keysock.c
来自「eCos操作系统源码」· C语言 代码 · 共 753 行 · 第 1/2 页
C
753 行
} n->m_len = MCLBYTES; } if (tlen < n->m_len) n->m_len = tlen; n->m_next = NULL; if (m == NULL) m = mprev = n; else { mprev->m_next = n; mprev = n; } tlen -= n->m_len; n = NULL; } m->m_pkthdr.len = len; m->m_pkthdr.rcvif = NULL; m_copyback(m, 0, len, (caddr_t)msg); /* avoid duplicated statistics */ pfkeystat.in_total--; pfkeystat.in_bytes -= len; pfkeystat.in_msgtype[msg->sadb_msg_type]--; return key_sendup_mbuf(so, m, target);}/* so can be NULL if target != KEY_SENDUP_ONE */intkey_sendup_mbuf(so, m, target) struct socket *so; struct mbuf *m; int target;{ struct mbuf *n; struct keycb *kp; int sendup; struct rawcb *rp; int error = 0; if (m == NULL) panic("key_sendup_mbuf: NULL pointer was passed.\n"); if (so == NULL && target == KEY_SENDUP_ONE) panic("key_sendup_mbuf: NULL pointer was passed.\n"); pfkeystat.in_total++; pfkeystat.in_bytes += m->m_pkthdr.len; if (m->m_len < sizeof(struct sadb_msg)) {#if 1 m = m_pullup(m, sizeof(struct sadb_msg)); if (m == NULL) { pfkeystat.in_nomem++; return ENOBUFS; }#else /* don't bother pulling it up just for stats */#endif } if (m->m_len >= sizeof(struct sadb_msg)) { struct sadb_msg *msg; msg = mtod(m, struct sadb_msg *); pfkeystat.in_msgtype[msg->sadb_msg_type]++; }#ifdef __NetBSD__ for (rp = rawcb.lh_first; rp; rp = rp->rcb_list.le_next)#elif defined(__FreeBSD__) && __FreeBSD__ >= 3 LIST_FOREACH(rp, &rawcb_list, list)#else for (rp = rawcb.rcb_next; rp != &rawcb; rp = rp->rcb_next)#endif { if (rp->rcb_proto.sp_family != PF_KEY) continue; if (rp->rcb_proto.sp_protocol && rp->rcb_proto.sp_protocol != PF_KEY_V2) { continue; } kp = (struct keycb *)rp; /* * If you are in promiscuous mode, and when you get broadcasted * reply, you'll get two PF_KEY messages. * (based on pf_key@inner.net message on 14 Oct 1998) */ if (((struct keycb *)rp)->kp_promisc) { if ((n = m_copy(m, 0, (int)M_COPYALL)) != NULL) { (void)key_sendup0(rp, n, 1); n = NULL; } } /* the exact target will be processed later */ if (so && sotorawcb(so) == rp) continue; sendup = 0; switch (target) { case KEY_SENDUP_ONE: /* the statement has no effect */ if (so && sotorawcb(so) == rp) sendup++; break; case KEY_SENDUP_ALL: sendup++; break; case KEY_SENDUP_REGISTERED: if (kp->kp_registered) sendup++; break; } pfkeystat.in_msgtarget[target]++; if (!sendup) continue; if ((n = m_copy(m, 0, (int)M_COPYALL)) == NULL) { m_freem(m); pfkeystat.in_nomem++; return ENOBUFS; } if ((error = key_sendup0(rp, n, 0)) != 0) { m_freem(m); return error; } n = NULL; } if (so) { error = key_sendup0(sotorawcb(so), m, 0); m = NULL; } else { error = 0; m_freem(m); } return error;}#if defined(__FreeBSD__) && __FreeBSD__ >= 3/* * key_abort() * derived from net/rtsock.c:rts_abort() */static intkey_abort(struct socket *so){ int s, error; s = splnet(); error = raw_usrreqs.pru_abort(so); splx(s); return error;}/* * key_attach() * derived from net/rtsock.c:rts_attach() */static intkey_attach(struct socket *so, int proto, struct proc *p){ struct keycb *kp; int s, error; if (sotorawcb(so) != 0) return EISCONN; /* XXX panic? */ kp = (struct keycb *)malloc(sizeof *kp, M_PCB, M_WAITOK); /* XXX */ if (kp == 0) return ENOBUFS; bzero(kp, sizeof *kp); /* * The splnet() is necessary to block protocols from sending * error notifications (like RTM_REDIRECT or RTM_LOSING) while * this PCB is extant but incompletely initialized. * Probably we should try to do more of this work beforehand and * eliminate the spl. */ s = splnet(); so->so_pcb = (caddr_t)kp; error = raw_usrreqs.pru_attach(so, proto, p); kp = (struct keycb *)sotorawcb(so); if (error) { free(kp, M_PCB); so->so_pcb = (caddr_t) 0; splx(s); return error; } kp->kp_promisc = kp->kp_registered = 0; if (kp->kp_raw.rcb_proto.sp_protocol == PF_KEY) /* XXX: AF_KEY */ key_cb.key_count++; key_cb.any_count++; kp->kp_raw.rcb_laddr = &key_src; kp->kp_raw.rcb_faddr = &key_dst; soisconnected(so); so->so_options |= SO_USELOOPBACK; splx(s); return 0;}/* * key_bind() * derived from net/rtsock.c:rts_bind() */static intkey_bind(struct socket *so, struct sockaddr *nam, struct proc *p){ int s, error; s = splnet(); error = raw_usrreqs.pru_bind(so, nam, p); /* xxx just EINVAL */ splx(s); return error;}/* * key_connect() * derived from net/rtsock.c:rts_connect() */static intkey_connect(struct socket *so, struct sockaddr *nam, struct proc *p){ int s, error; s = splnet(); error = raw_usrreqs.pru_connect(so, nam, p); /* XXX just EINVAL */ splx(s); return error;}/* * key_detach() * derived from net/rtsock.c:rts_detach() */static intkey_detach(struct socket *so){ struct keycb *kp = (struct keycb *)sotorawcb(so); int s, error; s = splnet(); if (kp != 0) { if (kp->kp_raw.rcb_proto.sp_protocol == PF_KEY) /* XXX: AF_KEY */ key_cb.key_count--; key_cb.any_count--; key_freereg(so); } error = raw_usrreqs.pru_detach(so); splx(s); return error;}/* * key_disconnect() * derived from net/rtsock.c:key_disconnect() */static intkey_disconnect(struct socket *so){ int s, error; s = splnet(); error = raw_usrreqs.pru_disconnect(so); splx(s); return error;}/* * key_peeraddr() * derived from net/rtsock.c:rts_peeraddr() */static intkey_peeraddr(struct socket *so, struct sockaddr **nam){ int s, error; s = splnet(); error = raw_usrreqs.pru_peeraddr(so, nam); splx(s); return error;}/* * key_send() * derived from net/rtsock.c:rts_send() */static intkey_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam, struct mbuf *control, struct proc *p){ int s, error; s = splnet(); error = raw_usrreqs.pru_send(so, flags, m, nam, control, p); splx(s); return error;}/* * key_shutdown() * derived from net/rtsock.c:rts_shutdown() */static intkey_shutdown(struct socket *so){ int s, error; s = splnet(); error = raw_usrreqs.pru_shutdown(so); splx(s); return error;}/* * key_sockaddr() * derived from net/rtsock.c:rts_sockaddr() */static intkey_sockaddr(struct socket *so, struct sockaddr **nam){ int s, error; s = splnet(); error = raw_usrreqs.pru_sockaddr(so, nam); splx(s); return error;}struct pr_usrreqs key_usrreqs = { key_abort, pru_accept_notsupp, key_attach, key_bind, key_connect, pru_connect2_notsupp, pru_control_notsupp, key_detach, key_disconnect, pru_listen_notsupp, key_peeraddr, pru_rcvd_notsupp, pru_rcvoob_notsupp, key_send, pru_sense_null, key_shutdown, key_sockaddr, sosend, soreceive, sopoll};#endif /* __FreeBSD__ >= 3 */#ifdef __FreeBSD__/* sysctl */SYSCTL_NODE(_net, PF_KEY, key, CTLFLAG_RW, 0, "Key Family");#endif/* * Definitions of protocols supported in the KEY domain. */extern struct domain keydomain;struct protosw keysw[] = {{ SOCK_RAW, &keydomain, PF_KEY_V2, PR_ATOMIC|PR_ADDR, 0, key_output, raw_ctlinput, 0,#if defined(__FreeBSD__) && __FreeBSD__ >= 3 0,#else key_usrreq,#endif raw_init, 0, 0, 0,#if defined(__bsdi__) || defined(__NetBSD__) key_sysctl,#elif defined(__FreeBSD__) && __FreeBSD__ >= 3 &key_usrreqs#endif}};struct domain keydomain = { PF_KEY, "key", key_init, 0, 0, keysw, &keysw[sizeof(keysw)/sizeof(keysw[0])] };#ifdef __FreeBSD__DOMAIN_SET(key);#endif
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?