2 * Claws Mail -- a GTK+ based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2015 Hiroyuki Yamamoto and the Claws Mail team
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 3 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "claws-features.h"
25 #if (defined (_XOPEN_SOURCE) && !defined (_BSD_SOURCE))
30 #include <glib/gi18n.h>
33 #include <sys/types.h>
35 # include <winsock2.h>
37 # define EINPROGRESS WSAEINPROGRESS
42 # include <sys/wait.h>
44 # include <sys/socket.h>
45 # include <sys/stat.h>
47 # include <netinet/in.h>
48 # include <arpa/inet.h>
51 #endif /* G_OS_WIN32 */
61 # include <sys/select.h>
72 #error USE_GIO is currently not supported
82 typedef gint (*SockAddrFunc) (GList *addr_list,
85 typedef struct _SockConnectData SockConnectData;
86 typedef struct _SockLookupData SockLookupData;
87 typedef struct _SockAddrData SockAddrData;
88 typedef struct _SockSource SockSource;
90 struct _SockConnectData {
96 SockLookupData *lookup_data;
101 gchar *canonical_name;
104 struct _SockLookupData {
113 gchar *canonical_name;
116 struct _SockAddrData {
121 struct sockaddr *addr;
129 static guint io_timeout = 60;
131 static GList *sock_connect_data_list = NULL;
133 static gboolean ssl_sock_prepare (GSource *source,
135 static gboolean ssl_sock_check (GSource *source);
136 static gboolean ssl_sock_dispatch (GSource *source,
137 GSourceFunc callback,
141 GSourceFuncs ssl_watch_funcs = {
149 static gint sock_connect_with_timeout (gint sock,
150 const struct sockaddr *serv_addr,
154 static gint sock_connect_by_getaddrinfo (const gchar *hostname,
157 static SockInfo *sockinfo_from_fd(const gchar *hostname,
160 static void sock_address_list_free (GList *addr_list);
162 static gboolean sock_connect_async_cb (GIOChannel *source,
163 GIOCondition condition,
165 static gint sock_connect_async_get_address_info_cb
169 static gint sock_connect_address_list_async (SockConnectData *conn_data);
171 static gboolean sock_get_address_info_async_cb (GIOChannel *source,
172 GIOCondition condition,
174 static SockLookupData *sock_get_address_info_async
175 (const gchar *hostname,
179 static gint sock_get_address_info_async_cancel (SockLookupData *lookup_data);
188 result = WSAStartup(MAKEWORD(2, 2), &wsadata);
189 if (result != NO_ERROR) {
190 g_warning("WSAStartup() failed\n");
197 gint sock_cleanup(void)
205 gint sock_set_io_timeout(guint sec)
211 void refresh_resolvers(void)
214 static time_t resolv_conf_changed = (time_t)NULL;
217 /* This makes the glibc re-read resolv.conf, if it changed
218 * since our startup. Maybe that should be #ifdef'ed, I don't
219 * know if it'd work on BSDs.
220 * Why doesn't the glibc do it by itself?
222 if (g_stat("/etc/resolv.conf", &s) == 0) {
223 if (s.st_mtime > resolv_conf_changed) {
224 resolv_conf_changed = s.st_mtime;
228 we'll have bigger problems. */
233 #define SOCKET_IS_VALID(s) ((s) != INVALID_SOCKET)
235 #define SOCKET_IS_VALID(s) (s != -1)
238 /* Due to the fact that socket under Windows are not represented by
239 standard file descriptors, we sometimes need to check whether a
240 given file descriptor is actually a socket. This is done by
241 testing for an error. Returns true under W32 if FD is a socket. */
242 static int fd_is_w32_socket(gint fd)
246 gint retval = sizeof(optval);
248 return !getsockopt(fd, SOL_SOCKET, SO_TYPE, (char*)&optval, &retval);
254 gint fd_connect_inet(gushort port)
257 struct sockaddr_in addr;
259 sock = socket(AF_INET, SOCK_STREAM, 0);
260 if (!SOCKET_IS_VALID(sock)) {
262 debug_print("fd_connect_inet(): socket() failed: %d\n",
265 perror("fd_connect_inet(): socket");
270 memset(&addr, 0, sizeof(addr));
271 addr.sin_family = AF_INET;
272 addr.sin_port = htons(port);
273 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
275 if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
282 gint fd_open_inet(gushort port)
285 struct sockaddr_in addr;
288 sock = socket(AF_INET, SOCK_STREAM, 0);
289 if (!SOCKET_IS_VALID(sock)) {
291 g_warning("fd_open_inet(): socket() failed: %d\n",
294 perror("fd_open_inet(): socket");
300 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (char *)&val,
302 perror("setsockopt");
307 memset(&addr, 0, sizeof(addr));
308 addr.sin_family = AF_INET;
309 addr.sin_port = htons(port);
310 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
312 if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
318 if (listen(sock, 1) < 0) {
327 gint fd_connect_unix(const gchar *path)
331 struct sockaddr_un addr;
333 sock = socket(PF_UNIX, SOCK_STREAM, 0);
335 perror("sock_connect_unix(): socket");
339 memset(&addr, 0, sizeof(addr));
340 addr.sun_family = AF_UNIX;
341 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
343 if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
354 gint fd_open_unix(const gchar *path)
358 struct sockaddr_un addr;
360 sock = socket(PF_UNIX, SOCK_STREAM, 0);
363 perror("sock_open_unix(): socket");
367 memset(&addr, 0, sizeof(addr));
368 addr.sun_family = AF_UNIX;
369 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
371 if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
372 gchar *buf = g_strdup_printf("can't bind to %s", path);
379 if (listen(sock, 1) < 0) {
380 gchar *buf = g_strdup_printf("can't listen on %s", path);
393 gint fd_accept(gint sock)
395 struct sockaddr_in caddr;
398 caddr_len = sizeof(caddr);
399 return accept(sock, (struct sockaddr *)&caddr, &caddr_len);
403 static gint set_nonblocking_mode(gint fd, gboolean nonblock)
408 flags = fcntl(fd, F_GETFL, 0);
417 flags &= ~O_NONBLOCK;
419 return fcntl(fd, F_SETFL, flags);
425 gint sock_set_nonblocking_mode(SockInfo *sock, gboolean nonblock)
427 cm_return_val_if_fail(sock != NULL, -1);
429 return set_nonblocking_mode(sock->sock, nonblock);
432 static gboolean is_nonblocking_mode(gint fd)
437 flags = fcntl(fd, F_GETFL, 0);
443 return ((flags & O_NONBLOCK) != 0);
449 gboolean sock_is_nonblocking_mode(SockInfo *sock)
451 cm_return_val_if_fail(sock != NULL, FALSE);
453 return is_nonblocking_mode(sock->sock);
458 static gboolean ssl_sock_prepare(GSource *source, gint *timeout)
464 static gboolean ssl_sock_check(GSource *source)
466 SockInfo *sock = ((SockSource *)source)->sock;
467 struct timeval timeout = {0, 0};
469 GIOCondition condition = 0;
471 if (!sock || !sock->sock)
474 condition = sock->condition;
476 if ((condition & G_IO_IN) == G_IO_IN &&
477 gnutls_record_check_pending(sock->ssl) != 0)
481 FD_SET(sock->sock, &fds);
483 select(sock->sock + 1,
484 (condition & G_IO_IN) ? &fds : NULL,
485 (condition & G_IO_OUT) ? &fds : NULL,
488 return FD_ISSET(sock->sock, &fds) != 0;
491 static gboolean ssl_sock_dispatch(GSource *source, GSourceFunc callback,
494 SockInfo *sock = ((SockSource *)source)->sock;
496 if (!sock || !sock->callback || !sock->data)
499 return sock->callback(sock, sock->condition, sock->data);
503 static gboolean sock_watch_cb(GIOChannel *source, GIOCondition condition,
506 SockInfo *sock = (SockInfo *)data;
508 if ((condition & sock->condition) == 0)
511 return sock->callback(sock, sock->condition, sock->data);
514 guint sock_add_watch(SockInfo *sock, GIOCondition condition, SockFunc func,
520 sock->callback = func;
521 sock->condition = condition;
527 GSource *source = g_source_new(&ssl_watch_funcs,
529 ((SockSource *) source)->sock = sock;
530 g_source_set_priority(source, G_PRIORITY_DEFAULT);
531 g_source_set_can_recurse(source, FALSE);
532 sock->g_source = g_source_attach(source, NULL);
533 g_source_unref (source); /* Refcount back down to 1 */
534 return sock->g_source;
538 return g_io_add_watch(sock->sock_ch, condition, sock_watch_cb, sock);
541 static gint fd_check_io(gint fd, GIOCondition cond)
543 struct timeval timeout;
546 if (is_nonblocking_mode(fd))
549 timeout.tv_sec = io_timeout;
555 if (cond == G_IO_IN) {
556 select(fd + 1, &fds, NULL, NULL,
557 io_timeout > 0 ? &timeout : NULL);
559 select(fd + 1, NULL, &fds, NULL,
560 io_timeout > 0 ? &timeout : NULL);
563 if (FD_ISSET(fd, &fds)) {
566 g_warning("Socket IO timeout\n");
567 log_error(LOG_PROTOCOL, _("Socket IO timeout.\n"));
573 static sigjmp_buf jmpenv;
575 static void timeout_handler(gint sig)
577 siglongjmp(jmpenv, 1);
581 static gint sock_connect_with_timeout(gint sock,
582 const struct sockaddr *serv_addr,
588 void (*prev_handler)(gint);
591 prev_handler = signal(SIGALRM, timeout_handler);
592 if (sigsetjmp(jmpenv, 1)) {
594 signal(SIGALRM, prev_handler);
596 log_error(LOG_PROTOCOL, _("Connection timed out.\n"));
602 ret = connect(sock, serv_addr, addrlen);
606 signal(SIGALRM, prev_handler);
612 static gint sock_connect_by_getaddrinfo(const gchar *hostname, gushort port)
614 gint sock = -1, gai_error;
615 struct addrinfo hints, *res, *ai;
620 memset(&hints, 0, sizeof(hints));
621 hints.ai_flags = AI_ADDRCONFIG;
624 hints.ai_family = AF_UNSPEC;
626 hints.ai_family = AF_INET;
629 hints.ai_socktype = SOCK_STREAM;
630 hints.ai_protocol = IPPROTO_TCP;
632 /* convert port from integer to string. */
633 g_snprintf(port_str, sizeof(port_str), "%d", port);
635 if ((gai_error = getaddrinfo(hostname, port_str, &hints, &res)) != 0) {
636 g_printerr("getaddrinfo for %s:%s failed: %s\n",
637 hostname, port_str, gai_strerror(gai_error));
641 for (ai = res; ai != NULL; ai = ai->ai_next) {
643 if (ai->ai_family == AF_INET6)
647 sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
651 if (sock == INVALID_SOCKET)
655 if (sock_connect_with_timeout
656 (sock, ai->ai_addr, ai->ai_addrlen, io_timeout) == 0)
671 SockInfo *sock_connect(const gchar *hostname, gushort port)
679 if ((sock = sock_connect_by_getaddrinfo(hostname, port)) < 0) {
683 return sockinfo_from_fd(hostname, port, sock);
687 static void sock_address_list_free(GList *addr_list)
691 for (cur = addr_list; cur != NULL; cur = cur->next) {
692 SockAddrData *addr_data = (SockAddrData *)cur->data;
693 g_free(addr_data->addr);
697 g_list_free(addr_list);
700 /* asynchronous TCP connection */
702 static gboolean sock_connect_async_cb(GIOChannel *source,
703 GIOCondition condition, gpointer data)
705 SockConnectData *conn_data = (SockConnectData *)data;
711 if (conn_data->io_tag == 0 && conn_data->channel == NULL)
714 fd = g_io_channel_unix_get_fd(source);
716 conn_data->io_tag = 0;
717 conn_data->channel = NULL;
718 g_io_channel_unref(source);
721 if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &val, &len) < 0) {
722 perror("getsockopt");
724 sock_connect_address_list_async(conn_data);
730 log_error(LOG_PROTOCOL, _("%s:%d: connection failed (%s).\n"),
731 conn_data->hostname, conn_data->port,
733 sock_connect_address_list_async(conn_data);
737 sockinfo = g_new0(SockInfo, 1);
740 sockinfo->sock_ch = g_io_channel_unix_new(fd);
742 sockinfo->sock_ch = g_io_channel_win32_new_socket(fd);
744 sockinfo->hostname = g_strdup(conn_data->hostname);
745 sockinfo->port = conn_data->port;
746 sockinfo->state = CONN_ESTABLISHED;
747 sockinfo->canonical_name = g_strdup(conn_data->canonical_name);
749 conn_data->func(sockinfo, conn_data->data);
751 sock_connect_async_cancel(conn_data->id);
756 static gint sock_connect_async_get_address_info_cb(GList *addr_list,
759 SockConnectData *conn_data = (SockConnectData *)data;
761 conn_data->addr_list = addr_list;
762 conn_data->cur_addr = addr_list;
763 if (conn_data->lookup_data) {
764 conn_data->canonical_name = conn_data->lookup_data->canonical_name;
765 conn_data->lookup_data->canonical_name = NULL;
766 conn_data->lookup_data = NULL;
768 return sock_connect_address_list_async(conn_data);
771 gint sock_connect_async(const gchar *hostname, gushort port,
772 SockConnectFunc func, gpointer data)
775 SockConnectData *conn_data;
777 conn_data = g_new0(SockConnectData, 1);
778 conn_data->id = id++;
779 conn_data->hostname = g_strdup(hostname);
780 conn_data->port = port;
781 conn_data->addr_list = NULL;
782 conn_data->cur_addr = NULL;
783 conn_data->io_tag = 0;
784 conn_data->func = func;
785 conn_data->data = data;
787 conn_data->lookup_data = sock_get_address_info_async
788 (hostname, port, sock_connect_async_get_address_info_cb,
791 if (conn_data->lookup_data == NULL) {
792 g_free(conn_data->hostname);
797 sock_connect_data_list = g_list_append(sock_connect_data_list,
800 return conn_data->id;
803 gint sock_connect_async_cancel(gint id)
805 SockConnectData *conn_data = NULL;
808 for (cur = sock_connect_data_list; cur != NULL; cur = cur->next) {
809 if (((SockConnectData *)cur->data)->id == id) {
810 conn_data = (SockConnectData *)cur->data;
816 sock_connect_data_list = g_list_remove(sock_connect_data_list,
819 if (conn_data->lookup_data)
820 sock_get_address_info_async_cancel
821 (conn_data->lookup_data);
823 if (conn_data->io_tag > 0)
824 g_source_remove(conn_data->io_tag);
825 if (conn_data->channel) {
827 g_io_channel_shutdown(conn_data->channel, TRUE, &err);
830 g_io_channel_unref(conn_data->channel);
833 sock_address_list_free(conn_data->addr_list);
834 g_free(conn_data->canonical_name);
835 g_free(conn_data->hostname);
838 g_warning("sock_connect_async_cancel: id %d not found.\n", id);
845 static gint sock_connect_address_list_async(SockConnectData *conn_data)
847 SockAddrData *addr_data;
850 for (; conn_data->cur_addr != NULL;
851 conn_data->cur_addr = conn_data->cur_addr->next) {
852 addr_data = (SockAddrData *)conn_data->cur_addr->data;
854 if ((sock = socket(addr_data->family, addr_data->socktype,
855 addr_data->protocol)) < 0) {
861 set_nonblocking_mode(sock, TRUE);
863 if (connect(sock, addr_data->addr, addr_data->addr_len) < 0) {
864 if (EINPROGRESS == errno) {
875 if (conn_data->cur_addr == NULL) {
876 conn_data->func(NULL, conn_data->data);
877 sock_connect_async_cancel(conn_data->id);
881 conn_data->cur_addr = conn_data->cur_addr->next;
884 conn_data->channel = g_io_channel_unix_new(sock);
886 conn_data->channel = g_io_channel_win32_new_socket(sock);
888 conn_data->io_tag = g_io_add_watch(conn_data->channel, G_IO_IN|G_IO_OUT,
889 sock_connect_async_cb, conn_data);
894 /* asynchronous DNS lookup */
896 static gboolean sock_get_address_info_async_cb(GIOChannel *source,
897 GIOCondition condition,
900 SockLookupData *lookup_data = (SockLookupData *)data;
901 GList *addr_list = NULL;
902 SockAddrData *addr_data;
905 struct sockaddr *addr;
906 gchar *canonical_name = NULL;
910 g_io_channel_set_encoding(source, NULL, &err);
912 g_warning("can unset encoding: %s\n", err->message);
916 g_io_channel_set_buffered(source, FALSE);
917 if (g_io_channel_read_chars(source, &len, sizeof(len),
918 &bytes_read, &err) == G_IO_STATUS_NORMAL) {
920 g_warning("g_io_channel_read_chars: %s\n", err->message);
924 if (bytes_read == sizeof(len) && len > 0) {
927 canonical_name = g_malloc0(len + 1);
928 cur = canonical_name;
930 if (g_io_channel_read_chars(source, cur, todo,
931 &bytes_read, &err) != G_IO_STATUS_NORMAL) {
933 g_warning("canonical name not read %s\n", err->message);
934 g_free(canonical_name);
935 canonical_name = NULL;
944 if (bytes_read == 0) {
945 g_warning("canonical name not read\n");
946 g_free(canonical_name);
947 canonical_name = NULL;
954 if (g_io_channel_read_chars(source, (gchar *)ai_member,
955 sizeof(ai_member), &bytes_read, &err)
956 != G_IO_STATUS_NORMAL) {
958 g_warning("g_io_channel_read_chars: addr len %s\n", err->message);
965 if (bytes_read == 0 || bytes_read != sizeof(ai_member))
968 if (ai_member[0] == AF_UNSPEC) {
969 g_warning("DNS lookup failed\n");
970 log_error(LOG_PROTOCOL, _("%s:%d: unknown host.\n"),
971 lookup_data->hostname, lookup_data->port);
975 addr = g_malloc(ai_member[3]);
976 if (g_io_channel_read_chars(source, (gchar *)addr, ai_member[3],
978 != G_IO_STATUS_NORMAL) {
980 g_warning("g_io_channel_read_chars: addr data read %s\n", err->message);
988 if (bytes_read != ai_member[3]) {
989 g_warning("sock_get_address_info_async_cb: "
990 "incomplete address data\n");
995 addr_data = g_new0(SockAddrData, 1);
996 addr_data->family = ai_member[0];
997 addr_data->socktype = ai_member[1];
998 addr_data->protocol = ai_member[2];
999 addr_data->addr_len = ai_member[3];
1000 addr_data->addr = addr;
1002 addr_list = g_list_append(addr_list, addr_data);
1005 g_io_channel_shutdown(source, TRUE, &err);
1008 g_io_channel_unref(source);
1011 /* FIXME: We would need to cancel the thread. */
1013 kill(lookup_data->child_pid, SIGKILL);
1014 waitpid(lookup_data->child_pid, NULL, 0);
1016 lookup_data->canonical_name = canonical_name;
1018 lookup_data->func(addr_list, lookup_data->data);
1020 g_free(lookup_data->canonical_name);
1021 g_free(lookup_data->hostname);
1022 g_free(lookup_data);
1028 /* For better readability we use a separate function to implement the
1029 child code of sock_get_address_info_async. Note, that under W32
1030 this is actually not a child but a thread and this is the reason
1031 why we pass only a void pointer. */
1032 static void address_info_async_child(void *opaque)
1034 SockLookupData *parm = opaque;
1036 struct addrinfo hints, *res, *ai;
1038 gint ai_member[4] = {AF_UNSPEC, 0, 0, 0};
1041 close(parm->pipe_fds[0]);
1042 parm->pipe_fds[0] = -1;
1045 memset(&hints, 0, sizeof(hints));
1046 hints.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
1048 hints.ai_family = AF_UNSPEC;
1050 hints.ai_family = AF_INET;
1052 hints.ai_socktype = SOCK_STREAM;
1053 hints.ai_protocol = IPPROTO_TCP;
1055 g_snprintf(port_str, sizeof(port_str), "%d", parm->port);
1057 gai_err = getaddrinfo(parm->hostname, port_str, &hints, &res);
1060 g_warning("getaddrinfo for %s:%s failed: %s\n",
1061 parm->hostname, port_str, gai_strerror(gai_err));
1062 log_error(LOG_PROTOCOL, _("%s:%s: host lookup failed (%s).\n"),
1063 parm->hostname, port_str, gai_strerror(gai_err));
1064 fd_write_all(parm->pipe_fds[1], &len,
1066 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1068 close(parm->pipe_fds[1]);
1069 parm->pipe_fds[1] = -1;
1078 if (res->ai_canonname && strlen(res->ai_canonname) < 255) {
1079 gchar len = strlen(res->ai_canonname);
1080 fd_write_all(parm->pipe_fds[1], &len,
1082 fd_write_all(parm->pipe_fds[1], res->ai_canonname,
1086 fd_write_all(parm->pipe_fds[1], &len,
1091 fd_write_all(parm->pipe_fds[1], &len,
1095 for (ai = res; ai != NULL; ai = ai->ai_next) {
1096 ai_member[0] = ai->ai_family;
1097 ai_member[1] = ai->ai_socktype;
1098 ai_member[2] = ai->ai_protocol;
1099 ai_member[3] = ai->ai_addrlen;
1101 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1103 fd_write_all(parm->pipe_fds[1], (gchar *)ai->ai_addr,
1110 close(parm->pipe_fds[1]);
1111 parm->pipe_fds[1] = -1;
1120 static SockLookupData *sock_get_address_info_async(const gchar *hostname,
1125 SockLookupData *lookup_data = NULL;
1127 refresh_resolvers();
1129 lookup_data = g_new0(SockLookupData, 1);
1130 lookup_data->hostname = g_strdup(hostname);
1131 lookup_data->func = func;
1132 lookup_data->data = data;
1133 lookup_data->port = port;
1134 lookup_data->child_pid = (pid_t)(-1);
1135 lookup_data->pipe_fds[0] = -1;
1136 lookup_data->pipe_fds[1] = -1;
1138 if (pipe(lookup_data->pipe_fds) < 0) {
1141 g_free (lookup_data->hostname);
1142 g_free (lookup_data);
1147 if ((lookup_data->child_pid = fork()) < 0) {
1150 g_free (lookup_data->hostname);
1151 g_free (lookup_data);
1155 if (lookup_data->child_pid == 0) {
1156 /* Child process. */
1157 address_info_async_child (lookup_data);
1158 g_assert_not_reached ();
1160 /* Parent process. */
1161 close(lookup_data->pipe_fds[1]);
1162 lookup_data->pipe_fds[1] = -1;
1163 #endif /*!G_OS_WIN32 */
1166 lookup_data->channel = g_io_channel_unix_new(lookup_data->pipe_fds[0]);
1168 lookup_data->channel = g_io_channel_win32_new_fd(lookup_data->pipe_fds[0]);
1170 lookup_data->io_tag = g_io_add_watch(lookup_data->channel, G_IO_IN,
1171 sock_get_address_info_async_cb,
1174 lookup_data->child_pid = _beginthread(
1175 address_info_async_child, 0, lookup_data);
1181 static gint sock_get_address_info_async_cancel(SockLookupData *lookup_data)
1183 if (lookup_data->io_tag > 0)
1184 g_source_remove(lookup_data->io_tag);
1185 if (lookup_data->channel) {
1187 g_io_channel_shutdown(lookup_data->channel, TRUE, &err);
1191 g_io_channel_unref(lookup_data->channel);
1194 if (lookup_data->child_pid > 0) {
1196 /* FIXME: Need a way to cancel the thread. */
1198 kill(lookup_data->child_pid, SIGKILL);
1199 waitpid(lookup_data->child_pid, NULL, 0);
1203 g_free(lookup_data->canonical_name);
1204 g_free(lookup_data->hostname);
1205 g_free(lookup_data);
1211 static SockInfo *sockinfo_from_fd(const gchar *hostname,
1217 sockinfo = g_new0(SockInfo, 1);
1218 sockinfo->sock = sock;
1220 sockinfo->sock_ch = g_io_channel_unix_new(sock);
1222 sockinfo->sock_ch = g_io_channel_win32_new_socket(sock);
1224 sockinfo->hostname = g_strdup(hostname);
1225 sockinfo->port = port;
1226 sockinfo->state = CONN_ESTABLISHED;
1231 static gint fd_read(gint fd, gchar *buf, gint len)
1233 if (fd_check_io(fd, G_IO_IN) < 0)
1236 if (fd_is_w32_socket(fd))
1237 return recv(fd, buf, len, 0);
1238 return read(fd, buf, len);
1242 static gint ssl_read(gnutls_session_t ssl, gchar *buf, gint len)
1246 if (gnutls_record_check_pending(ssl) == 0) {
1247 if (fd_check_io(GPOINTER_TO_INT(gnutls_transport_get_ptr(ssl)), G_IO_IN) < 0)
1252 r = gnutls_record_recv(ssl, buf, len);
1257 case 0: /* closed connection */
1260 case GNUTLS_E_REHANDSHAKE:
1262 r = gnutls_handshake(ssl);
1263 } while (r == GNUTLS_E_AGAIN || r == GNUTLS_E_INTERRUPTED);
1264 break; /* re-receive */
1265 case GNUTLS_E_AGAIN:
1266 case GNUTLS_E_INTERRUPTED:
1271 debug_print("Unexpected SSL read result %d\n", r);
1280 gint sock_read(SockInfo *sock, gchar *buf, gint len)
1284 cm_return_val_if_fail(sock != NULL, -1);
1288 ret = ssl_read(sock->ssl, buf, len);
1291 ret = fd_read(sock->sock, buf, len);
1294 sock->state = CONN_DISCONNECTED;
1298 gint fd_write(gint fd, const gchar *buf, gint len)
1300 if (fd_check_io(fd, G_IO_OUT) < 0)
1303 if (fd_is_w32_socket (fd))
1304 return send(fd, buf, len, 0);
1305 return write(fd, buf, len);
1309 static gint ssl_write(gnutls_session_t ssl, const gchar *buf, gint len)
1313 if (fd_check_io(GPOINTER_TO_INT(gnutls_transport_get_ptr(ssl)), G_IO_OUT) < 0)
1316 ret = gnutls_record_send(ssl, buf, len);
1321 case GNUTLS_E_AGAIN:
1322 case GNUTLS_E_INTERRUPTED:
1332 gint sock_write(SockInfo *sock, const gchar *buf, gint len)
1336 cm_return_val_if_fail(sock != NULL, -1);
1340 ret = ssl_write(sock->ssl, buf, len);
1343 ret = fd_write(sock->sock, buf, len);
1346 sock->state = CONN_DISCONNECTED;
1350 gint fd_write_all(gint fd, const gchar *buf, gint len)
1355 if (fd_check_io(fd, G_IO_OUT) < 0)
1358 signal(SIGPIPE, SIG_IGN);
1360 if (fd_is_w32_socket(fd))
1361 n = send(fd, buf, len, 0);
1363 n = write(fd, buf, len);
1366 log_error(LOG_PROTOCOL, _("write on fd%d: %s\n"), fd, g_strerror(errno));
1378 static gint ssl_write_all(gnutls_session_t ssl, const gchar *buf, gint len)
1383 n = ssl_write(ssl, buf, len);
1395 gint sock_write_all(SockInfo *sock, const gchar *buf, gint len)
1399 cm_return_val_if_fail(sock != NULL, -1);
1403 ret = ssl_write_all(sock->ssl, buf, len);
1406 ret = fd_write_all(sock->sock, buf, len);
1409 sock->state = CONN_DISCONNECTED;
1413 static gint fd_recv(gint fd, gchar *buf, gint len, gint flags)
1415 if (fd_check_io(fd, G_IO_IN) < 0)
1418 return recv(fd, buf, len, flags);
1421 gint fd_gets(gint fd, gchar *buf, gint len)
1423 gchar *newline, *bp = buf;
1430 fd_check_io(fd, G_IO_IN);
1434 MSKB Article ID: Q147714
1435 Windows Sockets 2 Service Provider Interface Limitations
1436 Polling with recv(MSG_PEEK) to determine when a complete message
1438 Reason and Workaround not available.
1440 Single-byte send() and recv().
1441 Reason: Couple one-byte sends with Nagle disabled.
1442 Workaround: Send modest amounts and receive as much as possible.
1445 if (recv(fd, bp, 1, 0) <= 0)
1452 #else /*!G_OS_WIN32*/
1454 if ((n = fd_recv(fd, bp, len, MSG_PEEK)) <= 0)
1456 if ((newline = memchr(bp, '\n', n)) != NULL)
1457 n = newline - bp + 1;
1458 if ((n = fd_read(fd, bp, n)) < 0)
1462 } while (!newline && len);
1463 #endif /*!G_OS_WIN32*/
1469 gint sock_close(SockInfo *sock)
1477 g_io_channel_unref(sock->sock_ch);
1481 ssl_done_socket(sock);
1482 if (sock->g_source != 0 && g_main_context_find_source_by_id(NULL, sock->g_source) != NULL)
1483 g_source_remove(sock->g_source);
1487 shutdown(sock->sock, 1); /* complete transfer before close */
1488 ret = closesocket(sock->sock);
1490 ret = fd_close(sock->sock);
1493 g_free(sock->canonical_name);
1494 g_free(sock->hostname);
1500 gint fd_close(gint fd)