92ea0a646c871db9fdd8b7e9238def03d4da8266
[tripe] / admin.c
1 /* -*-c-*-
2 *
3 * $Id$
4 *
5 * Admin interface for configuration
6 *
7 * (c) 2001 Straylight/Edgeware
8 */
9
10 /*----- Licensing notice --------------------------------------------------*
11 *
12 * This file is part of Trivial IP Encryption (TrIPE).
13 *
14 * TrIPE is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
18 *
19 * TrIPE is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
23 *
24 * You should have received a copy of the GNU General Public License
25 * along with TrIPE; if not, write to the Free Software Foundation,
26 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
27 */
28
29 /*----- Header files ------------------------------------------------------*/
30
31 #include "tripe.h"
32
33 /*----- Global variables --------------------------------------------------*/
34
35 #ifndef NTRACE
36
37 const trace_opt tr_opts[] = {
38 { 't', T_TUNNEL, "tunnel events" },
39 { 'r', T_PEER, "peer events" },
40 { 'a', T_ADMIN, "admin interface" },
41 { 'p', T_PACKET, "packet contents" },
42 { 'c', T_CRYPTO, "crypto details" },
43 { 's', T_KEYSET, "symmetric keyset management" },
44 { 'x', T_KEYEXCH, "key exchange" },
45 { 'm', T_KEYMGMT, "key management" },
46 { 'A', T_ALL, "all of the above" },
47 { 0, 0, 0 }
48 };
49
50 unsigned tr_flags = 0;
51 #endif
52
53 static const trace_opt w_opts[] = {
54 { 't', AF_TRACE, "trace messages" },
55 { 'n', AF_NOTE, "asynchronous notifications" },
56 { 'w', AF_WARN, "warnings" },
57 { 'A', AF_ALLMSGS, "all of the above" },
58 { 0, 0, 0 }
59 };
60
61 /*----- Static variables --------------------------------------------------*/
62
63 static admin *admins;
64 static sel_file sock;
65 static const char *sockname;
66 static unsigned flags = 0;
67 static admin *a_stdin = 0;
68 static sig s_term, s_int, s_hup;
69
70 #define F_DAEMON 1u
71 #define F_INIT 2u
72
73 #define T_RESOLVE SEC(30)
74 #define T_PING SEC(5)
75
76 static void a_destroy(admin */*a*/);
77 static void a_lock(admin */*a*/);
78 static void a_unlock(admin */*a*/);
79
80 /*----- Output functions --------------------------------------------------*/
81
82 /* --- @trywrite@ --- *
83 *
84 * Arguments: @admin *a@ = pointer to an admin block
85 * @const char *p@ = pointer to buffer to write
86 * @size_t sz@ = size of data to write
87 *
88 * Returns: The number of bytes written, or less than zero on error.
89 *
90 * Use: Attempts to write data to a client.
91 */
92
93 static ssize_t trywrite(admin *a, const char *p, size_t sz)
94 {
95 ssize_t n, done = 0;
96
97 again:
98 if (!sz)
99 return (done);
100 n = write(a->w.fd, p, sz);
101 if (n > 0) {
102 done += n;
103 p += n;
104 sz -= n;
105 goto again;
106 }
107 if (n < 0) {
108 if (errno == EINTR)
109 goto again;
110 if (errno != EAGAIN && errno != EWOULDBLOCK) {
111 a_destroy(a);
112 a_warn("ADMIN client-read-error -- %s", strerror(errno));
113 return (-1);
114 }
115 }
116 return (done);
117 }
118
119 /* --- @doqueue@ -- *
120 *
121 * Arguments: @oqueue *q@ = pointer to output queue
122 * @const char *p@ = pointer to buffer to write
123 * @size_t sz@ = size of buffer
124 *
125 * Returns: Nonzero if the queue was previously empty.
126 *
127 * Use: Queues data to be written later.
128 */
129
130 static int doqueue(oqueue *q, const char *p, size_t sz)
131 {
132 obuf *o;
133 int rc = 0;
134 size_t n;
135
136 o = q->tl;
137 if (!o)
138 rc = 1;
139 else if (o->p_in < o->buf + OBUFSZ)
140 goto noalloc;
141
142 do {
143 o = xmalloc(sizeof(obuf));
144 o->next = 0;
145 o->p_in = o->p_out = o->buf;
146 if (q->tl)
147 q->tl->next = o;
148 else
149 q->hd = o;
150 q->tl = o;
151
152 noalloc:
153 n = o->buf + OBUFSZ - o->p_in;
154 if (n > sz)
155 n = sz;
156 memcpy(o->p_in, p, n);
157 o->p_in += n;
158 p += n;
159 sz -= n;
160 } while (sz);
161
162 return (rc);
163 }
164
165 /* --- @dosend@ --- *
166 *
167 * Arguemnts: @admin *a@ = pointer to an admin block
168 * @const char *p@ = pointer to buffer to write
169 * @size_t sz@ = size of data to write
170 *
171 * Returns: ---
172 *
173 * Use: Sends data to an admin client.
174 */
175
176 static void dosend(admin *a, const char *p, size_t sz)
177 {
178 ssize_t n;
179
180 if (a->f & AF_DEAD)
181 return;
182 if (!a->out.hd) {
183 if ((n = trywrite(a, p, sz)) < 0)
184 return;
185 p += n;
186 sz -= n;
187 if (!sz)
188 return;
189 }
190 if (doqueue(&a->out, p, sz))
191 sel_addfile(&a->w);
192 }
193
194 /* --- @a_flush@ --- *
195 *
196 * Arguments: @int fd@ = file descriptor
197 * @unsigned mode@ = what's happening
198 * @void *v@ = pointer to my admin block
199 *
200 * Returns: ---
201 *
202 * Use: Flushes buffers when a client is ready to read again.
203 */
204
205 static void a_flush(int fd, unsigned mode, void *v)
206 {
207 admin *a = v;
208 obuf *o, *oo;
209 ssize_t n;
210
211 o = a->out.hd;
212 while (o) {
213 if ((n = trywrite(a, o->p_out, o->p_in - o->p_out)) < 0)
214 return;
215 o->p_out += n;
216 if (o->p_in < o->p_out)
217 break;
218 oo = o;
219 o = o->next;
220 xfree(oo);
221 }
222 a->out.hd = o;
223 if (!o) {
224 a->out.tl = 0;
225 sel_rmfile(&a->w);
226 }
227 }
228
229 /*----- Utility functions -------------------------------------------------*/
230
231 /* --- @a_write@, @a_vwrite@ --- *
232 *
233 * Arguments: @admin *a@ = admin connection to write to
234 * @const char *status@ = status code to report
235 * @const char *tag@ = tag string, or null
236 * @const char *fmt@ = pointer to format string
237 * @va_list ap@ = arguments in list
238 * @...@ = other arguments
239 *
240 * Returns: ---
241 *
242 * Use: Sends a message to an admin connection.
243 */
244
245 static void a_vwrite(admin *a, const char *status, const char *tag,
246 const char *fmt, va_list ap)
247 {
248 dstr d = DSTR_INIT;
249
250 if (tag) dstr_puts(&d, "BG");
251 dstr_puts(&d, status);
252 if (tag) {
253 dstr_putc(&d, ' ');
254 dstr_puts(&d, tag);
255 }
256 if (fmt) {
257 dstr_putc(&d, ' ');
258 dstr_vputf(&d, fmt, &ap);
259 }
260 dstr_putc(&d, '\n');
261 dosend(a, d.buf, d.len);
262 dstr_destroy(&d);
263 }
264
265 static void a_write(admin *a, const char *status, const char *tag,
266 const char *fmt, ...)
267 {
268 va_list ap;
269 va_start(ap, fmt);
270 a_vwrite(a, status, tag, fmt, ap);
271 va_end(ap);
272 }
273
274 /* --- @a_ok@, @a_info@, @a_fail@ --- *
275 *
276 * Arguments: @admin *a@ = connection
277 * @const char *fmt@ = format string
278 * @...@ = other arguments
279 *
280 * Returns: ---
281 *
282 * Use: Convenience functions for @a_write@.
283 */
284
285 static void a_ok(admin *a) { a_write(a, "OK", 0, 0); }
286
287 static void a_info(admin *a, const char *fmt, ...)
288 {
289 va_list ap;
290 va_start(ap, fmt);
291 a_vwrite(a, "INFO", 0, fmt, ap);
292 va_end(ap);
293 }
294
295 static void a_fail(admin *a, const char *fmt, ...)
296 {
297 va_list ap;
298 va_start(ap, fmt);
299 a_vwrite(a, "FAIL", 0, fmt, ap);
300 va_end(ap);
301 }
302
303 /* --- @a_alert@, @a_valert@, @a_rawalert@ --- *
304 *
305 * Arguments: @unsigned f_and, f_eq@ = filter for connections
306 * @const char *status@ = status string
307 * @const char *fmt@ = pointer to format string
308 * @const char *p@ = pointer to raw string
309 * @size_t sz@ = size of raw string
310 * @va_list ap@ = arguments in list
311 * @...@ = other arguments
312 *
313 * Returns: ---
314 *
315 * Use: Write a message to all admin connections matched by the given
316 * filter.
317 */
318
319 static void a_rawalert(unsigned f_and, unsigned f_eq, const char *status,
320 const char *p, size_t sz)
321 {
322 admin *a, *aa;
323 dstr d = DSTR_INIT;
324
325 if (!(flags & F_INIT))
326 return;
327 dstr_puts(&d, status);
328 if (p) {
329 dstr_putc(&d, ' ');
330 dstr_putm(&d, p, sz);
331 }
332 dstr_putc(&d, '\n');
333 p = d.buf;
334 sz = d.len;
335 for (a = admins; a; a = aa) {
336 aa = a->next;
337 if ((a->f & f_and) == f_eq)
338 dosend(a, d.buf, d.len);
339 }
340 dstr_destroy(&d);
341 }
342
343 static void a_valert(unsigned f_and, unsigned f_eq, const char *tag,
344 const char *fmt, va_list ap)
345 {
346 dstr d = DSTR_INIT;
347
348 if (!(flags & F_INIT))
349 return;
350 if (fmt)
351 dstr_vputf(&d, fmt, &ap);
352 a_rawalert(f_and, f_eq, tag, fmt ? d.buf : 0, fmt ? d.len : 0);
353 dstr_destroy(&d);
354 }
355
356 #if 0 /*unused*/
357 static void a_alert(unsigned f_and, unsigned f_eq, const char *tag,
358 const char *fmt, ...)
359 {
360 va_list ap;
361 va_start(ap, fmt);
362 a_valert(f_and, f_eq, tag, fmt, ap);
363 va_end(ap);
364 }
365 #endif
366
367 /* --- @a_warn@ --- *
368 *
369 * Arguments: @const char *fmt@ = pointer to format string
370 * @...@ = other arguments
371 *
372 * Returns: ---
373 *
374 * Use: Informs all admin connections of a warning.
375 */
376
377 void a_warn(const char *fmt, ...)
378 {
379 va_list ap;
380
381 va_start(ap, fmt);
382 if (flags & F_INIT)
383 a_valert(0, 0, "WARN", fmt, ap);
384 else {
385 fprintf(stderr, "%s: ", QUIS);
386 vfprintf(stderr, fmt, ap);
387 fputc('\n', stderr);
388 }
389 va_end(ap);
390 }
391
392 /* --- @a_trace@ --- *
393 *
394 * Arguments: @const char *p@ = pointer to a buffer
395 * @size_t sz@ = size of the buffer
396 * @void *v@ = uninteresting pointer
397 *
398 * Returns: ---
399 *
400 * Use: Custom trace output handler. Sends trace messages to
401 * interested admin connections.
402 */
403
404 #ifndef NTRACE
405 static void a_trace(const char *p, size_t sz, void *v)
406 { a_rawalert(AF_TRACE, AF_TRACE, "TRACE", p, sz); }
407 #endif
408
409 /* --- @a_notify@ --- *
410 *
411 * Arguments: @const char *fmt@ = pointer to format string
412 * @...@ = other arguments
413 *
414 * Returns: ---
415 *
416 * Use: Sends a notification to interested admin connections.
417 */
418
419 void a_notify(const char *fmt, ...)
420 {
421 va_list ap;
422
423 va_start(ap, fmt);
424 a_valert(AF_NOTE, AF_NOTE, "NOTE", fmt, ap);
425 va_end(ap);
426 }
427
428 /* --- @a_quit@ --- *
429 *
430 * Arguments: ---
431 *
432 * Returns: ---
433 *
434 * Use: Shuts things down nicely.
435 */
436
437 void a_quit(void)
438 {
439 peer *p;
440
441 close(sock.fd);
442 unlink(sockname);
443 while ((p = p_first()) != 0)
444 p_destroy(p);
445 exit(0);
446 }
447
448 /* --- @a_sigdie@ --- *
449 *
450 * Arguments: @int sig@ = signal number
451 * @void *v@ = an uninteresting argument
452 *
453 * Returns: ---
454 *
455 * Use Shuts down on receipt of a fatal signal.
456 */
457
458 static void a_sigdie(int sig, void *v)
459 {
460 char *p;
461 char buf[20];
462
463 switch (sig) {
464 case SIGTERM: p = "SIGTERM"; break;
465 case SIGINT: p = "SIGINT"; break;
466 default:
467 sprintf(buf, "%i", sig);
468 p = buf;
469 break;
470 }
471 a_warn("SERVER quit signal %s", p);
472 a_quit();
473 }
474
475 /* --- @a_sighup@ --- *
476 *
477 * Arguments: @int sig@ = signal number
478 * @void *v@ = an uninteresting argument
479 *
480 * Returns: ---
481 *
482 * Use Logs a message about SIGHUP not being useful.
483 */
484
485 static void a_sighup(int sig, void *v)
486 {
487 a_warn("SERVER ignore signal SIGHUP");
488 }
489
490 /* --- @a_parsetime@ --- *
491 *
492 * Arguments; @const char *p@ = time string to parse
493 *
494 * Returns: Time in seconds, or @< 0@ on error.
495 */
496
497 static long a_parsetime(const char *p)
498 {
499 char *q;
500 long t = strtol(p, &q, 0);
501
502 switch (*q) {
503 case 'd': t *= 24;
504 case 'h': t *= 60;
505 case 'm': t *= 60;
506 case 's': if (q[1] != 0)
507 default: t = -1;
508 case 0: break;
509 }
510 return (t);
511 }
512
513 /*----- Backgrounded operations -------------------------------------------*/
514
515 /* --- @a_bgrelease@ --- *
516 *
517 * Arguments: @admin_bgop *bg@ = backgrounded operation
518 *
519 * Returns: ---
520 *
521 * Use: Removes a backgrounded operation from the queue, since
522 * (presumably) it's done.
523 */
524
525 static void a_bgrelease(admin_bgop *bg)
526 {
527 admin *a = bg->a;
528
529 if (bg->tag)
530 xfree(bg->tag);
531 else
532 selbuf_enable(&a->b);
533 if (bg->next)
534 bg->next->prev = bg->prev;
535 if (bg->prev)
536 bg->prev->next = bg->next;
537 else
538 a->bg = bg->next;
539 xfree(bg);
540 if (a->f & AF_CLOSE)
541 a_destroy(a);
542 }
543
544 /* --- @a_bgok@, @a_bginfo@, @a_bgfail@ --- *
545 *
546 * Arguments: @admin_bgop *bg@ = backgrounded operation
547 * @const char *fmt@ = format string
548 * @...@ = other arguments
549 *
550 * Returns: ---
551 *
552 * Use: Convenience functions for @a_write@.
553 */
554
555 static void a_bgok(admin_bgop *bg)
556 { a_write(bg->a, "OK", bg->tag, 0); }
557
558 static void a_bginfo(admin_bgop *bg, const char *fmt, ...)
559 {
560 va_list ap;
561 va_start(ap, fmt);
562 a_vwrite(bg->a, "INFO", bg->tag, fmt, ap);
563 va_end(ap);
564 }
565
566 static void a_bgfail(admin_bgop *bg, const char *fmt, ...)
567 {
568 va_list ap;
569 va_start(ap, fmt);
570 a_vwrite(bg->a, "FAIL", bg->tag, fmt, ap);
571 va_end(ap);
572 }
573
574 /* --- @a_bgadd@ --- *
575 *
576 * Arguments: @admin *a@ = administration connection
577 * @admin_bgop *bg@ = pointer to background operation
578 * @const char *tag@ = background tag, or null for foreground
579 * @void (*cancel)(admin_bgop *)@ = cancel function
580 *
581 * Returns: ---
582 *
583 * Use: Links a background job into the list.
584 */
585
586 static void a_bgadd(admin *a, admin_bgop *bg, const char *tag,
587 void (*cancel)(admin_bgop *))
588 {
589 if (tag)
590 bg->tag = xstrdup(tag);
591 else {
592 bg->tag = 0;
593 selbuf_disable(&a->b);
594 }
595 bg->a = a;
596 bg->cancel = cancel;
597 bg->next = a->bg;
598 bg->prev = 0;
599 a->bg = bg;
600 if (tag) a_write(a, "DETACH", tag, 0);
601 }
602
603 /*----- Adding peers ------------------------------------------------------*/
604
605 /* --- @a_addfree@ --- *
606 *
607 * Arguments: @admin_addop *add@ = operation block
608 *
609 * Returns: ---
610 *
611 * Use: Frees an add operation.
612 */
613
614 static void a_addfree(admin_addop *add)
615 {
616 if (add->peer.name) xfree(add->peer.name);
617 if (add->paddr) xfree(add->paddr);
618 }
619
620 /* --- @a_addcancel@ --- *
621 *
622 * Arguments: @admin_bgop *bg@ = background operation
623 *
624 * Returns: ---
625 *
626 * Use: Cancels an add operation.
627 */
628
629 static void a_addcancel(admin_bgop *bg)
630 {
631 admin_addop *add = (admin_addop *)bg;
632
633 sel_rmtimer(&add->t);
634 bres_abort(&add->r);
635 a_addfree(add);
636 }
637
638 /* --- @a_doadd@ --- *
639 *
640 * Arguments: @admin_addop *add@ = operation block
641 *
642 * Returns: ---
643 *
644 * Use: Does the peer add thing.
645 */
646
647 static void a_doadd(admin_addop *add)
648 {
649 if (p_find(add->peer.name))
650 a_bgfail(&add->bg, "peer-exists %s", add->peer.name);
651 else if (!p_create(&add->peer))
652 a_bgfail(&add->bg, "peer-create-fail %s", add->peer.name);
653 else
654 a_bgok(&add->bg);
655 }
656
657 /* --- @a_addresolve@ --- *
658 *
659 * Arguments: @struct hostent *h@ = pointer to resolved hostname
660 * @void *v@ = pointer to add operation
661 *
662 * Returns: ---
663 *
664 * Use: Handles a completed name resolution.
665 */
666
667 static void a_addresolve(struct hostent *h, void *v)
668 {
669 admin_addop *add = v;
670
671 a_lock(add->bg.a);
672 T( trace(T_ADMIN, "admin: %u resolved", add->bg.a->seq); )
673 TIMER;
674 if (!h)
675 a_bgfail(&add->bg, "resolve-error %s", add->paddr);
676 else {
677 memcpy(&add->peer.sa.sin.sin_addr, h->h_addr, sizeof(struct in_addr));
678 a_doadd(add);
679 }
680 sel_rmtimer(&add->t);
681 a_addfree(add);
682 a_bgrelease(&add->bg);
683 a_unlock(add->bg.a);
684 }
685
686 /* --- @a_addtimer@ --- *
687 *
688 * Arguments: @struct timeval *tv@ = timer
689 * @void *v@ = pointer to add operation
690 *
691 * Returns: ---
692 *
693 * Use: Times out a resolver.
694 */
695
696 static void a_addtimer(struct timeval *tv, void *v)
697 {
698 admin_addop *add = v;
699
700 a_lock(add->bg.a);
701 T( trace(T_ADMIN, "admin: %u resolver timeout", add->bg.a->seq); )
702 a_bgfail(&add->bg, "resolver-timeout %s\n", add->paddr);
703 bres_abort(&add->r);
704 a_addfree(add);
705 a_bgrelease(&add->bg);
706 a_unlock(add->bg.a);
707 }
708
709 /* --- @acmd_add@ --- *
710 *
711 * Arguments: @admin *a@ = connection which requested the addition
712 * @unsigned ac@ = argument count
713 * @char *av[]@ = pointer to the argument list
714 *
715 * Returns: ---
716 *
717 * Use: Adds a new peer.
718 */
719
720 static void acmd_add(admin *a, unsigned ac, char *av[])
721 {
722 unsigned long pt;
723 struct timeval tv;
724 unsigned i, j;
725 char *p;
726 const char *tag = 0;
727 admin_addop *add = 0;
728
729 /* --- Make sure someone's not got there already --- */
730
731 if (p_find(av[0])) {
732 a_fail(a, "peer-exists %s", av[0]);
733 goto fail;
734 }
735
736 /* --- Set stuff up --- */
737
738 add = xmalloc(sizeof(*add));
739 add->peer.name = xstrdup(av[0]);
740 add->peer.t_ka = 0;
741 add->peer.tops = tun_default;
742 add->paddr = 0;
743
744 /* --- Parse options --- */
745
746 i = 1;
747 for (;;) {
748 if (!av[i])
749 goto bad_syntax;
750 if (mystrieq(av[i], "-background")) {
751 if (!av[++i]) goto bad_syntax;
752 tag = av[i];
753 } else if (mystrieq(av[i], "-tunnel")) {
754 if (!av[++i]) goto bad_syntax;
755 for (j = 0;; j++) {
756 if (!tunnels[j]) {
757 a_fail(a, "unknown-tunnel %s", av[i]);
758 return;
759 }
760 if (mystrieq(av[i], tunnels[j]->name)) {
761 add->peer.tops = tunnels[j];
762 break;
763 }
764 }
765 } else if (mystrieq(av[i], "-keepalive")) {
766 long t;
767 if (!av[++i]) goto bad_syntax;
768 if ((t = a_parsetime(av[i])) < 0) {
769 a_fail(a, "bad-time-spec %s", av[i]);
770 return;
771 }
772 add->peer.t_ka = t;
773 } else if (mystrieq(av[i], "--")) {
774 i++;
775 break;
776 } else
777 break;
778 i++;
779 }
780
781 /* --- Fill in the easy bits of address --- */
782
783 if (mystrieq(av[i], "inet")) i++;
784 if (ac - i != 2) {
785 a_fail(a, "bad-syntax -- add PEER [OPTIONS] [inet] ADDRESS PORT");
786 goto fail;
787 }
788 add->peer.sa.sin.sin_family = AF_INET;
789 add->peer.sasz = sizeof(add->peer.sa.sin);
790 add->paddr = xstrdup(av[i]);
791 pt = strtoul(av[i + 1], &p, 0);
792 if (*p) {
793 struct servent *s = getservbyname(av[i + 1], "udp");
794 if (!s) {
795 a_fail(a, "unknown-service %s", av[i + 1]);
796 goto fail;
797 }
798 pt = ntohs(s->s_port);
799 }
800 if (pt == 0 || pt >= 65536) {
801 a_fail(a, "invalid-port %lu", pt);
802 goto fail;
803 }
804 add->peer.sa.sin.sin_port = htons(pt);
805
806 /* --- Report backgrounding --- *
807 *
808 * Do this for consistency of interface, even if we're going to get the
809 * answer straight away.
810 */
811
812 a_bgadd(a, &add->bg, tag, a_addcancel);
813
814 /* --- If the name is numeric, do it the easy way --- */
815
816 if (inet_aton(av[i], &add->peer.sa.sin.sin_addr)) {
817 a_doadd(add);
818 a_addfree(add);
819 a_bgrelease(&add->bg);
820 return;
821 }
822
823 /* --- Store everything for later and crank up the resolver --- */
824
825 gettimeofday(&tv, 0);
826 tv.tv_sec += T_RESOLVE;
827 sel_addtimer(&sel, &add->t, &tv, a_addtimer, add);
828 bres_byname(&add->r, add->paddr, a_addresolve, add);
829 T( trace(T_ADMIN, "admin: %u resolving hostname `%s'",
830 a->seq, add->paddr); )
831 return;
832
833 bad_syntax:
834 a_fail(a, "bad-syntax -- add PEER [OPTIONS] ADDR ...");
835 fail:
836 if (add) {
837 a_addfree(add);
838 xfree(add);
839 }
840 return;
841 }
842
843 /*----- Ping --------------------------------------------------------------*/
844
845 /* --- @a_pingcancel@ --- *
846 *
847 * Arguments: @admin_bgop *bg@ = background operation block
848 *
849 * Returns: ---
850 *
851 * Use: Cancels a running ping.
852 */
853
854 static void a_pingcancel(admin_bgop *bg)
855 {
856 admin_pingop *pg = (admin_pingop *)bg;
857 p_pingdone(&pg->ping, PING_NONOTIFY);
858 }
859
860 /* --- @a_pong@ --- *
861 *
862 * Arguments: @int rc@ = return code
863 * @void *v@ = ping operation block
864 *
865 * Returns: ---
866 *
867 * Use: Collects what happened to a ping message.
868 */
869
870 static void a_pong(int rc, void *v)
871 {
872 admin_pingop *pg = v;
873 struct timeval tv;
874 double millis;
875
876 a_lock(pg->bg.a);
877 switch (rc) {
878 case PING_OK:
879 gettimeofday(&tv, 0);
880 tv_sub(&tv, &tv, &pg->pingtime);
881 millis = (double)tv.tv_sec * 1000 + (double)tv.tv_usec/1000;
882 a_bginfo(&pg->bg, "ping-ok %.1f", millis);
883 a_bgok(&pg->bg);
884 break;
885 case PING_TIMEOUT:
886 a_bginfo(&pg->bg, "ping-timeout");
887 a_bgok(&pg->bg);
888 break;
889 case PING_PEERDIED:
890 a_bginfo(&pg->bg, "ping-peer-died");
891 a_bgok(&pg->bg);
892 break;
893 default:
894 abort();
895 }
896 a_bgrelease(&pg->bg);
897 a_unlock(pg->bg.a);
898 }
899
900 /* --- @acmd_ping@, @acmd_eping@ --- *
901 *
902 * Arguments: @admin *a@ = connection which requested the ping
903 * @unsigned ac@ = argument count
904 * @char *av[]@ = pointer to the argument list
905 *
906 * Returns: ---
907 *
908 * Use: Pings a peer.
909 */
910
911 static void a_ping(admin *a, unsigned ac, char *av[],
912 const char *cmd, unsigned msg)
913 {
914 long t = T_PING;
915 int i;
916 peer *p;
917 admin_pingop *pg = 0;
918 const char *tag = 0;
919
920 i = 0;
921 for (;;) {
922 if (!av[i])
923 goto bad_syntax;
924 if (mystrieq(av[i], "-background")) {
925 if (!av[++i]) goto bad_syntax;
926 tag = av[i];
927 } else if (mystrieq(av[i], "-timeout")) {
928 if (!av[++i]) goto bad_syntax;
929 if ((t = a_parsetime(av[i])) < 0) {
930 a_fail(a, "bad-time-spec %s", av[i]);
931 return;
932 }
933 } else if (mystrieq(av[i], "--")) {
934 i++;
935 break;
936 } else
937 break;
938 i++;
939 }
940
941 if (!av[i]) goto bad_syntax;
942 if ((p = p_find(av[i])) == 0) {
943 a_fail(a, "unknown-peer %s", av[i]);
944 return;
945 }
946 pg = xmalloc(sizeof(*pg));
947 gettimeofday(&pg->pingtime, 0);
948 a_bgadd(a, &pg->bg, tag, a_pingcancel);
949 if (p_pingsend(p, &pg->ping, msg, t, a_pong, pg)) {
950 a_bgfail(&pg->bg, "ping-send-failed");
951 a_bgrelease(&pg->bg);
952 }
953 return;
954
955 bad_syntax:
956 a_fail(a, "bad-syntax -- %s [OPTIONS] PEER", cmd);
957 return;
958 }
959
960 static void acmd_ping(admin *a, unsigned ac, char *av[])
961 { a_ping(a, ac, av, "ping", MISC_PING); }
962 static void acmd_eping(admin *a, unsigned ac, char *av[])
963 { a_ping(a, ac, av, "eping", MISC_EPING); }
964
965 /*----- Administration commands -------------------------------------------*/
966
967 /* --- Miscellaneous commands --- */
968
969 /* --- @traceish@ --- *
970 *
971 * Arguments: @admin *a@ = connection to complain on
972 * @unsigned ac@ = number of arguments
973 * @char *av[]@ = vector of arguments
974 * @const char *what@ = what we're messing with
975 * @const trace_opt *tt@ = options table
976 * @unsigned *ff@ = where the flags are
977 *
978 * Returns: Nonzero if anything changed.
979 *
980 * Use: Guts of trace-ish commands like `trace' and `watch'.
981 */
982
983 static int traceish(admin *a, unsigned ac, char *av[],
984 const char *what, const trace_opt *tt, unsigned *ff)
985 {
986 int ch = 0;
987
988 if (!ac || strcmp(av[0], "?") == 0) {
989 const trace_opt *t;
990 a_info(a, "Current %s status:", what);
991 for (t = tt; t->ch; t++) {
992 a_info(a, "%c %c %s",
993 t->ch, (*ff & t->f) == t->f ? '*' : ' ', t->help);
994 }
995 } else {
996 unsigned sense = 1;
997 unsigned f = *ff;
998 const trace_opt *t;
999 char *p = av[0];
1000
1001 while (*p) {
1002 switch (*p) {
1003 case '+': sense = 1; break;
1004 case '-': sense = 0; break;
1005 default:
1006 for (t = tt; t->ch; t++) {
1007 if (t->ch == *p) {
1008 if (sense) f |= t->f;
1009 else f &= ~t->f;
1010 goto tropt_ok;
1011 }
1012 }
1013 a_fail(a, "bad-%s-option %c", what, *p);
1014 return (0);
1015 tropt_ok:;
1016 break;
1017 }
1018 p++;
1019 }
1020 *ff = f;
1021 ch = 1;
1022 }
1023 a_ok(a);
1024 return (ch);
1025 }
1026
1027 #ifndef NTRACE
1028
1029 static void acmd_trace(admin *a, unsigned ac, char *av[])
1030 {
1031 if (traceish(a, ac, av, "trace", tr_opts, &tr_flags))
1032 trace_level(tr_flags);
1033 }
1034
1035 #endif
1036
1037 static void acmd_watch(admin *a, unsigned ac, char *av[])
1038 {
1039 traceish(a, ac, av, "watch", w_opts, &a->f);
1040 }
1041
1042 static void quotify(dstr *d, const char *p)
1043 {
1044 if (d->len)
1045 dstr_putc(d, ' ');
1046 if (*p && !p[strcspn(p, "\"' \t\n\v")])
1047 dstr_puts(d, p);
1048 else {
1049 dstr_putc(d, '\"');
1050 while (*p) {
1051 if (*p == '\\' || *p == '\"')
1052 dstr_putc(d, '\\');
1053 dstr_putc(d, *p++);
1054 }
1055 dstr_putc(d, '\"');
1056 }
1057 }
1058
1059 static void alertcmd(admin *a, unsigned f_and, unsigned f_eq,
1060 const char *tag, unsigned ac, char *av[])
1061 {
1062 dstr d = DSTR_INIT;
1063 unsigned i;
1064
1065 dstr_puts(&d, "USER");
1066 for (i = 0; i < ac; i++)
1067 quotify(&d, av[i]);
1068 dstr_putz(&d);
1069 a_rawalert(f_and, f_eq, tag, d.buf, d.len);
1070 dstr_destroy(&d);
1071 a_ok(a);
1072 }
1073
1074 static void acmd_notify(admin *a, unsigned ac, char *av[])
1075 { alertcmd(a, AF_NOTE, AF_NOTE, "NOTE", ac, av); }
1076 static void acmd_warn(admin *a, unsigned ac, char *av[])
1077 { alertcmd(a, AF_WARN, AF_WARN, "WARN", ac, av); }
1078
1079 static void acmd_port(admin *a, unsigned ac, char *av[])
1080 {
1081 a_info(a, "%u", p_port());
1082 a_ok(a);
1083 }
1084
1085 static void acmd_daemon(admin *a, unsigned ac, char *av[])
1086 {
1087 if (flags & F_DAEMON)
1088 a_fail(a, "already-daemon");
1089 else {
1090 a_notify("DAEMON");
1091 if (a_stdin)
1092 a_destroy(a_stdin);
1093 if (u_daemon())
1094 a_fail(a, "daemon-error -- %s", strerror(errno));
1095 else {
1096 flags |= F_DAEMON;
1097 a_ok(a);
1098 }
1099 }
1100 }
1101
1102 static void acmd_list(admin *a, unsigned ac, char *av[])
1103 {
1104 peer *p;
1105 for (p = p_first(); p; p = p_next(p))
1106 a_info(a, "%s", p_name(p));
1107 a_ok(a);
1108 }
1109
1110 static void acmd_ifname(admin *a, unsigned ac, char *av[])
1111 {
1112 peer *p;
1113
1114 if ((p = p_find(av[0])) == 0)
1115 a_fail(a, "unknown-peer %s", av[0]);
1116 else {
1117 a_info(a, "%s", p_ifname(p));
1118 a_ok(a);
1119 }
1120 }
1121
1122 static void acmd_addr(admin *a, unsigned ac, char *av[])
1123 {
1124 peer *p;
1125 const addr *ad;
1126
1127 if ((p = p_find(av[0])) == 0)
1128 a_fail(a, "unknown-peer %s", av[0]);
1129 else {
1130 ad = p_addr(p);
1131 assert(ad->sa.sa_family == AF_INET);
1132 a_info(a, "INET %s %u",
1133 inet_ntoa(ad->sin.sin_addr),
1134 (unsigned)ntohs(ad->sin.sin_port));
1135 a_ok(a);
1136 }
1137 }
1138
1139 static void acmd_stats(admin *a, unsigned ac, char *av[])
1140 {
1141 peer *p;
1142 stats *st;
1143
1144 if ((p = p_find(av[0])) == 0)
1145 a_fail(a, "unknown-peer %s", av[0]);
1146 else {
1147 st = p_stats(p);
1148 a_info(a, "start-time=%s", timestr(st->t_start));
1149 a_info(a, "last-packet-time=%s", timestr(st->t_last));
1150 a_info(a, "last-keyexch-time=%s", timestr(st->t_kx));
1151 a_info(a, "packets-in=%lu bytes-in=%lu", st->n_in, st->sz_in);
1152 a_info(a, "packets-out=%lu bytes-out=%lu",
1153 st->n_out, st->sz_out);
1154 a_info(a, "keyexch-packets-in=%lu keyexch-bytes-in=%lu",
1155 st->n_kxin, st->sz_kxin);
1156 a_info(a, "keyexch-packets-out=%lu keyexch-bytes-out=%lu",
1157 st->n_kxout, st->sz_kxout);
1158 a_info(a, "ip-packets-in=%lu ip-bytes-in=%lu",
1159 st->n_ipin, st->sz_ipin);
1160 a_info(a, "ip-packets-out=%lu ip-bytes-out=%lu",
1161 st->n_ipout, st->sz_ipout);
1162 a_info(a, "rejected-packets=%lu", st->n_reject);
1163 a_ok(a);
1164 }
1165 }
1166
1167 static void acmd_kill(admin *a, unsigned ac, char *av[])
1168 {
1169 peer *p;
1170 if ((p = p_find(av[0])) == 0)
1171 a_fail(a, "unknown-peer %s", av[0]);
1172 else {
1173 p_destroy(p);
1174 a_ok(a);
1175 }
1176 }
1177
1178 static void acmd_forcekx(admin *a, unsigned ac, char *av[])
1179 {
1180 peer *p;
1181 if ((p = p_find(av[0])) == 0)
1182 a_fail(a, "unknown-peer %s", av[0]);
1183 else {
1184 kx_start(&p->kx, 1);
1185 a_ok(a);
1186 }
1187 }
1188
1189 static void acmd_reload(admin *a, unsigned ac, char *av[])
1190 { p_keyreload(); a_ok(a); }
1191
1192 static void acmd_quit(admin *a, unsigned ac, char *av[])
1193 {
1194 a_warn("SERVER quit admin-request");
1195 a_ok(a);
1196 a_unlock(a);
1197 a_quit();
1198 }
1199
1200 static void acmd_version(admin *a, unsigned ac, char *av[])
1201 {
1202 a_info(a, "%s %s", PACKAGE, VERSION);
1203 a_ok(a);
1204 }
1205
1206 static void acmd_tunnels(admin *a, unsigned ac, char *av[])
1207 {
1208 int i;
1209 for (i = 0; tunnels[i]; i++)
1210 a_info(a, "%s", tunnels[i]->name);
1211 a_ok(a);
1212 }
1213
1214 /* --- The command table and help --- */
1215
1216 typedef struct acmd {
1217 const char *name;
1218 const char *help;
1219 unsigned argmin, argmax;
1220 void (*func)(admin */*a*/, unsigned /*ac*/, char */*av*/[]);
1221 } acmd;
1222
1223 static void acmd_help(admin */*a*/, unsigned /*ac*/, char */*av*/[]);
1224
1225 static const acmd acmdtab[] = {
1226 { "add", "add PEER [OPTIONS] ADDR ...",
1227 2, 0xffff, acmd_add },
1228 { "addr", "addr PEER", 1, 1, acmd_addr },
1229 { "daemon", "daemon", 0, 0, acmd_daemon },
1230 { "eping", "eping [OPTIONS] PEER", 1, 0xffff, acmd_eping },
1231 { "forcekx", "forcekx PEER", 1, 1, acmd_forcekx },
1232 { "help", "help", 0, 0, acmd_help },
1233 { "ifname", "ifname PEER", 1, 1, acmd_ifname },
1234 { "kill", "kill PEER", 1, 1, acmd_kill },
1235 { "list", "list", 0, 0, acmd_list },
1236 { "notify", "notify MESSAGE ...", 1, 0xffff, acmd_notify },
1237 { "ping", "ping [OPTIONS] PEER", 1, 0xffff, acmd_ping },
1238 { "port", "port", 0, 0, acmd_port },
1239 { "quit", "quit", 0, 0, acmd_quit },
1240 { "reload", "reload", 0, 0, acmd_reload },
1241 { "stats", "stats PEER", 1, 1, acmd_stats },
1242 #ifndef NTRACE
1243 { "trace", "trace [OPTIONS]", 0, 1, acmd_trace },
1244 #endif
1245 { "tunnels", "tunnels", 0, 0, acmd_tunnels },
1246 { "version", "version", 0, 0, acmd_version },
1247 { "warn", "warn MESSAGE ...", 1, 0xffff, acmd_warn },
1248 { "watch", "watch [OPTIONS]", 0, 1, acmd_watch },
1249 { 0, 0, 0, 0, 0 }
1250 };
1251
1252 static void acmd_help(admin *a, unsigned ac, char *av[])
1253 {
1254 const acmd *c;
1255 for (c = acmdtab; c->name; c++)
1256 a_info(a, "%s", c->help);
1257 a_ok(a);
1258 }
1259
1260 /*----- Connection handling -----------------------------------------------*/
1261
1262 /* --- @a_lock@ --- *
1263 *
1264 * Arguments: @admin *a@ = pointer to an admin block
1265 *
1266 * Returns: ---
1267 *
1268 * Use: Locks an admin block so that it won't be destroyed
1269 * immediately.
1270 */
1271
1272 static void a_lock(admin *a) { assert(!(a->f & AF_LOCK)); a->f |= AF_LOCK; }
1273
1274 /* --- @a_unlock@ --- *
1275 *
1276 * Arguments: @admin *a@ = pointer to an admin block
1277 *
1278 * Returns: ---
1279 *
1280 * Use: Unlocks an admin block, allowing its destruction. This is
1281 * also the second half of @a_destroy@.
1282 */
1283
1284 static void a_unlock(admin *a)
1285 {
1286 admin_bgop *bg, *bbg;
1287
1288 assert(a->f & AF_LOCK);
1289
1290 /* --- If we're not dead, that's fine --- */
1291
1292 if (!(a->f & AF_DEAD)) {
1293 a->f &= ~AF_LOCK;
1294 return;
1295 }
1296
1297 /* --- If we are, then destroy the rest of the block --- */
1298
1299 T( trace(T_ADMIN, "admin: completing destruction of connection %u",
1300 a->seq); )
1301
1302 selbuf_destroy(&a->b);
1303 for (bg = a->bg; bg; bg = bbg) {
1304 bbg = bg->next;
1305 bg->cancel(bg);
1306 if (bg->tag) xfree(bg->tag);
1307 xfree(bg);
1308 }
1309 if (a->b.reader.fd != a->w.fd) close(a->b.reader.fd);
1310 close(a->w.fd);
1311
1312 if (a_stdin == a)
1313 a_stdin = 0;
1314 if (a->next)
1315 a->next->prev = a->prev;
1316 if (a->prev)
1317 a->prev->next = a->next;
1318 else
1319 admins = a->next;
1320 DESTROY(a);
1321 }
1322
1323 /* --- @a_destroy@ --- *
1324 *
1325 * Arguments: @admin *a@ = pointer to an admin block
1326 *
1327 * Returns: ---
1328 *
1329 * Use: Destroys an admin block. This requires a certain amount of
1330 * care.
1331 */
1332
1333 static void freequeue(oqueue *q)
1334 {
1335 obuf *o, *oo;
1336
1337 for (o = q->hd; o; o = oo) {
1338 oo = o->next;
1339 xfree(o);
1340 }
1341 q->hd = q->tl = 0;
1342 }
1343
1344 static void a_destroy(admin *a)
1345 {
1346 /* --- Don't multiply destroy admin blocks --- */
1347
1348 if (a->f & AF_DEAD)
1349 return;
1350
1351 /* --- Make sure nobody expects it to work --- */
1352
1353 a->f |= AF_DEAD;
1354 T( trace(T_ADMIN, "admin: destroying connection %u", a->seq); )
1355
1356 /* --- Free the output buffers --- */
1357
1358 if (a->out.hd)
1359 sel_rmfile(&a->w);
1360 freequeue(&a->out);
1361
1362 /* --- If the block is locked, that's all we can manage --- */
1363
1364 if (a->f & AF_LOCK) {
1365 T( trace(T_ADMIN, "admin: deferring destruction..."); )
1366 return;
1367 }
1368 a->f |= AF_LOCK;
1369 a_unlock(a);
1370 }
1371
1372 /* --- @a_line@ --- *
1373 *
1374 * Arguments: @char *p@ = pointer to the line read
1375 * @size_t len@ = length of the line
1376 * @void *vp@ = pointer to my admin block
1377 *
1378 * Returns: ---
1379 *
1380 * Use: Handles a line of input.
1381 */
1382
1383 static void a_line(char *p, size_t len, void *vp)
1384 {
1385 admin *a = vp;
1386 const acmd *c;
1387 char *av[16];
1388 size_t ac;
1389
1390 TIMER;
1391 if (a->f & AF_DEAD)
1392 return;
1393 if (!p) {
1394 if (!a->bg)
1395 a_destroy(a);
1396 else {
1397 a->f |= AF_CLOSE;
1398 selbuf_disable(&a->b);
1399 }
1400 return;
1401 }
1402 ac = str_qsplit(p, av, 16, 0, STRF_QUOTE);
1403 if (!ac)
1404 return;
1405 for (c = acmdtab; c->name; c++) {
1406 if (mystrieq(av[0], c->name)) {
1407 ac--;
1408 if (c->argmin > ac || ac > c->argmax)
1409 a_fail(a, "bad-syntax -- %s", c->help);
1410 else {
1411 a_lock(a);
1412 c->func(a, ac, av + 1);
1413 a_unlock(a);
1414 }
1415 return;
1416 }
1417 }
1418 a_fail(a, "unknown-command %s", av[0]);
1419 }
1420
1421 /* --- @a_create@ --- *
1422 *
1423 * Arguments: @int fd_in, fd_out@ = file descriptors to use
1424 * @unsigned f@ = initial flags to set
1425 *
1426 * Returns: ---
1427 *
1428 * Use: Creates a new admin connection.
1429 */
1430
1431 void a_create(int fd_in, int fd_out, unsigned f)
1432 {
1433 admin *a = CREATE(admin);
1434
1435 T( static unsigned seq = 0;
1436 a->seq = seq++; )
1437 T( trace(T_ADMIN, "admin: accepted connection %u", a->seq); )
1438 a->bg = 0;
1439 a->f = f;
1440 if (fd_in == STDIN_FILENO) a_stdin = a;
1441 fdflags(fd_in, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
1442 if (fd_out != fd_in)
1443 fdflags(fd_out, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
1444 selbuf_init(&a->b, &sel, fd_in, a_line, a);
1445 sel_initfile(&sel, &a->w, fd_out, SEL_WRITE, a_flush, a);
1446 a->out.hd = a->out.tl = 0;
1447 a->next = admins;
1448 a->prev = 0;
1449 if (admins) admins->prev = a;
1450 admins = a;
1451 }
1452
1453 /* --- @a_accept@ --- *
1454 *
1455 * Arguments: @int fd@ = file descriptor to accept
1456 * @unsigned mode@ = what to do
1457 * @void *v@ = uninteresting pointer
1458 *
1459 * Returns: ---
1460 *
1461 * Use: Accepts a new admin connection.
1462 */
1463
1464 static void a_accept(int fd, unsigned mode, void *v)
1465 {
1466 int nfd;
1467 struct sockaddr_un sun;
1468 size_t sz = sizeof(sun);
1469
1470 if ((nfd = accept(fd, (struct sockaddr *)&sun, &sz)) < 0) {
1471 if (errno != EINTR && errno != EAGAIN && errno != EWOULDBLOCK &&
1472 errno != ECONNABORTED && errno != EPROTO)
1473 a_warn("ADMIN accept-error -- %s", strerror(errno));
1474 return;
1475 }
1476 a_create(nfd, nfd, 0);
1477 }
1478
1479 /* --- @a_daemon@ --- *
1480 *
1481 * Arguments: ---
1482 *
1483 * Returns: ---
1484 *
1485 * Use: Informs the admin module that it's a daemon.
1486 */
1487
1488 void a_daemon(void)
1489 {
1490 flags |= F_DAEMON;
1491 }
1492
1493 /* --- @a_init@ --- *
1494 *
1495 * Arguments: @const char *name@ = socket name to create
1496 *
1497 * Returns: ---
1498 *
1499 * Use: Creates the admin listening socket.
1500 */
1501
1502 void a_init(const char *name)
1503 {
1504 int fd;
1505 int n = 5;
1506 struct sockaddr_un sun;
1507 struct sigaction sa;
1508 size_t sz;
1509
1510 /* --- Set up the socket address --- */
1511
1512 sz = strlen(name) + 1;
1513 if (sz > sizeof(sun.sun_path))
1514 die(EXIT_FAILURE, "socket name `%s' too long", name);
1515 BURN(sun);
1516 sun.sun_family = AF_UNIX;
1517 memcpy(sun.sun_path, name, sz);
1518 sz += offsetof(struct sockaddr_un, sun_path);
1519
1520 /* --- Attempt to bind to the socket --- */
1521
1522 umask(0077);
1523 again:
1524 if ((fd = socket(PF_UNIX, SOCK_STREAM, 0)) < 0)
1525 die(EXIT_FAILURE, "couldn't create socket: %s", strerror(errno));
1526 if (bind(fd, (struct sockaddr *)&sun, sz) < 0) {
1527 struct stat st;
1528 int e = errno;
1529 if (errno != EADDRINUSE) {
1530 die(EXIT_FAILURE, "couldn't bind to address `%s': %s",
1531 sun.sun_path, strerror(e));
1532 }
1533 if (!n)
1534 die(EXIT_FAILURE, "too many retries; giving up");
1535 n--;
1536 if (!connect(fd, (struct sockaddr *)&sun, sz)) {
1537 die(EXIT_FAILURE, "server already listening on admin socket `%s'",
1538 sun.sun_path);
1539 }
1540 if (errno != ECONNREFUSED)
1541 die(EXIT_FAILURE, "couldn't bind to address: %s", strerror(e));
1542 if (stat(sun.sun_path, &st)) {
1543 die(EXIT_FAILURE, "couldn't stat `%s': %s",
1544 sun.sun_path, strerror(errno));
1545 }
1546 if (!S_ISSOCK(st.st_mode))
1547 die(EXIT_FAILURE, "object `%s' isn't a socket", sun.sun_path);
1548 T( trace(T_ADMIN, "admin: stale socket found; removing it"); )
1549 unlink(sun.sun_path);
1550 close(fd);
1551 goto again;
1552 }
1553 chmod(sun.sun_path, 0600);
1554 fdflags(fd, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
1555 if (listen(fd, 5))
1556 die(EXIT_FAILURE, "couldn't listen on socket: %s", strerror(errno));
1557
1558 /* --- Listen to the socket --- */
1559
1560 sel_initfile(&sel, &sock, fd, SEL_READ, a_accept, 0);
1561 sel_addfile(&sock);
1562 sockname = name;
1563 bres_init(&sel);
1564 T( trace_custom(a_trace, 0);
1565 trace(T_ADMIN, "admin: enabled custom tracing"); )
1566 flags |= F_INIT;
1567
1568 /* --- Set up signal handlers --- */
1569
1570 sig_add(&s_term, SIGTERM, a_sigdie, 0);
1571 sig_add(&s_hup, SIGHUP, a_sighup, 0);
1572 signal(SIGPIPE, SIG_IGN);
1573 sigaction(SIGINT, 0, &sa);
1574 if (sa.sa_handler != SIG_IGN)
1575 sig_add(&s_int, SIGINT, a_sigdie, 0);
1576 }
1577
1578 /*----- That's all, folks -------------------------------------------------*/