errno == EFAULT || errno == EINVAL) |
84e398270f7f
net_accept() returns now -2 for fatal failures.
Timo Sirainen <tss@iki.fi>
parents:
628
diff
changeset
|
341 return -2; |
84e398270f7f
net_accept() returns now -2 for fatal failures.
Timo Sirainen <tss@iki.fi>
parents:
628
diff
changeset
|
342 else |
84e398270f7f
net_accept() returns now -2 for fatal failures.
Timo Sirainen <tss@iki.fi>
parents:
628
diff
changeset
|
343 return -1; |
84e398270f7f
net_accept() returns now -2 for fatal failures.
Timo Sirainen <tss@iki.fi>
parents:
628
diff
changeset
|
344 } |
0 | 345 |
346 if (addr != NULL) sin_get_ip(&so, addr); | |
347 if (port != NULL) *port = sin_get_port(&so); | |
348 | |
159
e0193106a95d
net_accept() set listening socket nonblocking, not the new socket. thanks to
Timo Sirainen <tss@iki.fi>
parents:
64
diff
changeset
|
349 net_set_nonblock(ret, TRUE); |
0 | 350 return ret; |
351 } | |
352 | |
353 /* Read data from socket, return number of bytes read, -1 = error */ | |
183
4a7ab9e94f25
size_t fixes for lib/. Changed OFF_T_FORMAT to PRIuOFF_T which is more
Timo Sirainen <tss@iki.fi>
parents:
159
diff
changeset
|
354 ssize_t net_receive(int fd, void *buf, size_t len) |
0 | 355 { |
183
4a7ab9e94f25
size_t fixes for lib/. Changed OFF_T_FORMAT to PRIuOFF_T which is more
Timo Sirainen <tss@iki.fi>
parents:
159
diff
changeset
|
356 ssize_t ret; |
0 | 357 |
358 i_assert(fd >= 0); | |
359 i_assert(buf != NULL); | |
183
4a7ab9e94f25
size_t fixes for lib/. Changed OFF_T_FORMAT to PRIuOFF_T which is more
Timo Sirainen <tss@iki.fi>
parents:
159
diff
changeset
|
360 i_assert(len <= SSIZE_T_MAX); |
0 | 361 |
362 ret = recv(fd, buf, len, 0); | |
363 if (ret == 0) | |
364 return -1; /* disconnected */ | |
365 | |
366 if (ret < 0 && (errno == EINTR || errno == EAGAIN)) | |
367 return 0; | |
368 | |
369 return ret; | |
370 } | |
371 | |
372 /* Transmit data, return number of bytes sent, -1 = error */ | |
183
4a7ab9e94f25
size_t fixes for lib/. Changed OFF_T_FORMAT to PRIuOFF_T which is more
Timo Sirainen <tss@iki.fi>
parents:
159
diff
changeset
|
373 ssize_t net_transmit(int fd, const void *data, size_t len) |
0 | 374 { |
183
4a7ab9e94f25
size_t fixes for lib/. Changed OFF_T_FORMAT to PRIuOFF_T which is more
Timo Sirainen <tss@iki.fi>
parents:
159
diff
changeset
|
375 ssize_t ret; |
0 | 376 |
377 i_assert(fd >= 0); | |
378 i_assert(data != NULL); | |
183
4a7ab9e94f25
size_t fixes for lib/. Changed OFF_T_FORMAT to PRIuOFF_T which is more
Timo Sirainen <tss@iki.fi>
parents:
159
diff
changeset
|
379 i_assert(len <= SSIZE_T_MAX); |
0 | 380 |
64
83ae914a583a
added t_strdup_noconst() which can be used instead of (char *) t_strdup().
Timo Sirainen <tss@iki.fi>
parents:
34
diff
changeset
|
381 ret = send(fd, data, len, 0); |
0 | 382 if (ret == -1 && (errno == EINTR || errno == EPIPE || errno == EAGAIN)) |
383 return 0; | |
384 | |
385 return ret; | |
386 } | |
387 | |
388 /* Get IP addresses for host. ips contains ips_count of IPs, they don't need | |
389 to be free'd. Returns 0 = ok, others = error code for net_gethosterror() */ | |
390 int net_gethostbyname(const char *addr, IPADDR **ips, int *ips_count) | |
391 { | |
392 #ifdef HAVE_IPV6 | |
393 union sockaddr_union *so; | |
394 struct addrinfo hints, *ai, *origai; | |
395 char hbuf[NI_MAXHOST]; | |
396 int host_error; | |
397 #else | |
398 struct hostent *hp; | |
399 #endif | |
400 int count; | |
401 | |
402 i_assert(addr != NULL); | |
403 i_assert(ips != NULL); | |
404 i_assert(ips_count != NULL); | |
405 | |
406 *ips = NULL; | |
407 *ips_count = 0; | |
408 | |
409 #ifdef HAVE_IPV6 | |
410 memset(&hints, 0, sizeof(struct addrinfo)); | |
411 hints.ai_socktype = SOCK_STREAM; | |
412 | |
413 /* save error to host_error for later use */ | |
414 host_error = getaddrinfo(addr, NULL, &hints, &ai); | |
415 if (host_error != 0) | |
416 return host_error; | |
417 | |
418 if (getnameinfo(ai->ai_addr, ai->ai_addrlen, hbuf, | |
419 sizeof(hbuf), NULL, 0, NI_NUMERICHOST) != 0) | |
420 return 1; | |
421 | |
422 | |
423 /* get number of IPs */ | |
424 origai = ai; | |
425 for (count = 0; ai != NULL; ai = ai->ai_next) | |
426 count++; | |
427 | |
428 *ips_count = count; | |
429 *ips = t_malloc(sizeof(IPADDR) * count); | |
430 | |
431 count = 0; | |
432 for (ai = origai; ai != NULL; ai = ai->ai_next, count++) { | |
433 so = (union sockaddr_union *) ai->ai_addr; | |
434 | |
435 sin_get_ip(so, ips[count]); | |
436 } | |
437 freeaddrinfo(origai); | |
438 #else | |
439 hp = gethostbyname(addr); | |
440 if (hp == NULL) | |
441 return h_errno; | |
442 | |
443 /* get number of IPs */ | |
444 count = 0; | |
445 while (hp->h_addr_list[count] != NULL) | |
446 count++; | |
447 | |
448 *ips_count = count; | |
449 *ips = t_malloc(sizeof(IPADDR) * count); | |
450 | |
451 while (count > 0) { | |
452 count--; | |
453 | |
454 (*ips)[count].family = AF_INET; | |
455 memcpy(&(*ips)[count].ip, hp->h_addr_list[count], 4); | |
456 } | |
457 #endif | |
458 | |
459 return 0; | |
460 } | |
461 | |
462 /* Get socket address/port */ | |
349 | 463 int net_getsockname(int fd, IPADDR *addr, unsigned int *port) |
0 | 464 { |
465 union sockaddr_union so; | |
466 socklen_t addrlen; | |
467 | |
468 i_assert(fd >= 0); | |
469 | |
470 addrlen = sizeof(so); | |
471 if (getsockname(fd, (struct sockaddr *) &so, &addrlen) == -1) | |
472 return -1; | |
473 | |
474 if (addr != NULL) sin_get_ip(&so, addr); | |
475 if (port != NULL) *port = sin_get_port(&so); | |
476 | |
477 return 0; | |
478 } | |
479 | |
480 int net_ip2host(IPADDR *ip, char *host) | |
481 { | |
482 #ifdef HAVE_IPV6 | |
483 if (!inet_ntop(ip->family, &ip->ip, host, MAX_IP_LEN)) | |
484 return -1; | |
485 #else | |
486 unsigned long ip4; | |
487 | |
488 if (ip->family != AF_INET) { | |
489 strcpy(host, "0.0.0.0"); | |
490 return -1; | |
491 } | |
492 | |
493 ip4 = ntohl(ip->ip.s_addr); | |
494 i_snprintf(host, MAX_IP_LEN, "%lu.%lu.%lu.%lu", | |
495 (ip4 & 0xff000000UL) >> 24, | |
496 (ip4 & 0x00ff0000) >> 16, | |
497 (ip4 & 0x0000ff00) >> 8, | |
498 (ip4 & 0x000000ff)); | |
499 #endif | |
500 return 0; | |
501 } | |
502 | |
503 int net_host2ip(const char *host, IPADDR *ip) | |
504 { | |
505 if (strchr(host, ':') != NULL) { | |
506 /* IPv6 */ | |
507 ip->family = AF_INET6; | |
508 #ifdef HAVE_IPV6 | |
509 if (inet_pton(AF_INET6, host, &ip->ip) == 0) | |
510 return -1; | |
511 #else | |
512 ip->ip.s_addr = 0; | |
513 #endif | |
514 } else { | |
515 /* IPv4 */ | |
516 ip->family = AF_INET; | |
517 if (inet_aton(host, (struct in_addr *) &ip->ip) == 0) | |
518 return -1; | |
519 } | |
520 | |
521 return 0; | |
522 } | |
523 | |
524 /* Get socket error */ | |
525 int net_geterror(int fd) | |
526 { | |
527 int data; | |
528 socklen_t len = sizeof(data); | |
529 | |
530 if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &data, &len) == -1) | |
531 return -1; | |
532 | |
533 return data; | |
534 } | |
535 | |
536 /* get error of net_gethostname() */ | |
537 const char *net_gethosterror(int error) | |
538 { | |
539 #ifdef HAVE_IPV6 | |
540 i_assert(error != 0); | |
541 | |
542 if (error == 1) { | |
543 /* getnameinfo() failed */ | |
544 return strerror(errno); | |
545 } | |
546 | |
547 return gai_strerror(error); | |
548 #else | |
549 switch (error) { | |
550 case HOST_NOT_FOUND: | |
551 return "Host not found"; | |
552 case NO_ADDRESS: | |
553 return "No IP address found for name"; | |
554 case NO_RECOVERY: | |
555 return "A non-recovable name server error occurred"; | |
556 case TRY_AGAIN: | |
557 return "A temporary error on an authoritative name server"; | |
558 } | |
559 | |
560 /* unknown error */ | |
561 return NULL; | |
562 #endif | |
563 } | |
564 | |
565 /* return TRUE if host lookup failed because it didn't exist (ie. not | |
566 some error with name server) */ | |
567 int net_hosterror_notfound(int error) | |
568 { | |
569 #ifdef HAVE_IPV6 | |
570 return error != 1 && (error == EAI_NONAME || error == EAI_NODATA); | |
571 #else | |
572 return error == HOST_NOT_FOUND || error == NO_ADDRESS; | |
573 #endif | |
574 } | |
575 | |
576 /* Get name of TCP service */ | |
349 | 577 char *net_getservbyport(unsigned short port) |
0 | 578 { |
579 struct servent *entry; | |
580 | |
349 | 581 entry = getservbyport(htons(port), "tcp"); |
0 | 582 return entry == NULL ? NULL : entry->s_name; |
583 } | |
584 | |
585 int is_ipv4_address(const char *host) | |
586 { | |
587 while (*host != '\0') { | |
588 if (*host != '.' && !i_isdigit(*host)) | |
589 return 0; | |
590 host++; | |
591 } | |
592 | |
593 return 1; | |
594 } | |
595 | |
596 int is_ipv6_address(const char *host) | |
597 { | |
598 while (*host != '\0') { | |
599 if (*host != ':' && !i_isxdigit(*host)) | |
600 return 0; | |
601 host++; | |
602 } | |
603 | |
604 return 1; | |
605 } |