summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2004-10-16 21:41:12 +0000
committerNick Mathewson <nickm@torproject.org>2004-10-16 21:41:12 +0000
commit69d7b468b47da6984a486f6ddd013ff729c18970 (patch)
tree350a6eb4a96f25f10856f20126ad06ff3096fae2
parenta8300c5a2ee1bf8640c74b159f350a4c4871758d (diff)
downloadtor-69d7b468b47da6984a486f6ddd013ff729c18970.tar.gz
tor-69d7b468b47da6984a486f6ddd013ff729c18970.zip
Refactor parse-addr-mask-and-port-range into a separate function
svn:r2540
-rw-r--r--src/common/util.c100
-rw-r--r--src/common/util.h4
2 files changed, 104 insertions, 0 deletions
diff --git a/src/common/util.c b/src/common/util.c
index 613998eb8e..244eb11b4d 100644
--- a/src/common/util.c
+++ b/src/common/util.c
@@ -2117,6 +2117,106 @@ parse_addr_port(const char *addrport, char **address, uint32_t *addr,
return ok ? 0 : -1;
}
+/** Parse a string <b>s</b> in the format of
+ * (IP(/mask|/mask-bits)?|*):(*|port(-maxport)?), setting the various
+ * *out pointers as appropriate. Return 0 on success, -1 on failure.
+ */
+int
+parse_addr_and_port_range(const char *s, uint32_t *addr_out,
+ uint32_t *mask_out, uint16_t *port_min_out,
+ uint16_t *port_max_out)
+{
+ char *address;
+ char *mask, *port, *endptr;
+ struct in_addr in;
+ int bits;
+
+ tor_assert(s && addr_out && mask_out && port_min_out && port_max_out);
+
+ address = tor_strdup(s);
+ /* Break 'address' into separate strings.
+ */
+ mask = strchr(address,'/');
+ port = strchr(mask?mask:address,':');
+ if (mask)
+ *mask++ = '\0';
+ if (port)
+ *port++ = '\0';
+ /* Now "address" is the IP|'*' part...
+ * "mask" is the Mask|Maskbits part...
+ * and "port" is the *|port|min-max part.
+ */
+
+ if (strcmp(address,"*")==0) {
+ *addr_out = 0;
+ } else if (tor_inet_aton(address, &in) != 0) {
+ *addr_out = ntohl(in.s_addr);
+ } else {
+ log_fn(LOG_WARN, "Malformed IP %s in address pattern; rejecting.",address);
+ goto err;
+ }
+
+ if (!mask) {
+ if (strcmp(address,"*")==0)
+ *mask_out = 0;
+ else
+ *mask_out = 0xFFFFFFFFu;
+ } else {
+ endptr = NULL;
+ bits = (int) strtol(mask, &endptr, 10);
+ if (!*endptr) {
+ /* strtol handled the whole mask. */
+ if (bits < 0 || bits > 32) {
+ log_fn(LOG_WARN, "Bad number of mask bits on address range; rejecting.");
+ goto err;
+ }
+ *mask_out = ~((1<<(32-bits))-1);
+ } else if (tor_inet_aton(mask, &in) != 0) {
+ *mask_out = ntohl(in.s_addr);
+ } else {
+ log_fn(LOG_WARN, "Malformed mask %s on address range; rejecting.",
+ mask);
+ goto err;
+ }
+ }
+
+ if (!port || strcmp(port, "*") == 0) {
+ *port_min_out = 1;
+ *port_max_out = 65535;
+ } else {
+ endptr = NULL;
+ *port_min_out = (uint16_t) tor_parse_long(port, 10, 1, 65535,
+ NULL, &endptr);
+ if (*endptr == '-') {
+ port = endptr+1;
+ endptr = NULL;
+ *port_max_out = (uint16_t) tor_parse_long(port, 10, 1, 65535, NULL,
+ &endptr);
+ if (*endptr || !*port_max_out) {
+ log_fn(LOG_WARN, "Malformed port %s on address range rejecting.",
+ port);
+ }
+ } else if (*endptr || !*port_min_out) {
+ log_fn(LOG_WARN, "Malformed port %s on address range; rejecting.",
+ port);
+ goto err;
+ } else {
+ *port_max_out = *port_min_out;
+ }
+ if (*port_min_out > *port_max_out) {
+ log_fn(LOG_WARN,"Insane port range on address policy; rejecting.");
+ goto err;
+ }
+ }
+
+ tor_free(address);
+ return 0;
+ err:
+ tor_free(address);
+ return -1;
+}
+
+
/** Extract a long from the start of s, in the given numeric base. If
* there is unconverted data and next is provided, set *next to the
* first unconverted character. An error has occurred if no characters
diff --git a/src/common/util.h b/src/common/util.h
index 99f326d26d..dd55a81c04 100644
--- a/src/common/util.h
+++ b/src/common/util.h
@@ -248,6 +248,10 @@ int tor_lookup_hostname(const char *name, uint32_t *addr);
int parse_addr_port(const char *addrport, char **address, uint32_t *addr,
uint16_t *port);
+int parse_addr_and_port_range(const char *s, uint32_t *addr_out,
+ uint32_t *mask_out, uint16_t *port_min_out,
+ uint16_t *port_max_out);
+
/* For stupid historical reasons, windows sockets have an independent
* set of errnos, and an independent way to get them. Also, you can't
* always believe WSAEWOULDBLOCK. Use the macros below to compare