00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011 #include "rubysocket.h"
00012
00013 static void
00014 setup_domain_and_type(VALUE domain, int *dv, VALUE type, int *tv)
00015 {
00016 *dv = rsock_family_arg(domain);
00017 *tv = rsock_socktype_arg(type);
00018 }
00019
00020
00021
00022
00023
00024
00025
00026
00027
00028
00029
00030
00031
00032
00033
00034
00035
00036
00037
00038
00039 static VALUE
00040 sock_initialize(int argc, VALUE *argv, VALUE sock)
00041 {
00042 VALUE domain, type, protocol;
00043 int fd;
00044 int d, t;
00045
00046 rb_scan_args(argc, argv, "21", &domain, &type, &protocol);
00047 if (NIL_P(protocol))
00048 protocol = INT2FIX(0);
00049
00050 rb_secure(3);
00051 setup_domain_and_type(domain, &d, type, &t);
00052 fd = rsock_socket(d, t, NUM2INT(protocol));
00053 if (fd < 0) rb_sys_fail("socket(2)");
00054
00055 return rsock_init_sock(sock, fd);
00056 }
00057
00058 #if defined HAVE_SOCKETPAIR
00059 static VALUE
00060 io_call_close(VALUE io)
00061 {
00062 return rb_funcall(io, rb_intern("close"), 0, 0);
00063 }
00064
00065 static VALUE
00066 io_close(VALUE io)
00067 {
00068 return rb_rescue(io_call_close, io, 0, 0);
00069 }
00070
00071 static VALUE
00072 pair_yield(VALUE pair)
00073 {
00074 return rb_ensure(rb_yield, pair, io_close, rb_ary_entry(pair, 1));
00075 }
00076 #endif
00077
00078 #if defined HAVE_SOCKETPAIR
00079
00080
00081
00082
00083
00084
00085
00086
00087
00088
00089
00090
00091
00092
00093
00094
00095
00096
00097
00098
00099
00100 VALUE
00101 rsock_sock_s_socketpair(int argc, VALUE *argv, VALUE klass)
00102 {
00103 VALUE domain, type, protocol;
00104 int d, t, p, sp[2];
00105 int ret;
00106 VALUE s1, s2, r;
00107
00108 rb_scan_args(argc, argv, "21", &domain, &type, &protocol);
00109 if (NIL_P(protocol))
00110 protocol = INT2FIX(0);
00111
00112 setup_domain_and_type(domain, &d, type, &t);
00113 p = NUM2INT(protocol);
00114 ret = socketpair(d, t, p, sp);
00115 if (ret < 0 && (errno == EMFILE || errno == ENFILE)) {
00116 rb_gc();
00117 ret = socketpair(d, t, p, sp);
00118 }
00119 if (ret < 0) {
00120 rb_sys_fail("socketpair(2)");
00121 }
00122 rb_update_max_fd(sp[0]);
00123 rb_update_max_fd(sp[1]);
00124
00125 s1 = rsock_init_sock(rb_obj_alloc(klass), sp[0]);
00126 s2 = rsock_init_sock(rb_obj_alloc(klass), sp[1]);
00127 r = rb_assoc_new(s1, s2);
00128 if (rb_block_given_p()) {
00129 return rb_ensure(pair_yield, r, io_close, s1);
00130 }
00131 return r;
00132 }
00133 #else
00134 #define rsock_sock_s_socketpair rb_f_notimplement
00135 #endif
00136
00137
00138
00139
00140
00141
00142
00143
00144
00145
00146
00147
00148
00149
00150
00151
00152
00153
00154
00155
00156
00157
00158
00159
00160
00161
00162
00163
00164
00165
00166
00167
00168
00169
00170
00171
00172
00173
00174
00175
00176
00177
00178
00179
00180
00181
00182
00183
00184
00185
00186
00187
00188
00189
00190
00191
00192
00193
00194
00195
00196
00197
00198
00199
00200
00201
00202
00203
00204
00205
00206
00207
00208
00209
00210
00211
00212
00213
00214
00215
00216
00217
00218
00219
00220
00221
00222
00223
00224
00225
00226
00227
00228
00229
00230
00231
00232
00233
00234
00235
00236
00237
00238
00239
00240
00241
00242
00243
00244
00245
00246
00247
00248 static VALUE
00249 sock_connect(VALUE sock, VALUE addr)
00250 {
00251 rb_io_t *fptr;
00252 int fd, n;
00253
00254 SockAddrStringValue(addr);
00255 addr = rb_str_new4(addr);
00256 GetOpenFile(sock, fptr);
00257 fd = fptr->fd;
00258 n = rsock_connect(fd, (struct sockaddr*)RSTRING_PTR(addr), RSTRING_LENINT(addr), 0);
00259 if (n < 0) {
00260 rb_sys_fail("connect(2)");
00261 }
00262
00263 return INT2FIX(n);
00264 }
00265
00266
00267
00268
00269
00270
00271
00272
00273
00274
00275
00276
00277
00278
00279
00280
00281
00282
00283
00284
00285
00286
00287
00288
00289
00290
00291
00292
00293
00294
00295
00296
00297
00298
00299
00300
00301
00302
00303
00304
00305
00306
00307
00308 static VALUE
00309 sock_connect_nonblock(VALUE sock, VALUE addr)
00310 {
00311 rb_io_t *fptr;
00312 int n;
00313
00314 SockAddrStringValue(addr);
00315 addr = rb_str_new4(addr);
00316 GetOpenFile(sock, fptr);
00317 rb_io_set_nonblock(fptr);
00318 n = connect(fptr->fd, (struct sockaddr*)RSTRING_PTR(addr), RSTRING_LENINT(addr));
00319 if (n < 0) {
00320 if (errno == EINPROGRESS)
00321 rb_mod_sys_fail(rb_mWaitWritable, "connect(2) would block");
00322 rb_sys_fail("connect(2)");
00323 }
00324
00325 return INT2FIX(n);
00326 }
00327
00328
00329
00330
00331
00332
00333
00334
00335
00336
00337
00338
00339
00340
00341
00342
00343
00344
00345
00346
00347
00348
00349
00350
00351
00352
00353
00354
00355
00356
00357
00358
00359
00360
00361
00362
00363
00364
00365
00366
00367
00368
00369
00370
00371
00372
00373
00374
00375
00376
00377
00378
00379
00380
00381
00382
00383
00384
00385
00386
00387
00388
00389
00390
00391
00392
00393
00394
00395
00396
00397
00398
00399
00400
00401
00402
00403
00404
00405
00406
00407
00408
00409
00410
00411
00412
00413
00414 static VALUE
00415 sock_bind(VALUE sock, VALUE addr)
00416 {
00417 rb_io_t *fptr;
00418
00419 SockAddrStringValue(addr);
00420 GetOpenFile(sock, fptr);
00421 if (bind(fptr->fd, (struct sockaddr*)RSTRING_PTR(addr), RSTRING_LENINT(addr)) < 0)
00422 rb_sys_fail("bind(2)");
00423
00424 return INT2FIX(0);
00425 }
00426
00427
00428
00429
00430
00431
00432
00433
00434
00435
00436
00437
00438
00439
00440
00441
00442
00443
00444
00445
00446
00447
00448
00449
00450
00451
00452
00453
00454
00455
00456
00457
00458
00459
00460
00461
00462
00463
00464
00465
00466
00467
00468
00469
00470
00471
00472
00473
00474
00475
00476
00477
00478
00479
00480
00481
00482
00483
00484
00485
00486
00487
00488
00489
00490
00491
00492
00493
00494
00495
00496
00497 VALUE
00498 rsock_sock_listen(VALUE sock, VALUE log)
00499 {
00500 rb_io_t *fptr;
00501 int backlog;
00502
00503 rb_secure(4);
00504 backlog = NUM2INT(log);
00505 GetOpenFile(sock, fptr);
00506 if (listen(fptr->fd, backlog) < 0)
00507 rb_sys_fail("listen(2)");
00508
00509 return INT2FIX(0);
00510 }
00511
00512
00513
00514
00515
00516
00517
00518
00519
00520
00521
00522
00523
00524
00525
00526
00527
00528
00529
00530
00531
00532
00533
00534
00535
00536
00537
00538
00539
00540
00541
00542
00543
00544
00545
00546
00547
00548
00549
00550
00551
00552
00553
00554
00555
00556
00557
00558
00559
00560
00561
00562
00563
00564
00565
00566
00567
00568
00569
00570
00571
00572
00573
00574
00575
00576
00577
00578
00579
00580
00581
00582
00583
00584
00585
00586
00587
00588
00589
00590
00591
00592
00593
00594
00595
00596
00597
00598
00599
00600
00601
00602
00603
00604
00605
00606
00607
00608
00609
00610
00611
00612
00613
00614
00615
00616
00617 static VALUE
00618 sock_recvfrom(int argc, VALUE *argv, VALUE sock)
00619 {
00620 return rsock_s_recvfrom(sock, argc, argv, RECV_SOCKET);
00621 }
00622
00623
00624
00625
00626
00627
00628
00629
00630
00631
00632
00633
00634
00635
00636
00637
00638
00639
00640
00641
00642
00643
00644
00645
00646
00647
00648
00649
00650
00651
00652
00653
00654
00655
00656
00657
00658
00659
00660
00661
00662
00663
00664
00665
00666
00667
00668
00669
00670
00671
00672
00673
00674
00675
00676
00677
00678
00679
00680
00681
00682
00683
00684
00685 static VALUE
00686 sock_recvfrom_nonblock(int argc, VALUE *argv, VALUE sock)
00687 {
00688 return rsock_s_recvfrom_nonblock(sock, argc, argv, RECV_SOCKET);
00689 }
00690
00691
00692
00693
00694
00695
00696
00697
00698
00699
00700
00701
00702
00703
00704
00705 static VALUE
00706 sock_accept(VALUE sock)
00707 {
00708 rb_io_t *fptr;
00709 VALUE sock2;
00710 struct sockaddr_storage buf;
00711 socklen_t len = (socklen_t)sizeof buf;
00712
00713 GetOpenFile(sock, fptr);
00714 sock2 = rsock_s_accept(rb_cSocket,fptr->fd,(struct sockaddr*)&buf,&len);
00715
00716 return rb_assoc_new(sock2, rsock_io_socket_addrinfo(sock2, (struct sockaddr*)&buf, len));
00717 }
00718
00719
00720
00721
00722
00723
00724
00725
00726
00727
00728
00729
00730
00731
00732
00733
00734
00735
00736
00737
00738
00739
00740
00741
00742
00743
00744
00745
00746
00747
00748
00749
00750
00751
00752
00753
00754
00755
00756
00757
00758
00759
00760
00761
00762
00763
00764
00765
00766
00767
00768
00769
00770 static VALUE
00771 sock_accept_nonblock(VALUE sock)
00772 {
00773 rb_io_t *fptr;
00774 VALUE sock2;
00775 struct sockaddr_storage buf;
00776 socklen_t len = (socklen_t)sizeof buf;
00777
00778 GetOpenFile(sock, fptr);
00779 sock2 = rsock_s_accept_nonblock(rb_cSocket, fptr, (struct sockaddr *)&buf, &len);
00780 return rb_assoc_new(sock2, rsock_io_socket_addrinfo(sock2, (struct sockaddr*)&buf, len));
00781 }
00782
00783
00784
00785
00786
00787
00788
00789
00790
00791
00792
00793
00794
00795
00796
00797
00798
00799
00800
00801
00802
00803
00804
00805
00806
00807
00808
00809
00810
00811
00812
00813
00814
00815
00816
00817
00818
00819
00820
00821 static VALUE
00822 sock_sysaccept(VALUE sock)
00823 {
00824 rb_io_t *fptr;
00825 VALUE sock2;
00826 struct sockaddr_storage buf;
00827 socklen_t len = (socklen_t)sizeof buf;
00828
00829 GetOpenFile(sock, fptr);
00830 sock2 = rsock_s_accept(0,fptr->fd,(struct sockaddr*)&buf,&len);
00831
00832 return rb_assoc_new(sock2, rsock_io_socket_addrinfo(sock2, (struct sockaddr*)&buf, len));
00833 }
00834
00835 #ifdef HAVE_GETHOSTNAME
00836
00837
00838
00839
00840
00841
00842
00843
00844
00845
00846
00847 static VALUE
00848 sock_gethostname(VALUE obj)
00849 {
00850 #ifndef HOST_NAME_MAX
00851 # define HOST_NAME_MAX 1024
00852 #endif
00853 char buf[HOST_NAME_MAX+1];
00854
00855 rb_secure(3);
00856 if (gethostname(buf, (int)sizeof buf - 1) < 0)
00857 rb_sys_fail("gethostname");
00858
00859 buf[sizeof buf - 1] = '\0';
00860 return rb_str_new2(buf);
00861 }
00862 #else
00863 #ifdef HAVE_UNAME
00864
00865 #include <sys/utsname.h>
00866
00867 static VALUE
00868 sock_gethostname(VALUE obj)
00869 {
00870 struct utsname un;
00871
00872 rb_secure(3);
00873 uname(&un);
00874 return rb_str_new2(un.nodename);
00875 }
00876 #else
00877 #define sock_gethostname rb_f_notimplement
00878 #endif
00879 #endif
00880
00881 static VALUE
00882 make_addrinfo(struct addrinfo *res0, int norevlookup)
00883 {
00884 VALUE base, ary;
00885 struct addrinfo *res;
00886
00887 if (res0 == NULL) {
00888 rb_raise(rb_eSocket, "host not found");
00889 }
00890 base = rb_ary_new();
00891 for (res = res0; res; res = res->ai_next) {
00892 ary = rsock_ipaddr(res->ai_addr, norevlookup);
00893 if (res->ai_canonname) {
00894 RARRAY_PTR(ary)[2] = rb_str_new2(res->ai_canonname);
00895 }
00896 rb_ary_push(ary, INT2FIX(res->ai_family));
00897 rb_ary_push(ary, INT2FIX(res->ai_socktype));
00898 rb_ary_push(ary, INT2FIX(res->ai_protocol));
00899 rb_ary_push(base, ary);
00900 }
00901 return base;
00902 }
00903
00904 static VALUE
00905 sock_sockaddr(struct sockaddr *addr, size_t len)
00906 {
00907 char *ptr;
00908
00909 switch (addr->sa_family) {
00910 case AF_INET:
00911 ptr = (char*)&((struct sockaddr_in*)addr)->sin_addr.s_addr;
00912 len = sizeof(((struct sockaddr_in*)addr)->sin_addr.s_addr);
00913 break;
00914 #ifdef AF_INET6
00915 case AF_INET6:
00916 ptr = (char*)&((struct sockaddr_in6*)addr)->sin6_addr.s6_addr;
00917 len = sizeof(((struct sockaddr_in6*)addr)->sin6_addr.s6_addr);
00918 break;
00919 #endif
00920 default:
00921 rb_raise(rb_eSocket, "unknown socket family:%d", addr->sa_family);
00922 break;
00923 }
00924 return rb_str_new(ptr, len);
00925 }
00926
00927
00928
00929
00930
00931
00932
00933
00934
00935
00936 static VALUE
00937 sock_s_gethostbyname(VALUE obj, VALUE host)
00938 {
00939 rb_secure(3);
00940 return rsock_make_hostent(host, rsock_addrinfo(host, Qnil, SOCK_STREAM, AI_CANONNAME), sock_sockaddr);
00941 }
00942
00943
00944
00945
00946
00947
00948
00949
00950
00951
00952 static VALUE
00953 sock_s_gethostbyaddr(int argc, VALUE *argv)
00954 {
00955 VALUE addr, family;
00956 struct hostent *h;
00957 struct sockaddr *sa;
00958 char **pch;
00959 VALUE ary, names;
00960 int t = AF_INET;
00961
00962 rb_scan_args(argc, argv, "11", &addr, &family);
00963 sa = (struct sockaddr*)StringValuePtr(addr);
00964 if (!NIL_P(family)) {
00965 t = rsock_family_arg(family);
00966 }
00967 #ifdef AF_INET6
00968 else if (RSTRING_LEN(addr) == 16) {
00969 t = AF_INET6;
00970 }
00971 #endif
00972 h = gethostbyaddr(RSTRING_PTR(addr), RSTRING_LENINT(addr), t);
00973 if (h == NULL) {
00974 #ifdef HAVE_HSTRERROR
00975 extern int h_errno;
00976 rb_raise(rb_eSocket, "%s", (char*)hstrerror(h_errno));
00977 #else
00978 rb_raise(rb_eSocket, "host not found");
00979 #endif
00980 }
00981 ary = rb_ary_new();
00982 rb_ary_push(ary, rb_str_new2(h->h_name));
00983 names = rb_ary_new();
00984 rb_ary_push(ary, names);
00985 if (h->h_aliases != NULL) {
00986 for (pch = h->h_aliases; *pch; pch++) {
00987 rb_ary_push(names, rb_str_new2(*pch));
00988 }
00989 }
00990 rb_ary_push(ary, INT2NUM(h->h_addrtype));
00991 #ifdef h_addr
00992 for (pch = h->h_addr_list; *pch; pch++) {
00993 rb_ary_push(ary, rb_str_new(*pch, h->h_length));
00994 }
00995 #else
00996 rb_ary_push(ary, rb_str_new(h->h_addr, h->h_length));
00997 #endif
00998
00999 return ary;
01000 }
01001
01002
01003
01004
01005
01006
01007
01008
01009
01010
01011
01012
01013
01014
01015 static VALUE
01016 sock_s_getservbyname(int argc, VALUE *argv)
01017 {
01018 VALUE service, proto;
01019 struct servent *sp;
01020 long port;
01021 const char *servicename, *protoname = "tcp";
01022
01023 rb_scan_args(argc, argv, "11", &service, &proto);
01024 StringValue(service);
01025 if (!NIL_P(proto)) StringValue(proto);
01026 servicename = StringValueCStr(service);
01027 if (!NIL_P(proto)) protoname = StringValueCStr(proto);
01028 sp = getservbyname(servicename, protoname);
01029 if (sp) {
01030 port = ntohs(sp->s_port);
01031 }
01032 else {
01033 char *end;
01034
01035 port = STRTOUL(servicename, &end, 0);
01036 if (*end != '\0') {
01037 rb_raise(rb_eSocket, "no such service %s/%s", servicename, protoname);
01038 }
01039 }
01040 return INT2FIX(port);
01041 }
01042
01043
01044
01045
01046
01047
01048
01049
01050
01051
01052
01053
01054
01055
01056 static VALUE
01057 sock_s_getservbyport(int argc, VALUE *argv)
01058 {
01059 VALUE port, proto;
01060 struct servent *sp;
01061 long portnum;
01062 const char *protoname = "tcp";
01063
01064 rb_scan_args(argc, argv, "11", &port, &proto);
01065 portnum = NUM2LONG(port);
01066 if (portnum != (uint16_t)portnum) {
01067 const char *s = portnum > 0 ? "big" : "small";
01068 rb_raise(rb_eRangeError, "integer %ld too %s to convert into `int16_t'", portnum, s);
01069 }
01070 if (!NIL_P(proto)) protoname = StringValueCStr(proto);
01071
01072 sp = getservbyport((int)htons((uint16_t)portnum), protoname);
01073 if (!sp) {
01074 rb_raise(rb_eSocket, "no such service for port %d/%s", (int)portnum, protoname);
01075 }
01076 return rb_tainted_str_new2(sp->s_name);
01077 }
01078
01079
01080
01081
01082
01083
01084
01085
01086
01087
01088
01089
01090
01091
01092
01093
01094
01095
01096
01097
01098
01099
01100
01101
01102
01103
01104
01105
01106
01107
01108
01109
01110
01111
01112 static VALUE
01113 sock_s_getaddrinfo(int argc, VALUE *argv)
01114 {
01115 VALUE host, port, family, socktype, protocol, flags, ret, revlookup;
01116 struct addrinfo hints, *res;
01117 int norevlookup;
01118
01119 rb_scan_args(argc, argv, "25", &host, &port, &family, &socktype, &protocol, &flags, &revlookup);
01120
01121 MEMZERO(&hints, struct addrinfo, 1);
01122 hints.ai_family = NIL_P(family) ? PF_UNSPEC : rsock_family_arg(family);
01123
01124 if (!NIL_P(socktype)) {
01125 hints.ai_socktype = rsock_socktype_arg(socktype);
01126 }
01127 if (!NIL_P(protocol)) {
01128 hints.ai_protocol = NUM2INT(protocol);
01129 }
01130 if (!NIL_P(flags)) {
01131 hints.ai_flags = NUM2INT(flags);
01132 }
01133 if (NIL_P(revlookup) || !rsock_revlookup_flag(revlookup, &norevlookup)) {
01134 norevlookup = rsock_do_not_reverse_lookup;
01135 }
01136 res = rsock_getaddrinfo(host, port, &hints, 0);
01137
01138 ret = make_addrinfo(res, norevlookup);
01139 freeaddrinfo(res);
01140 return ret;
01141 }
01142
01143
01144
01145
01146
01147
01148
01149
01150
01151
01152
01153
01154
01155
01156
01157
01158
01159
01160
01161
01162
01163
01164 static VALUE
01165 sock_s_getnameinfo(int argc, VALUE *argv)
01166 {
01167 VALUE sa, af = Qnil, host = Qnil, port = Qnil, flags, tmp;
01168 char *hptr, *pptr;
01169 char hbuf[1024], pbuf[1024];
01170 int fl;
01171 struct addrinfo hints, *res = NULL, *r;
01172 int error;
01173 struct sockaddr_storage ss;
01174 struct sockaddr *sap;
01175
01176 sa = flags = Qnil;
01177 rb_scan_args(argc, argv, "11", &sa, &flags);
01178
01179 fl = 0;
01180 if (!NIL_P(flags)) {
01181 fl = NUM2INT(flags);
01182 }
01183 tmp = rb_check_sockaddr_string_type(sa);
01184 if (!NIL_P(tmp)) {
01185 sa = tmp;
01186 if (sizeof(ss) < (size_t)RSTRING_LEN(sa)) {
01187 rb_raise(rb_eTypeError, "sockaddr length too big");
01188 }
01189 memcpy(&ss, RSTRING_PTR(sa), RSTRING_LEN(sa));
01190 if ((size_t)RSTRING_LEN(sa) != SS_LEN(&ss)) {
01191 rb_raise(rb_eTypeError, "sockaddr size differs - should not happen");
01192 }
01193 sap = (struct sockaddr*)&ss;
01194 goto call_nameinfo;
01195 }
01196 tmp = rb_check_array_type(sa);
01197 if (!NIL_P(tmp)) {
01198 sa = tmp;
01199 MEMZERO(&hints, struct addrinfo, 1);
01200 if (RARRAY_LEN(sa) == 3) {
01201 af = RARRAY_PTR(sa)[0];
01202 port = RARRAY_PTR(sa)[1];
01203 host = RARRAY_PTR(sa)[2];
01204 }
01205 else if (RARRAY_LEN(sa) >= 4) {
01206 af = RARRAY_PTR(sa)[0];
01207 port = RARRAY_PTR(sa)[1];
01208 host = RARRAY_PTR(sa)[3];
01209 if (NIL_P(host)) {
01210 host = RARRAY_PTR(sa)[2];
01211 }
01212 else {
01213
01214
01215
01216
01217 #ifdef AI_NUMERICHOST
01218 hints.ai_flags |= AI_NUMERICHOST;
01219 #endif
01220 }
01221 }
01222 else {
01223 rb_raise(rb_eArgError, "array size should be 3 or 4, %ld given",
01224 RARRAY_LEN(sa));
01225 }
01226
01227 if (NIL_P(host)) {
01228 hptr = NULL;
01229 }
01230 else {
01231 strncpy(hbuf, StringValuePtr(host), sizeof(hbuf));
01232 hbuf[sizeof(hbuf) - 1] = '\0';
01233 hptr = hbuf;
01234 }
01235
01236 if (NIL_P(port)) {
01237 strcpy(pbuf, "0");
01238 pptr = NULL;
01239 }
01240 else if (FIXNUM_P(port)) {
01241 snprintf(pbuf, sizeof(pbuf), "%ld", NUM2LONG(port));
01242 pptr = pbuf;
01243 }
01244 else {
01245 strncpy(pbuf, StringValuePtr(port), sizeof(pbuf));
01246 pbuf[sizeof(pbuf) - 1] = '\0';
01247 pptr = pbuf;
01248 }
01249 hints.ai_socktype = (fl & NI_DGRAM) ? SOCK_DGRAM : SOCK_STREAM;
01250
01251 hints.ai_family = NIL_P(af) ? PF_UNSPEC : rsock_family_arg(af);
01252 error = rb_getaddrinfo(hptr, pptr, &hints, &res);
01253 if (error) goto error_exit_addr;
01254 sap = res->ai_addr;
01255 }
01256 else {
01257 rb_raise(rb_eTypeError, "expecting String or Array");
01258 }
01259
01260 call_nameinfo:
01261 error = rb_getnameinfo(sap, SA_LEN(sap), hbuf, sizeof(hbuf),
01262 pbuf, sizeof(pbuf), fl);
01263 if (error) goto error_exit_name;
01264 if (res) {
01265 for (r = res->ai_next; r; r = r->ai_next) {
01266 char hbuf2[1024], pbuf2[1024];
01267
01268 sap = r->ai_addr;
01269 error = rb_getnameinfo(sap, SA_LEN(sap), hbuf2, sizeof(hbuf2),
01270 pbuf2, sizeof(pbuf2), fl);
01271 if (error) goto error_exit_name;
01272 if (strcmp(hbuf, hbuf2) != 0|| strcmp(pbuf, pbuf2) != 0) {
01273 freeaddrinfo(res);
01274 rb_raise(rb_eSocket, "sockaddr resolved to multiple nodename");
01275 }
01276 }
01277 freeaddrinfo(res);
01278 }
01279 return rb_assoc_new(rb_str_new2(hbuf), rb_str_new2(pbuf));
01280
01281 error_exit_addr:
01282 if (res) freeaddrinfo(res);
01283 rsock_raise_socket_error("getaddrinfo", error);
01284
01285 error_exit_name:
01286 if (res) freeaddrinfo(res);
01287 rsock_raise_socket_error("getnameinfo", error);
01288 }
01289
01290
01291
01292
01293
01294
01295
01296
01297
01298
01299
01300
01301
01302
01303
01304 static VALUE
01305 sock_s_pack_sockaddr_in(VALUE self, VALUE port, VALUE host)
01306 {
01307 struct addrinfo *res = rsock_addrinfo(host, port, 0, 0);
01308 VALUE addr = rb_str_new((char*)res->ai_addr, res->ai_addrlen);
01309
01310 freeaddrinfo(res);
01311 OBJ_INFECT(addr, port);
01312 OBJ_INFECT(addr, host);
01313
01314 return addr;
01315 }
01316
01317
01318
01319
01320
01321
01322
01323
01324
01325
01326
01327
01328
01329
01330 static VALUE
01331 sock_s_unpack_sockaddr_in(VALUE self, VALUE addr)
01332 {
01333 struct sockaddr_in * sockaddr;
01334 VALUE host;
01335
01336 sockaddr = (struct sockaddr_in*)SockAddrStringValuePtr(addr);
01337 if (RSTRING_LEN(addr) <
01338 (char*)&((struct sockaddr *)sockaddr)->sa_family +
01339 sizeof(((struct sockaddr *)sockaddr)->sa_family) -
01340 (char*)sockaddr)
01341 rb_raise(rb_eArgError, "too short sockaddr");
01342 if (((struct sockaddr *)sockaddr)->sa_family != AF_INET
01343 #ifdef INET6
01344 && ((struct sockaddr *)sockaddr)->sa_family != AF_INET6
01345 #endif
01346 ) {
01347 #ifdef INET6
01348 rb_raise(rb_eArgError, "not an AF_INET/AF_INET6 sockaddr");
01349 #else
01350 rb_raise(rb_eArgError, "not an AF_INET sockaddr");
01351 #endif
01352 }
01353 host = rsock_make_ipaddr((struct sockaddr*)sockaddr);
01354 OBJ_INFECT(host, addr);
01355 return rb_assoc_new(INT2NUM(ntohs(sockaddr->sin_port)), host);
01356 }
01357
01358 #ifdef HAVE_SYS_UN_H
01359
01360
01361
01362
01363
01364
01365
01366
01367
01368
01369
01370 static VALUE
01371 sock_s_pack_sockaddr_un(VALUE self, VALUE path)
01372 {
01373 struct sockaddr_un sockaddr;
01374 char *sun_path;
01375 VALUE addr;
01376
01377 MEMZERO(&sockaddr, struct sockaddr_un, 1);
01378 sockaddr.sun_family = AF_UNIX;
01379 sun_path = StringValueCStr(path);
01380 if (sizeof(sockaddr.sun_path) <= strlen(sun_path)) {
01381 rb_raise(rb_eArgError, "too long unix socket path (max: %dbytes)",
01382 (int)sizeof(sockaddr.sun_path)-1);
01383 }
01384 strncpy(sockaddr.sun_path, sun_path, sizeof(sockaddr.sun_path)-1);
01385 addr = rb_str_new((char*)&sockaddr, sizeof(sockaddr));
01386 OBJ_INFECT(addr, path);
01387
01388 return addr;
01389 }
01390
01391
01392
01393
01394
01395
01396
01397
01398
01399
01400
01401
01402
01403 static VALUE
01404 sock_s_unpack_sockaddr_un(VALUE self, VALUE addr)
01405 {
01406 struct sockaddr_un * sockaddr;
01407 const char *sun_path;
01408 VALUE path;
01409
01410 sockaddr = (struct sockaddr_un*)SockAddrStringValuePtr(addr);
01411 if (RSTRING_LEN(addr) <
01412 (char*)&((struct sockaddr *)sockaddr)->sa_family +
01413 sizeof(((struct sockaddr *)sockaddr)->sa_family) -
01414 (char*)sockaddr)
01415 rb_raise(rb_eArgError, "too short sockaddr");
01416 if (((struct sockaddr *)sockaddr)->sa_family != AF_UNIX) {
01417 rb_raise(rb_eArgError, "not an AF_UNIX sockaddr");
01418 }
01419 if (sizeof(struct sockaddr_un) < (size_t)RSTRING_LEN(addr)) {
01420 rb_raise(rb_eTypeError, "too long sockaddr_un - %ld longer than %d",
01421 RSTRING_LEN(addr), (int)sizeof(struct sockaddr_un));
01422 }
01423 sun_path = rsock_unixpath(sockaddr, RSTRING_LENINT(addr));
01424 if (sizeof(struct sockaddr_un) == RSTRING_LEN(addr) &&
01425 sun_path == sockaddr->sun_path &&
01426 sun_path + strlen(sun_path) == RSTRING_PTR(addr) + RSTRING_LEN(addr)) {
01427 rb_raise(rb_eArgError, "sockaddr_un.sun_path not NUL terminated");
01428 }
01429 path = rb_str_new2(sun_path);
01430 OBJ_INFECT(path, addr);
01431 return path;
01432 }
01433 #endif
01434
01435 #if defined(HAVE_GETIFADDRS) || defined(SIOCGLIFCONF) || defined(SIOCGIFCONF) || defined(_WIN32)
01436 static VALUE
01437 sockaddr_obj(struct sockaddr *addr)
01438 {
01439 socklen_t len;
01440 #if defined(AF_INET6) && defined(__KAME__)
01441 struct sockaddr_in6 addr6;
01442 #endif
01443
01444 if (addr == NULL)
01445 return Qnil;
01446
01447 switch (addr->sa_family) {
01448 case AF_INET:
01449 len = (socklen_t)sizeof(struct sockaddr_in);
01450 break;
01451
01452 #ifdef AF_INET6
01453 case AF_INET6:
01454 len = (socklen_t)sizeof(struct sockaddr_in6);
01455 # ifdef __KAME__
01456
01457
01458
01459 memcpy(&addr6, addr, len);
01460 addr = (struct sockaddr *)&addr6;
01461 if (IN6_IS_ADDR_LINKLOCAL(&addr6.sin6_addr) &&
01462 addr6.sin6_scope_id == 0 &&
01463 (addr6.sin6_addr.s6_addr[2] || addr6.sin6_addr.s6_addr[3])) {
01464 addr6.sin6_scope_id = (addr6.sin6_addr.s6_addr[2] << 8) | addr6.sin6_addr.s6_addr[3];
01465 addr6.sin6_addr.s6_addr[2] = 0;
01466 addr6.sin6_addr.s6_addr[3] = 0;
01467 }
01468 # endif
01469 break;
01470 #endif
01471
01472 #ifdef HAVE_SYS_UN_H
01473 case AF_UNIX:
01474 len = (socklen_t)sizeof(struct sockaddr_un);
01475 break;
01476 #endif
01477
01478 default:
01479 len = (socklen_t)sizeof(struct sockaddr_in);
01480 break;
01481 }
01482 #ifdef SA_LEN
01483 if (len < (socklen_t)SA_LEN(addr))
01484 len = (socklen_t)SA_LEN(addr);
01485 #endif
01486
01487 return rsock_addrinfo_new(addr, len, addr->sa_family, 0, 0, Qnil, Qnil);
01488 }
01489 #endif
01490
01491 #if defined(HAVE_GETIFADDRS) || (defined(SIOCGLIFCONF) && defined(SIOCGLIFNUM) && !defined(__hpux)) || defined(SIOCGIFCONF) || defined(_WIN32)
01492
01493
01494
01495
01496
01497
01498
01499
01500
01501
01502
01503
01504
01505
01506
01507 static VALUE
01508 socket_s_ip_address_list(VALUE self)
01509 {
01510 #if defined(HAVE_GETIFADDRS)
01511 struct ifaddrs *ifp = NULL;
01512 struct ifaddrs *p;
01513 int ret;
01514 VALUE list;
01515
01516 ret = getifaddrs(&ifp);
01517 if (ret == -1) {
01518 rb_sys_fail("getifaddrs");
01519 }
01520
01521 list = rb_ary_new();
01522 for (p = ifp; p; p = p->ifa_next) {
01523 if (p->ifa_addr != NULL && IS_IP_FAMILY(p->ifa_addr->sa_family)) {
01524 rb_ary_push(list, sockaddr_obj(p->ifa_addr));
01525 }
01526 }
01527
01528 freeifaddrs(ifp);
01529
01530 return list;
01531 #elif defined(SIOCGLIFCONF) && defined(SIOCGLIFNUM) && !defined(__hpux)
01532
01533
01534 int fd = -1;
01535 int ret;
01536 struct lifnum ln;
01537 struct lifconf lc;
01538 char *reason = NULL;
01539 int save_errno;
01540 int i;
01541 VALUE list = Qnil;
01542
01543 lc.lifc_buf = NULL;
01544
01545 fd = socket(AF_INET, SOCK_DGRAM, 0);
01546 if (fd == -1)
01547 rb_sys_fail("socket");
01548
01549 memset(&ln, 0, sizeof(ln));
01550 ln.lifn_family = AF_UNSPEC;
01551
01552 ret = ioctl(fd, SIOCGLIFNUM, &ln);
01553 if (ret == -1) {
01554 reason = "SIOCGLIFNUM";
01555 goto finish;
01556 }
01557
01558 memset(&lc, 0, sizeof(lc));
01559 lc.lifc_family = AF_UNSPEC;
01560 lc.lifc_flags = 0;
01561 lc.lifc_len = sizeof(struct lifreq) * ln.lifn_count;
01562 lc.lifc_req = xmalloc(lc.lifc_len);
01563
01564 ret = ioctl(fd, SIOCGLIFCONF, &lc);
01565 if (ret == -1) {
01566 reason = "SIOCGLIFCONF";
01567 goto finish;
01568 }
01569
01570 list = rb_ary_new();
01571 for (i = 0; i < ln.lifn_count; i++) {
01572 struct lifreq *req = &lc.lifc_req[i];
01573 if (IS_IP_FAMILY(req->lifr_addr.ss_family)) {
01574 if (req->lifr_addr.ss_family == AF_INET6 &&
01575 IN6_IS_ADDR_LINKLOCAL(&((struct sockaddr_in6 *)(&req->lifr_addr))->sin6_addr) &&
01576 ((struct sockaddr_in6 *)(&req->lifr_addr))->sin6_scope_id == 0) {
01577 struct lifreq req2;
01578 memcpy(req2.lifr_name, req->lifr_name, LIFNAMSIZ);
01579 ret = ioctl(fd, SIOCGLIFINDEX, &req2);
01580 if (ret == -1) {
01581 reason = "SIOCGLIFINDEX";
01582 goto finish;
01583 }
01584 ((struct sockaddr_in6 *)(&req->lifr_addr))->sin6_scope_id = req2.lifr_index;
01585 }
01586 rb_ary_push(list, sockaddr_obj((struct sockaddr *)&req->lifr_addr));
01587 }
01588 }
01589
01590 finish:
01591 save_errno = errno;
01592 if (lc.lifc_buf != NULL)
01593 xfree(lc.lifc_req);
01594 if (fd != -1)
01595 close(fd);
01596 errno = save_errno;
01597
01598 if (reason)
01599 rb_sys_fail(reason);
01600 return list;
01601
01602 #elif defined(SIOCGIFCONF)
01603 int fd = -1;
01604 int ret;
01605 #define EXTRA_SPACE (sizeof(struct ifconf) + sizeof(struct sockaddr_storage))
01606 char initbuf[4096+EXTRA_SPACE];
01607 char *buf = initbuf;
01608 int bufsize;
01609 struct ifconf conf;
01610 struct ifreq *req;
01611 VALUE list = Qnil;
01612 const char *reason = NULL;
01613 int save_errno;
01614
01615 fd = socket(AF_INET, SOCK_DGRAM, 0);
01616 if (fd == -1)
01617 rb_sys_fail("socket");
01618
01619 bufsize = sizeof(initbuf);
01620 buf = initbuf;
01621
01622 retry:
01623 conf.ifc_len = bufsize;
01624 conf.ifc_req = (struct ifreq *)buf;
01625
01626
01627
01628 ret = ioctl(fd, SIOCGIFCONF, &conf);
01629 if (ret == -1) {
01630 reason = "SIOCGIFCONF";
01631 goto finish;
01632 }
01633
01634
01635
01636 if (bufsize - EXTRA_SPACE < conf.ifc_len) {
01637 if (bufsize < conf.ifc_len) {
01638
01639 bufsize = conf.ifc_len + EXTRA_SPACE;
01640 }
01641 else {
01642 bufsize = bufsize << 1;
01643 }
01644 if (buf == initbuf)
01645 buf = NULL;
01646 buf = xrealloc(buf, bufsize);
01647 goto retry;
01648 }
01649
01650 close(fd);
01651 fd = -1;
01652
01653 list = rb_ary_new();
01654 req = conf.ifc_req;
01655 while ((char*)req < (char*)conf.ifc_req + conf.ifc_len) {
01656 struct sockaddr *addr = &req->ifr_addr;
01657 if (IS_IP_FAMILY(addr->sa_family)) {
01658 rb_ary_push(list, sockaddr_obj(addr));
01659 }
01660 #ifdef HAVE_SA_LEN
01661 # ifndef _SIZEOF_ADDR_IFREQ
01662 # define _SIZEOF_ADDR_IFREQ(r) \
01663 (sizeof(struct ifreq) + \
01664 (sizeof(struct sockaddr) < (r).ifr_addr.sa_len ? \
01665 (r).ifr_addr.sa_len - sizeof(struct sockaddr) : \
01666 0))
01667 # endif
01668 req = (struct ifreq *)((char*)req + _SIZEOF_ADDR_IFREQ(*req));
01669 #else
01670 req = (struct ifreq *)((char*)req + sizeof(struct ifreq));
01671 #endif
01672 }
01673
01674 finish:
01675
01676 save_errno = errno;
01677 if (buf != initbuf)
01678 xfree(buf);
01679 if (fd != -1)
01680 close(fd);
01681 errno = save_errno;
01682
01683 if (reason)
01684 rb_sys_fail(reason);
01685 return list;
01686
01687 #undef EXTRA_SPACE
01688 #elif defined(_WIN32)
01689 typedef struct ip_adapter_unicast_address_st {
01690 unsigned LONG_LONG dummy0;
01691 struct ip_adapter_unicast_address_st *Next;
01692 struct {
01693 struct sockaddr *lpSockaddr;
01694 int iSockaddrLength;
01695 } Address;
01696 int dummy1;
01697 int dummy2;
01698 int dummy3;
01699 long dummy4;
01700 long dummy5;
01701 long dummy6;
01702 } ip_adapter_unicast_address_t;
01703 typedef struct ip_adapter_anycast_address_st {
01704 unsigned LONG_LONG dummy0;
01705 struct ip_adapter_anycast_address_st *Next;
01706 struct {
01707 struct sockaddr *lpSockaddr;
01708 int iSockaddrLength;
01709 } Address;
01710 } ip_adapter_anycast_address_t;
01711 typedef struct ip_adapter_addresses_st {
01712 unsigned LONG_LONG dummy0;
01713 struct ip_adapter_addresses_st *Next;
01714 void *dummy1;
01715 ip_adapter_unicast_address_t *FirstUnicastAddress;
01716 ip_adapter_anycast_address_t *FirstAnycastAddress;
01717 void *dummy2;
01718 void *dummy3;
01719 void *dummy4;
01720 void *dummy5;
01721 void *dummy6;
01722 BYTE dummy7[8];
01723 DWORD dummy8;
01724 DWORD dummy9;
01725 DWORD dummy10;
01726 DWORD IfType;
01727 int OperStatus;
01728 DWORD dummy12;
01729 DWORD dummy13[16];
01730 void *dummy14;
01731 } ip_adapter_addresses_t;
01732 typedef ULONG (WINAPI *GetAdaptersAddresses_t)(ULONG, ULONG, PVOID, ip_adapter_addresses_t *, PULONG);
01733 HMODULE h;
01734 GetAdaptersAddresses_t pGetAdaptersAddresses;
01735 ULONG len;
01736 DWORD ret;
01737 ip_adapter_addresses_t *adapters;
01738 VALUE list;
01739
01740 h = LoadLibrary("iphlpapi.dll");
01741 if (!h)
01742 rb_notimplement();
01743 pGetAdaptersAddresses = (GetAdaptersAddresses_t)GetProcAddress(h, "GetAdaptersAddresses");
01744 if (!pGetAdaptersAddresses) {
01745 FreeLibrary(h);
01746 rb_notimplement();
01747 }
01748
01749 ret = pGetAdaptersAddresses(AF_UNSPEC, 0, NULL, NULL, &len);
01750 if (ret != ERROR_SUCCESS && ret != ERROR_BUFFER_OVERFLOW) {
01751 errno = rb_w32_map_errno(ret);
01752 FreeLibrary(h);
01753 rb_sys_fail("GetAdaptersAddresses");
01754 }
01755 adapters = (ip_adapter_addresses_t *)ALLOCA_N(BYTE, len);
01756 ret = pGetAdaptersAddresses(AF_UNSPEC, 0, NULL, adapters, &len);
01757 if (ret != ERROR_SUCCESS) {
01758 errno = rb_w32_map_errno(ret);
01759 FreeLibrary(h);
01760 rb_sys_fail("GetAdaptersAddresses");
01761 }
01762
01763 list = rb_ary_new();
01764 for (; adapters; adapters = adapters->Next) {
01765 ip_adapter_unicast_address_t *uni;
01766 ip_adapter_anycast_address_t *any;
01767 if (adapters->OperStatus != 1)
01768 continue;
01769 for (uni = adapters->FirstUnicastAddress; uni; uni = uni->Next) {
01770 #ifndef INET6
01771 if (uni->Address.lpSockaddr->sa_family == AF_INET)
01772 #else
01773 if (IS_IP_FAMILY(uni->Address.lpSockaddr->sa_family))
01774 #endif
01775 rb_ary_push(list, sockaddr_obj(uni->Address.lpSockaddr));
01776 }
01777 for (any = adapters->FirstAnycastAddress; any; any = any->Next) {
01778 #ifndef INET6
01779 if (any->Address.lpSockaddr->sa_family == AF_INET)
01780 #else
01781 if (IS_IP_FAMILY(any->Address.lpSockaddr->sa_family))
01782 #endif
01783 rb_ary_push(list, sockaddr_obj(any->Address.lpSockaddr));
01784 }
01785 }
01786
01787 FreeLibrary(h);
01788 return list;
01789 #endif
01790 }
01791 #else
01792 #define socket_s_ip_address_list rb_f_notimplement
01793 #endif
01794
01795 void
01796 Init_socket()
01797 {
01798 rsock_init_basicsocket();
01799
01800
01801
01802
01803
01804
01805
01806
01807
01808
01809
01810
01811
01812
01813
01814
01815
01816
01817
01818
01819
01820
01821
01822
01823
01824
01825
01826
01827
01828
01829
01830
01831
01832
01833
01834
01835
01836
01837
01838
01839
01840
01841
01842
01843
01844
01845
01846
01847
01848
01849
01850
01851
01852
01853
01854
01855
01856
01857
01858
01859
01860
01861
01862
01863
01864
01865
01866
01867
01868
01869
01870
01871
01872
01873
01874
01875
01876
01877
01878
01879
01880
01881
01882
01883
01884
01885
01886
01887
01888
01889
01890
01891
01892
01893
01894
01895
01896
01897
01898
01899
01900
01901
01902
01903
01904
01905 rb_cSocket = rb_define_class("Socket", rb_cBasicSocket);
01906
01907 rsock_init_socket_init();
01908
01909 rb_define_method(rb_cSocket, "initialize", sock_initialize, -1);
01910 rb_define_method(rb_cSocket, "connect", sock_connect, 1);
01911 rb_define_method(rb_cSocket, "connect_nonblock", sock_connect_nonblock, 1);
01912 rb_define_method(rb_cSocket, "bind", sock_bind, 1);
01913 rb_define_method(rb_cSocket, "listen", rsock_sock_listen, 1);
01914 rb_define_method(rb_cSocket, "accept", sock_accept, 0);
01915 rb_define_method(rb_cSocket, "accept_nonblock", sock_accept_nonblock, 0);
01916 rb_define_method(rb_cSocket, "sysaccept", sock_sysaccept, 0);
01917
01918 rb_define_method(rb_cSocket, "recvfrom", sock_recvfrom, -1);
01919 rb_define_method(rb_cSocket, "recvfrom_nonblock", sock_recvfrom_nonblock, -1);
01920
01921 rb_define_singleton_method(rb_cSocket, "socketpair", rsock_sock_s_socketpair, -1);
01922 rb_define_singleton_method(rb_cSocket, "pair", rsock_sock_s_socketpair, -1);
01923 rb_define_singleton_method(rb_cSocket, "gethostname", sock_gethostname, 0);
01924 rb_define_singleton_method(rb_cSocket, "gethostbyname", sock_s_gethostbyname, 1);
01925 rb_define_singleton_method(rb_cSocket, "gethostbyaddr", sock_s_gethostbyaddr, -1);
01926 rb_define_singleton_method(rb_cSocket, "getservbyname", sock_s_getservbyname, -1);
01927 rb_define_singleton_method(rb_cSocket, "getservbyport", sock_s_getservbyport, -1);
01928 rb_define_singleton_method(rb_cSocket, "getaddrinfo", sock_s_getaddrinfo, -1);
01929 rb_define_singleton_method(rb_cSocket, "getnameinfo", sock_s_getnameinfo, -1);
01930 rb_define_singleton_method(rb_cSocket, "sockaddr_in", sock_s_pack_sockaddr_in, 2);
01931 rb_define_singleton_method(rb_cSocket, "pack_sockaddr_in", sock_s_pack_sockaddr_in, 2);
01932 rb_define_singleton_method(rb_cSocket, "unpack_sockaddr_in", sock_s_unpack_sockaddr_in, 1);
01933 #ifdef HAVE_SYS_UN_H
01934 rb_define_singleton_method(rb_cSocket, "sockaddr_un", sock_s_pack_sockaddr_un, 1);
01935 rb_define_singleton_method(rb_cSocket, "pack_sockaddr_un", sock_s_pack_sockaddr_un, 1);
01936 rb_define_singleton_method(rb_cSocket, "unpack_sockaddr_un", sock_s_unpack_sockaddr_un, 1);
01937 #endif
01938
01939 rb_define_singleton_method(rb_cSocket, "ip_address_list", socket_s_ip_address_list, 0);
01940 }
01941