sockwrap.c 12.6 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
/* sockwrap.c */

/* Berkley/WinSock socket API wrappers */

/* $Id$ */

/****************************************************************************
 * @format.tab-size 4		(Plain Text/Source Code File Header)			*
 * @format.use-tabs true	(see http://www.synchro.net/ptsc_hdr.html)		*
 *																			*
11
 * CopyrightRob Swindell - http://www.synchro.net/copyright.html			*
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
 *																			*
 * This library is free software; you can redistribute it and/or			*
 * modify it under the terms of the GNU Lesser General Public License		*
 * as published by the Free Software Foundation; either version 2			*
 * of the License, or (at your option) any later version.					*
 * See the GNU Lesser General Public License for more details: lgpl.txt or	*
 * http://www.fsf.org/copyleft/lesser.html									*
 *																			*
 * Anonymous FTP access to the most recent released source is available at	*
 * ftp://vert.synchro.net, ftp://cvs.synchro.net and ftp://ftp.synchro.net	*
 *																			*
 * Anonymous CVS access to the development source and modification history	*
 * is available at cvs.synchro.net:/cvsroot/sbbs, example:					*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs login			*
 *     (just hit return, no password is necessary)							*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs checkout src		*
 *																			*
 * For Synchronet coding style and modification guidelines, see				*
 * http://www.synchro.net/source.html										*
 *																			*
 * You are encouraged to submit any modifications (preferably in Unix diff	*
 * format) via e-mail to mods@synchro.net									*
 *																			*
 * Note: If this box doesn't appear square, then you need to fix your tabs.	*
 ****************************************************************************/

deuce's avatar
deuce committed
38
#include <ctype.h>		/* isdigit */
39
#include <stdlib.h>		/* alloca/free on FreeBSD */
40
#include <string.h>		/* bzero (for FD_ZERO) on FreeBSD */
41
#include <errno.h>		/* ENOMEM */
42
#include <stdio.h>		/* SEEK_SET */
43
#include <string.h>
44
45
46
#if defined(_WIN32)
 #include <malloc.h>	/* alloca() on Win32 */
#endif
47

48
#include "genwrap.h"	/* SLEEP */
deuce's avatar
deuce committed
49
#include "gen_defs.h"	/* BOOL/LOG_WARNING */
50
51
52
#include "sockwrap.h"	/* sendsocket */
#include "filewrap.h"	/* filelength */

53
static socket_option_t socket_options[] = {
54
	{ "TYPE",				0,				SOL_SOCKET,		SO_TYPE				},
55
	{ "ERROR",				0,				SOL_SOCKET,		SO_ERROR			},
56
57
58
59
	{ "DEBUG",				0,				SOL_SOCKET,		SO_DEBUG			},
	{ "LINGER",				SOCK_STREAM,	SOL_SOCKET,		SO_LINGER			},
	{ "SNDBUF",				0,				SOL_SOCKET,		SO_SNDBUF			},
	{ "RCVBUF",				0,				SOL_SOCKET,		SO_RCVBUF			},
60
61

#ifndef _WINSOCKAPI_	/* Defined, but not supported, by WinSock */
62
63
64
65
	{ "SNDLOWAT",			0,				SOL_SOCKET,		SO_SNDLOWAT			},
	{ "RCVLOWAT",			0,				SOL_SOCKET,		SO_RCVLOWAT			},
	{ "SNDTIMEO",			0,				SOL_SOCKET,		SO_SNDTIMEO			},
	{ "RCVTIMEO",			0,				SOL_SOCKET,		SO_RCVTIMEO			},
66
67
68
#ifdef SO_USELOOPBACK	/* SunOS */
	{ "USELOOPBACK",		0,				SOL_SOCKET,		SO_USELOOPBACK		},
#endif
69
#endif
70

71
	{ "REUSEADDR",			0,				SOL_SOCKET,		SO_REUSEADDR		},	
deuce's avatar
deuce committed
72
73
74
#ifdef SO_REUSEPORT	/* BSD */
	{ "REUSEPORT",			0,				SOL_SOCKET,		SO_REUSEPORT		},	
#endif
75
76
77
78
	{ "KEEPALIVE",			SOCK_STREAM,	SOL_SOCKET,		SO_KEEPALIVE		},
	{ "DONTROUTE",			0,				SOL_SOCKET,		SO_DONTROUTE		},
	{ "BROADCAST",			SOCK_DGRAM,		SOL_SOCKET,		SO_BROADCAST		},
	{ "OOBINLINE",			SOCK_STREAM,	SOL_SOCKET,		SO_OOBINLINE		},
79

80
#ifdef SO_ACCEPTCONN											
81
	{ "ACCEPTCONN",			SOCK_STREAM,	SOL_SOCKET,		SO_ACCEPTCONN		},
82
#endif
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
#ifdef SO_PRIORITY		/* Linux */
	{ "PRIORITY",			0,				SOL_SOCKET,		SO_PRIORITY			},
#endif
#ifdef SO_NO_CHECK		/* Linux */
	{ "NO_CHECK",			0,				SOL_SOCKET,		SO_NO_CHECK			},
#endif
#ifdef SO_PROTOTYPE		/* SunOS */
	{ "PROTOTYPE",			0,				SOL_SOCKET,		SO_PROTOTYPE		},
#endif
#ifdef SO_MAX_MSG_SIZE	/* WinSock2 */
	{ "MAX_MSG_SIZE",		SOCK_DGRAM,		SOL_SOCKET,		SO_MAX_MSG_SIZE		},
#endif
#ifdef SO_CONNECT_TIME	/* WinSock2 */
	{ "CONNECT_TIME",		SOCK_STREAM,	SOL_SOCKET,		SO_CONNECT_TIME		},
#endif
98
99

	/* IPPROTO-level socket options */
100
	{ "TCP_NODELAY",		SOCK_STREAM,	IPPROTO_TCP,	TCP_NODELAY			},
101
102
	/* The following are platform-specific */					
#ifdef TCP_MAXSEG											
103
	{ "TCP_MAXSEG",			SOCK_STREAM,	IPPROTO_TCP,	TCP_MAXSEG			},
104
105
#endif															
#ifdef TCP_CORK													
106
	{ "TCP_CORK",			SOCK_STREAM,	IPPROTO_TCP,	TCP_CORK			},
107
108
#endif															
#ifdef TCP_KEEPIDLE												
109
	{ "TCP_KEEPIDLE",		SOCK_STREAM,	IPPROTO_TCP,	TCP_KEEPIDLE		},
110
111
#endif															
#ifdef TCP_KEEPINTVL											
112
	{ "TCP_KEEPINTVL",		SOCK_STREAM,	IPPROTO_TCP,	TCP_KEEPINTVL		},
113
114
#endif															
#ifdef TCP_KEEPCNT												
115
	{ "TCP_KEEPCNT",		SOCK_STREAM,	IPPROTO_TCP,	TCP_KEEPCNT			},
116
#endif															
117
118
119
#ifdef TCP_KEEPALIVE	/* SunOS */
	{ "TCP_KEEPALIVE",		SOCK_STREAM,	IPPROTO_TCP,	TCP_KEEPALIVE		},
#endif															
120
#ifdef TCP_SYNCNT												
121
	{ "TCP_SYNCNT",			SOCK_STREAM,	IPPROTO_TCP,	TCP_SYNCNT			},
122
123
#endif															
#ifdef TCP_LINGER2												
124
	{ "TCP_LINGER2",		SOCK_STREAM,	IPPROTO_TCP,	TCP_LINGER2			},
125
126
#endif														
#ifdef TCP_DEFER_ACCEPT										
127
	{ "TCP_DEFER_ACCEPT",	SOCK_STREAM,	IPPROTO_TCP,	TCP_DEFER_ACCEPT	},
128
129
#endif															
#ifdef TCP_WINDOW_CLAMP											
130
	{ "TCP_WINDOW_CLAMP",	SOCK_STREAM,	IPPROTO_TCP,	TCP_WINDOW_CLAMP	},
131
132
#endif														
#ifdef TCP_QUICKACK											
133
	{ "TCP_QUICKACK",		SOCK_STREAM,	IPPROTO_TCP,	TCP_QUICKACK		},
134
135
#endif						
#ifdef TCP_NOPUSH			
136
	{ "TCP_NOPUSH",			SOCK_STREAM,	IPPROTO_TCP,	TCP_NOPUSH			},
137
138
#endif						
#ifdef TCP_NOOPT			
139
	{ "TCP_NOOPT",			SOCK_STREAM,	IPPROTO_TCP,	TCP_NOOPT			},
140
141
142
#endif
#if defined(IPV6_V6ONLY) && defined(IPPROTO_IPV6)
	{ "IPV6_V6ONLY",		0,				IPPROTO_IPV6,	IPV6_V6ONLY			},
143
144
145
146
#endif
	{ NULL }
};

deuce's avatar
deuce committed
147
int DLLCALL getSocketOptionByName(const char* name, int* level)
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
{
	int i;

	if(level!=NULL)
		*level=SOL_SOCKET;	/* default option level */
	for(i=0;socket_options[i].name;i++) {
		if(stricmp(name,socket_options[i].name)==0) {
			if(level!=NULL)
				*level = socket_options[i].level;
			return(socket_options[i].value);
		}
	}
	if(!isdigit(*name))	/* unknown option name */
		return(-1);
	return(strtol(name,NULL,0));
}

deuce's avatar
deuce committed
165
socket_option_t* DLLCALL getSocketOptionList(void)
166
167
168
169
{
	return(socket_options);
}

deuce's avatar
deuce committed
170
int DLLCALL sendfilesocket(int sock, int file, off_t *offset, off_t count)
171
{
172
	char		buf[1024*16];
173
	off_t		len;
174
175
176
177
	int			rd;
	int			wr=0;
	int			total=0;
	int			i;
178

179
180
181
/* sendfile() on Linux may or may not work with non-blocking sockets ToDo */
	len=filelength(file);

182
183
184
185
	if(offset!=NULL)
		if(lseek(file,*offset,SEEK_SET)<0)
			return(-1);

186
	if(count<1 || count>len) {
187
		count=len;
188
189
		count-=tell(file);		/* don't try to read beyond EOF */
	}
190
191
192
193
194
195
196
197
#if USE_SENDFILE
	while((i=sendfile(file,sock,(offset==NULL?0:*offset)+total,count-total,NULL,&wr,0))==-1 && errno==EAGAIN)  {
		total+=wr;
		SLEEP(1);
	}
	if(i==0)
		return((int)count);
#endif
198

199
200
201
202
203
204
	if(count<0) {
		errno=EINVAL;
		return(-1);
	}

	while(total<count) {
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
		rd=read(file,buf,sizeof(buf));
		if(rd==-1)
			return(-1);
		if(rd==0)
			break;
		for(i=wr=0;i<rd;i+=wr) {
			wr=sendsocket(sock,buf+i,rd-i);
			if(wr>0)
				continue;
			if(wr==SOCKET_ERROR && ERROR_VALUE==EWOULDBLOCK) {
				wr=0;
				SLEEP(1);
				continue;
			}
			return(wr);
220
		}
221
222
223
		if(i!=rd)
			return(-1);
		total+=rd;
224
225
	}

226
	if(offset!=NULL)
227
228
229
		(*offset)+=total;

	return(total);
230
231
}

deuce's avatar
deuce committed
232
int DLLCALL recvfilesocket(int sock, int file, off_t *offset, off_t count)
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
{
	/* Writes a file from a socket -
	 *
	 * sock		- Socket to read from
	 * file		- File descriptior to write to
	 *				MUST be open and writeable
	 * offset	- pointer to file offset to start writing at
	 *				is set to offset writing STOPPED
	 *				on return
	 * count	- number of bytes to read/write
	 *
	 * returns -1 if an error occurse, otherwise
	 * returns number ob bytes written and sets offset
	 * to the new offset
	 */
	 
	char*	buf;
	int		rd;
	int		wr;

	if(count<1) {
		errno=ERANGE;
		return(-1);
	}
		
258
	if((buf=(char*)malloc((size_t)count))==NULL) {
259
260
261
262
		errno=ENOMEM;
		return(-1);
	}

263
264
265
	if(offset!=NULL) {
		if(lseek(file,*offset,SEEK_SET)<0) {
			free(buf);
266
			return(-1);
267
268
		}
	}
269

270
	rd=read(sock,buf,(size_t)count);
271
272
	if(rd!=count) {
		free(buf);
273
		return(-1);
274
	}
275
276
277
278
279
280

	wr=write(file,buf,rd);

	if(offset!=NULL)
		(*offset)+=wr;

281
	free(buf);
282
283
284
285
	return(wr);
}


286
/* Return true if connected, optionally sets *rd_p to true if read data available */
deuce's avatar
deuce committed
287
BOOL DLLCALL socket_check(SOCKET sock, BOOL* rd_p, BOOL* wr_p, DWORD timeout)
288
289
290
{
	char	ch;
	int		i,rd;
291
	fd_set	rd_set;
292
	fd_set*	rd_set_p=&rd_set;
293
294
	fd_set	wr_set;
	fd_set*	wr_set_p=NULL;
295
296
297
298
299
	struct	timeval tv;

	if(rd_p!=NULL)
		*rd_p=FALSE;

300
301
302
	if(wr_p!=NULL)
		*wr_p=FALSE;

303
304
305
	if(sock==INVALID_SOCKET)
		return(FALSE);

306
307
308
309
310
311
	FD_ZERO(&rd_set);
	FD_SET(sock,&rd_set);
	if(wr_p!=NULL) {
		wr_set_p=&wr_set;
		FD_ZERO(wr_set_p);
		FD_SET(sock,wr_set_p);
312
		if(rd_p==NULL)
313
			rd_set_p=NULL;
314
	}
315

316
317
318
	/* Convert timeout from ms to sec/usec */
	tv.tv_sec=timeout/1000;
	tv.tv_usec=(timeout%1000)*1000;
319

320
	i=select(sock+1,rd_set_p,wr_set_p,NULL,&tv);
321
322
323
324
325
326
	if(i==SOCKET_ERROR)
		return(FALSE);

	if(i==0) 
		return(TRUE);

327
328
329
330
331
332
	if(wr_p!=NULL && FD_ISSET(sock,wr_set_p)) {
		*wr_p=TRUE;
		if(i==1)
			return(TRUE);
	}

333
	if(rd_p !=NULL || wr_p==NULL)  {
334
335
336
337
338
339
340
		rd=recv(sock,&ch,1,MSG_PEEK);
		if(rd==1 
			|| (rd==SOCKET_ERROR && ERROR_VALUE==EMSGSIZE)) {
			if(rd_p!=NULL)
				*rd_p=TRUE;
			return(TRUE);
		}
341
342
343
344
	}

	return(FALSE);
}
deuce's avatar
deuce committed
345

deuce's avatar
deuce committed
346
int DLLCALL retry_bind(SOCKET s, const struct sockaddr *addr, socklen_t addrlen
347
348
			   ,uint retries, uint wait_secs
			   ,const char* prot
349
			   ,int (*lprintf)(int level, const char *fmt, ...))
deuce's avatar
deuce committed
350
{
351
	char	port_str[128];
deuce's avatar
deuce committed
352
	int		result=-1;
353
	uint	i;
deuce's avatar
deuce committed
354

355
	if(addr->sa_family==AF_INET)
deuce's avatar
deuce committed
356
		SAFEPRINTF(port_str," to port %u",ntohs(((SOCKADDR_IN *)(addr))->sin_port));
357
358
	else
		port_str[0]=0;
deuce's avatar
deuce committed
359
	for(i=0;i<=retries;i++) {
360
		if((result=bind(s,addr,addrlen))==0)
deuce's avatar
deuce committed
361
			break;
362
		if(lprintf!=NULL)
363
			lprintf(i<retries ? LOG_WARNING:LOG_CRIT
364
365
366
				,"%04d !ERROR %d binding %s socket%s", s, ERROR_VALUE, prot, port_str);
		if(i<retries) {
			if(lprintf!=NULL)
367
368
				lprintf(LOG_WARNING,"%04d Will retry in %u seconds (%u of %u)"
					,s, wait_secs, i+1, retries);
369
370
			SLEEP(wait_secs*1000);
		}
deuce's avatar
deuce committed
371
372
373
	}
	return(result);
}
374

deuce's avatar
deuce committed
375
int DLLCALL nonblocking_connect(SOCKET sock, struct sockaddr* addr, size_t size, unsigned timeout)
376
377
378
379
380
{
	int result;

	result=connect(sock, addr, size);

381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
	if(result==SOCKET_ERROR) {
		result=ERROR_VALUE;
		if(result==EWOULDBLOCK || result==EINPROGRESS) {
			fd_set		wsocket_set;
			fd_set		esocket_set;
			struct		timeval tv;
			socklen_t	optlen=sizeof(result);
			tv.tv_sec = timeout;
			tv.tv_usec = 0;
			FD_ZERO(&wsocket_set);
			FD_SET(sock,&wsocket_set);
			FD_ZERO(&esocket_set);
			FD_SET(sock,&esocket_set);
			switch(select(sock+1,NULL,&wsocket_set,&esocket_set,&tv)) {
				case 1:
					if(getsockopt(sock, SOL_SOCKET, SO_ERROR, (void*)&result, &optlen)==SOCKET_ERROR)
						result=ERROR_VALUE;
					break;
				case 0:
					break;
				case SOCKET_ERROR:
					result=ERROR_VALUE;
					break;
			}
		}
406
407
408
	}
	return result;
}
409

deuce's avatar
deuce committed
410

deuce's avatar
deuce committed
411
union xp_sockaddr* DLLCALL inet_ptoaddr(char *addr_str, union xp_sockaddr *addr, size_t size)
deuce's avatar
deuce committed
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
{
    struct addrinfo hints = {0};
    struct addrinfo *res, *cur;

    hints.ai_flags = AI_NUMERICHOST|AI_PASSIVE;
    if(getaddrinfo(addr_str, NULL, &hints, &res))
        return NULL;
    
    for(cur = res; cur; cur++) {
        if(cur->ai_addr->sa_family == AF_INET6)
            break;
    }
    if(!cur) {
        freeaddrinfo(res);
        return NULL;
    }
428
429
430
431
432
433
    if (size < sizeof(struct sockaddr_in6)) {
        freeaddrinfo(res);
        return NULL;
	}
	size = sizeof(struct sockaddr_in6);
    memcpy(addr, ((struct sockaddr_in6 *)(cur->ai_addr)), size);
deuce's avatar
deuce committed
434
435
436
437
    freeaddrinfo(res);
    return addr;
}

deuce's avatar
deuce committed
438
const char* DLLCALL inet_addrtop(union xp_sockaddr *addr, char *dest, size_t size)
439
{
440
#ifdef _WIN32
deuce's avatar
deuce committed
441
	if(getnameinfo(&addr->addr, xp_sockaddr_len(addr), dest, size, NULL, 0, NI_NUMERICHOST))
442
		safe_snprintf(dest, size, "<Error %u converting address, family=%u>", WSAGetLastError(), addr->addr.sa_family);
443
444
	return dest;
#else
445
	switch(addr->addr.sa_family) {
446
		case AF_INET:
447
			return inet_ntop(addr->in.sin_family, &addr->in.sin_addr, dest, size);
448
		case AF_INET6:
449
			return inet_ntop(addr->in6.sin6_family, &addr->in6.sin6_addr, dest, size);
450
451
452
453
		case AF_UNIX:
			strncpy(dest, addr->un.sun_path, size);
			dest[size-1]=0;
			return dest;
454
		default:
455
			safe_snprintf(dest, size, "<unknown address family: %u>", addr->addr.sa_family);
456
457
			return NULL;
	}
458
#endif
459
460
}

deuce's avatar
deuce committed
461
uint16_t DLLCALL inet_addrport(union xp_sockaddr *addr)
462
{
463
	switch(addr->addr.sa_family) {
464
		case AF_INET:
465
			return ntohs(addr->in.sin_port);
466
		case AF_INET6:
467
			return ntohs(addr->in6.sin6_port);
468
469
470
471
		default:
			return 0;
	}
}
deuce's avatar
deuce committed
472

deuce's avatar
deuce committed
473
void DLLCALL inet_setaddrport(union xp_sockaddr *addr, uint16_t port)
deuce's avatar
deuce committed
474
475
476
477
478
479
480
481
482
483
{
	switch(addr->addr.sa_family) {
		case AF_INET:
			addr->in.sin_port = htons(port);
			break;
		case AF_INET6:
			addr->in6.sin6_port = htons(port);
			break;
	}
}