fd5ab1803e
removed unneeded pointer in extracting quoted names implementation
595 lines
11 KiB
C
595 lines
11 KiB
C
/*
|
|
* Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
|
|
* Copyright (C) 1999-2001 Hiroyuki Yamamoto
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
# include "config.h"
|
|
#endif
|
|
|
|
#include <glib.h>
|
|
#include <sys/time.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/un.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <netdb.h>
|
|
#include <unistd.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <stdarg.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
|
|
#if USE_THREADS
|
|
# include <pthread.h>
|
|
#endif
|
|
|
|
#include "socket.h"
|
|
#if USE_SSL
|
|
# include "ssl.h"
|
|
#endif
|
|
|
|
#if USE_GIO
|
|
#error USE_GIO is currently not supported
|
|
#endif
|
|
|
|
#define BUFFSIZE 8192
|
|
|
|
#ifndef INET6
|
|
static gint sock_connect_by_hostname (gint sock,
|
|
const gchar *hostname,
|
|
gushort port);
|
|
#else
|
|
static gint sock_connect_by_getaddrinfo (const gchar *hostname,
|
|
gushort port);
|
|
#endif
|
|
|
|
|
|
gint fd_connect_unix(const gchar *path)
|
|
{
|
|
gint sock;
|
|
struct sockaddr_un addr;
|
|
|
|
sock = socket(PF_UNIX, SOCK_STREAM, 0);
|
|
if (sock < 0) {
|
|
perror("sock_connect_unix(): socket");
|
|
return -1;
|
|
}
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.sun_family = AF_UNIX;
|
|
strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
|
|
|
|
if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
|
|
close(sock);
|
|
return -1;
|
|
}
|
|
|
|
return sock;
|
|
}
|
|
|
|
gint fd_open_unix(const gchar *path)
|
|
{
|
|
gint sock;
|
|
struct sockaddr_un addr;
|
|
|
|
sock = socket(PF_UNIX, SOCK_STREAM, 0);
|
|
|
|
if (sock < 0) {
|
|
perror("sock_open_unix(): socket");
|
|
return -1;
|
|
}
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.sun_family = AF_UNIX;
|
|
strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
|
|
|
|
if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
|
|
perror("bind");
|
|
close(sock);
|
|
return -1;
|
|
}
|
|
|
|
if (listen(sock, 1) < 0) {
|
|
perror("listen");
|
|
close(sock);
|
|
return -1;
|
|
}
|
|
|
|
return sock;
|
|
}
|
|
|
|
gint fd_accept(gint sock)
|
|
{
|
|
struct sockaddr_in caddr;
|
|
gint caddr_len;
|
|
|
|
caddr_len = sizeof(caddr);
|
|
return accept(sock, (struct sockaddr *)&caddr, &caddr_len);
|
|
}
|
|
|
|
|
|
static gint set_nonblocking_mode(gint fd, gboolean nonblock)
|
|
{
|
|
gint flags;
|
|
|
|
flags = fcntl(fd, F_GETFL, 0);
|
|
if (flags < 0) {
|
|
perror("fcntl");
|
|
return -1;
|
|
}
|
|
|
|
if (nonblock)
|
|
flags |= O_NONBLOCK;
|
|
else
|
|
flags &= ~O_NONBLOCK;
|
|
|
|
return fcntl(fd, F_SETFL, flags);
|
|
}
|
|
|
|
gint sock_set_nonblocking_mode(SockInfo *sock, gboolean nonblock)
|
|
{
|
|
g_return_val_if_fail(sock != NULL, -1);
|
|
|
|
return set_nonblocking_mode(sock->sock, nonblock);
|
|
}
|
|
|
|
|
|
static gboolean is_nonblocking_mode(gint fd)
|
|
{
|
|
gint flags;
|
|
|
|
flags = fcntl(fd, F_GETFL, 0);
|
|
if (flags < 0) {
|
|
perror("fcntl");
|
|
return FALSE;
|
|
}
|
|
|
|
return ((flags & O_NONBLOCK) != 0);
|
|
}
|
|
|
|
gboolean sock_is_nonblocking_mode(SockInfo *sock)
|
|
{
|
|
g_return_val_if_fail(sock != NULL, FALSE);
|
|
|
|
return is_nonblocking_mode(sock->sock);
|
|
}
|
|
|
|
|
|
#ifndef INET6
|
|
static gint sock_connect_by_hostname(gint sock, const gchar *hostname,
|
|
gushort port)
|
|
{
|
|
struct hostent *hp;
|
|
struct sockaddr_in ad;
|
|
#ifndef HAVE_INET_ATON
|
|
#if HAVE_INET_ADDR
|
|
guint32 inaddr;
|
|
#endif
|
|
#endif /* HAVE_INET_ATON */
|
|
|
|
memset(&ad, 0, sizeof(ad));
|
|
ad.sin_family = AF_INET;
|
|
ad.sin_port = htons(port);
|
|
|
|
#if HAVE_INET_ATON
|
|
if (!inet_aton(hostname, &ad.sin_addr)) {
|
|
#else
|
|
#if HAVE_INET_ADDR
|
|
inaddr = inet_addr(hostname);
|
|
if (inaddr != -1)
|
|
memcpy(&ad.sin_addr, &inaddr, sizeof(inaddr));
|
|
else {
|
|
#else
|
|
{
|
|
#endif
|
|
#endif /* HAVE_INET_ATON */
|
|
if ((hp = gethostbyname(hostname)) == NULL) {
|
|
fprintf(stderr, "%s: unknown host.\n", hostname);
|
|
errno = 0;
|
|
return -1;
|
|
}
|
|
|
|
if (hp->h_length != 4 && hp->h_length != 8) {
|
|
h_errno = errno = 0;
|
|
fprintf(stderr, "illegal address length received for host %s\n", hostname);
|
|
return -1;
|
|
}
|
|
|
|
memcpy(&ad.sin_addr, hp->h_addr, hp->h_length);
|
|
}
|
|
|
|
return connect(sock, (struct sockaddr *)&ad, sizeof(ad));
|
|
}
|
|
|
|
#else /* INET6 */
|
|
static gint sock_connect_by_getaddrinfo(const gchar *hostname, gushort port)
|
|
{
|
|
gint sock = -1, gai_error;
|
|
struct addrinfo hints, *res, *ai;
|
|
gchar port_str[6];
|
|
|
|
memset(&hints, 0, sizeof(hints));
|
|
/* hints.ai_flags = AI_CANONNAME; */
|
|
hints.ai_family = AF_UNSPEC;
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
hints.ai_protocol = IPPROTO_TCP;
|
|
|
|
/* convert port from integer to string. */
|
|
g_snprintf(port_str, sizeof(port_str), "%d", port);
|
|
|
|
if ((gai_error = getaddrinfo(hostname, port_str, &hints, &res)) != 0) {
|
|
fprintf(stderr, "getaddrinfo for %s:%s failed: %s\n",
|
|
hostname, port_str, gai_strerror(gai_error));
|
|
return -1;
|
|
}
|
|
|
|
for (ai = res; ai != NULL; ai = ai->ai_next) {
|
|
sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
|
|
if (sock < 0)
|
|
continue;
|
|
|
|
if (connect(sock, ai->ai_addr, ai->ai_addrlen) == 0)
|
|
break;
|
|
|
|
close(sock);
|
|
}
|
|
|
|
if (res != NULL)
|
|
freeaddrinfo(res);
|
|
|
|
if (ai == NULL)
|
|
return -1;
|
|
|
|
return sock;
|
|
}
|
|
#endif /* !INET6 */
|
|
|
|
SockInfo *sock_connect(const gchar *hostname, gushort port)
|
|
{
|
|
gint sock;
|
|
SockInfo *sockinfo;
|
|
|
|
#ifdef INET6
|
|
if ((sock = sock_connect_by_getaddrinfo(hostname, port)) < 0)
|
|
return NULL;
|
|
#else
|
|
if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
perror("socket");
|
|
return NULL;
|
|
}
|
|
|
|
if (sock_connect_by_hostname(sock, hostname, port) < 0) {
|
|
if (errno != 0) perror("connect");
|
|
close(sock);
|
|
return NULL;
|
|
}
|
|
#endif /* INET6 */
|
|
|
|
sockinfo = g_new0(SockInfo, 1);
|
|
sockinfo->sock = sock;
|
|
sockinfo->hostname = g_strdup(hostname);
|
|
sockinfo->port = port;
|
|
sockinfo->state = CONN_ESTABLISHED;
|
|
|
|
usleep(100000);
|
|
|
|
return sockinfo;
|
|
}
|
|
|
|
#if USE_THREADS
|
|
static void sock_connect_thread(SockInfo *sockinfo)
|
|
{
|
|
#ifdef INET6
|
|
if ((sockinfo->sock = sock_connect_by_getaddrinfo
|
|
(sockinfo->hostname, sockinfo->port)) < 0)
|
|
pthread_exit((void *)1);
|
|
#else
|
|
if (sock_connect_by_hostname(sockinfo->sock, sockinfo->hostname,
|
|
sockinfo->port) < 0) {
|
|
if (errno != 0) perror("connect");
|
|
sockinfo->state = CONN_FAILED;
|
|
pthread_exit((void *)1);
|
|
}
|
|
#endif /* INET6 */
|
|
sockinfo->state = CONN_ESTABLISHED;
|
|
|
|
pthread_exit(0);
|
|
}
|
|
|
|
SockInfo *sock_connect_with_thread(const gchar *hostname, gushort port)
|
|
{
|
|
gint sock = 0;
|
|
SockInfo *sockinfo;
|
|
|
|
#ifndef INET6
|
|
if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
perror("socket");
|
|
return NULL;
|
|
}
|
|
#endif /* !INET6 */
|
|
|
|
sockinfo = g_new0(SockInfo, 1);
|
|
sockinfo->sock = sock;
|
|
sockinfo->hostname = g_strdup(hostname);
|
|
sockinfo->port = port;
|
|
sockinfo->state = CONN_READY;
|
|
|
|
pthread_create(&sockinfo->connect_thr, NULL,
|
|
(void *)sock_connect_thread,
|
|
sockinfo);
|
|
pthread_mutex_init(&sockinfo->mutex, NULL);
|
|
pthread_detach(sockinfo->connect_thr);
|
|
|
|
return sockinfo;
|
|
}
|
|
#endif
|
|
|
|
|
|
gint sock_printf(SockInfo *sock, const gchar *format, ...)
|
|
{
|
|
va_list args;
|
|
gchar buf[BUFFSIZE];
|
|
|
|
va_start(args, format);
|
|
g_vsnprintf(buf, sizeof(buf), format, args);
|
|
va_end(args);
|
|
|
|
return sock_write(sock, buf, strlen(buf));
|
|
}
|
|
|
|
gint sock_read(SockInfo *sock, gchar *buf, gint len)
|
|
{
|
|
g_return_val_if_fail(sock != NULL, -1);
|
|
|
|
#if USE_SSL
|
|
if (sock->ssl)
|
|
return ssl_read(sock->ssl, buf, len);
|
|
#endif
|
|
return fd_read(sock->sock, buf, len);
|
|
}
|
|
|
|
gint fd_read(gint fd, gchar *buf, gint len)
|
|
{
|
|
return read(fd, buf, len);
|
|
}
|
|
|
|
#if USE_SSL
|
|
gint ssl_read(SSL *ssl, gchar *buf, gint len)
|
|
{
|
|
return SSL_read(ssl, buf, len);
|
|
}
|
|
#endif
|
|
|
|
gint sock_write(SockInfo *sock, const gchar *buf, gint len)
|
|
{
|
|
g_return_val_if_fail(sock != NULL, -1);
|
|
|
|
#if USE_SSL
|
|
if (sock->ssl)
|
|
return ssl_write(sock->ssl, buf, len);
|
|
#endif
|
|
return fd_write(sock->sock, buf, len);
|
|
}
|
|
|
|
gint fd_write(gint fd, const gchar *buf, gint len)
|
|
{
|
|
gint n, wrlen = 0;
|
|
|
|
while (len) {
|
|
n = write(fd, buf, len);
|
|
if (n <= 0)
|
|
return -1;
|
|
len -= n;
|
|
wrlen += n;
|
|
buf += n;
|
|
}
|
|
|
|
return wrlen;
|
|
}
|
|
|
|
#if USE_SSL
|
|
gint ssl_write(SSL *ssl, const gchar *buf, gint len)
|
|
{
|
|
gint n, wrlen = 0;
|
|
|
|
while (len) {
|
|
n = SSL_write(ssl, buf, len);
|
|
if (n <= 0)
|
|
return -1;
|
|
len -= n;
|
|
wrlen += n;
|
|
buf += n;
|
|
}
|
|
|
|
return wrlen;
|
|
}
|
|
#endif
|
|
|
|
gint fd_gets(gint fd, gchar *buf, gint len)
|
|
{
|
|
gchar *newline, *bp = buf;
|
|
gint n;
|
|
|
|
if (--len < 1)
|
|
return -1;
|
|
do {
|
|
if ((n = recv(fd, bp, len, MSG_PEEK)) <= 0)
|
|
return -1;
|
|
if ((newline = memchr(bp, '\n', n)) != NULL)
|
|
n = newline - bp + 1;
|
|
if ((n = read(fd, bp, n)) < 0)
|
|
return -1;
|
|
bp += n;
|
|
len -= n;
|
|
} while (!newline && len);
|
|
|
|
*bp = '\0';
|
|
return bp - buf;
|
|
}
|
|
|
|
#if USE_SSL
|
|
gint ssl_gets(SSL *ssl, gchar *buf, gint len)
|
|
{
|
|
gchar *newline, *bp = buf;
|
|
gint n;
|
|
|
|
if (--len < 1)
|
|
return -1;
|
|
do {
|
|
if ((n = SSL_peek(ssl, bp, len)) <= 0)
|
|
return -1;
|
|
if ((newline = memchr(bp, '\n', n)) != NULL)
|
|
n = newline - bp + 1;
|
|
if ((n = SSL_read(ssl, bp, n)) < 0)
|
|
return -1;
|
|
bp += n;
|
|
len -= n;
|
|
} while (!newline && len);
|
|
|
|
*bp = '\0';
|
|
return bp - buf;
|
|
}
|
|
#endif
|
|
|
|
gint sock_gets(SockInfo *sock, gchar *buf, gint len)
|
|
{
|
|
g_return_val_if_fail(sock != NULL, -1);
|
|
|
|
#if USE_SSL
|
|
if (sock->ssl)
|
|
return ssl_gets(sock->ssl, buf, len);
|
|
#endif
|
|
return fd_gets(sock->sock, buf, len);
|
|
}
|
|
|
|
gchar *fd_getline(gint fd)
|
|
{
|
|
gchar buf[BUFFSIZE];
|
|
gchar *str = NULL;
|
|
gint len;
|
|
gulong size = 1;
|
|
|
|
while ((len = fd_gets(fd, buf, sizeof(buf))) > 0) {
|
|
size += len;
|
|
if (!str)
|
|
str = g_strdup(buf);
|
|
else {
|
|
str = g_realloc(str, size);
|
|
strcat(str, buf);
|
|
}
|
|
if (buf[len - 1] == '\n')
|
|
break;
|
|
}
|
|
|
|
return str;
|
|
}
|
|
|
|
#if USE_SSL
|
|
gchar *ssl_getline(SSL *ssl)
|
|
{
|
|
gchar buf[BUFFSIZE];
|
|
gchar *str = NULL;
|
|
gint len;
|
|
gulong size = 1;
|
|
|
|
while ((len = ssl_gets(ssl, buf, sizeof(buf))) > 0) {
|
|
size += len;
|
|
if (!str)
|
|
str = g_strdup(buf);
|
|
else {
|
|
str = g_realloc(str, size);
|
|
strcat(str, buf);
|
|
}
|
|
if (buf[len - 1] == '\n')
|
|
break;
|
|
}
|
|
|
|
return str;
|
|
}
|
|
#endif
|
|
|
|
gchar *sock_getline(SockInfo *sock)
|
|
{
|
|
g_return_val_if_fail(sock != NULL, NULL);
|
|
|
|
#if USE_SSL
|
|
if (sock->ssl)
|
|
return ssl_getline(sock->ssl);
|
|
#endif
|
|
return fd_getline(sock->sock);
|
|
}
|
|
|
|
gint sock_puts(SockInfo *sock, const gchar *buf)
|
|
{
|
|
gint ret;
|
|
|
|
if ((ret = sock_write(sock, buf, strlen(buf))) < 0)
|
|
return ret;
|
|
return sock_write(sock, "\r\n", 2);
|
|
}
|
|
|
|
/* peek at the next socket character without actually reading it */
|
|
gint sock_peek(SockInfo *sock)
|
|
{
|
|
gint n;
|
|
gchar ch;
|
|
|
|
g_return_val_if_fail(sock != NULL, -1);
|
|
|
|
if ((n = recv(sock->sock, &ch, 1, MSG_PEEK)) < 0)
|
|
return -1;
|
|
else
|
|
return ch;
|
|
}
|
|
|
|
gint sock_close(SockInfo *sock)
|
|
{
|
|
gint ret;
|
|
|
|
if (!sock)
|
|
return 0;
|
|
|
|
#if USE_SSL
|
|
if (sock->ssl)
|
|
ssl_done_socket(sock);
|
|
#endif
|
|
ret = fd_close(sock->sock);
|
|
g_free(sock->hostname);
|
|
g_free(sock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
gint fd_close(gint fd)
|
|
{
|
|
return close(fd);
|
|
}
|
|
|
|
gint sock_gdk_input_add(SockInfo *sock,
|
|
GdkInputCondition condition,
|
|
GdkInputFunction function,
|
|
gpointer data)
|
|
{
|
|
g_return_val_if_fail(sock != NULL, -1);
|
|
|
|
/* :WK: We have to change some things here becuse most likey
|
|
function() does take SockInfo * and not an gint */
|
|
return gdk_input_add(sock->sock, condition, function, data);
|
|
}
|