1 | /** \file TcpSocket.cpp |
---|
2 | ** \date 2004-02-13 |
---|
3 | ** \author grymse@alhem.net |
---|
4 | **/ |
---|
5 | /* |
---|
6 | Copyright (C) 2004-2007 Anders Hedstrom |
---|
7 | |
---|
8 | This library is made available under the terms of the GNU GPL. |
---|
9 | |
---|
10 | If you would like to use this library in a closed-source application, |
---|
11 | a separate license agreement is available. For information about |
---|
12 | the closed-source license agreement for the C++ sockets library, |
---|
13 | please visit http://www.alhem.net/Sockets/license.html and/or |
---|
14 | email license@alhem.net. |
---|
15 | |
---|
16 | This program is free software; you can redistribute it and/or |
---|
17 | modify it under the terms of the GNU General Public License |
---|
18 | as published by the Free Software Foundation; either version 2 |
---|
19 | of the License, or (at your option) any later version. |
---|
20 | |
---|
21 | This program is distributed in the hope that it will be useful, |
---|
22 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
23 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
---|
24 | GNU General Public License for more details. |
---|
25 | |
---|
26 | You should have received a copy of the GNU General Public License |
---|
27 | along with this program; if not, write to the Free Software |
---|
28 | Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. |
---|
29 | */ |
---|
30 | #ifdef _WIN32 |
---|
31 | #ifdef _MSC_VER |
---|
32 | #pragma warning(disable:4786) |
---|
33 | #endif |
---|
34 | #include <stdlib.h> |
---|
35 | #else |
---|
36 | #include <errno.h> |
---|
37 | #endif |
---|
38 | #include "ISocketHandler.h" |
---|
39 | #include <fcntl.h> |
---|
40 | #include <assert.h> |
---|
41 | #include <stdarg.h> |
---|
42 | #ifdef HAVE_OPENSSL |
---|
43 | #include <openssl/rand.h> |
---|
44 | #include <openssl/err.h> |
---|
45 | #endif |
---|
46 | #include <map> |
---|
47 | |
---|
48 | #include "TcpSocket.h" |
---|
49 | #include "Utility.h" |
---|
50 | #include "Ipv4Address.h" |
---|
51 | #include "Ipv6Address.h" |
---|
52 | #include "Mutex.h" |
---|
53 | #include "IFile.h" |
---|
54 | |
---|
55 | #ifdef SOCKETS_NAMESPACE |
---|
56 | namespace SOCKETS_NAMESPACE { |
---|
57 | #endif |
---|
58 | |
---|
59 | |
---|
60 | //#ifdef _DEBUG |
---|
61 | //#define DEB(x) x |
---|
62 | //#else |
---|
63 | #define DEB(x) |
---|
64 | //#endif |
---|
65 | |
---|
66 | |
---|
67 | // statics |
---|
68 | #ifdef HAVE_OPENSSL |
---|
69 | SSLInitializer TcpSocket::m_ssl_init; |
---|
70 | #endif |
---|
71 | |
---|
72 | |
---|
73 | // thanks, q |
---|
74 | #ifdef _MSC_VER |
---|
75 | #pragma warning(disable:4355) |
---|
76 | #endif |
---|
77 | TcpSocket::TcpSocket(ISocketHandler& h) : StreamSocket(h) |
---|
78 | ,ibuf(TCP_BUFSIZE_READ) |
---|
79 | ,m_b_input_buffer_disabled(false) |
---|
80 | ,m_bytes_sent(0) |
---|
81 | ,m_bytes_received(0) |
---|
82 | ,m_skip_c(false) |
---|
83 | #ifdef SOCKETS_DYNAMIC_TEMP |
---|
84 | ,m_buf(new char[TCP_BUFSIZE_READ + 1]) |
---|
85 | #endif |
---|
86 | ,m_obuf_top(NULL) |
---|
87 | ,m_transfer_limit(0) |
---|
88 | ,m_output_length(0) |
---|
89 | #ifdef HAVE_OPENSSL |
---|
90 | ,m_ssl_ctx(NULL) |
---|
91 | ,m_ssl(NULL) |
---|
92 | ,m_sbio(NULL) |
---|
93 | #endif |
---|
94 | #ifdef ENABLE_SOCKS4 |
---|
95 | ,m_socks4_state(0) |
---|
96 | #endif |
---|
97 | #ifdef ENABLE_RESOLVER |
---|
98 | ,m_resolver_id(0) |
---|
99 | #endif |
---|
100 | #ifdef ENABLE_RECONNECT |
---|
101 | ,m_b_reconnect(false) |
---|
102 | ,m_b_is_reconnect(false) |
---|
103 | #endif |
---|
104 | { |
---|
105 | } |
---|
106 | #ifdef _MSC_VER |
---|
107 | #pragma warning(default:4355) |
---|
108 | #endif |
---|
109 | |
---|
110 | |
---|
111 | #ifdef _MSC_VER |
---|
112 | #pragma warning(disable:4355) |
---|
113 | #endif |
---|
114 | TcpSocket::TcpSocket(ISocketHandler& h,size_t isize,size_t osize) : StreamSocket(h) |
---|
115 | ,ibuf(isize) |
---|
116 | ,m_b_input_buffer_disabled(false) |
---|
117 | ,m_bytes_sent(0) |
---|
118 | ,m_bytes_received(0) |
---|
119 | ,m_skip_c(false) |
---|
120 | #ifdef SOCKETS_DYNAMIC_TEMP |
---|
121 | ,m_buf(new char[TCP_BUFSIZE_READ + 1]) |
---|
122 | #endif |
---|
123 | ,m_obuf_top(NULL) |
---|
124 | ,m_transfer_limit(0) |
---|
125 | ,m_output_length(0) |
---|
126 | #ifdef HAVE_OPENSSL |
---|
127 | ,m_ssl_ctx(NULL) |
---|
128 | ,m_ssl(NULL) |
---|
129 | ,m_sbio(NULL) |
---|
130 | #endif |
---|
131 | #ifdef ENABLE_SOCKS4 |
---|
132 | ,m_socks4_state(0) |
---|
133 | #endif |
---|
134 | #ifdef ENABLE_RESOLVER |
---|
135 | ,m_resolver_id(0) |
---|
136 | #endif |
---|
137 | #ifdef ENABLE_RECONNECT |
---|
138 | ,m_b_reconnect(false) |
---|
139 | ,m_b_is_reconnect(false) |
---|
140 | #endif |
---|
141 | { |
---|
142 | } |
---|
143 | #ifdef _MSC_VER |
---|
144 | #pragma warning(default:4355) |
---|
145 | #endif |
---|
146 | |
---|
147 | |
---|
148 | TcpSocket::~TcpSocket() |
---|
149 | { |
---|
150 | #ifdef SOCKETS_DYNAMIC_TEMP |
---|
151 | delete[] m_buf; |
---|
152 | #endif |
---|
153 | // %! empty m_obuf |
---|
154 | while (m_obuf.size()) |
---|
155 | { |
---|
156 | output_l::iterator it = m_obuf.begin(); |
---|
157 | OUTPUT *p = *it; |
---|
158 | delete p; |
---|
159 | m_obuf.erase(it); |
---|
160 | } |
---|
161 | #ifdef HAVE_OPENSSL |
---|
162 | if (m_ssl) |
---|
163 | { |
---|
164 | SSL_free(m_ssl); |
---|
165 | } |
---|
166 | #endif |
---|
167 | } |
---|
168 | |
---|
169 | |
---|
170 | bool TcpSocket::Open(ipaddr_t ip,port_t port,bool skip_socks) |
---|
171 | { |
---|
172 | Ipv4Address ad(ip, port); |
---|
173 | Ipv4Address local; |
---|
174 | return Open(ad, local, skip_socks); |
---|
175 | } |
---|
176 | |
---|
177 | |
---|
178 | #ifdef ENABLE_IPV6 |
---|
179 | #ifdef IPPROTO_IPV6 |
---|
180 | bool TcpSocket::Open(in6_addr ip,port_t port,bool skip_socks) |
---|
181 | { |
---|
182 | Ipv6Address ad(ip, port); |
---|
183 | return Open(ad, skip_socks); |
---|
184 | } |
---|
185 | #endif |
---|
186 | #endif |
---|
187 | |
---|
188 | |
---|
189 | bool TcpSocket::Open(SocketAddress& ad,bool skip_socks) |
---|
190 | { |
---|
191 | Ipv4Address bind_ad("0.0.0.0", 0); |
---|
192 | return Open(ad, bind_ad, skip_socks); |
---|
193 | } |
---|
194 | |
---|
195 | |
---|
196 | bool TcpSocket::Open(SocketAddress& ad,SocketAddress& bind_ad,bool skip_socks) |
---|
197 | { |
---|
198 | if (!ad.IsValid()) |
---|
199 | { |
---|
200 | Handler().LogError(this, "Open", 0, "Invalid SocketAddress", LOG_LEVEL_FATAL); |
---|
201 | SetCloseAndDelete(); |
---|
202 | return false; |
---|
203 | } |
---|
204 | if (Handler().GetCount() >= FD_SETSIZE) |
---|
205 | { |
---|
206 | Handler().LogError(this, "Open", 0, "no space left in fd_set", LOG_LEVEL_FATAL); |
---|
207 | SetCloseAndDelete(); |
---|
208 | return false; |
---|
209 | } |
---|
210 | SetConnecting(false); |
---|
211 | #ifdef ENABLE_SOCKS4 |
---|
212 | SetSocks4(false); |
---|
213 | #endif |
---|
214 | // check for pooling |
---|
215 | #ifdef ENABLE_POOL |
---|
216 | if (Handler().PoolEnabled()) |
---|
217 | { |
---|
218 | ISocketHandler::PoolSocket *pools = Handler().FindConnection(SOCK_STREAM, "tcp", ad); |
---|
219 | if (pools) |
---|
220 | { |
---|
221 | CopyConnection( pools ); |
---|
222 | delete pools; |
---|
223 | |
---|
224 | SetIsClient(); |
---|
225 | SetCallOnConnect(); // ISocketHandler must call OnConnect |
---|
226 | Handler().LogError(this, "SetCallOnConnect", 0, "Found pooled connection", LOG_LEVEL_INFO); |
---|
227 | return true; |
---|
228 | } |
---|
229 | } |
---|
230 | #endif |
---|
231 | // if not, create new connection |
---|
232 | SOCKET s = CreateSocket(ad.GetFamily(), SOCK_STREAM, "tcp"); |
---|
233 | if (s == INVALID_SOCKET) |
---|
234 | { |
---|
235 | return false; |
---|
236 | } |
---|
237 | // socket must be nonblocking for async connect |
---|
238 | if (!SetNonblocking(true, s)) |
---|
239 | { |
---|
240 | SetCloseAndDelete(); |
---|
241 | closesocket(s); |
---|
242 | return false; |
---|
243 | } |
---|
244 | #ifdef ENABLE_POOL |
---|
245 | SetIsClient(); // client because we connect |
---|
246 | #endif |
---|
247 | SetClientRemoteAddress(ad); |
---|
248 | int n = 0; |
---|
249 | if (bind_ad.GetPort() != 0) |
---|
250 | { |
---|
251 | bind(s, bind_ad, bind_ad); |
---|
252 | } |
---|
253 | #ifdef ENABLE_SOCKS4 |
---|
254 | if (!skip_socks && GetSocks4Host() && GetSocks4Port()) |
---|
255 | { |
---|
256 | Ipv4Address sa(GetSocks4Host(), GetSocks4Port()); |
---|
257 | { |
---|
258 | std::string sockshost; |
---|
259 | Utility::l2ip(GetSocks4Host(), sockshost); |
---|
260 | Handler().LogError(this, "Open", 0, "Connecting to socks4 server @ " + sockshost + ":" + |
---|
261 | Utility::l2string(GetSocks4Port()), LOG_LEVEL_INFO); |
---|
262 | } |
---|
263 | SetSocks4(); |
---|
264 | n = connect(s, sa, sa); |
---|
265 | SetRemoteAddress(sa); |
---|
266 | } |
---|
267 | else |
---|
268 | #endif |
---|
269 | { |
---|
270 | n = connect(s, ad, ad); |
---|
271 | SetRemoteAddress(ad); |
---|
272 | } |
---|
273 | if (n == -1) |
---|
274 | { |
---|
275 | // check error code that means a connect is in progress |
---|
276 | #ifdef _WIN32 |
---|
277 | if (Errno == WSAEWOULDBLOCK) |
---|
278 | #else |
---|
279 | if (Errno == EINPROGRESS) |
---|
280 | #endif |
---|
281 | { |
---|
282 | Attach(s); |
---|
283 | SetConnecting( true ); // this flag will control fd_set's |
---|
284 | } |
---|
285 | else |
---|
286 | #ifdef ENABLE_SOCKS4 |
---|
287 | if (Socks4() && Handler().Socks4TryDirect() ) // retry |
---|
288 | { |
---|
289 | closesocket(s); |
---|
290 | return Open(ad, true); |
---|
291 | } |
---|
292 | else |
---|
293 | #endif |
---|
294 | #ifdef ENABLE_RECONNECT |
---|
295 | if (Reconnect()) |
---|
296 | { |
---|
297 | Handler().LogError(this, "connect: failed, reconnect pending", Errno, StrError(Errno), LOG_LEVEL_INFO); |
---|
298 | Attach(s); |
---|
299 | SetConnecting( true ); // this flag will control fd_set's |
---|
300 | } |
---|
301 | else |
---|
302 | #endif |
---|
303 | { |
---|
304 | Handler().LogError(this, "connect: failed", Errno, StrError(Errno), LOG_LEVEL_FATAL); |
---|
305 | SetCloseAndDelete(); |
---|
306 | closesocket(s); |
---|
307 | return false; |
---|
308 | } |
---|
309 | } |
---|
310 | else |
---|
311 | { |
---|
312 | Attach(s); |
---|
313 | SetCallOnConnect(); // ISocketHandler must call OnConnect |
---|
314 | } |
---|
315 | |
---|
316 | // 'true' means connected or connecting(not yet connected) |
---|
317 | // 'false' means something failed |
---|
318 | return true; //!Connecting(); |
---|
319 | } |
---|
320 | |
---|
321 | |
---|
322 | bool TcpSocket::Open(const std::string &host,port_t port) |
---|
323 | { |
---|
324 | #ifdef ENABLE_IPV6 |
---|
325 | #ifdef IPPROTO_IPV6 |
---|
326 | if (IsIpv6()) |
---|
327 | { |
---|
328 | #ifdef ENABLE_RESOLVER |
---|
329 | if (!Handler().ResolverEnabled() || Utility::isipv6(host) ) |
---|
330 | { |
---|
331 | #endif |
---|
332 | in6_addr a; |
---|
333 | if (!Utility::u2ip(host, a)) |
---|
334 | { |
---|
335 | SetCloseAndDelete(); |
---|
336 | return false; |
---|
337 | } |
---|
338 | Ipv6Address ad(a, port); |
---|
339 | Ipv6Address local; |
---|
340 | return Open(ad, local); |
---|
341 | #ifdef ENABLE_RESOLVER |
---|
342 | } |
---|
343 | m_resolver_id = Resolve6(host, port); |
---|
344 | return true; |
---|
345 | #endif |
---|
346 | } |
---|
347 | #endif |
---|
348 | #endif |
---|
349 | #ifdef ENABLE_RESOLVER |
---|
350 | if (!Handler().ResolverEnabled() || Utility::isipv4(host) ) |
---|
351 | { |
---|
352 | #endif |
---|
353 | ipaddr_t l; |
---|
354 | if (!Utility::u2ip(host,l)) |
---|
355 | { |
---|
356 | SetCloseAndDelete(); |
---|
357 | return false; |
---|
358 | } |
---|
359 | Ipv4Address ad(l, port); |
---|
360 | Ipv4Address local; |
---|
361 | return Open(ad, local); |
---|
362 | #ifdef ENABLE_RESOLVER |
---|
363 | } |
---|
364 | // resolve using async resolver thread |
---|
365 | m_resolver_id = Resolve(host, port); |
---|
366 | return true; |
---|
367 | #endif |
---|
368 | } |
---|
369 | |
---|
370 | |
---|
371 | #ifdef ENABLE_RESOLVER |
---|
372 | void TcpSocket::OnResolved(int id,ipaddr_t a,port_t port) |
---|
373 | { |
---|
374 | DEB( fprintf(stderr, "TcpSocket::OnResolved id %d addr %x port %d\n", id, a, port);) |
---|
375 | if (id == m_resolver_id) |
---|
376 | { |
---|
377 | if (a && port) |
---|
378 | { |
---|
379 | Ipv4Address ad(a, port); |
---|
380 | Ipv4Address local; |
---|
381 | if (Open(ad, local)) |
---|
382 | { |
---|
383 | if (!Handler().Valid(this)) |
---|
384 | { |
---|
385 | Handler().Add(this); |
---|
386 | } |
---|
387 | } |
---|
388 | } |
---|
389 | else |
---|
390 | { |
---|
391 | Handler().LogError(this, "OnResolved", 0, "Resolver failed", LOG_LEVEL_FATAL); |
---|
392 | SetCloseAndDelete(); |
---|
393 | } |
---|
394 | } |
---|
395 | else |
---|
396 | { |
---|
397 | Handler().LogError(this, "OnResolved", id, "Resolver returned wrong job id", LOG_LEVEL_FATAL); |
---|
398 | SetCloseAndDelete(); |
---|
399 | } |
---|
400 | } |
---|
401 | |
---|
402 | |
---|
403 | #ifdef ENABLE_IPV6 |
---|
404 | void TcpSocket::OnResolved(int id,in6_addr& a,port_t port) |
---|
405 | { |
---|
406 | if (id == m_resolver_id) |
---|
407 | { |
---|
408 | Ipv6Address ad(a, port); |
---|
409 | if (ad.IsValid()) |
---|
410 | { |
---|
411 | Ipv6Address local; |
---|
412 | if (Open(ad, local)) |
---|
413 | { |
---|
414 | if (!Handler().Valid(this)) |
---|
415 | { |
---|
416 | Handler().Add(this); |
---|
417 | } |
---|
418 | } |
---|
419 | } |
---|
420 | } |
---|
421 | else |
---|
422 | { |
---|
423 | Handler().LogError(this, "OnResolved", id, "Resolver returned wrong job id", LOG_LEVEL_FATAL); |
---|
424 | SetCloseAndDelete(); |
---|
425 | } |
---|
426 | } |
---|
427 | #endif |
---|
428 | #endif |
---|
429 | |
---|
430 | |
---|
431 | void TcpSocket::OnRead() |
---|
432 | { |
---|
433 | int n = 0; |
---|
434 | #ifdef SOCKETS_DYNAMIC_TEMP |
---|
435 | char *buf = m_buf; |
---|
436 | #else |
---|
437 | char buf[TCP_BUFSIZE_READ]; |
---|
438 | #endif |
---|
439 | #ifdef HAVE_OPENSSL |
---|
440 | if (IsSSL()) |
---|
441 | { |
---|
442 | if (!Ready()) |
---|
443 | return; |
---|
444 | n = SSL_read(m_ssl, buf, TCP_BUFSIZE_READ); |
---|
445 | if (n == -1) |
---|
446 | { |
---|
447 | n = SSL_get_error(m_ssl, n); |
---|
448 | switch (n) |
---|
449 | { |
---|
450 | case SSL_ERROR_NONE: |
---|
451 | case SSL_ERROR_WANT_READ: |
---|
452 | case SSL_ERROR_WANT_WRITE: |
---|
453 | break; |
---|
454 | case SSL_ERROR_ZERO_RETURN: |
---|
455 | DEB( fprintf(stderr, "SSL_read() returns zero - closing socket\n");) |
---|
456 | OnDisconnect(); |
---|
457 | SetCloseAndDelete(true); |
---|
458 | SetFlushBeforeClose(false); |
---|
459 | SetLost(); |
---|
460 | break; |
---|
461 | default: |
---|
462 | DEB( fprintf(stderr, "SSL read problem, errcode = %d\n",n);) |
---|
463 | OnDisconnect(); |
---|
464 | SetCloseAndDelete(true); |
---|
465 | SetFlushBeforeClose(false); |
---|
466 | SetLost(); |
---|
467 | } |
---|
468 | return; |
---|
469 | } |
---|
470 | else |
---|
471 | if (!n) |
---|
472 | { |
---|
473 | OnDisconnect(); |
---|
474 | SetCloseAndDelete(true); |
---|
475 | SetFlushBeforeClose(false); |
---|
476 | SetLost(); |
---|
477 | SetShutdown(SHUT_WR); |
---|
478 | return; |
---|
479 | } |
---|
480 | else |
---|
481 | if (n > 0 && n <= TCP_BUFSIZE_READ) |
---|
482 | { |
---|
483 | m_bytes_received += n; |
---|
484 | if (GetTrafficMonitor()) |
---|
485 | { |
---|
486 | GetTrafficMonitor() -> fwrite(buf, 1, n); |
---|
487 | } |
---|
488 | if (!m_b_input_buffer_disabled && !ibuf.Write(buf,n)) |
---|
489 | { |
---|
490 | Handler().LogError(this, "OnRead(ssl)", 0, "ibuf overflow", LOG_LEVEL_WARNING); |
---|
491 | } |
---|
492 | } |
---|
493 | else |
---|
494 | { |
---|
495 | Handler().LogError(this, "OnRead(ssl)", n, "abnormal value from SSL_read", LOG_LEVEL_ERROR); |
---|
496 | } |
---|
497 | } |
---|
498 | else |
---|
499 | #endif // HAVE_OPENSSL |
---|
500 | { |
---|
501 | n = recv(GetSocket(), buf, TCP_BUFSIZE_READ, MSG_NOSIGNAL); |
---|
502 | if (n == -1) |
---|
503 | { |
---|
504 | Handler().LogError(this, "read", Errno, StrError(Errno), LOG_LEVEL_FATAL); |
---|
505 | OnDisconnect(); |
---|
506 | SetCloseAndDelete(true); |
---|
507 | SetFlushBeforeClose(false); |
---|
508 | SetLost(); |
---|
509 | return; |
---|
510 | } |
---|
511 | else |
---|
512 | if (!n) |
---|
513 | { |
---|
514 | OnDisconnect(); |
---|
515 | SetCloseAndDelete(true); |
---|
516 | SetFlushBeforeClose(false); |
---|
517 | SetLost(); |
---|
518 | SetShutdown(SHUT_WR); |
---|
519 | return; |
---|
520 | } |
---|
521 | else |
---|
522 | if (n > 0 && n <= TCP_BUFSIZE_READ) |
---|
523 | { |
---|
524 | m_bytes_received += n; |
---|
525 | if (GetTrafficMonitor()) |
---|
526 | { |
---|
527 | GetTrafficMonitor() -> fwrite(buf, 1, n); |
---|
528 | } |
---|
529 | if (!m_b_input_buffer_disabled && !ibuf.Write(buf,n)) |
---|
530 | { |
---|
531 | Handler().LogError(this, "OnRead", 0, "ibuf overflow", LOG_LEVEL_WARNING); |
---|
532 | } |
---|
533 | } |
---|
534 | else |
---|
535 | { |
---|
536 | Handler().LogError(this, "OnRead", n, "abnormal value from recv", LOG_LEVEL_ERROR); |
---|
537 | } |
---|
538 | } |
---|
539 | // |
---|
540 | OnRead( buf, n ); |
---|
541 | } |
---|
542 | |
---|
543 | |
---|
544 | void TcpSocket::OnRead( char *buf, size_t n ) |
---|
545 | { |
---|
546 | // unbuffered |
---|
547 | if (n > 0 && n <= TCP_BUFSIZE_READ) |
---|
548 | { |
---|
549 | if (LineProtocol()) |
---|
550 | { |
---|
551 | buf[n] = 0; |
---|
552 | size_t i = 0; |
---|
553 | if (m_skip_c && (buf[i] == 13 || buf[i] == 10) && buf[i] != m_c) |
---|
554 | { |
---|
555 | m_skip_c = false; |
---|
556 | i++; |
---|
557 | } |
---|
558 | size_t x = i; |
---|
559 | for (; i < n && LineProtocol(); i++) |
---|
560 | { |
---|
561 | while ((buf[i] == 13 || buf[i] == 10) && LineProtocol()) |
---|
562 | { |
---|
563 | char c = buf[i]; |
---|
564 | buf[i] = 0; |
---|
565 | if (buf[x]) |
---|
566 | { |
---|
567 | m_line += (buf + x); |
---|
568 | } |
---|
569 | OnLine( m_line ); |
---|
570 | i++; |
---|
571 | m_skip_c = true; |
---|
572 | m_c = c; |
---|
573 | if (i < n && (buf[i] == 13 || buf[i] == 10) && buf[i] != c) |
---|
574 | { |
---|
575 | m_skip_c = false; |
---|
576 | i++; |
---|
577 | } |
---|
578 | x = i; |
---|
579 | m_line = ""; |
---|
580 | } |
---|
581 | if (!LineProtocol()) |
---|
582 | { |
---|
583 | break; |
---|
584 | } |
---|
585 | } |
---|
586 | if (!LineProtocol()) |
---|
587 | { |
---|
588 | if (i < n) |
---|
589 | { |
---|
590 | OnRawData(buf + i, n - i); |
---|
591 | } |
---|
592 | } |
---|
593 | else |
---|
594 | if (buf[x]) |
---|
595 | { |
---|
596 | m_line += (buf + x); |
---|
597 | } |
---|
598 | } |
---|
599 | else |
---|
600 | { |
---|
601 | OnRawData(buf, n); |
---|
602 | } |
---|
603 | } |
---|
604 | if (m_b_input_buffer_disabled) |
---|
605 | { |
---|
606 | return; |
---|
607 | } |
---|
608 | // further processing: socks4 |
---|
609 | #ifdef ENABLE_SOCKS4 |
---|
610 | if (Socks4()) |
---|
611 | { |
---|
612 | bool need_more = false; |
---|
613 | while (GetInputLength() && !need_more && !CloseAndDelete()) |
---|
614 | { |
---|
615 | need_more = OnSocks4Read(); |
---|
616 | } |
---|
617 | } |
---|
618 | #endif |
---|
619 | } |
---|
620 | |
---|
621 | |
---|
622 | void TcpSocket::OnWriteComplete() |
---|
623 | { |
---|
624 | } |
---|
625 | |
---|
626 | |
---|
627 | void TcpSocket::OnWrite() |
---|
628 | { |
---|
629 | if (Connecting()) |
---|
630 | { |
---|
631 | int err = SoError(); |
---|
632 | |
---|
633 | // don't reset connecting flag on error here, we want the OnConnectFailed timeout later on |
---|
634 | if (!err) // ok |
---|
635 | { |
---|
636 | Set(!IsDisableRead(), false); |
---|
637 | SetConnecting(false); |
---|
638 | SetCallOnConnect(); |
---|
639 | return; |
---|
640 | } |
---|
641 | Handler().LogError(this, "tcp: connect failed", err, StrError(err), LOG_LEVEL_FATAL); |
---|
642 | Set(false, false); // no more monitoring because connection failed |
---|
643 | |
---|
644 | // failed |
---|
645 | #ifdef ENABLE_SOCKS4 |
---|
646 | if (Socks4()) |
---|
647 | { |
---|
648 | // %! leave 'Connecting' flag set? |
---|
649 | OnSocks4ConnectFailed(); |
---|
650 | return; |
---|
651 | } |
---|
652 | #endif |
---|
653 | if (GetConnectionRetry() == -1 || |
---|
654 | (GetConnectionRetry() && GetConnectionRetries() < GetConnectionRetry()) ) |
---|
655 | { |
---|
656 | // even though the connection failed at once, only retry after |
---|
657 | // the connection timeout. |
---|
658 | // should we even try to connect again, when CheckConnect returns |
---|
659 | // false it's because of a connection error - not a timeout... |
---|
660 | return; |
---|
661 | } |
---|
662 | SetConnecting(false); |
---|
663 | SetCloseAndDelete( true ); |
---|
664 | /// \todo state reason why connect failed |
---|
665 | OnConnectFailed(); |
---|
666 | return; |
---|
667 | } |
---|
668 | // try send next block in buffer |
---|
669 | // if full block is sent, repeat |
---|
670 | // if all blocks are sent, reset m_wfds |
---|
671 | |
---|
672 | bool repeat = false; |
---|
673 | size_t sz = m_transfer_limit ? GetOutputLength() : 0; |
---|
674 | do |
---|
675 | { |
---|
676 | output_l::iterator it = m_obuf.begin(); |
---|
677 | OUTPUT *p = *it; |
---|
678 | repeat = false; |
---|
679 | int n = TryWrite(p -> Buf(), p -> Len()); |
---|
680 | if (n > 0) |
---|
681 | { |
---|
682 | size_t left = p -> Remove(n); |
---|
683 | m_output_length -= n; |
---|
684 | if (!left) |
---|
685 | { |
---|
686 | delete p; |
---|
687 | m_obuf.erase(it); |
---|
688 | if (!m_obuf.size()) |
---|
689 | { |
---|
690 | m_obuf_top = NULL; |
---|
691 | OnWriteComplete(); |
---|
692 | } |
---|
693 | else |
---|
694 | { |
---|
695 | repeat = true; |
---|
696 | } |
---|
697 | } |
---|
698 | } |
---|
699 | } while (repeat); |
---|
700 | |
---|
701 | if (m_transfer_limit && sz > m_transfer_limit && GetOutputLength() < m_transfer_limit) |
---|
702 | { |
---|
703 | OnTransferLimit(); |
---|
704 | } |
---|
705 | |
---|
706 | // check output buffer set, set/reset m_wfds accordingly |
---|
707 | { |
---|
708 | bool br; |
---|
709 | bool bw; |
---|
710 | bool bx; |
---|
711 | Handler().Get(GetSocket(), br, bw, bx); |
---|
712 | if (m_obuf.size()) |
---|
713 | Set(br, true); |
---|
714 | else |
---|
715 | Set(br, false); |
---|
716 | } |
---|
717 | } |
---|
718 | |
---|
719 | |
---|
720 | int TcpSocket::TryWrite(const char *buf, size_t len) |
---|
721 | { |
---|
722 | int n = 0; |
---|
723 | #ifdef HAVE_OPENSSL |
---|
724 | if (IsSSL()) |
---|
725 | { |
---|
726 | n = SSL_write(m_ssl, buf, (int)len); |
---|
727 | if (n == -1) |
---|
728 | { |
---|
729 | int errnr = SSL_get_error(m_ssl, n); |
---|
730 | if ( errnr != SSL_ERROR_WANT_READ && errnr != SSL_ERROR_WANT_WRITE ) |
---|
731 | { |
---|
732 | OnDisconnect(); |
---|
733 | SetCloseAndDelete(true); |
---|
734 | SetFlushBeforeClose(false); |
---|
735 | SetLost(); |
---|
736 | const char *errbuf = ERR_error_string(errnr, NULL); |
---|
737 | Handler().LogError(this, "OnWrite/SSL_write", errnr, errbuf, LOG_LEVEL_FATAL); |
---|
738 | } |
---|
739 | return 0; |
---|
740 | } |
---|
741 | else |
---|
742 | if (!n) |
---|
743 | { |
---|
744 | OnDisconnect(); |
---|
745 | SetCloseAndDelete(true); |
---|
746 | SetFlushBeforeClose(false); |
---|
747 | SetLost(); |
---|
748 | DEB( int errnr = SSL_get_error(m_ssl, n); |
---|
749 | const char *errbuf = ERR_error_string(errnr, NULL); |
---|
750 | fprintf(stderr, "SSL_write() returns 0: %d : %s\n",errnr, errbuf);) |
---|
751 | } |
---|
752 | } |
---|
753 | else |
---|
754 | #endif // HAVE_OPENSSL |
---|
755 | { |
---|
756 | n = send(GetSocket(), buf, (int)len, MSG_NOSIGNAL); |
---|
757 | if (n == -1) |
---|
758 | { |
---|
759 | // normal error codes: |
---|
760 | // WSAEWOULDBLOCK |
---|
761 | // EAGAIN or EWOULDBLOCK |
---|
762 | #ifdef _WIN32 |
---|
763 | if (Errno != WSAEWOULDBLOCK) |
---|
764 | #else |
---|
765 | if (Errno != EWOULDBLOCK) |
---|
766 | #endif |
---|
767 | { |
---|
768 | Handler().LogError(this, "send", Errno, StrError(Errno), LOG_LEVEL_FATAL); |
---|
769 | OnDisconnect(); |
---|
770 | SetCloseAndDelete(true); |
---|
771 | SetFlushBeforeClose(false); |
---|
772 | SetLost(); |
---|
773 | } |
---|
774 | return 0; |
---|
775 | } |
---|
776 | } |
---|
777 | if (n > 0) |
---|
778 | { |
---|
779 | m_bytes_sent += n; |
---|
780 | if (GetTrafficMonitor()) |
---|
781 | { |
---|
782 | GetTrafficMonitor() -> fwrite(buf, 1, n); |
---|
783 | } |
---|
784 | } |
---|
785 | return n; |
---|
786 | } |
---|
787 | |
---|
788 | |
---|
789 | void TcpSocket::Buffer(const char *buf, size_t len) |
---|
790 | { |
---|
791 | size_t ptr = 0; |
---|
792 | m_output_length += len; |
---|
793 | while (ptr < len) |
---|
794 | { |
---|
795 | // buf/len => pbuf/sz |
---|
796 | size_t space = 0; |
---|
797 | if (m_obuf_top && (space = m_obuf_top -> Space()) > 0) |
---|
798 | { |
---|
799 | const char *pbuf = buf + ptr; |
---|
800 | size_t sz = len - ptr; |
---|
801 | if (space >= sz) |
---|
802 | { |
---|
803 | m_obuf_top -> Add(pbuf, sz); |
---|
804 | ptr += sz; |
---|
805 | } |
---|
806 | else |
---|
807 | { |
---|
808 | m_obuf_top -> Add(pbuf, space); |
---|
809 | ptr += space; |
---|
810 | } |
---|
811 | } |
---|
812 | else |
---|
813 | { |
---|
814 | m_obuf_top = new OUTPUT; |
---|
815 | m_obuf.push_back( m_obuf_top ); |
---|
816 | } |
---|
817 | } |
---|
818 | } |
---|
819 | |
---|
820 | |
---|
821 | void TcpSocket::Send(const std::string &str,int i) |
---|
822 | { |
---|
823 | SendBuf(str.c_str(),str.size(),i); |
---|
824 | } |
---|
825 | |
---|
826 | |
---|
827 | void TcpSocket::SendBuf(const char *buf,size_t len,int) |
---|
828 | { |
---|
829 | if (!Ready() && !Connecting()) |
---|
830 | { |
---|
831 | Handler().LogError(this, "SendBuf", -1, "Attempt to write to a non-ready socket" ); // warning |
---|
832 | if (GetSocket() == INVALID_SOCKET) |
---|
833 | Handler().LogError(this, "SendBuf", 0, " * GetSocket() == INVALID_SOCKET", LOG_LEVEL_INFO); |
---|
834 | if (Connecting()) |
---|
835 | Handler().LogError(this, "SendBuf", 0, " * Connecting()", LOG_LEVEL_INFO); |
---|
836 | if (CloseAndDelete()) |
---|
837 | Handler().LogError(this, "SendBuf", 0, " * CloseAndDelete()", LOG_LEVEL_INFO); |
---|
838 | return; |
---|
839 | } |
---|
840 | if (!IsConnected()) |
---|
841 | { |
---|
842 | Handler().LogError(this, "SendBuf", -1, "Attempt to write to a non-connected socket, will be sent on connect" ); // warning |
---|
843 | Buffer(buf, len); |
---|
844 | return; |
---|
845 | } |
---|
846 | if (m_obuf_top) |
---|
847 | { |
---|
848 | Buffer(buf, len); |
---|
849 | return; |
---|
850 | } |
---|
851 | int n = TryWrite(buf, len); |
---|
852 | if (n >= 0 && n < (int)len) |
---|
853 | { |
---|
854 | Buffer(buf + n, len - n); |
---|
855 | } |
---|
856 | // if ( data in buffer || !IsConnected ) |
---|
857 | // { |
---|
858 | // add to buffer |
---|
859 | // } |
---|
860 | // else |
---|
861 | // try_send |
---|
862 | // if any data is unsent, buffer it and set m_wfds |
---|
863 | |
---|
864 | // check output buffer set, set/reset m_wfds accordingly |
---|
865 | { |
---|
866 | bool br; |
---|
867 | bool bw; |
---|
868 | bool bx; |
---|
869 | Handler().Get(GetSocket(), br, bw, bx); |
---|
870 | if (m_obuf.size()) |
---|
871 | Set(br, true); |
---|
872 | else |
---|
873 | Set(br, false); |
---|
874 | } |
---|
875 | } |
---|
876 | |
---|
877 | |
---|
878 | void TcpSocket::OnLine(const std::string& ) |
---|
879 | { |
---|
880 | } |
---|
881 | |
---|
882 | |
---|
883 | #ifdef _MSC_VER |
---|
884 | #pragma warning(disable:4355) |
---|
885 | #endif |
---|
886 | TcpSocket::TcpSocket(const TcpSocket& s) |
---|
887 | :StreamSocket(s) |
---|
888 | ,ibuf(0) |
---|
889 | { |
---|
890 | } |
---|
891 | #ifdef _MSC_VER |
---|
892 | #pragma warning(default:4355) |
---|
893 | #endif |
---|
894 | |
---|
895 | |
---|
896 | #ifdef ENABLE_SOCKS4 |
---|
897 | void TcpSocket::OnSocks4Connect() |
---|
898 | { |
---|
899 | char request[1000]; |
---|
900 | memset(request, 0, sizeof(request)); |
---|
901 | request[0] = 4; // socks v4 |
---|
902 | request[1] = 1; // command code: CONNECT |
---|
903 | { |
---|
904 | std::auto_ptr<SocketAddress> ad = GetClientRemoteAddress(); |
---|
905 | if (ad.get()) |
---|
906 | { |
---|
907 | struct sockaddr *p0 = (struct sockaddr *)*ad; |
---|
908 | struct sockaddr_in *p = (struct sockaddr_in *)p0; |
---|
909 | if (p -> sin_family == AF_INET) |
---|
910 | { |
---|
911 | memcpy(request + 2, &p -> sin_port, 2); // nwbo is ok here |
---|
912 | memcpy(request + 4, &p -> sin_addr, sizeof(struct in_addr)); |
---|
913 | } |
---|
914 | else |
---|
915 | { |
---|
916 | /// \todo warn |
---|
917 | } |
---|
918 | } |
---|
919 | else |
---|
920 | { |
---|
921 | /// \todo warn |
---|
922 | } |
---|
923 | } |
---|
924 | strcpy(request + 8, GetSocks4Userid().c_str()); |
---|
925 | size_t length = GetSocks4Userid().size() + 8 + 1; |
---|
926 | SendBuf(request, length); |
---|
927 | m_socks4_state = 0; |
---|
928 | } |
---|
929 | |
---|
930 | |
---|
931 | void TcpSocket::OnSocks4ConnectFailed() |
---|
932 | { |
---|
933 | Handler().LogError(this,"OnSocks4ConnectFailed",0,"connection to socks4 server failed, trying direct connection",LOG_LEVEL_WARNING); |
---|
934 | if (!Handler().Socks4TryDirect()) |
---|
935 | { |
---|
936 | SetConnecting(false); |
---|
937 | SetCloseAndDelete(); |
---|
938 | OnConnectFailed(); // just in case |
---|
939 | } |
---|
940 | else |
---|
941 | { |
---|
942 | SetRetryClientConnect(); |
---|
943 | } |
---|
944 | } |
---|
945 | |
---|
946 | |
---|
947 | bool TcpSocket::OnSocks4Read() |
---|
948 | { |
---|
949 | switch (m_socks4_state) |
---|
950 | { |
---|
951 | case 0: |
---|
952 | ibuf.Read(&m_socks4_vn, 1); |
---|
953 | m_socks4_state = 1; |
---|
954 | break; |
---|
955 | case 1: |
---|
956 | ibuf.Read(&m_socks4_cd, 1); |
---|
957 | m_socks4_state = 2; |
---|
958 | break; |
---|
959 | case 2: |
---|
960 | if (GetInputLength() > 1) |
---|
961 | { |
---|
962 | ibuf.Read( (char *)&m_socks4_dstport, 2); |
---|
963 | m_socks4_state = 3; |
---|
964 | } |
---|
965 | else |
---|
966 | { |
---|
967 | return true; |
---|
968 | } |
---|
969 | break; |
---|
970 | case 3: |
---|
971 | if (GetInputLength() > 3) |
---|
972 | { |
---|
973 | ibuf.Read( (char *)&m_socks4_dstip, 4); |
---|
974 | SetSocks4(false); |
---|
975 | |
---|
976 | switch (m_socks4_cd) |
---|
977 | { |
---|
978 | case 90: |
---|
979 | OnConnect(); |
---|
980 | Handler().LogError(this, "OnSocks4Read", 0, "Connection established", LOG_LEVEL_INFO); |
---|
981 | break; |
---|
982 | case 91: |
---|
983 | case 92: |
---|
984 | case 93: |
---|
985 | Handler().LogError(this,"OnSocks4Read",m_socks4_cd,"socks4 server reports connect failed",LOG_LEVEL_FATAL); |
---|
986 | SetConnecting(false); |
---|
987 | SetCloseAndDelete(); |
---|
988 | OnConnectFailed(); |
---|
989 | break; |
---|
990 | default: |
---|
991 | Handler().LogError(this,"OnSocks4Read",m_socks4_cd,"socks4 server unrecognized response",LOG_LEVEL_FATAL); |
---|
992 | SetCloseAndDelete(); |
---|
993 | break; |
---|
994 | } |
---|
995 | } |
---|
996 | else |
---|
997 | { |
---|
998 | return true; |
---|
999 | } |
---|
1000 | break; |
---|
1001 | } |
---|
1002 | return false; |
---|
1003 | } |
---|
1004 | #endif |
---|
1005 | |
---|
1006 | |
---|
1007 | void TcpSocket::Sendf(const char *format, ...) |
---|
1008 | { |
---|
1009 | va_list ap; |
---|
1010 | va_start(ap, format); |
---|
1011 | char slask[5000]; // vsprintf / vsnprintf temporary |
---|
1012 | #ifdef _WIN32 |
---|
1013 | vsprintf(slask, format, ap); |
---|
1014 | #else |
---|
1015 | vsnprintf(slask, 5000, format, ap); |
---|
1016 | #endif |
---|
1017 | va_end(ap); |
---|
1018 | Send( slask ); |
---|
1019 | } |
---|
1020 | |
---|
1021 | |
---|
1022 | #ifdef HAVE_OPENSSL |
---|
1023 | void TcpSocket::OnSSLConnect() |
---|
1024 | { |
---|
1025 | SetNonblocking(true); |
---|
1026 | { |
---|
1027 | if (m_ssl_ctx) |
---|
1028 | { |
---|
1029 | DEB( fprintf(stderr, "SSL Context already initialized - closing socket\n");) |
---|
1030 | SetCloseAndDelete(true); |
---|
1031 | return; |
---|
1032 | } |
---|
1033 | InitSSLClient(); |
---|
1034 | } |
---|
1035 | if (m_ssl_ctx) |
---|
1036 | { |
---|
1037 | /* Connect the SSL socket */ |
---|
1038 | m_ssl = SSL_new(m_ssl_ctx); |
---|
1039 | if (!m_ssl) |
---|
1040 | { |
---|
1041 | DEB( fprintf(stderr, " m_ssl is NULL\n");) |
---|
1042 | SetCloseAndDelete(true); |
---|
1043 | return; |
---|
1044 | } |
---|
1045 | SSL_set_mode(m_ssl, SSL_MODE_AUTO_RETRY); |
---|
1046 | m_sbio = BIO_new_socket((int)GetSocket(), BIO_NOCLOSE); |
---|
1047 | if (!m_sbio) |
---|
1048 | { |
---|
1049 | DEB( fprintf(stderr, " m_sbio is NULL\n");) |
---|
1050 | SetCloseAndDelete(true); |
---|
1051 | return; |
---|
1052 | } |
---|
1053 | SSL_set_bio(m_ssl, m_sbio, m_sbio); |
---|
1054 | if (!SSLNegotiate()) |
---|
1055 | { |
---|
1056 | SetSSLNegotiate(); |
---|
1057 | } |
---|
1058 | } |
---|
1059 | else |
---|
1060 | { |
---|
1061 | SetCloseAndDelete(); |
---|
1062 | } |
---|
1063 | } |
---|
1064 | |
---|
1065 | |
---|
1066 | void TcpSocket::OnSSLAccept() |
---|
1067 | { |
---|
1068 | SetNonblocking(true); |
---|
1069 | { |
---|
1070 | if (m_ssl_ctx) |
---|
1071 | { |
---|
1072 | DEB( fprintf(stderr, "SSL Context already initialized - closing socket\n");) |
---|
1073 | SetCloseAndDelete(true); |
---|
1074 | return; |
---|
1075 | } |
---|
1076 | InitSSLServer(); |
---|
1077 | SetSSLServer(); |
---|
1078 | } |
---|
1079 | if (m_ssl_ctx) |
---|
1080 | { |
---|
1081 | m_ssl = SSL_new(m_ssl_ctx); |
---|
1082 | if (!m_ssl) |
---|
1083 | { |
---|
1084 | DEB( fprintf(stderr, " m_ssl is NULL\n");) |
---|
1085 | SetCloseAndDelete(true); |
---|
1086 | return; |
---|
1087 | } |
---|
1088 | SSL_set_mode(m_ssl, SSL_MODE_AUTO_RETRY); |
---|
1089 | m_sbio = BIO_new_socket((int)GetSocket(), BIO_NOCLOSE); |
---|
1090 | if (!m_sbio) |
---|
1091 | { |
---|
1092 | DEB( fprintf(stderr, " m_sbio is NULL\n");) |
---|
1093 | SetCloseAndDelete(true); |
---|
1094 | return; |
---|
1095 | } |
---|
1096 | SSL_set_bio(m_ssl, m_sbio, m_sbio); |
---|
1097 | // if (!SSLNegotiate()) |
---|
1098 | { |
---|
1099 | SetSSLNegotiate(); |
---|
1100 | } |
---|
1101 | } |
---|
1102 | } |
---|
1103 | |
---|
1104 | |
---|
1105 | bool TcpSocket::SSLNegotiate() |
---|
1106 | { |
---|
1107 | if (!IsSSLServer()) // client |
---|
1108 | { |
---|
1109 | int r = SSL_connect(m_ssl); |
---|
1110 | if (r > 0) |
---|
1111 | { |
---|
1112 | SetSSLNegotiate(false); |
---|
1113 | /// \todo: resurrect certificate check... client |
---|
1114 | // CheckCertificateChain( "");//ServerHOST); |
---|
1115 | SetNonblocking(false); |
---|
1116 | // |
---|
1117 | { |
---|
1118 | SetConnected(); |
---|
1119 | if (GetOutputLength()) |
---|
1120 | { |
---|
1121 | OnWrite(); |
---|
1122 | } |
---|
1123 | } |
---|
1124 | #ifdef ENABLE_RECONNECT |
---|
1125 | if (IsReconnect()) |
---|
1126 | OnReconnect(); |
---|
1127 | else |
---|
1128 | #endif |
---|
1129 | { |
---|
1130 | OnConnect(); |
---|
1131 | } |
---|
1132 | Handler().LogError(this, "SSLNegotiate/SSL_connect", 0, "Connection established", LOG_LEVEL_INFO); |
---|
1133 | return true; |
---|
1134 | } |
---|
1135 | else |
---|
1136 | if (!r) |
---|
1137 | { |
---|
1138 | Handler().LogError(this, "SSLNegotiate/SSL_connect", 0, "Connection failed", LOG_LEVEL_INFO); |
---|
1139 | SetSSLNegotiate(false); |
---|
1140 | SetCloseAndDelete(); |
---|
1141 | OnSSLConnectFailed(); |
---|
1142 | } |
---|
1143 | else |
---|
1144 | { |
---|
1145 | r = SSL_get_error(m_ssl, r); |
---|
1146 | if (r != SSL_ERROR_WANT_READ && r != SSL_ERROR_WANT_WRITE) |
---|
1147 | { |
---|
1148 | Handler().LogError(this, "SSLNegotiate/SSL_connect", -1, "Connection failed", LOG_LEVEL_INFO); |
---|
1149 | DEB( fprintf(stderr, "SSL_connect() failed - closing socket, return code: %d\n",r);) |
---|
1150 | SetSSLNegotiate(false); |
---|
1151 | SetCloseAndDelete(true); |
---|
1152 | OnSSLConnectFailed(); |
---|
1153 | } |
---|
1154 | } |
---|
1155 | } |
---|
1156 | else // server |
---|
1157 | { |
---|
1158 | int r = SSL_accept(m_ssl); |
---|
1159 | if (r > 0) |
---|
1160 | { |
---|
1161 | SetSSLNegotiate(false); |
---|
1162 | /// \todo: resurrect certificate check... server |
---|
1163 | // CheckCertificateChain( "");//ClientHOST); |
---|
1164 | SetNonblocking(false); |
---|
1165 | // |
---|
1166 | { |
---|
1167 | SetConnected(); |
---|
1168 | if (GetOutputLength()) |
---|
1169 | { |
---|
1170 | OnWrite(); |
---|
1171 | } |
---|
1172 | } |
---|
1173 | OnAccept(); |
---|
1174 | Handler().LogError(this, "SSLNegotiate/SSL_accept", 0, "Connection established", LOG_LEVEL_INFO); |
---|
1175 | return true; |
---|
1176 | } |
---|
1177 | else |
---|
1178 | if (!r) |
---|
1179 | { |
---|
1180 | Handler().LogError(this, "SSLNegotiate/SSL_accept", 0, "Connection failed", LOG_LEVEL_INFO); |
---|
1181 | SetSSLNegotiate(false); |
---|
1182 | SetCloseAndDelete(); |
---|
1183 | OnSSLAcceptFailed(); |
---|
1184 | } |
---|
1185 | else |
---|
1186 | { |
---|
1187 | r = SSL_get_error(m_ssl, r); |
---|
1188 | if (r != SSL_ERROR_WANT_READ && r != SSL_ERROR_WANT_WRITE) |
---|
1189 | { |
---|
1190 | Handler().LogError(this, "SSLNegotiate/SSL_accept", -1, "Connection failed", LOG_LEVEL_INFO); |
---|
1191 | DEB( fprintf(stderr, "SSL_accept() failed - closing socket, return code: %d\n",r);) |
---|
1192 | SetSSLNegotiate(false); |
---|
1193 | SetCloseAndDelete(true); |
---|
1194 | OnSSLAcceptFailed(); |
---|
1195 | } |
---|
1196 | } |
---|
1197 | } |
---|
1198 | return false; |
---|
1199 | } |
---|
1200 | |
---|
1201 | |
---|
1202 | void TcpSocket::InitSSLClient() |
---|
1203 | { |
---|
1204 | InitializeContext("", SSLv23_method()); |
---|
1205 | } |
---|
1206 | |
---|
1207 | |
---|
1208 | void TcpSocket::InitSSLServer() |
---|
1209 | { |
---|
1210 | Handler().LogError(this, "InitSSLServer", 0, "You MUST implement your own InitSSLServer method", LOG_LEVEL_FATAL); |
---|
1211 | SetCloseAndDelete(); |
---|
1212 | } |
---|
1213 | |
---|
1214 | |
---|
1215 | void TcpSocket::InitializeContext(const std::string& context, SSL_METHOD *meth_in) |
---|
1216 | { |
---|
1217 | /* Create our context*/ |
---|
1218 | static std::map<std::string, SSL_CTX *> client_contexts; |
---|
1219 | if (client_contexts.find(context) == client_contexts.end()) |
---|
1220 | { |
---|
1221 | SSL_METHOD *meth = meth_in ? meth_in : SSLv3_method(); |
---|
1222 | m_ssl_ctx = client_contexts[context] = SSL_CTX_new(meth); |
---|
1223 | SSL_CTX_set_mode(m_ssl_ctx, SSL_MODE_AUTO_RETRY); |
---|
1224 | } |
---|
1225 | else |
---|
1226 | { |
---|
1227 | m_ssl_ctx = client_contexts[context]; |
---|
1228 | } |
---|
1229 | } |
---|
1230 | |
---|
1231 | |
---|
1232 | void TcpSocket::InitializeContext(const std::string& context,const std::string& keyfile,const std::string& password,SSL_METHOD *meth_in) |
---|
1233 | { |
---|
1234 | /* Create our context*/ |
---|
1235 | static std::map<std::string, SSL_CTX *> server_contexts; |
---|
1236 | if (server_contexts.find(context) == server_contexts.end()) |
---|
1237 | { |
---|
1238 | SSL_METHOD *meth = meth_in ? meth_in : SSLv3_method(); |
---|
1239 | m_ssl_ctx = server_contexts[context] = SSL_CTX_new(meth); |
---|
1240 | SSL_CTX_set_mode(m_ssl_ctx, SSL_MODE_AUTO_RETRY); |
---|
1241 | // session id |
---|
1242 | if (!context.empty()) |
---|
1243 | SSL_CTX_set_session_id_context(m_ssl_ctx, (const unsigned char *)context.c_str(), (unsigned int)context.size()); |
---|
1244 | else |
---|
1245 | SSL_CTX_set_session_id_context(m_ssl_ctx, (const unsigned char *)"--empty--", 9); |
---|
1246 | } |
---|
1247 | else |
---|
1248 | { |
---|
1249 | m_ssl_ctx = server_contexts[context]; |
---|
1250 | } |
---|
1251 | |
---|
1252 | /* Load our keys and certificates*/ |
---|
1253 | if (!(SSL_CTX_use_certificate_file(m_ssl_ctx, keyfile.c_str(), SSL_FILETYPE_PEM))) |
---|
1254 | { |
---|
1255 | Handler().LogError(this, "TcpSocket InitializeContext", 0, "Couldn't read certificate file " + keyfile, LOG_LEVEL_FATAL); |
---|
1256 | } |
---|
1257 | |
---|
1258 | m_password = password; |
---|
1259 | SSL_CTX_set_default_passwd_cb(m_ssl_ctx, SSL_password_cb); |
---|
1260 | SSL_CTX_set_default_passwd_cb_userdata(m_ssl_ctx, this); |
---|
1261 | if (!(SSL_CTX_use_PrivateKey_file(m_ssl_ctx, keyfile.c_str(), SSL_FILETYPE_PEM))) |
---|
1262 | { |
---|
1263 | Handler().LogError(this, "TcpSocket InitializeContext", 0, "Couldn't read private key file " + keyfile, LOG_LEVEL_FATAL); |
---|
1264 | } |
---|
1265 | } |
---|
1266 | |
---|
1267 | |
---|
1268 | void TcpSocket::InitializeContext(const std::string& context,const std::string& certfile,const std::string& keyfile,const std::string& password,SSL_METHOD *meth_in) |
---|
1269 | { |
---|
1270 | /* Create our context*/ |
---|
1271 | static std::map<std::string, SSL_CTX *> server_contexts; |
---|
1272 | if (server_contexts.find(context) == server_contexts.end()) |
---|
1273 | { |
---|
1274 | SSL_METHOD *meth = meth_in ? meth_in : SSLv3_method(); |
---|
1275 | m_ssl_ctx = server_contexts[context] = SSL_CTX_new(meth); |
---|
1276 | SSL_CTX_set_mode(m_ssl_ctx, SSL_MODE_AUTO_RETRY); |
---|
1277 | // session id |
---|
1278 | if (context.size()) |
---|
1279 | SSL_CTX_set_session_id_context(m_ssl_ctx, (const unsigned char *)context.c_str(), (unsigned int)context.size()); |
---|
1280 | else |
---|
1281 | SSL_CTX_set_session_id_context(m_ssl_ctx, (const unsigned char *)"--empty--", 9); |
---|
1282 | } |
---|
1283 | else |
---|
1284 | { |
---|
1285 | m_ssl_ctx = server_contexts[context]; |
---|
1286 | } |
---|
1287 | |
---|
1288 | /* Load our keys and certificates*/ |
---|
1289 | if (!(SSL_CTX_use_certificate_file(m_ssl_ctx, certfile.c_str(), SSL_FILETYPE_PEM))) |
---|
1290 | { |
---|
1291 | Handler().LogError(this, "TcpSocket InitializeContext", 0, "Couldn't read certificate file " + keyfile, LOG_LEVEL_FATAL); |
---|
1292 | } |
---|
1293 | |
---|
1294 | m_password = password; |
---|
1295 | SSL_CTX_set_default_passwd_cb(m_ssl_ctx, SSL_password_cb); |
---|
1296 | SSL_CTX_set_default_passwd_cb_userdata(m_ssl_ctx, this); |
---|
1297 | if (!(SSL_CTX_use_PrivateKey_file(m_ssl_ctx, keyfile.c_str(), SSL_FILETYPE_PEM))) |
---|
1298 | { |
---|
1299 | Handler().LogError(this, "TcpSocket InitializeContext", 0, "Couldn't read private key file " + keyfile, LOG_LEVEL_FATAL); |
---|
1300 | } |
---|
1301 | } |
---|
1302 | |
---|
1303 | |
---|
1304 | int TcpSocket::SSL_password_cb(char *buf,int num,int rwflag,void *userdata) |
---|
1305 | { |
---|
1306 | Socket *p0 = static_cast<Socket *>(userdata); |
---|
1307 | TcpSocket *p = dynamic_cast<TcpSocket *>(p0); |
---|
1308 | std::string pw = p ? p -> GetPassword() : ""; |
---|
1309 | if ( (size_t)num < pw.size() + 1) |
---|
1310 | { |
---|
1311 | return 0; |
---|
1312 | } |
---|
1313 | strcpy(buf,pw.c_str()); |
---|
1314 | return (int)pw.size(); |
---|
1315 | } |
---|
1316 | #endif // HAVE_OPENSSL |
---|
1317 | |
---|
1318 | |
---|
1319 | int TcpSocket::Close() |
---|
1320 | { |
---|
1321 | if (GetSocket() == INVALID_SOCKET) // this could happen |
---|
1322 | { |
---|
1323 | Handler().LogError(this, "Socket::Close", 0, "file descriptor invalid", LOG_LEVEL_WARNING); |
---|
1324 | return 0; |
---|
1325 | } |
---|
1326 | int n; |
---|
1327 | SetNonblocking(true); |
---|
1328 | if (!Lost() && IsConnected() && !(GetShutdown() & SHUT_WR)) |
---|
1329 | { |
---|
1330 | if (shutdown(GetSocket(), SHUT_WR) == -1) |
---|
1331 | { |
---|
1332 | // failed... |
---|
1333 | Handler().LogError(this, "shutdown", Errno, StrError(Errno), LOG_LEVEL_ERROR); |
---|
1334 | } |
---|
1335 | } |
---|
1336 | // |
---|
1337 | char tmp[1000]; |
---|
1338 | if (!Lost() && (n = recv(GetSocket(),tmp,1000,0)) >= 0) |
---|
1339 | { |
---|
1340 | if (n) |
---|
1341 | { |
---|
1342 | Handler().LogError(this, "read() after shutdown", n, "bytes read", LOG_LEVEL_WARNING); |
---|
1343 | } |
---|
1344 | } |
---|
1345 | #ifdef HAVE_OPENSSL |
---|
1346 | if (IsSSL() && m_ssl) |
---|
1347 | SSL_shutdown(m_ssl); |
---|
1348 | if (m_ssl) |
---|
1349 | { |
---|
1350 | SSL_free(m_ssl); |
---|
1351 | m_ssl = NULL; |
---|
1352 | } |
---|
1353 | #endif |
---|
1354 | return Socket::Close(); |
---|
1355 | } |
---|
1356 | |
---|
1357 | |
---|
1358 | #ifdef HAVE_OPENSSL |
---|
1359 | SSL_CTX *TcpSocket::GetSslContext() |
---|
1360 | { |
---|
1361 | if (!m_ssl_ctx) |
---|
1362 | Handler().LogError(this, "GetSslContext", 0, "SSL Context is NULL; check InitSSLServer/InitSSLClient", LOG_LEVEL_WARNING); |
---|
1363 | return m_ssl_ctx; |
---|
1364 | } |
---|
1365 | |
---|
1366 | SSL *TcpSocket::GetSsl() |
---|
1367 | { |
---|
1368 | if (!m_ssl) |
---|
1369 | Handler().LogError(this, "GetSsl", 0, "SSL is NULL; check InitSSLServer/InitSSLClient", LOG_LEVEL_WARNING); |
---|
1370 | return m_ssl; |
---|
1371 | } |
---|
1372 | #endif |
---|
1373 | |
---|
1374 | |
---|
1375 | #ifdef ENABLE_RECONNECT |
---|
1376 | void TcpSocket::SetReconnect(bool x) |
---|
1377 | { |
---|
1378 | m_b_reconnect = x; |
---|
1379 | } |
---|
1380 | #endif |
---|
1381 | |
---|
1382 | |
---|
1383 | void TcpSocket::OnRawData(const char *buf_in,size_t len) |
---|
1384 | { |
---|
1385 | } |
---|
1386 | |
---|
1387 | |
---|
1388 | size_t TcpSocket::GetInputLength() |
---|
1389 | { |
---|
1390 | return ibuf.GetLength(); |
---|
1391 | } |
---|
1392 | |
---|
1393 | |
---|
1394 | size_t TcpSocket::GetOutputLength() |
---|
1395 | { |
---|
1396 | return m_output_length; |
---|
1397 | } |
---|
1398 | |
---|
1399 | |
---|
1400 | uint64_t TcpSocket::GetBytesReceived(bool clear) |
---|
1401 | { |
---|
1402 | uint64_t z = m_bytes_received; |
---|
1403 | if (clear) |
---|
1404 | m_bytes_received = 0; |
---|
1405 | return z; |
---|
1406 | } |
---|
1407 | |
---|
1408 | |
---|
1409 | uint64_t TcpSocket::GetBytesSent(bool clear) |
---|
1410 | { |
---|
1411 | uint64_t z = m_bytes_sent; |
---|
1412 | if (clear) |
---|
1413 | m_bytes_sent = 0; |
---|
1414 | return z; |
---|
1415 | } |
---|
1416 | |
---|
1417 | |
---|
1418 | #ifdef ENABLE_RECONNECT |
---|
1419 | bool TcpSocket::Reconnect() |
---|
1420 | { |
---|
1421 | return m_b_reconnect; |
---|
1422 | } |
---|
1423 | |
---|
1424 | |
---|
1425 | void TcpSocket::SetIsReconnect(bool x) |
---|
1426 | { |
---|
1427 | m_b_is_reconnect = x; |
---|
1428 | } |
---|
1429 | |
---|
1430 | |
---|
1431 | bool TcpSocket::IsReconnect() |
---|
1432 | { |
---|
1433 | return m_b_is_reconnect; |
---|
1434 | } |
---|
1435 | #endif |
---|
1436 | |
---|
1437 | |
---|
1438 | #ifdef HAVE_OPENSSL |
---|
1439 | const std::string& TcpSocket::GetPassword() |
---|
1440 | { |
---|
1441 | return m_password; |
---|
1442 | } |
---|
1443 | #endif |
---|
1444 | |
---|
1445 | |
---|
1446 | void TcpSocket::DisableInputBuffer(bool x) |
---|
1447 | { |
---|
1448 | m_b_input_buffer_disabled = x; |
---|
1449 | } |
---|
1450 | |
---|
1451 | |
---|
1452 | void TcpSocket::OnOptions(int family,int type,int protocol,SOCKET s) |
---|
1453 | { |
---|
1454 | DEB( fprintf(stderr, "Socket::OnOptions()\n");) |
---|
1455 | #ifdef SO_NOSIGPIPE |
---|
1456 | SetSoNosigpipe(true); |
---|
1457 | #endif |
---|
1458 | SetSoReuseaddr(true); |
---|
1459 | SetSoKeepalive(true); |
---|
1460 | } |
---|
1461 | |
---|
1462 | |
---|
1463 | void TcpSocket::SetLineProtocol(bool x) |
---|
1464 | { |
---|
1465 | StreamSocket::SetLineProtocol(x); |
---|
1466 | DisableInputBuffer(x); |
---|
1467 | } |
---|
1468 | |
---|
1469 | |
---|
1470 | bool TcpSocket::SetTcpNodelay(bool x) |
---|
1471 | { |
---|
1472 | #ifdef TCP_NODELAY |
---|
1473 | int optval = x ? 1 : 0; |
---|
1474 | if (setsockopt(GetSocket(), IPPROTO_TCP, TCP_NODELAY, (char *)&optval, sizeof(optval)) == -1) |
---|
1475 | { |
---|
1476 | Handler().LogError(this, "setsockopt(IPPROTO_TCP, TCP_NODELAY)", Errno, StrError(Errno), LOG_LEVEL_FATAL); |
---|
1477 | return false; |
---|
1478 | } |
---|
1479 | return true; |
---|
1480 | #else |
---|
1481 | Handler().LogError(this, "socket option not available", 0, "TCP_NODELAY", LOG_LEVEL_INFO); |
---|
1482 | return false; |
---|
1483 | #endif |
---|
1484 | } |
---|
1485 | |
---|
1486 | |
---|
1487 | TcpSocket::CircularBuffer::CircularBuffer(size_t size) |
---|
1488 | :buf(new char[2 * size]) |
---|
1489 | ,m_max(size) |
---|
1490 | ,m_q(0) |
---|
1491 | ,m_b(0) |
---|
1492 | ,m_t(0) |
---|
1493 | ,m_count(0) |
---|
1494 | { |
---|
1495 | } |
---|
1496 | |
---|
1497 | |
---|
1498 | TcpSocket::CircularBuffer::~CircularBuffer() |
---|
1499 | { |
---|
1500 | delete[] buf; |
---|
1501 | } |
---|
1502 | |
---|
1503 | |
---|
1504 | bool TcpSocket::CircularBuffer::Write(const char *s,size_t l) |
---|
1505 | { |
---|
1506 | if (m_q + l > m_max) |
---|
1507 | { |
---|
1508 | return false; // overflow |
---|
1509 | } |
---|
1510 | m_count += (unsigned long)l; |
---|
1511 | if (m_t + l > m_max) // block crosses circular border |
---|
1512 | { |
---|
1513 | size_t l1 = m_max - m_t; // size left until circular border crossing |
---|
1514 | // always copy full block to buffer(buf) + top pointer(m_t) |
---|
1515 | // because we have doubled the buffer size for performance reasons |
---|
1516 | memcpy(buf + m_t, s, l); |
---|
1517 | memcpy(buf, s + l1, l - l1); |
---|
1518 | m_t = l - l1; |
---|
1519 | m_q += l; |
---|
1520 | } |
---|
1521 | else |
---|
1522 | { |
---|
1523 | memcpy(buf + m_t, s, l); |
---|
1524 | memcpy(buf + m_max + m_t, s, l); |
---|
1525 | m_t += l; |
---|
1526 | if (m_t >= m_max) |
---|
1527 | m_t -= m_max; |
---|
1528 | m_q += l; |
---|
1529 | } |
---|
1530 | return true; |
---|
1531 | } |
---|
1532 | |
---|
1533 | |
---|
1534 | bool TcpSocket::CircularBuffer::Read(char *s,size_t l) |
---|
1535 | { |
---|
1536 | if (l > m_q) |
---|
1537 | { |
---|
1538 | return false; // not enough chars |
---|
1539 | } |
---|
1540 | if (m_b + l > m_max) // block crosses circular border |
---|
1541 | { |
---|
1542 | size_t l1 = m_max - m_b; |
---|
1543 | if (s) |
---|
1544 | { |
---|
1545 | memcpy(s, buf + m_b, l1); |
---|
1546 | memcpy(s + l1, buf, l - l1); |
---|
1547 | } |
---|
1548 | m_b = l - l1; |
---|
1549 | m_q -= l; |
---|
1550 | } |
---|
1551 | else |
---|
1552 | { |
---|
1553 | if (s) |
---|
1554 | { |
---|
1555 | memcpy(s, buf + m_b, l); |
---|
1556 | } |
---|
1557 | m_b += l; |
---|
1558 | if (m_b >= m_max) |
---|
1559 | m_b -= m_max; |
---|
1560 | m_q -= l; |
---|
1561 | } |
---|
1562 | if (!m_q) |
---|
1563 | { |
---|
1564 | m_b = m_t = 0; |
---|
1565 | } |
---|
1566 | return true; |
---|
1567 | } |
---|
1568 | |
---|
1569 | bool TcpSocket::CircularBuffer::SoftRead(char *s, size_t l) |
---|
1570 | { |
---|
1571 | if (l > m_q) |
---|
1572 | { |
---|
1573 | return false; |
---|
1574 | } |
---|
1575 | if (m_b + l > m_max) // block crosses circular border |
---|
1576 | { |
---|
1577 | size_t l1 = m_max - m_b; |
---|
1578 | if (s) |
---|
1579 | { |
---|
1580 | memcpy(s, buf + m_b, l1); |
---|
1581 | memcpy(s + l1, buf, l - l1); |
---|
1582 | } |
---|
1583 | } |
---|
1584 | else |
---|
1585 | { |
---|
1586 | if (s) |
---|
1587 | { |
---|
1588 | memcpy(s, buf + m_b, l); |
---|
1589 | } |
---|
1590 | } |
---|
1591 | return true; |
---|
1592 | } |
---|
1593 | |
---|
1594 | bool TcpSocket::CircularBuffer::Remove(size_t l) |
---|
1595 | { |
---|
1596 | return Read(NULL, l); |
---|
1597 | } |
---|
1598 | |
---|
1599 | |
---|
1600 | size_t TcpSocket::CircularBuffer::GetLength() |
---|
1601 | { |
---|
1602 | return m_q; |
---|
1603 | } |
---|
1604 | |
---|
1605 | |
---|
1606 | const char *TcpSocket::CircularBuffer::GetStart() |
---|
1607 | { |
---|
1608 | return buf + m_b; |
---|
1609 | } |
---|
1610 | |
---|
1611 | |
---|
1612 | size_t TcpSocket::CircularBuffer::GetL() |
---|
1613 | { |
---|
1614 | return (m_b + m_q > m_max) ? m_max - m_b : m_q; |
---|
1615 | } |
---|
1616 | |
---|
1617 | |
---|
1618 | size_t TcpSocket::CircularBuffer::Space() |
---|
1619 | { |
---|
1620 | return m_max - m_q; |
---|
1621 | } |
---|
1622 | |
---|
1623 | |
---|
1624 | unsigned long TcpSocket::CircularBuffer::ByteCounter(bool clear) |
---|
1625 | { |
---|
1626 | if (clear) |
---|
1627 | { |
---|
1628 | unsigned long x = m_count; |
---|
1629 | m_count = 0; |
---|
1630 | return x; |
---|
1631 | } |
---|
1632 | return m_count; |
---|
1633 | } |
---|
1634 | |
---|
1635 | |
---|
1636 | std::string TcpSocket::CircularBuffer::ReadString(size_t l) |
---|
1637 | { |
---|
1638 | char *sz = new char[l + 1]; |
---|
1639 | if (!Read(sz, l)) // failed, debug printout in Read() method |
---|
1640 | { |
---|
1641 | delete[] sz; |
---|
1642 | return ""; |
---|
1643 | } |
---|
1644 | sz[l] = 0; |
---|
1645 | std::string tmp = sz; |
---|
1646 | delete[] sz; |
---|
1647 | return tmp; |
---|
1648 | } |
---|
1649 | |
---|
1650 | |
---|
1651 | void TcpSocket::OnConnectTimeout() |
---|
1652 | { |
---|
1653 | Handler().LogError(this, "connect", -1, "connect timeout", LOG_LEVEL_FATAL); |
---|
1654 | #ifdef ENABLE_SOCKS4 |
---|
1655 | if (Socks4()) |
---|
1656 | { |
---|
1657 | OnSocks4ConnectFailed(); |
---|
1658 | // retry direct connection |
---|
1659 | } |
---|
1660 | else |
---|
1661 | #endif |
---|
1662 | if (GetConnectionRetry() == -1 || |
---|
1663 | (GetConnectionRetry() && GetConnectionRetries() < GetConnectionRetry()) ) |
---|
1664 | { |
---|
1665 | IncreaseConnectionRetries(); |
---|
1666 | // ask socket via OnConnectRetry callback if we should continue trying |
---|
1667 | if (OnConnectRetry()) |
---|
1668 | { |
---|
1669 | SetRetryClientConnect(); |
---|
1670 | } |
---|
1671 | else |
---|
1672 | { |
---|
1673 | SetCloseAndDelete( true ); |
---|
1674 | /// \todo state reason why connect failed |
---|
1675 | OnConnectFailed(); |
---|
1676 | } |
---|
1677 | } |
---|
1678 | else |
---|
1679 | { |
---|
1680 | SetCloseAndDelete(true); |
---|
1681 | /// \todo state reason why connect failed |
---|
1682 | OnConnectFailed(); |
---|
1683 | } |
---|
1684 | // |
---|
1685 | SetConnecting(false); |
---|
1686 | } |
---|
1687 | |
---|
1688 | |
---|
1689 | #ifdef _WIN32 |
---|
1690 | void TcpSocket::OnException() |
---|
1691 | { |
---|
1692 | if (Connecting()) |
---|
1693 | { |
---|
1694 | #ifdef ENABLE_SOCKS4 |
---|
1695 | if (Socks4()) |
---|
1696 | OnSocks4ConnectFailed(); |
---|
1697 | else |
---|
1698 | #endif |
---|
1699 | if (GetConnectionRetry() == -1 || |
---|
1700 | (GetConnectionRetry() && |
---|
1701 | GetConnectionRetries() < GetConnectionRetry() )) |
---|
1702 | { |
---|
1703 | // even though the connection failed at once, only retry after |
---|
1704 | // the connection timeout |
---|
1705 | // should we even try to connect again, when CheckConnect returns |
---|
1706 | // false it's because of a connection error - not a timeout... |
---|
1707 | } |
---|
1708 | else |
---|
1709 | { |
---|
1710 | SetConnecting(false); // tnx snibbe |
---|
1711 | SetCloseAndDelete(); |
---|
1712 | OnConnectFailed(); |
---|
1713 | } |
---|
1714 | return; |
---|
1715 | } |
---|
1716 | // %! exception doesn't always mean something bad happened, this code should be reworked |
---|
1717 | // errno valid here? |
---|
1718 | int err = SoError(); |
---|
1719 | Handler().LogError(this, "exception on select", err, StrError(err), LOG_LEVEL_FATAL); |
---|
1720 | SetCloseAndDelete(); |
---|
1721 | } |
---|
1722 | #endif // _WIN32 |
---|
1723 | |
---|
1724 | |
---|
1725 | int TcpSocket::Protocol() |
---|
1726 | { |
---|
1727 | return IPPROTO_TCP; |
---|
1728 | } |
---|
1729 | |
---|
1730 | |
---|
1731 | void TcpSocket::SetTransferLimit(size_t sz) |
---|
1732 | { |
---|
1733 | m_transfer_limit = sz; |
---|
1734 | } |
---|
1735 | |
---|
1736 | |
---|
1737 | void TcpSocket::OnTransferLimit() |
---|
1738 | { |
---|
1739 | } |
---|
1740 | |
---|
1741 | |
---|
1742 | #ifdef SOCKETS_NAMESPACE |
---|
1743 | } |
---|
1744 | #endif |
---|
1745 | |
---|