imapext-2007
diff src/osdep/wce/tcp_wce.c @ 0:ada5e610ab86
imap-2007e
author | yuuji@gentei.org |
---|---|
date | Mon, 14 Sep 2009 15:17:45 +0900 |
parents | |
children |
line diff
1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/src/osdep/wce/tcp_wce.c Mon Sep 14 15:17:45 2009 +0900 1.3 @@ -0,0 +1,818 @@ 1.4 +/* ======================================================================== 1.5 + * Copyright 1988-2008 University of Washington 1.6 + * 1.7 + * Licensed under the Apache License, Version 2.0 (the "License"); 1.8 + * you may not use this file except in compliance with the License. 1.9 + * You may obtain a copy of the License at 1.10 + * 1.11 + * http://www.apache.org/licenses/LICENSE-2.0 1.12 + * 1.13 + * 1.14 + * ======================================================================== 1.15 + */ 1.16 + 1.17 +/* 1.18 + * Program: Winsock TCP/IP routines 1.19 + * 1.20 + * Author: Mark Crispin from Mike Seibel's Winsock code 1.21 + * Networks and Distributed Computing 1.22 + * Computing & Communications 1.23 + * University of Washington 1.24 + * Administration Building, AG-44 1.25 + * Seattle, WA 98195 1.26 + * Internet: MRC@CAC.Washington.EDU 1.27 + * 1.28 + * Date: 11 April 1989 1.29 + * Last Edited: 13 January 2008 1.30 + */ 1.31 + 1.32 + 1.33 +#define TCPMAXSEND 32768 1.34 + 1.35 +/* Private functions */ 1.36 + 1.37 +int tcp_socket_open (struct sockaddr_in *sin,char *tmp,char *hst, 1.38 + unsigned long port); 1.39 +static char *tcp_getline_work (TCPSTREAM *stream,unsigned long *size, 1.40 + long *contd); 1.41 +long tcp_abort (TCPSTREAM *stream); 1.42 +long tcp_close_socket (SOCKET *sock); 1.43 +char *tcp_name (struct sockaddr_in *sin,long flag); 1.44 +char *tcp_name_valid (char *s); 1.45 + 1.46 + 1.47 +/* Private data */ 1.48 + 1.49 +int wsa_initted = 0; /* init ? */ 1.50 +static int wsa_sock_open = 0; /* keep track of open sockets */ 1.51 +static tcptimeout_t tmoh = NIL; /* TCP timeout handler routine */ 1.52 +static long ttmo_read = 0; /* TCP timeouts, in seconds */ 1.53 +static long ttmo_write = 0; 1.54 +static long allowreversedns = T;/* allow reverse DNS lookup */ 1.55 +static long tcpdebug = NIL; /* extra TCP debugging telemetry */ 1.56 + 1.57 +/* TCP/IP manipulate parameters 1.58 + * Accepts: function code 1.59 + * function-dependent value 1.60 + * Returns: function-dependent return value 1.61 + */ 1.62 + 1.63 +void *tcp_parameters (long function,void *value) 1.64 +{ 1.65 + void *ret = NIL; 1.66 + switch ((int) function) { 1.67 + case SET_TIMEOUT: 1.68 + tmoh = (tcptimeout_t) value; 1.69 + case GET_TIMEOUT: 1.70 + ret = (void *) tmoh; 1.71 + break; 1.72 + case SET_READTIMEOUT: 1.73 + ttmo_read = (long) value; 1.74 + case GET_READTIMEOUT: 1.75 + ret = (void *) ttmo_read; 1.76 + break; 1.77 + case SET_WRITETIMEOUT: 1.78 + ttmo_write = (long) value; 1.79 + case GET_WRITETIMEOUT: 1.80 + ret = (void *) ttmo_write; 1.81 + break; 1.82 + case SET_ALLOWREVERSEDNS: 1.83 + allowreversedns = (long) value; 1.84 + case GET_ALLOWREVERSEDNS: 1.85 + ret = (void *) allowreversedns; 1.86 + break; 1.87 + case SET_TCPDEBUG: 1.88 + tcpdebug = (long) value; 1.89 + case GET_TCPDEBUG: 1.90 + ret = (void *) tcpdebug; 1.91 + break; 1.92 + } 1.93 + return ret; 1.94 +} 1.95 + 1.96 +/* TCP/IP open 1.97 + * Accepts: host name 1.98 + * contact service name 1.99 + * contact port number and optional silent flag 1.100 + * Returns: TCP/IP stream if success else NIL 1.101 + */ 1.102 + 1.103 +TCPSTREAM *tcp_open (char *host,char *service,unsigned long port) 1.104 +{ 1.105 + TCPSTREAM *stream = NIL; 1.106 + int i; 1.107 + SOCKET sock = INVALID_SOCKET; 1.108 + int silent = (port & NET_SILENT) ? T : NIL; 1.109 + char *s; 1.110 + struct sockaddr_in sin; 1.111 + struct hostent *he; 1.112 + char hostname[MAILTMPLEN]; 1.113 + char tmp[MAILTMPLEN]; 1.114 + struct servent *sv = NIL; 1.115 + blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL); 1.116 + if (!wsa_initted++) { /* init Windows Sockets */ 1.117 + WSADATA wsock; 1.118 + if (i = (int) WSAStartup (WSA_VERSION,&wsock)) { 1.119 + wsa_initted = 0; /* in case we try again */ 1.120 + sprintf (tmp,"Unable to start Windows Sockets (%d)",i); 1.121 + mm_log (tmp,ERROR); 1.122 + return NIL; 1.123 + } 1.124 + } 1.125 + port &= 0xffff; /* erase flags */ 1.126 + /* lookup service */ 1.127 + if (service && (sv = getservbyname (service,"tcp"))) 1.128 + port = ntohs (sin.sin_port = sv->s_port); 1.129 + /* copy port number in network format */ 1.130 + else sin.sin_port = htons ((u_short) port); 1.131 + /* The domain literal form is used (rather than simply the dotted decimal 1.132 + as with other Windows programs) because it has to be a valid "host name" 1.133 + in mailsystem terminology. */ 1.134 + sin.sin_family = AF_INET; /* family is always Internet */ 1.135 + /* look like domain literal? */ 1.136 + if (host[0] == '[' && host[(strlen (host))-1] == ']') { 1.137 + strcpy (tmp,host+1); /* yes, copy number part */ 1.138 + tmp[strlen (tmp)-1] = '\0'; 1.139 + if ((sin.sin_addr.s_addr = inet_addr (tmp)) == INADDR_NONE) { 1.140 + sprintf (tmp,"Bad format domain-literal: %.80s",host); 1.141 + mm_log (tmp,ERROR); 1.142 + return NIL; 1.143 + } 1.144 + else { 1.145 + sin.sin_family = AF_INET; /* family is always Internet */ 1.146 + strcpy (hostname,host); 1.147 + (*bn) (BLOCK_TCPOPEN,NIL); 1.148 + sock = tcp_socket_open (&sin,tmp,hostname,port); 1.149 + (*bn) (BLOCK_NONE,NIL); 1.150 + } 1.151 + } 1.152 + 1.153 + else { /* lookup host name */ 1.154 + if (tcpdebug) { 1.155 + sprintf (tmp,"DNS resolution %.80s",host); 1.156 + mm_log (tmp,TCPDEBUG); 1.157 + } 1.158 + (*bn) (BLOCK_DNSLOOKUP,NIL);/* look up name */ 1.159 + if (!(he = gethostbyname (lcase (strcpy (tmp,host))))) 1.160 + sprintf (tmp,"Host not found (#%d): %s",WSAGetLastError(),host); 1.161 + (*bn) (BLOCK_NONE,NIL); 1.162 + if (he) { /* DNS resolution won? */ 1.163 + if (tcpdebug) mm_log ("DNS resolution done",TCPDEBUG); 1.164 + /* copy address type */ 1.165 + sin.sin_family = he->h_addrtype; 1.166 + /* copy host name */ 1.167 + strcpy (hostname,he->h_name); 1.168 + wsa_sock_open++; /* prevent tcp_close_socket() from freeing in 1.169 + loop */ 1.170 + for (i = 0; (sock == INVALID_SOCKET) && (s = he->h_addr_list[i]); i++) { 1.171 + if (i && !silent) mm_log (tmp,WARN); 1.172 + memcpy (&sin.sin_addr,s,he->h_length); 1.173 + (*bn) (BLOCK_TCPOPEN,NIL); 1.174 + sock = tcp_socket_open (&sin,tmp,hostname,port); 1.175 + (*bn) (BLOCK_NONE,NIL); 1.176 + } 1.177 + wsa_sock_open--; /* undo protection */ 1.178 + } 1.179 + } 1.180 + if (sock == INVALID_SOCKET) { /* error? */ 1.181 + if (!silent) mm_log (tmp,ERROR); 1.182 + tcp_close_socket (&sock); /* do possible cleanup action */ 1.183 + } 1.184 + else { /* got a socket, create TCP/IP stream */ 1.185 + stream = (TCPSTREAM *) memset (fs_get (sizeof (TCPSTREAM)),0, 1.186 + sizeof (TCPSTREAM)); 1.187 + stream->port = port; /* port number */ 1.188 + /* init socket */ 1.189 + stream->tcpsi = stream->tcpso = sock; 1.190 + stream->ictr = 0; /* init input counter */ 1.191 + /* copy official host name */ 1.192 + stream->host = cpystr (hostname); 1.193 + if (tcpdebug) mm_log ("Stream open and ready for read",TCPDEBUG); 1.194 + } 1.195 + return stream; /* return success */ 1.196 +} 1.197 + 1.198 +/* Open a TCP socket 1.199 + * Accepts: Internet socket address block 1.200 + * scratch buffer 1.201 + * host name for error message 1.202 + * port number for error message 1.203 + * Returns: socket if success, else -1 with error string in scratch buffer 1.204 + */ 1.205 + 1.206 +int tcp_socket_open (struct sockaddr_in *sin,char *tmp,char *hst, 1.207 + unsigned long port) 1.208 +{ 1.209 + int sock; 1.210 + char *s; 1.211 + sprintf (tmp,"Trying IP address [%s]",inet_ntoa (sin->sin_addr)); 1.212 + mm_log (tmp,NIL); 1.213 + /* get a TCP stream */ 1.214 + if ((sock = socket (sin->sin_family,SOCK_STREAM,0)) == INVALID_SOCKET) { 1.215 + sprintf (tmp,"Unable to create TCP socket (%d)",WSAGetLastError()); 1.216 + return -1; 1.217 + } 1.218 + wsa_sock_open++; /* count this socket as open */ 1.219 + /* open connection */ 1.220 + if (connect (sock,(struct sockaddr *) sin,sizeof (struct sockaddr_in)) == 1.221 + SOCKET_ERROR) { 1.222 + switch (WSAGetLastError ()){/* analyze error */ 1.223 + case WSAECONNREFUSED: 1.224 + s = "Refused"; 1.225 + break; 1.226 + case WSAENOBUFS: 1.227 + s = "Insufficient system resources"; 1.228 + break; 1.229 + case WSAETIMEDOUT: 1.230 + s = "Timed out"; 1.231 + break; 1.232 + case WSAEHOSTUNREACH: 1.233 + s = "Host unreachable"; 1.234 + break; 1.235 + default: 1.236 + s = "Unknown error"; 1.237 + break; 1.238 + } 1.239 + sprintf (tmp,"Can't connect to %.80s,%ld: %s (%d)",hst,port,s, 1.240 + WSAGetLastError ()); 1.241 + tcp_close_socket (&sock); /* flush socket */ 1.242 + sock = INVALID_SOCKET; 1.243 + } 1.244 + return sock; /* return the socket */ 1.245 +} 1.246 + 1.247 +/* TCP/IP authenticated open 1.248 + * Accepts: NETMBX specifier 1.249 + * service name 1.250 + * returned user name buffer 1.251 + * Returns: TCP/IP stream if success else NIL 1.252 + */ 1.253 + 1.254 +TCPSTREAM *tcp_aopen (NETMBX *mb,char *service,char *usrbuf) 1.255 +{ 1.256 + return NIL; /* always NIL on Windows */ 1.257 +} 1.258 + 1.259 +/* TCP receive line 1.260 + * Accepts: TCP stream 1.261 + * Returns: text line string or NIL if failure 1.262 + */ 1.263 + 1.264 +char *tcp_getline (TCPSTREAM *stream) 1.265 +{ 1.266 + unsigned long n,contd; 1.267 + char *ret = tcp_getline_work (stream,&n,&contd); 1.268 + if (ret && contd) { /* got a line needing continuation? */ 1.269 + STRINGLIST *stl = mail_newstringlist (); 1.270 + STRINGLIST *stc = stl; 1.271 + do { /* collect additional lines */ 1.272 + stc->text.data = (unsigned char *) ret; 1.273 + stc->text.size = n; 1.274 + stc = stc->next = mail_newstringlist (); 1.275 + ret = tcp_getline_work (stream,&n,&contd); 1.276 + } while (ret && contd); 1.277 + if (ret) { /* stash final part of line on list */ 1.278 + stc->text.data = (unsigned char *) ret; 1.279 + stc->text.size = n; 1.280 + /* determine how large a buffer we need */ 1.281 + for (n = 0, stc = stl; stc; stc = stc->next) n += stc->text.size; 1.282 + ret = fs_get (n + 1); /* copy parts into buffer */ 1.283 + for (n = 0, stc = stl; stc; n += stc->text.size, stc = stc->next) 1.284 + memcpy (ret + n,stc->text.data,stc->text.size); 1.285 + ret[n] = '\0'; 1.286 + } 1.287 + mail_free_stringlist (&stl);/* either way, done with list */ 1.288 + } 1.289 + return ret; 1.290 +} 1.291 + 1.292 +/* TCP receive line or partial line 1.293 + * Accepts: TCP stream 1.294 + * pointer to return size 1.295 + * pointer to return continuation flag 1.296 + * Returns: text line string, size and continuation flag, or NIL if failure 1.297 + */ 1.298 + 1.299 +static char *tcp_getline_work (TCPSTREAM *stream,unsigned long *size, 1.300 + long *contd) 1.301 +{ 1.302 + unsigned long n; 1.303 + char *s,*ret,c,d; 1.304 + *contd = NIL; /* assume no continuation */ 1.305 + /* make sure have data */ 1.306 + if (!tcp_getdata (stream)) return NIL; 1.307 + for (s = stream->iptr, n = 0, c = '\0'; stream->ictr--; n++, c = d) { 1.308 + d = *stream->iptr++; /* slurp another character */ 1.309 + if ((c == '\015') && (d == '\012')) { 1.310 + ret = (char *) fs_get (n--); 1.311 + memcpy (ret,s,*size = n); /* copy into a free storage string */ 1.312 + ret[n] = '\0'; /* tie off string with null */ 1.313 + return ret; 1.314 + } 1.315 + } 1.316 + /* copy partial string from buffer */ 1.317 + memcpy ((ret = (char *) fs_get (n)),s,*size = n); 1.318 + /* get more data from the net */ 1.319 + if (!tcp_getdata (stream)) fs_give ((void **) &ret); 1.320 + /* special case of newline broken by buffer */ 1.321 + else if ((c == '\015') && (*stream->iptr == '\012')) { 1.322 + stream->iptr++; /* eat the line feed */ 1.323 + stream->ictr--; 1.324 + ret[*size = --n] = '\0'; /* tie off string with null */ 1.325 + } 1.326 + else *contd = LONGT; /* continuation needed */ 1.327 + return ret; 1.328 +} 1.329 + 1.330 +/* TCP/IP receive buffer 1.331 + * Accepts: TCP/IP stream 1.332 + * size in bytes 1.333 + * buffer to read into 1.334 + * Returns: T if success, NIL otherwise 1.335 + */ 1.336 + 1.337 +long tcp_getbuffer (TCPSTREAM *stream,unsigned long size,char *s) 1.338 +{ 1.339 + unsigned long n; 1.340 + /* make sure socket still alive */ 1.341 + if (stream->tcpsi == INVALID_SOCKET) return NIL; 1.342 + /* can transfer bytes from buffer? */ 1.343 + if (n = min (size,stream->ictr)) { 1.344 + memcpy (s,stream->iptr,n); /* yes, slurp as much as we can from it */ 1.345 + s += n; /* update pointer */ 1.346 + stream->iptr +=n; 1.347 + size -= n; /* update # of bytes to do */ 1.348 + stream->ictr -=n; 1.349 + } 1.350 + if (size) { 1.351 + int i; 1.352 + fd_set fds; 1.353 + struct timeval tmo; 1.354 + time_t tc,t = time (0); 1.355 + blocknotify_t bn=(blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL); 1.356 + (*bn) (BLOCK_TCPREAD,NIL); 1.357 + while (size > 0) { /* until request satisfied */ 1.358 + time_t tl = time (0); 1.359 + if (tcpdebug) mm_log ("Reading TCP buffer",TCPDEBUG); 1.360 + FD_ZERO (&fds); /* initialize selection vector */ 1.361 + FD_SET (stream->tcpsi,&fds);/* set bit in selection vector */ 1.362 + tmo.tv_sec = ttmo_read; 1.363 + tmo.tv_usec = 0; 1.364 + /* block and read */ 1.365 + switch ((stream->tcpsi == stream->tcpso) ? 1.366 + select (stream->tcpsi+1,&fds,0,0, 1.367 + ttmo_read ? &tmo : (struct timeval *) 0) : 1) { 1.368 + case SOCKET_ERROR: /* error */ 1.369 + if (WSAGetLastError () != WSAEINTR) return tcp_abort (stream); 1.370 + break; 1.371 + case 0: /* timeout */ 1.372 + tc = time (0); 1.373 + if (tmoh && ((*tmoh) (tc - t,tc - tl))) break; 1.374 + return tcp_abort (stream); 1.375 + default: 1.376 + if (stream->tcpsi == stream->tcpso) 1.377 + while (((i = recv (stream->tcpsi,s,(int) min (maxposint,size),0)) == 1.378 + SOCKET_ERROR) && (WSAGetLastError () == WSAEINTR)); 1.379 + else while (((i = read (stream->tcpsi,s,(int) min (maxposint,size))) < 1.380 + 0) && (errno == EINTR)); 1.381 + switch (i) { 1.382 + case SOCKET_ERROR: /* error */ 1.383 + case 0: /* no data read */ 1.384 + return tcp_abort (stream); 1.385 + default: 1.386 + s += i; /* point at new place to write */ 1.387 + size -= i; /* reduce byte count */ 1.388 + if (tcpdebug) mm_log ("Successfully read TCP buffer",TCPDEBUG); 1.389 + } 1.390 + } 1.391 + } 1.392 + (*bn) (BLOCK_NONE,NIL); 1.393 + } 1.394 + *s = '\0'; /* tie off string */ 1.395 + return T; 1.396 +} 1.397 + 1.398 +/* TCP/IP receive data 1.399 + * Accepts: TCP/IP stream 1.400 + * Returns: T if success, NIL otherwise 1.401 + */ 1.402 + 1.403 +long tcp_getdata (TCPSTREAM *stream) 1.404 +{ 1.405 + struct timeval tmo; 1.406 + int i; 1.407 + fd_set fds; 1.408 + time_t tc,t = time (0); 1.409 + blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL); 1.410 + FD_ZERO (&fds); /* initialize selection vector */ 1.411 + if (stream->tcpsi == INVALID_SOCKET) return NIL; 1.412 + (*bn) (BLOCK_TCPREAD,NIL); 1.413 + tmo.tv_sec = ttmo_read; 1.414 + tmo.tv_usec = 0; 1.415 + while (stream->ictr < 1) { /* if nothing in the buffer */ 1.416 + time_t tl = time (0); 1.417 + if (tcpdebug) mm_log ("Reading TCP data",TCPDEBUG); 1.418 + FD_SET (stream->tcpsi,&fds);/* set bit in selection vector */ 1.419 + /* block and read */ 1.420 + switch ((stream->tcpsi == stream->tcpso) ? 1.421 + select (stream->tcpsi+1,&fds,0,0, 1.422 + ttmo_read ? &tmo : (struct timeval *) 0) : 1) { 1.423 + case SOCKET_ERROR: /* error */ 1.424 + if (WSAGetLastError () != WSAEINTR) return tcp_abort (stream); 1.425 + break; 1.426 + case 0: /* timeout */ 1.427 + tc = time (0); 1.428 + if (tmoh && ((*tmoh) (tc - t,tc - tl))) break; 1.429 + return tcp_abort (stream); 1.430 + default: 1.431 + if (stream->tcpsi == stream->tcpso) 1.432 + while (((i = recv (stream->tcpsi,stream->ibuf,BUFLEN,0)) == 1.433 + SOCKET_ERROR) && (WSAGetLastError () == WSAEINTR)); 1.434 + else while (((i = read (stream->tcpsi,stream->ibuf,BUFLEN)) < 0) && 1.435 + (errno == EINTR)); 1.436 + switch (i) { 1.437 + case SOCKET_ERROR: /* error */ 1.438 + case 0: /* no data read */ 1.439 + return tcp_abort (stream); 1.440 + default: 1.441 + stream->ictr = i; /* set new byte count */ 1.442 + /* point at TCP buffer */ 1.443 + stream->iptr = stream->ibuf; 1.444 + if (tcpdebug) mm_log ("Successfully read TCP data",TCPDEBUG); 1.445 + } 1.446 + } 1.447 + } 1.448 + (*bn) (BLOCK_NONE,NIL); 1.449 + return T; 1.450 +} 1.451 + 1.452 +/* TCP/IP send string as record 1.453 + * Accepts: TCP/IP stream 1.454 + * string pointer 1.455 + * Returns: T if success else NIL 1.456 + */ 1.457 + 1.458 +long tcp_soutr (TCPSTREAM *stream,char *string) 1.459 +{ 1.460 + return tcp_sout (stream,string,(unsigned long) strlen (string)); 1.461 +} 1.462 + 1.463 + 1.464 +/* TCP/IP send string 1.465 + * Accepts: TCP/IP stream 1.466 + * string pointer 1.467 + * byte count 1.468 + * Returns: T if success else NIL 1.469 + */ 1.470 + 1.471 +long tcp_sout (TCPSTREAM *stream,char *string,unsigned long size) 1.472 +{ 1.473 + int i; 1.474 + struct timeval tmo; 1.475 + fd_set fds; 1.476 + time_t tc,t = time (0); 1.477 + blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL); 1.478 + tmo.tv_sec = ttmo_write; 1.479 + tmo.tv_usec = 0; 1.480 + FD_ZERO (&fds); /* initialize selection vector */ 1.481 + if (stream->tcpso == INVALID_SOCKET) return NIL; 1.482 + (*bn) (BLOCK_TCPWRITE,NIL); 1.483 + while (size > 0) { /* until request satisfied */ 1.484 + time_t tl = time (0); 1.485 + if (tcpdebug) mm_log ("Writing to TCP",TCPDEBUG); 1.486 + FD_SET (stream->tcpso,&fds);/* set bit in selection vector */ 1.487 + /* block and write */ 1.488 + switch ((stream->tcpsi == stream->tcpso) ? 1.489 + select (stream->tcpso+1,NULL,&fds,NULL, 1.490 + tmo.tv_sec ? &tmo : (struct timeval *) 0) : 1) { 1.491 + case SOCKET_ERROR: /* error */ 1.492 + if (WSAGetLastError () != WSAEINTR) return tcp_abort (stream); 1.493 + break; 1.494 + case 0: /* timeout */ 1.495 + tc = time (0); 1.496 + if (tmoh && ((*tmoh) (tc - t,tc - tl))) break; 1.497 + return tcp_abort (stream); 1.498 + default: 1.499 + if (stream->tcpsi == stream->tcpso) 1.500 + while (((i = send (stream->tcpso,string, 1.501 + (int) min (size,TCPMAXSEND),0)) == SOCKET_ERROR) && 1.502 + (WSAGetLastError () == WSAEINTR)); 1.503 + else while (((i = write (stream->tcpso,string, 1.504 + min (size,TCPMAXSEND))) < 0) && 1.505 + (errno == EINTR)); 1.506 + if (i == SOCKET_ERROR) return tcp_abort (stream); 1.507 + size -= i; /* count this size */ 1.508 + if (tcpdebug) mm_log ("successfully wrote to TCP",TCPDEBUG); 1.509 + string += i; 1.510 + } 1.511 + } 1.512 + (*bn) (BLOCK_NONE,NIL); 1.513 + return T; /* all done */ 1.514 +} 1.515 + 1.516 + 1.517 +/* TCP/IP close 1.518 + * Accepts: TCP/IP stream 1.519 + */ 1.520 + 1.521 +void tcp_close (TCPSTREAM *stream) 1.522 +{ 1.523 + tcp_abort (stream); /* nuke the sockets */ 1.524 + /* flush host names */ 1.525 + if (stream->host) fs_give ((void **) &stream->host); 1.526 + if (stream->remotehost) fs_give ((void **) &stream->remotehost); 1.527 + if (stream->localhost) fs_give ((void **) &stream->localhost); 1.528 + fs_give ((void **) &stream); /* flush the stream */ 1.529 +} 1.530 + 1.531 + 1.532 +/* TCP/IP abort sockets 1.533 + * Accepts: TCP/IP stream 1.534 + * Returns: NIL, always 1.535 + */ 1.536 + 1.537 +long tcp_abort (TCPSTREAM *stream) 1.538 +{ 1.539 + if (stream->tcpsi != stream->tcpso) tcp_close_socket (&stream->tcpso); 1.540 + else stream->tcpso = INVALID_SOCKET; 1.541 + return tcp_close_socket (&stream->tcpsi); 1.542 +} 1.543 + 1.544 + 1.545 +/* TCP/IP abort stream 1.546 + * Accepts: WinSock socket 1.547 + * Returns: NIL, always 1.548 + */ 1.549 + 1.550 +long tcp_close_socket (SOCKET *sock) 1.551 +{ 1.552 + blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL); 1.553 + /* something to close? */ 1.554 + if (sock && (*sock != INVALID_SOCKET)) { 1.555 + (*bn) (BLOCK_TCPCLOSE,NIL); 1.556 + closesocket (*sock); /* WinSock socket close */ 1.557 + *sock = INVALID_SOCKET; 1.558 + (*bn) (BLOCK_NONE,NIL); 1.559 + wsa_sock_open--; /* drop this socket */ 1.560 + } 1.561 + /* no more open streams? */ 1.562 + if (wsa_initted && !wsa_sock_open) { 1.563 + mm_log ("Winsock cleanup",NIL); 1.564 + wsa_initted = 0; /* no more sockets, so... */ 1.565 + WSACleanup (); /* free up resources until needed */ 1.566 + } 1.567 + return NIL; 1.568 +} 1.569 + 1.570 +/* TCP/IP get host name 1.571 + * Accepts: TCP/IP stream 1.572 + * Returns: host name for this stream 1.573 + */ 1.574 + 1.575 +char *tcp_host (TCPSTREAM *stream) 1.576 +{ 1.577 + return stream->host; /* use tcp_remotehost() if want guarantees */ 1.578 +} 1.579 + 1.580 + 1.581 +/* TCP/IP get remote host name 1.582 + * Accepts: TCP/IP stream 1.583 + * Returns: host name for this stream 1.584 + */ 1.585 + 1.586 +char *tcp_remotehost (TCPSTREAM *stream) 1.587 +{ 1.588 + if (!stream->remotehost) { 1.589 + struct sockaddr_in sin; 1.590 + int sinlen = sizeof (struct sockaddr_in); 1.591 + stream->remotehost = /* get socket's peer name */ 1.592 + ((getpeername (stream->tcpsi,(struct sockaddr *) &sin,&sinlen) == 1.593 + SOCKET_ERROR) || (sinlen <= 0)) ? 1.594 + cpystr (stream->host) : tcp_name (&sin,NIL); 1.595 + } 1.596 + return stream->remotehost; 1.597 +} 1.598 + 1.599 + 1.600 +/* TCP/IP return port for this stream 1.601 + * Accepts: TCP/IP stream 1.602 + * Returns: port number for this stream 1.603 + */ 1.604 + 1.605 +unsigned long tcp_port (TCPSTREAM *stream) 1.606 +{ 1.607 + return stream->port; /* return port number */ 1.608 +} 1.609 + 1.610 + 1.611 +/* TCP/IP get local host name 1.612 + * Accepts: TCP/IP stream 1.613 + * Returns: local host name 1.614 + */ 1.615 + 1.616 +char *tcp_localhost (TCPSTREAM *stream) 1.617 +{ 1.618 + if (!stream->localhost) { 1.619 + struct sockaddr_in sin; 1.620 + int sinlen = sizeof (struct sockaddr_in); 1.621 + stream->localhost = /* get socket's name */ 1.622 + ((stream->port & 0xffff000) || 1.623 + ((getsockname (stream->tcpsi,(struct sockaddr *) &sin,&sinlen) == 1.624 + SOCKET_ERROR) || (sinlen <= 0))) ? 1.625 + cpystr (mylocalhost ()) : tcp_name (&sin,NIL); 1.626 + } 1.627 + return stream->localhost; /* return local host name */ 1.628 +} 1.629 + 1.630 +/* TCP/IP get client host address (server calls only) 1.631 + * Returns: client host address 1.632 + */ 1.633 + 1.634 +char *tcp_clientaddr () 1.635 +{ 1.636 + if (!myClientAddr) { 1.637 + struct sockaddr_in sin; 1.638 + int sinlen = sizeof (struct sockaddr_in); 1.639 + myClientAddr = /* get stdin's peer name */ 1.640 + ((getpeername (0,(struct sockaddr *) &sin,&sinlen) == SOCKET_ERROR) || 1.641 + (sinlen <= 0)) ? cpystr ("UNKNOWN") : cpystr (inet_ntoa (sin.sin_addr)); 1.642 + } 1.643 + return myClientAddr; 1.644 +} 1.645 + 1.646 + 1.647 +/* TCP/IP get client host name (server calls only) 1.648 + * Returns: client host name 1.649 + */ 1.650 + 1.651 +char *tcp_clienthost () 1.652 +{ 1.653 + if (!myClientHost) { 1.654 + struct sockaddr_in sin; 1.655 + int sinlen = sizeof (struct sockaddr_in); 1.656 + myClientHost = /* get stdin's peer name */ 1.657 + ((getpeername (0,(struct sockaddr *) &sin,&sinlen) == SOCKET_ERROR) || 1.658 + (sinlen <= 0)) ? cpystr ("UNKNOWN") : tcp_name (&sin,T); 1.659 + } 1.660 + return myClientHost; 1.661 +} 1.662 + 1.663 +/* TCP/IP get server host address (server calls only) 1.664 + * Returns: server host address 1.665 + */ 1.666 + 1.667 +char *tcp_serveraddr () 1.668 +{ 1.669 + if (!myServerAddr) { 1.670 + struct sockaddr_in sin; 1.671 + int sinlen = sizeof (struct sockaddr_in); 1.672 + myServerAddr = /* get stdin's peer name */ 1.673 + ((getsockname (0,(struct sockaddr *) &sin,&sinlen) == SOCKET_ERROR) || 1.674 + (sinlen <= 0)) ? cpystr ("UNKNOWN") : cpystr (inet_ntoa (sin.sin_addr)); 1.675 + } 1.676 + return myServerAddr; 1.677 +} 1.678 + 1.679 + 1.680 +/* TCP/IP get server host name (server calls only) 1.681 + * Returns: server host name 1.682 + */ 1.683 + 1.684 +static long myServerPort = -1; 1.685 + 1.686 +char *tcp_serverhost () 1.687 +{ 1.688 + if (!myServerHost) { 1.689 + struct sockaddr_in sin; 1.690 + int sinlen = sizeof (struct sockaddr_in); 1.691 + if (!wsa_initted++) { /* init Windows Sockets */ 1.692 + WSADATA wsock; 1.693 + if (WSAStartup (WSA_VERSION,&wsock)) { 1.694 + wsa_initted = 0; 1.695 + return "random-pc"; /* try again later? */ 1.696 + } 1.697 + } 1.698 + /* get stdin's name */ 1.699 + if ((getsockname (0,(struct sockaddr *) &sin,&sinlen) == SOCKET_ERROR) || 1.700 + (sinlen <= 0)) myServerHost = cpystr (mylocalhost ()); 1.701 + else { 1.702 + myServerHost = tcp_name (&sin,NIL); 1.703 + myServerPort = ntohs (sin.sin_port); 1.704 + } 1.705 + } 1.706 + return myServerHost; 1.707 +} 1.708 + 1.709 + 1.710 +/* TCP/IP get server port number (server calls only) 1.711 + * Returns: server port number 1.712 + */ 1.713 + 1.714 +long tcp_serverport () 1.715 +{ 1.716 + if (!myServerHost) tcp_serverhost (); 1.717 + return myServerPort; 1.718 +} 1.719 + 1.720 +/* TCP/IP return canonical form of host name 1.721 + * Accepts: host name 1.722 + * Returns: canonical form of host name 1.723 + */ 1.724 + 1.725 +char *tcp_canonical (char *name) 1.726 +{ 1.727 + char *ret,host[MAILTMPLEN]; 1.728 + struct hostent *he; 1.729 + blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL); 1.730 + /* look like domain literal? */ 1.731 + if (name[0] == '[' && name[strlen (name) - 1] == ']') return name; 1.732 + (*bn) (BLOCK_DNSLOOKUP,NIL); 1.733 + if (tcpdebug) { 1.734 + sprintf (host,"DNS canonicalization %.80s",name); 1.735 + mm_log (host,TCPDEBUG); 1.736 + } 1.737 + /* note that NT requires lowercase! */ 1.738 + ret = (he = gethostbyname (lcase (strcpy (host,name)))) ? he->h_name : name; 1.739 + (*bn) (BLOCK_NONE,NIL); 1.740 + if (tcpdebug) mm_log ("DNS canonicalization done",TCPDEBUG); 1.741 + return ret; 1.742 +} 1.743 + 1.744 + 1.745 +/* TCP/IP return name from socket 1.746 + * Accepts: socket 1.747 + * verbose flag 1.748 + * Returns: cpystr name 1.749 + */ 1.750 + 1.751 +char *tcp_name (struct sockaddr_in *sin,long flag) 1.752 +{ 1.753 + char *ret,*t,adr[MAILTMPLEN],tmp[MAILTMPLEN]; 1.754 + sprintf (ret = adr,"[%.80s]",inet_ntoa (sin->sin_addr)); 1.755 + if (allowreversedns) { 1.756 + struct hostent *he; 1.757 + blocknotify_t bn = (blocknotify_t)mail_parameters(NIL,GET_BLOCKNOTIFY,NIL); 1.758 + void *data; 1.759 + if (tcpdebug) { 1.760 + sprintf (tmp,"Reverse DNS resolution %s",adr); 1.761 + mm_log (tmp,TCPDEBUG); 1.762 + } 1.763 + (*bn) (BLOCK_DNSLOOKUP,NIL);/* quell alarms */ 1.764 + data = (*bn) (BLOCK_SENSITIVE,NIL); 1.765 + /* translate address to name */ 1.766 + if (t = tcp_name_valid ((he = gethostbyaddr ((char *) &sin->sin_addr, 1.767 + sizeof (struct in_addr), 1.768 + sin->sin_family)) ? 1.769 + (char *) he->h_name : NIL)) { 1.770 + /* produce verbose form if needed */ 1.771 + if (flag) sprintf (ret = tmp,"%s %s",t,adr); 1.772 + else ret = t; 1.773 + } 1.774 + (*bn) (BLOCK_NONSENSITIVE,data); 1.775 + (*bn) (BLOCK_NONE,NIL); /* alarms OK now */ 1.776 + if (tcpdebug) mm_log ("Reverse DNS resolution done",TCPDEBUG); 1.777 + } 1.778 + return cpystr (ret); 1.779 +} 1.780 + 1.781 +/* Return my local host name 1.782 + * Returns: my local host name 1.783 + */ 1.784 + 1.785 +char *mylocalhost (void) 1.786 +{ 1.787 + if (!myLocalHost) { 1.788 + char tmp[MAILTMPLEN]; 1.789 + if (!wsa_initted++) { /* init Windows Sockets */ 1.790 + WSADATA wsock; 1.791 + if (WSAStartup (WSA_VERSION,&wsock)) { 1.792 + wsa_initted = 0; 1.793 + return "random-pc"; /* try again later? */ 1.794 + } 1.795 + } 1.796 + myLocalHost = cpystr ((gethostname (tmp,MAILTMPLEN-1) == SOCKET_ERROR) ? 1.797 + "random-pc" : tcp_canonical (tmp)); 1.798 + } 1.799 + return myLocalHost; 1.800 +} 1.801 + 1.802 + 1.803 +/* Validate name 1.804 + * Accepts: domain name 1.805 + * Returns: T if valid, NIL otherwise 1.806 + */ 1.807 + 1.808 +char *tcp_name_valid (char *s) 1.809 +{ 1.810 + int c; 1.811 + char *ret,*tail; 1.812 + /* must be non-empty and not too long */ 1.813 + if ((ret = (s && *s) ? s : NIL) && (tail = ret + NETMAXHOST)) { 1.814 + /* must be alnum, dot, or hyphen */ 1.815 + while ((c = *s++) && (s <= tail) && 1.816 + (((c >= 'A') && (c <= 'Z')) || ((c >= 'a') && (c <= 'z')) || 1.817 + ((c >= '0') && (c <= '9')) || (c == '-') || (c == '.'))); 1.818 + if (c) ret = NIL; 1.819 + } 1.820 + return ret; 1.821 +}