2 * Claws Mail -- a GTK+ based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2017 Hiroyuki Yamamoto and the Claws Mail team
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 3 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "claws-features.h"
24 #if (defined (_XOPEN_SOURCE) && !defined (_BSD_SOURCE))
28 /* This can probably be handled better, e.g. define it in config.h. */
29 #define _WIN32_WINNT _WIN32_WINNT_WIN6
31 #include <glib/gi18n.h>
34 #include <sys/types.h>
36 # include <ws2tcpip.h>
38 # define EINPROGRESS WSAEINPROGRESS
43 # include <sys/wait.h>
45 # include <sys/socket.h>
46 # include <sys/stat.h>
48 # include <netinet/in.h>
49 # include <arpa/inet.h>
51 # ifndef _PATH_RESCONF
52 # define _PATH_RESCONF "/etc/resolv.conf"
55 #endif /* G_OS_WIN32 */
65 # include <sys/select.h>
76 #error USE_GIO is currently not supported
86 typedef gint (*SockAddrFunc) (GList *addr_list,
89 typedef struct _SockConnectData SockConnectData;
90 typedef struct _SockLookupData SockLookupData;
91 typedef struct _SockAddrData SockAddrData;
92 typedef struct _SockSource SockSource;
94 struct _SockConnectData {
100 SockLookupData *lookup_data;
103 SockConnectFunc func;
105 gchar *canonical_name;
108 struct _SockLookupData {
117 gchar *canonical_name;
120 struct _SockAddrData {
125 struct sockaddr *addr;
133 static guint io_timeout = 60;
135 static GList *sock_connect_data_list = NULL;
137 static gboolean ssl_sock_prepare (GSource *source,
139 static gboolean ssl_sock_check (GSource *source);
140 static gboolean ssl_sock_dispatch (GSource *source,
141 GSourceFunc callback,
145 GSourceFuncs ssl_watch_funcs = {
155 static gint sock_connect_with_timeout (gint sock,
156 const struct sockaddr *serv_addr,
160 static gint sock_connect_by_getaddrinfo (const gchar *hostname,
163 static SockInfo *sockinfo_from_fd(const gchar *hostname,
166 static void sock_address_list_free (GList *addr_list);
168 static gboolean sock_connect_async_cb (GIOChannel *source,
169 GIOCondition condition,
171 static gint sock_connect_async_get_address_info_cb
175 static gint sock_connect_address_list_async (SockConnectData *conn_data);
177 static gboolean sock_get_address_info_async_cb (GIOChannel *source,
178 GIOCondition condition,
180 static SockLookupData *sock_get_address_info_async
181 (const gchar *hostname,
185 static gint sock_get_address_info_async_cancel (SockLookupData *lookup_data);
194 result = WSAStartup(MAKEWORD(2, 2), &wsadata);
195 if (result != NO_ERROR) {
196 g_warning("WSAStartup() failed");
203 gint sock_cleanup(void)
211 gint sock_set_io_timeout(guint sec)
217 void refresh_resolvers(void)
220 static time_t resolv_conf_changed = (time_t)NULL;
223 /* This makes the glibc re-read resolv.conf, if it changed
224 * since our startup. Maybe that should be #ifdef'ed, I don't
225 * know if it'd work on BSDs.
226 * Why doesn't the glibc do it by itself?
228 if (g_stat(_PATH_RESCONF, &s) == 0) {
229 if (s.st_mtime > resolv_conf_changed) {
230 resolv_conf_changed = s.st_mtime;
234 we'll have bigger problems. */
239 #define SOCKET_IS_VALID(s) ((s) != INVALID_SOCKET)
241 #define SOCKET_IS_VALID(s) (s != -1)
244 /* Due to the fact that socket under Windows are not represented by
245 standard file descriptors, we sometimes need to check whether a
246 given file descriptor is actually a socket. This is done by
247 testing for an error. Returns true under W32 if FD is a socket. */
248 static int fd_is_w32_socket(gint fd)
252 gint retval = sizeof(optval);
254 return !getsockopt(fd, SOL_SOCKET, SO_TYPE, (char*)&optval, &retval);
260 gint fd_connect_inet(gushort port)
263 struct sockaddr_in addr;
265 sock = socket(AF_INET, SOCK_STREAM, 0);
266 if (!SOCKET_IS_VALID(sock)) {
268 debug_print("fd_connect_inet(): socket() failed: %d\n",
271 perror("fd_connect_inet(): socket");
276 memset(&addr, 0, sizeof(addr));
277 addr.sin_family = AF_INET;
278 addr.sin_port = htons(port);
279 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
281 if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
288 gint fd_open_inet(gushort port)
291 struct sockaddr_in addr;
294 sock = socket(AF_INET, SOCK_STREAM, 0);
295 if (!SOCKET_IS_VALID(sock)) {
297 g_warning("fd_open_inet(): socket() failed: %d",
300 perror("fd_open_inet(): socket");
306 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (char *)&val,
308 perror("setsockopt");
313 memset(&addr, 0, sizeof(addr));
314 addr.sin_family = AF_INET;
315 addr.sin_port = htons(port);
316 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
318 if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
324 if (listen(sock, 1) < 0) {
333 gint fd_connect_unix(const gchar *path)
337 struct sockaddr_un addr;
339 sock = socket(PF_UNIX, SOCK_STREAM, 0);
341 perror("sock_connect_unix(): socket");
345 memset(&addr, 0, sizeof(addr));
346 addr.sun_family = AF_UNIX;
347 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
349 if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
360 gint fd_open_unix(const gchar *path)
364 struct sockaddr_un addr;
366 sock = socket(PF_UNIX, SOCK_STREAM, 0);
369 perror("sock_open_unix(): socket");
373 memset(&addr, 0, sizeof(addr));
374 addr.sun_family = AF_UNIX;
375 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
377 if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
378 gchar *buf = g_strdup_printf("can't bind to %s", path);
385 if (listen(sock, 1) < 0) {
386 gchar *buf = g_strdup_printf("can't listen on %s", path);
399 gint fd_accept(gint sock)
401 struct sockaddr_in caddr;
404 caddr_len = sizeof(caddr);
405 return accept(sock, (struct sockaddr *)&caddr, &caddr_len);
409 static gint set_nonblocking_mode(gint fd, gboolean nonblock)
414 flags = fcntl(fd, F_GETFL, 0);
423 flags &= ~O_NONBLOCK;
425 return fcntl(fd, F_SETFL, flags);
431 gint sock_set_nonblocking_mode(SockInfo *sock, gboolean nonblock)
433 cm_return_val_if_fail(sock != NULL, -1);
435 return set_nonblocking_mode(sock->sock, nonblock);
438 static gboolean is_nonblocking_mode(gint fd)
443 flags = fcntl(fd, F_GETFL, 0);
449 return ((flags & O_NONBLOCK) != 0);
455 gboolean sock_is_nonblocking_mode(SockInfo *sock)
457 cm_return_val_if_fail(sock != NULL, FALSE);
459 return is_nonblocking_mode(sock->sock);
464 static gboolean ssl_sock_prepare(GSource *source, gint *timeout)
470 static gboolean ssl_sock_check(GSource *source)
472 SockInfo *sock = ((SockSource *)source)->sock;
473 struct timeval timeout = {0, 0};
475 GIOCondition condition = 0;
477 if (!sock || !sock->sock)
480 condition = sock->condition;
482 if ((condition & G_IO_IN) == G_IO_IN &&
483 gnutls_record_check_pending(sock->ssl) != 0)
487 FD_SET(sock->sock, &fds);
489 select(sock->sock + 1,
490 (condition & G_IO_IN) ? &fds : NULL,
491 (condition & G_IO_OUT) ? &fds : NULL,
494 return FD_ISSET(sock->sock, &fds) != 0;
497 static gboolean ssl_sock_dispatch(GSource *source, GSourceFunc callback,
500 SockInfo *sock = ((SockSource *)source)->sock;
502 if (!sock || !sock->callback || !sock->data)
505 return sock->callback(sock, sock->condition, sock->data);
509 static gboolean sock_watch_cb(GIOChannel *source, GIOCondition condition,
512 SockInfo *sock = (SockInfo *)data;
514 if ((condition & sock->condition) == 0)
517 return sock->callback(sock, sock->condition, sock->data);
520 guint sock_add_watch(SockInfo *sock, GIOCondition condition, SockFunc func,
526 sock->callback = func;
527 sock->condition = condition;
533 GSource *source = g_source_new(&ssl_watch_funcs,
535 ((SockSource *) source)->sock = sock;
536 g_source_set_priority(source, G_PRIORITY_DEFAULT);
537 g_source_set_can_recurse(source, FALSE);
538 sock->g_source = g_source_attach(source, NULL);
539 g_source_unref (source); /* Refcount back down to 1 */
540 return sock->g_source;
544 return g_io_add_watch(sock->sock_ch, condition, sock_watch_cb, sock);
547 static gint fd_check_io(gint fd, GIOCondition cond)
549 struct timeval timeout;
552 if (is_nonblocking_mode(fd))
555 timeout.tv_sec = io_timeout;
561 if (cond == G_IO_IN) {
562 select(fd + 1, &fds, NULL, NULL,
563 io_timeout > 0 ? &timeout : NULL);
565 select(fd + 1, NULL, &fds, NULL,
566 io_timeout > 0 ? &timeout : NULL);
569 if (FD_ISSET(fd, &fds)) {
572 g_warning("Socket IO timeout");
573 log_error(LOG_PROTOCOL, _("Socket IO timeout.\n"));
579 static sigjmp_buf jmpenv;
581 static void timeout_handler(gint sig)
583 siglongjmp(jmpenv, 1);
587 static gint sock_connect_with_timeout(gint sock,
588 const struct sockaddr *serv_addr,
592 gint ret, saved_errno;
594 void (*prev_handler)(gint);
597 prev_handler = signal(SIGALRM, timeout_handler);
598 if (sigsetjmp(jmpenv, 1)) {
600 signal(SIGALRM, prev_handler);
602 log_error(LOG_PROTOCOL, _("Connection timed out.\n"));
608 ret = connect(sock, serv_addr, addrlen);
612 debug_print("connect() failed: %d (%s)\n",
613 saved_errno, g_strerror(saved_errno));
618 signal(SIGALRM, prev_handler);
624 static gint sock_connect_by_getaddrinfo(const gchar *hostname, gushort port)
626 gint sock = -1, gai_error;
627 struct addrinfo hints, *res, *ai;
632 memset(&hints, 0, sizeof(hints));
633 hints.ai_flags = AI_ADDRCONFIG;
636 hints.ai_family = AF_UNSPEC;
638 hints.ai_family = AF_INET;
641 hints.ai_socktype = SOCK_STREAM;
642 hints.ai_protocol = IPPROTO_TCP;
644 /* convert port from integer to string. */
645 g_snprintf(port_str, sizeof(port_str), "%d", port);
647 if ((gai_error = getaddrinfo(hostname, port_str, &hints, &res)) != 0) {
648 g_printerr("getaddrinfo for %s:%s failed: %s\n",
649 hostname, port_str, gai_strerror(gai_error));
653 for (ai = res; ai != NULL; ai = ai->ai_next) {
655 if (ai->ai_family == AF_INET6)
659 sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
663 if (sock == INVALID_SOCKET)
667 if (sock_connect_with_timeout
668 (sock, ai->ai_addr, ai->ai_addrlen, io_timeout) == 0)
683 SockInfo *sock_connect(const gchar *hostname, gushort port)
691 if ((sock = sock_connect_by_getaddrinfo(hostname, port)) < 0) {
695 return sockinfo_from_fd(hostname, port, sock);
699 static void sock_address_list_free(GList *addr_list)
703 for (cur = addr_list; cur != NULL; cur = cur->next) {
704 SockAddrData *addr_data = (SockAddrData *)cur->data;
705 g_free(addr_data->addr);
709 g_list_free(addr_list);
712 /* asynchronous TCP connection */
714 static gboolean sock_connect_async_cb(GIOChannel *source,
715 GIOCondition condition, gpointer data)
717 SockConnectData *conn_data = (SockConnectData *)data;
723 if (conn_data->io_tag == 0 && conn_data->channel == NULL)
726 fd = g_io_channel_unix_get_fd(source);
728 conn_data->io_tag = 0;
729 conn_data->channel = NULL;
730 g_io_channel_unref(source);
733 if (getsockopt(fd, SOL_SOCKET, SO_ERROR, (void*)&val, &len) < 0) {
734 perror("getsockopt");
736 sock_connect_address_list_async(conn_data);
742 log_error(LOG_PROTOCOL, _("%s:%d: connection failed (%s).\n"),
743 conn_data->hostname, conn_data->port,
745 sock_connect_address_list_async(conn_data);
749 sockinfo = g_new0(SockInfo, 1);
752 sockinfo->sock_ch = g_io_channel_unix_new(fd);
754 sockinfo->sock_ch = g_io_channel_win32_new_socket(fd);
756 sockinfo->hostname = g_strdup(conn_data->hostname);
757 sockinfo->port = conn_data->port;
758 sockinfo->state = CONN_ESTABLISHED;
759 sockinfo->canonical_name = g_strdup(conn_data->canonical_name);
761 conn_data->func(sockinfo, conn_data->data);
763 sock_connect_async_cancel(conn_data->id);
768 static gint sock_connect_async_get_address_info_cb(GList *addr_list,
771 SockConnectData *conn_data = (SockConnectData *)data;
773 conn_data->addr_list = addr_list;
774 conn_data->cur_addr = addr_list;
775 if (conn_data->lookup_data) {
776 conn_data->canonical_name = conn_data->lookup_data->canonical_name;
777 conn_data->lookup_data->canonical_name = NULL;
778 conn_data->lookup_data = NULL;
780 return sock_connect_address_list_async(conn_data);
783 gint sock_connect_async(const gchar *hostname, gushort port,
784 SockConnectFunc func, gpointer data)
787 SockConnectData *conn_data;
789 conn_data = g_new0(SockConnectData, 1);
790 conn_data->id = id++;
791 conn_data->hostname = g_strdup(hostname);
792 conn_data->port = port;
793 conn_data->addr_list = NULL;
794 conn_data->cur_addr = NULL;
795 conn_data->io_tag = 0;
796 conn_data->func = func;
797 conn_data->data = data;
799 conn_data->lookup_data = sock_get_address_info_async
800 (hostname, port, sock_connect_async_get_address_info_cb,
803 if (conn_data->lookup_data == NULL) {
804 g_free(conn_data->hostname);
809 sock_connect_data_list = g_list_append(sock_connect_data_list,
812 return conn_data->id;
815 gint sock_connect_async_cancel(gint id)
817 SockConnectData *conn_data = NULL;
820 for (cur = sock_connect_data_list; cur != NULL; cur = cur->next) {
821 if (((SockConnectData *)cur->data)->id == id) {
822 conn_data = (SockConnectData *)cur->data;
828 sock_connect_data_list = g_list_remove(sock_connect_data_list,
831 if (conn_data->lookup_data)
832 sock_get_address_info_async_cancel
833 (conn_data->lookup_data);
835 if (conn_data->io_tag > 0)
836 g_source_remove(conn_data->io_tag);
837 if (conn_data->channel) {
839 g_io_channel_shutdown(conn_data->channel, TRUE, &err);
842 g_io_channel_unref(conn_data->channel);
845 sock_address_list_free(conn_data->addr_list);
846 g_free(conn_data->canonical_name);
847 g_free(conn_data->hostname);
850 g_warning("sock_connect_async_cancel: id %d not found", id);
857 static gint sock_connect_address_list_async(SockConnectData *conn_data)
859 SockAddrData *addr_data;
862 for (; conn_data->cur_addr != NULL;
863 conn_data->cur_addr = conn_data->cur_addr->next) {
864 addr_data = (SockAddrData *)conn_data->cur_addr->data;
866 if ((sock = socket(addr_data->family, addr_data->socktype,
867 addr_data->protocol)) < 0) {
873 set_nonblocking_mode(sock, TRUE);
875 if (connect(sock, addr_data->addr, addr_data->addr_len) < 0) {
876 if (EINPROGRESS == errno) {
887 if (conn_data->cur_addr == NULL) {
888 conn_data->func(NULL, conn_data->data);
889 sock_connect_async_cancel(conn_data->id);
893 conn_data->cur_addr = conn_data->cur_addr->next;
896 conn_data->channel = g_io_channel_unix_new(sock);
898 conn_data->channel = g_io_channel_win32_new_socket(sock);
900 conn_data->io_tag = g_io_add_watch(conn_data->channel, G_IO_IN|G_IO_OUT,
901 sock_connect_async_cb, conn_data);
906 /* asynchronous DNS lookup */
908 static gboolean sock_get_address_info_async_cb(GIOChannel *source,
909 GIOCondition condition,
912 SockLookupData *lookup_data = (SockLookupData *)data;
913 GList *addr_list = NULL;
914 SockAddrData *addr_data;
917 struct sockaddr *addr;
918 gchar *canonical_name = NULL;
922 g_io_channel_set_encoding(source, NULL, &err);
924 g_warning("can unset encoding: %s", err->message);
928 g_io_channel_set_buffered(source, FALSE);
929 if (g_io_channel_read_chars(source, &len, sizeof(len),
930 &bytes_read, &err) == G_IO_STATUS_NORMAL) {
932 g_warning("g_io_channel_read_chars: %s", err->message);
936 if (bytes_read == sizeof(len) && len > 0) {
939 canonical_name = g_malloc0(len + 1);
940 cur = canonical_name;
942 if (g_io_channel_read_chars(source, cur, todo,
943 &bytes_read, &err) != G_IO_STATUS_NORMAL) {
945 g_warning("canonical name not read %s", err->message);
946 g_free(canonical_name);
947 canonical_name = NULL;
956 if (bytes_read == 0) {
957 g_warning("canonical name not read");
958 g_free(canonical_name);
959 canonical_name = NULL;
966 if (g_io_channel_read_chars(source, (gchar *)ai_member,
967 sizeof(ai_member), &bytes_read, &err)
968 != G_IO_STATUS_NORMAL) {
970 g_warning("g_io_channel_read_chars: addr len %s", err->message);
977 if (bytes_read == 0 || bytes_read != sizeof(ai_member))
980 if (ai_member[0] == AF_UNSPEC) {
981 g_warning("DNS lookup failed");
982 log_error(LOG_PROTOCOL, _("%s:%d: unknown host.\n"),
983 lookup_data->hostname, lookup_data->port);
987 addr = g_malloc(ai_member[3]);
988 if (g_io_channel_read_chars(source, (gchar *)addr, ai_member[3],
990 != G_IO_STATUS_NORMAL) {
992 g_warning("g_io_channel_read_chars: addr data read %s", err->message);
1000 if (bytes_read != ai_member[3]) {
1001 g_warning("sock_get_address_info_async_cb: "
1002 "incomplete address data");
1007 addr_data = g_new0(SockAddrData, 1);
1008 addr_data->family = ai_member[0];
1009 addr_data->socktype = ai_member[1];
1010 addr_data->protocol = ai_member[2];
1011 addr_data->addr_len = ai_member[3];
1012 addr_data->addr = addr;
1014 addr_list = g_list_append(addr_list, addr_data);
1017 g_io_channel_shutdown(source, TRUE, &err);
1020 g_io_channel_unref(source);
1023 /* FIXME: We would need to cancel the thread. */
1025 kill(lookup_data->child_pid, SIGKILL);
1026 waitpid(lookup_data->child_pid, NULL, 0);
1028 lookup_data->canonical_name = canonical_name;
1030 lookup_data->func(addr_list, lookup_data->data);
1032 g_free(lookup_data->canonical_name);
1033 g_free(lookup_data->hostname);
1034 g_free(lookup_data);
1040 /* For better readability we use a separate function to implement the
1041 child code of sock_get_address_info_async. Note, that under W32
1042 this is actually not a child but a thread and this is the reason
1043 why we pass only a void pointer. */
1044 static void address_info_async_child(void *opaque)
1046 SockLookupData *parm = opaque;
1048 struct addrinfo hints, *res, *ai;
1050 gint ai_member[4] = {AF_UNSPEC, 0, 0, 0};
1053 close(parm->pipe_fds[0]);
1054 parm->pipe_fds[0] = -1;
1057 memset(&hints, 0, sizeof(hints));
1058 hints.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
1060 hints.ai_family = AF_UNSPEC;
1062 hints.ai_family = AF_INET;
1064 hints.ai_socktype = SOCK_STREAM;
1065 hints.ai_protocol = IPPROTO_TCP;
1067 g_snprintf(port_str, sizeof(port_str), "%d", parm->port);
1069 gai_err = getaddrinfo(parm->hostname, port_str, &hints, &res);
1072 g_warning("getaddrinfo for %s:%s failed: %s",
1073 parm->hostname, port_str, gai_strerror(gai_err));
1074 log_error(LOG_PROTOCOL, _("%s:%s: host lookup failed (%s).\n"),
1075 parm->hostname, port_str, gai_strerror(gai_err));
1076 fd_write_all(parm->pipe_fds[1], &len,
1078 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1080 close(parm->pipe_fds[1]);
1081 parm->pipe_fds[1] = -1;
1090 if (res->ai_canonname && strlen(res->ai_canonname) < 255) {
1091 gchar len = strlen(res->ai_canonname);
1092 fd_write_all(parm->pipe_fds[1], &len,
1094 fd_write_all(parm->pipe_fds[1], res->ai_canonname,
1098 fd_write_all(parm->pipe_fds[1], &len,
1103 fd_write_all(parm->pipe_fds[1], &len,
1107 for (ai = res; ai != NULL; ai = ai->ai_next) {
1108 ai_member[0] = ai->ai_family;
1109 ai_member[1] = ai->ai_socktype;
1110 ai_member[2] = ai->ai_protocol;
1111 ai_member[3] = ai->ai_addrlen;
1113 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1115 fd_write_all(parm->pipe_fds[1], (gchar *)ai->ai_addr,
1122 close(parm->pipe_fds[1]);
1123 parm->pipe_fds[1] = -1;
1132 static SockLookupData *sock_get_address_info_async(const gchar *hostname,
1137 SockLookupData *lookup_data = NULL;
1139 refresh_resolvers();
1141 lookup_data = g_new0(SockLookupData, 1);
1142 lookup_data->hostname = g_strdup(hostname);
1143 lookup_data->func = func;
1144 lookup_data->data = data;
1145 lookup_data->port = port;
1146 lookup_data->child_pid = (pid_t)(-1);
1147 lookup_data->pipe_fds[0] = -1;
1148 lookup_data->pipe_fds[1] = -1;
1150 if (pipe(lookup_data->pipe_fds) < 0) {
1153 g_free (lookup_data->hostname);
1154 g_free (lookup_data);
1159 if ((lookup_data->child_pid = fork()) < 0) {
1162 g_free (lookup_data->hostname);
1163 g_free (lookup_data);
1167 if (lookup_data->child_pid == 0) {
1168 /* Child process. */
1169 address_info_async_child (lookup_data);
1170 g_assert_not_reached ();
1172 /* Parent process. */
1173 close(lookup_data->pipe_fds[1]);
1174 lookup_data->pipe_fds[1] = -1;
1175 #endif /*!G_OS_WIN32 */
1178 lookup_data->channel = g_io_channel_unix_new(lookup_data->pipe_fds[0]);
1180 lookup_data->channel = g_io_channel_win32_new_fd(lookup_data->pipe_fds[0]);
1182 lookup_data->io_tag = g_io_add_watch(lookup_data->channel, G_IO_IN,
1183 sock_get_address_info_async_cb,
1186 lookup_data->child_pid = _beginthread(
1187 address_info_async_child, 0, lookup_data);
1193 static gint sock_get_address_info_async_cancel(SockLookupData *lookup_data)
1195 if (lookup_data->io_tag > 0)
1196 g_source_remove(lookup_data->io_tag);
1197 if (lookup_data->channel) {
1199 g_io_channel_shutdown(lookup_data->channel, TRUE, &err);
1203 g_io_channel_unref(lookup_data->channel);
1206 if (lookup_data->child_pid > 0) {
1208 /* FIXME: Need a way to cancel the thread. */
1210 kill(lookup_data->child_pid, SIGKILL);
1211 waitpid(lookup_data->child_pid, NULL, 0);
1215 g_free(lookup_data->canonical_name);
1216 g_free(lookup_data->hostname);
1217 g_free(lookup_data);
1223 static SockInfo *sockinfo_from_fd(const gchar *hostname,
1229 sockinfo = g_new0(SockInfo, 1);
1230 sockinfo->sock = sock;
1232 sockinfo->sock_ch = g_io_channel_unix_new(sock);
1234 sockinfo->sock_ch = g_io_channel_win32_new_socket(sock);
1236 sockinfo->hostname = g_strdup(hostname);
1237 sockinfo->port = port;
1238 sockinfo->state = CONN_ESTABLISHED;
1243 static gint fd_read(gint fd, gchar *buf, gint len)
1245 if (fd_check_io(fd, G_IO_IN) < 0)
1248 if (fd_is_w32_socket(fd))
1249 return recv(fd, buf, len, 0);
1250 return read(fd, buf, len);
1254 static gint ssl_read(gnutls_session_t ssl, gchar *buf, gint len)
1258 if (gnutls_record_check_pending(ssl) == 0) {
1259 if (fd_check_io(GPOINTER_TO_INT(gnutls_transport_get_ptr(ssl)), G_IO_IN) < 0)
1264 r = gnutls_record_recv(ssl, buf, len);
1269 case 0: /* closed connection */
1272 case GNUTLS_E_REHANDSHAKE:
1274 r = gnutls_handshake(ssl);
1275 } while (r == GNUTLS_E_AGAIN || r == GNUTLS_E_INTERRUPTED);
1276 break; /* re-receive */
1277 case GNUTLS_E_AGAIN:
1278 case GNUTLS_E_INTERRUPTED:
1283 debug_print("Unexpected SSL/TLS read result %d\n", r);
1292 gint sock_read(SockInfo *sock, gchar *buf, gint len)
1296 cm_return_val_if_fail(sock != NULL, -1);
1300 ret = ssl_read(sock->ssl, buf, len);
1303 ret = fd_read(sock->sock, buf, len);
1306 sock->state = CONN_DISCONNECTED;
1310 gint fd_write(gint fd, const gchar *buf, gint len)
1312 if (fd_check_io(fd, G_IO_OUT) < 0)
1315 if (fd_is_w32_socket (fd))
1316 return send(fd, buf, len, 0);
1317 return write(fd, buf, len);
1321 static gint ssl_write(gnutls_session_t ssl, const gchar *buf, gint len)
1325 if (fd_check_io(GPOINTER_TO_INT(gnutls_transport_get_ptr(ssl)), G_IO_OUT) < 0)
1328 ret = gnutls_record_send(ssl, buf, len);
1333 case GNUTLS_E_AGAIN:
1334 case GNUTLS_E_INTERRUPTED:
1344 gint sock_write(SockInfo *sock, const gchar *buf, gint len)
1348 cm_return_val_if_fail(sock != NULL, -1);
1352 ret = ssl_write(sock->ssl, buf, len);
1355 ret = fd_write(sock->sock, buf, len);
1358 sock->state = CONN_DISCONNECTED;
1362 gint fd_write_all(gint fd, const gchar *buf, gint len)
1367 if (fd_check_io(fd, G_IO_OUT) < 0)
1370 signal(SIGPIPE, SIG_IGN);
1372 if (fd_is_w32_socket(fd))
1373 n = send(fd, buf, len, 0);
1375 n = write(fd, buf, len);
1378 log_error(LOG_PROTOCOL, _("write on fd%d: %s\n"), fd, g_strerror(errno));
1390 static gint ssl_write_all(gnutls_session_t ssl, const gchar *buf, gint len)
1395 n = ssl_write(ssl, buf, len);
1407 gint sock_write_all(SockInfo *sock, const gchar *buf, gint len)
1411 cm_return_val_if_fail(sock != NULL, -1);
1415 ret = ssl_write_all(sock->ssl, buf, len);
1418 ret = fd_write_all(sock->sock, buf, len);
1421 sock->state = CONN_DISCONNECTED;
1425 static gint fd_recv(gint fd, gchar *buf, gint len, gint flags)
1427 if (fd_check_io(fd, G_IO_IN) < 0)
1430 return recv(fd, buf, len, flags);
1433 gint fd_gets(gint fd, gchar *buf, gint len)
1441 fd_check_io(fd, G_IO_IN);
1445 MSKB Article ID: Q147714
1446 Windows Sockets 2 Service Provider Interface Limitations
1447 Polling with recv(MSG_PEEK) to determine when a complete message
1449 Reason and Workaround not available.
1451 Single-byte send() and recv().
1452 Reason: Couple one-byte sends with Nagle disabled.
1453 Workaround: Send modest amounts and receive as much as possible.
1456 if (recv(fd, bp, 1, 0) <= 0)
1463 #else /*!G_OS_WIN32*/
1467 if ((n = fd_recv(fd, bp, len, MSG_PEEK)) <= 0)
1469 if ((newline = memchr(bp, '\n', n)) != NULL)
1470 n = newline - bp + 1;
1471 if ((n = fd_read(fd, bp, n)) < 0)
1475 } while (!newline && len);
1476 #endif /*!G_OS_WIN32*/
1482 gint sock_close(SockInfo *sock)
1490 g_io_channel_unref(sock->sock_ch);
1494 ssl_done_socket(sock);
1495 if (sock->g_source != 0 && g_main_context_find_source_by_id(NULL, sock->g_source) != NULL)
1496 g_source_remove(sock->g_source);
1500 shutdown(sock->sock, 1); /* complete transfer before close */
1501 ret = closesocket(sock->sock);
1503 ret = fd_close(sock->sock);
1506 g_free(sock->canonical_name);
1507 g_free(sock->hostname);
1513 gint fd_close(gint fd)