Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Contribute to GitLab
Sign in
Toggle navigation
M
mongoose
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
esp
mongoose
Commits
7af9df9f
Commit
7af9df9f
authored
Feb 01, 2012
by
Sergey Lyubka
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Added preliminary IPv6 support
parent
6905a9a0
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
80 additions
and
66 deletions
+80
-66
mongoose.c
mongoose.c
+80
-66
No files found.
mongoose.c
View file @
7af9df9f
...
@@ -366,12 +366,12 @@ static const char *month_names[] = {
...
@@ -366,12 +366,12 @@ static const char *month_names[] = {
// Unified socket address. For IPv6 support, add IPv6 address structure
// Unified socket address. For IPv6 support, add IPv6 address structure
// in the union u.
// in the union u.
struct
usa
{
union
usa
{
socklen_t
len
;
union
{
struct
sockaddr
sa
;
struct
sockaddr
sa
;
struct
sockaddr_in
sin
;
struct
sockaddr_in
sin
;
}
u
;
#if !defined(NO_IPV6)
struct
sockaddr_in6
sin6
;
#endif
};
};
// Describes a string (chunk of memory).
// Describes a string (chunk of memory).
...
@@ -392,8 +392,8 @@ struct mgstat {
...
@@ -392,8 +392,8 @@ struct mgstat {
struct
socket
{
struct
socket
{
struct
socket
*
next
;
// Linkage
struct
socket
*
next
;
// Linkage
SOCKET
sock
;
// Listening socket
SOCKET
sock
;
// Listening socket
struct
usa
lsa
;
// Local socket address
union
usa
lsa
;
// Local socket address
struct
usa
rsa
;
// Remote socket address
union
usa
rsa
;
// Remote socket address
int
is_ssl
;
// Is socket SSL-ed
int
is_ssl
;
// Is socket SSL-ed
int
is_proxy
;
int
is_proxy
;
};
};
...
@@ -506,9 +506,22 @@ const char *mg_get_option(const struct mg_context *ctx, const char *name) {
...
@@ -506,9 +506,22 @@ const char *mg_get_option(const struct mg_context *ctx, const char *name) {
}
}
}
}
static
void
sockaddr_to_string
(
char
*
buf
,
size_t
len
,
const
union
usa
*
usa
)
{
buf
[
0
]
=
'\0'
;
#if !defined(NO_IPV6)
inet_ntop
(
usa
->
sa
.
sa_family
,
usa
->
sa
.
sa_family
==
AF_INET
?
(
void
*
)
&
usa
->
sin
.
sin_addr
:
(
void
*
)
&
usa
->
sin6
.
sin6_addr
,
buf
,
len
);
#else
// TODO(lsm): inet_ntoa is not thread safe, use inet_pton instead
strncpy
(
buf
,
inet_ntoa
(
usa
->
sin
.
sin_addr
),
len
);
#endif
}
// Print error message to the opened error log stream.
// Print error message to the opened error log stream.
static
void
cry
(
struct
mg_connection
*
conn
,
const
char
*
fmt
,
...)
{
static
void
cry
(
struct
mg_connection
*
conn
,
const
char
*
fmt
,
...)
{
char
buf
[
BUFSIZ
];
char
buf
[
BUFSIZ
]
,
src_addr
[
20
]
;
va_list
ap
;
va_list
ap
;
FILE
*
fp
;
FILE
*
fp
;
time_t
timestamp
;
time_t
timestamp
;
...
@@ -529,14 +542,12 @@ static void cry(struct mg_connection *conn, const char *fmt, ...) {
...
@@ -529,14 +542,12 @@ static void cry(struct mg_connection *conn, const char *fmt, ...) {
flockfile
(
fp
);
flockfile
(
fp
);
timestamp
=
time
(
NULL
);
timestamp
=
time
(
NULL
);
(
void
)
fprintf
(
fp
,
sockaddr_to_string
(
src_addr
,
sizeof
(
src_addr
),
&
conn
->
client
.
rsa
);
"[%010lu] [error] [client %s] "
,
fprintf
(
fp
,
"[%010lu] [error] [client %s] "
,
(
unsigned
long
)
timestamp
,
(
unsigned
long
)
timestamp
,
src_addr
);
inet_ntoa
(
conn
->
client
.
rsa
.
u
.
sin
.
sin_addr
));
if
(
conn
->
request_info
.
request_method
!=
NULL
)
{
if
(
conn
->
request_info
.
request_method
!=
NULL
)
{
(
void
)
fprintf
(
fp
,
"%s %s: "
,
fprintf
(
fp
,
"%s %s: "
,
conn
->
request_info
.
request_method
,
conn
->
request_info
.
request_method
,
conn
->
request_info
.
uri
);
conn
->
request_info
.
uri
);
}
}
...
@@ -1603,7 +1614,7 @@ static struct mg_connection *mg_connect(struct mg_connection *conn,
...
@@ -1603,7 +1614,7 @@ static struct mg_connection *mg_connect(struct mg_connection *conn,
closesocket
(
sock
);
closesocket
(
sock
);
}
else
{
}
else
{
newconn
->
client
.
sock
=
sock
;
newconn
->
client
.
sock
=
sock
;
newconn
->
client
.
rsa
.
u
.
sin
=
sin
;
newconn
->
client
.
rsa
.
sin
=
sin
;
if
(
use_ssl
)
{
if
(
use_ssl
)
{
sslize
(
newconn
,
SSL_connect
);
sslize
(
newconn
,
SSL_connect
);
}
}
...
@@ -2818,11 +2829,12 @@ static void prepare_cgi_environment(struct mg_connection *conn,
...
@@ -2818,11 +2829,12 @@ static void prepare_cgi_environment(struct mg_connection *conn,
struct
cgi_env_block
*
blk
)
{
struct
cgi_env_block
*
blk
)
{
const
char
*
s
,
*
slash
;
const
char
*
s
,
*
slash
;
struct
vec
var_vec
;
struct
vec
var_vec
;
char
*
p
;
char
*
p
,
src_addr
[
20
]
;
int
i
;
int
i
;
blk
->
len
=
blk
->
nvars
=
0
;
blk
->
len
=
blk
->
nvars
=
0
;
blk
->
conn
=
conn
;
blk
->
conn
=
conn
;
sockaddr_to_string
(
src_addr
,
sizeof
(
src_addr
),
&
conn
->
client
.
rsa
);
addenv
(
blk
,
"SERVER_NAME=%s"
,
conn
->
ctx
->
config
[
AUTHENTICATION_DOMAIN
]);
addenv
(
blk
,
"SERVER_NAME=%s"
,
conn
->
ctx
->
config
[
AUTHENTICATION_DOMAIN
]);
addenv
(
blk
,
"SERVER_ROOT=%s"
,
conn
->
ctx
->
config
[
DOCUMENT_ROOT
]);
addenv
(
blk
,
"SERVER_ROOT=%s"
,
conn
->
ctx
->
config
[
DOCUMENT_ROOT
]);
...
@@ -2832,10 +2844,12 @@ static void prepare_cgi_environment(struct mg_connection *conn,
...
@@ -2832,10 +2844,12 @@ static void prepare_cgi_environment(struct mg_connection *conn,
addenv
(
blk
,
"%s"
,
"GATEWAY_INTERFACE=CGI/1.1"
);
addenv
(
blk
,
"%s"
,
"GATEWAY_INTERFACE=CGI/1.1"
);
addenv
(
blk
,
"%s"
,
"SERVER_PROTOCOL=HTTP/1.1"
);
addenv
(
blk
,
"%s"
,
"SERVER_PROTOCOL=HTTP/1.1"
);
addenv
(
blk
,
"%s"
,
"REDIRECT_STATUS=200"
);
// For PHP
addenv
(
blk
,
"%s"
,
"REDIRECT_STATUS=200"
);
// For PHP
addenv
(
blk
,
"SERVER_PORT=%d"
,
ntohs
(
conn
->
client
.
lsa
.
u
.
sin
.
sin_port
));
// TODO(lsm): fix this for IPv6 case
addenv
(
blk
,
"SERVER_PORT=%d"
,
ntohs
(
conn
->
client
.
lsa
.
sin
.
sin_port
));
addenv
(
blk
,
"REQUEST_METHOD=%s"
,
conn
->
request_info
.
request_method
);
addenv
(
blk
,
"REQUEST_METHOD=%s"
,
conn
->
request_info
.
request_method
);
addenv
(
blk
,
"REMOTE_ADDR=%s"
,
addenv
(
blk
,
"REMOTE_ADDR=%s"
,
src_addr
);
inet_ntoa
(
conn
->
client
.
rsa
.
u
.
sin
.
sin_addr
));
addenv
(
blk
,
"REMOTE_PORT=%d"
,
conn
->
request_info
.
remote_port
);
addenv
(
blk
,
"REMOTE_PORT=%d"
,
conn
->
request_info
.
remote_port
);
addenv
(
blk
,
"REQUEST_URI=%s"
,
conn
->
request_info
.
uri
);
addenv
(
blk
,
"REQUEST_URI=%s"
,
conn
->
request_info
.
uri
);
...
@@ -3398,35 +3412,35 @@ static void close_all_listening_sockets(struct mg_context *ctx) {
...
@@ -3398,35 +3412,35 @@ static void close_all_listening_sockets(struct mg_context *ctx) {
}
}
}
}
// Valid listening port specification is: [ip_address:]port[s|p]
// Valid listening port specification is: [ip_address:]port[s]
// Examples: 80, 443s, 127.0.0.1:3128p, 1.2.3.4:8080sp
// Examples: 80, 443s, 127.0.0.1:3128,1.2.3.4:8080s
// TODO(lsm): add parsing of the IPv6 address
static
int
parse_port_string
(
const
struct
vec
*
vec
,
struct
socket
*
so
)
{
static
int
parse_port_string
(
const
struct
vec
*
vec
,
struct
socket
*
so
)
{
struct
usa
*
usa
=
&
so
->
lsa
;
int
a
,
b
,
c
,
d
,
port
,
len
;
int
a
,
b
,
c
,
d
,
port
,
len
;
// MacOS needs that. If we do not zero it, subsequent bind() will fail.
// MacOS needs that. If we do not zero it, subsequent bind() will fail.
// Also, all-zeroes in the socket address means binding to all addresses
// for both IPv4 and IPv6 (INADDR_ANY and IN6ADDR_ANY_INIT).
memset
(
so
,
0
,
sizeof
(
*
so
));
memset
(
so
,
0
,
sizeof
(
*
so
));
if
(
sscanf
(
vec
->
ptr
,
"%d.%d.%d.%d:%d%n"
,
&
a
,
&
b
,
&
c
,
&
d
,
&
port
,
&
len
)
==
5
)
{
if
(
sscanf
(
vec
->
ptr
,
"%d.%d.%d.%d:%d%n"
,
&
a
,
&
b
,
&
c
,
&
d
,
&
port
,
&
len
)
==
5
)
{
// IP address to bind to is specified
// Bind to a specific IPv4 address
usa
->
u
.
sin
.
sin_addr
.
s_addr
=
htonl
((
a
<<
24
)
|
(
b
<<
16
)
|
(
c
<<
8
)
|
d
);
so
->
lsa
.
sin
.
sin_addr
.
s_addr
=
htonl
((
a
<<
24
)
|
(
b
<<
16
)
|
(
c
<<
8
)
|
d
);
}
else
if
(
sscanf
(
vec
->
ptr
,
"%d%n"
,
&
port
,
&
len
)
==
1
)
{
}
else
if
(
sscanf
(
vec
->
ptr
,
"%d%n"
,
&
port
,
&
len
)
!=
1
||
// Only port number is specified. Bind to all addresses
len
<=
0
||
usa
->
u
.
sin
.
sin_addr
.
s_addr
=
htonl
(
INADDR_ANY
);
len
>
(
int
)
vec
->
len
||
}
else
{
(
vec
->
ptr
[
len
]
&&
vec
->
ptr
[
len
]
!=
's'
&&
vec
->
ptr
[
len
]
!=
','
))
{
return
0
;
}
assert
(
len
>
0
&&
len
<=
(
int
)
vec
->
len
);
if
(
strchr
(
"sp,"
,
vec
->
ptr
[
len
])
==
NULL
)
{
return
0
;
return
0
;
}
}
so
->
is_ssl
=
vec
->
ptr
[
len
]
==
's'
;
so
->
is_ssl
=
vec
->
ptr
[
len
]
==
's'
;
so
->
is_proxy
=
vec
->
ptr
[
len
]
==
'p'
;
#if !defined(NO_IPV6)
usa
->
len
=
sizeof
(
usa
->
u
.
sin
);
so
->
lsa
.
sin6
.
sin6_family
=
AF_INET6
;
usa
->
u
.
sin
.
sin_family
=
AF_INET
;
so
->
lsa
.
sin6
.
sin6_port
=
htons
((
uint16_t
)
port
);
usa
->
u
.
sin
.
sin_port
=
htons
((
uint16_t
)
port
);
#else
so
->
lsa
.
sin
.
sin_family
=
AF_INET
;
so
->
lsa
.
sin
.
sin_port
=
htons
((
uint16_t
)
port
);
#endif
return
1
;
return
1
;
}
}
...
@@ -3446,7 +3460,8 @@ static int set_ports_option(struct mg_context *ctx) {
...
@@ -3446,7 +3460,8 @@ static int set_ports_option(struct mg_context *ctx) {
}
else
if
(
so
.
is_ssl
&&
ctx
->
ssl_ctx
==
NULL
)
{
}
else
if
(
so
.
is_ssl
&&
ctx
->
ssl_ctx
==
NULL
)
{
cry
(
fc
(
ctx
),
"Cannot add SSL socket, is -ssl_certificate option set?"
);
cry
(
fc
(
ctx
),
"Cannot add SSL socket, is -ssl_certificate option set?"
);
success
=
0
;
success
=
0
;
}
else
if
((
sock
=
socket
(
PF_INET
,
SOCK_STREAM
,
6
))
==
INVALID_SOCKET
||
}
else
if
((
sock
=
socket
(
so
.
lsa
.
sa
.
sa_family
,
SOCK_STREAM
,
6
))
==
INVALID_SOCKET
||
#if !defined(_WIN32)
#if !defined(_WIN32)
// On Windows, SO_REUSEADDR is recommended only for
// On Windows, SO_REUSEADDR is recommended only for
// broadcast UDP sockets
// broadcast UDP sockets
...
@@ -3462,7 +3477,7 @@ static int set_ports_option(struct mg_context *ctx) {
...
@@ -3462,7 +3477,7 @@ static int set_ports_option(struct mg_context *ctx) {
// Thanks to Igor Klopov who suggested the patch.
// Thanks to Igor Klopov who suggested the patch.
setsockopt
(
sock
,
SOL_SOCKET
,
SO_KEEPALIVE
,
(
void
*
)
&
on
,
setsockopt
(
sock
,
SOL_SOCKET
,
SO_KEEPALIVE
,
(
void
*
)
&
on
,
sizeof
(
on
))
!=
0
||
sizeof
(
on
))
!=
0
||
bind
(
sock
,
&
so
.
lsa
.
u
.
sa
,
so
.
lsa
.
len
)
!=
0
||
bind
(
sock
,
&
so
.
lsa
.
sa
,
sizeof
(
so
.
lsa
)
)
!=
0
||
listen
(
sock
,
100
)
!=
0
)
{
listen
(
sock
,
100
)
!=
0
)
{
closesocket
(
sock
);
closesocket
(
sock
);
cry
(
fc
(
ctx
),
"%s: cannot bind to %.*s: %s"
,
__func__
,
cry
(
fc
(
ctx
),
"%s: cannot bind to %.*s: %s"
,
__func__
,
...
@@ -3503,7 +3518,7 @@ static void log_header(const struct mg_connection *conn, const char *header,
...
@@ -3503,7 +3518,7 @@ static void log_header(const struct mg_connection *conn, const char *header,
static
void
log_access
(
const
struct
mg_connection
*
conn
)
{
static
void
log_access
(
const
struct
mg_connection
*
conn
)
{
const
struct
mg_request_info
*
ri
;
const
struct
mg_request_info
*
ri
;
FILE
*
fp
;
FILE
*
fp
;
char
date
[
64
];
char
date
[
64
]
,
src_addr
[
20
]
;
fp
=
conn
->
ctx
->
config
[
ACCESS_LOG_FILE
]
==
NULL
?
NULL
:
fp
=
conn
->
ctx
->
config
[
ACCESS_LOG_FILE
]
==
NULL
?
NULL
:
mg_fopen
(
conn
->
ctx
->
config
[
ACCESS_LOG_FILE
],
"a+"
);
mg_fopen
(
conn
->
ctx
->
config
[
ACCESS_LOG_FILE
],
"a+"
);
...
@@ -3511,29 +3526,25 @@ static void log_access(const struct mg_connection *conn) {
...
@@ -3511,29 +3526,25 @@ static void log_access(const struct mg_connection *conn) {
if
(
fp
==
NULL
)
if
(
fp
==
NULL
)
return
;
return
;
(
void
)
strftime
(
date
,
sizeof
(
date
),
"%d/%b/%Y:%H:%M:%S %z"
,
strftime
(
date
,
sizeof
(
date
),
"%d/%b/%Y:%H:%M:%S %z"
,
localtime
(
&
conn
->
birth_time
));
localtime
(
&
conn
->
birth_time
));
ri
=
&
conn
->
request_info
;
ri
=
&
conn
->
request_info
;
flockfile
(
fp
);
flockfile
(
fp
);
(
void
)
fprintf
(
fp
,
sockaddr_to_string
(
src_addr
,
sizeof
(
src_addr
),
&
conn
->
client
.
rsa
);
"%s - %s [%s]
\"
%s %s HTTP/%s
\"
%d %"
INT64_FMT
,
fprintf
(
fp
,
"%s - %s [%s]
\"
%s %s HTTP/%s
\"
%d %"
INT64_FMT
,
inet_ntoa
(
conn
->
client
.
rsa
.
u
.
sin
.
sin_addr
),
src_addr
,
ri
->
remote_user
==
NULL
?
"-"
:
ri
->
remote_user
,
date
,
ri
->
remote_user
==
NULL
?
"-"
:
ri
->
remote_user
,
date
,
ri
->
request_method
?
ri
->
request_method
:
"-"
,
ri
->
request_method
?
ri
->
request_method
:
"-"
,
ri
->
uri
?
ri
->
uri
:
"-"
,
ri
->
uri
?
ri
->
uri
:
"-"
,
ri
->
http_version
,
ri
->
http_version
,
conn
->
request_info
.
status_code
,
conn
->
num_bytes_sent
);
conn
->
request_info
.
status_code
,
conn
->
num_bytes_sent
);
log_header
(
conn
,
"Referer"
,
fp
);
log_header
(
conn
,
"Referer"
,
fp
);
log_header
(
conn
,
"User-Agent"
,
fp
);
log_header
(
conn
,
"User-Agent"
,
fp
);
(
void
)
fputc
(
'\n'
,
fp
);
fputc
(
'\n'
,
fp
);
(
void
)
fflush
(
fp
);
fflush
(
fp
);
funlockfile
(
fp
);
funlockfile
(
fp
);
(
void
)
fclose
(
fp
);
fclose
(
fp
);
}
}
static
int
isbyte
(
int
n
)
{
static
int
isbyte
(
int
n
)
{
...
@@ -3542,7 +3553,7 @@ static int isbyte(int n) {
...
@@ -3542,7 +3553,7 @@ static int isbyte(int n) {
// Verify given socket address against the ACL.
// Verify given socket address against the ACL.
// Return -1 if ACL is malformed, 0 if address is disallowed, 1 if allowed.
// Return -1 if ACL is malformed, 0 if address is disallowed, 1 if allowed.
static
int
check_acl
(
struct
mg_context
*
ctx
,
const
struct
usa
*
usa
)
{
static
int
check_acl
(
struct
mg_context
*
ctx
,
const
union
usa
*
usa
)
{
int
a
,
b
,
c
,
d
,
n
,
mask
,
allowed
;
int
a
,
b
,
c
,
d
,
n
,
mask
,
allowed
;
char
flag
;
char
flag
;
uint32_t
acl_subnet
,
acl_mask
,
remote_ip
;
uint32_t
acl_subnet
,
acl_mask
,
remote_ip
;
...
@@ -3553,7 +3564,7 @@ static int check_acl(struct mg_context *ctx, const struct usa *usa) {
...
@@ -3553,7 +3564,7 @@ static int check_acl(struct mg_context *ctx, const struct usa *usa) {
return
1
;
return
1
;
}
}
(
void
)
memcpy
(
&
remote_ip
,
&
usa
->
u
.
sin
.
sin_addr
,
sizeof
(
remote_ip
));
(
void
)
memcpy
(
&
remote_ip
,
&
usa
->
sin
.
sin_addr
,
sizeof
(
remote_ip
));
// If any ACL is set, deny by default
// If any ACL is set, deny by default
allowed
=
'-'
;
allowed
=
'-'
;
...
@@ -3760,7 +3771,7 @@ static int set_gpass_option(struct mg_context *ctx) {
...
@@ -3760,7 +3771,7 @@ static int set_gpass_option(struct mg_context *ctx) {
}
}
static
int
set_acl_option
(
struct
mg_context
*
ctx
)
{
static
int
set_acl_option
(
struct
mg_context
*
ctx
)
{
struct
usa
fake
;
union
usa
fake
;
return
check_acl
(
ctx
,
&
fake
)
!=
-
1
;
return
check_acl
(
ctx
,
&
fake
)
!=
-
1
;
}
}
...
@@ -4015,9 +4026,10 @@ static void worker_thread(struct mg_context *ctx) {
...
@@ -4015,9 +4026,10 @@ static void worker_thread(struct mg_context *ctx) {
// Fill in IP, port info early so even if SSL setup below fails,
// Fill in IP, port info early so even if SSL setup below fails,
// error handler would have the corresponding info.
// error handler would have the corresponding info.
// Thanks to Johannes Winkelmann for the patch.
// Thanks to Johannes Winkelmann for the patch.
conn
->
request_info
.
remote_port
=
ntohs
(
conn
->
client
.
rsa
.
u
.
sin
.
sin_port
);
// TODO(lsm): Fix IPv6 case
conn
->
request_info
.
remote_port
=
ntohs
(
conn
->
client
.
rsa
.
sin
.
sin_port
);
memcpy
(
&
conn
->
request_info
.
remote_ip
,
memcpy
(
&
conn
->
request_info
.
remote_ip
,
&
conn
->
client
.
rsa
.
u
.
sin
.
sin_addr
.
s_addr
,
4
);
&
conn
->
client
.
rsa
.
sin
.
sin_addr
.
s_addr
,
4
);
conn
->
request_info
.
remote_ip
=
ntohl
(
conn
->
request_info
.
remote_ip
);
conn
->
request_info
.
remote_ip
=
ntohl
(
conn
->
request_info
.
remote_ip
);
conn
->
request_info
.
is_ssl
=
conn
->
client
.
is_ssl
;
conn
->
request_info
.
is_ssl
=
conn
->
client
.
is_ssl
;
...
@@ -4064,11 +4076,13 @@ static void produce_socket(struct mg_context *ctx, const struct socket *sp) {
...
@@ -4064,11 +4076,13 @@ static void produce_socket(struct mg_context *ctx, const struct socket *sp) {
static
void
accept_new_connection
(
const
struct
socket
*
listener
,
static
void
accept_new_connection
(
const
struct
socket
*
listener
,
struct
mg_context
*
ctx
)
{
struct
mg_context
*
ctx
)
{
struct
socket
accepted
;
struct
socket
accepted
;
char
src_addr
[
20
];
socklen_t
len
;
int
allowed
;
int
allowed
;
accepted
.
rsa
.
len
=
sizeof
(
accepted
.
rsa
.
u
.
sin
);
len
=
sizeof
(
accepted
.
rsa
);
accepted
.
lsa
=
listener
->
lsa
;
accepted
.
lsa
=
listener
->
lsa
;
accepted
.
sock
=
accept
(
listener
->
sock
,
&
accepted
.
rsa
.
u
.
sa
,
&
accepted
.
rsa
.
len
);
accepted
.
sock
=
accept
(
listener
->
sock
,
&
accepted
.
rsa
.
sa
,
&
len
);
if
(
accepted
.
sock
!=
INVALID_SOCKET
)
{
if
(
accepted
.
sock
!=
INVALID_SOCKET
)
{
allowed
=
check_acl
(
ctx
,
&
accepted
.
rsa
);
allowed
=
check_acl
(
ctx
,
&
accepted
.
rsa
);
if
(
allowed
)
{
if
(
allowed
)
{
...
@@ -4078,8 +4092,8 @@ static void accept_new_connection(const struct socket *listener,
...
@@ -4078,8 +4092,8 @@ static void accept_new_connection(const struct socket *listener,
accepted
.
is_proxy
=
listener
->
is_proxy
;
accepted
.
is_proxy
=
listener
->
is_proxy
;
produce_socket
(
ctx
,
&
accepted
);
produce_socket
(
ctx
,
&
accepted
);
}
else
{
}
else
{
cry
(
fc
(
ctx
),
"%s: %s is not allowed to connect"
,
sockaddr_to_string
(
src_addr
,
sizeof
(
src_addr
),
&
accepted
.
rsa
);
__func__
,
inet_ntoa
(
accepted
.
rsa
.
u
.
sin
.
sin_addr
)
);
cry
(
fc
(
ctx
),
"%s: %s is not allowed to connect"
,
__func__
,
src_addr
);
(
void
)
closesocket
(
accepted
.
sock
);
(
void
)
closesocket
(
accepted
.
sock
);
}
}
}
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment