- listener->ssl ? " ssl" : "");\r
- }\r
-}\r
-\r
-/*\r
- * inetport - create a listener socket in the AF_INET or AF_INET6 domain,\r
- * bind it to the port given in 'port' and listen to it\r
- * returns true (1) if successful false (0) on error.\r
- *\r
- * If the operating system has a define for SOMAXCONN, use it, otherwise\r
- * use RATBOX_SOMAXCONN\r
- */\r
-#ifdef SOMAXCONN\r
-#undef RATBOX_SOMAXCONN\r
-#define RATBOX_SOMAXCONN SOMAXCONN\r
-#endif\r
-\r
-static int\r
-inetport(struct Listener *listener)\r
-{\r
- rb_fde_t *F;\r
- int ret;\r
- int opt = 1;\r
-\r
- /*\r
- * At first, open a new socket\r
- */\r
- \r
- F = rb_socket(GET_SS_FAMILY(&listener->addr), SOCK_STREAM, 0, "Listener socket");\r
-\r
-#ifdef IPV6\r
- if(GET_SS_FAMILY(&listener->addr) == AF_INET6)\r
- {\r
- struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&listener->addr;\r
- if(!IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &in6addr_any))\r
- {\r
- rb_inet_ntop(AF_INET6, &in6->sin6_addr, listener->vhost, sizeof(listener->vhost));\r
- listener->name = listener->vhost;\r
- }\r
- } else\r
-#endif\r
- {\r
- struct sockaddr_in *in = (struct sockaddr_in *)&listener->addr;\r
- if(in->sin_addr.s_addr != INADDR_ANY)\r
- {\r
- rb_inet_ntop(AF_INET, &in->sin_addr, listener->vhost, sizeof(listener->vhost));\r
- listener->name = listener->vhost;\r
- } \r
- }\r
-\r
-\r
- if(F == NULL)\r
- {\r
- report_error("opening listener socket %s:%s",\r
- get_listener_name(listener), \r
- get_listener_name(listener), errno);\r
- return 0;\r
- }\r
- else if((maxconnections - 10) < rb_get_fd(F)) /* XXX this is kinda bogus*/\r
- {\r
- report_error("no more connections left for listener %s:%s",\r
- get_listener_name(listener), \r
- get_listener_name(listener), errno);\r
- rb_close(F);\r
- return 0;\r
- }\r
- /*\r
- * XXX - we don't want to do all this crap for a listener\r
- * set_sock_opts(listener);\r
- */\r
- if(setsockopt(rb_get_fd(F), SOL_SOCKET, SO_REUSEADDR, (char *) &opt, sizeof(opt)))\r
- {\r
- report_error("setting SO_REUSEADDR for listener %s:%s",\r
- get_listener_name(listener), \r
- get_listener_name(listener), errno);\r
- rb_close(F);\r
- return 0;\r
- }\r
-\r
- /*\r
- * Bind a port to listen for new connections if port is non-null,\r
- * else assume it is already open and try get something from it.\r
- */\r
-\r
- if(bind(rb_get_fd(F), (struct sockaddr *) &listener->addr, GET_SS_LEN(&listener->addr)))\r
- {\r
- report_error("binding listener socket %s:%s",\r
- get_listener_name(listener), \r
- get_listener_name(listener), errno);\r
- rb_close(F);\r
- return 0;\r
- }\r
-\r
- if((ret = rb_listen(F, RATBOX_SOMAXCONN)))\r
- {\r
- report_error("listen failed for %s:%s", \r
- get_listener_name(listener), \r
- get_listener_name(listener), errno);\r
- rb_close(F);\r
- return 0;\r
- }\r
-\r
- listener->F = F;\r
-\r
- rb_accept_tcp(listener->F, accept_precallback, accept_callback, listener);\r
- return 1;\r
-}\r
-\r
-static struct Listener *\r
-find_listener(struct rb_sockaddr_storage *addr)\r
-{\r
- struct Listener *listener = NULL;\r
- struct Listener *last_closed = NULL;\r
- rb_dlink_node *ptr;\r
-\r
- RB_DLINK_FOREACH(ptr, listener_list.head)\r
- {\r
- listener = ptr->data;\r
- if(GET_SS_FAMILY(addr) != GET_SS_FAMILY(&listener->addr))\r
- continue;\r
- \r
- switch(GET_SS_FAMILY(addr))\r
- {\r
- case AF_INET:\r
- {\r
- struct sockaddr_in *in4 = (struct sockaddr_in *)addr;\r
- struct sockaddr_in *lin4 = (struct sockaddr_in *)&listener->addr;\r
- if(in4->sin_addr.s_addr == lin4->sin_addr.s_addr && \r
- in4->sin_port == lin4->sin_port )\r
- {\r
- if(listener->F == NULL)\r
- last_closed = listener;\r
- else\r
- return(listener);\r
- }\r
- break;\r
- }\r
-#ifdef IPV6\r
- case AF_INET6:\r
- {\r
- struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)addr;\r
- struct sockaddr_in6 *lin6 =(struct sockaddr_in6 *)&listener->addr;\r
- if(IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &lin6->sin6_addr) &&\r
- in6->sin6_port == lin6->sin6_port)\r
- {\r
- if(listener->F == NULL)\r
- last_closed = listener;\r
- else\r
- return(listener);\r
- }\r
- break;\r
- \r
- }\r
-#endif\r
-\r
- default:\r
- break;\r
- }\r
- }\r
- return last_closed;\r
-}\r
-\r
-/*\r
- * add_listener- create a new listener\r
- * port - the port number to listen on\r
- * vhost_ip - if non-null must contain a valid IP address string in\r
- * the format "255.255.255.255"\r
- */\r
-void\r
-add_listener(int port, const char *vhost_ip, int family, int ssl)\r
-{\r
- struct Listener *listener;\r
- struct rb_sockaddr_storage vaddr;\r
-\r
- /*\r
- * if no port in conf line, don't bother\r
- */\r
- if(port == 0)\r
- return;\r
- \r
- memset(&vaddr, 0, sizeof(vaddr));\r
- GET_SS_FAMILY(&vaddr) = family;\r
-\r
- if(vhost_ip != NULL)\r
- {\r
- if(rb_inet_pton_sock(vhost_ip, (struct sockaddr *)&vaddr) <= 0)\r
- return;\r
- } else\r
- {\r
- switch(family)\r
- {\r
- case AF_INET:\r
- ((struct sockaddr_in *)&vaddr)->sin_addr.s_addr = INADDR_ANY;\r
- break;\r
-#ifdef IPV6\r
- case AF_INET6:\r
- memcpy(&((struct sockaddr_in6 *)&vaddr)->sin6_addr, &in6addr_any, sizeof(struct in6_addr));\r
- break;\r
-#endif\r
- default:\r
- return;\r
- } \r
- }\r
- switch(family)\r
- {\r
- case AF_INET:\r
- SET_SS_LEN(&vaddr, sizeof(struct sockaddr_in));\r
- ((struct sockaddr_in *)&vaddr)->sin_port = htons(port);\r
- break;\r
-#ifdef IPV6\r
- case AF_INET6:\r
- SET_SS_LEN(&vaddr, sizeof(struct sockaddr_in6));\r
- ((struct sockaddr_in6 *)&vaddr)->sin6_port = htons(port);\r
- break;\r
-#endif\r
- default:\r
- break;\r
- }\r
- if((listener = find_listener(&vaddr)))\r
- {\r
- if(listener->F != NULL)\r
- return;\r
- }\r
- else\r
- {\r
- listener = make_listener(&vaddr);\r
- rb_dlinkAdd(listener, &listener->node, &listener_list);\r
- }\r
-\r
- listener->F = NULL;\r
- listener->ssl = ssl;\r
- if(inetport(listener))\r
- listener->active = 1;\r
- else\r
- close_listener(listener);\r
-}\r
-\r
-/*\r
- * close_listener - close a single listener\r
- */\r
-void\r
-close_listener(struct Listener *listener)\r
-{\r
- s_assert(listener != NULL);\r
- if(listener == NULL)\r
- return;\r
- if(listener->F != NULL)\r
- {\r
- rb_close(listener->F);\r
- listener->F = NULL;\r
- }\r
-\r
- listener->active = 0;\r
-\r
- if(listener->ref_count)\r
- return;\r
-\r
- free_listener(listener);\r
-}\r
-\r
-/*\r
- * close_listeners - close and free all listeners that are not being used\r
- */\r
-void\r
-close_listeners()\r
-{\r
- struct Listener *listener;\r
- rb_dlink_node *ptr, *next;\r
-\r
- RB_DLINK_FOREACH_SAFE(ptr, next, listener_list.head)\r
- {\r
- listener = ptr->data;\r
- close_listener(listener);\r
- }\r
-}\r
-\r
-/*\r
- * add_connection - creates a client which has just connected to us on \r
- * the given fd. The sockhost field is initialized with the ip# of the host.\r
- * The client is sent to the auth module for verification, and not put in\r
- * any client list yet.\r
- */\r
-static void\r
-add_connection(struct Listener *listener, rb_fde_t *F, struct sockaddr *sai, struct sockaddr *lai, void *ssl_ctl)\r
-{\r
- struct Client *new_client;\r
- s_assert(NULL != listener);\r
- /* \r
- * get the client socket name from the socket\r
- * the client has already been checked out in accept_connection\r
- */\r
- new_client = make_client(NULL);\r
-\r
- memcpy(&new_client->localClient->ip, sai, sizeof(struct rb_sockaddr_storage));\r
- new_client->localClient->lip = rb_malloc(sizeof(struct rb_sockaddr_storage));\r
- memcpy(new_client->localClient->lip, lai, sizeof(struct rb_sockaddr_storage));\r
-\r
- /* \r
- * copy address to 'sockhost' as a string, copy it to host too\r
- * so we have something valid to put into error messages...\r
- */\r
- rb_inet_ntop_sock((struct sockaddr *)&new_client->localClient->ip, new_client->sockhost, \r
- sizeof(new_client->sockhost));\r
-\r
-\r
- rb_strlcpy(new_client->host, new_client->sockhost, sizeof(new_client->host));\r
-\r
-#ifdef IPV6\r
- if(GET_SS_FAMILY(&new_client->localClient->ip) == AF_INET6 && ConfigFileEntry.dot_in_ip6_addr == 1)\r
- {\r
- rb_strlcat(new_client->host, ".", sizeof(new_client->host));\r
- }\r
-#endif\r
-\r
- new_client->localClient->F = F;\r
- add_to_cli_fd_hash(new_client);\r
- new_client->localClient->listener = listener;\r
+ listener->ssl ? " ssl" : "");
+ }
+}
+
+/*
+ * inetport - create a listener socket in the AF_INET or AF_INET6 domain,
+ * bind it to the port given in 'port' and listen to it
+ * returns true (1) if successful false (0) on error.
+ *
+ * If the operating system has a define for SOMAXCONN, use it, otherwise
+ * use RATBOX_SOMAXCONN
+ */
+#ifdef SOMAXCONN
+#undef RATBOX_SOMAXCONN
+#define RATBOX_SOMAXCONN SOMAXCONN
+#endif
+
+static int
+inetport(listener_t *listener)
+{
+ rb_fde_t *F;
+ int ret;
+ int opt = 1;
+
+ /*
+ * At first, open a new socket
+ */
+
+ F = rb_socket(GET_SS_FAMILY(&listener->addr), SOCK_STREAM, 0, "Listener socket");
+
+#ifdef RB_IPV6
+ if(listener->addr.ss_family == AF_INET6)
+ {
+ struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&listener->addr;
+ if(!IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &in6addr_any))
+ {
+ inetntop(AF_INET6, &in6->sin6_addr, listener->vhost, sizeof(listener->vhost));
+ listener->name = listener->vhost;
+ }
+ } else
+#endif
+ {
+ struct sockaddr_in *in = (struct sockaddr_in *)&listener->addr;
+ if(in->sin_addr.s_addr != INADDR_ANY)
+ {
+ inetntop(AF_INET, &in->sin_addr, listener->vhost, sizeof(listener->vhost));
+ listener->name = listener->vhost;
+ }
+ }
+
+ if(F == NULL)
+ {
+ ilog_error("opening listener socket");
+ return 0;
+ }
+ else if((maxconnections - 10) < rb_get_fd(F)) /* XXX this is kinda bogus*/
+ {
+ ilog_error("no more connections left for listener");
+ rb_close(F);
+ return 0;
+ }
+
+ /*
+ * XXX - we don't want to do all this crap for a listener
+ * set_sock_opts(listener);
+ */
+ if(setsockopt(rb_get_fd(F), SOL_SOCKET, SO_REUSEADDR, (char *) &opt, sizeof(opt)))
+ {
+ ilog_error("setting SO_REUSEADDR for listener");
+ rb_close(F);
+ return 0;
+ }
+
+ /*
+ * Bind a port to listen for new connections if port is non-null,
+ * else assume it is already open and try get something from it.
+ */
+
+ if(bind(rb_get_fd(F), (struct sockaddr *) &listener->addr, GET_SS_LEN(&listener->addr)))
+ {
+ ilog_error("binding listener socket");
+ rb_close(F);
+ return 0;
+ }
+
+ if((ret = rb_listen(F, RATBOX_SOMAXCONN)))
+ {
+ ilog_error("listen()");
+ rb_close(F);
+ return 0;
+ }
+
+ listener->F = F;
+
+ rb_accept_tcp(listener->F, accept_precallback, accept_callback, listener);
+ return 1;
+}
+
+static listener_t *
+find_listener(struct rb_sockaddr_storage *addr)
+{
+ listener_t *listener = NULL;
+ listener_t *last_closed = NULL;
+
+ for (listener = ListenerPollList; listener; listener = listener->next)
+ {
+ if(addr->ss_family != listener->addr.ss_family)
+ continue;
+
+ switch(addr->ss_family)
+ {
+ case AF_INET:
+ {
+ struct sockaddr_in *in4 = (struct sockaddr_in *)addr;
+ struct sockaddr_in *lin4 = (struct sockaddr_in *)&listener->addr;
+ if(in4->sin_addr.s_addr == lin4->sin_addr.s_addr &&
+ in4->sin_port == lin4->sin_port )
+ {
+ if(listener->F == NULL)
+ last_closed = listener;
+ else
+ return(listener);
+ }
+ break;
+ }
+#ifdef RB_IPV6
+ case AF_INET6:
+ {
+ struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)addr;
+ struct sockaddr_in6 *lin6 =(struct sockaddr_in6 *)&listener->addr;
+ if(IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &lin6->sin6_addr) &&
+ in6->sin6_port == lin6->sin6_port)
+ {
+ if(listener->F == NULL)
+ last_closed = listener;
+ else
+ return(listener);
+ }
+ break;
+
+ }
+#endif
+
+ default:
+ break;
+ }
+ }
+ return last_closed;
+}
+
+
+/*
+ * add_listener- create a new listener
+ * port - the port number to listen on
+ * vhost_ip - if non-null must contain a valid IP address string in
+ * the format "255.255.255.255"
+ */
+void
+add_listener(int port, const char *vhost_ip, int family, int ssl)
+{
+ listener_t *listener;
+ struct rb_sockaddr_storage vaddr;
+
+ /*
+ * if no port in conf line, don't bother
+ */
+ if(port == 0)
+ return;
+ memset(&vaddr, 0, sizeof(vaddr));
+ vaddr.ss_family = family;
+
+ if(vhost_ip != NULL)
+ {
+ if(family == AF_INET)
+ {
+ if(inetpton(family, vhost_ip, &((struct sockaddr_in *)&vaddr)->sin_addr) <= 0)
+ return;
+ }
+#ifdef RB_IPV6
+ else
+ {
+ if(inetpton(family, vhost_ip, &((struct sockaddr_in6 *)&vaddr)->sin6_addr) <= 0)
+ return;
+
+ }
+#endif
+ } else
+ {
+ switch(family)
+ {
+ case AF_INET:
+ ((struct sockaddr_in *)&vaddr)->sin_addr.s_addr = INADDR_ANY;
+ break;
+#ifdef RB_IPV6
+ case AF_INET6:
+ memcpy(&((struct sockaddr_in6 *)&vaddr)->sin6_addr, &in6addr_any, sizeof(struct in6_addr));
+ break;
+ default:
+ return;
+#endif
+ }
+ }
+ switch(family)
+ {
+ case AF_INET:
+ SET_SS_LEN(&vaddr, sizeof(struct sockaddr_in));
+ ((struct sockaddr_in *)&vaddr)->sin_port = htons(port);
+ break;
+#ifdef RB_IPV6
+ case AF_INET6:
+ SET_SS_LEN(&vaddr, sizeof(struct sockaddr_in6));
+ ((struct sockaddr_in6 *)&vaddr)->sin6_port = htons(port);
+ break;
+#endif
+ default:
+ break;
+ }
+ if((listener = find_listener(&vaddr)))
+ {
+ if(listener->F != NULL)
+ return;
+ }
+ else
+ {
+ listener = make_listener(&vaddr);
+ listener->next = ListenerPollList;
+ ListenerPollList = listener;
+ }
+
+ listener->F = NULL;
+ listener->ssl = ssl;
+
+ if(inetport(listener))
+ listener->active = 1;
+ else
+ close_listener(listener);
+}
+
+/*
+ * close_listener - close a single listener
+ */
+void
+close_listener(listener_t *listener)
+{
+ s_assert(listener != NULL);
+ if(listener == NULL)
+ return;
+ if(listener->F != NULL)
+ {
+ rb_close(listener->F);
+ listener->F = NULL;
+ }
+
+ listener->active = 0;
+
+ if(listener->ref_count)
+ return;
+
+ free_listener(listener);
+}
+
+/*
+ * close_listeners - close and free all listeners that are not being used
+ */
+void
+close_listeners()
+{
+ listener_t *listener;
+ listener_t *listener_next = 0;
+ /*
+ * close all 'extra' listening ports we have
+ */
+ for (listener = ListenerPollList; listener; listener = listener_next)
+ {
+ listener_next = listener->next;
+ close_listener(listener);
+ }
+}
+
+#define DLINE_WARNING "ERROR :You have been D-lined.\r\n"
+
+/*
+ * add_connection - creates a client which has just connected to us on
+ * the given fd. The sockhost field is initialized with the ip# of the host.
+ * The client is sent to the auth module for verification, and not put in
+ * any client list yet.
+ */
+static void
+add_connection(struct Listener *listener, rb_fde_t *F, struct sockaddr *sai, void *ssl_ctl, int exempt)
+{
+ struct Client *new_client;
+ s_assert(NULL != listener);
+
+ /*
+ * get the client socket name from the socket
+ * the client has already been checked out in accept_connection
+ */
+ new_client = make_client(NULL);
+
+ memcpy(&new_client->localClient->ip, sai, sizeof(struct rb_sockaddr_storage));
+
+ /*
+ * copy address to 'sockhost' as a string, copy it to host too
+ * so we have something valid to put into error messages...
+ */
+ inetntop_sock((struct sockaddr *)&new_client->localClient->ip, new_client->sockhost,
+ sizeof(new_client->sockhost));
+
+
+ strlcpy(new_client->host, new_client->sockhost, sizeof(new_client->host));
+
+ new_client->localClient->F = F;
+ add_to_cli_fd_hash(new_client);
+ new_client->localClient->listener = listener;