initial message templates support
[claws.git] / src / socket.c
blob0468b2ce085f32e1110a1ea8764e068855a24034
1 /*
2 * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2001 Hiroyuki Yamamoto
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
20 #ifdef HAVE_CONFIG_H
21 # include "config.h"
22 #endif
24 #include <glib.h>
25 #include <sys/time.h>
26 #include <sys/types.h>
27 #include <sys/socket.h>
28 #include <sys/un.h>
29 #include <netinet/in.h>
30 #include <arpa/inet.h>
31 #include <netdb.h>
32 #include <unistd.h>
33 #include <stdio.h>
34 #include <string.h>
35 #include <stdarg.h>
36 #include <fcntl.h>
37 #include <errno.h>
39 #if USE_THREADS
40 # include <pthread.h>
41 #endif
43 #include "socket.h"
45 #if USE_GIO
46 #error USE_GIO is currently not supported
47 #endif
49 #define BUFFSIZE 8192
51 #ifndef INET6
52 static gint sock_connect_by_hostname (gint sock,
53 const gchar *hostname,
54 gushort port);
55 #else
56 static gint sock_connect_by_getaddrinfo (const gchar *hostname,
57 gushort port);
58 #endif
61 gint fd_connect_unix(const gchar *path)
63 gint sock;
64 struct sockaddr_un addr;
66 sock = socket(PF_UNIX, SOCK_STREAM, 0);
67 if (sock < 0) {
68 perror("sock_connect_unix(): socket");
69 return -1;
72 memset(&addr, 0, sizeof(addr));
73 addr.sun_family = AF_UNIX;
74 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
76 if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
77 close(sock);
78 return -1;
81 return sock;
84 gint fd_open_unix(const gchar *path)
86 gint sock;
87 struct sockaddr_un addr;
89 sock = socket(PF_UNIX, SOCK_STREAM, 0);
91 if (sock < 0) {
92 perror("sock_open_unix(): socket");
93 return -1;
96 memset(&addr, 0, sizeof(addr));
97 addr.sun_family = AF_UNIX;
98 strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
100 if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
101 perror("bind");
102 close(sock);
103 return -1;
106 if (listen(sock, 1) < 0) {
107 perror("listen");
108 close(sock);
109 return -1;
112 return sock;
115 gint fd_accept(gint sock)
117 struct sockaddr_in caddr;
118 gint caddr_len;
120 caddr_len = sizeof(caddr);
121 return accept(sock, (struct sockaddr *)&caddr, &caddr_len);
125 static gint set_nonblocking_mode(gint fd, gboolean nonblock)
127 gint flags;
129 flags = fcntl(fd, F_GETFL, 0);
130 if (flags < 0) {
131 perror("fcntl");
132 return -1;
135 if (nonblock)
136 flags |= O_NONBLOCK;
137 else
138 flags &= ~O_NONBLOCK;
140 return fcntl(fd, F_SETFL, flags);
143 gint sock_set_nonblocking_mode(SockInfo *sock, gboolean nonblock)
145 g_return_val_if_fail(sock != NULL, -1);
147 return set_nonblocking_mode(sock->sock, nonblock);
151 static gboolean is_nonblocking_mode(gint fd)
153 gint flags;
155 flags = fcntl(fd, F_GETFL, 0);
156 if (flags < 0) {
157 perror("fcntl");
158 return FALSE;
161 return ((flags & O_NONBLOCK) != 0);
164 gboolean sock_is_nonblocking_mode(SockInfo *sock)
166 g_return_val_if_fail(sock != NULL, FALSE);
168 return is_nonblocking_mode(sock->sock);
172 #ifndef INET6
173 static gint sock_connect_by_hostname(gint sock, const gchar *hostname,
174 gushort port)
176 struct hostent *hp;
177 struct sockaddr_in ad;
178 #ifndef HAVE_INET_ATON
179 #if HAVE_INET_ADDR
180 guint32 inaddr;
181 #endif
182 #endif /* HAVE_INET_ATON */
184 memset(&ad, 0, sizeof(ad));
185 ad.sin_family = AF_INET;
186 ad.sin_port = htons(port);
188 #if HAVE_INET_ATON
189 if (!inet_aton(hostname, &ad.sin_addr)) {
190 #else
191 #if HAVE_INET_ADDR
192 inaddr = inet_addr(hostname);
193 if (inaddr != -1)
194 memcpy(&ad.sin_addr, &inaddr, sizeof(inaddr));
195 else {
196 #else
198 #endif
199 #endif /* HAVE_INET_ATON */
200 if ((hp = gethostbyname(hostname)) == NULL) {
201 fprintf(stderr, "%s: unknown host.\n", hostname);
202 errno = 0;
203 return -1;
206 if (hp->h_length != 4 && hp->h_length != 8) {
207 h_errno = errno = 0;
208 fprintf(stderr, "illegal address length received for host %s\n", hostname);
209 return -1;
212 memcpy(&ad.sin_addr, hp->h_addr, hp->h_length);
215 return connect(sock, (struct sockaddr *)&ad, sizeof(ad));
218 #else /* INET6 */
219 static gint sock_connect_by_getaddrinfo(const gchar *hostname, gushort port)
221 gint sock = -1, gai_error;
222 struct addrinfo hints, *res, *ai;
223 gchar port_str[6];
225 memset(&hints, 0, sizeof(hints));
226 /* hints.ai_flags = AI_CANONNAME; */
227 hints.ai_family = AF_UNSPEC;
228 hints.ai_socktype = SOCK_STREAM;
229 hints.ai_protocol = IPPROTO_TCP;
231 /* convert port from integer to string. */
232 g_snprintf(port_str, sizeof(port_str), "%d", port);
234 if ((gai_error = getaddrinfo(hostname, port_str, &hints, &res)) != 0) {
235 fprintf(stderr, "getaddrinfo for %s:%s failed: %s\n",
236 hostname, port_str, gai_strerror(gai_error));
237 return -1;
240 for (ai = res; ai != NULL; ai = ai->ai_next) {
241 sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
242 if (sock < 0)
243 continue;
245 if (connect(sock, ai->ai_addr, ai->ai_addrlen) == 0)
246 break;
248 close(sock);
251 if (res != NULL)
252 freeaddrinfo(res);
254 if (ai == NULL)
255 return -1;
257 return sock;
259 #endif /* !INET6 */
261 #if 0
262 SockInfo *sock_connect_nb(const gchar *hostname, gushort port)
264 gint sock;
265 gint ret;
266 SockInfo *sockinfo;
268 #ifdef INET6
269 if ((sock = sock_connect_by_getaddrinfo(hostname, port)) < 0)
270 return NULL;
271 if (set_nonblocking_mode(sock, TRUE) < 0) return NULL;
272 ret = sock;
273 #else
274 if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
275 perror("socket");
276 return NULL;
279 if (set_nonblocking_mode(sock, TRUE) < 0) return NULL;
281 ret = sock_connect_by_hostname(sock, hostname, port);
283 if (ret < 0 && errno != EINPROGRESS) {
284 if (errno != 0) perror("connect");
285 close(sock);
286 return NULL;
288 #endif /* INET6 */
290 sockinfo = g_new0(SockInfo, 1);
291 sockinfo->sock = sock;
292 sockinfo->hostname = g_strdup(hostname);
293 sockinfo->port = port;
294 sockinfo->state = CONN_LOOKUPSUCCESS;
296 if (ret < 0 && errno == EINPROGRESS) return sockinfo;
298 sockinfo->state = CONN_ESTABLISHED;
299 return sockinfo;
301 #endif
303 SockInfo *sock_connect(const gchar *hostname, gushort port)
305 gint sock;
306 SockInfo *sockinfo;
308 #ifdef INET6
309 if ((sock = sock_connect_by_getaddrinfo(hostname, port)) < 0)
310 return NULL;
311 #else
312 if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
313 perror("socket");
314 return NULL;
317 if (sock_connect_by_hostname(sock, hostname, port) < 0) {
318 if (errno != 0) perror("connect");
319 close(sock);
320 return NULL;
322 #endif /* INET6 */
324 sockinfo = g_new0(SockInfo, 1);
325 sockinfo->sock = sock;
326 sockinfo->hostname = g_strdup(hostname);
327 sockinfo->port = port;
328 sockinfo->state = CONN_ESTABLISHED;
330 usleep(100000);
332 return sockinfo;
335 #if USE_THREADS
336 static void sock_connect_thread(SockInfo *sockinfo)
338 #ifdef INET6
339 if ((sockinfo->sock = sock_connect_by_getaddrinfo
340 (sockinfo->hostname, sockinfo->port)) < 0)
341 pthread_exit((void *)1);
342 #else
343 if (sock_connect_by_hostname(sockinfo->sock, sockinfo->hostname,
344 sockinfo->port) < 0) {
345 if (errno != 0) perror("connect");
346 sockinfo->state = CONN_FAILED;
347 pthread_exit((void *)1);
349 #endif /* INET6 */
350 sockinfo->state = CONN_ESTABLISHED;
352 pthread_exit(0);
355 SockInfo *sock_connect_with_thread(const gchar *hostname, gushort port)
357 gint sock = 0;
358 SockInfo *sockinfo;
360 #ifndef INET6
361 if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
362 perror("socket");
363 return NULL;
365 #endif /* !INET6 */
367 sockinfo = g_new0(SockInfo, 1);
368 sockinfo->sock = sock;
369 sockinfo->hostname = g_strdup(hostname);
370 sockinfo->port = port;
371 sockinfo->state = CONN_READY;
373 pthread_create(&sockinfo->connect_thr, NULL,
374 (void *)sock_connect_thread,
375 sockinfo);
376 pthread_mutex_init(&sockinfo->mutex, NULL);
377 pthread_detach(sockinfo->connect_thr);
379 return sockinfo;
381 #endif
384 gint sock_printf(SockInfo *sock, const gchar *format, ...)
386 va_list args;
387 gchar buf[BUFFSIZE];
389 va_start(args, format);
390 g_vsnprintf(buf, sizeof(buf), format, args);
391 va_end(args);
393 return sock_write(sock, buf, strlen(buf));
396 gint sock_read(SockInfo *sock, gchar *buf, gint len)
398 g_return_val_if_fail(sock != NULL, -1);
400 #if USE_SSL
401 if(sock->ssl) {
402 return ssl_read(sock->ssl, buf, len);
404 #endif
405 return fd_read(sock->sock, buf, len);
408 gint fd_read(gint fd, gchar *buf, gint len)
410 return read(fd, buf, len);
413 #ifdef USE_SSL
414 gint ssl_read(SSL *ssl, gchar *buf, gint len)
416 return SSL_read(ssl, buf, len);
418 #endif
420 gint sock_write(SockInfo *sock, const gchar *buf, gint len)
422 g_return_val_if_fail(sock != NULL, -1);
424 #if USE_SSL
425 if(sock->ssl) {
426 return ssl_write(sock->ssl, buf, len);
428 #endif
429 return fd_write(sock->sock, buf, len);
432 gint fd_write(gint fd, const gchar *buf, gint len)
434 gint n, wrlen = 0;
436 while (len) {
437 n = write(fd, buf, len);
438 if (n <= 0)
439 return -1;
440 len -= n;
441 wrlen += n;
442 buf += n;
445 return wrlen;
448 #ifdef USE_SSL
449 gint ssl_write(SSL *ssl, const gchar *buf, gint len)
451 gint n, wrlen = 0;
453 while (len) {
454 n = SSL_write(ssl, buf, len);
455 if (n <= 0)
456 return -1;
457 len -= n;
458 wrlen += n;
459 buf += n;
462 return wrlen;
464 #endif
466 gint fd_gets(gint fd, gchar *buf, gint len)
468 gchar *newline, *bp = buf;
469 gint n;
471 if (--len < 1)
472 return -1;
473 do {
474 if ((n = recv(fd, bp, len, MSG_PEEK)) <= 0)
475 return -1;
476 if ((newline = memchr(bp, '\n', n)) != NULL)
477 n = newline - bp + 1;
478 if ((n = read(fd, bp, n)) < 0)
479 return -1;
480 bp += n;
481 len -= n;
482 } while (!newline && len);
484 *bp = '\0';
485 return bp - buf;
488 #if USE_SSL
489 gint ssl_gets(SSL *ssl, gchar *buf, gint len)
491 gchar *buf2 = buf;
492 gboolean newline = FALSE;
493 gint n, count = 0;
495 if (--len < 1)
496 return -1;
497 while(len > 0 && !newline) {
498 *buf2 = '\0';
499 if((n = SSL_read(ssl, buf2, 1)) < 0)
500 return -1;
501 if(*buf2 == '\n')
502 newline = TRUE;
503 buf2 += n;
504 count += n;
507 *buf2 = '\0';
508 return count;
510 #endif
512 gint sock_gets(SockInfo *sock, gchar *buf, gint len)
514 g_return_val_if_fail(sock != NULL, -1);
516 #if USE_SSL
517 if(sock->ssl) {
518 return ssl_gets(sock->ssl, buf, len);
520 #endif
521 return fd_gets(sock->sock, buf, len);
524 gchar *fd_getline(gint fd)
526 gchar buf[BUFFSIZE];
527 gchar *str = NULL;
528 gint len;
529 gulong size = 1;
531 while ((len = fd_gets(fd, buf, sizeof(buf))) > 0) {
532 size += len;
533 if (!str)
534 str = g_strdup(buf);
535 else {
536 str = g_realloc(str, size);
537 strcat(str, buf);
539 if (buf[len - 1] == '\n')
540 break;
543 return str;
546 #if USE_SSL
547 gchar *ssl_getline(SSL *ssl)
549 gchar buf[BUFFSIZE];
550 gchar *str = NULL;
551 gint len;
552 gulong size = 1;
554 while ((len = ssl_gets(ssl, buf, sizeof(buf))) > 0) {
555 size += len;
556 if (!str)
557 str = g_strdup(buf);
558 else {
559 str = g_realloc(str, size);
560 strcat(str, buf);
562 if (buf[len - 1] == '\n')
563 break;
566 return str;
568 #endif
570 gchar *sock_getline(SockInfo *sock)
572 g_return_val_if_fail(sock != NULL, NULL);
574 #if USE_SSL
575 if(sock->ssl) {
576 return ssl_getline(sock->ssl);
578 #endif
579 return fd_getline(sock->sock);
582 gint sock_puts(SockInfo *sock, const gchar *buf)
584 gint ret;
586 if ((ret = sock_write(sock, buf, strlen(buf))) < 0)
587 return ret;
588 return sock_write(sock, "\r\n", 2);
591 /* peek at the next socket character without actually reading it */
592 gint sock_peek(SockInfo *sock)
594 gint n;
595 gchar ch;
597 g_return_val_if_fail(sock != NULL, -1);
599 if ((n = recv(sock->sock, &ch, 1, MSG_PEEK)) < 0)
600 return -1;
601 else
602 return ch;
605 gint sock_close(SockInfo *sock)
607 gint ret;
609 if (!sock)
610 return 0;
612 ret = fd_close(sock->sock);
613 g_free(sock->hostname);
614 g_free(sock);
616 return ret;
619 gint fd_close(gint fd)
621 return close(fd);
624 gint sock_gdk_input_add(SockInfo *sock,
625 GdkInputCondition condition,
626 GdkInputFunction function,
627 gpointer data)
629 g_return_val_if_fail(sock != NULL, -1);
631 /* :WK: We have to change some things here becuse most likey
632 function() does take SockInfo * and not an gint */
633 return gdk_input_add(sock->sock, condition, function, data);