summaryrefslogtreecommitdiff
path: root/usr/src/lib/libldap4/common/os-ip.c
diff options
context:
space:
mode:
authorstevel@tonic-gate <none@none>2005-06-14 00:00:00 -0700
committerstevel@tonic-gate <none@none>2005-06-14 00:00:00 -0700
commit7c478bd95313f5f23a4c958a745db2134aa03244 (patch)
treec871e58545497667cbb4b0a4f2daf204743e1fe7 /usr/src/lib/libldap4/common/os-ip.c
downloadillumos-gate-7c478bd95313f5f23a4c958a745db2134aa03244.tar.gz
OpenSolaris Launch
Diffstat (limited to 'usr/src/lib/libldap4/common/os-ip.c')
-rw-r--r--usr/src/lib/libldap4/common/os-ip.c614
1 files changed, 614 insertions, 0 deletions
diff --git a/usr/src/lib/libldap4/common/os-ip.c b/usr/src/lib/libldap4/common/os-ip.c
new file mode 100644
index 0000000000..5f025ee548
--- /dev/null
+++ b/usr/src/lib/libldap4/common/os-ip.c
@@ -0,0 +1,614 @@
+/*
+ * Copyright (c) 1995-2001 by Sun Microsystems, Inc.
+ * All rights reserved.
+ */
+
+#pragma ident "%Z%%M% %I% %E% SMI"
+
+/*
+ * Copyright (c) 1995 Regents of the University of Michigan.
+ * All rights reserved.
+ *
+ * os-ip.c -- platform-specific TCP & UDP related code
+ */
+
+#ifndef lint
+static char copyright[] = "@(#) Copyright (c) 1995 Regents of the University of Michigan.\nAll rights reserved.\n";
+#endif
+
+#include <stdio.h>
+#include <string.h>
+#include <errno.h>
+#include <arpa/inet.h>
+
+#ifdef _WIN32
+#include <io.h>
+#include "msdos.h"
+#else /* _WIN32 */
+#include <sys/time.h>
+#include <sys/types.h>
+#include <sys/socket.h>
+#include <netinet/in.h>
+#include <netdb.h>
+#endif /* _WIN32 */
+#ifdef _AIX
+#include <sys/select.h>
+#endif /* _AIX */
+#ifdef VMS
+#include "ucx_select.h"
+#endif /* VMS */
+#include "portable.h"
+#include "lber.h"
+#include "ldap.h"
+#include "ldap-private.h"
+#include "ldap-int.h"
+
+#ifdef LDAP_REFERRALS
+#ifdef USE_SYSCONF
+#include <unistd.h>
+#endif /* USE_SYSCONF */
+#ifdef notyet
+#ifdef NEED_FILIO
+#include <sys/filio.h>
+#else /* NEED_FILIO */
+#include <sys/ioctl.h>
+#endif /* NEED_FILIO */
+#endif /* notyet */
+#endif /* LDAP_REFERRALS */
+
+#ifdef MACOS
+#define tcp_close(s) tcpclose(s)
+#else /* MACOS */
+#ifdef DOS
+#ifdef PCNFS
+#define tcp_close(s) close(s)
+#endif /* PCNFS */
+#ifdef NCSA
+#define tcp_close(s) netclose(s); netshut()
+#endif /* NCSA */
+#ifdef WINSOCK
+#define tcp_close(s) closesocket(s); WSACleanup();
+#endif /* WINSOCK */
+#else /* DOS */
+#define tcp_close(s) close(s)
+#endif /* DOS */
+#endif /* MACOS */
+#ifdef SUN
+#include <nss_dbdefs.h>
+#endif
+
+#include <fcntl.h>
+#include <sys/poll.h>
+
+
+/*
+ * Do an async connect or blocking connect depending on the timeout
+ * value. LDAP_X_IO_TIMEOUT_NO_TIMEOUT means do a blocking connect.
+ * Otherwise wait for timeout milliseconds for the connection.
+ * Returns 0 on success and -1 on failure.
+ */
+static int
+do_connect(int s, struct sockaddr *sin, int timeout)
+{
+ int flags, connected = 0;
+ int retval, error, n;
+ fd_set wfds;
+ struct timeval waittime, *sel_timeout;
+
+ /* set the socket to do non-blocking i/o */
+ flags = fcntl(s, F_GETFL, 0);
+ fcntl(s, F_SETFL, flags | O_NONBLOCK);
+
+ if (connect(s, sin, sizeof (struct sockaddr_in)) == 0) {
+ connected = 1;
+ } else if (errno == EINPROGRESS) {
+ /* if NO_TIMEOUT is specified do a blocking connect */
+ if (timeout <= LDAP_X_IO_TIMEOUT_NO_TIMEOUT) {
+ sel_timeout = NULL;
+ } else {
+ /* set the timeout to the specified value */
+ waittime.tv_sec = timeout / MILLISEC;
+ waittime.tv_usec = (timeout % MILLISEC) * 1000;
+ sel_timeout = &waittime;
+ }
+
+ FD_ZERO(&wfds);
+ FD_SET(s, &wfds);
+ n = sizeof (error);
+ if (select(s+1, NULL, &wfds, NULL, sel_timeout) > 0 &&
+ FD_ISSET(s, &wfds) &&
+ getsockopt(s, SOL_SOCKET, SO_ERROR, &error, &n) == 0 &&
+ error == 0) {
+ connected = 1;
+ }
+ }
+
+ /* if we are connected restore the flags for the socket */
+ if (connected) {
+ fcntl(s, F_SETFL, flags);
+ }
+
+ return (connected ? 0 : -1);
+}
+
+
+int
+connect_to_host(Sockbuf *sb, char *host, in_addr_t address,
+ int port, int async, int timeout)
+/*
+ * if host == NULL, connect using address
+ * "address" and "port" must be in network byte order
+ * zero is returned upon success, -1 if fatal error, -2 EINPROGRESS
+ * async is only used ifdef LDAP_REFERRALS (non-0 means don't wait for connect)
+ * XXX async is not used yet!
+ */
+{
+ int rc, i, s, connected, use_hp;
+ struct sockaddr_in sin;
+ struct hostent *hp;
+#ifdef notyet
+#ifdef LDAP_REFERRALS
+ int status; /* for ioctl call */
+#endif /* LDAP_REFERRALS */
+#endif /* notyet */
+#ifdef SUN
+ struct hostent hpret;
+ char hpbuf[NSS_BUFLEN_HOSTS];
+ int hperrno;
+#endif
+
+ Debug(LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 201, "connect_to_host: "
+ "%1$s:%2$d\n"), (host == NULL) ? catgets(slapdcat, 1, 202,
+ "(by address)") : host, ntohs(port), 0);
+
+ connected = use_hp = 0;
+
+ if (host != NULL && (address = inet_addr(host)) == -1) {
+#ifdef SUN
+ if ((hp = gethostbyname_r(host, &hpret, hpbuf,
+ NSS_BUFLEN_HOSTS, &hperrno)) == NULL) {
+#else
+ if ((hp = gethostbyname(host)) == NULL) {
+#endif
+ errno = EHOSTUNREACH; /* not exactly right, but... */
+ return (-1);
+ }
+ use_hp = 1;
+ }
+
+ rc = -1;
+ for (i = 0; !use_hp || (hp->h_addr_list[i] != 0); i++) {
+ if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
+ return (-1);
+ }
+#ifdef notyet
+#ifdef LDAP_REFERRALS
+ status = 1;
+ if (async && ioctl(s, FIONBIO, (caddr_t)&status) == -1) {
+ Debug(LDAP_DEBUG_ANY, catgets(slapdcat, 1, 203,
+ "FIONBIO ioctl failed on %d\n"), s, 0, 0);
+ }
+#endif /* LDAP_REFERRALS */
+#endif /* notyet */
+ (void) memset((char *)&sin, 0, sizeof (struct sockaddr_in));
+ sin.sin_family = AF_INET;
+ sin.sin_port = port;
+ SAFEMEMCPY((char *) &sin.sin_addr.s_addr,
+ (use_hp ? (char *) hp->h_addr_list[i] :
+ (char *)&address), sizeof (sin.sin_addr.s_addr));
+
+ if (do_connect(s, (struct sockaddr *)&sin, timeout) == 0) {
+ connected = 1;
+ break;
+ }
+
+#ifdef notyet
+#ifdef LDAP_REFERRALS
+#ifdef EAGAIN
+ if (errno == EINPROGRESS || errno == EAGAIN) {
+#else /* EAGAIN */
+ if (errno == EINPROGRESS) {
+#endif /* EAGAIN */
+ Debug(LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 204,
+ "connect would block...\n"), 0, 0, 0);
+ rc = -2;
+ break;
+ }
+#endif /* LDAP_REFERRALS */
+#endif /* notyet */
+
+#ifdef LDAP_DEBUG
+ if (ldap_debug & LDAP_DEBUG_TRACE) {
+ perror((char *)inet_ntoa(sin.sin_addr));
+ }
+#endif
+ close(s);
+ if (!use_hp) {
+ break;
+ }
+ }
+
+ if (connected) {
+ rc = 0;
+ sb->sb_sd = s;
+#ifdef notyet
+#ifdef LDAP_REFERRALS
+ status = 0;
+ if (!async && ioctl(s, FIONBIO, (caddr_t)&on) == -1) {
+ Debug(LDAP_DEBUG_ANY, catgets(slapdcat, 1, 203,
+ "FIONBIO ioctl failed on %d\n"), s, 0, 0);
+ }
+#endif /* LDAP_REFERRALS */
+#endif /* notyet */
+
+ Debug(LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 205,
+ "sd %1$d connected to: %2$s\n"), s,
+ inet_ntoa(sin.sin_addr), 0);
+ }
+
+ return (rc);
+}
+
+
+void
+close_ldap_connection( Sockbuf *sb )
+{
+#ifdef LDAP_SSL
+ if (sb->sb_ssl){
+ SSL_close(sb->sb_ssl);
+ SSL_delete(sb->sb_ssl);
+ }
+ sb->sb_ssl = NULL;
+ sb->sb_ssl_tls = 0;
+#endif
+ tcp_close( sb->sb_sd );
+}
+
+
+#ifdef KERBEROS
+char *
+host_connected_to( Sockbuf *sb )
+{
+ struct hostent *hp;
+ char *p;
+ int len;
+ struct sockaddr_in sin;
+#ifdef SUN
+ struct hostent hpret;
+ char hpbuf[NSS_BUFLEN_HOSTS];
+ int hperrno;
+#endif
+
+ (void)memset( (char *)&sin, 0, sizeof( struct sockaddr_in ));
+ len = sizeof( sin );
+ if ( getpeername( sb->sb_sd, (struct sockaddr *)&sin, &len ) == -1 ) {
+ return( NULL );
+ }
+
+ /*
+ * do a reverse lookup on the addr to get the official hostname.
+ * this is necessary for kerberos to work right, since the official
+ * hostname is used as the kerberos instance.
+ */
+#ifdef SUN
+ if (( hp = gethostbyaddr_r((char *) &sin.sin_addr,
+ sizeof( sin.sin_addr ), AF_INET,
+ &hpret, hpbuf, NSS_BUFLEN_HOSTS, &hperrno)) != NULL ) {
+#else
+ if (( hp = gethostbyaddr( (char *) &sin.sin_addr,
+ sizeof( sin.sin_addr ), AF_INET )) != NULL ) {
+#endif
+ if ( hp->h_name != NULL ) {
+ return( strdup( hp->h_name ));
+ }
+ }
+
+ return( NULL );
+}
+#endif /* KERBEROS */
+
+
+#ifdef LDAP_REFERRALS
+#ifdef SUN
+/* for UNIX */
+#include <stropts.h>
+#include <poll.h>
+
+struct selectinfo {
+ struct pollfd fds[LDAP_DEFAULT_REFHOPLIMIT];
+ int nbfds;
+};
+
+
+void
+mark_select_write( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+ int i;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ /* find if sb is in fds */
+ for (i=0; i< sip->nbfds; i++) {
+ if (sip->fds[i].fd == sb->sb_sd){
+ sip->fds[i].events |= POLLOUT;
+ return;
+ }
+ }
+ if (sip->nbfds < LDAP_DEFAULT_REFHOPLIMIT) {
+ sip->fds[sip->nbfds].fd = sb->sb_sd;
+ sip->fds[sip->nbfds].events |= POLLOUT;
+ sip->nbfds++;
+ }
+ else {
+ /* Should not happen */
+ Debug( LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 206, "Mark for poll : Too many descriptors\n"), 0, 0, 0 );
+ }
+}
+
+
+void
+mark_select_read( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+ int i;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ /* find if sb is in fds */
+ for (i=0; i< sip->nbfds; i++) {
+ if (sip->fds[i].fd == sb->sb_sd) {
+ sip->fds[i].events |= POLLIN;
+ return;
+ }
+ }
+
+ if (sip->nbfds < LDAP_DEFAULT_REFHOPLIMIT) {
+ sip->fds[sip->nbfds].fd = sb->sb_sd;
+ sip->fds[sip->nbfds].events |= POLLIN;
+ sip->nbfds++;
+ }
+ else {
+ /* Should not happen */
+ Debug( LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 206, "Mark for poll : Too many descriptors\n"), 0, 0, 0 );
+ }
+}
+
+
+void
+mark_select_clear( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+ int i;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ for (i = 0; i< sip->nbfds; i++) {
+ if (sip->fds[i].fd == sb->sb_sd){
+ i++;
+ for (; i < sip->nbfds; i ++) {
+ sip->fds[ i - 1] = sip->fds[i];
+ }
+ sip->fds[i].fd = -1;
+ sip->fds[i].events = -1;
+ sip->nbfds--;
+ return;
+ }
+ }
+ /* If we reach here, there's a pb. */
+ Debug( LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 207, "Clear poll : descriptor not found\n"), 0, 0, 0 );
+}
+
+
+long
+is_write_ready( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+ int i;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ for (i=0; i< sip->nbfds; i++) {
+ if (sip->fds[i].fd == sb->sb_sd) {
+ if ( sip->fds[i].revents & (POLLERR | POLLHUP | POLLNVAL)) {
+ return (-1);
+ }
+ return( sip->fds[i].revents & POLLOUT );
+ }
+ }
+ return(0);
+}
+
+
+long
+is_read_ready( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+ int i;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ for (i=0; i< sip->nbfds; i++) {
+ if (sip->fds[i].fd == sb->sb_sd) {
+ if (sip->fds[i].revents & (POLLERR | POLLHUP | POLLNVAL)) {
+ return (-1);
+ }
+ return( sip->fds[i].revents & POLLIN );
+ }
+ }
+ return(0);
+}
+
+void *
+new_select_info()
+{
+ struct selectinfo *sip;
+
+ sip = (struct selectinfo *)calloc( 1, sizeof( struct selectinfo ));
+
+ return( (void *)sip );
+}
+
+
+void
+free_select_info( void *sip )
+{
+ free( sip );
+}
+
+
+int
+do_ldap_select( LDAP *ld, struct timeval *timeout )
+{
+ struct selectinfo *sip;
+ int tim;
+#if defined( SUN ) && defined( _REENTRANT )
+ int rv;
+#endif
+
+ Debug( LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 208, "do_ldap_select\n"), 0, 0, 0 );
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+/* sip->fds[0].revents = 0; */
+
+ if ( timeout ) {
+ tim = (timeout->tv_sec*1000)+(timeout->tv_usec/1000);
+ } else {
+ tim = INFTIM;
+ } /* end if */
+ errno=0;
+#if defined( SUN ) && defined( _REENTRANT )
+/* UNLOCK_LDAP(ld); */
+ LOCK_POLL(ld);
+ rv = poll(sip->fds,sip->nbfds,tim);
+/* LOCK_LDAP(ld); */
+ UNLOCK_POLL(ld);
+ return(rv);
+#else
+ return( poll(sip->fds,sip->nbfds,tim) );
+#endif
+}
+#else
+/* for UNIX */
+struct selectinfo {
+ fd_set si_readfds;
+ fd_set si_writefds;
+ fd_set si_use_readfds;
+ fd_set si_use_writefds;
+};
+
+
+void
+mark_select_write( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ if ( !FD_ISSET( sb->sb_sd, &sip->si_writefds )) {
+ FD_SET( sb->sb_sd, &sip->si_writefds );
+ }
+}
+
+
+void
+mark_select_read( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ if ( !FD_ISSET( sb->sb_sd, &sip->si_readfds )) {
+ FD_SET( sb->sb_sd, &sip->si_readfds );
+ }
+}
+
+
+void
+mark_select_clear( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ FD_CLR( sb->sb_sd, &sip->si_writefds );
+ FD_CLR( sb->sb_sd, &sip->si_readfds );
+}
+
+
+long
+is_write_ready( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ return( FD_ISSET( sb->sb_sd, &sip->si_use_writefds ));
+}
+
+
+long
+is_read_ready( LDAP *ld, Sockbuf *sb )
+{
+ struct selectinfo *sip;
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+
+ return( FD_ISSET( sb->sb_sd, &sip->si_use_readfds ));
+}
+
+
+void *
+new_select_info()
+{
+ struct selectinfo *sip;
+
+ if (( sip = (struct selectinfo *)calloc( 1,
+ sizeof( struct selectinfo ))) != NULL ) {
+ FD_ZERO( &sip->si_readfds );
+ FD_ZERO( &sip->si_writefds );
+ }
+
+ return( (void *)sip );
+}
+
+
+void
+free_select_info( void *sip )
+{
+ free( sip );
+}
+
+
+int
+do_ldap_select( LDAP *ld, struct timeval *timeout )
+{
+ struct selectinfo *sip;
+ static int tblsize;
+
+ Debug( LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 208, "do_ldap_select\n"), 0, 0, 0 );
+
+#if defined( SUN ) && defined( _REENTRANT )
+ LOCK_LDAP(ld);
+#endif
+ if ( tblsize == 0 ) {
+#ifdef USE_SYSCONF
+ tblsize = (int)sysconf( _SC_OPEN_MAX );
+#else /* USE_SYSCONF */
+ tblsize = getdtablesize();
+#endif /* USE_SYSCONF */
+ }
+
+ sip = (struct selectinfo *)ld->ld_selectinfo;
+ sip->si_use_readfds = sip->si_readfds;
+ sip->si_use_writefds = sip->si_writefds;
+
+#if defined( SUN ) && defined( _REENTRANT )
+ UNLOCK_LDAP(ld);
+#endif
+ return( select( tblsize, &sip->si_use_readfds, &sip->si_use_writefds,
+ NULL, timeout ));
+}
+#endif /* SUN */
+#endif /* LDAP_REFERRALS */