openwrt-routing/mcproxy/patches/200-uclibc_sourcefilter.patch

139 lines
4.1 KiB
Diff

--- a/mcproxy/src/utils/mc_socket.cpp
+++ b/mcproxy/src/utils/mc_socket.cpp
@@ -37,6 +37,135 @@
#include <numeric>
#include <unistd.h>
+#ifdef __UCLIBC__
+#include <assert.h>
+#include <netax25/ax25.h>
+#include <netipx/ipx.h>
+#include <stdlib.h>
+#include <sys/param.h>
+#include <sys/socket.h>
+
+extern "C" {
+static const struct
+{
+ int sol;
+ int af;
+ socklen_t size;
+} sol_map[] =
+ {
+ /* Sort the array according to importance of the protocols. Add
+ more protocols when they become available. */
+ { SOL_IP, AF_INET, sizeof(struct sockaddr_in) },
+ { SOL_IPV6, AF_INET6, sizeof(struct sockaddr_in6) },
+ { SOL_AX25, AF_AX25, sizeof(struct sockaddr_ax25) },
+ { SOL_IPX, AF_IPX, sizeof(struct sockaddr_ipx) },
+ { SOL_PACKET, AF_PACKET, sizeof(struct sockaddr_ll) }
+ };
+#define NSOL_MAP (sizeof(sol_map) / sizeof(sol_map[0]))
+
+/* Try to determine the socket level value. Ideally both side and
+ family are set. But sometimes only the size is correct and the
+ family value might be bogus. Loop over the array entries and look
+ for a perfect match or the first match based on size. */
+int __get_sol(int af, socklen_t len)
+{
+ int first_size_sol = -1;
+ for (size_t cnt = 0; cnt < NSOL_MAP; ++cnt) {
+ /* Just a test so that we make sure the special value used to
+ signal the "we have so far no socket level value" is OK. */
+ assert(sol_map[cnt].sol != -1);
+
+ if (len == sol_map[cnt].size) {
+ /* The size matches, which is a requirement. If the family
+ matches, too, we have a winner. Otherwise we remember the
+ socket level value for this protocol if it is the first
+ match. */
+ if (af == sol_map[cnt].af)
+ return sol_map[cnt].sol;
+
+ if (first_size_sol == -1)
+ first_size_sol = sol_map[cnt].sol;
+ }
+ }
+
+ return first_size_sol;
+}
+
+int getsourcefilter(int s, uint32_t interface, const struct sockaddr *group,
+ socklen_t grouplen, uint32_t *fmode, uint32_t *numsrc,
+ struct sockaddr_storage *slist)
+{
+ socklen_t needed = GROUP_FILTER_SIZE(*numsrc);
+ struct group_filter *gf;
+
+ gf = (struct group_filter *) malloc(needed);
+ if (gf == NULL)
+ return -1;
+
+ gf->gf_interface = interface;
+ memcpy(&gf->gf_group, group, grouplen);
+ gf->gf_numsrc = *numsrc;
+
+ /* We need to provide the appropriate socket level value. */
+ int result;
+ int sol = __get_sol(group->sa_family, grouplen);
+ if (sol == -1) {
+ result = -1;
+ }
+ else {
+ result = getsockopt(s, sol, MCAST_MSFILTER, gf, &needed);
+
+ /* If successful, copy the results to the places the caller wants
+ them in. */
+ if (result == 0) {
+ *fmode = gf->gf_fmode;
+ memcpy(slist, gf->gf_slist,
+ MIN(*numsrc, gf->gf_numsrc)
+ * sizeof(struct sockaddr_storage));
+ *numsrc = gf->gf_numsrc;
+ }
+ }
+
+ free(gf);
+
+ return result;
+}
+
+int setsourcefilter(int s, uint32_t interface, const struct sockaddr *group,
+ socklen_t grouplen, uint32_t fmode, uint32_t numsrc,
+ const struct sockaddr_storage *slist)
+{
+ /* We have to create an struct ip_msfilter object which we can pass
+ to the kernel. */
+ size_t needed = GROUP_FILTER_SIZE(numsrc);
+ struct group_filter *gf;
+
+ gf = (struct group_filter *) malloc(needed);
+ if (gf == NULL)
+ return -1;
+
+ gf->gf_interface = interface;
+ memcpy(&gf->gf_group, group, grouplen);
+ gf->gf_fmode = fmode;
+ gf->gf_numsrc = numsrc;
+ memcpy(gf->gf_slist, slist, numsrc * sizeof(struct sockaddr_storage));
+
+ /* We need to provide the appropriate socket level value. */
+ int result;
+ int sol = __get_sol(group->sa_family, grouplen);
+ if (sol == -1) {
+ result = -1;
+ }
+ else
+ result = setsockopt(s, sol, MCAST_MSFILTER, gf, needed);
+
+ free(gf);
+
+ return result;
+}
+}
+#endif /* __UCLIBC__ */
+
std::string ipAddrResolver(std::string ipAddr)
{
std::string str[][2] = {