| lh | 9ed821d | 2023-04-07 01:36:19 -0700 | [diff] [blame] | 1 | #include	<string.h> | 
 | 2 | #include	<stdlib.h> | 
 | 3 |  | 
 | 4 | #ifdef UEMF | 
 | 5 | 	#include	"uemf.h" | 
 | 6 | #else | 
 | 7 | 	#include	<socket.h> | 
 | 8 | 	#include	<types.h> | 
 | 9 | 	#include	<unistd.h> | 
 | 10 | 	#include	"emfInternal.h" | 
 | 11 | #endif | 
 | 12 |  | 
 | 13 | static int	socketDoOutput(socket_t *sp, char *buf, int toWrite, int *errCode); | 
 | 14 | static int	tryAlternateSendTo(int sock, char *buf, int toWrite, int i, | 
 | 15 | 			struct sockaddr *server); | 
 | 16 |  | 
 | 17 | int 		socketHighestFd = -1;	 | 
 | 18 |  | 
 | 19 | socket_t	**socketList;			 | 
 | 20 | int			socketMax;				 | 
 | 21 |  | 
 | 22 |  | 
 | 23 | int	socketWriteString(int sid, char_t *buf) | 
 | 24 | { | 
 | 25 |  #ifdef UNICODE | 
 | 26 |  	char	*byteBuf; | 
 | 27 |  	int		r, buf_len; | 
 | 28 |   | 
 | 29 |  	buf_len = gstrlen(buf); | 
 | 30 |  	byteBuf = ballocUniToAsc(buf, buf_len); | 
 | 31 |  	r = socketWrite(sid, byteBuf, buf_len); | 
 | 32 |  	bfreeSafe(B_L, byteBuf); | 
 | 33 |  	return r; | 
 | 34 |  #else | 
 | 35 |  	return socketWrite(sid, buf, strlen(buf)); | 
 | 36 |  #endif /* UNICODE */ | 
 | 37 | } | 
 | 38 |  | 
 | 39 |  | 
 | 40 | int	socketWrite(int sid, char *buf, int bufsize) | 
 | 41 | { | 
 | 42 | 	socket_t	*sp; | 
 | 43 | 	ringq_t		*rq; | 
 | 44 | 	int			buf_len, bytesWritten, room; | 
 | 45 |  | 
 | 46 | 	a_assert(buf); | 
 | 47 | 	a_assert(bufsize >= 0); | 
 | 48 |  | 
 | 49 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 50 | 		return -1; | 
 | 51 | 	} | 
 | 52 |  | 
 | 53 | 	rq = &sp->outBuf; | 
 | 54 | 	for (bytesWritten = 0; bufsize > 0; ) { | 
 | 55 | 		if ((room = ringqPutBlkMax(rq)) == 0) { | 
 | 56 | 			if (socketFlush(sid) < 0) { | 
 | 57 | 				return -1; | 
 | 58 | 			} | 
 | 59 | 			if ((room = ringqPutBlkMax(rq)) == 0) { | 
 | 60 | 				if (sp->flags & SOCKET_BLOCK) { | 
 | 61 | #if (defined (WIN) || defined (CE)) | 
 | 62 | 					int		errCode; | 
 | 63 | 					if (! socketWaitForEvent(sp,  FD_WRITE | SOCKET_WRITABLE, &errCode)) { | 
 | 64 | 						return -1; | 
 | 65 | 					} | 
 | 66 | #endif | 
 | 67 | 					continue; | 
 | 68 | 				} | 
 | 69 | 				break; | 
 | 70 | 			} | 
 | 71 | 			continue; | 
 | 72 | 		} | 
 | 73 | 		buf_len = min(room, bufsize); | 
 | 74 | 		ringqPutBlk(rq, (unsigned char *) buf, buf_len); | 
 | 75 | 		bytesWritten += buf_len; | 
 | 76 | 		bufsize -= buf_len; | 
 | 77 | 		buf += buf_len; | 
 | 78 | 	} | 
 | 79 | 	return bytesWritten; | 
 | 80 | } | 
 | 81 |  | 
 | 82 |  | 
 | 83 | int	socketRead(int sid, char *buf, int bufsize) | 
 | 84 | { | 
 | 85 | 	socket_t	*sp; | 
 | 86 | 	ringq_t		*rq; | 
 | 87 | 	int			buf_len, room, errCode, bytesRead; | 
 | 88 |  | 
 | 89 | 	a_assert(buf); | 
 | 90 | 	a_assert(bufsize > 0); | 
 | 91 |  | 
 | 92 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 93 | 		return -1; | 
 | 94 | 	} | 
 | 95 |  | 
 | 96 | 	if (sp->flags & SOCKET_EOF) { | 
 | 97 | 		return 0; | 
 | 98 | 	} | 
 | 99 |  | 
 | 100 | 	rq = &sp->inBuf; | 
 | 101 | 	for (bytesRead = 0; bufsize > 0; ) { | 
 | 102 | 		buf_len = min(ringqLen(rq), bufsize); | 
 | 103 | 		if (buf_len <= 0) { | 
 | 104 |  | 
 | 105 | 			if ((sp->flags & SOCKET_BLOCK) && | 
 | 106 | 				(bytesRead > 0)) { | 
 | 107 | 				break; | 
 | 108 | 			} | 
 | 109 |  | 
 | 110 | 			ringqFlush(rq); | 
 | 111 | 			room = ringqPutBlkMax(rq); | 
 | 112 | 			buf_len = socketGetInput(sid, (char *) rq->endp, room, &errCode); | 
 | 113 | 			if (buf_len < 0) { | 
 | 114 | 				if (errCode == EWOULDBLOCK) { | 
 | 115 | 					if ((sp->flags & SOCKET_BLOCK) && | 
 | 116 | 						(bytesRead ==  0)) { | 
 | 117 | 						continue; | 
 | 118 | 					} | 
 | 119 | //					if (bytesRead >= 0) {  // kw 3 ;  bytesRead>=0 always be true | 
 | 120 | 						return bytesRead; | 
 | 121 | //					} | 
 | 122 | 				} | 
 | 123 | 				return -1; | 
 | 124 |  | 
 | 125 | 			} else if (buf_len == 0) { | 
 | 126 |  | 
 | 127 | 				if (bytesRead == 0) { | 
 | 128 | 					sp->flags |= SOCKET_EOF; | 
 | 129 | 				} | 
 | 130 | 				return bytesRead; | 
 | 131 | 			} | 
 | 132 | 			ringqPutBlkAdj(rq, buf_len); | 
 | 133 | 			buf_len = min(buf_len, bufsize); | 
 | 134 | 		} | 
 | 135 | 		memcpy(&buf[bytesRead], rq->servp, buf_len); | 
 | 136 | 		ringqGetBlkAdj(rq, buf_len); | 
 | 137 | 		bufsize -= buf_len; | 
 | 138 | 		bytesRead += buf_len; | 
 | 139 | 	} | 
 | 140 | 	return bytesRead; | 
 | 141 | } | 
 | 142 |  | 
 | 143 | int socketFlush(int sid) | 
 | 144 | { | 
 | 145 | 	socket_t	*sp; | 
 | 146 | 	ringq_t		*rq; | 
 | 147 | 	int			rq_len, bytesWritten, errCode; | 
 | 148 | 	int         errEINTRNum = 0; /* myp: ÓÃÓÚ¹æ±Üsocket´íÎó */ | 
 | 149 |  | 
 | 150 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 151 | 		return -1; | 
 | 152 | 	} | 
 | 153 | 	rq = &sp->outBuf; | 
 | 154 |  | 
 | 155 | 	if (! (sp->flags & SOCKET_BLOCK)) { | 
 | 156 | 		sp->flags |= SOCKET_FLUSHING; | 
 | 157 | 	} | 
 | 158 |  | 
 | 159 | 	while (ringqLen(rq) > 0) { | 
 | 160 | 		rq_len = ringqGetBlkMax(&sp->outBuf); | 
 | 161 | 		bytesWritten = socketDoOutput(sp, (char*) rq->servp, rq_len, &errCode); | 
 | 162 | 		if (bytesWritten < 0) { | 
 | 163 | 			if (errCode == EINTR && errEINTRNum++ < 1000) { | 
 | 164 | 				continue; | 
 | 165 | //			} else if (errCode == EWOULDBLOCK || errCode == EAGAIN) { kw 3   // #define	EWOULDBLOCK	EAGAIN | 
 | 166 |             } else if (errCode == EAGAIN) { | 
 | 167 | 				if (sp->saveMask < 0 ) { | 
 | 168 | 					sp->saveMask = sp->handlerMask; | 
 | 169 | 					socketRegisterInterest(sp,  | 
 | 170 | 					sp->handlerMask | SOCKET_WRITABLE); | 
 | 171 | 				} | 
 | 172 | 				return 0; | 
 | 173 | 			} | 
 | 174 | 			return -1; | 
 | 175 | 		} | 
 | 176 | 		ringqGetBlkAdj(rq, bytesWritten); | 
 | 177 | 	} | 
 | 178 |  | 
 | 179 | 	if (ringqLen(rq) == 0) { | 
 | 180 | 		ringqFlush(rq); | 
 | 181 | 	} | 
 | 182 |  | 
 | 183 | 	if (sp->saveMask >= 0) { | 
 | 184 | 		socketRegisterInterest(sp, sp->saveMask); | 
 | 185 | 		sp->saveMask = -1; | 
 | 186 | 	} | 
 | 187 | 	sp->flags &= ~SOCKET_FLUSHING; | 
 | 188 | 	return 0; | 
 | 189 | } | 
 | 190 |  | 
 | 191 | int	socketGets(int sid, char_t **buf) | 
 | 192 | { | 
 | 193 | 	socket_t	*sp; | 
 | 194 | 	ringq_t		*lq; | 
 | 195 | 	char		c = '\0'; //cov | 
 | 196 | 	int			rc, rq_len; | 
 | 197 |  | 
 | 198 | 	a_assert(buf); | 
 | 199 | 	*buf = NULL; | 
 | 200 |  | 
 | 201 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 202 | 		return -1; | 
 | 203 | 	} | 
 | 204 | 	lq = &sp->lineBuf; | 
 | 205 |  | 
 | 206 | 	while (ringqLen(lq) < 1536) { | 
 | 207 |  | 
 | 208 | 		if ((rc = socketRead(sid, &c, 1)) < 0) { | 
 | 209 | 			return rc; | 
 | 210 | 		} | 
 | 211 | 		 | 
 | 212 | 		if (rc == 0) { | 
 | 213 | 			if (ringqLen(lq) > 0 && (sp->flags & SOCKET_EOF)) { | 
 | 214 | 				c = '\n'; | 
 | 215 | 			} else { | 
 | 216 | 				return -1; | 
 | 217 | 			} | 
 | 218 | 		} | 
 | 219 |  | 
 | 220 | 		if (c == '\n') { | 
 | 221 | 			rq_len = ringqLen(lq); | 
 | 222 | 			if (rq_len > 0) { | 
 | 223 | 				*buf = ballocAscToUni((char *)lq->servp, rq_len); | 
 | 224 | 			} else { | 
 | 225 | 				*buf = NULL; | 
 | 226 | 			} | 
 | 227 | 			ringqFlush(lq); | 
 | 228 | 			return rq_len; | 
 | 229 |  | 
 | 230 | 		} else if (c == '\r') { | 
 | 231 | 			continue; | 
 | 232 | 		} | 
 | 233 | 		ringqPutcA(lq, c); | 
 | 234 | 	} | 
 | 235 | 	ringqFlush(lq); | 
 | 236 | 	return -1; | 
 | 237 | } | 
 | 238 |  | 
 | 239 |  | 
 | 240 | int socketInputBuffered(int sid) | 
 | 241 | { | 
 | 242 | 	socket_t	*sp; | 
 | 243 |  | 
 | 244 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 245 | 		return -1; | 
 | 246 | 	} | 
 | 247 | 	if (socketEof(sid)) { | 
 | 248 | 		return -1; | 
 | 249 | 	} | 
 | 250 | 	return ringqLen(&sp->lineBuf) + ringqLen(&sp->inBuf); | 
 | 251 | } | 
 | 252 |  | 
 | 253 | int socketEof(int sid) | 
 | 254 | { | 
 | 255 | 	socket_t	*sp; | 
 | 256 |  | 
 | 257 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 258 | 		return -1; | 
 | 259 | 	} | 
 | 260 | 	return sp->flags & SOCKET_EOF; | 
 | 261 | } | 
 | 262 |  | 
 | 263 | void socketCreateHandler(int sid, int handlerMask, socketHandler_t handler,  | 
 | 264 | 		int data) | 
 | 265 | { | 
 | 266 | 	socket_t	*sp; | 
 | 267 |  | 
 | 268 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 269 | 		return; | 
 | 270 | 	} | 
 | 271 | 	sp->handler = handler; | 
 | 272 | 	sp->handler_data = data; | 
 | 273 | 	socketRegisterInterest(sp, handlerMask); | 
 | 274 | } | 
 | 275 |  | 
 | 276 | static int socketDoOutput(socket_t *sp, char *buf, int toWrite, int *errCode) | 
 | 277 | { | 
 | 278 | 	struct sockaddr_in	server; | 
 | 279 | 	int					bytes; | 
 | 280 |  | 
 | 281 | 	a_assert(sp); | 
 | 282 | 	a_assert(buf); | 
 | 283 | 	a_assert(toWrite > 0); | 
 | 284 | 	a_assert(errCode); | 
 | 285 |  | 
 | 286 | 	*errCode = 0; | 
 | 287 |  | 
 | 288 | 	if (sp->flags & SOCKET_BROADCAST) { | 
 | 289 | 		server.sin_family = AF_INET; | 
 | 290 | 		server.sin_addr.s_addr = INADDR_BROADCAST; | 
 | 291 | 		server.sin_port = htons((short)(sp->port & 0xFFFF)); | 
 | 292 | 		bytes = sendto(sp->sock, buf, toWrite, 0,(struct sockaddr *) &server, sizeof(server)); | 
 | 293 | 	} else if (sp->flags & SOCKET_DATAGRAM) { | 
 | 294 | 		server.sin_family = AF_INET; | 
 | 295 | 		server.sin_addr.s_addr = inet_addr(sp->host); | 
 | 296 | 		server.sin_port = htons((short)(sp->port & 0xFFFF)); | 
 | 297 | 		bytes = sendto(sp->sock, buf, toWrite, 0,(struct sockaddr *) &server, sizeof(server)); | 
 | 298 |  | 
 | 299 | 	} else { | 
 | 300 | 		bytes = send(sp->sock, buf, toWrite, 0); | 
 | 301 | 	} | 
 | 302 |  | 
 | 303 | 	if (bytes < 0) { | 
 | 304 | 		*errCode = socketGetError(); | 
 | 305 |         //printf("\n socketDoOutput ERROR: bytes = %d, *errCode = %d! ", bytes, *errCode); | 
 | 306 | 		return -1; | 
 | 307 |  | 
 | 308 | 	} else if (bytes == 0 && bytes != toWrite) { | 
 | 309 | 		*errCode = EWOULDBLOCK; | 
 | 310 |         //printf("\n socketDoOutput ERROR: bytes = %d, *errCode = %d! ", bytes, *errCode); | 
 | 311 | 		return -1; | 
 | 312 | 	} | 
 | 313 |  | 
 | 314 | 	return bytes; | 
 | 315 | } | 
 | 316 |  | 
 | 317 | void socketDeleteHandler(int sid) | 
 | 318 | { | 
 | 319 | 	socket_t	*sp; | 
 | 320 |  | 
 | 321 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 322 | 		return; | 
 | 323 | 	} | 
 | 324 | 	sp->handler = NULL; | 
 | 325 | 	socketRegisterInterest(sp, 0); | 
 | 326 | } | 
 | 327 |  | 
 | 328 | int socketAlloc(char *host, int port, socketAccept_t accept, int flags) | 
 | 329 | { | 
 | 330 | 	socket_t	*sp; | 
 | 331 | 	int			sid; | 
 | 332 |  | 
 | 333 | 	if ((sid = hAllocEntry((void***) &socketList, &socketMax, | 
 | 334 | 			sizeof(socket_t))) < 0) { | 
 | 335 | 		return -1; | 
 | 336 | 	} | 
 | 337 | 	sp = socketList[sid]; | 
 | 338 |  | 
 | 339 | 	sp->sid = sid; | 
 | 340 | 	sp->accept = accept; | 
 | 341 | 	sp->port = port; | 
 | 342 | 	sp->fileHandle = -1; | 
 | 343 | 	sp->saveMask = -1; | 
 | 344 |  | 
 | 345 | 	if (host) { | 
 | 346 | 		strncpy(sp->host, host, sizeof(sp->host)-1); | 
 | 347 | 	} | 
 | 348 |  | 
 | 349 | 	a_assert((flags & ~(SOCKET_BROADCAST|SOCKET_DATAGRAM|SOCKET_BLOCK| | 
 | 350 | 						SOCKET_LISTENING)) == 0); | 
 | 351 | 	sp->flags = flags & (SOCKET_BROADCAST | SOCKET_DATAGRAM | SOCKET_BLOCK| | 
 | 352 | 						SOCKET_LISTENING); | 
 | 353 |  | 
 | 354 |  | 
 | 355 | 	ringqOpen(&sp->inBuf, SOCKET_BUFSIZ, SOCKET_BUFSIZ); | 
 | 356 | 	ringqOpen(&sp->outBuf, SOCKET_BUFSIZ + 1, SOCKET_BUFSIZ + 1); | 
 | 357 | 	ringqOpen(&sp->lineBuf, SOCKET_BUFSIZ, -1); | 
 | 358 |  | 
 | 359 | 	return sid; | 
 | 360 | } | 
 | 361 |  | 
 | 362 | void socketFree(int sid) | 
 | 363 | { | 
 | 364 | 	socket_t	*sp; | 
 | 365 | 	char_t		buf[256]; | 
 | 366 | 	int			i; | 
 | 367 | 	int recv_len = -1; | 
 | 368 |  | 
 | 369 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 370 | 		return; | 
 | 371 | 	} | 
 | 372 |  | 
 | 373 | 	socketRegisterInterest(sp, 0); | 
 | 374 | 	if (sp->sock >= 0) { | 
 | 375 | 		socketSetBlock(sid, 0); | 
 | 376 | 		if (shutdown(sp->sock, 1) >= 0) { | 
 | 377 | 			recv_len = recv(sp->sock, buf, sizeof(buf), 0); | 
 | 378 | 			if(recv_len < 0){ | 
 | 379 | 				; | 
 | 380 | 			}else if(recv_len == 0){ | 
 | 381 | 				// ÕâÀï±íʾ¶Ô¶ËµÄsocketÒÑÕý³£¹Ø±Õ? | 
 | 382 | 				; | 
 | 383 | 			}else if(recv_len == sizeof(buf)){ | 
 | 384 | 				; | 
 | 385 | 			}else{ | 
 | 386 | 				;// ÐèÒªÔٴζÁÈ¡ | 
 | 387 | 			} | 
 | 388 | 		} | 
 | 389 | #if (defined (WIN) || defined (CE)) | 
 | 390 | 		closesocket(sp->sock); | 
 | 391 | #else | 
 | 392 | 		close(sp->sock); | 
 | 393 | #endif | 
 | 394 | 	} | 
 | 395 |  | 
 | 396 | 	ringqClose(&sp->inBuf); | 
 | 397 | 	ringqClose(&sp->outBuf); | 
 | 398 | 	ringqClose(&sp->lineBuf); | 
 | 399 |  | 
 | 400 | 	bfree(B_L, sp); | 
 | 401 | 	socketMax = hFree((void***) &socketList, sid); | 
 | 402 |  | 
 | 403 | 	socketHighestFd = -1; | 
 | 404 | 	for (i = 0; i < socketMax; i++) { | 
 | 405 | 		if ((sp = socketList[i]) == NULL) { | 
 | 406 | 			continue; | 
 | 407 | 		}  | 
 | 408 | 		socketHighestFd = max(socketHighestFd, sp->sock); | 
 | 409 | 	} | 
 | 410 | } | 
 | 411 |  | 
 | 412 |  | 
 | 413 | int socketGetError() | 
 | 414 | { | 
 | 415 | #if (defined (WIN) || defined (CE)) | 
 | 416 | 	switch (WSAGetLastError()) { | 
 | 417 | 	case WSAEWOULDBLOCK: | 
 | 418 | 		return EWOULDBLOCK; | 
 | 419 | 	case WSAECONNRESET: | 
 | 420 | 		return ECONNRESET; | 
 | 421 | 	case WSAENETDOWN: | 
 | 422 | 		return ENETDOWN; | 
 | 423 | 	case WSAEPROCLIM: | 
 | 424 | 		return EAGAIN; | 
 | 425 | 	case WSAEINTR: | 
 | 426 | 		return EINTR; | 
 | 427 | 	default: | 
 | 428 | 		return EINVAL; | 
 | 429 | 	} | 
 | 430 | #else | 
 | 431 | 	return errno; | 
 | 432 | #endif | 
 | 433 | } | 
 | 434 |  | 
 | 435 | socket_t *socketPtr(int sid) | 
 | 436 | { | 
 | 437 | 	if (sid < 0 || sid >= socketMax || socketList[sid] == NULL) { | 
 | 438 | 		a_assert(NULL); | 
 | 439 | 		errno = EBADF; | 
 | 440 | 		return NULL; | 
 | 441 | 	} | 
 | 442 |  | 
 | 443 | 	a_assert(socketList[sid]); | 
 | 444 | 	return socketList[sid]; | 
 | 445 | } | 
 | 446 |  | 
 | 447 | int socketGetHandle(int sid) | 
 | 448 | { | 
 | 449 | 	socket_t	*sp; | 
 | 450 |  | 
 | 451 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 452 | 		return -1; | 
 | 453 | 	} | 
 | 454 | 	return sp->sock; | 
 | 455 | } | 
 | 456 |  | 
 | 457 | int socketGetBlock(int sid) | 
 | 458 | { | 
 | 459 | 	socket_t	*sp; | 
 | 460 |  | 
 | 461 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 462 | 		a_assert(0); | 
 | 463 | 		return 0; | 
 | 464 | 	} | 
 | 465 | 	return (sp->flags & SOCKET_BLOCK); | 
 | 466 | } | 
 | 467 |  | 
 | 468 | int socketGetMode(int sid) | 
 | 469 | { | 
 | 470 | 	socket_t	*sp; | 
 | 471 |  | 
 | 472 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 473 | 		a_assert(0); | 
 | 474 | 		return 0; | 
 | 475 | 	} | 
 | 476 | 	return sp->flags; | 
 | 477 | } | 
 | 478 |  | 
 | 479 | void socketSetMode(int sid, int mode) | 
 | 480 | { | 
 | 481 | 	socket_t	*sp; | 
 | 482 |  | 
 | 483 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 484 | 		a_assert(0); | 
 | 485 | 		return; | 
 | 486 | 	} | 
 | 487 | 	sp->flags = mode; | 
 | 488 | } | 
 | 489 |  | 
 | 490 | int socketGetPort(int sid) | 
 | 491 | { | 
 | 492 | 	socket_t	*sp; | 
 | 493 |  | 
 | 494 | 	if ((sp = socketPtr(sid)) == NULL) { | 
 | 495 | 		return -1; | 
 | 496 | 	} | 
 | 497 | 	return sp->port; | 
 | 498 | } | 
 | 499 |  |