blob: bbe37f1a3f4e7c030e00d6660b034adf145c784d [file] [log] [blame]
/*
Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003
oss@fabasoft.com
Author: Bernhard Penz <bernhard.penz@fabasoft.com>
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
* The name of Fabasoft R&D Software GmbH & Co KG or any of its subsidiaries,
brand or product names may not be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#ifdef WIN32
#include <net-snmp/net-snmp-config.h>
#include <net-snmp/types.h>
#include <net-snmp/library/snmp_assert.h>
#include <net-snmp/library/winpipe.h>
#include <io.h>
static int InitUPDSocket(SOCKET *sock, struct sockaddr_in *socketaddress)
{
*sock = 0;
memset(socketaddress, 0, sizeof(struct sockaddr_in));
if( (*sock = socket(AF_INET, SOCK_DGRAM, 0)) == SOCKET_ERROR)
{
netsnmp_assert(GetLastError() != WSANOTINITIALISED);
return -1;
}
socketaddress->sin_family = AF_INET;
socketaddress->sin_addr.S_un.S_addr = htonl(INADDR_LOOPBACK);
socketaddress->sin_port = 0;
if(bind(*sock, (struct sockaddr *) socketaddress, sizeof(struct sockaddr)) == SOCKET_ERROR)
{
return -1;
}
return 0;
}
static int ConnectUDPSocket(SOCKET *sock, struct sockaddr_in *socketaddress, SOCKET *remotesocket)
{
int size = sizeof(struct sockaddr);
if (getsockname(*sock, (struct sockaddr *) socketaddress, &size) == SOCKET_ERROR)
{
return -1;
}
if(size != sizeof(struct sockaddr))
{
return -1;
}
if (connect(*remotesocket, (struct sockaddr *) socketaddress, sizeof(struct sockaddr)) == SOCKET_ERROR)
{
return -1;
}
return 0;
}
static int TestUDPSend(SOCKET *sock, struct sockaddr_in *socketaddress)
{
unsigned short port = socketaddress->sin_port;
int bytessent = sendto(*sock, (char *) &port, sizeof(port), 0, NULL, 0);
if(bytessent != sizeof(port))
{
return -1;
}
return 0;
}
static int TestUDPReceive(SOCKET *sock, SOCKET *remotesocket, struct sockaddr_in *remotesocketaddress)
{
struct sockaddr_in recvfromaddress;
unsigned short readbuffer[2];
int size = sizeof(struct sockaddr);
int bytesreceived = recvfrom(*sock,(char *) &readbuffer, sizeof(readbuffer), 0, (struct sockaddr *) &recvfromaddress, &size) ;
if(bytesreceived != sizeof(unsigned short) || size != sizeof(struct sockaddr) || readbuffer[0] != (unsigned short) remotesocketaddress->sin_port || recvfromaddress.sin_family != remotesocketaddress->sin_family || recvfromaddress.sin_addr.S_un.S_addr != remotesocketaddress->sin_addr.S_un.S_addr || recvfromaddress.sin_port != remotesocketaddress->sin_port)
{
return -1;
}
return 0;
}
static void CloseUDPSocketPair(SOCKET *socketpair)
{
if(socketpair[0] != INVALID_SOCKET)
{
closesocket(socketpair[0]);
}
if(socketpair[1] != INVALID_SOCKET)
{
closesocket(socketpair[1]);
}
}
/*
Windows unnamed pipe emulation, used to enable select()
on a Windows machine for the CALLBACK (pipe-based) transport domain.
*/
int create_winpipe_transport(int *pipefds)
{
SOCKET socketpair[2];
struct sockaddr_in socketaddress[2];
struct timeval waittime = {0, 200000};
fd_set readset;
if (InitUPDSocket(&socketpair[0], &socketaddress[0]))
{
CloseUDPSocketPair(socketpair);
return -1;
}
if (InitUPDSocket(&socketpair[1], &socketaddress[1]))
{
CloseUDPSocketPair(socketpair);
return -1;
}
/*
I have two UDP sockets - now lets connect them to each other.
*/
if (ConnectUDPSocket(&socketpair[0], &socketaddress[0], &socketpair[1]))
{
CloseUDPSocketPair(socketpair);
return -1;
}
if(ConnectUDPSocket(&socketpair[1], &socketaddress[1], &socketpair[0]))
{
CloseUDPSocketPair(socketpair);
return -1;
}
/*
The two sockets are connected to each other, now lets test the connection
by sending the own port number.
*/
if(TestUDPSend(&socketpair[0], &socketaddress[0]))
{
CloseUDPSocketPair(socketpair);
return -1;
}
if(TestUDPSend(&socketpair[1], &socketaddress[1]))
{
CloseUDPSocketPair(socketpair);
return -1;
}
/*
Port numbers sent, now lets select() on the socketpair and check that
both messages got through
*/
FD_ZERO(&readset);
FD_SET(socketpair[0], &readset);
FD_SET(socketpair[1], &readset);
/*
For some unknown reason the timeout setting in the select call does not have
the desired effect, and for yet another unknown reason a Sleep(1) solves this
problem.
*/
Sleep(1);
if(select(0, &readset, NULL, NULL, &waittime) != 2 || !FD_ISSET(socketpair[0], &readset) || !FD_ISSET(socketpair[1], &readset))
{
CloseUDPSocketPair(socketpair);
return -1;
}
/*
Check if the packets I receive were really sent by me, and nobody else
tried to sneak.
*/
if(TestUDPReceive(&socketpair[0], &socketpair[1], &socketaddress[1]))
{
CloseUDPSocketPair(socketpair);
return -1;
}
if(TestUDPReceive(&socketpair[1], &socketpair[0], &socketaddress[0]))
{
CloseUDPSocketPair(socketpair);
return -1;
}
/*
All sanity checks passed, I can return a "UDP pipe"
*/
pipefds[0] = (int) socketpair[0];
pipefds[1] = (int) socketpair[1];
return 0;
}
#endif /* WIN32 */