diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-17 07:42:04 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-17 07:42:04 +0000 |
commit | 0d47952611198ef6b1163f366dc03922d20b1475 (patch) | |
tree | 3d840a3b8c0daef0754707bfb9f5e873b6b1ac13 /nsock/src/netutils.c | |
parent | Initial commit. (diff) | |
download | nmap-0d47952611198ef6b1163f366dc03922d20b1475.tar.xz nmap-0d47952611198ef6b1163f366dc03922d20b1475.zip |
Adding upstream version 7.94+git20230807.3be01efb1+dfsg.upstream/7.94+git20230807.3be01efb1+dfsgupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'nsock/src/netutils.c')
-rw-r--r-- | nsock/src/netutils.c | 183 |
1 files changed, 183 insertions, 0 deletions
diff --git a/nsock/src/netutils.c b/nsock/src/netutils.c new file mode 100644 index 0000000..4523203 --- /dev/null +++ b/nsock/src/netutils.c @@ -0,0 +1,183 @@ +/*************************************************************************** + * netutils.c -- This contains some useful little network/socket related * + * utility functions. * + * * + ***********************IMPORTANT NSOCK LICENSE TERMS*********************** + * + * The nsock parallel socket event library is (C) 1999-2023 Nmap Software LLC + * This library is free software; you may redistribute and/or modify it under + * the terms of the GNU General Public License as published by the Free Software + * Foundation; Version 2. This guarantees your right to use, modify, and + * redistribute this software under certain conditions. If this license is + * unacceptable to you, Nmap Software LLC may be willing to sell alternative + * licenses (contact sales@nmap.com ). + * + * As a special exception to the GPL terms, Nmap Software LLC grants permission + * to link the code of this program with any version of the OpenSSL library + * which is distributed under a license identical to that listed in the included + * docs/licenses/OpenSSL.txt file, and distribute linked combinations including + * the two. You must obey the GNU GPL in all respects for all of the code used + * other than OpenSSL. If you modify this file, you may extend this exception to + * your version of the file, but you are not obligated to do so. + * + * If you received these files with a written license agreement stating terms + * other than the (GPL) terms above, then that alternative license agreement + * takes precedence over this comment. + * + * Source is provided to this software because we believe users have a right to + * know exactly what a program is going to do before they run it. This also + * allows you to audit the software for security holes. + * + * Source code also allows you to port Nmap to new platforms, fix bugs, and add + * new features. You are highly encouraged to send your changes to the + * dev@nmap.org mailing list for possible incorporation into the main + * distribution. By sending these changes to Fyodor or one of the Insecure.Org + * development mailing lists, or checking them into the Nmap source code + * repository, it is understood (unless you specify otherwise) that you are + * offering the Nmap Project (Nmap Software LLC) the unlimited, non-exclusive + * right to reuse, modify, and relicense the code. Nmap will always be available + * Open Source, but this is important because the inability to relicense code + * has caused devastating problems for other Free Software projects (such as KDE + * and NASM). We also occasionally relicense the code to third parties as + * discussed above. If you wish to specify special license conditions of your + * contributions, just say so when you send them. + * + * This program is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS + * FOR A PARTICULAR PURPOSE. See the GNU General Public License v2.0 for more + * details (http://www.gnu.org/licenses/gpl-2.0.html). + * + ***************************************************************************/ + +/* $Id$ */ + +#include "netutils.h" +#include "error.h" + +#if WIN32 +#include "Winsock2.h" +#endif + +#if HAVE_SYS_TIME_H +#include <sys/time.h> +#endif +#if HAVE_SYS_RESOURCE_H +#include <sys/resource.h> +#endif +#if HAVE_UNISTD_H +#include <unistd.h> +#endif +#if HAVE_NETINET_IN_H +#include <netinet/in.h> +#endif +#if HAVE_SYS_TYPES_H +#include <sys/types.h> +#endif +#if HAVE_SYS_SOCKET_H +#include <sys/socket.h> +#endif +#if HAVE_FCNTL_H +#include <fcntl.h> +#endif +#if HAVE_SYS_UN_H +#include <sys/un.h> +#endif + +static int netutils_debugging = 0; + +/* maximize the number of file descriptors (including sockets) allowed for this + * process and return that maximum value (note -- you better not actually open + * this many -- stdin, stdout, other files opened by libraries you use, etc. all + * count toward this limit. Leave a little slack */ +rlim_t maximize_fdlimit(void) { + +#ifndef WIN32 + struct rlimit r; + static int maxfds_set = 0; + static rlim_t maxfds = 0; + + if (maxfds_set) + return maxfds; + +#ifndef RLIMIT_NOFILE + #ifdef RLIMIT_OFILE + #define RLIMIT_NOFILE RLIMIT_OFILE + #else + #error Neither RLIMIT_NOFILE nor RLIMIT_OFILE defined + #endif +#endif + if (!getrlimit(RLIMIT_NOFILE, &r)) { + maxfds = r.rlim_cur; + r.rlim_cur = r.rlim_max; + if (!setrlimit(RLIMIT_NOFILE, &r)) + if (netutils_debugging) + perror("setrlimit RLIMIT_NOFILE failed"); + + if (!getrlimit(RLIMIT_NOFILE, &r)) { + maxfds = r.rlim_cur; + } + maxfds_set = 1; + return maxfds; + } +#endif /* !WIN32 */ + return 0; +} + +#if HAVE_SYS_UN_H + #define PEER_STR_LEN sizeof(((struct sockaddr_un *) 0)->sun_path) +#else + #define PEER_STR_LEN sizeof("[ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255]:xxxxx") +#endif + +#if HAVE_SYS_UN_H +/* Get the UNIX domain socket path or empty string if the address family != AF_UNIX. */ +const char *get_unixsock_path(const struct sockaddr_storage *addr) { + struct sockaddr_un *su = (struct sockaddr_un *)addr; + + if (!addr || addr->ss_family != AF_UNIX) + return ""; + + return (const char *)su->sun_path; +} +#endif + +static int get_port(const struct sockaddr_storage *ss) { + if (ss->ss_family == AF_INET) + return ntohs(((struct sockaddr_in *) ss)->sin_port); +#if HAVE_IPV6 + else if (ss->ss_family == AF_INET6) + return ntohs(((struct sockaddr_in6 *) ss)->sin6_port); +#endif + + return -1; +} + +static char *get_addr_string(const struct sockaddr_storage *ss, size_t sslen) { + static char buffer[PEER_STR_LEN]; + +#if HAVE_SYS_UN_H + if (ss->ss_family == AF_UNIX) { + sprintf(buffer, "%s", get_unixsock_path(ss)); + return buffer; + } +#endif + + sprintf(buffer, "%s:%d", inet_ntop_ez(ss, sslen), get_port(ss)); + return buffer; +} + +/* Get the peer/host address string. + * In case we have support for UNIX domain sockets, function returns + * string containing path to UNIX socket if the address family is AF_UNIX, + * otherwise it returns string containing "<address>:<port>". */ +char *get_peeraddr_string(const struct niod *iod) { + if (iod->peerlen > 0) + return get_addr_string(&iod->peer, iod->peerlen); + else + return "peer unspecified"; +} + +/* Get the local bind address string. */ +char *get_localaddr_string(const struct niod *iod) { + return get_addr_string(&iod->local, iod->locallen); +} |