2012-01-03 23:33:31 +01:00
|
|
|
// Copyright (c) 2009-2010 Satoshi Nakamoto
|
2014-02-08 22:50:24 +01:00
|
|
|
// Copyright (c) 2009-2014 The Bitcoin developers
|
2012-01-03 23:33:31 +01:00
|
|
|
// Distributed under the MIT/X11 software license, see the accompanying
|
2012-05-18 16:02:28 +02:00
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
2012-01-03 23:33:31 +01:00
|
|
|
|
2014-06-26 20:55:39 +02:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "bitcoin-config.h"
|
|
|
|
#endif
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
#include "netbase.h"
|
2013-04-13 07:13:08 +02:00
|
|
|
|
2012-12-18 20:56:21 +01:00
|
|
|
#include "hash.h"
|
2013-04-13 07:13:08 +02:00
|
|
|
#include "sync.h"
|
|
|
|
#include "uint256.h"
|
|
|
|
#include "util.h"
|
Split up util.cpp/h
Split up util.cpp/h into:
- string utilities (hex, base32, base64): no internal dependencies, no dependency on boost (apart from foreach)
- money utilities (parsesmoney, formatmoney)
- time utilities (gettime*, sleep, format date):
- and the rest (logging, argument parsing, config file parsing)
The latter is basically the environment and OS handling,
and is stripped of all utility functions, so we may want to
rename it to something else than util.cpp/h for clarity (Matt suggested
osinterface).
Breaks dependency of sha256.cpp on all the things pulled in by util.
2014-08-21 16:11:09 +02:00
|
|
|
#include "utilstrencodings.h"
|
2013-04-13 07:13:08 +02:00
|
|
|
|
2014-07-09 11:00:00 +02:00
|
|
|
#ifdef HAVE_GETADDRINFO_A
|
|
|
|
#include <netdb.h>
|
|
|
|
#endif
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
#ifndef WIN32
|
2014-07-07 10:44:30 +02:00
|
|
|
#if HAVE_INET_PTON
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#endif
|
2013-07-17 10:51:40 +02:00
|
|
|
#include <fcntl.h>
|
2012-01-03 23:33:31 +01:00
|
|
|
#endif
|
|
|
|
|
2012-05-13 00:40:30 +02:00
|
|
|
#include <boost/algorithm/string/case_conv.hpp> // for to_lower()
|
2012-10-02 21:36:39 +02:00
|
|
|
#include <boost/algorithm/string/predicate.hpp> // for startswith() and endswith()
|
Split up util.cpp/h
Split up util.cpp/h into:
- string utilities (hex, base32, base64): no internal dependencies, no dependency on boost (apart from foreach)
- money utilities (parsesmoney, formatmoney)
- time utilities (gettime*, sleep, format date):
- and the rest (logging, argument parsing, config file parsing)
The latter is basically the environment and OS handling,
and is stripped of all utility functions, so we may want to
rename it to something else than util.cpp/h for clarity (Matt suggested
osinterface).
Breaks dependency of sha256.cpp on all the things pulled in by util.
2014-08-21 16:11:09 +02:00
|
|
|
#include <boost/thread.hpp>
|
2012-01-03 23:33:31 +01:00
|
|
|
|
2013-04-13 07:13:08 +02:00
|
|
|
#if !defined(HAVE_MSG_NOSIGNAL) && !defined(MSG_NOSIGNAL)
|
2013-05-28 01:55:01 +02:00
|
|
|
#define MSG_NOSIGNAL 0
|
|
|
|
#endif
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
using namespace std;
|
|
|
|
|
|
|
|
// Settings
|
2012-05-24 19:02:21 +02:00
|
|
|
static proxyType proxyInfo[NET_MAX];
|
2014-06-11 13:20:59 +02:00
|
|
|
static CService nameProxy;
|
2012-09-23 12:55:05 +02:00
|
|
|
static CCriticalSection cs_proxyInfos;
|
2012-01-03 23:33:31 +01:00
|
|
|
int nConnectTimeout = 5000;
|
2012-05-24 19:02:21 +02:00
|
|
|
bool fNameLookup = false;
|
2012-01-03 23:33:31 +01:00
|
|
|
|
|
|
|
static const unsigned char pchIPv4[12] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xff, 0xff };
|
|
|
|
|
2012-04-10 20:22:04 +02:00
|
|
|
enum Network ParseNetwork(std::string net) {
|
2012-05-13 00:40:30 +02:00
|
|
|
boost::to_lower(net);
|
2012-04-10 20:22:04 +02:00
|
|
|
if (net == "ipv4") return NET_IPV4;
|
|
|
|
if (net == "ipv6") return NET_IPV6;
|
2014-07-30 15:27:03 +02:00
|
|
|
if (net == "tor" || net == "onion") return NET_TOR;
|
2012-04-10 20:22:04 +02:00
|
|
|
return NET_UNROUTABLE;
|
|
|
|
}
|
|
|
|
|
2014-07-30 15:32:36 +02:00
|
|
|
std::string GetNetworkName(enum Network net) {
|
|
|
|
switch(net)
|
|
|
|
{
|
|
|
|
case NET_IPV4: return "ipv4";
|
|
|
|
case NET_IPV6: return "ipv6";
|
|
|
|
case NET_TOR: return "onion";
|
|
|
|
default: return "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-30 22:44:23 +02:00
|
|
|
void SplitHostPort(std::string in, int &portOut, std::string &hostOut) {
|
|
|
|
size_t colon = in.find_last_of(':');
|
|
|
|
// if a : is found, and it either follows a [...], or no other : is in the string, treat it as port separator
|
|
|
|
bool fHaveColon = colon != in.npos;
|
|
|
|
bool fBracketed = fHaveColon && (in[0]=='[' && in[colon-1]==']'); // if there is a colon, and in[0]=='[', colon is not 0, so in[colon-1] is safe
|
|
|
|
bool fMultiColon = fHaveColon && (in.find_last_of(':',colon-1) != in.npos);
|
|
|
|
if (fHaveColon && (colon==0 || fBracketed || !fMultiColon)) {
|
2014-05-03 10:25:58 +02:00
|
|
|
int32_t n;
|
|
|
|
if (ParseInt32(in.substr(colon + 1), &n) && n > 0 && n < 0x10000) {
|
2012-05-30 22:44:23 +02:00
|
|
|
in = in.substr(0, colon);
|
2014-05-03 10:25:58 +02:00
|
|
|
portOut = n;
|
2012-05-30 22:44:23 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (in.size()>0 && in[0] == '[' && in[in.size()-1] == ']')
|
|
|
|
hostOut = in.substr(1, in.size()-2);
|
|
|
|
else
|
|
|
|
hostOut = in;
|
|
|
|
}
|
|
|
|
|
2012-04-15 22:58:32 +02:00
|
|
|
bool static LookupIntern(const char *pszName, std::vector<CNetAddr>& vIP, unsigned int nMaxSolutions, bool fAllowLookup)
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
|
|
|
vIP.clear();
|
2012-04-29 02:11:56 +02:00
|
|
|
|
|
|
|
{
|
|
|
|
CNetAddr addr;
|
|
|
|
if (addr.SetSpecial(std::string(pszName))) {
|
|
|
|
vIP.push_back(addr);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-26 20:55:39 +02:00
|
|
|
#ifdef HAVE_GETADDRINFO_A
|
|
|
|
struct in_addr ipv4_addr;
|
|
|
|
#ifdef HAVE_INET_PTON
|
|
|
|
if (inet_pton(AF_INET, pszName, &ipv4_addr) > 0) {
|
|
|
|
vIP.push_back(CNetAddr(ipv4_addr));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct in6_addr ipv6_addr;
|
|
|
|
if (inet_pton(AF_INET6, pszName, &ipv6_addr) > 0) {
|
|
|
|
vIP.push_back(CNetAddr(ipv6_addr));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
ipv4_addr.s_addr = inet_addr(pszName);
|
|
|
|
if (ipv4_addr.s_addr != INADDR_NONE) {
|
|
|
|
vIP.push_back(CNetAddr(ipv4_addr));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2012-01-13 02:02:47 +01:00
|
|
|
struct addrinfo aiHint;
|
|
|
|
memset(&aiHint, 0, sizeof(struct addrinfo));
|
2012-01-03 23:33:31 +01:00
|
|
|
aiHint.ai_socktype = SOCK_STREAM;
|
|
|
|
aiHint.ai_protocol = IPPROTO_TCP;
|
|
|
|
aiHint.ai_family = AF_UNSPEC;
|
2013-04-27 14:27:05 +02:00
|
|
|
#ifdef WIN32
|
2012-06-19 02:22:09 +02:00
|
|
|
aiHint.ai_flags = fAllowLookup ? 0 : AI_NUMERICHOST;
|
2012-01-03 23:33:31 +01:00
|
|
|
#else
|
2012-06-19 02:22:09 +02:00
|
|
|
aiHint.ai_flags = fAllowLookup ? AI_ADDRCONFIG : AI_NUMERICHOST;
|
2012-01-03 23:33:31 +01:00
|
|
|
#endif
|
2014-06-26 20:55:39 +02:00
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
struct addrinfo *aiRes = NULL;
|
2014-06-26 20:55:39 +02:00
|
|
|
#ifdef HAVE_GETADDRINFO_A
|
|
|
|
struct gaicb gcb, *query = &gcb;
|
|
|
|
memset(query, 0, sizeof(struct gaicb));
|
|
|
|
gcb.ar_name = pszName;
|
|
|
|
gcb.ar_request = &aiHint;
|
|
|
|
int nErr = getaddrinfo_a(GAI_NOWAIT, &query, 1, NULL);
|
|
|
|
if (nErr)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
do {
|
|
|
|
// Should set the timeout limit to a resonable value to avoid
|
|
|
|
// generating unnecessary checking call during the polling loop,
|
|
|
|
// while it can still response to stop request quick enough.
|
|
|
|
// 2 seconds looks fine in our situation.
|
|
|
|
struct timespec ts = { 2, 0 };
|
|
|
|
gai_suspend(&query, 1, &ts);
|
|
|
|
boost::this_thread::interruption_point();
|
|
|
|
|
|
|
|
nErr = gai_error(query);
|
|
|
|
if (0 == nErr)
|
|
|
|
aiRes = query->ar_result;
|
|
|
|
} while (nErr == EAI_INPROGRESS);
|
|
|
|
#else
|
2012-01-03 23:33:31 +01:00
|
|
|
int nErr = getaddrinfo(pszName, NULL, &aiHint, &aiRes);
|
2014-06-26 20:55:39 +02:00
|
|
|
#endif
|
2012-01-03 23:33:31 +01:00
|
|
|
if (nErr)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
struct addrinfo *aiTrav = aiRes;
|
|
|
|
while (aiTrav != NULL && (nMaxSolutions == 0 || vIP.size() < nMaxSolutions))
|
|
|
|
{
|
|
|
|
if (aiTrav->ai_family == AF_INET)
|
|
|
|
{
|
|
|
|
assert(aiTrav->ai_addrlen >= sizeof(sockaddr_in));
|
|
|
|
vIP.push_back(CNetAddr(((struct sockaddr_in*)(aiTrav->ai_addr))->sin_addr));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aiTrav->ai_family == AF_INET6)
|
|
|
|
{
|
|
|
|
assert(aiTrav->ai_addrlen >= sizeof(sockaddr_in6));
|
|
|
|
vIP.push_back(CNetAddr(((struct sockaddr_in6*)(aiTrav->ai_addr))->sin6_addr));
|
|
|
|
}
|
|
|
|
|
|
|
|
aiTrav = aiTrav->ai_next;
|
|
|
|
}
|
|
|
|
|
|
|
|
freeaddrinfo(aiRes);
|
|
|
|
|
|
|
|
return (vIP.size() > 0);
|
|
|
|
}
|
|
|
|
|
2012-04-15 22:58:32 +02:00
|
|
|
bool LookupHost(const char *pszName, std::vector<CNetAddr>& vIP, unsigned int nMaxSolutions, bool fAllowLookup)
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
2013-04-27 14:27:05 +02:00
|
|
|
std::string strHost(pszName);
|
|
|
|
if (strHost.empty())
|
2012-01-03 23:33:31 +01:00
|
|
|
return false;
|
2013-04-27 14:27:05 +02:00
|
|
|
if (boost::algorithm::starts_with(strHost, "[") && boost::algorithm::ends_with(strHost, "]"))
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
2013-04-27 14:27:05 +02:00
|
|
|
strHost = strHost.substr(1, strHost.size() - 2);
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
2012-10-02 21:36:39 +02:00
|
|
|
return LookupIntern(strHost.c_str(), vIP, nMaxSolutions, fAllowLookup);
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
2012-04-15 22:58:32 +02:00
|
|
|
bool Lookup(const char *pszName, std::vector<CService>& vAddr, int portDefault, bool fAllowLookup, unsigned int nMaxSolutions)
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
|
|
|
if (pszName[0] == 0)
|
|
|
|
return false;
|
|
|
|
int port = portDefault;
|
2012-05-30 22:44:23 +02:00
|
|
|
std::string hostname = "";
|
|
|
|
SplitHostPort(std::string(pszName), port, hostname);
|
2012-01-03 23:33:31 +01:00
|
|
|
|
|
|
|
std::vector<CNetAddr> vIP;
|
2012-05-30 22:44:23 +02:00
|
|
|
bool fRet = LookupIntern(hostname.c_str(), vIP, nMaxSolutions, fAllowLookup);
|
2011-12-17 01:48:03 +01:00
|
|
|
if (!fRet)
|
|
|
|
return false;
|
|
|
|
vAddr.resize(vIP.size());
|
2012-04-15 22:52:09 +02:00
|
|
|
for (unsigned int i = 0; i < vIP.size(); i++)
|
2011-12-17 01:48:03 +01:00
|
|
|
vAddr[i] = CService(vIP[i], port);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool Lookup(const char *pszName, CService& addr, int portDefault, bool fAllowLookup)
|
|
|
|
{
|
|
|
|
std::vector<CService> vService;
|
|
|
|
bool fRet = Lookup(pszName, vService, portDefault, fAllowLookup, 1);
|
2012-01-03 23:33:31 +01:00
|
|
|
if (!fRet)
|
|
|
|
return false;
|
2011-12-17 01:48:03 +01:00
|
|
|
addr = vService[0];
|
2012-01-03 23:33:31 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool LookupNumeric(const char *pszName, CService& addr, int portDefault)
|
|
|
|
{
|
|
|
|
return Lookup(pszName, addr, portDefault, false);
|
|
|
|
}
|
|
|
|
|
2012-04-19 17:02:21 +02:00
|
|
|
bool static Socks5(string strDest, int port, SOCKET& hSocket)
|
2012-04-01 20:25:48 +02:00
|
|
|
{
|
2014-01-16 16:15:27 +01:00
|
|
|
LogPrintf("SOCKS5 connecting %s\n", strDest);
|
2012-04-19 17:02:21 +02:00
|
|
|
if (strDest.size() > 255)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-19 17:02:21 +02:00
|
|
|
return error("Hostname too long");
|
|
|
|
}
|
2012-04-01 20:25:48 +02:00
|
|
|
char pszSocks5Init[] = "\5\1\0";
|
2012-07-07 16:11:54 +02:00
|
|
|
ssize_t nSize = sizeof(pszSocks5Init) - 1;
|
2012-04-01 20:25:48 +02:00
|
|
|
|
2013-04-27 14:27:05 +02:00
|
|
|
ssize_t ret = send(hSocket, pszSocks5Init, nSize, MSG_NOSIGNAL);
|
2012-04-01 20:25:48 +02:00
|
|
|
if (ret != nSize)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Error sending to proxy");
|
|
|
|
}
|
|
|
|
char pchRet1[2];
|
|
|
|
if (recv(hSocket, pchRet1, 2, 0) != 2)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Error reading proxy response");
|
|
|
|
}
|
|
|
|
if (pchRet1[0] != 0x05 || pchRet1[1] != 0x00)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Proxy failed to initialize");
|
|
|
|
}
|
2012-04-19 16:13:30 +02:00
|
|
|
string strSocks5("\5\1");
|
|
|
|
strSocks5 += '\000'; strSocks5 += '\003';
|
|
|
|
strSocks5 += static_cast<char>(std::min((int)strDest.size(), 255));
|
2012-09-18 21:07:58 +02:00
|
|
|
strSocks5 += strDest;
|
2012-04-19 17:02:21 +02:00
|
|
|
strSocks5 += static_cast<char>((port >> 8) & 0xFF);
|
|
|
|
strSocks5 += static_cast<char>((port >> 0) & 0xFF);
|
2012-04-19 16:13:30 +02:00
|
|
|
ret = send(hSocket, strSocks5.c_str(), strSocks5.size(), MSG_NOSIGNAL);
|
2012-05-09 03:48:14 +02:00
|
|
|
if (ret != (ssize_t)strSocks5.size())
|
2012-04-01 20:25:48 +02:00
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Error sending to proxy");
|
|
|
|
}
|
|
|
|
char pchRet2[4];
|
|
|
|
if (recv(hSocket, pchRet2, 4, 0) != 4)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Error reading proxy response");
|
|
|
|
}
|
|
|
|
if (pchRet2[0] != 0x05)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Proxy failed to accept request");
|
|
|
|
}
|
|
|
|
if (pchRet2[1] != 0x00)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
switch (pchRet2[1])
|
|
|
|
{
|
|
|
|
case 0x01: return error("Proxy error: general failure");
|
|
|
|
case 0x02: return error("Proxy error: connection not allowed");
|
|
|
|
case 0x03: return error("Proxy error: network unreachable");
|
|
|
|
case 0x04: return error("Proxy error: host unreachable");
|
|
|
|
case 0x05: return error("Proxy error: connection refused");
|
|
|
|
case 0x06: return error("Proxy error: TTL expired");
|
|
|
|
case 0x07: return error("Proxy error: protocol error");
|
|
|
|
case 0x08: return error("Proxy error: address type not supported");
|
|
|
|
default: return error("Proxy error: unknown");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (pchRet2[2] != 0x00)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Error: malformed proxy response");
|
|
|
|
}
|
|
|
|
char pchRet3[256];
|
|
|
|
switch (pchRet2[3])
|
|
|
|
{
|
|
|
|
case 0x01: ret = recv(hSocket, pchRet3, 4, 0) != 4; break;
|
|
|
|
case 0x04: ret = recv(hSocket, pchRet3, 16, 0) != 16; break;
|
|
|
|
case 0x03:
|
|
|
|
{
|
|
|
|
ret = recv(hSocket, pchRet3, 1, 0) != 1;
|
2014-04-10 02:09:17 +02:00
|
|
|
if (ret) {
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Error reading from proxy");
|
2014-04-10 02:09:17 +02:00
|
|
|
}
|
2012-04-01 20:25:48 +02:00
|
|
|
int nRecv = pchRet3[0];
|
|
|
|
ret = recv(hSocket, pchRet3, nRecv, 0) != nRecv;
|
|
|
|
break;
|
|
|
|
}
|
2014-07-10 12:13:03 +02:00
|
|
|
default: CloseSocket(hSocket); return error("Error: malformed proxy response");
|
2012-04-01 20:25:48 +02:00
|
|
|
}
|
|
|
|
if (ret)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Error reading from proxy");
|
|
|
|
}
|
|
|
|
if (recv(hSocket, pchRet3, 2, 0) != 2)
|
|
|
|
{
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-04-01 20:25:48 +02:00
|
|
|
return error("Error reading from proxy");
|
|
|
|
}
|
2014-01-16 16:15:27 +01:00
|
|
|
LogPrintf("SOCKS5 connected %s\n", strDest);
|
2012-04-01 20:25:48 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-04-19 17:02:21 +02:00
|
|
|
bool static ConnectSocketDirectly(const CService &addrConnect, SOCKET& hSocketRet, int nTimeout)
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
|
|
|
hSocketRet = INVALID_SOCKET;
|
|
|
|
|
2012-05-11 15:28:59 +02:00
|
|
|
struct sockaddr_storage sockaddr;
|
|
|
|
socklen_t len = sizeof(sockaddr);
|
|
|
|
if (!addrConnect.GetSockAddr((struct sockaddr*)&sockaddr, &len)) {
|
2014-01-16 16:15:27 +01:00
|
|
|
LogPrintf("Cannot connect to %s: unsupported network\n", addrConnect.ToString());
|
2012-03-31 17:58:25 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-05-11 15:28:59 +02:00
|
|
|
SOCKET hSocket = socket(((struct sockaddr*)&sockaddr)->sa_family, SOCK_STREAM, IPPROTO_TCP);
|
2012-01-03 23:33:31 +01:00
|
|
|
if (hSocket == INVALID_SOCKET)
|
|
|
|
return false;
|
2014-07-09 11:00:00 +02:00
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
#ifdef SO_NOSIGPIPE
|
|
|
|
int set = 1;
|
2014-06-16 15:55:39 +02:00
|
|
|
// Different way of disabling SIGPIPE on BSD
|
2012-01-03 23:33:31 +01:00
|
|
|
setsockopt(hSocket, SOL_SOCKET, SO_NOSIGPIPE, (void*)&set, sizeof(int));
|
|
|
|
#endif
|
|
|
|
|
2014-07-09 11:00:00 +02:00
|
|
|
// Set to non-blocking
|
|
|
|
if (!SetSocketNonBlocking(hSocket, true))
|
|
|
|
return error("ConnectSocketDirectly: Setting socket to non-blocking failed, error %s\n", NetworkErrorString(WSAGetLastError()));
|
2012-01-03 23:33:31 +01:00
|
|
|
|
2012-05-11 15:28:59 +02:00
|
|
|
if (connect(hSocket, (struct sockaddr*)&sockaddr, len) == SOCKET_ERROR)
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
2014-06-22 20:17:15 +02:00
|
|
|
int nErr = WSAGetLastError();
|
2012-01-03 23:33:31 +01:00
|
|
|
// WSAEINVAL is here because some legacy version of winsock uses it
|
2014-06-22 20:17:15 +02:00
|
|
|
if (nErr == WSAEINPROGRESS || nErr == WSAEWOULDBLOCK || nErr == WSAEINVAL)
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
|
|
|
struct timeval timeout;
|
|
|
|
timeout.tv_sec = nTimeout / 1000;
|
|
|
|
timeout.tv_usec = (nTimeout % 1000) * 1000;
|
|
|
|
|
|
|
|
fd_set fdset;
|
|
|
|
FD_ZERO(&fdset);
|
|
|
|
FD_SET(hSocket, &fdset);
|
|
|
|
int nRet = select(hSocket + 1, NULL, &fdset, NULL, &timeout);
|
|
|
|
if (nRet == 0)
|
|
|
|
{
|
2014-01-16 16:15:27 +01:00
|
|
|
LogPrint("net", "connection to %s timeout\n", addrConnect.ToString());
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-01-03 23:33:31 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (nRet == SOCKET_ERROR)
|
|
|
|
{
|
2014-05-08 14:15:19 +02:00
|
|
|
LogPrintf("select() for %s failed: %s\n", addrConnect.ToString(), NetworkErrorString(WSAGetLastError()));
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-01-03 23:33:31 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
socklen_t nRetSize = sizeof(nRet);
|
|
|
|
#ifdef WIN32
|
|
|
|
if (getsockopt(hSocket, SOL_SOCKET, SO_ERROR, (char*)(&nRet), &nRetSize) == SOCKET_ERROR)
|
|
|
|
#else
|
|
|
|
if (getsockopt(hSocket, SOL_SOCKET, SO_ERROR, &nRet, &nRetSize) == SOCKET_ERROR)
|
|
|
|
#endif
|
|
|
|
{
|
2014-05-08 14:15:19 +02:00
|
|
|
LogPrintf("getsockopt() for %s failed: %s\n", addrConnect.ToString(), NetworkErrorString(WSAGetLastError()));
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-01-03 23:33:31 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (nRet != 0)
|
|
|
|
{
|
2014-05-08 14:15:19 +02:00
|
|
|
LogPrintf("connect() to %s failed after select(): %s\n", addrConnect.ToString(), NetworkErrorString(nRet));
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-01-03 23:33:31 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#ifdef WIN32
|
|
|
|
else if (WSAGetLastError() != WSAEISCONN)
|
|
|
|
#else
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
2014-05-08 14:15:19 +02:00
|
|
|
LogPrintf("connect() to %s failed: %s\n", addrConnect.ToString(), NetworkErrorString(WSAGetLastError()));
|
2014-07-10 12:13:03 +02:00
|
|
|
CloseSocket(hSocket);
|
2012-01-03 23:33:31 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-09 11:00:00 +02:00
|
|
|
// This is required when using SOCKS5 proxy!
|
|
|
|
// CNode::ConnectNode turns the socket back to non-blocking.
|
|
|
|
if (!SetSocketNonBlocking(hSocket, false))
|
|
|
|
return error("ConnectSocketDirectly: Setting socket to blocking failed, error %s\n", NetworkErrorString(WSAGetLastError()));
|
2012-01-03 23:33:31 +01:00
|
|
|
|
2012-04-19 17:02:21 +02:00
|
|
|
hSocketRet = hSocket;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-06-11 13:20:59 +02:00
|
|
|
bool SetProxy(enum Network net, CService addrProxy) {
|
2012-05-24 19:02:21 +02:00
|
|
|
assert(net >= 0 && net < NET_MAX);
|
2014-06-11 13:20:59 +02:00
|
|
|
if (!addrProxy.IsValid())
|
2012-05-24 19:02:21 +02:00
|
|
|
return false;
|
2012-09-23 12:55:05 +02:00
|
|
|
LOCK(cs_proxyInfos);
|
2014-06-11 13:20:59 +02:00
|
|
|
proxyInfo[net] = addrProxy;
|
2012-05-24 19:02:21 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-09-23 12:55:05 +02:00
|
|
|
bool GetProxy(enum Network net, proxyType &proxyInfoOut) {
|
2012-05-24 19:02:21 +02:00
|
|
|
assert(net >= 0 && net < NET_MAX);
|
2012-09-23 12:55:05 +02:00
|
|
|
LOCK(cs_proxyInfos);
|
2014-06-11 13:20:59 +02:00
|
|
|
if (!proxyInfo[net].IsValid())
|
2012-05-24 19:02:21 +02:00
|
|
|
return false;
|
2012-09-23 12:55:05 +02:00
|
|
|
proxyInfoOut = proxyInfo[net];
|
2012-05-24 19:02:21 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-06-11 13:20:59 +02:00
|
|
|
bool SetNameProxy(CService addrProxy) {
|
|
|
|
if (!addrProxy.IsValid())
|
2012-05-24 19:02:21 +02:00
|
|
|
return false;
|
2012-09-23 12:55:05 +02:00
|
|
|
LOCK(cs_proxyInfos);
|
2014-06-11 13:20:59 +02:00
|
|
|
nameProxy = addrProxy;
|
2012-05-24 19:02:21 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-06-11 13:20:59 +02:00
|
|
|
bool GetNameProxy(CService &nameProxyOut) {
|
2012-09-23 12:55:05 +02:00
|
|
|
LOCK(cs_proxyInfos);
|
2014-06-11 13:20:59 +02:00
|
|
|
if(!nameProxy.IsValid())
|
2012-09-23 12:55:05 +02:00
|
|
|
return false;
|
2014-06-11 13:20:59 +02:00
|
|
|
nameProxyOut = nameProxy;
|
2012-09-23 12:55:05 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool HaveNameProxy() {
|
|
|
|
LOCK(cs_proxyInfos);
|
2014-06-11 13:20:59 +02:00
|
|
|
return nameProxy.IsValid();
|
2012-05-24 19:02:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
bool IsProxy(const CNetAddr &addr) {
|
2012-09-23 12:55:05 +02:00
|
|
|
LOCK(cs_proxyInfos);
|
|
|
|
for (int i = 0; i < NET_MAX; i++) {
|
2014-06-11 13:20:59 +02:00
|
|
|
if (addr == (CNetAddr)proxyInfo[i])
|
2012-05-24 19:02:21 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-04-19 17:02:21 +02:00
|
|
|
bool ConnectSocket(const CService &addrDest, SOCKET& hSocketRet, int nTimeout)
|
|
|
|
{
|
2012-09-23 12:55:05 +02:00
|
|
|
proxyType proxy;
|
2014-06-11 13:20:59 +02:00
|
|
|
// no proxy needed (none set for target network)
|
2012-09-23 12:55:05 +02:00
|
|
|
if (!GetProxy(addrDest.GetNetwork(), proxy))
|
2012-05-24 19:02:21 +02:00
|
|
|
return ConnectSocketDirectly(addrDest, hSocketRet, nTimeout);
|
|
|
|
|
2012-04-19 17:02:21 +02:00
|
|
|
SOCKET hSocket = INVALID_SOCKET;
|
|
|
|
|
2012-05-24 19:02:21 +02:00
|
|
|
// first connect to proxy server
|
2014-06-11 13:20:59 +02:00
|
|
|
if (!ConnectSocketDirectly(proxy, hSocket, nTimeout))
|
2012-05-24 19:02:21 +02:00
|
|
|
return false;
|
|
|
|
// do socks negotiation
|
2014-06-11 13:20:59 +02:00
|
|
|
if (!Socks5(addrDest.ToStringIP(), addrDest.GetPort(), hSocket))
|
2012-04-19 17:02:21 +02:00
|
|
|
return false;
|
2012-01-03 23:33:31 +01:00
|
|
|
|
|
|
|
hSocketRet = hSocket;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-04-19 17:38:03 +02:00
|
|
|
bool ConnectSocketByName(CService &addr, SOCKET& hSocketRet, const char *pszDest, int portDefault, int nTimeout)
|
|
|
|
{
|
2012-05-30 22:44:23 +02:00
|
|
|
string strDest;
|
2012-04-19 17:38:03 +02:00
|
|
|
int port = portDefault;
|
2012-05-30 22:44:23 +02:00
|
|
|
SplitHostPort(string(pszDest), port, strDest);
|
2012-04-19 17:38:03 +02:00
|
|
|
|
|
|
|
SOCKET hSocket = INVALID_SOCKET;
|
2012-09-23 12:55:05 +02:00
|
|
|
|
2014-06-11 13:20:59 +02:00
|
|
|
CService nameProxy;
|
|
|
|
GetNameProxy(nameProxy);
|
2012-09-23 12:55:05 +02:00
|
|
|
|
2014-06-11 13:20:59 +02:00
|
|
|
CService addrResolved(CNetAddr(strDest, fNameLookup && !HaveNameProxy()), port);
|
2012-04-19 17:38:03 +02:00
|
|
|
if (addrResolved.IsValid()) {
|
|
|
|
addr = addrResolved;
|
|
|
|
return ConnectSocket(addr, hSocketRet, nTimeout);
|
|
|
|
}
|
2014-06-11 13:20:59 +02:00
|
|
|
|
2012-04-19 17:38:03 +02:00
|
|
|
addr = CService("0.0.0.0:0");
|
2014-06-11 13:20:59 +02:00
|
|
|
|
|
|
|
if (!HaveNameProxy())
|
2012-04-19 17:38:03 +02:00
|
|
|
return false;
|
2014-06-11 13:20:59 +02:00
|
|
|
// first connect to name proxy server
|
|
|
|
if (!ConnectSocketDirectly(nameProxy, hSocket, nTimeout))
|
|
|
|
return false;
|
|
|
|
// do socks negotiation
|
|
|
|
if (!Socks5(strDest, (unsigned short)port, hSocket))
|
2012-04-19 17:38:03 +02:00
|
|
|
return false;
|
|
|
|
|
|
|
|
hSocketRet = hSocket;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
void CNetAddr::Init()
|
|
|
|
{
|
2012-11-08 19:38:49 +01:00
|
|
|
memset(ip, 0, sizeof(ip));
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void CNetAddr::SetIP(const CNetAddr& ipIn)
|
|
|
|
{
|
|
|
|
memcpy(ip, ipIn.ip, sizeof(ip));
|
|
|
|
}
|
|
|
|
|
2014-04-28 11:08:57 +02:00
|
|
|
void CNetAddr::SetRaw(Network network, const uint8_t *ip_in)
|
|
|
|
{
|
|
|
|
switch(network)
|
|
|
|
{
|
|
|
|
case NET_IPV4:
|
|
|
|
memcpy(ip, pchIPv4, 12);
|
|
|
|
memcpy(ip+12, ip_in, 4);
|
|
|
|
break;
|
|
|
|
case NET_IPV6:
|
|
|
|
memcpy(ip, ip_in, 16);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
assert(!"invalid network");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-04-29 02:11:56 +02:00
|
|
|
static const unsigned char pchOnionCat[] = {0xFD,0x87,0xD8,0x7E,0xEB,0x43};
|
|
|
|
|
|
|
|
bool CNetAddr::SetSpecial(const std::string &strName)
|
|
|
|
{
|
|
|
|
if (strName.size()>6 && strName.substr(strName.size() - 6, 6) == ".onion") {
|
|
|
|
std::vector<unsigned char> vchAddr = DecodeBase32(strName.substr(0, strName.size() - 6).c_str());
|
|
|
|
if (vchAddr.size() != 16-sizeof(pchOnionCat))
|
|
|
|
return false;
|
|
|
|
memcpy(ip, pchOnionCat, sizeof(pchOnionCat));
|
|
|
|
for (unsigned int i=0; i<16-sizeof(pchOnionCat); i++)
|
|
|
|
ip[i + sizeof(pchOnionCat)] = vchAddr[i];
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
CNetAddr::CNetAddr()
|
|
|
|
{
|
|
|
|
Init();
|
|
|
|
}
|
|
|
|
|
|
|
|
CNetAddr::CNetAddr(const struct in_addr& ipv4Addr)
|
|
|
|
{
|
2014-04-28 11:08:57 +02:00
|
|
|
SetRaw(NET_IPV4, (const uint8_t*)&ipv4Addr);
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
CNetAddr::CNetAddr(const struct in6_addr& ipv6Addr)
|
|
|
|
{
|
2014-04-28 11:08:57 +02:00
|
|
|
SetRaw(NET_IPV6, (const uint8_t*)&ipv6Addr);
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
CNetAddr::CNetAddr(const char *pszIp, bool fAllowLookup)
|
|
|
|
{
|
|
|
|
Init();
|
|
|
|
std::vector<CNetAddr> vIP;
|
|
|
|
if (LookupHost(pszIp, vIP, 1, fAllowLookup))
|
|
|
|
*this = vIP[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
CNetAddr::CNetAddr(const std::string &strIp, bool fAllowLookup)
|
|
|
|
{
|
|
|
|
Init();
|
|
|
|
std::vector<CNetAddr> vIP;
|
|
|
|
if (LookupHost(strIp.c_str(), vIP, 1, fAllowLookup))
|
|
|
|
*this = vIP[0];
|
|
|
|
}
|
|
|
|
|
2012-09-05 23:36:19 +02:00
|
|
|
unsigned int CNetAddr::GetByte(int n) const
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
|
|
|
return ip[15-n];
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsIPv4() const
|
|
|
|
{
|
|
|
|
return (memcmp(ip, pchIPv4, sizeof(pchIPv4)) == 0);
|
|
|
|
}
|
|
|
|
|
2012-03-31 17:58:25 +02:00
|
|
|
bool CNetAddr::IsIPv6() const
|
|
|
|
{
|
2012-10-07 14:53:17 +02:00
|
|
|
return (!IsIPv4() && !IsTor());
|
2012-03-31 17:58:25 +02:00
|
|
|
}
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
bool CNetAddr::IsRFC1918() const
|
|
|
|
{
|
|
|
|
return IsIPv4() && (
|
2012-09-18 21:07:58 +02:00
|
|
|
GetByte(3) == 10 ||
|
|
|
|
(GetByte(3) == 192 && GetByte(2) == 168) ||
|
2012-01-03 23:33:31 +01:00
|
|
|
(GetByte(3) == 172 && (GetByte(2) >= 16 && GetByte(2) <= 31)));
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRFC3927() const
|
|
|
|
{
|
|
|
|
return IsIPv4() && (GetByte(3) == 169 && GetByte(2) == 254);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRFC3849() const
|
|
|
|
{
|
|
|
|
return GetByte(15) == 0x20 && GetByte(14) == 0x01 && GetByte(13) == 0x0D && GetByte(12) == 0xB8;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRFC3964() const
|
|
|
|
{
|
|
|
|
return (GetByte(15) == 0x20 && GetByte(14) == 0x02);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRFC6052() const
|
|
|
|
{
|
|
|
|
static const unsigned char pchRFC6052[] = {0,0x64,0xFF,0x9B,0,0,0,0,0,0,0,0};
|
|
|
|
return (memcmp(ip, pchRFC6052, sizeof(pchRFC6052)) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRFC4380() const
|
|
|
|
{
|
|
|
|
return (GetByte(15) == 0x20 && GetByte(14) == 0x01 && GetByte(13) == 0 && GetByte(12) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRFC4862() const
|
|
|
|
{
|
|
|
|
static const unsigned char pchRFC4862[] = {0xFE,0x80,0,0,0,0,0,0};
|
|
|
|
return (memcmp(ip, pchRFC4862, sizeof(pchRFC4862)) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRFC4193() const
|
|
|
|
{
|
|
|
|
return ((GetByte(15) & 0xFE) == 0xFC);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRFC6145() const
|
|
|
|
{
|
|
|
|
static const unsigned char pchRFC6145[] = {0,0,0,0,0,0,0,0,0xFF,0xFF,0,0};
|
|
|
|
return (memcmp(ip, pchRFC6145, sizeof(pchRFC6145)) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRFC4843() const
|
|
|
|
{
|
2012-02-17 14:40:21 +01:00
|
|
|
return (GetByte(15) == 0x20 && GetByte(14) == 0x01 && GetByte(13) == 0x00 && (GetByte(12) & 0xF0) == 0x10);
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
2012-04-29 02:11:56 +02:00
|
|
|
bool CNetAddr::IsTor() const
|
2012-04-02 17:06:11 +02:00
|
|
|
{
|
|
|
|
return (memcmp(ip, pchOnionCat, sizeof(pchOnionCat)) == 0);
|
|
|
|
}
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
bool CNetAddr::IsLocal() const
|
|
|
|
{
|
|
|
|
// IPv4 loopback
|
|
|
|
if (IsIPv4() && (GetByte(3) == 127 || GetByte(3) == 0))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
// IPv6 loopback (::1/128)
|
|
|
|
static const unsigned char pchLocal[16] = {0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1};
|
|
|
|
if (memcmp(ip, pchLocal, 16) == 0)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsMulticast() const
|
|
|
|
{
|
|
|
|
return (IsIPv4() && (GetByte(3) & 0xF0) == 0xE0)
|
|
|
|
|| (GetByte(15) == 0xFF);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsValid() const
|
|
|
|
{
|
2012-07-26 02:48:39 +02:00
|
|
|
// Cleanup 3-byte shifted addresses caused by garbage in size field
|
2012-01-03 23:33:31 +01:00
|
|
|
// of addr messages from versions before 0.2.9 checksum.
|
|
|
|
// Two consecutive addr messages look like this:
|
|
|
|
// header20 vectorlen3 addr26 addr26 addr26 header20 vectorlen3 addr26 addr26 addr26...
|
|
|
|
// so if the first length field is garbled, it reads the second batch
|
|
|
|
// of addr misaligned by 3 bytes.
|
|
|
|
if (memcmp(ip, pchIPv4+3, sizeof(pchIPv4)-3) == 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// unspecified IPv6 address (::/128)
|
|
|
|
unsigned char ipNone[16] = {};
|
|
|
|
if (memcmp(ip, ipNone, 16) == 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// documentation IPv6 address
|
|
|
|
if (IsRFC3849())
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (IsIPv4())
|
|
|
|
{
|
|
|
|
// INADDR_NONE
|
|
|
|
uint32_t ipNone = INADDR_NONE;
|
|
|
|
if (memcmp(ip+12, &ipNone, 4) == 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// 0
|
|
|
|
ipNone = 0;
|
|
|
|
if (memcmp(ip+12, &ipNone, 4) == 0)
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::IsRoutable() const
|
|
|
|
{
|
2012-10-07 14:53:17 +02:00
|
|
|
return IsValid() && !(IsRFC1918() || IsRFC3927() || IsRFC4862() || (IsRFC4193() && !IsTor()) || IsRFC4843() || IsLocal());
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
2012-04-10 20:22:04 +02:00
|
|
|
enum Network CNetAddr::GetNetwork() const
|
|
|
|
{
|
|
|
|
if (!IsRoutable())
|
|
|
|
return NET_UNROUTABLE;
|
|
|
|
|
|
|
|
if (IsIPv4())
|
|
|
|
return NET_IPV4;
|
|
|
|
|
2012-04-29 02:11:56 +02:00
|
|
|
if (IsTor())
|
2012-04-10 20:22:04 +02:00
|
|
|
return NET_TOR;
|
|
|
|
|
|
|
|
return NET_IPV6;
|
|
|
|
}
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
std::string CNetAddr::ToStringIP() const
|
|
|
|
{
|
2012-04-29 02:11:56 +02:00
|
|
|
if (IsTor())
|
|
|
|
return EncodeBase32(&ip[6], 10) + ".onion";
|
2012-05-14 00:43:21 +02:00
|
|
|
CService serv(*this, 0);
|
|
|
|
struct sockaddr_storage sockaddr;
|
|
|
|
socklen_t socklen = sizeof(sockaddr);
|
|
|
|
if (serv.GetSockAddr((struct sockaddr*)&sockaddr, &socklen)) {
|
|
|
|
char name[1025] = "";
|
|
|
|
if (!getnameinfo((const struct sockaddr*)&sockaddr, socklen, name, sizeof(name), NULL, 0, NI_NUMERICHOST))
|
|
|
|
return std::string(name);
|
|
|
|
}
|
2012-04-29 02:11:56 +02:00
|
|
|
if (IsIPv4())
|
2012-01-03 23:33:31 +01:00
|
|
|
return strprintf("%u.%u.%u.%u", GetByte(3), GetByte(2), GetByte(1), GetByte(0));
|
|
|
|
else
|
|
|
|
return strprintf("%x:%x:%x:%x:%x:%x:%x:%x",
|
|
|
|
GetByte(15) << 8 | GetByte(14), GetByte(13) << 8 | GetByte(12),
|
|
|
|
GetByte(11) << 8 | GetByte(10), GetByte(9) << 8 | GetByte(8),
|
|
|
|
GetByte(7) << 8 | GetByte(6), GetByte(5) << 8 | GetByte(4),
|
|
|
|
GetByte(3) << 8 | GetByte(2), GetByte(1) << 8 | GetByte(0));
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string CNetAddr::ToString() const
|
|
|
|
{
|
|
|
|
return ToStringIP();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator==(const CNetAddr& a, const CNetAddr& b)
|
|
|
|
{
|
|
|
|
return (memcmp(a.ip, b.ip, 16) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator!=(const CNetAddr& a, const CNetAddr& b)
|
|
|
|
{
|
|
|
|
return (memcmp(a.ip, b.ip, 16) != 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator<(const CNetAddr& a, const CNetAddr& b)
|
|
|
|
{
|
|
|
|
return (memcmp(a.ip, b.ip, 16) < 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::GetInAddr(struct in_addr* pipv4Addr) const
|
|
|
|
{
|
|
|
|
if (!IsIPv4())
|
|
|
|
return false;
|
|
|
|
memcpy(pipv4Addr, ip+12, 4);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetAddr::GetIn6Addr(struct in6_addr* pipv6Addr) const
|
|
|
|
{
|
|
|
|
memcpy(pipv6Addr, ip, 16);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// get canonical identifier of an address' group
|
|
|
|
// no two connections will be attempted to addresses with the same group
|
|
|
|
std::vector<unsigned char> CNetAddr::GetGroup() const
|
|
|
|
{
|
|
|
|
std::vector<unsigned char> vchRet;
|
2012-04-29 02:19:23 +02:00
|
|
|
int nClass = NET_IPV6;
|
2012-01-03 23:33:31 +01:00
|
|
|
int nStartByte = 0;
|
|
|
|
int nBits = 16;
|
|
|
|
|
2012-01-04 23:39:45 +01:00
|
|
|
// all local addresses belong to the same group
|
|
|
|
if (IsLocal())
|
|
|
|
{
|
2012-04-29 02:19:23 +02:00
|
|
|
nClass = 255;
|
2012-01-04 23:39:45 +01:00
|
|
|
nBits = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// all unroutable addresses belong to the same group
|
2012-01-03 23:33:31 +01:00
|
|
|
if (!IsRoutable())
|
|
|
|
{
|
2012-04-29 02:19:23 +02:00
|
|
|
nClass = NET_UNROUTABLE;
|
2012-01-04 23:39:45 +01:00
|
|
|
nBits = 0;
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
// for IPv4 addresses, '1' + the 16 higher-order bits of the IP
|
|
|
|
// includes mapped IPv4, SIIT translated IPv4, and the well-known prefix
|
|
|
|
else if (IsIPv4() || IsRFC6145() || IsRFC6052())
|
|
|
|
{
|
2012-04-29 02:19:23 +02:00
|
|
|
nClass = NET_IPV4;
|
2012-01-03 23:33:31 +01:00
|
|
|
nStartByte = 12;
|
|
|
|
}
|
2012-07-26 02:48:39 +02:00
|
|
|
// for 6to4 tunnelled addresses, use the encapsulated IPv4 address
|
2012-01-03 23:33:31 +01:00
|
|
|
else if (IsRFC3964())
|
|
|
|
{
|
2012-04-29 02:19:23 +02:00
|
|
|
nClass = NET_IPV4;
|
2012-01-03 23:33:31 +01:00
|
|
|
nStartByte = 2;
|
|
|
|
}
|
2012-07-26 02:48:39 +02:00
|
|
|
// for Teredo-tunnelled IPv6 addresses, use the encapsulated IPv4 address
|
2012-01-03 23:33:31 +01:00
|
|
|
else if (IsRFC4380())
|
|
|
|
{
|
2012-04-29 02:19:23 +02:00
|
|
|
vchRet.push_back(NET_IPV4);
|
2012-01-03 23:33:31 +01:00
|
|
|
vchRet.push_back(GetByte(3) ^ 0xFF);
|
|
|
|
vchRet.push_back(GetByte(2) ^ 0xFF);
|
|
|
|
return vchRet;
|
|
|
|
}
|
2012-04-29 02:11:56 +02:00
|
|
|
else if (IsTor())
|
|
|
|
{
|
|
|
|
nClass = NET_TOR;
|
|
|
|
nStartByte = 6;
|
|
|
|
nBits = 4;
|
|
|
|
}
|
2012-01-03 23:33:31 +01:00
|
|
|
// for he.net, use /36 groups
|
2013-10-04 14:46:45 +02:00
|
|
|
else if (GetByte(15) == 0x20 && GetByte(14) == 0x01 && GetByte(13) == 0x04 && GetByte(12) == 0x70)
|
2012-01-03 23:33:31 +01:00
|
|
|
nBits = 36;
|
|
|
|
// for the rest of the IPv6 network, use /32 groups
|
|
|
|
else
|
|
|
|
nBits = 32;
|
|
|
|
|
|
|
|
vchRet.push_back(nClass);
|
|
|
|
while (nBits >= 8)
|
|
|
|
{
|
|
|
|
vchRet.push_back(GetByte(15 - nStartByte));
|
|
|
|
nStartByte++;
|
|
|
|
nBits -= 8;
|
|
|
|
}
|
|
|
|
if (nBits > 0)
|
|
|
|
vchRet.push_back(GetByte(15 - nStartByte) | ((1 << nBits) - 1));
|
|
|
|
|
|
|
|
return vchRet;
|
|
|
|
}
|
|
|
|
|
2013-04-13 07:13:08 +02:00
|
|
|
uint64_t CNetAddr::GetHash() const
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
|
|
|
uint256 hash = Hash(&ip[0], &ip[16]);
|
2013-04-13 07:13:08 +02:00
|
|
|
uint64_t nRet;
|
2012-01-03 23:33:31 +01:00
|
|
|
memcpy(&nRet, &hash, sizeof(nRet));
|
|
|
|
return nRet;
|
|
|
|
}
|
|
|
|
|
2012-05-01 17:32:42 +02:00
|
|
|
// private extensions to enum Network, only returned by GetExtNetwork,
|
|
|
|
// and only used in GetReachabilityFrom
|
|
|
|
static const int NET_UNKNOWN = NET_MAX + 0;
|
|
|
|
static const int NET_TEREDO = NET_MAX + 1;
|
|
|
|
int static GetExtNetwork(const CNetAddr *addr)
|
|
|
|
{
|
|
|
|
if (addr == NULL)
|
|
|
|
return NET_UNKNOWN;
|
|
|
|
if (addr->IsRFC4380())
|
|
|
|
return NET_TEREDO;
|
|
|
|
return addr->GetNetwork();
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Calculates a metric for how reachable (*this) is from a given partner */
|
2012-02-12 13:45:24 +01:00
|
|
|
int CNetAddr::GetReachabilityFrom(const CNetAddr *paddrPartner) const
|
|
|
|
{
|
2012-05-01 17:32:42 +02:00
|
|
|
enum Reachability {
|
|
|
|
REACH_UNREACHABLE,
|
|
|
|
REACH_DEFAULT,
|
|
|
|
REACH_TEREDO,
|
|
|
|
REACH_IPV6_WEAK,
|
|
|
|
REACH_IPV4,
|
|
|
|
REACH_IPV6_STRONG,
|
|
|
|
REACH_PRIVATE
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!IsRoutable())
|
|
|
|
return REACH_UNREACHABLE;
|
|
|
|
|
|
|
|
int ourNet = GetExtNetwork(this);
|
|
|
|
int theirNet = GetExtNetwork(paddrPartner);
|
|
|
|
bool fTunnel = IsRFC3964() || IsRFC6052() || IsRFC6145();
|
|
|
|
|
|
|
|
switch(theirNet) {
|
|
|
|
case NET_IPV4:
|
|
|
|
switch(ourNet) {
|
|
|
|
default: return REACH_DEFAULT;
|
|
|
|
case NET_IPV4: return REACH_IPV4;
|
|
|
|
}
|
|
|
|
case NET_IPV6:
|
|
|
|
switch(ourNet) {
|
|
|
|
default: return REACH_DEFAULT;
|
|
|
|
case NET_TEREDO: return REACH_TEREDO;
|
|
|
|
case NET_IPV4: return REACH_IPV4;
|
2012-07-26 02:48:39 +02:00
|
|
|
case NET_IPV6: return fTunnel ? REACH_IPV6_WEAK : REACH_IPV6_STRONG; // only prefer giving our IPv6 address if it's not tunnelled
|
2012-05-01 17:32:42 +02:00
|
|
|
}
|
|
|
|
case NET_TOR:
|
|
|
|
switch(ourNet) {
|
|
|
|
default: return REACH_DEFAULT;
|
|
|
|
case NET_IPV4: return REACH_IPV4; // Tor users can connect to IPv4 as well
|
|
|
|
case NET_TOR: return REACH_PRIVATE;
|
|
|
|
}
|
|
|
|
case NET_TEREDO:
|
|
|
|
switch(ourNet) {
|
|
|
|
default: return REACH_DEFAULT;
|
|
|
|
case NET_TEREDO: return REACH_TEREDO;
|
|
|
|
case NET_IPV6: return REACH_IPV6_WEAK;
|
|
|
|
case NET_IPV4: return REACH_IPV4;
|
|
|
|
}
|
|
|
|
case NET_UNKNOWN:
|
|
|
|
case NET_UNROUTABLE:
|
|
|
|
default:
|
|
|
|
switch(ourNet) {
|
|
|
|
default: return REACH_DEFAULT;
|
|
|
|
case NET_TEREDO: return REACH_TEREDO;
|
|
|
|
case NET_IPV6: return REACH_IPV6_WEAK;
|
|
|
|
case NET_IPV4: return REACH_IPV4;
|
2012-10-07 14:53:17 +02:00
|
|
|
case NET_TOR: return REACH_PRIVATE; // either from Tor, or don't care about our address
|
2012-05-01 17:32:42 +02:00
|
|
|
}
|
|
|
|
}
|
2012-02-12 13:45:24 +01:00
|
|
|
}
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
void CService::Init()
|
|
|
|
{
|
|
|
|
port = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
CService::CService()
|
|
|
|
{
|
|
|
|
Init();
|
|
|
|
}
|
|
|
|
|
|
|
|
CService::CService(const CNetAddr& cip, unsigned short portIn) : CNetAddr(cip), port(portIn)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
CService::CService(const struct in_addr& ipv4Addr, unsigned short portIn) : CNetAddr(ipv4Addr), port(portIn)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
CService::CService(const struct in6_addr& ipv6Addr, unsigned short portIn) : CNetAddr(ipv6Addr), port(portIn)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
CService::CService(const struct sockaddr_in& addr) : CNetAddr(addr.sin_addr), port(ntohs(addr.sin_port))
|
|
|
|
{
|
|
|
|
assert(addr.sin_family == AF_INET);
|
|
|
|
}
|
|
|
|
|
|
|
|
CService::CService(const struct sockaddr_in6 &addr) : CNetAddr(addr.sin6_addr), port(ntohs(addr.sin6_port))
|
|
|
|
{
|
|
|
|
assert(addr.sin6_family == AF_INET6);
|
|
|
|
}
|
|
|
|
|
2012-05-11 15:28:59 +02:00
|
|
|
bool CService::SetSockAddr(const struct sockaddr *paddr)
|
|
|
|
{
|
|
|
|
switch (paddr->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
*this = CService(*(const struct sockaddr_in*)paddr);
|
|
|
|
return true;
|
|
|
|
case AF_INET6:
|
|
|
|
*this = CService(*(const struct sockaddr_in6*)paddr);
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
CService::CService(const char *pszIpPort, bool fAllowLookup)
|
|
|
|
{
|
|
|
|
Init();
|
|
|
|
CService ip;
|
|
|
|
if (Lookup(pszIpPort, ip, 0, fAllowLookup))
|
|
|
|
*this = ip;
|
|
|
|
}
|
|
|
|
|
2012-01-17 02:12:35 +01:00
|
|
|
CService::CService(const char *pszIpPort, int portDefault, bool fAllowLookup)
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
2012-01-17 02:12:35 +01:00
|
|
|
Init();
|
|
|
|
CService ip;
|
|
|
|
if (Lookup(pszIpPort, ip, portDefault, fAllowLookup))
|
|
|
|
*this = ip;
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
CService::CService(const std::string &strIpPort, bool fAllowLookup)
|
|
|
|
{
|
|
|
|
Init();
|
|
|
|
CService ip;
|
|
|
|
if (Lookup(strIpPort.c_str(), ip, 0, fAllowLookup))
|
|
|
|
*this = ip;
|
|
|
|
}
|
|
|
|
|
2012-01-17 02:12:35 +01:00
|
|
|
CService::CService(const std::string &strIpPort, int portDefault, bool fAllowLookup)
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
2012-01-17 02:12:35 +01:00
|
|
|
Init();
|
|
|
|
CService ip;
|
|
|
|
if (Lookup(strIpPort.c_str(), ip, portDefault, fAllowLookup))
|
|
|
|
*this = ip;
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
unsigned short CService::GetPort() const
|
|
|
|
{
|
|
|
|
return port;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator==(const CService& a, const CService& b)
|
|
|
|
{
|
|
|
|
return (CNetAddr)a == (CNetAddr)b && a.port == b.port;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator!=(const CService& a, const CService& b)
|
|
|
|
{
|
|
|
|
return (CNetAddr)a != (CNetAddr)b || a.port != b.port;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator<(const CService& a, const CService& b)
|
|
|
|
{
|
|
|
|
return (CNetAddr)a < (CNetAddr)b || ((CNetAddr)a == (CNetAddr)b && a.port < b.port);
|
|
|
|
}
|
|
|
|
|
2012-05-11 15:28:59 +02:00
|
|
|
bool CService::GetSockAddr(struct sockaddr* paddr, socklen_t *addrlen) const
|
2012-01-03 23:33:31 +01:00
|
|
|
{
|
2012-05-11 15:28:59 +02:00
|
|
|
if (IsIPv4()) {
|
2012-06-05 07:32:27 +02:00
|
|
|
if (*addrlen < (socklen_t)sizeof(struct sockaddr_in))
|
2012-05-11 15:28:59 +02:00
|
|
|
return false;
|
|
|
|
*addrlen = sizeof(struct sockaddr_in);
|
|
|
|
struct sockaddr_in *paddrin = (struct sockaddr_in*)paddr;
|
|
|
|
memset(paddrin, 0, *addrlen);
|
|
|
|
if (!GetInAddr(&paddrin->sin_addr))
|
|
|
|
return false;
|
|
|
|
paddrin->sin_family = AF_INET;
|
|
|
|
paddrin->sin_port = htons(port);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (IsIPv6()) {
|
2012-06-05 07:32:27 +02:00
|
|
|
if (*addrlen < (socklen_t)sizeof(struct sockaddr_in6))
|
2012-05-11 15:28:59 +02:00
|
|
|
return false;
|
|
|
|
*addrlen = sizeof(struct sockaddr_in6);
|
|
|
|
struct sockaddr_in6 *paddrin6 = (struct sockaddr_in6*)paddr;
|
|
|
|
memset(paddrin6, 0, *addrlen);
|
|
|
|
if (!GetIn6Addr(&paddrin6->sin6_addr))
|
|
|
|
return false;
|
|
|
|
paddrin6->sin6_family = AF_INET6;
|
|
|
|
paddrin6->sin6_port = htons(port);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
2012-01-03 23:33:31 +01:00
|
|
|
|
|
|
|
std::vector<unsigned char> CService::GetKey() const
|
|
|
|
{
|
|
|
|
std::vector<unsigned char> vKey;
|
|
|
|
vKey.resize(18);
|
|
|
|
memcpy(&vKey[0], ip, 16);
|
|
|
|
vKey[16] = port / 0x100;
|
|
|
|
vKey[17] = port & 0x0FF;
|
|
|
|
return vKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string CService::ToStringPort() const
|
|
|
|
{
|
2012-09-05 23:36:19 +02:00
|
|
|
return strprintf("%u", port);
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string CService::ToStringIPPort() const
|
|
|
|
{
|
2012-10-07 14:53:17 +02:00
|
|
|
if (IsIPv4() || IsTor()) {
|
2012-03-31 17:58:25 +02:00
|
|
|
return ToStringIP() + ":" + ToStringPort();
|
|
|
|
} else {
|
|
|
|
return "[" + ToStringIP() + "]:" + ToStringPort();
|
|
|
|
}
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string CService::ToString() const
|
|
|
|
{
|
|
|
|
return ToStringIPPort();
|
|
|
|
}
|
|
|
|
|
|
|
|
void CService::SetPort(unsigned short portIn)
|
|
|
|
{
|
|
|
|
port = portIn;
|
|
|
|
}
|
2014-04-28 11:08:57 +02:00
|
|
|
|
|
|
|
CSubNet::CSubNet():
|
|
|
|
valid(false)
|
|
|
|
{
|
|
|
|
memset(netmask, 0, sizeof(netmask));
|
|
|
|
}
|
|
|
|
|
|
|
|
CSubNet::CSubNet(const std::string &strSubnet, bool fAllowLookup)
|
|
|
|
{
|
|
|
|
size_t slash = strSubnet.find_last_of('/');
|
|
|
|
std::vector<CNetAddr> vIP;
|
|
|
|
|
|
|
|
valid = true;
|
|
|
|
// Default to /32 (IPv4) or /128 (IPv6), i.e. match single address
|
|
|
|
memset(netmask, 255, sizeof(netmask));
|
|
|
|
|
|
|
|
std::string strAddress = strSubnet.substr(0, slash);
|
|
|
|
if (LookupHost(strAddress.c_str(), vIP, 1, fAllowLookup))
|
|
|
|
{
|
|
|
|
network = vIP[0];
|
|
|
|
if (slash != strSubnet.npos)
|
|
|
|
{
|
|
|
|
std::string strNetmask = strSubnet.substr(slash + 1);
|
|
|
|
int32_t n;
|
|
|
|
// IPv4 addresses start at offset 12, and first 12 bytes must match, so just offset n
|
|
|
|
int noffset = network.IsIPv4() ? (12 * 8) : 0;
|
|
|
|
if (ParseInt32(strNetmask, &n)) // If valid number, assume /24 symtex
|
|
|
|
{
|
|
|
|
if(n >= 0 && n <= (128 - noffset)) // Only valid if in range of bits of address
|
|
|
|
{
|
|
|
|
n += noffset;
|
|
|
|
// Clear bits [n..127]
|
|
|
|
for (; n < 128; ++n)
|
|
|
|
netmask[n>>3] &= ~(1<<(n&7));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
valid = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else // If not a valid number, try full netmask syntax
|
|
|
|
{
|
|
|
|
if (LookupHost(strNetmask.c_str(), vIP, 1, false)) // Never allow lookup for netmask
|
|
|
|
{
|
|
|
|
// Remember: GetByte returns bytes in reversed order
|
|
|
|
// Copy only the *last* four bytes in case of IPv4, the rest of the mask should stay 1's as
|
|
|
|
// we don't want pchIPv4 to be part of the mask.
|
|
|
|
int asize = network.IsIPv4() ? 4 : 16;
|
|
|
|
for(int x=0; x<asize; ++x)
|
|
|
|
netmask[15-x] = vIP[0].GetByte(x);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
valid = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
valid = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CSubNet::Match(const CNetAddr &addr) const
|
|
|
|
{
|
|
|
|
if (!valid || !addr.IsValid())
|
|
|
|
return false;
|
|
|
|
for(int x=0; x<16; ++x)
|
|
|
|
if ((addr.GetByte(x) & netmask[15-x]) != network.GetByte(x))
|
|
|
|
return false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string CSubNet::ToString() const
|
|
|
|
{
|
|
|
|
std::string strNetmask;
|
|
|
|
if (network.IsIPv4())
|
|
|
|
strNetmask = strprintf("%u.%u.%u.%u", netmask[12], netmask[13], netmask[14], netmask[15]);
|
|
|
|
else
|
|
|
|
strNetmask = strprintf("%x:%x:%x:%x:%x:%x:%x:%x",
|
|
|
|
netmask[0] << 8 | netmask[1], netmask[2] << 8 | netmask[3],
|
|
|
|
netmask[4] << 8 | netmask[5], netmask[6] << 8 | netmask[7],
|
|
|
|
netmask[8] << 8 | netmask[9], netmask[10] << 8 | netmask[11],
|
|
|
|
netmask[12] << 8 | netmask[13], netmask[14] << 8 | netmask[15]);
|
|
|
|
return network.ToString() + "/" + strNetmask;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CSubNet::IsValid() const
|
|
|
|
{
|
|
|
|
return valid;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator==(const CSubNet& a, const CSubNet& b)
|
|
|
|
{
|
|
|
|
return a.valid == b.valid && a.network == b.network && !memcmp(a.netmask, b.netmask, 16);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator!=(const CSubNet& a, const CSubNet& b)
|
|
|
|
{
|
|
|
|
return !(a==b);
|
|
|
|
}
|
2014-05-08 14:15:19 +02:00
|
|
|
|
|
|
|
#ifdef WIN32
|
|
|
|
std::string NetworkErrorString(int err)
|
|
|
|
{
|
|
|
|
char buf[256];
|
|
|
|
buf[0] = 0;
|
|
|
|
if(FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS | FORMAT_MESSAGE_MAX_WIDTH_MASK,
|
|
|
|
NULL, err, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
|
|
|
|
buf, sizeof(buf), NULL))
|
|
|
|
{
|
|
|
|
return strprintf("%s (%d)", buf, err);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return strprintf("Unknown error (%d)", err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
std::string NetworkErrorString(int err)
|
|
|
|
{
|
|
|
|
char buf[256];
|
|
|
|
const char *s = buf;
|
|
|
|
buf[0] = 0;
|
|
|
|
/* Too bad there are two incompatible implementations of the
|
|
|
|
* thread-safe strerror. */
|
|
|
|
#ifdef STRERROR_R_CHAR_P /* GNU variant can return a pointer outside the passed buffer */
|
|
|
|
s = strerror_r(err, buf, sizeof(buf));
|
|
|
|
#else /* POSIX variant always returns message in buffer */
|
2014-07-07 17:34:00 +02:00
|
|
|
if (strerror_r(err, buf, sizeof(buf)))
|
|
|
|
buf[0] = 0;
|
2014-05-08 14:15:19 +02:00
|
|
|
#endif
|
|
|
|
return strprintf("%s (%d)", s, err);
|
|
|
|
}
|
|
|
|
#endif
|
2014-07-10 12:13:03 +02:00
|
|
|
|
|
|
|
bool CloseSocket(SOCKET& hSocket)
|
|
|
|
{
|
|
|
|
if (hSocket == INVALID_SOCKET)
|
|
|
|
return false;
|
|
|
|
#ifdef WIN32
|
|
|
|
int ret = closesocket(hSocket);
|
|
|
|
#else
|
|
|
|
int ret = close(hSocket);
|
|
|
|
#endif
|
|
|
|
hSocket = INVALID_SOCKET;
|
|
|
|
return ret != SOCKET_ERROR;
|
|
|
|
}
|
2014-07-09 11:00:00 +02:00
|
|
|
|
|
|
|
bool SetSocketNonBlocking(SOCKET& hSocket, bool fNonBlocking)
|
|
|
|
{
|
|
|
|
if (fNonBlocking) {
|
|
|
|
#ifdef WIN32
|
|
|
|
u_long nOne = 1;
|
|
|
|
if (ioctlsocket(hSocket, FIONBIO, &nOne) == SOCKET_ERROR) {
|
|
|
|
#else
|
|
|
|
int fFlags = fcntl(hSocket, F_GETFL, 0);
|
|
|
|
if (fcntl(hSocket, F_SETFL, fFlags | O_NONBLOCK) == SOCKET_ERROR) {
|
|
|
|
#endif
|
|
|
|
CloseSocket(hSocket);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
#ifdef WIN32
|
|
|
|
u_long nZero = 0;
|
|
|
|
if (ioctlsocket(hSocket, FIONBIO, &nZero) == SOCKET_ERROR) {
|
|
|
|
#else
|
|
|
|
int fFlags = fcntl(hSocket, F_GETFL, 0);
|
|
|
|
if (fcntl(hSocket, F_SETFL, fFlags & ~O_NONBLOCK) == SOCKET_ERROR) {
|
|
|
|
#endif
|
|
|
|
CloseSocket(hSocket);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|