mirror of
				https://github.com/python/cpython.git
				synced 2025-10-31 05:31:20 +00:00 
			
		
		
		
	 885d457709
			
		
	
	
		885d457709
		
	
	
	
	
		
			
			Also changed <>-style #includes to ""-style in some places where the former didn't make sense.
		
			
				
	
	
		
			3762 lines
		
	
	
	
		
			92 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			3762 lines
		
	
	
	
		
			92 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* Socket module */
 | |
| 
 | |
| /* SSL support based on patches by Brian E Gallew and Laszlo Kovacs */
 | |
| 
 | |
| /*
 | |
| This module provides an interface to Berkeley socket IPC.
 | |
| 
 | |
| Limitations:
 | |
| 
 | |
| - only AF_INET, AF_INET6 and AF_UNIX address families are supported in a
 | |
|   portable manner, though AF_PACKET is supported under Linux.
 | |
| - no read/write operations (use sendall/recv or makefile instead)
 | |
| - additional restrictions apply on Windows (compensated for by socket.py)
 | |
| 
 | |
| Module interface:
 | |
| 
 | |
| - socket.error: exception raised for socket specific errors
 | |
| - socket.gaierror: exception raised for getaddrinfo/getnameinfo errors,
 | |
| 	a subclass of socket.error
 | |
| - socket.herror: exception raised for gethostby* errors,
 | |
| 	a subclass of socket.error
 | |
| - socket.gethostbyname(hostname) --> host IP address (string: 'dd.dd.dd.dd')
 | |
| - socket.gethostbyaddr(IP address) --> (hostname, [alias, ...], [IP addr, ...])
 | |
| - socket.gethostname() --> host name (string: 'spam' or 'spam.domain.com')
 | |
| - socket.getprotobyname(protocolname) --> protocol number
 | |
| - socket.getservbyname(servicename, protocolname) --> port number
 | |
| - socket.socket(family, type [, proto]) --> new socket object
 | |
| - socket.ntohs(16 bit value) --> new int object
 | |
| - socket.ntohl(32 bit value) --> new int object
 | |
| - socket.htons(16 bit value) --> new int object
 | |
| - socket.htonl(32 bit value) --> new int object
 | |
| - socket.getaddrinfo(host, port [, family, socktype, proto, flags])
 | |
| 	--> List of (family, socktype, proto, canonname, sockaddr)
 | |
| - socket.getnameinfo(sockaddr, flags) --> (host, port)
 | |
| - socket.AF_INET, socket.SOCK_STREAM, etc.: constants from <socket.h>
 | |
| - socket.inet_aton(IP address) -> 32-bit packed IP representation
 | |
| - socket.inet_ntoa(packed IP) -> IP address string
 | |
| - socket.ssl(socket, keyfile, certfile) -> new ssl object
 | |
| - an Internet socket address is a pair (hostname, port)
 | |
|   where hostname can be anything recognized by gethostbyname()
 | |
|   (including the dd.dd.dd.dd notation) and port is in host byte order
 | |
| - where a hostname is returned, the dd.dd.dd.dd notation is used
 | |
| - a UNIX domain socket address is a string specifying the pathname
 | |
| - an AF_PACKET socket address is a tuple containing a string
 | |
|   specifying the ethernet interface and an integer specifying
 | |
|   the Ethernet protocol number to be received. For example:
 | |
|   ("eth0",0x1234).  Optional 3rd,4th,5th elements in the tuple
 | |
|   specify packet-type and ha-type/addr -- these are ignored by
 | |
|   networking code, but accepted since they are returned by the
 | |
|   getsockname() method.
 | |
| 
 | |
| Socket methods:
 | |
| 
 | |
| - s.accept() --> new socket object, sockaddr
 | |
| - s.bind(sockaddr) --> None
 | |
| - s.close() --> None
 | |
| - s.connect(sockaddr) --> None
 | |
| - s.connect_ex(sockaddr) --> 0 or errno (handy for e.g. async connect)
 | |
| - s.fileno() --> file descriptor
 | |
| - s.dup() --> same as socket.fromfd(os.dup(s.fileno(), ...)
 | |
| - s.getpeername() --> sockaddr
 | |
| - s.getsockname() --> sockaddr
 | |
| - s.getsockopt(level, optname[, buflen]) --> int or string
 | |
| - s.listen(backlog) --> None
 | |
| - s.makefile([mode[, bufsize]]) --> file object
 | |
| - s.recv(buflen [,flags]) --> string
 | |
| - s.recvfrom(buflen [,flags]) --> string, sockaddr
 | |
| - s.send(string [,flags]) --> nbytes
 | |
| - s.sendall(string [,flags]) # tries to send everything in a loop
 | |
| - s.sendto(string, [flags,] sockaddr) --> nbytes
 | |
| - s.setblocking(0 | 1) --> None
 | |
| - s.setsockopt(level, optname, value) --> None
 | |
| - s.shutdown(how) --> None
 | |
| - repr(s) --> "<socket object, fd=%d, family=%d, type=%d, protocol=%d>"
 | |
| 
 | |
| */
 | |
| 
 | |
| #include "Python.h"
 | |
| 
 | |
| /* XXX This is a terrible mess of of platform-dependent preprocessor hacks.
 | |
|    I hope some day someone can clean this up please... */
 | |
| 
 | |
| /* Hacks for gethostbyname_r().  On some non-Linux platforms, the configure
 | |
|    script doesn't get this right, so we hardcode some platform checks below.
 | |
|    On the other hand, not all Linux versions agree, so there the settings
 | |
|    computed by the configure script are needed! */
 | |
| 
 | |
| #ifndef linux
 | |
| #undef HAVE_GETHOSTBYNAME_R_3_ARG
 | |
| #undef HAVE_GETHOSTBYNAME_R_5_ARG
 | |
| #undef HAVE_GETHOSTBYNAME_R_6_ARG
 | |
| #endif
 | |
| 
 | |
| #ifndef WITH_THREAD
 | |
| #undef HAVE_GETHOSTBYNAME_R
 | |
| #endif
 | |
| 
 | |
| #ifdef HAVE_GETHOSTBYNAME_R
 | |
| #if defined(_AIX) || defined(__osf__)
 | |
| #define HAVE_GETHOSTBYNAME_R_3_ARG
 | |
| #elif defined(__sun) || defined(__sgi)
 | |
| #define HAVE_GETHOSTBYNAME_R_5_ARG
 | |
| #elif defined(linux)
 | |
| /* Rely on the configure script */
 | |
| #else
 | |
| #undef HAVE_GETHOSTBYNAME_R
 | |
| #endif
 | |
| #endif
 | |
| 
 | |
| #if !defined(HAVE_GETHOSTBYNAME_R) && defined(WITH_THREAD) && !defined(MS_WINDOWS)
 | |
| #define USE_GETHOSTBYNAME_LOCK
 | |
| #endif
 | |
| 
 | |
| #ifdef USE_GETHOSTBYNAME_LOCK
 | |
| #include "pythread.h"
 | |
| #endif
 | |
| 
 | |
| #ifdef HAVE_UNISTD_H
 | |
| #include <unistd.h>
 | |
| #endif
 | |
| 
 | |
| #if defined(PYCC_VACPP)
 | |
| #include <types.h>
 | |
| #include <io.h>
 | |
| #include <sys/ioctl.h>
 | |
| #include <utils.h>
 | |
| #include <ctype.h>
 | |
| #endif
 | |
| 
 | |
| #if defined(PYOS_OS2)
 | |
| #define  INCL_DOS
 | |
| #define  INCL_DOSERRORS
 | |
| #define  INCL_NOPMAPI
 | |
| #include <os2.h>
 | |
| #endif
 | |
| 
 | |
| 
 | |
| #include <sys/types.h>
 | |
| 
 | |
| #include <signal.h>
 | |
| #ifndef MS_WINDOWS
 | |
| #include <netdb.h>
 | |
| #include <sys/socket.h>
 | |
| #include <netinet/in.h>
 | |
| #if !(defined(__BEOS__) || defined(__CYGWIN__) || (defined(PYOS_OS2) && defined(PYCC_VACPP)))
 | |
| #include <netinet/tcp.h>
 | |
| #endif
 | |
| 
 | |
| /* Headers needed for inet_ntoa() and inet_addr() */
 | |
| #ifdef __BEOS__
 | |
| #include <net/netdb.h>
 | |
| #elif defined(PYOS_OS2) && defined(PYCC_VACPP)
 | |
| #include <netdb.h>
 | |
| typedef size_t socklen_t;
 | |
| #else
 | |
| #ifndef USE_GUSI1
 | |
| #include <arpa/inet.h>
 | |
| #endif
 | |
| #endif
 | |
| 
 | |
| #ifndef RISCOS
 | |
| #include <fcntl.h>
 | |
| #else
 | |
| #include <sys/fcntl.h>
 | |
| #define NO_DUP
 | |
| int h_errno; /* not used */
 | |
| #endif
 | |
| #else
 | |
| #include <winsock.h>
 | |
| #include <fcntl.h>
 | |
| #endif
 | |
| 
 | |
| 
 | |
| #ifdef HAVE_SYS_UN_H
 | |
| #include <sys/un.h>
 | |
| #else
 | |
| #undef AF_UNIX
 | |
| #endif
 | |
| 
 | |
| #ifdef HAVE_NETPACKET_PACKET_H
 | |
| #include <sys/ioctl.h>
 | |
| #include <net/if.h>
 | |
| #include <netpacket/packet.h>
 | |
| #endif
 | |
| 
 | |
| #ifdef HAVE_STDDEF_H
 | |
| #include <stddef.h>
 | |
| #endif
 | |
| 
 | |
| #ifndef offsetof
 | |
| #define offsetof(type, member)	((size_t)(&((type *)0)->member))
 | |
| #endif
 | |
| 
 | |
| #ifndef O_NDELAY
 | |
| #define O_NDELAY O_NONBLOCK	/* For QNX only? */
 | |
| #endif
 | |
| 
 | |
| #ifdef USE_GUSI1
 | |
| /* fdopen() isn't declared in stdio.h (sigh) */
 | |
| #include <GUSI.h>
 | |
| #endif
 | |
| 
 | |
| #include "addrinfo.h"
 | |
| 
 | |
| #ifdef USE_SSL
 | |
| #include "openssl/rsa.h"
 | |
| #include "openssl/crypto.h"
 | |
| #include "openssl/x509.h"
 | |
| #include "openssl/pem.h"
 | |
| #include "openssl/ssl.h"
 | |
| #include "openssl/err.h"
 | |
| #include "openssl/rand.h"
 | |
| #endif /* USE_SSL */
 | |
| 
 | |
| #ifndef HAVE_INET_PTON
 | |
| int inet_pton (int af, const char *src, void *dst);
 | |
| const char *inet_ntop(int af, const void *src, char *dst, socklen_t size);
 | |
| #endif
 | |
| 
 | |
| #ifdef __APPLE__
 | |
| /* On OS X, getaddrinfo returns no error indication of lookup
 | |
|    failure, so we must use the emulation instead of the libinfo
 | |
|    implementation. Unfortunately, performing an autoconf test
 | |
|    for this bug would require DNS access for the machine performing
 | |
|    the configuration, which is not acceptable. Therefore, we
 | |
|    determine the bug just by checking for __APPLE__. If this bug
 | |
|    gets ever fixed, perhaps checking for sys/version.h would be
 | |
|    appropriate, which is 10/0 on the system with the bug. */
 | |
| #undef HAVE_GETADDRINFO
 | |
| /* avoid clashes with the C library definition of the symbol. */
 | |
| #define getaddrinfo fake_getaddrinfo
 | |
| #endif
 | |
| 
 | |
| /* I know this is a bad practice, but it is the easiest... */
 | |
| #if !defined(HAVE_GETADDRINFO)
 | |
| #include "getaddrinfo.c"
 | |
| #endif
 | |
| #if !defined(HAVE_GETNAMEINFO)
 | |
| #include "getnameinfo.c"
 | |
| #endif
 | |
| 
 | |
| #if defined(MS_WINDOWS) || defined(__BEOS__)
 | |
| /* BeOS suffers from the same socket dichotomy as Win32... - [cjh] */
 | |
| /* seem to be a few differences in the API */
 | |
| #define SOCKETCLOSE closesocket
 | |
| #define NO_DUP /* Actually it exists on NT 3.5, but what the heck... */
 | |
| #endif
 | |
| 
 | |
| /* abstract the socket file descriptor type */
 | |
| #ifdef MS_WINDOWS
 | |
| typedef SOCKET SOCKET_T;
 | |
| #	ifdef MS_WIN64
 | |
| #		define SIZEOF_SOCKET_T 8
 | |
| #	else
 | |
| #		define SIZEOF_SOCKET_T 4
 | |
| #	endif
 | |
| #else
 | |
| typedef int SOCKET_T;
 | |
| #	define SIZEOF_SOCKET_T SIZEOF_INT
 | |
| #endif
 | |
| 
 | |
| #ifdef MS_WIN32
 | |
| #	define EAFNOSUPPORT            WSAEAFNOSUPPORT
 | |
| #	define snprintf _snprintf
 | |
| #endif
 | |
| 
 | |
| #if defined(PYOS_OS2)
 | |
| #define SOCKETCLOSE soclose
 | |
| #define NO_DUP /* Sockets are Not Actual File Handles under OS/2 */
 | |
| #endif
 | |
| 
 | |
| #ifndef SOCKETCLOSE
 | |
| #define SOCKETCLOSE close
 | |
| #endif
 | |
| 
 | |
| 
 | |
| /* XXX There's a problem here: *static* functions are not supposed to have
 | |
|    a Py prefix (or use CapitalizedWords).  Later... */
 | |
| 
 | |
| /* Global variable holding the exception type for errors detected
 | |
|    by this module (but not argument type or memory errors, etc.). */
 | |
| 
 | |
| static PyObject *PySocket_Error;
 | |
| static PyObject *PyH_Error;
 | |
| static PyObject *PyGAI_Error;
 | |
| 
 | |
| #ifdef USE_SSL
 | |
| static PyObject *PySSLErrorObject;
 | |
| #endif /* USE_SSL */
 | |
| 
 | |
| 
 | |
| #ifdef RISCOS
 | |
| /* Global variable which is !=0 if Python is running in a RISC OS taskwindow */
 | |
| static int taskwindow;
 | |
| #endif
 | |
| 
 | |
| 
 | |
| /* Convenience function to raise an error according to errno
 | |
|    and return a NULL pointer from a function. */
 | |
| 
 | |
| static PyObject *
 | |
| PySocket_Err(void)
 | |
| {
 | |
| #ifdef MS_WINDOWS
 | |
| 	int err_no = WSAGetLastError();
 | |
| 	if (err_no) {
 | |
| 		static struct { int no; const char *msg; } *msgp, msgs[] = {
 | |
| 			{ WSAEINTR, "Interrupted system call" },
 | |
| 			{ WSAEBADF, "Bad file descriptor" },
 | |
| 			{ WSAEACCES, "Permission denied" },
 | |
| 			{ WSAEFAULT, "Bad address" },
 | |
| 			{ WSAEINVAL, "Invalid argument" },
 | |
| 			{ WSAEMFILE, "Too many open files" },
 | |
| 			{ WSAEWOULDBLOCK,
 | |
| 				"The socket operation could not complete "
 | |
| 				"without blocking" },
 | |
| 			{ WSAEINPROGRESS, "Operation now in progress" },
 | |
| 			{ WSAEALREADY, "Operation already in progress" },
 | |
| 			{ WSAENOTSOCK, "Socket operation on non-socket" },
 | |
| 			{ WSAEDESTADDRREQ, "Destination address required" },
 | |
| 			{ WSAEMSGSIZE, "Message too long" },
 | |
| 			{ WSAEPROTOTYPE, "Protocol wrong type for socket" },
 | |
| 			{ WSAENOPROTOOPT, "Protocol not available" },
 | |
| 			{ WSAEPROTONOSUPPORT, "Protocol not supported" },
 | |
| 			{ WSAESOCKTNOSUPPORT, "Socket type not supported" },
 | |
| 			{ WSAEOPNOTSUPP, "Operation not supported" },
 | |
| 			{ WSAEPFNOSUPPORT, "Protocol family not supported" },
 | |
| 			{ WSAEAFNOSUPPORT, "Address family not supported" },
 | |
| 			{ WSAEADDRINUSE, "Address already in use" },
 | |
| 			{ WSAEADDRNOTAVAIL,
 | |
| 				"Can't assign requested address" },
 | |
| 			{ WSAENETDOWN, "Network is down" },
 | |
| 			{ WSAENETUNREACH, "Network is unreachable" },
 | |
| 			{ WSAENETRESET,
 | |
| 				"Network dropped connection on reset" },
 | |
| 			{ WSAECONNABORTED,
 | |
| 				"Software caused connection abort" },
 | |
| 			{ WSAECONNRESET, "Connection reset by peer" },
 | |
| 			{ WSAENOBUFS, "No buffer space available" },
 | |
| 			{ WSAEISCONN, "Socket is already connected" },
 | |
| 			{ WSAENOTCONN, "Socket is not connected" },
 | |
| 			{ WSAESHUTDOWN, "Can't send after socket shutdown" },
 | |
| 			{ WSAETOOMANYREFS,
 | |
| 				"Too many references: can't splice" },
 | |
| 			{ WSAETIMEDOUT, "Operation timed out" },
 | |
| 			{ WSAECONNREFUSED, "Connection refused" },
 | |
| 			{ WSAELOOP, "Too many levels of symbolic links" },
 | |
| 			{ WSAENAMETOOLONG, "File name too long" },
 | |
| 			{ WSAEHOSTDOWN, "Host is down" },
 | |
| 			{ WSAEHOSTUNREACH, "No route to host" },
 | |
| 			{ WSAENOTEMPTY, "Directory not empty" },
 | |
| 			{ WSAEPROCLIM, "Too many processes" },
 | |
| 			{ WSAEUSERS, "Too many users" },
 | |
| 			{ WSAEDQUOT, "Disc quota exceeded" },
 | |
| 			{ WSAESTALE, "Stale NFS file handle" },
 | |
| 			{ WSAEREMOTE, "Too many levels of remote in path" },
 | |
| 			{ WSASYSNOTREADY,
 | |
| 				"Network subsystem is unvailable" },
 | |
| 			{ WSAVERNOTSUPPORTED,
 | |
| 				"WinSock version is not supported" },
 | |
| 			{ WSANOTINITIALISED,
 | |
| 				"Successful WSAStartup() not yet performed" },
 | |
| 			{ WSAEDISCON, "Graceful shutdown in progress" },
 | |
| 			/* Resolver errors */
 | |
| 			{ WSAHOST_NOT_FOUND, "No such host is known" },
 | |
| 			{ WSATRY_AGAIN, "Host not found, or server failed" },
 | |
| 			{ WSANO_RECOVERY,
 | |
| 				"Unexpected server error encountered" },
 | |
| 			{ WSANO_DATA, "Valid name without requested data" },
 | |
| 			{ WSANO_ADDRESS, "No address, look for MX record" },
 | |
| 			{ 0, NULL }
 | |
| 		};
 | |
| 		PyObject *v;
 | |
| 		const char *msg = "winsock error";
 | |
| 
 | |
| 		for (msgp = msgs; msgp->msg; msgp++) {
 | |
| 			if (err_no == msgp->no) {
 | |
| 				msg = msgp->msg;
 | |
| 				break;
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		v = Py_BuildValue("(is)", err_no, msg);
 | |
| 		if (v != NULL) {
 | |
| 			PyErr_SetObject(PySocket_Error, v);
 | |
| 			Py_DECREF(v);
 | |
| 		}
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	else
 | |
| #endif
 | |
| 
 | |
| #if defined(PYOS_OS2)
 | |
|     if (sock_errno() != NO_ERROR) {
 | |
|         APIRET rc;
 | |
|         ULONG  msglen;
 | |
|         char   outbuf[100];
 | |
|         int    myerrorcode = sock_errno();
 | |
| 
 | |
|         /* Retrieve Socket-Related Error Message from MPTN.MSG File */
 | |
|         rc = DosGetMessage(NULL, 0, outbuf, sizeof(outbuf),
 | |
|                            myerrorcode - SOCBASEERR + 26, "mptn.msg", &msglen);
 | |
|         if (rc == NO_ERROR) {
 | |
|             PyObject *v;
 | |
| 
 | |
|             outbuf[msglen] = '\0'; /* OS/2 Doesn't Guarantee a Terminator */
 | |
|             if (strlen(outbuf) > 0) { /* If Non-Empty Msg, Trim CRLF */
 | |
|                 char *lastc = &outbuf[ strlen(outbuf)-1 ];
 | |
|                 while (lastc > outbuf && isspace(*lastc))
 | |
|                     *lastc-- = '\0'; /* Trim Trailing Whitespace (CRLF) */
 | |
|             }
 | |
|             v = Py_BuildValue("(is)", myerrorcode, outbuf);
 | |
|             if (v != NULL) {
 | |
|                 PyErr_SetObject(PySocket_Error, v);
 | |
|                 Py_DECREF(v);
 | |
|             }
 | |
|             return NULL;
 | |
|         }
 | |
|     }
 | |
| #endif
 | |
| 
 | |
| 	return PyErr_SetFromErrno(PySocket_Error);
 | |
| }
 | |
| 
 | |
| 
 | |
| static PyObject *
 | |
| PyH_Err(int h_error)
 | |
| {
 | |
| 	PyObject *v;
 | |
| 
 | |
| #ifdef HAVE_HSTRERROR
 | |
| 	v = Py_BuildValue("(is)", h_error, (char *)hstrerror(h_error));
 | |
| #else
 | |
| 	v = Py_BuildValue("(is)", h_error, "host not found");
 | |
| #endif
 | |
| 	if (v != NULL) {
 | |
| 		PyErr_SetObject(PyH_Error, v);
 | |
| 		Py_DECREF(v);
 | |
| 	}
 | |
| 
 | |
| 	return NULL;
 | |
| }
 | |
| 
 | |
| 
 | |
| static PyObject *
 | |
| PyGAI_Err(int error)
 | |
| {
 | |
| 	PyObject *v;
 | |
| 
 | |
| 	if (error == EAI_SYSTEM)
 | |
| 		return PySocket_Err();
 | |
| 
 | |
| #ifdef HAVE_GAI_STRERROR
 | |
| 	v = Py_BuildValue("(is)", error, gai_strerror(error));
 | |
| #else
 | |
| 	v = Py_BuildValue("(is)", error, "getaddrinfo failed");
 | |
| #endif
 | |
| 	if (v != NULL) {
 | |
| 		PyErr_SetObject(PyGAI_Error, v);
 | |
| 		Py_DECREF(v);
 | |
| 	}
 | |
| 
 | |
| 	return NULL;
 | |
| }
 | |
| 
 | |
| 
 | |
| /* The object holding a socket.  It holds some extra information,
 | |
|    like the address family, which is used to decode socket address
 | |
|    arguments properly. */
 | |
| 
 | |
| typedef struct {
 | |
| 	PyObject_HEAD
 | |
| 	SOCKET_T sock_fd;	/* Socket file descriptor */
 | |
| 	int sock_family;	/* Address family, e.g., AF_INET */
 | |
| 	int sock_type;		/* Socket type, e.g., SOCK_STREAM */
 | |
| 	int sock_proto;		/* Protocol type, usually 0 */
 | |
| 	union sock_addr {
 | |
| 		struct sockaddr_in in;
 | |
| #ifdef AF_UNIX
 | |
| 		struct sockaddr_un un;
 | |
| #endif
 | |
| #ifdef INET6
 | |
| 		struct sockaddr_in6 in6;
 | |
| 		struct sockaddr_storage storage;
 | |
| #endif
 | |
| #ifdef HAVE_NETPACKET_PACKET_H
 | |
| 		struct sockaddr_ll ll;
 | |
| #endif
 | |
| 	} sock_addr;
 | |
| } PySocketSockObject;
 | |
| 
 | |
| #ifdef USE_SSL
 | |
| 
 | |
| #define X509_NAME_MAXLEN 256
 | |
| 
 | |
| typedef struct {
 | |
| 	PyObject_HEAD
 | |
| 	PySocketSockObject *Socket;	/* Socket on which we're layered */
 | |
| 	SSL_CTX* 	ctx;
 | |
| 	SSL*     	ssl;
 | |
| 	X509*    	server_cert;
 | |
| 	BIO*		sbio;
 | |
| 	char    	server[X509_NAME_MAXLEN];
 | |
| 	char		issuer[X509_NAME_MAXLEN];
 | |
| 
 | |
| } PySSLObject;
 | |
| 
 | |
| staticforward PyTypeObject PySSL_Type;
 | |
| staticforward PyObject *PySSL_SSLwrite(PySSLObject *self, PyObject *args);
 | |
| staticforward PyObject *PySSL_SSLread(PySSLObject *self, PyObject *args);
 | |
| 
 | |
| #define PySSLObject_Check(v)	((v)->ob_type == &PySSL_Type)
 | |
| 
 | |
| #endif /* USE_SSL */
 | |
| 
 | |
| /* A forward reference to the Socktype type object.
 | |
|    The Socktype variable contains pointers to various functions,
 | |
|    some of which call newsockobject(), which uses Socktype, so
 | |
|    there has to be a circular reference. */
 | |
| 
 | |
| staticforward PyTypeObject PySocketSock_Type;
 | |
| 
 | |
| 
 | |
| /* Initialize a new socket object. */
 | |
| 
 | |
| static void
 | |
| init_sockobject(PySocketSockObject *s,
 | |
| 		SOCKET_T fd, int family, int type, int proto)
 | |
| {
 | |
| #ifdef RISCOS
 | |
| 	int block = 1;
 | |
| #endif
 | |
| 	s->sock_fd = fd;
 | |
| 	s->sock_family = family;
 | |
| 	s->sock_type = type;
 | |
| 	s->sock_proto = proto;
 | |
| #ifdef RISCOS
 | |
| 	if(taskwindow) {
 | |
| 		socketioctl(s->sock_fd, 0x80046679, (u_long*)&block);
 | |
| 	}
 | |
| #endif
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Create a new socket object.
 | |
|    This just creates the object and initializes it.
 | |
|    If the creation fails, return NULL and set an exception (implicit
 | |
|    in NEWOBJ()). */
 | |
| 
 | |
| static PySocketSockObject *
 | |
| PySocketSock_New(SOCKET_T fd, int family, int type, int proto)
 | |
| {
 | |
| 	PySocketSockObject *s;
 | |
| 	s = (PySocketSockObject *)
 | |
| 		PyType_GenericNew(&PySocketSock_Type, NULL, NULL);
 | |
| 	if (s != NULL)
 | |
| 		init_sockobject(s, fd, family, type, proto);
 | |
| 	return s;
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Lock to allow python interpreter to continue, but only allow one
 | |
|    thread to be in gethostbyname */
 | |
| #ifdef USE_GETHOSTBYNAME_LOCK
 | |
| PyThread_type_lock gethostbyname_lock;
 | |
| #endif
 | |
| 
 | |
| 
 | |
| /* Convert a string specifying a host name or one of a few symbolic
 | |
|    names to a numeric IP address.  This usually calls gethostbyname()
 | |
|    to do the work; the names "" and "<broadcast>" are special.
 | |
|    Return the length (IPv4 should be 4 bytes), or negative if
 | |
|    an error occurred; then an exception is raised. */
 | |
| 
 | |
| static int
 | |
| setipaddr(char* name, struct sockaddr * addr_ret, int af)
 | |
| {
 | |
| 	struct addrinfo hints, *res;
 | |
| 	int error;
 | |
| 
 | |
| 	memset((void *) addr_ret, '\0', sizeof(*addr_ret));
 | |
| 	if (name[0] == '\0') {
 | |
| 		int siz;
 | |
| 		memset(&hints, 0, sizeof(hints));
 | |
| 		hints.ai_family = af;
 | |
| 		hints.ai_socktype = SOCK_DGRAM;	/*dummy*/
 | |
| 		hints.ai_flags = AI_PASSIVE;
 | |
| 		error = getaddrinfo(NULL, "0", &hints, &res);
 | |
| 		if (error) {
 | |
| 			PyGAI_Err(error);
 | |
| 			return -1;
 | |
| 		}
 | |
| 		switch (res->ai_family) {
 | |
| 		case AF_INET:
 | |
| 			siz = 4;
 | |
| 			break;
 | |
| #ifdef INET6
 | |
| 		case AF_INET6:
 | |
| 			siz = 16;
 | |
| 			break;
 | |
| #endif
 | |
| 		default:
 | |
| 			freeaddrinfo(res);
 | |
| 			PyErr_SetString(PySocket_Error,
 | |
| 				"unsupported address family");
 | |
| 			return -1;
 | |
| 		}
 | |
| 		if (res->ai_next) {
 | |
| 			freeaddrinfo(res);
 | |
| 			PyErr_SetString(PySocket_Error,
 | |
| 				"wildcard resolved to multiple address");
 | |
| 			return -1;
 | |
| 		}
 | |
| 		memcpy(addr_ret, res->ai_addr, res->ai_addrlen);
 | |
| 		freeaddrinfo(res);
 | |
| 		return siz;
 | |
| 	}
 | |
| 	if (name[0] == '<' && strcmp(name, "<broadcast>") == 0) {
 | |
| 		struct sockaddr_in *sin;
 | |
| 		if (af != PF_INET && af != PF_UNSPEC) {
 | |
| 			PyErr_SetString(PySocket_Error,
 | |
| 				"address family mismatched");
 | |
| 			return -1;
 | |
| 		}
 | |
| 		sin = (struct sockaddr_in *)addr_ret;
 | |
| 		memset((void *) sin, '\0', sizeof(*sin));
 | |
| 		sin->sin_family = AF_INET;
 | |
| #ifdef HAVE_SOCKADDR_SA_LEN
 | |
| 		sin->sin_len = sizeof(*sin);
 | |
| #endif
 | |
| 		sin->sin_addr.s_addr = INADDR_BROADCAST;
 | |
| 		return sizeof(sin->sin_addr);
 | |
| 	}
 | |
| 	memset(&hints, 0, sizeof(hints));
 | |
| 	hints.ai_family = af;
 | |
| 	error = getaddrinfo(name, NULL, &hints, &res);
 | |
| #if defined(__digital__) && defined(__unix__)
 | |
|         if (error == EAI_NONAME && af == AF_UNSPEC) {
 | |
|           /* On Tru64 V5.1, numeric-to-addr conversion
 | |
|              fails if no address family is given. Assume IPv4 for now.*/
 | |
|           hints.ai_family = AF_INET;
 | |
|           error = getaddrinfo(name, NULL, &hints, &res);
 | |
|         }
 | |
| #endif
 | |
| 	if (error) {
 | |
| 		PyGAI_Err(error);
 | |
| 		return -1;
 | |
| 	}
 | |
| 	memcpy((char *) addr_ret, res->ai_addr, res->ai_addrlen);
 | |
| 	freeaddrinfo(res);
 | |
| 	switch (addr_ret->sa_family) {
 | |
| 	case AF_INET:
 | |
| 		return 4;
 | |
| #ifdef INET6
 | |
| 	case AF_INET6:
 | |
| 		return 16;
 | |
| #endif
 | |
| 	default:
 | |
| 		PyErr_SetString(PySocket_Error, "unknown address family");
 | |
| 		return -1;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Create a string object representing an IP address.
 | |
|    This is always a string of the form 'dd.dd.dd.dd' (with variable
 | |
|    size numbers). */
 | |
| 
 | |
| static PyObject *
 | |
| makeipaddr(struct sockaddr *addr, int addrlen)
 | |
| {
 | |
| 	char buf[NI_MAXHOST];
 | |
| 	int error;
 | |
| 
 | |
| 	error = getnameinfo(addr, addrlen, buf, sizeof(buf), NULL, 0,
 | |
| 		NI_NUMERICHOST);
 | |
| 	if (error) {
 | |
| 		PyGAI_Err(error);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	return PyString_FromString(buf);
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Create an object representing the given socket address,
 | |
|    suitable for passing it back to bind(), connect() etc.
 | |
|    The family field of the sockaddr structure is inspected
 | |
|    to determine what kind of address it really is. */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| makesockaddr(int sockfd, struct sockaddr *addr, int addrlen)
 | |
| {
 | |
| 	if (addrlen == 0) {
 | |
| 		/* No address -- may be recvfrom() from known socket */
 | |
| 		Py_INCREF(Py_None);
 | |
| 		return Py_None;
 | |
| 	}
 | |
| 
 | |
| #ifdef __BEOS__
 | |
| 	/* XXX: BeOS version of accept() doesn't set family correctly */
 | |
| 	addr->sa_family = AF_INET;
 | |
| #endif
 | |
| 
 | |
| 	switch (addr->sa_family) {
 | |
| 
 | |
| 	case AF_INET:
 | |
| 	{
 | |
| 		struct sockaddr_in *a;
 | |
| 		PyObject *addrobj = makeipaddr(addr, sizeof(*a));
 | |
| 		PyObject *ret = NULL;
 | |
| 		if (addrobj) {
 | |
| 			a = (struct sockaddr_in *)addr;
 | |
| 			ret = Py_BuildValue("Oi", addrobj, ntohs(a->sin_port));
 | |
| 			Py_DECREF(addrobj);
 | |
| 		}
 | |
| 		return ret;
 | |
| 	}
 | |
| 
 | |
| #ifdef AF_UNIX
 | |
| 	case AF_UNIX:
 | |
| 	{
 | |
| 		struct sockaddr_un *a = (struct sockaddr_un *) addr;
 | |
| 		return PyString_FromString(a->sun_path);
 | |
| 	}
 | |
| #endif /* AF_UNIX */
 | |
| 
 | |
| #ifdef INET6
 | |
| 	case AF_INET6:
 | |
| 	{
 | |
| 		struct sockaddr_in6 *a;
 | |
| 		PyObject *addrobj = makeipaddr(addr, sizeof(*a));
 | |
| 		PyObject *ret = NULL;
 | |
| 		if (addrobj) {
 | |
| 			a = (struct sockaddr_in6 *)addr;
 | |
| 			ret = Py_BuildValue("Oiii", addrobj, ntohs(a->sin6_port),
 | |
| 				a->sin6_flowinfo, a->sin6_scope_id);
 | |
| 			Py_DECREF(addrobj);
 | |
| 		}
 | |
| 		return ret;
 | |
| 	}
 | |
| #endif
 | |
| 
 | |
| #ifdef HAVE_NETPACKET_PACKET_H
 | |
| 	case AF_PACKET:
 | |
| 	{
 | |
| 		struct sockaddr_ll *a = (struct sockaddr_ll *)addr;
 | |
| 		char *ifname = "";
 | |
| 		struct ifreq ifr;
 | |
| 		/* need to look up interface name give index */
 | |
| 		if (a->sll_ifindex) {
 | |
| 			ifr.ifr_ifindex = a->sll_ifindex;
 | |
| 			if (ioctl(sockfd, SIOCGIFNAME, &ifr) == 0)
 | |
| 				ifname = ifr.ifr_name;
 | |
| 		}
 | |
| 		return Py_BuildValue("shbhs#", ifname, ntohs(a->sll_protocol),
 | |
| 				     a->sll_pkttype, a->sll_hatype,
 | |
| 				     a->sll_addr, a->sll_halen);
 | |
| 	}
 | |
| #endif
 | |
| 
 | |
| 	/* More cases here... */
 | |
| 
 | |
| 	default:
 | |
| 		/* If we don't know the address family, don't raise an
 | |
| 		   exception -- return it as a tuple. */
 | |
| 		return Py_BuildValue("is#",
 | |
| 				     addr->sa_family,
 | |
| 				     addr->sa_data,
 | |
| 				     sizeof(addr->sa_data));
 | |
| 
 | |
| 	}
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Parse a socket address argument according to the socket object's
 | |
|    address family.  Return 1 if the address was in the proper format,
 | |
|    0 of not.  The address is returned through addr_ret, its length
 | |
|    through len_ret. */
 | |
| 
 | |
| static int
 | |
| getsockaddrarg(PySocketSockObject *s, PyObject *args,
 | |
| 	       struct sockaddr **addr_ret, int *len_ret)
 | |
| {
 | |
| 	switch (s->sock_family) {
 | |
| 
 | |
| #ifdef AF_UNIX
 | |
| 	case AF_UNIX:
 | |
| 	{
 | |
| 		struct sockaddr_un* addr;
 | |
| 		char *path;
 | |
| 		int len;
 | |
| 		addr = (struct sockaddr_un* )&(s->sock_addr).un;
 | |
| 		if (!PyArg_Parse(args, "t#", &path, &len))
 | |
| 			return 0;
 | |
| 		if (len > sizeof addr->sun_path) {
 | |
| 			PyErr_SetString(PySocket_Error,
 | |
| 					"AF_UNIX path too long");
 | |
| 			return 0;
 | |
| 		}
 | |
| 		addr->sun_family = s->sock_family;
 | |
| 		memcpy(addr->sun_path, path, len);
 | |
| 		addr->sun_path[len] = 0;
 | |
| 		*addr_ret = (struct sockaddr *) addr;
 | |
| 		*len_ret = len + sizeof(*addr) - sizeof(addr->sun_path);
 | |
| 		return 1;
 | |
| 	}
 | |
| #endif /* AF_UNIX */
 | |
| 
 | |
| 	case AF_INET:
 | |
| 	{
 | |
| 		struct sockaddr_in* addr;
 | |
| 		char *host;
 | |
| 		int port;
 | |
|  		addr=(struct sockaddr_in*)&(s->sock_addr).in;
 | |
| 		if (!PyTuple_Check(args)) {
 | |
| 			PyErr_Format(PyExc_TypeError,
 | |
| 		  "getsockaddrarg: AF_INET address must be tuple, not %.500s",
 | |
| 				     args->ob_type->tp_name);
 | |
| 			return 0;
 | |
| 		}
 | |
| 		if (!PyArg_ParseTuple(args, "si:getsockaddrarg", &host, &port))
 | |
| 			return 0;
 | |
| 		if (setipaddr(host, (struct sockaddr *)addr, AF_INET) < 0)
 | |
| 			return 0;
 | |
| 		addr->sin_family = AF_INET;
 | |
| 		addr->sin_port = htons((short)port);
 | |
| 		*addr_ret = (struct sockaddr *) addr;
 | |
| 		*len_ret = sizeof *addr;
 | |
| 		return 1;
 | |
| 	}
 | |
| 
 | |
| #ifdef INET6
 | |
| 	case AF_INET6:
 | |
| 	{
 | |
| 		struct sockaddr_in6* addr;
 | |
| 		char *host;
 | |
| 		int port, flowinfo, scope_id;
 | |
|  		addr = (struct sockaddr_in6*)&(s->sock_addr).in6;
 | |
| 		flowinfo = scope_id = 0;
 | |
| 		if (!PyArg_ParseTuple(args, "si|ii", &host, &port, &flowinfo,
 | |
| 				&scope_id)) {
 | |
| 			return 0;
 | |
| 		}
 | |
| 		if (setipaddr(host, (struct sockaddr *)addr, AF_INET6) < 0)
 | |
| 			return 0;
 | |
| 		addr->sin6_family = s->sock_family;
 | |
| 		addr->sin6_port = htons((short)port);
 | |
| 		addr->sin6_flowinfo = flowinfo;
 | |
| 		addr->sin6_scope_id = scope_id;
 | |
| 		*addr_ret = (struct sockaddr *) addr;
 | |
| 		*len_ret = sizeof *addr;
 | |
| 		return 1;
 | |
| 	}
 | |
| #endif
 | |
| 
 | |
| #ifdef HAVE_NETPACKET_PACKET_H
 | |
| 	case AF_PACKET:
 | |
| 	{
 | |
| 		struct sockaddr_ll* addr;
 | |
| 		struct ifreq ifr;
 | |
| 		char *interfaceName;
 | |
| 		int protoNumber;
 | |
| 		int hatype = 0;
 | |
| 		int pkttype = 0;
 | |
| 		char *haddr;
 | |
| 
 | |
| 		if (!PyArg_ParseTuple(args, "si|iis", &interfaceName,
 | |
| 				      &protoNumber, &pkttype, &hatype, &haddr))
 | |
| 			return 0;
 | |
| 		strncpy(ifr.ifr_name, interfaceName, sizeof(ifr.ifr_name));
 | |
| 		ifr.ifr_name[(sizeof(ifr.ifr_name))-1] = '\0';
 | |
| 		if (ioctl(s->sock_fd, SIOCGIFINDEX, &ifr) < 0) {
 | |
| 			PySocket_Err();
 | |
| 			return 0;
 | |
| 		}
 | |
| 		addr = &(s->sock_addr.ll);
 | |
| 		addr->sll_family = AF_PACKET;
 | |
| 		addr->sll_protocol = htons((short)protoNumber);
 | |
| 		addr->sll_ifindex = ifr.ifr_ifindex;
 | |
| 		addr->sll_pkttype = pkttype;
 | |
| 		addr->sll_hatype = hatype;
 | |
| 		*addr_ret = (struct sockaddr *) addr;
 | |
| 		*len_ret = sizeof *addr;
 | |
| 		return 1;
 | |
| 	}
 | |
| #endif
 | |
| 
 | |
| 	/* More cases here... */
 | |
| 
 | |
| 	default:
 | |
| 		PyErr_SetString(PySocket_Error, "getsockaddrarg: bad family");
 | |
| 		return 0;
 | |
| 
 | |
| 	}
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Get the address length according to the socket object's address family.
 | |
|    Return 1 if the family is known, 0 otherwise.  The length is returned
 | |
|    through len_ret. */
 | |
| 
 | |
| static int
 | |
| getsockaddrlen(PySocketSockObject *s, socklen_t *len_ret)
 | |
| {
 | |
| 	switch (s->sock_family) {
 | |
| 
 | |
| #ifdef AF_UNIX
 | |
| 	case AF_UNIX:
 | |
| 	{
 | |
| 		*len_ret = sizeof (struct sockaddr_un);
 | |
| 		return 1;
 | |
| 	}
 | |
| #endif /* AF_UNIX */
 | |
| 
 | |
| 	case AF_INET:
 | |
| 	{
 | |
| 		*len_ret = sizeof (struct sockaddr_in);
 | |
| 		return 1;
 | |
| 	}
 | |
| 
 | |
| #ifdef INET6
 | |
| 	case AF_INET6:
 | |
| 	{
 | |
| 		*len_ret = sizeof (struct sockaddr_in6);
 | |
| 		return 1;
 | |
| 	}
 | |
| #endif
 | |
| 
 | |
| #ifdef HAVE_NETPACKET_PACKET_H
 | |
| 	case AF_PACKET:
 | |
| 	{
 | |
| 		*len_ret = sizeof (struct sockaddr_ll);
 | |
| 		return 1;
 | |
| 	}
 | |
| #endif
 | |
| 
 | |
| 	/* More cases here... */
 | |
| 
 | |
| 	default:
 | |
| 		PyErr_SetString(PySocket_Error, "getsockaddrlen: bad family");
 | |
| 		return 0;
 | |
| 
 | |
| 	}
 | |
| }
 | |
| 
 | |
| 
 | |
| /* s.accept() method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_accept(PySocketSockObject *s)
 | |
| {
 | |
| 	char addrbuf[256];
 | |
| 	SOCKET_T newfd;
 | |
| 	socklen_t addrlen;
 | |
| 	PyObject *sock = NULL;
 | |
| 	PyObject *addr = NULL;
 | |
| 	PyObject *res = NULL;
 | |
| 
 | |
| 	if (!getsockaddrlen(s, &addrlen))
 | |
| 		return NULL;
 | |
| 	memset(addrbuf, 0, addrlen);
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	newfd = accept(s->sock_fd, (struct sockaddr *) addrbuf, &addrlen);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| #ifdef MS_WINDOWS
 | |
| 	if (newfd == INVALID_SOCKET)
 | |
| #else
 | |
| 	if (newfd < 0)
 | |
| #endif
 | |
| 		return PySocket_Err();
 | |
| 
 | |
| 	/* Create the new object with unspecified family,
 | |
| 	   to avoid calls to bind() etc. on it. */
 | |
| 	sock = (PyObject *) PySocketSock_New(newfd,
 | |
| 					s->sock_family,
 | |
| 					s->sock_type,
 | |
| 					s->sock_proto);
 | |
| 	if (sock == NULL) {
 | |
| 		SOCKETCLOSE(newfd);
 | |
| 		goto finally;
 | |
| 	}
 | |
| 	addr = makesockaddr(s->sock_fd, (struct sockaddr *)addrbuf,
 | |
| 			    addrlen);
 | |
| 	if (addr == NULL)
 | |
| 		goto finally;
 | |
| 
 | |
| 	res = Py_BuildValue("OO", sock, addr);
 | |
| 
 | |
|   finally:
 | |
| 	Py_XDECREF(sock);
 | |
| 	Py_XDECREF(addr);
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static char accept_doc[] =
 | |
| "accept() -> (socket object, address info)\n\
 | |
| \n\
 | |
| Wait for an incoming connection.  Return a new socket representing the\n\
 | |
| connection, and the address of the client.  For IP sockets, the address\n\
 | |
| info is a pair (hostaddr, port).";
 | |
| 
 | |
| 
 | |
| /* s.setblocking(1 | 0) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_setblocking(PySocketSockObject *s, PyObject *arg)
 | |
| {
 | |
| 	int block;
 | |
| #ifndef RISCOS
 | |
| #ifndef MS_WINDOWS
 | |
| 	int delay_flag;
 | |
| #endif
 | |
| #endif
 | |
| 	block = PyInt_AsLong(arg);
 | |
| 	if (block == -1 && PyErr_Occurred())
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| #ifdef __BEOS__
 | |
| 	block = !block;
 | |
| 	setsockopt( s->sock_fd, SOL_SOCKET, SO_NONBLOCK,
 | |
| 				(void *)(&block), sizeof( int ) );
 | |
| #else
 | |
| #ifndef RISCOS
 | |
| #ifndef MS_WINDOWS
 | |
| #ifdef PYOS_OS2
 | |
| 	block = !block;
 | |
| 	ioctl(s->sock_fd, FIONBIO, (caddr_t)&block, sizeof(block));
 | |
| #else /* !PYOS_OS2 */
 | |
| 	delay_flag = fcntl (s->sock_fd, F_GETFL, 0);
 | |
| 	if (block)
 | |
| 		delay_flag &= (~O_NDELAY);
 | |
| 	else
 | |
| 		delay_flag |= O_NDELAY;
 | |
| 	fcntl (s->sock_fd, F_SETFL, delay_flag);
 | |
| #endif /* !PYOS_OS2 */
 | |
| #else /* MS_WINDOWS */
 | |
| 	block = !block;
 | |
| 	ioctlsocket(s->sock_fd, FIONBIO, (u_long*)&block);
 | |
| #endif /* MS_WINDOWS */
 | |
| #endif /* __BEOS__ */
 | |
| #endif /* RISCOS */
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 
 | |
| 	Py_INCREF(Py_None);
 | |
| 	return Py_None;
 | |
| }
 | |
| 
 | |
| static char setblocking_doc[] =
 | |
| "setblocking(flag)\n\
 | |
| \n\
 | |
| Set the socket to blocking (flag is true) or non-blocking (false).\n\
 | |
| This uses the FIONBIO ioctl with the O_NDELAY flag.";
 | |
| 
 | |
| 
 | |
| #ifdef RISCOS
 | |
| /* s.sleeptaskw(1 | 0) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_sleeptaskw(PySocketSockObject *s,PyObject *args)
 | |
| {
 | |
|  int block;
 | |
|  int delay_flag;
 | |
|  if (!PyArg_GetInt(args, &block))
 | |
|   return NULL;
 | |
|  Py_BEGIN_ALLOW_THREADS
 | |
|   socketioctl(s->sock_fd, 0x80046679, (u_long*)&block);
 | |
|  Py_END_ALLOW_THREADS
 | |
| 
 | |
|  Py_INCREF(Py_None);
 | |
|  return Py_None;
 | |
| }
 | |
| static char sleeptaskw_doc[] =
 | |
| "sleeptaskw(flag)\n\
 | |
| \n\
 | |
| Allow sleeps in taskwindows.";
 | |
| #endif
 | |
| 
 | |
| 
 | |
| /* s.setsockopt() method.
 | |
|    With an integer third argument, sets an integer option.
 | |
|    With a string third argument, sets an option from a buffer;
 | |
|    use optional built-in module 'struct' to encode the string. */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_setsockopt(PySocketSockObject *s, PyObject *args)
 | |
| {
 | |
| 	int level;
 | |
| 	int optname;
 | |
| 	int res;
 | |
| 	char *buf;
 | |
| 	int buflen;
 | |
| 	int flag;
 | |
| 
 | |
| 	if (PyArg_ParseTuple(args, "iii:setsockopt",
 | |
| 			     &level, &optname, &flag)) {
 | |
| 		buf = (char *) &flag;
 | |
| 		buflen = sizeof flag;
 | |
| 	}
 | |
| 	else {
 | |
| 		PyErr_Clear();
 | |
| 		if (!PyArg_ParseTuple(args, "iis#:setsockopt",
 | |
| 				      &level, &optname, &buf, &buflen))
 | |
| 			return NULL;
 | |
| 	}
 | |
| 	res = setsockopt(s->sock_fd, level, optname, (void *)buf, buflen);
 | |
| 	if (res < 0)
 | |
| 		return PySocket_Err();
 | |
| 	Py_INCREF(Py_None);
 | |
| 	return Py_None;
 | |
| }
 | |
| 
 | |
| static char setsockopt_doc[] =
 | |
| "setsockopt(level, option, value)\n\
 | |
| \n\
 | |
| Set a socket option.  See the Unix manual for level and option.\n\
 | |
| The value argument can either be an integer or a string.";
 | |
| 
 | |
| 
 | |
| /* s.getsockopt() method.
 | |
|    With two arguments, retrieves an integer option.
 | |
|    With a third integer argument, retrieves a string buffer of that size;
 | |
|    use optional built-in module 'struct' to decode the string. */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_getsockopt(PySocketSockObject *s, PyObject *args)
 | |
| {
 | |
| 	int level;
 | |
| 	int optname;
 | |
| 	int res;
 | |
| 	PyObject *buf;
 | |
| 	socklen_t buflen = 0;
 | |
| 
 | |
| #ifdef __BEOS__
 | |
| 	/* We have incomplete socket support. */
 | |
| 	PyErr_SetString(PySocket_Error, "getsockopt not supported");
 | |
| 	return NULL;
 | |
| #else
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "ii|i:getsockopt",
 | |
| 			      &level, &optname, &buflen))
 | |
| 		return NULL;
 | |
| 
 | |
| 	if (buflen == 0) {
 | |
| 		int flag = 0;
 | |
| 		socklen_t flagsize = sizeof flag;
 | |
| 		res = getsockopt(s->sock_fd, level, optname,
 | |
| 				 (void *)&flag, &flagsize);
 | |
| 		if (res < 0)
 | |
| 			return PySocket_Err();
 | |
| 		return PyInt_FromLong(flag);
 | |
| 	}
 | |
| 	if (buflen <= 0 || buflen > 1024) {
 | |
| 		PyErr_SetString(PySocket_Error,
 | |
| 				"getsockopt buflen out of range");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	buf = PyString_FromStringAndSize((char *)NULL, buflen);
 | |
| 	if (buf == NULL)
 | |
| 		return NULL;
 | |
| 	res = getsockopt(s->sock_fd, level, optname,
 | |
| 			 (void *)PyString_AS_STRING(buf), &buflen);
 | |
| 	if (res < 0) {
 | |
| 		Py_DECREF(buf);
 | |
| 		return PySocket_Err();
 | |
| 	}
 | |
| 	_PyString_Resize(&buf, buflen);
 | |
| 	return buf;
 | |
| #endif /* __BEOS__ */
 | |
| }
 | |
| 
 | |
| static char getsockopt_doc[] =
 | |
| "getsockopt(level, option[, buffersize]) -> value\n\
 | |
| \n\
 | |
| Get a socket option.  See the Unix manual for level and option.\n\
 | |
| If a nonzero buffersize argument is given, the return value is a\n\
 | |
| string of that length; otherwise it is an integer.";
 | |
| 
 | |
| 
 | |
| /* s.bind(sockaddr) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_bind(PySocketSockObject *s, PyObject *addro)
 | |
| {
 | |
| 	struct sockaddr *addr;
 | |
| 	int addrlen;
 | |
| 	int res;
 | |
| 
 | |
| 	if (!getsockaddrarg(s, addro, &addr, &addrlen))
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	res = bind(s->sock_fd, addr, addrlen);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (res < 0)
 | |
| 		return PySocket_Err();
 | |
| 	Py_INCREF(Py_None);
 | |
| 	return Py_None;
 | |
| }
 | |
| 
 | |
| static char bind_doc[] =
 | |
| "bind(address)\n\
 | |
| \n\
 | |
| Bind the socket to a local address.  For IP sockets, the address is a\n\
 | |
| pair (host, port); the host must refer to the local host. For raw packet\n\
 | |
| sockets the address is a tuple (ifname, proto [,pkttype [,hatype]])";
 | |
| 
 | |
| 
 | |
| /* s.close() method.
 | |
|    Set the file descriptor to -1 so operations tried subsequently
 | |
|    will surely fail. */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_close(PySocketSockObject *s)
 | |
| {
 | |
| 	SOCKET_T fd;
 | |
| 
 | |
| 	if ((fd = s->sock_fd) != -1) {
 | |
| 		s->sock_fd = -1;
 | |
| 		Py_BEGIN_ALLOW_THREADS
 | |
| 		(void) SOCKETCLOSE(fd);
 | |
| 		Py_END_ALLOW_THREADS
 | |
| 	}
 | |
| 	Py_INCREF(Py_None);
 | |
| 	return Py_None;
 | |
| }
 | |
| 
 | |
| static char close_doc[] =
 | |
| "close()\n\
 | |
| \n\
 | |
| Close the socket.  It cannot be used after this call.";
 | |
| 
 | |
| 
 | |
| /* s.connect(sockaddr) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_connect(PySocketSockObject *s, PyObject *addro)
 | |
| {
 | |
| 	struct sockaddr *addr;
 | |
| 	int addrlen;
 | |
| 	int res;
 | |
| 
 | |
| 	if (!getsockaddrarg(s, addro, &addr, &addrlen))
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	res = connect(s->sock_fd, addr, addrlen);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (res < 0)
 | |
| 		return PySocket_Err();
 | |
| 	Py_INCREF(Py_None);
 | |
| 	return Py_None;
 | |
| }
 | |
| 
 | |
| static char connect_doc[] =
 | |
| "connect(address)\n\
 | |
| \n\
 | |
| Connect the socket to a remote address.  For IP sockets, the address\n\
 | |
| is a pair (host, port).";
 | |
| 
 | |
| 
 | |
| /* s.connect_ex(sockaddr) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_connect_ex(PySocketSockObject *s, PyObject *addro)
 | |
| {
 | |
| 	struct sockaddr *addr;
 | |
| 	int addrlen;
 | |
| 	int res;
 | |
| 
 | |
| 	if (!getsockaddrarg(s, addro, &addr, &addrlen))
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	res = connect(s->sock_fd, addr, addrlen);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (res != 0) {
 | |
| #ifdef MS_WINDOWS
 | |
| 		res = WSAGetLastError();
 | |
| #else
 | |
| 		res = errno;
 | |
| #endif
 | |
| 	}
 | |
| 	return PyInt_FromLong((long) res);
 | |
| }
 | |
| 
 | |
| static char connect_ex_doc[] =
 | |
| "connect_ex(address)\n\
 | |
| \n\
 | |
| This is like connect(address), but returns an error code (the errno value)\n\
 | |
| instead of raising an exception when an error occurs.";
 | |
| 
 | |
| 
 | |
| /* s.fileno() method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_fileno(PySocketSockObject *s)
 | |
| {
 | |
| #if SIZEOF_SOCKET_T <= SIZEOF_LONG
 | |
| 	return PyInt_FromLong((long) s->sock_fd);
 | |
| #else
 | |
| 	return PyLong_FromLongLong((LONG_LONG)s->sock_fd);
 | |
| #endif
 | |
| }
 | |
| 
 | |
| static char fileno_doc[] =
 | |
| "fileno() -> integer\n\
 | |
| \n\
 | |
| Return the integer file descriptor of the socket.";
 | |
| 
 | |
| 
 | |
| #ifndef NO_DUP
 | |
| /* s.dup() method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_dup(PySocketSockObject *s)
 | |
| {
 | |
| 	SOCKET_T newfd;
 | |
| 	PyObject *sock;
 | |
| 
 | |
| 	newfd = dup(s->sock_fd);
 | |
| 	if (newfd < 0)
 | |
| 		return PySocket_Err();
 | |
| 	sock = (PyObject *) PySocketSock_New(newfd,
 | |
| 					     s->sock_family,
 | |
| 					     s->sock_type,
 | |
| 					     s->sock_proto);
 | |
| 	if (sock == NULL)
 | |
| 		SOCKETCLOSE(newfd);
 | |
| 	return sock;
 | |
| }
 | |
| 
 | |
| static char dup_doc[] =
 | |
| "dup() -> socket object\n\
 | |
| \n\
 | |
| Return a new socket object connected to the same system resource.";
 | |
| 
 | |
| #endif
 | |
| 
 | |
| 
 | |
| /* s.getsockname() method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_getsockname(PySocketSockObject *s)
 | |
| {
 | |
| 	char addrbuf[256];
 | |
| 	int res;
 | |
| 	socklen_t addrlen;
 | |
| 
 | |
| 	if (!getsockaddrlen(s, &addrlen))
 | |
| 		return NULL;
 | |
| 	memset(addrbuf, 0, addrlen);
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	res = getsockname(s->sock_fd, (struct sockaddr *) addrbuf, &addrlen);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (res < 0)
 | |
| 		return PySocket_Err();
 | |
| 	return makesockaddr(s->sock_fd, (struct sockaddr *) addrbuf, addrlen);
 | |
| }
 | |
| 
 | |
| static char getsockname_doc[] =
 | |
| "getsockname() -> address info\n\
 | |
| \n\
 | |
| Return the address of the local endpoint.  For IP sockets, the address\n\
 | |
| info is a pair (hostaddr, port).";
 | |
| 
 | |
| 
 | |
| #ifdef HAVE_GETPEERNAME		/* Cray APP doesn't have this :-( */
 | |
| /* s.getpeername() method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_getpeername(PySocketSockObject *s)
 | |
| {
 | |
| 	char addrbuf[256];
 | |
| 	int res;
 | |
| 	socklen_t addrlen;
 | |
| 
 | |
| 	if (!getsockaddrlen(s, &addrlen))
 | |
| 		return NULL;
 | |
| 	memset(addrbuf, 0, addrlen);
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	res = getpeername(s->sock_fd, (struct sockaddr *) addrbuf, &addrlen);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (res < 0)
 | |
| 		return PySocket_Err();
 | |
| 	return makesockaddr(s->sock_fd, (struct sockaddr *) addrbuf, addrlen);
 | |
| }
 | |
| 
 | |
| static char getpeername_doc[] =
 | |
| "getpeername() -> address info\n\
 | |
| \n\
 | |
| Return the address of the remote endpoint.  For IP sockets, the address\n\
 | |
| info is a pair (hostaddr, port).";
 | |
| 
 | |
| #endif /* HAVE_GETPEERNAME */
 | |
| 
 | |
| 
 | |
| /* s.listen(n) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_listen(PySocketSockObject *s, PyObject *arg)
 | |
| {
 | |
| 	int backlog;
 | |
| 	int res;
 | |
| 
 | |
| 	backlog = PyInt_AsLong(arg);
 | |
| 	if (backlog == -1 && PyErr_Occurred())
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	if (backlog < 1)
 | |
| 		backlog = 1;
 | |
| 	res = listen(s->sock_fd, backlog);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (res < 0)
 | |
| 		return PySocket_Err();
 | |
| 	Py_INCREF(Py_None);
 | |
| 	return Py_None;
 | |
| }
 | |
| 
 | |
| static char listen_doc[] =
 | |
| "listen(backlog)\n\
 | |
| \n\
 | |
| Enable a server to accept connections.  The backlog argument must be at\n\
 | |
| least 1; it specifies the number of unaccepted connection that the system\n\
 | |
| will allow before refusing new connections.";
 | |
| 
 | |
| 
 | |
| #ifndef NO_DUP
 | |
| /* s.makefile(mode) method.
 | |
|    Create a new open file object referring to a dupped version of
 | |
|    the socket's file descriptor.  (The dup() call is necessary so
 | |
|    that the open file and socket objects may be closed independent
 | |
|    of each other.)
 | |
|    The mode argument specifies 'r' or 'w' passed to fdopen(). */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_makefile(PySocketSockObject *s, PyObject *args)
 | |
| {
 | |
| 	extern int fclose(FILE *);
 | |
| 	char *mode = "r";
 | |
| 	int bufsize = -1;
 | |
| #ifdef MS_WIN32
 | |
| 	Py_intptr_t fd;
 | |
| #else
 | |
| 	int fd;
 | |
| #endif
 | |
| 	FILE *fp;
 | |
| 	PyObject *f;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "|si:makefile", &mode, &bufsize))
 | |
| 		return NULL;
 | |
| #ifdef MS_WIN32
 | |
| 	if (((fd = _open_osfhandle(s->sock_fd, _O_BINARY)) < 0) ||
 | |
| 	    ((fd = dup(fd)) < 0) || ((fp = fdopen(fd, mode)) == NULL))
 | |
| #else
 | |
| 	if ((fd = dup(s->sock_fd)) < 0 || (fp = fdopen(fd, mode)) == NULL)
 | |
| #endif
 | |
| 	{
 | |
| 		if (fd >= 0)
 | |
| 			SOCKETCLOSE(fd);
 | |
| 		return PySocket_Err();
 | |
| 	}
 | |
| 	f = PyFile_FromFile(fp, "<socket>", mode, fclose);
 | |
| 	if (f != NULL)
 | |
| 		PyFile_SetBufSize(f, bufsize);
 | |
| 	return f;
 | |
| }
 | |
| 
 | |
| static char makefile_doc[] =
 | |
| "makefile([mode[, buffersize]]) -> file object\n\
 | |
| \n\
 | |
| Return a regular file object corresponding to the socket.\n\
 | |
| The mode and buffersize arguments are as for the built-in open() function.";
 | |
| 
 | |
| #endif /* NO_DUP */
 | |
| 
 | |
| 
 | |
| /* s.recv(nbytes [,flags]) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_recv(PySocketSockObject *s, PyObject *args)
 | |
| {
 | |
| 	int len, n, flags = 0;
 | |
| 	PyObject *buf;
 | |
| 	if (!PyArg_ParseTuple(args, "i|i:recv", &len, &flags))
 | |
| 		return NULL;
 | |
|         if (len < 0) {
 | |
| 		PyErr_SetString(PyExc_ValueError,
 | |
| 				"negative buffersize in connect");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	buf = PyString_FromStringAndSize((char *) 0, len);
 | |
| 	if (buf == NULL)
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	n = recv(s->sock_fd, PyString_AS_STRING(buf), len, flags);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (n < 0) {
 | |
| 		Py_DECREF(buf);
 | |
| 		return PySocket_Err();
 | |
| 	}
 | |
| 	if (n != len && _PyString_Resize(&buf, n) < 0)
 | |
| 		return NULL;
 | |
| 	return buf;
 | |
| }
 | |
| 
 | |
| static char recv_doc[] =
 | |
| "recv(buffersize[, flags]) -> data\n\
 | |
| \n\
 | |
| Receive up to buffersize bytes from the socket.  For the optional flags\n\
 | |
| argument, see the Unix manual.  When no data is available, block until\n\
 | |
| at least one byte is available or until the remote end is closed.  When\n\
 | |
| the remote end is closed and all data is read, return the empty string.";
 | |
| 
 | |
| 
 | |
| /* s.recvfrom(nbytes [,flags]) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_recvfrom(PySocketSockObject *s, PyObject *args)
 | |
| {
 | |
| 	char addrbuf[256];
 | |
| 	PyObject *buf = NULL;
 | |
| 	PyObject *addr = NULL;
 | |
| 	PyObject *ret = NULL;
 | |
| 
 | |
| 	int len, n, flags = 0;
 | |
| 	socklen_t addrlen;
 | |
| 	if (!PyArg_ParseTuple(args, "i|i:recvfrom", &len, &flags))
 | |
| 		return NULL;
 | |
| 	if (!getsockaddrlen(s, &addrlen))
 | |
| 		return NULL;
 | |
| 	buf = PyString_FromStringAndSize((char *) 0, len);
 | |
| 	if (buf == NULL)
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	memset(addrbuf, 0, addrlen);
 | |
| 	n = recvfrom(s->sock_fd, PyString_AS_STRING(buf), len, flags,
 | |
| #ifndef MS_WINDOWS
 | |
| #if defined(PYOS_OS2)
 | |
| 		     (struct sockaddr *)addrbuf, &addrlen
 | |
| #else
 | |
| 		     (void *)addrbuf, &addrlen
 | |
| #endif
 | |
| #else
 | |
| 		     (struct sockaddr *)addrbuf, &addrlen
 | |
| #endif
 | |
| 		     );
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (n < 0) {
 | |
| 		Py_DECREF(buf);
 | |
| 		return PySocket_Err();
 | |
| 	}
 | |
| 	if (n != len && _PyString_Resize(&buf, n) < 0)
 | |
| 		return NULL;
 | |
| 
 | |
| 	if (!(addr = makesockaddr(s->sock_fd, (struct sockaddr *)addrbuf, addrlen)))
 | |
| 		goto finally;
 | |
| 
 | |
| 	ret = Py_BuildValue("OO", buf, addr);
 | |
|   finally:
 | |
| 	Py_XDECREF(addr);
 | |
| 	Py_XDECREF(buf);
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| static char recvfrom_doc[] =
 | |
| "recvfrom(buffersize[, flags]) -> (data, address info)\n\
 | |
| \n\
 | |
| Like recv(buffersize, flags) but also return the sender's address info.";
 | |
| 
 | |
| 
 | |
| /* s.send(data [,flags]) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_send(PySocketSockObject *s, PyObject *args)
 | |
| {
 | |
| 	char *buf;
 | |
| 	int len, n, flags = 0;
 | |
| 	if (!PyArg_ParseTuple(args, "s#|i:send", &buf, &len, &flags))
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	n = send(s->sock_fd, buf, len, flags);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (n < 0)
 | |
| 		return PySocket_Err();
 | |
| 	return PyInt_FromLong((long)n);
 | |
| }
 | |
| 
 | |
| static char send_doc[] =
 | |
| "send(data[, flags]) -> count\n\
 | |
| \n\
 | |
| Send a data string to the socket.  For the optional flags\n\
 | |
| argument, see the Unix manual.  Return the number of bytes\n\
 | |
| sent; this may be less than len(data) if the network is busy.";
 | |
| 
 | |
| 
 | |
| /* s.sendall(data [,flags]) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_sendall(PySocketSockObject *s, PyObject *args)
 | |
| {
 | |
| 	char *buf;
 | |
| 	int len, n, flags = 0, total = 0;
 | |
| 	if (!PyArg_ParseTuple(args, "s#|i:sendall", &buf, &len, &flags))
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	do {
 | |
| 		n = send(s->sock_fd, buf, len, flags);
 | |
| 		if (n < 0)
 | |
| 			break;
 | |
| 		total += n;
 | |
| 		buf += n;
 | |
| 		len -= n;
 | |
| 	} while (len > 0);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (n < 0)
 | |
| 		return PySocket_Err();
 | |
| 	Py_INCREF(Py_None);
 | |
| 	return Py_None;
 | |
| }
 | |
| 
 | |
| static char sendall_doc[] =
 | |
| "sendall(data[, flags])\n\
 | |
| \n\
 | |
| Send a data string to the socket.  For the optional flags\n\
 | |
| argument, see the Unix manual.  This calls send() repeatedly\n\
 | |
| until all data is sent.  If an error occurs, it's impossible\n\
 | |
| to tell how much data has been sent.";
 | |
| 
 | |
| 
 | |
| /* s.sendto(data, [flags,] sockaddr) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_sendto(PySocketSockObject *s, PyObject *args)
 | |
| {
 | |
| 	PyObject *addro;
 | |
| 	char *buf;
 | |
| 	struct sockaddr *addr;
 | |
| 	int addrlen, len, n, flags;
 | |
| 	flags = 0;
 | |
| 	if (!PyArg_ParseTuple(args, "s#O:sendto", &buf, &len, &addro)) {
 | |
| 		PyErr_Clear();
 | |
| 		if (!PyArg_ParseTuple(args, "s#iO:sendto",
 | |
| 				      &buf, &len, &flags, &addro))
 | |
| 			return NULL;
 | |
| 	}
 | |
| 	if (!getsockaddrarg(s, addro, &addr, &addrlen))
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	n = sendto(s->sock_fd, buf, len, flags, addr, addrlen);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (n < 0)
 | |
| 		return PySocket_Err();
 | |
| 	return PyInt_FromLong((long)n);
 | |
| }
 | |
| 
 | |
| static char sendto_doc[] =
 | |
| "sendto(data[, flags], address)\n\
 | |
| \n\
 | |
| Like send(data, flags) but allows specifying the destination address.\n\
 | |
| For IP sockets, the address is a pair (hostaddr, port).";
 | |
| 
 | |
| 
 | |
| /* s.shutdown(how) method */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_shutdown(PySocketSockObject *s, PyObject *arg)
 | |
| {
 | |
| 	int how;
 | |
| 	int res;
 | |
| 
 | |
| 	how = PyInt_AsLong(arg);
 | |
| 	if (how == -1 && PyErr_Occurred())
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	res = shutdown(s->sock_fd, how);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (res < 0)
 | |
| 		return PySocket_Err();
 | |
| 	Py_INCREF(Py_None);
 | |
| 	return Py_None;
 | |
| }
 | |
| 
 | |
| static char shutdown_doc[] =
 | |
| "shutdown(flag)\n\
 | |
| \n\
 | |
| Shut down the reading side of the socket (flag == 0), the writing side\n\
 | |
| of the socket (flag == 1), or both ends (flag == 2).";
 | |
| 
 | |
| 
 | |
| /* List of methods for socket objects */
 | |
| 
 | |
| static PyMethodDef PySocketSock_methods[] = {
 | |
| 	{"accept",	(PyCFunction)PySocketSock_accept, METH_NOARGS,
 | |
| 			accept_doc},
 | |
| 	{"bind",	(PyCFunction)PySocketSock_bind, METH_O,
 | |
| 			bind_doc},
 | |
| 	{"close",	(PyCFunction)PySocketSock_close, METH_NOARGS,
 | |
| 			close_doc},
 | |
| 	{"connect",	(PyCFunction)PySocketSock_connect, METH_O,
 | |
| 			connect_doc},
 | |
| 	{"connect_ex",	(PyCFunction)PySocketSock_connect_ex, METH_O,
 | |
| 			connect_ex_doc},
 | |
| #ifndef NO_DUP
 | |
| 	{"dup",		(PyCFunction)PySocketSock_dup, METH_NOARGS,
 | |
| 			dup_doc},
 | |
| #endif
 | |
| 	{"fileno",	(PyCFunction)PySocketSock_fileno, METH_NOARGS,
 | |
| 			fileno_doc},
 | |
| #ifdef HAVE_GETPEERNAME
 | |
| 	{"getpeername",	(PyCFunction)PySocketSock_getpeername, 
 | |
| 	                METH_NOARGS, getpeername_doc},
 | |
| #endif
 | |
| 	{"getsockname",	(PyCFunction)PySocketSock_getsockname,
 | |
| 	                METH_NOARGS, getsockname_doc},
 | |
| 	{"getsockopt",	(PyCFunction)PySocketSock_getsockopt, METH_VARARGS,
 | |
| 			getsockopt_doc},
 | |
| 	{"listen",	(PyCFunction)PySocketSock_listen, METH_O,
 | |
| 			listen_doc},
 | |
| #ifndef NO_DUP
 | |
| 	{"makefile",	(PyCFunction)PySocketSock_makefile, METH_VARARGS,
 | |
| 			makefile_doc},
 | |
| #endif
 | |
| 	{"recv",	(PyCFunction)PySocketSock_recv, METH_VARARGS,
 | |
| 			recv_doc},
 | |
| 	{"recvfrom",	(PyCFunction)PySocketSock_recvfrom, METH_VARARGS,
 | |
| 			recvfrom_doc},
 | |
| 	{"send",	(PyCFunction)PySocketSock_send, METH_VARARGS,
 | |
| 			send_doc},
 | |
| 	{"sendall",	(PyCFunction)PySocketSock_sendall, METH_VARARGS,
 | |
| 			sendall_doc},
 | |
| 	{"sendto",	(PyCFunction)PySocketSock_sendto, METH_VARARGS,
 | |
| 			sendto_doc},
 | |
| 	{"setblocking",	(PyCFunction)PySocketSock_setblocking, METH_O,
 | |
| 			setblocking_doc},
 | |
| 	{"setsockopt",	(PyCFunction)PySocketSock_setsockopt, METH_VARARGS,
 | |
| 			setsockopt_doc},
 | |
| 	{"shutdown",	(PyCFunction)PySocketSock_shutdown, METH_O,
 | |
| 			shutdown_doc},
 | |
| #ifdef RISCOS
 | |
| 	{"sleeptaskw",	(PyCFunction)PySocketSock_sleeptaskw, METH_VARARGS,
 | |
| 	 		sleeptaskw_doc},
 | |
| #endif
 | |
| 	{NULL,			NULL}		/* sentinel */
 | |
| };
 | |
| 
 | |
| 
 | |
| /* Deallocate a socket object in response to the last Py_DECREF().
 | |
|    First close the file description. */
 | |
| 
 | |
| static void
 | |
| PySocketSock_dealloc(PySocketSockObject *s)
 | |
| {
 | |
| 	if (s->sock_fd != -1)
 | |
| 		(void) SOCKETCLOSE(s->sock_fd);
 | |
| 	s->ob_type->tp_free((PyObject *)s);
 | |
| }
 | |
| 
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_repr(PySocketSockObject *s)
 | |
| {
 | |
| 	char buf[512];
 | |
| #if SIZEOF_SOCKET_T > SIZEOF_LONG
 | |
| 	if (s->sock_fd > LONG_MAX) {
 | |
| 		/* this can occur on Win64, and actually there is a special
 | |
| 		   ugly printf formatter for decimal pointer length integer
 | |
| 		   printing, only bother if necessary*/
 | |
| 		PyErr_SetString(PyExc_OverflowError,
 | |
| 			"no printf formatter to display the socket descriptor in decimal");
 | |
| 		return NULL;
 | |
| 	}
 | |
| #endif
 | |
| 	PyOS_snprintf(buf, sizeof(buf),
 | |
| 		      "<socket object, fd=%ld, family=%d, type=%d, protocol=%d>",
 | |
| 		      (long)s->sock_fd, s->sock_family,
 | |
| 		      s->sock_type,
 | |
| 		      s->sock_proto);
 | |
| 	return PyString_FromString(buf);
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Create a new, uninitialized socket object. */
 | |
| 
 | |
| static PyObject *
 | |
| PySocketSock_new(PyTypeObject *type, PyObject *args, PyObject *kwds)
 | |
| {
 | |
| 	PyObject *new;
 | |
| 
 | |
| 	new = type->tp_alloc(type, 0);
 | |
| 	if (new != NULL)
 | |
| 		((PySocketSockObject *)new)->sock_fd = -1;
 | |
| 	return new;
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Initialize a new socket object. */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static int
 | |
| PySocketSock_init(PyObject *self, PyObject *args, PyObject *kwds)
 | |
| {
 | |
| 	PySocketSockObject *s = (PySocketSockObject *)self;
 | |
| 	SOCKET_T fd;
 | |
| 	int family = AF_INET, type = SOCK_STREAM, proto = 0;
 | |
| 	static char *keywords[] = {"family", "type", "proto", 0};
 | |
| 
 | |
| 	if (!PyArg_ParseTupleAndKeywords(args, kwds,
 | |
| 					 "|iii:socket", keywords,
 | |
| 					 &family, &type, &proto))
 | |
| 		return -1;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	fd = socket(family, type, proto);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| #ifdef MS_WINDOWS
 | |
| 	if (fd == INVALID_SOCKET)
 | |
| #else
 | |
| 	if (fd < 0)
 | |
| #endif
 | |
| 	{
 | |
| 		PySocket_Err();
 | |
| 		return -1;
 | |
| 	}
 | |
| 	init_sockobject(s, fd, family, type, proto);
 | |
| 	/* From now on, ignore SIGPIPE and let the error checking
 | |
| 	   do the work. */
 | |
| #ifdef SIGPIPE
 | |
| 	(void) signal(SIGPIPE, SIG_IGN);
 | |
| #endif
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Type object for socket objects. */
 | |
| 
 | |
| static char socket_doc[] =
 | |
| "socket([family[, type[, proto]]]) -> socket object\n\
 | |
| \n\
 | |
| Open a socket of the given type.  The family argument specifies the\n\
 | |
| address family; it defaults to AF_INET.  The type argument specifies\n\
 | |
| whether this is a stream (SOCK_STREAM, this is the default)\n\
 | |
| or datagram (SOCK_DGRAM) socket.  The protocol argument defaults to 0,\n\
 | |
| specifying the default protocol.\n\
 | |
| \n\
 | |
| A socket represents one endpoint of a network connection.\n\
 | |
| \n\
 | |
| Methods:\n\
 | |
| \n\
 | |
| accept() -- accept a connection, returning new socket and client address\n\
 | |
| bind() -- bind the socket to a local address\n\
 | |
| close() -- close the socket\n\
 | |
| connect() -- connect the socket to a remote address\n\
 | |
| connect_ex() -- connect, return an error code instead of an exception \n\
 | |
| dup() -- return a new socket object identical to the current one (*)\n\
 | |
| fileno() -- return underlying file descriptor\n\
 | |
| getpeername() -- return remote address (*)\n\
 | |
| getsockname() -- return local address\n\
 | |
| getsockopt() -- get socket options\n\
 | |
| listen() -- start listening for incoming connections\n\
 | |
| makefile() -- return a file object corresponding to the socket (*)\n\
 | |
| recv() -- receive data\n\
 | |
| recvfrom() -- receive data and sender's address\n\
 | |
| send() -- send data, may not send all of it\n\
 | |
| sendall() -- send all data\n\
 | |
| sendto() -- send data to a given address\n\
 | |
| setblocking() -- set or clear the blocking I/O flag\n\
 | |
| setsockopt() -- set socket options\n\
 | |
| shutdown() -- shut down traffic in one or both directions\n\
 | |
| \n\
 | |
| (*) not available on all platforms!)";
 | |
| 
 | |
| static PyTypeObject PySocketSock_Type = {
 | |
| 	PyObject_HEAD_INIT(0)	/* Must fill in type value later */
 | |
| 	0,					/* ob_size */
 | |
| 	"_socket.socket",			/* tp_name */
 | |
| 	sizeof(PySocketSockObject),		/* tp_basicsize */
 | |
| 	0,					/* tp_itemsize */
 | |
| 	(destructor)PySocketSock_dealloc,	/* tp_dealloc */
 | |
| 	0,					/* tp_print */
 | |
| 	0,					/* tp_getattr */
 | |
| 	0,					/* tp_setattr */
 | |
| 	0,					/* tp_compare */
 | |
| 	(reprfunc)PySocketSock_repr,		/* tp_repr */
 | |
| 	0,					/* tp_as_number */
 | |
| 	0,					/* tp_as_sequence */
 | |
| 	0,					/* tp_as_mapping */
 | |
| 	0,					/* tp_hash */
 | |
| 	0,					/* tp_call */
 | |
| 	0,					/* tp_str */
 | |
| 	0,	/* set below */			/* tp_getattro */
 | |
| 	0,					/* tp_setattro */
 | |
| 	0,					/* tp_as_buffer */
 | |
| 	Py_TPFLAGS_DEFAULT | Py_TPFLAGS_BASETYPE, /* tp_flags */
 | |
| 	socket_doc,				/* tp_doc */
 | |
| 	0,					/* tp_traverse */
 | |
| 	0,					/* tp_clear */
 | |
| 	0,					/* tp_richcompare */
 | |
| 	0,					/* tp_weaklistoffset */
 | |
| 	0,					/* tp_iter */
 | |
| 	0,					/* tp_iternext */
 | |
| 	PySocketSock_methods,			/* tp_methods */
 | |
| 	0,					/* tp_members */
 | |
| 	0,					/* tp_getset */
 | |
| 	0,					/* tp_base */
 | |
| 	0,					/* tp_dict */
 | |
| 	0,					/* tp_descr_get */
 | |
| 	0,					/* tp_descr_set */
 | |
| 	0,					/* tp_dictoffset */
 | |
| 	PySocketSock_init,			/* tp_init */
 | |
| 	0,	/* set below */			/* tp_alloc */
 | |
| 	PySocketSock_new,			/* tp_new */
 | |
| 	0,	/* set below */			/* tp_free */
 | |
| };
 | |
| 
 | |
| 
 | |
| /* Python interface to gethostname(). */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| PySocket_gethostname(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	char buf[1024];
 | |
| 	int res;
 | |
| 	if (!PyArg_ParseTuple(args, ":gethostname"))
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	res = gethostname(buf, (int) sizeof buf - 1);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (res < 0)
 | |
| 		return PySocket_Err();
 | |
| 	buf[sizeof buf - 1] = '\0';
 | |
| 	return PyString_FromString(buf);
 | |
| }
 | |
| 
 | |
| static char gethostname_doc[] =
 | |
| "gethostname() -> string\n\
 | |
| \n\
 | |
| Return the current host name.";
 | |
| 
 | |
| 
 | |
| /* Python interface to gethostbyname(name). */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| PySocket_gethostbyname(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	char *name;
 | |
| 	struct sockaddr_storage addrbuf;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "s:gethostbyname", &name))
 | |
| 		return NULL;
 | |
| 	if (setipaddr(name, (struct sockaddr *)&addrbuf, AF_INET) < 0)
 | |
| 		return NULL;
 | |
| 	return makeipaddr((struct sockaddr *)&addrbuf,
 | |
| 		sizeof(struct sockaddr_in));
 | |
| }
 | |
| 
 | |
| static char gethostbyname_doc[] =
 | |
| "gethostbyname(host) -> address\n\
 | |
| \n\
 | |
| Return the IP address (a string of the form '255.255.255.255') for a host.";
 | |
| 
 | |
| 
 | |
| /* Convenience function common to gethostbyname_ex and gethostbyaddr */
 | |
| 
 | |
| static PyObject *
 | |
| gethost_common(struct hostent *h, struct sockaddr *addr, int alen, int af)
 | |
| {
 | |
| 	char **pch;
 | |
| 	PyObject *rtn_tuple = (PyObject *)NULL;
 | |
| 	PyObject *name_list = (PyObject *)NULL;
 | |
| 	PyObject *addr_list = (PyObject *)NULL;
 | |
| 	PyObject *tmp;
 | |
| 
 | |
| 	if (h == NULL) {
 | |
| 		/* Let's get real error message to return */
 | |
| #ifndef RISCOS
 | |
| 		PyH_Err(h_errno);
 | |
| #else
 | |
| 		PyErr_SetString(PySocket_Error, "host not found");
 | |
| #endif
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	if (h->h_addrtype != af) {
 | |
| #ifdef HAVE_STRERROR
 | |
| 	        /* Let's get real error message to return */
 | |
| 		PyErr_SetString(PySocket_Error, (char *)strerror(EAFNOSUPPORT));
 | |
| #else
 | |
| 		PyErr_SetString(PySocket_Error,
 | |
| 		    "Address family not supported by protocol family");
 | |
| #endif
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	switch (af) {
 | |
| 	case AF_INET:
 | |
| 		if (alen < sizeof(struct sockaddr_in))
 | |
| 			return NULL;
 | |
| 		break;
 | |
| #ifdef INET6
 | |
| 	case AF_INET6:
 | |
| 		if (alen < sizeof(struct sockaddr_in6))
 | |
| 			return NULL;
 | |
| 		break;
 | |
| #endif
 | |
| 	}
 | |
| 	if ((name_list = PyList_New(0)) == NULL)
 | |
| 		goto err;
 | |
| 	if ((addr_list = PyList_New(0)) == NULL)
 | |
| 		goto err;
 | |
| 	for (pch = h->h_aliases; *pch != NULL; pch++) {
 | |
| 		int status;
 | |
| 		tmp = PyString_FromString(*pch);
 | |
| 		if (tmp == NULL)
 | |
| 			goto err;
 | |
| 		status = PyList_Append(name_list, tmp);
 | |
| 		Py_DECREF(tmp);
 | |
| 		if (status)
 | |
| 			goto err;
 | |
| 	}
 | |
| 	for (pch = h->h_addr_list; *pch != NULL; pch++) {
 | |
| 		int status;
 | |
| 		switch (af) {
 | |
| 		case AF_INET:
 | |
| 		    {
 | |
| 			struct sockaddr_in sin;
 | |
| 			memset(&sin, 0, sizeof(sin));
 | |
| 			sin.sin_family = af;
 | |
| #ifdef HAVE_SOCKADDR_SA_LEN
 | |
| 			sin.sin_len = sizeof(sin);
 | |
| #endif
 | |
| 			memcpy(&sin.sin_addr, *pch, sizeof(sin.sin_addr));
 | |
| 			tmp = makeipaddr((struct sockaddr *)&sin, sizeof(sin));
 | |
| 			if (pch == h->h_addr_list && alen >= sizeof(sin))
 | |
| 				memcpy((char *) addr, &sin, sizeof(sin));
 | |
| 			break;
 | |
| 		    }
 | |
| #ifdef INET6
 | |
| 		case AF_INET6:
 | |
| 		    {
 | |
| 			struct sockaddr_in6 sin6;
 | |
| 			memset(&sin6, 0, sizeof(sin6));
 | |
| 			sin6.sin6_family = af;
 | |
| #ifdef HAVE_SOCKADDR_SA_LEN
 | |
| 			sin6.sin6_len = sizeof(sin6);
 | |
| #endif
 | |
| 			memcpy(&sin6.sin6_addr, *pch, sizeof(sin6.sin6_addr));
 | |
| 			tmp = makeipaddr((struct sockaddr *)&sin6,
 | |
| 				sizeof(sin6));
 | |
| 			if (pch == h->h_addr_list && alen >= sizeof(sin6))
 | |
| 				memcpy((char *) addr, &sin6, sizeof(sin6));
 | |
| 			break;
 | |
| 		    }
 | |
| #endif
 | |
| 		default:	/* can't happen */
 | |
| 			PyErr_SetString(PySocket_Error,
 | |
| 				"unsupported address family");
 | |
| 			return NULL;
 | |
| 		}
 | |
| 		if (tmp == NULL)
 | |
| 			goto err;
 | |
| 		status = PyList_Append(addr_list, tmp);
 | |
| 		Py_DECREF(tmp);
 | |
| 		if (status)
 | |
| 			goto err;
 | |
| 	}
 | |
| 	rtn_tuple = Py_BuildValue("sOO", h->h_name, name_list, addr_list);
 | |
|  err:
 | |
| 	Py_XDECREF(name_list);
 | |
| 	Py_XDECREF(addr_list);
 | |
| 	return rtn_tuple;
 | |
| }
 | |
| 
 | |
| 
 | |
| /* Python interface to gethostbyname_ex(name). */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| PySocket_gethostbyname_ex(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	char *name;
 | |
| 	struct hostent *h;
 | |
| 	struct sockaddr_storage addr;
 | |
| 	struct sockaddr *sa;
 | |
| 	PyObject *ret;
 | |
| #ifdef HAVE_GETHOSTBYNAME_R
 | |
| 	struct hostent hp_allocated;
 | |
| #ifdef HAVE_GETHOSTBYNAME_R_3_ARG
 | |
| 	struct hostent_data data;
 | |
| #else
 | |
| 	char buf[16384];
 | |
| 	int buf_len = (sizeof buf) - 1;
 | |
| 	int errnop;
 | |
| #endif
 | |
| #if defined(HAVE_GETHOSTBYNAME_R_3_ARG) || defined(HAVE_GETHOSTBYNAME_R_6_ARG)
 | |
| 	int result;
 | |
| #endif
 | |
| #endif /* HAVE_GETHOSTBYNAME_R */
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "s:gethostbyname_ex", &name))
 | |
| 		return NULL;
 | |
| 	if (setipaddr(name, (struct sockaddr *)&addr, PF_INET) < 0)
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| #ifdef HAVE_GETHOSTBYNAME_R
 | |
| #if   defined(HAVE_GETHOSTBYNAME_R_6_ARG)
 | |
| 	result = gethostbyname_r(name, &hp_allocated, buf, buf_len, &h, &errnop);
 | |
| #elif defined(HAVE_GETHOSTBYNAME_R_5_ARG)
 | |
| 	h = gethostbyname_r(name, &hp_allocated, buf, buf_len, &errnop);
 | |
| #else /* HAVE_GETHOSTBYNAME_R_3_ARG */
 | |
| 	memset((void *) &data, '\0', sizeof(data));
 | |
| 	result = gethostbyname_r(name, &hp_allocated, &data);
 | |
| 	h = (result != 0) ? NULL : &hp_allocated;
 | |
| #endif
 | |
| #else /* not HAVE_GETHOSTBYNAME_R */
 | |
| #ifdef USE_GETHOSTBYNAME_LOCK
 | |
| 	PyThread_acquire_lock(gethostbyname_lock, 1);
 | |
| #endif
 | |
| 	h = gethostbyname(name);
 | |
| #endif /* HAVE_GETHOSTBYNAME_R */
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	/* Some C libraries would require addr.__ss_family instead of addr.ss_family.
 | |
|            Therefore, we cast the sockaddr_storage into sockaddr to access sa_family. */
 | |
| 	sa = (struct sockaddr*)&addr;
 | |
| 	ret = gethost_common(h, (struct sockaddr *)&addr, sizeof(addr), sa->sa_family);
 | |
| #ifdef USE_GETHOSTBYNAME_LOCK
 | |
| 	PyThread_release_lock(gethostbyname_lock);
 | |
| #endif
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| static char ghbn_ex_doc[] =
 | |
| "gethostbyname_ex(host) -> (name, aliaslist, addresslist)\n\
 | |
| \n\
 | |
| Return the true host name, a list of aliases, and a list of IP addresses,\n\
 | |
| for a host.  The host argument is a string giving a host name or IP number.";
 | |
| 
 | |
| 
 | |
| /* Python interface to gethostbyaddr(IP). */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| PySocket_gethostbyaddr(PyObject *self, PyObject *args)
 | |
| {
 | |
| #ifdef INET6
 | |
|         struct sockaddr_storage addr;
 | |
| #else
 | |
| 	struct sockaddr_in addr;
 | |
| #endif
 | |
| 	struct sockaddr *sa = (struct sockaddr *)&addr;
 | |
| 	char *ip_num;
 | |
| 	struct hostent *h;
 | |
| 	PyObject *ret;
 | |
| #ifdef HAVE_GETHOSTBYNAME_R
 | |
| 	struct hostent hp_allocated;
 | |
| #ifdef HAVE_GETHOSTBYNAME_R_3_ARG
 | |
| 	struct hostent_data data;
 | |
| #else
 | |
| 	char buf[16384];
 | |
| 	int buf_len = (sizeof buf) - 1;
 | |
| 	int errnop;
 | |
| #endif
 | |
| #if defined(HAVE_GETHOSTBYNAME_R_3_ARG) || defined(HAVE_GETHOSTBYNAME_R_6_ARG)
 | |
| 	int result;
 | |
| #endif
 | |
| #endif /* HAVE_GETHOSTBYNAME_R */
 | |
| 	char *ap;
 | |
| 	int al;
 | |
| 	int af;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "s:gethostbyaddr", &ip_num))
 | |
| 		return NULL;
 | |
| 	af = PF_UNSPEC;
 | |
| 	if (setipaddr(ip_num, sa, af) < 0)
 | |
| 		return NULL;
 | |
| 	af = sa->sa_family;
 | |
| 	ap = NULL;
 | |
| 	al = 0;
 | |
| 	switch (af) {
 | |
| 	case AF_INET:
 | |
| 		ap = (char *)&((struct sockaddr_in *)sa)->sin_addr;
 | |
| 		al = sizeof(((struct sockaddr_in *)sa)->sin_addr);
 | |
| 		break;
 | |
| #ifdef INET6
 | |
| 	case AF_INET6:
 | |
| 		ap = (char *)&((struct sockaddr_in6 *)sa)->sin6_addr;
 | |
| 		al = sizeof(((struct sockaddr_in6 *)sa)->sin6_addr);
 | |
| 		break;
 | |
| #endif
 | |
| 	default:
 | |
| 		PyErr_SetString(PySocket_Error, "unsupported address family");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| #ifdef HAVE_GETHOSTBYNAME_R
 | |
| #if   defined(HAVE_GETHOSTBYNAME_R_6_ARG)
 | |
| 	result = gethostbyaddr_r(ap, al, af,
 | |
| 		&hp_allocated, buf, buf_len,
 | |
| 		&h, &errnop);
 | |
| #elif defined(HAVE_GETHOSTBYNAME_R_5_ARG)
 | |
| 	h = gethostbyaddr_r(ap, al, af,
 | |
| 			    &hp_allocated, buf, buf_len, &errnop);
 | |
| #else /* HAVE_GETHOSTBYNAME_R_3_ARG */
 | |
| 	memset((void *) &data, '\0', sizeof(data));
 | |
| 	result = gethostbyaddr_r(ap, al, af, &hp_allocated, &data);
 | |
| 	h = (result != 0) ? NULL : &hp_allocated;
 | |
| #endif
 | |
| #else /* not HAVE_GETHOSTBYNAME_R */
 | |
| #ifdef USE_GETHOSTBYNAME_LOCK
 | |
| 	PyThread_acquire_lock(gethostbyname_lock, 1);
 | |
| #endif
 | |
| 	h = gethostbyaddr(ap, al, af);
 | |
| #endif /* HAVE_GETHOSTBYNAME_R */
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	ret = gethost_common(h, (struct sockaddr *)&addr, sizeof(addr), af);
 | |
| #ifdef USE_GETHOSTBYNAME_LOCK
 | |
| 	PyThread_release_lock(gethostbyname_lock);
 | |
| #endif
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| static char gethostbyaddr_doc[] =
 | |
| "gethostbyaddr(host) -> (name, aliaslist, addresslist)\n\
 | |
| \n\
 | |
| Return the true host name, a list of aliases, and a list of IP addresses,\n\
 | |
| for a host.  The host argument is a string giving a host name or IP number.";
 | |
| 
 | |
| 
 | |
| /* Python interface to getservbyname(name).
 | |
|    This only returns the port number, since the other info is already
 | |
|    known or not useful (like the list of aliases). */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| PySocket_getservbyname(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	char *name, *proto;
 | |
| 	struct servent *sp;
 | |
| 	if (!PyArg_ParseTuple(args, "ss:getservbyname", &name, &proto))
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	sp = getservbyname(name, proto);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (sp == NULL) {
 | |
| 		PyErr_SetString(PySocket_Error, "service/proto not found");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	return PyInt_FromLong((long) ntohs(sp->s_port));
 | |
| }
 | |
| 
 | |
| static char getservbyname_doc[] =
 | |
| "getservbyname(servicename, protocolname) -> integer\n\
 | |
| \n\
 | |
| Return a port number from a service name and protocol name.\n\
 | |
| The protocol name should be 'tcp' or 'udp'.";
 | |
| 
 | |
| 
 | |
| /* Python interface to getprotobyname(name).
 | |
|    This only returns the protocol number, since the other info is
 | |
|    already known or not useful (like the list of aliases). */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| PySocket_getprotobyname(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	char *name;
 | |
| 	struct protoent *sp;
 | |
| #ifdef __BEOS__
 | |
| /* Not available in BeOS yet. - [cjh] */
 | |
| 	PyErr_SetString( PySocket_Error, "getprotobyname not supported" );
 | |
| 	return NULL;
 | |
| #else
 | |
| 	if (!PyArg_ParseTuple(args, "s:getprotobyname", &name))
 | |
| 		return NULL;
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	sp = getprotobyname(name);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (sp == NULL) {
 | |
| 		PyErr_SetString(PySocket_Error, "protocol not found");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	return PyInt_FromLong((long) sp->p_proto);
 | |
| #endif
 | |
| }
 | |
| 
 | |
| static char getprotobyname_doc[] =
 | |
| "getprotobyname(name) -> integer\n\
 | |
| \n\
 | |
| Return the protocol number for the named protocol.  (Rarely used.)";
 | |
| 
 | |
| 
 | |
| #ifndef NO_DUP
 | |
| /* Create a socket object from a numeric file description.
 | |
|    Useful e.g. if stdin is a socket.
 | |
|    Additional arguments as for socket(). */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| PySocket_fromfd(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	PySocketSockObject *s;
 | |
| 	SOCKET_T fd;
 | |
| 	int family, type, proto = 0;
 | |
| 	if (!PyArg_ParseTuple(args, "iii|i:fromfd",
 | |
| 			      &fd, &family, &type, &proto))
 | |
| 		return NULL;
 | |
| 	/* Dup the fd so it and the socket can be closed independently */
 | |
| 	fd = dup(fd);
 | |
| 	if (fd < 0)
 | |
| 		return PySocket_Err();
 | |
| 	s = PySocketSock_New(fd, family, type, proto);
 | |
| 	/* From now on, ignore SIGPIPE and let the error checking
 | |
| 	   do the work. */
 | |
| #ifdef SIGPIPE
 | |
| 	(void) signal(SIGPIPE, SIG_IGN);
 | |
| #endif
 | |
| 	return (PyObject *) s;
 | |
| }
 | |
| 
 | |
| static char fromfd_doc[] =
 | |
| "fromfd(fd, family, type[, proto]) -> socket object\n\
 | |
| \n\
 | |
| Create a socket object from the given file descriptor.\n\
 | |
| The remaining arguments are the same as for socket().";
 | |
| 
 | |
| #endif /* NO_DUP */
 | |
| 
 | |
| 
 | |
| static PyObject *
 | |
| PySocket_ntohs(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	int x1, x2;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "i:ntohs", &x1)) {
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	x2 = (int)ntohs((short)x1);
 | |
| 	return PyInt_FromLong(x2);
 | |
| }
 | |
| 
 | |
| static char ntohs_doc[] =
 | |
| "ntohs(integer) -> integer\n\
 | |
| \n\
 | |
| Convert a 16-bit integer from network to host byte order.";
 | |
| 
 | |
| 
 | |
| static PyObject *
 | |
| PySocket_ntohl(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	int x1, x2;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "i:ntohl", &x1)) {
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	x2 = ntohl(x1);
 | |
| 	return PyInt_FromLong(x2);
 | |
| }
 | |
| 
 | |
| static char ntohl_doc[] =
 | |
| "ntohl(integer) -> integer\n\
 | |
| \n\
 | |
| Convert a 32-bit integer from network to host byte order.";
 | |
| 
 | |
| 
 | |
| static PyObject *
 | |
| PySocket_htons(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	int x1, x2;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "i:htons", &x1)) {
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	x2 = (int)htons((short)x1);
 | |
| 	return PyInt_FromLong(x2);
 | |
| }
 | |
| 
 | |
| static char htons_doc[] =
 | |
| "htons(integer) -> integer\n\
 | |
| \n\
 | |
| Convert a 16-bit integer from host to network byte order.";
 | |
| 
 | |
| 
 | |
| static PyObject *
 | |
| PySocket_htonl(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	int x1, x2;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "i:htonl", &x1)) {
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	x2 = htonl(x1);
 | |
| 	return PyInt_FromLong(x2);
 | |
| }
 | |
| 
 | |
| static char htonl_doc[] =
 | |
| "htonl(integer) -> integer\n\
 | |
| \n\
 | |
| Convert a 32-bit integer from host to network byte order.";
 | |
| 
 | |
| /*
 | |
|  * socket.inet_aton() and socket.inet_ntoa() functions
 | |
|  *
 | |
|  * written 20 Aug 1999 by Ben Gertzfield <che@debian.org> <- blame him!
 | |
|  *
 | |
|  */
 | |
| 
 | |
| static char inet_aton_doc[] =
 | |
| "inet_aton(string) -> packed 32-bit IP representation\n\
 | |
| \n\
 | |
| Convert an IP address in string format (123.45.67.89) to the 32-bit packed\n\
 | |
| binary format used in low-level network functions.";
 | |
| 
 | |
| static PyObject*
 | |
| PySocket_inet_aton(PyObject *self, PyObject *args)
 | |
| {
 | |
| #ifndef INADDR_NONE
 | |
| #define INADDR_NONE (-1)
 | |
| #endif
 | |
| 
 | |
| 	/* Have to use inet_addr() instead */
 | |
| 	char *ip_addr;
 | |
| 	unsigned long packed_addr;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "s:inet_aton", &ip_addr)) {
 | |
| 		return NULL;
 | |
| 	}
 | |
| #ifdef USE_GUSI1
 | |
| 	packed_addr = inet_addr(ip_addr).s_addr;
 | |
| #else
 | |
| 	packed_addr = inet_addr(ip_addr);
 | |
| #endif
 | |
| 
 | |
| 	if (packed_addr == INADDR_NONE) {	/* invalid address */
 | |
| 		PyErr_SetString(PySocket_Error,
 | |
| 			"illegal IP address string passed to inet_aton");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	return PyString_FromStringAndSize((char *) &packed_addr,
 | |
| 					  sizeof(packed_addr));
 | |
| }
 | |
| 
 | |
| static char inet_ntoa_doc[] =
 | |
| "inet_ntoa(packed_ip) -> ip_address_string\n\
 | |
| \n\
 | |
| Convert an IP address from 32-bit packed binary format to string format";
 | |
| 
 | |
| static PyObject*
 | |
| PySocket_inet_ntoa(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	char *packed_str;
 | |
| 	int addr_len;
 | |
| 	struct in_addr packed_addr;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "s#:inet_ntoa", &packed_str, &addr_len)) {
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	if (addr_len != sizeof(packed_addr)) {
 | |
| 		PyErr_SetString(PySocket_Error,
 | |
| 			"packed IP wrong length for inet_ntoa");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	memcpy(&packed_addr, packed_str, addr_len);
 | |
| 
 | |
| 	return PyString_FromString(inet_ntoa(packed_addr));
 | |
| }
 | |
| 
 | |
| /* Python interface to getaddrinfo(host, port). */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| PySocket_getaddrinfo(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	struct addrinfo hints, *res;
 | |
| 	struct addrinfo *res0 = NULL;
 | |
| 	PyObject *pobj = (PyObject *)NULL;
 | |
| 	char pbuf[30];
 | |
| 	char *hptr, *pptr;
 | |
| 	int family, socktype, protocol, flags;
 | |
| 	int error;
 | |
| 	PyObject *all = (PyObject *)NULL;
 | |
| 	PyObject *single = (PyObject *)NULL;
 | |
| 
 | |
| 	family = socktype = protocol = flags = 0;
 | |
| 	family = PF_UNSPEC;
 | |
| 	if (!PyArg_ParseTuple(args, "zO|iiii:getaddrinfo",
 | |
| 	    &hptr, &pobj, &family, &socktype,
 | |
| 			&protocol, &flags)) {
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	if (PyInt_Check(pobj)) {
 | |
| 		PyOS_snprintf(pbuf, sizeof(pbuf), "%ld", PyInt_AsLong(pobj));
 | |
| 		pptr = pbuf;
 | |
| 	} else if (PyString_Check(pobj)) {
 | |
| 		pptr = PyString_AsString(pobj);
 | |
| 	} else if (pobj == Py_None) {
 | |
| 		pptr = (char *)NULL;
 | |
| 	} else {
 | |
| 		PyErr_SetString(PySocket_Error, "Int or String expected");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	memset(&hints, 0, sizeof(hints));
 | |
| 	hints.ai_family = family;
 | |
| 	hints.ai_socktype = socktype;
 | |
| 	hints.ai_protocol = protocol;
 | |
| 	hints.ai_flags = flags;
 | |
| 	error = getaddrinfo(hptr, pptr, &hints, &res0);
 | |
| 	if (error) {
 | |
| 		PyGAI_Err(error);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	if ((all = PyList_New(0)) == NULL)
 | |
| 		goto err;
 | |
| 	for (res = res0; res; res = res->ai_next) {
 | |
| 		PyObject *addr =
 | |
| 			makesockaddr(-1, res->ai_addr, res->ai_addrlen);
 | |
| 		if (addr == NULL)
 | |
| 			goto err;
 | |
| 		single = Py_BuildValue("iiisO", res->ai_family,
 | |
| 			res->ai_socktype, res->ai_protocol,
 | |
| 			res->ai_canonname ? res->ai_canonname : "",
 | |
| 			addr);
 | |
| 		Py_DECREF(addr);
 | |
| 		if (single == NULL)
 | |
| 			goto err;
 | |
| 
 | |
| 		if (PyList_Append(all, single))
 | |
| 			goto err;
 | |
| 		Py_XDECREF(single);
 | |
| 	}
 | |
| 	return all;
 | |
|  err:
 | |
| 	Py_XDECREF(single);
 | |
| 	Py_XDECREF(all);
 | |
| 	if (res0)
 | |
| 		freeaddrinfo(res0);
 | |
| 	return (PyObject *)NULL;
 | |
| }
 | |
| 
 | |
| static char getaddrinfo_doc[] =
 | |
| "socket.getaddrinfo(host, port [, family, socktype, proto, flags])\n\
 | |
| 	--> List of (family, socktype, proto, canonname, sockaddr)\n\
 | |
| \n\
 | |
| Resolve host and port into addrinfo struct.";
 | |
| 
 | |
| /* Python interface to getnameinfo(sa, flags). */
 | |
| 
 | |
| /*ARGSUSED*/
 | |
| static PyObject *
 | |
| PySocket_getnameinfo(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	PyObject *sa = (PyObject *)NULL;
 | |
| 	int flags;
 | |
| 	char *hostp;
 | |
| 	int port, flowinfo, scope_id;
 | |
| 	char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
 | |
| 	struct addrinfo hints, *res = NULL;
 | |
| 	int error;
 | |
| 	PyObject *ret = (PyObject *)NULL;
 | |
| 
 | |
| 	flags = flowinfo = scope_id = 0;
 | |
| 	if (!PyArg_ParseTuple(args, "Oi:getnameinfo", &sa, &flags))
 | |
| 		return NULL;
 | |
| 	if  (!PyArg_ParseTuple(sa, "si|ii", &hostp, &port, &flowinfo, &scope_id))
 | |
| 		return NULL;
 | |
| 	PyOS_snprintf(pbuf, sizeof(pbuf), "%d", port);
 | |
| 	memset(&hints, 0, sizeof(hints));
 | |
| 	hints.ai_family = PF_UNSPEC;
 | |
| 	hints.ai_socktype = SOCK_DGRAM;	/* make numeric port happy */
 | |
| 	error = getaddrinfo(hostp, pbuf, &hints, &res);
 | |
| 	if (error) {
 | |
| 		PyGAI_Err(error);
 | |
| 		goto fail;
 | |
| 	}
 | |
| 	if (res->ai_next) {
 | |
| 		PyErr_SetString(PySocket_Error,
 | |
| 			"sockaddr resolved to multiple addresses");
 | |
| 		goto fail;
 | |
| 	}
 | |
| 	switch (res->ai_family) {
 | |
| 	case AF_INET:
 | |
| 	    {
 | |
| 		char *t1;
 | |
| 		int t2;
 | |
| 		if (PyArg_ParseTuple(sa, "si", &t1, &t2) == 0) {
 | |
| 			PyErr_SetString(PySocket_Error,
 | |
| 				"IPv4 sockaddr must be 2 tuple");
 | |
| 			goto fail;
 | |
| 		}
 | |
| 		break;
 | |
| 	    }
 | |
| #ifdef INET6
 | |
| 	case AF_INET6:
 | |
| 	    {
 | |
| 		struct sockaddr_in6 *sin6;
 | |
| 		sin6 = (struct sockaddr_in6 *)res->ai_addr;
 | |
| 		sin6->sin6_flowinfo = flowinfo;
 | |
| 		sin6->sin6_scope_id = scope_id;
 | |
| 		break;
 | |
| 	    }
 | |
| #endif
 | |
| 	}
 | |
| 	error = getnameinfo(res->ai_addr, res->ai_addrlen,
 | |
| 			hbuf, sizeof(hbuf), pbuf, sizeof(pbuf), flags);
 | |
| 	if (error) {
 | |
| 		PyGAI_Err(error);
 | |
| 		goto fail;
 | |
| 	}
 | |
| 	ret = Py_BuildValue("ss", hbuf, pbuf);
 | |
| 
 | |
| fail:
 | |
| 	if (res)
 | |
| 		freeaddrinfo(res);
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| static char getnameinfo_doc[] =
 | |
| "socket.getnameinfo(sockaddr, flags) --> (host, port)\n\
 | |
| \n\
 | |
| Get host and port for a sockaddr.";
 | |
| 
 | |
| /* XXX It might be helpful to augment the error message generated
 | |
|    below with the name of the SSL function that generated the error.
 | |
|    I expect it's obvious most of the time.
 | |
| */
 | |
| 
 | |
| #ifdef USE_SSL
 | |
| static PyObject *
 | |
| PySSL_SetError(SSL *ssl, int ret)
 | |
| {
 | |
| 	PyObject *v, *n, *s;
 | |
| 	char *errstr;
 | |
| 	int err;
 | |
| 
 | |
| 	assert(ret <= 0);
 | |
|     
 | |
| 	err = SSL_get_error(ssl, ret);
 | |
| 	n = PyInt_FromLong(err);
 | |
| 	if (n == NULL)
 | |
| 		return NULL;
 | |
| 	v = PyTuple_New(2);
 | |
| 	if (v == NULL) {
 | |
| 		Py_DECREF(n);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	switch (SSL_get_error(ssl, ret)) {
 | |
| 	case SSL_ERROR_ZERO_RETURN:
 | |
| 		errstr = "TLS/SSL connection has been closed";
 | |
| 		break;
 | |
| 	case SSL_ERROR_WANT_READ:
 | |
| 		errstr = "The operation did not complete (read)";
 | |
| 		break;
 | |
| 	case SSL_ERROR_WANT_WRITE:
 | |
| 		errstr = "The operation did not complete (write)";
 | |
| 		break;
 | |
| 	case SSL_ERROR_WANT_X509_LOOKUP:
 | |
| 		errstr = "The operation did not complete (X509 lookup)";
 | |
| 		break;
 | |
| 	case SSL_ERROR_SYSCALL:
 | |
| 	case SSL_ERROR_SSL:
 | |
| 	{
 | |
| 		unsigned long e = ERR_get_error();
 | |
| 		if (e == 0) {
 | |
| 			/* an EOF was observed that violates the protocol */
 | |
| 			errstr = "EOF occurred in violation of protocol";
 | |
| 		} else if (e == -1) {
 | |
| 			/* the underlying BIO reported an I/O error */
 | |
| 			Py_DECREF(v);
 | |
| 			Py_DECREF(n);
 | |
| 			return PySocket_Err();
 | |
| 		} else {
 | |
| 			/* XXX Protected by global interpreter lock */
 | |
| 			errstr = ERR_error_string(e, NULL);
 | |
| 		}
 | |
| 		break;
 | |
| 	}
 | |
| 	default:
 | |
| 		errstr = "Invalid error code";
 | |
| 	}
 | |
| 	s = PyString_FromString(errstr);
 | |
| 	if (s == NULL) {
 | |
| 		Py_DECREF(v);
 | |
| 		Py_DECREF(n);
 | |
| 	}
 | |
| 	PyTuple_SET_ITEM(v, 0, n);
 | |
| 	PyTuple_SET_ITEM(v, 1, s);
 | |
| 	PyErr_SetObject(PySSLErrorObject, v);
 | |
| 	return NULL;
 | |
| }
 | |
| 
 | |
| /* This is a C function to be called for new object initialization */
 | |
| static PySSLObject *
 | |
| newPySSLObject(PySocketSockObject *Sock, char *key_file, char *cert_file)
 | |
| {
 | |
| 	PySSLObject *self;
 | |
| 	char *errstr = NULL;
 | |
| 	int ret;
 | |
| 
 | |
| 	self = PyObject_New(PySSLObject, &PySSL_Type); /* Create new object */
 | |
| 	if (self == NULL){
 | |
| 		errstr = "newPySSLObject error";
 | |
| 		goto fail;
 | |
| 	}
 | |
| 	memset(self->server, '\0', sizeof(char) * X509_NAME_MAXLEN);
 | |
| 	memset(self->issuer, '\0', sizeof(char) * X509_NAME_MAXLEN);
 | |
| 	self->server_cert = NULL;
 | |
| 	self->ssl = NULL;
 | |
| 	self->ctx = NULL;
 | |
| 	self->Socket = NULL;
 | |
| 
 | |
| 	if ((key_file && !cert_file) || (!key_file && cert_file)) {
 | |
| 		errstr = "Both the key & certificate files must be specified";
 | |
| 		goto fail;
 | |
| 	}
 | |
| 
 | |
| 	self->ctx = SSL_CTX_new(SSLv23_method()); /* Set up context */
 | |
| 	if (self->ctx == NULL) {
 | |
| 		errstr = "SSL_CTX_new error";
 | |
| 		goto fail;
 | |
| 	}
 | |
| 
 | |
| 	if (key_file) {
 | |
| 		if (SSL_CTX_use_PrivateKey_file(self->ctx, key_file,
 | |
| 						SSL_FILETYPE_PEM) < 1) {
 | |
| 			errstr = "SSL_CTX_use_PrivateKey_file error";
 | |
| 			goto fail;
 | |
| 		}
 | |
| 
 | |
| 		if (SSL_CTX_use_certificate_chain_file(self->ctx,
 | |
| 						       cert_file) < 1) {
 | |
| 			errstr = "SSL_CTX_use_certificate_chain_file error";
 | |
| 			goto fail;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	SSL_CTX_set_verify(self->ctx,
 | |
| 			   SSL_VERIFY_NONE, NULL); /* set verify lvl */
 | |
| 	self->ssl = SSL_new(self->ctx); /* New ssl struct */
 | |
| 	SSL_set_fd(self->ssl, Sock->sock_fd);	/* Set the socket for SSL */
 | |
| 	SSL_set_connect_state(self->ssl);
 | |
| 
 | |
| 	/* Actually negotiate SSL connection */
 | |
| 	/* XXX If SSL_connect() returns 0, it's also a failure. */
 | |
| 	ret = SSL_connect(self->ssl);
 | |
| 	if (ret <= 0) {
 | |
| 		PySSL_SetError(self->ssl, ret);
 | |
| 		goto fail;
 | |
| 	}
 | |
| 	self->ssl->debug = 1;
 | |
| 
 | |
| 	if ((self->server_cert = SSL_get_peer_certificate(self->ssl))) {
 | |
| 		X509_NAME_oneline(X509_get_subject_name(self->server_cert),
 | |
| 				  self->server, X509_NAME_MAXLEN);
 | |
| 		X509_NAME_oneline(X509_get_issuer_name(self->server_cert),
 | |
| 				  self->issuer, X509_NAME_MAXLEN);
 | |
| 	}
 | |
| 	self->Socket = Sock;
 | |
| 	Py_INCREF(self->Socket);
 | |
| 	return self;
 | |
|  fail:
 | |
| 	if (errstr)
 | |
| 		PyErr_SetString(PySSLErrorObject, errstr);
 | |
| 	Py_DECREF(self);
 | |
| 	return NULL;
 | |
| }
 | |
| 
 | |
| /* This is the Python function called for new object initialization */
 | |
| static PyObject *
 | |
| PySocket_ssl(PyObject *self, PyObject *args)
 | |
| {
 | |
| 	PySSLObject *rv;
 | |
| 	PySocketSockObject *Sock;
 | |
| 	char *key_file = NULL;
 | |
| 	char *cert_file = NULL;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "O!|zz:ssl",
 | |
| 			      &PySocketSock_Type, (PyObject*)&Sock,
 | |
| 			      &key_file, &cert_file))
 | |
| 		return NULL;
 | |
| 
 | |
| 	rv = newPySSLObject(Sock, key_file, cert_file);
 | |
| 	if (rv == NULL)
 | |
| 		return NULL;
 | |
| 	return (PyObject *)rv;
 | |
| }
 | |
| 
 | |
| static char ssl_doc[] =
 | |
| "ssl(socket, [keyfile, certfile]) -> sslobject";
 | |
| 
 | |
| /* SSL object methods */
 | |
| 
 | |
| static PyObject *
 | |
| PySSL_server(PySSLObject *self)
 | |
| {
 | |
| 	return PyString_FromString(self->server);
 | |
| }
 | |
| 
 | |
| static PyObject *
 | |
| PySSL_issuer(PySSLObject *self)
 | |
| {
 | |
| 	return PyString_FromString(self->issuer);
 | |
| }
 | |
| 
 | |
| 
 | |
| static void PySSL_dealloc(PySSLObject *self)
 | |
| {
 | |
| 	if (self->server_cert)	/* Possible not to have one? */
 | |
| 		X509_free (self->server_cert);
 | |
| 	if (self->ssl)
 | |
| 	    SSL_free(self->ssl);
 | |
| 	if (self->ctx)
 | |
| 	    SSL_CTX_free(self->ctx);
 | |
| 	Py_XDECREF(self->Socket);
 | |
| 	PyObject_Del(self);
 | |
| }
 | |
| 
 | |
| static PyObject *PySSL_SSLwrite(PySSLObject *self, PyObject *args)
 | |
| {
 | |
| 	char *data;
 | |
| 	int len;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "s#:write", &data, &len))
 | |
| 		return NULL;
 | |
| 
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	len = SSL_write(self->ssl, data, len);
 | |
| 	Py_END_ALLOW_THREADS
 | |
| 	if (len > 0)
 | |
| 		return PyInt_FromLong(len);
 | |
| 	else
 | |
| 		return PySSL_SetError(self->ssl, len);
 | |
| }
 | |
| 
 | |
| static char PySSL_SSLwrite_doc[] =
 | |
| "write(s) -> len\n\
 | |
| \n\
 | |
| Writes the string s into the SSL object.  Returns the number\n\
 | |
| of bytes written.";
 | |
| 
 | |
| static PyObject *PySSL_SSLread(PySSLObject *self, PyObject *args)
 | |
| {
 | |
| 	PyObject *buf;
 | |
| 	int count = 0;
 | |
| 	int len = 1024;
 | |
| 
 | |
| 	if (!PyArg_ParseTuple(args, "|i:read", &len))
 | |
| 		return NULL;
 | |
| 
 | |
| 	if (!(buf = PyString_FromStringAndSize((char *) 0, len)))
 | |
| 		return NULL;
 | |
| 
 | |
| 	Py_BEGIN_ALLOW_THREADS
 | |
| 	count = SSL_read(self->ssl, PyString_AsString(buf), len);
 | |
| 	Py_END_ALLOW_THREADS
 | |
|  	if (count <= 0) {
 | |
| 		Py_DECREF(buf);
 | |
| 		return PySSL_SetError(self->ssl, count);
 | |
| 	}
 | |
| 	if (count != len && _PyString_Resize(&buf, count) < 0)
 | |
| 		return NULL;
 | |
| 	return buf;
 | |
| }
 | |
| 
 | |
| static char PySSL_SSLread_doc[] =
 | |
| "read([len]) -> string\n\
 | |
| \n\
 | |
| Read up to len bytes from the SSL socket.";
 | |
| 
 | |
| static PyMethodDef PySSLMethods[] = {
 | |
| 	{"write", (PyCFunction)PySSL_SSLwrite, 1,
 | |
| 	          PySSL_SSLwrite_doc},
 | |
| 	{"read", (PyCFunction)PySSL_SSLread, 1,
 | |
| 	          PySSL_SSLread_doc},
 | |
| 	{"server", (PyCFunction)PySSL_server, METH_NOARGS},
 | |
| 	{"issuer", (PyCFunction)PySSL_issuer, METH_NOARGS},
 | |
| 	{NULL, NULL}
 | |
| };
 | |
| 
 | |
| static PyObject *PySSL_getattr(PySSLObject *self, char *name)
 | |
| {
 | |
| 	return Py_FindMethod(PySSLMethods, (PyObject *)self, name);
 | |
| }
 | |
| 
 | |
| staticforward PyTypeObject PySSL_Type = {
 | |
| 	PyObject_HEAD_INIT(NULL)
 | |
| 	0,				/*ob_size*/
 | |
| 	"_socket.SSL",			/*tp_name*/
 | |
| 	sizeof(PySSLObject),		/*tp_basicsize*/
 | |
| 	0,				/*tp_itemsize*/
 | |
| 	/* methods */
 | |
| 	(destructor)PySSL_dealloc,	/*tp_dealloc*/
 | |
| 	0,				/*tp_print*/
 | |
| 	(getattrfunc)PySSL_getattr,	/*tp_getattr*/
 | |
| 	0,				/*tp_setattr*/
 | |
| 	0,				/*tp_compare*/
 | |
| 	0,				/*tp_repr*/
 | |
| 	0,				/*tp_as_number*/
 | |
| 	0,				/*tp_as_sequence*/
 | |
| 	0,				/*tp_as_mapping*/
 | |
| 	0,				/*tp_hash*/
 | |
| };
 | |
| 
 | |
| /* helper routines for seeding the SSL PRNG */
 | |
| static PyObject *
 | |
| PySSL_RAND_add(PyObject *self, PyObject *args)
 | |
| {
 | |
|     char *buf;
 | |
|     int len;
 | |
|     double entropy;
 | |
| 
 | |
|     if (!PyArg_ParseTuple(args, "s#d:RAND_add", &buf, &len, &entropy))
 | |
| 	return NULL;
 | |
|     RAND_add(buf, len, entropy);
 | |
|     Py_INCREF(Py_None);
 | |
|     return Py_None;
 | |
| }
 | |
| 
 | |
| static char PySSL_RAND_add_doc[] =
 | |
| "RAND_add(string, entropy)\n\
 | |
| \n\
 | |
| Mix string into the OpenSSL PRNG state.  entropy (a float) is a lower\n\
 | |
| bound on the entropy contained in string.";
 | |
| 
 | |
| static PyObject *
 | |
| PySSL_RAND_status(PyObject *self)
 | |
| {
 | |
|     return PyInt_FromLong(RAND_status());
 | |
| }
 | |
| 
 | |
| static char PySSL_RAND_status_doc[] = 
 | |
| "RAND_status() -> 0 or 1\n\
 | |
| \n\
 | |
| Returns 1 if the OpenSSL PRNG has been seeded with enough data and 0 if not.\n\
 | |
| It is necessary to seed the PRNG with RAND_add() on some platforms before\n\
 | |
| using the ssl() function.";
 | |
| 
 | |
| static PyObject *
 | |
| PySSL_RAND_egd(PyObject *self, PyObject *arg)
 | |
| {
 | |
|     int bytes;
 | |
| 
 | |
|     if (!PyString_Check(arg))
 | |
| 	return PyErr_Format(PyExc_TypeError,
 | |
| 			    "RAND_egd() expected string, found %s",
 | |
| 			    arg->ob_type->tp_name);
 | |
|     bytes = RAND_egd(PyString_AS_STRING(arg));
 | |
|     if (bytes == -1) {
 | |
| 	PyErr_SetString(PySSLErrorObject,
 | |
| 			"EGD connection failed or EGD did not return "
 | |
| 			"enough data to seed the PRNG");
 | |
| 	return NULL;
 | |
|     }
 | |
|     return PyInt_FromLong(bytes);
 | |
| }
 | |
| 
 | |
| static char PySSL_RAND_egd_doc[] = 
 | |
| "RAND_egd(path) -> bytes\n\
 | |
| \n\
 | |
| Queries the entropy gather daemon (EGD) on socket path.  Returns number\n\
 | |
| of bytes read.  Raises socket.sslerror if connection to EGD fails or\n\
 | |
| if it does provide enough data to seed PRNG.";
 | |
| 
 | |
| #endif /* USE_SSL */
 | |
| 
 | |
| 
 | |
| /* List of functions exported by this module. */
 | |
| 
 | |
| static PyMethodDef PySocket_methods[] = {
 | |
| 	{"gethostbyname",	PySocket_gethostbyname,
 | |
| 	 METH_VARARGS, gethostbyname_doc},
 | |
| 	{"gethostbyname_ex",	PySocket_gethostbyname_ex,
 | |
| 	 METH_VARARGS, ghbn_ex_doc},
 | |
| 	{"gethostbyaddr",	PySocket_gethostbyaddr,
 | |
| 	 METH_VARARGS, gethostbyaddr_doc},
 | |
| 	{"gethostname",		PySocket_gethostname,
 | |
| 	 METH_VARARGS, gethostname_doc},
 | |
| 	{"getservbyname",	PySocket_getservbyname,
 | |
| 	 METH_VARARGS, getservbyname_doc},
 | |
| 	{"getprotobyname",	PySocket_getprotobyname,
 | |
| 	 METH_VARARGS,getprotobyname_doc},
 | |
| #ifndef NO_DUP
 | |
| 	{"fromfd",		PySocket_fromfd,
 | |
| 	 METH_VARARGS, fromfd_doc},
 | |
| #endif
 | |
| 	{"ntohs",		PySocket_ntohs,
 | |
| 	 METH_VARARGS, ntohs_doc},
 | |
| 	{"ntohl",		PySocket_ntohl,
 | |
| 	 METH_VARARGS, ntohl_doc},
 | |
| 	{"htons",		PySocket_htons,
 | |
| 	 METH_VARARGS, htons_doc},
 | |
| 	{"htonl",		PySocket_htonl,
 | |
| 	 METH_VARARGS, htonl_doc},
 | |
| 	{"inet_aton",		PySocket_inet_aton,
 | |
| 	 METH_VARARGS, inet_aton_doc},
 | |
| 	{"inet_ntoa",		PySocket_inet_ntoa,
 | |
| 	 METH_VARARGS, inet_ntoa_doc},
 | |
| 	{"getaddrinfo",		PySocket_getaddrinfo,
 | |
| 	 METH_VARARGS, getaddrinfo_doc},
 | |
| 	{"getnameinfo",		PySocket_getnameinfo,
 | |
| 	 METH_VARARGS, getnameinfo_doc},
 | |
| #ifdef USE_SSL
 | |
| 	{"ssl",			PySocket_ssl,
 | |
| 	 METH_VARARGS, ssl_doc},
 | |
| 	{"RAND_add",            PySSL_RAND_add, METH_VARARGS, 
 | |
| 	 PySSL_RAND_add_doc},
 | |
| 	{"RAND_egd",            PySSL_RAND_egd, METH_O,
 | |
| 	 PySSL_RAND_egd_doc},
 | |
| 	{"RAND_status",         (PyCFunction)PySSL_RAND_status, METH_NOARGS,
 | |
| 	 PySSL_RAND_status_doc},
 | |
| #endif /* USE_SSL */
 | |
| 	{NULL,			NULL}		 /* Sentinel */
 | |
| };
 | |
| 
 | |
| 
 | |
| /* Convenience routine to export an integer value.
 | |
|  *
 | |
|  * Errors are silently ignored, for better or for worse...
 | |
|  */
 | |
| static void
 | |
| insint(PyObject *d, char *name, int value)
 | |
| {
 | |
| 	PyObject *v = PyInt_FromLong((long) value);
 | |
| 	if (!v || PyDict_SetItemString(d, name, v))
 | |
| 		PyErr_Clear();
 | |
| 
 | |
| 	Py_XDECREF(v);
 | |
| }
 | |
| 
 | |
| 
 | |
| #ifdef MS_WINDOWS
 | |
| 
 | |
| /* Additional initialization and cleanup for NT/Windows */
 | |
| 
 | |
| static void
 | |
| NTcleanup(void)
 | |
| {
 | |
| 	WSACleanup();
 | |
| }
 | |
| 
 | |
| static int
 | |
| NTinit(void)
 | |
| {
 | |
| 	WSADATA WSAData;
 | |
| 	int ret;
 | |
| 	char buf[100];
 | |
| 	ret = WSAStartup(0x0101, &WSAData);
 | |
| 	switch (ret) {
 | |
| 	case 0:	/* no error */
 | |
| 		atexit(NTcleanup);
 | |
| 		return 1;
 | |
| 	case WSASYSNOTREADY:
 | |
| 		PyErr_SetString(PyExc_ImportError,
 | |
| 				"WSAStartup failed: network not ready");
 | |
| 		break;
 | |
| 	case WSAVERNOTSUPPORTED:
 | |
| 	case WSAEINVAL:
 | |
| 		PyErr_SetString(PyExc_ImportError,
 | |
| 		    "WSAStartup failed: requested version not supported");
 | |
| 		break;
 | |
| 	default:
 | |
| 		PyOS_snprintf(buf, sizeof(buf),
 | |
| 			      "WSAStartup failed: error code %d", ret);
 | |
| 		PyErr_SetString(PyExc_ImportError, buf);
 | |
| 		break;
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| #endif /* MS_WINDOWS */
 | |
| 
 | |
| #if defined(PYOS_OS2)
 | |
| 
 | |
| /* Additional initialization and cleanup for OS/2 */
 | |
| 
 | |
| static void
 | |
| OS2cleanup(void)
 | |
| {
 | |
|     /* No cleanup is necessary for OS/2 Sockets */
 | |
| }
 | |
| 
 | |
| static int
 | |
| OS2init(void)
 | |
| {
 | |
|     char reason[64];
 | |
|     int rc = sock_init();
 | |
| 
 | |
|     if (rc == 0) {
 | |
| 	    atexit(OS2cleanup);
 | |
| 	    return 1; /* Indicate Success */
 | |
|     }
 | |
| 
 | |
|     sprintf(reason, "OS/2 TCP/IP Error# %d", sock_errno());
 | |
|     PyErr_SetString(PyExc_ImportError, reason);
 | |
| 
 | |
|     return 0;  /* Indicate Failure */
 | |
| }
 | |
| 
 | |
| #endif /* PYOS_OS2 */
 | |
| 
 | |
| /* Initialize this module.
 | |
|  *   This is called when the first 'import socket' is done,
 | |
|  *   via a table in config.c, if config.c is compiled with USE_SOCKET
 | |
|  *   defined.
 | |
|  *
 | |
|  *   For MS_WINDOWS (which means any Windows variant), this module
 | |
|  *   is actually called "_socket", and there's a wrapper "socket.py"
 | |
|  *   which implements some missing functionality (such as makefile(),
 | |
|  *   dup() and fromfd()).  The import of "_socket" may fail with an
 | |
|  *   ImportError exception if initialization of WINSOCK fails.  When
 | |
|  *   WINSOCK is initialized succesfully, a call to WSACleanup() is
 | |
|  *   scheduled to be made at exit time.
 | |
|  *
 | |
|  *   For OS/2, this module is also called "_socket" and uses a wrapper
 | |
|  *   "socket.py" which implements that functionality that is missing
 | |
|  *   when PC operating systems don't put socket descriptors in the
 | |
|  *   operating system's filesystem layer.
 | |
|  */
 | |
| 
 | |
| static char module_doc[] =
 | |
| "Implementation module for socket operations.  See the socket module\n\
 | |
| for documentation.";
 | |
| 
 | |
| DL_EXPORT(void)
 | |
| init_socket(void)
 | |
| {
 | |
| 	PyObject *m, *d;
 | |
| #ifdef RISCOS
 | |
| 	_kernel_swi_regs r;
 | |
| 	r.r[0]=0;
 | |
| 	_kernel_swi(0x43380, &r, &r);
 | |
| 	taskwindow = r.r[0];
 | |
| #else
 | |
| #ifdef MS_WINDOWS
 | |
| 	if (!NTinit())
 | |
| 		return;
 | |
| #else
 | |
| #if defined(__TOS_OS2__)
 | |
| 	if (!OS2init())
 | |
| 		return;
 | |
| #endif /* __TOS_OS2__ */
 | |
| #endif /* MS_WINDOWS */
 | |
| #endif /* RISCOS */
 | |
| 	PySocketSock_Type.ob_type = &PyType_Type;
 | |
| 	PySocketSock_Type.tp_getattro = PyObject_GenericGetAttr;
 | |
| 	PySocketSock_Type.tp_alloc = PyType_GenericAlloc;
 | |
| 	PySocketSock_Type.tp_free = _PyObject_Del;
 | |
| #ifdef USE_SSL
 | |
| 	PySSL_Type.ob_type = &PyType_Type;
 | |
| #endif
 | |
| 	m = Py_InitModule3("_socket", PySocket_methods, module_doc);
 | |
| 	d = PyModule_GetDict(m);
 | |
| 	PySocket_Error = PyErr_NewException("socket.error", NULL, NULL);
 | |
| 	if (PySocket_Error == NULL)
 | |
| 		return;
 | |
| 	PyDict_SetItemString(d, "error", PySocket_Error);
 | |
| 	PyH_Error = PyErr_NewException("socket.herror", PySocket_Error, NULL);
 | |
| 	if (PyH_Error == NULL)
 | |
| 		return;
 | |
| 	PyDict_SetItemString(d, "herror", PyH_Error);
 | |
| 	PyGAI_Error = PyErr_NewException("socket.gaierror", PySocket_Error,
 | |
| 	    NULL);
 | |
| 	if (PyGAI_Error == NULL)
 | |
| 		return;
 | |
| 	PyDict_SetItemString(d, "gaierror", PyGAI_Error);
 | |
| #ifdef USE_SSL
 | |
| 	SSL_load_error_strings();
 | |
| 	SSLeay_add_ssl_algorithms();
 | |
| 	PySSLErrorObject = PyErr_NewException("socket.sslerror", NULL, NULL);
 | |
| 	if (PySSLErrorObject == NULL)
 | |
| 		return;
 | |
| 	PyDict_SetItemString(d, "sslerror", PySSLErrorObject);
 | |
| 	if (PyDict_SetItemString(d, "SSLType",
 | |
| 				 (PyObject *)&PySSL_Type) != 0)
 | |
| 		return;
 | |
| 	PyModule_AddIntConstant(m, "SSL_ERROR_ZERO_RETURN",
 | |
| 				SSL_ERROR_ZERO_RETURN);
 | |
| 	PyModule_AddIntConstant(m, "SSL_ERROR_WANT_READ",
 | |
| 				SSL_ERROR_WANT_READ);
 | |
| 	PyModule_AddIntConstant(m, "SSL_ERROR_WANT_WRITE",
 | |
| 				SSL_ERROR_WANT_WRITE);
 | |
| 	PyModule_AddIntConstant(m, "SSL_ERROR_WANT_X509_LOOKUP",
 | |
| 				SSL_ERROR_WANT_X509_LOOKUP);
 | |
| 	PyModule_AddIntConstant(m, "SSL_ERROR_SYSCALL",
 | |
| 				SSL_ERROR_SYSCALL);
 | |
| 	PyModule_AddIntConstant(m, "SSL_ERROR_SSL",
 | |
| 				SSL_ERROR_SSL);
 | |
| #endif /* USE_SSL */
 | |
| 	if (PyDict_SetItemString(d, "SocketType",
 | |
| 				 (PyObject *)&PySocketSock_Type) != 0)
 | |
| 		return;
 | |
| 	if (PyDict_SetItemString(d, "socket",
 | |
| 				 (PyObject *)&PySocketSock_Type) != 0)
 | |
| 		return;
 | |
| 
 | |
| 	/* Address families (we only support AF_INET and AF_UNIX) */
 | |
| #ifdef AF_UNSPEC
 | |
| 	insint(d, "AF_UNSPEC", AF_UNSPEC);
 | |
| #endif
 | |
| 	insint(d, "AF_INET", AF_INET);
 | |
| #ifdef AF_INET6
 | |
| 	insint(d, "AF_INET6", AF_INET6);
 | |
| #endif /* AF_INET6 */
 | |
| #ifdef AF_UNIX
 | |
| 	insint(d, "AF_UNIX", AF_UNIX);
 | |
| #endif /* AF_UNIX */
 | |
| #ifdef AF_AX25
 | |
| 	insint(d, "AF_AX25", AF_AX25); /* Amateur Radio AX.25 */
 | |
| #endif
 | |
| #ifdef AF_IPX
 | |
| 	insint(d, "AF_IPX", AF_IPX); /* Novell IPX */
 | |
| #endif
 | |
| #ifdef AF_APPLETALK
 | |
| 	insint(d, "AF_APPLETALK", AF_APPLETALK); /* Appletalk DDP */
 | |
| #endif
 | |
| #ifdef AF_NETROM
 | |
| 	insint(d, "AF_NETROM", AF_NETROM); /* Amateur radio NetROM */
 | |
| #endif
 | |
| #ifdef AF_BRIDGE
 | |
| 	insint(d, "AF_BRIDGE", AF_BRIDGE); /* Multiprotocol bridge */
 | |
| #endif
 | |
| #ifdef AF_AAL5
 | |
| 	insint(d, "AF_AAL5", AF_AAL5); /* Reserved for Werner's ATM */
 | |
| #endif
 | |
| #ifdef AF_X25
 | |
| 	insint(d, "AF_X25", AF_X25); /* Reserved for X.25 project */
 | |
| #endif
 | |
| #ifdef AF_INET6
 | |
| 	insint(d, "AF_INET6", AF_INET6); /* IP version 6 */
 | |
| #endif
 | |
| #ifdef AF_ROSE
 | |
| 	insint(d, "AF_ROSE", AF_ROSE); /* Amateur Radio X.25 PLP */
 | |
| #endif
 | |
| #ifdef HAVE_NETPACKET_PACKET_H
 | |
| 	insint(d, "AF_PACKET", AF_PACKET);
 | |
| 	insint(d, "PF_PACKET", PF_PACKET);
 | |
| 	insint(d, "PACKET_HOST", PACKET_HOST);
 | |
| 	insint(d, "PACKET_BROADCAST", PACKET_BROADCAST);
 | |
| 	insint(d, "PACKET_MULTICAST", PACKET_MULTICAST);
 | |
| 	insint(d, "PACKET_OTHERHOST", PACKET_OTHERHOST);
 | |
| 	insint(d, "PACKET_OUTGOING", PACKET_OUTGOING);
 | |
| 	insint(d, "PACKET_LOOPBACK", PACKET_LOOPBACK);
 | |
| 	insint(d, "PACKET_FASTROUTE", PACKET_FASTROUTE);
 | |
| #endif
 | |
| 
 | |
| 	/* Socket types */
 | |
| 	insint(d, "SOCK_STREAM", SOCK_STREAM);
 | |
| 	insint(d, "SOCK_DGRAM", SOCK_DGRAM);
 | |
| #ifndef __BEOS__
 | |
| /* We have incomplete socket support. */
 | |
| 	insint(d, "SOCK_RAW", SOCK_RAW);
 | |
| 	insint(d, "SOCK_SEQPACKET", SOCK_SEQPACKET);
 | |
| 	insint(d, "SOCK_RDM", SOCK_RDM);
 | |
| #endif
 | |
| 
 | |
| #ifdef	SO_DEBUG
 | |
| 	insint(d, "SO_DEBUG", SO_DEBUG);
 | |
| #endif
 | |
| #ifdef	SO_ACCEPTCONN
 | |
| 	insint(d, "SO_ACCEPTCONN", SO_ACCEPTCONN);
 | |
| #endif
 | |
| #ifdef	SO_REUSEADDR
 | |
| 	insint(d, "SO_REUSEADDR", SO_REUSEADDR);
 | |
| #endif
 | |
| #ifdef	SO_KEEPALIVE
 | |
| 	insint(d, "SO_KEEPALIVE", SO_KEEPALIVE);
 | |
| #endif
 | |
| #ifdef	SO_DONTROUTE
 | |
| 	insint(d, "SO_DONTROUTE", SO_DONTROUTE);
 | |
| #endif
 | |
| #ifdef	SO_BROADCAST
 | |
| 	insint(d, "SO_BROADCAST", SO_BROADCAST);
 | |
| #endif
 | |
| #ifdef	SO_USELOOPBACK
 | |
| 	insint(d, "SO_USELOOPBACK", SO_USELOOPBACK);
 | |
| #endif
 | |
| #ifdef	SO_LINGER
 | |
| 	insint(d, "SO_LINGER", SO_LINGER);
 | |
| #endif
 | |
| #ifdef	SO_OOBINLINE
 | |
| 	insint(d, "SO_OOBINLINE", SO_OOBINLINE);
 | |
| #endif
 | |
| #ifdef	SO_REUSEPORT
 | |
| 	insint(d, "SO_REUSEPORT", SO_REUSEPORT);
 | |
| #endif
 | |
| #ifdef	SO_SNDBUF
 | |
| 	insint(d, "SO_SNDBUF", SO_SNDBUF);
 | |
| #endif
 | |
| #ifdef	SO_RCVBUF
 | |
| 	insint(d, "SO_RCVBUF", SO_RCVBUF);
 | |
| #endif
 | |
| #ifdef	SO_SNDLOWAT
 | |
| 	insint(d, "SO_SNDLOWAT", SO_SNDLOWAT);
 | |
| #endif
 | |
| #ifdef	SO_RCVLOWAT
 | |
| 	insint(d, "SO_RCVLOWAT", SO_RCVLOWAT);
 | |
| #endif
 | |
| #ifdef	SO_SNDTIMEO
 | |
| 	insint(d, "SO_SNDTIMEO", SO_SNDTIMEO);
 | |
| #endif
 | |
| #ifdef	SO_RCVTIMEO
 | |
| 	insint(d, "SO_RCVTIMEO", SO_RCVTIMEO);
 | |
| #endif
 | |
| #ifdef	SO_ERROR
 | |
| 	insint(d, "SO_ERROR", SO_ERROR);
 | |
| #endif
 | |
| #ifdef	SO_TYPE
 | |
| 	insint(d, "SO_TYPE", SO_TYPE);
 | |
| #endif
 | |
| 
 | |
| 	/* Maximum number of connections for "listen" */
 | |
| #ifdef	SOMAXCONN
 | |
| 	insint(d, "SOMAXCONN", SOMAXCONN);
 | |
| #else
 | |
| 	insint(d, "SOMAXCONN", 5);	/* Common value */
 | |
| #endif
 | |
| 
 | |
| 	/* Flags for send, recv */
 | |
| #ifdef	MSG_OOB
 | |
| 	insint(d, "MSG_OOB", MSG_OOB);
 | |
| #endif
 | |
| #ifdef	MSG_PEEK
 | |
| 	insint(d, "MSG_PEEK", MSG_PEEK);
 | |
| #endif
 | |
| #ifdef	MSG_DONTROUTE
 | |
| 	insint(d, "MSG_DONTROUTE", MSG_DONTROUTE);
 | |
| #endif
 | |
| #ifdef	MSG_DONTWAIT
 | |
| 	insint(d, "MSG_DONTWAIT", MSG_DONTWAIT);
 | |
| #endif
 | |
| #ifdef	MSG_EOR
 | |
| 	insint(d, "MSG_EOR", MSG_EOR);
 | |
| #endif
 | |
| #ifdef	MSG_TRUNC
 | |
| 	insint(d, "MSG_TRUNC", MSG_TRUNC);
 | |
| #endif
 | |
| #ifdef	MSG_CTRUNC
 | |
| 	insint(d, "MSG_CTRUNC", MSG_CTRUNC);
 | |
| #endif
 | |
| #ifdef	MSG_WAITALL
 | |
| 	insint(d, "MSG_WAITALL", MSG_WAITALL);
 | |
| #endif
 | |
| #ifdef	MSG_BTAG
 | |
| 	insint(d, "MSG_BTAG", MSG_BTAG);
 | |
| #endif
 | |
| #ifdef	MSG_ETAG
 | |
| 	insint(d, "MSG_ETAG", MSG_ETAG);
 | |
| #endif
 | |
| 
 | |
| 	/* Protocol level and numbers, usable for [gs]etsockopt */
 | |
| #ifdef	SOL_SOCKET
 | |
| 	insint(d, "SOL_SOCKET", SOL_SOCKET);
 | |
| #endif
 | |
| #ifdef	SOL_IP
 | |
| 	insint(d, "SOL_IP", SOL_IP);
 | |
| #else
 | |
| 	insint(d, "SOL_IP", 0);
 | |
| #endif
 | |
| #ifdef	SOL_IPX
 | |
| 	insint(d, "SOL_IPX", SOL_IPX);
 | |
| #endif
 | |
| #ifdef	SOL_AX25
 | |
| 	insint(d, "SOL_AX25", SOL_AX25);
 | |
| #endif
 | |
| #ifdef	SOL_ATALK
 | |
| 	insint(d, "SOL_ATALK", SOL_ATALK);
 | |
| #endif
 | |
| #ifdef	SOL_NETROM
 | |
| 	insint(d, "SOL_NETROM", SOL_NETROM);
 | |
| #endif
 | |
| #ifdef	SOL_ROSE
 | |
| 	insint(d, "SOL_ROSE", SOL_ROSE);
 | |
| #endif
 | |
| #ifdef	SOL_TCP
 | |
| 	insint(d, "SOL_TCP", SOL_TCP);
 | |
| #else
 | |
| 	insint(d, "SOL_TCP", 6);
 | |
| #endif
 | |
| #ifdef	SOL_UDP
 | |
| 	insint(d, "SOL_UDP", SOL_UDP);
 | |
| #else
 | |
| 	insint(d, "SOL_UDP", 17);
 | |
| #endif
 | |
| #ifdef	IPPROTO_IP
 | |
| 	insint(d, "IPPROTO_IP", IPPROTO_IP);
 | |
| #else
 | |
| 	insint(d, "IPPROTO_IP", 0);
 | |
| #endif
 | |
| #ifdef	IPPROTO_HOPOPTS
 | |
| 	insint(d, "IPPROTO_HOPOPTS", IPPROTO_HOPOPTS);
 | |
| #endif
 | |
| #ifdef	IPPROTO_ICMP
 | |
| 	insint(d, "IPPROTO_ICMP", IPPROTO_ICMP);
 | |
| #else
 | |
| 	insint(d, "IPPROTO_ICMP", 1);
 | |
| #endif
 | |
| #ifdef	IPPROTO_IGMP
 | |
| 	insint(d, "IPPROTO_IGMP", IPPROTO_IGMP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_GGP
 | |
| 	insint(d, "IPPROTO_GGP", IPPROTO_GGP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_IPV4
 | |
| 	insint(d, "IPPROTO_IPV4", IPPROTO_IPV4);
 | |
| #endif
 | |
| #ifdef	IPPROTO_IPIP
 | |
| 	insint(d, "IPPROTO_IPIP", IPPROTO_IPIP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_TCP
 | |
| 	insint(d, "IPPROTO_TCP", IPPROTO_TCP);
 | |
| #else
 | |
| 	insint(d, "IPPROTO_TCP", 6);
 | |
| #endif
 | |
| #ifdef	IPPROTO_EGP
 | |
| 	insint(d, "IPPROTO_EGP", IPPROTO_EGP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_PUP
 | |
| 	insint(d, "IPPROTO_PUP", IPPROTO_PUP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_UDP
 | |
| 	insint(d, "IPPROTO_UDP", IPPROTO_UDP);
 | |
| #else
 | |
| 	insint(d, "IPPROTO_UDP", 17);
 | |
| #endif
 | |
| #ifdef	IPPROTO_IDP
 | |
| 	insint(d, "IPPROTO_IDP", IPPROTO_IDP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_HELLO
 | |
| 	insint(d, "IPPROTO_HELLO", IPPROTO_HELLO);
 | |
| #endif
 | |
| #ifdef	IPPROTO_ND
 | |
| 	insint(d, "IPPROTO_ND", IPPROTO_ND);
 | |
| #endif
 | |
| #ifdef	IPPROTO_TP
 | |
| 	insint(d, "IPPROTO_TP", IPPROTO_TP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_IPV6
 | |
| 	insint(d, "IPPROTO_IPV6", IPPROTO_IPV6);
 | |
| #endif
 | |
| #ifdef	IPPROTO_ROUTING
 | |
| 	insint(d, "IPPROTO_ROUTING", IPPROTO_ROUTING);
 | |
| #endif
 | |
| #ifdef	IPPROTO_FRAGMENT
 | |
| 	insint(d, "IPPROTO_FRAGMENT", IPPROTO_FRAGMENT);
 | |
| #endif
 | |
| #ifdef	IPPROTO_RSVP
 | |
| 	insint(d, "IPPROTO_RSVP", IPPROTO_RSVP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_GRE
 | |
| 	insint(d, "IPPROTO_GRE", IPPROTO_GRE);
 | |
| #endif
 | |
| #ifdef	IPPROTO_ESP
 | |
| 	insint(d, "IPPROTO_ESP", IPPROTO_ESP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_AH
 | |
| 	insint(d, "IPPROTO_AH", IPPROTO_AH);
 | |
| #endif
 | |
| #ifdef	IPPROTO_MOBILE
 | |
| 	insint(d, "IPPROTO_MOBILE", IPPROTO_MOBILE);
 | |
| #endif
 | |
| #ifdef	IPPROTO_ICMPV6
 | |
| 	insint(d, "IPPROTO_ICMPV6", IPPROTO_ICMPV6);
 | |
| #endif
 | |
| #ifdef	IPPROTO_NONE
 | |
| 	insint(d, "IPPROTO_NONE", IPPROTO_NONE);
 | |
| #endif
 | |
| #ifdef	IPPROTO_DSTOPTS
 | |
| 	insint(d, "IPPROTO_DSTOPTS", IPPROTO_DSTOPTS);
 | |
| #endif
 | |
| #ifdef	IPPROTO_XTP
 | |
| 	insint(d, "IPPROTO_XTP", IPPROTO_XTP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_EON
 | |
| 	insint(d, "IPPROTO_EON", IPPROTO_EON);
 | |
| #endif
 | |
| #ifdef	IPPROTO_PIM
 | |
| 	insint(d, "IPPROTO_PIM", IPPROTO_PIM);
 | |
| #endif
 | |
| #ifdef	IPPROTO_IPCOMP
 | |
| 	insint(d, "IPPROTO_IPCOMP", IPPROTO_IPCOMP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_VRRP
 | |
| 	insint(d, "IPPROTO_VRRP", IPPROTO_VRRP);
 | |
| #endif
 | |
| #ifdef	IPPROTO_BIP
 | |
| 	insint(d, "IPPROTO_BIP", IPPROTO_BIP);
 | |
| #endif
 | |
| /**/
 | |
| #ifdef	IPPROTO_RAW
 | |
| 	insint(d, "IPPROTO_RAW", IPPROTO_RAW);
 | |
| #else
 | |
| 	insint(d, "IPPROTO_RAW", 255);
 | |
| #endif
 | |
| #ifdef	IPPROTO_MAX
 | |
| 	insint(d, "IPPROTO_MAX", IPPROTO_MAX);
 | |
| #endif
 | |
| 
 | |
| 	/* Some port configuration */
 | |
| #ifdef	IPPORT_RESERVED
 | |
| 	insint(d, "IPPORT_RESERVED", IPPORT_RESERVED);
 | |
| #else
 | |
| 	insint(d, "IPPORT_RESERVED", 1024);
 | |
| #endif
 | |
| #ifdef	IPPORT_USERRESERVED
 | |
| 	insint(d, "IPPORT_USERRESERVED", IPPORT_USERRESERVED);
 | |
| #else
 | |
| 	insint(d, "IPPORT_USERRESERVED", 5000);
 | |
| #endif
 | |
| 
 | |
| 	/* Some reserved IP v.4 addresses */
 | |
| #ifdef	INADDR_ANY
 | |
| 	insint(d, "INADDR_ANY", INADDR_ANY);
 | |
| #else
 | |
| 	insint(d, "INADDR_ANY", 0x00000000);
 | |
| #endif
 | |
| #ifdef	INADDR_BROADCAST
 | |
| 	insint(d, "INADDR_BROADCAST", INADDR_BROADCAST);
 | |
| #else
 | |
| 	insint(d, "INADDR_BROADCAST", 0xffffffff);
 | |
| #endif
 | |
| #ifdef	INADDR_LOOPBACK
 | |
| 	insint(d, "INADDR_LOOPBACK", INADDR_LOOPBACK);
 | |
| #else
 | |
| 	insint(d, "INADDR_LOOPBACK", 0x7F000001);
 | |
| #endif
 | |
| #ifdef	INADDR_UNSPEC_GROUP
 | |
| 	insint(d, "INADDR_UNSPEC_GROUP", INADDR_UNSPEC_GROUP);
 | |
| #else
 | |
| 	insint(d, "INADDR_UNSPEC_GROUP", 0xe0000000);
 | |
| #endif
 | |
| #ifdef	INADDR_ALLHOSTS_GROUP
 | |
| 	insint(d, "INADDR_ALLHOSTS_GROUP", INADDR_ALLHOSTS_GROUP);
 | |
| #else
 | |
| 	insint(d, "INADDR_ALLHOSTS_GROUP", 0xe0000001);
 | |
| #endif
 | |
| #ifdef	INADDR_MAX_LOCAL_GROUP
 | |
| 	insint(d, "INADDR_MAX_LOCAL_GROUP", INADDR_MAX_LOCAL_GROUP);
 | |
| #else
 | |
| 	insint(d, "INADDR_MAX_LOCAL_GROUP", 0xe00000ff);
 | |
| #endif
 | |
| #ifdef	INADDR_NONE
 | |
| 	insint(d, "INADDR_NONE", INADDR_NONE);
 | |
| #else
 | |
| 	insint(d, "INADDR_NONE", 0xffffffff);
 | |
| #endif
 | |
| 
 | |
| 	/* IPv4 [gs]etsockopt options */
 | |
| #ifdef	IP_OPTIONS
 | |
| 	insint(d, "IP_OPTIONS", IP_OPTIONS);
 | |
| #endif
 | |
| #ifdef	IP_HDRINCL
 | |
| 	insint(d, "IP_HDRINCL", IP_HDRINCL);
 | |
| #endif
 | |
| #ifdef	IP_TOS
 | |
| 	insint(d, "IP_TOS", IP_TOS);
 | |
| #endif
 | |
| #ifdef	IP_TTL
 | |
| 	insint(d, "IP_TTL", IP_TTL);
 | |
| #endif
 | |
| #ifdef	IP_RECVOPTS
 | |
| 	insint(d, "IP_RECVOPTS", IP_RECVOPTS);
 | |
| #endif
 | |
| #ifdef	IP_RECVRETOPTS
 | |
| 	insint(d, "IP_RECVRETOPTS", IP_RECVRETOPTS);
 | |
| #endif
 | |
| #ifdef	IP_RECVDSTADDR
 | |
| 	insint(d, "IP_RECVDSTADDR", IP_RECVDSTADDR);
 | |
| #endif
 | |
| #ifdef	IP_RETOPTS
 | |
| 	insint(d, "IP_RETOPTS", IP_RETOPTS);
 | |
| #endif
 | |
| #ifdef	IP_MULTICAST_IF
 | |
| 	insint(d, "IP_MULTICAST_IF", IP_MULTICAST_IF);
 | |
| #endif
 | |
| #ifdef	IP_MULTICAST_TTL
 | |
| 	insint(d, "IP_MULTICAST_TTL", IP_MULTICAST_TTL);
 | |
| #endif
 | |
| #ifdef	IP_MULTICAST_LOOP
 | |
| 	insint(d, "IP_MULTICAST_LOOP", IP_MULTICAST_LOOP);
 | |
| #endif
 | |
| #ifdef	IP_ADD_MEMBERSHIP
 | |
| 	insint(d, "IP_ADD_MEMBERSHIP", IP_ADD_MEMBERSHIP);
 | |
| #endif
 | |
| #ifdef	IP_DROP_MEMBERSHIP
 | |
| 	insint(d, "IP_DROP_MEMBERSHIP", IP_DROP_MEMBERSHIP);
 | |
| #endif
 | |
| #ifdef	IP_DEFAULT_MULTICAST_TTL
 | |
| 	insint(d, "IP_DEFAULT_MULTICAST_TTL", IP_DEFAULT_MULTICAST_TTL);
 | |
| #endif
 | |
| #ifdef	IP_DEFAULT_MULTICAST_LOOP
 | |
| 	insint(d, "IP_DEFAULT_MULTICAST_LOOP", IP_DEFAULT_MULTICAST_LOOP);
 | |
| #endif
 | |
| #ifdef	IP_MAX_MEMBERSHIPS
 | |
| 	insint(d, "IP_MAX_MEMBERSHIPS", IP_MAX_MEMBERSHIPS);
 | |
| #endif
 | |
| 
 | |
| 	/* IPv6 [gs]etsockopt options, defined in RFC2553 */
 | |
| #ifdef	IPV6_JOIN_GROUP
 | |
| 	insint(d, "IPV6_JOIN_GROUP", IPV6_JOIN_GROUP);
 | |
| #endif
 | |
| #ifdef	IPV6_LEAVE_GROUP
 | |
| 	insint(d, "IPV6_LEAVE_GROUP", IPV6_LEAVE_GROUP);
 | |
| #endif
 | |
| #ifdef	IPV6_MULTICAST_HOPS
 | |
| 	insint(d, "IPV6_MULTICAST_HOPS", IPV6_MULTICAST_HOPS);
 | |
| #endif
 | |
| #ifdef	IPV6_MULTICAST_IF
 | |
| 	insint(d, "IPV6_MULTICAST_IF", IPV6_MULTICAST_IF);
 | |
| #endif
 | |
| #ifdef	IPV6_MULTICAST_LOOP
 | |
| 	insint(d, "IPV6_MULTICAST_LOOP", IPV6_MULTICAST_LOOP);
 | |
| #endif
 | |
| #ifdef	IPV6_UNICAST_HOPS
 | |
| 	insint(d, "IPV6_UNICAST_HOPS", IPV6_UNICAST_HOPS);
 | |
| #endif
 | |
| 
 | |
| 	/* TCP options */
 | |
| #ifdef	TCP_NODELAY
 | |
| 	insint(d, "TCP_NODELAY", TCP_NODELAY);
 | |
| #endif
 | |
| #ifdef	TCP_MAXSEG
 | |
| 	insint(d, "TCP_MAXSEG", TCP_MAXSEG);
 | |
| #endif
 | |
| 
 | |
| 	/* IPX options */
 | |
| #ifdef	IPX_TYPE
 | |
| 	insint(d, "IPX_TYPE", IPX_TYPE);
 | |
| #endif
 | |
| 
 | |
| 	/* get{addr,name}info parameters */
 | |
| #ifdef EAI_ADDRFAMILY
 | |
| 	insint(d, "EAI_ADDRFAMILY", EAI_ADDRFAMILY);
 | |
| #endif
 | |
| #ifdef EAI_AGAIN
 | |
| 	insint(d, "EAI_AGAIN", EAI_AGAIN);
 | |
| #endif
 | |
| #ifdef EAI_BADFLAGS
 | |
| 	insint(d, "EAI_BADFLAGS", EAI_BADFLAGS);
 | |
| #endif
 | |
| #ifdef EAI_FAIL
 | |
| 	insint(d, "EAI_FAIL", EAI_FAIL);
 | |
| #endif
 | |
| #ifdef EAI_FAMILY
 | |
| 	insint(d, "EAI_FAMILY", EAI_FAMILY);
 | |
| #endif
 | |
| #ifdef EAI_MEMORY
 | |
| 	insint(d, "EAI_MEMORY", EAI_MEMORY);
 | |
| #endif
 | |
| #ifdef EAI_NODATA
 | |
| 	insint(d, "EAI_NODATA", EAI_NODATA);
 | |
| #endif
 | |
| #ifdef EAI_NONAME
 | |
| 	insint(d, "EAI_NONAME", EAI_NONAME);
 | |
| #endif
 | |
| #ifdef EAI_SERVICE
 | |
| 	insint(d, "EAI_SERVICE", EAI_SERVICE);
 | |
| #endif
 | |
| #ifdef EAI_SOCKTYPE
 | |
| 	insint(d, "EAI_SOCKTYPE", EAI_SOCKTYPE);
 | |
| #endif
 | |
| #ifdef EAI_SYSTEM
 | |
| 	insint(d, "EAI_SYSTEM", EAI_SYSTEM);
 | |
| #endif
 | |
| #ifdef EAI_BADHINTS
 | |
| 	insint(d, "EAI_BADHINTS", EAI_BADHINTS);
 | |
| #endif
 | |
| #ifdef EAI_PROTOCOL
 | |
| 	insint(d, "EAI_PROTOCOL", EAI_PROTOCOL);
 | |
| #endif
 | |
| #ifdef EAI_MAX
 | |
| 	insint(d, "EAI_MAX", EAI_MAX);
 | |
| #endif
 | |
| #ifdef AI_PASSIVE
 | |
| 	insint(d, "AI_PASSIVE", AI_PASSIVE);
 | |
| #endif
 | |
| #ifdef AI_CANONNAME
 | |
| 	insint(d, "AI_CANONNAME", AI_CANONNAME);
 | |
| #endif
 | |
| #ifdef AI_NUMERICHOST
 | |
| 	insint(d, "AI_NUMERICHOST", AI_NUMERICHOST);
 | |
| #endif
 | |
| #ifdef AI_MASK
 | |
| 	insint(d, "AI_MASK", AI_MASK);
 | |
| #endif
 | |
| #ifdef AI_ALL
 | |
| 	insint(d, "AI_ALL", AI_ALL);
 | |
| #endif
 | |
| #ifdef AI_V4MAPPED_CFG
 | |
| 	insint(d, "AI_V4MAPPED_CFG", AI_V4MAPPED_CFG);
 | |
| #endif
 | |
| #ifdef AI_ADDRCONFIG
 | |
| 	insint(d, "AI_ADDRCONFIG", AI_ADDRCONFIG);
 | |
| #endif
 | |
| #ifdef AI_V4MAPPED
 | |
| 	insint(d, "AI_V4MAPPED", AI_V4MAPPED);
 | |
| #endif
 | |
| #ifdef AI_DEFAULT
 | |
| 	insint(d, "AI_DEFAULT", AI_DEFAULT);
 | |
| #endif
 | |
| #ifdef NI_MAXHOST
 | |
| 	insint(d, "NI_MAXHOST", NI_MAXHOST);
 | |
| #endif
 | |
| #ifdef NI_MAXSERV
 | |
| 	insint(d, "NI_MAXSERV", NI_MAXSERV);
 | |
| #endif
 | |
| #ifdef NI_NOFQDN
 | |
| 	insint(d, "NI_NOFQDN", NI_NOFQDN);
 | |
| #endif
 | |
| #ifdef NI_NUMERICHOST
 | |
| 	insint(d, "NI_NUMERICHOST", NI_NUMERICHOST);
 | |
| #endif
 | |
| #ifdef NI_NAMEREQD
 | |
| 	insint(d, "NI_NAMEREQD", NI_NAMEREQD);
 | |
| #endif
 | |
| #ifdef NI_NUMERICSERV
 | |
| 	insint(d, "NI_NUMERICSERV", NI_NUMERICSERV);
 | |
| #endif
 | |
| #ifdef NI_DGRAM
 | |
| 	insint(d, "NI_DGRAM", NI_DGRAM);
 | |
| #endif
 | |
| 
 | |
| 	/* Initialize gethostbyname lock */
 | |
| #ifdef USE_GETHOSTBYNAME_LOCK
 | |
| 	gethostbyname_lock = PyThread_allocate_lock();
 | |
| #endif
 | |
| }
 | |
| 
 | |
| /* Simplistic emulation code for inet_pton that only works for IPv4 */
 | |
| #ifndef HAVE_INET_PTON
 | |
| int 
 | |
| inet_pton (int af, const char *src, void *dst)
 | |
| {
 | |
| 	if(af == AF_INET){
 | |
| 		long packed_addr;
 | |
| #ifdef USE_GUSI1
 | |
| 		packed_addr = (long)inet_addr(src).s_addr;
 | |
| #else
 | |
| 		packed_addr = inet_addr(src);
 | |
| #endif
 | |
| 		if (packed_addr == INADDR_NONE)
 | |
| 			return 0;
 | |
| 		memcpy(dst, &packed_addr, 4);
 | |
| 		return 1;
 | |
| 	}
 | |
| 	/* Should set errno to EAFNOSUPPORT */
 | |
| 	return -1;
 | |
| }
 | |
| 
 | |
| const char *
 | |
| inet_ntop(int af, const void *src, char *dst, socklen_t size)
 | |
| {
 | |
| 	if (af == AF_INET) {
 | |
| 		struct in_addr packed_addr;
 | |
| 		if (size < 16)
 | |
| 			/* Should set errno to ENOSPC. */
 | |
| 			return NULL;
 | |
| 		memcpy(&packed_addr, src, sizeof(packed_addr));
 | |
| 		return strncpy(dst, inet_ntoa(packed_addr), size);
 | |
| 	}
 | |
| 	/* Should set errno to EAFNOSUPPORT */
 | |
| 	return NULL;
 | |
| }
 | |
| #endif
 |