mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-01-10 01:48:00 +00:00
20f818af12
I mentioned recently (in commit 9e7d4c53d8
) message that I'm no
longer fond of the variable name 'ret', because it's used in two quite
different contexts: it's the return value from a subroutine you just
called (e.g. 'int ret = read(fd, buf, len);' and then check for error
or EOF), or it's the value you're preparing to return from the
_containing_ routine (maybe by assigning it a default value and then
conditionally modifying it, or by starting at NULL and reallocating,
or setting it just before using the 'goto out' cleanup idiom). In the
past I've occasionally made mistakes by forgetting which meaning the
variable had, or accidentally conflating both uses.
If all else fails, I now prefer 'retd' (short for 'returned') in the
former situation, and 'toret' (obviously, the value 'to return') in
the latter case. But even better is to pick a name that actually says
something more specific about what the thing actually is.
One particular bad habit throughout this codebase is to have a set of
functions that deal with some object type (say 'Foo'), all *but one*
of which take a 'Foo *foo' parameter, but the foo_new() function
starts with 'Foo *ret = snew(Foo)'. If all the rest of them think the
canonical name for the ambient Foo is 'foo', so should foo_new()!
So here's a no-brainer start on cutting down on the uses of 'ret': I
looked for all the cases where it was being assigned the result of an
allocation, and renamed the variable to be a description of the thing
being allocated. In the case of a new() function belonging to a
family, I picked the same name as the rest of the functions in its own
family, for consistency. In other cases I picked something sensible.
One case where it _does_ make sense not to use your usual name for the
variable type is when you're cloning an existing object. In that case,
_neither_ of the Foo objects involved should be called 'foo', because
it's ambiguous! They should be named so you can see which is which. In
the two cases I found here, I've called them 'orig' and 'copy'.
As in the previous refactoring, many thanks to clang-rename for the
help.
1880 lines
55 KiB
C
1880 lines
55 KiB
C
/*
|
|
* Windows networking abstraction.
|
|
*
|
|
* For the IPv6 code in here I am indebted to Jeroen Massar and
|
|
* unfix.org.
|
|
*/
|
|
|
|
#include <winsock2.h> /* need to put this first, for winelib builds */
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <assert.h>
|
|
|
|
#define NEED_DECLARATION_OF_SELECT /* in order to initialise it */
|
|
|
|
#include "putty.h"
|
|
#include "network.h"
|
|
#include "tree234.h"
|
|
#include "ssh.h"
|
|
|
|
#include <ws2tcpip.h>
|
|
|
|
#if HAVE_AFUNIX_H
|
|
#include <afunix.h>
|
|
#endif
|
|
|
|
#ifndef NO_IPV6
|
|
#ifdef __clang__
|
|
#pragma clang diagnostic push
|
|
#pragma clang diagnostic ignored "-Wmissing-braces"
|
|
#endif
|
|
const struct in6_addr in6addr_any = IN6ADDR_ANY_INIT;
|
|
const struct in6_addr in6addr_loopback = IN6ADDR_LOOPBACK_INIT;
|
|
#ifdef __clang__
|
|
#pragma clang diagnostic pop
|
|
#endif
|
|
#endif
|
|
|
|
#define ipv4_is_loopback(addr) \
|
|
((p_ntohl(addr.s_addr) & 0xFF000000L) == 0x7F000000L)
|
|
|
|
/*
|
|
* Mutable state that goes with a SockAddr: stores information
|
|
* about where in the list of candidate IP(v*) addresses we've
|
|
* currently got to.
|
|
*/
|
|
typedef struct SockAddrStep_tag SockAddrStep;
|
|
struct SockAddrStep_tag {
|
|
#ifndef NO_IPV6
|
|
struct addrinfo *ai; /* steps along addr->ais */
|
|
#endif
|
|
int curraddr;
|
|
};
|
|
|
|
typedef struct NetSocket NetSocket;
|
|
struct NetSocket {
|
|
const char *error;
|
|
SOCKET s;
|
|
Plug *plug;
|
|
bufchain output_data;
|
|
bool connected;
|
|
bool writable;
|
|
bool frozen; /* this causes readability notifications to be ignored */
|
|
bool frozen_readable; /* this means we missed at least one readability
|
|
* notification while we were frozen */
|
|
bool localhost_only; /* for listening sockets */
|
|
char oobdata[1];
|
|
size_t sending_oob;
|
|
bool oobinline, nodelay, keepalive, privport;
|
|
enum { EOF_NO, EOF_PENDING, EOF_SENT } outgoingeof;
|
|
SockAddr *addr;
|
|
SockAddrStep step;
|
|
int port;
|
|
int pending_error; /* in case send() returns error */
|
|
/*
|
|
* We sometimes need pairs of Socket structures to be linked:
|
|
* if we are listening on the same IPv6 and v4 port, for
|
|
* example. So here we define `parent' and `child' pointers to
|
|
* track this link.
|
|
*/
|
|
NetSocket *parent, *child;
|
|
|
|
Socket sock;
|
|
};
|
|
|
|
/*
|
|
* Top-level discriminator for SockAddr.
|
|
*
|
|
* UNRESOLVED means a host name not yet put through DNS; IP means a
|
|
* resolved IP address (or list of them); UNIX indicates the AF_UNIX
|
|
* network family (which Windows also has); NAMEDPIPE indicates that
|
|
* this SockAddr is phony, holding a Windows named pipe pathname
|
|
* instead of any address WinSock can understand.
|
|
*/
|
|
typedef enum SuperFamily {
|
|
UNRESOLVED,
|
|
IP,
|
|
#if HAVE_AFUNIX_H
|
|
UNIX,
|
|
#endif
|
|
NAMEDPIPE
|
|
} SuperFamily;
|
|
|
|
struct SockAddr {
|
|
int refcount;
|
|
const char *error;
|
|
SuperFamily superfamily;
|
|
#ifndef NO_IPV6
|
|
struct addrinfo *ais; /* Addresses IPv6 style. */
|
|
#endif
|
|
unsigned long *addresses; /* Addresses IPv4 style. */
|
|
int naddresses;
|
|
char hostname[512]; /* Store an unresolved host name. */
|
|
};
|
|
|
|
/*
|
|
* Which address family this address belongs to. AF_INET for IPv4;
|
|
* AF_INET6 for IPv6; AF_UNIX for Unix-domain sockets; AF_UNSPEC
|
|
* indicates that name resolution has not been done and a simple host
|
|
* name is held in this SockAddr structure.
|
|
*/
|
|
static inline int sockaddr_family(SockAddr *addr, SockAddrStep step)
|
|
{
|
|
switch (addr->superfamily) {
|
|
case IP:
|
|
#ifndef NO_IPV6
|
|
if (step.ai)
|
|
return step.ai->ai_family;
|
|
#endif
|
|
return AF_INET;
|
|
#if HAVE_AFUNIX_H
|
|
case UNIX:
|
|
return AF_UNIX;
|
|
#endif
|
|
default:
|
|
return AF_UNSPEC;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Start a SockAddrStep structure to step through multiple
|
|
* addresses.
|
|
*/
|
|
#ifndef NO_IPV6
|
|
#define START_STEP(addr, step) \
|
|
((step).ai = (addr)->ais, (step).curraddr = 0)
|
|
#else
|
|
#define START_STEP(addr, step) \
|
|
((step).curraddr = 0)
|
|
#endif
|
|
|
|
static tree234 *sktree;
|
|
|
|
static int cmpfortree(void *av, void *bv)
|
|
{
|
|
NetSocket *a = (NetSocket *)av, *b = (NetSocket *)bv;
|
|
uintptr_t as = (uintptr_t) a->s, bs = (uintptr_t) b->s;
|
|
if (as < bs)
|
|
return -1;
|
|
if (as > bs)
|
|
return +1;
|
|
if (a < b)
|
|
return -1;
|
|
if (a > b)
|
|
return +1;
|
|
return 0;
|
|
}
|
|
|
|
static int cmpforsearch(void *av, void *bv)
|
|
{
|
|
NetSocket *b = (NetSocket *)bv;
|
|
uintptr_t as = (uintptr_t) av, bs = (uintptr_t) b->s;
|
|
if (as < bs)
|
|
return -1;
|
|
if (as > bs)
|
|
return +1;
|
|
return 0;
|
|
}
|
|
|
|
DECL_WINDOWS_FUNCTION(static, int, WSAStartup, (WORD, LPWSADATA));
|
|
DECL_WINDOWS_FUNCTION(static, int, WSACleanup, (void));
|
|
DECL_WINDOWS_FUNCTION(static, int, closesocket, (SOCKET));
|
|
DECL_WINDOWS_FUNCTION(static, ULONG, ntohl, (ULONG));
|
|
DECL_WINDOWS_FUNCTION(static, ULONG, htonl, (ULONG));
|
|
DECL_WINDOWS_FUNCTION(static, USHORT, htons, (USHORT));
|
|
DECL_WINDOWS_FUNCTION(static, USHORT, ntohs, (USHORT));
|
|
DECL_WINDOWS_FUNCTION(static, int, gethostname, (char *, int));
|
|
DECL_WINDOWS_FUNCTION(static, struct hostent FAR *, gethostbyname,
|
|
(const char FAR *));
|
|
DECL_WINDOWS_FUNCTION(static, struct servent FAR *, getservbyname,
|
|
(const char FAR *, const char FAR *));
|
|
DECL_WINDOWS_FUNCTION(static, ULONG, inet_addr, (const char FAR *));
|
|
DECL_WINDOWS_FUNCTION(static, char FAR *, inet_ntoa, (struct in_addr));
|
|
DECL_WINDOWS_FUNCTION(static, const char FAR *, inet_ntop,
|
|
(int, void FAR *, char *, size_t));
|
|
DECL_WINDOWS_FUNCTION(static, int, connect,
|
|
(SOCKET, const struct sockaddr FAR *, int));
|
|
DECL_WINDOWS_FUNCTION(static, int, bind,
|
|
(SOCKET, const struct sockaddr FAR *, int));
|
|
DECL_WINDOWS_FUNCTION(static, int, setsockopt,
|
|
(SOCKET, int, int, const char FAR *, int));
|
|
DECL_WINDOWS_FUNCTION(static, SOCKET, socket, (int, int, int));
|
|
DECL_WINDOWS_FUNCTION(static, int, listen, (SOCKET, int));
|
|
DECL_WINDOWS_FUNCTION(static, int, send, (SOCKET, const char FAR *, int, int));
|
|
DECL_WINDOWS_FUNCTION(static, int, shutdown, (SOCKET, int));
|
|
DECL_WINDOWS_FUNCTION(static, int, ioctlsocket,
|
|
(SOCKET, LONG, ULONG FAR *));
|
|
DECL_WINDOWS_FUNCTION(static, SOCKET, accept,
|
|
(SOCKET, struct sockaddr FAR *, int FAR *));
|
|
DECL_WINDOWS_FUNCTION(static, int, getpeername,
|
|
(SOCKET, struct sockaddr FAR *, int FAR *));
|
|
DECL_WINDOWS_FUNCTION(static, int, recv, (SOCKET, char FAR *, int, int));
|
|
DECL_WINDOWS_FUNCTION(static, int, WSAIoctl,
|
|
(SOCKET, DWORD, LPVOID, DWORD, LPVOID, DWORD,
|
|
LPDWORD, LPWSAOVERLAPPED,
|
|
LPWSAOVERLAPPED_COMPLETION_ROUTINE));
|
|
#ifndef NO_IPV6
|
|
DECL_WINDOWS_FUNCTION(static, int, getaddrinfo,
|
|
(const char *nodename, const char *servname,
|
|
const struct addrinfo *hints, struct addrinfo **res));
|
|
DECL_WINDOWS_FUNCTION(static, void, freeaddrinfo, (struct addrinfo *res));
|
|
DECL_WINDOWS_FUNCTION(static, int, getnameinfo,
|
|
(const struct sockaddr FAR *sa, socklen_t salen,
|
|
char FAR *host, DWORD hostlen, char FAR *serv,
|
|
DWORD servlen, int flags));
|
|
DECL_WINDOWS_FUNCTION(static, int, WSAAddressToStringA,
|
|
(LPSOCKADDR, DWORD, LPWSAPROTOCOL_INFO,
|
|
LPSTR, LPDWORD));
|
|
#endif
|
|
|
|
static HMODULE winsock_module = NULL;
|
|
static WSADATA wsadata;
|
|
#ifndef NO_IPV6
|
|
static HMODULE winsock2_module = NULL;
|
|
static HMODULE wship6_module = NULL;
|
|
#endif
|
|
|
|
static bool sk_startup(int hi, int lo)
|
|
{
|
|
WORD winsock_ver;
|
|
|
|
winsock_ver = MAKEWORD(hi, lo);
|
|
|
|
if (p_WSAStartup(winsock_ver, &wsadata)) {
|
|
return false;
|
|
}
|
|
|
|
if (LOBYTE(wsadata.wVersion) != LOBYTE(winsock_ver)) {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
DEF_WINDOWS_FUNCTION(WSAAsyncSelect);
|
|
DEF_WINDOWS_FUNCTION(WSAEventSelect);
|
|
DEF_WINDOWS_FUNCTION(WSAGetLastError);
|
|
DEF_WINDOWS_FUNCTION(WSAEnumNetworkEvents);
|
|
DEF_WINDOWS_FUNCTION(select);
|
|
|
|
void sk_init(void)
|
|
{
|
|
#ifndef NO_IPV6
|
|
winsock2_module =
|
|
#endif
|
|
winsock_module = load_system32_dll("ws2_32.dll");
|
|
if (!winsock_module) {
|
|
winsock_module = load_system32_dll("wsock32.dll");
|
|
}
|
|
if (!winsock_module)
|
|
modalfatalbox("Unable to load any WinSock library");
|
|
|
|
#ifndef NO_IPV6
|
|
/* Check if we have getaddrinfo in Winsock */
|
|
if (GetProcAddress(winsock_module, "getaddrinfo") != NULL) {
|
|
GET_WINDOWS_FUNCTION(winsock_module, getaddrinfo);
|
|
GET_WINDOWS_FUNCTION(winsock_module, freeaddrinfo);
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(winsock_module, getnameinfo);
|
|
/* This function would fail its type-check if we did one,
|
|
* because the VS header file provides an inline definition
|
|
* which is __cdecl instead of WINAPI. */
|
|
} else {
|
|
/* Fall back to wship6.dll for Windows 2000 */
|
|
wship6_module = load_system32_dll("wship6.dll");
|
|
if (wship6_module) {
|
|
GET_WINDOWS_FUNCTION(wship6_module, getaddrinfo);
|
|
GET_WINDOWS_FUNCTION(wship6_module, freeaddrinfo);
|
|
/* See comment above about type check */
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(wship6_module, getnameinfo);
|
|
} else {
|
|
}
|
|
}
|
|
GET_WINDOWS_FUNCTION(winsock2_module, WSAAddressToStringA);
|
|
#endif
|
|
|
|
GET_WINDOWS_FUNCTION(winsock_module, WSAAsyncSelect);
|
|
GET_WINDOWS_FUNCTION(winsock_module, WSAEventSelect);
|
|
/* We don't type-check select because at least some MinGW versions
|
|
* of the Windows API headers seem to disagree with the
|
|
* documentation on whether the 'struct timeval *' pointer is
|
|
* const or not. */
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(winsock_module, select);
|
|
GET_WINDOWS_FUNCTION(winsock_module, WSAGetLastError);
|
|
GET_WINDOWS_FUNCTION(winsock_module, WSAEnumNetworkEvents);
|
|
GET_WINDOWS_FUNCTION(winsock_module, WSAStartup);
|
|
GET_WINDOWS_FUNCTION(winsock_module, WSACleanup);
|
|
GET_WINDOWS_FUNCTION(winsock_module, closesocket);
|
|
/* Winelib maps ntohl and friends to things like
|
|
* __wine_ulong_swap, which fail these type checks hopelessly */
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(winsock_module, ntohl);
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(winsock_module, htonl);
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(winsock_module, htons);
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(winsock_module, ntohs);
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(winsock_module, gethostname);
|
|
GET_WINDOWS_FUNCTION(winsock_module, gethostbyname);
|
|
GET_WINDOWS_FUNCTION(winsock_module, getservbyname);
|
|
GET_WINDOWS_FUNCTION(winsock_module, inet_addr);
|
|
GET_WINDOWS_FUNCTION(winsock_module, inet_ntoa);
|
|
/* Older Visual Studio, and MinGW as of Ubuntu 16.04, don't know
|
|
* about this function at all, so can't type-check it. Also there
|
|
* seems to be some disagreement in the VS headers about whether
|
|
* the second argument is void * or const void *, so I omit the
|
|
* type check. */
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(winsock_module, inet_ntop);
|
|
GET_WINDOWS_FUNCTION(winsock_module, connect);
|
|
GET_WINDOWS_FUNCTION(winsock_module, bind);
|
|
GET_WINDOWS_FUNCTION(winsock_module, setsockopt);
|
|
GET_WINDOWS_FUNCTION(winsock_module, socket);
|
|
GET_WINDOWS_FUNCTION(winsock_module, listen);
|
|
GET_WINDOWS_FUNCTION(winsock_module, send);
|
|
GET_WINDOWS_FUNCTION(winsock_module, shutdown);
|
|
GET_WINDOWS_FUNCTION(winsock_module, ioctlsocket);
|
|
GET_WINDOWS_FUNCTION(winsock_module, accept);
|
|
GET_WINDOWS_FUNCTION(winsock_module, getpeername);
|
|
GET_WINDOWS_FUNCTION(winsock_module, recv);
|
|
GET_WINDOWS_FUNCTION(winsock_module, WSAIoctl);
|
|
|
|
/* Try to get the best WinSock version we can get */
|
|
if (!sk_startup(2,2) &&
|
|
!sk_startup(2,0) &&
|
|
!sk_startup(1,1)) {
|
|
modalfatalbox("Unable to initialise WinSock");
|
|
}
|
|
|
|
sktree = newtree234(cmpfortree);
|
|
}
|
|
|
|
void sk_cleanup(void)
|
|
{
|
|
NetSocket *s;
|
|
int i;
|
|
|
|
if (sktree) {
|
|
for (i = 0; (s = index234(sktree, i)) != NULL; i++) {
|
|
p_closesocket(s->s);
|
|
}
|
|
freetree234(sktree);
|
|
sktree = NULL;
|
|
}
|
|
|
|
if (p_WSACleanup)
|
|
p_WSACleanup();
|
|
if (winsock_module)
|
|
FreeLibrary(winsock_module);
|
|
#ifndef NO_IPV6
|
|
if (wship6_module)
|
|
FreeLibrary(wship6_module);
|
|
#endif
|
|
}
|
|
|
|
const char *winsock_error_string(int error)
|
|
{
|
|
/*
|
|
* Error codes we know about and have historically had reasonably
|
|
* sensible error messages for.
|
|
*/
|
|
switch (error) {
|
|
case WSAEACCES:
|
|
return "Network error: Permission denied";
|
|
case WSAEADDRINUSE:
|
|
return "Network error: Address already in use";
|
|
case WSAEADDRNOTAVAIL:
|
|
return "Network error: Cannot assign requested address";
|
|
case WSAEAFNOSUPPORT:
|
|
return
|
|
"Network error: Address family not supported by protocol family";
|
|
case WSAEALREADY:
|
|
return "Network error: Operation already in progress";
|
|
case WSAECONNABORTED:
|
|
return "Network error: Software caused connection abort";
|
|
case WSAECONNREFUSED:
|
|
return "Network error: Connection refused";
|
|
case WSAECONNRESET:
|
|
return "Network error: Connection reset by peer";
|
|
case WSAEDESTADDRREQ:
|
|
return "Network error: Destination address required";
|
|
case WSAEFAULT:
|
|
return "Network error: Bad address";
|
|
case WSAEHOSTDOWN:
|
|
return "Network error: Host is down";
|
|
case WSAEHOSTUNREACH:
|
|
return "Network error: No route to host";
|
|
case WSAEINPROGRESS:
|
|
return "Network error: Operation now in progress";
|
|
case WSAEINTR:
|
|
return "Network error: Interrupted function call";
|
|
case WSAEINVAL:
|
|
return "Network error: Invalid argument";
|
|
case WSAEISCONN:
|
|
return "Network error: Socket is already connected";
|
|
case WSAEMFILE:
|
|
return "Network error: Too many open files";
|
|
case WSAEMSGSIZE:
|
|
return "Network error: Message too long";
|
|
case WSAENETDOWN:
|
|
return "Network error: Network is down";
|
|
case WSAENETRESET:
|
|
return "Network error: Network dropped connection on reset";
|
|
case WSAENETUNREACH:
|
|
return "Network error: Network is unreachable";
|
|
case WSAENOBUFS:
|
|
return "Network error: No buffer space available";
|
|
case WSAENOPROTOOPT:
|
|
return "Network error: Bad protocol option";
|
|
case WSAENOTCONN:
|
|
return "Network error: Socket is not connected";
|
|
case WSAENOTSOCK:
|
|
return "Network error: Socket operation on non-socket";
|
|
case WSAEOPNOTSUPP:
|
|
return "Network error: Operation not supported";
|
|
case WSAEPFNOSUPPORT:
|
|
return "Network error: Protocol family not supported";
|
|
case WSAEPROCLIM:
|
|
return "Network error: Too many processes";
|
|
case WSAEPROTONOSUPPORT:
|
|
return "Network error: Protocol not supported";
|
|
case WSAEPROTOTYPE:
|
|
return "Network error: Protocol wrong type for socket";
|
|
case WSAESHUTDOWN:
|
|
return "Network error: Cannot send after socket shutdown";
|
|
case WSAESOCKTNOSUPPORT:
|
|
return "Network error: Socket type not supported";
|
|
case WSAETIMEDOUT:
|
|
return "Network error: Connection timed out";
|
|
case WSAEWOULDBLOCK:
|
|
return "Network error: Resource temporarily unavailable";
|
|
case WSAEDISCON:
|
|
return "Network error: Graceful shutdown in progress";
|
|
}
|
|
|
|
/*
|
|
* Handle any other error code by delegating to win_strerror.
|
|
*/
|
|
return win_strerror(error);
|
|
}
|
|
|
|
static inline const char *namelookup_strerror(DWORD err)
|
|
{
|
|
/* PuTTY has traditionally translated a few of the likely error
|
|
* messages into more concise strings than the standard Windows ones */
|
|
return (err == WSAENETDOWN ? "Network is down" :
|
|
err == WSAHOST_NOT_FOUND ? "Host does not exist" :
|
|
err == WSATRY_AGAIN ? "Host not found" :
|
|
win_strerror(err));
|
|
}
|
|
|
|
SockAddr *sk_namelookup(const char *host, char **canonicalname,
|
|
int address_family)
|
|
{
|
|
*canonicalname = NULL;
|
|
|
|
SockAddr *addr = snew(SockAddr);
|
|
memset(addr, 0, sizeof(SockAddr));
|
|
addr->superfamily = UNRESOLVED;
|
|
addr->refcount = 1;
|
|
|
|
#ifndef NO_IPV6
|
|
/*
|
|
* Use getaddrinfo, as long as it's available. This should handle
|
|
* both IPv4 and IPv6 address literals, and hostnames, in one
|
|
* unified API.
|
|
*/
|
|
if (p_getaddrinfo) {
|
|
struct addrinfo hints;
|
|
memset(&hints, 0, sizeof(hints));
|
|
hints.ai_family = (address_family == ADDRTYPE_IPV4 ? AF_INET :
|
|
address_family == ADDRTYPE_IPV6 ? AF_INET6 :
|
|
AF_UNSPEC);
|
|
hints.ai_flags = AI_CANONNAME;
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
/* strip [] on IPv6 address literals */
|
|
char *trimmed_host = host_strduptrim(host);
|
|
int err = p_getaddrinfo(trimmed_host, NULL, &hints, &addr->ais);
|
|
sfree(trimmed_host);
|
|
|
|
if (addr->ais) {
|
|
addr->superfamily = IP;
|
|
if (addr->ais->ai_canonname)
|
|
*canonicalname = dupstr(addr->ais->ai_canonname);
|
|
else
|
|
*canonicalname = dupstr(host);
|
|
} else {
|
|
addr->error = namelookup_strerror(err);
|
|
}
|
|
return addr;
|
|
}
|
|
#endif
|
|
|
|
/*
|
|
* Failing that (if IPv6 support was not compiled in, or if
|
|
* getaddrinfo turned out to be unavailable at run time), try the
|
|
* old-fashioned approach, which is to start by manually checking
|
|
* for an IPv4 literal and then use gethostbyname.
|
|
*/
|
|
unsigned long a = p_inet_addr(host);
|
|
if (a != (unsigned long) INADDR_NONE) {
|
|
addr->addresses = snew(unsigned long);
|
|
addr->naddresses = 1;
|
|
addr->addresses[0] = p_ntohl(a);
|
|
addr->superfamily = IP;
|
|
*canonicalname = dupstr(host);
|
|
return addr;
|
|
}
|
|
|
|
struct hostent *h = p_gethostbyname(host);
|
|
if (h) {
|
|
addr->superfamily = IP;
|
|
|
|
size_t n;
|
|
for (n = 0; h->h_addr_list[n]; n++);
|
|
addr->addresses = snewn(n, unsigned long);
|
|
addr->naddresses = n;
|
|
for (n = 0; n < addr->naddresses; n++) {
|
|
uint32_t a;
|
|
memcpy(&a, h->h_addr_list[n], sizeof(a));
|
|
addr->addresses[n] = p_ntohl(a);
|
|
}
|
|
|
|
*canonicalname = dupstr(h->h_name);
|
|
} else {
|
|
DWORD err = p_WSAGetLastError();
|
|
addr->error = namelookup_strerror(err);
|
|
}
|
|
return addr;
|
|
}
|
|
|
|
static SockAddr *sk_special_addr(SuperFamily superfamily, const char *name)
|
|
{
|
|
SockAddr *addr = snew(SockAddr);
|
|
addr->error = NULL;
|
|
addr->superfamily = superfamily;
|
|
#ifndef NO_IPV6
|
|
addr->ais = NULL;
|
|
#endif
|
|
addr->addresses = NULL;
|
|
addr->naddresses = 0;
|
|
addr->refcount = 1;
|
|
strncpy(addr->hostname, name, lenof(addr->hostname));
|
|
addr->hostname[lenof(addr->hostname)-1] = '\0';
|
|
return addr;
|
|
}
|
|
|
|
SockAddr *sk_nonamelookup(const char *host)
|
|
{
|
|
return sk_special_addr(UNRESOLVED, host);
|
|
}
|
|
|
|
SockAddr *sk_namedpipe_addr(const char *pipename)
|
|
{
|
|
return sk_special_addr(NAMEDPIPE, pipename);
|
|
}
|
|
|
|
#if HAVE_AFUNIX_H
|
|
SockAddr *sk_unix_addr(const char *sockpath)
|
|
{
|
|
return sk_special_addr(UNIX, sockpath);
|
|
}
|
|
#endif
|
|
|
|
static bool sk_nextaddr(SockAddr *addr, SockAddrStep *step)
|
|
{
|
|
#ifndef NO_IPV6
|
|
if (step->ai) {
|
|
if (step->ai->ai_next) {
|
|
step->ai = step->ai->ai_next;
|
|
return true;
|
|
} else
|
|
return false;
|
|
}
|
|
#endif
|
|
if (step->curraddr+1 < addr->naddresses) {
|
|
step->curraddr++;
|
|
return true;
|
|
} else {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
void sk_getaddr(SockAddr *addr, char *buf, int buflen)
|
|
{
|
|
SockAddrStep step;
|
|
START_STEP(addr, step);
|
|
|
|
#ifndef NO_IPV6
|
|
if (step.ai) {
|
|
int err = 0;
|
|
if (p_WSAAddressToStringA) {
|
|
DWORD dwbuflen = buflen;
|
|
err = p_WSAAddressToStringA(step.ai->ai_addr, step.ai->ai_addrlen,
|
|
NULL, buf, &dwbuflen);
|
|
} else
|
|
err = -1;
|
|
if (err) {
|
|
strncpy(buf, addr->hostname, buflen);
|
|
if (!buf[0])
|
|
strncpy(buf, "<unknown>", buflen);
|
|
buf[buflen-1] = '\0';
|
|
}
|
|
} else
|
|
#endif
|
|
if (sockaddr_family(addr, step) == AF_INET) {
|
|
struct in_addr a;
|
|
assert(addr->addresses && step.curraddr < addr->naddresses);
|
|
a.s_addr = p_htonl(addr->addresses[step.curraddr]);
|
|
strncpy(buf, p_inet_ntoa(a), buflen);
|
|
buf[buflen-1] = '\0';
|
|
} else {
|
|
strncpy(buf, addr->hostname, buflen);
|
|
buf[buflen-1] = '\0';
|
|
}
|
|
}
|
|
|
|
/*
|
|
* This constructs a SockAddr that points at one specific sub-address
|
|
* of a parent SockAddr. The returned SockAddr does not own all its
|
|
* own memory: it points into the old one's data structures, so it
|
|
* MUST NOT be used after the old one is freed, and it MUST NOT be
|
|
* passed to sk_addr_free. (The latter is why it's returned by value
|
|
* rather than dynamically allocated - that should clue in anyone
|
|
* writing a call to it that something is weird about it.)
|
|
*/
|
|
static SockAddr sk_extractaddr_tmp(
|
|
SockAddr *addr, const SockAddrStep *step)
|
|
{
|
|
SockAddr toret;
|
|
toret = *addr; /* structure copy */
|
|
toret.refcount = 1;
|
|
|
|
#ifndef NO_IPV6
|
|
toret.ais = step->ai;
|
|
#endif
|
|
if (sockaddr_family(addr, *step) == AF_INET
|
|
#ifndef NO_IPV6
|
|
&& !toret.ais
|
|
#endif
|
|
)
|
|
toret.addresses += step->curraddr;
|
|
|
|
return toret;
|
|
}
|
|
|
|
bool sk_addr_needs_port(SockAddr *addr)
|
|
{
|
|
return addr->superfamily != NAMEDPIPE
|
|
#if HAVE_AFUNIX_H
|
|
&& addr->superfamily != UNIX
|
|
#endif
|
|
;
|
|
}
|
|
|
|
bool sk_hostname_is_local(const char *name)
|
|
{
|
|
return !strcmp(name, "localhost") ||
|
|
!strcmp(name, "::1") ||
|
|
!strncmp(name, "127.", 4);
|
|
}
|
|
|
|
static INTERFACE_INFO local_interfaces[16];
|
|
static int n_local_interfaces; /* 0=not yet, -1=failed, >0=number */
|
|
|
|
static bool ipv4_is_local_addr(struct in_addr addr)
|
|
{
|
|
if (ipv4_is_loopback(addr))
|
|
return true; /* loopback addresses are local */
|
|
if (!n_local_interfaces) {
|
|
SOCKET s = p_socket(AF_INET, SOCK_DGRAM, 0);
|
|
DWORD retbytes;
|
|
|
|
SetHandleInformation((HANDLE)s, HANDLE_FLAG_INHERIT, 0);
|
|
|
|
if (p_WSAIoctl &&
|
|
p_WSAIoctl(s, SIO_GET_INTERFACE_LIST, NULL, 0,
|
|
local_interfaces, sizeof(local_interfaces),
|
|
&retbytes, NULL, NULL) == 0)
|
|
n_local_interfaces = retbytes / sizeof(INTERFACE_INFO);
|
|
else
|
|
n_local_interfaces = -1;
|
|
}
|
|
if (n_local_interfaces > 0) {
|
|
int i;
|
|
for (i = 0; i < n_local_interfaces; i++) {
|
|
SOCKADDR_IN *address =
|
|
(SOCKADDR_IN *)&local_interfaces[i].iiAddress;
|
|
if (address->sin_addr.s_addr == addr.s_addr)
|
|
return true; /* this address is local */
|
|
}
|
|
}
|
|
return false; /* this address is not local */
|
|
}
|
|
|
|
bool sk_address_is_local(SockAddr *addr)
|
|
{
|
|
SockAddrStep step;
|
|
int family;
|
|
START_STEP(addr, step);
|
|
family = sockaddr_family(addr, step);
|
|
|
|
#ifndef NO_IPV6
|
|
if (family == AF_INET6) {
|
|
return IN6_IS_ADDR_LOOPBACK(&((const struct sockaddr_in6 *)step.ai->ai_addr)->sin6_addr);
|
|
} else
|
|
#endif
|
|
if (family == AF_INET) {
|
|
#ifndef NO_IPV6
|
|
if (step.ai) {
|
|
return ipv4_is_local_addr(((struct sockaddr_in *)step.ai->ai_addr)
|
|
->sin_addr);
|
|
} else
|
|
#endif
|
|
{
|
|
struct in_addr a;
|
|
assert(addr->addresses && step.curraddr < addr->naddresses);
|
|
a.s_addr = p_htonl(addr->addresses[step.curraddr]);
|
|
return ipv4_is_local_addr(a);
|
|
}
|
|
} else {
|
|
assert(family == AF_UNSPEC);
|
|
return false; /* we don't know; assume not */
|
|
}
|
|
}
|
|
|
|
bool sk_address_is_special_local(SockAddr *addr)
|
|
{
|
|
return false; /* no Unix-domain socket analogue here */
|
|
}
|
|
|
|
int sk_addrtype(SockAddr *addr)
|
|
{
|
|
SockAddrStep step;
|
|
int family;
|
|
START_STEP(addr, step);
|
|
family = sockaddr_family(addr, step);
|
|
|
|
return (family == AF_INET ? ADDRTYPE_IPV4 :
|
|
#ifndef NO_IPV6
|
|
family == AF_INET6 ? ADDRTYPE_IPV6 :
|
|
#endif
|
|
ADDRTYPE_NAME);
|
|
}
|
|
|
|
void sk_addrcopy(SockAddr *addr, char *buf)
|
|
{
|
|
SockAddrStep step;
|
|
int family;
|
|
START_STEP(addr, step);
|
|
family = sockaddr_family(addr, step);
|
|
|
|
assert(family != AF_UNSPEC);
|
|
#ifndef NO_IPV6
|
|
if (step.ai) {
|
|
if (family == AF_INET)
|
|
memcpy(buf, &((struct sockaddr_in *)step.ai->ai_addr)->sin_addr,
|
|
sizeof(struct in_addr));
|
|
else if (family == AF_INET6)
|
|
memcpy(buf, &((struct sockaddr_in6 *)step.ai->ai_addr)->sin6_addr,
|
|
sizeof(struct in6_addr));
|
|
else
|
|
unreachable("bad address family in sk_addrcopy");
|
|
} else
|
|
#endif
|
|
if (family == AF_INET) {
|
|
struct in_addr a;
|
|
assert(addr->addresses && step.curraddr < addr->naddresses);
|
|
a.s_addr = p_htonl(addr->addresses[step.curraddr]);
|
|
memcpy(buf, (char*) &a.s_addr, 4);
|
|
}
|
|
}
|
|
|
|
void sk_addr_free(SockAddr *addr)
|
|
{
|
|
if (--addr->refcount > 0)
|
|
return;
|
|
#ifndef NO_IPV6
|
|
if (addr->ais && p_freeaddrinfo)
|
|
p_freeaddrinfo(addr->ais);
|
|
#endif
|
|
if (addr->addresses)
|
|
sfree(addr->addresses);
|
|
sfree(addr);
|
|
}
|
|
|
|
SockAddr *sk_addr_dup(SockAddr *addr)
|
|
{
|
|
addr->refcount++;
|
|
return addr;
|
|
}
|
|
|
|
static Plug *sk_net_plug(Socket *sock, Plug *p)
|
|
{
|
|
NetSocket *s = container_of(sock, NetSocket, sock);
|
|
Plug *ret = s->plug;
|
|
if (p)
|
|
s->plug = p;
|
|
return ret;
|
|
}
|
|
|
|
static void sk_net_close(Socket *s);
|
|
static size_t sk_net_write(Socket *s, const void *data, size_t len);
|
|
static size_t sk_net_write_oob(Socket *s, const void *data, size_t len);
|
|
static void sk_net_write_eof(Socket *s);
|
|
static void sk_net_set_frozen(Socket *s, bool is_frozen);
|
|
static const char *sk_net_socket_error(Socket *s);
|
|
static SocketPeerInfo *sk_net_peer_info(Socket *s);
|
|
|
|
static const SocketVtable NetSocket_sockvt = {
|
|
.plug = sk_net_plug,
|
|
.close = sk_net_close,
|
|
.write = sk_net_write,
|
|
.write_oob = sk_net_write_oob,
|
|
.write_eof = sk_net_write_eof,
|
|
.set_frozen = sk_net_set_frozen,
|
|
.socket_error = sk_net_socket_error,
|
|
.peer_info = sk_net_peer_info,
|
|
};
|
|
|
|
static Socket *sk_net_accept(accept_ctx_t ctx, Plug *plug)
|
|
{
|
|
DWORD err;
|
|
const char *errstr;
|
|
NetSocket *s;
|
|
|
|
/*
|
|
* Create NetSocket structure.
|
|
*/
|
|
s = snew(NetSocket);
|
|
s->sock.vt = &NetSocket_sockvt;
|
|
s->error = NULL;
|
|
s->plug = plug;
|
|
bufchain_init(&s->output_data);
|
|
s->writable = true; /* to start with */
|
|
s->sending_oob = 0;
|
|
s->outgoingeof = EOF_NO;
|
|
s->frozen = true;
|
|
s->frozen_readable = false;
|
|
s->localhost_only = false; /* unused, but best init anyway */
|
|
s->pending_error = 0;
|
|
s->parent = s->child = NULL;
|
|
s->addr = NULL;
|
|
|
|
s->s = (SOCKET)ctx.p;
|
|
|
|
if (s->s == INVALID_SOCKET) {
|
|
err = p_WSAGetLastError();
|
|
s->error = winsock_error_string(err);
|
|
return &s->sock;
|
|
}
|
|
|
|
s->oobinline = false;
|
|
|
|
/* Set up a select mechanism. This could be an AsyncSelect on a
|
|
* window, or an EventSelect on an event object. */
|
|
errstr = do_select(s->s, true);
|
|
if (errstr) {
|
|
s->error = errstr;
|
|
return &s->sock;
|
|
}
|
|
|
|
add234(sktree, s);
|
|
|
|
return &s->sock;
|
|
}
|
|
|
|
static DWORD try_connect(NetSocket *sock)
|
|
{
|
|
SOCKET s;
|
|
#ifndef NO_IPV6
|
|
SOCKADDR_IN6 a6;
|
|
#endif
|
|
SOCKADDR_IN a;
|
|
DWORD err;
|
|
const char *errstr;
|
|
short localport;
|
|
int family;
|
|
|
|
if (sock->s != INVALID_SOCKET) {
|
|
do_select(sock->s, false);
|
|
p_closesocket(sock->s);
|
|
}
|
|
|
|
{
|
|
SockAddr thisaddr = sk_extractaddr_tmp(
|
|
sock->addr, &sock->step);
|
|
plug_log(sock->plug, PLUGLOG_CONNECT_TRYING,
|
|
&thisaddr, sock->port, NULL, 0);
|
|
}
|
|
|
|
/*
|
|
* Open socket.
|
|
*/
|
|
family = sockaddr_family(sock->addr, sock->step);
|
|
|
|
/*
|
|
* Remove the socket from the tree before we overwrite its
|
|
* internal socket id, because that forms part of the tree's
|
|
* sorting criterion. We'll add it back before exiting this
|
|
* function, whether we changed anything or not.
|
|
*/
|
|
del234(sktree, sock);
|
|
|
|
s = p_socket(family, SOCK_STREAM, 0);
|
|
sock->s = s;
|
|
|
|
if (s == INVALID_SOCKET) {
|
|
err = p_WSAGetLastError();
|
|
sock->error = winsock_error_string(err);
|
|
goto ret;
|
|
}
|
|
|
|
SetHandleInformation((HANDLE)s, HANDLE_FLAG_INHERIT, 0);
|
|
|
|
if (sock->oobinline) {
|
|
BOOL b = true;
|
|
p_setsockopt(s, SOL_SOCKET, SO_OOBINLINE, (void *) &b, sizeof(b));
|
|
}
|
|
|
|
if (sock->nodelay) {
|
|
BOOL b = true;
|
|
p_setsockopt(s, IPPROTO_TCP, TCP_NODELAY, (void *) &b, sizeof(b));
|
|
}
|
|
|
|
if (sock->keepalive) {
|
|
BOOL b = true;
|
|
p_setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, (void *) &b, sizeof(b));
|
|
}
|
|
|
|
/*
|
|
* Bind to local address.
|
|
*/
|
|
if (sock->privport)
|
|
localport = 1023; /* count from 1023 downwards */
|
|
else
|
|
localport = 0; /* just use port 0 (ie winsock picks) */
|
|
|
|
/* Loop round trying to bind */
|
|
while (1) {
|
|
int sockcode;
|
|
|
|
#ifndef NO_IPV6
|
|
if (family == AF_INET6) {
|
|
memset(&a6, 0, sizeof(a6));
|
|
a6.sin6_family = AF_INET6;
|
|
/*a6.sin6_addr = in6addr_any; */ /* == 0 done by memset() */
|
|
a6.sin6_port = p_htons(localport);
|
|
} else
|
|
#endif
|
|
{
|
|
a.sin_family = AF_INET;
|
|
a.sin_addr.s_addr = p_htonl(INADDR_ANY);
|
|
a.sin_port = p_htons(localport);
|
|
}
|
|
#ifndef NO_IPV6
|
|
sockcode = p_bind(s, (family == AF_INET6 ?
|
|
(struct sockaddr *) &a6 :
|
|
(struct sockaddr *) &a),
|
|
(family == AF_INET6 ? sizeof(a6) : sizeof(a)));
|
|
#else
|
|
sockcode = p_bind(s, (struct sockaddr *) &a, sizeof(a));
|
|
#endif
|
|
if (sockcode != SOCKET_ERROR) {
|
|
err = 0;
|
|
break; /* done */
|
|
} else {
|
|
err = p_WSAGetLastError();
|
|
if (err != WSAEADDRINUSE) /* failed, for a bad reason */
|
|
break;
|
|
}
|
|
|
|
if (localport == 0)
|
|
break; /* we're only looping once */
|
|
localport--;
|
|
if (localport == 0)
|
|
break; /* we might have got to the end */
|
|
}
|
|
|
|
if (err) {
|
|
sock->error = winsock_error_string(err);
|
|
goto ret;
|
|
}
|
|
|
|
/*
|
|
* Connect to remote address.
|
|
*/
|
|
#ifndef NO_IPV6
|
|
if (sock->step.ai) {
|
|
if (family == AF_INET6) {
|
|
a6.sin6_family = AF_INET6;
|
|
a6.sin6_port = p_htons((short) sock->port);
|
|
a6.sin6_addr =
|
|
((struct sockaddr_in6 *) sock->step.ai->ai_addr)->sin6_addr;
|
|
a6.sin6_flowinfo = ((struct sockaddr_in6 *) sock->step.ai->ai_addr)->sin6_flowinfo;
|
|
a6.sin6_scope_id = ((struct sockaddr_in6 *) sock->step.ai->ai_addr)->sin6_scope_id;
|
|
} else {
|
|
a.sin_family = AF_INET;
|
|
a.sin_addr =
|
|
((struct sockaddr_in *) sock->step.ai->ai_addr)->sin_addr;
|
|
a.sin_port = p_htons((short) sock->port);
|
|
}
|
|
} else
|
|
#endif
|
|
{
|
|
assert(sock->addr->addresses && sock->step.curraddr < sock->addr->naddresses);
|
|
a.sin_family = AF_INET;
|
|
a.sin_addr.s_addr = p_htonl(sock->addr->addresses[sock->step.curraddr]);
|
|
a.sin_port = p_htons((short) sock->port);
|
|
}
|
|
|
|
/* Set up a select mechanism. This could be an AsyncSelect on a
|
|
* window, or an EventSelect on an event object. */
|
|
errstr = do_select(s, true);
|
|
if (errstr) {
|
|
sock->error = errstr;
|
|
err = 1;
|
|
goto ret;
|
|
}
|
|
|
|
if ((
|
|
#ifndef NO_IPV6
|
|
p_connect(s,
|
|
((family == AF_INET6) ? (struct sockaddr *) &a6 :
|
|
(struct sockaddr *) &a),
|
|
(family == AF_INET6) ? sizeof(a6) : sizeof(a))
|
|
#else
|
|
p_connect(s, (struct sockaddr *) &a, sizeof(a))
|
|
#endif
|
|
) == SOCKET_ERROR) {
|
|
err = p_WSAGetLastError();
|
|
/*
|
|
* We expect a potential EWOULDBLOCK here, because the
|
|
* chances are the front end has done a select for
|
|
* FD_CONNECT, so that connect() will complete
|
|
* asynchronously.
|
|
*/
|
|
if ( err != WSAEWOULDBLOCK ) {
|
|
sock->error = winsock_error_string(err);
|
|
goto ret;
|
|
}
|
|
} else {
|
|
/*
|
|
* If we _don't_ get EWOULDBLOCK, the connect has completed
|
|
* and we should set the socket as writable.
|
|
*/
|
|
sock->writable = true;
|
|
SockAddr thisaddr = sk_extractaddr_tmp(sock->addr, &sock->step);
|
|
plug_log(sock->plug, PLUGLOG_CONNECT_SUCCESS,
|
|
&thisaddr, sock->port, NULL, 0);
|
|
}
|
|
|
|
err = 0;
|
|
|
|
ret:
|
|
|
|
/*
|
|
* No matter what happened, put the socket back in the tree.
|
|
*/
|
|
add234(sktree, sock);
|
|
|
|
if (err) {
|
|
SockAddr thisaddr = sk_extractaddr_tmp(
|
|
sock->addr, &sock->step);
|
|
plug_log(sock->plug, PLUGLOG_CONNECT_FAILED,
|
|
&thisaddr, sock->port, sock->error, err);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
Socket *sk_new(SockAddr *addr, int port, bool privport, bool oobinline,
|
|
bool nodelay, bool keepalive, Plug *plug)
|
|
{
|
|
NetSocket *s;
|
|
DWORD err;
|
|
|
|
/*
|
|
* Create NetSocket structure.
|
|
*/
|
|
s = snew(NetSocket);
|
|
s->sock.vt = &NetSocket_sockvt;
|
|
s->error = NULL;
|
|
s->plug = plug;
|
|
bufchain_init(&s->output_data);
|
|
s->connected = false; /* to start with */
|
|
s->writable = false; /* to start with */
|
|
s->sending_oob = 0;
|
|
s->outgoingeof = EOF_NO;
|
|
s->frozen = false;
|
|
s->frozen_readable = false;
|
|
s->localhost_only = false; /* unused, but best init anyway */
|
|
s->pending_error = 0;
|
|
s->parent = s->child = NULL;
|
|
s->oobinline = oobinline;
|
|
s->nodelay = nodelay;
|
|
s->keepalive = keepalive;
|
|
s->privport = privport;
|
|
s->port = port;
|
|
s->addr = addr;
|
|
START_STEP(s->addr, s->step);
|
|
s->s = INVALID_SOCKET;
|
|
|
|
err = 0;
|
|
do {
|
|
err = try_connect(s);
|
|
} while (err && sk_nextaddr(s->addr, &s->step));
|
|
|
|
return &s->sock;
|
|
}
|
|
|
|
static Socket *sk_newlistener_internal(
|
|
const char *srcaddr, int port, Plug *plug,
|
|
bool local_host_only, int orig_address_family)
|
|
{
|
|
SOCKET sk;
|
|
SOCKADDR_IN a;
|
|
#ifndef NO_IPV6
|
|
SOCKADDR_IN6 a6;
|
|
#endif
|
|
#if HAVE_AFUNIX_H
|
|
SOCKADDR_UN au;
|
|
#endif
|
|
struct sockaddr *bindaddr;
|
|
unsigned bindsize;
|
|
|
|
DWORD err;
|
|
const char *errstr;
|
|
NetSocket *s;
|
|
int retcode;
|
|
|
|
int address_family = orig_address_family;
|
|
|
|
/*
|
|
* Create NetSocket structure.
|
|
*/
|
|
s = snew(NetSocket);
|
|
s->sock.vt = &NetSocket_sockvt;
|
|
s->error = NULL;
|
|
s->plug = plug;
|
|
bufchain_init(&s->output_data);
|
|
s->writable = false; /* to start with */
|
|
s->sending_oob = 0;
|
|
s->outgoingeof = EOF_NO;
|
|
s->frozen = false;
|
|
s->frozen_readable = false;
|
|
s->localhost_only = local_host_only;
|
|
s->pending_error = 0;
|
|
s->parent = s->child = NULL;
|
|
s->addr = NULL;
|
|
|
|
/*
|
|
* Our default, if passed the `don't care' value
|
|
* ADDRTYPE_UNSPEC, is to listen on IPv4. If IPv6 is supported,
|
|
* we will also set up a second socket listening on IPv6, but
|
|
* the v4 one is primary since that ought to work even on
|
|
* non-v6-supporting systems.
|
|
*/
|
|
if (address_family == AF_UNSPEC) address_family = AF_INET;
|
|
|
|
/*
|
|
* Open socket.
|
|
*/
|
|
sk = p_socket(address_family, SOCK_STREAM, 0);
|
|
s->s = sk;
|
|
|
|
if (sk == INVALID_SOCKET) {
|
|
err = p_WSAGetLastError();
|
|
s->error = winsock_error_string(err);
|
|
return &s->sock;
|
|
}
|
|
|
|
SetHandleInformation((HANDLE)sk, HANDLE_FLAG_INHERIT, 0);
|
|
|
|
s->oobinline = false;
|
|
|
|
#if HAVE_AFUNIX_H
|
|
if (address_family != AF_UNIX)
|
|
#endif
|
|
{
|
|
BOOL on = true;
|
|
p_setsockopt(sk, SOL_SOCKET, SO_EXCLUSIVEADDRUSE,
|
|
(const char *)&on, sizeof(on));
|
|
}
|
|
|
|
switch (address_family) {
|
|
#ifndef NO_IPV6
|
|
case AF_INET6: {
|
|
memset(&a6, 0, sizeof(a6));
|
|
a6.sin6_family = AF_INET6;
|
|
if (local_host_only)
|
|
a6.sin6_addr = in6addr_loopback;
|
|
else
|
|
a6.sin6_addr = in6addr_any;
|
|
if (srcaddr != NULL && p_getaddrinfo) {
|
|
struct addrinfo hints;
|
|
struct addrinfo *ai;
|
|
int err;
|
|
|
|
memset(&hints, 0, sizeof(hints));
|
|
hints.ai_family = AF_INET6;
|
|
hints.ai_flags = 0;
|
|
{
|
|
/* strip [] on IPv6 address literals */
|
|
char *trimmed_addr = host_strduptrim(srcaddr);
|
|
err = p_getaddrinfo(trimmed_addr, NULL, &hints, &ai);
|
|
sfree(trimmed_addr);
|
|
}
|
|
if (err == 0 && ai->ai_family == AF_INET6) {
|
|
a6.sin6_addr =
|
|
((struct sockaddr_in6 *)ai->ai_addr)->sin6_addr;
|
|
}
|
|
}
|
|
a6.sin6_port = p_htons(port);
|
|
bindaddr = (struct sockaddr *)&a6;
|
|
bindsize = sizeof(a6);
|
|
break;
|
|
}
|
|
#endif
|
|
case AF_INET: {
|
|
bool got_addr = false;
|
|
a.sin_family = AF_INET;
|
|
|
|
/*
|
|
* Bind to source address. First try an explicitly
|
|
* specified one...
|
|
*/
|
|
if (srcaddr) {
|
|
a.sin_addr.s_addr = p_inet_addr(srcaddr);
|
|
if (a.sin_addr.s_addr != INADDR_NONE) {
|
|
/* Override localhost_only with specified listen addr. */
|
|
s->localhost_only = ipv4_is_loopback(a.sin_addr);
|
|
got_addr = true;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* ... and failing that, go with one of the standard ones.
|
|
*/
|
|
if (!got_addr) {
|
|
if (local_host_only)
|
|
a.sin_addr.s_addr = p_htonl(INADDR_LOOPBACK);
|
|
else
|
|
a.sin_addr.s_addr = p_htonl(INADDR_ANY);
|
|
}
|
|
|
|
a.sin_port = p_htons((short)port);
|
|
bindaddr = (struct sockaddr *)&a;
|
|
bindsize = sizeof(a);
|
|
break;
|
|
}
|
|
#if HAVE_AFUNIX_H
|
|
case AF_UNIX: {
|
|
au.sun_family = AF_UNIX;
|
|
strncpy(au.sun_path, srcaddr, sizeof(au.sun_path));
|
|
bindaddr = (struct sockaddr *)&au;
|
|
bindsize = sizeof(au);
|
|
break;
|
|
}
|
|
#endif
|
|
default:
|
|
unreachable("bad address family in sk_newlistener_internal");
|
|
}
|
|
|
|
retcode = p_bind(sk, bindaddr, bindsize);
|
|
if (retcode != SOCKET_ERROR) {
|
|
err = 0;
|
|
} else {
|
|
err = p_WSAGetLastError();
|
|
}
|
|
|
|
if (err) {
|
|
p_closesocket(sk);
|
|
s->error = winsock_error_string(err);
|
|
return &s->sock;
|
|
}
|
|
|
|
|
|
if (p_listen(sk, SOMAXCONN) == SOCKET_ERROR) {
|
|
p_closesocket(sk);
|
|
s->error = winsock_error_string(p_WSAGetLastError());
|
|
return &s->sock;
|
|
}
|
|
|
|
/* Set up a select mechanism. This could be an AsyncSelect on a
|
|
* window, or an EventSelect on an event object. */
|
|
errstr = do_select(sk, true);
|
|
if (errstr) {
|
|
p_closesocket(sk);
|
|
s->error = errstr;
|
|
return &s->sock;
|
|
}
|
|
|
|
add234(sktree, s);
|
|
|
|
#ifndef NO_IPV6
|
|
/*
|
|
* If we were given ADDRTYPE_UNSPEC, we must also create an
|
|
* IPv6 listening socket and link it to this one.
|
|
*/
|
|
if (address_family == AF_INET && orig_address_family == AF_UNSPEC) {
|
|
Socket *other = sk_newlistener_internal(srcaddr, port, plug,
|
|
local_host_only, AF_INET6);
|
|
|
|
if (other) {
|
|
NetSocket *ns = container_of(other, NetSocket, sock);
|
|
if (!ns->error) {
|
|
ns->parent = s;
|
|
s->child = ns;
|
|
} else {
|
|
sfree(ns);
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
return &s->sock;
|
|
}
|
|
|
|
Socket *sk_newlistener(const char *srcaddr, int port, Plug *plug,
|
|
bool local_host_only, int orig_address_family)
|
|
{
|
|
/*
|
|
* Translate address_family from platform-independent constants
|
|
* into local reality.
|
|
*/
|
|
int address_family = (orig_address_family == ADDRTYPE_IPV4 ? AF_INET :
|
|
#ifndef NO_IPV6
|
|
orig_address_family == ADDRTYPE_IPV6 ? AF_INET6 :
|
|
#endif
|
|
AF_UNSPEC);
|
|
|
|
return sk_newlistener_internal(srcaddr, port, plug, local_host_only,
|
|
address_family);
|
|
}
|
|
|
|
Socket *sk_newlistener_unix(const char *path, Plug *plug)
|
|
{
|
|
#if HAVE_AFUNIX_H
|
|
return sk_newlistener_internal(path, 0, plug, false, AF_UNIX);
|
|
#else
|
|
return new_error_socket_fmt(
|
|
plug, "AF_UNIX support not compiled into this program");
|
|
#endif
|
|
}
|
|
|
|
static void sk_net_close(Socket *sock)
|
|
{
|
|
NetSocket *s = container_of(sock, NetSocket, sock);
|
|
|
|
if (s->child)
|
|
sk_net_close(&s->child->sock);
|
|
|
|
bufchain_clear(&s->output_data);
|
|
|
|
del234(sktree, s);
|
|
do_select(s->s, false);
|
|
p_closesocket(s->s);
|
|
if (s->addr)
|
|
sk_addr_free(s->addr);
|
|
delete_callbacks_for_context(s);
|
|
sfree(s);
|
|
}
|
|
|
|
void plug_closing_system_error(Plug *plug, DWORD error)
|
|
{
|
|
PlugCloseType type = PLUGCLOSE_ERROR;
|
|
if (error == ERROR_BROKEN_PIPE)
|
|
type = PLUGCLOSE_BROKEN_PIPE;
|
|
plug_closing(plug, type, win_strerror(error));
|
|
}
|
|
|
|
void plug_closing_winsock_error(Plug *plug, DWORD error)
|
|
{
|
|
plug_closing(plug, PLUGCLOSE_ERROR, winsock_error_string(error));
|
|
}
|
|
|
|
/*
|
|
* Deal with socket errors detected in try_send().
|
|
*/
|
|
static void socket_error_callback(void *vs)
|
|
{
|
|
NetSocket *s = (NetSocket *)vs;
|
|
|
|
/*
|
|
* Just in case other socket work has caused this socket to vanish
|
|
* or become somehow non-erroneous before this callback arrived...
|
|
*/
|
|
if (!find234(sktree, s, NULL) || !s->pending_error)
|
|
return;
|
|
|
|
/*
|
|
* An error has occurred on this socket. Pass it to the plug.
|
|
*/
|
|
plug_closing_winsock_error(s->plug, s->pending_error);
|
|
}
|
|
|
|
/*
|
|
* The function which tries to send on a socket once it's deemed
|
|
* writable.
|
|
*/
|
|
static void try_send(NetSocket *s)
|
|
{
|
|
while (s->sending_oob || bufchain_size(&s->output_data) > 0) {
|
|
int nsent;
|
|
DWORD err;
|
|
const void *data;
|
|
size_t len;
|
|
int urgentflag;
|
|
|
|
if (s->sending_oob) {
|
|
urgentflag = MSG_OOB;
|
|
len = s->sending_oob;
|
|
data = &s->oobdata;
|
|
} else {
|
|
urgentflag = 0;
|
|
ptrlen bufdata = bufchain_prefix(&s->output_data);
|
|
data = bufdata.ptr;
|
|
len = bufdata.len;
|
|
}
|
|
len = min(len, INT_MAX); /* WinSock send() takes an int */
|
|
nsent = p_send(s->s, data, len, urgentflag);
|
|
noise_ultralight(NOISE_SOURCE_IOLEN, nsent);
|
|
if (nsent <= 0) {
|
|
err = (nsent < 0 ? p_WSAGetLastError() : 0);
|
|
if ((err < WSABASEERR && nsent < 0) || err == WSAEWOULDBLOCK) {
|
|
/*
|
|
* Perfectly normal: we've sent all we can for the moment.
|
|
*
|
|
* (Some WinSock send() implementations can return
|
|
* <0 but leave no sensible error indication -
|
|
* WSAGetLastError() is called but returns zero or
|
|
* a small number - so we check that case and treat
|
|
* it just like WSAEWOULDBLOCK.)
|
|
*/
|
|
s->writable = false;
|
|
return;
|
|
} else {
|
|
/*
|
|
* If send() returns a socket error, we unfortunately
|
|
* can't just call plug_closing(), because it's quite
|
|
* likely that we're currently _in_ a call from the
|
|
* code we'd be calling back to, so we'd have to make
|
|
* half the SSH code reentrant. Instead we flag a
|
|
* pending error on the socket, to be dealt with (by
|
|
* calling plug_closing()) at some suitable future
|
|
* moment.
|
|
*/
|
|
s->pending_error = err;
|
|
queue_toplevel_callback(socket_error_callback, s);
|
|
return;
|
|
}
|
|
} else {
|
|
if (s->sending_oob) {
|
|
if (nsent < len) {
|
|
memmove(s->oobdata, s->oobdata+nsent, len-nsent);
|
|
s->sending_oob = len - nsent;
|
|
} else {
|
|
s->sending_oob = 0;
|
|
}
|
|
} else {
|
|
bufchain_consume(&s->output_data, nsent);
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* If we reach here, we've finished sending everything we might
|
|
* have needed to send. Send EOF, if we need to.
|
|
*/
|
|
if (s->outgoingeof == EOF_PENDING) {
|
|
p_shutdown(s->s, SD_SEND);
|
|
s->outgoingeof = EOF_SENT;
|
|
}
|
|
}
|
|
|
|
static size_t sk_net_write(Socket *sock, const void *buf, size_t len)
|
|
{
|
|
NetSocket *s = container_of(sock, NetSocket, sock);
|
|
|
|
assert(s->outgoingeof == EOF_NO);
|
|
|
|
/*
|
|
* Add the data to the buffer list on the socket.
|
|
*/
|
|
bufchain_add(&s->output_data, buf, len);
|
|
|
|
/*
|
|
* Now try sending from the start of the buffer list.
|
|
*/
|
|
if (s->writable)
|
|
try_send(s);
|
|
|
|
return bufchain_size(&s->output_data);
|
|
}
|
|
|
|
static size_t sk_net_write_oob(Socket *sock, const void *buf, size_t len)
|
|
{
|
|
NetSocket *s = container_of(sock, NetSocket, sock);
|
|
|
|
assert(s->outgoingeof == EOF_NO);
|
|
|
|
/*
|
|
* Replace the buffer list on the socket with the data.
|
|
*/
|
|
bufchain_clear(&s->output_data);
|
|
assert(len <= sizeof(s->oobdata));
|
|
memcpy(s->oobdata, buf, len);
|
|
s->sending_oob = len;
|
|
|
|
/*
|
|
* Now try sending from the start of the buffer list.
|
|
*/
|
|
if (s->writable)
|
|
try_send(s);
|
|
|
|
return s->sending_oob;
|
|
}
|
|
|
|
static void sk_net_write_eof(Socket *sock)
|
|
{
|
|
NetSocket *s = container_of(sock, NetSocket, sock);
|
|
|
|
assert(s->outgoingeof == EOF_NO);
|
|
|
|
/*
|
|
* Mark the socket as pending outgoing EOF.
|
|
*/
|
|
s->outgoingeof = EOF_PENDING;
|
|
|
|
/*
|
|
* Now try sending from the start of the buffer list.
|
|
*/
|
|
if (s->writable)
|
|
try_send(s);
|
|
}
|
|
|
|
void select_result(WPARAM wParam, LPARAM lParam)
|
|
{
|
|
int ret;
|
|
DWORD err;
|
|
char buf[20480]; /* nice big buffer for plenty of speed */
|
|
NetSocket *s;
|
|
bool atmark;
|
|
|
|
/* wParam is the socket itself */
|
|
|
|
if (wParam == 0)
|
|
return; /* boggle */
|
|
|
|
s = find234(sktree, (void *) wParam, cmpforsearch);
|
|
if (!s)
|
|
return; /* boggle */
|
|
|
|
if ((err = WSAGETSELECTERROR(lParam)) != 0) {
|
|
/*
|
|
* An error has occurred on this socket. Pass it to the
|
|
* plug.
|
|
*/
|
|
if (s->addr) {
|
|
SockAddr thisaddr = sk_extractaddr_tmp(
|
|
s->addr, &s->step);
|
|
plug_log(s->plug, PLUGLOG_CONNECT_FAILED, &thisaddr, s->port,
|
|
winsock_error_string(err), err);
|
|
while (err && s->addr && sk_nextaddr(s->addr, &s->step)) {
|
|
err = try_connect(s);
|
|
}
|
|
}
|
|
if (err != 0)
|
|
plug_closing_winsock_error(s->plug, err);
|
|
return;
|
|
}
|
|
|
|
noise_ultralight(NOISE_SOURCE_IOID, wParam);
|
|
|
|
switch (WSAGETSELECTEVENT(lParam)) {
|
|
case FD_CONNECT:
|
|
s->connected = true;
|
|
s->writable = true;
|
|
|
|
/*
|
|
* Once a socket is connected, we can stop falling back
|
|
* through the candidate addresses to connect to. But first,
|
|
* let the plug know we were successful.
|
|
*/
|
|
if (s->addr) {
|
|
SockAddr thisaddr = sk_extractaddr_tmp(
|
|
s->addr, &s->step);
|
|
plug_log(s->plug, PLUGLOG_CONNECT_SUCCESS,
|
|
&thisaddr, s->port, NULL, 0);
|
|
|
|
sk_addr_free(s->addr);
|
|
s->addr = NULL;
|
|
}
|
|
break;
|
|
case FD_READ:
|
|
/* In the case the socket is still frozen, we don't even bother */
|
|
if (s->frozen) {
|
|
s->frozen_readable = true;
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* We have received data on the socket. For an oobinline
|
|
* socket, this might be data _before_ an urgent pointer,
|
|
* in which case we send it to the back end with type==1
|
|
* (data prior to urgent).
|
|
*/
|
|
if (s->oobinline) {
|
|
u_long atmark_from_ioctl = 1;
|
|
p_ioctlsocket(s->s, SIOCATMARK, &atmark_from_ioctl);
|
|
/*
|
|
* Avoid checking the return value from ioctlsocket(),
|
|
* on the grounds that some WinSock wrappers don't
|
|
* support it. If it does nothing, we get atmark==1,
|
|
* which is equivalent to `no OOB pending', so the
|
|
* effect will be to non-OOB-ify any OOB data.
|
|
*/
|
|
atmark = atmark_from_ioctl;
|
|
} else
|
|
atmark = true;
|
|
|
|
ret = p_recv(s->s, buf, sizeof(buf), 0);
|
|
noise_ultralight(NOISE_SOURCE_IOLEN, ret);
|
|
if (ret < 0) {
|
|
err = p_WSAGetLastError();
|
|
if (err == WSAEWOULDBLOCK) {
|
|
break;
|
|
}
|
|
}
|
|
if (ret < 0) {
|
|
plug_closing_winsock_error(s->plug, err);
|
|
} else if (0 == ret) {
|
|
plug_closing_normal(s->plug);
|
|
} else {
|
|
plug_receive(s->plug, atmark ? 0 : 1, buf, ret);
|
|
}
|
|
break;
|
|
case FD_OOB:
|
|
/*
|
|
* This will only happen on a non-oobinline socket. It
|
|
* indicates that we can immediately perform an OOB read
|
|
* and get back OOB data, which we will send to the back
|
|
* end with type==2 (urgent data).
|
|
*/
|
|
ret = p_recv(s->s, buf, sizeof(buf), MSG_OOB);
|
|
noise_ultralight(NOISE_SOURCE_IOLEN, ret);
|
|
if (ret <= 0) {
|
|
int err = p_WSAGetLastError();
|
|
plug_closing_winsock_error(s->plug, err);
|
|
} else {
|
|
plug_receive(s->plug, 2, buf, ret);
|
|
}
|
|
break;
|
|
case FD_WRITE: {
|
|
int bufsize_before, bufsize_after;
|
|
s->writable = true;
|
|
bufsize_before = s->sending_oob + bufchain_size(&s->output_data);
|
|
try_send(s);
|
|
bufsize_after = s->sending_oob + bufchain_size(&s->output_data);
|
|
if (bufsize_after < bufsize_before)
|
|
plug_sent(s->plug, bufsize_after);
|
|
break;
|
|
}
|
|
case FD_CLOSE:
|
|
/* Signal a close on the socket. First read any outstanding data. */
|
|
do {
|
|
ret = p_recv(s->s, buf, sizeof(buf), 0);
|
|
if (ret < 0) {
|
|
err = p_WSAGetLastError();
|
|
if (err == WSAEWOULDBLOCK)
|
|
break;
|
|
plug_closing_winsock_error(s->plug, err);
|
|
} else {
|
|
if (ret)
|
|
plug_receive(s->plug, 0, buf, ret);
|
|
else
|
|
plug_closing_normal(s->plug);
|
|
}
|
|
} while (ret > 0);
|
|
return;
|
|
case FD_ACCEPT: {
|
|
#ifdef NO_IPV6
|
|
struct sockaddr_in isa;
|
|
#else
|
|
struct sockaddr_storage isa; // FIXME: also if Unix and no IPv6
|
|
#endif
|
|
int addrlen = sizeof(isa);
|
|
SOCKET t; /* socket of connection */
|
|
accept_ctx_t actx;
|
|
|
|
memset(&isa, 0, sizeof(isa));
|
|
err = 0;
|
|
t = p_accept(s->s,(struct sockaddr *)&isa,&addrlen);
|
|
if (t == INVALID_SOCKET)
|
|
{
|
|
err = p_WSAGetLastError();
|
|
if (err == WSATRY_AGAIN)
|
|
break;
|
|
}
|
|
|
|
actx.p = (void *)t;
|
|
|
|
#ifndef NO_IPV6
|
|
if (isa.ss_family == AF_INET &&
|
|
s->localhost_only &&
|
|
!ipv4_is_local_addr(((struct sockaddr_in *)&isa)->sin_addr))
|
|
#else
|
|
if (s->localhost_only && !ipv4_is_local_addr(isa.sin_addr))
|
|
#endif
|
|
{
|
|
p_closesocket(t); /* dodgy WinSock let nonlocal through */
|
|
} else if (plug_accepting(s->plug, sk_net_accept, actx)) {
|
|
p_closesocket(t); /* denied or error */
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Special error values are returned from sk_namelookup and sk_new
|
|
* if there's a problem. These functions extract an error message,
|
|
* or return NULL if there's no problem.
|
|
*/
|
|
const char *sk_addr_error(SockAddr *addr)
|
|
{
|
|
return addr->error;
|
|
}
|
|
static const char *sk_net_socket_error(Socket *sock)
|
|
{
|
|
NetSocket *s = container_of(sock, NetSocket, sock);
|
|
return s->error;
|
|
}
|
|
|
|
static SocketPeerInfo *sk_net_peer_info(Socket *sock)
|
|
{
|
|
NetSocket *s = container_of(sock, NetSocket, sock);
|
|
#ifdef NO_IPV6
|
|
struct sockaddr_in addr;
|
|
#else
|
|
struct sockaddr_storage addr; // FIXME: also if Unix and no IPv6
|
|
char buf[INET6_ADDRSTRLEN];
|
|
#endif
|
|
int addrlen = sizeof(addr);
|
|
SocketPeerInfo *pi;
|
|
|
|
if (p_getpeername(s->s, (struct sockaddr *)&addr, &addrlen) < 0)
|
|
return NULL;
|
|
|
|
pi = snew(SocketPeerInfo);
|
|
pi->addressfamily = ADDRTYPE_UNSPEC;
|
|
pi->addr_text = NULL;
|
|
pi->port = -1;
|
|
pi->log_text = NULL;
|
|
|
|
if (((struct sockaddr *)&addr)->sa_family == AF_INET) {
|
|
pi->addressfamily = ADDRTYPE_IPV4;
|
|
memcpy(pi->addr_bin.ipv4, &((struct sockaddr_in *)&addr)->sin_addr, 4);
|
|
pi->port = p_ntohs(((struct sockaddr_in *)&addr)->sin_port);
|
|
pi->addr_text = dupstr(
|
|
p_inet_ntoa(((struct sockaddr_in *)&addr)->sin_addr));
|
|
pi->log_text = dupprintf("%s:%d", pi->addr_text, pi->port);
|
|
|
|
#ifndef NO_IPV6
|
|
} else if (((struct sockaddr *)&addr)->sa_family == AF_INET6) {
|
|
pi->addressfamily = ADDRTYPE_IPV6;
|
|
memcpy(pi->addr_bin.ipv6,
|
|
&((struct sockaddr_in6 *)&addr)->sin6_addr, 16);
|
|
pi->port = p_ntohs(((struct sockaddr_in6 *)&addr)->sin6_port);
|
|
pi->addr_text = dupstr(
|
|
p_inet_ntop(AF_INET6, &((struct sockaddr_in6 *)&addr)->sin6_addr,
|
|
buf, sizeof(buf)));
|
|
pi->log_text = dupprintf("[%s]:%d", pi->addr_text, pi->port);
|
|
|
|
#endif
|
|
} else {
|
|
sfree(pi);
|
|
return NULL;
|
|
}
|
|
|
|
return pi;
|
|
}
|
|
|
|
static void sk_net_set_frozen(Socket *sock, bool is_frozen)
|
|
{
|
|
NetSocket *s = container_of(sock, NetSocket, sock);
|
|
if (s->frozen == is_frozen)
|
|
return;
|
|
s->frozen = is_frozen;
|
|
if (!is_frozen) {
|
|
do_select(s->s, true);
|
|
if (s->frozen_readable) {
|
|
char c;
|
|
p_recv(s->s, &c, 1, MSG_PEEK);
|
|
}
|
|
}
|
|
s->frozen_readable = false;
|
|
}
|
|
|
|
void socket_reselect_all(void)
|
|
{
|
|
NetSocket *s;
|
|
int i;
|
|
|
|
for (i = 0; (s = index234(sktree, i)) != NULL; i++) {
|
|
if (!s->frozen)
|
|
do_select(s->s, true);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* For Plink: enumerate all sockets currently active.
|
|
*/
|
|
SOCKET first_socket(int *state)
|
|
{
|
|
NetSocket *s;
|
|
*state = 0;
|
|
s = index234(sktree, (*state)++);
|
|
return s ? s->s : INVALID_SOCKET;
|
|
}
|
|
|
|
SOCKET next_socket(int *state)
|
|
{
|
|
NetSocket *s = index234(sktree, (*state)++);
|
|
return s ? s->s : INVALID_SOCKET;
|
|
}
|
|
|
|
bool socket_writable(SOCKET skt)
|
|
{
|
|
NetSocket *s = find234(sktree, (void *)skt, cmpforsearch);
|
|
|
|
if (s)
|
|
return bufchain_size(&s->output_data) > 0;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
int net_service_lookup(const char *service)
|
|
{
|
|
struct servent *se;
|
|
se = p_getservbyname(service, NULL);
|
|
if (se != NULL)
|
|
return p_ntohs(se->s_port);
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
char *get_hostname(void)
|
|
{
|
|
char hostbuf[256]; /* MSDN docs for gethostname() promise this is enough */
|
|
if (p_gethostname(hostbuf, sizeof(hostbuf)) < 0)
|
|
return NULL;
|
|
return dupstr(hostbuf);
|
|
}
|
|
|
|
SockAddr *platform_get_x11_unix_address(const char *display, int displaynum)
|
|
{
|
|
SockAddr *addr = snew(SockAddr);
|
|
memset(addr, 0, sizeof(SockAddr));
|
|
addr->error = "unix sockets for X11 not supported on this platform";
|
|
addr->refcount = 1;
|
|
return addr;
|
|
}
|