10 #include "../../stdafx.h"
13 #include "../../debug.h"
15 #include "../../safeguards.h"
37 switch (this->
address.ss_family) {
40 return ntohs(((
const struct sockaddr_in *)&this->
address)->sin_port);
43 return ntohs(((
const struct sockaddr_in6 *)&this->address)->sin6_port);
56 switch (this->
address.ss_family) {
59 ((
struct sockaddr_in*)&this->
address)->sin_port = htons(port);
63 ((
struct sockaddr_in6*)&this->
address)->sin6_port = htons(port);
79 if (this->
GetAddress()->ss_family == AF_INET6) buffer =
strecpy(buffer,
"[", last);
81 if (this->
GetAddress()->ss_family == AF_INET6) buffer =
strecpy(buffer,
"]", last);
86 switch (this->
address.ss_family) {
87 case AF_INET: family =
'4';
break;
88 case AF_INET6: family =
'6';
break;
89 default: family =
'?';
break;
91 seprintf(buffer, last,
" (IPv%c)", family);
116 return !INVALID_SOCKET;
147 return this->
address.ss_family == family;
161 int cidr = this->
address.ss_family == AF_INET ? 32 : 128;
166 const char *chr_cidr = strchr(netmask,
'/');
167 if (chr_cidr !=
nullptr) {
168 int tmp_cidr = atoi(chr_cidr + 1);
171 if (tmp_cidr > 0 || tmp_cidr < cidr) cidr = tmp_cidr;
174 std::string ip_str(netmask, chr_cidr - netmask);
175 mask_address =
NetworkAddress(ip_str.c_str(), 0, this->address.ss_family);
184 switch (this->
address.ss_family) {
186 ip = (uint32*)&((
struct sockaddr_in*)&this->
address)->sin_addr.s_addr;
187 mask = (uint32*)&((
struct sockaddr_in*)&mask_address.
address)->sin_addr.s_addr;
191 ip = (uint32*)&((
struct sockaddr_in6*)&this->
address)->sin6_addr;
192 mask = (uint32*)&((
struct sockaddr_in6*)&mask_address.
address)->sin6_addr;
200 uint32 msk = cidr >= 32 ? (uint32)-1 : htonl(-(1 << (32 - cidr)));
201 if ((*mask++ & msk) != (*ip++ & msk))
return false;
221 struct addrinfo hints;
222 memset(&hints, 0,
sizeof (hints));
223 hints.ai_family = family;
224 hints.ai_flags = flags;
225 hints.ai_socktype = socktype;
231 bool reset_hostname =
false;
236 reset_hostname =
true;
237 int fam = this->
address.ss_family;
238 if (fam == AF_UNSPEC) fam = family;
244 if (reset_hostname)
strecpy(this->hostname,
"",
lastof(this->hostname));
248 DEBUG(net, 0,
"getaddrinfo for hostname \"%s\", port %s, address family %s and socket type %s failed: %s",
251 return INVALID_SOCKET;
254 SOCKET sock = INVALID_SOCKET;
255 for (
struct addrinfo *runp = ai; runp !=
nullptr; runp = runp->ai_next) {
259 if (sockets !=
nullptr) {
264 if (sock == INVALID_SOCKET)
continue;
266 if (sockets ==
nullptr) {
268 assert(
sizeof(this->
address) >= runp->ai_addrlen);
269 memcpy(&this->
address, runp->ai_addr, runp->ai_addrlen);
270 #ifdef __EMSCRIPTEN__
277 if (this->
address.ss_family == AF_INET) {
278 sockaddr_in *address_ipv4 = (sockaddr_in *)&this->
address;
279 memset(address_ipv4->sin_zero, 0,
sizeof(address_ipv4->sin_zero));
286 (*sockets)[addr] = sock;
287 sock = INVALID_SOCKET;
306 SOCKET sock = socket(runp->ai_family, runp->ai_socktype, runp->ai_protocol);
307 if (sock == INVALID_SOCKET) {
308 DEBUG(net, 1,
"[%s] could not create %s socket: %s", type, family, strerror(errno));
309 return INVALID_SOCKET;
312 if (!
SetNoDelay(sock))
DEBUG(net, 1,
"[%s] setting TCP_NODELAY failed", type);
314 int err = connect(sock, runp->ai_addr, (
int)runp->ai_addrlen);
315 #ifdef __EMSCRIPTEN__
318 if (err != 0 && errno != EINPROGRESS)
323 DEBUG(net, 1,
"[%s] could not connect %s socket: %s", type, family, strerror(errno));
325 return INVALID_SOCKET;
331 DEBUG(net, 1,
"[%s] connected to %s", type, address);
359 SOCKET sock = socket(runp->ai_family, runp->ai_socktype, runp->ai_protocol);
360 if (sock == INVALID_SOCKET) {
361 DEBUG(net, 0,
"[%s] could not create %s socket on port %s: %s", type, family, address, strerror(errno));
362 return INVALID_SOCKET;
365 if (runp->ai_socktype == SOCK_STREAM && !
SetNoDelay(sock)) {
366 DEBUG(net, 3,
"[%s] setting TCP_NODELAY failed for port %s", type, address);
371 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (
const char*)&on,
sizeof(on)) == -1) {
372 DEBUG(net, 3,
"[%s] could not set reusable %s sockets for port %s: %s", type, family, address, strerror(errno));
376 if (runp->ai_family == AF_INET6 &&
377 setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, (
const char*)&on,
sizeof(on)) == -1) {
378 DEBUG(net, 3,
"[%s] could not disable IPv4 over IPv6 on port %s: %s", type, address, strerror(errno));
382 if (bind(sock, runp->ai_addr, (
int)runp->ai_addrlen) != 0) {
383 DEBUG(net, 1,
"[%s] could not bind on %s port %s: %s", type, family, address, strerror(errno));
385 return INVALID_SOCKET;
388 if (runp->ai_socktype != SOCK_DGRAM && listen(sock, 1) != 0) {
389 DEBUG(net, 1,
"[%s] could not listen at %s port %s: %s", type, family, address, strerror(errno));
391 return INVALID_SOCKET;
395 if (!
SetNonBlocking(sock))
DEBUG(net, 0,
"[%s] setting non-blocking mode failed for %s port %s", type, family, address);
397 DEBUG(net, 1,
"[%s] listening on %s port %s", type, family, address);
408 assert(sockets !=
nullptr);
431 case SOCK_STREAM:
return "tcp";
432 case SOCK_DGRAM:
return "udp";
433 default:
return "unsupported";
446 case AF_UNSPEC:
return "either IPv4 or IPv6";
447 case AF_INET:
return "IPv4";
448 case AF_INET6:
return "IPv6";
449 default:
return "unsupported";