File: | src/usr.sbin/rbootd/utils.c |
Warning: | line 394, column 3 Value stored to 'rtmp' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* $OpenBSD: utils.c,v 1.17 2017/01/20 03:47:31 krw Exp $ */ |
2 | /* $NetBSD: utils.c,v 1.5.2.1 1995/11/14 08:45:46 thorpej Exp $ */ |
3 | |
4 | /* |
5 | * Copyright (c) 1988, 1992 The University of Utah and the Center |
6 | * for Software Science (CSS). |
7 | * Copyright (c) 1992, 1993 |
8 | * The Regents of the University of California. All rights reserved. |
9 | * |
10 | * This code is derived from software contributed to Berkeley by |
11 | * the Center for Software Science of the University of Utah Computer |
12 | * Science Department. CSS requests users of this software to return |
13 | * to css-dist@cs.utah.edu any improvements that they make and grant |
14 | * CSS redistribution rights. |
15 | * |
16 | * Redistribution and use in source and binary forms, with or without |
17 | * modification, are permitted provided that the following conditions |
18 | * are met: |
19 | * 1. Redistributions of source code must retain the above copyright |
20 | * notice, this list of conditions and the following disclaimer. |
21 | * 2. Redistributions in binary form must reproduce the above copyright |
22 | * notice, this list of conditions and the following disclaimer in the |
23 | * documentation and/or other materials provided with the distribution. |
24 | * 3. Neither the name of the University nor the names of its contributors |
25 | * may be used to endorse or promote products derived from this software |
26 | * without specific prior written permission. |
27 | * |
28 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
29 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
30 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
31 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
32 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
33 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
34 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
35 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
36 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
37 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
38 | * SUCH DAMAGE. |
39 | * |
40 | * from: @(#)utils.c 8.1 (Berkeley) 6/4/93 |
41 | * |
42 | * From: Utah Hdr: utils.c 3.1 92/07/06 |
43 | * Author: Jeff Forys, University of Utah CSS |
44 | */ |
45 | |
46 | #include <sys/time.h> |
47 | #include <stdio.h> |
48 | #include <stdlib.h> |
49 | #include <string.h> |
50 | #include <syslog.h> |
51 | #include <time.h> |
52 | #include <unistd.h> |
53 | #include "defs.h" |
54 | |
55 | /* |
56 | ** DispPkt -- Display the contents of an RMPCONN packet. |
57 | ** |
58 | ** Parameters: |
59 | ** rconn - packet to be displayed. |
60 | ** direct - direction packet is going (DIR_*). |
61 | ** |
62 | ** Returns: |
63 | ** Nothing. |
64 | ** |
65 | ** Side Effects: |
66 | ** None. |
67 | */ |
68 | void |
69 | DispPkt(RMPCONN *rconn, int direct) |
70 | { |
71 | static const char BootFmt[] = |
72 | "\t\tRetCode:%u SeqNo:%x SessID:%x Vers:%u"; |
73 | static const char ReadFmt[] = |
74 | "\t\tRetCode:%u Offset:%x SessID:%x\n"; |
75 | struct tm *tmp; |
76 | struct rmp_packet *rmp; |
77 | int i; |
78 | u_int32_t t; |
79 | time_t tim; |
80 | |
81 | /* display direction packet is going using '>>>' or '<<<' */ |
82 | fputs((direct==DIR_RCVD0)?"<<< ":(direct==DIR_SENT1)?">>> ":"", DbgFp); |
83 | |
84 | /* display packet timestamp */ |
85 | |
86 | tim = rconn->tstamp.tv_sec; |
87 | tmp = localtime(&tim); |
88 | fprintf(DbgFp, "%02d:%02d:%02d.%06ld ", tmp->tm_hour, tmp->tm_min, |
89 | tmp->tm_sec, rconn->tstamp.tv_usec); |
90 | |
91 | /* display src or dst addr and information about network interface */ |
92 | fprintf(DbgFp, "Addr: %s Intf: %s\n", EnetStr(rconn)GetEtherAddr(&(rconn)->rmp.hp_hdr.saddr[0]), IntfName); |
93 | |
94 | rmp = &rconn->rmp; |
95 | |
96 | /* display IEEE 802.2 Logical Link Control header */ |
97 | (void) fprintf(DbgFp, "\t802.2 LLC: DSAP:%x SSAP:%x CTRL:%x\n", |
98 | rmp->hp_llc.dsap, rmp->hp_llc.ssap, ntohs(rmp->hp_llc.cntrl)(__uint16_t)(__builtin_constant_p(rmp->hp_llc.cntrl) ? (__uint16_t )(((__uint16_t)(rmp->hp_llc.cntrl) & 0xffU) << 8 | ((__uint16_t)(rmp->hp_llc.cntrl) & 0xff00U) >> 8) : __swap16md(rmp->hp_llc.cntrl))); |
99 | |
100 | /* display HP extensions to 802.2 Logical Link Control header */ |
101 | (void) fprintf(DbgFp, "\tHP Ext: DXSAP:%x SXSAP:%x\n", |
102 | ntohs(rmp->hp_llc.dxsap)(__uint16_t)(__builtin_constant_p(rmp->hp_llc.dxsap) ? (__uint16_t )(((__uint16_t)(rmp->hp_llc.dxsap) & 0xffU) << 8 | ((__uint16_t)(rmp->hp_llc.dxsap) & 0xff00U) >> 8) : __swap16md(rmp->hp_llc.dxsap)), ntohs(rmp->hp_llc.sxsap)(__uint16_t)(__builtin_constant_p(rmp->hp_llc.sxsap) ? (__uint16_t )(((__uint16_t)(rmp->hp_llc.sxsap) & 0xffU) << 8 | ((__uint16_t)(rmp->hp_llc.sxsap) & 0xff00U) >> 8) : __swap16md(rmp->hp_llc.sxsap))); |
103 | |
104 | /* |
105 | * Display information about RMP packet using type field to |
106 | * determine what kind of packet this is. |
107 | */ |
108 | switch (rmp->r_typermp_proto.rmp_raw.rmp_type) { |
109 | case RMP_BOOT_REQ1: /* boot request */ |
110 | (void) fprintf(DbgFp, "\tBoot Request:"); |
111 | GETWORD(rmp->r_brq.rmp_seqno, t)(t) = (((u_int32_t)(__uint16_t)(__builtin_constant_p((rmp-> rmp_proto.rmp_brq.rmp_seqno).val[0]) ? (__uint16_t)(((__uint16_t )((rmp->rmp_proto.rmp_brq.rmp_seqno).val[0]) & 0xffU) << 8 | ((__uint16_t)((rmp->rmp_proto.rmp_brq.rmp_seqno).val[ 0]) & 0xff00U) >> 8) : __swap16md((rmp->rmp_proto .rmp_brq.rmp_seqno).val[0]))) << 16) | (__uint16_t)(__builtin_constant_p ((rmp->rmp_proto.rmp_brq.rmp_seqno).val[1]) ? (__uint16_t) (((__uint16_t)((rmp->rmp_proto.rmp_brq.rmp_seqno).val[1]) & 0xffU) << 8 | ((__uint16_t)((rmp->rmp_proto.rmp_brq .rmp_seqno).val[1]) & 0xff00U) >> 8) : __swap16md(( rmp->rmp_proto.rmp_brq.rmp_seqno).val[1])); |
112 | if (ntohs(rmp->r_brq.rmp_session)(__uint16_t)(__builtin_constant_p(rmp->rmp_proto.rmp_brq.rmp_session ) ? (__uint16_t)(((__uint16_t)(rmp->rmp_proto.rmp_brq.rmp_session ) & 0xffU) << 8 | ((__uint16_t)(rmp->rmp_proto.rmp_brq .rmp_session) & 0xff00U) >> 8) : __swap16md(rmp-> rmp_proto.rmp_brq.rmp_session)) == RMP_PROBESID0xffff) { |
113 | if (WORDZE(rmp->r_brq.rmp_seqno)((rmp->rmp_proto.rmp_brq.rmp_seqno.val[0] == 0) && (rmp->rmp_proto.rmp_brq.rmp_seqno.val[1] == 0))) |
114 | fputs(" (Send Server ID)", DbgFp); |
115 | else |
116 | fprintf(DbgFp," (Send Filename #%u)",t); |
117 | } |
118 | (void) fputc('\n', DbgFp); |
119 | (void) fprintf(DbgFp, BootFmt, rmp->r_brqrmp_proto.rmp_brq.rmp_retcode, |
120 | t, ntohs(rmp->r_brq.rmp_session)(__uint16_t)(__builtin_constant_p(rmp->rmp_proto.rmp_brq.rmp_session ) ? (__uint16_t)(((__uint16_t)(rmp->rmp_proto.rmp_brq.rmp_session ) & 0xffU) << 8 | ((__uint16_t)(rmp->rmp_proto.rmp_brq .rmp_session) & 0xff00U) >> 8) : __swap16md(rmp-> rmp_proto.rmp_brq.rmp_session)), |
121 | ntohs(rmp->r_brq.rmp_version)(__uint16_t)(__builtin_constant_p(rmp->rmp_proto.rmp_brq.rmp_version ) ? (__uint16_t)(((__uint16_t)(rmp->rmp_proto.rmp_brq.rmp_version ) & 0xffU) << 8 | ((__uint16_t)(rmp->rmp_proto.rmp_brq .rmp_version) & 0xff00U) >> 8) : __swap16md(rmp-> rmp_proto.rmp_brq.rmp_version))); |
122 | (void) fprintf(DbgFp, "\n\t\tMachine Type: "); |
123 | for (i = 0; i < RMP_MACHLEN20; i++) |
124 | (void) fputc(rmp->r_brqrmp_proto.rmp_brq.rmp_machtype[i], DbgFp); |
125 | DspFlnm(rmp->r_brqrmp_proto.rmp_brq.rmp_flnmsize, &rmp->r_brqrmp_proto.rmp_brq.rmp_flnm); |
126 | break; |
127 | case RMP_BOOT_REPL129: /* boot reply */ |
128 | fprintf(DbgFp, "\tBoot Reply:\n"); |
129 | GETWORD(rmp->r_brpl.rmp_seqno, t)(t) = (((u_int32_t)(__uint16_t)(__builtin_constant_p((rmp-> rmp_proto.rmp_brpl.rmp_seqno).val[0]) ? (__uint16_t)(((__uint16_t )((rmp->rmp_proto.rmp_brpl.rmp_seqno).val[0]) & 0xffU) << 8 | ((__uint16_t)((rmp->rmp_proto.rmp_brpl.rmp_seqno ).val[0]) & 0xff00U) >> 8) : __swap16md((rmp->rmp_proto .rmp_brpl.rmp_seqno).val[0]))) << 16) | (__uint16_t)(__builtin_constant_p ((rmp->rmp_proto.rmp_brpl.rmp_seqno).val[1]) ? (__uint16_t )(((__uint16_t)((rmp->rmp_proto.rmp_brpl.rmp_seqno).val[1] ) & 0xffU) << 8 | ((__uint16_t)((rmp->rmp_proto. rmp_brpl.rmp_seqno).val[1]) & 0xff00U) >> 8) : __swap16md ((rmp->rmp_proto.rmp_brpl.rmp_seqno).val[1])); |
130 | (void) fprintf(DbgFp, BootFmt, rmp->r_brplrmp_proto.rmp_brpl.rmp_retcode, |
131 | t, ntohs(rmp->r_brpl.rmp_session)(__uint16_t)(__builtin_constant_p(rmp->rmp_proto.rmp_brpl. rmp_session) ? (__uint16_t)(((__uint16_t)(rmp->rmp_proto.rmp_brpl .rmp_session) & 0xffU) << 8 | ((__uint16_t)(rmp-> rmp_proto.rmp_brpl.rmp_session) & 0xff00U) >> 8) : __swap16md (rmp->rmp_proto.rmp_brpl.rmp_session)), |
132 | ntohs(rmp->r_brpl.rmp_version)(__uint16_t)(__builtin_constant_p(rmp->rmp_proto.rmp_brpl. rmp_version) ? (__uint16_t)(((__uint16_t)(rmp->rmp_proto.rmp_brpl .rmp_version) & 0xffU) << 8 | ((__uint16_t)(rmp-> rmp_proto.rmp_brpl.rmp_version) & 0xff00U) >> 8) : __swap16md (rmp->rmp_proto.rmp_brpl.rmp_version))); |
133 | DspFlnm(rmp->r_brplrmp_proto.rmp_brpl.rmp_flnmsize,&rmp->r_brplrmp_proto.rmp_brpl.rmp_flnm); |
134 | break; |
135 | case RMP_READ_REQ2: /* read request */ |
136 | (void) fprintf(DbgFp, "\tRead Request:\n"); |
137 | GETWORD(rmp->r_rrq.rmp_offset, t)(t) = (((u_int32_t)(__uint16_t)(__builtin_constant_p((rmp-> rmp_proto.rmp_rrq.rmp_offset).val[0]) ? (__uint16_t)(((__uint16_t )((rmp->rmp_proto.rmp_rrq.rmp_offset).val[0]) & 0xffU) << 8 | ((__uint16_t)((rmp->rmp_proto.rmp_rrq.rmp_offset ).val[0]) & 0xff00U) >> 8) : __swap16md((rmp->rmp_proto .rmp_rrq.rmp_offset).val[0]))) << 16) | (__uint16_t)(__builtin_constant_p ((rmp->rmp_proto.rmp_rrq.rmp_offset).val[1]) ? (__uint16_t )(((__uint16_t)((rmp->rmp_proto.rmp_rrq.rmp_offset).val[1] ) & 0xffU) << 8 | ((__uint16_t)((rmp->rmp_proto. rmp_rrq.rmp_offset).val[1]) & 0xff00U) >> 8) : __swap16md ((rmp->rmp_proto.rmp_rrq.rmp_offset).val[1])); |
138 | (void) fprintf(DbgFp, ReadFmt, rmp->r_rrqrmp_proto.rmp_rrq.rmp_retcode, |
139 | t, ntohs(rmp->r_rrq.rmp_session)(__uint16_t)(__builtin_constant_p(rmp->rmp_proto.rmp_rrq.rmp_session ) ? (__uint16_t)(((__uint16_t)(rmp->rmp_proto.rmp_rrq.rmp_session ) & 0xffU) << 8 | ((__uint16_t)(rmp->rmp_proto.rmp_rrq .rmp_session) & 0xff00U) >> 8) : __swap16md(rmp-> rmp_proto.rmp_rrq.rmp_session))); |
140 | (void) fprintf(DbgFp, "\t\tNoOfBytes: %u\n", |
141 | ntohs(rmp->r_rrq.rmp_size)(__uint16_t)(__builtin_constant_p(rmp->rmp_proto.rmp_rrq.rmp_size ) ? (__uint16_t)(((__uint16_t)(rmp->rmp_proto.rmp_rrq.rmp_size ) & 0xffU) << 8 | ((__uint16_t)(rmp->rmp_proto.rmp_rrq .rmp_size) & 0xff00U) >> 8) : __swap16md(rmp->rmp_proto .rmp_rrq.rmp_size))); |
142 | break; |
143 | case RMP_READ_REPL130: /* read reply */ |
144 | (void) fprintf(DbgFp, "\tRead Reply:\n"); |
145 | GETWORD(rmp->r_rrpl.rmp_offset, t)(t) = (((u_int32_t)(__uint16_t)(__builtin_constant_p((rmp-> rmp_proto.rmp_rrpl.rmp_offset).val[0]) ? (__uint16_t)(((__uint16_t )((rmp->rmp_proto.rmp_rrpl.rmp_offset).val[0]) & 0xffU ) << 8 | ((__uint16_t)((rmp->rmp_proto.rmp_rrpl.rmp_offset ).val[0]) & 0xff00U) >> 8) : __swap16md((rmp->rmp_proto .rmp_rrpl.rmp_offset).val[0]))) << 16) | (__uint16_t)(__builtin_constant_p ((rmp->rmp_proto.rmp_rrpl.rmp_offset).val[1]) ? (__uint16_t )(((__uint16_t)((rmp->rmp_proto.rmp_rrpl.rmp_offset).val[1 ]) & 0xffU) << 8 | ((__uint16_t)((rmp->rmp_proto .rmp_rrpl.rmp_offset).val[1]) & 0xff00U) >> 8) : __swap16md ((rmp->rmp_proto.rmp_rrpl.rmp_offset).val[1])); |
146 | (void) fprintf(DbgFp, ReadFmt, rmp->r_rrplrmp_proto.rmp_rrpl.rmp_retcode, |
147 | t, ntohs(rmp->r_rrpl.rmp_session)(__uint16_t)(__builtin_constant_p(rmp->rmp_proto.rmp_rrpl. rmp_session) ? (__uint16_t)(((__uint16_t)(rmp->rmp_proto.rmp_rrpl .rmp_session) & 0xffU) << 8 | ((__uint16_t)(rmp-> rmp_proto.rmp_rrpl.rmp_session) & 0xff00U) >> 8) : __swap16md (rmp->rmp_proto.rmp_rrpl.rmp_session))); |
148 | (void) fprintf(DbgFp, "\t\tNoOfBytesSent: %ld\n", |
149 | (long)(rconn->rmplen - RMPREADSIZE(0)(sizeof(struct hp_hdr) + sizeof(struct hp_llc) + sizeof(struct rmp_read_repl) + 0 - sizeof(restofpkt) - sizeof(u_int8_t)))); |
150 | break; |
151 | case RMP_BOOT_DONE3: /* boot complete */ |
152 | (void) fprintf(DbgFp, "\tBoot Complete:\n"); |
153 | (void) fprintf(DbgFp, "\t\tRetCode:%u SessID:%x\n", |
154 | rmp->r_donermp_proto.rmp_done.rmp_retcode, |
155 | ntohs(rmp->r_done.rmp_session)(__uint16_t)(__builtin_constant_p(rmp->rmp_proto.rmp_done. rmp_session) ? (__uint16_t)(((__uint16_t)(rmp->rmp_proto.rmp_done .rmp_session) & 0xffU) << 8 | ((__uint16_t)(rmp-> rmp_proto.rmp_done.rmp_session) & 0xff00U) >> 8) : __swap16md (rmp->rmp_proto.rmp_done.rmp_session))); |
156 | break; |
157 | default: /* ??? */ |
158 | (void) fprintf(DbgFp, "\tUnknown Type:(%d)\n", |
159 | rmp->r_typermp_proto.rmp_raw.rmp_type); |
160 | break; |
161 | } |
162 | (void) fputc('\n', DbgFp); |
163 | (void) fflush(DbgFp); |
164 | } |
165 | |
166 | |
167 | /* |
168 | ** GetEtherAddr -- convert an RMP (Ethernet) address into a string. |
169 | ** |
170 | ** An RMP BOOT packet has been received. Look at the type field |
171 | ** and process Boot Requests, Read Requests, and Boot Complete |
172 | ** packets. Any other type will be dropped with a warning msg. |
173 | ** |
174 | ** Parameters: |
175 | ** addr - array of RMP_ADDRLEN bytes. |
176 | ** |
177 | ** Returns: |
178 | ** Pointer to static string representation of `addr'. |
179 | ** |
180 | ** Side Effects: |
181 | ** None. |
182 | ** |
183 | ** Warnings: |
184 | ** - The return value points to a static buffer; it must |
185 | ** be copied if it's to be saved. |
186 | */ |
187 | char * |
188 | GetEtherAddr(u_int8_t *addr) |
189 | { |
190 | static char Hex[] = "0123456789abcdef"; |
191 | static char etherstr[RMP_ADDRLEN6*3]; |
192 | int i; |
193 | char *cp; |
194 | |
195 | /* |
196 | * For each byte in `addr', convert it to "<hexchar><hexchar>:". |
197 | * The last byte does not get a trailing `:' appended. |
198 | */ |
199 | i = 0; |
200 | cp = etherstr; |
201 | for(;;) { |
202 | *cp++ = Hex[*addr >> 4 & 0xf]; |
203 | *cp++ = Hex[*addr++ & 0xf]; |
204 | if (++i == RMP_ADDRLEN6) |
205 | break; |
206 | *cp++ = ':'; |
207 | } |
208 | *cp = '\0'; |
209 | |
210 | return(etherstr); |
211 | } |
212 | |
213 | |
214 | /* |
215 | ** DispFlnm -- Print a string of bytes to DbgFp (often, a file name). |
216 | ** |
217 | ** Parameters: |
218 | ** size - number of bytes to print. |
219 | ** flnm - address of first byte. |
220 | ** |
221 | ** Returns: |
222 | ** Nothing. |
223 | ** |
224 | ** Side Effects: |
225 | ** - Characters are sent to `DbgFp'. |
226 | */ |
227 | void |
228 | DspFlnm(u_int size, char *flnm) |
229 | { |
230 | u_int i; |
231 | |
232 | (void) fprintf(DbgFp, "\n\t\tFile Name (%u): <", size); |
233 | for (i = 0; i < size; i++) |
234 | (void) fputc(*flnm++, DbgFp); |
235 | (void) fputs(">\n", DbgFp); |
236 | } |
237 | |
238 | |
239 | /* |
240 | ** NewClient -- allocate memory for a new CLIENT. |
241 | ** |
242 | ** Parameters: |
243 | ** addr - RMP (Ethernet) address of new client. |
244 | ** |
245 | ** Returns: |
246 | ** Ptr to new CLIENT or NULL if we ran out of memory. |
247 | ** |
248 | ** Side Effects: |
249 | ** - Memory will be malloc'd for the new CLIENT. |
250 | ** - If malloc() fails, a log message will be generated. |
251 | */ |
252 | CLIENT * |
253 | NewClient(u_int8_t *addr) |
254 | { |
255 | CLIENT *ctmp; |
256 | |
257 | if ((ctmp = malloc(sizeof(CLIENT))) == NULL((void *)0)) { |
258 | syslog(LOG_ERR3, "NewClient: out of memory (%s)", |
259 | GetEtherAddr(addr)); |
260 | return(NULL((void *)0)); |
261 | } |
262 | |
263 | bzero(ctmp, sizeof(CLIENT)); |
264 | bcopy(addr, &ctmp->addr[0], RMP_ADDRLEN6); |
265 | return(ctmp); |
266 | } |
267 | |
268 | /* |
269 | ** FreeClient -- free linked list of Clients. |
270 | ** |
271 | ** Parameters: |
272 | ** None. |
273 | ** |
274 | ** Returns: |
275 | ** Nothing. |
276 | ** |
277 | ** Side Effects: |
278 | ** - All malloc'd memory associated with the linked list of |
279 | ** CLIENTS will be free'd; `Clients' will be set to NULL. |
280 | ** |
281 | ** Warnings: |
282 | ** - This routine must be called with SIGHUP blocked. |
283 | */ |
284 | void |
285 | FreeClients(void) |
286 | { |
287 | CLIENT *ctmp; |
288 | |
289 | while (Clients != NULL((void *)0)) { |
290 | ctmp = Clients; |
291 | Clients = Clients->next; |
292 | FreeClient(ctmp)free(ctmp); |
293 | } |
294 | } |
295 | |
296 | /* |
297 | ** NewStr -- allocate memory for a character array. |
298 | ** |
299 | ** Parameters: |
300 | ** str - null terminated character array. |
301 | ** |
302 | ** Returns: |
303 | ** Ptr to new character array or NULL if we ran out of memory. |
304 | ** |
305 | ** Side Effects: |
306 | ** - Memory will be malloc'd for the new character array. |
307 | ** - If malloc() fails, a log message will be generated. |
308 | */ |
309 | char * |
310 | NewStr(char *str) |
311 | { |
312 | char *stmp; |
313 | |
314 | stmp = strdup(str); |
315 | if (stmp == NULL((void *)0)) { |
316 | syslog(LOG_ERR3, "NewStr: out of memory (%s)", str); |
317 | return(NULL((void *)0)); |
318 | } |
319 | return(stmp); |
320 | } |
321 | |
322 | /* |
323 | ** To save time, NewConn and FreeConn maintain a cache of one RMPCONN |
324 | ** in `LastFree' (defined below). |
325 | */ |
326 | |
327 | static RMPCONN *LastFree = NULL((void *)0); |
328 | |
329 | /* |
330 | ** NewConn -- allocate memory for a new RMPCONN connection. |
331 | ** |
332 | ** Parameters: |
333 | ** rconn - initialization template for new connection. |
334 | ** |
335 | ** Returns: |
336 | ** Ptr to new RMPCONN or NULL if we ran out of memory. |
337 | ** |
338 | ** Side Effects: |
339 | ** - Memory may be malloc'd for the new RMPCONN (if not cached). |
340 | ** - If malloc() fails, a log message will be generated. |
341 | */ |
342 | RMPCONN * |
343 | NewConn(RMPCONN *rconn) |
344 | { |
345 | RMPCONN *rtmp; |
346 | |
347 | if (LastFree == NULL((void *)0)) { /* nothing cached; make a new one */ |
348 | if ((rtmp = malloc(sizeof(RMPCONN))) == NULL((void *)0)) { |
349 | syslog(LOG_ERR3, "NewConn: out of memory (%s)", |
350 | EnetStr(rconn)GetEtherAddr(&(rconn)->rmp.hp_hdr.saddr[0])); |
351 | return(NULL((void *)0)); |
352 | } |
353 | } else { /* use the cached RMPCONN */ |
354 | rtmp = LastFree; |
355 | LastFree = NULL((void *)0); |
356 | } |
357 | |
358 | /* |
359 | * Copy template into `rtmp', init file descriptor to `-1' and |
360 | * set ptr to next elem NULL. |
361 | */ |
362 | bcopy((char *)rconn, (char *)rtmp, sizeof(RMPCONN)); |
363 | rtmp->bootfd = -1; |
364 | rtmp->next = NULL((void *)0); |
365 | |
366 | return(rtmp); |
367 | } |
368 | |
369 | /* |
370 | ** FreeConn -- Free memory associated with an RMPCONN connection. |
371 | ** |
372 | ** Parameters: |
373 | ** rtmp - ptr to RMPCONN to be free'd. |
374 | ** |
375 | ** Returns: |
376 | ** Nothing. |
377 | ** |
378 | ** Side Effects: |
379 | ** - Memory associated with `rtmp' may be free'd (or cached). |
380 | ** - File desc associated with `rtmp->bootfd' will be closed. |
381 | */ |
382 | void |
383 | FreeConn(RMPCONN *rtmp) |
384 | { |
385 | /* |
386 | * If the file descriptor is in use, close the file. |
387 | */ |
388 | if (rtmp->bootfd >= 0) { |
389 | (void) close(rtmp->bootfd); |
390 | rtmp->bootfd = -1; |
391 | } |
392 | |
393 | if (LastFree == NULL((void *)0)) /* cache for next time */ |
394 | rtmp = LastFree; |
Value stored to 'rtmp' is never read | |
395 | else /* already one cached; free this one */ |
396 | free((char *)rtmp); |
397 | } |
398 | |
399 | /* |
400 | ** FreeConns -- free linked list of RMPCONN connections. |
401 | ** |
402 | ** Parameters: |
403 | ** None. |
404 | ** |
405 | ** Returns: |
406 | ** Nothing. |
407 | ** |
408 | ** Side Effects: |
409 | ** - All malloc'd memory associated with the linked list of |
410 | ** connections will be free'd; `RmpConns' will be set to NULL. |
411 | ** - If LastFree is != NULL, it too will be free'd & NULL'd. |
412 | ** |
413 | ** Warnings: |
414 | ** - This routine must be called with SIGHUP blocked. |
415 | */ |
416 | void |
417 | FreeConns(void) |
418 | { |
419 | RMPCONN *rtmp; |
420 | |
421 | while (RmpConns != NULL((void *)0)) { |
422 | rtmp = RmpConns; |
423 | RmpConns = RmpConns->next; |
424 | FreeConn(rtmp); |
425 | } |
426 | |
427 | if (LastFree != NULL((void *)0)) { |
428 | free((char *)LastFree); |
429 | LastFree = NULL((void *)0); |
430 | } |
431 | } |
432 | |
433 | /* |
434 | ** AddConn -- Add a connection to the linked list of connections. |
435 | ** |
436 | ** Parameters: |
437 | ** rconn - connection to be added. |
438 | ** |
439 | ** Returns: |
440 | ** Nothing. |
441 | ** |
442 | ** Side Effects: |
443 | ** - RmpConn will point to new connection. |
444 | ** |
445 | ** Warnings: |
446 | ** - This routine must be called with SIGHUP blocked. |
447 | */ |
448 | void |
449 | AddConn(RMPCONN *rconn) |
450 | { |
451 | if (RmpConns != NULL((void *)0)) |
452 | rconn->next = RmpConns; |
453 | RmpConns = rconn; |
454 | } |
455 | |
456 | /* |
457 | ** FindConn -- Find a connection in the linked list of connections. |
458 | ** |
459 | ** We use the RMP (Ethernet) address as the basis for determining |
460 | ** if this is the same connection. According to the Remote Maint |
461 | ** Protocol, we can only have one connection with any machine. |
462 | ** |
463 | ** Parameters: |
464 | ** rconn - connection to be found. |
465 | ** |
466 | ** Returns: |
467 | ** Matching connection from linked list or NULL if not found. |
468 | ** |
469 | ** Side Effects: |
470 | ** None. |
471 | ** |
472 | ** Warnings: |
473 | ** - This routine must be called with SIGHUP blocked. |
474 | */ |
475 | RMPCONN * |
476 | FindConn(RMPCONN *rconn) |
477 | { |
478 | RMPCONN *rtmp; |
479 | |
480 | for (rtmp = RmpConns; rtmp != NULL((void *)0); rtmp = rtmp->next) |
481 | if (bcmp((char *)&rconn->rmp.hp_hdr.saddr[0], |
482 | (char *)&rtmp->rmp.hp_hdr.saddr[0], RMP_ADDRLEN6) == 0) |
483 | break; |
484 | |
485 | return(rtmp); |
486 | } |
487 | |
488 | /* |
489 | ** RemoveConn -- Remove a connection from the linked list of connections. |
490 | ** |
491 | ** Parameters: |
492 | ** rconn - connection to be removed. |
493 | ** |
494 | ** Returns: |
495 | ** Nothing. |
496 | ** |
497 | ** Side Effects: |
498 | ** - If found, an RMPCONN will cease to exist and it will |
499 | ** be removed from the linked list. |
500 | ** |
501 | ** Warnings: |
502 | ** - This routine must be called with SIGHUP blocked. |
503 | */ |
504 | void |
505 | RemoveConn(RMPCONN *rconn) |
506 | { |
507 | RMPCONN *thisrconn, *lastrconn; |
508 | |
509 | if (RmpConns == rconn) { /* easy case */ |
510 | RmpConns = RmpConns->next; |
511 | FreeConn(rconn); |
512 | } else { /* must traverse linked list */ |
513 | lastrconn = RmpConns; /* set back ptr */ |
514 | thisrconn = lastrconn->next; /* set current ptr */ |
515 | while (thisrconn != NULL((void *)0)) { |
516 | if (rconn == thisrconn) { /* found it */ |
517 | lastrconn->next = thisrconn->next; |
518 | FreeConn(thisrconn); |
519 | break; |
520 | } |
521 | lastrconn = thisrconn; |
522 | thisrconn = thisrconn->next; |
523 | } |
524 | } |
525 | } |