2019-10-05 05:59:29 +08:00
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2023-01-02 20:51:48 +08:00
|
|
|
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
2019-10-05 05:59:29 +08:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2020-11-04 21:02:01 +08:00
|
|
|
* are also available at https://curl.se/docs/copyright.html.
|
2019-10-05 05:59:29 +08:00
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: curl
|
2022-05-17 17:16:50 +08:00
|
|
|
*
|
2019-10-05 05:59:29 +08:00
|
|
|
***************************************************************************/
|
|
|
|
|
|
|
|
#include "curl_setup.h"
|
|
|
|
#include "socketpair.h"
|
2023-04-24 20:14:11 +08:00
|
|
|
#include "urldata.h"
|
|
|
|
#include "rand.h"
|
2019-10-05 05:59:29 +08:00
|
|
|
|
2020-08-14 21:45:08 +08:00
|
|
|
#if !defined(HAVE_SOCKETPAIR) && !defined(CURL_DISABLE_SOCKETPAIR)
|
2019-10-05 05:59:29 +08:00
|
|
|
#ifdef WIN32
|
|
|
|
/*
|
|
|
|
* This is a socketpair() implementation for Windows.
|
|
|
|
*/
|
|
|
|
#include <string.h>
|
|
|
|
#include <winsock2.h>
|
|
|
|
#include <ws2tcpip.h>
|
|
|
|
#include <windows.h>
|
|
|
|
#include <io.h>
|
|
|
|
#else
|
|
|
|
#ifdef HAVE_NETDB_H
|
|
|
|
#include <netdb.h>
|
|
|
|
#endif
|
2019-10-10 17:52:51 +08:00
|
|
|
#ifdef HAVE_NETINET_IN_H
|
|
|
|
#include <netinet/in.h> /* IPPROTO_TCP */
|
|
|
|
#endif
|
2019-12-24 21:28:32 +08:00
|
|
|
#ifdef HAVE_ARPA_INET_H
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#endif
|
2019-10-10 17:52:51 +08:00
|
|
|
#ifndef INADDR_LOOPBACK
|
|
|
|
#define INADDR_LOOPBACK 0x7f000001
|
|
|
|
#endif /* !INADDR_LOOPBACK */
|
2019-10-05 05:59:29 +08:00
|
|
|
#endif /* !WIN32 */
|
|
|
|
|
2021-06-05 18:57:28 +08:00
|
|
|
#include "nonblock.h" /* for curlx_nonblock */
|
|
|
|
#include "timeval.h" /* needed before select.h */
|
|
|
|
#include "select.h" /* for Curl_poll */
|
|
|
|
|
2019-10-05 05:59:29 +08:00
|
|
|
/* The last 3 #include files should be in this order */
|
|
|
|
#include "curl_printf.h"
|
|
|
|
#include "curl_memory.h"
|
|
|
|
#include "memdebug.h"
|
|
|
|
|
|
|
|
int Curl_socketpair(int domain, int type, int protocol,
|
|
|
|
curl_socket_t socks[2])
|
|
|
|
{
|
|
|
|
union {
|
|
|
|
struct sockaddr_in inaddr;
|
|
|
|
struct sockaddr addr;
|
2022-12-28 00:19:51 +08:00
|
|
|
} a;
|
2019-10-05 05:59:29 +08:00
|
|
|
curl_socket_t listener;
|
|
|
|
curl_socklen_t addrlen = sizeof(a.inaddr);
|
|
|
|
int reuse = 1;
|
2021-06-05 18:57:28 +08:00
|
|
|
struct pollfd pfd[1];
|
2019-10-05 05:59:29 +08:00
|
|
|
(void)domain;
|
|
|
|
(void)type;
|
|
|
|
(void)protocol;
|
|
|
|
|
|
|
|
listener = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
|
|
|
|
if(listener == CURL_SOCKET_BAD)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
memset(&a, 0, sizeof(a));
|
|
|
|
a.inaddr.sin_family = AF_INET;
|
|
|
|
a.inaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
|
|
|
|
a.inaddr.sin_port = 0;
|
|
|
|
|
|
|
|
socks[0] = socks[1] = CURL_SOCKET_BAD;
|
|
|
|
|
2023-02-19 18:03:21 +08:00
|
|
|
#if defined(WIN32) || defined(__CYGWIN__)
|
|
|
|
/* don't set SO_REUSEADDR on Windows */
|
|
|
|
(void)reuse;
|
|
|
|
#ifdef SO_EXCLUSIVEADDRUSE
|
|
|
|
{
|
|
|
|
int exclusive = 1;
|
|
|
|
if(setsockopt(listener, SOL_SOCKET, SO_EXCLUSIVEADDRUSE,
|
|
|
|
(char *)&exclusive, (curl_socklen_t)sizeof(exclusive)) == -1)
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#else
|
2019-10-05 05:59:29 +08:00
|
|
|
if(setsockopt(listener, SOL_SOCKET, SO_REUSEADDR,
|
|
|
|
(char *)&reuse, (curl_socklen_t)sizeof(reuse)) == -1)
|
|
|
|
goto error;
|
2023-02-19 18:03:21 +08:00
|
|
|
#endif
|
2019-10-05 05:59:29 +08:00
|
|
|
if(bind(listener, &a.addr, sizeof(a.inaddr)) == -1)
|
|
|
|
goto error;
|
2021-06-05 18:57:28 +08:00
|
|
|
if(getsockname(listener, &a.addr, &addrlen) == -1 ||
|
|
|
|
addrlen < (int)sizeof(a.inaddr))
|
2019-10-05 05:59:29 +08:00
|
|
|
goto error;
|
|
|
|
if(listen(listener, 1) == -1)
|
|
|
|
goto error;
|
|
|
|
socks[0] = socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
if(socks[0] == CURL_SOCKET_BAD)
|
|
|
|
goto error;
|
|
|
|
if(connect(socks[0], &a.addr, sizeof(a.inaddr)) == -1)
|
|
|
|
goto error;
|
2021-06-05 18:57:28 +08:00
|
|
|
|
|
|
|
/* use non-blocking accept to make sure we don't block forever */
|
|
|
|
if(curlx_nonblock(listener, TRUE) < 0)
|
|
|
|
goto error;
|
|
|
|
pfd[0].fd = listener;
|
|
|
|
pfd[0].events = POLLIN;
|
|
|
|
pfd[0].revents = 0;
|
2022-12-28 00:19:51 +08:00
|
|
|
(void)Curl_poll(pfd, 1, 1000); /* one second */
|
2019-10-05 05:59:29 +08:00
|
|
|
socks[1] = accept(listener, NULL, NULL);
|
|
|
|
if(socks[1] == CURL_SOCKET_BAD)
|
|
|
|
goto error;
|
2022-12-28 00:19:51 +08:00
|
|
|
else {
|
2023-02-19 18:03:21 +08:00
|
|
|
struct curltime start = Curl_now();
|
2023-04-24 20:14:11 +08:00
|
|
|
char rnd[9];
|
|
|
|
char check[sizeof(rnd)];
|
|
|
|
char *p = &check[0];
|
2023-02-19 18:03:21 +08:00
|
|
|
size_t s = sizeof(check);
|
2019-10-05 05:59:29 +08:00
|
|
|
|
2023-04-24 20:14:11 +08:00
|
|
|
if(Curl_rand(NULL, (unsigned char *)rnd, sizeof(rnd)))
|
|
|
|
goto error;
|
|
|
|
|
2022-12-28 00:19:51 +08:00
|
|
|
/* write data to the socket */
|
2023-04-24 20:14:11 +08:00
|
|
|
swrite(socks[0], rnd, sizeof(rnd));
|
2022-12-28 00:19:51 +08:00
|
|
|
/* verify that we read the correct data */
|
2023-02-19 18:03:21 +08:00
|
|
|
do {
|
|
|
|
ssize_t nread;
|
|
|
|
|
|
|
|
pfd[0].fd = socks[1];
|
|
|
|
pfd[0].events = POLLIN;
|
|
|
|
pfd[0].revents = 0;
|
|
|
|
(void)Curl_poll(pfd, 1, 1000); /* one second */
|
|
|
|
|
|
|
|
nread = sread(socks[1], p, s);
|
|
|
|
if(nread == -1) {
|
|
|
|
int sockerr = SOCKERRNO;
|
|
|
|
/* Don't block forever */
|
|
|
|
if(Curl_timediff(Curl_now(), start) > (60 * 1000))
|
|
|
|
goto error;
|
|
|
|
if(
|
|
|
|
#ifdef WSAEWOULDBLOCK
|
|
|
|
/* This is how Windows does it */
|
|
|
|
(WSAEWOULDBLOCK == sockerr)
|
|
|
|
#else
|
|
|
|
/* errno may be EWOULDBLOCK or on some systems EAGAIN when it
|
|
|
|
returned due to its inability to send off data without
|
|
|
|
blocking. We therefore treat both error codes the same here */
|
|
|
|
(EWOULDBLOCK == sockerr) || (EAGAIN == sockerr) ||
|
|
|
|
(EINTR == sockerr) || (EINPROGRESS == sockerr)
|
|
|
|
#endif
|
|
|
|
) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
s -= nread;
|
|
|
|
if(s) {
|
|
|
|
p += nread;
|
|
|
|
continue;
|
|
|
|
}
|
2023-04-24 20:14:11 +08:00
|
|
|
if(memcmp(rnd, check, sizeof(check)))
|
2023-02-19 18:03:21 +08:00
|
|
|
goto error;
|
|
|
|
break;
|
|
|
|
} while(1);
|
2022-12-28 00:19:51 +08:00
|
|
|
}
|
2019-10-10 17:18:21 +08:00
|
|
|
|
|
|
|
sclose(listener);
|
2019-10-05 05:59:29 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
error:
|
|
|
|
sclose(listener);
|
|
|
|
sclose(socks[0]);
|
|
|
|
sclose(socks[1]);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* ! HAVE_SOCKETPAIR */
|