fix bug 4773, 'remove obsolescent AC_C_CONST'
[claws.git] / src / common / socket.c
blobe9d50184baad86c38f51e4146d39f4dd5b3eeb94
1 /*
2 * Claws Mail -- a GTK based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2022 the Claws Mail team and Hiroyuki Yamamoto
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 3 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
19 #ifdef HAVE_CONFIG_H
20 # include "config.h"
21 #include "claws-features.h"
22 #endif
24 /* This can probably be handled better, e.g. define it in config.h. */
25 #define _WIN32_WINNT _WIN32_WINNT_WIN6
26 #include <glib.h>
27 #include <glib/gi18n.h>
29 #include <sys/time.h>
30 #include <sys/types.h>
31 #ifdef G_OS_WIN32
32 # include <ws2tcpip.h>
33 # ifndef EINPROGRESS
34 # define EINPROGRESS WSAEINPROGRESS
35 # endif
36 #else
37 # if HAVE_SYS_WAIT_H
38 # include <sys/wait.h>
39 # endif
40 # include <sys/socket.h>
41 # include <sys/stat.h>
42 # include <sys/un.h>
43 # include <netinet/in.h>
44 # include <arpa/inet.h>
45 # include <resolv.h>
46 # ifndef _PATH_RESCONF
47 # define _PATH_RESCONF "/etc/resolv.conf"
48 # endif
49 # include <netdb.h>
50 #endif /* G_OS_WIN32 */
51 #include <unistd.h>
52 #include <stdio.h>
53 #include <string.h>
54 #include <stdarg.h>
55 #include <fcntl.h>
56 #include <errno.h>
57 #include <signal.h>
58 #include <setjmp.h>
59 #if HAVE_SYS_SELECT_H
60 # include <sys/select.h>
61 #endif
63 #include "socket.h"
64 #include "utils.h"
65 #include "log.h"
66 #ifdef USE_GNUTLS
67 # include "ssl.h"
68 #endif
70 #if USE_GIO
71 #error USE_GIO is currently not supported
72 #endif
74 #if G_IO_WIN32
75 #define BUFFSIZE 8191
76 #else
77 #define BUFFSIZE 8192
78 #endif
81 typedef gint (*SockAddrFunc) (GList *addr_list,
82 gpointer data);
84 typedef struct _SockConnectData SockConnectData;
85 typedef struct _SockLookupData SockLookupData;
86 typedef struct _SockAddrData SockAddrData;
87 typedef struct _SockSource SockSource;
89 struct _SockConnectData {
90 gint id;
91 gchar *hostname;
92 gushort port;
93 GList *addr_list;
94 GList *cur_addr;
95 SockLookupData *lookup_data;
96 GIOChannel *channel;
97 guint io_tag;
98 SockConnectFunc func;
99 gpointer data;
100 gchar *canonical_name;
103 struct _SockLookupData {
104 gchar *hostname;
105 pid_t child_pid;
106 GIOChannel *channel;
107 guint io_tag;
108 SockAddrFunc func;
109 gpointer data;
110 gushort port;
111 gint pipe_fds[2];
112 gchar *canonical_name;
115 struct _SockAddrData {
116 gint family;
117 gint socktype;
118 gint protocol;
119 gint addr_len;
120 struct sockaddr *addr;
123 struct _SockSource {
124 GSource parent;
125 SockInfo *sock;
128 static guint io_timeout = 60;
130 static GList *sock_connect_data_list = NULL;
132 #ifdef USE_GNUTLS
133 static gboolean ssl_sock_prepare (GSource *source,
134 gint *timeout);
135 static gboolean ssl_sock_check (GSource *source);
136 static gboolean ssl_sock_dispatch (GSource *source,
137 GSourceFunc callback,
138 gpointer user_data);
139 GSourceFuncs ssl_watch_funcs = {
140 ssl_sock_prepare,
141 ssl_sock_check,
142 ssl_sock_dispatch,
143 NULL,
144 NULL,
145 NULL
147 #endif
149 static gint sock_connect_with_timeout (gint sock,
150 const struct sockaddr *serv_addr,
151 gint addrlen,
152 guint timeout_secs);
154 static gint sock_connect_by_getaddrinfo (const gchar *hostname,
155 gushort port);
157 static SockInfo *sockinfo_from_fd(const gchar *hostname,
158 gushort port,
159 gint sock);
160 static void sock_address_list_free (GList *addr_list);
162 static gboolean sock_connect_async_cb (GIOChannel *source,
163 GIOCondition condition,
164 gpointer data);
165 static gint sock_connect_async_get_address_info_cb
166 (GList *addr_list,
167 gpointer data);
169 static gint sock_connect_address_list_async (SockConnectData *conn_data);
171 static gboolean sock_get_address_info_async_cb (GIOChannel *source,
172 GIOCondition condition,
173 gpointer data);
174 static SockLookupData *sock_get_address_info_async
175 (const gchar *hostname,
176 gushort port,
177 SockAddrFunc func,
178 gpointer data);
179 static gint sock_get_address_info_async_cancel (SockLookupData *lookup_data);
182 gint sock_init(void)
184 #ifdef G_OS_WIN32
185 WSADATA wsadata;
186 gint result;
188 result = WSAStartup(MAKEWORD(2, 2), &wsadata);
189 if (result != NO_ERROR) {
190 g_warning("WSAStartup() failed");
191 return -1;
193 #endif
194 return 0;
197 gint sock_cleanup(void)
199 #ifdef G_OS_WIN32
200 WSACleanup();
201 #endif
202 return 0;
205 gint sock_set_io_timeout(guint sec)
207 io_timeout = sec;
208 return 0;
211 void refresh_resolvers(void)
213 #ifdef G_OS_UNIX
214 static time_t resolv_conf_changed = (time_t)NULL;
215 GStatBuf s;
217 /* This makes the glibc re-read resolv.conf, if it changed
218 * since our startup. Maybe that should be #ifdef'ed, I don't
219 * know if it'd work on BSDs.
220 * Why doesn't the glibc do it by itself?
222 if (g_stat(_PATH_RESCONF, &s) == 0) {
223 if (s.st_mtime > resolv_conf_changed) {
224 resolv_conf_changed = s.st_mtime;
225 res_init();
227 } /* else
228 we'll have bigger problems. */
229 #endif /*G_OS_UNIX*/
232 #ifdef G_OS_WIN32
233 #define SOCKET_IS_VALID(s) ((s) != INVALID_SOCKET)
234 #else
235 #define SOCKET_IS_VALID(s) (s != -1)
236 #endif
238 #ifdef G_OS_WIN32
239 /* Due to the fact that socket under Windows are not represented by
240 standard file descriptors, we sometimes need to check whether a
241 given file descriptor is actually a socket. This is done by
242 testing for an error. Returns true under W32 if FD is a socket. */
243 static int fd_is_w32_socket(gint fd)
245 gint optval;
246 gint retval = sizeof(optval);
248 return !getsockopt(fd, SOL_SOCKET, SO_TYPE, (char*)&optval, &retval);
250 #endif
252 gint fd_connect_inet(gushort port)
254 gint sock;
255 struct sockaddr_in addr;
257 sock = socket(AF_INET, SOCK_STREAM, 0);
258 if (!SOCKET_IS_VALID(sock)) {
259 #ifdef G_OS_WIN32
260 debug_print("fd_connect_inet(): socket() failed: %d\n",
261 WSAGetLastError());
262 #else
263 perror("fd_connect_inet(): socket");
264 #endif
265 return -1;
268 memset(&addr, 0, sizeof(addr));
269 addr.sin_family = AF_INET;
270 addr.sin_port = htons(port);
271 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
273 if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
274 fd_close(sock);
275 return -1;
278 return sock;
280 gint fd_open_inet(gushort port)
282 gint sock;
283 struct sockaddr_in addr;
284 gint val;
286 sock = socket(AF_INET, SOCK_STREAM, 0);
287 if (!SOCKET_IS_VALID(sock)) {
288 #ifdef G_OS_WIN32
289 g_warning("fd_open_inet(): socket() failed: %d",
290 WSAGetLastError());
291 #else
292 perror("fd_open_inet(): socket");
293 #endif
294 return -1;
297 val = 1;
298 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (char *)&val,
299 sizeof(val)) < 0) {
300 perror("setsockopt");
301 fd_close(sock);
302 return -1;
305 memset(&addr, 0, sizeof(addr));
306 addr.sin_family = AF_INET;
307 addr.sin_port = htons(port);
308 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
310 if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
311 perror("bind");
312 fd_close(sock);
313 return -1;
316 if (listen(sock, 1) < 0) {
317 perror("listen");
318 fd_close(sock);
319 return -1;
322 return sock;
325 gint fd_connect_unix(const gchar *path)
327 #ifdef G_OS_UNIX
328 gint sock;
329 struct sockaddr_un addr;
331 sock = socket(PF_UNIX, SOCK_STREAM, 0);
332 if (sock < 0) {
333 perror("sock_connect_unix(): socket");
334 return -1;
337 memset(&addr, 0, sizeof(addr));
338 addr.sun_family = AF_UNIX;
339 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
341 if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
342 close(sock);
343 return -1;
346 return sock;
347 #else
348 return -1;
349 #endif
352 gint fd_open_unix(const gchar *path)
354 #ifdef G_OS_UNIX
355 gint sock;
356 struct sockaddr_un addr;
358 sock = socket(PF_UNIX, SOCK_STREAM, 0);
360 if (sock < 0) {
361 perror("sock_open_unix(): socket");
362 return -1;
365 memset(&addr, 0, sizeof(addr));
366 addr.sun_family = AF_UNIX;
367 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
369 if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
370 gchar *buf = g_strdup_printf("can't bind to %s", path);
371 perror(buf);
372 g_free(buf);
373 close(sock);
374 return -1;
377 if (listen(sock, 1) < 0) {
378 gchar *buf = g_strdup_printf("can't listen on %s", path);
379 perror(buf);
380 g_free(buf);
381 close(sock);
382 return -1;
385 return sock;
386 #else
387 return -1;
388 #endif
391 gint fd_accept(gint sock)
393 struct sockaddr_in caddr;
394 guint caddr_len;
396 caddr_len = sizeof(caddr);
397 return accept(sock, (struct sockaddr *)&caddr, &caddr_len);
401 static gint set_nonblocking_mode(gint fd, gboolean nonblock)
403 #ifdef G_OS_UNIX
404 gint flags;
406 flags = fcntl(fd, F_GETFL, 0);
407 if (flags < 0) {
408 perror("fcntl");
409 return -1;
412 if (nonblock)
413 flags |= O_NONBLOCK;
414 else
415 flags &= ~O_NONBLOCK;
417 return fcntl(fd, F_SETFL, flags);
418 #else
419 return -1;
420 #endif
423 gint sock_set_nonblocking_mode(SockInfo *sock, gboolean nonblock)
425 cm_return_val_if_fail(sock != NULL, -1);
427 return set_nonblocking_mode(sock->sock, nonblock);
430 static gboolean is_nonblocking_mode(gint fd)
432 #ifdef G_OS_UNIX
433 gint flags;
435 flags = fcntl(fd, F_GETFL, 0);
436 if (flags < 0) {
437 perror("fcntl");
438 return FALSE;
441 return ((flags & O_NONBLOCK) != 0);
442 #else
443 return FALSE;
444 #endif
447 gboolean sock_is_nonblocking_mode(SockInfo *sock)
449 cm_return_val_if_fail(sock != NULL, FALSE);
451 return is_nonblocking_mode(sock->sock);
455 #ifdef USE_GNUTLS
456 static gboolean ssl_sock_prepare(GSource *source, gint *timeout)
458 *timeout = 1;
459 return FALSE;
462 static gboolean ssl_sock_check(GSource *source)
464 SockInfo *sock = ((SockSource *)source)->sock;
465 struct timeval timeout = {0, 0};
466 fd_set fds;
467 GIOCondition condition = 0;
469 if (!sock || !sock->sock)
470 return FALSE;
472 condition = sock->condition;
474 if ((condition & G_IO_IN) == G_IO_IN &&
475 gnutls_record_check_pending(sock->ssl) != 0)
476 return TRUE;
478 FD_ZERO(&fds);
479 FD_SET(sock->sock, &fds);
481 select(sock->sock + 1,
482 (condition & G_IO_IN) ? &fds : NULL,
483 (condition & G_IO_OUT) ? &fds : NULL,
484 NULL, &timeout);
486 return FD_ISSET(sock->sock, &fds) != 0;
489 static gboolean ssl_sock_dispatch(GSource *source, GSourceFunc callback,
490 gpointer user_data)
492 SockInfo *sock = ((SockSource *)source)->sock;
494 if (!sock || !sock->callback || !sock->data)
495 return FALSE;
497 return sock->callback(sock, sock->condition, sock->data);
499 #endif
501 static gboolean sock_watch_cb(GIOChannel *source, GIOCondition condition,
502 gpointer data)
504 SockInfo *sock = (SockInfo *)data;
506 if ((condition & sock->condition) == 0)
507 return TRUE;
509 return sock->callback(sock, sock->condition, sock->data);
512 guint sock_add_watch(SockInfo *sock, GIOCondition condition, SockFunc func,
513 gpointer data)
515 if (!sock)
516 return FALSE;
518 sock->callback = func;
519 sock->condition = condition;
520 sock->data = data;
522 #ifdef USE_GNUTLS
523 if (sock->ssl)
525 GSource *source = g_source_new(&ssl_watch_funcs,
526 sizeof(SockSource));
527 ((SockSource *) source)->sock = sock;
528 g_source_set_priority(source, G_PRIORITY_DEFAULT);
529 g_source_set_can_recurse(source, FALSE);
530 sock->g_source = g_source_attach(source, NULL);
531 g_source_unref (source); /* Refcount back down to 1 */
532 return sock->g_source;
534 #endif
536 return g_io_add_watch(sock->sock_ch, condition, sock_watch_cb, sock);
539 static gint fd_check_io(gint fd, GIOCondition cond)
541 struct timeval timeout;
542 fd_set fds;
544 if (is_nonblocking_mode(fd))
545 return 0;
547 timeout.tv_sec = io_timeout;
548 timeout.tv_usec = 0;
550 FD_ZERO(&fds);
551 FD_SET(fd, &fds);
553 if (cond == G_IO_IN) {
554 select(fd + 1, &fds, NULL, NULL,
555 io_timeout > 0 ? &timeout : NULL);
556 } else {
557 select(fd + 1, NULL, &fds, NULL,
558 io_timeout > 0 ? &timeout : NULL);
561 if (FD_ISSET(fd, &fds)) {
562 return 0;
563 } else {
564 g_warning("socket IO timeout");
565 log_error(LOG_PROTOCOL, _("Socket IO timeout.\n"));
566 return -1;
570 #ifdef G_OS_UNIX
571 static sigjmp_buf jmpenv;
573 static void timeout_handler(gint sig)
575 siglongjmp(jmpenv, 1);
577 #endif /*G_OS_UNIX*/
579 static gint sock_connect_with_timeout(gint sock,
580 const struct sockaddr *serv_addr,
581 gint addrlen,
582 guint timeout_secs)
584 gint ret, saved_errno;
585 #ifdef G_OS_UNIX
586 void (*prev_handler)(gint);
588 alarm(0);
589 prev_handler = signal(SIGALRM, timeout_handler);
590 if (sigsetjmp(jmpenv, 1)) {
591 alarm(0);
592 signal(SIGALRM, prev_handler);
593 errno = ETIMEDOUT;
594 log_error(LOG_PROTOCOL, _("Connection timed out.\n"));
595 return -1;
597 alarm(timeout_secs);
598 #endif
600 ret = connect(sock, serv_addr, addrlen);
601 saved_errno = errno;
603 if (ret == -1) {
604 debug_print("connect() failed: %d (%s)\n",
605 saved_errno, g_strerror(saved_errno));
608 #ifdef G_OS_UNIX
609 alarm(0);
610 signal(SIGALRM, prev_handler);
611 #endif
613 return ret;
616 static gint sock_connect_by_getaddrinfo(const gchar *hostname, gushort port)
618 gint sock = -1, gai_error;
619 struct addrinfo hints, *res, *ai;
620 gchar port_str[6];
622 refresh_resolvers();
624 memset(&hints, 0, sizeof(hints));
625 hints.ai_flags = AI_ADDRCONFIG;
627 #ifdef INET6
628 hints.ai_family = AF_UNSPEC;
629 #else
630 hints.ai_family = AF_INET;
631 #endif
633 hints.ai_socktype = SOCK_STREAM;
634 hints.ai_protocol = IPPROTO_TCP;
636 /* convert port from integer to string. */
637 g_snprintf(port_str, sizeof(port_str), "%d", port);
639 if ((gai_error = getaddrinfo(hostname, port_str, &hints, &res)) != 0) {
640 g_printerr("getaddrinfo for %s:%s failed: %s\n",
641 hostname, port_str, gai_strerror(gai_error));
642 return -1;
645 for (ai = res; ai != NULL; ai = ai->ai_next) {
646 #ifndef INET6
647 if (ai->ai_family == AF_INET6)
648 continue;
649 #endif
651 sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
652 if (sock < 0 )
653 continue;
654 #ifdef G_OS_WIN32
655 if (sock == INVALID_SOCKET)
656 continue;
657 #endif
659 if (sock_connect_with_timeout
660 (sock, ai->ai_addr, ai->ai_addrlen, io_timeout) == 0)
661 break;
663 close(sock);
666 if (res != NULL)
667 freeaddrinfo(res);
669 if (ai == NULL)
670 return -1;
672 return sock;
675 SockInfo *sock_connect(const gchar *hostname, gushort port)
677 #ifdef G_OS_WIN32
678 SOCKET sock;
679 #else
680 gint sock;
681 #endif
683 if ((sock = sock_connect_by_getaddrinfo(hostname, port)) < 0) {
684 return NULL;
687 return sockinfo_from_fd(hostname, port, sock);
691 static void sock_address_list_free(GList *addr_list)
693 GList *cur;
695 for (cur = addr_list; cur != NULL; cur = cur->next) {
696 SockAddrData *addr_data = (SockAddrData *)cur->data;
697 g_free(addr_data->addr);
698 g_free(addr_data);
701 g_list_free(addr_list);
704 /* asynchronous TCP connection */
706 static gboolean sock_connect_async_cb(GIOChannel *source,
707 GIOCondition condition, gpointer data)
709 SockConnectData *conn_data = (SockConnectData *)data;
710 gint fd;
711 gint val;
712 guint len;
713 SockInfo *sockinfo;
715 if (conn_data->io_tag == 0 && conn_data->channel == NULL)
716 return FALSE;
718 fd = g_io_channel_unix_get_fd(source);
720 conn_data->io_tag = 0;
721 conn_data->channel = NULL;
722 g_io_channel_unref(source);
724 len = sizeof(val);
725 if (getsockopt(fd, SOL_SOCKET, SO_ERROR, (void*)&val, &len) < 0) {
726 perror("getsockopt");
727 close(fd);
728 sock_connect_address_list_async(conn_data);
729 return FALSE;
732 if (val != 0) {
733 close(fd);
734 log_error(LOG_PROTOCOL, _("%s:%d: connection failed (%s).\n"),
735 conn_data->hostname, conn_data->port,
736 g_strerror(val));
737 sock_connect_address_list_async(conn_data);
738 return FALSE;
741 sockinfo = g_new0(SockInfo, 1);
742 sockinfo->sock = fd;
743 #ifndef G_OS_WIN32
744 sockinfo->sock_ch = g_io_channel_unix_new(fd);
745 #else
746 sockinfo->sock_ch = g_io_channel_win32_new_socket(fd);
747 #endif
748 sockinfo->hostname = g_strdup(conn_data->hostname);
749 sockinfo->port = conn_data->port;
750 sockinfo->state = CONN_ESTABLISHED;
751 sockinfo->canonical_name = g_strdup(conn_data->canonical_name);
753 conn_data->func(sockinfo, conn_data->data);
755 sock_connect_async_cancel(conn_data->id);
757 return FALSE;
760 static gint sock_connect_async_get_address_info_cb(GList *addr_list,
761 gpointer data)
763 SockConnectData *conn_data = (SockConnectData *)data;
765 conn_data->addr_list = addr_list;
766 conn_data->cur_addr = addr_list;
767 if (conn_data->lookup_data) {
768 conn_data->canonical_name = conn_data->lookup_data->canonical_name;
769 conn_data->lookup_data->canonical_name = NULL;
770 conn_data->lookup_data = NULL;
772 return sock_connect_address_list_async(conn_data);
775 gint sock_connect_async(const gchar *hostname, gushort port,
776 SockConnectFunc func, gpointer data)
778 static gint id = 1;
779 SockConnectData *conn_data;
781 conn_data = g_new0(SockConnectData, 1);
782 conn_data->id = id++;
783 conn_data->hostname = g_strdup(hostname);
784 conn_data->port = port;
785 conn_data->addr_list = NULL;
786 conn_data->cur_addr = NULL;
787 conn_data->io_tag = 0;
788 conn_data->func = func;
789 conn_data->data = data;
791 conn_data->lookup_data = sock_get_address_info_async
792 (hostname, port, sock_connect_async_get_address_info_cb,
793 conn_data);
795 if (conn_data->lookup_data == NULL) {
796 g_free(conn_data->hostname);
797 g_free(conn_data);
798 return -1;
801 sock_connect_data_list = g_list_append(sock_connect_data_list,
802 conn_data);
804 return conn_data->id;
807 gint sock_connect_async_cancel(gint id)
809 SockConnectData *conn_data = NULL;
810 GList *cur;
812 for (cur = sock_connect_data_list; cur != NULL; cur = cur->next) {
813 if (((SockConnectData *)cur->data)->id == id) {
814 conn_data = (SockConnectData *)cur->data;
815 break;
819 if (conn_data) {
820 sock_connect_data_list = g_list_remove(sock_connect_data_list,
821 conn_data);
823 if (conn_data->lookup_data)
824 sock_get_address_info_async_cancel
825 (conn_data->lookup_data);
827 if (conn_data->io_tag > 0)
828 g_source_remove(conn_data->io_tag);
829 if (conn_data->channel) {
830 GError *err = NULL;
831 g_io_channel_shutdown(conn_data->channel, TRUE, &err);
832 if (err)
833 g_error_free(err);
834 g_io_channel_unref(conn_data->channel);
837 sock_address_list_free(conn_data->addr_list);
838 g_free(conn_data->canonical_name);
839 g_free(conn_data->hostname);
840 g_free(conn_data);
841 } else {
842 g_warning("sock_connect_async_cancel: id %d not found", id);
843 return -1;
846 return 0;
849 static gint sock_connect_address_list_async(SockConnectData *conn_data)
851 SockAddrData *addr_data;
852 gint sock = -1;
854 for (; conn_data->cur_addr != NULL;
855 conn_data->cur_addr = conn_data->cur_addr->next) {
856 addr_data = (SockAddrData *)conn_data->cur_addr->data;
858 if ((sock = socket(addr_data->family, addr_data->socktype,
859 addr_data->protocol)) < 0) {
860 perror("socket");
862 continue;
865 set_nonblocking_mode(sock, TRUE);
867 if (connect(sock, addr_data->addr, addr_data->addr_len) < 0) {
868 if (EINPROGRESS == errno) {
869 break;
870 } else {
871 perror("connect");
872 close(sock);
874 } else {
875 break;
879 if (conn_data->cur_addr == NULL) {
880 conn_data->func(NULL, conn_data->data);
881 sock_connect_async_cancel(conn_data->id);
882 return -1;
885 conn_data->cur_addr = conn_data->cur_addr->next;
887 #ifndef G_OS_WIN32
888 conn_data->channel = g_io_channel_unix_new(sock);
889 #else
890 conn_data->channel = g_io_channel_win32_new_socket(sock);
891 #endif
892 conn_data->io_tag = g_io_add_watch(conn_data->channel, G_IO_IN|G_IO_OUT,
893 sock_connect_async_cb, conn_data);
895 return 0;
898 /* asynchronous DNS lookup */
900 static gboolean sock_get_address_info_async_cb(GIOChannel *source,
901 GIOCondition condition,
902 gpointer data)
904 SockLookupData *lookup_data = (SockLookupData *)data;
905 GList *addr_list = NULL;
906 SockAddrData *addr_data;
907 gsize bytes_read;
908 gint ai_member[4];
909 struct sockaddr *addr;
910 gchar *canonical_name = NULL;
911 gchar len = 0;
912 GError *err = NULL;
914 g_io_channel_set_encoding(source, NULL, &err);
915 if (err) {
916 g_warning("can't unset encoding: %s", err->message);
917 g_error_free(err);
918 return FALSE;
920 g_io_channel_set_buffered(source, FALSE);
921 if (g_io_channel_read_chars(source, &len, sizeof(len),
922 &bytes_read, &err) == G_IO_STATUS_NORMAL) {
923 if (err != NULL) {
924 g_warning("g_io_channel_read_chars: %s", err->message);
925 g_error_free(err);
926 return FALSE;
928 if (bytes_read == sizeof(len) && len > 0) {
929 gchar *cur = NULL;
930 gint todo = len;
931 canonical_name = g_malloc0(len + 1);
932 cur = canonical_name;
933 while (todo > 0) {
934 if (g_io_channel_read_chars(source, cur, todo,
935 &bytes_read, &err) != G_IO_STATUS_NORMAL) {
936 if (err) {
937 g_warning("canonical name not read %s", err->message);
938 g_free(canonical_name);
939 canonical_name = NULL;
940 g_error_free(err);
941 err = NULL;
942 break;
944 } else {
945 cur += bytes_read;
946 todo -= bytes_read;
948 if (bytes_read == 0) {
949 g_warning("canonical name not read");
950 g_free(canonical_name);
951 canonical_name = NULL;
952 break;
957 for (;;) {
958 if (g_io_channel_read_chars(source, (gchar *)ai_member,
959 sizeof(ai_member), &bytes_read, &err)
960 != G_IO_STATUS_NORMAL) {
961 if (err != NULL) {
962 g_warning("g_io_channel_read_chars: addr len %s", err->message);
963 g_error_free(err);
964 err = NULL;
965 break;
969 if (bytes_read == 0 || bytes_read != sizeof(ai_member))
970 break;
972 if (ai_member[0] == AF_UNSPEC) {
973 g_warning("DNS lookup failed");
974 log_error(LOG_PROTOCOL, _("%s:%d: unknown host.\n"),
975 lookup_data->hostname, lookup_data->port);
976 break;
979 addr = g_malloc(ai_member[3]);
980 if (g_io_channel_read_chars(source, (gchar *)addr, ai_member[3],
981 &bytes_read, &err)
982 != G_IO_STATUS_NORMAL) {
983 if (err != NULL) {
984 g_warning("g_io_channel_read_chars: addr data read %s", err->message);
985 g_error_free(err);
986 err = NULL;
987 g_free(addr);
988 break;
992 if (bytes_read != ai_member[3]) {
993 g_warning("sock_get_address_info_async_cb: "
994 "incomplete address data");
995 g_free(addr);
996 break;
999 addr_data = g_new0(SockAddrData, 1);
1000 addr_data->family = ai_member[0];
1001 addr_data->socktype = ai_member[1];
1002 addr_data->protocol = ai_member[2];
1003 addr_data->addr_len = ai_member[3];
1004 addr_data->addr = addr;
1006 addr_list = g_list_append(addr_list, addr_data);
1009 g_io_channel_shutdown(source, TRUE, &err);
1010 if (err)
1011 g_error_free(err);
1012 g_io_channel_unref(source);
1014 #ifdef G_OS_WIN32
1015 /* FIXME: We would need to cancel the thread. */
1016 #else
1017 kill(lookup_data->child_pid, SIGKILL);
1018 waitpid(lookup_data->child_pid, NULL, 0);
1019 #endif
1020 lookup_data->canonical_name = canonical_name;
1022 lookup_data->func(addr_list, lookup_data->data);
1024 g_free(lookup_data->canonical_name);
1025 g_free(lookup_data->hostname);
1026 g_free(lookup_data);
1028 return FALSE;
1032 /* For better readability we use a separate function to implement the
1033 child code of sock_get_address_info_async. Note, that under W32
1034 this is actually not a child but a thread and this is the reason
1035 why we pass only a void pointer. */
1036 static void address_info_async_child(void *opaque)
1038 SockLookupData *parm = opaque;
1039 gint gai_err;
1040 struct addrinfo hints, *res, *ai;
1041 gchar port_str[6];
1042 gint ai_member[4] = {AF_UNSPEC, 0, 0, 0};
1044 #ifndef G_OS_WIN32
1045 close(parm->pipe_fds[0]);
1046 parm->pipe_fds[0] = -1;
1047 #endif
1049 memset(&hints, 0, sizeof(hints));
1050 hints.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
1051 #ifdef INET6
1052 hints.ai_family = AF_UNSPEC;
1053 #else
1054 hints.ai_family = AF_INET;
1055 #endif
1056 hints.ai_socktype = SOCK_STREAM;
1057 hints.ai_protocol = IPPROTO_TCP;
1059 g_snprintf(port_str, sizeof(port_str), "%d", parm->port);
1061 gai_err = getaddrinfo(parm->hostname, port_str, &hints, &res);
1062 if (gai_err != 0) {
1063 gchar len = 0;
1064 g_warning("getaddrinfo for %s:%s failed: %s",
1065 parm->hostname, port_str, gai_strerror(gai_err));
1066 log_error(LOG_PROTOCOL, _("%s:%s: host lookup failed (%s).\n"),
1067 parm->hostname, port_str, gai_strerror(gai_err));
1068 fd_write_all(parm->pipe_fds[1], &len,
1069 sizeof(len));
1070 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1071 sizeof(ai_member));
1072 close(parm->pipe_fds[1]);
1073 parm->pipe_fds[1] = -1;
1074 #ifdef G_OS_WIN32
1075 _endthread();
1076 #else
1077 _exit(1);
1078 #endif
1081 if (res != NULL) {
1082 if (res->ai_canonname && strlen(res->ai_canonname) < 255) {
1083 gchar len = strlen(res->ai_canonname);
1084 fd_write_all(parm->pipe_fds[1], &len,
1085 sizeof(len));
1086 fd_write_all(parm->pipe_fds[1], res->ai_canonname,
1087 len);
1088 } else {
1089 gchar len = 0;
1090 fd_write_all(parm->pipe_fds[1], &len,
1091 sizeof(len));
1093 } else {
1094 gchar len = 0;
1095 fd_write_all(parm->pipe_fds[1], &len,
1096 sizeof(len));
1099 for (ai = res; ai != NULL; ai = ai->ai_next) {
1100 ai_member[0] = ai->ai_family;
1101 ai_member[1] = ai->ai_socktype;
1102 ai_member[2] = ai->ai_protocol;
1103 ai_member[3] = ai->ai_addrlen;
1105 fd_write_all(parm->pipe_fds[1], (gchar *)ai_member,
1106 sizeof(ai_member));
1107 fd_write_all(parm->pipe_fds[1], (gchar *)ai->ai_addr,
1108 ai->ai_addrlen);
1111 if (res != NULL)
1112 freeaddrinfo(res);
1114 close(parm->pipe_fds[1]);
1115 parm->pipe_fds[1] = -1;
1117 #ifdef G_OS_WIN32
1118 _endthread();
1119 #else
1120 _exit(0);
1121 #endif
1124 static SockLookupData *sock_get_address_info_async(const gchar *hostname,
1125 gushort port,
1126 SockAddrFunc func,
1127 gpointer data)
1129 SockLookupData *lookup_data = NULL;
1131 refresh_resolvers();
1133 lookup_data = g_new0(SockLookupData, 1);
1134 lookup_data->hostname = g_strdup(hostname);
1135 lookup_data->func = func;
1136 lookup_data->data = data;
1137 lookup_data->port = port;
1138 lookup_data->child_pid = (pid_t)(-1);
1139 lookup_data->pipe_fds[0] = -1;
1140 lookup_data->pipe_fds[1] = -1;
1142 if (pipe(lookup_data->pipe_fds) < 0) {
1143 perror("pipe");
1144 func(NULL, data);
1145 g_free (lookup_data->hostname);
1146 g_free (lookup_data);
1147 return NULL;
1150 #ifndef G_OS_WIN32
1151 if ((lookup_data->child_pid = fork()) < 0) {
1152 perror("fork");
1153 func(NULL, data);
1154 g_free (lookup_data->hostname);
1155 g_free (lookup_data);
1156 return NULL;
1159 if (lookup_data->child_pid == 0) {
1160 /* Child process. */
1161 address_info_async_child (lookup_data);
1162 g_assert_not_reached ();
1164 /* Parent process. */
1165 close(lookup_data->pipe_fds[1]);
1166 lookup_data->pipe_fds[1] = -1;
1167 #endif /*!G_OS_WIN32 */
1169 #ifndef G_OS_WIN32
1170 lookup_data->channel = g_io_channel_unix_new(lookup_data->pipe_fds[0]);
1171 #else
1172 lookup_data->channel = g_io_channel_win32_new_fd(lookup_data->pipe_fds[0]);
1173 #endif
1174 lookup_data->io_tag = g_io_add_watch(lookup_data->channel, G_IO_IN,
1175 sock_get_address_info_async_cb,
1176 lookup_data);
1177 #ifdef G_OS_WIN32
1178 lookup_data->child_pid = _beginthread(
1179 address_info_async_child, 0, lookup_data);
1180 #endif
1182 return lookup_data;
1185 static gint sock_get_address_info_async_cancel(SockLookupData *lookup_data)
1187 if (lookup_data->io_tag > 0)
1188 g_source_remove(lookup_data->io_tag);
1189 if (lookup_data->channel) {
1190 GError *err = NULL;
1191 g_io_channel_shutdown(lookup_data->channel, TRUE, &err);
1192 if (err)
1193 g_error_free(err);
1195 g_io_channel_unref(lookup_data->channel);
1198 if (lookup_data->child_pid > 0) {
1199 #ifdef G_OS_WIN32
1200 /* FIXME: Need a way to cancel the thread. */
1201 #else
1202 kill(lookup_data->child_pid, SIGKILL);
1203 waitpid(lookup_data->child_pid, NULL, 0);
1204 #endif
1207 g_free(lookup_data->canonical_name);
1208 g_free(lookup_data->hostname);
1209 g_free(lookup_data);
1211 return 0;
1215 static SockInfo *sockinfo_from_fd(const gchar *hostname,
1216 gushort port,
1217 gint sock)
1219 SockInfo *sockinfo;
1221 sockinfo = g_new0(SockInfo, 1);
1222 sockinfo->sock = sock;
1223 #ifndef G_OS_WIN32
1224 sockinfo->sock_ch = g_io_channel_unix_new(sock);
1225 #else
1226 sockinfo->sock_ch = g_io_channel_win32_new_socket(sock);
1227 #endif
1228 sockinfo->hostname = g_strdup(hostname);
1229 sockinfo->port = port;
1230 sockinfo->state = CONN_ESTABLISHED;
1232 return sockinfo;
1235 static gint fd_read(gint fd, gchar *buf, gint len)
1237 if (fd_check_io(fd, G_IO_IN) < 0)
1238 return -1;
1240 #ifdef G_OS_WIN32
1241 if (fd_is_w32_socket(fd))
1242 return recv(fd, buf, len, 0);
1243 #endif
1245 return read(fd, buf, len);
1248 #if USE_GNUTLS
1249 static gint ssl_read(gnutls_session_t ssl, gchar *buf, gint len)
1251 gint r;
1253 if (gnutls_record_check_pending(ssl) == 0) {
1254 if (fd_check_io(GPOINTER_TO_INT(gnutls_transport_get_ptr(ssl)), G_IO_IN) < 0)
1255 return -1;
1258 while (1) {
1259 errno = 0;
1260 r = gnutls_record_recv(ssl, buf, len);
1261 if (r > 0)
1262 return r;
1264 switch (r) {
1265 case 0: /* closed connection */
1266 return -1;
1268 case GNUTLS_E_REHANDSHAKE:
1269 do {
1270 r = gnutls_handshake(ssl);
1271 } while (r == GNUTLS_E_AGAIN || r == GNUTLS_E_INTERRUPTED);
1272 break; /* re-receive */
1273 case GNUTLS_E_AGAIN:
1274 case GNUTLS_E_INTERRUPTED:
1275 errno = EAGAIN;
1276 return -1;
1277 case GNUTLS_E_PREMATURE_TERMINATION:
1278 if (errno == 0)
1279 return 0;
1280 /* fall through */
1281 default:
1282 debug_print("Unexpected TLS read result %d\n", r);
1283 errno = EIO;
1284 return -1;
1289 #endif
1291 gint sock_read(SockInfo *sock, gchar *buf, gint len)
1293 gint ret;
1295 cm_return_val_if_fail(sock != NULL, -1);
1297 #ifdef USE_GNUTLS
1298 if (sock->ssl)
1299 ret = ssl_read(sock->ssl, buf, len);
1300 else
1301 #endif
1302 ret = fd_read(sock->sock, buf, len);
1304 if (ret < 0)
1305 sock->state = CONN_DISCONNECTED;
1306 return ret;
1309 gint fd_write(gint fd, const gchar *buf, gint len)
1311 if (fd_check_io(fd, G_IO_OUT) < 0)
1312 return -1;
1314 #ifdef G_OS_WIN32
1315 if (fd_is_w32_socket (fd))
1316 return send(fd, buf, len, 0);
1317 #endif
1319 return write(fd, buf, len);
1322 #if USE_GNUTLS
1323 static gint ssl_write(gnutls_session_t ssl, const gchar *buf, gint len)
1325 gint ret;
1327 if (fd_check_io(GPOINTER_TO_INT(gnutls_transport_get_ptr(ssl)), G_IO_OUT) < 0)
1328 return -1;
1330 ret = gnutls_record_send(ssl, buf, len);
1332 switch (ret) {
1333 case 0:
1334 return -1;
1335 case GNUTLS_E_AGAIN:
1336 case GNUTLS_E_INTERRUPTED:
1337 return 0;
1339 default:
1340 return ret;
1344 #endif
1346 gint sock_write(SockInfo *sock, const gchar *buf, gint len)
1348 gint ret;
1350 cm_return_val_if_fail(sock != NULL, -1);
1352 #ifdef USE_GNUTLS
1353 if (sock->ssl)
1354 ret = ssl_write(sock->ssl, buf, len);
1355 else
1356 #endif
1357 ret = fd_write(sock->sock, buf, len);
1359 if (ret < 0)
1360 sock->state = CONN_DISCONNECTED;
1361 return ret;
1364 gint fd_write_all(gint fd, const gchar *buf, gint len)
1366 gint n, wrlen = 0;
1368 while (len) {
1369 if (fd_check_io(fd, G_IO_OUT) < 0)
1370 return -1;
1371 #ifndef G_OS_WIN32
1372 signal(SIGPIPE, SIG_IGN);
1373 #endif
1375 #ifdef G_OS_WIN32
1376 if (fd_is_w32_socket(fd))
1377 n = send(fd, buf, len, 0);
1378 else
1379 #endif
1380 n = write(fd, buf, len);
1382 if (n <= 0) {
1383 log_error(LOG_PROTOCOL, _("write on fd%d: %s\n"), fd, g_strerror(errno));
1384 return -1;
1386 len -= n;
1387 wrlen += n;
1388 buf += n;
1391 return wrlen;
1394 #ifdef USE_GNUTLS
1395 static gint ssl_write_all(gnutls_session_t ssl, const gchar *buf, gint len)
1397 gint n, wrlen = 0;
1399 while (len) {
1400 n = ssl_write(ssl, buf, len);
1401 if (n <= 0)
1402 return -1;
1403 len -= n;
1404 wrlen += n;
1405 buf += n;
1408 return wrlen;
1410 #endif
1412 gint sock_write_all(SockInfo *sock, const gchar *buf, gint len)
1414 gint ret;
1416 cm_return_val_if_fail(sock != NULL, -1);
1418 #ifdef USE_GNUTLS
1419 if (sock->ssl)
1420 ret = ssl_write_all(sock->ssl, buf, len);
1421 else
1422 #endif
1423 ret = fd_write_all(sock->sock, buf, len);
1425 if (ret < 0)
1426 sock->state = CONN_DISCONNECTED;
1427 return ret;
1430 #ifndef G_OS_WIN32
1431 static gint fd_recv(gint fd, gchar *buf, gint len, gint flags)
1433 if (fd_check_io(fd, G_IO_IN) < 0)
1434 return -1;
1436 return recv(fd, buf, len, flags);
1438 #endif
1440 gint fd_gets(gint fd, gchar *buf, gint len)
1442 gchar *bp = buf;
1444 if (--len < 1)
1445 return -1;
1447 #ifdef G_OS_WIN32
1448 fd_check_io(fd, G_IO_IN);
1449 do {
1451 XXX:tm try nonblock
1452 MSKB Article ID: Q147714
1453 Windows Sockets 2 Service Provider Interface Limitations
1454 Polling with recv(MSG_PEEK) to determine when a complete message
1455 has arrived.
1456 Reason and Workaround not available.
1458 Single-byte send() and recv().
1459 Reason: Couple one-byte sends with Nagle disabled.
1460 Workaround: Send modest amounts and receive as much as possible.
1461 (still unused)
1463 if (recv(fd, bp, 1, 0) <= 0)
1464 return -1;
1465 if (*bp == '\n')
1466 break;
1467 bp++;
1468 len--;
1469 } while (0 < len);
1470 #else /*!G_OS_WIN32*/
1471 gchar *newline;
1472 gint n;
1473 do {
1474 if ((n = fd_recv(fd, bp, len, MSG_PEEK)) <= 0)
1475 return -1;
1476 if ((newline = memchr(bp, '\n', n)) != NULL)
1477 n = newline - bp + 1;
1478 if ((n = fd_read(fd, bp, n)) < 0)
1479 return -1;
1480 bp += n;
1481 len -= n;
1482 } while (!newline && len);
1483 #endif /*!G_OS_WIN32*/
1485 *bp = '\0';
1486 return bp - buf;
1489 gint sock_close(SockInfo *sock, gboolean close_fd)
1491 gint ret = 0;
1493 if (!sock)
1494 return 0;
1496 if (sock->sock_ch)
1497 g_io_channel_unref(sock->sock_ch);
1499 #ifdef USE_GNUTLS
1500 if (sock->ssl)
1501 ssl_done_socket(sock);
1502 if (sock->g_source != 0 && g_main_context_find_source_by_id(NULL, sock->g_source) != NULL)
1503 g_source_remove(sock->g_source);
1504 sock->g_source = 0;
1505 #endif
1506 if (close_fd) {
1507 #ifdef G_OS_WIN32
1508 shutdown(sock->sock, 1); /* complete transfer before close */
1509 ret = closesocket(sock->sock);
1510 #else
1511 ret = fd_close(sock->sock);
1512 #endif
1515 g_free(sock->canonical_name);
1516 g_free(sock->hostname);
1517 g_free(sock);
1519 return ret;
1522 gint fd_close(gint fd)
1524 return close(fd);