utils.c revision 31386
1/*
2 * Copyright (c) 1988, 1992 The University of Utah and the Center
3 *	for Software Science (CSS).
4 * Copyright (c) 1992, 1993
5 *	The Regents of the University of California.  All rights reserved.
6 *
7 * This code is derived from software contributed to Berkeley by
8 * the Center for Software Science of the University of Utah Computer
9 * Science Department.  CSS requests users of this software to return
10 * to css-dist@cs.utah.edu any improvements that they make and grant
11 * CSS redistribution rights.
12 *
13 * Redistribution and use in source and binary forms, with or without
14 * modification, are permitted provided that the following conditions
15 * are met:
16 * 1. Redistributions of source code must retain the above copyright
17 *    notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 *    notice, this list of conditions and the following disclaimer in the
20 *    documentation and/or other materials provided with the distribution.
21 * 3. All advertising materials mentioning features or use of this software
22 *    must display the following acknowledgement:
23 *	This product includes software developed by the University of
24 *	California, Berkeley and its contributors.
25 * 4. Neither the name of the University nor the names of its contributors
26 *    may be used to endorse or promote products derived from this software
27 *    without specific prior written permission.
28 *
29 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
30 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
31 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
32 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
33 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
34 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
35 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
37 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
38 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 * SUCH DAMAGE.
40 *
41 *	from: @(#)utils.c	8.1 (Berkeley) 6/4/93
42 *
43 * From: Utah Hdr: utils.c 3.1 92/07/06
44 * Author: Jeff Forys, University of Utah CSS
45 */
46
47#ifndef lint
48#if 0
49static const char sccsid[] = "@(#)utils.c	8.1 (Berkeley) 6/4/93";
50#endif
51static const char rcsid[] =
52	"$Id$";
53#endif /* not lint */
54
55#include <sys/param.h>
56#include <sys/time.h>
57
58#include <fcntl.h>
59#include <signal.h>
60#include <stdio.h>
61#include <stdlib.h>
62#include <string.h>
63#include <syslog.h>
64#include <time.h>
65#include <unistd.h>
66#include "defs.h"
67
68/*
69**  DispPkt -- Display the contents of an RMPCONN packet.
70**
71**	Parameters:
72**		rconn - packet to be displayed.
73**		direct - direction packet is going (DIR_*).
74**
75**	Returns:
76**		Nothing.
77**
78**	Side Effects:
79**		None.
80*/
81void
82DispPkt(rconn, direct)
83	RMPCONN *rconn;
84	int direct;
85{
86	static char BootFmt[] = "\t\tRetCode:%u SeqNo:%lx SessID:%x Vers:%u";
87	static char ReadFmt[] = "\t\tRetCode:%u Offset:%lx SessID:%x\n";
88
89	struct tm *tmp;
90	struct rmp_packet *rmp;
91	int i, omask;
92	u_int32_t t;
93
94	/*
95	 *  Since we will be working with RmpConns as well as DbgFp, we
96	 *  must block signals that can affect either.
97	 */
98	omask = sigblock(sigmask(SIGHUP)|sigmask(SIGUSR1)|sigmask(SIGUSR2));
99
100	if (DbgFp == NULL) {			/* sanity */
101		(void) sigsetmask(omask);
102		return;
103	}
104
105	/* display direction packet is going using '>>>' or '<<<' */
106	fputs((direct==DIR_RCVD)?"<<< ":(direct==DIR_SENT)?">>> ":"", DbgFp);
107
108	/* display packet timestamp */
109	tmp = localtime((time_t *)&rconn->tstamp.tv_sec);
110	fprintf(DbgFp, "%02d:%02d:%02d.%06ld   ", tmp->tm_hour, tmp->tm_min,
111	        tmp->tm_sec, rconn->tstamp.tv_usec);
112
113	/* display src or dst addr and information about network interface */
114	fprintf(DbgFp, "Addr: %s   Intf: %s\n", EnetStr(rconn), IntfName);
115
116	rmp = &rconn->rmp;
117
118	/* display IEEE 802.2 Logical Link Control header */
119	(void) fprintf(DbgFp, "\t802.2 LLC: DSAP:%x SSAP:%x CTRL:%x\n",
120               rmp->hp_llc.dsap, rmp->hp_llc.ssap, ntohs(rmp->hp_llc.cntrl));
121
122	/* display HP extensions to 802.2 Logical Link Control header */
123	(void) fprintf(DbgFp, "\tHP Ext:    DXSAP:%x SXSAP:%x\n",
124	               ntohs(rmp->hp_llc.dxsap), ntohs(rmp->hp_llc.sxsap));
125
126	/*
127	 *  Display information about RMP packet using type field to
128	 *  determine what kind of packet this is.
129	 */
130	switch(rmp->r_type) {
131		case RMP_BOOT_REQ:		/* boot request */
132			(void) fprintf(DbgFp, "\tBoot Request:");
133			GETWORD(rmp->r_brq.rmp_seqno, t);
134			if (ntohs(rmp->r_brq.rmp_session) == RMP_PROBESID) {
135				if (WORDZE(rmp->r_brq.rmp_seqno))
136					fputs(" (Send Server ID)", DbgFp);
137				else
138					fprintf(DbgFp," (Send Filename #%u)",t);
139			}
140			(void) fputc('\n', DbgFp);
141			(void) fprintf(DbgFp, BootFmt, rmp->r_brq.rmp_retcode,
142			        t, ntohs(rmp->r_brq.rmp_session),
143			        ntohs(rmp->r_brq.rmp_version));
144			(void) fprintf(DbgFp, "\n\t\tMachine Type: ");
145			for (i = 0; i < RMP_MACHLEN; i++)
146				(void) fputc(rmp->r_brq.rmp_machtype[i], DbgFp);
147			DspFlnm(rmp->r_brq.rmp_flnmsize, &rmp->r_brq.rmp_flnm);
148			break;
149		case RMP_BOOT_REPL:		/* boot reply */
150			fprintf(DbgFp, "\tBoot Reply:\n");
151			GETWORD(rmp->r_brpl.rmp_seqno, t);
152			(void) fprintf(DbgFp, BootFmt, rmp->r_brpl.rmp_retcode,
153			        t, ntohs(rmp->r_brpl.rmp_session),
154			        ntohs(rmp->r_brpl.rmp_version));
155			DspFlnm(rmp->r_brpl.rmp_flnmsize,&rmp->r_brpl.rmp_flnm);
156			break;
157		case RMP_READ_REQ:		/* read request */
158			(void) fprintf(DbgFp, "\tRead Request:\n");
159			GETWORD(rmp->r_rrq.rmp_offset, t);
160			(void) fprintf(DbgFp, ReadFmt, rmp->r_rrq.rmp_retcode,
161			        t, ntohs(rmp->r_rrq.rmp_session));
162			(void) fprintf(DbgFp, "\t\tNoOfBytes: %u\n",
163			        ntohs(rmp->r_rrq.rmp_size));
164			break;
165		case RMP_READ_REPL:		/* read reply */
166			(void) fprintf(DbgFp, "\tRead Reply:\n");
167			GETWORD(rmp->r_rrpl.rmp_offset, t);
168			(void) fprintf(DbgFp, ReadFmt, rmp->r_rrpl.rmp_retcode,
169			        t, ntohs(rmp->r_rrpl.rmp_session));
170			(void) fprintf(DbgFp, "\t\tNoOfBytesSent: %d\n",
171			        rconn->rmplen - RMPREADSIZE(0));
172			break;
173		case RMP_BOOT_DONE:		/* boot complete */
174			(void) fprintf(DbgFp, "\tBoot Complete:\n");
175			(void) fprintf(DbgFp, "\t\tRetCode:%u SessID:%x\n",
176			        rmp->r_done.rmp_retcode,
177			        ntohs(rmp->r_done.rmp_session));
178			break;
179		default:			/* ??? */
180			(void) fprintf(DbgFp, "\tUnknown Type:(%d)\n",
181				rmp->r_type);
182	}
183	(void) fputc('\n', DbgFp);
184	(void) fflush(DbgFp);
185
186	(void) sigsetmask(omask);		/* reset old signal mask */
187}
188
189
190/*
191**  GetEtherAddr -- convert an RMP (Ethernet) address into a string.
192**
193**	An RMP BOOT packet has been received.  Look at the type field
194**	and process Boot Requests, Read Requests, and Boot Complete
195**	packets.  Any other type will be dropped with a warning msg.
196**
197**	Parameters:
198**		addr - array of RMP_ADDRLEN bytes.
199**
200**	Returns:
201**		Pointer to static string representation of `addr'.
202**
203**	Side Effects:
204**		None.
205**
206**	Warnings:
207**		- The return value points to a static buffer; it must
208**		  be copied if it's to be saved.
209*/
210char *
211GetEtherAddr(addr)
212	u_int8_t *addr;
213{
214	static char Hex[] = "0123456789abcdef";
215	static char etherstr[RMP_ADDRLEN*3];
216	int i;
217	char *cp;
218
219	/*
220	 *  For each byte in `addr', convert it to "<hexchar><hexchar>:".
221	 *  The last byte does not get a trailing `:' appended.
222	 */
223	i = 0;
224	cp = etherstr;
225	for(;;) {
226		*cp++ = Hex[*addr >> 4 & 0xf];
227		*cp++ = Hex[*addr++ & 0xf];
228		if (++i == RMP_ADDRLEN)
229			break;
230		*cp++ = ':';
231	}
232	*cp = '\0';
233
234	return(etherstr);
235}
236
237
238/*
239**  DispFlnm -- Print a string of bytes to DbgFp (often, a file name).
240**
241**	Parameters:
242**		size - number of bytes to print.
243**		flnm - address of first byte.
244**
245**	Returns:
246**		Nothing.
247**
248**	Side Effects:
249**		- Characters are sent to `DbgFp'.
250*/
251void
252DspFlnm(size, flnm)
253	u_int size;
254	char *flnm;
255{
256	int i;
257
258	(void) fprintf(DbgFp, "\n\t\tFile Name (%u): <", size);
259	for (i = 0; i < size; i++)
260		(void) fputc(*flnm++, DbgFp);
261	(void) fputs(">\n", DbgFp);
262}
263
264
265/*
266**  NewClient -- allocate memory for a new CLIENT.
267**
268**	Parameters:
269**		addr - RMP (Ethernet) address of new client.
270**
271**	Returns:
272**		Ptr to new CLIENT or NULL if we ran out of memory.
273**
274**	Side Effects:
275**		- Memory will be malloc'd for the new CLIENT.
276**		- If malloc() fails, a log message will be generated.
277*/
278CLIENT *
279NewClient(addr)
280	u_int8_t *addr;
281{
282	CLIENT *ctmp;
283
284	if ((ctmp = (CLIENT *) malloc(sizeof(CLIENT))) == NULL) {
285		syslog(LOG_ERR, "NewClient: out of memory (%s)",
286		       GetEtherAddr(addr));
287		return(NULL);
288	}
289
290	memset(ctmp, 0, sizeof(CLIENT));
291	memmove(&ctmp->addr[0], addr, RMP_ADDRLEN);
292	return(ctmp);
293}
294
295/*
296**  FreeClient -- free linked list of Clients.
297**
298**	Parameters:
299**		None.
300**
301**	Returns:
302**		Nothing.
303**
304**	Side Effects:
305**		- All malloc'd memory associated with the linked list of
306**		  CLIENTS will be free'd; `Clients' will be set to NULL.
307**
308**	Warnings:
309**		- This routine must be called with SIGHUP blocked.
310*/
311void
312FreeClients()
313{
314	CLIENT *ctmp;
315
316	while (Clients != NULL) {
317		ctmp = Clients;
318		Clients = Clients->next;
319		FreeClient(ctmp);
320	}
321}
322
323/*
324**  NewStr -- allocate memory for a character array.
325**
326**	Parameters:
327**		str - null terminated character array.
328**
329**	Returns:
330**		Ptr to new character array or NULL if we ran out of memory.
331**
332**	Side Effects:
333**		- Memory will be malloc'd for the new character array.
334**		- If malloc() fails, a log message will be generated.
335*/
336char *
337NewStr(str)
338	char *str;
339{
340	char *stmp;
341
342	if ((stmp = (char *)malloc((unsigned) (strlen(str)+1))) == NULL) {
343		syslog(LOG_ERR, "NewStr: out of memory (%s)", str);
344		return(NULL);
345	}
346
347	(void) strcpy(stmp, str);
348	return(stmp);
349}
350
351/*
352**  To save time, NewConn and FreeConn maintain a cache of one RMPCONN
353**  in `LastFree' (defined below).
354*/
355
356static RMPCONN *LastFree = NULL;
357
358/*
359**  NewConn -- allocate memory for a new RMPCONN connection.
360**
361**	Parameters:
362**		rconn - initialization template for new connection.
363**
364**	Returns:
365**		Ptr to new RMPCONN or NULL if we ran out of memory.
366**
367**	Side Effects:
368**		- Memory may be malloc'd for the new RMPCONN (if not cached).
369**		- If malloc() fails, a log message will be generated.
370*/
371RMPCONN *
372NewConn(rconn)
373	RMPCONN *rconn;
374{
375	RMPCONN *rtmp;
376
377	if (LastFree == NULL) {		/* nothing cached; make a new one */
378		if ((rtmp = (RMPCONN *) malloc(sizeof(RMPCONN))) == NULL) {
379			syslog(LOG_ERR, "NewConn: out of memory (%s)",
380			       EnetStr(rconn));
381			return(NULL);
382		}
383	} else {			/* use the cached RMPCONN */
384		rtmp = LastFree;
385		LastFree = NULL;
386	}
387
388	/*
389	 *  Copy template into `rtmp', init file descriptor to `-1' and
390	 *  set ptr to next elem NULL.
391	 */
392	memmove((char *)rtmp, (char *)rconn, sizeof(RMPCONN));
393	rtmp->bootfd = -1;
394	rtmp->next = NULL;
395
396	return(rtmp);
397}
398
399/*
400**  FreeConn -- Free memory associated with an RMPCONN connection.
401**
402**	Parameters:
403**		rtmp - ptr to RMPCONN to be free'd.
404**
405**	Returns:
406**		Nothing.
407**
408**	Side Effects:
409**		- Memory associated with `rtmp' may be free'd (or cached).
410**		- File desc associated with `rtmp->bootfd' will be closed.
411*/
412void
413FreeConn(rtmp)
414	RMPCONN *rtmp;
415{
416	/*
417	 *  If the file descriptor is in use, close the file.
418	 */
419	if (rtmp->bootfd >= 0) {
420		(void) close(rtmp->bootfd);
421		rtmp->bootfd = -1;
422	}
423
424	if (LastFree == NULL)		/* cache for next time */
425		rtmp = LastFree;
426	else				/* already one cached; free this one */
427		free((char *)rtmp);
428}
429
430/*
431**  FreeConns -- free linked list of RMPCONN connections.
432**
433**	Parameters:
434**		None.
435**
436**	Returns:
437**		Nothing.
438**
439**	Side Effects:
440**		- All malloc'd memory associated with the linked list of
441**		  connections will be free'd; `RmpConns' will be set to NULL.
442**		- If LastFree is != NULL, it too will be free'd & NULL'd.
443**
444**	Warnings:
445**		- This routine must be called with SIGHUP blocked.
446*/
447void
448FreeConns()
449{
450	RMPCONN *rtmp;
451
452	while (RmpConns != NULL) {
453		rtmp = RmpConns;
454		RmpConns = RmpConns->next;
455		FreeConn(rtmp);
456	}
457
458	if (LastFree != NULL) {
459		free((char *)LastFree);
460		LastFree = NULL;
461	}
462}
463
464/*
465**  AddConn -- Add a connection to the linked list of connections.
466**
467**	Parameters:
468**		rconn - connection to be added.
469**
470**	Returns:
471**		Nothing.
472**
473**	Side Effects:
474**		- RmpConn will point to new connection.
475**
476**	Warnings:
477**		- This routine must be called with SIGHUP blocked.
478*/
479void
480AddConn(rconn)
481	RMPCONN *rconn;
482{
483	if (RmpConns != NULL)
484		rconn->next = RmpConns;
485	RmpConns = rconn;
486}
487
488/*
489**  FindConn -- Find a connection in the linked list of connections.
490**
491**	We use the RMP (Ethernet) address as the basis for determining
492**	if this is the same connection.  According to the Remote Maint
493**	Protocol, we can only have one connection with any machine.
494**
495**	Parameters:
496**		rconn - connection to be found.
497**
498**	Returns:
499**		Matching connection from linked list or NULL if not found.
500**
501**	Side Effects:
502**		None.
503**
504**	Warnings:
505**		- This routine must be called with SIGHUP blocked.
506*/
507RMPCONN *
508FindConn(rconn)
509	RMPCONN *rconn;
510{
511	RMPCONN *rtmp;
512
513	for (rtmp = RmpConns; rtmp != NULL; rtmp = rtmp->next)
514		if (bcmp((char *)&rconn->rmp.hp_hdr.saddr[0],
515		         (char *)&rtmp->rmp.hp_hdr.saddr[0], RMP_ADDRLEN) == 0)
516			break;
517
518	return(rtmp);
519}
520
521/*
522**  RemoveConn -- Remove a connection from the linked list of connections.
523**
524**	Parameters:
525**		rconn - connection to be removed.
526**
527**	Returns:
528**		Nothing.
529**
530**	Side Effects:
531**		- If found, an RMPCONN will cease to exist and it will
532**		  be removed from the linked list.
533**
534**	Warnings:
535**		- This routine must be called with SIGHUP blocked.
536*/
537void
538RemoveConn(rconn)
539	RMPCONN *rconn;
540{
541	RMPCONN *thisrconn, *lastrconn;
542
543	if (RmpConns == rconn) {		/* easy case */
544		RmpConns = RmpConns->next;
545		FreeConn(rconn);
546	} else {				/* must traverse linked list */
547		lastrconn = RmpConns;			/* set back ptr */
548		thisrconn = lastrconn->next;		/* set current ptr */
549		while (thisrconn != NULL) {
550			if (rconn == thisrconn) {		/* found it */
551				lastrconn->next = thisrconn->next;
552				FreeConn(thisrconn);
553				break;
554			}
555			lastrconn = thisrconn;
556			thisrconn = thisrconn->next;
557		}
558	}
559}
560