- Test m_pkthdr.fw_flags against DUMMYNET_MBUF_TAGGED before trying to locate
[dragonfly/netmp.git] / sbin / mount_portal / pt_tcplisten.c
blob522cfc76d6d6fd692039bc38ab645248e385a253
1 /*
2 * Copyright (c) 1992, 1993
3 * The Regents of the University of California. All rights reserved.
4 * All rights reserved.
6 * This code is derived from software donated to Berkeley by
7 * Jan-Simon Pendry.
9 * Modified by Duncan Barclay.
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. All advertising materials mentioning features or use of this software
20 * must display the following acknowledgement:
21 * This product includes software developed by the University of
22 * California, Berkeley and its contributors.
23 * 4. Neither the name of the University nor the names of its contributors
24 * may be used to endorse or promote products derived from this software
25 * without specific prior written permission.
27 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
28 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
29 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
30 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
31 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
32 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
33 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
34 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
35 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
36 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
37 * SUCH DAMAGE.
39 * @(#)pt_tcp.c 8.3 (Berkeley) 3/27/94
41 * $DragonFly: src/sbin/mount_portal/pt_tcplisten.c,v 1.5 2005/11/06 12:36:40 swildner Exp $
42 * pt_tcp.c,v 1.1.1.1 1994/05/26 06:34:34 rgrimes Exp
45 #include <stdio.h>
46 #include <unistd.h>
47 #include <stdlib.h>
48 #include <errno.h>
49 #include <strings.h>
50 #include <sys/types.h>
51 #include <sys/param.h>
52 #include <sys/syslog.h>
53 #include <sys/socket.h>
54 #include <netinet/in.h>
55 #include <arpa/inet.h>
56 #include <netdb.h>
58 #include "portald.h"
61 * Key will be tcplisten/host/port
63 * Create a TCP socket bound to the requested host and port.
64 * If the host is "ANY" the receving address will be set to INADDR_ANY.
65 * If the port is 0 the caller must find out the returned port number
66 * using a call to getsockname.
68 * XXX! The owner of the socket will be root rather then the user. This
69 * may cause remote auth (identd) to return unexpected results.
72 int
73 portal_tcplisten(struct portal_cred *pcr, char *key, char **v, int kso,
74 int *fdp)
76 char host[MAXHOSTNAMELEN];
77 char port[MAXHOSTNAMELEN];
78 char *p = key + (v[1] ? strlen(v[1]) : 0);
79 char *q;
80 struct hostent *hp;
81 struct servent *sp;
82 struct in_addr **ipp = NULL;
83 struct in_addr *ip[2];
84 struct in_addr ina;
85 u_short s_port;
86 int any = 0;
87 struct sockaddr_in sain;
89 q = strchr(p, '/');
90 if (q == 0 || q - p >= sizeof(host))
91 return (EINVAL);
92 *q = '\0';
93 snprintf(host, sizeof(host), "%s", p);
94 p = q + 1;
96 q = strchr(p, '/');
97 if (q)
98 *q = '\0';
99 if (strlen(p) >= sizeof(port))
100 return (EINVAL);
101 snprintf(port, sizeof(port), "%s", p);
103 if (strcmp(host, "ANY") == 0) {
104 any = 1;
105 } else {
106 hp = gethostbyname(host);
107 if (hp != 0) {
108 ipp = (struct in_addr **) hp->h_addr_list;
109 } else {
110 ina.s_addr = inet_addr(host);
111 if (ina.s_addr == INADDR_NONE)
112 return (EINVAL);
113 ip[0] = &ina;
114 ip[1] = 0;
115 ipp = ip;
118 #ifdef DEBUG
119 if (any)
120 printf("INADDR_ANY to be used for hostname\n");
121 else
122 printf("inet address for %s is %s\n", host, inet_ntoa(*ipp[0]));
123 #endif
125 sp = getservbyname(port, "tcp");
126 if (sp != NULL) {
127 s_port = (u_short) sp->s_port;
128 } else {
129 s_port = strtoul(port, &p, 0);
130 if (*p != '\0')
131 return (EINVAL);
132 s_port = htons(s_port);
134 if ((ntohs(s_port) != 0) &&
135 (ntohs(s_port) <= IPPORT_RESERVED) &&
136 (pcr->pcr_uid != 0))
137 return (EPERM);
138 #ifdef DEBUG
139 printf("port number for %s is %d\n", port, ntohs(s_port));
140 #endif
142 memset(&sain, 0, sizeof(sain));
143 sain.sin_len = sizeof(sain);
144 sain.sin_family = AF_INET;
145 sain.sin_port = s_port;
147 if (any) {
148 int so;
149 int sock;
151 so = socket(AF_INET, SOCK_STREAM, 0);
152 if (so < 0) {
153 syslog(LOG_ERR, "socket: %m");
154 return (errno);
157 sain.sin_addr.s_addr = INADDR_ANY;
158 if (bind(so, (struct sockaddr *) &sain, sizeof(sain)) == 0) {
159 listen(so, 1);
160 if ((sock = accept(so, (struct sockaddr *)0, (int *)0)) == -1) {
161 syslog(LOG_ERR, "accept: %m");
162 close(so);
163 return (errno);
165 *fdp = sock;
166 close(so);
167 return (0);
169 syslog(LOG_ERR, "bind: %m");
170 close(so);
171 return (errno);
174 while (ipp[0]) {
175 int so;
176 int sock;
178 so = socket(AF_INET, SOCK_STREAM, 0);
179 if (so < 0) {
180 syslog(LOG_ERR, "socket: %m");
181 return (errno);
184 sain.sin_addr = *ipp[0];
185 if (bind(so, (struct sockaddr *) &sain, sizeof(sain)) == 0) {
186 listen(so, 1);
187 if ((sock = accept(so, (struct sockaddr *)0, (int *)0)) == -1) {
188 syslog(LOG_ERR, "accept: %m");
189 close(so);
190 return (errno);
192 *fdp = sock;
193 close(so);
194 return (0);
196 close(so);
198 ipp++;
201 syslog(LOG_ERR, "bind: %m");
202 return (errno);