#include "para.h"
#include "net.h"
-#include <netdb.h>
-#include "error.h"
#include "string.h"
+#include "error.h"
+
+struct crypt_data {
+ crypt_function *recv;
+ crypt_function *send;
+ void *private_data;
+};
+
+static struct crypt_data *crypt_data_array;
+static unsigned cda_size = 0;
+
+void enable_crypt(int fd, crypt_function *recv, crypt_function *send,
+ void *private_data)
+{
+ if (fd + 1 > cda_size) {
+ crypt_data_array = para_realloc(crypt_data_array,
+ (fd + 1) * sizeof(struct crypt_data));
+ memset(crypt_data_array + cda_size * sizeof(struct crypt_data), 0,
+ (fd + 1 - cda_size) * sizeof(struct crypt_data));
+ cda_size = fd + 1;
+ }
+ crypt_data_array[fd].recv = recv;
+ crypt_data_array[fd].send = send;
+ crypt_data_array[fd].private_data = private_data;
+ PARA_INFO_LOG("rc4 encryption activated for fd %d\n", fd);
+}
+
+void disable_crypt(int fd)
+{
+ if (cda_size < fd + 1)
+ return;
+ crypt_data_array[fd].recv = NULL;
+ crypt_data_array[fd].send = NULL;
+ crypt_data_array[fd].private_data = NULL;
+}
-extern void (*crypt_function_recv)(unsigned long len, const unsigned char *indata, unsigned char *outdata);
-extern void (*crypt_function_send)(unsigned long len, const unsigned char *indata, unsigned char *outdata);
/**
* initialize a struct sockaddr_in
int send_bin_buffer(int fd, const char *buf, size_t len)
{
int ret;
+ crypt_function *cf = NULL;
if (!len)
PARA_CRIT_LOG("%s", "len == 0\n");
- if (crypt_function_send) {
+ if (fd + 1 <= cda_size)
+ cf = crypt_data_array[fd].send;
+ if (cf) {
+ void *private = crypt_data_array[fd].private_data;
unsigned char *outbuf = para_malloc(len);
- crypt_function_send(len, (unsigned char *)buf, outbuf);
+ (*cf)(len, (unsigned char *)buf, outbuf, private);
ret = sendall(fd, (char *)outbuf, &len);
free(outbuf);
} else
*
* @return Positive on success, \p -E_SEND on errors.
*/
-__printf_2_3 int send_va_buffer(int fd, char *fmt, ...)
+__printf_2_3 int send_va_buffer(int fd, const char *fmt, ...)
{
char *msg;
int ret;
__must_check int recv_bin_buffer(int fd, char *buf, ssize_t size)
{
int n;
+ crypt_function *cf = NULL;
- if (crypt_function_recv) {
+ if (fd + 1 <= cda_size)
+ cf = crypt_data_array[fd].recv;
+ if (cf) {
unsigned char *tmp = para_malloc(size);
+ void *private = crypt_data_array[fd].private_data;
n = recv(fd, tmp, size, 0);
if (n > 0)
- crypt_function_recv(n, tmp, (unsigned char *)buf);
+ (*cf)(n, tmp, (unsigned char *)buf, private);
free(tmp);
} else
n = recv(fd, buf, size, 0);
{
int n;
- if ((n = recv_bin_buffer(fd, buf, size - 1)) >= 0)
+ n = recv_bin_buffer(fd, buf, size - 1);
+ if (n >= 0)
buf[n] = '\0';
+ else
+ *buf = '\0';
return n;
}
/**
* wrapper around gethostbyname
*
- * @param host hostname or IPv4 address
- * \return The hostent structure or a NULL pointer if an error occurs
+ * \param host hostname or IPv4 address
+ * \param ret the hostent structure is returned here
+ *
+ * \return positive on success, negative on errors. On success, \a ret
+ * contains the return value of the underlying gethostbyname() call.
+ *
* \sa gethostbyname(2)
*/
-struct hostent *get_host_info(char *host)
+int get_host_info(char *host, struct hostent **ret)
{
PARA_INFO_LOG("getting host info of %s\n", host);
/* FIXME: gethostbyname() is obsolete */
- return gethostbyname(host);
+ *ret = gethostbyname(host);
+ return *ret? 1 : -E_HOST_INFO;
}
/**
return 1;
}
-static int do_bind(int socket_fd, struct sockaddr_in *my_addr)
-{
- if (bind(socket_fd, (struct sockaddr *)my_addr,
- sizeof(struct sockaddr)) == -1)
- return -E_BIND;
- return 1;
-}
-
/**
* prepare a structure for \p AF_UNIX socket addresses
*
return fd;
}
+#ifndef HAVE_UCRED
+ struct ucred {
+ uid_t uid, pid, gid;
+};
+ssize_t send_cred_buffer(int sock, char *buf)
+{
+ return send_buffer(sock, buf);
+}
+int recv_cred_buffer(int fd, char *buf, size_t size)
+{
+ return recv_buffer(fd, buf, size) > 0? 1 : -E_RECVMSG;
+}
+#else /* HAVE_UCRED */
/**
* send NULL terminated buffer and Unix credentials of the current process
*
* \param fd the socket file descriptor
* \param buf the buffer to store the message
* \param size the size of \a buffer
- * \param cred the credentials are returned here
+ *
+ * \return negative on errors, the user id on success.
*
* \sa okir's Black Hats Manual
* \sa recvmsg(2)
*/
-int recv_cred_buffer(int fd, char *buf, size_t size, struct ucred *cred)
+int recv_cred_buffer(int fd, char *buf, size_t size)
{
char control[255];
struct msghdr msg;
struct cmsghdr *cmsg;
struct iovec iov;
- int result;
+ int result = 0;
int yes = 1;
+ struct ucred cred;
setsockopt(fd, SOL_SOCKET, SO_PASSCRED, &yes, sizeof(int));
memset(&msg, 0, sizeof(msg));
msg.msg_controllen = sizeof(control);
if (recvmsg(fd, &msg, 0) < 0)
return -E_RECVMSG;
- result = -SCM_CREDENTIALS;
+ result = -E_SCM_CREDENTIALS;
cmsg = CMSG_FIRSTHDR(&msg);
while (cmsg) {
if (cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type
== SCM_CREDENTIALS) {
- memcpy(cred, CMSG_DATA(cmsg), sizeof(struct ucred));
- result = iov.iov_len;
+ memcpy(&cred, CMSG_DATA(cmsg), sizeof(struct ucred));
+ result = cred.uid;
} else
if (cmsg->cmsg_level == SOL_SOCKET
&& cmsg->cmsg_type == SCM_RIGHTS) {
}
return result;
}
+#endif /* HAVE_UCRED */
/** how many pending connections queue will hold */
#define BACKLOG 10
* \return The file descriptor of the created socket, negative
* on errors.
*
- * \sa get_socket()
+ * \sa get_socket()
* \sa setsockopt(2)
* \sa bind(2)
* \sa listen(2)
*/
int init_tcp_socket(int port)
{
- int sockfd, ret;
struct sockaddr_in my_addr;
+ int fd, ret = get_socket();
- if ((sockfd = get_socket()) < 0)
- return sockfd;
- ret = setserversockopts(sockfd);
if (ret < 0)
return ret;
- init_sockaddr(&my_addr, port, NULL);
- ret = do_bind(sockfd, &my_addr);
+ fd = ret;
+ ret = setserversockopts(fd);
if (ret < 0)
- return ret;
- if (listen(sockfd, BACKLOG) == -1)
- return -E_LISTEN;
- PARA_INFO_LOG("listening on port %d, fd %d\n", port, sockfd);
- return sockfd;
+ goto err;
+ init_sockaddr(&my_addr, port, NULL);
+ ret = -E_BIND;
+ if (bind(fd, (struct sockaddr *)&my_addr,
+ sizeof(struct sockaddr)) == -1) {
+ PARA_CRIT_LOG("bind error: %s\n", strerror(errno));
+ goto err;
+ }
+ ret = -E_LISTEN;
+ if (listen(fd, BACKLOG) == -1)
+ goto err;
+ PARA_INFO_LOG("listening on port %d, fd %d\n", port, fd);
+ return fd;
+err:
+ close(fd);
+ return ret;
}
/**
if (n < len)
goto out;
- buf[n] = '\0';
if (strncasecmp(buf, pattern, len))
goto out;
ret = 1;
out:
+ if (ret < 0)
+ PARA_NOTICE_LOG("did not receive pattern '%s'\n", pattern);
free(buf);
return ret;
}