* \param addr The address to add.
* \param netmask The netmask to use for this entry.
*/
-static void acl_add_entry(struct list_head *acl, struct in_addr addr,
- int netmask)
+static void acl_add_entry(struct list_head *acl, char *addr, int netmask)
{
struct access_info *ai = para_malloc(sizeof(struct access_info));
- ai->addr = addr;
+
+ inet_pton(AF_INET, addr, &ai->addr);
ai->netmask = netmask;
- PARA_INFO_LOG("adding %s/%i to access list\n", inet_ntoa(ai->addr),
- ai->netmask);
+ PARA_INFO_LOG("adding %s/%i to access list\n", addr, ai->netmask);
para_list_add(&ai->node, acl);
}
* \param addr The address to delete.
* \param netmask The netmask of the entry to be removed from the list.
*/
-static void acl_del_entry(struct list_head *acl, struct in_addr addr,
- int netmask)
+static void acl_del_entry(struct list_head *acl, char *addr, int netmask)
{
struct access_info *ai, *tmp;
list_for_each_entry_safe(ai, tmp, acl, node) {
- char *nad = para_strdup(inet_ntoa(ai->addr));
- if (!strcmp(nad, inet_ntoa(addr)) &&
+ if (!strcmp(addr, inet_ntoa(ai->addr)) &&
ai->netmask == netmask) {
PARA_NOTICE_LOG("removing %s/%i from access list\n",
- nad, ai->netmask);
+ addr, ai->netmask);
list_del(&ai->node);
free(ai);
}
- free(nad);
}
}
for (i = 0; i < num; i++) {
char *arg = para_strdup(acl_info[i]);
char *p = strchr(arg, '/');
- struct in_addr addr;
int netmask;
if (!p)
goto err;
*p = '\0';
- if (!inet_pton(AF_INET, arg, &addr))
+ if (!is_valid_ipv4_address(arg))
goto err;
netmask = atoi(++p);
if (netmask < 0 || netmask > 32)
goto err;
- acl_add_entry(acl, addr, netmask);
+ acl_add_entry(acl, arg, netmask);
goto success;
err:
PARA_CRIT_LOG("syntax error: %s\n", acl_info[i]);
* \param acl The access control list.
* \param default_deny Whether \a acl is a whitelist.
*/
-void acl_allow(struct in_addr addr, int netmask,
- struct list_head *acl, int default_deny)
+void acl_allow(char *addr, int netmask,
+ struct list_head *acl, int default_deny)
{
if (default_deny)
acl_add_entry(acl, addr, netmask);
* \param acl The access control list.
* \param default_deny Whether \a acl is a whitelist.
*/
-void acl_deny(struct in_addr addr, int netmask,
- struct list_head *acl, int default_deny)
+void acl_deny(char *addr, int netmask,
+ struct list_head *acl, int default_deny)
{
acl_allow(addr, netmask, acl, !default_deny);
}
void acl_init(struct list_head *acl, char * const *acl_info, int num);
char *acl_get_contents(struct list_head *acl);
int acl_check_access(int fd, struct list_head *acl, int default_deny);
-void acl_allow(struct in_addr addr, int netmask,
- struct list_head *acl, int default_deny);
-void acl_deny(struct in_addr addr, int netmask,
- struct list_head *acl, int default_deny);
+void acl_allow(char *addr, int mask, struct list_head *acl, int default_deny);
+void acl_deny(char *addr, int mask, struct list_head *acl, int default_deny);
case SENDER_ALLOW:
if (argc != 4 && argc != 5)
return -E_COMMAND_SYNTAX;
- if (!inet_pton(AF_INET, argv[3], &scd->addr))
+ if (!is_valid_ipv4_address(argv[3]))
return -E_COMMAND_SYNTAX;
scd->netmask = 32;
if (argc == 5) {
if (scd->netmask < 0 || scd->netmask > 32)
return -E_COMMAND_SYNTAX;
}
+ strncpy(scd->host, argv[3], sizeof(scd->host));
break;
case SENDER_ADD:
case SENDER_DELETE:
usleep(100 * 1000);
continue;
}
- mmd->sender_cmd_data = scd;
+ memcpy(&mmd->sender_cmd_data, &scd, sizeof(scd));
mutex_unlock(mmd_mutex);
break;
}
void generic_com_allow(struct sender_command_data *scd,
struct sender_status *ss)
{
- acl_allow(scd->addr, scd->netmask, &ss->acl, ss->default_deny);
+ acl_allow(scd->host, scd->netmask, &ss->acl, ss->default_deny);
}
/**
void generic_com_deny(struct sender_command_data *scd,
struct sender_status *ss)
{
- acl_deny(scd->addr, scd->netmask, &ss->acl, ss->default_deny);
+ acl_deny(scd->host, scd->netmask, &ss->acl, ss->default_deny);
}
/**