VirtualBox

source: vbox/trunk/src/VBox/Devices/Network/slirp/udp.c@ 19748

Last change on this file since 19748 was 17363, checked in by vboxsync, 16 years ago

NAT: dns proxy functions fine. the time out and switch to next server should be bit tested

  • Property svn:eol-style set to native
File size: 23.2 KB
Line 
1/*
2 * Copyright (c) 1982, 1986, 1988, 1990, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * @(#)udp_usrreq.c 8.4 (Berkeley) 1/21/94
34 * udp_usrreq.c,v 1.4 1994/10/02 17:48:45 phk Exp
35 */
36
37/*
38 * Changes and additions relating to SLiRP
39 * Copyright (c) 1995 Danny Gasparovski.
40 *
41 * Please read the file COPYRIGHT for the
42 * terms and conditions of the copyright.
43 */
44
45#include <slirp.h>
46#include "ip_icmp.h"
47#include "ctl.h"
48
49
50/*
51 * UDP protocol implementation.
52 * Per RFC 768, August, 1980.
53 */
54#define udpcksum 1
55
56void
57udp_init(PNATState pData)
58{
59 udp_last_so = &udb;
60 udb.so_next = udb.so_prev = &udb;
61}
62
63/* m->m_data points at ip packet header
64 * m->m_len length ip packet
65 * ip->ip_len length data (IPDU)
66 */
67void
68udp_input(PNATState pData, register struct mbuf *m, int iphlen)
69{
70 register struct ip *ip;
71 register struct udphdr *uh;
72 int len;
73 struct ip save_ip;
74 struct socket *so;
75 int ret;
76 int ttl;
77
78 DEBUG_CALL("udp_input");
79 DEBUG_ARG("m = %lx", (long)m);
80 DEBUG_ARG("iphlen = %d", iphlen);
81
82 udpstat.udps_ipackets++;
83
84 /*
85 * Strip IP options, if any; should skip this,
86 * make available to user, and use on returned packets,
87 * but we don't yet have a way to check the checksum
88 * with options still present.
89 */
90 if (iphlen > sizeof(struct ip))
91 {
92 ip_stripoptions(m, (struct mbuf *)0);
93 iphlen = sizeof(struct ip);
94 }
95
96 /*
97 * Get IP and UDP header together in first mbuf.
98 */
99 ip = mtod(m, struct ip *);
100 uh = (struct udphdr *)((caddr_t)ip + iphlen);
101
102 /*
103 * Make mbuf data length reflect UDP length.
104 * If not enough data to reflect UDP length, drop.
105 */
106 len = ntohs((u_int16_t)uh->uh_ulen);
107
108 if (ip->ip_len != len)
109 {
110 if (len > ip->ip_len)
111 {
112 udpstat.udps_badlen++;
113 goto bad;
114 }
115 m_adj(m, len - ip->ip_len);
116 ip->ip_len = len;
117 }
118
119 /*
120 * Save a copy of the IP header in case we want restore it
121 * for sending an ICMP error message in response.
122 */
123 save_ip = *ip;
124 save_ip.ip_len+= iphlen; /* tcp_input subtracts this */
125
126 /*
127 * Checksum extended UDP header and data.
128 */
129 if (udpcksum && uh->uh_sum)
130 {
131 memset(((struct ipovly *)ip)->ih_x1, 0, 9);
132 ((struct ipovly *)ip)->ih_len = uh->uh_ulen;
133#if 0
134 /* keep uh_sum for ICMP reply */
135 uh->uh_sum = cksum(m, len + sizeof (struct ip));
136 if (uh->uh_sum)
137 {
138
139#endif
140 if(cksum(m, len + sizeof(struct ip)))
141 {
142 udpstat.udps_badsum++;
143 goto bad;
144 }
145 }
146#if 0
147 }
148#endif
149
150 /*
151 * handle DHCP/BOOTP
152 */
153 if (ntohs(uh->uh_dport) == BOOTP_SERVER)
154 {
155 bootp_input(pData, m);
156 goto bad;
157 }
158
159 /*
160 * handle TFTP
161 */
162 if ( ntohs(uh->uh_dport) == TFTP_SERVER
163 && CTL_CHECK(ntohl(ip->ip_dst.s_addr), CTL_TFTP))
164 {
165 tftp_input(pData, m);
166 goto bad;
167 }
168
169 /*
170 * Locate pcb for datagram.
171 */
172 so = udp_last_so;
173 if ( so->so_lport != uh->uh_sport
174 || so->so_laddr.s_addr != ip->ip_src.s_addr)
175 {
176 struct socket *tmp;
177
178 for (tmp = udb.so_next; tmp != &udb; tmp = tmp->so_next)
179 {
180 if ( tmp->so_lport == uh->uh_sport
181 && tmp->so_laddr.s_addr == ip->ip_src.s_addr)
182 {
183 so = tmp;
184 break;
185 }
186 }
187 if (tmp == &udb)
188 so = NULL;
189 else
190 {
191 udpstat.udpps_pcbcachemiss++;
192 udp_last_so = so;
193 }
194 }
195
196 if (so == NULL)
197 {
198 /*
199 * If there's no socket for this packet,
200 * create one
201 */
202 if ((so = socreate()) == NULL)
203 goto bad;
204 if (udp_attach(pData, so, slirp_get_service(IPPROTO_UDP, uh->uh_dport, uh->uh_sport)) == -1)
205 {
206 DEBUG_MISC((dfd," udp_attach errno = %d-%s\n",
207 errno, strerror(errno)));
208 sofree(pData, so);
209 goto bad;
210 }
211
212 /*
213 * Setup fields
214 */
215 /* udp_last_so = so; */
216 so->so_laddr = ip->ip_src;
217 so->so_lport = uh->uh_sport;
218
219 if ((so->so_iptos = udp_tos(so)) == 0)
220 so->so_iptos = ip->ip_tos;
221
222 /*
223 * XXXXX Here, check if it's in udpexec_list,
224 * and if it is, do the fork_exec() etc.
225 */
226 }
227
228 so->so_faddr = ip->ip_dst; /* XXX */
229 so->so_fport = uh->uh_dport; /* XXX */
230
231#ifdef VBOX_WITH_SLIRP_DNS_PROXY
232 if ( (ip->ip_dst.s_addr == htonl(ntohl(special_addr.s_addr) | CTL_DNS))
233 && (ntohs(uh->uh_dport) == 53))
234 {
235 dnsproxy_query(pData, so, m, iphlen);
236 goto bad; /* it isn't bad, probably better to add additional label done for boot/tftf :) */
237 }
238#endif
239
240 iphlen += sizeof(struct udphdr);
241 m->m_len -= iphlen;
242 m->m_data += iphlen;
243
244 /*
245 * Now we sendto() the packet.
246 */
247 if (so->so_emu)
248 udp_emu(pData, so, m);
249
250 ttl = ip->ip_ttl = save_ip.ip_ttl;
251 ret = setsockopt(so->s, IPPROTO_IP, IP_TTL, (const char*)&ttl, sizeof(ttl));
252 if (ret < 0)
253 LogRel(("NAT: Error (%s) occurred while setting TTL(%d) attribute "
254 "of IP packet to socket %R[natsock]\n", strerror(errno), ip->ip_ttl, so));
255
256 if (sosendto(pData, so, m) == -1)
257 {
258 m->m_len += iphlen;
259 m->m_data -= iphlen;
260 *ip = save_ip;
261 DEBUG_MISC((dfd,"udp tx errno = %d-%s\n", errno, strerror(errno)));
262 icmp_error(pData, m, ICMP_UNREACH, ICMP_UNREACH_NET, 0, strerror(errno));
263 /* in case we receive ICMP on this socket we'll aware that ICMP has been already sent to host*/
264 so->so_m = NULL;
265 }
266
267 m_free(pData, so->so_m); /* used for ICMP if error on sorecvfrom */
268
269 /* restore the orig mbuf packet */
270 m->m_len += iphlen;
271 m->m_data -= iphlen;
272 *ip = save_ip;
273 so->so_m = m; /* ICMP backup */
274
275 return;
276
277bad:
278 m_freem(pData, m);
279 return;
280}
281
282int udp_output2(PNATState pData, struct socket *so, struct mbuf *m,
283 struct sockaddr_in *saddr, struct sockaddr_in *daddr,
284 int iptos)
285{
286 register struct udpiphdr *ui;
287 int error = 0;
288
289 DEBUG_CALL("udp_output");
290 DEBUG_ARG("so = %lx", (long)so);
291 DEBUG_ARG("m = %lx", (long)m);
292 DEBUG_ARG("saddr = %lx", (long)saddr->sin_addr.s_addr);
293 DEBUG_ARG("daddr = %lx", (long)daddr->sin_addr.s_addr);
294
295 /*
296 * Adjust for header
297 */
298 m->m_data -= sizeof(struct udpiphdr);
299 m->m_len += sizeof(struct udpiphdr);
300
301 /*
302 * Fill in mbuf with extended UDP header
303 * and addresses and length put into network format.
304 */
305 ui = mtod(m, struct udpiphdr *);
306 memset(ui->ui_x1, 0, 9);
307 ui->ui_pr = IPPROTO_UDP;
308 ui->ui_len = htons(m->m_len - sizeof(struct ip)); /* + sizeof (struct udphdr)); */
309 /* XXXXX Check for from-one-location sockets, or from-any-location sockets */
310 ui->ui_src = saddr->sin_addr;
311 ui->ui_dst = daddr->sin_addr;
312 ui->ui_sport = saddr->sin_port;
313 ui->ui_dport = daddr->sin_port;
314 ui->ui_ulen = ui->ui_len;
315
316 /*
317 * Stuff checksum and output datagram.
318 */
319 ui->ui_sum = 0;
320 if (udpcksum)
321 {
322 if ((ui->ui_sum = cksum(m, /* sizeof (struct udpiphdr) + */ m->m_len)) == 0)
323 ui->ui_sum = 0xffff;
324 }
325 ((struct ip *)ui)->ip_len = m->m_len;
326 ((struct ip *)ui)->ip_ttl = ip_defttl;
327 ((struct ip *)ui)->ip_tos = iptos;
328
329 udpstat.udps_opackets++;
330
331 error = ip_output(pData, so, m);
332
333 return error;
334}
335
336int udp_output(PNATState pData, struct socket *so, struct mbuf *m,
337 struct sockaddr_in *addr)
338{
339 struct sockaddr_in saddr, daddr;
340
341 saddr = *addr;
342 if ((so->so_faddr.s_addr & htonl(pData->netmask)) == special_addr.s_addr)
343 {
344 saddr.sin_addr.s_addr = so->so_faddr.s_addr;
345 if ((so->so_faddr.s_addr & htonl(~pData->netmask)) == htonl(~pData->netmask))
346 saddr.sin_addr.s_addr = alias_addr.s_addr;
347 }
348
349 /* Any UDP packet to the loopback address must be translated to be from
350 * the forwarding address, i.e. 10.0.2.2. */
351 if ( (saddr.sin_addr.s_addr & htonl(IN_CLASSA_NET))
352 == htonl(INADDR_LOOPBACK & IN_CLASSA_NET))
353 saddr.sin_addr.s_addr = alias_addr.s_addr;
354
355 daddr.sin_addr = so->so_laddr;
356 daddr.sin_port = so->so_lport;
357
358 return udp_output2(pData, so, m, &saddr, &daddr, so->so_iptos);
359}
360
361int
362udp_attach(PNATState pData, struct socket *so, int service_port)
363{
364 struct sockaddr_in addr;
365 struct sockaddr sa_addr;
366 socklen_t socklen = sizeof(struct sockaddr);
367 int status;
368
369 if ((so->s = socket(AF_INET, SOCK_DGRAM, 0)) != -1)
370 {
371 /*
372 * Here, we bind() the socket. Although not really needed
373 * (sendto() on an unbound socket will bind it), it's done
374 * here so that emulation of ytalk etc. don't have to do it
375 */
376 addr.sin_family = AF_INET;
377 addr.sin_port = service_port;
378 addr.sin_addr.s_addr = INADDR_ANY;
379 fd_nonblock(so->s);
380 if (bind(so->s, (struct sockaddr *)&addr, sizeof(addr)) < 0)
381 {
382 int lasterrno = errno;
383 closesocket(so->s);
384 so->s = -1;
385#ifdef RT_OS_WINDOWS
386 WSASetLastError(lasterrno);
387#else
388 errno = lasterrno;
389#endif
390 }
391 else
392 {
393 int opt = 1;
394 /* success, insert in queue */
395 so->so_expire = curtime + SO_EXPIRE;
396 /* enable broadcast for later use */
397 setsockopt(so->s, SOL_SOCKET, SO_BROADCAST, (const char *)&opt, sizeof(opt));
398 status = getsockname(so->s, &sa_addr, &socklen);
399 Assert(status == 0 && sa_addr.sa_family == AF_INET);
400 so->so_hlport = ((struct sockaddr_in *)&sa_addr)->sin_port;
401 so->so_hladdr.s_addr = ((struct sockaddr_in *)&sa_addr)->sin_addr.s_addr;
402 SOCKET_LOCK_CREATE(so);
403 QSOCKET_LOCK(udb);
404 insque(pData, so, &udb);
405 NSOCK_INC();
406 QSOCKET_UNLOCK(udb);
407 }
408 }
409 else
410 {
411 LogRel(("NAT: can't create datagramm socket\n"));
412 }
413 return so->s;
414}
415
416void
417udp_detach(PNATState pData, struct socket *so)
418{
419 if (so != &pData->icmp_socket)
420 {
421 QSOCKET_LOCK(udb);
422 SOCKET_LOCK(so);
423 QSOCKET_UNLOCK(udb);
424 closesocket(so->s);
425 sofree(pData, so);
426 SOCKET_UNLOCK(so);
427 }
428}
429
430static const struct tos_t udptos[] =
431{
432 { 0, 53, IPTOS_LOWDELAY, 0 }, /* DNS */
433 { 517, 517, IPTOS_LOWDELAY, EMU_TALK }, /* talk */
434 { 518, 518, IPTOS_LOWDELAY, EMU_NTALK }, /* ntalk */
435 { 0, 7648, IPTOS_LOWDELAY, EMU_CUSEEME }, /* Cu-Seeme */
436 { 0, 0, 0, 0 }
437};
438
439u_int8_t
440udp_tos(struct socket *so)
441{
442 int i = 0;
443
444 while(udptos[i].tos)
445 {
446 if ( (udptos[i].fport && ntohs(so->so_fport) == udptos[i].fport)
447 || (udptos[i].lport && ntohs(so->so_lport) == udptos[i].lport))
448 {
449 so->so_emu = udptos[i].emu;
450 return udptos[i].tos;
451 }
452 i++;
453 }
454
455 return 0;
456}
457
458#ifdef EMULATE_TALK
459#include "talkd.h"
460#endif
461
462/*
463 * Here, talk/ytalk/ntalk requests must be emulated
464 */
465void
466udp_emu(PNATState pData, struct socket *so, struct mbuf *m)
467{
468 struct sockaddr_in addr;
469 socklen_t addrlen = sizeof(addr);
470#ifdef EMULATE_TALK
471 CTL_MSG_OLD *omsg;
472 CTL_MSG *nmsg;
473 char buff[sizeof(CTL_MSG)];
474 u_char type;
475
476 struct talk_request
477 {
478 struct talk_request *next;
479 struct socket *udp_so;
480 struct socket *tcp_so;
481 } *req;
482
483 static struct talk_request *req_tbl = 0;
484
485#endif
486
487 struct cu_header
488 {
489 uint16_t d_family; /* destination family */
490 uint16_t d_port; /* destination port */
491 uint32_t d_addr; /* destination address */
492 uint16_t s_family; /* source family */
493 uint16_t s_port; /* source port */
494 uint32_t so_addr; /* source address */
495 uint32_t seqn; /* sequence number */
496 uint16_t message; /* message */
497 uint16_t data_type; /* data type */
498 uint16_t pkt_len; /* packet length */
499 } *cu_head;
500
501 switch(so->so_emu)
502 {
503#ifdef EMULATE_TALK
504 case EMU_TALK:
505 case EMU_NTALK:
506 /*
507 * Talk emulation. We always change the ctl_addr to get
508 * some answers from the daemon. When an ANNOUNCE comes,
509 * we send LEAVE_INVITE to the local daemons. Also when a
510 * DELETE comes, we send copies to the local daemons.
511 */
512 if (getsockname(so->s, (struct sockaddr *)&addr, &addrlen) < 0)
513 return;
514
515#define IS_OLD (so->so_emu == EMU_TALK)
516
517#define COPY_MSG(dest, src) \
518 do { \
519 dest->type = src->type; \
520 dest->id_num = src->id_num; \
521 dest->pid = src->pid; \
522 dest->addr = src->addr; \
523 dest->ctl_addr = src->ctl_addr; \
524 memcpy(&dest->l_name, &src->l_name, NAME_SIZE_OLD); \
525 memcpy(&dest->r_name, &src->r_name, NAME_SIZE_OLD); \
526 memcpy(&dest->r_tty, &src->r_tty, TTY_SIZE);
527 } while (0)
528
529#define OTOSIN(ptr, field) ((struct sockaddr_in *)&ptr->field)
530/* old_sockaddr to sockaddr_in */
531
532
533 if (IS_OLD)
534 {
535 /* old talk */
536 omsg = mtod(m, CTL_MSG_OLD*);
537 nmsg = (CTL_MSG *) buff;
538 type = omsg->type;
539 OTOSIN(omsg, ctl_addr)->sin_port = addr.sin_port;
540 OTOSIN(omsg, ctl_addr)->sin_addr = our_addr;
541 strncpy(omsg->l_name, getlogin(), NAME_SIZE_OLD);
542 }
543 else
544 {
545 /* new talk */
546 omsg = (CTL_MSG_OLD *) buff;
547 nmsg = mtod(m, CTL_MSG *);
548 type = nmsg->type;
549 OTOSIN(nmsg, ctl_addr)->sin_port = addr.sin_port;
550 OTOSIN(nmsg, ctl_addr)->sin_addr = our_addr;
551 strncpy(nmsg->l_name, getlogin(), NAME_SIZE_OLD);
552 }
553
554 if (type == LOOK_UP)
555 return; /* for LOOK_UP this is enough */
556
557 if (IS_OLD)
558 {
559 /* make a copy of the message */
560 COPY_MSG(nmsg, omsg);
561 nmsg->vers = 1;
562 nmsg->answer = 0;
563 }
564 else
565 COPY_MSG(omsg, nmsg);
566
567 /*
568 * If if is an ANNOUNCE message, we go through the
569 * request table to see if a tcp port has already
570 * been redirected for this socket. If not, we solisten()
571 * a new socket and add this entry to the table.
572 * The port number of the tcp socket and our IP
573 * are put to the addr field of the message structures.
574 * Then a LEAVE_INVITE is sent to both local daemon
575 * ports, 517 and 518. This is why we have two copies
576 * of the message, one in old talk and one in new talk
577 * format.
578 */
579
580 if (type == ANNOUNCE)
581 {
582 int s;
583 u_short temp_port;
584
585 for(req = req_tbl; req; req = req->next)
586 if (so == req->udp_so)
587 break; /* found it */
588
589 if (!req)
590 {
591 /* no entry for so, create new */
592 req = (struct talk_request *)RTMemAlloc(sizeof(struct talk_request));
593 req->udp_so = so;
594 req->tcp_so = solisten(0,
595 OTOSIN(omsg, addr)->sin_addr.s_addr,
596 OTOSIN(omsg, addr)->sin_port,
597 SS_FACCEPTONCE);
598 req->next = req_tbl;
599 req_tbl = req;
600 }
601
602 /* replace port number in addr field */
603 addrlen = sizeof(addr);
604 getsockname(req->tcp_so->s, (struct sockaddr *) &addr, &addrlen);
605 OTOSIN(omsg, addr)->sin_port = addr.sin_port;
606 OTOSIN(omsg, addr)->sin_addr = our_addr;
607 OTOSIN(nmsg, addr)->sin_port = addr.sin_port;
608 OTOSIN(nmsg, addr)->sin_addr = our_addr;
609
610 /* send LEAVE_INVITEs */
611 temp_port = OTOSIN(omsg, ctl_addr)->sin_port;
612 OTOSIN(omsg, ctl_addr)->sin_port = 0;
613 OTOSIN(nmsg, ctl_addr)->sin_port = 0;
614 omsg->type = nmsg->type = LEAVE_INVITE;
615
616 s = socket(AF_INET, SOCK_DGRAM, IPPROTO_IP);
617 addr.sin_addr = our_addr;
618 addr.sin_family = AF_INET;
619 addr.sin_port = htons(517);
620 sendto(s, (char *)omsg, sizeof(*omsg), 0,
621 (struct sockaddr *)&addr, sizeof(addr));
622 addr.sin_port = htons(518);
623 sendto(s, (char *)nmsg, sizeof(*nmsg), 0,
624 (struct sockaddr *) &addr, sizeof(addr));
625 closesocket(s) ;
626
627 omsg->type = nmsg->type = ANNOUNCE;
628 OTOSIN(omsg, ctl_addr)->sin_port = temp_port;
629 OTOSIN(nmsg, ctl_addr)->sin_port = temp_port;
630 }
631
632 /*
633 * If it is a DELETE message, we send a copy to the
634 * local daemons. Then we delete the entry corresponding
635 * to our socket from the request table.
636 */
637
638 if (type == DELETE)
639 {
640 struct talk_request *temp_req, *req_next;
641 int s;
642 u_short temp_port;
643
644 temp_port = OTOSIN(omsg, ctl_addr)->sin_port;
645 OTOSIN(omsg, ctl_addr)->sin_port = 0;
646 OTOSIN(nmsg, ctl_addr)->sin_port = 0;
647
648 s = socket(AF_INET, SOCK_DGRAM, IPPROTO_IP);
649 addr.sin_addr = our_addr;
650 addr.sin_family = AF_INET;
651 addr.sin_port = htons(517);
652 sendto(s, (char *)omsg, sizeof(*omsg), 0,
653 (struct sockaddr *)&addr, sizeof(addr));
654 addr.sin_port = htons(518);
655 sendto(s, (char *)nmsg, sizeof(*nmsg), 0,
656 (struct sockaddr *)&addr, sizeof(addr));
657 closesocket(s);
658
659 OTOSIN(omsg, ctl_addr)->sin_port = temp_port;
660 OTOSIN(nmsg, ctl_addr)->sin_port = temp_port;
661
662 /* delete table entry */
663 if (so == req_tbl->udp_so)
664 {
665 temp_req = req_tbl;
666 req_tbl = req_tbl->next;
667 RTMemFree(temp_req);
668 }
669 else
670 {
671 temp_req = req_tbl;
672 for (req = req_tbl->next; req; req = req_next)
673 {
674 req_next = req->next;
675 if (so == req->udp_so)
676 {
677 temp_req->next = req_next;
678 RTMemFree(req);
679 break;
680 }
681 else
682 temp_req = req;
683 }
684 }
685 }
686
687 return;
688#endif
689
690 case EMU_CUSEEME:
691 /*
692 * Cu-SeeMe emulation.
693 * Hopefully the packet is more that 16 bytes long. We don't
694 * do any other tests, just replace the address and port
695 * fields.
696 */
697 if (m->m_len >= sizeof (*cu_head))
698 {
699 if (getsockname(so->s, (struct sockaddr *)&addr, &addrlen) < 0)
700 return;
701 cu_head = mtod(m, struct cu_header *);
702 cu_head->s_port = addr.sin_port;
703 cu_head->so_addr = our_addr.s_addr;
704 }
705 return;
706 }
707}
708
709struct socket *
710udp_listen(PNATState pData, u_int port, u_int32_t laddr, u_int lport, int flags)
711{
712 struct sockaddr_in addr;
713 struct socket *so;
714 socklen_t addrlen = sizeof(struct sockaddr_in);
715 int opt = 1;
716
717 if ((so = socreate()) == NULL)
718 return NULL;
719
720 so->s = socket(AF_INET, SOCK_DGRAM, 0);
721 if (so->s == -1)
722 {
723 LogRel(("NAT: can't create datagram socket\n"));
724 RTMemFree(so);
725 return NULL;
726 }
727 so->so_expire = curtime + SO_EXPIRE;
728 fd_nonblock(so->s);
729 SOCKET_LOCK_CREATE(so);
730 QSOCKET_LOCK(udb);
731 insque(pData, so,&udb);
732 NSOCK_INC();
733 QSOCKET_UNLOCK(udb);
734
735 addr.sin_family = AF_INET;
736 addr.sin_addr.s_addr = INADDR_ANY;
737 addr.sin_port = port;
738
739 if (bind(so->s,(struct sockaddr *)&addr, addrlen) < 0)
740 {
741 udp_detach(pData, so);
742 return NULL;
743 }
744 setsockopt(so->s, SOL_SOCKET, SO_REUSEADDR,(char *)&opt, sizeof(int));
745/* setsockopt(so->s, SOL_SOCKET, SO_OOBINLINE,(char *)&opt, sizeof(int)); */
746
747 getsockname(so->s,(struct sockaddr *)&addr,&addrlen);
748 so->so_fport = addr.sin_port;
749 /* The original check was completely broken, as the commented out
750 * if statement was always true (INADDR_ANY=0). */
751 /* if (addr.sin_addr.s_addr == 0 || addr.sin_addr.s_addr == loopback_addr.s_addr) */
752 if (1 == 0) /* always use the else part */
753 so->so_faddr = alias_addr;
754 else
755 so->so_faddr = addr.sin_addr;
756
757 so->so_lport = lport;
758 so->so_laddr.s_addr = laddr;
759 if (flags != SS_FACCEPTONCE)
760 so->so_expire = 0;
761
762 so->so_state = SS_ISFCONNECTED;
763
764 return so;
765}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette