223 lines
6.1 KiB
C
223 lines
6.1 KiB
C
/*
|
|
Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003
|
|
oss@fabasoft.com
|
|
Author: Bernhard Penz <bernhard.penz@fabasoft.com>
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
modification, are permitted provided that the following conditions are met:
|
|
|
|
* Redistributions of source code must retain the above copyright notice,
|
|
this list of conditions and the following disclaimer.
|
|
|
|
* Redistributions in binary form must reproduce the above copyright
|
|
notice, this list of conditions and the following disclaimer in the
|
|
documentation and/or other materials provided with the distribution.
|
|
|
|
* The name of Fabasoft R&D Software GmbH & Co KG or any of its subsidiaries,
|
|
brand or product names may not be used to endorse or promote products
|
|
derived from this software without specific prior written permission.
|
|
|
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY
|
|
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE
|
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
|
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#ifdef WIN32
|
|
|
|
#include <net-snmp/net-snmp-config.h>
|
|
#include <net-snmp/types.h>
|
|
#include <net-snmp/library/snmp_assert.h>
|
|
#include <net-snmp/library/winpipe.h>
|
|
#include <io.h>
|
|
|
|
static int InitUPDSocket(SOCKET *sock, struct sockaddr_in *socketaddress)
|
|
{
|
|
*sock = 0;
|
|
memset(socketaddress, 0, sizeof(struct sockaddr_in));
|
|
|
|
if( (*sock = socket(AF_INET, SOCK_DGRAM, 0)) == SOCKET_ERROR)
|
|
{
|
|
netsnmp_assert(GetLastError() != WSANOTINITIALISED);
|
|
return -1;
|
|
}
|
|
socketaddress->sin_family = AF_INET;
|
|
socketaddress->sin_addr.S_un.S_addr = htonl(INADDR_LOOPBACK);
|
|
socketaddress->sin_port = 0;
|
|
|
|
if(bind(*sock, (struct sockaddr *) socketaddress, sizeof(struct sockaddr)) == SOCKET_ERROR)
|
|
{
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int ConnectUDPSocket(SOCKET *sock, struct sockaddr_in *socketaddress, SOCKET *remotesocket)
|
|
{
|
|
int size = sizeof(struct sockaddr);
|
|
if (getsockname(*sock, (struct sockaddr *) socketaddress, &size) == SOCKET_ERROR)
|
|
{
|
|
return -1;
|
|
}
|
|
|
|
if(size != sizeof(struct sockaddr))
|
|
{
|
|
return -1;
|
|
}
|
|
|
|
if (connect(*remotesocket, (struct sockaddr *) socketaddress, sizeof(struct sockaddr)) == SOCKET_ERROR)
|
|
{
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int TestUDPSend(SOCKET *sock, struct sockaddr_in *socketaddress)
|
|
{
|
|
unsigned short port = socketaddress->sin_port;
|
|
|
|
int bytessent = sendto(*sock, (char *) &port, sizeof(port), 0, NULL, 0);
|
|
if(bytessent != sizeof(port))
|
|
{
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int TestUDPReceive(SOCKET *sock, SOCKET *remotesocket, struct sockaddr_in *remotesocketaddress)
|
|
{
|
|
struct sockaddr_in recvfromaddress;
|
|
unsigned short readbuffer[2];
|
|
int size = sizeof(struct sockaddr);
|
|
|
|
int bytesreceived = recvfrom(*sock,(char *) &readbuffer, sizeof(readbuffer), 0, (struct sockaddr *) &recvfromaddress, &size) ;
|
|
if(bytesreceived != sizeof(unsigned short) || size != sizeof(struct sockaddr) || readbuffer[0] != (unsigned short) remotesocketaddress->sin_port || recvfromaddress.sin_family != remotesocketaddress->sin_family || recvfromaddress.sin_addr.S_un.S_addr != remotesocketaddress->sin_addr.S_un.S_addr || recvfromaddress.sin_port != remotesocketaddress->sin_port)
|
|
{
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void CloseUDPSocketPair(SOCKET *socketpair)
|
|
{
|
|
if(socketpair[0] != INVALID_SOCKET)
|
|
{
|
|
closesocket(socketpair[0]);
|
|
}
|
|
if(socketpair[1] != INVALID_SOCKET)
|
|
{
|
|
closesocket(socketpair[1]);
|
|
}
|
|
}
|
|
|
|
/*
|
|
Windows unnamed pipe emulation, used to enable select()
|
|
on a Windows machine for the CALLBACK (pipe-based) transport domain.
|
|
*/
|
|
int create_winpipe_transport(int *pipefds)
|
|
{
|
|
SOCKET socketpair[2];
|
|
struct sockaddr_in socketaddress[2];
|
|
|
|
struct timeval waittime = {0, 200000};
|
|
fd_set readset;
|
|
|
|
if (InitUPDSocket(&socketpair[0], &socketaddress[0]))
|
|
{
|
|
CloseUDPSocketPair(socketpair);
|
|
return -1;
|
|
}
|
|
if (InitUPDSocket(&socketpair[1], &socketaddress[1]))
|
|
{
|
|
CloseUDPSocketPair(socketpair);
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
I have two UDP sockets - now lets connect them to each other.
|
|
*/
|
|
|
|
if (ConnectUDPSocket(&socketpair[0], &socketaddress[0], &socketpair[1]))
|
|
{
|
|
CloseUDPSocketPair(socketpair);
|
|
return -1;
|
|
}
|
|
if(ConnectUDPSocket(&socketpair[1], &socketaddress[1], &socketpair[0]))
|
|
{
|
|
CloseUDPSocketPair(socketpair);
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
The two sockets are connected to each other, now lets test the connection
|
|
by sending the own port number.
|
|
*/
|
|
if(TestUDPSend(&socketpair[0], &socketaddress[0]))
|
|
{
|
|
CloseUDPSocketPair(socketpair);
|
|
return -1;
|
|
}
|
|
if(TestUDPSend(&socketpair[1], &socketaddress[1]))
|
|
{
|
|
CloseUDPSocketPair(socketpair);
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
Port numbers sent, now lets select() on the socketpair and check that
|
|
both messages got through
|
|
*/
|
|
FD_ZERO(&readset);
|
|
FD_SET(socketpair[0], &readset);
|
|
FD_SET(socketpair[1], &readset);
|
|
|
|
/*
|
|
For some unknown reason the timeout setting in the select call does not have
|
|
the desired effect, and for yet another unknown reason a Sleep(1) solves this
|
|
problem.
|
|
*/
|
|
Sleep(1);
|
|
if(select(0, &readset, NULL, NULL, &waittime) != 2 || !FD_ISSET(socketpair[0], &readset) || !FD_ISSET(socketpair[1], &readset))
|
|
{
|
|
CloseUDPSocketPair(socketpair);
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
Check if the packets I receive were really sent by me, and nobody else
|
|
tried to sneak.
|
|
*/
|
|
if(TestUDPReceive(&socketpair[0], &socketpair[1], &socketaddress[1]))
|
|
{
|
|
CloseUDPSocketPair(socketpair);
|
|
return -1;
|
|
}
|
|
if(TestUDPReceive(&socketpair[1], &socketpair[0], &socketaddress[0]))
|
|
{
|
|
CloseUDPSocketPair(socketpair);
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
All sanity checks passed, I can return a "UDP pipe"
|
|
*/
|
|
pipefds[0] = (int) socketpair[0];
|
|
pipefds[1] = (int) socketpair[1];
|
|
|
|
return 0;
|
|
}
|
|
|
|
#endif /* WIN32 */
|
|
|