/* * OpenConnect (SSL + DTLS) VPN client * * Copyright © 2008-2015 Intel Corporation. * * Authors: David Woodhouse * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public License * version 2.1, as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. */ #include #include #include #include #include #include #include "openconnect-internal.h" #ifdef HAVE_SUNOS_BROKEN_TIME /* * On SunOS, time() goes backwards. Thankfully, gethrtime() doesn't. * https://www.illumos.org/issues/1871 and, for Solaris 11, Oracle * bug ID #15760793 (previously Sun CR ID 7121035). */ #include time_t openconnect__time(time_t *t) { time_t s = gethrtime() / 1000000000LL; if (t) *t = s; return s; } #endif #ifndef HAVE_VASPRINTF int openconnect__vasprintf(char **strp, const char *fmt, va_list ap) { va_list ap2; char *res = NULL; int len = 160, len2; int ret = 0; int errno_save = -ENOMEM; res = malloc(160); if (!res) goto err; /* Use a copy of 'ap', preserving it in case we need to retry into a larger buffer. 160 characters should be sufficient for most strings in openconnect. */ #ifdef HAVE_VA_COPY va_copy(ap2, ap); #elif defined(HAVE___VA_COPY) __va_copy(ap2, ap); #else #error No va_copy()! /* You could try this. */ ap2 = ap; /* Or this */ *ap2 = *ap; #endif len = vsnprintf(res, 160, fmt, ap2); va_end(ap2); if (len < 0) { printf_err: errno_save = errno; free(res); res = NULL; goto err; } if (len >= 0 && len < 160) goto out; free(res); res = malloc(len+1); if (!res) goto err; len2 = vsnprintf(res, len+1, fmt, ap); if (len2 < 0 || len2 > len) goto printf_err; ret = 0; goto out; err: errno = errno_save; ret = -1; out: *strp = res; return ret; } #endif #ifndef HAVE_ASPRINTF int openconnect__asprintf(char **strp, const char *fmt, ...) { va_list ap; int ret; va_start(ap, fmt); ret = vasprintf(strp, fmt, ap); va_end(ap); return ret; } #endif #ifndef HAVE_GETLINE ssize_t openconnect__getline(char **lineptr, size_t *n, FILE *stream) { int len = 0; if (!*lineptr) { *n = 2; *lineptr = malloc(*n); if (!*lineptr) return -1; } while (fgets((*lineptr) + len, (*n) - len, stream)) { len += strlen((*lineptr) + len); if ((*lineptr)[len-1] == '\n') break; *n *= 2; realloc_inplace(*lineptr, *n); if (!*lineptr) return -1; } if (len) return len; return -1; } #endif #ifndef HAVE_STRCASESTR char *openconnect__strcasestr(const char *haystack, const char *needle) { int hlen = strlen(haystack); int nlen = strlen(needle); int i, j; for (i = 0; i < hlen - nlen + 1; i++) { for (j = 0; j < nlen; j++) { if (tolower(haystack[i + j]) != tolower(needle[j])) break; } if (j == nlen) return (char *)haystack + i; } return NULL; } #endif #ifndef HAVE_STRNDUP char *openconnect__strndup(const char *s, size_t n) { char *r; if (n > strlen(s)) n = strlen(s); r = malloc(n + 1); if (r) { memcpy(r, s, n); r[n] = 0; } return r; } #endif #ifndef HAVE_INET_ATON int openconnect__inet_aton(const char *cp, struct in_addr *addr) { return inet_pton(AF_INET, cp, addr); } #endif #ifdef _WIN32 char *openconnect__win32_strerror(DWORD err) { wchar_t *msgw; char *msgutf8; int nr_chars; if (!FormatMessageW(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS | FORMAT_MESSAGE_ALLOCATE_BUFFER, NULL, err, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), (LPWSTR)&msgw, 0, NULL)) { if (asprintf(&msgutf8, _("(error 0x%lx)"), err) != -1) return msgutf8; fail: return strdup(_("(Error while describing error!)")); } nr_chars = wcslen(msgw); if (nr_chars && msgw[nr_chars - 1] == 10) msgw[--nr_chars] = 0; if (nr_chars && msgw[nr_chars - 1] == 13) msgw[--nr_chars] = 0; nr_chars = WideCharToMultiByte(CP_UTF8, 0, msgw, -1, NULL, 0, NULL, NULL); msgutf8 = malloc(nr_chars); if (!msgutf8) goto fail; WideCharToMultiByte(CP_UTF8, 0, msgw, -1, msgutf8, nr_chars, NULL, NULL); LocalFree(msgw); return msgutf8; } int openconnect__win32_sock_init() { WSADATA data; if (WSAStartup (MAKEWORD(1, 1), &data) != 0) { fprintf(stderr, _("ERROR: Cannot initialize sockets\n")); return -EIO; } return 0; } int openconnect__win32_inet_pton(int af, const char *src, void *dst) { union { struct sockaddr_in s4; struct sockaddr_in6 s6; } sa; int salen = sizeof(sa); if (af != AF_INET && af != AF_INET6) { errno = EAFNOSUPPORT; return -1; } memset(&sa, 0, sizeof(sa)); sa.s4.sin_family = af; if (WSAStringToAddressA((char *)src, af, NULL, (void *)&sa, &salen)) return 0; /* For Legacy IP we need to filter out a lot of crap that * inet_aton() (and WSAStringToAddress()) will support, but * which inet_pton() should not. Not to mention the fact that * Wine's implementation will even succeed for strings like * "2001::1" (http://bugs.winehq.org/show_bug.cgi?id=36991) */ if (af == AF_INET) { char canon[16]; unsigned char *a = (unsigned char *)&sa.s4.sin_addr; snprintf(canon, sizeof(canon), "%d.%d.%d.%d", a[0], a[1], a[2], a[3]); if (strcmp(canon, src)) return 0; memcpy(dst, &sa.s4.sin_addr, sizeof(sa.s4.sin_addr)); return 1; } else { memcpy(dst, &sa.s6.sin6_addr, sizeof(sa.s6.sin6_addr)); return 1; } } /* https://github.com/ncm/selectable-socketpair Copyright 2007, 2010 by Nathan C. Myers Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. The name of the author must not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /* Changes: * 2013-07-18: Change to BSD 3-clause license * 2010-03-31: * set addr to 127.0.0.1 because win32 getsockname does not always set it. * 2010-02-25: * set SO_REUSEADDR option to avoid leaking some windows resource. * Windows System Error 10049, "Event ID 4226 TCP/IP has reached * the security limit imposed on the number of concurrent TCP connect * attempts." Bleah. * 2007-04-25: * preserve value of WSAGetLastError() on all error returns. * 2007-04-22: (Thanks to Matthew Gregan ) * s/EINVAL/WSAEINVAL/ fix trivial compile failure * s/socket/WSASocket/ enable creation of sockets suitable as stdin/stdout * of a child process. * add argument make_overlapped */ #include # include # include # include /* dumb_socketpair: * If make_overlapped is nonzero, both sockets created will be usable for * "overlapped" operations via WSASend etc. If make_overlapped is zero, * socks[0] (only) will be usable with regular ReadFile etc., and thus * suitable for use as stdin or stdout of a child process. Note that the * sockets must be closed with closesocket() regardless. */ OPENCONNECT_CMD_SOCKET dumb_socketpair(OPENCONNECT_CMD_SOCKET socks[2], int make_overlapped) { union { struct sockaddr_in inaddr; struct sockaddr addr; } a; OPENCONNECT_CMD_SOCKET listener; int e; socklen_t addrlen = sizeof(a.inaddr); DWORD flags = (make_overlapped ? WSA_FLAG_OVERLAPPED : 0); int reuse = 1; if (socks == 0) { WSASetLastError(WSAEINVAL); return SOCKET_ERROR; } listener = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listener == INVALID_SOCKET) return SOCKET_ERROR; memset(&a, 0, sizeof(a)); a.inaddr.sin_family = AF_INET; a.inaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); a.inaddr.sin_port = 0; socks[0] = socks[1] = -1; do { if (setsockopt(listener, SOL_SOCKET, SO_REUSEADDR, (char*) &reuse, (socklen_t) sizeof(reuse)) == -1) break; if (bind(listener, &a.addr, sizeof(a.inaddr)) == SOCKET_ERROR) break; memset(&a, 0, sizeof(a)); if (getsockname(listener, &a.addr, &addrlen) == SOCKET_ERROR) break; // win32 getsockname may only set the port number, p=0.0005. // ( http://msdn.microsoft.com/library/ms738543.aspx ): a.inaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); a.inaddr.sin_family = AF_INET; if (listen(listener, 1) == SOCKET_ERROR) break; socks[0] = WSASocket(AF_INET, SOCK_STREAM, 0, NULL, 0, flags); if (socks[0] == INVALID_SOCKET) break; if (connect(socks[0], &a.addr, sizeof(a.inaddr)) == SOCKET_ERROR) break; socks[1] = accept(listener, NULL, NULL); if (socks[1] == INVALID_SOCKET) break; closesocket(listener); return 0; } while (0); e = WSAGetLastError(); closesocket(listener); closesocket(socks[0]); closesocket(socks[1]); WSASetLastError(e); return SOCKET_ERROR; } #endif /* _WIN32 */