1999-12-02 02:42:23 -05:00
|
|
|
|
/* Establishing and handling network connections.
|
2007-09-28 18:45:31 -04:00
|
|
|
|
Copyright (C) 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
|
2008-01-25 08:04:01 -05:00
|
|
|
|
2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2001-05-27 15:35:15 -04:00
|
|
|
|
This file is part of GNU Wget.
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2001-05-27 15:35:15 -04:00
|
|
|
|
GNU Wget is free software; you can redistribute it and/or modify
|
1999-12-02 02:42:23 -05:00
|
|
|
|
it under the terms of the GNU General Public License as published by
|
2007-07-10 01:53:22 -04:00
|
|
|
|
the Free Software Foundation; either version 3 of the License, or
|
2003-10-30 19:18:08 -05:00
|
|
|
|
(at your option) any later version.
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2001-05-27 15:35:15 -04:00
|
|
|
|
GNU Wget is distributed in the hope that it will be useful,
|
1999-12-02 02:42:23 -05:00
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
2007-07-10 01:53:22 -04:00
|
|
|
|
along with Wget. If not, see <http://www.gnu.org/licenses/>.
|
2002-05-17 22:16:36 -04:00
|
|
|
|
|
2007-11-28 03:05:33 -05:00
|
|
|
|
Additional permission under GNU GPL version 3 section 7
|
|
|
|
|
|
|
|
|
|
If you modify this program, or any covered work, by linking or
|
|
|
|
|
combining it with the OpenSSL project's OpenSSL library (or a
|
|
|
|
|
modified version of that library), containing parts covered by the
|
|
|
|
|
terms of the OpenSSL or SSLeay licenses, the Free Software Foundation
|
|
|
|
|
grants you additional permission to convey the resulting work.
|
|
|
|
|
Corresponding Source for a non-source form of such a combination
|
|
|
|
|
shall include the source code for the parts of OpenSSL used as well
|
|
|
|
|
as that of the covered work. */
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2007-10-18 23:50:40 -04:00
|
|
|
|
#include "wget.h"
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
|
|
|
|
#include <stdio.h>
|
2003-09-14 18:04:13 -04:00
|
|
|
|
#include <stdlib.h>
|
1999-12-02 02:42:23 -05:00
|
|
|
|
#ifdef HAVE_UNISTD_H
|
|
|
|
|
# include <unistd.h>
|
|
|
|
|
#endif
|
2001-11-26 00:36:33 -05:00
|
|
|
|
#include <assert.h>
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2003-10-03 12:37:47 -04:00
|
|
|
|
#ifndef WINDOWS
|
1999-12-02 02:42:23 -05:00
|
|
|
|
# include <sys/socket.h>
|
|
|
|
|
# include <netdb.h>
|
|
|
|
|
# include <netinet/in.h>
|
2003-10-03 12:37:47 -04:00
|
|
|
|
# ifndef __BEOS__
|
|
|
|
|
# include <arpa/inet.h>
|
|
|
|
|
# endif
|
|
|
|
|
#endif /* not WINDOWS */
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
|
|
|
|
#include <errno.h>
|
2005-06-19 18:34:58 -04:00
|
|
|
|
#include <string.h>
|
1999-12-02 02:42:23 -05:00
|
|
|
|
#ifdef HAVE_SYS_SELECT_H
|
|
|
|
|
# include <sys/select.h>
|
|
|
|
|
#endif /* HAVE_SYS_SELECT_H */
|
2008-03-17 04:53:49 -04:00
|
|
|
|
#ifdef HAVE_SYS_TIME_H
|
|
|
|
|
# include <sys/time.h>
|
|
|
|
|
#endif
|
2002-04-13 18:18:28 -04:00
|
|
|
|
#include "utils.h"
|
1999-12-02 02:42:23 -05:00
|
|
|
|
#include "host.h"
|
2002-01-24 22:34:23 -05:00
|
|
|
|
#include "connect.h"
|
2003-11-05 20:12:03 -05:00
|
|
|
|
#include "hash.h"
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2003-11-26 12:20:23 -05:00
|
|
|
|
/* Define sockaddr_storage where unavailable (presumably on IPv4-only
|
|
|
|
|
hosts). */
|
|
|
|
|
|
|
|
|
|
#ifndef ENABLE_IPV6
|
|
|
|
|
# ifndef HAVE_STRUCT_SOCKADDR_STORAGE
|
|
|
|
|
# define sockaddr_storage sockaddr_in
|
|
|
|
|
# endif
|
|
|
|
|
#endif /* ENABLE_IPV6 */
|
|
|
|
|
|
2003-10-31 07:20:14 -05:00
|
|
|
|
/* Fill SA as per the data in IP and PORT. SA shoult point to struct
|
|
|
|
|
sockaddr_storage if ENABLE_IPV6 is defined, to struct sockaddr_in
|
|
|
|
|
otherwise. */
|
|
|
|
|
|
2003-10-30 19:18:08 -05:00
|
|
|
|
static void
|
2003-10-31 07:20:14 -05:00
|
|
|
|
sockaddr_set_data (struct sockaddr *sa, const ip_address *ip, int port)
|
2002-01-24 22:34:23 -05:00
|
|
|
|
{
|
2005-08-10 09:50:08 -04:00
|
|
|
|
switch (ip->family)
|
2003-10-30 19:18:08 -05:00
|
|
|
|
{
|
2005-08-10 09:50:08 -04:00
|
|
|
|
case AF_INET:
|
2003-10-31 07:20:14 -05:00
|
|
|
|
{
|
2007-08-02 23:38:21 -04:00
|
|
|
|
struct sockaddr_in *sin = (struct sockaddr_in *)sa;
|
|
|
|
|
xzero (*sin);
|
|
|
|
|
sin->sin_family = AF_INET;
|
|
|
|
|
sin->sin_port = htons (port);
|
|
|
|
|
sin->sin_addr = ip->data.d4;
|
|
|
|
|
break;
|
2003-10-31 07:20:14 -05:00
|
|
|
|
}
|
2003-10-30 19:18:08 -05:00
|
|
|
|
#ifdef ENABLE_IPV6
|
2005-08-10 09:50:08 -04:00
|
|
|
|
case AF_INET6:
|
2003-10-31 07:20:14 -05:00
|
|
|
|
{
|
2007-08-02 23:38:21 -04:00
|
|
|
|
struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
|
|
|
|
|
xzero (*sin6);
|
|
|
|
|
sin6->sin6_family = AF_INET6;
|
|
|
|
|
sin6->sin6_port = htons (port);
|
|
|
|
|
sin6->sin6_addr = ip->data.d6;
|
2003-10-30 19:18:08 -05:00
|
|
|
|
#ifdef HAVE_SOCKADDR_IN6_SCOPE_ID
|
2007-08-02 23:38:21 -04:00
|
|
|
|
sin6->sin6_scope_id = ip->ipv6_scope;
|
2003-10-30 19:18:08 -05:00
|
|
|
|
#endif
|
2007-08-02 23:38:21 -04:00
|
|
|
|
break;
|
2003-10-31 07:20:14 -05:00
|
|
|
|
}
|
2003-10-30 19:18:08 -05:00
|
|
|
|
#endif /* ENABLE_IPV6 */
|
2003-10-31 07:20:14 -05:00
|
|
|
|
default:
|
|
|
|
|
abort ();
|
|
|
|
|
}
|
2003-10-30 19:18:08 -05:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Get the data of SA, specifically the IP address and the port. If
|
|
|
|
|
you're not interested in one or the other information, pass NULL as
|
|
|
|
|
the pointer. */
|
2002-01-24 22:34:23 -05:00
|
|
|
|
|
2003-11-07 21:57:51 -05:00
|
|
|
|
static void
|
2003-10-30 19:18:08 -05:00
|
|
|
|
sockaddr_get_data (const struct sockaddr *sa, ip_address *ip, int *port)
|
|
|
|
|
{
|
2003-10-31 07:20:14 -05:00
|
|
|
|
switch (sa->sa_family)
|
2003-10-29 13:23:56 -05:00
|
|
|
|
{
|
2003-10-31 07:20:14 -05:00
|
|
|
|
case AF_INET:
|
|
|
|
|
{
|
2007-08-02 23:38:21 -04:00
|
|
|
|
struct sockaddr_in *sin = (struct sockaddr_in *)sa;
|
|
|
|
|
if (ip)
|
|
|
|
|
{
|
|
|
|
|
ip->family = AF_INET;
|
|
|
|
|
ip->data.d4 = sin->sin_addr;
|
|
|
|
|
}
|
|
|
|
|
if (port)
|
|
|
|
|
*port = ntohs (sin->sin_port);
|
|
|
|
|
break;
|
2003-10-31 07:20:14 -05:00
|
|
|
|
}
|
2003-10-30 19:18:08 -05:00
|
|
|
|
#ifdef ENABLE_IPV6
|
2003-10-31 07:20:14 -05:00
|
|
|
|
case AF_INET6:
|
|
|
|
|
{
|
2007-08-02 23:38:21 -04:00
|
|
|
|
struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
|
|
|
|
|
if (ip)
|
|
|
|
|
{
|
|
|
|
|
ip->family = AF_INET6;
|
|
|
|
|
ip->data.d6 = sin6->sin6_addr;
|
2003-10-30 19:18:08 -05:00
|
|
|
|
#ifdef HAVE_SOCKADDR_IN6_SCOPE_ID
|
2007-08-02 23:38:21 -04:00
|
|
|
|
ip->ipv6_scope = sin6->sin6_scope_id;
|
2003-10-30 19:18:08 -05:00
|
|
|
|
#endif
|
2007-08-02 23:38:21 -04:00
|
|
|
|
}
|
|
|
|
|
if (port)
|
|
|
|
|
*port = ntohs (sin6->sin6_port);
|
|
|
|
|
break;
|
2003-10-31 07:20:14 -05:00
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
default:
|
|
|
|
|
abort ();
|
2003-10-29 13:23:56 -05:00
|
|
|
|
}
|
2003-10-30 19:18:08 -05:00
|
|
|
|
}
|
2002-01-24 22:34:23 -05:00
|
|
|
|
|
2003-10-30 19:18:08 -05:00
|
|
|
|
/* Return the size of the sockaddr structure depending on its
|
|
|
|
|
family. */
|
|
|
|
|
|
|
|
|
|
static socklen_t
|
|
|
|
|
sockaddr_size (const struct sockaddr *sa)
|
|
|
|
|
{
|
|
|
|
|
switch (sa->sa_family)
|
2002-01-24 22:34:23 -05:00
|
|
|
|
{
|
2003-10-30 19:18:08 -05:00
|
|
|
|
case AF_INET:
|
|
|
|
|
return sizeof (struct sockaddr_in);
|
2003-10-29 13:23:56 -05:00
|
|
|
|
#ifdef ENABLE_IPV6
|
2003-10-30 19:18:08 -05:00
|
|
|
|
case AF_INET6:
|
|
|
|
|
return sizeof (struct sockaddr_in6);
|
2003-10-29 13:23:56 -05:00
|
|
|
|
#endif
|
2003-10-30 19:18:08 -05:00
|
|
|
|
default:
|
|
|
|
|
abort ();
|
2002-01-24 22:34:23 -05:00
|
|
|
|
}
|
2003-10-30 19:18:08 -05:00
|
|
|
|
}
|
|
|
|
|
|
2005-06-22 15:38:10 -04:00
|
|
|
|
/* Resolve the bind address specified via --bind-address and store it
|
|
|
|
|
to SA. The resolved value is stored in a static variable and
|
|
|
|
|
reused after the first invocation of this function.
|
|
|
|
|
|
|
|
|
|
Returns true on success, false on failure. */
|
|
|
|
|
|
|
|
|
|
static bool
|
2003-11-09 20:38:09 -05:00
|
|
|
|
resolve_bind_address (struct sockaddr *sa)
|
2003-10-30 19:18:08 -05:00
|
|
|
|
{
|
|
|
|
|
struct address_list *al;
|
2002-01-24 22:34:23 -05:00
|
|
|
|
|
2003-11-09 20:38:09 -05:00
|
|
|
|
/* Make sure this is called only once. opt.bind_address doesn't
|
|
|
|
|
change during a Wget run. */
|
2005-06-22 15:38:10 -04:00
|
|
|
|
static bool called, should_bind;
|
2003-11-09 20:38:09 -05:00
|
|
|
|
static ip_address ip;
|
|
|
|
|
if (called)
|
|
|
|
|
{
|
|
|
|
|
if (should_bind)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
sockaddr_set_data (sa, &ip, 0);
|
2003-11-09 20:38:09 -05:00
|
|
|
|
return should_bind;
|
|
|
|
|
}
|
2005-06-22 15:38:10 -04:00
|
|
|
|
called = true;
|
2003-10-29 13:23:56 -05:00
|
|
|
|
|
2003-11-14 20:49:52 -05:00
|
|
|
|
al = lookup_host (opt.bind_address, LH_BIND | LH_SILENT);
|
2003-11-09 20:38:09 -05:00
|
|
|
|
if (!al)
|
2003-10-30 19:18:08 -05:00
|
|
|
|
{
|
2003-11-09 20:38:09 -05:00
|
|
|
|
/* #### We should be able to print the error message here. */
|
2003-10-30 19:18:08 -05:00
|
|
|
|
logprintf (LOG_NOTQUIET,
|
2008-04-16 05:45:14 -04:00
|
|
|
|
_("%s: unable to resolve bind address %s; disabling bind.\n"),
|
|
|
|
|
exec_name, quote (opt.bind_address));
|
2005-06-22 15:38:10 -04:00
|
|
|
|
should_bind = false;
|
|
|
|
|
return false;
|
2003-10-30 19:18:08 -05:00
|
|
|
|
}
|
2003-10-29 13:23:56 -05:00
|
|
|
|
|
2003-10-30 19:18:08 -05:00
|
|
|
|
/* Pick the first address in the list and use it as bind address.
|
2003-11-09 20:38:09 -05:00
|
|
|
|
Perhaps we should try multiple addresses in succession, but I
|
|
|
|
|
don't think that's necessary in practice. */
|
|
|
|
|
ip = *address_list_address_at (al, 0);
|
2003-10-30 19:18:08 -05:00
|
|
|
|
address_list_release (al);
|
2003-11-09 20:38:09 -05:00
|
|
|
|
|
|
|
|
|
sockaddr_set_data (sa, &ip, 0);
|
2005-06-22 15:38:10 -04:00
|
|
|
|
should_bind = true;
|
|
|
|
|
return true;
|
2002-01-24 22:34:23 -05:00
|
|
|
|
}
|
2002-04-11 21:14:18 -04:00
|
|
|
|
|
2002-04-13 18:18:28 -04:00
|
|
|
|
struct cwt_context {
|
|
|
|
|
int fd;
|
|
|
|
|
const struct sockaddr *addr;
|
2003-10-10 21:39:07 -04:00
|
|
|
|
socklen_t addrlen;
|
2002-04-13 18:18:28 -04:00
|
|
|
|
int result;
|
|
|
|
|
};
|
2002-04-11 21:14:18 -04:00
|
|
|
|
|
2002-04-13 18:18:28 -04:00
|
|
|
|
static void
|
|
|
|
|
connect_with_timeout_callback (void *arg)
|
2002-04-11 21:14:18 -04:00
|
|
|
|
{
|
2002-04-13 18:18:28 -04:00
|
|
|
|
struct cwt_context *ctx = (struct cwt_context *)arg;
|
|
|
|
|
ctx->result = connect (ctx->fd, ctx->addr, ctx->addrlen);
|
2002-04-11 21:14:18 -04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Like connect, but specifies a timeout. If connecting takes longer
|
|
|
|
|
than TIMEOUT seconds, -1 is returned and errno is set to
|
|
|
|
|
ETIMEDOUT. */
|
|
|
|
|
|
|
|
|
|
static int
|
2003-10-10 21:39:07 -04:00
|
|
|
|
connect_with_timeout (int fd, const struct sockaddr *addr, socklen_t addrlen,
|
2007-08-02 23:38:21 -04:00
|
|
|
|
double timeout)
|
2002-04-11 21:14:18 -04:00
|
|
|
|
{
|
2002-04-13 18:18:28 -04:00
|
|
|
|
struct cwt_context ctx;
|
|
|
|
|
ctx.fd = fd;
|
|
|
|
|
ctx.addr = addr;
|
|
|
|
|
ctx.addrlen = addrlen;
|
2002-01-24 22:34:23 -05:00
|
|
|
|
|
2002-04-13 18:18:28 -04:00
|
|
|
|
if (run_with_timeout (timeout, connect_with_timeout_callback, &ctx))
|
2002-04-11 21:14:18 -04:00
|
|
|
|
{
|
|
|
|
|
errno = ETIMEDOUT;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2002-04-13 18:18:28 -04:00
|
|
|
|
if (ctx.result == -1 && errno == EINTR)
|
|
|
|
|
errno = ETIMEDOUT;
|
|
|
|
|
return ctx.result;
|
2002-04-11 21:14:18 -04:00
|
|
|
|
}
|
|
|
|
|
|
2003-11-17 18:53:14 -05:00
|
|
|
|
/* Connect via TCP to the specified address and port.
|
|
|
|
|
|
|
|
|
|
If PRINT is non-NULL, it is the host name to print that we're
|
|
|
|
|
connecting to. */
|
2001-11-25 12:13:20 -05:00
|
|
|
|
|
2001-11-27 07:49:13 -05:00
|
|
|
|
int
|
2003-10-30 19:18:08 -05:00
|
|
|
|
connect_to_ip (const ip_address *ip, int port, const char *print)
|
2001-11-26 00:36:33 -05:00
|
|
|
|
{
|
2003-10-29 13:23:56 -05:00
|
|
|
|
struct sockaddr_storage ss;
|
|
|
|
|
struct sockaddr *sa = (struct sockaddr *)&ss;
|
2005-02-28 13:48:23 -05:00
|
|
|
|
int sock;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2003-10-30 19:18:08 -05:00
|
|
|
|
/* If PRINT is non-NULL, print the "Connecting to..." line, with
|
|
|
|
|
PRINT being the host name we're connecting to. */
|
|
|
|
|
if (print)
|
2001-11-26 00:36:33 -05:00
|
|
|
|
{
|
2005-06-30 16:03:18 -04:00
|
|
|
|
const char *txt_addr = print_address (ip);
|
2003-10-30 19:18:08 -05:00
|
|
|
|
if (print && 0 != strcmp (print, txt_addr))
|
2007-08-02 23:38:21 -04:00
|
|
|
|
logprintf (LOG_VERBOSE, _("Connecting to %s|%s|:%d... "),
|
|
|
|
|
escnonprint (print), txt_addr, port);
|
2001-11-26 00:36:33 -05:00
|
|
|
|
else
|
2007-08-02 23:38:21 -04:00
|
|
|
|
logprintf (LOG_VERBOSE, _("Connecting to %s:%d... "), txt_addr, port);
|
2001-11-26 00:36:33 -05:00
|
|
|
|
}
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2003-10-30 19:18:08 -05:00
|
|
|
|
/* Store the sockaddr info to SA. */
|
|
|
|
|
sockaddr_set_data (sa, ip, port);
|
|
|
|
|
|
2003-10-29 18:13:25 -05:00
|
|
|
|
/* Create the socket of the family appropriate for the address. */
|
2003-10-29 13:23:56 -05:00
|
|
|
|
sock = socket (sa->sa_family, SOCK_STREAM, 0);
|
2001-11-26 00:36:33 -05:00
|
|
|
|
if (sock < 0)
|
2003-11-05 10:12:14 -05:00
|
|
|
|
goto err;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2005-04-20 21:26:33 -04:00
|
|
|
|
#if defined(ENABLE_IPV6) && defined(IPV6_V6ONLY)
|
|
|
|
|
if (opt.ipv6_only) {
|
|
|
|
|
int on = 1;
|
|
|
|
|
/* In case of error, we will go on anyway... */
|
|
|
|
|
int err = setsockopt (sock, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof (on));
|
2005-06-21 21:26:22 -04:00
|
|
|
|
IF_DEBUG
|
|
|
|
|
if (err < 0)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
DEBUGP (("Failed setting IPV6_V6ONLY: %s", strerror (errno)));
|
2005-04-20 21:26:33 -04:00
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
2003-09-15 17:48:43 -04:00
|
|
|
|
/* For very small rate limits, set the buffer size (and hence,
|
2003-10-30 19:18:08 -05:00
|
|
|
|
hopefully, the kernel's TCP window size) to the per-second limit.
|
|
|
|
|
That way we should never have to sleep for more than 1s between
|
|
|
|
|
network reads. */
|
2003-09-15 17:48:43 -04:00
|
|
|
|
if (opt.limit_rate && opt.limit_rate < 8192)
|
|
|
|
|
{
|
|
|
|
|
int bufsize = opt.limit_rate;
|
|
|
|
|
if (bufsize < 512)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
bufsize = 512; /* avoid pathologically small values */
|
2003-09-22 09:55:22 -04:00
|
|
|
|
#ifdef SO_RCVBUF
|
2003-09-15 17:48:43 -04:00
|
|
|
|
setsockopt (sock, SOL_SOCKET, SO_RCVBUF,
|
2007-08-02 23:38:21 -04:00
|
|
|
|
(void *)&bufsize, (socklen_t)sizeof (bufsize));
|
2003-09-15 17:48:43 -04:00
|
|
|
|
#endif
|
2003-10-30 19:18:08 -05:00
|
|
|
|
/* When we add limit_rate support for writing, which is useful
|
2007-08-02 23:38:21 -04:00
|
|
|
|
for POST, we should also set SO_SNDBUF here. */
|
2003-09-22 09:55:22 -04:00
|
|
|
|
}
|
2003-09-15 17:48:43 -04:00
|
|
|
|
|
2003-10-29 13:23:56 -05:00
|
|
|
|
if (opt.bind_address)
|
2000-10-24 02:19:17 -04:00
|
|
|
|
{
|
2003-10-30 19:18:08 -05:00
|
|
|
|
/* Bind the client side of the socket to the requested
|
2007-08-02 23:38:21 -04:00
|
|
|
|
address. */
|
2003-10-30 19:18:08 -05:00
|
|
|
|
struct sockaddr_storage bind_ss;
|
|
|
|
|
struct sockaddr *bind_sa = (struct sockaddr *)&bind_ss;
|
2003-11-09 20:38:09 -05:00
|
|
|
|
if (resolve_bind_address (bind_sa))
|
2007-08-02 23:38:21 -04:00
|
|
|
|
{
|
2003-10-30 19:18:08 -05:00
|
|
|
|
if (bind (sock, bind_sa, sockaddr_size (bind_sa)) < 0)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
goto err;
|
|
|
|
|
}
|
2000-10-24 02:19:17 -04:00
|
|
|
|
}
|
|
|
|
|
|
2003-10-30 19:18:08 -05:00
|
|
|
|
/* Connect the socket to the remote endpoint. */
|
|
|
|
|
if (connect_with_timeout (sock, sa, sockaddr_size (sa),
|
2007-08-02 23:38:21 -04:00
|
|
|
|
opt.connect_timeout) < 0)
|
2003-11-05 10:12:14 -05:00
|
|
|
|
goto err;
|
2001-11-26 00:36:33 -05:00
|
|
|
|
|
2003-11-05 10:12:14 -05:00
|
|
|
|
/* Success. */
|
|
|
|
|
assert (sock >= 0);
|
|
|
|
|
if (print)
|
|
|
|
|
logprintf (LOG_VERBOSE, _("connected.\n"));
|
|
|
|
|
DEBUGP (("Created socket %d.\n", sock));
|
2001-11-26 00:36:33 -05:00
|
|
|
|
return sock;
|
2003-11-05 10:12:14 -05:00
|
|
|
|
|
|
|
|
|
err:
|
|
|
|
|
{
|
|
|
|
|
/* Protect errno from possible modifications by close and
|
|
|
|
|
logprintf. */
|
|
|
|
|
int save_errno = errno;
|
|
|
|
|
if (sock >= 0)
|
2003-11-20 10:19:59 -05:00
|
|
|
|
fd_close (sock);
|
2003-11-05 10:12:14 -05:00
|
|
|
|
if (print)
|
2005-06-15 16:26:37 -04:00
|
|
|
|
logprintf (LOG_VERBOSE, _("failed: %s.\n"), strerror (errno));
|
2003-11-05 10:12:14 -05:00
|
|
|
|
errno = save_errno;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2001-11-26 00:36:33 -05:00
|
|
|
|
}
|
|
|
|
|
|
2003-11-17 18:53:14 -05:00
|
|
|
|
/* Connect via TCP to a remote host on the specified port.
|
|
|
|
|
|
|
|
|
|
HOST is resolved as an Internet host name. If HOST resolves to
|
|
|
|
|
more than one IP address, they are tried in the order returned by
|
|
|
|
|
DNS until connecting to one of them succeeds. */
|
2003-10-30 19:18:08 -05:00
|
|
|
|
|
2001-11-26 00:36:33 -05:00
|
|
|
|
int
|
2003-10-30 19:18:08 -05:00
|
|
|
|
connect_to_host (const char *host, int port)
|
2001-11-26 00:36:33 -05:00
|
|
|
|
{
|
2001-11-27 09:55:40 -05:00
|
|
|
|
int i, start, end;
|
2003-11-17 15:51:27 -05:00
|
|
|
|
int sock;
|
2003-10-30 19:18:08 -05:00
|
|
|
|
|
2003-11-17 15:51:27 -05:00
|
|
|
|
struct address_list *al = lookup_host (host, 0);
|
|
|
|
|
|
|
|
|
|
retry:
|
2003-10-30 19:18:08 -05:00
|
|
|
|
if (!al)
|
2007-10-03 01:12:04 -04:00
|
|
|
|
{
|
|
|
|
|
logprintf (LOG_NOTQUIET,
|
2008-04-16 05:45:14 -04:00
|
|
|
|
_("%s: unable to resolve host address %s\n"),
|
|
|
|
|
exec_name, quote (host));
|
2007-10-03 01:12:04 -04:00
|
|
|
|
return E_HOST;
|
|
|
|
|
}
|
2001-11-26 00:36:33 -05:00
|
|
|
|
|
2001-11-27 09:55:40 -05:00
|
|
|
|
address_list_get_bounds (al, &start, &end);
|
|
|
|
|
for (i = start; i < end; i++)
|
2001-11-26 00:36:33 -05:00
|
|
|
|
{
|
2003-10-30 19:18:08 -05:00
|
|
|
|
const ip_address *ip = address_list_address_at (al, i);
|
|
|
|
|
sock = connect_to_ip (ip, port, host);
|
2001-11-26 00:36:33 -05:00
|
|
|
|
if (sock >= 0)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
{
|
|
|
|
|
/* Success. */
|
|
|
|
|
address_list_set_connected (al);
|
|
|
|
|
address_list_release (al);
|
|
|
|
|
return sock;
|
|
|
|
|
}
|
2001-11-26 00:36:33 -05:00
|
|
|
|
|
|
|
|
|
/* The attempt to connect has failed. Continue with the loop
|
2007-08-02 23:38:21 -04:00
|
|
|
|
and try next address. */
|
2003-11-17 15:51:27 -05:00
|
|
|
|
|
|
|
|
|
address_list_set_faulty (al, i);
|
2001-11-26 00:36:33 -05:00
|
|
|
|
}
|
2003-10-30 19:18:08 -05:00
|
|
|
|
|
2003-11-17 15:51:27 -05:00
|
|
|
|
/* Failed to connect to any of the addresses in AL. */
|
2003-11-10 08:20:46 -05:00
|
|
|
|
|
2003-11-17 15:51:27 -05:00
|
|
|
|
if (address_list_connected_p (al))
|
2003-10-30 19:18:08 -05:00
|
|
|
|
{
|
2003-11-17 15:51:27 -05:00
|
|
|
|
/* We connected to AL before, but cannot do so now. That might
|
2007-08-02 23:38:21 -04:00
|
|
|
|
indicate that our DNS cache entry for HOST has expired. */
|
2003-11-17 15:51:27 -05:00
|
|
|
|
address_list_release (al);
|
|
|
|
|
al = lookup_host (host, LH_REFRESH);
|
|
|
|
|
goto retry;
|
2003-10-30 19:18:08 -05:00
|
|
|
|
}
|
2003-11-17 15:51:27 -05:00
|
|
|
|
address_list_release (al);
|
2001-11-26 00:36:33 -05:00
|
|
|
|
|
2003-11-17 15:51:27 -05:00
|
|
|
|
return -1;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
}
|
2003-11-17 18:53:14 -05:00
|
|
|
|
|
2003-11-13 12:05:06 -05:00
|
|
|
|
/* Create a socket, bind it to local interface BIND_ADDRESS on port
|
|
|
|
|
*PORT, set up a listen backlog, and return the resulting socket, or
|
|
|
|
|
-1 in case of error.
|
2003-10-29 13:23:56 -05:00
|
|
|
|
|
2003-11-13 12:05:06 -05:00
|
|
|
|
BIND_ADDRESS is the address of the interface to bind to. If it is
|
|
|
|
|
NULL, the socket is bound to the default address. PORT should
|
|
|
|
|
point to the port number that will be used for the binding. If
|
|
|
|
|
that number is 0, the system will choose a suitable port, and the
|
|
|
|
|
chosen value will be written to *PORT.
|
|
|
|
|
|
|
|
|
|
Calling accept() on such a socket waits for and accepts incoming
|
|
|
|
|
TCP connections. */
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
bind_local (const ip_address *bind_address, int *port)
|
1999-12-02 02:42:23 -05:00
|
|
|
|
{
|
2003-11-05 10:12:14 -05:00
|
|
|
|
int sock;
|
2003-10-29 13:23:56 -05:00
|
|
|
|
struct sockaddr_storage ss;
|
|
|
|
|
struct sockaddr *sa = (struct sockaddr *)&ss;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2003-11-05 10:12:14 -05:00
|
|
|
|
/* For setting options with setsockopt. */
|
|
|
|
|
int setopt_val = 1;
|
|
|
|
|
void *setopt_ptr = (void *)&setopt_val;
|
|
|
|
|
socklen_t setopt_size = sizeof (setopt_val);
|
|
|
|
|
|
2005-08-10 09:50:08 -04:00
|
|
|
|
sock = socket (bind_address->family, SOCK_STREAM, 0);
|
2003-11-13 12:05:06 -05:00
|
|
|
|
if (sock < 0)
|
|
|
|
|
return -1;
|
2003-09-15 17:48:43 -04:00
|
|
|
|
|
|
|
|
|
#ifdef SO_REUSEADDR
|
2003-11-05 10:12:14 -05:00
|
|
|
|
setsockopt (sock, SOL_SOCKET, SO_REUSEADDR, setopt_ptr, setopt_size);
|
2003-09-15 17:48:43 -04:00
|
|
|
|
#endif
|
2000-10-24 02:19:17 -04:00
|
|
|
|
|
2003-11-05 16:33:46 -05:00
|
|
|
|
xzero (ss);
|
2003-10-30 19:18:08 -05:00
|
|
|
|
sockaddr_set_data (sa, bind_address, *port);
|
2003-11-05 10:12:14 -05:00
|
|
|
|
if (bind (sock, sa, sockaddr_size (sa)) < 0)
|
1999-12-02 02:42:23 -05:00
|
|
|
|
{
|
2003-11-20 10:19:59 -05:00
|
|
|
|
fd_close (sock);
|
2003-11-13 12:05:06 -05:00
|
|
|
|
return -1;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
}
|
2003-11-05 10:12:14 -05:00
|
|
|
|
DEBUGP (("Local socket fd %d bound.\n", sock));
|
2003-11-13 12:05:06 -05:00
|
|
|
|
|
|
|
|
|
/* If *PORT is 0, find out which port we've bound to. */
|
|
|
|
|
if (*port == 0)
|
1999-12-02 02:42:23 -05:00
|
|
|
|
{
|
2003-11-27 05:59:41 -05:00
|
|
|
|
socklen_t addrlen = sockaddr_size (sa);
|
|
|
|
|
if (getsockname (sock, sa, &addrlen) < 0)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
{
|
|
|
|
|
/* If we can't find out the socket's local address ("name"),
|
|
|
|
|
something is seriously wrong with the socket, and it's
|
|
|
|
|
unusable for us anyway because we must know the chosen
|
|
|
|
|
port. */
|
|
|
|
|
fd_close (sock);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2003-10-30 19:18:08 -05:00
|
|
|
|
sockaddr_get_data (sa, NULL, port);
|
2005-06-30 16:03:18 -04:00
|
|
|
|
DEBUGP (("binding to address %s using port %i.\n",
|
2007-08-02 23:38:21 -04:00
|
|
|
|
print_address (bind_address), *port));
|
1999-12-02 02:42:23 -05:00
|
|
|
|
}
|
2003-11-05 10:12:14 -05:00
|
|
|
|
if (listen (sock, 1) < 0)
|
1999-12-02 02:42:23 -05:00
|
|
|
|
{
|
2003-11-20 10:19:59 -05:00
|
|
|
|
fd_close (sock);
|
2003-11-13 12:05:06 -05:00
|
|
|
|
return -1;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
}
|
2003-11-13 12:05:06 -05:00
|
|
|
|
return sock;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
}
|
|
|
|
|
|
2003-11-13 12:05:06 -05:00
|
|
|
|
/* Like a call to accept(), but with the added check for timeout.
|
|
|
|
|
|
|
|
|
|
In other words, accept a client connection on LOCAL_SOCK, and
|
|
|
|
|
return the new socket used for communication with the client.
|
|
|
|
|
LOCAL_SOCK should have been bound, e.g. using bind_local().
|
|
|
|
|
|
|
|
|
|
The caller is blocked until a connection is established. If no
|
|
|
|
|
connection is established for opt.connect_timeout seconds, the
|
2003-09-21 00:41:55 -04:00
|
|
|
|
function exits with an error status. */
|
2003-10-30 19:18:08 -05:00
|
|
|
|
|
2003-11-13 12:05:06 -05:00
|
|
|
|
int
|
|
|
|
|
accept_connection (int local_sock)
|
1999-12-02 02:42:23 -05:00
|
|
|
|
{
|
2003-11-13 12:05:06 -05:00
|
|
|
|
int sock;
|
|
|
|
|
|
|
|
|
|
/* We don't need the values provided by accept, but accept
|
|
|
|
|
apparently requires them to be present. */
|
2003-10-29 13:23:56 -05:00
|
|
|
|
struct sockaddr_storage ss;
|
|
|
|
|
struct sockaddr *sa = (struct sockaddr *)&ss;
|
|
|
|
|
socklen_t addrlen = sizeof (ss);
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2003-11-01 09:01:53 -05:00
|
|
|
|
if (opt.connect_timeout)
|
2003-11-13 12:05:06 -05:00
|
|
|
|
{
|
|
|
|
|
int test = select_fd (local_sock, opt.connect_timeout, WAIT_FOR_READ);
|
|
|
|
|
if (test == 0)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
errno = ETIMEDOUT;
|
2003-11-13 12:05:06 -05:00
|
|
|
|
if (test <= 0)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
return -1;
|
2003-11-13 12:05:06 -05:00
|
|
|
|
}
|
|
|
|
|
sock = accept (local_sock, sa, &addrlen);
|
|
|
|
|
DEBUGP (("Accepted client at socket %d.\n", sock));
|
|
|
|
|
return sock;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
}
|
|
|
|
|
|
2003-11-07 21:57:51 -05:00
|
|
|
|
/* Get the IP address associated with the connection on FD and store
|
2005-06-22 15:38:10 -04:00
|
|
|
|
it to IP. Return true on success, false otherwise.
|
2003-11-07 21:57:51 -05:00
|
|
|
|
|
|
|
|
|
If ENDPOINT is ENDPOINT_LOCAL, it returns the address of the local
|
|
|
|
|
(client) side of the socket. Else if ENDPOINT is ENDPOINT_PEER, it
|
|
|
|
|
returns the address of the remote (peer's) side of the socket. */
|
2002-01-24 00:45:54 -05:00
|
|
|
|
|
2005-06-22 15:38:10 -04:00
|
|
|
|
bool
|
2003-11-07 21:57:51 -05:00
|
|
|
|
socket_ip_address (int sock, ip_address *ip, int endpoint)
|
1999-12-02 02:42:23 -05:00
|
|
|
|
{
|
2003-10-29 18:13:25 -05:00
|
|
|
|
struct sockaddr_storage storage;
|
|
|
|
|
struct sockaddr *sockaddr = (struct sockaddr *)&storage;
|
|
|
|
|
socklen_t addrlen = sizeof (storage);
|
2003-11-07 21:57:51 -05:00
|
|
|
|
int ret;
|
2003-10-29 13:23:56 -05:00
|
|
|
|
|
2003-11-07 21:57:51 -05:00
|
|
|
|
if (endpoint == ENDPOINT_LOCAL)
|
|
|
|
|
ret = getsockname (sock, sockaddr, &addrlen);
|
|
|
|
|
else if (endpoint == ENDPOINT_PEER)
|
|
|
|
|
ret = getpeername (sock, sockaddr, &addrlen);
|
|
|
|
|
else
|
|
|
|
|
abort ();
|
|
|
|
|
if (ret < 0)
|
2005-06-22 15:38:10 -04:00
|
|
|
|
return false;
|
2002-01-24 00:45:54 -05:00
|
|
|
|
|
2005-08-10 09:50:08 -04:00
|
|
|
|
ip->family = sockaddr->sa_family;
|
2003-10-29 18:13:25 -05:00
|
|
|
|
switch (sockaddr->sa_family)
|
2002-01-24 00:45:54 -05:00
|
|
|
|
{
|
2003-09-09 15:30:45 -04:00
|
|
|
|
#ifdef ENABLE_IPV6
|
2002-01-24 00:45:54 -05:00
|
|
|
|
case AF_INET6:
|
2003-10-29 18:13:25 -05:00
|
|
|
|
{
|
2007-08-02 23:38:21 -04:00
|
|
|
|
struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)&storage;
|
|
|
|
|
ip->data.d6 = sa6->sin6_addr;
|
2003-10-29 13:23:56 -05:00
|
|
|
|
#ifdef HAVE_SOCKADDR_IN6_SCOPE_ID
|
2007-08-02 23:38:21 -04:00
|
|
|
|
ip->ipv6_scope = sa6->sin6_scope_id;
|
2003-10-29 13:23:56 -05:00
|
|
|
|
#endif
|
2007-08-02 23:38:21 -04:00
|
|
|
|
DEBUGP (("conaddr is: %s\n", print_address (ip)));
|
|
|
|
|
return true;
|
2003-10-29 18:13:25 -05:00
|
|
|
|
}
|
2002-01-24 00:45:54 -05:00
|
|
|
|
#endif
|
|
|
|
|
case AF_INET:
|
2003-10-29 18:13:25 -05:00
|
|
|
|
{
|
2007-08-02 23:38:21 -04:00
|
|
|
|
struct sockaddr_in *sa = (struct sockaddr_in *)&storage;
|
|
|
|
|
ip->data.d4 = sa->sin_addr;
|
|
|
|
|
DEBUGP (("conaddr is: %s\n", print_address (ip)));
|
|
|
|
|
return true;
|
2003-10-29 18:13:25 -05:00
|
|
|
|
}
|
2002-01-24 00:45:54 -05:00
|
|
|
|
default:
|
|
|
|
|
abort ();
|
|
|
|
|
}
|
1999-12-02 02:42:23 -05:00
|
|
|
|
}
|
2003-11-13 15:26:18 -05:00
|
|
|
|
|
2005-06-22 15:38:10 -04:00
|
|
|
|
/* Return true if the error from the connect code can be considered
|
|
|
|
|
retryable. Wget normally retries after errors, but the exception
|
|
|
|
|
are the "unsupported protocol" type errors (possible on IPv4/IPv6
|
|
|
|
|
dual family systems) and "connection refused". */
|
2003-11-13 15:26:18 -05:00
|
|
|
|
|
2005-06-22 15:38:10 -04:00
|
|
|
|
bool
|
2003-11-13 17:27:38 -05:00
|
|
|
|
retryable_socket_connect_error (int err)
|
2003-11-13 15:26:18 -05:00
|
|
|
|
{
|
|
|
|
|
/* Have to guard against some of these values not being defined.
|
2003-11-13 17:27:38 -05:00
|
|
|
|
Cannot use a switch statement because some of the values might be
|
|
|
|
|
equal. */
|
2005-06-22 15:38:10 -04:00
|
|
|
|
if (false
|
2003-11-13 15:26:18 -05:00
|
|
|
|
#ifdef EAFNOSUPPORT
|
2003-11-13 17:27:38 -05:00
|
|
|
|
|| err == EAFNOSUPPORT
|
2003-11-13 15:26:18 -05:00
|
|
|
|
#endif
|
|
|
|
|
#ifdef EPFNOSUPPORT
|
2003-11-13 17:27:38 -05:00
|
|
|
|
|| err == EPFNOSUPPORT
|
2003-11-13 15:26:18 -05:00
|
|
|
|
#endif
|
2007-08-02 23:38:21 -04:00
|
|
|
|
#ifdef ESOCKTNOSUPPORT /* no, "sockt" is not a typo! */
|
2003-11-13 17:27:38 -05:00
|
|
|
|
|| err == ESOCKTNOSUPPORT
|
2003-11-13 15:26:18 -05:00
|
|
|
|
#endif
|
|
|
|
|
#ifdef EPROTONOSUPPORT
|
2003-11-13 17:27:38 -05:00
|
|
|
|
|| err == EPROTONOSUPPORT
|
2003-11-13 15:26:18 -05:00
|
|
|
|
#endif
|
|
|
|
|
#ifdef ENOPROTOOPT
|
2003-11-13 17:27:38 -05:00
|
|
|
|
|| err == ENOPROTOOPT
|
2003-11-13 15:26:18 -05:00
|
|
|
|
#endif
|
2003-11-13 17:27:38 -05:00
|
|
|
|
/* Apparently, older versions of Linux and BSD used EINVAL
|
2007-08-02 23:38:21 -04:00
|
|
|
|
instead of EAFNOSUPPORT and such. */
|
2003-11-13 17:27:38 -05:00
|
|
|
|
|| err == EINVAL
|
|
|
|
|
)
|
2005-06-22 15:38:10 -04:00
|
|
|
|
return false;
|
2003-11-13 15:26:18 -05:00
|
|
|
|
|
2005-04-24 13:13:42 -04:00
|
|
|
|
if (!opt.retry_connrefused)
|
|
|
|
|
if (err == ECONNREFUSED
|
|
|
|
|
#ifdef ENETUNREACH
|
2007-08-02 23:38:21 -04:00
|
|
|
|
|| err == ENETUNREACH /* network is unreachable */
|
2005-04-24 13:13:42 -04:00
|
|
|
|
#endif
|
|
|
|
|
#ifdef EHOSTUNREACH
|
2007-08-02 23:38:21 -04:00
|
|
|
|
|| err == EHOSTUNREACH /* host is unreachable */
|
2005-04-24 13:13:42 -04:00
|
|
|
|
#endif
|
2007-08-02 23:38:21 -04:00
|
|
|
|
)
|
2005-06-22 15:38:10 -04:00
|
|
|
|
return false;
|
2003-11-13 17:27:38 -05:00
|
|
|
|
|
2005-06-22 15:38:10 -04:00
|
|
|
|
return true;
|
2003-11-13 15:26:18 -05:00
|
|
|
|
}
|
|
|
|
|
|
2003-11-17 18:46:20 -05:00
|
|
|
|
/* Wait for a single descriptor to become available, timing out after
|
|
|
|
|
MAXTIME seconds. Returns 1 if FD is available, 0 for timeout and
|
|
|
|
|
-1 for error. The argument WAIT_FOR can be a combination of
|
|
|
|
|
WAIT_FOR_READ and WAIT_FOR_WRITE.
|
2003-11-13 15:26:18 -05:00
|
|
|
|
|
|
|
|
|
This is a mere convenience wrapper around the select call, and
|
2003-11-17 18:46:20 -05:00
|
|
|
|
should be taken as such (for example, it doesn't implement Wget's
|
|
|
|
|
0-timeout-means-no-timeout semantics.) */
|
2003-11-13 15:26:18 -05:00
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
select_fd (int fd, double maxtime, int wait_for)
|
|
|
|
|
{
|
|
|
|
|
fd_set fdset;
|
|
|
|
|
fd_set *rd = NULL, *wr = NULL;
|
|
|
|
|
struct timeval tmout;
|
|
|
|
|
int result;
|
|
|
|
|
|
|
|
|
|
FD_ZERO (&fdset);
|
|
|
|
|
FD_SET (fd, &fdset);
|
|
|
|
|
if (wait_for & WAIT_FOR_READ)
|
|
|
|
|
rd = &fdset;
|
|
|
|
|
if (wait_for & WAIT_FOR_WRITE)
|
|
|
|
|
wr = &fdset;
|
|
|
|
|
|
|
|
|
|
tmout.tv_sec = (long) maxtime;
|
2005-04-01 13:22:38 -05:00
|
|
|
|
tmout.tv_usec = 1000000 * (maxtime - (long) maxtime);
|
2003-11-13 15:26:18 -05:00
|
|
|
|
|
|
|
|
|
do
|
|
|
|
|
result = select (fd + 1, rd, wr, NULL, &tmout);
|
|
|
|
|
while (result < 0 && errno == EINTR);
|
|
|
|
|
|
|
|
|
|
return result;
|
2003-11-17 18:46:20 -05:00
|
|
|
|
}
|
2003-11-17 18:53:14 -05:00
|
|
|
|
|
2005-07-03 20:55:12 -04:00
|
|
|
|
/* Return true iff the connection to the remote site established
|
|
|
|
|
through SOCK is still open.
|
|
|
|
|
|
|
|
|
|
Specifically, this function returns true if SOCK is not ready for
|
|
|
|
|
reading. This is because, when the connection closes, the socket
|
|
|
|
|
is ready for reading because EOF is about to be delivered. A side
|
|
|
|
|
effect of this method is that sockets that have pending data are
|
|
|
|
|
considered non-open. This is actually a good thing for callers of
|
|
|
|
|
this function, where such pending data can only be unwanted
|
|
|
|
|
leftover from a previous request. */
|
|
|
|
|
|
2005-06-22 15:38:10 -04:00
|
|
|
|
bool
|
2003-11-17 18:53:14 -05:00
|
|
|
|
test_socket_open (int sock)
|
|
|
|
|
{
|
|
|
|
|
fd_set check_set;
|
|
|
|
|
struct timeval to;
|
|
|
|
|
|
|
|
|
|
/* Check if we still have a valid (non-EOF) connection. From Andrew
|
|
|
|
|
* Maholski's code in the Unix Socket FAQ. */
|
|
|
|
|
|
|
|
|
|
FD_ZERO (&check_set);
|
|
|
|
|
FD_SET (sock, &check_set);
|
|
|
|
|
|
|
|
|
|
/* Wait one microsecond */
|
|
|
|
|
to.tv_sec = 0;
|
|
|
|
|
to.tv_usec = 1;
|
|
|
|
|
|
|
|
|
|
if (select (sock + 1, &check_set, NULL, NULL, &to) == 0)
|
2005-07-03 21:07:59 -04:00
|
|
|
|
/* We got a timeout, it means we're still connected. */
|
2005-07-03 20:55:12 -04:00
|
|
|
|
return true;
|
2003-11-17 18:53:14 -05:00
|
|
|
|
else
|
2005-07-03 21:07:59 -04:00
|
|
|
|
/* Read now would not wait, it means we have either pending data
|
|
|
|
|
or EOF/error. */
|
2005-06-22 15:38:10 -04:00
|
|
|
|
return false;
|
2003-11-17 18:53:14 -05:00
|
|
|
|
}
|
2003-11-05 20:12:03 -05:00
|
|
|
|
|
|
|
|
|
/* Basic socket operations, mostly EINTR wrappers. */
|
|
|
|
|
|
2007-09-28 17:47:46 -04:00
|
|
|
|
#if defined(WINDOWS) || defined(MSDOS)
|
2003-11-05 20:12:03 -05:00
|
|
|
|
# define read(fd, buf, cnt) recv (fd, buf, cnt, 0)
|
|
|
|
|
# define write(fd, buf, cnt) send (fd, buf, cnt, 0)
|
|
|
|
|
# define close(fd) closesocket (fd)
|
|
|
|
|
#endif
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2003-11-05 20:12:03 -05:00
|
|
|
|
#ifdef __BEOS__
|
|
|
|
|
# define read(fd, buf, cnt) recv (fd, buf, cnt, 0)
|
|
|
|
|
# define write(fd, buf, cnt) send (fd, buf, cnt, 0)
|
|
|
|
|
#endif
|
2002-04-14 01:19:27 -04:00
|
|
|
|
|
2003-11-05 20:12:03 -05:00
|
|
|
|
static int
|
|
|
|
|
sock_read (int fd, char *buf, int bufsize)
|
1999-12-02 02:42:23 -05:00
|
|
|
|
{
|
|
|
|
|
int res;
|
2002-04-14 01:19:27 -04:00
|
|
|
|
do
|
2003-11-05 20:12:03 -05:00
|
|
|
|
res = read (fd, buf, bufsize);
|
1999-12-02 02:42:23 -05:00
|
|
|
|
while (res == -1 && errno == EINTR);
|
2003-11-05 20:12:03 -05:00
|
|
|
|
return res;
|
|
|
|
|
}
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2003-11-05 20:12:03 -05:00
|
|
|
|
static int
|
|
|
|
|
sock_write (int fd, char *buf, int bufsize)
|
|
|
|
|
{
|
2003-11-19 19:42:21 -05:00
|
|
|
|
int res;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
do
|
|
|
|
|
res = write (fd, buf, bufsize);
|
|
|
|
|
while (res == -1 && errno == EINTR);
|
1999-12-02 02:42:23 -05:00
|
|
|
|
return res;
|
|
|
|
|
}
|
|
|
|
|
|
2003-11-05 20:12:03 -05:00
|
|
|
|
static int
|
|
|
|
|
sock_poll (int fd, double timeout, int wait_for)
|
|
|
|
|
{
|
|
|
|
|
return select_fd (fd, timeout, wait_for);
|
|
|
|
|
}
|
|
|
|
|
|
2003-11-20 20:48:11 -05:00
|
|
|
|
static int
|
|
|
|
|
sock_peek (int fd, char *buf, int bufsize)
|
|
|
|
|
{
|
|
|
|
|
int res;
|
|
|
|
|
do
|
|
|
|
|
res = recv (fd, buf, bufsize, MSG_PEEK);
|
|
|
|
|
while (res == -1 && errno == EINTR);
|
|
|
|
|
return res;
|
|
|
|
|
}
|
|
|
|
|
|
2003-11-05 20:12:03 -05:00
|
|
|
|
static void
|
|
|
|
|
sock_close (int fd)
|
|
|
|
|
{
|
|
|
|
|
close (fd);
|
|
|
|
|
DEBUGP (("Closed fd %d\n", fd));
|
|
|
|
|
}
|
|
|
|
|
#undef read
|
|
|
|
|
#undef write
|
|
|
|
|
#undef close
|
|
|
|
|
|
|
|
|
|
/* Reading and writing from the network. We build around the socket
|
|
|
|
|
(file descriptor) API, but support "extended" operations for things
|
|
|
|
|
that are not mere file descriptors under the hood, such as SSL
|
|
|
|
|
sockets.
|
|
|
|
|
|
2003-11-20 10:19:59 -05:00
|
|
|
|
That way the user code can call fd_read(fd, ...) and we'll run read
|
2003-11-05 20:12:03 -05:00
|
|
|
|
or SSL_read or whatever is necessary. */
|
|
|
|
|
|
2003-11-14 08:43:46 -05:00
|
|
|
|
static struct hash_table *transport_map;
|
2005-07-03 17:20:33 -04:00
|
|
|
|
static unsigned int transport_map_modified_tick;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
|
2003-11-14 08:43:46 -05:00
|
|
|
|
struct transport_info {
|
2005-07-03 17:20:33 -04:00
|
|
|
|
struct transport_implementation *imp;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
void *ctx;
|
|
|
|
|
};
|
|
|
|
|
|
2003-11-14 08:43:46 -05:00
|
|
|
|
/* Register the transport layer operations that will be used when
|
|
|
|
|
reading, writing, and polling FD.
|
|
|
|
|
|
|
|
|
|
This should be used for transport layers like SSL that piggyback on
|
|
|
|
|
sockets. FD should otherwise be a real socket, on which you can
|
|
|
|
|
call getpeername, etc. */
|
2003-11-10 08:20:46 -05:00
|
|
|
|
|
2003-11-05 20:12:03 -05:00
|
|
|
|
void
|
2005-07-03 17:20:33 -04:00
|
|
|
|
fd_register_transport (int fd, struct transport_implementation *imp, void *ctx)
|
2003-11-05 20:12:03 -05:00
|
|
|
|
{
|
2003-11-14 08:43:46 -05:00
|
|
|
|
struct transport_info *info;
|
2003-11-07 18:45:03 -05:00
|
|
|
|
|
|
|
|
|
/* The file descriptor must be non-negative to be registered.
|
2003-11-20 10:19:59 -05:00
|
|
|
|
Negative values are ignored by fd_close(), and -1 cannot be used as
|
2003-11-07 18:45:03 -05:00
|
|
|
|
hash key. */
|
|
|
|
|
assert (fd >= 0);
|
|
|
|
|
|
2003-11-14 08:43:46 -05:00
|
|
|
|
info = xnew (struct transport_info);
|
2005-07-03 17:20:33 -04:00
|
|
|
|
info->imp = imp;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
info->ctx = ctx;
|
2003-11-14 08:43:46 -05:00
|
|
|
|
if (!transport_map)
|
|
|
|
|
transport_map = hash_table_new (0, NULL, NULL);
|
2006-07-14 09:25:50 -04:00
|
|
|
|
hash_table_put (transport_map, (void *)(intptr_t) fd, info);
|
2003-11-14 08:43:46 -05:00
|
|
|
|
++transport_map_modified_tick;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
}
|
|
|
|
|
|
2005-05-10 11:17:37 -04:00
|
|
|
|
/* Return context of the transport registered with
|
|
|
|
|
fd_register_transport. This assumes fd_register_transport was
|
|
|
|
|
previously called on FD. */
|
|
|
|
|
|
|
|
|
|
void *
|
|
|
|
|
fd_transport_context (int fd)
|
|
|
|
|
{
|
2006-07-14 09:25:50 -04:00
|
|
|
|
struct transport_info *info = hash_table_get (transport_map, (void *)(intptr_t) fd);
|
2005-05-10 11:17:37 -04:00
|
|
|
|
return info->ctx;
|
|
|
|
|
}
|
|
|
|
|
|
2003-11-20 10:19:59 -05:00
|
|
|
|
/* When fd_read/fd_write are called multiple times in a loop, they should
|
2003-11-05 20:12:03 -05:00
|
|
|
|
remember the INFO pointer instead of fetching it every time. It is
|
|
|
|
|
not enough to compare FD to LAST_FD because FD might have been
|
|
|
|
|
closed and reopened. modified_tick ensures that changes to
|
2003-11-14 08:43:46 -05:00
|
|
|
|
transport_map will not be unnoticed.
|
2003-11-05 20:12:03 -05:00
|
|
|
|
|
|
|
|
|
This is a macro because we want the static storage variables to be
|
|
|
|
|
per-function. */
|
|
|
|
|
|
2007-08-02 23:38:21 -04:00
|
|
|
|
#define LAZY_RETRIEVE_INFO(info) do { \
|
|
|
|
|
static struct transport_info *last_info; \
|
|
|
|
|
static int last_fd = -1; \
|
|
|
|
|
static unsigned int last_tick; \
|
|
|
|
|
if (!transport_map) \
|
|
|
|
|
info = NULL; \
|
|
|
|
|
else if (last_fd == fd && last_tick == transport_map_modified_tick) \
|
|
|
|
|
info = last_info; \
|
|
|
|
|
else \
|
|
|
|
|
{ \
|
|
|
|
|
info = hash_table_get (transport_map, (void *)(intptr_t) fd); \
|
|
|
|
|
last_fd = fd; \
|
|
|
|
|
last_info = info; \
|
|
|
|
|
last_tick = transport_map_modified_tick; \
|
|
|
|
|
} \
|
2003-11-05 20:12:03 -05:00
|
|
|
|
} while (0)
|
|
|
|
|
|
2005-06-22 15:38:10 -04:00
|
|
|
|
static bool
|
2003-11-20 20:48:11 -05:00
|
|
|
|
poll_internal (int fd, struct transport_info *info, int wf, double timeout)
|
1999-12-02 02:42:23 -05:00
|
|
|
|
{
|
2003-11-05 20:12:03 -05:00
|
|
|
|
if (timeout == -1)
|
|
|
|
|
timeout = opt.read_timeout;
|
|
|
|
|
if (timeout)
|
|
|
|
|
{
|
|
|
|
|
int test;
|
2005-07-03 17:20:33 -04:00
|
|
|
|
if (info && info->imp->poller)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
test = info->imp->poller (fd, timeout, wf, info->ctx);
|
2003-11-05 20:12:03 -05:00
|
|
|
|
else
|
2007-08-02 23:38:21 -04:00
|
|
|
|
test = sock_poll (fd, timeout, wf);
|
2003-11-05 20:12:03 -05:00
|
|
|
|
if (test == 0)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
errno = ETIMEDOUT;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
if (test <= 0)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
return false;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
}
|
2005-06-22 15:38:10 -04:00
|
|
|
|
return true;
|
2003-11-20 20:48:11 -05:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Read no more than BUFSIZE bytes of data from FD, storing them to
|
|
|
|
|
BUF. If TIMEOUT is non-zero, the operation aborts if no data is
|
|
|
|
|
received after that many seconds. If TIMEOUT is -1, the value of
|
|
|
|
|
opt.timeout is used for TIMEOUT. */
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
fd_read (int fd, char *buf, int bufsize, double timeout)
|
|
|
|
|
{
|
|
|
|
|
struct transport_info *info;
|
|
|
|
|
LAZY_RETRIEVE_INFO (info);
|
|
|
|
|
if (!poll_internal (fd, info, WAIT_FOR_READ, timeout))
|
|
|
|
|
return -1;
|
2005-07-03 17:20:33 -04:00
|
|
|
|
if (info && info->imp->reader)
|
|
|
|
|
return info->imp->reader (fd, buf, bufsize, info->ctx);
|
2003-11-05 20:12:03 -05:00
|
|
|
|
else
|
|
|
|
|
return sock_read (fd, buf, bufsize);
|
|
|
|
|
}
|
1999-12-02 02:42:23 -05:00
|
|
|
|
|
2005-03-16 16:44:22 -05:00
|
|
|
|
/* Like fd_read, except it provides a "preview" of the data that will
|
|
|
|
|
be read by subsequent calls to fd_read. Specifically, it copies no
|
|
|
|
|
more than BUFSIZE bytes of the currently available data to BUF and
|
|
|
|
|
returns the number of bytes copied. Return values and timeout
|
|
|
|
|
semantics are the same as those of fd_read.
|
|
|
|
|
|
|
|
|
|
CAVEAT: Do not assume that the first subsequent call to fd_read
|
|
|
|
|
will retrieve the same amount of data. Reading can return more or
|
|
|
|
|
less data, depending on the TCP implementation and other
|
|
|
|
|
circumstances. However, barring an error, it can be expected that
|
|
|
|
|
all the peeked data will eventually be read by fd_read. */
|
2003-11-20 20:48:11 -05:00
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
fd_peek (int fd, char *buf, int bufsize, double timeout)
|
|
|
|
|
{
|
|
|
|
|
struct transport_info *info;
|
|
|
|
|
LAZY_RETRIEVE_INFO (info);
|
|
|
|
|
if (!poll_internal (fd, info, WAIT_FOR_READ, timeout))
|
|
|
|
|
return -1;
|
2005-07-03 17:20:33 -04:00
|
|
|
|
if (info && info->imp->peeker)
|
|
|
|
|
return info->imp->peeker (fd, buf, bufsize, info->ctx);
|
2003-11-20 20:48:11 -05:00
|
|
|
|
else
|
|
|
|
|
return sock_peek (fd, buf, bufsize);
|
|
|
|
|
}
|
|
|
|
|
|
2003-11-05 20:12:03 -05:00
|
|
|
|
/* Write the entire contents of BUF to FD. If TIMEOUT is non-zero,
|
|
|
|
|
the operation aborts if no data is received after that many
|
|
|
|
|
seconds. If TIMEOUT is -1, the value of opt.timeout is used for
|
|
|
|
|
TIMEOUT. */
|
|
|
|
|
|
|
|
|
|
int
|
2003-11-20 10:19:59 -05:00
|
|
|
|
fd_write (int fd, char *buf, int bufsize, double timeout)
|
2003-11-05 20:12:03 -05:00
|
|
|
|
{
|
|
|
|
|
int res;
|
2003-11-14 08:43:46 -05:00
|
|
|
|
struct transport_info *info;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
LAZY_RETRIEVE_INFO (info);
|
|
|
|
|
|
|
|
|
|
/* `write' may write less than LEN bytes, thus the loop keeps trying
|
|
|
|
|
it until all was written, or an error occurred. */
|
|
|
|
|
res = 0;
|
|
|
|
|
while (bufsize > 0)
|
1999-12-02 02:42:23 -05:00
|
|
|
|
{
|
2003-11-20 20:48:11 -05:00
|
|
|
|
if (!poll_internal (fd, info, WAIT_FOR_WRITE, timeout))
|
2007-08-02 23:38:21 -04:00
|
|
|
|
return -1;
|
2005-07-03 17:20:33 -04:00
|
|
|
|
if (info && info->imp->writer)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
res = info->imp->writer (fd, buf, bufsize, info->ctx);
|
2003-11-05 20:12:03 -05:00
|
|
|
|
else
|
2007-08-02 23:38:21 -04:00
|
|
|
|
res = sock_write (fd, buf, bufsize);
|
1999-12-02 02:42:23 -05:00
|
|
|
|
if (res <= 0)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
break;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
buf += res;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
bufsize -= res;
|
1999-12-02 02:42:23 -05:00
|
|
|
|
}
|
|
|
|
|
return res;
|
|
|
|
|
}
|
2003-11-05 20:12:03 -05:00
|
|
|
|
|
2005-07-03 17:20:33 -04:00
|
|
|
|
/* Report the most recent error(s) on FD. This should only be called
|
|
|
|
|
after fd_* functions, such as fd_read and fd_write, and only if
|
|
|
|
|
they return a negative result. For errors coming from other calls
|
|
|
|
|
such as setsockopt or fopen, strerror should continue to be
|
|
|
|
|
used.
|
|
|
|
|
|
|
|
|
|
If the transport doesn't support error messages or doesn't supply
|
2005-07-04 17:42:09 -04:00
|
|
|
|
one, strerror(errno) is returned. The returned error message
|
|
|
|
|
should not be used after fd_close has been called. */
|
2005-07-03 17:20:33 -04:00
|
|
|
|
|
|
|
|
|
const char *
|
|
|
|
|
fd_errstr (int fd)
|
|
|
|
|
{
|
|
|
|
|
/* Don't bother with LAZY_RETRIEVE_INFO, as this will only be called
|
|
|
|
|
in case of error, never in a tight loop. */
|
|
|
|
|
struct transport_info *info = NULL;
|
|
|
|
|
if (transport_map)
|
2006-07-14 09:25:50 -04:00
|
|
|
|
info = hash_table_get (transport_map, (void *)(intptr_t) fd);
|
2005-07-03 17:20:33 -04:00
|
|
|
|
|
|
|
|
|
if (info && info->imp->errstr)
|
|
|
|
|
{
|
|
|
|
|
const char *err = info->imp->errstr (fd, info->ctx);
|
|
|
|
|
if (err)
|
2007-08-02 23:38:21 -04:00
|
|
|
|
return err;
|
2005-07-03 17:20:33 -04:00
|
|
|
|
/* else, fall through and print the system error. */
|
|
|
|
|
}
|
|
|
|
|
return strerror (errno);
|
|
|
|
|
}
|
|
|
|
|
|
2003-11-05 20:12:03 -05:00
|
|
|
|
/* Close the file descriptor FD. */
|
|
|
|
|
|
|
|
|
|
void
|
2003-11-20 10:19:59 -05:00
|
|
|
|
fd_close (int fd)
|
2003-11-05 20:12:03 -05:00
|
|
|
|
{
|
2003-11-14 08:43:46 -05:00
|
|
|
|
struct transport_info *info;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
if (fd < 0)
|
|
|
|
|
return;
|
|
|
|
|
|
2003-11-20 10:19:59 -05:00
|
|
|
|
/* Don't use LAZY_RETRIEVE_INFO because fd_close() is only called once
|
2003-11-14 08:43:46 -05:00
|
|
|
|
per socket, so that particular optimization wouldn't work. */
|
2003-11-05 20:12:03 -05:00
|
|
|
|
info = NULL;
|
2003-11-14 08:43:46 -05:00
|
|
|
|
if (transport_map)
|
2006-07-14 09:25:50 -04:00
|
|
|
|
info = hash_table_get (transport_map, (void *)(intptr_t) fd);
|
2003-11-05 20:12:03 -05:00
|
|
|
|
|
2005-07-03 17:20:33 -04:00
|
|
|
|
if (info && info->imp->closer)
|
|
|
|
|
info->imp->closer (fd, info->ctx);
|
2003-11-05 20:15:44 -05:00
|
|
|
|
else
|
|
|
|
|
sock_close (fd);
|
|
|
|
|
|
|
|
|
|
if (info)
|
2003-11-05 20:12:03 -05:00
|
|
|
|
{
|
2006-07-14 09:25:50 -04:00
|
|
|
|
hash_table_remove (transport_map, (void *)(intptr_t) fd);
|
2003-11-05 20:12:03 -05:00
|
|
|
|
xfree (info);
|
2003-11-14 08:43:46 -05:00
|
|
|
|
++transport_map_modified_tick;
|
2003-11-05 20:12:03 -05:00
|
|
|
|
}
|
|
|
|
|
}
|