summaryrefslogtreecommitdiffstats
path: root/x11vnc/inet.c
diff options
context:
space:
mode:
authorChristian Beier <dontmind@freeshell.org>2014-09-03 20:54:39 +0200
committerChristian Beier <dontmind@freeshell.org>2014-09-03 20:54:39 +0200
commit498d222976975f53dea885cfe43ef0f805abd412 (patch)
treebac684fbde46fdc3e4cc3817616816b71bb67f9f /x11vnc/inet.c
parent8d2db0486dcc167f1b02d4454ebf4624ce03e1de (diff)
downloadlibtdevnc-498d222976975f53dea885cfe43ef0f805abd412.tar.gz
libtdevnc-498d222976975f53dea885cfe43ef0f805abd412.zip
Remove x11vnc subdir.
The new x11vnc repo is at https://github.com/LibVNC/x11vnc.
Diffstat (limited to 'x11vnc/inet.c')
-rw-r--r--x11vnc/inet.c936
1 files changed, 0 insertions, 936 deletions
diff --git a/x11vnc/inet.c b/x11vnc/inet.c
deleted file mode 100644
index 23a911e..0000000
--- a/x11vnc/inet.c
+++ /dev/null
@@ -1,936 +0,0 @@
-/*
- Copyright (C) 2002-2010 Karl J. Runge <runge@karlrunge.com>
- All rights reserved.
-
-This file is part of x11vnc.
-
-x11vnc is free software; you can redistribute it and/or modify
-it under the terms of the GNU General Public License as published by
-the Free Software Foundation; either version 2 of the License, or (at
-your option) any later version.
-
-x11vnc is distributed in the hope that it will be useful,
-but WITHOUT ANY WARRANTY; without even the implied warranty of
-MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-GNU General Public License for more details.
-
-You should have received a copy of the GNU General Public License
-along with x11vnc; if not, write to the Free Software
-Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
-or see <http://www.gnu.org/licenses/>.
-
-In addition, as a special exception, Karl J. Runge
-gives permission to link the code of its release of x11vnc with the
-OpenSSL project's "OpenSSL" library (or with modified versions of it
-that use the same license as the "OpenSSL" library), and distribute
-the linked executables. You must obey the GNU General Public License
-in all respects for all of the code used other than "OpenSSL". If you
-modify this file, you may extend this exception to your version of the
-file, but you are not obligated to do so. If you do not wish to do
-so, delete this exception statement from your version.
-*/
-
-/* -- inet.c -- */
-
-#include "x11vnc.h"
-#include "unixpw.h"
-#include "sslhelper.h"
-
-/*
- * Simple utility to map host name to dotted IP address. Ignores aliases.
- * Up to caller to free returned string.
- */
-char *host2ip(char *host);
-char *raw2host(char *raw, int len);
-char *raw2ip(char *raw);
-char *ip2host(char *ip);
-int ipv6_ip(char *host);
-int dotted_ip(char *host, int partial);
-int get_remote_port(int sock);
-int get_local_port(int sock);
-char *get_remote_host(int sock);
-char *get_local_host(int sock);
-char *ident_username(rfbClientPtr client);
-int find_free_port(int start, int end);
-int find_free_port6(int start, int end);
-int have_ssh_env(void);
-char *ipv6_getnameinfo(struct sockaddr *paddr, int addrlen);
-char *ipv6_getipaddr(struct sockaddr *paddr, int addrlen);
-int listen6(int port);
-int listen_unix(char *file);
-int accept_unix(int s);
-int connect_tcp(char *host, int port);
-int listen_tcp(int port, in_addr_t iface, int try6);
-
-static int get_port(int sock, int remote);
-static char *get_host(int sock, int remote);
-
-char *host2ip(char *host) {
- struct hostent *hp;
- struct sockaddr_in addr;
- char *str;
-
- if (! host_lookup) {
- return NULL;
- }
-
- hp = gethostbyname(host);
- if (!hp) {
- return NULL;
- }
- memset(&addr, 0, sizeof(addr));
- addr.sin_family = AF_INET;
- addr.sin_addr.s_addr = *(unsigned long *)hp->h_addr;
- str = strdup(inet_ntoa(addr.sin_addr));
- return str;
-}
-
-char *raw2host(char *raw, int len) {
- char *str;
-#if LIBVNCSERVER_HAVE_NETDB_H && LIBVNCSERVER_HAVE_NETINET_IN_H
- struct hostent *hp;
-
- if (! host_lookup) {
- return strdup("unknown");
- }
-
- hp = gethostbyaddr(raw, len, AF_INET);
- if (!hp) {
- return strdup(inet_ntoa(*((struct in_addr *)raw)));
- }
- str = strdup(hp->h_name);
-#else
- str = strdup("unknown");
-#endif
- return str;
-}
-
-char *raw2ip(char *raw) {
- return strdup(inet_ntoa(*((struct in_addr *)raw)));
-}
-
-char *ip2host(char *ip) {
- char *str;
-#if LIBVNCSERVER_HAVE_NETDB_H && LIBVNCSERVER_HAVE_NETINET_IN_H
- struct hostent *hp;
- in_addr_t iaddr;
-
- if (! host_lookup) {
- return strdup("unknown");
- }
-
- iaddr = inet_addr(ip);
- if (iaddr == htonl(INADDR_NONE)) {
- return strdup("unknown");
- }
-
- hp = gethostbyaddr((char *)&iaddr, sizeof(in_addr_t), AF_INET);
- if (!hp) {
- return strdup("unknown");
- }
- str = strdup(hp->h_name);
-#else
- str = strdup("unknown");
-#endif
- return str;
-}
-
-int ipv6_ip(char *host_in) {
- char *p, *host, a[2];
- int ncol = 0, nhex = 0;
-
- if (host_in[0] == '[') {
- host = host_in + 1;
- } else {
- host = host_in;
- }
-
- if (strstr(host, "::ffff:") == host || strstr(host, "::FFFF:") == host) {
- return dotted_ip(host + strlen("::ffff:"), 0);
- }
-
- a[1] = '\0';
-
- p = host;
- while (*p != '\0' && *p != '%' && *p != ']') {
- if (*p == ':') {
- ncol++;
- } else {
- nhex++;
- }
- a[0] = *p;
- if (strpbrk(a, ":abcdef0123456789") == a) {
- p++;
- continue;
- }
- return 0;
- }
- if (ncol < 2 || ncol > 8 || nhex == 0) {
- return 0;
- } else {
- return 1;
- }
-}
-
-int dotted_ip(char *host, int partial) {
- int len, dots = 0;
- char *p = host;
-
- if (!host) {
- return 0;
- }
-
- if (!isdigit((unsigned char) host[0])) {
- return 0;
- }
-
- len = strlen(host);
- if (!partial && !isdigit((unsigned char) host[len-1])) {
- return 0;
- }
-
- while (*p != '\0') {
- if (*p == '.') dots++;
- if (*p == '.' || isdigit((unsigned char) (*p))) {
- p++;
- continue;
- }
- return 0;
- }
- if (!partial && dots != 3) {
- return 0;
- }
- return 1;
-}
-
-static int get_port(int sock, int remote) {
- struct sockaddr_in saddr;
- unsigned int saddr_len;
- int saddr_port;
-
- saddr_len = sizeof(saddr);
- memset(&saddr, 0, sizeof(saddr));
- saddr_port = -1;
- if (remote) {
- if (!getpeername(sock, (struct sockaddr *)&saddr, &saddr_len)) {
- saddr_port = ntohs(saddr.sin_port);
- }
- } else {
- if (!getsockname(sock, (struct sockaddr *)&saddr, &saddr_len)) {
- saddr_port = ntohs(saddr.sin_port);
- }
- }
- return saddr_port;
-}
-
-int get_remote_port(int sock) {
- return get_port(sock, 1);
-}
-
-int get_local_port(int sock) {
- return get_port(sock, 0);
-}
-
-static char *get_host(int sock, int remote) {
- struct sockaddr_in saddr;
- unsigned int saddr_len;
- int saddr_port;
- char *saddr_ip_str = NULL;
-
- saddr_len = sizeof(saddr);
- memset(&saddr, 0, sizeof(saddr));
- saddr_port = -1;
-#if LIBVNCSERVER_HAVE_NETINET_IN_H
- if (remote) {
- if (!getpeername(sock, (struct sockaddr *)&saddr, &saddr_len)) {
- saddr_ip_str = inet_ntoa(saddr.sin_addr);
- }
- } else {
- if (!getsockname(sock, (struct sockaddr *)&saddr, &saddr_len)) {
- saddr_ip_str = inet_ntoa(saddr.sin_addr);
- }
- }
-#endif
- if (! saddr_ip_str) {
- saddr_ip_str = "unknown";
- }
- return strdup(saddr_ip_str);
-}
-
-char *get_remote_host(int sock) {
- return get_host(sock, 1);
-}
-
-char *get_local_host(int sock) {
- return get_host(sock, 0);
-}
-
-char *ident_username(rfbClientPtr client) {
- ClientData *cd = (ClientData *) client->clientData;
- char *str, *newhost, *user = NULL, *newuser = NULL;
- int len;
-
- if (cd) {
- user = cd->username;
- }
- if (!user || *user == '\0') {
- int n, sock, ok = 0;
- int block = 0;
- int refused = 0;
-
- /*
- * need to check to see if the operation will block for
- * a long time: a firewall may just ignore our packets.
- */
-#if LIBVNCSERVER_HAVE_FORK
- { pid_t pid, pidw;
- int rc;
- if ((pid = fork()) > 0) {
- usleep(100 * 1000); /* 0.1 sec for quick success or refusal */
- pidw = waitpid(pid, &rc, WNOHANG);
- if (pidw <= 0) {
- usleep(1500 * 1000); /* 1.5 sec */
- pidw = waitpid(pid, &rc, WNOHANG);
- if (pidw <= 0) {
- int rc2;
- rfbLog("ident_username: set block=1 (hung)\n");
- block = 1;
- kill(pid, SIGTERM);
- usleep(100 * 1000);
- waitpid(pid, &rc2, WNOHANG);
- }
- }
- if (pidw > 0 && !block) {
- if (WIFEXITED(rc) && WEXITSTATUS(rc) == 1) {
- rfbLog("ident_username: set refused=1 (exit)\n");
- refused = 1;
- }
- }
- } else if (pid == -1) {
- ;
- } else {
- /* child */
- signal(SIGHUP, SIG_DFL);
- signal(SIGINT, SIG_DFL);
- signal(SIGQUIT, SIG_DFL);
- signal(SIGTERM, SIG_DFL);
-
- if ((sock = connect_tcp(client->host, 113)) < 0) {
- exit(1);
- } else {
- close(sock);
- exit(0);
- }
- }
- }
-#endif
- if (block || refused) {
- ;
- } else if ((sock = connect_tcp(client->host, 113)) < 0) {
- rfbLog("ident_username: could not connect to ident: %s:%d\n",
- client->host, 113);
- } else {
- char msg[128];
- int ret;
- fd_set rfds;
- struct timeval tv;
- int rport = get_remote_port(client->sock);
- int lport = get_local_port(client->sock);
-
- sprintf(msg, "%d, %d\r\n", rport, lport);
- n = write(sock, msg, strlen(msg));
-
- FD_ZERO(&rfds);
- FD_SET(sock, &rfds);
- tv.tv_sec = 3;
- tv.tv_usec = 0;
- ret = select(sock+1, &rfds, NULL, NULL, &tv);
-
- if (ret > 0) {
- int i;
- char *q, *p;
- for (i=0; i < (int) sizeof(msg); i++) {
- msg[i] = '\0';
- }
- usleep(250*1000);
- n = read(sock, msg, 127);
- close(sock);
- if (n <= 0) goto badreply;
-
- /* 32782 , 6000 : USERID : UNIX :runge */
- q = strstr(msg, "USERID");
- if (!q) goto badreply;
- q = strstr(q, ":");
- if (!q) goto badreply;
- q++;
- q = strstr(q, ":");
- if (!q) goto badreply;
- q++;
- q = lblanks(q);
- p = q;
- while (*p) {
- if (*p == '\r' || *p == '\n') {
- *p = '\0';
- }
- p++;
- }
- ok = 1;
- if (strlen(q) > 24) {
- *(q+24) = '\0';
- }
- newuser = strdup(q);
-
- badreply:
- n = 0; /* avoid syntax error */
- } else {
- close(sock);
- }
- }
- if (! ok || !newuser) {
- newuser = strdup("unknown-user");
- }
- if (cd) {
- if (cd->username) {
- free(cd->username);
- }
- cd->username = newuser;
- }
- user = newuser;
- }
- if (!strcmp(user, "unknown-user") && cd && cd->unixname[0] != '\0') {
- user = cd->unixname;
- }
- if (unixpw && openssl_last_ip && strstr("UNIX:", user) != user) {
- newhost = ip2host(openssl_last_ip);
- } else {
- newhost = ip2host(client->host);
- }
- len = strlen(user) + 1 + strlen(newhost) + 1;
- str = (char *) malloc(len);
- sprintf(str, "%s@%s", user, newhost);
- free(newhost);
- return str;
-}
-
-int find_free_port(int start, int end) {
- int port;
- if (start <= 0) {
- start = 1024;
- }
- if (end <= 0) {
- end = 65530;
- }
- for (port = start; port <= end; port++) {
- int sock = listen_tcp(port, htonl(INADDR_ANY), 0);
- if (sock >= 0) {
- close(sock);
- return port;
- }
- }
- return 0;
-}
-
-int find_free_port6(int start, int end) {
- int port;
- if (start <= 0) {
- start = 1024;
- }
- if (end <= 0) {
- end = 65530;
- }
- for (port = start; port <= end; port++) {
- int sock = listen6(port);
- if (sock >= 0) {
- close(sock);
- return port;
- }
- }
- return 0;
-}
-
-int have_ssh_env(void) {
- char *str, *p = getenv("SSH_CONNECTION");
- char *rhost, *rport, *lhost, *lport;
-
- if (! p) {
- char *q = getenv("SSH_CLIENT");
- if (! q) {
- return 0;
- }
- if (strstr(q, "127.0.0.1") != NULL) {
- return 0;
- }
- return 1;
- }
-
- if (strstr(p, "127.0.0.1") != NULL) {
- return 0;
- }
-
- str = strdup(p);
-
- p = strtok(str, " ");
- rhost = p;
-
- p = strtok(NULL, " ");
- if (! p) goto fail;
-
- rport = p;
-
- p = strtok(NULL, " ");
- if (! p) goto fail;
-
- lhost = p;
-
- p = strtok(NULL, " ");
- if (! p) goto fail;
-
- lport = p;
-
-if (0) fprintf(stderr, "%d/%d - '%s' '%s'\n", atoi(rport), atoi(lport), rhost, lhost);
-
- if (atoi(rport) <= 16 || atoi(rport) > 65535) {
- goto fail;
- }
- if (atoi(lport) <= 16 || atoi(lport) > 65535) {
- goto fail;
- }
-
- if (!strcmp(rhost, lhost)) {
- goto fail;
- }
-
- free(str);
-
- return 1;
-
- fail:
-
- free(str);
-
- return 0;
-}
-
-char *ipv6_getnameinfo(struct sockaddr *paddr, int addrlen) {
-#if X11VNC_IPV6
- char name[200];
- if (noipv6) {
- return strdup("unknown");
- }
- if (getnameinfo(paddr, addrlen, name, sizeof(name), NULL, 0, 0) == 0) {
- return strdup(name);
- }
-#endif
- return strdup("unknown");
-}
-
-char *ipv6_getipaddr(struct sockaddr *paddr, int addrlen) {
-#if X11VNC_IPV6 && defined(NI_NUMERICHOST)
- char name[200];
- if (noipv6) {
- return strdup("unknown");
- }
- if (getnameinfo(paddr, addrlen, name, sizeof(name), NULL, 0, NI_NUMERICHOST) == 0) {
- return strdup(name);
- }
-#endif
- return strdup("unknown");
-}
-
-int listen6(int port) {
-#if X11VNC_IPV6
- struct sockaddr_in6 sin;
- int fd = -1, one = 1;
-
- if (noipv6) {
- return -1;
- }
- if (port <= 0 || 65535 < port) {
- /* for us, invalid port means do not listen. */
- return -1;
- }
-
- fd = socket(AF_INET6, SOCK_STREAM, 0);
- if (fd < 0) {
- rfbLogPerror("listen6: socket");
- rfbLog("(Ignore the above error if this system is IPv4-only.)\n");
- return -1;
- }
-
- if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (char *)&one, sizeof(one)) < 0) {
- rfbLogPerror("listen6: setsockopt SO_REUSEADDR");
- close(fd);
- return -1;
- }
-
-#if defined(SOL_IPV6) && defined(IPV6_V6ONLY)
- if (setsockopt(fd, SOL_IPV6, IPV6_V6ONLY, (char *)&one, sizeof(one)) < 0) {
- rfbLogPerror("listen6: setsockopt IPV6_V6ONLY");
- close(fd);
- return -1;
- }
-#endif
-
- memset((char *)&sin, 0, sizeof(sin));
- sin.sin6_family = AF_INET6;
- sin.sin6_port = htons(port);
- sin.sin6_addr = in6addr_any;
-
- if (listen_str6) {
- if (!strcmp(listen_str6, "localhost") || !strcmp(listen_str6, "::1")) {
- sin.sin6_addr = in6addr_loopback;
- } else {
- int err;
- struct addrinfo *ai;
- struct addrinfo hints;
- char service[32];
-
- memset(&hints, 0, sizeof(hints));
- sprintf(service, "%d", port);
-
- hints.ai_family = AF_INET6;
- hints.ai_socktype = SOCK_STREAM;
-#ifdef AI_ADDRCONFIG
- hints.ai_flags |= AI_ADDRCONFIG;
-#endif
-#ifdef AI_NUMERICHOST
- if(ipv6_ip(listen_str6)) {
- hints.ai_flags |= AI_NUMERICHOST;
- }
-#endif
-#ifdef AI_NUMERICSERV
- hints.ai_flags |= AI_NUMERICSERV;
-#endif
- err = getaddrinfo(listen_str6, service, &hints, &ai);
- if (err == 0) {
- struct addrinfo *ap = ai;
- err = 1;
- while (ap != NULL) {
- char *s = ipv6_getipaddr(ap->ai_addr, ap->ai_addrlen);
- if (!s) s = strdup("unknown");
-
- rfbLog("listen6: checking: %s family: %d\n", s, ap->ai_family);
- if (ap->ai_family == AF_INET6) {
- memcpy((char *)&sin, ap->ai_addr, sizeof(sin));
- rfbLog("listen6: using: %s scope_id: %d\n", s, sin.sin6_scope_id);
- err = 0;
- free(s);
- break;
- }
- free(s);
- ap = ap->ai_next;
- }
- freeaddrinfo(ai);
- }
-
- if (err != 0) {
- rfbLog("Invalid or Unsupported -listen6 string: %s\n", listen_str6);
- close(fd);
- return -1;
- }
- }
- } else if (allow_list && !strcmp(allow_list, "127.0.0.1")) {
- sin.sin6_addr = in6addr_loopback;
- } else if (listen_str) {
- if (!strcmp(listen_str, "localhost")) {
- sin.sin6_addr = in6addr_loopback;
- }
- }
-
- if (bind(fd, (struct sockaddr *) &sin, sizeof(sin)) < 0) {
- rfbLogPerror("listen6: bind");
- close(fd);
- return -1;
- }
- if (listen(fd, 32) < 0) {
- rfbLogPerror("listen6: listen");
- close(fd);
- return -1;
- }
- return fd;
-#else
- if (port) {}
- return -1;
-#endif
-}
-
-#ifdef LIBVNCSERVER_HAVE_SYS_SOCKET_H
-#include <sys/un.h>
-#endif
-
-int listen_unix(char *file) {
-#if !defined(AF_UNIX) || !defined(LIBVNCSERVER_HAVE_SYS_SOCKET_H)
- if (sock) {}
- return -1;
-#else
- int s, len;
- struct sockaddr_un saun;
-
- s = socket(AF_UNIX, SOCK_STREAM, 0);
- if (s < 0) {
- rfbLogPerror("listen_unix: socket");
- return -1;
- }
- saun.sun_family = AF_UNIX;
- strcpy(saun.sun_path, file);
- unlink(file);
-
- len = sizeof(saun.sun_family) + strlen(saun.sun_path);
-
- if (bind(s, (struct sockaddr *)&saun, len) < 0) {
- rfbLogPerror("listen_unix: bind");
- close(s);
- return -1;
- }
-
- if (listen(s, 32) < 0) {
- rfbLogPerror("listen_unix: listen");
- close(s);
- return -1;
- }
- rfbLog("listening on unix socket: %s fd=%d\n", file, s);
- return s;
-#endif
-}
-
-int accept_unix(int s) {
-#if !defined(AF_UNIX) || !defined(LIBVNCSERVER_HAVE_SYS_SOCKET_H)
- if (s) {}
- return -1;
-#else
- int fd, fromlen;
- struct sockaddr_un fsaun;
-
- fd = accept(s, (struct sockaddr *)&fsaun, &fromlen);
- if (fd < 0) {
- rfbLogPerror("accept_unix: accept");
- return -1;
- }
- return fd;
-#endif
-}
-
-int connect_tcp(char *host, int port) {
- double t0 = dnow();
- int fd = -1;
- int fail4 = noipv4;
- if (getenv("IPV4_FAILS")) {
- fail4 = 2;
- }
-
- rfbLog("connect_tcp: trying: %s %d\n", host, port);
-
- if (fail4) {
- if (fail4 > 1) {
- rfbLog("TESTING: IPV4_FAILS for connect_tcp.\n");
- }
- } else {
- fd = rfbConnectToTcpAddr(host, port);
- }
-
- if (fd >= 0) {
- return fd;
- }
- rfbLogPerror("connect_tcp: connection failed");
-
- if (dnow() - t0 < 4.0) {
- rfbLog("connect_tcp: re-trying %s %d\n", host, port);
- usleep (100 * 1000);
- if (!fail4) {
- fd = rfbConnectToTcpAddr(host, port);
- }
- if (fd < 0) {
- rfbLogPerror("connect_tcp: connection failed");
- }
- }
-
- if (fd < 0 && !noipv6) {
-#if X11VNC_IPV6
- int err;
- struct addrinfo *ai;
- struct addrinfo hints;
- char service[32], *host2, *q;
-
- rfbLog("connect_tcp: trying IPv6 %s %d\n", host, port);
-
- memset(&hints, 0, sizeof(hints));
- sprintf(service, "%d", port);
-
- hints.ai_family = AF_UNSPEC;
- hints.ai_socktype = SOCK_STREAM;
-#ifdef AI_ADDRCONFIG
- hints.ai_flags |= AI_ADDRCONFIG;
-#endif
- if(ipv6_ip(host)) {
-#ifdef AI_NUMERICHOST
- rfbLog("connect_tcp[ipv6]: setting AI_NUMERICHOST for %s\n", host);
- hints.ai_flags |= AI_NUMERICHOST;
-#endif
- }
-#ifdef AI_NUMERICSERV
- hints.ai_flags |= AI_NUMERICSERV;
-#endif
-
- if (!strcmp(host, "127.0.0.1")) {
- host2 = strdup("::1");
- } else if (host[0] == '[') {
- host2 = strdup(host+1);
- } else {
- host2 = strdup(host);
- }
- q = strrchr(host2, ']');
- if (q) {
- *q = '\0';
- }
-
- err = getaddrinfo(host2, service, &hints, &ai);
- if (err != 0) {
- rfbLog("connect_tcp[ipv6]: getaddrinfo[%d]: %s\n", err, gai_strerror(err));
- usleep(100 * 1000);
- err = getaddrinfo(host2, service, &hints, &ai);
- }
- free(host2);
-
- if (err != 0) {
- rfbLog("connect_tcp[ipv6]: getaddrinfo[%d]: %s\n", err, gai_strerror(err));
- } else {
- struct addrinfo *ap = ai;
- while (ap != NULL) {
- int sock;
-
- if (fail4) {
- struct sockaddr_in6 *s6ptr;
- if (ap->ai_family != AF_INET6) {
- rfbLog("connect_tcp[ipv6]: skipping AF_INET address under -noipv4\n");
- ap = ap->ai_next;
- continue;
- }
-#ifdef IN6_IS_ADDR_V4MAPPED
- s6ptr = (struct sockaddr_in6 *) ap->ai_addr;
- if (IN6_IS_ADDR_V4MAPPED(&(s6ptr->sin6_addr))) {
- rfbLog("connect_tcp[ipv6]: skipping V4MAPPED address under -noipv4\n");
- ap = ap->ai_next;
- continue;
- }
-#endif
- }
-
- sock = socket(ap->ai_family, ap->ai_socktype, ap->ai_protocol);
-
- if (sock == -1) {
- rfbLogPerror("connect_tcp[ipv6]: socket");
- if (0) rfbLog("(Ignore the above error if this system is IPv4-only.)\n");
- } else {
- int res = -1, dmsg = 0;
- char *s = ipv6_getipaddr(ap->ai_addr, ap->ai_addrlen);
- if (!s) s = strdup("unknown");
-
- rfbLog("connect_tcp[ipv6]: trying sock=%d fam=%d proto=%d using %s\n",
- sock, ap->ai_family, ap->ai_protocol, s);
- res = connect(sock, ap->ai_addr, ap->ai_addrlen);
-#if defined(SOL_IPV6) && defined(IPV6_V6ONLY)
- if (res != 0) {
- int zero = 0;
- rfbLogPerror("connect_tcp[ipv6]: connect");
- dmsg = 1;
- if (setsockopt(sock, SOL_IPV6, IPV6_V6ONLY, (char *)&zero, sizeof(zero)) == 0) {
- rfbLog("connect_tcp[ipv6]: trying again with IPV6_V6ONLY=0\n");
- res = connect(sock, ap->ai_addr, ap->ai_addrlen);
- dmsg = 0;
- } else {
- rfbLogPerror("connect_tcp[ipv6]: setsockopt IPV6_V6ONLY");
- }
- }
-#endif
- if (res == 0) {
- rfbLog("connect_tcp[ipv6]: connect OK\n");
- fd = sock;
- if (!ipv6_client_ip_str) {
- ipv6_client_ip_str = strdup(s);
- }
- free(s);
- break;
- } else {
- if (!dmsg) rfbLogPerror("connect_tcp[ipv6]: connect");
- close(sock);
- }
- free(s);
- }
- ap = ap->ai_next;
- }
- freeaddrinfo(ai);
- }
-#endif
- }
- if (fd < 0 && !fail4) {
- /* this is a kludge for IPv4-only machines getting v4mapped string. */
- char *q, *host2;
- if (host[0] == '[') {
- host2 = strdup(host+1);
- } else {
- host2 = strdup(host);
- }
- q = strrchr(host2, ']');
- if (q) {
- *q = '\0';
- }
- if (strstr(host2, "::ffff:") == host2 || strstr(host2, "::FFFF:") == host2) {
- char *host3 = host2 + strlen("::ffff:");
- if (dotted_ip(host3, 0)) {
- rfbLog("connect_tcp[ipv4]: trying fallback to IPv4 for %s\n", host2);
- fd = rfbConnectToTcpAddr(host3, port);
- if (fd < 0) {
- rfbLogPerror("connect_tcp[ipv4]: connection failed");
- }
- }
- }
- free(host2);
- }
- return fd;
-}
-
-int listen_tcp(int port, in_addr_t iface, int try6) {
- int fd = -1;
- int fail4 = noipv4;
- if (getenv("IPV4_FAILS")) {
- fail4 = 2;
- }
-
- if (port <= 0 || 65535 < port) {
- /* for us, invalid port means do not listen. */
- return -1;
- }
-
- if (fail4) {
- if (fail4 > 1) {
- rfbLog("TESTING: IPV4_FAILS for listen_tcp: port=%d try6=%d\n", port, try6);
- }
- } else {
- fd = rfbListenOnTCPPort(port, iface);
- }
-
- if (fd >= 0) {
- return fd;
- }
- if (fail4 > 1) {
- rfbLogPerror("listen_tcp: listen failed");
- }
-
- if (fd < 0 && try6 && ipv6_listen && !noipv6) {
-#if X11VNC_IPV6
- char *save = listen_str6;
- if (iface == htonl(INADDR_LOOPBACK)) {
- listen_str6 = "localhost";
- rfbLog("listen_tcp: retrying on IPv6 in6addr_loopback ...\n");
- fd = listen6(port);
- } else if (iface == htonl(INADDR_ANY)) {
- listen_str6 = NULL;
- rfbLog("listen_tcp: retrying on IPv6 in6addr_any ...\n");
- fd = listen6(port);
- }
- listen_str6 = save;
-#endif
- }
- return fd;
-}
-