/* * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client * Copyright (C) 1999-2002 Hiroyuki Yamamoto * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ #ifdef HAVE_CONFIG_H # include "config.h" #endif #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #if HAVE_SYS_SELECT_H # include #endif #include "socket.h" #include "utils.h" #include "log.h" #if USE_OPENSSL # include "ssl.h" #endif #if USE_GIO #error USE_GIO is currently not supported #endif #define BUFFSIZE 8192 #define IO_TIMEOUT 60 static gint sock_connect_with_timeout (gint sock, const struct sockaddr *serv_addr, gint addrlen, guint timeout_secs); #ifndef INET6 static gint sock_connect_by_hostname (gint sock, const gchar *hostname, gushort port); #else static gint sock_connect_by_getaddrinfo (const gchar *hostname, gushort port); #endif static SockInfo *sockinfo_from_fd(const gchar *hostname, gushort port, gint sock); gint fd_connect_unix(const gchar *path) { gint sock; struct sockaddr_un addr; sock = socket(PF_UNIX, SOCK_STREAM, 0); if (sock < 0) { perror("sock_connect_unix(): socket"); return -1; } memset(&addr, 0, sizeof(addr)); addr.sun_family = AF_UNIX; strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1); if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) { close(sock); return -1; } return sock; } gint fd_open_unix(const gchar *path) { gint sock; struct sockaddr_un addr; sock = socket(PF_UNIX, SOCK_STREAM, 0); if (sock < 0) { perror("sock_open_unix(): socket"); return -1; } memset(&addr, 0, sizeof(addr)); addr.sun_family = AF_UNIX; strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1); if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) { perror("bind"); close(sock); return -1; } if (listen(sock, 1) < 0) { perror("listen"); close(sock); return -1; } return sock; } gint fd_accept(gint sock) { struct sockaddr_in caddr; gint caddr_len; caddr_len = sizeof(caddr); return accept(sock, (struct sockaddr *)&caddr, &caddr_len); } static gint set_nonblocking_mode(gint fd, gboolean nonblock) { gint flags; flags = fcntl(fd, F_GETFL, 0); if (flags < 0) { perror("fcntl"); return -1; } if (nonblock) flags |= O_NONBLOCK; else flags &= ~O_NONBLOCK; return fcntl(fd, F_SETFL, flags); } gint sock_set_nonblocking_mode(SockInfo *sock, gboolean nonblock) { g_return_val_if_fail(sock != NULL, -1); return set_nonblocking_mode(sock->sock, nonblock); } static gboolean is_nonblocking_mode(gint fd) { gint flags; flags = fcntl(fd, F_GETFL, 0); if (flags < 0) { perror("fcntl"); return FALSE; } return ((flags & O_NONBLOCK) != 0); } gboolean sock_is_nonblocking_mode(SockInfo *sock) { g_return_val_if_fail(sock != NULL, FALSE); return is_nonblocking_mode(sock->sock); } static gint fd_check_io(gint fd, GIOCondition cond) { struct timeval timeout; fd_set fds; timeout.tv_sec = IO_TIMEOUT; timeout.tv_usec = 0; FD_ZERO(&fds); FD_SET(fd, &fds); if (cond == G_IO_IN) { select(fd + 1, &fds, NULL, NULL, &timeout); } else { select(fd + 1, NULL, &fds, NULL, &timeout); } if (FD_ISSET(fd, &fds)) { return 0; } else { g_warning("Socket IO timeout\n"); return -1; } } static sigjmp_buf jmpenv; static void timeout_handler(gint sig) { siglongjmp(jmpenv, 1); } static gint sock_connect_with_timeout(gint sock, const struct sockaddr *serv_addr, gint addrlen, guint timeout_secs) { gint ret; void (*prev_handler)(gint); alarm(0); prev_handler = signal(SIGALRM, timeout_handler); if (sigsetjmp(jmpenv, 1)) { alarm(0); signal(SIGALRM, prev_handler); errno = ETIMEDOUT; return -1; } alarm(timeout_secs); ret = connect(sock, serv_addr, addrlen); alarm(0); signal(SIGALRM, prev_handler); return ret; } struct hostent *my_gethostbyname(const gchar *hostname) { struct hostent *hp; void (*prev_handler)(gint); guint timeout_secs = IO_TIMEOUT; alarm(0); prev_handler = signal(SIGALRM, timeout_handler); if (sigsetjmp(jmpenv, 1)) { alarm(0); signal(SIGALRM, prev_handler); fprintf(stderr, "%s: host lookup timed out.\n", hostname); errno = 0; return NULL; } alarm(timeout_secs); if ((hp = gethostbyname(hostname)) == NULL) { alarm(0); signal(SIGALRM, prev_handler); fprintf(stderr, "%s: unknown host.\n", hostname); errno = 0; return NULL; } alarm(0); signal(SIGALRM, prev_handler); return hp; } #ifndef INET6 static gint my_inet_aton(const gchar *hostname, struct in_addr *inp) { #if HAVE_INET_ATON return inet_aton(hostname, inp); #else #if HAVE_INET_ADDR guint32 inaddr; inaddr = inet_addr(hostname); if (inaddr != -1) { memcpy(inp, &inaddr, sizeof(inaddr)); return 1; } else return 0; #else return 0; #endif #endif /* HAVE_INET_ATON */ } static gint sock_connect_by_hostname(gint sock, const gchar *hostname, gushort port) { struct hostent *hp; struct sockaddr_in ad; guint timeout_secs = IO_TIMEOUT; memset(&ad, 0, sizeof(ad)); ad.sin_family = AF_INET; ad.sin_port = htons(port); if (!my_inet_aton(hostname, &ad.sin_addr)) { if ((hp = my_gethostbyname(hostname)) == NULL) { fprintf(stderr, "%s: unknown host.\n", hostname); errno = 0; return -1; } if (hp->h_length != 4 && hp->h_length != 8) { fprintf(stderr, "illegal address length received for host %s\n", hostname); errno = 0; return -1; } memcpy(&ad.sin_addr, hp->h_addr, hp->h_length); } return sock_connect_with_timeout(sock, (struct sockaddr *)&ad, sizeof(ad), timeout_secs); } #else /* INET6 */ static gint sock_connect_by_getaddrinfo(const gchar *hostname, gushort port) { gint sock = -1, gai_error; struct addrinfo hints, *res, *ai; guint timeout_secs = IO_TIMEOUT; gchar port_str[6]; memset(&hints, 0, sizeof(hints)); /* hints.ai_flags = AI_CANONNAME; */ hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; hints.ai_protocol = IPPROTO_TCP; /* convert port from integer to string. */ g_snprintf(port_str, sizeof(port_str), "%d", port); if ((gai_error = getaddrinfo(hostname, port_str, &hints, &res)) != 0) { fprintf(stderr, "getaddrinfo for %s:%s failed: %s\n", hostname, port_str, gai_strerror(gai_error)); return -1; } for (ai = res; ai != NULL; ai = ai->ai_next) { sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol); if (sock < 0) continue; if (sock_connect_with_timeout (sock, ai->ai_addr, ai->ai_addrlen, timeout_secs) == 0) break; close(sock); } if (res != NULL) freeaddrinfo(res); if (ai == NULL) return -1; return sock; } #endif /* !INET6 */ /* Open a connection using an external program. May be useful when * you need to tunnel through a SOCKS or other firewall, or to * establish an IMAP-over-SSH connection. */ /* TODO: Recreate this for sock_connect_thread() */ SockInfo *sock_connect_cmd(const gchar *hostname, const gchar *tunnelcmd) { gint fd[2]; int r; if ((r = socketpair(AF_UNIX, SOCK_STREAM, 0, fd)) == -1) { perror("socketpair"); return NULL; } log_message("launching tunnel command \"%s\"\n", tunnelcmd); if (fork() == 0) { close(fd[0]); close(0); close(1); dup(fd[1]); /* set onto stdin */ dup(fd[1]); execlp("/bin/sh", "/bin/sh", "-c", tunnelcmd, NULL); } close(fd[1]); return sockinfo_from_fd(hostname, 0, fd[0]); } SockInfo *sock_connect(const gchar *hostname, gushort port) { gint sock; #ifdef INET6 if ((sock = sock_connect_by_getaddrinfo(hostname, port)) < 0) return NULL; #else if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { perror("socket"); return NULL; } if (sock_connect_by_hostname(sock, hostname, port) < 0) { if (errno != 0) perror("connect"); close(sock); return NULL; } #endif /* INET6 */ return sockinfo_from_fd(hostname, port, sock); } static SockInfo *sockinfo_from_fd(const gchar *hostname, gushort port, gint sock) { SockInfo *sockinfo; sockinfo = g_new0(SockInfo, 1); sockinfo->sock = sock; sockinfo->hostname = g_strdup(hostname); sockinfo->port = port; sockinfo->state = CONN_ESTABLISHED; usleep(100000); return sockinfo; } gint sock_printf(SockInfo *sock, const gchar *format, ...) { va_list args; gchar buf[BUFFSIZE]; va_start(args, format); g_vsnprintf(buf, sizeof(buf), format, args); va_end(args); return sock_write(sock, buf, strlen(buf)); } gint sock_read(SockInfo *sock, gchar *buf, gint len) { g_return_val_if_fail(sock != NULL, -1); #if USE_OPENSSL if (sock->ssl) return ssl_read(sock->ssl, buf, len); #endif return fd_read(sock->sock, buf, len); } gint fd_read(gint fd, gchar *buf, gint len) { if (fd_check_io(fd, G_IO_IN) < 0) return -1; return read(fd, buf, len); } #if USE_OPENSSL gint ssl_read(SSL *ssl, gchar *buf, gint len) { return SSL_read(ssl, buf, len); } #endif gint sock_write(SockInfo *sock, const gchar *buf, gint len) { g_return_val_if_fail(sock != NULL, -1); #if USE_OPENSSL if (sock->ssl) return ssl_write(sock->ssl, buf, len); #endif return fd_write(sock->sock, buf, len); } gint fd_write(gint fd, const gchar *buf, gint len) { gint n, wrlen = 0; while (len) { if (fd_check_io(fd, G_IO_OUT) < 0) return -1; signal(SIGPIPE, SIG_IGN); n = write(fd, buf, len); if (n <= 0) { log_error("write on fd%d: %s\n", fd, strerror(errno)); return -1; } len -= n; wrlen += n; buf += n; } return wrlen; } #if USE_OPENSSL gint ssl_write(SSL *ssl, const gchar *buf, gint len) { gint n, wrlen = 0; while (len) { n = SSL_write(ssl, buf, len); if (n <= 0) return -1; len -= n; wrlen += n; buf += n; } return wrlen; } #endif gint fd_recv(gint fd, gchar *buf, gint len, gint flags) { if (fd_check_io(fd, G_IO_IN) < 0) return -1; return recv(fd, buf, len, flags); } gint fd_gets(gint fd, gchar *buf, gint len) { gchar *newline, *bp = buf; gint n; if (--len < 1) return -1; do { if ((n = fd_recv(fd, bp, len, MSG_PEEK)) <= 0) return -1; if ((newline = memchr(bp, '\n', n)) != NULL) n = newline - bp + 1; if ((n = fd_read(fd, bp, n)) < 0) return -1; bp += n; len -= n; } while (!newline && len); *bp = '\0'; return bp - buf; } #if USE_OPENSSL gint ssl_gets(SSL *ssl, gchar *buf, gint len) { gchar *newline, *bp = buf; gint n; if (--len < 1) return -1; do { if ((n = SSL_peek(ssl, bp, len)) <= 0) return -1; if ((newline = memchr(bp, '\n', n)) != NULL) n = newline - bp + 1; if ((n = SSL_read(ssl, bp, n)) < 0) return -1; bp += n; len -= n; } while (!newline && len); *bp = '\0'; return bp - buf; } #endif gint sock_gets(SockInfo *sock, gchar *buf, gint len) { g_return_val_if_fail(sock != NULL, -1); #if USE_OPENSSL if (sock->ssl) return ssl_gets(sock->ssl, buf, len); #endif return fd_gets(sock->sock, buf, len); } gchar *fd_getline(gint fd) { gchar buf[BUFFSIZE]; gchar *str = NULL; gint len; gulong size = 1; while ((len = fd_gets(fd, buf, sizeof(buf))) > 0) { size += len; if (!str) str = g_strdup(buf); else { str = g_realloc(str, size); strcat(str, buf); } if (buf[len - 1] == '\n') break; } if (len == -1) { log_error("Read from socket fd%d failed: %s\n", fd, strerror(errno)); if (str) g_free(str); return NULL; } return str; } #if USE_OPENSSL gchar *ssl_getline(SSL *ssl) { gchar buf[BUFFSIZE]; gchar *str = NULL; gint len; gulong size = 1; while ((len = ssl_gets(ssl, buf, sizeof(buf))) > 0) { size += len; if (!str) str = g_strdup(buf); else { str = g_realloc(str, size); strcat(str, buf); } if (buf[len - 1] == '\n') break; } return str; } #endif gchar *sock_getline(SockInfo *sock) { g_return_val_if_fail(sock != NULL, NULL); #if USE_OPENSSL if (sock->ssl) return ssl_getline(sock->ssl); #endif return fd_getline(sock->sock); } gint sock_puts(SockInfo *sock, const gchar *buf) { gint ret; if ((ret = sock_write(sock, buf, strlen(buf))) < 0) return ret; return sock_write(sock, "\r\n", 2); } /* peek at the next socket character without actually reading it */ gint sock_peek(SockInfo *sock) { gint n; gchar ch; g_return_val_if_fail(sock != NULL, -1); #if USE_OPENSSL if (sock->ssl) { if ((n = SSL_peek(sock->ssl, &ch, 1)) < 0) return -1; else return ch; } #endif if ((n = recv(sock->sock, &ch, 1, MSG_PEEK)) < 0) return -1; else return ch; } gint sock_close(SockInfo *sock) { gint ret; if (!sock) return 0; #if USE_OPENSSL if (sock->ssl) ssl_done_socket(sock); #endif ret = fd_close(sock->sock); g_free(sock->hostname); g_free(sock); return ret; } gint fd_close(gint fd) { return close(fd); } gint sock_input_add(SockInfo *sock, GIOCondition condition, GIOFunc function, gpointer data) { GIOChannel *channel; guint result; g_return_val_if_fail(sock != NULL, -1); channel = g_io_channel_unix_new(sock->sock); /* :WK: We have to change some things here becuse most likey function() does take SockInfo * and not an gint */ result = g_io_add_watch(channel, condition, function, data); g_io_channel_unref(channel); return result; }