+static void usageerr(const char *m) {
+ fprintf(stderr,"bad usage: %s\n",m);
+ exit(12);
+}
+
+static void bindmaster(const char *bindname) {
+ union {
+ struct sockaddr sa;
+ struct sockaddr_in sin;
+ struct sockaddr_un sun;
+ } su;
+ socklen_t sulen;
+ const char *colon;
+ char *copy, *ep;
+ int r;
+ unsigned long portul;
+ struct hostent *he;
+ struct servent *se;
+
+ memset(&su,0,sizeof(su));
+
+ if (bindname[0]=='/' || bindname[0]=='.') {
+
+ if (strlen(bindname) >= sizeof(su.sun.sun_path))
+ usageerr("AF_UNIX bind path too long");
+ sulen= sizeof(su.sun);
+ su.sun.sun_family= AF_UNIX;
+ strcpy(su.sun.sun_path, bindname);
+
+ } else if (bindname[0] != ':' && (colon= strrchr(bindname,':'))) {
+
+ sulen= sizeof(su.sin);
+ su.sin.sin_family= AF_INET;
+
+ copy= xmalloc(colon - bindname + 1);
+ memcpy(copy,bindname, colon - bindname + 1);
+ copy[colon - bindname]= 0;
+ portul= strtoul(colon+1,&ep,0);
+
+ if (!*ep) {
+ if (!portul || portul>=65536) usageerr("invalid port number");
+ su.sin.sin_port= htons(portul);
+ } else {
+ se= getservbyname(colon+1, "tcp");
+ if (!se) { fprintf(stderr,"unknown service `%s'\n",colon+1); exit(4); }
+ su.sin.sin_port= htons(se->s_port);
+ }
+
+ if (!strcmp(copy,"any")) {
+ su.sin.sin_addr.s_addr= INADDR_ANY;
+ } else if (!inet_aton(copy,&su.sin.sin_addr)) {
+ he= gethostbyname(copy);
+ if (!he) { herror(copy); exit(4); }
+ if (he->h_addrtype != AF_INET ||
+ he->h_length != sizeof(su.sin.sin_addr) ||
+ !he->h_addr_list[0] ||
+ he->h_addr_list[1]) {
+ fprintf(stderr,"hostname lookup `%s' did not yield"
+ " exactly one IPv4 address\n",copy);
+ exit(4);
+ }
+ memcpy(&su.sin.sin_addr, he->h_addr_list[0], sizeof(su.sin.sin_addr));
+ }
+
+ } else {
+ usageerr("unknown bind name");
+ exit(12);
+ }
+
+ master= socket(su.sa.sa_family,SOCK_STREAM,0);
+ if (master<0) { perror("socket"); exit(8); }
+
+ r= bind(master, &su.sa, sulen);
+ if (r) { perror("bind"); exit(8); }
+
+ r= listen(master, 5);
+ if (r) { perror("listen"); exit(8); }
+}
+