socketpair.c 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213
  1. /* Copyright (c) 2003-2004, Roger Dingledine
  2. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  3. * Copyright (c) 2007-2018, The Tor Project, Inc. */
  4. #include "lib/net/socketpair.h"
  5. #include "lib/net/inaddr_st.h"
  6. #include "lib/arch/bytes.h"
  7. #include <errno.h>
  8. #include <string.h>
  9. #ifdef HAVE_UNISTD_H
  10. #include <unistd.h>
  11. #endif
  12. #ifdef HAVE_NETINET_IN_H
  13. #include <netinet/in.h>
  14. #endif
  15. #ifdef _WIN32
  16. #include <winsock2.h>
  17. #include <windows.h>
  18. #define socket_errno() (WSAGetLastError())
  19. #define SOCKET_EPROTONOSUPPORT WSAEPROTONOSUPPORT
  20. #else
  21. #define closesocket(x) close(x)
  22. #define socket_errno() (errno)
  23. #define SOCKET_EPROTONOSUPPORT EPROTONOSUPPORT
  24. #endif
  25. #ifdef NEED_ERSATZ_SOCKETPAIR
  26. // Avoid warning about call to memcmp.
  27. #define raw_memcmp memcmp
  28. /**
  29. * Return a new socket that is bound and listening on the loopback interface
  30. * of family <b>family</b> for a socket of type <b>type</b>. On failure return
  31. * TOR_INVALID_SOCKET.
  32. */
  33. static tor_socket_t
  34. get_local_listener(int family, int type)
  35. {
  36. struct sockaddr_in sin;
  37. struct sockaddr_in6 sin6;
  38. struct sockaddr *sa;
  39. int len;
  40. memset(&sin, 0, sizeof(sin));
  41. memset(&sin6, 0, sizeof(sin6));
  42. tor_socket_t sock = TOR_INVALID_SOCKET;
  43. sock = socket(family, type, 0);
  44. if (!SOCKET_OK(sock)) {
  45. return TOR_INVALID_SOCKET;
  46. }
  47. if (family == AF_INET) {
  48. sa = (struct sockaddr *) &sin;
  49. sin.sin_family = AF_INET;
  50. sin.sin_addr.s_addr = tor_htonl(0x7f000001);
  51. len = sizeof(sin);
  52. } else {
  53. sa = (struct sockaddr *) &sin6;
  54. sin6.sin6_family = AF_INET;
  55. sin6.sin6_addr.s6_addr[15] = 1;
  56. len = sizeof(sin6);
  57. }
  58. if (bind(sock, sa, len) == -1)
  59. goto err;
  60. if (listen(sock, 1) == -1)
  61. goto err;
  62. return sock;
  63. err:
  64. closesocket(sock);
  65. return TOR_INVALID_SOCKET;
  66. }
  67. /**
  68. * Return true iff sa1 and sa2 are equivalent AF_INET or AF_INET6 addresses.
  69. */
  70. static int
  71. sockaddr_eq(struct sockaddr *sa1, struct sockaddr *sa2)
  72. {
  73. if (sa1->sa_family != sa2->sa_family)
  74. return 0;
  75. if (sa1->sa_family == AF_INET6) {
  76. struct sockaddr_in6 *sin6_1 = (struct sockaddr_in6 *) sa1;
  77. struct sockaddr_in6 *sin6_2 = (struct sockaddr_in6 *) sa2;
  78. return sin6_1->sin6_port == sin6_2->sin6_port &&
  79. 0==raw_memcmp(sin6_1->sin6_addr.s6_addr, sin6_2->sin6_addr.s6_addr, 16);
  80. } else if (sa1->sa_family == AF_INET) {
  81. struct sockaddr_in *sin_1 = (struct sockaddr_in *) sa1;
  82. struct sockaddr_in *sin_2 = (struct sockaddr_in *) sa2;
  83. return sin_1->sin_port == sin_2->sin_port &&
  84. sin_1->sin_addr.s_addr == sin_2->sin_addr.s_addr;
  85. } else {
  86. return 0;
  87. }
  88. }
  89. /**
  90. * Helper used to implement socketpair on systems that lack it, by
  91. * making a direct connection to localhost.
  92. */
  93. int
  94. tor_ersatz_socketpair(int family, int type, int protocol, tor_socket_t fd[2])
  95. {
  96. /* This socketpair does not work when localhost is down. So
  97. * it's really not the same thing at all. But it's close enough
  98. * for now, and really, when localhost is down sometimes, we
  99. * have other problems too.
  100. */
  101. tor_socket_t listener = TOR_INVALID_SOCKET;
  102. tor_socket_t connector = TOR_INVALID_SOCKET;
  103. tor_socket_t acceptor = TOR_INVALID_SOCKET;
  104. struct sockaddr_storage accepted_addr_ss;
  105. struct sockaddr_storage connect_addr_ss;
  106. struct sockaddr *connect_addr = (struct sockaddr *) &connect_addr_ss;
  107. struct sockaddr *accepted_addr = (struct sockaddr *) &accepted_addr_ss;
  108. socklen_t size;
  109. int saved_errno = -1;
  110. int ersatz_domain = AF_INET;
  111. socklen_t addrlen = sizeof(struct sockaddr_in);
  112. memset(&accepted_addr_ss, 0, sizeof(accepted_addr_ss));
  113. memset(&connect_addr_ss, 0, sizeof(connect_addr_ss));
  114. if (protocol
  115. #ifdef AF_UNIX
  116. || family != AF_UNIX
  117. #endif
  118. ) {
  119. #ifdef _WIN32
  120. return -WSAEAFNOSUPPORT;
  121. #else
  122. return -EAFNOSUPPORT;
  123. #endif
  124. }
  125. if (!fd) {
  126. return -EINVAL;
  127. }
  128. listener = get_local_listener(ersatz_domain, type);
  129. if (!SOCKET_OK(listener)) {
  130. int first_errno = socket_errno();
  131. if (first_errno == SOCKET_EPROTONOSUPPORT) {
  132. /* Assume we're on an IPv6-only system */
  133. ersatz_domain = AF_INET6;
  134. addrlen = sizeof(struct sockaddr_in6);
  135. listener = get_local_listener(ersatz_domain, type);
  136. }
  137. if (!SOCKET_OK(listener)) {
  138. /* Keep the previous behaviour, which was to return the IPv4 error.
  139. * (This may be less informative on IPv6-only systems.)
  140. * XX/teor - is there a better way to decide which errno to return?
  141. * (I doubt we care much either way, once there is an error.)
  142. */
  143. return -first_errno;
  144. }
  145. }
  146. connector = socket(ersatz_domain, type, 0);
  147. if (!SOCKET_OK(connector))
  148. goto tidy_up_and_fail;
  149. /* We want to find out the port number to connect to. */
  150. size = sizeof(connect_addr_ss);
  151. if (getsockname(listener, connect_addr, &size) == -1)
  152. goto tidy_up_and_fail;
  153. if (size != addrlen)
  154. goto abort_tidy_up_and_fail;
  155. if (connect(connector, connect_addr, size) == -1)
  156. goto tidy_up_and_fail;
  157. size = sizeof(accepted_addr_ss);
  158. acceptor = accept(listener, accepted_addr, &size);
  159. if (!SOCKET_OK(acceptor))
  160. goto tidy_up_and_fail;
  161. if (size != addrlen)
  162. goto abort_tidy_up_and_fail;
  163. /* Now check we are talking to ourself by matching port and host on the
  164. two sockets. */
  165. if (getsockname(connector, connect_addr, &size) == -1)
  166. goto tidy_up_and_fail;
  167. /* Set *_tor_addr and *_port to the address and port that was used */
  168. if (!sockaddr_eq(accepted_addr, connect_addr))
  169. goto abort_tidy_up_and_fail;
  170. closesocket(listener);
  171. fd[0] = connector;
  172. fd[1] = acceptor;
  173. return 0;
  174. abort_tidy_up_and_fail:
  175. #ifdef _WIN32
  176. saved_errno = WSAECONNABORTED;
  177. #else
  178. saved_errno = ECONNABORTED; /* I hope this is portable and appropriate. */
  179. #endif
  180. tidy_up_and_fail:
  181. if (saved_errno < 0)
  182. saved_errno = errno;
  183. if (SOCKET_OK(listener))
  184. closesocket(listener);
  185. if (SOCKET_OK(connector))
  186. closesocket(connector);
  187. if (SOCKET_OK(acceptor))
  188. closesocket(acceptor);
  189. return -saved_errno;
  190. }
  191. #endif /* defined(NEED_ERSATZ_SOCKETPAIR) */