summaryrefslogtreecommitdiffstats
path: root/nsock/src/netutils.c
diff options
context:
space:
mode:
Diffstat (limited to 'nsock/src/netutils.c')
-rw-r--r--nsock/src/netutils.c183
1 files changed, 183 insertions, 0 deletions
diff --git a/nsock/src/netutils.c b/nsock/src/netutils.c
new file mode 100644
index 0000000..4523203
--- /dev/null
+++ b/nsock/src/netutils.c
@@ -0,0 +1,183 @@
+/***************************************************************************
+ * netutils.c -- This contains some useful little network/socket related *
+ * utility functions. *
+ * *
+ ***********************IMPORTANT NSOCK LICENSE TERMS***********************
+ *
+ * The nsock parallel socket event library is (C) 1999-2023 Nmap Software LLC
+ * This library is free software; you may redistribute and/or modify it under
+ * the terms of the GNU General Public License as published by the Free Software
+ * Foundation; Version 2. This guarantees your right to use, modify, and
+ * redistribute this software under certain conditions. If this license is
+ * unacceptable to you, Nmap Software LLC may be willing to sell alternative
+ * licenses (contact sales@nmap.com ).
+ *
+ * As a special exception to the GPL terms, Nmap Software LLC grants permission
+ * to link the code of this program with any version of the OpenSSL library
+ * which is distributed under a license identical to that listed in the included
+ * docs/licenses/OpenSSL.txt file, and distribute linked combinations including
+ * the two. You must obey the GNU GPL in all respects for all of the code used
+ * other than OpenSSL. If you modify this file, you may extend this exception to
+ * your version of the file, but you are not obligated to do so.
+ *
+ * If you received these files with a written license agreement stating terms
+ * other than the (GPL) terms above, then that alternative license agreement
+ * takes precedence over this comment.
+ *
+ * Source is provided to this software because we believe users have a right to
+ * know exactly what a program is going to do before they run it. This also
+ * allows you to audit the software for security holes.
+ *
+ * Source code also allows you to port Nmap to new platforms, fix bugs, and add
+ * new features. You are highly encouraged to send your changes to the
+ * dev@nmap.org mailing list for possible incorporation into the main
+ * distribution. By sending these changes to Fyodor or one of the Insecure.Org
+ * development mailing lists, or checking them into the Nmap source code
+ * repository, it is understood (unless you specify otherwise) that you are
+ * offering the Nmap Project (Nmap Software LLC) the unlimited, non-exclusive
+ * right to reuse, modify, and relicense the code. Nmap will always be available
+ * Open Source, but this is important because the inability to relicense code
+ * has caused devastating problems for other Free Software projects (such as KDE
+ * and NASM). We also occasionally relicense the code to third parties as
+ * discussed above. If you wish to specify special license conditions of your
+ * contributions, just say so when you send them.
+ *
+ * This program is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
+ * FOR A PARTICULAR PURPOSE. See the GNU General Public License v2.0 for more
+ * details (http://www.gnu.org/licenses/gpl-2.0.html).
+ *
+ ***************************************************************************/
+
+/* $Id$ */
+
+#include "netutils.h"
+#include "error.h"
+
+#if WIN32
+#include "Winsock2.h"
+#endif
+
+#if HAVE_SYS_TIME_H
+#include <sys/time.h>
+#endif
+#if HAVE_SYS_RESOURCE_H
+#include <sys/resource.h>
+#endif
+#if HAVE_UNISTD_H
+#include <unistd.h>
+#endif
+#if HAVE_NETINET_IN_H
+#include <netinet/in.h>
+#endif
+#if HAVE_SYS_TYPES_H
+#include <sys/types.h>
+#endif
+#if HAVE_SYS_SOCKET_H
+#include <sys/socket.h>
+#endif
+#if HAVE_FCNTL_H
+#include <fcntl.h>
+#endif
+#if HAVE_SYS_UN_H
+#include <sys/un.h>
+#endif
+
+static int netutils_debugging = 0;
+
+/* maximize the number of file descriptors (including sockets) allowed for this
+ * process and return that maximum value (note -- you better not actually open
+ * this many -- stdin, stdout, other files opened by libraries you use, etc. all
+ * count toward this limit. Leave a little slack */
+rlim_t maximize_fdlimit(void) {
+
+#ifndef WIN32
+ struct rlimit r;
+ static int maxfds_set = 0;
+ static rlim_t maxfds = 0;
+
+ if (maxfds_set)
+ return maxfds;
+
+#ifndef RLIMIT_NOFILE
+ #ifdef RLIMIT_OFILE
+ #define RLIMIT_NOFILE RLIMIT_OFILE
+ #else
+ #error Neither RLIMIT_NOFILE nor RLIMIT_OFILE defined
+ #endif
+#endif
+ if (!getrlimit(RLIMIT_NOFILE, &r)) {
+ maxfds = r.rlim_cur;
+ r.rlim_cur = r.rlim_max;
+ if (!setrlimit(RLIMIT_NOFILE, &r))
+ if (netutils_debugging)
+ perror("setrlimit RLIMIT_NOFILE failed");
+
+ if (!getrlimit(RLIMIT_NOFILE, &r)) {
+ maxfds = r.rlim_cur;
+ }
+ maxfds_set = 1;
+ return maxfds;
+ }
+#endif /* !WIN32 */
+ return 0;
+}
+
+#if HAVE_SYS_UN_H
+ #define PEER_STR_LEN sizeof(((struct sockaddr_un *) 0)->sun_path)
+#else
+ #define PEER_STR_LEN sizeof("[ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255]:xxxxx")
+#endif
+
+#if HAVE_SYS_UN_H
+/* Get the UNIX domain socket path or empty string if the address family != AF_UNIX. */
+const char *get_unixsock_path(const struct sockaddr_storage *addr) {
+ struct sockaddr_un *su = (struct sockaddr_un *)addr;
+
+ if (!addr || addr->ss_family != AF_UNIX)
+ return "";
+
+ return (const char *)su->sun_path;
+}
+#endif
+
+static int get_port(const struct sockaddr_storage *ss) {
+ if (ss->ss_family == AF_INET)
+ return ntohs(((struct sockaddr_in *) ss)->sin_port);
+#if HAVE_IPV6
+ else if (ss->ss_family == AF_INET6)
+ return ntohs(((struct sockaddr_in6 *) ss)->sin6_port);
+#endif
+
+ return -1;
+}
+
+static char *get_addr_string(const struct sockaddr_storage *ss, size_t sslen) {
+ static char buffer[PEER_STR_LEN];
+
+#if HAVE_SYS_UN_H
+ if (ss->ss_family == AF_UNIX) {
+ sprintf(buffer, "%s", get_unixsock_path(ss));
+ return buffer;
+ }
+#endif
+
+ sprintf(buffer, "%s:%d", inet_ntop_ez(ss, sslen), get_port(ss));
+ return buffer;
+}
+
+/* Get the peer/host address string.
+ * In case we have support for UNIX domain sockets, function returns
+ * string containing path to UNIX socket if the address family is AF_UNIX,
+ * otherwise it returns string containing "<address>:<port>". */
+char *get_peeraddr_string(const struct niod *iod) {
+ if (iod->peerlen > 0)
+ return get_addr_string(&iod->peer, iod->peerlen);
+ else
+ return "peer unspecified";
+}
+
+/* Get the local bind address string. */
+char *get_localaddr_string(const struct niod *iod) {
+ return get_addr_string(&iod->local, iod->locallen);
+}