2 * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2012 Hiroyuki Yamamoto and the Claws Mail team
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 3 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "claws-features.h"
25 #if (defined (_XOPEN_SOURCE) && !defined (_BSD_SOURCE))
30 #include <glib/gi18n.h>
33 #include <sys/types.h>
35 # include <winsock2.h>
37 # define EINPROGRESS WSAEINPROGRESS
42 # include <sys/wait.h>
44 # include <sys/socket.h>
45 # include <sys/stat.h>
47 # include <netinet/in.h>
48 # include <arpa/inet.h>
51 #endif /* G_OS_WIN32 */
61 # include <sys/select.h>
72 #error USE_GIO is currently not supported
82 typedef gint (*SockAddrFunc) (GList *addr_list,
85 typedef struct _SockConnectData SockConnectData;
86 typedef struct _SockLookupData SockLookupData;
87 typedef struct _SockAddrData SockAddrData;
88 typedef struct _SockSource SockSource;
90 struct _SockConnectData {
96 SockLookupData *lookup_data;
101 gchar *canonical_name;
104 struct _SockLookupData {
113 gchar *canonical_name;
116 struct _SockAddrData {
121 struct sockaddr *addr;
129 static guint io_timeout = 60;
131 static GList *sock_connect_data_list = NULL;
133 static gint sock_connect_with_timeout (gint sock,
134 const struct sockaddr *serv_addr,
139 static gint sock_connect_by_hostname (gint sock,
140 const gchar *hostname,
143 static gint sock_connect_by_getaddrinfo (const gchar *hostname,
147 static SockInfo *sockinfo_from_fd(const gchar *hostname,
150 static void sock_address_list_free (GList *addr_list);
152 static gboolean sock_connect_async_cb (GIOChannel *source,
153 GIOCondition condition,
155 static gint sock_connect_async_get_address_info_cb
159 static gint sock_connect_address_list_async (SockConnectData *conn_data);
161 static gboolean sock_get_address_info_async_cb (GIOChannel *source,
162 GIOCondition condition,
164 static SockLookupData *sock_get_address_info_async
165 (const gchar *hostname,
169 static gint sock_get_address_info_async_cancel (SockLookupData *lookup_data);
178 result = WSAStartup(MAKEWORD(2, 2), &wsadata);
179 if (result != NO_ERROR) {
180 g_warning("WSAStartup() failed\n");
187 gint sock_cleanup(void)
195 gint sock_set_io_timeout(guint sec)
201 void refresh_resolvers(void)
204 static time_t resolv_conf_changed = (time_t)NULL;
207 /* This makes the glibc re-read resolv.conf, if it changed
208 * since our startup. Maybe that should be #ifdef'ed, I don't
209 * know if it'd work on BSDs.
210 * Why doesn't the glibc do it by itself?
212 if (stat("/etc/resolv.conf", &s) == 0) {
213 if (s.st_mtime > resolv_conf_changed) {
214 resolv_conf_changed = s.st_mtime;
218 we'll have bigger problems. */
223 #define SOCKET_IS_VALID(s) ((s) != INVALID_SOCKET)
225 #define SOCKET_IS_VALID(s) TRUE
228 /* Due to the fact that socket under Windows are not represented by
229 standard file descriptors, we sometimes need to check whether a
230 given file descriptor is actually a socket. This is done by
231 testing for an error. Returns true under W32 if FD is a socket. */
232 static int fd_is_w32_socket(gint fd)
236 gint retval = sizeof(optval);
238 return !getsockopt(fd, SOL_SOCKET, SO_TYPE, (char*)&optval, &retval);
244 gint fd_connect_inet(gushort port)
247 struct sockaddr_in addr;
249 sock = socket(AF_INET, SOCK_STREAM, 0);
250 if (!SOCKET_IS_VALID(sock)) {
252 debug_print("fd_connect_inet(): socket() failed: %d\n",
255 perror("fd_connect_inet(): socket");
260 memset(&addr, 0, sizeof(addr));
261 addr.sin_family = AF_INET;
262 addr.sin_port = htons(port);
263 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
265 if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
272 gint fd_open_inet(gushort port)
275 struct sockaddr_in addr;
278 sock = socket(AF_INET, SOCK_STREAM, 0);
279 if (!SOCKET_IS_VALID(sock)) {
281 g_warning("fd_open_inet(): socket() failed: %d\n",
284 perror("fd_open_inet(): socket");
290 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (char *)&val,
292 perror("setsockopt");
297 memset(&addr, 0, sizeof(addr));
298 addr.sin_family = AF_INET;
299 addr.sin_port = htons(port);
300 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
302 if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
308 if (listen(sock, 1) < 0) {
317 gint fd_connect_unix(const gchar *path)
321 struct sockaddr_un addr;
323 sock = socket(PF_UNIX, SOCK_STREAM, 0);
325 perror("sock_connect_unix(): socket");
329 memset(&addr, 0, sizeof(addr));
330 addr.sun_family = AF_UNIX;
331 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
333 if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
344 gint fd_open_unix(const gchar *path)
348 struct sockaddr_un addr;
350 sock = socket(PF_UNIX, SOCK_STREAM, 0);
353 perror("sock_open_unix(): socket");
357 memset(&addr, 0, sizeof(addr));
358 addr.sun_family = AF_UNIX;
359 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
361 if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
362 gchar *buf = g_strdup_printf("can't bind to %s", path);
369 if (listen(sock, 1) < 0) {
370 gchar *buf = g_strdup_printf("can't listen on %s", path);
383 gint fd_accept(gint sock)
385 struct sockaddr_in caddr;
388 caddr_len = sizeof(caddr);
389 return accept(sock, (struct sockaddr *)&caddr, &caddr_len);
393 static gint set_nonblocking_mode(gint fd, gboolean nonblock)
398 flags = fcntl(fd, F_GETFL, 0);
407 flags &= ~O_NONBLOCK;
409 return fcntl(fd, F_SETFL, flags);
415 gint sock_set_nonblocking_mode(SockInfo *sock, gboolean nonblock)
417 cm_return_val_if_fail(sock != NULL, -1);
419 return set_nonblocking_mode(sock->sock, nonblock);
422 static gboolean is_nonblocking_mode(gint fd)
427 flags = fcntl(fd, F_GETFL, 0);
433 return ((flags & O_NONBLOCK) != 0);
439 gboolean sock_is_nonblocking_mode(SockInfo *sock)
441 cm_return_val_if_fail(sock != NULL, FALSE);
443 return is_nonblocking_mode(sock->sock);
446 static gboolean sock_watch_cb(GIOChannel *source, GIOCondition condition,
449 SockInfo *sock = (SockInfo *)data;
451 if ((condition & sock->condition) == 0)
454 return sock->callback(sock, sock->condition, sock->data);
457 guint sock_add_watch(SockInfo *sock, GIOCondition condition, SockFunc func,
463 sock->callback = func;
464 sock->condition = condition;
467 return g_io_add_watch(sock->sock_ch, condition, sock_watch_cb, sock);
470 static gint fd_check_io(gint fd, GIOCondition cond)
472 struct timeval timeout;
475 if (is_nonblocking_mode(fd))
478 timeout.tv_sec = io_timeout;
484 if (cond == G_IO_IN) {
485 select(fd + 1, &fds, NULL, NULL,
486 io_timeout > 0 ? &timeout : NULL);
488 select(fd + 1, NULL, &fds, NULL,
489 io_timeout > 0 ? &timeout : NULL);
492 if (FD_ISSET(fd, &fds)) {
495 g_warning("Socket IO timeout\n");
496 log_error(LOG_PROTOCOL, _("Socket IO timeout.\n"));
502 static sigjmp_buf jmpenv;
504 static void timeout_handler(gint sig)
506 siglongjmp(jmpenv, 1);
510 static gint sock_connect_with_timeout(gint sock,
511 const struct sockaddr *serv_addr,
517 void (*prev_handler)(gint);
520 prev_handler = signal(SIGALRM, timeout_handler);
521 if (sigsetjmp(jmpenv, 1)) {
523 signal(SIGALRM, prev_handler);
525 log_error(LOG_PROTOCOL, _("Connection timed out.\n"));
531 ret = connect(sock, serv_addr, addrlen);
535 signal(SIGALRM, prev_handler);
541 struct hostent *my_gethostbyname(const gchar *hostname)
545 void (*prev_handler)(gint);
548 prev_handler = signal(SIGALRM, timeout_handler);
549 if (sigsetjmp(jmpenv, 1)) {
551 signal(SIGALRM, prev_handler);
552 g_printerr("%s: host lookup timed out.\n", hostname);
553 log_error(LOG_PROTOCOL, _("%s: host lookup timed out.\n"), hostname);
560 if ((hp = gethostbyname(hostname)) == NULL) {
563 signal(SIGALRM, prev_handler);
565 g_printerr("%s: unknown host.\n", hostname);
566 log_error(LOG_PROTOCOL, _("%s: unknown host.\n"), hostname);
573 signal(SIGALRM, prev_handler);
580 static gint my_inet_aton(const gchar *hostname, struct in_addr *inp)
583 return inet_aton(hostname, inp);
588 inaddr = inet_addr(hostname);
590 memcpy(inp, &inaddr, sizeof(inaddr));
597 #endif /* HAVE_INET_ATON */
600 static gint sock_connect_by_hostname(gint sock, const gchar *hostname,
604 struct sockaddr_in ad;
606 memset(&ad, 0, sizeof(ad));
607 ad.sin_family = AF_INET;
608 ad.sin_port = htons(port);
612 if (!my_inet_aton(hostname, &ad.sin_addr)) {
613 if ((hp = my_gethostbyname(hostname)) == NULL) {
614 g_printerr("%s: unknown host.\n", hostname);
619 if (hp->h_length != 4 && hp->h_length != 8) {
620 g_printerr("illegal address length received for host %s\n", hostname);
625 memcpy(&ad.sin_addr, hp->h_addr, hp->h_length);
628 return sock_connect_with_timeout(sock, (struct sockaddr *)&ad,
629 sizeof(ad), io_timeout);
633 static gint sock_connect_by_getaddrinfo(const gchar *hostname, gushort port)
635 gint sock = -1, gai_error;
636 struct addrinfo hints, *res, *ai;
641 memset(&hints, 0, sizeof(hints));
642 /* hints.ai_flags = AI_CANONNAME; */
643 hints.ai_family = AF_UNSPEC;
644 hints.ai_socktype = SOCK_STREAM;
645 hints.ai_protocol = IPPROTO_TCP;
647 /* convert port from integer to string. */
648 g_snprintf(port_str, sizeof(port_str), "%d", port);
650 if ((gai_error = getaddrinfo(hostname, port_str, &hints, &res)) != 0) {
651 g_printerr("getaddrinfo for %s:%s failed: %s\n",
652 hostname, port_str, gai_strerror(gai_error));
656 for (ai = res; ai != NULL; ai = ai->ai_next) {
657 sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
661 if (sock_connect_with_timeout
662 (sock, ai->ai_addr, ai->ai_addrlen, io_timeout) == 0)
678 SockInfo *sock_connect(const gchar *hostname, gushort port)
687 if ((sock = sock_connect_by_getaddrinfo(hostname, port)) < 0)
691 if ((sock = socket(AF_INET, SOCK_STREAM, 0)) == INVALID_SOCKET) {
692 g_warning("socket() failed: %d\n", WSAGetLastError());
694 if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
696 #endif /* G_OS_WIN32 */
700 if (sock_connect_by_hostname(sock, hostname, port) < 0) {
701 if (errno != 0) perror("connect");
707 return sockinfo_from_fd(hostname, port, sock);
711 static void sock_address_list_free(GList *addr_list)
715 for (cur = addr_list; cur != NULL; cur = cur->next) {
716 SockAddrData *addr_data = (SockAddrData *)cur->data;
717 g_free(addr_data->addr);
721 g_list_free(addr_list);
724 /* asynchronous TCP connection */
726 static gboolean sock_connect_async_cb(GIOChannel *source,
727 GIOCondition condition, gpointer data)
729 SockConnectData *conn_data = (SockConnectData *)data;
735 if (conn_data->io_tag == 0 && conn_data->channel == NULL)
738 fd = g_io_channel_unix_get_fd(source);
740 conn_data->io_tag = 0;
741 conn_data->channel = NULL;
742 g_io_channel_unref(source);
745 if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &val, &len) < 0) {
746 perror("getsockopt");
748 sock_connect_address_list_async(conn_data);
754 log_error(LOG_PROTOCOL, _("%s:%d: connection failed (%s).\n"),
755 conn_data->hostname, conn_data->port,
757 sock_connect_address_list_async(conn_data);
761 sockinfo = g_new0(SockInfo, 1);
764 sockinfo->sock_ch = g_io_channel_unix_new(fd);
766 sockinfo->sock_ch = g_io_channel_win32_new_socket(fd);
768 sockinfo->hostname = g_strdup(conn_data->hostname);
769 sockinfo->port = conn_data->port;
770 sockinfo->state = CONN_ESTABLISHED;
771 sockinfo->canonical_name = g_strdup(conn_data->canonical_name);
773 conn_data->func(sockinfo, conn_data->data);
775 sock_connect_async_cancel(conn_data->id);
780 static gint sock_connect_async_get_address_info_cb(GList *addr_list,
783 SockConnectData *conn_data = (SockConnectData *)data;
785 conn_data->addr_list = addr_list;
786 conn_data->cur_addr = addr_list;
787 if (conn_data->lookup_data) {
788 conn_data->canonical_name = conn_data->lookup_data->canonical_name;
789 conn_data->lookup_data->canonical_name = NULL;
790 conn_data->lookup_data = NULL;
792 return sock_connect_address_list_async(conn_data);
795 gint sock_connect_async(const gchar *hostname, gushort port,
796 SockConnectFunc func, gpointer data)
799 SockConnectData *conn_data;
801 conn_data = g_new0(SockConnectData, 1);
802 conn_data->id = id++;
803 conn_data->hostname = g_strdup(hostname);
804 conn_data->port = port;
805 conn_data->addr_list = NULL;
806 conn_data->cur_addr = NULL;
807 conn_data->io_tag = 0;
808 conn_data->func = func;
809 conn_data->data = data;
811 conn_data->lookup_data = sock_get_address_info_async
812 (hostname, port, sock_connect_async_get_address_info_cb,
815 if (conn_data->lookup_data == NULL) {
816 g_free(conn_data->hostname);
821 sock_connect_data_list = g_list_append(sock_connect_data_list,
824 return conn_data->id;
827 gint sock_connect_async_cancel(gint id)
829 SockConnectData *conn_data = NULL;
832 for (cur = sock_connect_data_list; cur != NULL; cur = cur->next) {
833 if (((SockConnectData *)cur->data)->id == id) {
834 conn_data = (SockConnectData *)cur->data;
840 sock_connect_data_list = g_list_remove(sock_connect_data_list,
843 if (conn_data->lookup_data)
844 sock_get_address_info_async_cancel
845 (conn_data->lookup_data);
847 if (conn_data->io_tag > 0)
848 g_source_remove(conn_data->io_tag);
849 if (conn_data->channel) {
851 g_io_channel_shutdown(conn_data->channel, TRUE, &err);
854 g_io_channel_unref(conn_data->channel);
857 sock_address_list_free(conn_data->addr_list);
858 g_free(conn_data->canonical_name);
859 g_free(conn_data->hostname);
862 g_warning("sock_connect_async_cancel: id %d not found.\n", id);
869 static gint sock_connect_address_list_async(SockConnectData *conn_data)
871 SockAddrData *addr_data;
874 for (; conn_data->cur_addr != NULL;
875 conn_data->cur_addr = conn_data->cur_addr->next) {
876 addr_data = (SockAddrData *)conn_data->cur_addr->data;
878 if ((sock = socket(addr_data->family, addr_data->socktype,
879 addr_data->protocol)) < 0) {
885 set_nonblocking_mode(sock, TRUE);
887 if (connect(sock, addr_data->addr, addr_data->addr_len) < 0) {
888 if (EINPROGRESS == errno) {
899 if (conn_data->cur_addr == NULL) {
900 conn_data->func(NULL, conn_data->data);
901 sock_connect_async_cancel(conn_data->id);
905 conn_data->cur_addr = conn_data->cur_addr->next;
908 conn_data->channel = g_io_channel_unix_new(sock);
910 conn_data->channel = g_io_channel_win32_new_socket(sock);
912 conn_data->io_tag = g_io_add_watch(conn_data->channel, G_IO_IN|G_IO_OUT,
913 sock_connect_async_cb, conn_data);
918 /* asynchronous DNS lookup */
920 static gboolean sock_get_address_info_async_cb(GIOChannel *source,
921 GIOCondition condition,
924 SockLookupData *lookup_data = (SockLookupData *)data;
925 GList *addr_list = NULL;
926 SockAddrData *addr_data;
929 struct sockaddr *addr;
930 gchar *canonical_name = NULL;
934 g_io_channel_set_encoding(source, NULL, &err);
936 g_warning("can unset encoding: %s\n", err->message);
940 g_io_channel_set_buffered(source, FALSE);
941 if (g_io_channel_read_chars(source, &len, sizeof(len),
942 &bytes_read, &err) == G_IO_STATUS_NORMAL) {
944 g_warning("g_io_channel_read_chars: %s\n", err->message);
948 if (bytes_read == sizeof(len) && len > 0) {
951 canonical_name = g_malloc0(len + 1);
952 cur = canonical_name;
954 if (g_io_channel_read_chars(source, cur, todo,
955 &bytes_read, &err) != G_IO_STATUS_NORMAL) {
957 g_warning("canonical name not read %s\n", err->message);
958 g_free(canonical_name);
959 canonical_name = NULL;
968 if (bytes_read == 0) {
969 g_warning("canonical name not read\n");
970 g_free(canonical_name);
971 canonical_name = NULL;
978 if (g_io_channel_read_chars(source, (gchar *)ai_member,
979 sizeof(ai_member), &bytes_read, &err)
980 != G_IO_STATUS_NORMAL) {
982 g_warning("g_io_channel_read_chars: addr len %s\n", err->message);
989 if (bytes_read == 0 || bytes_read != sizeof(ai_member))
992 if (ai_member[0] == AF_UNSPEC) {
993 g_warning("DNS lookup failed\n");
994 log_error(LOG_PROTOCOL, _("%s:%d: unknown host.\n"),
995 lookup_data->hostname, lookup_data->port);
999 addr = g_malloc(ai_member[3]);
1000 if (g_io_channel_read_chars(source, (gchar *)addr, ai_member[3],
1002 != G_IO_STATUS_NORMAL) {
1004 g_warning("g_io_channel_read_chars: addr data read %s\n", err->message);
1012 if (bytes_read != ai_member[3]) {
1013 g_warning("sock_get_address_info_async_cb: "
1014 "incomplete address data\n");
1019 addr_data = g_new0(SockAddrData, 1);
1020 addr_data->family = ai_member[0];
1021 addr_data->socktype = ai_member[1];
1022 addr_data->protocol = ai_member[2];
1023 addr_data->addr_len = ai_member[3];
1024 addr_data->addr = addr;
1026 addr_list = g_list_append(addr_list, addr_data);
1029 g_io_channel_shutdown(source, TRUE, &err);
1032 g_io_channel_unref(source);
1035 /* FIXME: We would need to cancel the thread. */
1037 kill(lookup_data->child_pid, SIGKILL);
1038 waitpid(lookup_data->child_pid, NULL, 0);
1040 lookup_data->canonical_name = canonical_name;
1042 lookup_data->func(addr_list, lookup_data->data);
1044 g_free(lookup_data->canonical_name);
1045 g_free(lookup_data->hostname);
1046 g_free(lookup_data);
1052 /* For better readability we use a separate function to implement the
1053 child code of sock_get_address_info_async. Note, that under W32
1054 this is actually not a child but a thread and this is the reason
1055 why we pass only a void pointer. */
1056 static void address_info_async_child(void *opaque)
1058 SockLookupData *parm = opaque;
1061 struct addrinfo hints, *res, *ai;
1065 gchar **addr_list_p;
1066 struct sockaddr_in ad;
1068 gint ai_member[4] = {AF_UNSPEC, 0, 0, 0};
1071 close(parm->pipe_fds[0]);
1072 parm->pipe_fds[0] = -1;
1076 memset(&hints, 0, sizeof(hints));
1077 hints.ai_flags = AI_CANONNAME;
1078 hints.ai_family = AF_UNSPEC;
1079 hints.ai_socktype = SOCK_STREAM;
1080 hints.ai_protocol = IPPROTO_TCP;
1082 g_snprintf(port_str, sizeof(port_str), "%d", parm->port);
1084 gai_err = getaddrinfo(parm->hostname, port_str, &hints, &res);
1087 g_warning("getaddrinfo for %s:%s failed: %s\n",
1088 parm->hostname, port_str, gai_strerror(gai_err));
1089 log_error(LOG_PROTOCOL, _("%s:%s: host lookup failed (%s).\n"),
1090 parm->hostname, port_str, gai_strerror(gai_err));
1091 fd_write_all(parm->pipe_fds[1], &len,
1093 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1095 close(parm->pipe_fds[1]);
1096 parm->pipe_fds[1] = -1;
1105 if (res->ai_canonname && strlen(res->ai_canonname) < 255) {
1106 gchar len = strlen(res->ai_canonname);
1107 fd_write_all(parm->pipe_fds[1], &len,
1109 fd_write_all(parm->pipe_fds[1], res->ai_canonname,
1113 fd_write_all(parm->pipe_fds[1], &len,
1118 fd_write_all(parm->pipe_fds[1], &len,
1122 for (ai = res; ai != NULL; ai = ai->ai_next) {
1123 ai_member[0] = ai->ai_family;
1124 ai_member[1] = ai->ai_socktype;
1125 ai_member[2] = ai->ai_protocol;
1126 ai_member[3] = ai->ai_addrlen;
1128 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1130 fd_write_all(parm->pipe_fds[1], (gchar *)ai->ai_addr,
1137 hp = my_gethostbyname(parm->hostname);
1138 if (hp == NULL || hp->h_addrtype != AF_INET) {
1140 fd_write_all(parm->pipe_fds[1], &len,
1142 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1144 close(parm->pipe_fds[1]);
1145 parm->pipe_fds[1] = -1;
1153 ai_member[0] = AF_INET;
1154 ai_member[1] = SOCK_STREAM;
1155 ai_member[2] = IPPROTO_TCP;
1156 ai_member[3] = sizeof(ad);
1158 memset(&ad, 0, sizeof(ad));
1159 ad.sin_family = AF_INET;
1160 ad.sin_port = htons(parm->port);
1162 if (hp->h_name && strlen(hp->h_name) < 255) {
1163 gchar len = strlen(hp->h_name);
1164 fd_write_all(parm->pipe_fds[1], &len,
1166 fd_write_all(parm->pipe_fds[1], hp->h_name,
1170 fd_write_all(parm->pipe_fds[1], &len,
1173 for (addr_list_p = hp->h_addr_list; *addr_list_p != NULL;
1175 memcpy(&ad.sin_addr, *addr_list_p, hp->h_length);
1176 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1178 fd_write_all(parm->pipe_fds[1], (gchar *)&ad, sizeof(ad));
1182 close(parm->pipe_fds[1]);
1183 parm->pipe_fds[1] = -1;
1192 static SockLookupData *sock_get_address_info_async(const gchar *hostname,
1197 SockLookupData *lookup_data = NULL;
1199 refresh_resolvers();
1201 lookup_data = g_new0(SockLookupData, 1);
1202 lookup_data->hostname = g_strdup(hostname);
1203 lookup_data->func = func;
1204 lookup_data->data = data;
1205 lookup_data->port = port;
1206 lookup_data->child_pid = (pid_t)(-1);
1207 lookup_data->pipe_fds[0] = -1;
1208 lookup_data->pipe_fds[1] = -1;
1210 if (pipe(lookup_data->pipe_fds) < 0) {
1213 g_free (lookup_data->hostname);
1214 g_free (lookup_data);
1219 if ((lookup_data->child_pid = fork()) < 0) {
1222 g_free (lookup_data->hostname);
1223 g_free (lookup_data);
1227 if (lookup_data->child_pid == 0) {
1228 /* Child process. */
1229 address_info_async_child (lookup_data);
1230 g_assert_not_reached ();
1232 /* Parent process. */
1233 close(lookup_data->pipe_fds[1]);
1234 lookup_data->pipe_fds[1] = -1;
1235 #endif /*!G_OS_WIN32 */
1238 lookup_data->channel = g_io_channel_unix_new(lookup_data->pipe_fds[0]);
1240 lookup_data->channel = g_io_channel_win32_new_fd(lookup_data->pipe_fds[0]);
1242 lookup_data->io_tag = g_io_add_watch(lookup_data->channel, G_IO_IN,
1243 sock_get_address_info_async_cb,
1246 lookup_data->child_pid = _beginthread(
1247 address_info_async_child, 0, lookup_data);
1253 static gint sock_get_address_info_async_cancel(SockLookupData *lookup_data)
1255 if (lookup_data->io_tag > 0)
1256 g_source_remove(lookup_data->io_tag);
1257 if (lookup_data->channel) {
1259 g_io_channel_shutdown(lookup_data->channel, TRUE, &err);
1263 g_io_channel_unref(lookup_data->channel);
1266 if (lookup_data->child_pid > 0) {
1268 /* FIXME: Need a way to cancel the thread. */
1270 kill(lookup_data->child_pid, SIGKILL);
1271 waitpid(lookup_data->child_pid, NULL, 0);
1275 g_free(lookup_data->canonical_name);
1276 g_free(lookup_data->hostname);
1277 g_free(lookup_data);
1283 static SockInfo *sockinfo_from_fd(const gchar *hostname,
1289 sockinfo = g_new0(SockInfo, 1);
1290 sockinfo->sock = sock;
1292 sockinfo->sock_ch = g_io_channel_unix_new(sock);
1294 sockinfo->sock_ch = g_io_channel_win32_new_socket(sock);
1296 sockinfo->hostname = g_strdup(hostname);
1297 sockinfo->port = port;
1298 sockinfo->state = CONN_ESTABLISHED;
1303 static gint fd_read(gint fd, gchar *buf, gint len)
1305 if (fd_check_io(fd, G_IO_IN) < 0)
1308 if (fd_is_w32_socket(fd))
1309 return recv(fd, buf, len, 0);
1310 return read(fd, buf, len);
1314 static gint ssl_read(gnutls_session_t ssl, gchar *buf, gint len)
1318 if (gnutls_record_check_pending(ssl) == 0) {
1319 if (fd_check_io(GPOINTER_TO_INT(gnutls_transport_get_ptr(ssl)), G_IO_IN) < 0)
1324 r = gnutls_record_recv(ssl, buf, len);
1329 case 0: /* closed connection */
1332 case GNUTLS_E_REHANDSHAKE:
1334 r = gnutls_handshake(ssl);
1335 } while (r == GNUTLS_E_AGAIN || r == GNUTLS_E_INTERRUPTED);
1336 break; /* re-receive */
1337 case GNUTLS_E_AGAIN:
1338 case GNUTLS_E_INTERRUPTED:
1343 debug_print("Unexpected SSL read result %d\n", r);
1352 gint sock_read(SockInfo *sock, gchar *buf, gint len)
1356 cm_return_val_if_fail(sock != NULL, -1);
1360 ret = ssl_read(sock->ssl, buf, len);
1363 ret = fd_read(sock->sock, buf, len);
1366 sock->state = CONN_DISCONNECTED;
1370 gint fd_write(gint fd, const gchar *buf, gint len)
1372 if (fd_check_io(fd, G_IO_OUT) < 0)
1375 if (fd_is_w32_socket (fd))
1376 return send(fd, buf, len, 0);
1377 return write(fd, buf, len);
1381 static gint ssl_write(gnutls_session_t ssl, const gchar *buf, gint len)
1385 if (fd_check_io(GPOINTER_TO_INT(gnutls_transport_get_ptr(ssl)), G_IO_OUT) < 0)
1388 ret = gnutls_record_send(ssl, buf, len);
1393 case GNUTLS_E_AGAIN:
1394 case GNUTLS_E_INTERRUPTED:
1404 gint sock_write(SockInfo *sock, const gchar *buf, gint len)
1408 cm_return_val_if_fail(sock != NULL, -1);
1412 ret = ssl_write(sock->ssl, buf, len);
1415 ret = fd_write(sock->sock, buf, len);
1418 sock->state = CONN_DISCONNECTED;
1422 gint fd_write_all(gint fd, const gchar *buf, gint len)
1427 if (fd_check_io(fd, G_IO_OUT) < 0)
1430 signal(SIGPIPE, SIG_IGN);
1432 if (fd_is_w32_socket(fd))
1433 n = send(fd, buf, len, 0);
1435 n = write(fd, buf, len);
1438 log_error(LOG_PROTOCOL, _("write on fd%d: %s\n"), fd, strerror(errno));
1450 static gint ssl_write_all(gnutls_session_t ssl, const gchar *buf, gint len)
1455 n = ssl_write(ssl, buf, len);
1467 gint sock_write_all(SockInfo *sock, const gchar *buf, gint len)
1471 cm_return_val_if_fail(sock != NULL, -1);
1475 ret = ssl_write_all(sock->ssl, buf, len);
1478 ret = fd_write_all(sock->sock, buf, len);
1481 sock->state = CONN_DISCONNECTED;
1485 static gint fd_recv(gint fd, gchar *buf, gint len, gint flags)
1487 if (fd_check_io(fd, G_IO_IN) < 0)
1490 return recv(fd, buf, len, flags);
1493 gint fd_gets(gint fd, gchar *buf, gint len)
1495 gchar *newline, *bp = buf;
1502 fd_check_io(fd, G_IO_IN);
1506 MSKB Article ID: Q147714
1507 Windows Sockets 2 Service Provider Interface Limitations
1508 Polling with recv(MSG_PEEK) to determine when a complete message
1510 Reason and Workaround not available.
1512 Single-byte send() and recv().
1513 Reason: Couple one-byte sends with Nagle disabled.
1514 Workaround: Send modest amounts and receive as much as possible.
1517 if (recv(fd, bp, 1, 0) <= 0)
1524 #else /*!G_OS_WIN32*/
1526 if ((n = fd_recv(fd, bp, len, MSG_PEEK)) <= 0)
1528 if ((newline = memchr(bp, '\n', n)) != NULL)
1529 n = newline - bp + 1;
1530 if ((n = fd_read(fd, bp, n)) < 0)
1534 } while (!newline && len);
1535 #endif /*!G_OS_WIN32*/
1541 gint sock_close(SockInfo *sock)
1549 g_io_channel_unref(sock->sock_ch);
1553 ssl_done_socket(sock);
1556 shutdown(sock->sock, 1); /* complete transfer before close */
1557 ret = closesocket(sock->sock);
1559 ret = fd_close(sock->sock);
1562 g_free(sock->canonical_name);
1563 g_free(sock->hostname);
1569 gint fd_close(gint fd)