/* * Copyright (c) 2018-2023 SignalWire, Inc * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all * copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE * SOFTWARE. */ /* Use select on windows and poll everywhere else. Select is the devil. Especially if you are doing a lot of small socket connections. If your FD number is bigger than 1024 you will silently create memory corruption. If you have build errors on your platform because you don't have poll find a way to detect it and #define KS_USE_SELECT and #undef KS_USE_POLL All of this will be upgraded to autoheadache eventually. */ /* TBD for win32 figure out how to tell if you have WSAPoll (vista or higher) and use it when available by #defining KS_USE_WSAPOLL (see below) */ #ifdef _MSC_VER #ifndef FD_SETSIZE #define FD_SETSIZE 8192 #endif //#define KS_USE_SELECT #else #define KS_USE_POLL #endif #include "libks/ks.h" #ifndef WIN32 #define closesocket(s) close(s) #else /* WIN32 */ #pragma warning (disable:6386) /* These warnings need to be ignored warning in sdk header */ #include #include #pragma comment(lib, "Ws2_32.lib") #ifndef errno #define errno WSAGetLastError() #endif #ifndef EINTR #define EINTR WSAEINTR #endif #pragma warning (default:6386) #endif /* WIN32 */ #ifndef SOL_IPV6 #define SOL_IPV6 41 #endif #ifdef KS_USE_POLL #include #endif KS_DECLARE(ks_status_t) ks_socket_option(ks_socket_t socket, int option_name, ks_bool_t enabled) { int result = -1; ks_status_t status = KS_STATUS_FAIL; #ifdef WIN32 BOOL opt = TRUE; if (!enabled) opt = FALSE; #else int opt = 1; if (!enabled) opt = 0; #endif switch(option_name) { case SO_REUSEADDR: case TCP_NODELAY: case SO_KEEPALIVE: case SO_LINGER: #ifdef KS_KEEP_IDLE_INTVL #ifndef __APPLE__ case TCP_KEEPIDLE: case TCP_KEEPINTVL: #endif #endif /* KS_KEEP_IDLE_INTVL */ #ifdef WIN32 result = setsockopt(socket, SOL_SOCKET, option_name, (char *) &opt, sizeof(opt)); #else result = setsockopt(socket, SOL_SOCKET, option_name, &opt, sizeof(opt)); #endif if (!result) status = KS_STATUS_SUCCESS; break; case KS_SO_NONBLOCK: { #ifdef WIN32 u_long val = (u_long)!!opt; if (ioctlsocket(socket, FIONBIO, &val) != SOCKET_ERROR) { status = KS_STATUS_SUCCESS; } #else int flags = fcntl(socket, F_GETFL, 0); if (opt) { flags |= O_NONBLOCK; } else { flags &= ~O_NONBLOCK; } if (fcntl(socket, F_SETFL, flags) != -1) { status = KS_STATUS_SUCCESS; } #endif } break; case IPV6_V6ONLY: #ifdef WIN32 //#warning make sure windows works like linux for IPV6 to IPV4 automapping stuff result = setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, (char *)&opt, sizeof(opt)); #else result = setsockopt(socket, SOL_IPV6, IPV6_V6ONLY, &opt, sizeof(opt)); #endif if (!result) status = KS_STATUS_SUCCESS; break; default: break; } return status; } KS_DECLARE(ks_status_t) ks_socket_sndbuf(ks_socket_t socket, int bufsize) { int result; ks_status_t status = KS_STATUS_FAIL; #ifdef WIN32 result = setsockopt(socket, SOL_SOCKET, SO_SNDBUF, (char *) &bufsize, sizeof(bufsize)); #else result = setsockopt(socket, SOL_SOCKET, SO_SNDBUF, &bufsize, sizeof(bufsize)); #endif if (!result) status = KS_STATUS_SUCCESS; return status; } KS_DECLARE(ks_status_t) ks_socket_rcvbuf(ks_socket_t socket, int bufsize) { int result; ks_status_t status = KS_STATUS_FAIL; #ifdef WIN32 result = setsockopt(socket, SOL_SOCKET, SO_RCVBUF, (char *) &bufsize, sizeof(bufsize)); #else result = setsockopt(socket, SOL_SOCKET, SO_RCVBUF, &bufsize, sizeof(bufsize)); #endif if (!result) status = KS_STATUS_SUCCESS; return status; } static int ks_socket_reuseaddr(ks_socket_t socket) { #ifdef WIN32 BOOL reuse_addr = TRUE; return setsockopt(socket, SOL_SOCKET, SO_REUSEADDR, (char *) &reuse_addr, sizeof(reuse_addr)); #else int reuse_addr = 1; return setsockopt(socket, SOL_SOCKET, SO_REUSEADDR, &reuse_addr, sizeof(reuse_addr)); #endif } KS_DECLARE(ks_status_t) ks_socket_shutdown(ks_socket_t sock, int how) { return shutdown(sock, how) ? KS_STATUS_FAIL : KS_STATUS_SUCCESS; } KS_DECLARE(ks_status_t) ks_socket_close(ks_socket_t *sock) { ks_assert(sock); if (*sock != KS_SOCK_INVALID) { closesocket(*sock); *sock = KS_SOCK_INVALID; return KS_STATUS_SUCCESS; } return KS_STATUS_FAIL; } KS_DECLARE(ks_socket_t) ks_socket_connect(int type, int protocol, ks_sockaddr_t *addr) { return ks_socket_connect_ex(type, protocol, addr, 0); } KS_DECLARE(ks_socket_t) ks_socket_connect_ex(int type, int protocol, ks_sockaddr_t *addr, uint32_t nb_timeout) { ks_socket_t sock = KS_SOCK_INVALID; int32_t poll_flags = 0; ks_assert(addr); ks_assert(addr->family == AF_INET || addr->family == AF_INET6); if ((sock = socket(addr->family, type, protocol)) == KS_SOCK_INVALID) { return KS_SOCK_INVALID; } if (nb_timeout > 0) { if (ks_socket_option(sock, KS_SO_NONBLOCK, KS_TRUE) != KS_STATUS_SUCCESS) { ks_socket_close(&sock); return KS_SOCK_INVALID; } } if (addr->family == AF_INET) { if (connect(sock, (struct sockaddr *)&addr->v.v4, sizeof(addr->v.v4))) { if (!ks_errno_is_blocking(ks_errno())) { ks_socket_close(&sock); return KS_SOCK_INVALID; } } } else { if (connect(sock, (struct sockaddr *)&addr->v.v6, sizeof(addr->v.v6))) { if (!ks_errno_is_blocking(ks_errno())) { ks_socket_close(&sock); return KS_SOCK_INVALID; } } } if (nb_timeout > 0) { poll_flags = ks_wait_sock(sock, nb_timeout, KS_POLL_READ | KS_POLL_WRITE); if (poll_flags & KS_POLL_ERROR) { ks_socket_close(&sock); return KS_SOCK_INVALID; } if (!(poll_flags & (KS_POLL_READ | KS_POLL_WRITE))) { ks_socket_close(&sock); return KS_SOCK_INVALID; } if (ks_socket_option(sock, KS_SO_NONBLOCK, KS_FALSE) != KS_STATUS_SUCCESS) { ks_socket_close(&sock); return KS_SOCK_INVALID; } } return sock; } KS_DECLARE(ks_status_t) ks_addr_bind(ks_socket_t server_sock, const ks_sockaddr_t *addr) { ks_status_t status = KS_STATUS_SUCCESS; ks_assert(addr); ks_assert(addr->family == AF_INET || addr->family == AF_INET6); if (addr->family == AF_INET) { if (bind(server_sock, (struct sockaddr *) &addr->v.v4, sizeof(addr->v.v4)) < 0) { status = KS_STATUS_FAIL; } } else { if (bind(server_sock, (struct sockaddr *) &addr->v.v6, sizeof(addr->v.v6)) < 0) { status = KS_STATUS_FAIL; } } return status; } KS_DECLARE(const char *) ks_addr_get_host(ks_sockaddr_t *addr) { ks_assert(addr); ks_assert(addr->family == AF_INET || addr->family == AF_INET6); if (addr->family == AF_INET) { inet_ntop(AF_INET, &addr->v.v4.sin_addr, addr->host, sizeof(addr->host)); } else { inet_ntop(AF_INET6, &addr->v.v6.sin6_addr, addr->host, sizeof(addr->host)); } return (const char *) addr->host; } KS_DECLARE(ks_port_t) ks_addr_get_port(ks_sockaddr_t *addr) { ks_assert(addr); ks_assert(addr->family == AF_INET || addr->family == AF_INET6); if (addr->family == AF_INET) { addr->port = ntohs(addr->v.v4.sin_port); } else { addr->port = ntohs(addr->v.v6.sin6_port); } return addr->port; } KS_DECLARE(int) ks_addr_cmp(const ks_sockaddr_t *sa1, const ks_sockaddr_t *sa2) { if (!(sa1 && sa2)) { return 0; } if (sa1->family != sa2->family) { return 0; } switch (sa1->family) { case AF_INET: return (sa1->v.v4.sin_addr.s_addr == sa2->v.v4.sin_addr.s_addr && sa1->v.v4.sin_port == sa2->v.v4.sin_port); case AF_INET6: { int i; if (sa1->v.v6.sin6_port != sa2->v.v6.sin6_port) { return 0; } for (i = 0; i < 4; i++) { if (*((int32_t *) &sa1->v.v6.sin6_addr + i) != *((int32_t *) &sa2->v.v6.sin6_addr + i)) { return 0; } } return 1; } } return 0; } KS_DECLARE(ks_status_t) ks_addr_copy(ks_sockaddr_t *addr, const ks_sockaddr_t *src_addr) { ks_status_t status = KS_STATUS_SUCCESS; ks_assert(addr); ks_assert(src_addr); ks_assert(src_addr->family == AF_INET || src_addr->family == AF_INET6); addr->family = src_addr->family; if (src_addr->family == AF_INET) { memcpy(&addr->v.v4, &src_addr->v.v4, sizeof(src_addr->v.v4)); } else { memcpy(&addr->v.v6, &src_addr->v.v6, sizeof(src_addr->v.v6)); } ks_addr_get_host(addr); ks_addr_get_port(addr); return status; } KS_DECLARE(ks_status_t) ks_addr_set(ks_sockaddr_t *addr, const char *host, ks_port_t port, int family) { ks_status_t status = KS_STATUS_SUCCESS; ks_assert(addr); if (family != PF_INET && family != PF_INET6) family = PF_INET; if (host && strchr(host, ':')) family = PF_INET6; memset(addr, 0, sizeof(*addr)); if (family == PF_INET) { addr->family = AF_INET; addr->v.v4.sin_family = AF_INET; addr->v.v4.sin_addr.s_addr = host ? inet_addr(host): htonl(INADDR_ANY); addr->v.v4.sin_port = htons(port); } else { addr->family = AF_INET6; addr->v.v6.sin6_family = AF_INET6; addr->v.v6.sin6_port = htons(port); if (host) { inet_pton(AF_INET6, host, &(addr->v.v6.sin6_addr)); } else { addr->v.v6.sin6_addr = in6addr_any; } } ks_addr_get_host(addr); ks_addr_get_port(addr); return status; } KS_DECLARE(ks_status_t) ks_addr_set_raw(ks_sockaddr_t *addr, const void *data, ks_port_t port, int family) { ks_status_t status = KS_STATUS_SUCCESS; ks_assert(addr); if (family != PF_INET && family != PF_INET6) family = PF_INET; memset(addr, 0, sizeof(*addr)); if (family == PF_INET) { addr->family = AF_INET; addr->v.v4.sin_family = AF_INET; memcpy(&(addr->v.v4.sin_addr), data, 4); addr->v.v4.sin_port = htons(port); } else { addr->family = AF_INET6; addr->v.v6.sin6_family = AF_INET6; addr->v.v6.sin6_port = htons(port); memcpy(&(addr->v.v6.sin6_addr), data, 16); } ks_addr_get_host(addr); ks_addr_get_port(addr); return status; } KS_DECLARE(ks_status_t) ks_listen_sock(ks_socket_t server_sock, ks_sockaddr_t *addr, int backlog, ks_listen_callback_t callback, void *user_data) { ks_status_t status = KS_STATUS_SUCCESS; ks_socket_reuseaddr(server_sock); if (ks_addr_bind(server_sock, addr) != KS_STATUS_SUCCESS) { status = KS_STATUS_FAIL; goto end; } if (!backlog) backlog = 10000; if (listen(server_sock, backlog) < 0) { status = KS_STATUS_FAIL; goto end; } for (;;) { ks_socket_t client_sock; ks_sockaddr_t remote_addr = {0}; socklen_t slen = 0; if (addr->family == PF_INET) { slen = sizeof(remote_addr.v.v4); if ((client_sock = accept(server_sock, (struct sockaddr *) &remote_addr.v.v4, &slen)) == KS_SOCK_INVALID) { status = KS_STATUS_FAIL; goto end; } remote_addr.family = AF_INET; } else { slen = sizeof(remote_addr.v.v6); if ((client_sock = accept(server_sock, (struct sockaddr *) &remote_addr.v.v6, &slen)) == KS_SOCK_INVALID) { status = KS_STATUS_FAIL; goto end; } remote_addr.family = AF_INET6; } ks_addr_get_host(&remote_addr); ks_addr_get_port(&remote_addr); callback(server_sock, client_sock, &remote_addr, user_data); } end: if (server_sock != KS_SOCK_INVALID) { ks_socket_shutdown(server_sock, 2); ks_socket_close(&server_sock); server_sock = KS_SOCK_INVALID; } return status; } KS_DECLARE(ks_status_t) ks_listen(const char *host, ks_port_t port, int family, int backlog, ks_listen_callback_t callback, void *user_data) { ks_socket_t server_sock = KS_SOCK_INVALID; ks_sockaddr_t addr = { 0 }; if (family != PF_INET && family != PF_INET6) family = PF_INET; if (host && strchr(host, ':')) family = PF_INET6; if (ks_addr_set(&addr, host, port, family) != KS_STATUS_SUCCESS) { return KS_STATUS_FAIL; } if ((server_sock = socket(family, SOCK_STREAM, IPPROTO_TCP)) == KS_SOCK_INVALID) { return KS_STATUS_FAIL; } return ks_listen_sock(server_sock, &addr, backlog, callback, user_data); } KS_DECLARE(int) ks_poll(struct pollfd fds[], uint32_t nfds, int timeout) { #ifdef WIN32 int ret = WSAPoll(fds, nfds, timeout); if (ret == SOCKET_ERROR) { ret = WSAGetLastError(); } return ret; #else return poll(fds, nfds, timeout); #endif } #ifdef KS_USE_SELECT #ifdef WIN32 #pragma warning( push ) #pragma warning( disable : 6262 ) /* warning C6262: Function uses '98348' bytes of stack: exceeds /analyze:stacksize'16384'. Consider moving some data to heap */ #endif KS_DECLARE(int) ks_wait_sock(ks_socket_t sock, uint32_t ms, ks_poll_t flags) { int s = 0, r = 0; fd_set rfds; fd_set wfds; fd_set efds; struct timeval tv; if (sock == KS_SOCK_INVALID) { return KS_POLL_INVALID; } FD_ZERO(&rfds); FD_ZERO(&wfds); FD_ZERO(&efds); #ifndef WIN32 /* Wouldn't you rather know?? */ assert(sock <= FD_SETSIZE); #endif if ((flags & KS_POLL_READ)) { #ifdef WIN32 #pragma warning( push ) #pragma warning( disable : 4127 ) #pragma warning( disable : 4548 ) FD_SET(sock, &rfds); #pragma warning( pop ) #else FD_SET(sock, &rfds); #endif } if ((flags & KS_POLL_WRITE)) { #ifdef WIN32 #pragma warning( push ) #pragma warning( disable : 4127 ) #pragma warning( disable : 4548 ) FD_SET(sock, &wfds); #pragma warning( pop ) #else FD_SET(sock, &wfds); #endif } if ((flags & KS_POLL_ERROR)) { #ifdef WIN32 #pragma warning( push ) #pragma warning( disable : 4127 ) #pragma warning( disable : 4548 ) FD_SET(sock, &efds); #pragma warning( pop ) #else FD_SET(sock, &efds); #endif } tv.tv_sec = ms / 1000; tv.tv_usec = (ms % 1000) * ms; s = select((int)sock + 1, (flags & KS_POLL_READ) ? &rfds : NULL, (flags & KS_POLL_WRITE) ? &wfds : NULL, (flags & KS_POLL_ERROR) ? &efds : NULL, &tv); if (s < 0) { r = s; } else if (s > 0) { if ((flags & KS_POLL_READ) && FD_ISSET(sock, &rfds)) { r |= KS_POLL_READ; } if ((flags & KS_POLL_WRITE) && FD_ISSET(sock, &wfds)) { r |= KS_POLL_WRITE; } if ((flags & KS_POLL_ERROR) && FD_ISSET(sock, &efds)) { r |= KS_POLL_ERROR; } } return r; } #ifdef WIN32 #pragma warning( pop ) #endif #endif #if defined(KS_USE_POLL) || defined(WIN32) KS_DECLARE(int) ks_wait_sock(ks_socket_t sock, uint32_t ms, ks_poll_t flags) { struct pollfd pfds[2] = { {0} }; int s = 0, r = 0; if (sock == KS_SOCK_INVALID) { return KS_POLL_INVALID; } pfds[0].fd = sock; if ((flags & KS_POLL_READ)) { pfds[0].events |= POLLIN; } if ((flags & KS_POLL_WRITE)) { pfds[0].events |= POLLOUT; } if ((flags & KS_POLL_RDNORM)) { pfds[0].events |= POLLRDNORM; } if ((flags & KS_POLL_RDBAND)) { pfds[0].events |= POLLRDBAND; } if ((flags & KS_POLL_PRI)) { pfds[0].events |= POLLPRI; } s = ks_poll(pfds, 1, ms); if (s < 0) { r = s; } else if (s > 0) { if ((pfds[0].revents & POLLIN)) { r |= KS_POLL_READ; } if ((pfds[0].revents & POLLOUT)) { r |= KS_POLL_WRITE; } if ((pfds[0].revents & POLLERR)) { r |= KS_POLL_ERROR; } if ((pfds[0].revents & POLLHUP)) { r |= KS_POLL_HUP; } if ((pfds[0].revents & POLLRDNORM)) { r |= KS_POLL_RDNORM; } if ((pfds[0].revents & POLLRDBAND)) { r |= KS_POLL_RDBAND; } if ((pfds[0].revents & POLLPRI)) { r |= KS_POLL_PRI; } if ((pfds[0].revents & POLLNVAL)) { r |= KS_POLL_INVALID; } } return r; } #endif #ifdef HAVE_GETIFADDRS #include static int get_netmask(struct sockaddr_in *me, int *mask) { struct ifaddrs *ifaddrs, *i = NULL; if (!me || getifaddrs(&ifaddrs) < 0) { return -1; } for (i = ifaddrs; i; i = i->ifa_next) { struct sockaddr_in *s = (struct sockaddr_in *) i->ifa_addr; struct sockaddr_in *m = (struct sockaddr_in *) i->ifa_netmask; if (s && m && s->sin_family == AF_INET && s->sin_addr.s_addr == me->sin_addr.s_addr) { *mask = m->sin_addr.s_addr; freeifaddrs(ifaddrs); return 0; } } freeifaddrs(ifaddrs); return -2; } #elif defined(__linux__) #include #include static int get_netmask(struct sockaddr_in *me, int *mask) { static struct ifreq ifreqs[20] = { {{{0}}} }; struct ifconf ifconf; int nifaces, i; int sock; int r = -1; memset(&ifconf, 0, sizeof(ifconf)); ifconf.ifc_buf = (char *) (ifreqs); ifconf.ifc_len = sizeof(ifreqs); if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { goto end; } if (ioctl(sock, SIOCGIFCONF, (char *) &ifconf) < 0) { goto end; } nifaces = ifconf.ifc_len / sizeof(struct ifreq); for (i = 0; i < nifaces; i++) { struct sockaddr_in *sin = NULL; struct in_addr ip; ioctl(sock, SIOCGIFADDR, &ifreqs[i]); sin = (struct sockaddr_in *) &ifreqs[i].ifr_addr; ip = sin->sin_addr; if (ip.s_addr == me->sin_addr.s_addr) { ioctl(sock, SIOCGIFNETMASK, &ifreqs[i]); sin = (struct sockaddr_in *) &ifreqs[i].ifr_addr; /* mask = sin->sin_addr; */ *mask = sin->sin_addr.s_addr; r = 0; break; } } end: close(sock); return r; } #elif defined(WIN32) static int get_netmask(struct sockaddr_in *me, int *mask) { SOCKET sock = WSASocket(AF_INET, SOCK_DGRAM, 0, 0, 0, 0); INTERFACE_INFO interfaces[20]; unsigned long bytes; int interface_count, x; int r = -1; *mask = 0; if (sock == SOCKET_ERROR) { return -1; } if (WSAIoctl(sock, SIO_GET_INTERFACE_LIST, 0, 0, &interfaces, sizeof(interfaces), &bytes, 0, 0) == SOCKET_ERROR) { r = -1; goto end; } interface_count = bytes / sizeof(INTERFACE_INFO); for (x = 0; x < interface_count; ++x) { struct sockaddr_in *addr = (struct sockaddr_in *) &(interfaces[x].iiAddress); if (addr->sin_addr.s_addr == me->sin_addr.s_addr) { struct sockaddr_in *netmask = (struct sockaddr_in *) &(interfaces[x].iiNetmask); *mask = netmask->sin_addr.s_addr; r = 0; break; } } end: closesocket(sock); return r; } #else static int get_netmask(struct sockaddr_in *me, int *mask) { return -1; } #endif KS_DECLARE(ks_status_t) ks_ip_route(char *buf, int len, const char *route_ip) { int family = AF_INET; ks_assert(route_ip); if (strchr(route_ip, ':')) { family = AF_INET6; } return ks_find_local_ip(buf, len, NULL, family, route_ip); } KS_DECLARE(ks_status_t) ks_find_local_ip(char *buf, int len, int *mask, int family, const char *route_ip) { ks_status_t status = KS_STATUS_FAIL; char *base = (char *)route_ip; #ifdef WIN32 SOCKET tmp_socket; SOCKADDR_STORAGE l_address; int l_address_len; struct addrinfo *address_info = NULL; #else #ifdef __Darwin__ int ilen; #else unsigned int ilen; #endif int tmp_socket = -1, on = 1; char abuf[25] = ""; #endif if (len < 16) { return status; } switch (family) { case AF_INET: ks_copy_string(buf, "127.0.0.1", len); if (!base) { base = "82.45.148.209"; } break; case AF_INET6: ks_copy_string(buf, "::1", len); if (!base) { base = "2001:503:BA3E::2:30"; /* DNS Root server A */ } break; default: base = "127.0.0.1"; break; } #ifdef WIN32 tmp_socket = socket(family, SOCK_DGRAM, 0); getaddrinfo(base, NULL, NULL, &address_info); if (!address_info || WSAIoctl(tmp_socket, SIO_ROUTING_INTERFACE_QUERY, address_info->ai_addr, (DWORD) address_info->ai_addrlen, &l_address, sizeof(l_address), (LPDWORD) & l_address_len, NULL, NULL)) { closesocket(tmp_socket); if (address_info) freeaddrinfo(address_info); return status; } closesocket(tmp_socket); freeaddrinfo(address_info); if (!getnameinfo((const struct sockaddr *) &l_address, l_address_len, buf, len, NULL, 0, NI_NUMERICHOST)) { status = KS_STATUS_SUCCESS; if (mask && family == AF_INET) { get_netmask((struct sockaddr_in *) &l_address, mask); } } #else switch (family) { case AF_INET: { struct sockaddr_in iface_out; struct sockaddr_in remote; memset(&remote, 0, sizeof(struct sockaddr_in)); remote.sin_family = AF_INET; remote.sin_addr.s_addr = inet_addr(base); remote.sin_port = htons(4242); memset(&iface_out, 0, sizeof(iface_out)); if ( (tmp_socket = socket(AF_INET, SOCK_DGRAM, 0)) == -1 ) { goto doh; } if (setsockopt(tmp_socket, SOL_SOCKET, SO_BROADCAST, &on, sizeof(on)) == -1) { goto doh; } if (connect(tmp_socket, (struct sockaddr *) &remote, sizeof(struct sockaddr_in)) == -1) { goto doh; } ilen = sizeof(iface_out); if (getsockname(tmp_socket, (struct sockaddr *) &iface_out, &ilen) == -1) { goto doh; } if (iface_out.sin_addr.s_addr == 0) { goto doh; } getnameinfo((struct sockaddr *) &iface_out, sizeof(iface_out), abuf, sizeof(abuf), NULL, 0, NI_NUMERICHOST); ks_copy_string(buf, abuf, len); if (mask && family == AF_INET) { get_netmask((struct sockaddr_in *) &iface_out, mask); } status = KS_STATUS_SUCCESS; } break; case AF_INET6: { struct sockaddr_in6 iface_out; struct sockaddr_in6 remote; memset(&remote, 0, sizeof(struct sockaddr_in6)); remote.sin6_family = AF_INET6; inet_pton(AF_INET6, base, &remote.sin6_addr); remote.sin6_port = htons(4242); memset(&iface_out, 0, sizeof(iface_out)); if ( (tmp_socket = socket(AF_INET6, SOCK_DGRAM, 0)) == -1 ) { goto doh; } if (connect(tmp_socket, (struct sockaddr *) &remote, sizeof(remote)) == -1) { goto doh; } ilen = sizeof(iface_out); if (getsockname(tmp_socket, (struct sockaddr *) &iface_out, &ilen) == -1) { goto doh; } inet_ntop(AF_INET6, (const void *) &iface_out.sin6_addr, buf, len - 1); status = KS_STATUS_SUCCESS; } break; } doh: if (tmp_socket > 0) { close(tmp_socket); } #endif return status; } KS_DECLARE(ks_status_t) ks_addr_raw_data(const ks_sockaddr_t *addr, void **data, ks_size_t *datalen) { ks_assert(addr->family == AF_INET || addr->family == AF_INET6); if (addr->family == AF_INET) { *data = (void *)&addr->v.v4.sin_addr; *datalen = 4; } else { *data = (void *)&addr->v.v6.sin6_addr; *datalen = 16; } return KS_STATUS_SUCCESS; } KS_DECLARE(ks_status_t) ks_socket_send(ks_socket_t sock, void *data, ks_size_t *datalen) { ks_ssize_t r; ks_status_t status = KS_STATUS_FAIL; do { #ifdef WIN32 r = send(sock, data, (int)*datalen, 0); #else r = send(sock, data, *datalen, 0); #endif } while (r == -1 && ks_errno_is_interupt(ks_errno())); if (r > 0) { *datalen = (ks_size_t) r; status = KS_STATUS_SUCCESS; } else if (r == 0) { status = KS_STATUS_DISCONNECTED; } else if (ks_errno_is_blocking(ks_errno())) { status = KS_STATUS_BREAK; } return status; } KS_DECLARE(ks_status_t) ks_socket_recv(ks_socket_t sock, void *data, ks_size_t *datalen) { ks_ssize_t r; ks_status_t status = KS_STATUS_FAIL; do { #ifdef WIN32 r = recv(sock, data, (int)*datalen, 0); #else r = recv(sock, data, *datalen, 0); #endif } while (r == -1 && ks_errno_is_interupt(ks_errno())); if (r > 0) { *datalen = (ks_size_t) r; status = KS_STATUS_SUCCESS; } else if (r == 0) { status = KS_STATUS_DISCONNECTED; } else if (ks_errno_is_blocking(ks_errno())) { status = KS_STATUS_BREAK; } return status; } KS_DECLARE(ks_status_t) ks_socket_sendto(ks_socket_t sock, void *data, ks_size_t *datalen, ks_sockaddr_t *addr) { struct sockaddr *sockaddr; socklen_t socksize = 0; ks_status_t status = KS_STATUS_FAIL; ks_ssize_t r; ks_assert(addr); ks_assert(addr->family == AF_INET || addr->family == AF_INET6); if (addr->family == AF_INET) { sockaddr = (struct sockaddr *) &addr->v.v4; socksize = sizeof(addr->v.v4); } else { sockaddr = (struct sockaddr *) &addr->v.v6; socksize = sizeof(addr->v.v6); } do { #ifdef WIN32 r = sendto(sock, data, (int)*datalen, 0, sockaddr, socksize); #else r = sendto(sock, data, *datalen, 0, sockaddr, socksize); #endif } while (r == -1 && ks_errno_is_interupt(ks_errno())); if (r > 0) { *datalen = (ks_size_t) r; status = KS_STATUS_SUCCESS; } else if (r == 0) { status = KS_STATUS_DISCONNECTED; } else if (ks_errno_is_blocking(ks_errno())) { status = KS_STATUS_BREAK; } return status; } KS_DECLARE(ks_status_t) ks_socket_recvfrom(ks_socket_t sock, void *data, ks_size_t *datalen, ks_sockaddr_t *addr) { struct sockaddr *sockaddr; ks_status_t status = KS_STATUS_FAIL; ks_ssize_t r; socklen_t alen; ks_assert(addr); ks_assert(addr->family == AF_INET || addr->family == AF_INET6); if (addr->family == AF_INET) { sockaddr = (struct sockaddr *) &addr->v.v4; alen = sizeof(addr->v.v4); } else { sockaddr = (struct sockaddr *) &addr->v.v6; alen = sizeof(addr->v.v6); } do { #ifdef WIN32 r = recvfrom(sock, data, (int)*datalen, 0, sockaddr, &alen); #else r = recvfrom(sock, data, *datalen, 0, sockaddr, &alen); #endif } while (r == -1 && ks_errno_is_interupt(ks_errno())); if (r > 0) { ks_addr_get_host(addr); ks_addr_get_port(addr); *datalen = (ks_size_t) r; status = KS_STATUS_SUCCESS; } else if (r == 0) { status = KS_STATUS_DISCONNECTED; } else if (ks_errno_is_blocking(ks_errno())) { status = KS_STATUS_BREAK; } return status; } KS_DECLARE(ks_status_t) ks_addr_getbyname(const char *name, ks_port_t port, int family, ks_sockaddr_t *result) { ks_status_t ret = KS_STATUS_SUCCESS; struct addrinfo hints; struct addrinfo *res = NULL; int eai = 0; ks_assert(name); ks_assert(result); memset((void *)&hints, 0, sizeof(struct addrinfo)); hints.ai_family = family; eai = getaddrinfo(name, NULL, &hints, &res); if (eai == EAI_NONAME) ret = KS_STATUS_NOT_FOUND; else if (eai != 0) ret = KS_STATUS_FAIL; else { ks_assert(res); ks_addr_set_raw(result, &((struct sockaddr_in *)res->ai_addr)->sin_addr, port, res->ai_family); } if (res) freeaddrinfo(res); return ret; }