diff options
Diffstat (limited to 'snmplib/winpipe.c')
-rw-r--r-- | snmplib/winpipe.c | 222 |
1 files changed, 222 insertions, 0 deletions
diff --git a/snmplib/winpipe.c b/snmplib/winpipe.c new file mode 100644 index 0000000..bbe37f1 --- /dev/null +++ b/snmplib/winpipe.c @@ -0,0 +1,222 @@ +/* + Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003 + oss@fabasoft.com + Author: Bernhard Penz <bernhard.penz@fabasoft.com> + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + * Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + + * The name of Fabasoft R&D Software GmbH & Co KG or any of its subsidiaries, + brand or product names may not be used to endorse or promote products + derived from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY + EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE + LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR + BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, + WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE + OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN + IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +*/ + +#ifdef WIN32 + +#include <net-snmp/net-snmp-config.h> +#include <net-snmp/types.h> +#include <net-snmp/library/snmp_assert.h> +#include <net-snmp/library/winpipe.h> +#include <io.h> + +static int InitUPDSocket(SOCKET *sock, struct sockaddr_in *socketaddress) +{ + *sock = 0; + memset(socketaddress, 0, sizeof(struct sockaddr_in)); + + if( (*sock = socket(AF_INET, SOCK_DGRAM, 0)) == SOCKET_ERROR) + { + netsnmp_assert(GetLastError() != WSANOTINITIALISED); + return -1; + } + socketaddress->sin_family = AF_INET; + socketaddress->sin_addr.S_un.S_addr = htonl(INADDR_LOOPBACK); + socketaddress->sin_port = 0; + + if(bind(*sock, (struct sockaddr *) socketaddress, sizeof(struct sockaddr)) == SOCKET_ERROR) + { + return -1; + } + + return 0; +} + +static int ConnectUDPSocket(SOCKET *sock, struct sockaddr_in *socketaddress, SOCKET *remotesocket) +{ + int size = sizeof(struct sockaddr); + if (getsockname(*sock, (struct sockaddr *) socketaddress, &size) == SOCKET_ERROR) + { + return -1; + } + + if(size != sizeof(struct sockaddr)) + { + return -1; + } + + if (connect(*remotesocket, (struct sockaddr *) socketaddress, sizeof(struct sockaddr)) == SOCKET_ERROR) + { + return -1; + } + + return 0; +} + +static int TestUDPSend(SOCKET *sock, struct sockaddr_in *socketaddress) +{ + unsigned short port = socketaddress->sin_port; + + int bytessent = sendto(*sock, (char *) &port, sizeof(port), 0, NULL, 0); + if(bytessent != sizeof(port)) + { + return -1; + } + + return 0; +} + +static int TestUDPReceive(SOCKET *sock, SOCKET *remotesocket, struct sockaddr_in *remotesocketaddress) +{ + struct sockaddr_in recvfromaddress; + unsigned short readbuffer[2]; + int size = sizeof(struct sockaddr); + + int bytesreceived = recvfrom(*sock,(char *) &readbuffer, sizeof(readbuffer), 0, (struct sockaddr *) &recvfromaddress, &size) ; + if(bytesreceived != sizeof(unsigned short) || size != sizeof(struct sockaddr) || readbuffer[0] != (unsigned short) remotesocketaddress->sin_port || recvfromaddress.sin_family != remotesocketaddress->sin_family || recvfromaddress.sin_addr.S_un.S_addr != remotesocketaddress->sin_addr.S_un.S_addr || recvfromaddress.sin_port != remotesocketaddress->sin_port) + { + return -1; + } + + return 0; +} + +static void CloseUDPSocketPair(SOCKET *socketpair) +{ + if(socketpair[0] != INVALID_SOCKET) + { + closesocket(socketpair[0]); + } + if(socketpair[1] != INVALID_SOCKET) + { + closesocket(socketpair[1]); + } +} + +/* + Windows unnamed pipe emulation, used to enable select() + on a Windows machine for the CALLBACK (pipe-based) transport domain. +*/ +int create_winpipe_transport(int *pipefds) +{ + SOCKET socketpair[2]; + struct sockaddr_in socketaddress[2]; + + struct timeval waittime = {0, 200000}; + fd_set readset; + + if (InitUPDSocket(&socketpair[0], &socketaddress[0])) + { + CloseUDPSocketPair(socketpair); + return -1; + } + if (InitUPDSocket(&socketpair[1], &socketaddress[1])) + { + CloseUDPSocketPair(socketpair); + return -1; + } + + /* + I have two UDP sockets - now lets connect them to each other. + */ + + if (ConnectUDPSocket(&socketpair[0], &socketaddress[0], &socketpair[1])) + { + CloseUDPSocketPair(socketpair); + return -1; + } + if(ConnectUDPSocket(&socketpair[1], &socketaddress[1], &socketpair[0])) + { + CloseUDPSocketPair(socketpair); + return -1; + } + + /* + The two sockets are connected to each other, now lets test the connection + by sending the own port number. + */ + if(TestUDPSend(&socketpair[0], &socketaddress[0])) + { + CloseUDPSocketPair(socketpair); + return -1; + } + if(TestUDPSend(&socketpair[1], &socketaddress[1])) + { + CloseUDPSocketPair(socketpair); + return -1; + } + + /* + Port numbers sent, now lets select() on the socketpair and check that + both messages got through + */ + FD_ZERO(&readset); + FD_SET(socketpair[0], &readset); + FD_SET(socketpair[1], &readset); + + /* + For some unknown reason the timeout setting in the select call does not have + the desired effect, and for yet another unknown reason a Sleep(1) solves this + problem. + */ + Sleep(1); + if(select(0, &readset, NULL, NULL, &waittime) != 2 || !FD_ISSET(socketpair[0], &readset) || !FD_ISSET(socketpair[1], &readset)) + { + CloseUDPSocketPair(socketpair); + return -1; + } + + /* + Check if the packets I receive were really sent by me, and nobody else + tried to sneak. + */ + if(TestUDPReceive(&socketpair[0], &socketpair[1], &socketaddress[1])) + { + CloseUDPSocketPair(socketpair); + return -1; + } + if(TestUDPReceive(&socketpair[1], &socketpair[0], &socketaddress[0])) + { + CloseUDPSocketPair(socketpair); + return -1; + } + + /* + All sanity checks passed, I can return a "UDP pipe" + */ + pipefds[0] = (int) socketpair[0]; + pipefds[1] = (int) socketpair[1]; + + return 0; +} + +#endif /* WIN32 */ + |