BSocket.c 39 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482
  1. /**
  2. * @file BSocket.c
  3. * @author Ambroz Bizjak <ambrop7@gmail.com>
  4. *
  5. * @section LICENSE
  6. *
  7. * This file is part of BadVPN.
  8. *
  9. * BadVPN is free software: you can redistribute it and/or modify
  10. * it under the terms of the GNU General Public License version 2
  11. * as published by the Free Software Foundation.
  12. *
  13. * BadVPN is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU General Public License along
  19. * with this program; if not, write to the Free Software Foundation, Inc.,
  20. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  21. */
  22. #ifndef BADVPN_USE_WINAPI
  23. #define _GNU_SOURCE
  24. #include <sys/types.h>
  25. #include <sys/socket.h>
  26. #include <sys/un.h>
  27. #include <netinet/in.h>
  28. #include <netinet/tcp.h>
  29. #include <arpa/inet.h>
  30. #include <unistd.h>
  31. #include <fcntl.h>
  32. #include <errno.h>
  33. #endif
  34. #include <stdlib.h>
  35. #include <string.h>
  36. #include <stddef.h>
  37. #include <misc/debug.h>
  38. #include <system/BSocket.h>
  39. #define HANDLER_READ 0
  40. #define HANDLER_WRITE 1
  41. #define HANDLER_ACCEPT 2
  42. #define HANDLER_CONNECT 3
  43. #define HANDLER_ERROR 4
  44. static int get_event_index (int event)
  45. {
  46. switch (event) {
  47. case BSOCKET_READ:
  48. return HANDLER_READ;
  49. case BSOCKET_WRITE:
  50. return HANDLER_WRITE;
  51. case BSOCKET_ACCEPT:
  52. return HANDLER_ACCEPT;
  53. case BSOCKET_CONNECT:
  54. return HANDLER_CONNECT;
  55. case BSOCKET_ERROR:
  56. return HANDLER_ERROR;
  57. default:
  58. ASSERT(0)
  59. return 42;
  60. }
  61. }
  62. static int handler_events[] = {
  63. [HANDLER_READ] = BSOCKET_READ,
  64. [HANDLER_WRITE] = BSOCKET_WRITE,
  65. [HANDLER_ACCEPT] = BSOCKET_ACCEPT,
  66. [HANDLER_CONNECT] = BSOCKET_CONNECT,
  67. [HANDLER_ERROR] = BSOCKET_ERROR
  68. };
  69. static void init_handlers (BSocket *bs)
  70. {
  71. bs->global_handler = NULL;
  72. for (int i = 0; i < BSOCKET_NUM_EVENTS; i++) {
  73. bs->handlers[i] = NULL;
  74. }
  75. }
  76. static int set_nonblocking (int s)
  77. {
  78. #ifdef BADVPN_USE_WINAPI
  79. unsigned long bl = 1;
  80. int res = ioctlsocket(s, FIONBIO, &bl);
  81. #else
  82. int res = fcntl(s, F_SETFL, O_NONBLOCK);
  83. #endif
  84. return res;
  85. }
  86. static int set_pktinfo (int s)
  87. {
  88. #ifdef BADVPN_USE_WINAPI
  89. DWORD opt = 1;
  90. int res = setsockopt(s, IPPROTO_IP, IP_PKTINFO, (char *)&opt, sizeof(opt));
  91. #else
  92. int opt = 1;
  93. int res = setsockopt(s, IPPROTO_IP, IP_PKTINFO, &opt, sizeof(opt));
  94. #endif
  95. return res;
  96. }
  97. static int set_pktinfo6 (int s)
  98. {
  99. #ifdef BADVPN_USE_WINAPI
  100. DWORD opt = 1;
  101. int res = setsockopt(s, IPPROTO_IPV6, IPV6_PKTINFO, (char *)&opt, sizeof(opt));
  102. #else
  103. int opt = 1;
  104. int res = setsockopt(s, IPPROTO_IPV6, IPV6_RECVPKTINFO, &opt, sizeof(opt));
  105. #endif
  106. return res;
  107. }
  108. static void close_socket (int fd)
  109. {
  110. #ifdef BADVPN_USE_WINAPI
  111. int res = closesocket(fd);
  112. #else
  113. int res = close(fd);
  114. #endif
  115. ASSERT_FORCE(res == 0)
  116. }
  117. static int translate_error (int error)
  118. {
  119. #ifdef BADVPN_USE_WINAPI
  120. switch (error) {
  121. case WSAEADDRNOTAVAIL:
  122. return BSOCKET_ERROR_ADDRESS_NOT_AVAILABLE;
  123. case WSAEADDRINUSE:
  124. return BSOCKET_ERROR_ADDRESS_IN_USE;
  125. case WSAECONNRESET:
  126. return BSOCKET_ERROR_CONNECTION_RESET;
  127. case WSAETIMEDOUT:
  128. return BSOCKET_ERROR_CONNECTION_TIMED_OUT;
  129. case WSAECONNREFUSED:
  130. return BSOCKET_ERROR_CONNECTION_REFUSED;
  131. }
  132. #else
  133. switch (error) {
  134. case EADDRNOTAVAIL:
  135. return BSOCKET_ERROR_ADDRESS_NOT_AVAILABLE;
  136. case EADDRINUSE:
  137. return BSOCKET_ERROR_ADDRESS_IN_USE;
  138. case EACCES:
  139. case EPERM:
  140. return BSOCKET_ERROR_ACCESS_DENIED;
  141. case ECONNREFUSED:
  142. return BSOCKET_ERROR_CONNECTION_REFUSED;
  143. case ECONNRESET:
  144. return BSOCKET_ERROR_CONNECTION_RESET;
  145. case ENETUNREACH:
  146. return BSOCKET_ERROR_NETWORK_UNREACHABLE;
  147. case ETIMEDOUT:
  148. return BSOCKET_ERROR_CONNECTION_TIMED_OUT;
  149. case ENOMEM:
  150. return BSOCKET_ERROR_NO_MEMORY;
  151. }
  152. #endif
  153. return BSOCKET_ERROR_UNKNOWN;
  154. }
  155. struct sys_addr {
  156. #ifdef BADVPN_USE_WINAPI
  157. int len;
  158. #else
  159. socklen_t len;
  160. #endif
  161. union {
  162. struct sockaddr generic;
  163. struct sockaddr_in ipv4;
  164. struct sockaddr_in6 ipv6;
  165. } addr;
  166. };
  167. static void addr_socket_to_sys (struct sys_addr *out, BAddr *addr)
  168. {
  169. switch (addr->type) {
  170. case BADDR_TYPE_IPV4:
  171. out->len = sizeof(out->addr.ipv4);
  172. memset(&out->addr.ipv4, 0, sizeof(out->addr.ipv4));
  173. out->addr.ipv4.sin_family = AF_INET;
  174. out->addr.ipv4.sin_port = addr->ipv4.port;
  175. out->addr.ipv4.sin_addr.s_addr = addr->ipv4.ip;
  176. break;
  177. case BADDR_TYPE_IPV6:
  178. out->len = sizeof(out->addr.ipv6);
  179. memset(&out->addr.ipv6, 0, sizeof(out->addr.ipv6));
  180. out->addr.ipv6.sin6_family = AF_INET6;
  181. out->addr.ipv6.sin6_port = addr->ipv6.port;
  182. out->addr.ipv6.sin6_flowinfo = 0;
  183. memcpy(out->addr.ipv6.sin6_addr.s6_addr, addr->ipv6.ip, 16);
  184. out->addr.ipv6.sin6_scope_id = 0;
  185. break;
  186. default:
  187. ASSERT(0)
  188. break;
  189. }
  190. }
  191. static void addr_sys_to_socket (BAddr *out, struct sys_addr *addr)
  192. {
  193. switch (addr->addr.generic.sa_family) {
  194. case AF_INET:
  195. ASSERT(addr->len == sizeof(struct sockaddr_in))
  196. BAddr_InitIPv4(out, addr->addr.ipv4.sin_addr.s_addr, addr->addr.ipv4.sin_port);
  197. break;
  198. case AF_INET6:
  199. ASSERT(addr->len == sizeof(struct sockaddr_in6))
  200. BAddr_InitIPv6(out, addr->addr.ipv6.sin6_addr.s6_addr, addr->addr.ipv6.sin6_port);
  201. break;
  202. default:
  203. BAddr_InitNone(out);
  204. break;
  205. }
  206. }
  207. static void dispatch_event (BSocket *bs)
  208. {
  209. ASSERT(!bs->global_handler)
  210. ASSERT(bs->current_event_index >= 0)
  211. ASSERT(bs->current_event_index < BSOCKET_NUM_EVENTS)
  212. ASSERT(((bs->ready_events)&~(bs->waitEvents)) == 0)
  213. do {
  214. // get event
  215. int ev_index = bs->current_event_index;
  216. int ev_mask = handler_events[ev_index];
  217. int ev_dispatch = (bs->ready_events&ev_mask);
  218. // jump to next event, clear this event
  219. bs->current_event_index++;
  220. bs->ready_events &= ~ev_mask;
  221. ASSERT(!(bs->ready_events) || bs->current_event_index < BSOCKET_NUM_EVENTS)
  222. if (ev_dispatch) {
  223. // if there are more events to dispatch, schedule job
  224. if (bs->ready_events) {
  225. BPending_Set(&bs->job);
  226. }
  227. // dispatch this event
  228. bs->handlers[ev_index](bs->handlers_user[ev_index], ev_mask);
  229. return;
  230. }
  231. } while (bs->current_event_index < BSOCKET_NUM_EVENTS);
  232. ASSERT(!bs->ready_events)
  233. }
  234. static void job_handler (BSocket *bs)
  235. {
  236. ASSERT(!bs->global_handler) // BSocket_RemoveGlobalEventHandler unsets the job
  237. ASSERT(bs->current_event_index >= 0)
  238. ASSERT(bs->current_event_index < BSOCKET_NUM_EVENTS)
  239. ASSERT(((bs->ready_events)&~(bs->waitEvents)) == 0) // BSocket_DisableEvent clears events from ready_events
  240. DebugObject_Access(&bs->d_obj);
  241. dispatch_event(bs);
  242. return;
  243. }
  244. static void dispatch_events (BSocket *bs, int events)
  245. {
  246. ASSERT((events&~(bs->waitEvents)) == 0)
  247. // reset recv number
  248. bs->recv_num = 0;
  249. if (bs->global_handler) {
  250. if (events) {
  251. bs->global_handler(bs->global_handler_user, events);
  252. }
  253. return;
  254. }
  255. bs->ready_events = events;
  256. bs->current_event_index = 0;
  257. dispatch_event(bs);
  258. return;
  259. }
  260. #ifdef BADVPN_USE_WINAPI
  261. static long get_wsa_events (int sock_events)
  262. {
  263. long res = 0;
  264. if ((sock_events&BSOCKET_READ)) {
  265. res |= FD_READ | FD_CLOSE;
  266. }
  267. if ((sock_events&BSOCKET_WRITE)) {
  268. res |= FD_WRITE | FD_CLOSE;
  269. }
  270. if ((sock_events&BSOCKET_ACCEPT)) {
  271. res |= FD_ACCEPT | FD_CLOSE;
  272. }
  273. if ((sock_events&BSOCKET_CONNECT)) {
  274. res |= FD_CONNECT | FD_CLOSE;
  275. }
  276. return res;
  277. }
  278. static void handle_handler (BSocket *bs)
  279. {
  280. DebugObject_Access(&bs->d_obj);
  281. // enumerate network events and reset event
  282. WSANETWORKEVENTS events;
  283. int res = WSAEnumNetworkEvents(bs->socket, bs->event, &events);
  284. ASSERT_FORCE(res == 0)
  285. int returned_events = 0;
  286. if ((bs->waitEvents&BSOCKET_READ) && ((events.lNetworkEvents&FD_READ) || (events.lNetworkEvents&FD_CLOSE))) {
  287. returned_events |= BSOCKET_READ;
  288. }
  289. if ((bs->waitEvents&BSOCKET_WRITE) && ((events.lNetworkEvents&FD_WRITE) || (events.lNetworkEvents&FD_CLOSE))) {
  290. returned_events |= BSOCKET_WRITE;
  291. }
  292. if ((bs->waitEvents&BSOCKET_ACCEPT) && ((events.lNetworkEvents&FD_ACCEPT) || (events.lNetworkEvents&FD_CLOSE))) {
  293. returned_events |= BSOCKET_ACCEPT;
  294. }
  295. if ((bs->waitEvents&BSOCKET_CONNECT) && ((events.lNetworkEvents&FD_CONNECT) || (events.lNetworkEvents&FD_CLOSE))) {
  296. returned_events |= BSOCKET_CONNECT;
  297. // read connection attempt result
  298. ASSERT(bs->connecting_status == 1)
  299. bs->connecting_status = 2;
  300. if (events.iErrorCode[FD_CONNECT_BIT] == 0) {
  301. bs->connecting_result = BSOCKET_ERROR_NONE;
  302. } else {
  303. bs->connecting_result = translate_error(events.iErrorCode[FD_CONNECT_BIT]);
  304. }
  305. }
  306. if ((bs->waitEvents&BSOCKET_ERROR) && (events.lNetworkEvents&FD_CLOSE)) {
  307. returned_events |= BSOCKET_ERROR;
  308. }
  309. dispatch_events(bs, returned_events);
  310. return;
  311. }
  312. #else
  313. static int get_reactor_fd_events (int sock_events)
  314. {
  315. int res = 0;
  316. if ((sock_events&BSOCKET_READ) || (sock_events&BSOCKET_ACCEPT)) {
  317. res |= BREACTOR_READ;
  318. }
  319. if ((sock_events&BSOCKET_WRITE) || (sock_events&BSOCKET_CONNECT)) {
  320. res |= BREACTOR_WRITE;
  321. }
  322. return res;
  323. }
  324. static void file_descriptor_handler (BSocket *bs, int events)
  325. {
  326. DebugObject_Access(&bs->d_obj);
  327. int returned_events = 0;
  328. if ((bs->waitEvents&BSOCKET_READ) && ((events&BREACTOR_READ) || (events&BREACTOR_ERROR))) {
  329. returned_events |= BSOCKET_READ;
  330. }
  331. if ((bs->waitEvents&BSOCKET_WRITE) && ((events&BREACTOR_WRITE) || (events&BREACTOR_ERROR))) {
  332. returned_events |= BSOCKET_WRITE;
  333. }
  334. if ((bs->waitEvents&BSOCKET_ACCEPT) && ((events&BREACTOR_READ) || (events&BREACTOR_ERROR))) {
  335. returned_events |= BSOCKET_ACCEPT;
  336. }
  337. if ((bs->waitEvents&BSOCKET_CONNECT) && ((events&BREACTOR_WRITE) || (events&BREACTOR_ERROR))) {
  338. returned_events |= BSOCKET_CONNECT;
  339. // read connection attempt result
  340. ASSERT(bs->connecting_status == 1)
  341. bs->connecting_status = 2;
  342. int result;
  343. socklen_t result_len = sizeof(result);
  344. int res = getsockopt(bs->socket, SOL_SOCKET, SO_ERROR, &result, &result_len);
  345. ASSERT_FORCE(res == 0)
  346. if (result == 0) {
  347. bs->connecting_result = BSOCKET_ERROR_NONE;
  348. } else {
  349. bs->connecting_result = translate_error(result);
  350. }
  351. }
  352. if ((bs->waitEvents&BSOCKET_ERROR) && (events&BREACTOR_ERROR)) {
  353. returned_events |= BSOCKET_ERROR;
  354. }
  355. dispatch_events(bs, returned_events);
  356. return;
  357. }
  358. #endif
  359. static int init_event_backend (BSocket *bs)
  360. {
  361. #ifdef BADVPN_USE_WINAPI
  362. if ((bs->event = WSACreateEvent()) == WSA_INVALID_EVENT) {
  363. return 0;
  364. }
  365. BHandle_Init(&bs->bhandle, bs->event, (BHandle_handler)handle_handler, bs);
  366. if (!BReactor_AddHandle(bs->bsys, &bs->bhandle)) {
  367. ASSERT_FORCE(WSACloseEvent(bs->event))
  368. return 0;
  369. }
  370. BReactor_EnableHandle(bs->bsys, &bs->bhandle);
  371. #else
  372. BFileDescriptor_Init(&bs->fd, bs->socket, (BFileDescriptor_handler)file_descriptor_handler, bs);
  373. if (!BReactor_AddFileDescriptor(bs->bsys, &bs->fd)) {
  374. return 0;
  375. }
  376. #endif
  377. return 1;
  378. }
  379. static void free_event_backend (BSocket *bs)
  380. {
  381. #ifdef BADVPN_USE_WINAPI
  382. BReactor_RemoveHandle(bs->bsys, &bs->bhandle);
  383. ASSERT_FORCE(WSACloseEvent(bs->event))
  384. #else
  385. BReactor_RemoveFileDescriptor(bs->bsys, &bs->fd);
  386. #endif
  387. }
  388. static void update_event_backend (BSocket *bs)
  389. {
  390. #ifdef BADVPN_USE_WINAPI
  391. ASSERT_FORCE(WSAEventSelect(bs->socket, bs->event, get_wsa_events(bs->waitEvents)) == 0)
  392. #else
  393. BReactor_SetFileDescriptorEvents(bs->bsys, &bs->fd, get_reactor_fd_events(bs->waitEvents));
  394. #endif
  395. }
  396. static int limit_recv (BSocket *bs)
  397. {
  398. if (bs->recv_max > 0) {
  399. if (bs->recv_num >= bs->recv_max) {
  400. return 1;
  401. }
  402. bs->recv_num++;
  403. }
  404. return 0;
  405. }
  406. static int setup_pktinfo (int socket, int type, int domain)
  407. {
  408. if (type == BSOCKET_TYPE_DGRAM) {
  409. switch (domain) {
  410. case BADDR_TYPE_IPV4:
  411. if (set_pktinfo(socket)) {
  412. return 0;
  413. }
  414. break;
  415. case BADDR_TYPE_IPV6:
  416. if (set_pktinfo6(socket)) {
  417. return 0;
  418. }
  419. break;
  420. }
  421. }
  422. return 1;
  423. }
  424. static void setup_winsock_exts (int socket, int type, BSocket *bs)
  425. {
  426. #ifdef BADVPN_USE_WINAPI
  427. if (type == BSOCKET_TYPE_DGRAM) {
  428. DWORD out_bytes;
  429. // obtain WSARecvMsg
  430. GUID guid_recv = WSAID_WSARECVMSG;
  431. if (WSAIoctl(socket, SIO_GET_EXTENSION_FUNCTION_POINTER, &guid_recv, sizeof(guid_recv), &bs->WSARecvMsg, sizeof(bs->WSARecvMsg), &out_bytes, NULL, NULL) != 0) {
  432. bs->WSARecvMsg = NULL;
  433. }
  434. // obtain WSASendMsg
  435. GUID guid_send = WSAID_WSASENDMSG;
  436. if (WSAIoctl(socket, SIO_GET_EXTENSION_FUNCTION_POINTER, &guid_send, sizeof(guid_send), &bs->WSASendMsg, sizeof(bs->WSASendMsg), &out_bytes, NULL, NULL) != 0) {
  437. bs->WSASendMsg = NULL;
  438. }
  439. }
  440. #endif
  441. }
  442. int BSocket_GlobalInit (void)
  443. {
  444. #ifdef BADVPN_USE_WINAPI
  445. WORD requested = MAKEWORD(2, 2);
  446. WSADATA wsadata;
  447. if (WSAStartup(requested, &wsadata) != 0) {
  448. goto fail0;
  449. }
  450. if (wsadata.wVersion != requested) {
  451. goto fail1;
  452. }
  453. return 0;
  454. fail1:
  455. WSACleanup();
  456. fail0:
  457. return -1;
  458. #else
  459. return 0;
  460. #endif
  461. }
  462. int BSocket_Init (BSocket *bs, BReactor *bsys, int domain, int type)
  463. {
  464. // NOTE: if you change something here, you might also have to change BSocket_Accept
  465. // translate domain
  466. int sys_domain;
  467. switch (domain) {
  468. case BADDR_TYPE_IPV4:
  469. sys_domain = AF_INET;
  470. break;
  471. case BADDR_TYPE_IPV6:
  472. sys_domain = AF_INET6;
  473. break;
  474. #ifndef BADVPN_USE_WINAPI
  475. case BADDR_TYPE_UNIX:
  476. sys_domain = AF_UNIX;
  477. break;
  478. #endif
  479. default:
  480. ASSERT(0)
  481. return -1;
  482. }
  483. // translate type
  484. int sys_type;
  485. switch (type) {
  486. case BSOCKET_TYPE_STREAM:
  487. sys_type = SOCK_STREAM;
  488. break;
  489. case BSOCKET_TYPE_DGRAM:
  490. sys_type = SOCK_DGRAM;
  491. break;
  492. default:
  493. ASSERT(0)
  494. return -1;
  495. }
  496. // create socket
  497. int fd = socket(sys_domain, sys_type, 0);
  498. if (fd < 0) {
  499. DEBUG("socket() failed");
  500. goto fail0;
  501. }
  502. // set socket nonblocking
  503. if (set_nonblocking(fd) != 0) {
  504. DEBUG("set_nonblocking failed");
  505. goto fail1;
  506. }
  507. // set pktinfo if needed
  508. if (!setup_pktinfo(fd, type, domain)) {
  509. DEBUG("setup_pktinfo failed");
  510. goto fail1;
  511. }
  512. // setup winsock exts
  513. setup_winsock_exts(fd, type, bs);
  514. bs->bsys = bsys;
  515. bs->type = type;
  516. bs->domain = domain;
  517. bs->socket = fd;
  518. bs->error = BSOCKET_ERROR_NONE;
  519. init_handlers(bs);
  520. bs->waitEvents = 0;
  521. bs->connecting_status = 0;
  522. bs->recv_max = BSOCKET_DEFAULT_RECV_MAX;
  523. bs->recv_num = 0;
  524. bs->ready_events = 0; // just initialize it so we can clear them safely from BSocket_DisableEvent
  525. // init job
  526. BPending_Init(&bs->job, BReactor_PendingGroup(bsys), (BPending_handler)job_handler, bs);
  527. // initialize event backend
  528. if (!init_event_backend(bs)) {
  529. DEBUG("WARNING: init_event_backend failed");
  530. goto fail2;
  531. }
  532. DebugObject_Init(&bs->d_obj);
  533. return 0;
  534. fail2:
  535. BPending_Free(&bs->job);
  536. fail1:
  537. close_socket(fd);
  538. fail0:
  539. return -1;
  540. }
  541. void BSocket_Free (BSocket *bs)
  542. {
  543. DebugObject_Free(&bs->d_obj);
  544. // free event backend
  545. free_event_backend(bs);
  546. // free job
  547. BPending_Free(&bs->job);
  548. // close socket
  549. close_socket(bs->socket);
  550. }
  551. void BSocket_SetRecvMax (BSocket *bs, int max)
  552. {
  553. DebugObject_Access(&bs->d_obj);
  554. ASSERT(max > 0 || max == -1)
  555. bs->recv_max = max;
  556. bs->recv_num = 0;
  557. }
  558. int BSocket_GetError (BSocket *bs)
  559. {
  560. DebugObject_Access(&bs->d_obj);
  561. return bs->error;
  562. }
  563. void BSocket_AddGlobalEventHandler (BSocket *bs, BSocket_handler handler, void *user)
  564. {
  565. DebugObject_Access(&bs->d_obj);
  566. ASSERT(handler)
  567. ASSERT(!bs->global_handler)
  568. for (int i = 0; i < BSOCKET_NUM_EVENTS; i++) {
  569. ASSERT(!bs->handlers[i])
  570. }
  571. bs->global_handler = handler;
  572. bs->global_handler_user = user;
  573. // stop event dispatching job
  574. BPending_Unset(&bs->job);
  575. }
  576. void BSocket_RemoveGlobalEventHandler (BSocket *bs)
  577. {
  578. ASSERT(bs->global_handler)
  579. DebugObject_Access(&bs->d_obj);
  580. bs->global_handler = NULL;
  581. bs->waitEvents = 0;
  582. }
  583. void BSocket_SetGlobalEvents (BSocket *bs, int events)
  584. {
  585. ASSERT(bs->global_handler)
  586. DebugObject_Access(&bs->d_obj);
  587. // update events
  588. bs->waitEvents = events;
  589. // give new events to event backend
  590. update_event_backend(bs);
  591. }
  592. void BSocket_AddEventHandler (BSocket *bs, uint8_t event, BSocket_handler handler, void *user)
  593. {
  594. ASSERT(handler)
  595. ASSERT(!bs->global_handler)
  596. DebugObject_Access(&bs->d_obj);
  597. // get index
  598. int i = get_event_index(event);
  599. // event must not have handler
  600. ASSERT(!bs->handlers[i])
  601. // change handler
  602. bs->handlers[i] = handler;
  603. bs->handlers_user[i] = user;
  604. }
  605. void BSocket_RemoveEventHandler (BSocket *bs, uint8_t event)
  606. {
  607. DebugObject_Access(&bs->d_obj);
  608. // get table index
  609. int i = get_event_index(event);
  610. // event must have handler
  611. ASSERT(bs->handlers[i])
  612. // disable event if enabled
  613. if (bs->waitEvents&event) {
  614. BSocket_DisableEvent(bs, event);
  615. }
  616. // change handler
  617. bs->handlers[i] = NULL;
  618. }
  619. void BSocket_EnableEvent (BSocket *bs, uint8_t event)
  620. {
  621. DebugObject_Access(&bs->d_obj);
  622. #ifndef NDEBUG
  623. // check event and incompatible events
  624. switch (event) {
  625. case BSOCKET_READ:
  626. case BSOCKET_WRITE:
  627. ASSERT(!(bs->waitEvents&BSOCKET_ACCEPT))
  628. ASSERT(!(bs->waitEvents&BSOCKET_CONNECT))
  629. break;
  630. case BSOCKET_ACCEPT:
  631. ASSERT(!(bs->waitEvents&BSOCKET_READ))
  632. ASSERT(!(bs->waitEvents&BSOCKET_WRITE))
  633. ASSERT(!(bs->waitEvents&BSOCKET_CONNECT))
  634. break;
  635. case BSOCKET_CONNECT:
  636. ASSERT(!(bs->waitEvents&BSOCKET_READ))
  637. ASSERT(!(bs->waitEvents&BSOCKET_WRITE))
  638. ASSERT(!(bs->waitEvents&BSOCKET_ACCEPT))
  639. break;
  640. case BSOCKET_ERROR:
  641. break;
  642. default:
  643. ASSERT(0)
  644. break;
  645. }
  646. #endif
  647. // event must have handler
  648. ASSERT(bs->handlers[get_event_index(event)])
  649. // event must not be enabled
  650. ASSERT(!(bs->waitEvents&event))
  651. // update events
  652. bs->waitEvents |= event;
  653. // give new events to event backend
  654. update_event_backend(bs);
  655. }
  656. void BSocket_DisableEvent (BSocket *bs, uint8_t event)
  657. {
  658. DebugObject_Access(&bs->d_obj);
  659. // check event and get index
  660. int index = get_event_index(event);
  661. // event must have handler
  662. ASSERT(bs->handlers[index])
  663. // event must be enabled
  664. ASSERT(bs->waitEvents&event)
  665. // update events
  666. bs->waitEvents &= ~event;
  667. bs->ready_events &= ~event;
  668. // give new events to event backend
  669. update_event_backend(bs);
  670. }
  671. int BSocket_Connect (BSocket *bs, BAddr *addr)
  672. {
  673. ASSERT(addr)
  674. ASSERT(!BAddr_IsInvalid(addr))
  675. ASSERT(bs->connecting_status == 0)
  676. DebugObject_Access(&bs->d_obj);
  677. struct sys_addr sysaddr;
  678. addr_socket_to_sys(&sysaddr, addr);
  679. if (connect(bs->socket, &sysaddr.addr.generic, sysaddr.len) < 0) {
  680. int error;
  681. #ifdef BADVPN_USE_WINAPI
  682. switch ((error = WSAGetLastError())) {
  683. case WSAEWOULDBLOCK:
  684. bs->connecting_status = 1;
  685. bs->error = BSOCKET_ERROR_IN_PROGRESS;
  686. return -1;
  687. }
  688. #else
  689. switch ((error = errno)) {
  690. case EINPROGRESS:
  691. bs->connecting_status = 1;
  692. bs->error = BSOCKET_ERROR_IN_PROGRESS;
  693. return -1;
  694. }
  695. #endif
  696. bs->error = translate_error(error);
  697. return -1;
  698. }
  699. bs->error = BSOCKET_ERROR_NONE;
  700. return 0;
  701. }
  702. int BSocket_GetConnectResult (BSocket *bs)
  703. {
  704. ASSERT(bs->connecting_status == 2)
  705. DebugObject_Access(&bs->d_obj);
  706. bs->connecting_status = 0;
  707. return bs->connecting_result;
  708. }
  709. int BSocket_Bind (BSocket *bs, BAddr *addr)
  710. {
  711. ASSERT(addr)
  712. ASSERT(!BAddr_IsInvalid(addr))
  713. DebugObject_Access(&bs->d_obj);
  714. struct sys_addr sysaddr;
  715. addr_socket_to_sys(&sysaddr, addr);
  716. if (bs->type == BSOCKET_TYPE_STREAM) {
  717. #ifdef BADVPN_USE_WINAPI
  718. BOOL optval = TRUE;
  719. #else
  720. int optval = 1;
  721. #endif
  722. if (setsockopt(bs->socket, SOL_SOCKET, SO_REUSEADDR, (void *)&optval, sizeof(optval)) < 0) {
  723. DEBUG("WARNING: setsockopt failed");
  724. }
  725. }
  726. if (bind(bs->socket, &sysaddr.addr.generic, sysaddr.len) < 0) {
  727. #ifdef BADVPN_USE_WINAPI
  728. int error = WSAGetLastError();
  729. #else
  730. int error = errno;
  731. #endif
  732. bs->error = translate_error(error);
  733. return -1;
  734. }
  735. bs->error = BSOCKET_ERROR_NONE;
  736. return 0;
  737. }
  738. int BSocket_Listen (BSocket *bs, int backlog)
  739. {
  740. ASSERT(bs->type == BSOCKET_TYPE_STREAM)
  741. DebugObject_Access(&bs->d_obj);
  742. if (backlog < 0) {
  743. backlog = BSOCKET_DEFAULT_BACKLOG;
  744. }
  745. if (listen(bs->socket, backlog) < 0) {
  746. #ifdef BADVPN_USE_WINAPI
  747. int error = WSAGetLastError();
  748. #else
  749. int error = errno;
  750. #endif
  751. bs->error = translate_error(error);
  752. return -1;
  753. }
  754. bs->error = BSOCKET_ERROR_NONE;
  755. return 0;
  756. }
  757. int BSocket_Accept (BSocket *bs, BSocket *newsock, BAddr *addr)
  758. {
  759. ASSERT(bs->type == BSOCKET_TYPE_STREAM)
  760. DebugObject_Access(&bs->d_obj);
  761. struct sys_addr sysaddr;
  762. sysaddr.len = sizeof(sysaddr.addr);
  763. int fd = accept(bs->socket, &sysaddr.addr.generic, &sysaddr.len);
  764. if (fd < 0) {
  765. int error;
  766. #ifdef BADVPN_USE_WINAPI
  767. switch ((error = WSAGetLastError())) {
  768. case WSAEWOULDBLOCK:
  769. bs->error = BSOCKET_ERROR_LATER;
  770. return -1;
  771. }
  772. #else
  773. switch ((error = errno)) {
  774. case EAGAIN:
  775. #if EAGAIN != EWOULDBLOCK
  776. case EWOULDBLOCK:
  777. #endif
  778. bs->error = BSOCKET_ERROR_LATER;
  779. return -1;
  780. }
  781. #endif
  782. bs->error = translate_error(error);
  783. return -1;
  784. }
  785. if (!newsock) {
  786. close_socket(fd);
  787. } else {
  788. // set nonblocking
  789. if (set_nonblocking(fd) != 0) {
  790. DEBUG("WARNING: set_nonblocking failed");
  791. goto fail0;
  792. }
  793. // set pktinfo if needed
  794. if (!setup_pktinfo(fd, bs->type, bs->domain)) {
  795. DEBUG("setup_pktinfo failed");
  796. goto fail0;
  797. }
  798. // setup winsock exts
  799. setup_winsock_exts(fd, bs->type, newsock);
  800. newsock->bsys = bs->bsys;
  801. newsock->type = bs->type;
  802. newsock->domain = bs->domain;
  803. newsock->socket = fd;
  804. newsock->error = BSOCKET_ERROR_NONE;
  805. init_handlers(newsock);
  806. newsock->waitEvents = 0;
  807. newsock->connecting_status = 0;
  808. newsock->recv_max = BSOCKET_DEFAULT_RECV_MAX;
  809. newsock->recv_num = 0;
  810. newsock->ready_events = 0; // just initialize it so we can clear them safely from BSocket_DisableEvent
  811. // init job
  812. BPending_Init(&newsock->job, BReactor_PendingGroup(bs->bsys), (BPending_handler)job_handler, newsock);
  813. if (!init_event_backend(newsock)) {
  814. DEBUG("WARNING: init_event_backend failed");
  815. goto fail1;
  816. }
  817. // init debug object
  818. DebugObject_Init(&newsock->d_obj);
  819. }
  820. // return client address
  821. if (addr) {
  822. addr_sys_to_socket(addr, &sysaddr);
  823. }
  824. bs->error = BSOCKET_ERROR_NONE;
  825. return 0;
  826. fail1:
  827. BPending_Free(&newsock->job);
  828. fail0:
  829. close_socket(fd);
  830. bs->error = BSOCKET_ERROR_UNKNOWN;
  831. return -1;
  832. }
  833. int BSocket_Send (BSocket *bs, uint8_t *data, int len)
  834. {
  835. ASSERT(len >= 0)
  836. ASSERT(bs->type == BSOCKET_TYPE_STREAM)
  837. DebugObject_Access(&bs->d_obj);
  838. #ifdef BADVPN_USE_WINAPI
  839. int flags = 0;
  840. #else
  841. int flags = MSG_NOSIGNAL;
  842. #endif
  843. int bytes = send(bs->socket, data, len, flags);
  844. if (bytes < 0) {
  845. int error;
  846. #ifdef BADVPN_USE_WINAPI
  847. switch ((error = WSAGetLastError())) {
  848. case WSAEWOULDBLOCK:
  849. bs->error = BSOCKET_ERROR_LATER;
  850. return -1;
  851. }
  852. #else
  853. switch ((error = errno)) {
  854. case EAGAIN:
  855. #if EAGAIN != EWOULDBLOCK
  856. case EWOULDBLOCK:
  857. #endif
  858. bs->error = BSOCKET_ERROR_LATER;
  859. return -1;
  860. }
  861. #endif
  862. bs->error = translate_error(error);
  863. return -1;
  864. }
  865. bs->error = BSOCKET_ERROR_NONE;
  866. return bytes;
  867. }
  868. int BSocket_Recv (BSocket *bs, uint8_t *data, int len)
  869. {
  870. ASSERT(len >= 0)
  871. ASSERT(bs->type == BSOCKET_TYPE_STREAM)
  872. DebugObject_Access(&bs->d_obj);
  873. if (limit_recv(bs)) {
  874. bs->error = BSOCKET_ERROR_LATER;
  875. return -1;
  876. }
  877. int bytes = recv(bs->socket, data, len, 0);
  878. if (bytes < 0) {
  879. int error;
  880. #ifdef BADVPN_USE_WINAPI
  881. switch ((error = WSAGetLastError())) {
  882. case WSAEWOULDBLOCK:
  883. bs->error = BSOCKET_ERROR_LATER;
  884. return -1;
  885. }
  886. #else
  887. switch ((error = errno)) {
  888. case EAGAIN:
  889. #if EAGAIN != EWOULDBLOCK
  890. case EWOULDBLOCK:
  891. #endif
  892. bs->error = BSOCKET_ERROR_LATER;
  893. return -1;
  894. }
  895. #endif
  896. bs->error = translate_error(error);
  897. return -1;
  898. }
  899. bs->error = BSOCKET_ERROR_NONE;
  900. return bytes;
  901. }
  902. int BSocket_SendToFrom (BSocket *bs, uint8_t *data, int len, BAddr *addr, BIPAddr *local_addr)
  903. {
  904. ASSERT(len >= 0)
  905. ASSERT(addr)
  906. ASSERT(!BAddr_IsInvalid(addr))
  907. ASSERT(local_addr)
  908. ASSERT(bs->type == BSOCKET_TYPE_DGRAM)
  909. DebugObject_Access(&bs->d_obj);
  910. struct sys_addr remote_sysaddr;
  911. addr_socket_to_sys(&remote_sysaddr, addr);
  912. #ifdef BADVPN_USE_WINAPI
  913. WSABUF buf;
  914. buf.len = len;
  915. buf.buf = data;
  916. DWORD bytes;
  917. if (!bs->WSASendMsg) {
  918. if (WSASendTo(bs->socket, &buf, 1, &bytes, 0, &remote_sysaddr.addr.generic, remote_sysaddr.len, NULL, NULL) != 0) {
  919. int error;
  920. switch ((error = WSAGetLastError())) {
  921. case WSAEWOULDBLOCK:
  922. bs->error = BSOCKET_ERROR_LATER;
  923. return -1;
  924. }
  925. bs->error = translate_error(error);
  926. return -1;
  927. }
  928. } else {
  929. union {
  930. char in[WSA_CMSG_SPACE(sizeof(struct in_pktinfo))];
  931. char in6[WSA_CMSG_SPACE(sizeof(struct in6_pktinfo))];
  932. } cdata;
  933. WSAMSG msg;
  934. memset(&msg, 0, sizeof(msg));
  935. msg.name = &remote_sysaddr.addr.generic;
  936. msg.namelen = remote_sysaddr.len;
  937. msg.lpBuffers = &buf;
  938. msg.dwBufferCount = 1;
  939. msg.Control.buf = (char *)&cdata;
  940. msg.Control.len = sizeof(cdata);
  941. int sum = 0;
  942. WSACMSGHDR *cmsg = WSA_CMSG_FIRSTHDR(&msg);
  943. switch (local_addr->type) {
  944. case BADDR_TYPE_NONE:
  945. break;
  946. case BADDR_TYPE_IPV4: {
  947. memset(cmsg, 0, WSA_CMSG_SPACE(sizeof(struct in_pktinfo)));
  948. cmsg->cmsg_level = IPPROTO_IP;
  949. cmsg->cmsg_type = IP_PKTINFO;
  950. cmsg->cmsg_len = WSA_CMSG_LEN(sizeof(struct in_pktinfo));
  951. struct in_pktinfo *pktinfo = (struct in_pktinfo *)WSA_CMSG_DATA(cmsg);
  952. pktinfo->ipi_addr.s_addr = local_addr->ipv4;
  953. sum += WSA_CMSG_SPACE(sizeof(struct in_pktinfo));
  954. } break;
  955. case BADDR_TYPE_IPV6: {
  956. memset(cmsg, 0, WSA_CMSG_SPACE(sizeof(struct in6_pktinfo)));
  957. cmsg->cmsg_level = IPPROTO_IPV6;
  958. cmsg->cmsg_type = IPV6_PKTINFO;
  959. cmsg->cmsg_len = WSA_CMSG_LEN(sizeof(struct in6_pktinfo));
  960. struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)WSA_CMSG_DATA(cmsg);
  961. memcpy(pktinfo->ipi6_addr.s6_addr, local_addr->ipv6, 16);
  962. sum += WSA_CMSG_SPACE(sizeof(struct in6_pktinfo));
  963. } break;
  964. default:
  965. ASSERT(0);
  966. }
  967. msg.Control.len = sum;
  968. if (bs->WSASendMsg(bs->socket, &msg, 0, &bytes, NULL, NULL) != 0) {
  969. int error;
  970. switch ((error = WSAGetLastError())) {
  971. case WSAEWOULDBLOCK:
  972. bs->error = BSOCKET_ERROR_LATER;
  973. return -1;
  974. }
  975. bs->error = translate_error(error);
  976. return -1;
  977. }
  978. }
  979. #else
  980. struct iovec iov;
  981. iov.iov_base = data;
  982. iov.iov_len = len;
  983. union {
  984. char in[CMSG_SPACE(sizeof(struct in_pktinfo))];
  985. char in6[CMSG_SPACE(sizeof(struct in6_pktinfo))];
  986. } cdata;
  987. struct msghdr msg;
  988. memset(&msg, 0, sizeof(msg));
  989. msg.msg_name = &remote_sysaddr.addr.generic;
  990. msg.msg_namelen = remote_sysaddr.len;
  991. msg.msg_iov = &iov;
  992. msg.msg_iovlen = 1;
  993. msg.msg_control = &cdata;
  994. msg.msg_controllen = sizeof(cdata);
  995. int sum = 0;
  996. struct cmsghdr *cmsg = CMSG_FIRSTHDR(&msg);
  997. switch (local_addr->type) {
  998. case BADDR_TYPE_NONE:
  999. break;
  1000. case BADDR_TYPE_IPV4: {
  1001. memset(cmsg, 0, CMSG_SPACE(sizeof(struct in_pktinfo)));
  1002. cmsg->cmsg_level = IPPROTO_IP;
  1003. cmsg->cmsg_type = IP_PKTINFO;
  1004. cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
  1005. struct in_pktinfo *pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
  1006. pktinfo->ipi_spec_dst.s_addr = local_addr->ipv4;
  1007. sum += CMSG_SPACE(sizeof(struct in_pktinfo));
  1008. } break;
  1009. case BADDR_TYPE_IPV6: {
  1010. memset(cmsg, 0, CMSG_SPACE(sizeof(struct in6_pktinfo)));
  1011. cmsg->cmsg_level = IPPROTO_IPV6;
  1012. cmsg->cmsg_type = IPV6_PKTINFO;
  1013. cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
  1014. struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  1015. memcpy(pktinfo->ipi6_addr.s6_addr, local_addr->ipv6, 16);
  1016. sum += CMSG_SPACE(sizeof(struct in6_pktinfo));
  1017. } break;
  1018. default:
  1019. ASSERT(0);
  1020. }
  1021. msg.msg_controllen = sum;
  1022. int bytes = sendmsg(bs->socket, &msg, MSG_NOSIGNAL);
  1023. if (bytes < 0) {
  1024. int error;
  1025. switch ((error = errno)) {
  1026. case EAGAIN:
  1027. #if EAGAIN != EWOULDBLOCK
  1028. case EWOULDBLOCK:
  1029. #endif
  1030. bs->error = BSOCKET_ERROR_LATER;
  1031. return -1;
  1032. }
  1033. bs->error = translate_error(error);
  1034. return -1;
  1035. }
  1036. #endif
  1037. bs->error = BSOCKET_ERROR_NONE;
  1038. return bytes;
  1039. }
  1040. int BSocket_RecvFromTo (BSocket *bs, uint8_t *data, int len, BAddr *addr, BIPAddr *local_addr)
  1041. {
  1042. ASSERT(len >= 0)
  1043. ASSERT(addr)
  1044. ASSERT(local_addr)
  1045. ASSERT(bs->type == BSOCKET_TYPE_DGRAM)
  1046. DebugObject_Access(&bs->d_obj);
  1047. if (limit_recv(bs)) {
  1048. bs->error = BSOCKET_ERROR_LATER;
  1049. return -1;
  1050. }
  1051. struct sys_addr remote_sysaddr;
  1052. remote_sysaddr.len = sizeof(remote_sysaddr.addr);
  1053. #ifdef BADVPN_USE_WINAPI
  1054. WSABUF buf;
  1055. buf.len = len;
  1056. buf.buf = data;
  1057. DWORD bytes;
  1058. WSAMSG msg;
  1059. if (!bs->WSARecvMsg) {
  1060. DWORD flags = 0;
  1061. INT fromlen = remote_sysaddr.len;
  1062. if (WSARecvFrom(bs->socket, &buf, 1, &bytes, &flags, &remote_sysaddr.addr.generic, &fromlen, NULL, NULL) != 0) {
  1063. int error;
  1064. switch ((error = WSAGetLastError())) {
  1065. case WSAEWOULDBLOCK:
  1066. bs->error = BSOCKET_ERROR_LATER;
  1067. return -1;
  1068. }
  1069. bs->error = translate_error(error);
  1070. return -1;
  1071. }
  1072. remote_sysaddr.len = fromlen;
  1073. } else {
  1074. union {
  1075. char in[WSA_CMSG_SPACE(sizeof(struct in_pktinfo))];
  1076. char in6[WSA_CMSG_SPACE(sizeof(struct in6_pktinfo))];
  1077. } cdata;
  1078. memset(&msg, 0, sizeof(msg));
  1079. msg.name = &remote_sysaddr.addr.generic;
  1080. msg.namelen = remote_sysaddr.len;
  1081. msg.lpBuffers = &buf;
  1082. msg.dwBufferCount = 1;
  1083. msg.Control.buf = (char *)&cdata;
  1084. msg.Control.len = sizeof(cdata);
  1085. if (bs->WSARecvMsg(bs->socket, &msg, &bytes, NULL, NULL) != 0) {
  1086. int error;
  1087. switch ((error = WSAGetLastError())) {
  1088. case WSAEWOULDBLOCK:
  1089. bs->error = BSOCKET_ERROR_LATER;
  1090. return -1;
  1091. }
  1092. bs->error = translate_error(error);
  1093. return -1;
  1094. }
  1095. remote_sysaddr.len = msg.namelen;
  1096. }
  1097. #else
  1098. struct iovec iov;
  1099. iov.iov_base = data;
  1100. iov.iov_len = len;
  1101. union {
  1102. char in[CMSG_SPACE(sizeof(struct in_pktinfo))];
  1103. char in6[CMSG_SPACE(sizeof(struct in6_pktinfo))];
  1104. } cdata;
  1105. struct msghdr msg;
  1106. memset(&msg, 0, sizeof(msg));
  1107. msg.msg_name = &remote_sysaddr.addr.generic;
  1108. msg.msg_namelen = remote_sysaddr.len;
  1109. msg.msg_iov = &iov;
  1110. msg.msg_iovlen = 1;
  1111. msg.msg_control = &cdata;
  1112. msg.msg_controllen = sizeof(cdata);
  1113. int bytes = recvmsg(bs->socket, &msg, 0);
  1114. if (bytes < 0) {
  1115. int error;
  1116. switch ((error = errno)) {
  1117. case EAGAIN:
  1118. #if EAGAIN != EWOULDBLOCK
  1119. case EWOULDBLOCK:
  1120. #endif
  1121. bs->error = BSOCKET_ERROR_LATER;
  1122. return -1;
  1123. }
  1124. bs->error = translate_error(error);
  1125. return -1;
  1126. }
  1127. remote_sysaddr.len = msg.msg_namelen;
  1128. #endif
  1129. addr_sys_to_socket(addr, &remote_sysaddr);
  1130. BIPAddr_InitInvalid(local_addr);
  1131. #ifdef BADVPN_USE_WINAPI
  1132. if (bs->WSARecvMsg) {
  1133. WSACMSGHDR *cmsg;
  1134. for (cmsg = WSA_CMSG_FIRSTHDR(&msg); cmsg; cmsg = WSA_CMSG_NXTHDR(&msg, cmsg)) {
  1135. if (cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_PKTINFO) {
  1136. struct in_pktinfo *pktinfo = (struct in_pktinfo *)WSA_CMSG_DATA(cmsg);
  1137. BIPAddr_InitIPv4(local_addr, pktinfo->ipi_addr.s_addr);
  1138. }
  1139. else if (cmsg->cmsg_level == IPPROTO_IPV6 && cmsg->cmsg_type == IPV6_PKTINFO) {
  1140. struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)WSA_CMSG_DATA(cmsg);
  1141. BIPAddr_InitIPv6(local_addr, pktinfo->ipi6_addr.s6_addr);
  1142. }
  1143. }
  1144. }
  1145. #else
  1146. struct cmsghdr *cmsg;
  1147. for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
  1148. if (cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_PKTINFO) {
  1149. struct in_pktinfo *pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
  1150. BIPAddr_InitIPv4(local_addr, pktinfo->ipi_addr.s_addr);
  1151. }
  1152. else if (cmsg->cmsg_level == IPPROTO_IPV6 && cmsg->cmsg_type == IPV6_PKTINFO) {
  1153. struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  1154. BIPAddr_InitIPv6(local_addr, pktinfo->ipi6_addr.s6_addr);
  1155. }
  1156. }
  1157. #endif
  1158. bs->error = BSOCKET_ERROR_NONE;
  1159. return bytes;
  1160. }
  1161. int BSocket_GetPeerName (BSocket *bs, BAddr *addr)
  1162. {
  1163. ASSERT(addr)
  1164. DebugObject_Access(&bs->d_obj);
  1165. struct sys_addr sysaddr;
  1166. sysaddr.len = sizeof(sysaddr.addr);
  1167. if (getpeername(bs->socket, &sysaddr.addr.generic, &sysaddr.len) < 0) {
  1168. bs->error = BSOCKET_ERROR_UNKNOWN;
  1169. return -1;
  1170. }
  1171. addr_sys_to_socket(addr, &sysaddr);
  1172. bs->error = BSOCKET_ERROR_NONE;
  1173. return 0;
  1174. }
  1175. #ifndef BADVPN_USE_WINAPI
  1176. static int create_unix_sysaddr (struct sockaddr_un *addr, size_t *addr_len, const char *path)
  1177. {
  1178. size_t path_len = strlen(path);
  1179. if (path_len == 0) {
  1180. DEBUG("path empty");
  1181. return 0;
  1182. }
  1183. addr->sun_family = AF_UNIX;
  1184. if (path_len >= sizeof(addr->sun_path)) {
  1185. DEBUG("path too long");
  1186. return 0;
  1187. }
  1188. strcpy(addr->sun_path, path);
  1189. *addr_len = offsetof(struct sockaddr_un, sun_path) + path_len + 1;
  1190. return 1;
  1191. }
  1192. int BSocket_BindUnix (BSocket *bs, const char *path)
  1193. {
  1194. DebugObject_Access(&bs->d_obj);
  1195. struct sockaddr_un sys_addr;
  1196. size_t addr_len;
  1197. if (!create_unix_sysaddr(&sys_addr, &addr_len, path)) {
  1198. bs->error = BSOCKET_ERROR_UNKNOWN;
  1199. return -1;
  1200. }
  1201. if (bind(bs->socket, (struct sockaddr *)&sys_addr, addr_len) < 0) {
  1202. bs->error = translate_error(errno);
  1203. return -1;
  1204. }
  1205. bs->error = BSOCKET_ERROR_NONE;
  1206. return 0;
  1207. }
  1208. int BSocket_ConnectUnix (BSocket *bs, const char *path)
  1209. {
  1210. DebugObject_Access(&bs->d_obj);
  1211. struct sockaddr_un sys_addr;
  1212. size_t addr_len;
  1213. if (!create_unix_sysaddr(&sys_addr, &addr_len, path)) {
  1214. bs->error = BSOCKET_ERROR_UNKNOWN;
  1215. return -1;
  1216. }
  1217. if (connect(bs->socket, (struct sockaddr *)&sys_addr, addr_len) < 0) {
  1218. bs->error = translate_error(errno);
  1219. return -1;
  1220. }
  1221. bs->error = BSOCKET_ERROR_NONE;
  1222. return 0;
  1223. }
  1224. #endif