| /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ |
| /* This Source Code Form is subject to the terms of the Mozilla Public |
| * License, v. 2.0. If a copy of the MPL was not distributed with this |
| * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| |
| #include "primpl.h" |
| |
| #include <string.h> |
| |
| /************************************************************************/ |
| |
| /* These two functions are only used in assertions. */ |
| #if defined(DEBUG) |
| |
| PRBool IsValidNetAddr(const PRNetAddr *addr) |
| { |
| if ((addr != NULL) |
| #if defined(XP_UNIX) || defined(XP_OS2) |
| && (addr->raw.family != PR_AF_LOCAL) |
| #endif |
| && (addr->raw.family != PR_AF_INET6) |
| && (addr->raw.family != PR_AF_INET)) { |
| return PR_FALSE; |
| } |
| return PR_TRUE; |
| } |
| |
| static PRBool IsValidNetAddrLen(const PRNetAddr *addr, PRInt32 addr_len) |
| { |
| /* |
| * The definition of the length of a Unix domain socket address |
| * is not uniform, so we don't check it. |
| */ |
| if ((addr != NULL) |
| #if defined(XP_UNIX) || defined(XP_OS2) |
| && (addr->raw.family != AF_UNIX) |
| #endif |
| && (PR_NETADDR_SIZE(addr) != addr_len)) { |
| #if defined(LINUX) && __GLIBC__ == 2 && __GLIBC_MINOR__ == 1 |
| /* |
| * In glibc 2.1, struct sockaddr_in6 is 24 bytes. In glibc 2.2 |
| * and in the 2.4 kernel, struct sockaddr_in6 has the scope_id |
| * field and is 28 bytes. It is possible for socket functions |
| * to return an addr_len greater than sizeof(struct sockaddr_in6). |
| * We need to allow that. (Bugzilla bug #77264) |
| */ |
| if ((PR_AF_INET6 == addr->raw.family) |
| && (sizeof(addr->ipv6) == addr_len)) { |
| return PR_TRUE; |
| } |
| #endif |
| /* |
| * The accept(), getsockname(), etc. calls on some platforms |
| * do not set the actual socket address length on return. |
| * In this case, we verifiy addr_len is still the value we |
| * passed in (i.e., sizeof(PRNetAddr)). |
| */ |
| #if defined(QNX) |
| if (sizeof(PRNetAddr) == addr_len) { |
| return PR_TRUE; |
| } |
| #endif |
| return PR_FALSE; |
| } |
| return PR_TRUE; |
| } |
| |
| #endif /* DEBUG */ |
| |
| static PRInt32 PR_CALLBACK SocketWritev(PRFileDesc *fd, const PRIOVec *iov, |
| PRInt32 iov_size, PRIntervalTime timeout) |
| { |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| int w = 0; |
| const PRIOVec *tmp_iov; |
| #define LOCAL_MAXIOV 8 |
| PRIOVec local_iov[LOCAL_MAXIOV]; |
| PRIOVec *iov_copy = NULL; |
| int tmp_out; |
| int index, iov_cnt; |
| int count=0, sz = 0; /* 'count' is the return value. */ |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return -1; |
| } |
| |
| /* |
| * Assume the first writev will succeed. Copy iov's only on |
| * failure. |
| */ |
| tmp_iov = iov; |
| for (index = 0; index < iov_size; index++) |
| sz += iov[index].iov_len; |
| |
| iov_cnt = iov_size; |
| |
| while (sz > 0) { |
| |
| w = _PR_MD_WRITEV(fd, tmp_iov, iov_cnt, timeout); |
| if (w < 0) { |
| count = -1; |
| break; |
| } |
| count += w; |
| if (fd->secret->nonblocking) { |
| break; |
| } |
| sz -= w; |
| |
| if (sz > 0) { |
| /* find the next unwritten vector */ |
| for ( index = 0, tmp_out = count; |
| tmp_out >= iov[index].iov_len; |
| tmp_out -= iov[index].iov_len, index++){;} /* nothing to execute */ |
| |
| if (tmp_iov == iov) { |
| /* |
| * The first writev failed so we |
| * must copy iov's around. |
| * Avoid calloc/free if there |
| * are few enough iov's. |
| */ |
| if (iov_size - index <= LOCAL_MAXIOV) |
| iov_copy = local_iov; |
| else if ((iov_copy = (PRIOVec *) PR_CALLOC((iov_size - index) * |
| sizeof *iov_copy)) == NULL) { |
| PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0); |
| return -1; |
| } |
| tmp_iov = iov_copy; |
| } |
| |
| PR_ASSERT(tmp_iov == iov_copy); |
| |
| /* fill in the first partial read */ |
| iov_copy[0].iov_base = &(((char *)iov[index].iov_base)[tmp_out]); |
| iov_copy[0].iov_len = iov[index].iov_len - tmp_out; |
| index++; |
| |
| /* copy the remaining vectors */ |
| for (iov_cnt=1; index<iov_size; iov_cnt++, index++) { |
| iov_copy[iov_cnt].iov_base = iov[index].iov_base; |
| iov_copy[iov_cnt].iov_len = iov[index].iov_len; |
| } |
| } |
| } |
| |
| if (iov_copy != local_iov) |
| PR_DELETE(iov_copy); |
| return count; |
| } |
| |
| /************************************************************************/ |
| |
| PR_IMPLEMENT(PRFileDesc *) PR_ImportTCPSocket(PROsfd osfd) |
| { |
| PRFileDesc *fd; |
| |
| if (!_pr_initialized) _PR_ImplicitInitialization(); |
| fd = PR_AllocFileDesc(osfd, PR_GetTCPMethods()); |
| if (fd != NULL) { |
| _PR_MD_MAKE_NONBLOCK(fd); |
| _PR_MD_INIT_FD_INHERITABLE(fd, PR_TRUE); |
| #ifdef _PR_NEED_SECRET_AF |
| /* this means we can only import IPv4 sockets here. |
| * but this is what the function in ptio.c does. |
| * We need a way to import IPv6 sockets, too. |
| */ |
| fd->secret->af = AF_INET; |
| #endif |
| } else |
| _PR_MD_CLOSE_SOCKET(osfd); |
| return(fd); |
| } |
| |
| PR_IMPLEMENT(PRFileDesc *) PR_ImportUDPSocket(PROsfd osfd) |
| { |
| PRFileDesc *fd; |
| |
| if (!_pr_initialized) _PR_ImplicitInitialization(); |
| fd = PR_AllocFileDesc(osfd, PR_GetUDPMethods()); |
| if (fd != NULL) { |
| _PR_MD_MAKE_NONBLOCK(fd); |
| _PR_MD_INIT_FD_INHERITABLE(fd, PR_TRUE); |
| } else |
| _PR_MD_CLOSE_SOCKET(osfd); |
| return(fd); |
| } |
| |
| |
| static const PRIOMethods* PR_GetSocketPollFdMethods(void); |
| |
| PR_IMPLEMENT(PRFileDesc*) PR_CreateSocketPollFd(PROsfd osfd) |
| { |
| PRFileDesc *fd; |
| |
| if (!_pr_initialized) _PR_ImplicitInitialization(); |
| |
| fd = _PR_Getfd(); |
| |
| if (fd == NULL) PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0); |
| else |
| { |
| fd->secret->md.osfd = osfd; |
| fd->secret->inheritable = _PR_TRI_FALSE; |
| fd->secret->state = _PR_FILEDESC_OPEN; |
| fd->methods = PR_GetSocketPollFdMethods(); |
| } |
| |
| return fd; |
| } /* PR_CreateSocketPollFD */ |
| |
| PR_IMPLEMENT(PRStatus) PR_DestroySocketPollFd(PRFileDesc *fd) |
| { |
| if (NULL == fd) |
| { |
| PR_SetError(PR_BAD_DESCRIPTOR_ERROR, 0); |
| return PR_FAILURE; |
| } |
| fd->secret->state = _PR_FILEDESC_CLOSED; |
| _PR_Putfd(fd); |
| return PR_SUCCESS; |
| } /* PR_DestroySocketPollFd */ |
| |
| static PRStatus PR_CALLBACK SocketConnect( |
| PRFileDesc *fd, const PRNetAddr *addr, PRIntervalTime timeout) |
| { |
| PRInt32 rv; /* Return value of _PR_MD_CONNECT */ |
| const PRNetAddr *addrp = addr; |
| #if defined(_PR_INET6) |
| PRNetAddr addrCopy; |
| #endif |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return PR_FAILURE; |
| } |
| #if defined(_PR_INET6) |
| if (addr->raw.family == PR_AF_INET6) { |
| addrCopy = *addr; |
| addrCopy.raw.family = AF_INET6; |
| addrp = &addrCopy; |
| } |
| #endif |
| |
| rv = _PR_MD_CONNECT(fd, addrp, PR_NETADDR_SIZE(addr), timeout); |
| PR_LOG(_pr_io_lm, PR_LOG_MAX, ("connect -> %d", rv)); |
| if (rv == 0) |
| return PR_SUCCESS; |
| else |
| return PR_FAILURE; |
| } |
| |
| static PRStatus PR_CALLBACK SocketConnectContinue( |
| PRFileDesc *fd, PRInt16 out_flags) |
| { |
| PROsfd osfd; |
| int err; |
| |
| if (out_flags & PR_POLL_NVAL) { |
| PR_SetError(PR_BAD_DESCRIPTOR_ERROR, 0); |
| return PR_FAILURE; |
| } |
| if ((out_flags & (PR_POLL_WRITE | PR_POLL_EXCEPT | PR_POLL_ERR)) == 0) { |
| PR_ASSERT(out_flags == 0); |
| PR_SetError(PR_IN_PROGRESS_ERROR, 0); |
| return PR_FAILURE; |
| } |
| |
| osfd = fd->secret->md.osfd; |
| |
| #if defined(XP_UNIX) |
| |
| err = _MD_unix_get_nonblocking_connect_error(osfd); |
| if (err != 0) { |
| _PR_MD_MAP_CONNECT_ERROR(err); |
| return PR_FAILURE; |
| } |
| return PR_SUCCESS; |
| |
| #elif defined(WIN32) || defined(WIN16) |
| |
| if (out_flags & PR_POLL_EXCEPT) { |
| int len = sizeof(err); |
| if (getsockopt(osfd, (int)SOL_SOCKET, SO_ERROR, (char *) &err, &len) |
| == SOCKET_ERROR) { |
| _PR_MD_MAP_GETSOCKOPT_ERROR(WSAGetLastError()); |
| return PR_FAILURE; |
| } |
| if (err != 0) { |
| _PR_MD_MAP_CONNECT_ERROR(err); |
| } else { |
| PR_SetError(PR_UNKNOWN_ERROR, 0); |
| } |
| return PR_FAILURE; |
| } |
| |
| PR_ASSERT(out_flags & PR_POLL_WRITE); |
| return PR_SUCCESS; |
| |
| #elif defined(XP_OS2) |
| |
| err = _MD_os2_get_nonblocking_connect_error(osfd); |
| if (err != 0) { |
| _PR_MD_MAP_CONNECT_ERROR(err); |
| return PR_FAILURE; |
| } |
| return PR_SUCCESS; |
| |
| #elif defined(XP_BEOS) |
| |
| #ifdef BONE_VERSION /* bug 122364 */ |
| /* temporary workaround until getsockopt(SO_ERROR) works in BONE */ |
| if (out_flags & PR_POLL_EXCEPT) { |
| PR_SetError(PR_CONNECT_REFUSED_ERROR, 0); |
| return PR_FAILURE; |
| } |
| PR_ASSERT(out_flags & PR_POLL_WRITE); |
| return PR_SUCCESS; |
| #else |
| err = _MD_beos_get_nonblocking_connect_error(fd); |
| if( err != 0 ) { |
| _PR_MD_MAP_CONNECT_ERROR(err); |
| return PR_FAILURE; |
| } |
| else |
| return PR_SUCCESS; |
| #endif /* BONE_VERSION */ |
| |
| #else |
| PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); |
| return PR_FAILURE; |
| #endif |
| } |
| |
| PR_IMPLEMENT(PRStatus) PR_GetConnectStatus(const PRPollDesc *pd) |
| { |
| /* Find the NSPR layer and invoke its connectcontinue method */ |
| PRFileDesc *bottom = PR_GetIdentitiesLayer(pd->fd, PR_NSPR_IO_LAYER); |
| |
| if (NULL == bottom) { |
| PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0); |
| return PR_FAILURE; |
| } |
| return SocketConnectContinue(bottom, pd->out_flags); |
| } |
| |
| static PRFileDesc* PR_CALLBACK SocketAccept(PRFileDesc *fd, PRNetAddr *addr, |
| PRIntervalTime timeout) |
| { |
| PROsfd osfd; |
| PRFileDesc *fd2; |
| PRUint32 al; |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| #ifdef WINNT |
| PRNetAddr addrCopy; |
| #endif |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return 0; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return 0; |
| } |
| |
| #ifdef WINNT |
| if (addr == NULL) { |
| addr = &addrCopy; |
| } |
| #endif |
| al = sizeof(PRNetAddr); |
| osfd = _PR_MD_ACCEPT(fd, addr, &al, timeout); |
| if (osfd == -1) |
| return 0; |
| |
| fd2 = PR_AllocFileDesc(osfd, PR_GetTCPMethods()); |
| if (!fd2) { |
| _PR_MD_CLOSE_SOCKET(osfd); |
| return NULL; |
| } |
| |
| fd2->secret->nonblocking = fd->secret->nonblocking; |
| fd2->secret->inheritable = fd->secret->inheritable; |
| #ifdef WINNT |
| if (!fd2->secret->nonblocking && fd2->secret->inheritable != _PR_TRI_TRUE) { |
| /* |
| * The new socket has been associated with an I/O |
| * completion port. There is no going back. |
| */ |
| fd2->secret->md.io_model_committed = PR_TRUE; |
| } |
| PR_ASSERT(al == PR_NETADDR_SIZE(addr)); |
| fd2->secret->md.accepted_socket = PR_TRUE; |
| memcpy(&fd2->secret->md.peer_addr, addr, al); |
| #endif |
| |
| /* |
| * On some platforms, the new socket created by accept() |
| * inherits the nonblocking (or overlapped io) attribute |
| * of the listening socket. As an optimization, these |
| * platforms can skip the following _PR_MD_MAKE_NONBLOCK |
| * call. |
| */ |
| #if !defined(SOLARIS) && !defined(IRIX) && !defined(WINNT) |
| _PR_MD_MAKE_NONBLOCK(fd2); |
| #endif |
| |
| #ifdef _PR_INET6 |
| if (addr && (AF_INET6 == addr->raw.family)) |
| addr->raw.family = PR_AF_INET6; |
| #endif |
| PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE); |
| PR_ASSERT(IsValidNetAddrLen(addr, al) == PR_TRUE); |
| |
| return fd2; |
| } |
| |
| #ifdef WINNT |
| PR_IMPLEMENT(PRFileDesc*) PR_NTFast_Accept(PRFileDesc *fd, PRNetAddr *addr, |
| PRIntervalTime timeout) |
| { |
| PROsfd osfd; |
| PRFileDesc *fd2; |
| PRIntn al; |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| PRNetAddr addrCopy; |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return 0; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return 0; |
| } |
| |
| if (addr == NULL) { |
| addr = &addrCopy; |
| } |
| al = PR_NETADDR_SIZE(addr); |
| osfd = _PR_MD_FAST_ACCEPT(fd, addr, &al, timeout, PR_TRUE, NULL, NULL); |
| if (osfd == -1) { |
| return 0; |
| } |
| |
| fd2 = PR_AllocFileDesc(osfd, PR_GetTCPMethods()); |
| if (!fd2) { |
| _PR_MD_CLOSE_SOCKET(osfd); |
| } else { |
| fd2->secret->nonblocking = fd->secret->nonblocking; |
| fd2->secret->md.io_model_committed = PR_TRUE; |
| PR_ASSERT(al == PR_NETADDR_SIZE(addr)); |
| fd2->secret->md.accepted_socket = PR_TRUE; |
| memcpy(&fd2->secret->md.peer_addr, addr, al); |
| #ifdef _PR_INET6 |
| if (AF_INET6 == addr->raw.family) |
| addr->raw.family = PR_AF_INET6; |
| #endif |
| #ifdef _PR_NEED_SECRET_AF |
| fd2->secret->af = fd->secret->af; |
| #endif |
| } |
| return fd2; |
| } |
| #endif /* WINNT */ |
| |
| |
| static PRStatus PR_CALLBACK SocketBind(PRFileDesc *fd, const PRNetAddr *addr) |
| { |
| PRInt32 result; |
| const PRNetAddr *addrp = addr; |
| #if defined(_PR_INET6) |
| PRNetAddr addrCopy; |
| #endif |
| |
| PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE); |
| |
| #ifdef XP_UNIX |
| if (addr->raw.family == AF_UNIX) { |
| /* Disallow relative pathnames */ |
| if (addr->local.path[0] != '/') { |
| PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0); |
| return PR_FAILURE; |
| } |
| } |
| #endif /* XP_UNIX */ |
| |
| #if defined(_PR_INET6) |
| if (addr->raw.family == PR_AF_INET6) { |
| addrCopy = *addr; |
| addrCopy.raw.family = AF_INET6; |
| addrp = &addrCopy; |
| } |
| #endif |
| result = _PR_MD_BIND(fd, addrp, PR_NETADDR_SIZE(addr)); |
| if (result < 0) { |
| return PR_FAILURE; |
| } |
| return PR_SUCCESS; |
| } |
| |
| static PRStatus PR_CALLBACK SocketListen(PRFileDesc *fd, PRIntn backlog) |
| { |
| PRInt32 result; |
| |
| result = _PR_MD_LISTEN(fd, backlog); |
| if (result < 0) { |
| return PR_FAILURE; |
| } |
| return PR_SUCCESS; |
| } |
| |
| static PRStatus PR_CALLBACK SocketShutdown(PRFileDesc *fd, PRIntn how) |
| { |
| PRInt32 result; |
| |
| result = _PR_MD_SHUTDOWN(fd, how); |
| if (result < 0) { |
| return PR_FAILURE; |
| } |
| return PR_SUCCESS; |
| } |
| |
| static PRInt32 PR_CALLBACK SocketRecv(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags, |
| PRIntervalTime timeout) |
| { |
| PRInt32 rv; |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| |
| if ((flags != 0) && (flags != PR_MSG_PEEK)) { |
| PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return -1; |
| } |
| |
| PR_LOG(_pr_io_lm, PR_LOG_MAX, |
| ("recv: fd=%p osfd=%" PR_PRIdOSFD " buf=%p amount=%d flags=%d", |
| fd, fd->secret->md.osfd, buf, amount, flags)); |
| |
| #ifdef _PR_HAVE_PEEK_BUFFER |
| if (fd->secret->peekBytes != 0) { |
| rv = (amount < fd->secret->peekBytes) ? |
| amount : fd->secret->peekBytes; |
| memcpy(buf, fd->secret->peekBuffer, rv); |
| if (flags == 0) { |
| /* consume the bytes in the peek buffer */ |
| fd->secret->peekBytes -= rv; |
| if (fd->secret->peekBytes != 0) { |
| memmove(fd->secret->peekBuffer, |
| fd->secret->peekBuffer + rv, |
| fd->secret->peekBytes); |
| } |
| } |
| return rv; |
| } |
| |
| /* allocate peek buffer, if necessary */ |
| if ((PR_MSG_PEEK == flags) && _PR_FD_NEED_EMULATE_MSG_PEEK(fd)) { |
| PR_ASSERT(0 == fd->secret->peekBytes); |
| /* impose a max size on the peek buffer */ |
| if (amount > _PR_PEEK_BUFFER_MAX) { |
| amount = _PR_PEEK_BUFFER_MAX; |
| } |
| if (fd->secret->peekBufSize < amount) { |
| if (fd->secret->peekBuffer) { |
| PR_Free(fd->secret->peekBuffer); |
| } |
| fd->secret->peekBufSize = amount; |
| fd->secret->peekBuffer = PR_Malloc(amount); |
| if (NULL == fd->secret->peekBuffer) { |
| fd->secret->peekBufSize = 0; |
| PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0); |
| return -1; |
| } |
| } |
| } |
| #endif |
| |
| rv = _PR_MD_RECV(fd, buf, amount, flags, timeout); |
| PR_LOG(_pr_io_lm, PR_LOG_MAX, ("recv -> %d, error = %d, os error = %d", |
| rv, PR_GetError(), PR_GetOSError())); |
| |
| #ifdef _PR_HAVE_PEEK_BUFFER |
| if ((PR_MSG_PEEK == flags) && _PR_FD_NEED_EMULATE_MSG_PEEK(fd)) { |
| if (rv > 0) { |
| memcpy(fd->secret->peekBuffer, buf, rv); |
| fd->secret->peekBytes = rv; |
| } |
| } |
| #endif |
| |
| return rv; |
| } |
| |
| static PRInt32 PR_CALLBACK SocketRead(PRFileDesc *fd, void *buf, PRInt32 amount) |
| { |
| return SocketRecv(fd, buf, amount, 0, PR_INTERVAL_NO_TIMEOUT); |
| } |
| |
| static PRInt32 PR_CALLBACK SocketSend(PRFileDesc *fd, const void *buf, PRInt32 amount, |
| PRIntn flags, PRIntervalTime timeout) |
| { |
| PRInt32 temp, count; |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return -1; |
| } |
| |
| count = 0; |
| while (amount > 0) { |
| PR_LOG(_pr_io_lm, PR_LOG_MAX, |
| ("send: fd=%p osfd=%" PR_PRIdOSFD " buf=%p amount=%d", |
| fd, fd->secret->md.osfd, buf, amount)); |
| temp = _PR_MD_SEND(fd, buf, amount, flags, timeout); |
| if (temp < 0) { |
| count = -1; |
| break; |
| } |
| |
| count += temp; |
| if (fd->secret->nonblocking) { |
| break; |
| } |
| buf = (const void*) ((const char*)buf + temp); |
| |
| amount -= temp; |
| } |
| PR_LOG(_pr_io_lm, PR_LOG_MAX, ("send -> %d", count)); |
| return count; |
| } |
| |
| static PRInt32 PR_CALLBACK SocketWrite(PRFileDesc *fd, const void *buf, PRInt32 amount) |
| { |
| return SocketSend(fd, buf, amount, 0, PR_INTERVAL_NO_TIMEOUT); |
| } |
| |
| static PRStatus PR_CALLBACK SocketClose(PRFileDesc *fd) |
| { |
| if (!fd || !fd->secret |
| || (fd->secret->state != _PR_FILEDESC_OPEN |
| && fd->secret->state != _PR_FILEDESC_CLOSED)) { |
| PR_SetError(PR_BAD_DESCRIPTOR_ERROR, 0); |
| return PR_FAILURE; |
| } |
| |
| if (fd->secret->state == _PR_FILEDESC_OPEN) { |
| if (_PR_MD_CLOSE_SOCKET(fd->secret->md.osfd) < 0) { |
| return PR_FAILURE; |
| } |
| fd->secret->state = _PR_FILEDESC_CLOSED; |
| } |
| |
| #ifdef _PR_HAVE_PEEK_BUFFER |
| if (fd->secret->peekBuffer) { |
| PR_ASSERT(fd->secret->peekBufSize > 0); |
| PR_DELETE(fd->secret->peekBuffer); |
| fd->secret->peekBufSize = 0; |
| fd->secret->peekBytes = 0; |
| } |
| #endif |
| |
| PR_FreeFileDesc(fd); |
| return PR_SUCCESS; |
| } |
| |
| static PRInt32 PR_CALLBACK SocketAvailable(PRFileDesc *fd) |
| { |
| PRInt32 rv; |
| #ifdef _PR_HAVE_PEEK_BUFFER |
| if (fd->secret->peekBytes != 0) { |
| return fd->secret->peekBytes; |
| } |
| #endif |
| rv = _PR_MD_SOCKETAVAILABLE(fd); |
| return rv; |
| } |
| |
| static PRInt64 PR_CALLBACK SocketAvailable64(PRFileDesc *fd) |
| { |
| PRInt64 rv; |
| #ifdef _PR_HAVE_PEEK_BUFFER |
| if (fd->secret->peekBytes != 0) { |
| LL_I2L(rv, fd->secret->peekBytes); |
| return rv; |
| } |
| #endif |
| LL_I2L(rv, _PR_MD_SOCKETAVAILABLE(fd)); |
| return rv; |
| } |
| |
| static PRStatus PR_CALLBACK SocketSync(PRFileDesc *fd) |
| { |
| return PR_SUCCESS; |
| } |
| |
| static PRInt32 PR_CALLBACK SocketSendTo( |
| PRFileDesc *fd, const void *buf, PRInt32 amount, |
| PRIntn flags, const PRNetAddr *addr, PRIntervalTime timeout) |
| { |
| PRInt32 temp, count; |
| const PRNetAddr *addrp = addr; |
| #if defined(_PR_INET6) |
| PRNetAddr addrCopy; |
| #endif |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return -1; |
| } |
| |
| PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE); |
| #if defined(_PR_INET6) |
| if (addr->raw.family == PR_AF_INET6) { |
| addrCopy = *addr; |
| addrCopy.raw.family = AF_INET6; |
| addrp = &addrCopy; |
| } |
| #endif |
| |
| count = 0; |
| while (amount > 0) { |
| temp = _PR_MD_SENDTO(fd, buf, amount, flags, |
| addrp, PR_NETADDR_SIZE(addr), timeout); |
| if (temp < 0) { |
| count = -1; |
| break; |
| } |
| count += temp; |
| if (fd->secret->nonblocking) { |
| break; |
| } |
| buf = (const void*) ((const char*)buf + temp); |
| amount -= temp; |
| } |
| return count; |
| } |
| |
| static PRInt32 PR_CALLBACK SocketRecvFrom(PRFileDesc *fd, void *buf, PRInt32 amount, |
| PRIntn flags, PRNetAddr *addr, PRIntervalTime timeout) |
| { |
| PRInt32 rv; |
| PRUint32 al; |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return -1; |
| } |
| |
| al = sizeof(PRNetAddr); |
| rv = _PR_MD_RECVFROM(fd, buf, amount, flags, addr, &al, timeout); |
| #ifdef _PR_INET6 |
| if (addr && (AF_INET6 == addr->raw.family)) |
| addr->raw.family = PR_AF_INET6; |
| #endif |
| return rv; |
| } |
| |
| static PRInt32 PR_CALLBACK SocketAcceptRead(PRFileDesc *sd, PRFileDesc **nd, |
| PRNetAddr **raddr, void *buf, PRInt32 amount, |
| PRIntervalTime timeout) |
| { |
| PRInt32 rv; |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return -1; |
| } |
| /* The socket must be in blocking mode. */ |
| if (sd->secret->nonblocking) { |
| PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0); |
| return -1; |
| } |
| *nd = NULL; |
| |
| #if defined(WINNT) |
| { |
| PROsfd newSock; |
| PRNetAddr *raddrCopy; |
| |
| if (raddr == NULL) { |
| raddr = &raddrCopy; |
| } |
| rv = _PR_MD_ACCEPT_READ(sd, &newSock, raddr, buf, amount, timeout); |
| if (rv < 0) { |
| rv = -1; |
| } else { |
| /* Successfully accepted and read; create the new PRFileDesc */ |
| *nd = PR_AllocFileDesc(newSock, PR_GetTCPMethods()); |
| if (*nd == 0) { |
| _PR_MD_CLOSE_SOCKET(newSock); |
| /* PR_AllocFileDesc() has invoked PR_SetError(). */ |
| rv = -1; |
| } else { |
| (*nd)->secret->md.io_model_committed = PR_TRUE; |
| (*nd)->secret->md.accepted_socket = PR_TRUE; |
| memcpy(&(*nd)->secret->md.peer_addr, *raddr, |
| PR_NETADDR_SIZE(*raddr)); |
| #ifdef _PR_INET6 |
| if (AF_INET6 == *raddr->raw.family) |
| *raddr->raw.family = PR_AF_INET6; |
| #endif |
| } |
| } |
| } |
| #else |
| rv = PR_EmulateAcceptRead(sd, nd, raddr, buf, amount, timeout); |
| #endif |
| return rv; |
| } |
| |
| #ifdef WINNT |
| PR_IMPLEMENT(PRInt32) PR_NTFast_AcceptRead(PRFileDesc *sd, PRFileDesc **nd, |
| PRNetAddr **raddr, void *buf, PRInt32 amount, |
| PRIntervalTime timeout) |
| { |
| PRInt32 rv; |
| PROsfd newSock; |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| PRNetAddr *raddrCopy; |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return -1; |
| } |
| *nd = NULL; |
| |
| if (raddr == NULL) { |
| raddr = &raddrCopy; |
| } |
| rv = _PR_MD_FAST_ACCEPT_READ(sd, &newSock, raddr, buf, amount, |
| timeout, PR_TRUE, NULL, NULL); |
| if (rv < 0) { |
| rv = -1; |
| } else { |
| /* Successfully accepted and read; create the new PRFileDesc */ |
| *nd = PR_AllocFileDesc(newSock, PR_GetTCPMethods()); |
| if (*nd == 0) { |
| _PR_MD_CLOSE_SOCKET(newSock); |
| /* PR_AllocFileDesc() has invoked PR_SetError(). */ |
| rv = -1; |
| } else { |
| (*nd)->secret->md.io_model_committed = PR_TRUE; |
| (*nd)->secret->md.accepted_socket = PR_TRUE; |
| memcpy(&(*nd)->secret->md.peer_addr, *raddr, |
| PR_NETADDR_SIZE(*raddr)); |
| #ifdef _PR_INET6 |
| if (AF_INET6 == *raddr->raw.family) |
| *raddr->raw.family = PR_AF_INET6; |
| #endif |
| #ifdef _PR_NEED_SECRET_AF |
| (*nd)->secret->af = sd->secret->af; |
| #endif |
| } |
| } |
| return rv; |
| } |
| |
| PR_IMPLEMENT(PRInt32) PR_NTFast_AcceptRead_WithTimeoutCallback( |
| PRFileDesc *sd, PRFileDesc **nd, |
| PRNetAddr **raddr, void *buf, PRInt32 amount, |
| PRIntervalTime timeout, |
| _PR_AcceptTimeoutCallback callback, |
| void *callbackArg) |
| { |
| PRInt32 rv; |
| PROsfd newSock; |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| PRNetAddr *raddrCopy; |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return -1; |
| } |
| *nd = NULL; |
| |
| if (raddr == NULL) { |
| raddr = &raddrCopy; |
| } |
| rv = _PR_MD_FAST_ACCEPT_READ(sd, &newSock, raddr, buf, amount, |
| timeout, PR_TRUE, callback, callbackArg); |
| if (rv < 0) { |
| rv = -1; |
| } else { |
| /* Successfully accepted and read; create the new PRFileDesc */ |
| *nd = PR_AllocFileDesc(newSock, PR_GetTCPMethods()); |
| if (*nd == 0) { |
| _PR_MD_CLOSE_SOCKET(newSock); |
| /* PR_AllocFileDesc() has invoked PR_SetError(). */ |
| rv = -1; |
| } else { |
| (*nd)->secret->md.io_model_committed = PR_TRUE; |
| (*nd)->secret->md.accepted_socket = PR_TRUE; |
| memcpy(&(*nd)->secret->md.peer_addr, *raddr, |
| PR_NETADDR_SIZE(*raddr)); |
| #ifdef _PR_INET6 |
| if (AF_INET6 == *raddr->raw.family) |
| *raddr->raw.family = PR_AF_INET6; |
| #endif |
| #ifdef _PR_NEED_SECRET_AF |
| (*nd)->secret->af = sd->secret->af; |
| #endif |
| } |
| } |
| return rv; |
| } |
| #endif /* WINNT */ |
| |
| #ifdef WINNT |
| PR_IMPLEMENT(void) |
| PR_NTFast_UpdateAcceptContext(PRFileDesc *socket, PRFileDesc *acceptSocket) |
| { |
| _PR_MD_UPDATE_ACCEPT_CONTEXT( |
| socket->secret->md.osfd, acceptSocket->secret->md.osfd); |
| } |
| #endif /* WINNT */ |
| |
| static PRInt32 PR_CALLBACK SocketSendFile( |
| PRFileDesc *sd, PRSendFileData *sfd, |
| PRTransmitFileFlags flags, PRIntervalTime timeout) |
| { |
| PRInt32 rv; |
| PRThread *me = _PR_MD_CURRENT_THREAD(); |
| |
| if (_PR_PENDING_INTERRUPT(me)) { |
| me->flags &= ~_PR_INTERRUPT; |
| PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0); |
| return -1; |
| } |
| if (_PR_IO_PENDING(me)) { |
| PR_SetError(PR_IO_PENDING_ERROR, 0); |
| return -1; |
| } |
| /* The socket must be in blocking mode. */ |
| if (sd->secret->nonblocking) { |
| PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0); |
| return -1; |
| } |
| #if defined(WINNT) |
| rv = _PR_MD_SENDFILE(sd, sfd, flags, timeout); |
| if ((rv >= 0) && (flags == PR_TRANSMITFILE_CLOSE_SOCKET)) { |
| /* |
| * This should be kept the same as SocketClose, except |
| * that _PR_MD_CLOSE_SOCKET(sd->secret->md.osfd) should |
| * not be called because the socket will be recycled. |
| */ |
| PR_FreeFileDesc(sd); |
| } |
| #else |
| rv = PR_EmulateSendFile(sd, sfd, flags, timeout); |
| #endif /* WINNT */ |
| |
| return rv; |
| } |
| |
| static PRInt32 PR_CALLBACK SocketTransmitFile(PRFileDesc *sd, PRFileDesc *fd, |
| const void *headers, PRInt32 hlen, PRTransmitFileFlags flags, |
| PRIntervalTime timeout) |
| { |
| PRSendFileData sfd; |
| |
| sfd.fd = fd; |
| sfd.file_offset = 0; |
| sfd.file_nbytes = 0; |
| sfd.header = headers; |
| sfd.hlen = hlen; |
| sfd.trailer = NULL; |
| sfd.tlen = 0; |
| |
| return(SocketSendFile(sd, &sfd, flags, timeout)); |
| } |
| |
| static PRStatus PR_CALLBACK SocketGetName(PRFileDesc *fd, PRNetAddr *addr) |
| { |
| PRInt32 result; |
| PRUint32 addrlen; |
| |
| addrlen = sizeof(PRNetAddr); |
| result = _PR_MD_GETSOCKNAME(fd, addr, &addrlen); |
| if (result < 0) { |
| return PR_FAILURE; |
| } |
| #ifdef _PR_INET6 |
| if (AF_INET6 == addr->raw.family) |
| addr->raw.family = PR_AF_INET6; |
| #endif |
| PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE); |
| PR_ASSERT(IsValidNetAddrLen(addr, addrlen) == PR_TRUE); |
| return PR_SUCCESS; |
| } |
| |
| static PRStatus PR_CALLBACK SocketGetPeerName(PRFileDesc *fd, PRNetAddr *addr) |
| { |
| PRInt32 result; |
| PRUint32 addrlen; |
| |
| addrlen = sizeof(PRNetAddr); |
| result = _PR_MD_GETPEERNAME(fd, addr, &addrlen); |
| if (result < 0) { |
| return PR_FAILURE; |
| } |
| #ifdef _PR_INET6 |
| if (AF_INET6 == addr->raw.family) |
| addr->raw.family = PR_AF_INET6; |
| #endif |
| PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE); |
| PR_ASSERT(IsValidNetAddrLen(addr, addrlen) == PR_TRUE); |
| return PR_SUCCESS; |
| } |
| |
| static PRInt16 PR_CALLBACK SocketPoll( |
| PRFileDesc *fd, PRInt16 in_flags, PRInt16 *out_flags) |
| { |
| *out_flags = 0; |
| return in_flags; |
| } /* SocketPoll */ |
| |
| static PRIOMethods tcpMethods = { |
| PR_DESC_SOCKET_TCP, |
| SocketClose, |
| SocketRead, |
| SocketWrite, |
| SocketAvailable, |
| SocketAvailable64, |
| SocketSync, |
| (PRSeekFN)_PR_InvalidInt, |
| (PRSeek64FN)_PR_InvalidInt64, |
| (PRFileInfoFN)_PR_InvalidStatus, |
| (PRFileInfo64FN)_PR_InvalidStatus, |
| SocketWritev, |
| SocketConnect, |
| SocketAccept, |
| SocketBind, |
| SocketListen, |
| SocketShutdown, |
| SocketRecv, |
| SocketSend, |
| (PRRecvfromFN)_PR_InvalidInt, |
| (PRSendtoFN)_PR_InvalidInt, |
| SocketPoll, |
| SocketAcceptRead, |
| SocketTransmitFile, |
| SocketGetName, |
| SocketGetPeerName, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt, |
| _PR_SocketGetSocketOption, |
| _PR_SocketSetSocketOption, |
| SocketSendFile, |
| SocketConnectContinue, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt |
| }; |
| |
| static PRIOMethods udpMethods = { |
| PR_DESC_SOCKET_UDP, |
| SocketClose, |
| SocketRead, |
| SocketWrite, |
| SocketAvailable, |
| SocketAvailable64, |
| SocketSync, |
| (PRSeekFN)_PR_InvalidInt, |
| (PRSeek64FN)_PR_InvalidInt64, |
| (PRFileInfoFN)_PR_InvalidStatus, |
| (PRFileInfo64FN)_PR_InvalidStatus, |
| SocketWritev, |
| SocketConnect, |
| (PRAcceptFN)_PR_InvalidDesc, |
| SocketBind, |
| SocketListen, |
| SocketShutdown, |
| SocketRecv, |
| SocketSend, |
| SocketRecvFrom, |
| SocketSendTo, |
| SocketPoll, |
| (PRAcceptreadFN)_PR_InvalidInt, |
| (PRTransmitfileFN)_PR_InvalidInt, |
| SocketGetName, |
| SocketGetPeerName, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt, |
| _PR_SocketGetSocketOption, |
| _PR_SocketSetSocketOption, |
| (PRSendfileFN)_PR_InvalidInt, |
| (PRConnectcontinueFN)_PR_InvalidStatus, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt |
| }; |
| |
| |
| static PRIOMethods socketpollfdMethods = { |
| (PRDescType) 0, |
| (PRCloseFN)_PR_InvalidStatus, |
| (PRReadFN)_PR_InvalidInt, |
| (PRWriteFN)_PR_InvalidInt, |
| (PRAvailableFN)_PR_InvalidInt, |
| (PRAvailable64FN)_PR_InvalidInt64, |
| (PRFsyncFN)_PR_InvalidStatus, |
| (PRSeekFN)_PR_InvalidInt, |
| (PRSeek64FN)_PR_InvalidInt64, |
| (PRFileInfoFN)_PR_InvalidStatus, |
| (PRFileInfo64FN)_PR_InvalidStatus, |
| (PRWritevFN)_PR_InvalidInt, |
| (PRConnectFN)_PR_InvalidStatus, |
| (PRAcceptFN)_PR_InvalidDesc, |
| (PRBindFN)_PR_InvalidStatus, |
| (PRListenFN)_PR_InvalidStatus, |
| (PRShutdownFN)_PR_InvalidStatus, |
| (PRRecvFN)_PR_InvalidInt, |
| (PRSendFN)_PR_InvalidInt, |
| (PRRecvfromFN)_PR_InvalidInt, |
| (PRSendtoFN)_PR_InvalidInt, |
| SocketPoll, |
| (PRAcceptreadFN)_PR_InvalidInt, |
| (PRTransmitfileFN)_PR_InvalidInt, |
| (PRGetsocknameFN)_PR_InvalidStatus, |
| (PRGetpeernameFN)_PR_InvalidStatus, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRGetsocketoptionFN)_PR_InvalidStatus, |
| (PRSetsocketoptionFN)_PR_InvalidStatus, |
| (PRSendfileFN)_PR_InvalidInt, |
| (PRConnectcontinueFN)_PR_InvalidStatus, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt, |
| (PRReservedFN)_PR_InvalidInt |
| }; |
| |
| PR_IMPLEMENT(const PRIOMethods*) PR_GetTCPMethods() |
| { |
| return &tcpMethods; |
| } |
| |
| PR_IMPLEMENT(const PRIOMethods*) PR_GetUDPMethods() |
| { |
| return &udpMethods; |
| } |
| |
| static const PRIOMethods* PR_GetSocketPollFdMethods() |
| { |
| return &socketpollfdMethods; |
| } /* PR_GetSocketPollFdMethods */ |
| |
| #if !defined(_PR_INET6) || defined(_PR_INET6_PROBE) |
| PR_EXTERN(PRStatus) _pr_push_ipv6toipv4_layer(PRFileDesc *fd); |
| |
| #if defined(_PR_INET6_PROBE) |
| |
| extern PRBool _pr_ipv6_is_present(void); |
| |
| PR_IMPLEMENT(PRBool) _pr_test_ipv6_socket() |
| { |
| PROsfd osfd; |
| |
| osfd = _PR_MD_SOCKET(AF_INET6, SOCK_STREAM, 0); |
| if (osfd != -1) { |
| _PR_MD_CLOSE_SOCKET(osfd); |
| return PR_TRUE; |
| } |
| return PR_FALSE; |
| } |
| #endif /* _PR_INET6_PROBE */ |
| |
| #endif |
| |
| PR_IMPLEMENT(PRFileDesc*) PR_Socket(PRInt32 domain, PRInt32 type, PRInt32 proto) |
| { |
| PROsfd osfd; |
| PRFileDesc *fd; |
| PRInt32 tmp_domain = domain; |
| |
| if (!_pr_initialized) _PR_ImplicitInitialization(); |
| if (PR_AF_INET != domain |
| && PR_AF_INET6 != domain |
| #if defined(XP_UNIX) || defined(XP_OS2) |
| && PR_AF_LOCAL != domain |
| #endif |
| ) { |
| PR_SetError(PR_ADDRESS_NOT_SUPPORTED_ERROR, 0); |
| return NULL; |
| } |
| |
| #if defined(_PR_INET6_PROBE) |
| if (PR_AF_INET6 == domain) |
| domain = _pr_ipv6_is_present() ? AF_INET6 : AF_INET; |
| #elif defined(_PR_INET6) |
| if (PR_AF_INET6 == domain) |
| domain = AF_INET6; |
| #else |
| if (PR_AF_INET6 == domain) |
| domain = AF_INET; |
| #endif /* _PR_INET6 */ |
| osfd = _PR_MD_SOCKET(domain, type, proto); |
| if (osfd == -1) { |
| return 0; |
| } |
| if (type == SOCK_STREAM) |
| fd = PR_AllocFileDesc(osfd, PR_GetTCPMethods()); |
| else |
| fd = PR_AllocFileDesc(osfd, PR_GetUDPMethods()); |
| /* |
| * Make the sockets non-blocking |
| */ |
| if (fd != NULL) { |
| _PR_MD_MAKE_NONBLOCK(fd); |
| _PR_MD_INIT_FD_INHERITABLE(fd, PR_FALSE); |
| #ifdef _PR_NEED_SECRET_AF |
| fd->secret->af = domain; |
| #endif |
| #if defined(_PR_INET6_PROBE) || !defined(_PR_INET6) |
| /* |
| * For platforms with no support for IPv6 |
| * create layered socket for IPv4-mapped IPv6 addresses |
| */ |
| if (PR_AF_INET6 == tmp_domain && PR_AF_INET == domain) { |
| if (PR_FAILURE == _pr_push_ipv6toipv4_layer(fd)) { |
| PR_Close(fd); |
| fd = NULL; |
| } |
| } |
| #endif |
| } else |
| _PR_MD_CLOSE_SOCKET(osfd); |
| |
| return fd; |
| } |
| |
| PR_IMPLEMENT(PRFileDesc *) PR_NewTCPSocket(void) |
| { |
| PRInt32 domain = AF_INET; |
| |
| return PR_Socket(domain, SOCK_STREAM, 0); |
| } |
| |
| PR_IMPLEMENT(PRFileDesc*) PR_NewUDPSocket(void) |
| { |
| PRInt32 domain = AF_INET; |
| |
| return PR_Socket(domain, SOCK_DGRAM, 0); |
| } |
| |
| PR_IMPLEMENT(PRFileDesc *) PR_OpenTCPSocket(PRIntn af) |
| { |
| return PR_Socket(af, SOCK_STREAM, 0); |
| } |
| |
| PR_IMPLEMENT(PRFileDesc*) PR_OpenUDPSocket(PRIntn af) |
| { |
| return PR_Socket(af, SOCK_DGRAM, 0); |
| } |
| |
| PR_IMPLEMENT(PRStatus) PR_NewTCPSocketPair(PRFileDesc *f[]) |
| { |
| #ifdef XP_UNIX |
| PRInt32 rv, osfd[2]; |
| |
| if (!_pr_initialized) _PR_ImplicitInitialization(); |
| |
| rv = _PR_MD_SOCKETPAIR(AF_UNIX, SOCK_STREAM, 0, osfd); |
| if (rv == -1) { |
| return PR_FAILURE; |
| } |
| |
| f[0] = PR_AllocFileDesc(osfd[0], PR_GetTCPMethods()); |
| if (!f[0]) { |
| _PR_MD_CLOSE_SOCKET(osfd[0]); |
| _PR_MD_CLOSE_SOCKET(osfd[1]); |
| /* PR_AllocFileDesc() has invoked PR_SetError(). */ |
| return PR_FAILURE; |
| } |
| f[1] = PR_AllocFileDesc(osfd[1], PR_GetTCPMethods()); |
| if (!f[1]) { |
| PR_Close(f[0]); |
| _PR_MD_CLOSE_SOCKET(osfd[1]); |
| /* PR_AllocFileDesc() has invoked PR_SetError(). */ |
| return PR_FAILURE; |
| } |
| _PR_MD_MAKE_NONBLOCK(f[0]); |
| _PR_MD_INIT_FD_INHERITABLE(f[0], PR_FALSE); |
| _PR_MD_MAKE_NONBLOCK(f[1]); |
| _PR_MD_INIT_FD_INHERITABLE(f[1], PR_FALSE); |
| return PR_SUCCESS; |
| #elif defined(WINNT) |
| /* |
| * A socket pair is often used for interprocess communication, |
| * so we need to make sure neither socket is associated with |
| * the I/O completion port; otherwise it can't be used by a |
| * child process. |
| * |
| * The default implementation below cannot be used for NT |
| * because PR_Accept would have associated the I/O completion |
| * port with the listening and accepted sockets. |
| */ |
| SOCKET listenSock; |
| SOCKET osfd[2]; |
| struct sockaddr_in selfAddr, peerAddr; |
| int addrLen; |
| |
| if (!_pr_initialized) _PR_ImplicitInitialization(); |
| |
| osfd[0] = osfd[1] = INVALID_SOCKET; |
| listenSock = socket(AF_INET, SOCK_STREAM, 0); |
| if (listenSock == INVALID_SOCKET) { |
| goto failed; |
| } |
| selfAddr.sin_family = AF_INET; |
| selfAddr.sin_port = 0; |
| selfAddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); /* BugZilla: 35408 */ |
| addrLen = sizeof(selfAddr); |
| if (bind(listenSock, (struct sockaddr *) &selfAddr, |
| addrLen) == SOCKET_ERROR) { |
| goto failed; |
| } |
| if (getsockname(listenSock, (struct sockaddr *) &selfAddr, |
| &addrLen) == SOCKET_ERROR) { |
| goto failed; |
| } |
| if (listen(listenSock, 5) == SOCKET_ERROR) { |
| goto failed; |
| } |
| osfd[0] = socket(AF_INET, SOCK_STREAM, 0); |
| if (osfd[0] == INVALID_SOCKET) { |
| goto failed; |
| } |
| selfAddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); |
| |
| /* |
| * Only a thread is used to do the connect and accept. |
| * I am relying on the fact that connect returns |
| * successfully as soon as the connect request is put |
| * into the listen queue (but before accept is called). |
| * This is the behavior of the BSD socket code. If |
| * connect does not return until accept is called, we |
| * will need to create another thread to call connect. |
| */ |
| if (connect(osfd[0], (struct sockaddr *) &selfAddr, |
| addrLen) == SOCKET_ERROR) { |
| goto failed; |
| } |
| /* |
| * A malicious local process may connect to the listening |
| * socket, so we need to verify that the accepted connection |
| * is made from our own socket osfd[0]. |
| */ |
| if (getsockname(osfd[0], (struct sockaddr *) &selfAddr, |
| &addrLen) == SOCKET_ERROR) { |
| goto failed; |
| } |
| osfd[1] = accept(listenSock, (struct sockaddr *) &peerAddr, &addrLen); |
| if (osfd[1] == INVALID_SOCKET) { |
| goto failed; |
| } |
| if (peerAddr.sin_port != selfAddr.sin_port) { |
| /* the connection we accepted is not from osfd[0] */ |
| PR_SetError(PR_INSUFFICIENT_RESOURCES_ERROR, 0); |
| goto failed; |
| } |
| closesocket(listenSock); |
| |
| f[0] = PR_AllocFileDesc(osfd[0], PR_GetTCPMethods()); |
| if (!f[0]) { |
| closesocket(osfd[0]); |
| closesocket(osfd[1]); |
| /* PR_AllocFileDesc() has invoked PR_SetError(). */ |
| return PR_FAILURE; |
| } |
| f[1] = PR_AllocFileDesc(osfd[1], PR_GetTCPMethods()); |
| if (!f[1]) { |
| PR_Close(f[0]); |
| closesocket(osfd[1]); |
| /* PR_AllocFileDesc() has invoked PR_SetError(). */ |
| return PR_FAILURE; |
| } |
| _PR_MD_INIT_FD_INHERITABLE(f[0], PR_FALSE); |
| _PR_MD_INIT_FD_INHERITABLE(f[1], PR_FALSE); |
| return PR_SUCCESS; |
| |
| failed: |
| if (listenSock != INVALID_SOCKET) { |
| closesocket(listenSock); |
| } |
| if (osfd[0] != INVALID_SOCKET) { |
| closesocket(osfd[0]); |
| } |
| if (osfd[1] != INVALID_SOCKET) { |
| closesocket(osfd[1]); |
| } |
| return PR_FAILURE; |
| #else /* not Unix or NT */ |
| /* |
| * default implementation |
| */ |
| PRFileDesc *listenSock; |
| PRNetAddr selfAddr, peerAddr; |
| PRUint16 port; |
| |
| f[0] = f[1] = NULL; |
| listenSock = PR_NewTCPSocket(); |
| if (listenSock == NULL) { |
| goto failed; |
| } |
| PR_InitializeNetAddr(PR_IpAddrLoopback, 0, &selfAddr); /* BugZilla: 35408 */ |
| if (PR_Bind(listenSock, &selfAddr) == PR_FAILURE) { |
| goto failed; |
| } |
| if (PR_GetSockName(listenSock, &selfAddr) == PR_FAILURE) { |
| goto failed; |
| } |
| port = ntohs(selfAddr.inet.port); |
| if (PR_Listen(listenSock, 5) == PR_FAILURE) { |
| goto failed; |
| } |
| f[0] = PR_NewTCPSocket(); |
| if (f[0] == NULL) { |
| goto failed; |
| } |
| #ifdef _PR_CONNECT_DOES_NOT_BIND |
| /* |
| * If connect does not implicitly bind the socket (e.g., on |
| * BeOS), we have to bind the socket so that we can get its |
| * port with getsockname later. |
| */ |
| PR_InitializeNetAddr(PR_IpAddrLoopback, 0, &selfAddr); |
| if (PR_Bind(f[0], &selfAddr) == PR_FAILURE) { |
| goto failed; |
| } |
| #endif |
| PR_InitializeNetAddr(PR_IpAddrLoopback, port, &selfAddr); |
| |
| /* |
| * Only a thread is used to do the connect and accept. |
| * I am relying on the fact that PR_Connect returns |
| * successfully as soon as the connect request is put |
| * into the listen queue (but before PR_Accept is called). |
| * This is the behavior of the BSD socket code. If |
| * connect does not return until accept is called, we |
| * will need to create another thread to call connect. |
| */ |
| if (PR_Connect(f[0], &selfAddr, PR_INTERVAL_NO_TIMEOUT) |
| == PR_FAILURE) { |
| goto failed; |
| } |
| /* |
| * A malicious local process may connect to the listening |
| * socket, so we need to verify that the accepted connection |
| * is made from our own socket f[0]. |
| */ |
| if (PR_GetSockName(f[0], &selfAddr) == PR_FAILURE) { |
| goto failed; |
| } |
| f[1] = PR_Accept(listenSock, &peerAddr, PR_INTERVAL_NO_TIMEOUT); |
| if (f[1] == NULL) { |
| goto failed; |
| } |
| if (peerAddr.inet.port != selfAddr.inet.port) { |
| /* the connection we accepted is not from f[0] */ |
| PR_SetError(PR_INSUFFICIENT_RESOURCES_ERROR, 0); |
| goto failed; |
| } |
| PR_Close(listenSock); |
| return PR_SUCCESS; |
| |
| failed: |
| if (listenSock) { |
| PR_Close(listenSock); |
| } |
| if (f[0]) { |
| PR_Close(f[0]); |
| } |
| if (f[1]) { |
| PR_Close(f[1]); |
| } |
| return PR_FAILURE; |
| #endif |
| } |
| |
| PR_IMPLEMENT(PROsfd) |
| PR_FileDesc2NativeHandle(PRFileDesc *fd) |
| { |
| if (fd) { |
| fd = PR_GetIdentitiesLayer(fd, PR_NSPR_IO_LAYER); |
| } |
| if (!fd) { |
| PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0); |
| return -1; |
| } |
| return fd->secret->md.osfd; |
| } |
| |
| PR_IMPLEMENT(void) |
| PR_ChangeFileDescNativeHandle(PRFileDesc *fd, PROsfd handle) |
| { |
| if (fd) |
| fd->secret->md.osfd = handle; |
| } |
| |
| /* |
| ** Select compatibility |
| ** |
| */ |
| |
| PR_IMPLEMENT(void) PR_FD_ZERO(PR_fd_set *set) |
| { |
| memset(set, 0, sizeof(PR_fd_set)); |
| } |
| |
| PR_IMPLEMENT(void) PR_FD_SET(PRFileDesc *fh, PR_fd_set *set) |
| { |
| PR_ASSERT( set->hsize < PR_MAX_SELECT_DESC ); |
| |
| set->harray[set->hsize++] = fh; |
| } |
| |
| PR_IMPLEMENT(void) PR_FD_CLR(PRFileDesc *fh, PR_fd_set *set) |
| { |
| PRUint32 index, index2; |
| |
| for (index = 0; index<set->hsize; index++) |
| if (set->harray[index] == fh) { |
| for (index2=index; index2 < (set->hsize-1); index2++) { |
| set->harray[index2] = set->harray[index2+1]; |
| } |
| set->hsize--; |
| break; |
| } |
| } |
| |
| PR_IMPLEMENT(PRInt32) PR_FD_ISSET(PRFileDesc *fh, PR_fd_set *set) |
| { |
| PRUint32 index; |
| for (index = 0; index<set->hsize; index++) |
| if (set->harray[index] == fh) { |
| return 1; |
| } |
| return 0; |
| } |
| |
| PR_IMPLEMENT(void) PR_FD_NSET(PROsfd fd, PR_fd_set *set) |
| { |
| PR_ASSERT( set->nsize < PR_MAX_SELECT_DESC ); |
| |
| set->narray[set->nsize++] = fd; |
| } |
| |
| PR_IMPLEMENT(void) PR_FD_NCLR(PROsfd fd, PR_fd_set *set) |
| { |
| PRUint32 index, index2; |
| |
| for (index = 0; index<set->nsize; index++) |
| if (set->narray[index] == fd) { |
| for (index2=index; index2 < (set->nsize-1); index2++) { |
| set->narray[index2] = set->narray[index2+1]; |
| } |
| set->nsize--; |
| break; |
| } |
| } |
| |
| PR_IMPLEMENT(PRInt32) PR_FD_NISSET(PROsfd fd, PR_fd_set *set) |
| { |
| PRUint32 index; |
| for (index = 0; index<set->nsize; index++) |
| if (set->narray[index] == fd) { |
| return 1; |
| } |
| return 0; |
| } |
| |
| |
| #if !defined(NEED_SELECT) |
| #include "obsolete/probslet.h" |
| |
| #define PD_INCR 20 |
| |
| static PRPollDesc *_pr_setfd( |
| PR_fd_set *set, PRInt16 flags, PRPollDesc *polldesc) |
| { |
| PRUintn fsidx, pdidx; |
| PRPollDesc *poll = polldesc; |
| |
| if (NULL == set) return poll; |
| |
| /* First set the pr file handle osfds */ |
| for (fsidx = 0; fsidx < set->hsize; fsidx++) |
| { |
| for (pdidx = 0; 1; pdidx++) |
| { |
| if ((PRFileDesc*)-1 == poll[pdidx].fd) |
| { |
| /* our vector is full - extend and condition it */ |
| poll = (PRPollDesc*)PR_Realloc( |
| poll, (pdidx + 1 + PD_INCR) * sizeof(PRPollDesc)); |
| if (NULL == poll) goto out_of_memory; |
| memset( |
| poll + pdidx * sizeof(PRPollDesc), |
| 0, PD_INCR * sizeof(PRPollDesc)); |
| poll[pdidx + PD_INCR].fd = (PRFileDesc*)-1; |
| } |
| if ((NULL == poll[pdidx].fd) |
| || (poll[pdidx].fd == set->harray[fsidx])) |
| { |
| /* PR_ASSERT(0 == (poll[pdidx].in_flags & flags)); */ |
| /* either empty or prevously defined */ |
| poll[pdidx].fd = set->harray[fsidx]; /* possibly redundant */ |
| poll[pdidx].in_flags |= flags; /* possibly redundant */ |
| break; |
| } |
| } |
| } |
| |
| #if 0 |
| /* Second set the native osfds */ |
| for (fsidx = 0; fsidx < set->nsize; fsidx++) |
| { |
| for (pdidx = 0; ((PRFileDesc*)-1 != poll[pdidx].fd); pdidx++) |
| { |
| if ((PRFileDesc*)-1 == poll[pdidx].fd) |
| { |
| /* our vector is full - extend and condition it */ |
| poll = PR_Realloc( |
| poll, (pdidx + PD_INCR) * sizeof(PRPollDesc)); |
| if (NULL == poll) goto out_of_memory; |
| memset( |
| poll + pdidx * sizeof(PRPollDesc), |
| 0, PD_INCR * sizeof(PRPollDesc)); |
| poll[(pdidx + PD_INCR)].fd = (PRFileDesc*)-1; |
| } |
| if ((NULL == poll[pdidx].fd) |
| || (poll[pdidx].fd == set->narray[fsidx])) |
| { |
| /* either empty or prevously defined */ |
| poll[pdidx].fd = set->narray[fsidx]; |
| PR_ASSERT(0 == (poll[pdidx].in_flags & flags)); |
| poll[pdidx].in_flags |= flags; |
| break; |
| } |
| } |
| } |
| #endif /* 0 */ |
| |
| return poll; |
| |
| out_of_memory: |
| if (NULL != polldesc) PR_DELETE(polldesc); |
| return NULL; |
| } /* _pr_setfd */ |
| |
| #endif /* !defined(NEED_SELECT) */ |
| |
| PR_IMPLEMENT(PRInt32) PR_Select( |
| PRInt32 unused, PR_fd_set *pr_rd, PR_fd_set *pr_wr, |
| PR_fd_set *pr_ex, PRIntervalTime timeout) |
| { |
| |
| #if !defined(NEED_SELECT) |
| PRInt32 npds = 0; |
| /* |
| ** Find out how many fds are represented in the three lists. |
| ** Then allocate a polling descriptor for the logical union |
| ** (there can't be any overlapping) and call PR_Poll(). |
| */ |
| |
| PRPollDesc *copy, *poll; |
| |
| static PRBool warning = PR_TRUE; |
| if (warning) warning = _PR_Obsolete( "PR_Select()", "PR_Poll()"); |
| |
| /* try to get an initial guesss at how much space we need */ |
| npds = 0; |
| if ((NULL != pr_rd) && ((pr_rd->hsize + pr_rd->nsize - npds) > 0)) |
| npds = pr_rd->hsize + pr_rd->nsize; |
| if ((NULL != pr_wr) && ((pr_wr->hsize + pr_wr->nsize - npds) > 0)) |
| npds = pr_wr->hsize + pr_wr->nsize; |
| if ((NULL != pr_ex) && ((pr_ex->hsize + pr_ex->nsize - npds) > 0)) |
| npds = pr_ex->hsize + pr_ex->nsize; |
| |
| if (0 == npds) |
| { |
| PR_Sleep(timeout); |
| return 0; |
| } |
| |
| copy = poll = (PRPollDesc*)PR_Calloc(npds + PD_INCR, sizeof(PRPollDesc)); |
| if (NULL == poll) goto out_of_memory; |
| poll[npds + PD_INCR - 1].fd = (PRFileDesc*)-1; |
| |
| poll = _pr_setfd(pr_rd, PR_POLL_READ, poll); |
| if (NULL == poll) goto out_of_memory; |
| poll = _pr_setfd(pr_wr, PR_POLL_WRITE, poll); |
| if (NULL == poll) goto out_of_memory; |
| poll = _pr_setfd(pr_ex, PR_POLL_EXCEPT, poll); |
| if (NULL == poll) goto out_of_memory; |
| unused = 0; |
| while (NULL != poll[unused].fd && (PRFileDesc*)-1 != poll[unused].fd) |
| { |
| ++unused; |
| } |
| |
| PR_ASSERT(unused > 0); |
| npds = PR_Poll(poll, unused, timeout); |
| |
| if (npds > 0) |
| { |
| /* Copy the results back into the fd sets */ |
| if (NULL != pr_rd) pr_rd->nsize = pr_rd->hsize = 0; |
| if (NULL != pr_wr) pr_wr->nsize = pr_wr->hsize = 0; |
| if (NULL != pr_ex) pr_ex->nsize = pr_ex->hsize = 0; |
| for (copy = &poll[unused - 1]; copy >= poll; --copy) |
| { |
| if (copy->out_flags & PR_POLL_NVAL) |
| { |
| PR_SetError(PR_BAD_DESCRIPTOR_ERROR, 0); |
| npds = -1; |
| break; |
| } |
| if (copy->out_flags & PR_POLL_READ) |
| if (NULL != pr_rd) pr_rd->harray[pr_rd->hsize++] = copy->fd; |
| if (copy->out_flags & PR_POLL_WRITE) |
| if (NULL != pr_wr) pr_wr->harray[pr_wr->hsize++] = copy->fd; |
| if (copy->out_flags & PR_POLL_EXCEPT) |
| if (NULL != pr_ex) pr_ex->harray[pr_ex->hsize++] = copy->fd; |
| } |
| } |
| PR_DELETE(poll); |
| |
| return npds; |
| out_of_memory: |
| PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0); |
| return -1; |
| |
| #endif /* !defined(NEED_SELECT) */ |
| |
| } |