5 This module provides an interface to Berkeley socket IPC.
9 - Only AF_INET, AF_INET6 and AF_UNIX address families are supported in a
10 portable manner, though AF_PACKET, AF_NETLINK and AF_TIPC are supported
12 - No read/write operations (use sendall/recv or makefile instead).
13 - Additional restrictions apply on some non-Unix platforms (compensated
18 - socket.error: exception raised for socket specific errors
19 - socket.gaierror: exception raised for getaddrinfo/getnameinfo errors,
20 a subclass of socket.error
21 - socket.herror: exception raised for gethostby* errors,
22 a subclass of socket.error
23 - socket.gethostbyname(hostname) --> host IP address (string: 'dd.dd.dd.dd')
24 - socket.gethostbyaddr(IP address) --> (hostname, [alias, ...], [IP addr, ...])
25 - socket.gethostname() --> host name (string: 'spam' or 'spam.domain.com')
26 - socket.getprotobyname(protocolname) --> protocol number
27 - socket.getservbyname(servicename[, protocolname]) --> port number
28 - socket.getservbyport(portnumber[, protocolname]) --> service name
29 - socket.socket([family[, type [, proto, fileno]]]) --> new socket object
30 (fileno specifies a pre-existing socket file descriptor)
31 - socket.socketpair([family[, type [, proto]]]) --> (socket, socket)
32 - socket.ntohs(16 bit value) --> new int object
33 - socket.ntohl(32 bit value) --> new int object
34 - socket.htons(16 bit value) --> new int object
35 - socket.htonl(32 bit value) --> new int object
36 - socket.getaddrinfo(host, port [, family, socktype, proto, flags])
37 --> List of (family, socktype, proto, canonname, sockaddr)
38 - socket.getnameinfo(sockaddr, flags) --> (host, port)
39 - socket.AF_INET, socket.SOCK_STREAM, etc.: constants from <socket.h>
40 - socket.has_ipv6: boolean value indicating if IPv6 is supported
41 - socket.inet_aton(IP address) -> 32-bit packed IP representation
42 - socket.inet_ntoa(packed IP) -> IP address string
43 - socket.getdefaulttimeout() -> None | float
44 - socket.setdefaulttimeout(None | float)
45 - an Internet socket address is a pair (hostname, port)
46 where hostname can be anything recognized by gethostbyname()
47 (including the dd.dd.dd.dd notation) and port is in host byte order
48 - where a hostname is returned, the dd.dd.dd.dd notation is used
49 - a UNIX domain socket address is a string specifying the pathname
50 - an AF_PACKET socket address is a tuple containing a string
51 specifying the ethernet interface and an integer specifying
52 the Ethernet protocol number to be received. For example:
53 ("eth0",0x1234). Optional 3rd,4th,5th elements in the tuple
54 specify packet-type and ha-type/addr.
55 - an AF_TIPC socket address is expressed as
56 (addr_type, v1, v2, v3 [, scope]); where addr_type can be one of:
57 TIPC_ADDR_NAMESEQ, TIPC_ADDR_NAME, and TIPC_ADDR_ID;
58 and scope can be one of:
59 TIPC_ZONE_SCOPE, TIPC_CLUSTER_SCOPE, and TIPC_NODE_SCOPE.
60 The meaning of v1, v2 and v3 depends on the value of addr_type:
61 if addr_type is TIPC_ADDR_NAME:
63 v2 is the port identifier
65 if addr_type is TIPC_ADDR_NAMESEQ:
67 v2 is the lower port number
68 v3 is the upper port number
69 if addr_type is TIPC_ADDR_ID:
75 Local naming conventions:
77 - names starting with sock_ are socket object methods
78 - names starting with socket_ are module-level functions
79 - names starting with PySocket are exported through socketmodule.h
85 * inet_aton is not available on OSX 10.3, yet we want to use a binary
86 * that was build on 10.4 or later to work on that release, weak linking
87 * comes to the rescue.
89 # pragma weak inet_aton
93 #include "structmember.h"
96 #define MAX(x, y) ((x) < (y) ? (y) : (x))
98 /* Socket object documentation */
99 PyDoc_STRVAR(sock_doc
,
100 "socket([family[, type[, proto]]]) -> socket object\n\
102 Open a socket of the given type. The family argument specifies the\n\
103 address family; it defaults to AF_INET. The type argument specifies\n\
104 whether this is a stream (SOCK_STREAM, this is the default)\n\
105 or datagram (SOCK_DGRAM) socket. The protocol argument defaults to 0,\n\
106 specifying the default protocol. Keyword arguments are accepted.\n\
108 A socket object represents one endpoint of a network connection.\n\
110 Methods of socket objects (keyword arguments not allowed):\n\
112 _accept() -- accept connection, returning new socket fd and client address\n\
113 bind(addr) -- bind the socket to a local address\n\
114 close() -- close the socket\n\
115 connect(addr) -- connect the socket to a remote address\n\
116 connect_ex(addr) -- connect, return an error code instead of an exception\n\
117 _dup() -- return a new socket fd duplicated from fileno()\n\
118 fileno() -- return underlying file descriptor\n\
119 getpeername() -- return remote address [*]\n\
120 getsockname() -- return local address\n\
121 getsockopt(level, optname[, buflen]) -- get socket options\n\
122 gettimeout() -- return timeout or None\n\
123 listen(n) -- start listening for incoming connections\n\
124 recv(buflen[, flags]) -- receive data\n\
125 recv_into(buffer[, nbytes[, flags]]) -- receive data (into a buffer)\n\
126 recvfrom(buflen[, flags]) -- receive data and sender\'s address\n\
127 recvfrom_into(buffer[, nbytes, [, flags])\n\
128 -- receive data and sender\'s address (into a buffer)\n\
129 sendall(data[, flags]) -- send all data\n\
130 send(data[, flags]) -- send data, may not send all of it\n\
131 sendto(data[, flags], addr) -- send data to a given address\n\
132 setblocking(0 | 1) -- set or clear the blocking I/O flag\n\
133 setsockopt(level, optname, value) -- set socket options\n\
134 settimeout(None | float) -- set or clear the timeout\n\
135 shutdown(how) -- shut down traffic in one or both directions\n\
137 [*] not available on all platforms!");
139 /* XXX This is a terrible mess of platform-dependent preprocessor hacks.
140 I hope some day someone can clean this up please... */
142 /* Hacks for gethostbyname_r(). On some non-Linux platforms, the configure
143 script doesn't get this right, so we hardcode some platform checks below.
144 On the other hand, not all Linux versions agree, so there the settings
145 computed by the configure script are needed! */
148 # undef HAVE_GETHOSTBYNAME_R_3_ARG
149 # undef HAVE_GETHOSTBYNAME_R_5_ARG
150 # undef HAVE_GETHOSTBYNAME_R_6_ARG
154 # undef HAVE_GETHOSTBYNAME_R
157 #ifdef HAVE_GETHOSTBYNAME_R
158 # if defined(_AIX) || defined(__osf__)
159 # define HAVE_GETHOSTBYNAME_R_3_ARG
160 # elif defined(__sun) || defined(__sgi)
161 # define HAVE_GETHOSTBYNAME_R_5_ARG
162 # elif defined(linux)
163 /* Rely on the configure script */
165 # undef HAVE_GETHOSTBYNAME_R
169 #if !defined(HAVE_GETHOSTBYNAME_R) && defined(WITH_THREAD) && \
171 # define USE_GETHOSTBYNAME_LOCK
174 /* To use __FreeBSD_version */
175 #ifdef HAVE_SYS_PARAM_H
176 #include <sys/param.h>
178 /* On systems on which getaddrinfo() is believed to not be thread-safe,
179 (this includes the getaddrinfo emulation) protect access with a lock. */
180 #if defined(WITH_THREAD) && (defined(__APPLE__) || \
181 (defined(__FreeBSD__) && __FreeBSD_version+0 < 503000) || \
182 defined(__OpenBSD__) || defined(__NetBSD__) || \
183 defined(__VMS) || !defined(HAVE_GETADDRINFO))
184 #define USE_GETADDRINFO_LOCK
187 #ifdef USE_GETADDRINFO_LOCK
188 #define ACQUIRE_GETADDRINFO_LOCK PyThread_acquire_lock(netdb_lock, 1);
189 #define RELEASE_GETADDRINFO_LOCK PyThread_release_lock(netdb_lock);
191 #define ACQUIRE_GETADDRINFO_LOCK
192 #define RELEASE_GETADDRINFO_LOCK
195 #if defined(USE_GETHOSTBYNAME_LOCK) || defined(USE_GETADDRINFO_LOCK)
196 # include "pythread.h"
199 #if defined(PYCC_VACPP)
202 # include <sys/ioctl.h>
211 #if defined(PYOS_OS2)
213 # define INCL_DOSERRORS
214 # define INCL_NOPMAPI
218 #if defined(__sgi) && _COMPILER_VERSION>700 && !_SGIAPI
219 /* make sure that the reentrant (gethostbyaddr_r etc)
220 functions are declared correctly if compiling with
221 MIPSPro 7.x in ANSI C mode (default) */
223 /* XXX Using _SGIAPI is the wrong thing,
224 but I don't know what the right thing is. */
225 #undef _SGIAPI /* to avoid warning */
229 #include <sys/socket.h>
230 #include <sys/types.h>
231 #include <netinet/in.h>
233 #define HAVE_GETADDRINFO 1
234 #define HAVE_GETNAMEINFO 1
237 #define HAVE_INET_PTON
241 /* Irix 6.5 fails to define this variable at all. This is needed
242 for both GCC and SGI's compiler. I'd say that the SGI headers
243 are just busted. Same thing for Solaris. */
244 #if (defined(__sgi) || defined(sun)) && !defined(INET_ADDRSTRLEN)
245 #define INET_ADDRSTRLEN 16
248 /* Generic includes */
249 #ifdef HAVE_SYS_TYPES_H
250 #include <sys/types.h>
253 /* Generic socket object definitions and includes */
254 #define PySocket_BUILDING_SOCKET
255 #include "socketmodule.h"
257 /* Addressing includes */
261 /* Non-MS WINDOWS includes */
264 /* Headers needed for inet_ntoa() and inet_addr() */
265 # if defined(PYOS_OS2) && defined(PYCC_VACPP)
267 typedef size_t socklen_t
;
269 # include <arpa/inet.h>
276 /* MS_WINDOWS includes */
286 # define offsetof(type, member) ((size_t)(&((type *)0)->member))
290 # define O_NONBLOCK O_NDELAY
293 /* include Python's addrinfo.h unless it causes trouble */
294 #if defined(__sgi) && _COMPILER_VERSION>700 && defined(_SS_ALIGNSIZE)
295 /* Do not include addinfo.h on some newer IRIX versions.
296 * _SS_ALIGNSIZE is defined in sys/socket.h by 6.5.21,
297 * for example, but not by 6.5.10.
299 #elif defined(_MSC_VER) && _MSC_VER>1201
300 /* Do not include addrinfo.h for MSVC7 or greater. 'addrinfo' and
301 * EAI_* constants are defined in (the already included) ws2tcpip.h.
304 # include "addrinfo.h"
307 #ifndef HAVE_INET_PTON
308 #if !defined(NTDDI_VERSION) || (NTDDI_VERSION < NTDDI_LONGHORN)
309 int inet_pton(int af
, const char *src
, void *dst
);
310 const char *inet_ntop(int af
, const void *src
, char *dst
, socklen_t size
);
315 /* On OS X, getaddrinfo returns no error indication of lookup
316 failure, so we must use the emulation instead of the libinfo
317 implementation. Unfortunately, performing an autoconf test
318 for this bug would require DNS access for the machine performing
319 the configuration, which is not acceptable. Therefore, we
320 determine the bug just by checking for __APPLE__. If this bug
321 gets ever fixed, perhaps checking for sys/version.h would be
322 appropriate, which is 10/0 on the system with the bug. */
323 #ifndef HAVE_GETNAMEINFO
324 /* This bug seems to be fixed in Jaguar. Ths easiest way I could
325 Find to check for Jaguar is that it has getnameinfo(), which
326 older releases don't have */
327 #undef HAVE_GETADDRINFO
330 #ifdef HAVE_INET_ATON
331 #define USE_INET_ATON_WEAKLINK
336 /* I know this is a bad practice, but it is the easiest... */
337 #if !defined(HAVE_GETADDRINFO)
338 /* avoid clashes with the C library definition of the symbol. */
339 #define getaddrinfo fake_getaddrinfo
340 #define gai_strerror fake_gai_strerror
341 #define freeaddrinfo fake_freeaddrinfo
342 #include "getaddrinfo.c"
344 #if !defined(HAVE_GETNAMEINFO)
345 #define getnameinfo fake_getnameinfo
346 #include "getnameinfo.c"
350 /* On Windows a socket is really a handle not an fd */
352 dup_socket(SOCKET handle
)
356 if (!DuplicateHandle(GetCurrentProcess(), (HANDLE
)handle
,
357 GetCurrentProcess(), &newhandle
,
358 0, FALSE
, DUPLICATE_SAME_ACCESS
))
360 WSASetLastError(GetLastError());
361 return INVALID_SOCKET
;
363 return (SOCKET
)newhandle
;
365 #define SOCKETCLOSE closesocket
367 /* On Unix we can use dup to duplicate the file descriptor of a socket*/
368 #define dup_socket(fd) dup(fd)
372 #define EAFNOSUPPORT WSAEAFNOSUPPORT
373 #define snprintf _snprintf
376 #if defined(PYOS_OS2) && !defined(PYCC_GCC)
377 #define SOCKETCLOSE soclose
378 #define NO_DUP /* Sockets are Not Actual File Handles under OS/2 */
382 #define SOCKETCLOSE close
385 #if defined(HAVE_BLUETOOTH_H) || defined(HAVE_BLUETOOTH_BLUETOOTH_H) && !defined(__NetBSD__)
386 #define USE_BLUETOOTH 1
387 #if defined(__FreeBSD__)
388 #define BTPROTO_L2CAP BLUETOOTH_PROTO_L2CAP
389 #define BTPROTO_RFCOMM BLUETOOTH_PROTO_RFCOMM
390 #define BTPROTO_HCI BLUETOOTH_PROTO_HCI
391 #define SOL_HCI SOL_HCI_RAW
392 #define HCI_FILTER SO_HCI_RAW_FILTER
393 #define sockaddr_l2 sockaddr_l2cap
394 #define sockaddr_rc sockaddr_rfcomm
395 #define hci_dev hci_node
396 #define _BT_L2_MEMB(sa, memb) ((sa)->l2cap_##memb)
397 #define _BT_RC_MEMB(sa, memb) ((sa)->rfcomm_##memb)
398 #define _BT_HCI_MEMB(sa, memb) ((sa)->hci_##memb)
399 #elif defined(__NetBSD__)
400 #define sockaddr_l2 sockaddr_bt
401 #define sockaddr_rc sockaddr_bt
402 #define sockaddr_hci sockaddr_bt
403 #define sockaddr_sco sockaddr_bt
404 #define _BT_L2_MEMB(sa, memb) ((sa)->bt_##memb)
405 #define _BT_RC_MEMB(sa, memb) ((sa)->bt_##memb)
406 #define _BT_HCI_MEMB(sa, memb) ((sa)->bt_##memb)
407 #define _BT_SCO_MEMB(sa, memb) ((sa)->bt_##memb)
409 #define _BT_L2_MEMB(sa, memb) ((sa)->l2_##memb)
410 #define _BT_RC_MEMB(sa, memb) ((sa)->rc_##memb)
411 #define _BT_HCI_MEMB(sa, memb) ((sa)->hci_##memb)
412 #define _BT_SCO_MEMB(sa, memb) ((sa)->sco_##memb)
417 /* TCP/IP Services for VMS uses a maximum send/recv buffer length */
418 #define SEGMENT_SIZE (32 * 1024 -1)
421 #define SAS2SA(x) ((struct sockaddr *)(x))
424 * Constants for getnameinfo()
426 #if !defined(NI_MAXHOST)
427 #define NI_MAXHOST 1025
429 #if !defined(NI_MAXSERV)
430 #define NI_MAXSERV 32
433 #ifndef INVALID_SOCKET /* MS defines this */
434 #define INVALID_SOCKET (-1)
437 /* XXX There's a problem here: *static* functions are not supposed to have
438 a Py prefix (or use CapitalizedWords). Later... */
440 /* Global variable holding the exception type for errors detected
441 by this module (but not argument type or memory errors, etc.). */
442 static PyObject
*socket_error
;
443 static PyObject
*socket_herror
;
444 static PyObject
*socket_gaierror
;
445 static PyObject
*socket_timeout
;
447 /* A forward reference to the socket type object.
448 The sock_type variable contains pointers to various functions,
449 some of which call new_sockobject(), which uses sock_type, so
450 there has to be a circular reference. */
451 static PyTypeObject sock_type
;
453 #if defined(HAVE_POLL_H)
455 #elif defined(HAVE_SYS_POLL_H)
456 #include <sys/poll.h>
459 #ifdef Py_SOCKET_FD_CAN_BE_GE_FD_SETSIZE
460 /* Platform can select file descriptors beyond FD_SETSIZE */
461 #define IS_SELECTABLE(s) 1
462 #elif defined(HAVE_POLL)
463 /* Instead of select(), we'll use poll() since poll() works on any fd. */
464 #define IS_SELECTABLE(s) 1
465 /* Can we call select() with this socket without a buffer overrun? */
467 /* POSIX says selecting file descriptors beyond FD_SETSIZE
468 has undefined behaviour. If there's no timeout left, we don't have to
469 call select, so it's a safe, little white lie. */
470 #define IS_SELECTABLE(s) ((s)->sock_fd < FD_SETSIZE || s->sock_timeout <= 0.0)
476 PyErr_SetString(socket_error
, "unable to select on socket");
480 /* Convenience function to raise an error according to errno
481 and return a NULL pointer from a function. */
487 int err_no
= WSAGetLastError();
488 /* PyErr_SetExcFromWindowsErr() invokes FormatMessage() which
489 recognizes the error codes used by both GetLastError() and
492 return PyErr_SetExcFromWindowsErr(socket_error
, err_no
);
495 #if defined(PYOS_OS2) && !defined(PYCC_GCC)
496 if (sock_errno() != NO_ERROR
) {
500 int myerrorcode
= sock_errno();
502 /* Retrieve socket-related error message from MPTN.MSG file */
503 rc
= DosGetMessage(NULL
, 0, outbuf
, sizeof(outbuf
),
504 myerrorcode
- SOCBASEERR
+ 26,
507 if (rc
== NO_ERROR
) {
510 /* OS/2 doesn't guarantee a terminator */
511 outbuf
[msglen
] = '\0';
512 if (strlen(outbuf
) > 0) {
513 /* If non-empty msg, trim CRLF */
514 char *lastc
= &outbuf
[ strlen(outbuf
)-1 ];
515 while (lastc
> outbuf
&&
516 isspace(Py_CHARMASK(*lastc
))) {
517 /* Trim trailing whitespace (CRLF) */
521 v
= Py_BuildValue("(is)", myerrorcode
, outbuf
);
523 PyErr_SetObject(socket_error
, v
);
531 return PyErr_SetFromErrno(socket_error
);
536 set_herror(int h_error
)
540 #ifdef HAVE_HSTRERROR
541 v
= Py_BuildValue("(is)", h_error
, (char *)hstrerror(h_error
));
543 v
= Py_BuildValue("(is)", h_error
, "host not found");
546 PyErr_SetObject(socket_herror
, v
);
555 set_gaierror(int error
)
560 /* EAI_SYSTEM is not available on Windows XP. */
561 if (error
== EAI_SYSTEM
)
565 #ifdef HAVE_GAI_STRERROR
566 v
= Py_BuildValue("(is)", error
, gai_strerror(error
));
568 v
= Py_BuildValue("(is)", error
, "getaddrinfo failed");
571 PyErr_SetObject(socket_gaierror
, v
);
579 /* Function to send in segments */
581 sendsegmented(int sock_fd
, char *buf
, int len
, int flags
)
586 while (remaining
> 0) {
587 unsigned int segment
;
589 segment
= (remaining
>= SEGMENT_SIZE
? SEGMENT_SIZE
: remaining
);
590 n
= send(sock_fd
, buf
, segment
, flags
);
594 remaining
-= segment
;
602 /* Function to perform the setting of socket blocking mode
603 internally. block = (1 | 0). */
605 internal_setblocking(PySocketSockObject
*s
, int block
)
611 Py_BEGIN_ALLOW_THREADS
613 #if defined(PYOS_OS2) && !defined(PYCC_GCC)
615 ioctl(s
->sock_fd
, FIONBIO
, (caddr_t
)&block
, sizeof(block
));
618 ioctl(s
->sock_fd
, FIONBIO
, (unsigned int *)&block
);
619 #else /* !PYOS_OS2 && !__VMS */
620 delay_flag
= fcntl(s
->sock_fd
, F_GETFL
, 0);
622 delay_flag
&= (~O_NONBLOCK
);
624 delay_flag
|= O_NONBLOCK
;
625 fcntl(s
->sock_fd
, F_SETFL
, delay_flag
);
626 #endif /* !PYOS_OS2 */
627 #else /* MS_WINDOWS */
629 ioctlsocket(s
->sock_fd
, FIONBIO
, (u_long
*)&block
);
630 #endif /* MS_WINDOWS */
633 /* Since these don't return anything */
637 /* Do a select()/poll() on the socket, if necessary (sock_timeout > 0).
638 The argument writing indicates the direction.
639 This does not raise an exception; we'll let our caller do that
640 after they've reacquired the interpreter lock.
641 Returns 1 on timeout, -1 on error, 0 otherwise. */
643 internal_select(PySocketSockObject
*s
, int writing
)
647 /* Nothing to do unless we're in timeout mode (not non-blocking) */
648 if (s
->sock_timeout
<= 0.0)
651 /* Guard against closed socket */
655 /* Prefer poll, if available, since you can poll() any fd
656 * which can't be done with select(). */
659 struct pollfd pollfd
;
662 pollfd
.fd
= s
->sock_fd
;
663 pollfd
.events
= writing
? POLLOUT
: POLLIN
;
665 /* s->sock_timeout is in seconds, timeout in ms */
666 timeout
= (int)(s
->sock_timeout
* 1000 + 0.5);
667 n
= poll(&pollfd
, 1, timeout
);
671 /* Construct the arguments to select */
674 tv
.tv_sec
= (int)s
->sock_timeout
;
675 tv
.tv_usec
= (int)((s
->sock_timeout
- tv
.tv_sec
) * 1e6
);
677 FD_SET(s
->sock_fd
, &fds
);
679 /* See if the socket is ready */
681 n
= select(s
->sock_fd
+1, NULL
, &fds
, NULL
, &tv
);
683 n
= select(s
->sock_fd
+1, &fds
, NULL
, NULL
, &tv
);
694 /* Initialize a new socket object. */
696 static double defaulttimeout
= -1.0; /* Default timeout for new sockets */
699 init_sockobject(PySocketSockObject
*s
,
700 SOCKET_T fd
, int family
, int type
, int proto
)
703 s
->sock_family
= family
;
705 s
->sock_proto
= proto
;
706 s
->sock_timeout
= defaulttimeout
;
708 s
->errorhandler
= &set_error
;
710 if (defaulttimeout
>= 0.0)
711 internal_setblocking(s
, 0);
716 /* Create a new socket object.
717 This just creates the object and initializes it.
718 If the creation fails, return NULL and set an exception (implicit
721 static PySocketSockObject
*
722 new_sockobject(SOCKET_T fd
, int family
, int type
, int proto
)
724 PySocketSockObject
*s
;
725 s
= (PySocketSockObject
*)
726 PyType_GenericNew(&sock_type
, NULL
, NULL
);
728 init_sockobject(s
, fd
, family
, type
, proto
);
733 /* Lock to allow python interpreter to continue, but only allow one
734 thread to be in gethostbyname or getaddrinfo */
735 #if defined(USE_GETHOSTBYNAME_LOCK) || defined(USE_GETADDRINFO_LOCK)
736 PyThread_type_lock netdb_lock
;
740 /* Convert a string specifying a host name or one of a few symbolic
741 names to a numeric IP address. This usually calls gethostbyname()
742 to do the work; the names "" and "<broadcast>" are special.
743 Return the length (IPv4 should be 4 bytes), or negative if
744 an error occurred; then an exception is raised. */
747 setipaddr(char *name
, struct sockaddr
*addr_ret
, size_t addr_ret_size
, int af
)
749 struct addrinfo hints
, *res
;
754 memset((void *) addr_ret
, '\0', sizeof(*addr_ret
));
755 if (name
[0] == '\0') {
757 memset(&hints
, 0, sizeof(hints
));
758 hints
.ai_family
= af
;
759 hints
.ai_socktype
= SOCK_DGRAM
; /*dummy*/
760 hints
.ai_flags
= AI_PASSIVE
;
761 Py_BEGIN_ALLOW_THREADS
762 ACQUIRE_GETADDRINFO_LOCK
763 error
= getaddrinfo(NULL
, "0", &hints
, &res
);
765 /* We assume that those thread-unsafe getaddrinfo() versions
766 *are* safe regarding their return value, ie. that a
767 subsequent call to getaddrinfo() does not destroy the
768 outcome of the first call. */
769 RELEASE_GETADDRINFO_LOCK
774 switch (res
->ai_family
) {
785 PyErr_SetString(socket_error
,
786 "unsupported address family");
791 PyErr_SetString(socket_error
,
792 "wildcard resolved to multiple address");
795 if (res
->ai_addrlen
< addr_ret_size
)
796 addr_ret_size
= res
->ai_addrlen
;
797 memcpy(addr_ret
, res
->ai_addr
, addr_ret_size
);
801 if (name
[0] == '<' && strcmp(name
, "<broadcast>") == 0) {
802 struct sockaddr_in
*sin
;
803 if (af
!= AF_INET
&& af
!= AF_UNSPEC
) {
804 PyErr_SetString(socket_error
,
805 "address family mismatched");
808 sin
= (struct sockaddr_in
*)addr_ret
;
809 memset((void *) sin
, '\0', sizeof(*sin
));
810 sin
->sin_family
= AF_INET
;
811 #ifdef HAVE_SOCKADDR_SA_LEN
812 sin
->sin_len
= sizeof(*sin
);
814 sin
->sin_addr
.s_addr
= INADDR_BROADCAST
;
815 return sizeof(sin
->sin_addr
);
817 if (sscanf(name
, "%d.%d.%d.%d%c", &d1
, &d2
, &d3
, &d4
, &ch
) == 4 &&
818 0 <= d1
&& d1
<= 255 && 0 <= d2
&& d2
<= 255 &&
819 0 <= d3
&& d3
<= 255 && 0 <= d4
&& d4
<= 255) {
820 struct sockaddr_in
*sin
;
821 sin
= (struct sockaddr_in
*)addr_ret
;
822 sin
->sin_addr
.s_addr
= htonl(
823 ((long) d1
<< 24) | ((long) d2
<< 16) |
824 ((long) d3
<< 8) | ((long) d4
<< 0));
825 sin
->sin_family
= AF_INET
;
826 #ifdef HAVE_SOCKADDR_SA_LEN
827 sin
->sin_len
= sizeof(*sin
);
831 memset(&hints
, 0, sizeof(hints
));
832 hints
.ai_family
= af
;
833 Py_BEGIN_ALLOW_THREADS
834 ACQUIRE_GETADDRINFO_LOCK
835 error
= getaddrinfo(name
, NULL
, &hints
, &res
);
836 #if defined(__digital__) && defined(__unix__)
837 if (error
== EAI_NONAME
&& af
== AF_UNSPEC
) {
838 /* On Tru64 V5.1, numeric-to-addr conversion fails
839 if no address family is given. Assume IPv4 for now.*/
840 hints
.ai_family
= AF_INET
;
841 error
= getaddrinfo(name
, NULL
, &hints
, &res
);
845 RELEASE_GETADDRINFO_LOCK
/* see comment in setipaddr() */
850 if (res
->ai_addrlen
< addr_ret_size
)
851 addr_ret_size
= res
->ai_addrlen
;
852 memcpy((char *) addr_ret
, res
->ai_addr
, addr_ret_size
);
854 switch (addr_ret
->sa_family
) {
862 PyErr_SetString(socket_error
, "unknown address family");
868 /* Create a string object representing an IP address.
869 This is always a string of the form 'dd.dd.dd.dd' (with variable
873 makeipaddr(struct sockaddr
*addr
, int addrlen
)
875 char buf
[NI_MAXHOST
];
878 error
= getnameinfo(addr
, addrlen
, buf
, sizeof(buf
), NULL
, 0,
884 return PyUnicode_FromString(buf
);
889 /* Convert a string representation of a Bluetooth address into a numeric
890 address. Returns the length (6), or raises an exception and returns -1 if
891 an error occurred. */
894 setbdaddr(char *name
, bdaddr_t
*bdaddr
)
896 unsigned int b0
, b1
, b2
, b3
, b4
, b5
;
900 n
= sscanf(name
, "%X:%X:%X:%X:%X:%X%c",
901 &b5
, &b4
, &b3
, &b2
, &b1
, &b0
, &ch
);
902 if (n
== 6 && (b0
| b1
| b2
| b3
| b4
| b5
) < 256) {
911 PyErr_SetString(socket_error
, "bad bluetooth address");
916 /* Create a string representation of the Bluetooth address. This is always a
917 string of the form 'XX:XX:XX:XX:XX:XX' where XX is a two digit hexadecimal
918 value (zero padded if necessary). */
921 makebdaddr(bdaddr_t
*bdaddr
)
923 char buf
[(6 * 2) + 5 + 1];
925 sprintf(buf
, "%02X:%02X:%02X:%02X:%02X:%02X",
926 bdaddr
->b
[5], bdaddr
->b
[4], bdaddr
->b
[3],
927 bdaddr
->b
[2], bdaddr
->b
[1], bdaddr
->b
[0]);
928 return PyUnicode_FromString(buf
);
933 /* Create an object representing the given socket address,
934 suitable for passing it back to bind(), connect() etc.
935 The family field of the sockaddr structure is inspected
936 to determine what kind of address it really is. */
940 makesockaddr(int sockfd
, struct sockaddr
*addr
, int addrlen
, int proto
)
943 /* No address -- may be recvfrom() from known socket */
948 switch (addr
->sa_family
) {
952 struct sockaddr_in
*a
;
953 PyObject
*addrobj
= makeipaddr(addr
, sizeof(*a
));
954 PyObject
*ret
= NULL
;
956 a
= (struct sockaddr_in
*)addr
;
957 ret
= Py_BuildValue("Oi", addrobj
, ntohs(a
->sin_port
));
966 struct sockaddr_un
*a
= (struct sockaddr_un
*) addr
;
968 if (a
->sun_path
[0] == 0) { /* Linux abstract namespace */
969 addrlen
-= offsetof(struct sockaddr_un
, sun_path
);
970 return PyBytes_FromStringAndSize(a
->sun_path
, addrlen
);
975 /* regular NULL-terminated string */
976 return PyUnicode_FromString(a
->sun_path
);
981 #if defined(AF_NETLINK)
984 struct sockaddr_nl
*a
= (struct sockaddr_nl
*) addr
;
985 return Py_BuildValue("II", a
->nl_pid
, a
->nl_groups
);
987 #endif /* AF_NETLINK */
992 struct sockaddr_in6
*a
;
993 PyObject
*addrobj
= makeipaddr(addr
, sizeof(*a
));
994 PyObject
*ret
= NULL
;
996 a
= (struct sockaddr_in6
*)addr
;
997 ret
= Py_BuildValue("Oiii",
1008 #ifdef USE_BLUETOOTH
1014 struct sockaddr_l2
*a
= (struct sockaddr_l2
*) addr
;
1015 PyObject
*addrobj
= makebdaddr(&_BT_L2_MEMB(a
, bdaddr
));
1016 PyObject
*ret
= NULL
;
1018 ret
= Py_BuildValue("Oi",
1020 _BT_L2_MEMB(a
, psm
));
1026 case BTPROTO_RFCOMM
:
1028 struct sockaddr_rc
*a
= (struct sockaddr_rc
*) addr
;
1029 PyObject
*addrobj
= makebdaddr(&_BT_RC_MEMB(a
, bdaddr
));
1030 PyObject
*ret
= NULL
;
1032 ret
= Py_BuildValue("Oi",
1034 _BT_RC_MEMB(a
, channel
));
1042 struct sockaddr_hci
*a
= (struct sockaddr_hci
*) addr
;
1043 PyObject
*ret
= NULL
;
1044 ret
= Py_BuildValue("i", _BT_HCI_MEMB(a
, dev
));
1048 #if !defined(__FreeBSD__)
1051 struct sockaddr_sco
*a
= (struct sockaddr_sco
*) addr
;
1052 return makebdaddr(&_BT_SCO_MEMB(a
, bdaddr
));
1057 PyErr_SetString(PyExc_ValueError
,
1058 "Unknown Bluetooth protocol");
1063 #ifdef HAVE_NETPACKET_PACKET_H
1066 struct sockaddr_ll
*a
= (struct sockaddr_ll
*)addr
;
1069 /* need to look up interface name give index */
1070 if (a
->sll_ifindex
) {
1071 ifr
.ifr_ifindex
= a
->sll_ifindex
;
1072 if (ioctl(sockfd
, SIOCGIFNAME
, &ifr
) == 0)
1073 ifname
= ifr
.ifr_name
;
1075 return Py_BuildValue("shbhy#",
1077 ntohs(a
->sll_protocol
),
1085 #ifdef HAVE_LINUX_TIPC_H
1088 struct sockaddr_tipc
*a
= (struct sockaddr_tipc
*) addr
;
1089 if (a
->addrtype
== TIPC_ADDR_NAMESEQ
) {
1090 return Py_BuildValue("IIIII",
1092 a
->addr
.nameseq
.type
,
1093 a
->addr
.nameseq
.lower
,
1094 a
->addr
.nameseq
.upper
,
1096 } else if (a
->addrtype
== TIPC_ADDR_NAME
) {
1097 return Py_BuildValue("IIIII",
1099 a
->addr
.name
.name
.type
,
1100 a
->addr
.name
.name
.instance
,
1101 a
->addr
.name
.name
.instance
,
1103 } else if (a
->addrtype
== TIPC_ADDR_ID
) {
1104 return Py_BuildValue("IIIII",
1111 PyErr_SetString(PyExc_ValueError
,
1112 "Invalid address type");
1118 /* More cases here... */
1121 /* If we don't know the address family, don't raise an
1122 exception -- return it as an (int, bytes) tuple. */
1123 return Py_BuildValue("iy#",
1126 sizeof(addr
->sa_data
));
1132 /* Parse a socket address argument according to the socket object's
1133 address family. Return 1 if the address was in the proper format,
1134 0 of not. The address is returned through addr_ret, its length
1138 getsockaddrarg(PySocketSockObject
*s
, PyObject
*args
,
1139 struct sockaddr
*addr_ret
, int *len_ret
)
1141 switch (s
->sock_family
) {
1143 #if defined(AF_UNIX)
1146 struct sockaddr_un
* addr
;
1149 if (!PyArg_Parse(args
, "s#", &path
, &len
))
1152 addr
= (struct sockaddr_un
*)addr_ret
;
1154 if (len
> 0 && path
[0] == 0) {
1155 /* Linux abstract namespace extension */
1156 if (len
> sizeof addr
->sun_path
) {
1157 PyErr_SetString(socket_error
,
1158 "AF_UNIX path too long");
1165 /* regular NULL-terminated string */
1166 if (len
>= sizeof addr
->sun_path
) {
1167 PyErr_SetString(socket_error
,
1168 "AF_UNIX path too long");
1171 addr
->sun_path
[len
] = 0;
1173 addr
->sun_family
= s
->sock_family
;
1174 memcpy(addr
->sun_path
, path
, len
);
1175 #if defined(PYOS_OS2)
1176 *len_ret
= sizeof(*addr
);
1178 *len_ret
= len
+ offsetof(struct sockaddr_un
, sun_path
);
1182 #endif /* AF_UNIX */
1184 #if defined(AF_NETLINK)
1187 struct sockaddr_nl
* addr
;
1189 addr
= (struct sockaddr_nl
*)addr_ret
;
1190 if (!PyTuple_Check(args
)) {
1194 "AF_NETLINK address must be tuple, not %.500s",
1195 Py_TYPE(args
)->tp_name
);
1198 if (!PyArg_ParseTuple(args
, "II:getsockaddrarg", &pid
, &groups
))
1200 addr
->nl_family
= AF_NETLINK
;
1202 addr
->nl_groups
= groups
;
1203 *len_ret
= sizeof(*addr
);
1210 struct sockaddr_in
* addr
;
1213 if (!PyTuple_Check(args
)) {
1217 "AF_INET address must be tuple, not %.500s",
1218 Py_TYPE(args
)->tp_name
);
1221 if (!PyArg_ParseTuple(args
, "eti:getsockaddrarg",
1222 "idna", &host
, &port
))
1224 addr
=(struct sockaddr_in
*)addr_ret
;
1225 result
= setipaddr(host
, (struct sockaddr
*)addr
,
1226 sizeof(*addr
), AF_INET
);
1230 if (port
< 0 || port
> 0xffff) {
1232 PyExc_OverflowError
,
1233 "getsockaddrarg: port must be 0-65535.");
1236 addr
->sin_family
= AF_INET
;
1237 addr
->sin_port
= htons((short)port
);
1238 *len_ret
= sizeof *addr
;
1245 struct sockaddr_in6
* addr
;
1247 int port
, flowinfo
, scope_id
, result
;
1248 flowinfo
= scope_id
= 0;
1249 if (!PyTuple_Check(args
)) {
1253 "AF_INET6 address must be tuple, not %.500s",
1254 Py_TYPE(args
)->tp_name
);
1257 if (!PyArg_ParseTuple(args
, "eti|ii",
1258 "idna", &host
, &port
, &flowinfo
,
1262 addr
= (struct sockaddr_in6
*)addr_ret
;
1263 result
= setipaddr(host
, (struct sockaddr
*)addr
,
1264 sizeof(*addr
), AF_INET6
);
1268 if (port
< 0 || port
> 0xffff) {
1270 PyExc_OverflowError
,
1271 "getsockaddrarg: port must be 0-65535.");
1274 addr
->sin6_family
= s
->sock_family
;
1275 addr
->sin6_port
= htons((short)port
);
1276 addr
->sin6_flowinfo
= flowinfo
;
1277 addr
->sin6_scope_id
= scope_id
;
1278 *len_ret
= sizeof *addr
;
1283 #ifdef USE_BLUETOOTH
1286 switch (s
->sock_proto
) {
1289 struct sockaddr_l2
*addr
;
1292 addr
= (struct sockaddr_l2
*)addr_ret
;
1293 memset(addr
, 0, sizeof(struct sockaddr_l2
));
1294 _BT_L2_MEMB(addr
, family
) = AF_BLUETOOTH
;
1295 if (!PyArg_ParseTuple(args
, "si", &straddr
,
1296 &_BT_L2_MEMB(addr
, psm
))) {
1297 PyErr_SetString(socket_error
, "getsockaddrarg: "
1301 if (setbdaddr(straddr
, &_BT_L2_MEMB(addr
, bdaddr
)) < 0)
1304 *len_ret
= sizeof *addr
;
1307 case BTPROTO_RFCOMM
:
1309 struct sockaddr_rc
*addr
;
1312 addr
= (struct sockaddr_rc
*)addr_ret
;
1313 _BT_RC_MEMB(addr
, family
) = AF_BLUETOOTH
;
1314 if (!PyArg_ParseTuple(args
, "si", &straddr
,
1315 &_BT_RC_MEMB(addr
, channel
))) {
1316 PyErr_SetString(socket_error
, "getsockaddrarg: "
1320 if (setbdaddr(straddr
, &_BT_RC_MEMB(addr
, bdaddr
)) < 0)
1323 *len_ret
= sizeof *addr
;
1328 struct sockaddr_hci
*addr
= (struct sockaddr_hci
*)addr_ret
;
1329 _BT_HCI_MEMB(addr
, family
) = AF_BLUETOOTH
;
1330 if (!PyArg_ParseTuple(args
, "i", &_BT_HCI_MEMB(addr
, dev
))) {
1331 PyErr_SetString(socket_error
, "getsockaddrarg: "
1335 *len_ret
= sizeof *addr
;
1338 #if !defined(__FreeBSD__)
1341 struct sockaddr_sco
*addr
;
1344 addr
= (struct sockaddr_sco
*)addr_ret
;
1345 _BT_SCO_MEMB(addr
, family
) = AF_BLUETOOTH
;
1346 if (!PyBytes_Check(args
)) {
1347 PyErr_SetString(socket_error
, "getsockaddrarg: "
1351 straddr
= PyBytes_AS_STRING(args
);
1352 if (setbdaddr(straddr
, &_BT_SCO_MEMB(addr
, bdaddr
)) < 0)
1355 *len_ret
= sizeof *addr
;
1360 PyErr_SetString(socket_error
, "getsockaddrarg: unknown Bluetooth protocol");
1366 #ifdef HAVE_NETPACKET_PACKET_H
1369 struct sockaddr_ll
* addr
;
1371 char *interfaceName
;
1376 unsigned int halen
= 0;
1378 if (!PyTuple_Check(args
)) {
1382 "AF_PACKET address must be tuple, not %.500s",
1383 Py_TYPE(args
)->tp_name
);
1386 if (!PyArg_ParseTuple(args
, "si|iiy#", &interfaceName
,
1387 &protoNumber
, &pkttype
, &hatype
,
1390 strncpy(ifr
.ifr_name
, interfaceName
, sizeof(ifr
.ifr_name
));
1391 ifr
.ifr_name
[(sizeof(ifr
.ifr_name
))-1] = '\0';
1392 if (ioctl(s
->sock_fd
, SIOCGIFINDEX
, &ifr
) < 0) {
1397 PyErr_SetString(PyExc_ValueError
,
1398 "Hardware address must be 8 bytes or less");
1401 if (protoNumber
< 0 || protoNumber
> 0xffff) {
1403 PyExc_OverflowError
,
1404 "getsockaddrarg: protoNumber must be 0-65535.");
1407 addr
= (struct sockaddr_ll
*)addr_ret
;
1408 addr
->sll_family
= AF_PACKET
;
1409 addr
->sll_protocol
= htons((short)protoNumber
);
1410 addr
->sll_ifindex
= ifr
.ifr_ifindex
;
1411 addr
->sll_pkttype
= pkttype
;
1412 addr
->sll_hatype
= hatype
;
1414 memcpy(&addr
->sll_addr
, haddr
, halen
);
1416 addr
->sll_halen
= halen
;
1417 *len_ret
= sizeof *addr
;
1422 #ifdef HAVE_LINUX_TIPC_H
1425 unsigned int atype
, v1
, v2
, v3
;
1426 unsigned int scope
= TIPC_CLUSTER_SCOPE
;
1427 struct sockaddr_tipc
*addr
;
1429 if (!PyTuple_Check(args
)) {
1433 "AF_TIPC address must be tuple, not %.500s",
1434 Py_TYPE(args
)->tp_name
);
1438 if (!PyArg_ParseTuple(args
,
1439 "IIII|I;Invalid TIPC address format",
1440 &atype
, &v1
, &v2
, &v3
, &scope
))
1443 addr
= (struct sockaddr_tipc
*) addr_ret
;
1444 memset(addr
, 0, sizeof(struct sockaddr_tipc
));
1446 addr
->family
= AF_TIPC
;
1447 addr
->scope
= scope
;
1448 addr
->addrtype
= atype
;
1450 if (atype
== TIPC_ADDR_NAMESEQ
) {
1451 addr
->addr
.nameseq
.type
= v1
;
1452 addr
->addr
.nameseq
.lower
= v2
;
1453 addr
->addr
.nameseq
.upper
= v3
;
1454 } else if (atype
== TIPC_ADDR_NAME
) {
1455 addr
->addr
.name
.name
.type
= v1
;
1456 addr
->addr
.name
.name
.instance
= v2
;
1457 } else if (atype
== TIPC_ADDR_ID
) {
1458 addr
->addr
.id
.node
= v1
;
1459 addr
->addr
.id
.ref
= v2
;
1461 /* Shouldn't happen */
1462 PyErr_SetString(PyExc_TypeError
, "Invalid address type");
1466 *len_ret
= sizeof(*addr
);
1472 /* More cases here... */
1475 PyErr_SetString(socket_error
, "getsockaddrarg: bad family");
1482 /* Get the address length according to the socket object's address family.
1483 Return 1 if the family is known, 0 otherwise. The length is returned
1487 getsockaddrlen(PySocketSockObject
*s
, socklen_t
*len_ret
)
1489 switch (s
->sock_family
) {
1491 #if defined(AF_UNIX)
1494 *len_ret
= sizeof (struct sockaddr_un
);
1497 #endif /* AF_UNIX */
1498 #if defined(AF_NETLINK)
1501 *len_ret
= sizeof (struct sockaddr_nl
);
1508 *len_ret
= sizeof (struct sockaddr_in
);
1515 *len_ret
= sizeof (struct sockaddr_in6
);
1520 #ifdef USE_BLUETOOTH
1523 switch(s
->sock_proto
)
1527 *len_ret
= sizeof (struct sockaddr_l2
);
1529 case BTPROTO_RFCOMM
:
1530 *len_ret
= sizeof (struct sockaddr_rc
);
1533 *len_ret
= sizeof (struct sockaddr_hci
);
1535 #if !defined(__FreeBSD__)
1537 *len_ret
= sizeof (struct sockaddr_sco
);
1541 PyErr_SetString(socket_error
, "getsockaddrlen: "
1542 "unknown BT protocol");
1549 #ifdef HAVE_NETPACKET_PACKET_H
1552 *len_ret
= sizeof (struct sockaddr_ll
);
1557 #ifdef HAVE_LINUX_TIPC_H
1560 *len_ret
= sizeof (struct sockaddr_tipc
);
1565 /* More cases here... */
1568 PyErr_SetString(socket_error
, "getsockaddrlen: bad family");
1575 /* s._accept() -> (fd, address) */
1578 sock_accept(PySocketSockObject
*s
)
1580 sock_addr_t addrbuf
;
1581 SOCKET_T newfd
= INVALID_SOCKET
;
1583 PyObject
*sock
= NULL
;
1584 PyObject
*addr
= NULL
;
1585 PyObject
*res
= NULL
;
1588 if (!getsockaddrlen(s
, &addrlen
))
1590 memset(&addrbuf
, 0, addrlen
);
1592 if (!IS_SELECTABLE(s
))
1593 return select_error();
1595 Py_BEGIN_ALLOW_THREADS
1596 timeout
= internal_select(s
, 0);
1598 newfd
= accept(s
->sock_fd
, SAS2SA(&addrbuf
), &addrlen
);
1599 Py_END_ALLOW_THREADS
1602 PyErr_SetString(socket_timeout
, "timed out");
1606 if (newfd
== INVALID_SOCKET
)
1607 return s
->errorhandler();
1609 sock
= PyLong_FromSocket_t(newfd
);
1615 addr
= makesockaddr(s
->sock_fd
, SAS2SA(&addrbuf
),
1616 addrlen
, s
->sock_proto
);
1620 res
= PyTuple_Pack(2, sock
, addr
);
1628 PyDoc_STRVAR(accept_doc
,
1629 "_accept() -> (integer, address info)\n\
1631 Wait for an incoming connection. Return a new socket file descriptor\n\
1632 representing the connection, and the address of the client.\n\
1633 For IP sockets, the address info is a pair (hostaddr, port).");
1635 /* s.setblocking(flag) method. Argument:
1636 False -- non-blocking mode; same as settimeout(0)
1637 True -- blocking mode; same as settimeout(None)
1641 sock_setblocking(PySocketSockObject
*s
, PyObject
*arg
)
1645 block
= PyLong_AsLong(arg
);
1646 if (block
== -1 && PyErr_Occurred())
1649 s
->sock_timeout
= block
? -1.0 : 0.0;
1650 internal_setblocking(s
, block
);
1656 PyDoc_STRVAR(setblocking_doc
,
1657 "setblocking(flag)\n\
1659 Set the socket to blocking (flag is true) or non-blocking (false).\n\
1660 setblocking(True) is equivalent to settimeout(None);\n\
1661 setblocking(False) is equivalent to settimeout(0.0).");
1663 /* s.settimeout(timeout) method. Argument:
1664 None -- no timeout, blocking mode; same as setblocking(True)
1665 0.0 -- non-blocking mode; same as setblocking(False)
1666 > 0 -- timeout mode; operations time out after timeout seconds
1667 < 0 -- illegal; raises an exception
1670 sock_settimeout(PySocketSockObject
*s
, PyObject
*arg
)
1677 timeout
= PyFloat_AsDouble(arg
);
1678 if (timeout
< 0.0) {
1679 if (!PyErr_Occurred())
1680 PyErr_SetString(PyExc_ValueError
,
1681 "Timeout value out of range");
1686 s
->sock_timeout
= timeout
;
1687 internal_setblocking(s
, timeout
< 0.0);
1693 PyDoc_STRVAR(settimeout_doc
,
1694 "settimeout(timeout)\n\
1696 Set a timeout on socket operations. 'timeout' can be a float,\n\
1697 giving in seconds, or None. Setting a timeout of None disables\n\
1698 the timeout feature and is equivalent to setblocking(1).\n\
1699 Setting a timeout of zero is the same as setblocking(0).");
1701 /* s.gettimeout() method.
1702 Returns the timeout associated with a socket. */
1704 sock_gettimeout(PySocketSockObject
*s
)
1706 if (s
->sock_timeout
< 0.0) {
1711 return PyFloat_FromDouble(s
->sock_timeout
);
1714 PyDoc_STRVAR(gettimeout_doc
,
1715 "gettimeout() -> timeout\n\
1717 Returns the timeout in floating seconds associated with socket \n\
1718 operations. A timeout of None indicates that timeouts on socket \n\
1719 operations are disabled.");
1721 /* s.setsockopt() method.
1722 With an integer third argument, sets an integer option.
1723 With a string third argument, sets an option from a buffer;
1724 use optional built-in module 'struct' to encode the string. */
1727 sock_setsockopt(PySocketSockObject
*s
, PyObject
*args
)
1736 if (PyArg_ParseTuple(args
, "iii:setsockopt",
1737 &level
, &optname
, &flag
)) {
1738 buf
= (char *) &flag
;
1739 buflen
= sizeof flag
;
1743 if (!PyArg_ParseTuple(args
, "iiy#:setsockopt",
1744 &level
, &optname
, &buf
, &buflen
))
1747 res
= setsockopt(s
->sock_fd
, level
, optname
, (void *)buf
, buflen
);
1749 return s
->errorhandler();
1754 PyDoc_STRVAR(setsockopt_doc
,
1755 "setsockopt(level, option, value)\n\
1757 Set a socket option. See the Unix manual for level and option.\n\
1758 The value argument can either be an integer or a string.");
1761 /* s.getsockopt() method.
1762 With two arguments, retrieves an integer option.
1763 With a third integer argument, retrieves a string buffer of that size;
1764 use optional built-in module 'struct' to decode the string. */
1767 sock_getsockopt(PySocketSockObject
*s
, PyObject
*args
)
1773 socklen_t buflen
= 0;
1775 if (!PyArg_ParseTuple(args
, "ii|i:getsockopt",
1776 &level
, &optname
, &buflen
))
1781 socklen_t flagsize
= sizeof flag
;
1782 res
= getsockopt(s
->sock_fd
, level
, optname
,
1783 (void *)&flag
, &flagsize
);
1785 return s
->errorhandler();
1786 return PyLong_FromLong(flag
);
1789 /* socklen_t is unsigned so no negative test is needed,
1790 test buflen == 0 is previously done */
1791 if (buflen
> 1024) {
1793 if (buflen
<= 0 || buflen
> 1024) {
1795 PyErr_SetString(socket_error
,
1796 "getsockopt buflen out of range");
1799 buf
= PyBytes_FromStringAndSize((char *)NULL
, buflen
);
1802 res
= getsockopt(s
->sock_fd
, level
, optname
,
1803 (void *)PyBytes_AS_STRING(buf
), &buflen
);
1806 return s
->errorhandler();
1808 _PyBytes_Resize(&buf
, buflen
);
1812 PyDoc_STRVAR(getsockopt_doc
,
1813 "getsockopt(level, option[, buffersize]) -> value\n\
1815 Get a socket option. See the Unix manual for level and option.\n\
1816 If a nonzero buffersize argument is given, the return value is a\n\
1817 string of that length; otherwise it is an integer.");
1820 /* s.bind(sockaddr) method */
1823 sock_bind(PySocketSockObject
*s
, PyObject
*addro
)
1825 sock_addr_t addrbuf
;
1829 if (!getsockaddrarg(s
, addro
, SAS2SA(&addrbuf
), &addrlen
))
1831 Py_BEGIN_ALLOW_THREADS
1832 res
= bind(s
->sock_fd
, SAS2SA(&addrbuf
), addrlen
);
1833 Py_END_ALLOW_THREADS
1835 return s
->errorhandler();
1840 PyDoc_STRVAR(bind_doc
,
1843 Bind the socket to a local address. For IP sockets, the address is a\n\
1844 pair (host, port); the host must refer to the local host. For raw packet\n\
1845 sockets the address is a tuple (ifname, proto [,pkttype [,hatype]])");
1848 /* s.close() method.
1849 Set the file descriptor to -1 so operations tried subsequently
1850 will surely fail. */
1853 sock_close(PySocketSockObject
*s
)
1857 if ((fd
= s
->sock_fd
) != -1) {
1859 Py_BEGIN_ALLOW_THREADS
1860 (void) SOCKETCLOSE(fd
);
1861 Py_END_ALLOW_THREADS
1867 PyDoc_STRVAR(close_doc
,
1870 Close the socket. It cannot be used after this call.");
1873 internal_connect(PySocketSockObject
*s
, struct sockaddr
*addr
, int addrlen
,
1879 res
= connect(s
->sock_fd
, addr
, addrlen
);
1883 if (s
->sock_timeout
> 0.0) {
1884 if (res
< 0 && WSAGetLastError() == WSAEWOULDBLOCK
&&
1886 /* This is a mess. Best solution: trust select */
1890 tv
.tv_sec
= (int)s
->sock_timeout
;
1891 tv
.tv_usec
= (int)((s
->sock_timeout
- tv
.tv_sec
) * 1e6
);
1893 FD_SET(s
->sock_fd
, &fds
);
1895 FD_SET(s
->sock_fd
, &fds_exc
);
1896 res
= select(s
->sock_fd
+1, NULL
, &fds
, &fds_exc
, &tv
);
1898 res
= WSAEWOULDBLOCK
;
1900 } else if (res
> 0) {
1901 if (FD_ISSET(s
->sock_fd
, &fds
))
1902 /* The socket is in the writable set - this
1906 /* As per MS docs, we need to call getsockopt()
1907 to get the underlying error */
1908 int res_size
= sizeof res
;
1909 /* It must be in the exception set */
1910 assert(FD_ISSET(s
->sock_fd
, &fds_exc
));
1911 if (0 == getsockopt(s
->sock_fd
, SOL_SOCKET
, SO_ERROR
,
1912 (char *)&res
, &res_size
))
1913 /* getsockopt also clears WSAGetLastError,
1914 so reset it back. */
1915 WSASetLastError(res
);
1917 res
= WSAGetLastError();
1920 /* else if (res < 0) an error occurred */
1925 res
= WSAGetLastError();
1929 if (s
->sock_timeout
> 0.0) {
1930 if (res
< 0 && errno
== EINPROGRESS
&& IS_SELECTABLE(s
)) {
1931 timeout
= internal_select(s
, 1);
1933 /* Bug #1019808: in case of an EINPROGRESS,
1934 use getsockopt(SO_ERROR) to get the real
1936 socklen_t res_size
= sizeof res
;
1937 (void)getsockopt(s
->sock_fd
, SOL_SOCKET
,
1938 SO_ERROR
, &res
, &res_size
);
1943 else if (timeout
== -1) {
1944 res
= errno
; /* had error */
1947 res
= EWOULDBLOCK
; /* timed out */
1955 *timeoutp
= timeout
;
1960 /* s.connect(sockaddr) method */
1963 sock_connect(PySocketSockObject
*s
, PyObject
*addro
)
1965 sock_addr_t addrbuf
;
1970 if (!getsockaddrarg(s
, addro
, SAS2SA(&addrbuf
), &addrlen
))
1973 Py_BEGIN_ALLOW_THREADS
1974 res
= internal_connect(s
, SAS2SA(&addrbuf
), addrlen
, &timeout
);
1975 Py_END_ALLOW_THREADS
1978 PyErr_SetString(socket_timeout
, "timed out");
1982 return s
->errorhandler();
1987 PyDoc_STRVAR(connect_doc
,
1988 "connect(address)\n\
1990 Connect the socket to a remote address. For IP sockets, the address\n\
1991 is a pair (host, port).");
1994 /* s.connect_ex(sockaddr) method */
1997 sock_connect_ex(PySocketSockObject
*s
, PyObject
*addro
)
1999 sock_addr_t addrbuf
;
2004 if (!getsockaddrarg(s
, addro
, SAS2SA(&addrbuf
), &addrlen
))
2007 Py_BEGIN_ALLOW_THREADS
2008 res
= internal_connect(s
, SAS2SA(&addrbuf
), addrlen
, &timeout
);
2009 Py_END_ALLOW_THREADS
2011 /* Signals are not errors (though they may raise exceptions). Adapted
2012 from PyErr_SetFromErrnoWithFilenameObject(). */
2014 if (res
== EINTR
&& PyErr_CheckSignals())
2018 return PyLong_FromLong((long) res
);
2021 PyDoc_STRVAR(connect_ex_doc
,
2022 "connect_ex(address) -> errno\n\
2024 This is like connect(address), but returns an error code (the errno value)\n\
2025 instead of raising an exception when an error occurs.");
2028 /* s.fileno() method */
2031 sock_fileno(PySocketSockObject
*s
)
2033 return PyLong_FromSocket_t(s
->sock_fd
);
2036 PyDoc_STRVAR(fileno_doc
,
2037 "fileno() -> integer\n\
2039 Return the integer file descriptor of the socket.");
2042 /* s.getsockname() method */
2045 sock_getsockname(PySocketSockObject
*s
)
2047 sock_addr_t addrbuf
;
2051 if (!getsockaddrlen(s
, &addrlen
))
2053 memset(&addrbuf
, 0, addrlen
);
2054 Py_BEGIN_ALLOW_THREADS
2055 res
= getsockname(s
->sock_fd
, SAS2SA(&addrbuf
), &addrlen
);
2056 Py_END_ALLOW_THREADS
2058 return s
->errorhandler();
2059 return makesockaddr(s
->sock_fd
, SAS2SA(&addrbuf
), addrlen
,
2063 PyDoc_STRVAR(getsockname_doc
,
2064 "getsockname() -> address info\n\
2066 Return the address of the local endpoint. For IP sockets, the address\n\
2067 info is a pair (hostaddr, port).");
2070 #ifdef HAVE_GETPEERNAME /* Cray APP doesn't have this :-( */
2071 /* s.getpeername() method */
2074 sock_getpeername(PySocketSockObject
*s
)
2076 sock_addr_t addrbuf
;
2080 if (!getsockaddrlen(s
, &addrlen
))
2082 memset(&addrbuf
, 0, addrlen
);
2083 Py_BEGIN_ALLOW_THREADS
2084 res
= getpeername(s
->sock_fd
, SAS2SA(&addrbuf
), &addrlen
);
2085 Py_END_ALLOW_THREADS
2087 return s
->errorhandler();
2088 return makesockaddr(s
->sock_fd
, SAS2SA(&addrbuf
), addrlen
,
2092 PyDoc_STRVAR(getpeername_doc
,
2093 "getpeername() -> address info\n\
2095 Return the address of the remote endpoint. For IP sockets, the address\n\
2096 info is a pair (hostaddr, port).");
2098 #endif /* HAVE_GETPEERNAME */
2101 /* s.listen(n) method */
2104 sock_listen(PySocketSockObject
*s
, PyObject
*arg
)
2109 backlog
= PyLong_AsLong(arg
);
2110 if (backlog
== -1 && PyErr_Occurred())
2112 Py_BEGIN_ALLOW_THREADS
2115 res
= listen(s
->sock_fd
, backlog
);
2116 Py_END_ALLOW_THREADS
2118 return s
->errorhandler();
2123 PyDoc_STRVAR(listen_doc
,
2126 Enable a server to accept connections. The backlog argument must be at\n\
2127 least 1; it specifies the number of unaccepted connection that the system\n\
2128 will allow before refusing new connections.");
2132 * This is the guts of the recv() and recv_into() methods, which reads into a
2133 * char buffer. If you have any inc/dec ref to do to the objects that contain
2134 * the buffer, do it in the caller. This function returns the number of bytes
2135 * succesfully read. If there was an error, it returns -1. Note that it is
2136 * also possible that we return a number of bytes smaller than the request
2140 sock_recv_guts(PySocketSockObject
*s
, char* cbuf
, int len
, int flags
)
2142 ssize_t outlen
= -1;
2149 if (!IS_SELECTABLE(s
)) {
2154 /* If 0 bytes were requested, do nothing. */
2159 Py_BEGIN_ALLOW_THREADS
2160 timeout
= internal_select(s
, 0);
2162 outlen
= recv(s
->sock_fd
, cbuf
, len
, flags
);
2163 Py_END_ALLOW_THREADS
2166 PyErr_SetString(socket_timeout
, "timed out");
2170 /* Note: the call to errorhandler() ALWAYS indirectly returned
2171 NULL, so ignore its return value */
2178 while (remaining
!= 0) {
2179 unsigned int segment
;
2182 segment
= remaining
/SEGMENT_SIZE
;
2184 segment
= SEGMENT_SIZE
;
2187 segment
= remaining
;
2190 Py_BEGIN_ALLOW_THREADS
2191 timeout
= internal_select(s
, 0);
2193 nread
= recv(s
->sock_fd
, read_buf
, segment
, flags
);
2194 Py_END_ALLOW_THREADS
2197 PyErr_SetString(socket_timeout
, "timed out");
2204 if (nread
!= remaining
) {
2209 remaining
-= segment
;
2210 read_buf
+= segment
;
2212 outlen
= read_buf
- cbuf
;
2219 /* s.recv(nbytes [,flags]) method */
2222 sock_recv(PySocketSockObject
*s
, PyObject
*args
)
2224 int recvlen
, flags
= 0;
2228 if (!PyArg_ParseTuple(args
, "i|i:recv", &recvlen
, &flags
))
2232 PyErr_SetString(PyExc_ValueError
,
2233 "negative buffersize in recv");
2237 /* Allocate a new string. */
2238 buf
= PyBytes_FromStringAndSize((char *) 0, recvlen
);
2243 outlen
= sock_recv_guts(s
, PyBytes_AS_STRING(buf
), recvlen
, flags
);
2245 /* An error occurred, release the string and return an
2250 if (outlen
!= recvlen
) {
2251 /* We did not read as many bytes as we anticipated, resize the
2252 string if possible and be successful. */
2253 _PyBytes_Resize(&buf
, outlen
);
2259 PyDoc_STRVAR(recv_doc
,
2260 "recv(buffersize[, flags]) -> data\n\
2262 Receive up to buffersize bytes from the socket. For the optional flags\n\
2263 argument, see the Unix manual. When no data is available, block until\n\
2264 at least one byte is available or until the remote end is closed. When\n\
2265 the remote end is closed and all data is read, return the empty string.");
2268 /* s.recv_into(buffer, [nbytes [,flags]]) method */
2271 sock_recv_into(PySocketSockObject
*s
, PyObject
*args
, PyObject
*kwds
)
2273 static char *kwlist
[] = {"buffer", "nbytes", "flags", 0};
2275 int recvlen
= 0, flags
= 0;
2281 /* Get the buffer's memory */
2282 if (!PyArg_ParseTupleAndKeywords(args
, kwds
, "w*|ii:recv_into", kwlist
,
2283 &pbuf
, &recvlen
, &flags
))
2289 PyBuffer_Release(&pbuf
);
2290 PyErr_SetString(PyExc_ValueError
,
2291 "negative buffersize in recv_into");
2295 /* If nbytes was not specified, use the buffer's length */
2299 /* Check if the buffer is large enough */
2300 if (buflen
< recvlen
) {
2301 PyBuffer_Release(&pbuf
);
2302 PyErr_SetString(PyExc_ValueError
,
2303 "buffer too small for requested bytes");
2308 readlen
= sock_recv_guts(s
, buf
, recvlen
, flags
);
2310 /* Return an error. */
2311 PyBuffer_Release(&pbuf
);
2315 PyBuffer_Release(&pbuf
);
2316 /* Return the number of bytes read. Note that we do not do anything
2317 special here in the case that readlen < recvlen. */
2318 return PyLong_FromSsize_t(readlen
);
2321 PyDoc_STRVAR(recv_into_doc
,
2322 "recv_into(buffer, [nbytes[, flags]]) -> nbytes_read\n\
2324 A version of recv() that stores its data into a buffer rather than creating \n\
2325 a new string. Receive up to buffersize bytes from the socket. If buffersize \n\
2326 is not specified (or 0), receive up to the size available in the given buffer.\n\
2328 See recv() for documentation about the flags.");
2332 * This is the guts of the recvfrom() and recvfrom_into() methods, which reads
2333 * into a char buffer. If you have any inc/def ref to do to the objects that
2334 * contain the buffer, do it in the caller. This function returns the number
2335 * of bytes succesfully read. If there was an error, it returns -1. Note
2336 * that it is also possible that we return a number of bytes smaller than the
2339 * 'addr' is a return value for the address object. Note that you must decref
2343 sock_recvfrom_guts(PySocketSockObject
*s
, char* cbuf
, int len
, int flags
,
2346 sock_addr_t addrbuf
;
2353 if (!getsockaddrlen(s
, &addrlen
))
2356 if (!IS_SELECTABLE(s
)) {
2361 Py_BEGIN_ALLOW_THREADS
2362 memset(&addrbuf
, 0, addrlen
);
2363 timeout
= internal_select(s
, 0);
2366 #if defined(PYOS_OS2) && !defined(PYCC_GCC)
2367 n
= recvfrom(s
->sock_fd
, cbuf
, len
, flags
,
2368 SAS2SA(&addrbuf
), &addrlen
);
2370 n
= recvfrom(s
->sock_fd
, cbuf
, len
, flags
,
2371 (void *) &addrbuf
, &addrlen
);
2374 n
= recvfrom(s
->sock_fd
, cbuf
, len
, flags
,
2375 SAS2SA(&addrbuf
), &addrlen
);
2378 Py_END_ALLOW_THREADS
2381 PyErr_SetString(socket_timeout
, "timed out");
2389 if (!(*addr
= makesockaddr(s
->sock_fd
, SAS2SA(&addrbuf
),
2390 addrlen
, s
->sock_proto
)))
2396 /* s.recvfrom(nbytes [,flags]) method */
2399 sock_recvfrom(PySocketSockObject
*s
, PyObject
*args
)
2401 PyObject
*buf
= NULL
;
2402 PyObject
*addr
= NULL
;
2403 PyObject
*ret
= NULL
;
2404 int recvlen
, flags
= 0;
2407 if (!PyArg_ParseTuple(args
, "i|i:recvfrom", &recvlen
, &flags
))
2411 PyErr_SetString(PyExc_ValueError
,
2412 "negative buffersize in recvfrom");
2416 buf
= PyBytes_FromStringAndSize((char *) 0, recvlen
);
2420 outlen
= sock_recvfrom_guts(s
, PyBytes_AS_STRING(buf
),
2421 recvlen
, flags
, &addr
);
2426 if (outlen
!= recvlen
) {
2427 /* We did not read as many bytes as we anticipated, resize the
2428 string if possible and be succesful. */
2429 if (_PyBytes_Resize(&buf
, outlen
) < 0)
2430 /* Oopsy, not so succesful after all. */
2434 ret
= PyTuple_Pack(2, buf
, addr
);
2442 PyDoc_STRVAR(recvfrom_doc
,
2443 "recvfrom(buffersize[, flags]) -> (data, address info)\n\
2445 Like recv(buffersize, flags) but also return the sender's address info.");
2448 /* s.recvfrom_into(buffer[, nbytes [,flags]]) method */
2451 sock_recvfrom_into(PySocketSockObject
*s
, PyObject
*args
, PyObject
* kwds
)
2453 static char *kwlist
[] = {"buffer", "nbytes", "flags", 0};
2455 int recvlen
= 0, flags
= 0;
2461 PyObject
*addr
= NULL
;
2463 if (!PyArg_ParseTupleAndKeywords(args
, kwds
, "w*|ii:recvfrom_into",
2469 assert(buf
!= 0 && buflen
> 0);
2472 PyBuffer_Release(&pbuf
);
2473 PyErr_SetString(PyExc_ValueError
,
2474 "negative buffersize in recvfrom_into");
2478 /* If nbytes was not specified, use the buffer's length */
2482 readlen
= sock_recvfrom_guts(s
, buf
, recvlen
, flags
, &addr
);
2484 PyBuffer_Release(&pbuf
);
2485 /* Return an error */
2490 PyBuffer_Release(&pbuf
);
2491 /* Return the number of bytes read and the address. Note that we do
2492 not do anything special here in the case that readlen < recvlen. */
2493 return Py_BuildValue("lN", readlen
, addr
);
2496 PyDoc_STRVAR(recvfrom_into_doc
,
2497 "recvfrom_into(buffer[, nbytes[, flags]]) -> (nbytes, address info)\n\
2499 Like recv_into(buffer[, nbytes[, flags]]) but also return the sender's address info.");
2502 /* s.send(data [,flags]) method */
2505 sock_send(PySocketSockObject
*s
, PyObject
*args
)
2508 int len
, n
= -1, flags
= 0, timeout
;
2511 if (!PyArg_ParseTuple(args
, "y*|i:send", &pbuf
, &flags
))
2514 if (!IS_SELECTABLE(s
)) {
2515 PyBuffer_Release(&pbuf
);
2516 return select_error();
2521 Py_BEGIN_ALLOW_THREADS
2522 timeout
= internal_select(s
, 1);
2525 n
= sendsegmented(s
->sock_fd
, buf
, len
, flags
);
2527 n
= send(s
->sock_fd
, buf
, len
, flags
);
2529 Py_END_ALLOW_THREADS
2531 PyBuffer_Release(&pbuf
);
2534 PyErr_SetString(socket_timeout
, "timed out");
2538 return s
->errorhandler();
2539 return PyLong_FromLong((long)n
);
2542 PyDoc_STRVAR(send_doc
,
2543 "send(data[, flags]) -> count\n\
2545 Send a data string to the socket. For the optional flags\n\
2546 argument, see the Unix manual. Return the number of bytes\n\
2547 sent; this may be less than len(data) if the network is busy.");
2550 /* s.sendall(data [,flags]) method */
2553 sock_sendall(PySocketSockObject
*s
, PyObject
*args
)
2556 int len
, n
= -1, flags
= 0, timeout
;
2559 if (!PyArg_ParseTuple(args
, "y*|i:sendall", &pbuf
, &flags
))
2564 if (!IS_SELECTABLE(s
)) {
2565 PyBuffer_Release(&pbuf
);
2566 return select_error();
2569 Py_BEGIN_ALLOW_THREADS
2571 timeout
= internal_select(s
, 1);
2576 n
= sendsegmented(s
->sock_fd
, buf
, len
, flags
);
2578 n
= send(s
->sock_fd
, buf
, len
, flags
);
2585 Py_END_ALLOW_THREADS
2586 PyBuffer_Release(&pbuf
);
2589 PyErr_SetString(socket_timeout
, "timed out");
2593 return s
->errorhandler();
2599 PyDoc_STRVAR(sendall_doc
,
2600 "sendall(data[, flags])\n\
2602 Send a data string to the socket. For the optional flags\n\
2603 argument, see the Unix manual. This calls send() repeatedly\n\
2604 until all data is sent. If an error occurs, it's impossible\n\
2605 to tell how much data has been sent.");
2608 /* s.sendto(data, [flags,] sockaddr) method */
2611 sock_sendto(PySocketSockObject
*s
, PyObject
*args
)
2617 sock_addr_t addrbuf
;
2618 int addrlen
, n
= -1, flags
, timeout
;
2621 if (!PyArg_ParseTuple(args
, "y*O:sendto", &pbuf
, &addro
)) {
2623 if (!PyArg_ParseTuple(args
, "y*iO:sendto",
2624 &pbuf
, &flags
, &addro
))
2630 if (!IS_SELECTABLE(s
)) {
2631 PyBuffer_Release(&pbuf
);
2632 return select_error();
2635 if (!getsockaddrarg(s
, addro
, SAS2SA(&addrbuf
), &addrlen
)) {
2636 PyBuffer_Release(&pbuf
);
2640 Py_BEGIN_ALLOW_THREADS
2641 timeout
= internal_select(s
, 1);
2643 n
= sendto(s
->sock_fd
, buf
, len
, flags
, SAS2SA(&addrbuf
), addrlen
);
2644 Py_END_ALLOW_THREADS
2646 PyBuffer_Release(&pbuf
);
2648 PyErr_SetString(socket_timeout
, "timed out");
2652 return s
->errorhandler();
2653 return PyLong_FromLong((long)n
);
2656 PyDoc_STRVAR(sendto_doc
,
2657 "sendto(data[, flags], address) -> count\n\
2659 Like send(data, flags) but allows specifying the destination address.\n\
2660 For IP sockets, the address is a pair (hostaddr, port).");
2663 /* s.shutdown(how) method */
2666 sock_shutdown(PySocketSockObject
*s
, PyObject
*arg
)
2671 how
= PyLong_AsLong(arg
);
2672 if (how
== -1 && PyErr_Occurred())
2674 Py_BEGIN_ALLOW_THREADS
2675 res
= shutdown(s
->sock_fd
, how
);
2676 Py_END_ALLOW_THREADS
2678 return s
->errorhandler();
2683 PyDoc_STRVAR(shutdown_doc
,
2686 Shut down the reading side of the socket (flag == SHUT_RD), the writing side\n\
2687 of the socket (flag == SHUT_WR), or both ends (flag == SHUT_RDWR).");
2689 #if defined(MS_WINDOWS) && defined(SIO_RCVALL)
2691 sock_ioctl(PySocketSockObject
*s
, PyObject
*arg
)
2693 unsigned long cmd
= SIO_RCVALL
;
2694 unsigned int option
= RCVALL_ON
;
2697 if (!PyArg_ParseTuple(arg
, "kI:ioctl", &cmd
, &option
))
2700 if (WSAIoctl(s
->sock_fd
, cmd
, &option
, sizeof(option
),
2701 NULL
, 0, &recv
, NULL
, NULL
) == SOCKET_ERROR
) {
2704 return PyLong_FromUnsignedLong(recv
);
2706 PyDoc_STRVAR(sock_ioctl_doc
,
2707 "ioctl(cmd, option) -> long\n\
2709 Control the socket with WSAIoctl syscall. Currently only socket.SIO_RCVALL\n\
2710 is supported as control. Options must be one of the socket.RCVALL_*\n\
2715 /* List of methods for socket objects */
2717 static PyMethodDef sock_methods
[] = {
2718 {"_accept", (PyCFunction
)sock_accept
, METH_NOARGS
,
2720 {"bind", (PyCFunction
)sock_bind
, METH_O
,
2722 {"close", (PyCFunction
)sock_close
, METH_NOARGS
,
2724 {"connect", (PyCFunction
)sock_connect
, METH_O
,
2726 {"connect_ex", (PyCFunction
)sock_connect_ex
, METH_O
,
2728 {"fileno", (PyCFunction
)sock_fileno
, METH_NOARGS
,
2730 #ifdef HAVE_GETPEERNAME
2731 {"getpeername", (PyCFunction
)sock_getpeername
,
2732 METH_NOARGS
, getpeername_doc
},
2734 {"getsockname", (PyCFunction
)sock_getsockname
,
2735 METH_NOARGS
, getsockname_doc
},
2736 {"getsockopt", (PyCFunction
)sock_getsockopt
, METH_VARARGS
,
2738 #if defined(MS_WINDOWS) && defined(SIO_RCVALL)
2739 {"ioctl", (PyCFunction
)sock_ioctl
, METH_VARARGS
,
2742 {"listen", (PyCFunction
)sock_listen
, METH_O
,
2744 {"recv", (PyCFunction
)sock_recv
, METH_VARARGS
,
2746 {"recv_into", (PyCFunction
)sock_recv_into
, METH_VARARGS
| METH_KEYWORDS
,
2748 {"recvfrom", (PyCFunction
)sock_recvfrom
, METH_VARARGS
,
2750 {"recvfrom_into", (PyCFunction
)sock_recvfrom_into
, METH_VARARGS
| METH_KEYWORDS
,
2752 {"send", (PyCFunction
)sock_send
, METH_VARARGS
,
2754 {"sendall", (PyCFunction
)sock_sendall
, METH_VARARGS
,
2756 {"sendto", (PyCFunction
)sock_sendto
, METH_VARARGS
,
2758 {"setblocking", (PyCFunction
)sock_setblocking
, METH_O
,
2760 {"settimeout", (PyCFunction
)sock_settimeout
, METH_O
,
2762 {"gettimeout", (PyCFunction
)sock_gettimeout
, METH_NOARGS
,
2764 {"setsockopt", (PyCFunction
)sock_setsockopt
, METH_VARARGS
,
2766 {"shutdown", (PyCFunction
)sock_shutdown
, METH_O
,
2768 {NULL
, NULL
} /* sentinel */
2771 /* SockObject members */
2772 static PyMemberDef sock_memberlist
[] = {
2773 {"family", T_INT
, offsetof(PySocketSockObject
, sock_family
), READONLY
, "the socket family"},
2774 {"type", T_INT
, offsetof(PySocketSockObject
, sock_type
), READONLY
, "the socket type"},
2775 {"proto", T_INT
, offsetof(PySocketSockObject
, sock_proto
), READONLY
, "the socket protocol"},
2776 {"timeout", T_DOUBLE
, offsetof(PySocketSockObject
, sock_timeout
), READONLY
, "the socket timeout"},
2780 /* Deallocate a socket object in response to the last Py_DECREF().
2781 First close the file description. */
2784 sock_dealloc(PySocketSockObject
*s
)
2786 if (s
->sock_fd
!= -1)
2787 (void) SOCKETCLOSE(s
->sock_fd
);
2788 Py_TYPE(s
)->tp_free((PyObject
*)s
);
2793 sock_repr(PySocketSockObject
*s
)
2795 #if SIZEOF_SOCKET_T > SIZEOF_LONG
2796 if (s
->sock_fd
> LONG_MAX
) {
2797 /* this can occur on Win64, and actually there is a special
2798 ugly printf formatter for decimal pointer length integer
2799 printing, only bother if necessary*/
2800 PyErr_SetString(PyExc_OverflowError
,
2801 "no printf formatter to display "
2802 "the socket descriptor in decimal");
2806 return PyUnicode_FromFormat(
2807 "<socket object, fd=%ld, family=%d, type=%d, proto=%d>",
2808 (long)s
->sock_fd
, s
->sock_family
,
2814 /* Create a new, uninitialized socket object. */
2817 sock_new(PyTypeObject
*type
, PyObject
*args
, PyObject
*kwds
)
2821 new = type
->tp_alloc(type
, 0);
2823 ((PySocketSockObject
*)new)->sock_fd
= -1;
2824 ((PySocketSockObject
*)new)->sock_timeout
= -1.0;
2825 ((PySocketSockObject
*)new)->errorhandler
= &set_error
;
2831 /* Initialize a new socket object. */
2835 sock_initobj(PyObject
*self
, PyObject
*args
, PyObject
*kwds
)
2837 PySocketSockObject
*s
= (PySocketSockObject
*)self
;
2838 PyObject
*fdobj
= NULL
;
2839 SOCKET_T fd
= INVALID_SOCKET
;
2840 int family
= AF_INET
, type
= SOCK_STREAM
, proto
= 0;
2841 static char *keywords
[] = {"family", "type", "proto", "fileno", 0};
2843 if (!PyArg_ParseTupleAndKeywords(args
, kwds
,
2844 "|iiiO:socket", keywords
,
2845 &family
, &type
, &proto
, &fdobj
))
2848 if (fdobj
!= NULL
&& fdobj
!= Py_None
) {
2849 fd
= PyLong_AsSocket_t(fdobj
);
2850 if (fd
== (SOCKET_T
)(-1) && PyErr_Occurred())
2852 if (fd
== INVALID_SOCKET
) {
2853 PyErr_SetString(PyExc_ValueError
,
2854 "can't use invalid socket value");
2859 Py_BEGIN_ALLOW_THREADS
2860 fd
= socket(family
, type
, proto
);
2861 Py_END_ALLOW_THREADS
2863 if (fd
== INVALID_SOCKET
) {
2868 init_sockobject(s
, fd
, family
, type
, proto
);
2875 /* Type object for socket objects. */
2877 static PyTypeObject sock_type
= {
2878 PyVarObject_HEAD_INIT(0, 0) /* Must fill in type value later */
2879 "_socket.socket", /* tp_name */
2880 sizeof(PySocketSockObject
), /* tp_basicsize */
2881 0, /* tp_itemsize */
2882 (destructor
)sock_dealloc
, /* tp_dealloc */
2886 0, /* tp_reserved */
2887 (reprfunc
)sock_repr
, /* tp_repr */
2888 0, /* tp_as_number */
2889 0, /* tp_as_sequence */
2890 0, /* tp_as_mapping */
2894 PyObject_GenericGetAttr
, /* tp_getattro */
2895 0, /* tp_setattro */
2896 0, /* tp_as_buffer */
2897 Py_TPFLAGS_DEFAULT
| Py_TPFLAGS_BASETYPE
, /* tp_flags */
2898 sock_doc
, /* tp_doc */
2899 0, /* tp_traverse */
2901 0, /* tp_richcompare */
2902 0, /* tp_weaklistoffset */
2904 0, /* tp_iternext */
2905 sock_methods
, /* tp_methods */
2906 sock_memberlist
, /* tp_members */
2910 0, /* tp_descr_get */
2911 0, /* tp_descr_set */
2912 0, /* tp_dictoffset */
2913 sock_initobj
, /* tp_init */
2914 PyType_GenericAlloc
, /* tp_alloc */
2915 sock_new
, /* tp_new */
2916 PyObject_Del
, /* tp_free */
2920 /* Python interface to gethostname(). */
2924 socket_gethostname(PyObject
*self
, PyObject
*unused
)
2928 Py_BEGIN_ALLOW_THREADS
2929 res
= gethostname(buf
, (int) sizeof buf
- 1);
2930 Py_END_ALLOW_THREADS
2933 buf
[sizeof buf
- 1] = '\0';
2934 return PyUnicode_FromString(buf
);
2937 PyDoc_STRVAR(gethostname_doc
,
2938 "gethostname() -> string\n\
2940 Return the current host name.");
2943 /* Python interface to gethostbyname(name). */
2947 socket_gethostbyname(PyObject
*self
, PyObject
*args
)
2950 sock_addr_t addrbuf
;
2952 if (!PyArg_ParseTuple(args
, "s:gethostbyname", &name
))
2954 if (setipaddr(name
, SAS2SA(&addrbuf
), sizeof(addrbuf
), AF_INET
) < 0)
2956 return makeipaddr(SAS2SA(&addrbuf
), sizeof(struct sockaddr_in
));
2959 PyDoc_STRVAR(gethostbyname_doc
,
2960 "gethostbyname(host) -> address\n\
2962 Return the IP address (a string of the form '255.255.255.255') for a host.");
2965 /* Convenience function common to gethostbyname_ex and gethostbyaddr */
2968 gethost_common(struct hostent
*h
, struct sockaddr
*addr
, int alen
, int af
)
2971 PyObject
*rtn_tuple
= (PyObject
*)NULL
;
2972 PyObject
*name_list
= (PyObject
*)NULL
;
2973 PyObject
*addr_list
= (PyObject
*)NULL
;
2977 /* Let's get real error message to return */
2978 set_herror(h_errno
);
2982 if (h
->h_addrtype
!= af
) {
2983 /* Let's get real error message to return */
2984 PyErr_SetString(socket_error
,
2985 (char *)strerror(EAFNOSUPPORT
));
2993 if (alen
< sizeof(struct sockaddr_in
))
2999 if (alen
< sizeof(struct sockaddr_in6
))
3006 if ((name_list
= PyList_New(0)) == NULL
)
3009 if ((addr_list
= PyList_New(0)) == NULL
)
3012 /* SF #1511317: h_aliases can be NULL */
3014 for (pch
= h
->h_aliases
; *pch
!= NULL
; pch
++) {
3016 tmp
= PyUnicode_FromString(*pch
);
3020 status
= PyList_Append(name_list
, tmp
);
3028 for (pch
= h
->h_addr_list
; *pch
!= NULL
; pch
++) {
3035 struct sockaddr_in sin
;
3036 memset(&sin
, 0, sizeof(sin
));
3037 sin
.sin_family
= af
;
3038 #ifdef HAVE_SOCKADDR_SA_LEN
3039 sin
.sin_len
= sizeof(sin
);
3041 memcpy(&sin
.sin_addr
, *pch
, sizeof(sin
.sin_addr
));
3042 tmp
= makeipaddr((struct sockaddr
*)&sin
, sizeof(sin
));
3044 if (pch
== h
->h_addr_list
&& alen
>= sizeof(sin
))
3045 memcpy((char *) addr
, &sin
, sizeof(sin
));
3052 struct sockaddr_in6 sin6
;
3053 memset(&sin6
, 0, sizeof(sin6
));
3054 sin6
.sin6_family
= af
;
3055 #ifdef HAVE_SOCKADDR_SA_LEN
3056 sin6
.sin6_len
= sizeof(sin6
);
3058 memcpy(&sin6
.sin6_addr
, *pch
, sizeof(sin6
.sin6_addr
));
3059 tmp
= makeipaddr((struct sockaddr
*)&sin6
,
3062 if (pch
== h
->h_addr_list
&& alen
>= sizeof(sin6
))
3063 memcpy((char *) addr
, &sin6
, sizeof(sin6
));
3068 default: /* can't happen */
3069 PyErr_SetString(socket_error
,
3070 "unsupported address family");
3077 status
= PyList_Append(addr_list
, tmp
);
3084 rtn_tuple
= Py_BuildValue("sOO", h
->h_name
, name_list
, addr_list
);
3087 Py_XDECREF(name_list
);
3088 Py_XDECREF(addr_list
);
3093 /* Python interface to gethostbyname_ex(name). */
3097 socket_gethostbyname_ex(PyObject
*self
, PyObject
*args
)
3102 struct sockaddr_storage addr
;
3104 struct sockaddr_in addr
;
3106 struct sockaddr
*sa
;
3108 #ifdef HAVE_GETHOSTBYNAME_R
3109 struct hostent hp_allocated
;
3110 #ifdef HAVE_GETHOSTBYNAME_R_3_ARG
3111 struct hostent_data data
;
3114 int buf_len
= (sizeof buf
) - 1;
3117 #if defined(HAVE_GETHOSTBYNAME_R_3_ARG) || defined(HAVE_GETHOSTBYNAME_R_6_ARG)
3120 #endif /* HAVE_GETHOSTBYNAME_R */
3122 if (!PyArg_ParseTuple(args
, "s:gethostbyname_ex", &name
))
3124 if (setipaddr(name
, (struct sockaddr
*)&addr
, sizeof(addr
), AF_INET
) < 0)
3126 Py_BEGIN_ALLOW_THREADS
3127 #ifdef HAVE_GETHOSTBYNAME_R
3128 #if defined(HAVE_GETHOSTBYNAME_R_6_ARG)
3129 result
= gethostbyname_r(name
, &hp_allocated
, buf
, buf_len
,
3131 #elif defined(HAVE_GETHOSTBYNAME_R_5_ARG)
3132 h
= gethostbyname_r(name
, &hp_allocated
, buf
, buf_len
, &errnop
);
3133 #else /* HAVE_GETHOSTBYNAME_R_3_ARG */
3134 memset((void *) &data
, '\0', sizeof(data
));
3135 result
= gethostbyname_r(name
, &hp_allocated
, &data
);
3136 h
= (result
!= 0) ? NULL
: &hp_allocated
;
3138 #else /* not HAVE_GETHOSTBYNAME_R */
3139 #ifdef USE_GETHOSTBYNAME_LOCK
3140 PyThread_acquire_lock(netdb_lock
, 1);
3142 h
= gethostbyname(name
);
3143 #endif /* HAVE_GETHOSTBYNAME_R */
3144 Py_END_ALLOW_THREADS
3145 /* Some C libraries would require addr.__ss_family instead of
3147 Therefore, we cast the sockaddr_storage into sockaddr to
3148 access sa_family. */
3149 sa
= (struct sockaddr
*)&addr
;
3150 ret
= gethost_common(h
, (struct sockaddr
*)&addr
, sizeof(addr
),
3152 #ifdef USE_GETHOSTBYNAME_LOCK
3153 PyThread_release_lock(netdb_lock
);
3158 PyDoc_STRVAR(ghbn_ex_doc
,
3159 "gethostbyname_ex(host) -> (name, aliaslist, addresslist)\n\
3161 Return the true host name, a list of aliases, and a list of IP addresses,\n\
3162 for a host. The host argument is a string giving a host name or IP number.");
3165 /* Python interface to gethostbyaddr(IP). */
3169 socket_gethostbyaddr(PyObject
*self
, PyObject
*args
)
3172 struct sockaddr_storage addr
;
3174 struct sockaddr_in addr
;
3176 struct sockaddr
*sa
= (struct sockaddr
*)&addr
;
3180 #ifdef HAVE_GETHOSTBYNAME_R
3181 struct hostent hp_allocated
;
3182 #ifdef HAVE_GETHOSTBYNAME_R_3_ARG
3183 struct hostent_data data
;
3185 /* glibcs up to 2.10 assume that the buf argument to
3186 gethostbyaddr_r is 8-byte aligned, which at least llvm-gcc
3187 does not ensure. The attribute below instructs the compiler
3188 to maintain this alignment. */
3189 char buf
[16384] Py_ALIGNED(8);
3190 int buf_len
= (sizeof buf
) - 1;
3193 #if defined(HAVE_GETHOSTBYNAME_R_3_ARG) || defined(HAVE_GETHOSTBYNAME_R_6_ARG)
3196 #endif /* HAVE_GETHOSTBYNAME_R */
3201 if (!PyArg_ParseTuple(args
, "s:gethostbyaddr", &ip_num
))
3204 if (setipaddr(ip_num
, sa
, sizeof(addr
), af
) < 0)
3211 ap
= (char *)&((struct sockaddr_in
*)sa
)->sin_addr
;
3212 al
= sizeof(((struct sockaddr_in
*)sa
)->sin_addr
);
3216 ap
= (char *)&((struct sockaddr_in6
*)sa
)->sin6_addr
;
3217 al
= sizeof(((struct sockaddr_in6
*)sa
)->sin6_addr
);
3221 PyErr_SetString(socket_error
, "unsupported address family");
3224 Py_BEGIN_ALLOW_THREADS
3225 #ifdef HAVE_GETHOSTBYNAME_R
3226 #if defined(HAVE_GETHOSTBYNAME_R_6_ARG)
3227 result
= gethostbyaddr_r(ap
, al
, af
,
3228 &hp_allocated
, buf
, buf_len
,
3230 #elif defined(HAVE_GETHOSTBYNAME_R_5_ARG)
3231 h
= gethostbyaddr_r(ap
, al
, af
,
3232 &hp_allocated
, buf
, buf_len
, &errnop
);
3233 #else /* HAVE_GETHOSTBYNAME_R_3_ARG */
3234 memset((void *) &data
, '\0', sizeof(data
));
3235 result
= gethostbyaddr_r(ap
, al
, af
, &hp_allocated
, &data
);
3236 h
= (result
!= 0) ? NULL
: &hp_allocated
;
3238 #else /* not HAVE_GETHOSTBYNAME_R */
3239 #ifdef USE_GETHOSTBYNAME_LOCK
3240 PyThread_acquire_lock(netdb_lock
, 1);
3242 h
= gethostbyaddr(ap
, al
, af
);
3243 #endif /* HAVE_GETHOSTBYNAME_R */
3244 Py_END_ALLOW_THREADS
3245 ret
= gethost_common(h
, (struct sockaddr
*)&addr
, sizeof(addr
), af
);
3246 #ifdef USE_GETHOSTBYNAME_LOCK
3247 PyThread_release_lock(netdb_lock
);
3252 PyDoc_STRVAR(gethostbyaddr_doc
,
3253 "gethostbyaddr(host) -> (name, aliaslist, addresslist)\n\
3255 Return the true host name, a list of aliases, and a list of IP addresses,\n\
3256 for a host. The host argument is a string giving a host name or IP number.");
3259 /* Python interface to getservbyname(name).
3260 This only returns the port number, since the other info is already
3261 known or not useful (like the list of aliases). */
3265 socket_getservbyname(PyObject
*self
, PyObject
*args
)
3267 char *name
, *proto
=NULL
;
3269 if (!PyArg_ParseTuple(args
, "s|s:getservbyname", &name
, &proto
))
3271 Py_BEGIN_ALLOW_THREADS
3272 sp
= getservbyname(name
, proto
);
3273 Py_END_ALLOW_THREADS
3275 PyErr_SetString(socket_error
, "service/proto not found");
3278 return PyLong_FromLong((long) ntohs(sp
->s_port
));
3281 PyDoc_STRVAR(getservbyname_doc
,
3282 "getservbyname(servicename[, protocolname]) -> integer\n\
3284 Return a port number from a service name and protocol name.\n\
3285 The optional protocol name, if given, should be 'tcp' or 'udp',\n\
3286 otherwise any protocol will match.");
3289 /* Python interface to getservbyport(port).
3290 This only returns the service name, since the other info is already
3291 known or not useful (like the list of aliases). */
3295 socket_getservbyport(PyObject
*self
, PyObject
*args
)
3300 if (!PyArg_ParseTuple(args
, "i|s:getservbyport", &port
, &proto
))
3302 if (port
< 0 || port
> 0xffff) {
3304 PyExc_OverflowError
,
3305 "getservbyport: port must be 0-65535.");
3308 Py_BEGIN_ALLOW_THREADS
3309 sp
= getservbyport(htons((short)port
), proto
);
3310 Py_END_ALLOW_THREADS
3312 PyErr_SetString(socket_error
, "port/proto not found");
3315 return PyUnicode_FromString(sp
->s_name
);
3318 PyDoc_STRVAR(getservbyport_doc
,
3319 "getservbyport(port[, protocolname]) -> string\n\
3321 Return the service name from a port number and protocol name.\n\
3322 The optional protocol name, if given, should be 'tcp' or 'udp',\n\
3323 otherwise any protocol will match.");
3325 /* Python interface to getprotobyname(name).
3326 This only returns the protocol number, since the other info is
3327 already known or not useful (like the list of aliases). */
3331 socket_getprotobyname(PyObject
*self
, PyObject
*args
)
3334 struct protoent
*sp
;
3335 if (!PyArg_ParseTuple(args
, "s:getprotobyname", &name
))
3337 Py_BEGIN_ALLOW_THREADS
3338 sp
= getprotobyname(name
);
3339 Py_END_ALLOW_THREADS
3341 PyErr_SetString(socket_error
, "protocol not found");
3344 return PyLong_FromLong((long) sp
->p_proto
);
3347 PyDoc_STRVAR(getprotobyname_doc
,
3348 "getprotobyname(name) -> integer\n\
3350 Return the protocol number for the named protocol. (Rarely used.)");
3354 /* dup() function for socket fds */
3357 socket_dup(PyObject
*self
, PyObject
*fdobj
)
3363 fd
= PyLong_AsSocket_t(fdobj
);
3364 if (fd
== (SOCKET_T
)(-1) && PyErr_Occurred())
3367 newfd
= dup_socket(fd
);
3368 if (newfd
== INVALID_SOCKET
)
3371 newfdobj
= PyLong_FromSocket_t(newfd
);
3372 if (newfdobj
== NULL
)
3377 PyDoc_STRVAR(dup_doc
,
3378 "dup(integer) -> integer\n\
3380 Duplicate an integer socket file descriptor. This is like os.dup(), but for\n\
3381 sockets; on some platforms os.dup() won't work for socket file descriptors.");
3385 #ifdef HAVE_SOCKETPAIR
3386 /* Create a pair of sockets using the socketpair() function.
3387 Arguments as for socket() except the default family is AF_UNIX if
3388 defined on the platform; otherwise, the default is AF_INET. */
3392 socket_socketpair(PyObject
*self
, PyObject
*args
)
3394 PySocketSockObject
*s0
= NULL
, *s1
= NULL
;
3396 int family
, type
= SOCK_STREAM
, proto
= 0;
3397 PyObject
*res
= NULL
;
3399 #if defined(AF_UNIX)
3404 if (!PyArg_ParseTuple(args
, "|iii:socketpair",
3405 &family
, &type
, &proto
))
3407 /* Create a pair of socket fds */
3408 if (socketpair(family
, type
, proto
, sv
) < 0)
3410 s0
= new_sockobject(sv
[0], family
, type
, proto
);
3413 s1
= new_sockobject(sv
[1], family
, type
, proto
);
3416 res
= PyTuple_Pack(2, s0
, s1
);
3430 PyDoc_STRVAR(socketpair_doc
,
3431 "socketpair([family[, type[, proto]]]) -> (socket object, socket object)\n\
3433 Create a pair of socket objects from the sockets returned by the platform\n\
3434 socketpair() function.\n\
3435 The arguments are the same as for socket() except the default family is\n\
3436 AF_UNIX if defined on the platform; otherwise, the default is AF_INET.");
3438 #endif /* HAVE_SOCKETPAIR */
3442 socket_ntohs(PyObject
*self
, PyObject
*args
)
3446 if (!PyArg_ParseTuple(args
, "i:ntohs", &x1
)) {
3450 PyErr_SetString(PyExc_OverflowError
,
3451 "can't convert negative number to unsigned long");
3454 x2
= (unsigned int)ntohs((unsigned short)x1
);
3455 return PyLong_FromLong(x2
);
3458 PyDoc_STRVAR(ntohs_doc
,
3459 "ntohs(integer) -> integer\n\
3461 Convert a 16-bit integer from network to host byte order.");
3465 socket_ntohl(PyObject
*self
, PyObject
*arg
)
3469 if (PyLong_Check(arg
)) {
3470 x
= PyLong_AsUnsignedLong(arg
);
3471 if (x
== (unsigned long) -1 && PyErr_Occurred())
3476 /* only want the trailing 32 bits */
3477 y
= x
& 0xFFFFFFFFUL
;
3479 return PyErr_Format(PyExc_OverflowError
,
3480 "long int larger than 32 bits");
3486 return PyErr_Format(PyExc_TypeError
,
3487 "expected int/long, %s found",
3488 Py_TYPE(arg
)->tp_name
);
3489 if (x
== (unsigned long) -1 && PyErr_Occurred())
3491 return PyLong_FromUnsignedLong(ntohl(x
));
3494 PyDoc_STRVAR(ntohl_doc
,
3495 "ntohl(integer) -> integer\n\
3497 Convert a 32-bit integer from network to host byte order.");
3501 socket_htons(PyObject
*self
, PyObject
*args
)
3505 if (!PyArg_ParseTuple(args
, "i:htons", &x1
)) {
3509 PyErr_SetString(PyExc_OverflowError
,
3510 "can't convert negative number to unsigned long");
3513 x2
= (unsigned int)htons((unsigned short)x1
);
3514 return PyLong_FromLong(x2
);
3517 PyDoc_STRVAR(htons_doc
,
3518 "htons(integer) -> integer\n\
3520 Convert a 16-bit integer from host to network byte order.");
3524 socket_htonl(PyObject
*self
, PyObject
*arg
)
3528 if (PyLong_Check(arg
)) {
3529 x
= PyLong_AsUnsignedLong(arg
);
3530 if (x
== (unsigned long) -1 && PyErr_Occurred())
3535 /* only want the trailing 32 bits */
3536 y
= x
& 0xFFFFFFFFUL
;
3538 return PyErr_Format(PyExc_OverflowError
,
3539 "long int larger than 32 bits");
3545 return PyErr_Format(PyExc_TypeError
,
3546 "expected int/long, %s found",
3547 Py_TYPE(arg
)->tp_name
);
3548 return PyLong_FromUnsignedLong(htonl((unsigned long)x
));
3551 PyDoc_STRVAR(htonl_doc
,
3552 "htonl(integer) -> integer\n\
3554 Convert a 32-bit integer from host to network byte order.");
3556 /* socket.inet_aton() and socket.inet_ntoa() functions. */
3558 PyDoc_STRVAR(inet_aton_doc
,
3559 "inet_aton(string) -> bytes giving packed 32-bit IP representation\n\
3561 Convert an IP address in string format (123.45.67.89) to the 32-bit packed\n\
3562 binary format used in low-level network functions.");
3565 socket_inet_aton(PyObject
*self
, PyObject
*args
)
3568 #define INADDR_NONE (-1)
3570 #ifdef HAVE_INET_ATON
3574 #if !defined(HAVE_INET_ATON) || defined(USE_INET_ATON_WEAKLINK)
3575 #if (SIZEOF_INT != 4)
3576 #error "Not sure if in_addr_t exists and int is not 32-bits."
3578 /* Have to use inet_addr() instead */
3579 unsigned int packed_addr
;
3583 if (!PyArg_ParseTuple(args
, "s:inet_aton", &ip_addr
))
3587 #ifdef HAVE_INET_ATON
3589 #ifdef USE_INET_ATON_WEAKLINK
3590 if (inet_aton
!= NULL
) {
3592 if (inet_aton(ip_addr
, &buf
))
3593 return PyBytes_FromStringAndSize((char *)(&buf
),
3596 PyErr_SetString(socket_error
,
3597 "illegal IP address string passed to inet_aton");
3600 #ifdef USE_INET_ATON_WEAKLINK
3606 #if !defined(HAVE_INET_ATON) || defined(USE_INET_ATON_WEAKLINK)
3608 /* special-case this address as inet_addr might return INADDR_NONE
3610 if (strcmp(ip_addr
, "255.255.255.255") == 0) {
3611 packed_addr
= 0xFFFFFFFF;
3614 packed_addr
= inet_addr(ip_addr
);
3616 if (packed_addr
== INADDR_NONE
) { /* invalid address */
3617 PyErr_SetString(socket_error
,
3618 "illegal IP address string passed to inet_aton");
3622 return PyBytes_FromStringAndSize((char *) &packed_addr
,
3623 sizeof(packed_addr
));
3625 #ifdef USE_INET_ATON_WEAKLINK
3632 PyDoc_STRVAR(inet_ntoa_doc
,
3633 "inet_ntoa(packed_ip) -> ip_address_string\n\
3635 Convert an IP address from 32-bit packed binary format to string format");
3638 socket_inet_ntoa(PyObject
*self
, PyObject
*args
)
3642 struct in_addr packed_addr
;
3644 if (!PyArg_ParseTuple(args
, "y#:inet_ntoa", &packed_str
, &addr_len
)) {
3648 if (addr_len
!= sizeof(packed_addr
)) {
3649 PyErr_SetString(socket_error
,
3650 "packed IP wrong length for inet_ntoa");
3654 memcpy(&packed_addr
, packed_str
, addr_len
);
3656 return PyUnicode_FromString(inet_ntoa(packed_addr
));
3659 #ifdef HAVE_INET_PTON
3661 PyDoc_STRVAR(inet_pton_doc
,
3662 "inet_pton(af, ip) -> packed IP address string\n\
3664 Convert an IP address from string format to a packed string suitable\n\
3665 for use with low-level network functions.");
3668 socket_inet_pton(PyObject
*self
, PyObject
*args
)
3674 char packed
[MAX(sizeof(struct in_addr
), sizeof(struct in6_addr
))];
3676 char packed
[sizeof(struct in_addr
)];
3678 if (!PyArg_ParseTuple(args
, "is:inet_pton", &af
, &ip
)) {
3682 #if !defined(ENABLE_IPV6) && defined(AF_INET6)
3683 if(af
== AF_INET6
) {
3684 PyErr_SetString(socket_error
,
3685 "can't use AF_INET6, IPv6 is disabled");
3690 retval
= inet_pton(af
, ip
, packed
);
3692 PyErr_SetFromErrno(socket_error
);
3694 } else if (retval
== 0) {
3695 PyErr_SetString(socket_error
,
3696 "illegal IP address string passed to inet_pton");
3698 } else if (af
== AF_INET
) {
3699 return PyBytes_FromStringAndSize(packed
,
3700 sizeof(struct in_addr
));
3702 } else if (af
== AF_INET6
) {
3703 return PyBytes_FromStringAndSize(packed
,
3704 sizeof(struct in6_addr
));
3707 PyErr_SetString(socket_error
, "unknown address family");
3712 PyDoc_STRVAR(inet_ntop_doc
,
3713 "inet_ntop(af, packed_ip) -> string formatted IP address\n\
3715 Convert a packed IP address of the given family to string format.");
3718 socket_inet_ntop(PyObject
*self
, PyObject
*args
)
3725 char ip
[MAX(INET_ADDRSTRLEN
, INET6_ADDRSTRLEN
) + 1];
3727 char ip
[INET_ADDRSTRLEN
+ 1];
3730 /* Guarantee NUL-termination for PyUnicode_FromString() below */
3731 memset((void *) &ip
[0], '\0', sizeof(ip
));
3733 if (!PyArg_ParseTuple(args
, "iy#:inet_ntop", &af
, &packed
, &len
)) {
3737 if (af
== AF_INET
) {
3738 if (len
!= sizeof(struct in_addr
)) {
3739 PyErr_SetString(PyExc_ValueError
,
3740 "invalid length of packed IP address string");
3744 } else if (af
== AF_INET6
) {
3745 if (len
!= sizeof(struct in6_addr
)) {
3746 PyErr_SetString(PyExc_ValueError
,
3747 "invalid length of packed IP address string");
3752 PyErr_Format(PyExc_ValueError
,
3753 "unknown address family %d", af
);
3757 retval
= inet_ntop(af
, packed
, ip
, sizeof(ip
));
3759 PyErr_SetFromErrno(socket_error
);
3762 return PyUnicode_FromString(retval
);
3766 PyErr_SetString(PyExc_RuntimeError
, "invalid handling of inet_ntop");
3770 #endif /* HAVE_INET_PTON */
3772 /* Python interface to getaddrinfo(host, port). */
3776 socket_getaddrinfo(PyObject
*self
, PyObject
*args
)
3778 struct addrinfo hints
, *res
;
3779 struct addrinfo
*res0
= NULL
;
3780 PyObject
*hobj
= NULL
;
3781 PyObject
*pobj
= (PyObject
*)NULL
;
3784 int family
, socktype
, protocol
, flags
;
3786 PyObject
*all
= (PyObject
*)NULL
;
3787 PyObject
*idna
= NULL
;
3789 family
= socktype
= protocol
= flags
= 0;
3791 if (!PyArg_ParseTuple(args
, "OO|iiii:getaddrinfo",
3792 &hobj
, &pobj
, &family
, &socktype
,
3793 &protocol
, &flags
)) {
3796 if (hobj
== Py_None
) {
3798 } else if (PyUnicode_Check(hobj
)) {
3799 idna
= PyObject_CallMethod(hobj
, "encode", "s", "idna");
3802 assert(PyBytes_Check(idna
));
3803 hptr
= PyBytes_AS_STRING(idna
);
3804 } else if (PyBytes_Check(hobj
)) {
3805 hptr
= PyBytes_AsString(hobj
);
3807 PyErr_SetString(PyExc_TypeError
,
3808 "getaddrinfo() argument 1 must be string or None");
3811 if (PyLong_CheckExact(pobj
)) {
3812 long value
= PyLong_AsLong(pobj
);
3813 if (value
== -1 && PyErr_Occurred())
3815 PyOS_snprintf(pbuf
, sizeof(pbuf
), "%ld", value
);
3817 } else if (PyUnicode_Check(pobj
)) {
3818 pptr
= _PyUnicode_AsString(pobj
);
3819 } else if (PyBytes_Check(pobj
)) {
3820 pptr
= PyBytes_AsString(pobj
);
3821 } else if (pobj
== Py_None
) {
3822 pptr
= (char *)NULL
;
3824 PyErr_SetString(socket_error
, "Int or String expected");
3827 memset(&hints
, 0, sizeof(hints
));
3828 hints
.ai_family
= family
;
3829 hints
.ai_socktype
= socktype
;
3830 hints
.ai_protocol
= protocol
;
3831 hints
.ai_flags
= flags
;
3832 Py_BEGIN_ALLOW_THREADS
3833 ACQUIRE_GETADDRINFO_LOCK
3834 error
= getaddrinfo(hptr
, pptr
, &hints
, &res0
);
3835 Py_END_ALLOW_THREADS
3836 RELEASE_GETADDRINFO_LOCK
/* see comment in setipaddr() */
3838 set_gaierror(error
);
3842 if ((all
= PyList_New(0)) == NULL
)
3844 for (res
= res0
; res
; res
= res
->ai_next
) {
3847 makesockaddr(-1, res
->ai_addr
, res
->ai_addrlen
, protocol
);
3850 single
= Py_BuildValue("iiisO", res
->ai_family
,
3851 res
->ai_socktype
, res
->ai_protocol
,
3852 res
->ai_canonname
? res
->ai_canonname
: "",
3858 if (PyList_Append(all
, single
))
3871 return (PyObject
*)NULL
;
3874 PyDoc_STRVAR(getaddrinfo_doc
,
3875 "getaddrinfo(host, port [, family, socktype, proto, flags])\n\
3876 -> list of (family, socktype, proto, canonname, sockaddr)\n\
3878 Resolve host and port into addrinfo struct.");
3880 /* Python interface to getnameinfo(sa, flags). */
3884 socket_getnameinfo(PyObject
*self
, PyObject
*args
)
3886 PyObject
*sa
= (PyObject
*)NULL
;
3889 int port
, flowinfo
, scope_id
;
3890 char hbuf
[NI_MAXHOST
], pbuf
[NI_MAXSERV
];
3891 struct addrinfo hints
, *res
= NULL
;
3893 PyObject
*ret
= (PyObject
*)NULL
;
3895 flags
= flowinfo
= scope_id
= 0;
3896 if (!PyArg_ParseTuple(args
, "Oi:getnameinfo", &sa
, &flags
))
3898 if (!PyTuple_Check(sa
)) {
3899 PyErr_SetString(PyExc_TypeError
,
3900 "getnameinfo() argument 1 must be a tuple");
3903 if (!PyArg_ParseTuple(sa
, "si|ii",
3904 &hostp
, &port
, &flowinfo
, &scope_id
))
3906 PyOS_snprintf(pbuf
, sizeof(pbuf
), "%d", port
);
3907 memset(&hints
, 0, sizeof(hints
));
3908 hints
.ai_family
= AF_UNSPEC
;
3909 hints
.ai_socktype
= SOCK_DGRAM
; /* make numeric port happy */
3910 Py_BEGIN_ALLOW_THREADS
3911 ACQUIRE_GETADDRINFO_LOCK
3912 error
= getaddrinfo(hostp
, pbuf
, &hints
, &res
);
3913 Py_END_ALLOW_THREADS
3914 RELEASE_GETADDRINFO_LOCK
/* see comment in setipaddr() */
3916 set_gaierror(error
);
3920 PyErr_SetString(socket_error
,
3921 "sockaddr resolved to multiple addresses");
3924 switch (res
->ai_family
) {
3927 if (PyTuple_GET_SIZE(sa
) != 2) {
3928 PyErr_SetString(socket_error
,
3929 "IPv4 sockaddr must be 2 tuple");
3937 struct sockaddr_in6
*sin6
;
3938 sin6
= (struct sockaddr_in6
*)res
->ai_addr
;
3939 sin6
->sin6_flowinfo
= flowinfo
;
3940 sin6
->sin6_scope_id
= scope_id
;
3945 error
= getnameinfo(res
->ai_addr
, res
->ai_addrlen
,
3946 hbuf
, sizeof(hbuf
), pbuf
, sizeof(pbuf
), flags
);
3948 set_gaierror(error
);
3951 ret
= Py_BuildValue("ss", hbuf
, pbuf
);
3959 PyDoc_STRVAR(getnameinfo_doc
,
3960 "getnameinfo(sockaddr, flags) --> (host, port)\n\
3962 Get host and port for a sockaddr.");
3965 /* Python API to getting and setting the default timeout value. */
3968 socket_getdefaulttimeout(PyObject
*self
)
3970 if (defaulttimeout
< 0.0) {
3975 return PyFloat_FromDouble(defaulttimeout
);
3978 PyDoc_STRVAR(getdefaulttimeout_doc
,
3979 "getdefaulttimeout() -> timeout\n\
3981 Returns the default timeout in floating seconds for new socket objects.\n\
3982 A value of None indicates that new socket objects have no timeout.\n\
3983 When the socket module is first imported, the default is None.");
3986 socket_setdefaulttimeout(PyObject
*self
, PyObject
*arg
)
3993 timeout
= PyFloat_AsDouble(arg
);
3994 if (timeout
< 0.0) {
3995 if (!PyErr_Occurred())
3996 PyErr_SetString(PyExc_ValueError
,
3997 "Timeout value out of range");
4002 defaulttimeout
= timeout
;
4008 PyDoc_STRVAR(setdefaulttimeout_doc
,
4009 "setdefaulttimeout(timeout)\n\
4011 Set the default timeout in floating seconds for new socket objects.\n\
4012 A value of None indicates that new socket objects have no timeout.\n\
4013 When the socket module is first imported, the default is None.");
4016 /* List of functions exported by this module. */
4018 static PyMethodDef socket_methods
[] = {
4019 {"gethostbyname", socket_gethostbyname
,
4020 METH_VARARGS
, gethostbyname_doc
},
4021 {"gethostbyname_ex", socket_gethostbyname_ex
,
4022 METH_VARARGS
, ghbn_ex_doc
},
4023 {"gethostbyaddr", socket_gethostbyaddr
,
4024 METH_VARARGS
, gethostbyaddr_doc
},
4025 {"gethostname", socket_gethostname
,
4026 METH_NOARGS
, gethostname_doc
},
4027 {"getservbyname", socket_getservbyname
,
4028 METH_VARARGS
, getservbyname_doc
},
4029 {"getservbyport", socket_getservbyport
,
4030 METH_VARARGS
, getservbyport_doc
},
4031 {"getprotobyname", socket_getprotobyname
,
4032 METH_VARARGS
, getprotobyname_doc
},
4037 #ifdef HAVE_SOCKETPAIR
4038 {"socketpair", socket_socketpair
,
4039 METH_VARARGS
, socketpair_doc
},
4041 {"ntohs", socket_ntohs
,
4042 METH_VARARGS
, ntohs_doc
},
4043 {"ntohl", socket_ntohl
,
4045 {"htons", socket_htons
,
4046 METH_VARARGS
, htons_doc
},
4047 {"htonl", socket_htonl
,
4049 {"inet_aton", socket_inet_aton
,
4050 METH_VARARGS
, inet_aton_doc
},
4051 {"inet_ntoa", socket_inet_ntoa
,
4052 METH_VARARGS
, inet_ntoa_doc
},
4053 #ifdef HAVE_INET_PTON
4054 {"inet_pton", socket_inet_pton
,
4055 METH_VARARGS
, inet_pton_doc
},
4056 {"inet_ntop", socket_inet_ntop
,
4057 METH_VARARGS
, inet_ntop_doc
},
4059 {"getaddrinfo", socket_getaddrinfo
,
4060 METH_VARARGS
, getaddrinfo_doc
},
4061 {"getnameinfo", socket_getnameinfo
,
4062 METH_VARARGS
, getnameinfo_doc
},
4063 {"getdefaulttimeout", (PyCFunction
)socket_getdefaulttimeout
,
4064 METH_NOARGS
, getdefaulttimeout_doc
},
4065 {"setdefaulttimeout", socket_setdefaulttimeout
,
4066 METH_O
, setdefaulttimeout_doc
},
4067 {NULL
, NULL
} /* Sentinel */
4072 #define OS_INIT_DEFINED
4074 /* Additional initialization and cleanup for Windows */
4087 ret
= WSAStartup(0x0101, &WSAData
);
4089 case 0: /* No error */
4090 Py_AtExit(os_cleanup
);
4091 return 1; /* Success */
4092 case WSASYSNOTREADY
:
4093 PyErr_SetString(PyExc_ImportError
,
4094 "WSAStartup failed: network not ready");
4096 case WSAVERNOTSUPPORTED
:
4100 "WSAStartup failed: requested version not supported");
4103 PyErr_Format(PyExc_ImportError
, "WSAStartup failed: error code %d", ret
);
4106 return 0; /* Failure */
4109 #endif /* MS_WINDOWS */
4113 #define OS_INIT_DEFINED
4115 /* Additional initialization for OS/2 */
4121 int rc
= sock_init();
4124 return 1; /* Success */
4127 PyErr_Format(PyExc_ImportError
, "OS/2 TCP/IP Error# %d", sock_errno());
4129 return 0; /* Failure */
4131 /* No need to initialise sockets with GCC/EMX */
4132 return 1; /* Success */
4136 #endif /* PYOS_OS2 */
4139 #ifndef OS_INIT_DEFINED
4143 return 1; /* Success */
4148 /* C API table - always add new things to the end for binary
4151 PySocketModule_APIObject PySocketModuleAPI
=
4158 /* Initialize the _socket module.
4160 This module is actually called "_socket", and there's a wrapper
4161 "socket.py" which implements some additional functionality.
4162 The import of "_socket" may fail with an ImportError exception if
4163 os-specific initialization fails. On Windows, this does WINSOCK
4164 initialization. When WINSOCK is initialized succesfully, a call to
4165 WSACleanup() is scheduled to be made at exit time.
4168 PyDoc_STRVAR(socket_doc
,
4169 "Implementation module for socket operations.\n\
4171 See the socket module for documentation.");
4173 static struct PyModuleDef socketmodule
= {
4174 PyModuleDef_HEAD_INIT
,
4175 PySocket_MODULE_NAME
,
4186 PyInit__socket(void)
4188 PyObject
*m
, *has_ipv6
;
4193 Py_TYPE(&sock_type
) = &PyType_Type
;
4194 m
= PyModule_Create(&socketmodule
);
4198 socket_error
= PyErr_NewException("socket.error",
4199 PyExc_IOError
, NULL
);
4200 if (socket_error
== NULL
)
4202 PySocketModuleAPI
.error
= socket_error
;
4203 Py_INCREF(socket_error
);
4204 PyModule_AddObject(m
, "error", socket_error
);
4205 socket_herror
= PyErr_NewException("socket.herror",
4206 socket_error
, NULL
);
4207 if (socket_herror
== NULL
)
4209 Py_INCREF(socket_herror
);
4210 PyModule_AddObject(m
, "herror", socket_herror
);
4211 socket_gaierror
= PyErr_NewException("socket.gaierror", socket_error
,
4213 if (socket_gaierror
== NULL
)
4215 Py_INCREF(socket_gaierror
);
4216 PyModule_AddObject(m
, "gaierror", socket_gaierror
);
4217 socket_timeout
= PyErr_NewException("socket.timeout",
4218 socket_error
, NULL
);
4219 if (socket_timeout
== NULL
)
4221 Py_INCREF(socket_timeout
);
4222 PyModule_AddObject(m
, "timeout", socket_timeout
);
4223 Py_INCREF((PyObject
*)&sock_type
);
4224 if (PyModule_AddObject(m
, "SocketType",
4225 (PyObject
*)&sock_type
) != 0)
4227 Py_INCREF((PyObject
*)&sock_type
);
4228 if (PyModule_AddObject(m
, "socket",
4229 (PyObject
*)&sock_type
) != 0)
4235 has_ipv6
= Py_False
;
4237 Py_INCREF(has_ipv6
);
4238 PyModule_AddObject(m
, "has_ipv6", has_ipv6
);
4241 if (PyModule_AddObject(m
, PySocket_CAPI_NAME
,
4242 PyCapsule_New(&PySocketModuleAPI
, PySocket_CAPSULE_NAME
, NULL
)
4246 /* Address families (we only support AF_INET and AF_UNIX) */
4248 PyModule_AddIntConstant(m
, "AF_UNSPEC", AF_UNSPEC
);
4250 PyModule_AddIntConstant(m
, "AF_INET", AF_INET
);
4252 PyModule_AddIntConstant(m
, "AF_INET6", AF_INET6
);
4253 #endif /* AF_INET6 */
4254 #if defined(AF_UNIX)
4255 PyModule_AddIntConstant(m
, "AF_UNIX", AF_UNIX
);
4256 #endif /* AF_UNIX */
4258 /* Amateur Radio AX.25 */
4259 PyModule_AddIntConstant(m
, "AF_AX25", AF_AX25
);
4262 PyModule_AddIntConstant(m
, "AF_IPX", AF_IPX
); /* Novell IPX */
4266 PyModule_AddIntConstant(m
, "AF_APPLETALK", AF_APPLETALK
);
4269 /* Amateur radio NetROM */
4270 PyModule_AddIntConstant(m
, "AF_NETROM", AF_NETROM
);
4273 /* Multiprotocol bridge */
4274 PyModule_AddIntConstant(m
, "AF_BRIDGE", AF_BRIDGE
);
4278 PyModule_AddIntConstant(m
, "AF_ATMPVC", AF_ATMPVC
);
4281 /* Reserved for Werner's ATM */
4282 PyModule_AddIntConstant(m
, "AF_AAL5", AF_AAL5
);
4285 /* Reserved for X.25 project */
4286 PyModule_AddIntConstant(m
, "AF_X25", AF_X25
);
4289 PyModule_AddIntConstant(m
, "AF_INET6", AF_INET6
); /* IP version 6 */
4292 /* Amateur Radio X.25 PLP */
4293 PyModule_AddIntConstant(m
, "AF_ROSE", AF_ROSE
);
4296 /* Reserved for DECnet project */
4297 PyModule_AddIntConstant(m
, "AF_DECnet", AF_DECnet
);
4300 /* Reserved for 802.2LLC project */
4301 PyModule_AddIntConstant(m
, "AF_NETBEUI", AF_NETBEUI
);
4304 /* Security callback pseudo AF */
4305 PyModule_AddIntConstant(m
, "AF_SECURITY", AF_SECURITY
);
4308 /* PF_KEY key management API */
4309 PyModule_AddIntConstant(m
, "AF_KEY", AF_KEY
);
4313 PyModule_AddIntConstant(m
, "AF_NETLINK", AF_NETLINK
);
4314 PyModule_AddIntConstant(m
, "NETLINK_ROUTE", NETLINK_ROUTE
);
4316 PyModule_AddIntConstant(m
, "NETLINK_SKIP", NETLINK_SKIP
);
4319 PyModule_AddIntConstant(m
, "NETLINK_W1", NETLINK_W1
);
4321 PyModule_AddIntConstant(m
, "NETLINK_USERSOCK", NETLINK_USERSOCK
);
4322 PyModule_AddIntConstant(m
, "NETLINK_FIREWALL", NETLINK_FIREWALL
);
4323 #ifdef NETLINK_TCPDIAG
4324 PyModule_AddIntConstant(m
, "NETLINK_TCPDIAG", NETLINK_TCPDIAG
);
4326 #ifdef NETLINK_NFLOG
4327 PyModule_AddIntConstant(m
, "NETLINK_NFLOG", NETLINK_NFLOG
);
4330 PyModule_AddIntConstant(m
, "NETLINK_XFRM", NETLINK_XFRM
);
4333 PyModule_AddIntConstant(m
, "NETLINK_ARPD", NETLINK_ARPD
);
4335 #ifdef NETLINK_ROUTE6
4336 PyModule_AddIntConstant(m
, "NETLINK_ROUTE6", NETLINK_ROUTE6
);
4338 PyModule_AddIntConstant(m
, "NETLINK_IP6_FW", NETLINK_IP6_FW
);
4339 #ifdef NETLINK_DNRTMSG
4340 PyModule_AddIntConstant(m
, "NETLINK_DNRTMSG", NETLINK_DNRTMSG
);
4342 #ifdef NETLINK_TAPBASE
4343 PyModule_AddIntConstant(m
, "NETLINK_TAPBASE", NETLINK_TAPBASE
);
4345 #endif /* AF_NETLINK */
4347 /* Alias to emulate 4.4BSD */
4348 PyModule_AddIntConstant(m
, "AF_ROUTE", AF_ROUTE
);
4352 PyModule_AddIntConstant(m
, "AF_ASH", AF_ASH
);
4356 PyModule_AddIntConstant(m
, "AF_ECONET", AF_ECONET
);
4360 PyModule_AddIntConstant(m
, "AF_ATMSVC", AF_ATMSVC
);
4363 /* Linux SNA Project (nutters!) */
4364 PyModule_AddIntConstant(m
, "AF_SNA", AF_SNA
);
4368 PyModule_AddIntConstant(m
, "AF_IRDA", AF_IRDA
);
4372 PyModule_AddIntConstant(m
, "AF_PPPOX", AF_PPPOX
);
4375 /* Wanpipe API Sockets */
4376 PyModule_AddIntConstant(m
, "AF_WANPIPE", AF_WANPIPE
);
4380 PyModule_AddIntConstant(m
, "AF_LLC", AF_LLC
);
4383 #ifdef USE_BLUETOOTH
4384 PyModule_AddIntConstant(m
, "AF_BLUETOOTH", AF_BLUETOOTH
);
4385 PyModule_AddIntConstant(m
, "BTPROTO_L2CAP", BTPROTO_L2CAP
);
4386 PyModule_AddIntConstant(m
, "BTPROTO_HCI", BTPROTO_HCI
);
4387 PyModule_AddIntConstant(m
, "SOL_HCI", SOL_HCI
);
4388 PyModule_AddIntConstant(m
, "HCI_FILTER", HCI_FILTER
);
4389 #if !defined(__FreeBSD__)
4390 PyModule_AddIntConstant(m
, "HCI_TIME_STAMP", HCI_TIME_STAMP
);
4391 PyModule_AddIntConstant(m
, "HCI_DATA_DIR", HCI_DATA_DIR
);
4392 PyModule_AddIntConstant(m
, "BTPROTO_SCO", BTPROTO_SCO
);
4394 PyModule_AddIntConstant(m
, "BTPROTO_RFCOMM", BTPROTO_RFCOMM
);
4395 PyModule_AddStringConstant(m
, "BDADDR_ANY", "00:00:00:00:00:00");
4396 PyModule_AddStringConstant(m
, "BDADDR_LOCAL", "00:00:00:FF:FF:FF");
4399 #ifdef HAVE_NETPACKET_PACKET_H
4400 PyModule_AddIntConstant(m
, "AF_PACKET", AF_PACKET
);
4401 PyModule_AddIntConstant(m
, "PF_PACKET", PF_PACKET
);
4402 PyModule_AddIntConstant(m
, "PACKET_HOST", PACKET_HOST
);
4403 PyModule_AddIntConstant(m
, "PACKET_BROADCAST", PACKET_BROADCAST
);
4404 PyModule_AddIntConstant(m
, "PACKET_MULTICAST", PACKET_MULTICAST
);
4405 PyModule_AddIntConstant(m
, "PACKET_OTHERHOST", PACKET_OTHERHOST
);
4406 PyModule_AddIntConstant(m
, "PACKET_OUTGOING", PACKET_OUTGOING
);
4407 PyModule_AddIntConstant(m
, "PACKET_LOOPBACK", PACKET_LOOPBACK
);
4408 PyModule_AddIntConstant(m
, "PACKET_FASTROUTE", PACKET_FASTROUTE
);
4411 #ifdef HAVE_LINUX_TIPC_H
4412 PyModule_AddIntConstant(m
, "AF_TIPC", AF_TIPC
);
4415 PyModule_AddIntConstant(m
, "TIPC_ADDR_NAMESEQ", TIPC_ADDR_NAMESEQ
);
4416 PyModule_AddIntConstant(m
, "TIPC_ADDR_NAME", TIPC_ADDR_NAME
);
4417 PyModule_AddIntConstant(m
, "TIPC_ADDR_ID", TIPC_ADDR_ID
);
4419 PyModule_AddIntConstant(m
, "TIPC_ZONE_SCOPE", TIPC_ZONE_SCOPE
);
4420 PyModule_AddIntConstant(m
, "TIPC_CLUSTER_SCOPE", TIPC_CLUSTER_SCOPE
);
4421 PyModule_AddIntConstant(m
, "TIPC_NODE_SCOPE", TIPC_NODE_SCOPE
);
4423 /* for setsockopt() */
4424 PyModule_AddIntConstant(m
, "SOL_TIPC", SOL_TIPC
);
4425 PyModule_AddIntConstant(m
, "TIPC_IMPORTANCE", TIPC_IMPORTANCE
);
4426 PyModule_AddIntConstant(m
, "TIPC_SRC_DROPPABLE", TIPC_SRC_DROPPABLE
);
4427 PyModule_AddIntConstant(m
, "TIPC_DEST_DROPPABLE",
4428 TIPC_DEST_DROPPABLE
);
4429 PyModule_AddIntConstant(m
, "TIPC_CONN_TIMEOUT", TIPC_CONN_TIMEOUT
);
4431 PyModule_AddIntConstant(m
, "TIPC_LOW_IMPORTANCE",
4432 TIPC_LOW_IMPORTANCE
);
4433 PyModule_AddIntConstant(m
, "TIPC_MEDIUM_IMPORTANCE",
4434 TIPC_MEDIUM_IMPORTANCE
);
4435 PyModule_AddIntConstant(m
, "TIPC_HIGH_IMPORTANCE",
4436 TIPC_HIGH_IMPORTANCE
);
4437 PyModule_AddIntConstant(m
, "TIPC_CRITICAL_IMPORTANCE",
4438 TIPC_CRITICAL_IMPORTANCE
);
4440 /* for subscriptions */
4441 PyModule_AddIntConstant(m
, "TIPC_SUB_PORTS", TIPC_SUB_PORTS
);
4442 PyModule_AddIntConstant(m
, "TIPC_SUB_SERVICE", TIPC_SUB_SERVICE
);
4443 #ifdef TIPC_SUB_CANCEL
4444 /* doesn't seem to be available everywhere */
4445 PyModule_AddIntConstant(m
, "TIPC_SUB_CANCEL", TIPC_SUB_CANCEL
);
4447 PyModule_AddIntConstant(m
, "TIPC_WAIT_FOREVER", TIPC_WAIT_FOREVER
);
4448 PyModule_AddIntConstant(m
, "TIPC_PUBLISHED", TIPC_PUBLISHED
);
4449 PyModule_AddIntConstant(m
, "TIPC_WITHDRAWN", TIPC_WITHDRAWN
);
4450 PyModule_AddIntConstant(m
, "TIPC_SUBSCR_TIMEOUT", TIPC_SUBSCR_TIMEOUT
);
4451 PyModule_AddIntConstant(m
, "TIPC_CFG_SRV", TIPC_CFG_SRV
);
4452 PyModule_AddIntConstant(m
, "TIPC_TOP_SRV", TIPC_TOP_SRV
);
4456 PyModule_AddIntConstant(m
, "SOCK_STREAM", SOCK_STREAM
);
4457 PyModule_AddIntConstant(m
, "SOCK_DGRAM", SOCK_DGRAM
);
4458 /* We have incomplete socket support. */
4459 PyModule_AddIntConstant(m
, "SOCK_RAW", SOCK_RAW
);
4460 PyModule_AddIntConstant(m
, "SOCK_SEQPACKET", SOCK_SEQPACKET
);
4461 #if defined(SOCK_RDM)
4462 PyModule_AddIntConstant(m
, "SOCK_RDM", SOCK_RDM
);
4466 PyModule_AddIntConstant(m
, "SO_DEBUG", SO_DEBUG
);
4468 #ifdef SO_ACCEPTCONN
4469 PyModule_AddIntConstant(m
, "SO_ACCEPTCONN", SO_ACCEPTCONN
);
4472 PyModule_AddIntConstant(m
, "SO_REUSEADDR", SO_REUSEADDR
);
4474 #ifdef SO_EXCLUSIVEADDRUSE
4475 PyModule_AddIntConstant(m
, "SO_EXCLUSIVEADDRUSE", SO_EXCLUSIVEADDRUSE
);
4479 PyModule_AddIntConstant(m
, "SO_KEEPALIVE", SO_KEEPALIVE
);
4482 PyModule_AddIntConstant(m
, "SO_DONTROUTE", SO_DONTROUTE
);
4485 PyModule_AddIntConstant(m
, "SO_BROADCAST", SO_BROADCAST
);
4487 #ifdef SO_USELOOPBACK
4488 PyModule_AddIntConstant(m
, "SO_USELOOPBACK", SO_USELOOPBACK
);
4491 PyModule_AddIntConstant(m
, "SO_LINGER", SO_LINGER
);
4494 PyModule_AddIntConstant(m
, "SO_OOBINLINE", SO_OOBINLINE
);
4497 PyModule_AddIntConstant(m
, "SO_REUSEPORT", SO_REUSEPORT
);
4500 PyModule_AddIntConstant(m
, "SO_SNDBUF", SO_SNDBUF
);
4503 PyModule_AddIntConstant(m
, "SO_RCVBUF", SO_RCVBUF
);
4506 PyModule_AddIntConstant(m
, "SO_SNDLOWAT", SO_SNDLOWAT
);
4509 PyModule_AddIntConstant(m
, "SO_RCVLOWAT", SO_RCVLOWAT
);
4512 PyModule_AddIntConstant(m
, "SO_SNDTIMEO", SO_SNDTIMEO
);
4515 PyModule_AddIntConstant(m
, "SO_RCVTIMEO", SO_RCVTIMEO
);
4518 PyModule_AddIntConstant(m
, "SO_ERROR", SO_ERROR
);
4521 PyModule_AddIntConstant(m
, "SO_TYPE", SO_TYPE
);
4524 /* Maximum number of connections for "listen" */
4526 PyModule_AddIntConstant(m
, "SOMAXCONN", SOMAXCONN
);
4528 PyModule_AddIntConstant(m
, "SOMAXCONN", 5); /* Common value */
4531 /* Flags for send, recv */
4533 PyModule_AddIntConstant(m
, "MSG_OOB", MSG_OOB
);
4536 PyModule_AddIntConstant(m
, "MSG_PEEK", MSG_PEEK
);
4538 #ifdef MSG_DONTROUTE
4539 PyModule_AddIntConstant(m
, "MSG_DONTROUTE", MSG_DONTROUTE
);
4542 PyModule_AddIntConstant(m
, "MSG_DONTWAIT", MSG_DONTWAIT
);
4545 PyModule_AddIntConstant(m
, "MSG_EOR", MSG_EOR
);
4548 PyModule_AddIntConstant(m
, "MSG_TRUNC", MSG_TRUNC
);
4551 PyModule_AddIntConstant(m
, "MSG_CTRUNC", MSG_CTRUNC
);
4554 PyModule_AddIntConstant(m
, "MSG_WAITALL", MSG_WAITALL
);
4557 PyModule_AddIntConstant(m
, "MSG_BTAG", MSG_BTAG
);
4560 PyModule_AddIntConstant(m
, "MSG_ETAG", MSG_ETAG
);
4563 /* Protocol level and numbers, usable for [gs]etsockopt */
4565 PyModule_AddIntConstant(m
, "SOL_SOCKET", SOL_SOCKET
);
4568 PyModule_AddIntConstant(m
, "SOL_IP", SOL_IP
);
4570 PyModule_AddIntConstant(m
, "SOL_IP", 0);
4573 PyModule_AddIntConstant(m
, "SOL_IPX", SOL_IPX
);
4576 PyModule_AddIntConstant(m
, "SOL_AX25", SOL_AX25
);
4579 PyModule_AddIntConstant(m
, "SOL_ATALK", SOL_ATALK
);
4582 PyModule_AddIntConstant(m
, "SOL_NETROM", SOL_NETROM
);
4585 PyModule_AddIntConstant(m
, "SOL_ROSE", SOL_ROSE
);
4588 PyModule_AddIntConstant(m
, "SOL_TCP", SOL_TCP
);
4590 PyModule_AddIntConstant(m
, "SOL_TCP", 6);
4593 PyModule_AddIntConstant(m
, "SOL_UDP", SOL_UDP
);
4595 PyModule_AddIntConstant(m
, "SOL_UDP", 17);
4598 PyModule_AddIntConstant(m
, "IPPROTO_IP", IPPROTO_IP
);
4600 PyModule_AddIntConstant(m
, "IPPROTO_IP", 0);
4602 #ifdef IPPROTO_HOPOPTS
4603 PyModule_AddIntConstant(m
, "IPPROTO_HOPOPTS", IPPROTO_HOPOPTS
);
4606 PyModule_AddIntConstant(m
, "IPPROTO_ICMP", IPPROTO_ICMP
);
4608 PyModule_AddIntConstant(m
, "IPPROTO_ICMP", 1);
4611 PyModule_AddIntConstant(m
, "IPPROTO_IGMP", IPPROTO_IGMP
);
4614 PyModule_AddIntConstant(m
, "IPPROTO_GGP", IPPROTO_GGP
);
4617 PyModule_AddIntConstant(m
, "IPPROTO_IPV4", IPPROTO_IPV4
);
4620 PyModule_AddIntConstant(m
, "IPPROTO_IPV6", IPPROTO_IPV6
);
4623 PyModule_AddIntConstant(m
, "IPPROTO_IPIP", IPPROTO_IPIP
);
4626 PyModule_AddIntConstant(m
, "IPPROTO_TCP", IPPROTO_TCP
);
4628 PyModule_AddIntConstant(m
, "IPPROTO_TCP", 6);
4631 PyModule_AddIntConstant(m
, "IPPROTO_EGP", IPPROTO_EGP
);
4634 PyModule_AddIntConstant(m
, "IPPROTO_PUP", IPPROTO_PUP
);
4637 PyModule_AddIntConstant(m
, "IPPROTO_UDP", IPPROTO_UDP
);
4639 PyModule_AddIntConstant(m
, "IPPROTO_UDP", 17);
4642 PyModule_AddIntConstant(m
, "IPPROTO_IDP", IPPROTO_IDP
);
4644 #ifdef IPPROTO_HELLO
4645 PyModule_AddIntConstant(m
, "IPPROTO_HELLO", IPPROTO_HELLO
);
4648 PyModule_AddIntConstant(m
, "IPPROTO_ND", IPPROTO_ND
);
4651 PyModule_AddIntConstant(m
, "IPPROTO_TP", IPPROTO_TP
);
4654 PyModule_AddIntConstant(m
, "IPPROTO_IPV6", IPPROTO_IPV6
);
4656 #ifdef IPPROTO_ROUTING
4657 PyModule_AddIntConstant(m
, "IPPROTO_ROUTING", IPPROTO_ROUTING
);
4659 #ifdef IPPROTO_FRAGMENT
4660 PyModule_AddIntConstant(m
, "IPPROTO_FRAGMENT", IPPROTO_FRAGMENT
);
4663 PyModule_AddIntConstant(m
, "IPPROTO_RSVP", IPPROTO_RSVP
);
4666 PyModule_AddIntConstant(m
, "IPPROTO_GRE", IPPROTO_GRE
);
4669 PyModule_AddIntConstant(m
, "IPPROTO_ESP", IPPROTO_ESP
);
4672 PyModule_AddIntConstant(m
, "IPPROTO_AH", IPPROTO_AH
);
4674 #ifdef IPPROTO_MOBILE
4675 PyModule_AddIntConstant(m
, "IPPROTO_MOBILE", IPPROTO_MOBILE
);
4677 #ifdef IPPROTO_ICMPV6
4678 PyModule_AddIntConstant(m
, "IPPROTO_ICMPV6", IPPROTO_ICMPV6
);
4681 PyModule_AddIntConstant(m
, "IPPROTO_NONE", IPPROTO_NONE
);
4683 #ifdef IPPROTO_DSTOPTS
4684 PyModule_AddIntConstant(m
, "IPPROTO_DSTOPTS", IPPROTO_DSTOPTS
);
4687 PyModule_AddIntConstant(m
, "IPPROTO_XTP", IPPROTO_XTP
);
4690 PyModule_AddIntConstant(m
, "IPPROTO_EON", IPPROTO_EON
);
4693 PyModule_AddIntConstant(m
, "IPPROTO_PIM", IPPROTO_PIM
);
4695 #ifdef IPPROTO_IPCOMP
4696 PyModule_AddIntConstant(m
, "IPPROTO_IPCOMP", IPPROTO_IPCOMP
);
4699 PyModule_AddIntConstant(m
, "IPPROTO_VRRP", IPPROTO_VRRP
);
4702 PyModule_AddIntConstant(m
, "IPPROTO_BIP", IPPROTO_BIP
);
4706 PyModule_AddIntConstant(m
, "IPPROTO_RAW", IPPROTO_RAW
);
4708 PyModule_AddIntConstant(m
, "IPPROTO_RAW", 255);
4711 PyModule_AddIntConstant(m
, "IPPROTO_MAX", IPPROTO_MAX
);
4714 /* Some port configuration */
4715 #ifdef IPPORT_RESERVED
4716 PyModule_AddIntConstant(m
, "IPPORT_RESERVED", IPPORT_RESERVED
);
4718 PyModule_AddIntConstant(m
, "IPPORT_RESERVED", 1024);
4720 #ifdef IPPORT_USERRESERVED
4721 PyModule_AddIntConstant(m
, "IPPORT_USERRESERVED", IPPORT_USERRESERVED
);
4723 PyModule_AddIntConstant(m
, "IPPORT_USERRESERVED", 5000);
4726 /* Some reserved IP v.4 addresses */
4728 PyModule_AddIntConstant(m
, "INADDR_ANY", INADDR_ANY
);
4730 PyModule_AddIntConstant(m
, "INADDR_ANY", 0x00000000);
4732 #ifdef INADDR_BROADCAST
4733 PyModule_AddIntConstant(m
, "INADDR_BROADCAST", INADDR_BROADCAST
);
4735 PyModule_AddIntConstant(m
, "INADDR_BROADCAST", 0xffffffff);
4737 #ifdef INADDR_LOOPBACK
4738 PyModule_AddIntConstant(m
, "INADDR_LOOPBACK", INADDR_LOOPBACK
);
4740 PyModule_AddIntConstant(m
, "INADDR_LOOPBACK", 0x7F000001);
4742 #ifdef INADDR_UNSPEC_GROUP
4743 PyModule_AddIntConstant(m
, "INADDR_UNSPEC_GROUP", INADDR_UNSPEC_GROUP
);
4745 PyModule_AddIntConstant(m
, "INADDR_UNSPEC_GROUP", 0xe0000000);
4747 #ifdef INADDR_ALLHOSTS_GROUP
4748 PyModule_AddIntConstant(m
, "INADDR_ALLHOSTS_GROUP",
4749 INADDR_ALLHOSTS_GROUP
);
4751 PyModule_AddIntConstant(m
, "INADDR_ALLHOSTS_GROUP", 0xe0000001);
4753 #ifdef INADDR_MAX_LOCAL_GROUP
4754 PyModule_AddIntConstant(m
, "INADDR_MAX_LOCAL_GROUP",
4755 INADDR_MAX_LOCAL_GROUP
);
4757 PyModule_AddIntConstant(m
, "INADDR_MAX_LOCAL_GROUP", 0xe00000ff);
4760 PyModule_AddIntConstant(m
, "INADDR_NONE", INADDR_NONE
);
4762 PyModule_AddIntConstant(m
, "INADDR_NONE", 0xffffffff);
4765 /* IPv4 [gs]etsockopt options */
4767 PyModule_AddIntConstant(m
, "IP_OPTIONS", IP_OPTIONS
);
4770 PyModule_AddIntConstant(m
, "IP_HDRINCL", IP_HDRINCL
);
4773 PyModule_AddIntConstant(m
, "IP_TOS", IP_TOS
);
4776 PyModule_AddIntConstant(m
, "IP_TTL", IP_TTL
);
4779 PyModule_AddIntConstant(m
, "IP_RECVOPTS", IP_RECVOPTS
);
4781 #ifdef IP_RECVRETOPTS
4782 PyModule_AddIntConstant(m
, "IP_RECVRETOPTS", IP_RECVRETOPTS
);
4784 #ifdef IP_RECVDSTADDR
4785 PyModule_AddIntConstant(m
, "IP_RECVDSTADDR", IP_RECVDSTADDR
);
4788 PyModule_AddIntConstant(m
, "IP_RETOPTS", IP_RETOPTS
);
4790 #ifdef IP_MULTICAST_IF
4791 PyModule_AddIntConstant(m
, "IP_MULTICAST_IF", IP_MULTICAST_IF
);
4793 #ifdef IP_MULTICAST_TTL
4794 PyModule_AddIntConstant(m
, "IP_MULTICAST_TTL", IP_MULTICAST_TTL
);
4796 #ifdef IP_MULTICAST_LOOP
4797 PyModule_AddIntConstant(m
, "IP_MULTICAST_LOOP", IP_MULTICAST_LOOP
);
4799 #ifdef IP_ADD_MEMBERSHIP
4800 PyModule_AddIntConstant(m
, "IP_ADD_MEMBERSHIP", IP_ADD_MEMBERSHIP
);
4802 #ifdef IP_DROP_MEMBERSHIP
4803 PyModule_AddIntConstant(m
, "IP_DROP_MEMBERSHIP", IP_DROP_MEMBERSHIP
);
4805 #ifdef IP_DEFAULT_MULTICAST_TTL
4806 PyModule_AddIntConstant(m
, "IP_DEFAULT_MULTICAST_TTL",
4807 IP_DEFAULT_MULTICAST_TTL
);
4809 #ifdef IP_DEFAULT_MULTICAST_LOOP
4810 PyModule_AddIntConstant(m
, "IP_DEFAULT_MULTICAST_LOOP",
4811 IP_DEFAULT_MULTICAST_LOOP
);
4813 #ifdef IP_MAX_MEMBERSHIPS
4814 PyModule_AddIntConstant(m
, "IP_MAX_MEMBERSHIPS", IP_MAX_MEMBERSHIPS
);
4817 /* IPv6 [gs]etsockopt options, defined in RFC2553 */
4818 #ifdef IPV6_JOIN_GROUP
4819 PyModule_AddIntConstant(m
, "IPV6_JOIN_GROUP", IPV6_JOIN_GROUP
);
4821 #ifdef IPV6_LEAVE_GROUP
4822 PyModule_AddIntConstant(m
, "IPV6_LEAVE_GROUP", IPV6_LEAVE_GROUP
);
4824 #ifdef IPV6_MULTICAST_HOPS
4825 PyModule_AddIntConstant(m
, "IPV6_MULTICAST_HOPS", IPV6_MULTICAST_HOPS
);
4827 #ifdef IPV6_MULTICAST_IF
4828 PyModule_AddIntConstant(m
, "IPV6_MULTICAST_IF", IPV6_MULTICAST_IF
);
4830 #ifdef IPV6_MULTICAST_LOOP
4831 PyModule_AddIntConstant(m
, "IPV6_MULTICAST_LOOP", IPV6_MULTICAST_LOOP
);
4833 #ifdef IPV6_UNICAST_HOPS
4834 PyModule_AddIntConstant(m
, "IPV6_UNICAST_HOPS", IPV6_UNICAST_HOPS
);
4836 /* Additional IPV6 socket options, defined in RFC 3493 */
4838 PyModule_AddIntConstant(m
, "IPV6_V6ONLY", IPV6_V6ONLY
);
4840 /* Advanced IPV6 socket options, from RFC 3542 */
4841 #ifdef IPV6_CHECKSUM
4842 PyModule_AddIntConstant(m
, "IPV6_CHECKSUM", IPV6_CHECKSUM
);
4844 #ifdef IPV6_DONTFRAG
4845 PyModule_AddIntConstant(m
, "IPV6_DONTFRAG", IPV6_DONTFRAG
);
4848 PyModule_AddIntConstant(m
, "IPV6_DSTOPTS", IPV6_DSTOPTS
);
4850 #ifdef IPV6_HOPLIMIT
4851 PyModule_AddIntConstant(m
, "IPV6_HOPLIMIT", IPV6_HOPLIMIT
);
4854 PyModule_AddIntConstant(m
, "IPV6_HOPOPTS", IPV6_HOPOPTS
);
4857 PyModule_AddIntConstant(m
, "IPV6_NEXTHOP", IPV6_NEXTHOP
);
4860 PyModule_AddIntConstant(m
, "IPV6_PATHMTU", IPV6_PATHMTU
);
4863 PyModule_AddIntConstant(m
, "IPV6_PKTINFO", IPV6_PKTINFO
);
4865 #ifdef IPV6_RECVDSTOPTS
4866 PyModule_AddIntConstant(m
, "IPV6_RECVDSTOPTS", IPV6_RECVDSTOPTS
);
4868 #ifdef IPV6_RECVHOPLIMIT
4869 PyModule_AddIntConstant(m
, "IPV6_RECVHOPLIMIT", IPV6_RECVHOPLIMIT
);
4871 #ifdef IPV6_RECVHOPOPTS
4872 PyModule_AddIntConstant(m
, "IPV6_RECVHOPOPTS", IPV6_RECVHOPOPTS
);
4874 #ifdef IPV6_RECVPKTINFO
4875 PyModule_AddIntConstant(m
, "IPV6_RECVPKTINFO", IPV6_RECVPKTINFO
);
4877 #ifdef IPV6_RECVRTHDR
4878 PyModule_AddIntConstant(m
, "IPV6_RECVRTHDR", IPV6_RECVRTHDR
);
4880 #ifdef IPV6_RECVTCLASS
4881 PyModule_AddIntConstant(m
, "IPV6_RECVTCLASS", IPV6_RECVTCLASS
);
4884 PyModule_AddIntConstant(m
, "IPV6_RTHDR", IPV6_RTHDR
);
4886 #ifdef IPV6_RTHDRDSTOPTS
4887 PyModule_AddIntConstant(m
, "IPV6_RTHDRDSTOPTS", IPV6_RTHDRDSTOPTS
);
4889 #ifdef IPV6_RTHDR_TYPE_0
4890 PyModule_AddIntConstant(m
, "IPV6_RTHDR_TYPE_0", IPV6_RTHDR_TYPE_0
);
4892 #ifdef IPV6_RECVPATHMTU
4893 PyModule_AddIntConstant(m
, "IPV6_RECVPATHMTU", IPV6_RECVPATHMTU
);
4896 PyModule_AddIntConstant(m
, "IPV6_TCLASS", IPV6_TCLASS
);
4898 #ifdef IPV6_USE_MIN_MTU
4899 PyModule_AddIntConstant(m
, "IPV6_USE_MIN_MTU", IPV6_USE_MIN_MTU
);
4904 PyModule_AddIntConstant(m
, "TCP_NODELAY", TCP_NODELAY
);
4907 PyModule_AddIntConstant(m
, "TCP_MAXSEG", TCP_MAXSEG
);
4910 PyModule_AddIntConstant(m
, "TCP_CORK", TCP_CORK
);
4913 PyModule_AddIntConstant(m
, "TCP_KEEPIDLE", TCP_KEEPIDLE
);
4915 #ifdef TCP_KEEPINTVL
4916 PyModule_AddIntConstant(m
, "TCP_KEEPINTVL", TCP_KEEPINTVL
);
4919 PyModule_AddIntConstant(m
, "TCP_KEEPCNT", TCP_KEEPCNT
);
4922 PyModule_AddIntConstant(m
, "TCP_SYNCNT", TCP_SYNCNT
);
4925 PyModule_AddIntConstant(m
, "TCP_LINGER2", TCP_LINGER2
);
4927 #ifdef TCP_DEFER_ACCEPT
4928 PyModule_AddIntConstant(m
, "TCP_DEFER_ACCEPT", TCP_DEFER_ACCEPT
);
4930 #ifdef TCP_WINDOW_CLAMP
4931 PyModule_AddIntConstant(m
, "TCP_WINDOW_CLAMP", TCP_WINDOW_CLAMP
);
4934 PyModule_AddIntConstant(m
, "TCP_INFO", TCP_INFO
);
4937 PyModule_AddIntConstant(m
, "TCP_QUICKACK", TCP_QUICKACK
);
4943 PyModule_AddIntConstant(m
, "IPX_TYPE", IPX_TYPE
);
4946 /* get{addr,name}info parameters */
4947 #ifdef EAI_ADDRFAMILY
4948 PyModule_AddIntConstant(m
, "EAI_ADDRFAMILY", EAI_ADDRFAMILY
);
4951 PyModule_AddIntConstant(m
, "EAI_AGAIN", EAI_AGAIN
);
4954 PyModule_AddIntConstant(m
, "EAI_BADFLAGS", EAI_BADFLAGS
);
4957 PyModule_AddIntConstant(m
, "EAI_FAIL", EAI_FAIL
);
4960 PyModule_AddIntConstant(m
, "EAI_FAMILY", EAI_FAMILY
);
4963 PyModule_AddIntConstant(m
, "EAI_MEMORY", EAI_MEMORY
);
4966 PyModule_AddIntConstant(m
, "EAI_NODATA", EAI_NODATA
);
4969 PyModule_AddIntConstant(m
, "EAI_NONAME", EAI_NONAME
);
4972 PyModule_AddIntConstant(m
, "EAI_OVERFLOW", EAI_OVERFLOW
);
4975 PyModule_AddIntConstant(m
, "EAI_SERVICE", EAI_SERVICE
);
4978 PyModule_AddIntConstant(m
, "EAI_SOCKTYPE", EAI_SOCKTYPE
);
4981 PyModule_AddIntConstant(m
, "EAI_SYSTEM", EAI_SYSTEM
);
4984 PyModule_AddIntConstant(m
, "EAI_BADHINTS", EAI_BADHINTS
);
4987 PyModule_AddIntConstant(m
, "EAI_PROTOCOL", EAI_PROTOCOL
);
4990 PyModule_AddIntConstant(m
, "EAI_MAX", EAI_MAX
);
4993 PyModule_AddIntConstant(m
, "AI_PASSIVE", AI_PASSIVE
);
4996 PyModule_AddIntConstant(m
, "AI_CANONNAME", AI_CANONNAME
);
4998 #ifdef AI_NUMERICHOST
4999 PyModule_AddIntConstant(m
, "AI_NUMERICHOST", AI_NUMERICHOST
);
5001 #ifdef AI_NUMERICSERV
5002 PyModule_AddIntConstant(m
, "AI_NUMERICSERV", AI_NUMERICSERV
);
5005 PyModule_AddIntConstant(m
, "AI_MASK", AI_MASK
);
5008 PyModule_AddIntConstant(m
, "AI_ALL", AI_ALL
);
5010 #ifdef AI_V4MAPPED_CFG
5011 PyModule_AddIntConstant(m
, "AI_V4MAPPED_CFG", AI_V4MAPPED_CFG
);
5013 #ifdef AI_ADDRCONFIG
5014 PyModule_AddIntConstant(m
, "AI_ADDRCONFIG", AI_ADDRCONFIG
);
5017 PyModule_AddIntConstant(m
, "AI_V4MAPPED", AI_V4MAPPED
);
5020 PyModule_AddIntConstant(m
, "AI_DEFAULT", AI_DEFAULT
);
5023 PyModule_AddIntConstant(m
, "NI_MAXHOST", NI_MAXHOST
);
5026 PyModule_AddIntConstant(m
, "NI_MAXSERV", NI_MAXSERV
);
5029 PyModule_AddIntConstant(m
, "NI_NOFQDN", NI_NOFQDN
);
5031 #ifdef NI_NUMERICHOST
5032 PyModule_AddIntConstant(m
, "NI_NUMERICHOST", NI_NUMERICHOST
);
5035 PyModule_AddIntConstant(m
, "NI_NAMEREQD", NI_NAMEREQD
);
5037 #ifdef NI_NUMERICSERV
5038 PyModule_AddIntConstant(m
, "NI_NUMERICSERV", NI_NUMERICSERV
);
5041 PyModule_AddIntConstant(m
, "NI_DGRAM", NI_DGRAM
);
5044 /* shutdown() parameters */
5046 PyModule_AddIntConstant(m
, "SHUT_RD", SHUT_RD
);
5047 #elif defined(SD_RECEIVE)
5048 PyModule_AddIntConstant(m
, "SHUT_RD", SD_RECEIVE
);
5050 PyModule_AddIntConstant(m
, "SHUT_RD", 0);
5053 PyModule_AddIntConstant(m
, "SHUT_WR", SHUT_WR
);
5054 #elif defined(SD_SEND)
5055 PyModule_AddIntConstant(m
, "SHUT_WR", SD_SEND
);
5057 PyModule_AddIntConstant(m
, "SHUT_WR", 1);
5060 PyModule_AddIntConstant(m
, "SHUT_RDWR", SHUT_RDWR
);
5061 #elif defined(SD_BOTH)
5062 PyModule_AddIntConstant(m
, "SHUT_RDWR", SD_BOTH
);
5064 PyModule_AddIntConstant(m
, "SHUT_RDWR", 2);
5070 tmp
= PyLong_FromUnsignedLong(SIO_RCVALL
);
5073 PyModule_AddObject(m
, "SIO_RCVALL", tmp
);
5075 PyModule_AddIntConstant(m
, "RCVALL_OFF", RCVALL_OFF
);
5076 PyModule_AddIntConstant(m
, "RCVALL_ON", RCVALL_ON
);
5077 PyModule_AddIntConstant(m
, "RCVALL_SOCKETLEVELONLY", RCVALL_SOCKETLEVELONLY
);
5078 #ifdef RCVALL_IPLEVEL
5079 PyModule_AddIntConstant(m
, "RCVALL_IPLEVEL", RCVALL_IPLEVEL
);
5082 PyModule_AddIntConstant(m
, "RCVALL_MAX", RCVALL_MAX
);
5084 #endif /* _MSTCPIP_ */
5086 /* Initialize gethostbyname lock */
5087 #if defined(USE_GETHOSTBYNAME_LOCK) || defined(USE_GETADDRINFO_LOCK)
5088 netdb_lock
= PyThread_allocate_lock();
5094 #ifndef HAVE_INET_PTON
5095 #if !defined(NTDDI_VERSION) || (NTDDI_VERSION < NTDDI_LONGHORN)
5097 /* Simplistic emulation code for inet_pton that only works for IPv4 */
5098 /* These are not exposed because they do not set errno properly */
5101 inet_pton(int af
, const char *src
, void *dst
)
5103 if (af
== AF_INET
) {
5104 #if (SIZEOF_INT != 4)
5105 #error "Not sure if in_addr_t exists and int is not 32-bits."
5107 unsigned int packed_addr
;
5108 packed_addr
= inet_addr(src
);
5109 if (packed_addr
== INADDR_NONE
)
5111 memcpy(dst
, &packed_addr
, 4);
5114 /* Should set errno to EAFNOSUPPORT */
5119 inet_ntop(int af
, const void *src
, char *dst
, socklen_t size
)
5121 if (af
== AF_INET
) {
5122 struct in_addr packed_addr
;
5124 /* Should set errno to ENOSPC. */
5126 memcpy(&packed_addr
, src
, sizeof(packed_addr
));
5127 return strncpy(dst
, inet_ntoa(packed_addr
), size
);
5129 /* Should set errno to EAFNOSUPPORT */