1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
|
/* ========================================================================
* Copyright 2008-2011 Mark Crispin
* ========================================================================
*/
/*
* Program: Winsock TCP/IP routines
*
* Author: Mark Crispin from Mike Seibel's Winsock code
*
* Date: 11 April 1989
* Last Edited: 3 August 2011
*
* Previous versions of this file were:
*
* Copyright 1988-2007 University of Washington
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
*/
#include "ip_nt.c"
#define TCPMAXSEND 32768
/* Private functions */
int tcp_socket_open (int family,void *adr,size_t adrlen,unsigned short port,
char *tmp,char *hst);
static char *tcp_getline_work (TCPSTREAM *stream,unsigned long *size,
long *contd);
long tcp_abort (TCPSTREAM *stream);
long tcp_close_socket (SOCKET *sock);
char *tcp_name (struct sockaddr *sadr,long flag);
char *tcp_name_valid (char *s);
/* Private data */
int wsa_initted = 0; /* init ? */
static int wsa_sock_open = 0; /* keep track of open sockets */
static tcptimeout_t tmoh = NIL; /* TCP timeout handler routine */
static long ttmo_open = 0; /* TCP timeouts, in seconds */
static long ttmo_read = 0;
static long ttmo_write = 0;
static long allowreversedns = T;/* allow reverse DNS lookup */
static long tcpdebug = NIL; /* extra TCP debugging telemetry */
static char *myClientAddr = NIL;/* client host address */
static char *myClientHost = NIL;/* client host name */
static long myClientPort = -1; /* client port */
static char *myServerAddr = NIL;/* server host address */
static char *myServerHost = NIL;/* server host name */
static long myServerPort = -1; /* server port */
extern long maxposint; /* get this from write.c */
/* TCP/IP manipulate parameters
* Accepts: function code
* function-dependent value
* Returns: function-dependent return value
*/
void *tcp_parameters (long function,void *value)
{
void *ret = NIL;
switch ((int) function) {
case SET_TIMEOUT:
tmoh = (tcptimeout_t) value;
case GET_TIMEOUT:
ret = (void *) tmoh;
break;
case SET_OPENTIMEOUT:
ttmo_open = (long) value ? (long) value : (long) WSA_INFINITE;
case GET_OPENTIMEOUT:
ret = (void *) ttmo_open;
break;
case SET_READTIMEOUT:
ttmo_read = (long) value;
case GET_READTIMEOUT:
ret = (void *) ttmo_read;
break;
case SET_WRITETIMEOUT:
ttmo_write = (long) value;
case GET_WRITETIMEOUT:
ret = (void *) ttmo_write;
break;
case SET_ALLOWREVERSEDNS:
allowreversedns = (long) value;
case GET_ALLOWREVERSEDNS:
ret = (void *) allowreversedns;
break;
case SET_TCPDEBUG:
tcpdebug = (long) value;
case GET_TCPDEBUG:
ret = (void *) tcpdebug;
break;
}
return ret;
}
/* TCP/IP open
* Accepts: host name
* contact service name
* contact port number and optional silent flag
* Returns: TCP/IP stream if success else NIL
*/
TCPSTREAM *tcp_open (char *host,char *service,unsigned long port)
{
TCPSTREAM *stream = NIL;
int i,family;
SOCKET sock = INVALID_SOCKET;
int silent = (port & NET_SILENT) ? T : NIL;
char *s,tmp[MAILTMPLEN];
char *hostname = NIL;
void *adr,*next;
size_t adrlen;
void *cleanup = NIL;
struct servent *sv = NIL;
blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL);
if (!wsa_initted++) { /* init Windows Sockets */
WSADATA wsock;
if (i = (int) WSAStartup (WINSOCK_VERSION,&wsock)) {
wsa_initted = 0; /* in case we try again */
sprintf (tmp,"Unable to start Windows Sockets (%d)",i);
mm_log (tmp,ERROR);
return NIL;
}
}
port &= 0xffff; /* erase flags */
/* lookup service */
if (service && (sv = getservbyname (service,"tcp")))
port = ntohs (sv->s_port);
/* The domain literal form is used (rather than simply the dotted decimal
as with other Windows programs) because it has to be a valid "host name"
in mailsystem terminology. */
/* look like domain literal? */
if (host[0] == '[' && host[(strlen (host))-1] == ']') {
strcpy (tmp,host+1); /* yes, copy number part */
tmp[strlen (tmp)-1] = '\0';
if (adr = ip_stringtoaddr (tmp,&adrlen,&family)) {
(*bn) (BLOCK_TCPOPEN,NIL);
sock = tcp_socket_open (family,adr,adrlen,(unsigned short) port,tmp,
hostname = cpystr(host));
(*bn) (BLOCK_NONE,NIL);
fs_give ((void **) &adr);
}
else sprintf (tmp,"Bad format domain-literal: %.80s",host);
}
else { /* lookup host name */
if (tcpdebug) {
sprintf (tmp,"DNS resolution %.80s",host);
mm_log (tmp,TCPDEBUG);
}
(*bn) (BLOCK_DNSLOOKUP,NIL);/* look up name */
if (!(s = ip_nametoaddr (host,&adrlen,&family,&hostname,&next,&cleanup)))
sprintf (tmp,"Host not found (#%d): %s",WSAGetLastError (),host);
(*bn) (BLOCK_NONE,NIL);
if (s) { /* DNS resolution won? */
if (tcpdebug) mm_log ("DNS resolution done",TCPDEBUG);
wsa_sock_open++; /* prevent tcp_close_socket() from freeing in
loop */
do {
(*bn) (BLOCK_TCPOPEN,NIL);
if (((sock = tcp_socket_open (family,s,adrlen,(unsigned short) port,
tmp,hostname)) == INVALID_SOCKET) &&
(s = ip_nametoaddr (NIL,&adrlen,&family,&hostname,&next,
&cleanup)) && !silent)
mm_log (tmp,WARN);
(*bn) (BLOCK_NONE,NIL);
} while ((sock == INVALID_SOCKET) && s);
wsa_sock_open--; /* undo protection */
}
ip_nametoaddr (NIL,NIL,NIL,NIL,NIL,&cleanup);
}
if (sock == INVALID_SOCKET) { /* do possible cleanup action */
if (!silent) mm_log (tmp,ERROR);
tcp_close_socket (&sock);
if (hostname) fs_give ((void **) &hostname);
}
else { /* got a socket, create TCP/IP stream */
stream = (TCPSTREAM *) memset (fs_get (sizeof (TCPSTREAM)),0,
sizeof (TCPSTREAM));
stream->port = port; /* port number */
/* init socket */
stream->tcpsi = stream->tcpso = sock;
stream->ictr = 0; /* init input counter */
stream->host = hostname; /* copy official host name */
if (tcpdebug) mm_log ("Stream open and ready for read",TCPDEBUG);
}
return stream; /* return success */
}
/* Open a TCP socket
* Accepts: protocol family
* address to connect to
* address length
* port
* scratch buffer
* host name
* Returns: socket if success, else SOCKET_ERROR with error string in scratch
*/
int tcp_socket_open (int family,void *adr,size_t adrlen,unsigned short port,
char *tmp,char *hst)
{
int sock,err;
char *s,errmsg[100];
size_t len;
DWORD eo;
WSAEVENT event;
WSANETWORKEVENTS events;
char buf[NI_MAXHOST];
unsigned long cmd = 0;
struct sockaddr *sadr = ip_sockaddr (family,adr,adrlen,port,&len);
sprintf (tmp,"Trying IP address [%s]",ip_sockaddrtostring (sadr,buf));
mm_log (tmp,NIL);
/* get a TCP stream */
if ((sock = socket (sadr->sa_family,SOCK_STREAM,0)) == INVALID_SOCKET)
sprintf (tmp,"Unable to create TCP socket (%d)",WSAGetLastError ());
else {
/* On Windows, FD_SETSIZE is the number of descriptors which can be
* held in an fd_set, as opposed to the maximum descriptor value on UNIX.
* Similarly, an fd_set in Windows is a vector of descriptor values, as
* opposed to a bitmask of set fds on UNIX. Thus, an fd_set can hold up
* to FD_SETSIZE values which can be larger than FD_SETSIZE, and the test
* that is used on UNIX is unnecessary here.
*/
wsa_sock_open++; /* count this socket as open */
/* set socket nonblocking */
if (ttmo_open) WSAEventSelect (sock,event = WSACreateEvent (),FD_CONNECT);
else event = 0; /* no event */
/* open connection */
err = (connect (sock,sadr,len) == SOCKET_ERROR) ? WSAGetLastError () : NIL;
/* if timer in effect, wait for event */
if (event) while (err == WSAEWOULDBLOCK)
switch (eo = WSAWaitForMultipleEvents (1,&event,T,ttmo_open*1000,NIL)) {
case WSA_WAIT_EVENT_0: /* got an event? */
err = (WSAEnumNetworkEvents (sock,event,&events) == SOCKET_ERROR) ?
WSAGetLastError () : events.iErrorCode[FD_CONNECT_BIT];
break;
case WSA_WAIT_IO_COMPLETION:
break; /* fAlertable is NIL so shouldn't happen */
default: /* all other conditions */
err = eo; /* error from WSAWaitForMultipleEvents() */
break;
}
switch (err) { /* analyze result from connect and wait */
case 0: /* got a connection */
s = NIL;
if (event) { /* unset blocking mode */
WSAEventSelect (sock,event,NIL);
if (ioctlsocket (sock,FIONBIO,&cmd) == SOCKET_ERROR)
sprintf (s = errmsg,"Can't set blocking mode (%d)",
WSAGetLastError ());
}
break;
case WSAECONNREFUSED:
s = "Refused";
break;
case WSAENOBUFS:
s = "Insufficient system resources";
break;
case WSA_WAIT_TIMEOUT: case WSAETIMEDOUT:
s = "Timed out";
break;
case WSAEHOSTUNREACH:
s = "Host unreachable";
break;
default: /* horrible error 69 */
sprintf (s = errmsg,"Unknown error (%d)",err);
break;
}
/* flush event */
if (event) WSACloseEvent (event);
if (s) { /* got an error? */
sprintf (tmp,"Can't connect to %.80s,%ld: %.80s",hst,port,s);
tcp_close_socket (&sock); /* flush socket */
sock = INVALID_SOCKET;
}
}
fs_give ((void **) &sadr); /* and socket address */
return sock; /* return the socket */
}
/* TCP/IP authenticated open
* Accepts: NETMBX specifier
* service name
* returned user name buffer
* Returns: TCP/IP stream if success else NIL
*/
TCPSTREAM *tcp_aopen (NETMBX *mb,char *service,char *usrbuf)
{
return NIL; /* always NIL on Windows */
}
/* TCP receive line
* Accepts: TCP stream
* Returns: text line string or NIL if failure
*/
char *tcp_getline (TCPSTREAM *stream)
{
unsigned long n,contd;
char *ret = tcp_getline_work (stream,&n,&contd);
if (ret && contd) { /* got a line needing continuation? */
STRINGLIST *stl = mail_newstringlist ();
STRINGLIST *stc = stl;
do { /* collect additional lines */
stc->text.data = (unsigned char *) ret;
stc->text.size = n;
stc = stc->next = mail_newstringlist ();
ret = tcp_getline_work (stream,&n,&contd);
} while (ret && contd);
if (ret) { /* stash final part of line on list */
stc->text.data = (unsigned char *) ret;
stc->text.size = n;
/* determine how large a buffer we need */
for (n = 0, stc = stl; stc; stc = stc->next) n += stc->text.size;
ret = fs_get (n + 1); /* copy parts into buffer */
for (n = 0, stc = stl; stc; n += stc->text.size, stc = stc->next)
memcpy (ret + n,stc->text.data,stc->text.size);
ret[n] = '\0';
}
mail_free_stringlist (&stl);/* either way, done with list */
}
return ret;
}
/* TCP receive line or partial line
* Accepts: TCP stream
* pointer to return size
* pointer to return continuation flag
* Returns: text line string, size and continuation flag, or NIL if failure
*/
static char *tcp_getline_work (TCPSTREAM *stream,unsigned long *size,
long *contd)
{
unsigned long n;
char *s,*ret,c,d;
*contd = NIL; /* assume no continuation */
/* make sure have data */
if (!tcp_getdata (stream)) return NIL;
for (s = stream->iptr, n = 0, c = '\0'; stream->ictr--; n++, c = d) {
d = *stream->iptr++; /* slurp another character */
if ((c == '\015') && (d == '\012')) {
ret = (char *) fs_get (n--);
memcpy (ret,s,*size = n); /* copy into a free storage string */
ret[n] = '\0'; /* tie off string with null */
return ret;
}
}
/* copy partial string from buffer */
memcpy ((ret = (char *) fs_get (n)),s,*size = n);
/* get more data from the net */
if (!tcp_getdata (stream)) fs_give ((void **) &ret);
/* special case of newline broken by buffer */
else if ((c == '\015') && (*stream->iptr == '\012')) {
stream->iptr++; /* eat the line feed */
stream->ictr--;
ret[*size = --n] = '\0'; /* tie off string with null */
}
else *contd = LONGT; /* continuation needed */
return ret;
}
/* TCP/IP receive buffer
* Accepts: TCP/IP stream
* size in bytes
* buffer to read into
* Returns: T if success, NIL otherwise
*/
long tcp_getbuffer (TCPSTREAM *stream,unsigned long size,char *s)
{
unsigned long n;
/* make sure socket still alive */
if (stream->tcpsi == INVALID_SOCKET) return NIL;
/* can transfer bytes from buffer? */
if (n = min (size,stream->ictr)) {
memcpy (s,stream->iptr,n); /* yes, slurp as much as we can from it */
s += n; /* update pointer */
stream->iptr +=n;
size -= n; /* update # of bytes to do */
stream->ictr -=n;
}
if (size) {
int i;
fd_set fds,efds;
struct timeval tmo;
time_t t = time (0);
blocknotify_t bn=(blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL);
(*bn) (BLOCK_TCPREAD,NIL);
while (size > 0) { /* until request satisfied */
if (tcpdebug) mm_log ("Reading TCP buffer",TCPDEBUG);
/* simple case if not a socket */
if (stream->tcpsi != stream->tcpso)
while (((i = read (stream->tcpsi,s,(int) min (maxposint,size))) < 0) &&
(errno == EINTR));
else { /* socket case */
time_t tl = time (0);
time_t now = tl;
time_t ti = ttmo_read ? now + ttmo_read : 0;
tmo.tv_usec = 0;
FD_ZERO (&fds); /* initialize selection vector */
FD_ZERO (&efds); /* handle errors too */
/* set bit in selection vectors */
FD_SET (stream->tcpsi,&fds);
FD_SET (stream->tcpsi,&efds);
errno = NIL; /* initially no error */
do { /* block under timeout */
tmo.tv_sec = (long) (ti ? ti - now : 0);
i = select (stream->tcpsi+1,&fds,NIL,&efds,ti ? &tmo : NIL);
now = time (0); /* fake timeout if interrupt & time expired */
if ((i < 0) && ((errno = WSAGetLastError ()) == WSAEINTR) && ti &&
(ti <= now)) i = 0;
} while ((i < 0) && (errno == WSAEINTR));
/* success from select, read what we can */
if (i > 0) while (((i = recv (stream->tcpsi,s,
(int) min (maxposint,size),0)) ==
SOCKET_ERROR) &&
((errno = WSAGetLastError ()) == WSAEINTR));
else if (!i) { /* timeout, ignore if told to resume */
if (tmoh && (*tmoh) ((long) (now - t),(long) (now - tl),
stream->host))
continue;
/* otherwise punt */
if (tcpdebug) mm_log ("TCP buffer read timeout",TCPDEBUG);
return tcp_abort (stream);
}
}
if (i <= 0) { /* error seen? */
if (tcpdebug) {
char tmp[MAILTMPLEN];
if (i) sprintf (s = tmp,"TCP buffer read I/O error %d",errno);
else s = "TCP buffer read end of file";
mm_log (s,TCPDEBUG);
}
return tcp_abort (stream);
}
s += i; /* point at new place to write */
size -= i; /* reduce byte count */
if (tcpdebug) mm_log ("Successfully read TCP buffer",TCPDEBUG);
}
(*bn) (BLOCK_NONE,NIL);
}
*s = '\0'; /* tie off string */
return LONGT;
}
/* TCP/IP receive data
* Accepts: TCP/IP stream
* Returns: T if success, NIL otherwise
*/
long tcp_getdata (TCPSTREAM *stream)
{
int i;
fd_set fds,efds;
struct timeval tmo;
time_t t = time (0);
blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL);
if (stream->tcpsi == INVALID_SOCKET) return NIL;
(*bn) (BLOCK_TCPREAD,NIL);
while (stream->ictr < 1) { /* if nothing in the buffer */
if (tcpdebug) mm_log ("Reading TCP data",TCPDEBUG);
/* simple case if not a socket */
if (stream->tcpsi != stream->tcpso)
while (((i = read (stream->tcpsi,stream->ibuf,BUFLEN)) < 0) &&
(errno == EINTR));
else {
time_t tl = time (0);
time_t now = tl;
time_t ti = ttmo_read ? now + ttmo_read : 0;
tmo.tv_usec = 0;
FD_ZERO (&fds); /* initialize selection vector */
FD_ZERO (&efds); /* handle errors too */
/* set bit in selection vectors */
FD_SET (stream->tcpsi,&fds);
FD_SET (stream->tcpsi,&efds);
errno = NIL; /* initially no error */
do { /* block under timeout */
tmo.tv_sec = (long) (ti ? ti - now : 0);
i = select (stream->tcpsi+1,&fds,NIL,&efds,ti ? &tmo : NIL);
now = time (0); /* fake timeout if interrupt & time expired */
if ((i < 0) && ((errno = WSAGetLastError ()) == WSAEINTR) && ti &&
(ti <= now)) i = 0;
} while ((i < 0) && (errno == WSAEINTR));
/* success from select, read what we can */
if (i > 0) while (((i = recv (stream->tcpsi,stream->ibuf,BUFLEN,0)) ==
SOCKET_ERROR) &&
((errno = WSAGetLastError ()) == WSAEINTR));
else if (!i) { /* timeout, ignore if told to resume */
if (tmoh && (*tmoh) ((long) (now - t),(long) (now - tl), stream->host))
continue;
/* otherwise punt */
if (tcpdebug) mm_log ("TCP data read timeout",TCPDEBUG);
return tcp_abort (stream);
}
}
if (i <= 0) { /* error seen? */
if (tcpdebug) {
char *s,tmp[MAILTMPLEN];
if (i) sprintf (s = tmp,"TCP data read I/O error %d",errno);
else s = "TCP data read end of file";
mm_log (tmp,TCPDEBUG);
}
return tcp_abort (stream);
}
stream->iptr = stream->ibuf;/* point at TCP buffer */
stream->ictr = i; /* set new byte count */
if (tcpdebug) mm_log ("Successfully read TCP data",TCPDEBUG);
}
(*bn) (BLOCK_NONE,NIL);
return T;
}
/* TCP/IP send string as record
* Accepts: TCP/IP stream
* string pointer
* Returns: T if success else NIL
*/
long tcp_soutr (TCPSTREAM *stream,char *string)
{
return tcp_sout (stream,string,(unsigned long) strlen (string));
}
/* TCP/IP send string
* Accepts: TCP/IP stream
* string pointer
* byte count
* Returns: T if success else NIL
*/
long tcp_sout (TCPSTREAM *stream,char *string,unsigned long size)
{
int i;
struct timeval tmo;
fd_set fds,efds;
time_t t = time (0);
blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL);
tmo.tv_sec = ttmo_write;
tmo.tv_usec = 0;
FD_ZERO (&fds); /* initialize selection vector */
if (stream->tcpso == INVALID_SOCKET) return NIL;
(*bn) (BLOCK_TCPWRITE,NIL);
while (size > 0) { /* until request satisfied */
if (tcpdebug) mm_log ("Writing to TCP",TCPDEBUG);
/* simple case if not a socket */
if (stream->tcpsi != stream->tcpso)
while (((i = write (stream->tcpso,string,min (size,TCPMAXSEND))) < 0) &&
(errno == EINTR));
else {
time_t tl = time (0); /* start of request */
time_t now = tl;
time_t ti = ttmo_write ? now + ttmo_write : 0;
tmo.tv_usec = 0;
FD_ZERO (&fds); /* initialize selection vector */
FD_ZERO (&efds); /* handle errors too */
/* set bit in selection vectors */
FD_SET (stream->tcpso,&fds);
FD_SET(stream->tcpso,&efds);
errno = NIL; /* block and write */
do { /* block under timeout */
tmo.tv_sec = (long) (ti ? ti - now : 0);
i = select (stream->tcpso+1,NIL,&fds,&efds,ti ? &tmo : NIL);
now = time (0); /* fake timeout if interrupt & time expired */
if ((i < 0) && ((errno = WSAGetLastError ()) == WSAEINTR) && ti &&
(ti <= now)) i = 0;
} while ((i < 0) && (errno == WSAEINTR));
/* OK to send data? */
if (i > 0) while (((i = send (stream->tcpso,string,
(int) min (size,TCPMAXSEND),0)) ==
SOCKET_ERROR) &&
((errno = WSAGetLastError ()) == WSAEINTR));
else if (!i) { /* timeout, ignore if told to resume */
if (tmoh && (*tmoh) ((long) (now - t),(long) (now - tl), stream->host))
continue;
/* otherwise punt */
if (tcpdebug) mm_log ("TCP write timeout",TCPDEBUG);
return tcp_abort (stream);
}
}
if (i <= 0) { /* error seen? */
if (tcpdebug) {
char tmp[MAILTMPLEN];
sprintf (tmp,"TCP write I/O error %d",errno);
mm_log (tmp,TCPDEBUG);
}
return tcp_abort (stream);
}
string += i; /* how much we sent */
size -= i; /* count this size */
if (tcpdebug) mm_log ("successfully wrote to TCP",TCPDEBUG);
}
(*bn) (BLOCK_NONE,NIL);
return T; /* all done */
}
/* TCP/IP close
* Accepts: TCP/IP stream
*/
void tcp_close (TCPSTREAM *stream)
{
tcp_abort (stream); /* nuke the sockets */
/* flush host names */
if (stream->host) fs_give ((void **) &stream->host);
if (stream->remotehost) fs_give ((void **) &stream->remotehost);
if (stream->localhost) fs_give ((void **) &stream->localhost);
fs_give ((void **) &stream); /* flush the stream */
}
/* TCP/IP abort sockets
* Accepts: TCP/IP stream
* Returns: NIL, always
*/
long tcp_abort (TCPSTREAM *stream)
{
if (stream->tcpsi != stream->tcpso) tcp_close_socket (&stream->tcpso);
else stream->tcpso = INVALID_SOCKET;
return tcp_close_socket (&stream->tcpsi);
}
/* TCP/IP abort stream
* Accepts: WinSock socket
* Returns: NIL, always
*/
long tcp_close_socket (SOCKET *sock)
{
blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL);
/* something to close? */
if (sock && (*sock != INVALID_SOCKET)) {
(*bn) (BLOCK_TCPCLOSE,NIL);
closesocket (*sock); /* WinSock socket close */
*sock = INVALID_SOCKET;
(*bn) (BLOCK_NONE,NIL);
wsa_sock_open--; /* drop this socket */
}
/* no more open streams? */
if (wsa_initted && !wsa_sock_open) {
mm_log ("Winsock cleanup",NIL);
wsa_initted = 0; /* no more sockets, so... */
WSACleanup (); /* free up resources until needed */
}
return NIL;
}
/* TCP/IP get host name
* Accepts: TCP/IP stream
* Returns: host name for this stream
*/
char *tcp_host (TCPSTREAM *stream)
{
return stream->host; /* use tcp_remotehost() if want guarantees */
}
/* TCP/IP get remote host name
* Accepts: TCP/IP stream
* Returns: host name for this stream
*/
char *tcp_remotehost (TCPSTREAM *stream)
{
if (!stream->remotehost) {
size_t sadrlen;
struct sockaddr *sadr = ip_newsockaddr (&sadrlen);
stream->remotehost = /* get socket's peer name */
((getpeername (stream->tcpsi,sadr,&sadrlen) == SOCKET_ERROR) ||
(sadrlen <= 0)) ? cpystr (stream->host) : tcp_name (sadr,NIL);
fs_give ((void **) &sadr);
}
return stream->remotehost;
}
/* TCP/IP return port for this stream
* Accepts: TCP/IP stream
* Returns: port number for this stream
*/
unsigned long tcp_port (TCPSTREAM *stream)
{
return stream->port; /* return port number */
}
/* TCP/IP get local host name
* Accepts: TCP/IP stream
* Returns: local host name
*/
char *tcp_localhost (TCPSTREAM *stream)
{
if (!stream->localhost) {
size_t sadrlen;
struct sockaddr *sadr = ip_newsockaddr (&sadrlen);
stream->localhost = /* get socket's name */
((stream->port & 0xffff000) ||
((getsockname (stream->tcpsi,sadr,&sadrlen) == SOCKET_ERROR) ||
(sadrlen <= 0))) ? cpystr (mylocalhost ()) : tcp_name (sadr,NIL);
fs_give ((void **) &sadr);
}
return stream->localhost; /* return local host name */
}
/* TCP/IP get client host address (server calls only)
* Returns: client host address
*/
char *tcp_clientaddr ()
{
if (!myClientAddr) {
char buf[NI_MAXHOST];
size_t sadrlen;
struct sockaddr *sadr = ip_newsockaddr (&sadrlen);
if ((getpeername (0,sadr,(void *) &sadrlen) == SOCKET_ERROR) ||
(sadrlen <= 0)) myClientAddr = cpystr ("UNKNOWN");
else { /* get stdin's peer name */
myClientAddr = cpystr (ip_sockaddrtostring (sadr,buf));
if (myClientPort < 0) myClientPort = ip_sockaddrtoport (sadr);
}
fs_give ((void **) &sadr);
}
return myClientAddr;
}
/* TCP/IP get client host name (server calls only)
* Returns: client host name
*/
char *tcp_clienthost ()
{
if (!myClientHost) {
char buf[NI_MAXHOST];
size_t sadrlen;
struct sockaddr *sadr = ip_newsockaddr (&sadrlen);
if ((getpeername (0,sadr,(void *) &sadrlen) == SOCKET_ERROR) ||
(sadrlen <= 0)) myClientHost = cpystr ("UNKNOWN");
else { /* get stdin's peer name */
myClientHost = tcp_name (sadr,T);
if (!myClientAddr) myClientAddr = cpystr (ip_sockaddrtostring(sadr,buf));
if (myClientPort < 0) myClientPort = ip_sockaddrtoport (sadr);
}
fs_give ((void **) &sadr);
}
return myClientHost;
}
/* TCP/IP get client port number (server calls only)
* Returns: client port number
*/
long tcp_clientport ()
{
if (!myClientHost && !myClientAddr) tcp_clientaddr ();
return myClientPort;
}
/* TCP/IP get server host address (server calls only)
* Returns: server host address
*/
char *tcp_serveraddr ()
{
if (!myServerAddr) {
char buf[NI_MAXHOST];
size_t sadrlen;
struct sockaddr *sadr = ip_newsockaddr (&sadrlen);
if (!wsa_initted++) { /* init Windows Sockets */
WSADATA wsock;
if (WSAStartup (WINSOCK_VERSION,&wsock)) {
wsa_initted = 0;
return "random-pc"; /* try again later? */
}
}
if ((getsockname (0,sadr,(void *) &sadrlen) == SOCKET_ERROR) ||
(sadrlen <= 0)) myServerAddr = cpystr ("UNKNOWN");
else { /* get stdin's name */
myServerAddr = cpystr (ip_sockaddrtostring (sadr,buf));
if (myServerPort < 0) myServerPort = ip_sockaddrtoport (sadr);
}
fs_give ((void **) &sadr);
}
return myServerAddr;
}
/* TCP/IP get server host name (server calls only)
* Returns: server host name
*/
char *tcp_serverhost ()
{
if (!myServerHost) { /* once-only */
char buf[NI_MAXHOST];
size_t sadrlen;
struct sockaddr *sadr = ip_newsockaddr (&sadrlen);
if (!wsa_initted++) { /* init Windows Sockets */
WSADATA wsock;
if (WSAStartup (WINSOCK_VERSION,&wsock)) {
wsa_initted = 0;
return "random-pc"; /* try again later? */
}
}
/* get stdin's name */
if ((getsockname (0,sadr,(void *) &sadrlen) == SOCKET_ERROR) ||
(sadrlen <= 0)) myServerHost = cpystr (mylocalhost ());
else { /* get stdin's name */
myServerHost = tcp_name (sadr,NIL);
if (!myServerAddr) myServerAddr = cpystr (ip_sockaddrtostring(sadr,buf));
if (myServerPort < 0) myServerPort = ip_sockaddrtoport (sadr);
}
fs_give ((void **) &sadr);
}
return myServerHost;
}
/* TCP/IP get server port number (server calls only)
* Returns: server port number
*/
long tcp_serverport ()
{
if (!myServerHost && !myServerAddr) tcp_serveraddr ();
return myServerPort;
}
/* TCP/IP return canonical form of host name
* Accepts: host name
* Returns: canonical form of host name
*/
char *tcp_canonical (char *name)
{
char *ret,host[MAILTMPLEN];
blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL);
/* look like domain literal? */
if (name[0] == '[' && name[strlen (name) - 1] == ']') return name;
(*bn) (BLOCK_DNSLOOKUP,NIL);
if (tcpdebug) {
sprintf (host,"DNS canonicalization %.80s",name);
mm_log (host,TCPDEBUG);
}
/* get canonical name */
if (!ip_nametoaddr (name,NIL,NIL,&ret,NIL,NIL)) ret = cpystr (name);
(*bn) (BLOCK_NONE,NIL); /* alarms OK now */
if (tcpdebug) mm_log ("DNS canonicalization done",TCPDEBUG);
return ret;
}
/* TCP/IP return name from socket
* Accepts: socket
* verbose flag
* Returns: cpystr name
*/
char *tcp_name (struct sockaddr *sadr,long flag)
{
char *ret,*t,adr[MAILTMPLEN],tmp[MAILTMPLEN],buf[NI_MAXHOST];
sprintf (ret = adr,"[%.80s]",ip_sockaddrtostring (sadr,buf));
if (allowreversedns) {
blocknotify_t bn = (blocknotify_t)mail_parameters(NIL,GET_BLOCKNOTIFY,NIL);
if (tcpdebug) {
sprintf (tmp,"Reverse DNS resolution %s",adr);
mm_log (tmp,TCPDEBUG);
}
(*bn) (BLOCK_DNSLOOKUP,NIL);/* quell alarms */
/* translate address to name */
if (t = tcp_name_valid (ip_sockaddrtoname (sadr,buf))) {
/* produce verbose form if needed */
if (flag) sprintf (ret = tmp,"%s %s",t,adr);
else ret = t;
}
(*bn) (BLOCK_NONE,NIL); /* alarms OK now */
if (tcpdebug) mm_log ("Reverse DNS resolution done",TCPDEBUG);
}
return cpystr (ret);
}
/* Validate name
* Accepts: domain name
* Returns: T if valid, NIL otherwise
*/
char *tcp_name_valid (char *s)
{
int c;
char *ret,*tail;
/* must be non-empty and not too long */
if ((ret = (s && *s) ? s : NIL) && (tail = ret + NETMAXHOST)) {
/* must be alnum, dot, or hyphen */
while ((c = *s++) && (s <= tail) &&
(((c >= 'A') && (c <= 'Z')) || ((c >= 'a') && (c <= 'z')) ||
((c >= '0') && (c <= '9')) || (c == '-') || (c == '.')));
if (c) ret = NIL;
}
return ret;
}
|