socketpair.c 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214
  1. /* Copyright (c) 2003-2004, Roger Dingledine
  2. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  3. * Copyright (c) 2007-2019, The Tor Project, Inc. */
  4. #include "lib/cc/torint.h"
  5. #include "lib/net/socketpair.h"
  6. #include "lib/net/inaddr_st.h"
  7. #include "lib/arch/bytes.h"
  8. #include <errno.h>
  9. #include <string.h>
  10. #ifdef HAVE_UNISTD_H
  11. #include <unistd.h>
  12. #endif
  13. #ifdef HAVE_NETINET_IN_H
  14. #include <netinet/in.h>
  15. #endif
  16. #ifdef _WIN32
  17. #include <winsock2.h>
  18. #include <windows.h>
  19. #define socket_errno() (WSAGetLastError())
  20. #define SOCKET_EPROTONOSUPPORT WSAEPROTONOSUPPORT
  21. #else
  22. #define closesocket(x) close(x)
  23. #define socket_errno() (errno)
  24. #define SOCKET_EPROTONOSUPPORT EPROTONOSUPPORT
  25. #endif
  26. #ifdef NEED_ERSATZ_SOCKETPAIR
  27. // Avoid warning about call to memcmp.
  28. #define raw_memcmp memcmp
  29. /**
  30. * Return a new socket that is bound and listening on the loopback interface
  31. * of family <b>family</b> for a socket of type <b>type</b>. On failure return
  32. * TOR_INVALID_SOCKET.
  33. */
  34. static tor_socket_t
  35. get_local_listener(int family, int type)
  36. {
  37. struct sockaddr_in sin;
  38. struct sockaddr_in6 sin6;
  39. struct sockaddr *sa;
  40. int len;
  41. memset(&sin, 0, sizeof(sin));
  42. memset(&sin6, 0, sizeof(sin6));
  43. tor_socket_t sock = TOR_INVALID_SOCKET;
  44. sock = socket(family, type, 0);
  45. if (!SOCKET_OK(sock)) {
  46. return TOR_INVALID_SOCKET;
  47. }
  48. if (family == AF_INET) {
  49. sa = (struct sockaddr *) &sin;
  50. sin.sin_family = AF_INET;
  51. sin.sin_addr.s_addr = tor_htonl(0x7f000001);
  52. len = sizeof(sin);
  53. } else {
  54. sa = (struct sockaddr *) &sin6;
  55. sin6.sin6_family = AF_INET6;
  56. sin6.sin6_addr.s6_addr[15] = 1;
  57. len = sizeof(sin6);
  58. }
  59. if (bind(sock, sa, len) == -1)
  60. goto err;
  61. if (listen(sock, 1) == -1)
  62. goto err;
  63. return sock;
  64. err:
  65. closesocket(sock);
  66. return TOR_INVALID_SOCKET;
  67. }
  68. /**
  69. * Return true iff sa1 and sa2 are equivalent AF_INET or AF_INET6 addresses.
  70. */
  71. static int
  72. sockaddr_eq(struct sockaddr *sa1, struct sockaddr *sa2)
  73. {
  74. if (sa1->sa_family != sa2->sa_family)
  75. return 0;
  76. if (sa1->sa_family == AF_INET6) {
  77. struct sockaddr_in6 *sin6_1 = (struct sockaddr_in6 *) sa1;
  78. struct sockaddr_in6 *sin6_2 = (struct sockaddr_in6 *) sa2;
  79. return sin6_1->sin6_port == sin6_2->sin6_port &&
  80. 0==raw_memcmp(sin6_1->sin6_addr.s6_addr, sin6_2->sin6_addr.s6_addr, 16);
  81. } else if (sa1->sa_family == AF_INET) {
  82. struct sockaddr_in *sin_1 = (struct sockaddr_in *) sa1;
  83. struct sockaddr_in *sin_2 = (struct sockaddr_in *) sa2;
  84. return sin_1->sin_port == sin_2->sin_port &&
  85. sin_1->sin_addr.s_addr == sin_2->sin_addr.s_addr;
  86. } else {
  87. return 0;
  88. }
  89. }
  90. /**
  91. * Helper used to implement socketpair on systems that lack it, by
  92. * making a direct connection to localhost.
  93. */
  94. int
  95. tor_ersatz_socketpair(int family, int type, int protocol, tor_socket_t fd[2])
  96. {
  97. /* This socketpair does not work when localhost is down. So
  98. * it's really not the same thing at all. But it's close enough
  99. * for now, and really, when localhost is down sometimes, we
  100. * have other problems too.
  101. */
  102. tor_socket_t listener = TOR_INVALID_SOCKET;
  103. tor_socket_t connector = TOR_INVALID_SOCKET;
  104. tor_socket_t acceptor = TOR_INVALID_SOCKET;
  105. struct sockaddr_storage accepted_addr_ss;
  106. struct sockaddr_storage connect_addr_ss;
  107. struct sockaddr *connect_addr = (struct sockaddr *) &connect_addr_ss;
  108. struct sockaddr *accepted_addr = (struct sockaddr *) &accepted_addr_ss;
  109. socklen_t size;
  110. int saved_errno = -1;
  111. int ersatz_domain = AF_INET;
  112. socklen_t addrlen = sizeof(struct sockaddr_in);
  113. memset(&accepted_addr_ss, 0, sizeof(accepted_addr_ss));
  114. memset(&connect_addr_ss, 0, sizeof(connect_addr_ss));
  115. if (protocol
  116. #ifdef AF_UNIX
  117. || family != AF_UNIX
  118. #endif
  119. ) {
  120. #ifdef _WIN32
  121. return -WSAEAFNOSUPPORT;
  122. #else
  123. return -EAFNOSUPPORT;
  124. #endif
  125. }
  126. if (!fd) {
  127. return -EINVAL;
  128. }
  129. listener = get_local_listener(ersatz_domain, type);
  130. if (!SOCKET_OK(listener)) {
  131. int first_errno = socket_errno();
  132. if (first_errno == SOCKET_EPROTONOSUPPORT) {
  133. /* Assume we're on an IPv6-only system */
  134. ersatz_domain = AF_INET6;
  135. addrlen = sizeof(struct sockaddr_in6);
  136. listener = get_local_listener(ersatz_domain, type);
  137. }
  138. if (!SOCKET_OK(listener)) {
  139. /* Keep the previous behaviour, which was to return the IPv4 error.
  140. * (This may be less informative on IPv6-only systems.)
  141. * XX/teor - is there a better way to decide which errno to return?
  142. * (I doubt we care much either way, once there is an error.)
  143. */
  144. return -first_errno;
  145. }
  146. }
  147. connector = socket(ersatz_domain, type, 0);
  148. if (!SOCKET_OK(connector))
  149. goto tidy_up_and_fail;
  150. /* We want to find out the port number to connect to. */
  151. size = sizeof(connect_addr_ss);
  152. if (getsockname(listener, connect_addr, &size) == -1)
  153. goto tidy_up_and_fail;
  154. if (size != addrlen)
  155. goto abort_tidy_up_and_fail;
  156. if (connect(connector, connect_addr, size) == -1)
  157. goto tidy_up_and_fail;
  158. size = sizeof(accepted_addr_ss);
  159. acceptor = accept(listener, accepted_addr, &size);
  160. if (!SOCKET_OK(acceptor))
  161. goto tidy_up_and_fail;
  162. if (size != addrlen)
  163. goto abort_tidy_up_and_fail;
  164. /* Now check we are talking to ourself by matching port and host on the
  165. two sockets. */
  166. if (getsockname(connector, connect_addr, &size) == -1)
  167. goto tidy_up_and_fail;
  168. /* Set *_tor_addr and *_port to the address and port that was used */
  169. if (!sockaddr_eq(accepted_addr, connect_addr))
  170. goto abort_tidy_up_and_fail;
  171. closesocket(listener);
  172. fd[0] = connector;
  173. fd[1] = acceptor;
  174. return 0;
  175. abort_tidy_up_and_fail:
  176. #ifdef _WIN32
  177. saved_errno = WSAECONNABORTED;
  178. #else
  179. saved_errno = ECONNABORTED; /* I hope this is portable and appropriate. */
  180. #endif
  181. tidy_up_and_fail:
  182. if (saved_errno < 0)
  183. saved_errno = errno;
  184. if (SOCKET_OK(listener))
  185. closesocket(listener);
  186. if (SOCKET_OK(connector))
  187. closesocket(connector);
  188. if (SOCKET_OK(acceptor))
  189. closesocket(acceptor);
  190. return -saved_errno;
  191. }
  192. #endif /* defined(NEED_ERSATZ_SOCKETPAIR) */