]> jfr.im git - solanum.git/blame - ssld/ssld.c
client: handle UID rollover. ircd-ratbox r28917
[solanum.git] / ssld / ssld.c
CommitLineData
8d99443b
VY
1/*
2 * ssld.c: The ircd-ratbox ssl/zlib helper daemon thingy
3 * Copyright (C) 2007 Aaron Sethman <androsyn@ratbox.org>
4 * Copyright (C) 2007 ircd-ratbox development team
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
19 * USA
20 *
3202e249 21 * $Id$
8d99443b
VY
22 */
23
24
25#include "stdinc.h"
26
27#ifdef HAVE_LIBZ
28#include <zlib.h>
29#endif
30
31#define MAXPASSFD 4
32#ifndef READBUF_SIZE
33#define READBUF_SIZE 16384
34#endif
35
36static void setup_signals(void);
3202e249 37static pid_t ppid;
8d99443b 38
408a29c6
AC
39static inline uint32_t
40buf_to_uint32(uint8_t *buf)
8d99443b 41{
408a29c6 42 uint32_t x;
4b6a4d47 43 memcpy(&x, buf, sizeof(x));
8d99443b
VY
44 return x;
45}
46
3202e249 47static inline void
408a29c6 48uint32_to_buf(uint8_t *buf, uint32_t x)
8d99443b 49{
4b6a4d47 50 memcpy(buf, &x, sizeof(x));
8d99443b
VY
51 return;
52}
53
8d99443b
VY
54typedef struct _mod_ctl_buf
55{
56 rb_dlink_node node;
85e9bf41 57 uint8_t *buf;
8d99443b
VY
58 size_t buflen;
59 rb_fde_t *F[MAXPASSFD];
60 int nfds;
61} mod_ctl_buf_t;
62
63typedef struct _mod_ctl
64{
65 rb_dlink_node node;
66 int cli_count;
67 rb_fde_t *F;
68 rb_fde_t *F_pipe;
69 rb_dlink_list readq;
70 rb_dlink_list writeq;
71} mod_ctl_t;
72
73static mod_ctl_t *mod_ctl;
74
75
76#ifdef HAVE_LIBZ
77typedef struct _zlib_stream
78{
79 z_stream instream;
80 z_stream outstream;
81} zlib_stream_t;
82#endif
83
84typedef struct _conn
85{
86 rb_dlink_node node;
87 mod_ctl_t *ctl;
88 rawbuf_head_t *modbuf_out;
89 rawbuf_head_t *plainbuf_out;
90
408a29c6 91 uint32_t id;
8d99443b
VY
92
93 rb_fde_t *mod_fd;
94 rb_fde_t *plain_fd;
94356462
AC
95 uint64_t mod_out;
96 uint64_t mod_in;
97 uint64_t plain_in;
98 uint64_t plain_out;
7edb4f16 99 uint8_t flags;
8d99443b
VY
100 void *stream;
101} conn_t;
102
103#define FLAG_SSL 0x01
104#define FLAG_ZIP 0x02
105#define FLAG_CORK 0x04
106#define FLAG_DEAD 0x08
3202e249
VY
107#define FLAG_SSL_W_WANTS_R 0x10 /* output needs to wait until input possible */
108#define FLAG_SSL_R_WANTS_W 0x20 /* input needs to wait until output possible */
07c2bb75 109#define FLAG_ZIPSSL 0x40
8d99443b
VY
110
111#define IsSSL(x) ((x)->flags & FLAG_SSL)
112#define IsZip(x) ((x)->flags & FLAG_ZIP)
113#define IsCork(x) ((x)->flags & FLAG_CORK)
114#define IsDead(x) ((x)->flags & FLAG_DEAD)
73d6283c
VY
115#define IsSSLWWantsR(x) ((x)->flags & FLAG_SSL_W_WANTS_R)
116#define IsSSLRWantsW(x) ((x)->flags & FLAG_SSL_R_WANTS_W)
07c2bb75 117#define IsZipSSL(x) ((x)->flags & FLAG_ZIPSSL)
8d99443b
VY
118
119#define SetSSL(x) ((x)->flags |= FLAG_SSL)
120#define SetZip(x) ((x)->flags |= FLAG_ZIP)
121#define SetCork(x) ((x)->flags |= FLAG_CORK)
122#define SetDead(x) ((x)->flags |= FLAG_DEAD)
73d6283c
VY
123#define SetSSLWWantsR(x) ((x)->flags |= FLAG_SSL_W_WANTS_R)
124#define SetSSLRWantsW(x) ((x)->flags |= FLAG_SSL_R_WANTS_W)
07c2bb75 125#define SetZipSSL(x) ((x)->flags |= FLAG_ZIPSSL)
8d99443b
VY
126
127#define ClearSSL(x) ((x)->flags &= ~FLAG_SSL)
128#define ClearZip(x) ((x)->flags &= ~FLAG_ZIP)
129#define ClearCork(x) ((x)->flags &= ~FLAG_CORK)
130#define ClearDead(x) ((x)->flags &= ~FLAG_DEAD)
73d6283c
VY
131#define ClearSSLWWantsR(x) ((x)->flags &= ~FLAG_SSL_W_WANTS_R)
132#define ClearSSLRWantsW(x) ((x)->flags &= ~FLAG_SSL_R_WANTS_W)
07c2bb75 133#define ClearZipSSL(x) ((x)->flags &= ~FLAG_ZIPSSL)
8d99443b
VY
134
135#define NO_WAIT 0x0
136#define WAIT_PLAIN 0x1
137
4b6a4d47
VY
138#define HASH_WALK_SAFE(i, max, ptr, next, table) for(i = 0; i < max; i++) { RB_DLINK_FOREACH_SAFE(ptr, next, table[i].head)
139#define HASH_WALK_END }
8d99443b
VY
140#define CONN_HASH_SIZE 2000
141#define connid_hash(x) (&connid_hash_table[(x % CONN_HASH_SIZE)])
142
4b6a4d47
VY
143
144
8d99443b
VY
145static rb_dlink_list connid_hash_table[CONN_HASH_SIZE];
146static rb_dlink_list dead_list;
147
3202e249 148static void conn_mod_read_cb(rb_fde_t *fd, void *data);
8d99443b
VY
149static void conn_mod_write_sendq(rb_fde_t *, void *data);
150static void conn_plain_write_sendq(rb_fde_t *, void *data);
151static void mod_write_ctl(rb_fde_t *, void *data);
3202e249 152static void conn_plain_read_cb(rb_fde_t *fd, void *data);
e99f6122 153static void conn_plain_read_shutdown_cb(rb_fde_t *fd, void *data);
3202e249 154static void mod_cmd_write_queue(mod_ctl_t * ctl, const void *data, size_t len);
8d99443b
VY
155static const char *remote_closed = "Remote host closed the connection";
156static int ssl_ok;
e6bbb410 157static int certfp_method = RB_SSL_CERTFP_METH_SHA1;
8d99443b
VY
158#ifdef HAVE_LIBZ
159static int zlib_ok = 1;
160#else
161static int zlib_ok = 0;
162#endif
4b6a4d47
VY
163
164
165#ifdef HAVE_LIBZ
8d99443b
VY
166static void *
167ssld_alloc(void *unused, size_t count, size_t size)
168{
169 return rb_malloc(count * size);
170}
171
172static void
173ssld_free(void *unused, void *ptr)
174{
3202e249 175 rb_free(ptr);
8d99443b 176}
4b6a4d47 177#endif
8d99443b
VY
178
179static conn_t *
408a29c6 180conn_find_by_id(uint32_t id)
8d99443b
VY
181{
182 rb_dlink_node *ptr;
183 conn_t *conn;
184
185 RB_DLINK_FOREACH(ptr, (connid_hash(id))->head)
186 {
187 conn = ptr->data;
188 if(conn->id == id && !IsDead(conn))
189 return conn;
190 }
191 return NULL;
192}
193
194static void
408a29c6 195conn_add_id_hash(conn_t * conn, uint32_t id)
8d99443b
VY
196{
197 conn->id = id;
198 rb_dlinkAdd(conn, &conn->node, connid_hash(id));
199}
200
201static void
202free_conn(conn_t * conn)
203{
204 rb_free_rawbuffer(conn->modbuf_out);
205 rb_free_rawbuffer(conn->plainbuf_out);
4b6a4d47 206#ifdef HAVE_LIBZ
8d99443b
VY
207 if(IsZip(conn))
208 {
209 zlib_stream_t *stream = conn->stream;
210 inflateEnd(&stream->instream);
3202e249 211 deflateEnd(&stream->outstream);
84b49742 212 rb_free(stream);
8d99443b 213 }
4b6a4d47 214#endif
8d99443b
VY
215 rb_free(conn);
216}
217
218static void
219clean_dead_conns(void *unused)
220{
221 conn_t *conn;
222 rb_dlink_node *ptr, *next;
223 RB_DLINK_FOREACH_SAFE(ptr, next, dead_list.head)
224 {
225 conn = ptr->data;
226 free_conn(conn);
227 }
228 dead_list.tail = dead_list.head = NULL;
229}
230
231
232static void
233close_conn(conn_t * conn, int wait_plain, const char *fmt, ...)
234{
235 va_list ap;
3202e249 236 char reason[128]; /* must always be under 250 bytes */
85e9bf41 237 uint8_t buf[256];
8d99443b
VY
238 int len;
239 if(IsDead(conn))
240 return;
3202e249 241
8d99443b
VY
242 rb_rawbuf_flush(conn->modbuf_out, conn->mod_fd);
243 rb_rawbuf_flush(conn->plainbuf_out, conn->plain_fd);
244 rb_close(conn->mod_fd);
245 SetDead(conn);
246
408a29c6 247 if(!IsZipSSL(conn))
e99f6122
JT
248 rb_dlinkDelete(&conn->node, connid_hash(conn->id));
249
8d99443b
VY
250 if(!wait_plain || fmt == NULL)
251 {
252 rb_close(conn->plain_fd);
8d99443b
VY
253 rb_dlinkAdd(conn, &conn->node, &dead_list);
254 return;
255 }
e99f6122
JT
256 rb_setselect(conn->plain_fd, RB_SELECT_READ, conn_plain_read_shutdown_cb, conn);
257 rb_setselect(conn->plain_fd, RB_SELECT_WRITE, NULL, NULL);
8d99443b 258 va_start(ap, fmt);
5203cba5 259 vsnprintf(reason, sizeof(reason), fmt, ap);
8d99443b
VY
260 va_end(ap);
261
262 buf[0] = 'D';
408a29c6 263 uint32_to_buf(&buf[1], conn->id);
85e9bf41 264 rb_strlcpy((char *) &buf[5], reason, sizeof(buf) - 5);
8d99443b
VY
265 len = (strlen(reason) + 1) + 5;
266 mod_cmd_write_queue(conn->ctl, buf, len);
267}
268
269static conn_t *
3202e249 270make_conn(mod_ctl_t * ctl, rb_fde_t *mod_fd, rb_fde_t *plain_fd)
8d99443b
VY
271{
272 conn_t *conn = rb_malloc(sizeof(conn_t));
273 conn->ctl = ctl;
274 conn->modbuf_out = rb_new_rawbuffer();
275 conn->plainbuf_out = rb_new_rawbuffer();
276 conn->mod_fd = mod_fd;
277 conn->plain_fd = plain_fd;
278 conn->id = -1;
279 conn->stream = NULL;
280 rb_set_nb(mod_fd);
281 rb_set_nb(plain_fd);
282 return conn;
283}
284
4b6a4d47
VY
285static void
286check_handshake_flood(void *unused)
287{
288 conn_t *conn;
289 rb_dlink_node *ptr, *next;
290 unsigned int count;
291 int i;
292 HASH_WALK_SAFE(i, CONN_HASH_SIZE, ptr, next, connid_hash_table)
293 {
294 conn = ptr->data;
295 if(!IsSSL(conn))
296 continue;
3202e249 297
4b6a4d47
VY
298 count = rb_ssl_handshake_count(conn->mod_fd);
299 /* nothing needs to do this more than twice in ten seconds i don't think */
300 if(count > 2)
301 close_conn(conn, WAIT_PLAIN, "Handshake flooding");
302 else
303 rb_ssl_clear_handshake_count(conn->mod_fd);
3202e249
VY
304 }
305HASH_WALK_END}
4b6a4d47 306
8d99443b 307static void
3202e249 308conn_mod_write_sendq(rb_fde_t *fd, void *data)
8d99443b
VY
309{
310 conn_t *conn = data;
311 const char *err;
312 int retlen;
313 if(IsDead(conn))
314 return;
315
73d6283c
VY
316 if(IsSSLWWantsR(conn))
317 {
318 ClearSSLWWantsR(conn);
319 conn_mod_read_cb(conn->mod_fd, conn);
320 if(IsDead(conn))
321 return;
322 }
323
3202e249 324 while((retlen = rb_rawbuf_flush(conn->modbuf_out, fd)) > 0)
8d99443b
VY
325 conn->mod_out += retlen;
326
327 if(retlen == 0 || (retlen < 0 && !rb_ignore_errno(errno)))
328 {
329 if(retlen == 0)
330 close_conn(conn, WAIT_PLAIN, "%s", remote_closed);
331 if(IsSSL(conn) && retlen == RB_RW_SSL_ERROR)
332 err = rb_get_ssl_strerror(conn->mod_fd);
333 else
334 err = strerror(errno);
335 close_conn(conn, WAIT_PLAIN, "Write error: %s", err);
336 return;
337 }
338 if(rb_rawbuf_length(conn->modbuf_out) > 0)
339 {
73d6283c
VY
340 if(retlen != RB_RW_SSL_NEED_READ)
341 rb_setselect(conn->mod_fd, RB_SELECT_WRITE, conn_mod_write_sendq, conn);
342 else
343 {
344 rb_setselect(conn->mod_fd, RB_SELECT_READ, conn_mod_write_sendq, conn);
345 rb_setselect(conn->mod_fd, RB_SELECT_WRITE, NULL, NULL);
346 SetSSLWWantsR(conn);
347 }
8d99443b
VY
348 }
349 else
350 rb_setselect(conn->mod_fd, RB_SELECT_WRITE, NULL, NULL);
351
352 if(IsCork(conn) && rb_rawbuf_length(conn->modbuf_out) == 0)
353 {
354 ClearCork(conn);
355 conn_plain_read_cb(conn->plain_fd, conn);
356 }
357
358}
359
360static void
361conn_mod_write(conn_t * conn, void *data, size_t len)
362{
363 if(IsDead(conn)) /* no point in queueing to a dead man */
364 return;
365 rb_rawbuf_append(conn->modbuf_out, data, len);
366}
367
368static void
369conn_plain_write(conn_t * conn, void *data, size_t len)
370{
371 if(IsDead(conn)) /* again no point in queueing to dead men */
372 return;
373 rb_rawbuf_append(conn->plainbuf_out, data, len);
374}
375
376static void
377mod_cmd_write_queue(mod_ctl_t * ctl, const void *data, size_t len)
378{
379 mod_ctl_buf_t *ctl_buf;
380 ctl_buf = rb_malloc(sizeof(mod_ctl_buf_t));
381 ctl_buf->buf = rb_malloc(len);
382 ctl_buf->buflen = len;
383 memcpy(ctl_buf->buf, data, len);
384 ctl_buf->nfds = 0;
385 rb_dlinkAddTail(ctl_buf, &ctl_buf->node, &ctl->writeq);
386 mod_write_ctl(ctl->F, ctl);
387}
388
389#ifdef HAVE_LIBZ
390static void
391common_zlib_deflate(conn_t * conn, void *buf, size_t len)
392{
6cd1aca7 393 char outbuf[READBUF_SIZE];
8d99443b 394 int ret, have;
3202e249 395 z_stream *outstream = &((zlib_stream_t *) conn->stream)->outstream;
8d99443b
VY
396 outstream->next_in = buf;
397 outstream->avail_in = len;
398 outstream->next_out = (Bytef *) outbuf;
399 outstream->avail_out = sizeof(outbuf);
400
401 ret = deflate(outstream, Z_SYNC_FLUSH);
402 if(ret != Z_OK)
403 {
404 /* deflate error */
405 close_conn(conn, WAIT_PLAIN, "Deflate failed: %s", zError(ret));
406 return;
407 }
408 if(outstream->avail_out == 0)
409 {
410 /* avail_out empty */
411 close_conn(conn, WAIT_PLAIN, "error compressing data, avail_out == 0");
412 return;
413 }
414 if(outstream->avail_in != 0)
415 {
3202e249 416 /* avail_in isn't empty... */
8d99443b
VY
417 close_conn(conn, WAIT_PLAIN, "error compressing data, avail_in != 0");
418 return;
419 }
420 have = sizeof(outbuf) - outstream->avail_out;
421 conn_mod_write(conn, outbuf, have);
422}
423
424static void
425common_zlib_inflate(conn_t * conn, void *buf, size_t len)
426{
6cd1aca7 427 char outbuf[READBUF_SIZE];
3202e249
VY
428 int ret, have = 0;
429 ((zlib_stream_t *) conn->stream)->instream.next_in = buf;
430 ((zlib_stream_t *) conn->stream)->instream.avail_in = len;
431 ((zlib_stream_t *) conn->stream)->instream.next_out = (Bytef *) outbuf;
432 ((zlib_stream_t *) conn->stream)->instream.avail_out = sizeof(outbuf);
8d99443b 433
3202e249 434 while(((zlib_stream_t *) conn->stream)->instream.avail_in)
8d99443b 435 {
3202e249 436 ret = inflate(&((zlib_stream_t *) conn->stream)->instream, Z_NO_FLUSH);
8d99443b
VY
437 if(ret != Z_OK)
438 {
439 if(!strncmp("ERROR ", buf, 6))
440 {
441 close_conn(conn, WAIT_PLAIN, "Received uncompressed ERROR");
442 return;
443 }
444 close_conn(conn, WAIT_PLAIN, "Inflate failed: %s", zError(ret));
445 return;
446 }
3202e249 447 have = sizeof(outbuf) - ((zlib_stream_t *) conn->stream)->instream.avail_out;
8d99443b 448
3202e249 449 if(((zlib_stream_t *) conn->stream)->instream.avail_in)
8d99443b
VY
450 {
451 conn_plain_write(conn, outbuf, have);
452 have = 0;
3202e249
VY
453 ((zlib_stream_t *) conn->stream)->instream.next_out = (Bytef *) outbuf;
454 ((zlib_stream_t *) conn->stream)->instream.avail_out = sizeof(outbuf);
8d99443b
VY
455 }
456 }
457 if(have == 0)
458 return;
459
460 conn_plain_write(conn, outbuf, have);
461}
462#endif
463
464static int
465plain_check_cork(conn_t * conn)
466{
467 if(rb_rawbuf_length(conn->modbuf_out) >= 4096)
468 {
55abcbb2 469 /* if we have over 4k pending outbound, don't read until
8d99443b
VY
470 * we've cleared the queue */
471 SetCork(conn);
472 rb_setselect(conn->plain_fd, RB_SELECT_READ, NULL, NULL);
473 /* try to write */
474 conn_mod_write_sendq(conn->mod_fd, conn);
475 return 1;
476 }
477 return 0;
478}
479
480
481static void
3202e249 482conn_plain_read_cb(rb_fde_t *fd, void *data)
8d99443b 483{
6cd1aca7 484 char inbuf[READBUF_SIZE];
8d99443b
VY
485 conn_t *conn = data;
486 int length = 0;
487 if(conn == NULL)
488 return;
489
490 if(IsDead(conn))
491 return;
492
493 if(plain_check_cork(conn))
494 return;
495
3202e249 496 while(1)
8d99443b
VY
497 {
498 if(IsDead(conn))
499 return;
500
501 length = rb_read(conn->plain_fd, inbuf, sizeof(inbuf));
502
503 if(length == 0 || (length < 0 && !rb_ignore_errno(errno)))
504 {
505 close_conn(conn, NO_WAIT, NULL);
506 return;
507 }
508
509 if(length < 0)
510 {
511 rb_setselect(conn->plain_fd, RB_SELECT_READ, conn_plain_read_cb, conn);
512 conn_mod_write_sendq(conn->mod_fd, conn);
513 return;
514 }
515 conn->plain_in += length;
516
517#ifdef HAVE_LIBZ
518 if(IsZip(conn))
519 common_zlib_deflate(conn, inbuf, length);
520 else
521#endif
522 conn_mod_write(conn, inbuf, length);
523 if(IsDead(conn))
524 return;
525 if(plain_check_cork(conn))
526 return;
527 }
528}
529
e99f6122
JT
530static void
531conn_plain_read_shutdown_cb(rb_fde_t *fd, void *data)
532{
6cd1aca7 533 char inbuf[READBUF_SIZE];
e99f6122
JT
534 conn_t *conn = data;
535 int length = 0;
536
537 if(conn == NULL)
538 return;
539
540 while(1)
541 {
542 length = rb_read(conn->plain_fd, inbuf, sizeof(inbuf));
543
544 if(length == 0 || (length < 0 && !rb_ignore_errno(errno)))
545 {
546 rb_close(conn->plain_fd);
547 rb_dlinkAdd(conn, &conn->node, &dead_list);
548 return;
549 }
550
551 if(length < 0)
552 {
553 rb_setselect(conn->plain_fd, RB_SELECT_READ, conn_plain_read_shutdown_cb, conn);
554 return;
555 }
556 }
557}
558
8d99443b 559static void
3202e249 560conn_mod_read_cb(rb_fde_t *fd, void *data)
8d99443b 561{
6cd1aca7 562 char inbuf[READBUF_SIZE];
8d99443b
VY
563 conn_t *conn = data;
564 const char *err = remote_closed;
565 int length;
566 if(conn == NULL)
567 return;
568 if(IsDead(conn))
569 return;
570
73d6283c
VY
571 if(IsSSLRWantsW(conn))
572 {
573 ClearSSLRWantsW(conn);
574 conn_mod_write_sendq(conn->mod_fd, conn);
575 if(IsDead(conn))
576 return;
577 }
578
3202e249 579 while(1)
8d99443b
VY
580 {
581 if(IsDead(conn))
582 return;
583
584 length = rb_read(conn->mod_fd, inbuf, sizeof(inbuf));
585
586 if(length == 0 || (length < 0 && !rb_ignore_errno(errno)))
587 {
3202e249
VY
588 if(length == 0)
589 {
8d99443b
VY
590 close_conn(conn, WAIT_PLAIN, "%s", remote_closed);
591 return;
592 }
593
594 if(IsSSL(conn) && length == RB_RW_SSL_ERROR)
595 err = rb_get_ssl_strerror(conn->mod_fd);
596 else
597 err = strerror(errno);
598 close_conn(conn, WAIT_PLAIN, "Read error: %s", err);
599 return;
600 }
601 if(length < 0)
602 {
73d6283c
VY
603 if(length != RB_RW_SSL_NEED_WRITE)
604 rb_setselect(conn->mod_fd, RB_SELECT_READ, conn_mod_read_cb, conn);
605 else
606 {
607 rb_setselect(conn->mod_fd, RB_SELECT_READ, NULL, NULL);
608 rb_setselect(conn->mod_fd, RB_SELECT_WRITE, conn_mod_read_cb, conn);
609 SetSSLRWantsW(conn);
610 }
8d99443b
VY
611 conn_plain_write_sendq(conn->plain_fd, conn);
612 return;
3202e249 613 }
8d99443b
VY
614 conn->mod_in += length;
615#ifdef HAVE_LIBZ
616 if(IsZip(conn))
617 common_zlib_inflate(conn, inbuf, length);
618 else
619#endif
620 conn_plain_write(conn, inbuf, length);
621 }
622}
623
624static void
3202e249 625conn_plain_write_sendq(rb_fde_t *fd, void *data)
8d99443b
VY
626{
627 conn_t *conn = data;
628 int retlen;
629
630 if(IsDead(conn))
631 return;
632
3202e249 633 while((retlen = rb_rawbuf_flush(conn->plainbuf_out, fd)) > 0)
8d99443b
VY
634 {
635 conn->plain_out += retlen;
636 }
637 if(retlen == 0 || (retlen < 0 && !rb_ignore_errno(errno)))
638 {
639 close_conn(data, NO_WAIT, NULL);
640 return;
641 }
3202e249 642
8d99443b
VY
643
644 if(rb_rawbuf_length(conn->plainbuf_out) > 0)
645 rb_setselect(conn->plain_fd, RB_SELECT_WRITE, conn_plain_write_sendq, conn);
646 else
647 rb_setselect(conn->plain_fd, RB_SELECT_WRITE, NULL, NULL);
648}
649
650static int
651maxconn(void)
652{
653#if defined(RLIMIT_NOFILE) && defined(HAVE_SYS_RESOURCE_H)
654 struct rlimit limit;
655
656 if(!getrlimit(RLIMIT_NOFILE, &limit))
657 {
658 return limit.rlim_cur;
659 }
660#endif /* RLIMIT_FD_MAX */
661 return MAXCONNECTIONS;
662}
663
408a29c6
AC
664static void
665ssl_send_cipher(conn_t *conn)
666{
408a29c6 667 size_t len;
74ff144d 668 uint8_t buf[512];
408a29c6
AC
669 char cstring[256];
670 const char *p;
671 if(!IsSSL(conn))
672 return;
673
674 p = rb_ssl_get_cipher(conn->mod_fd);
675
676 if(p == NULL)
677 return;
678
679 rb_strlcpy(cstring, p, sizeof(cstring));
680
681 buf[0] = 'C';
682 uint32_to_buf(&buf[1], conn->id);
74ff144d 683 strcpy((char *) &buf[5], cstring);
408a29c6
AC
684 len = (strlen(cstring) + 1) + 5;
685 mod_cmd_write_queue(conn->ctl, buf, len);
408a29c6
AC
686}
687
688static void
689ssl_send_certfp(conn_t *conn)
690{
691 uint8_t buf[9 + RB_SSL_CERTFP_LEN];
692
693 int len = rb_get_ssl_certfp(conn->mod_fd, &buf[9], certfp_method);
694 if (!len)
695 return;
696
697 lrb_assert(len <= RB_SSL_CERTFP_LEN);
698 buf[0] = 'F';
699 uint32_to_buf(&buf[1], conn->id);
700 uint32_to_buf(&buf[5], len);
701 mod_cmd_write_queue(conn->ctl, buf, 9 + len);
702}
703
8d99443b 704static void
3202e249 705ssl_process_accept_cb(rb_fde_t *F, int status, struct sockaddr *addr, rb_socklen_t len, void *data)
8d99443b
VY
706{
707 conn_t *conn = data;
7247337a 708
8d99443b
VY
709 if(status == RB_OK)
710 {
711 conn_mod_read_cb(conn->mod_fd, conn);
712 conn_plain_read_cb(conn->plain_fd, conn);
408a29c6
AC
713 ssl_send_cipher(conn);
714 ssl_send_certfp(conn);
8d99443b
VY
715 return;
716 }
a444bb78 717 /* ircd doesn't care about the reason for this */
8d99443b
VY
718 close_conn(conn, NO_WAIT, 0);
719 return;
720}
721
722static void
3202e249 723ssl_process_connect_cb(rb_fde_t *F, int status, void *data)
8d99443b
VY
724{
725 conn_t *conn = data;
a7675ed2 726
8d99443b
VY
727 if(status == RB_OK)
728 {
729 conn_mod_read_cb(conn->mod_fd, conn);
730 conn_plain_read_cb(conn->plain_fd, conn);
408a29c6
AC
731 ssl_send_cipher(conn);
732 ssl_send_certfp(conn);
8d99443b 733 }
a444bb78
JT
734 else if(status == RB_ERR_TIMEOUT)
735 close_conn(conn, WAIT_PLAIN, "SSL handshake timed out");
736 else if(status == RB_ERROR_SSL)
737 close_conn(conn, WAIT_PLAIN, "%s", rb_get_ssl_strerror(conn->mod_fd));
738 else
739 close_conn(conn, WAIT_PLAIN, "SSL handshake failed");
8d99443b
VY
740}
741
742
c03677e9
JT
743static void
744cleanup_bad_message(mod_ctl_t * ctl, mod_ctl_buf_t * ctlb)
745{
746 int i;
747
748 /* XXX should log this somehow */
749 for (i = 0; i < ctlb->nfds; i++)
750 rb_close(ctlb->F[i]);
751}
752
8d99443b
VY
753static void
754ssl_process_accept(mod_ctl_t * ctl, mod_ctl_buf_t * ctlb)
755{
756 conn_t *conn;
408a29c6 757 uint32_t id;
8d99443b
VY
758
759 conn = make_conn(ctl, ctlb->F[0], ctlb->F[1]);
760
408a29c6
AC
761 id = buf_to_uint32(&ctlb->buf[1]);
762 conn_add_id_hash(conn, id);
8d99443b
VY
763 SetSSL(conn);
764
765 if(rb_get_type(conn->mod_fd) & RB_FD_UNKNOWN)
8d99443b 766 rb_set_type(conn->mod_fd, RB_FD_SOCKET);
a5ddb7df
AC
767
768 if(rb_get_type(conn->plain_fd) == RB_FD_UNKNOWN)
8d99443b
VY
769 rb_set_type(conn->plain_fd, RB_FD_SOCKET);
770
771 rb_ssl_start_accepted(ctlb->F[0], ssl_process_accept_cb, conn, 10);
772}
773
e6bbb410
EM
774static void
775ssl_change_certfp_method(mod_ctl_t * ctl, mod_ctl_buf_t * ctlb)
776{
408a29c6 777 certfp_method = buf_to_uint32(&ctlb->buf[1]);
e6bbb410
EM
778}
779
8d99443b
VY
780static void
781ssl_process_connect(mod_ctl_t * ctl, mod_ctl_buf_t * ctlb)
782{
783 conn_t *conn;
408a29c6 784 uint32_t id;
8d99443b
VY
785 conn = make_conn(ctl, ctlb->F[0], ctlb->F[1]);
786
408a29c6
AC
787 id = buf_to_uint32(&ctlb->buf[1]);
788 conn_add_id_hash(conn, id);
8d99443b
VY
789 SetSSL(conn);
790
791 if(rb_get_type(conn->mod_fd) == RB_FD_UNKNOWN)
792 rb_set_type(conn->mod_fd, RB_FD_SOCKET);
793
a5ddb7df 794 if(rb_get_type(conn->plain_fd) == RB_FD_UNKNOWN)
8d99443b
VY
795 rb_set_type(conn->plain_fd, RB_FD_SOCKET);
796
797
798 rb_ssl_start_connected(ctlb->F[0], ssl_process_connect_cb, conn, 10);
799}
800
801static void
802process_stats(mod_ctl_t * ctl, mod_ctl_buf_t * ctlb)
803{
804 char outstat[512];
805 conn_t *conn;
85e9bf41 806 uint8_t *odata;
408a29c6 807 uint32_t id;
8d99443b 808
408a29c6 809 id = buf_to_uint32(&ctlb->buf[1]);
3202e249 810
8d99443b
VY
811 odata = &ctlb->buf[5];
812 conn = conn_find_by_id(id);
813
814 if(conn == NULL)
815 return;
816
5203cba5 817 snprintf(outstat, sizeof(outstat), "S %s %llu %llu %llu %llu", odata,
26b83fa0
SA
818 (unsigned long long)conn->plain_out,
819 (unsigned long long)conn->mod_in,
820 (unsigned long long)conn->plain_in,
821 (unsigned long long)conn->mod_out);
8d99443b
VY
822 conn->plain_out = 0;
823 conn->plain_in = 0;
824 conn->mod_in = 0;
825 conn->mod_out = 0;
826 mod_cmd_write_queue(ctl, outstat, strlen(outstat) + 1); /* +1 is so we send the \0 as well */
827}
828
07c2bb75
JT
829static void
830change_connid(mod_ctl_t *ctl, mod_ctl_buf_t *ctlb)
831{
408a29c6
AC
832 uint32_t id = buf_to_uint32(&ctlb->buf[1]);
833 uint32_t newid = buf_to_uint32(&ctlb->buf[5]);
07c2bb75 834 conn_t *conn = conn_find_by_id(id);
7beaee52
SA
835 lrb_assert(conn != NULL);
836 if(conn == NULL)
837 {
c84003ae 838 uint8_t buf[256];
7beaee52
SA
839 int len;
840
841 buf[0] = 'D';
842 uint32_to_buf(&buf[1], newid);
c84003ae
AC
843 sprintf((char *) &buf[5], "connid %d does not exist", id);
844 len = (strlen((char *) &buf[5]) + 1) + 5;
7beaee52
SA
845 mod_cmd_write_queue(ctl, buf, len);
846
847 return;
848 }
408a29c6 849 rb_dlinkDelete(&conn->node, connid_hash(conn->id));
07c2bb75
JT
850 SetZipSSL(conn);
851 conn->id = newid;
852}
853
8d99443b 854#ifdef HAVE_LIBZ
8d99443b
VY
855static void
856zlib_process(mod_ctl_t * ctl, mod_ctl_buf_t * ctlb)
857{
7edb4f16 858 uint8_t level;
8d99443b 859 size_t recvqlen;
408a29c6 860 size_t hdr = (sizeof(uint8_t) * 2) + sizeof(uint32_t);
8d99443b
VY
861 void *recvq_start;
862 z_stream *instream, *outstream;
863 conn_t *conn;
408a29c6 864 uint32_t id;
8d99443b
VY
865
866 conn = make_conn(ctl, ctlb->F[0], ctlb->F[1]);
867 if(rb_get_type(conn->mod_fd) == RB_FD_UNKNOWN)
868 rb_set_type(conn->mod_fd, RB_FD_SOCKET);
869
870 if(rb_get_type(conn->plain_fd) == RB_FD_UNKNOWN)
871 rb_set_type(conn->plain_fd, RB_FD_SOCKET);
872
408a29c6 873 id = buf_to_uint32(&ctlb->buf[1]);
8d99443b
VY
874 conn_add_id_hash(conn, id);
875
3202e249 876 level = (uint8_t)ctlb->buf[5];
8d99443b
VY
877
878 recvqlen = ctlb->buflen - hdr;
879 recvq_start = &ctlb->buf[6];
880
881 SetZip(conn);
882 conn->stream = rb_malloc(sizeof(zlib_stream_t));
3202e249
VY
883 instream = &((zlib_stream_t *) conn->stream)->instream;
884 outstream = &((zlib_stream_t *) conn->stream)->outstream;
885
8d99443b
VY
886 instream->total_in = 0;
887 instream->total_out = 0;
888 instream->zalloc = (alloc_func) ssld_alloc;
889 instream->zfree = (free_func) ssld_free;
890 instream->data_type = Z_ASCII;
3202e249 891 inflateInit(&((zlib_stream_t *) conn->stream)->instream);
8d99443b
VY
892
893 outstream->total_in = 0;
894 outstream->total_out = 0;
895 outstream->zalloc = (alloc_func) ssld_alloc;
896 outstream->zfree = (free_func) ssld_free;
897 outstream->data_type = Z_ASCII;
898
899 if(level > 9)
408a29c6 900 level = (uint8_t) Z_DEFAULT_COMPRESSION;
8d99443b 901
3202e249 902 deflateInit(&((zlib_stream_t *) conn->stream)->outstream, level);
8d99443b
VY
903 if(recvqlen > 0)
904 common_zlib_inflate(conn, recvq_start, recvqlen);
0bd120ed 905
8d99443b
VY
906 conn_mod_read_cb(conn->mod_fd, conn);
907 conn_plain_read_cb(conn->plain_fd, conn);
908 return;
909
910}
911#endif
912
913static void
914init_prng(mod_ctl_t * ctl, mod_ctl_buf_t * ctl_buf)
915{
916 char *path;
917 prng_seed_t seed_type;
3202e249
VY
918
919 seed_type = (prng_seed_t) ctl_buf->buf[1];
85e9bf41 920 path = (char *) &ctl_buf->buf[2];
8d99443b
VY
921 rb_init_prng(path, seed_type);
922}
923
924
925static void
926ssl_new_keys(mod_ctl_t * ctl, mod_ctl_buf_t * ctl_buf)
927{
928 char *buf;
c1725bda 929 char *cert, *key, *dhparam, *cipher_list;
8d99443b 930
85e9bf41 931 buf = (char *) &ctl_buf->buf[2];
8d99443b
VY
932 cert = buf;
933 buf += strlen(cert) + 1;
934 key = buf;
935 buf += strlen(key) + 1;
936 dhparam = buf;
937 if(strlen(dhparam) == 0)
938 dhparam = NULL;
c1725bda
AC
939 buf += strlen(dhparam) + 1;
940 cipher_list = buf;
941 if(strlen(cipher_list) == 0)
942 cipher_list = NULL;
8d99443b 943
c1725bda 944 if(!rb_setup_ssl_server(cert, key, dhparam, cipher_list))
8d99443b
VY
945 {
946 const char *invalid = "I";
947 mod_cmd_write_queue(ctl, invalid, strlen(invalid));
948 return;
3202e249 949 }
8d99443b
VY
950}
951
952static void
3202e249 953send_nossl_support(mod_ctl_t * ctl, mod_ctl_buf_t * ctlb)
8d99443b
VY
954{
955 static const char *nossl_cmd = "N";
956 conn_t *conn;
408a29c6 957 uint32_t id;
8d99443b
VY
958
959 if(ctlb != NULL)
3202e249 960 {
8d99443b 961 conn = make_conn(ctl, ctlb->F[0], ctlb->F[1]);
408a29c6
AC
962 id = buf_to_uint32(&ctlb->buf[1]);
963 conn_add_id_hash(conn, id);
8d99443b 964 close_conn(conn, WAIT_PLAIN, "libratbox reports no SSL/TLS support");
3202e249
VY
965 }
966 mod_cmd_write_queue(ctl, nossl_cmd, strlen(nossl_cmd));
8d99443b
VY
967}
968
969static void
3202e249 970send_i_am_useless(mod_ctl_t * ctl)
8d99443b
VY
971{
972 static const char *useless = "U";
973 mod_cmd_write_queue(ctl, useless, strlen(useless));
974}
975
976static void
3202e249 977send_nozlib_support(mod_ctl_t * ctl, mod_ctl_buf_t * ctlb)
8d99443b
VY
978{
979 static const char *nozlib_cmd = "z";
980 conn_t *conn;
408a29c6 981 uint32_t id;
8d99443b
VY
982 if(ctlb != NULL)
983 {
984 conn = make_conn(ctl, ctlb->F[0], ctlb->F[1]);
408a29c6
AC
985 id = buf_to_uint32(&ctlb->buf[1]);
986 conn_add_id_hash(conn, id);
8d99443b 987 close_conn(conn, WAIT_PLAIN, "libratbox reports no zlib support");
3202e249 988 }
8d99443b
VY
989 mod_cmd_write_queue(ctl, nozlib_cmd, strlen(nozlib_cmd));
990}
991
992static void
993mod_process_cmd_recv(mod_ctl_t * ctl)
994{
995 rb_dlink_node *ptr, *next;
996 mod_ctl_buf_t *ctl_buf;
997
998 RB_DLINK_FOREACH_SAFE(ptr, next, ctl->readq.head)
999 {
1000 ctl_buf = ptr->data;
1001
1002 switch (*ctl_buf->buf)
1003 {
1004 case 'A':
1005 {
c03677e9
JT
1006 if (ctl_buf->nfds != 2 || ctl_buf->buflen != 5)
1007 {
1008 cleanup_bad_message(ctl, ctl_buf);
1009 break;
1010 }
1011
8d99443b
VY
1012 if(!ssl_ok)
1013 {
1014 send_nossl_support(ctl, ctl_buf);
1015 break;
1016 }
1017 ssl_process_accept(ctl, ctl_buf);
1018 break;
1019 }
1020 case 'C':
1021 {
c03677e9
JT
1022 if (ctl_buf->nfds != 2 || ctl_buf->buflen != 5)
1023 {
1024 cleanup_bad_message(ctl, ctl_buf);
1025 break;
1026 }
1027
8d99443b
VY
1028 if(!ssl_ok)
1029 {
1030 send_nossl_support(ctl, ctl_buf);
1031 break;
1032 }
1033 ssl_process_connect(ctl, ctl_buf);
1034 break;
1035 }
e6bbb410
EM
1036 case 'F':
1037 {
1038 if (ctl_buf->nfds != 2 || ctl_buf->buflen != 5)
1039 {
1040 cleanup_bad_message(ctl, ctl_buf);
1041 break;
1042 }
1043 ssl_change_certfp_method(ctl, ctl_buf);
1044 break;
1045 }
8d99443b
VY
1046 case 'K':
1047 {
1048 if(!ssl_ok)
1049 {
1050 send_nossl_support(ctl, ctl_buf);
1051 break;
1052 }
1053 ssl_new_keys(ctl, ctl_buf);
1054 break;
1055 }
1056 case 'I':
3202e249
VY
1057 init_prng(ctl, ctl_buf);
1058 break;
8d99443b
VY
1059 case 'S':
1060 {
1061 process_stats(ctl, ctl_buf);
1062 break;
1063 }
07c2bb75
JT
1064 case 'Y':
1065 {
1066 change_connid(ctl, ctl_buf);
1067 break;
1068 }
1069
8d99443b
VY
1070#ifdef HAVE_LIBZ
1071 case 'Z':
1072 {
c03677e9
JT
1073 if (ctl_buf->nfds != 2 || ctl_buf->buflen < 6)
1074 {
1075 cleanup_bad_message(ctl, ctl_buf);
1076 break;
1077 }
1078
8d99443b
VY
1079 /* just zlib only */
1080 zlib_process(ctl, ctl_buf);
1081 break;
1082 }
1083#else
55abcbb2 1084
8d99443b 1085 case 'Z':
21192997 1086 send_nozlib_support(ctl, ctl_buf);
8d99443b 1087 break;
3202e249 1088
8d99443b
VY
1089#endif
1090 default:
1091 break;
1092 /* Log unknown commands */
1093 }
1094 rb_dlinkDelete(ptr, &ctl->readq);
1095 rb_free(ctl_buf->buf);
1096 rb_free(ctl_buf);
1097 }
1098
1099}
1100
1101
1102
1103static void
3202e249 1104mod_read_ctl(rb_fde_t *F, void *data)
8d99443b
VY
1105{
1106 mod_ctl_buf_t *ctl_buf;
1107 mod_ctl_t *ctl = data;
1108 int retlen;
c03677e9 1109 int i;
8d99443b
VY
1110
1111 do
1112 {
1113 ctl_buf = rb_malloc(sizeof(mod_ctl_buf_t));
1114 ctl_buf->buf = rb_malloc(READBUF_SIZE);
1115 ctl_buf->buflen = READBUF_SIZE;
1116 retlen = rb_recv_fd_buf(ctl->F, ctl_buf->buf, ctl_buf->buflen, ctl_buf->F,
1117 MAXPASSFD);
1118 if(retlen <= 0)
1119 {
1120 rb_free(ctl_buf->buf);
1121 rb_free(ctl_buf);
1122 }
1123 else
1124 {
1125 ctl_buf->buflen = retlen;
1126 rb_dlinkAddTail(ctl_buf, &ctl_buf->node, &ctl->readq);
c03677e9
JT
1127 for (i = 0; i < MAXPASSFD && ctl_buf->F[i] != NULL; i++)
1128 ;
1129 ctl_buf->nfds = i;
8d99443b
VY
1130 }
1131 }
3202e249 1132 while(retlen > 0);
8d99443b
VY
1133
1134 if(retlen == 0 || (retlen < 0 && !rb_ignore_errno(errno)))
1135 exit(0);
1136
1137 mod_process_cmd_recv(ctl);
1138 rb_setselect(ctl->F, RB_SELECT_READ, mod_read_ctl, ctl);
1139}
1140
1141static void
3202e249 1142mod_write_ctl(rb_fde_t *F, void *data)
8d99443b
VY
1143{
1144 mod_ctl_t *ctl = data;
1145 mod_ctl_buf_t *ctl_buf;
1146 rb_dlink_node *ptr, *next;
1147 int retlen, x;
1148
1149 RB_DLINK_FOREACH_SAFE(ptr, next, ctl->writeq.head)
1150 {
1151 ctl_buf = ptr->data;
1152 retlen = rb_send_fd_buf(ctl->F, ctl_buf->F, ctl_buf->nfds, ctl_buf->buf,
3202e249 1153 ctl_buf->buflen, ppid);
8d99443b
VY
1154 if(retlen > 0)
1155 {
1156 rb_dlinkDelete(ptr, &ctl->writeq);
3202e249 1157 for(x = 0; x < ctl_buf->nfds; x++)
8d99443b
VY
1158 rb_close(ctl_buf->F[x]);
1159 rb_free(ctl_buf->buf);
1160 rb_free(ctl_buf);
1161
1162 }
1163 if(retlen == 0 || (retlen < 0 && !rb_ignore_errno(errno)))
3202e249
VY
1164 exit(0);
1165
8d99443b 1166 }
464b7606
JT
1167 if(rb_dlink_list_length(&ctl->writeq) > 0)
1168 rb_setselect(ctl->F, RB_SELECT_WRITE, mod_write_ctl, ctl);
8d99443b
VY
1169}
1170
1171
1172static void
3202e249 1173read_pipe_ctl(rb_fde_t *F, void *data)
8d99443b 1174{
6cd1aca7 1175 char inbuf[READBUF_SIZE];
8d99443b 1176 int retlen;
3202e249 1177 while((retlen = rb_read(F, inbuf, sizeof(inbuf))) > 0)
8d99443b
VY
1178 {
1179 ;; /* we don't do anything with the pipe really, just care if the other process dies.. */
1180 }
1181 if(retlen == 0 || (retlen < 0 && !rb_ignore_errno(errno)))
1182 exit(0);
1183 rb_setselect(F, RB_SELECT_READ, read_pipe_ctl, NULL);
1184
1185}
1186
1187int
1188main(int argc, char **argv)
1189{
3202e249 1190 const char *s_ctlfd, *s_pipe, *s_pid;
8d99443b
VY
1191 int ctlfd, pipefd, x, maxfd;
1192 maxfd = maxconn();
3202e249 1193
8d99443b
VY
1194 s_ctlfd = getenv("CTL_FD");
1195 s_pipe = getenv("CTL_PIPE");
3202e249 1196 s_pid = getenv("CTL_PPID");
8d99443b 1197
3202e249 1198 if(s_ctlfd == NULL || s_pipe == NULL || s_pid == NULL)
8d99443b 1199 {
3202e249
VY
1200 fprintf(stderr,
1201 "This is ircd-ratbox ssld. You know you aren't supposed to run me directly?\n");
1202 fprintf(stderr,
1203 "You get an Id tag for this: $Id$\n");
8d99443b
VY
1204 fprintf(stderr, "Have a nice life\n");
1205 exit(1);
1206 }
1207
1208 ctlfd = atoi(s_ctlfd);
1209 pipefd = atoi(s_pipe);
3202e249
VY
1210 ppid = atoi(s_pid);
1211 x = 0;
1212#ifndef _WIN32
1213 for(x = 0; x < maxfd; x++)
8d99443b
VY
1214 {
1215 if(x != ctlfd && x != pipefd && x > 2)
1216 close(x);
1217 }
8d99443b 1218 x = open("/dev/null", O_RDWR);
464b7606 1219
8d99443b
VY
1220 if(x >= 0)
1221 {
1222 if(ctlfd != 0 && pipefd != 0)
1223 dup2(x, 0);
1224 if(ctlfd != 1 && pipefd != 1)
1225 dup2(x, 1);
1226 if(ctlfd != 2 && pipefd != 2)
1227 dup2(x, 2);
1228 if(x > 2)
1229 close(x);
1230 }
3202e249 1231#endif
8d99443b
VY
1232 setup_signals();
1233 rb_lib_init(NULL, NULL, NULL, 0, maxfd, 1024, 4096);
1234 rb_init_rawbuffers(1024);
3202e249 1235 ssl_ok = rb_supports_ssl();
8d99443b
VY
1236 mod_ctl = rb_malloc(sizeof(mod_ctl_t));
1237 mod_ctl->F = rb_open(ctlfd, RB_FD_SOCKET, "ircd control socket");
1238 mod_ctl->F_pipe = rb_open(pipefd, RB_FD_PIPE, "ircd pipe");
1239 rb_set_nb(mod_ctl->F);
1240 rb_set_nb(mod_ctl->F_pipe);
1241 rb_event_addish("clean_dead_conns", clean_dead_conns, NULL, 10);
4b6a4d47 1242 rb_event_add("check_handshake_flood", check_handshake_flood, NULL, 10);
8d99443b
VY
1243 read_pipe_ctl(mod_ctl->F_pipe, NULL);
1244 mod_read_ctl(mod_ctl->F, mod_ctl);
1245 if(!zlib_ok && !ssl_ok)
1246 {
1247 /* this is really useless... */
1248 send_i_am_useless(mod_ctl);
1249 /* sleep until the ircd kills us */
3202e249 1250 rb_sleep(2 << 30, 0);
8d99443b
VY
1251 exit(1);
1252 }
1253
1254 if(!zlib_ok)
1255 send_nozlib_support(mod_ctl, NULL);
1256 if(!ssl_ok)
1257 send_nossl_support(mod_ctl, NULL);
1258 rb_lib_loop(0);
1259 return 0;
1260}
1261
1262
3202e249 1263#ifndef _WIN32
8d99443b
VY
1264static void
1265dummy_handler(int sig)
1266{
1267 return;
1268}
3202e249 1269#endif
8d99443b
VY
1270
1271static void
1272setup_signals()
1273{
3202e249 1274#ifndef _WIN32
8d99443b
VY
1275 struct sigaction act;
1276
1277 act.sa_flags = 0;
1278 act.sa_handler = SIG_IGN;
1279 sigemptyset(&act.sa_mask);
1280 sigaddset(&act.sa_mask, SIGPIPE);
1281 sigaddset(&act.sa_mask, SIGALRM);
1282#ifdef SIGTRAP
1283 sigaddset(&act.sa_mask, SIGTRAP);
1284#endif
1285
1286#ifdef SIGWINCH
1287 sigaddset(&act.sa_mask, SIGWINCH);
1288 sigaction(SIGWINCH, &act, 0);
1289#endif
1290 sigaction(SIGPIPE, &act, 0);
1291#ifdef SIGTRAP
1292 sigaction(SIGTRAP, &act, 0);
1293#endif
1294
1295 act.sa_handler = dummy_handler;
1296 sigaction(SIGALRM, &act, 0);
3202e249 1297#endif
8d99443b 1298}