| /* Socket module */ |
| |
| /* SSL support based on patches by Brian E Gallew and Laszlo Kovacs */ |
| |
| /* |
| This module provides an interface to Berkeley socket IPC. |
| |
| Limitations: |
| |
| - only AF_INET, AF_INET6 and AF_UNIX address families are supported in a |
| portable manner, though AF_PACKET is supported under Linux. |
| - no read/write operations (use send/recv or makefile instead) |
| - additional restrictions apply on Windows |
| |
| Module interface: |
| |
| - socket.error: exception raised for socket specific errors |
| - socket.gaierror: exception raised for getaddrinfo/getnameinfo errors, |
| a subclass of socket.error |
| - socket.herror: exception raised for gethostby* errors, |
| a subclass of socket.error |
| - socket.gethostbyname(hostname) --> host IP address (string: 'dd.dd.dd.dd') |
| - socket.gethostbyaddr(IP address) --> (hostname, [alias, ...], [IP addr, ...]) |
| - socket.gethostname() --> host name (string: 'spam' or 'spam.domain.com') |
| - socket.getprotobyname(protocolname) --> protocol number |
| - socket.getservbyname(servicename, protocolname) --> port number |
| - socket.socket(family, type [, proto]) --> new socket object |
| - socket.ntohs(16 bit value) --> new int object |
| - socket.ntohl(32 bit value) --> new int object |
| - socket.htons(16 bit value) --> new int object |
| - socket.htonl(32 bit value) --> new int object |
| - socket.getaddrinfo(host, port [, family, socktype, proto, flags]) |
| --> List of (family, socktype, proto, canonname, sockaddr) |
| - socket.getnameinfo(sockaddr, flags) --> (host, port) |
| - socket.AF_INET, socket.SOCK_STREAM, etc.: constants from <socket.h> |
| - socket.inet_aton(IP address) -> 32-bit packed IP representation |
| - socket.inet_ntoa(packed IP) -> IP address string |
| - socket.ssl(socket, keyfile, certfile) -> new ssl object |
| - an Internet socket address is a pair (hostname, port) |
| where hostname can be anything recognized by gethostbyname() |
| (including the dd.dd.dd.dd notation) and port is in host byte order |
| - where a hostname is returned, the dd.dd.dd.dd notation is used |
| - a UNIX domain socket address is a string specifying the pathname |
| - an AF_PACKET socket address is a tuple containing a string |
| specifying the ethernet interface and an integer specifying |
| the Ethernet protocol number to be received. For example: |
| ("eth0",0x1234). Optional 3rd,4th,5th elements in the tuple |
| specify packet-type and ha-type/addr -- these are ignored by |
| networking code, but accepted since they are returned by the |
| getsockname() method. |
| |
| Socket methods: |
| |
| - s.accept() --> new socket object, sockaddr |
| - s.bind(sockaddr) --> None |
| - s.close() --> None |
| - s.connect(sockaddr) --> None |
| - s.connect_ex(sockaddr) --> 0 or errno (handy for e.g. async connect) |
| - s.fileno() --> file descriptor |
| - s.dup() --> same as socket.fromfd(os.dup(s.fileno(), ...) |
| - s.getpeername() --> sockaddr |
| - s.getsockname() --> sockaddr |
| - s.getsockopt(level, optname[, buflen]) --> int or string |
| - s.listen(backlog) --> None |
| - s.makefile([mode[, bufsize]]) --> file object |
| - s.recv(buflen [,flags]) --> string |
| - s.recvfrom(buflen [,flags]) --> string, sockaddr |
| - s.send(string [,flags]) --> nbytes |
| - s.sendto(string, [flags,] sockaddr) --> nbytes |
| - s.setblocking(0 | 1) --> None |
| - s.setsockopt(level, optname, value) --> None |
| - s.shutdown(how) --> None |
| - repr(s) --> "<socket object, fd=%d, family=%d, type=%d, protocol=%d>" |
| |
| */ |
| |
| #include "Python.h" |
| |
| /* Hacks for gethostbyname_r(). On some non-Linux platforms, the configure |
| script doesn't get this right, so we hardcode some platform checks below. |
| On the other hand, not all Linux versions agree, so there the settings |
| computed by the configure script are needed! */ |
| |
| #ifndef linux |
| #undef HAVE_GETHOSTBYNAME_R_3_ARG |
| #undef HAVE_GETHOSTBYNAME_R_5_ARG |
| #undef HAVE_GETHOSTBYNAME_R_6_ARG |
| #endif |
| |
| #ifndef WITH_THREAD |
| #undef HAVE_GETHOSTBYNAME_R |
| #endif |
| |
| #ifdef HAVE_GETHOSTBYNAME_R |
| #if defined(_AIX) || defined(__osf__) |
| #define HAVE_GETHOSTBYNAME_R_3_ARG |
| #elif defined(__sun) || defined(__sgi) |
| #define HAVE_GETHOSTBYNAME_R_5_ARG |
| #elif defined(linux) |
| /* Rely on the configure script */ |
| #else |
| #undef HAVE_GETHOSTBYNAME_R |
| #endif |
| #endif |
| |
| #if !defined(HAVE_GETHOSTBYNAME_R) && defined(WITH_THREAD) && !defined(MS_WINDOWS) |
| #define USE_GETHOSTBYNAME_LOCK |
| #endif |
| |
| #ifdef USE_GETHOSTBYNAME_LOCK |
| #include "pythread.h" |
| #endif |
| |
| #ifdef HAVE_UNISTD_H |
| #include <unistd.h> |
| #endif |
| |
| #if defined(PYCC_VACPP) |
| #include <types.h> |
| #include <io.h> |
| #include <sys/ioctl.h> |
| #include <utils.h> |
| #include <ctype.h> |
| #endif |
| |
| #if defined(PYOS_OS2) |
| #define INCL_DOS |
| #define INCL_DOSERRORS |
| #define INCL_NOPMAPI |
| #include <os2.h> |
| #endif |
| |
| #ifdef RISCOS |
| #define NO_DUP |
| #undef off_t |
| #undef uid_t |
| #undef gid_t |
| #undef errno |
| #include <signal.h> |
| #include "socklib.h" |
| #include "inetlib.h" |
| #include "netdb.h" |
| #include "unixlib.h" |
| #include "netinet/in.h" |
| #include "sys/ioctl.h" |
| #else /*RISCOS*/ |
| |
| #include <sys/types.h> |
| |
| #include <signal.h> |
| #ifndef MS_WINDOWS |
| #include <netdb.h> |
| #include <sys/socket.h> |
| #include <netinet/in.h> |
| #if !(defined(__BEOS__) || defined(__CYGWIN__)) |
| #include <netinet/tcp.h> |
| #endif |
| |
| /* Headers needed for inet_ntoa() and inet_addr() */ |
| #ifdef __BEOS__ |
| #include <net/netdb.h> |
| #else |
| #ifndef USE_GUSI1 |
| #include <arpa/inet.h> |
| #endif |
| #endif |
| |
| #include <fcntl.h> |
| #else |
| #include <winsock.h> |
| #include <fcntl.h> |
| #endif |
| |
| #endif /*RISCOS*/ |
| |
| #ifdef HAVE_SYS_UN_H |
| #include <sys/un.h> |
| #else |
| #undef AF_UNIX |
| #endif |
| |
| #ifdef HAVE_NETPACKET_PACKET_H |
| #include <sys/ioctl.h> |
| #include <net/if.h> |
| #include <netpacket/packet.h> |
| #endif |
| |
| #ifdef HAVE_STDDEF_H |
| #include <stddef.h> |
| #endif |
| |
| #ifndef offsetof |
| #define offsetof(type, member) ((size_t)(&((type *)0)->member)) |
| #endif |
| |
| #ifndef O_NDELAY |
| #define O_NDELAY O_NONBLOCK /* For QNX only? */ |
| #endif |
| |
| #ifdef USE_GUSI1 |
| /* fdopen() isn't declared in stdio.h (sigh) */ |
| #include <GUSI.h> |
| #endif |
| |
| #include "addrinfo.h" |
| |
| #ifdef USE_SSL |
| #include "openssl/rsa.h" |
| #include "openssl/crypto.h" |
| #include "openssl/x509.h" |
| #include "openssl/pem.h" |
| #include "openssl/ssl.h" |
| #include "openssl/err.h" |
| #include "openssl/rand.h" |
| #endif /* USE_SSL */ |
| |
| #ifndef HAVE_INET_PTON |
| int inet_pton (int af, const char *src, void *dst); |
| const char *inet_ntop(int af, const void *src, char *dst, socklen_t size); |
| #endif |
| |
| #ifdef __APPLE__ |
| /* On OS X, getaddrinfo returns no error indication of lookup |
| failure, so we must use the emulation instead of the libinfo |
| implementation. Unfortunately, performing an autoconf test |
| for this bug would require DNS access for the machine performing |
| the configuration, which is not acceptable. Therefore, we |
| determine the bug just by checking for __APPLE__. If this bug |
| gets ever fixed, perhaps checking for sys/version.h would be |
| appropriate, which is 10/0 on the system with the bug. */ |
| #undef HAVE_GETADDRINFO |
| /* avoid clashes with the C library definition of the symbol. */ |
| #define getaddrinfo fake_getaddrinfo |
| #endif |
| |
| /* I know this is a bad practice, but it is the easiest... */ |
| #if !defined(HAVE_GETADDRINFO) |
| #include "getaddrinfo.c" |
| #endif |
| #if !defined(HAVE_GETNAMEINFO) |
| #include "getnameinfo.c" |
| #endif |
| |
| #if defined(MS_WINDOWS) || defined(__BEOS__) |
| /* BeOS suffers from the same socket dichotomy as Win32... - [cjh] */ |
| /* seem to be a few differences in the API */ |
| #define SOCKETCLOSE closesocket |
| #define NO_DUP /* Actually it exists on NT 3.5, but what the heck... */ |
| #endif |
| |
| /* abstract the socket file descriptor type */ |
| #ifdef MS_WINDOWS |
| typedef SOCKET SOCKET_T; |
| # ifdef MS_WIN64 |
| # define SIZEOF_SOCKET_T 8 |
| # else |
| # define SIZEOF_SOCKET_T 4 |
| # endif |
| #else |
| typedef int SOCKET_T; |
| # define SIZEOF_SOCKET_T SIZEOF_INT |
| #endif |
| |
| #ifdef MS_WIN32 |
| # define EAFNOSUPPORT WSAEAFNOSUPPORT |
| # define snprintf _snprintf |
| #endif |
| |
| #if defined(PYOS_OS2) |
| #define SOCKETCLOSE soclose |
| #define NO_DUP /* Sockets are Not Actual File Handles under OS/2 */ |
| #endif |
| |
| #ifndef SOCKETCLOSE |
| #define SOCKETCLOSE close |
| #endif |
| |
| /* Global variable holding the exception type for errors detected |
| by this module (but not argument type or memory errors, etc.). */ |
| |
| static PyObject *PySocket_Error; |
| static PyObject *PyH_Error; |
| static PyObject *PyGAI_Error; |
| |
| #ifdef USE_SSL |
| static PyObject *PySSLErrorObject; |
| #endif /* USE_SSL */ |
| |
| |
| #ifdef RISCOS |
| /* Global variable which is !=0 if Python is running in a RISC OS taskwindow */ |
| static int taskwindow; |
| #endif |
| |
| |
| /* Convenience function to raise an error according to errno |
| and return a NULL pointer from a function. */ |
| |
| static PyObject * |
| PySocket_Err(void) |
| { |
| #ifdef MS_WINDOWS |
| int err_no = WSAGetLastError(); |
| if (err_no) { |
| static struct { int no; const char *msg; } *msgp, msgs[] = { |
| { WSAEINTR, "Interrupted system call" }, |
| { WSAEBADF, "Bad file descriptor" }, |
| { WSAEACCES, "Permission denied" }, |
| { WSAEFAULT, "Bad address" }, |
| { WSAEINVAL, "Invalid argument" }, |
| { WSAEMFILE, "Too many open files" }, |
| { WSAEWOULDBLOCK, |
| "The socket operation could not complete " |
| "without blocking" }, |
| { WSAEINPROGRESS, "Operation now in progress" }, |
| { WSAEALREADY, "Operation already in progress" }, |
| { WSAENOTSOCK, "Socket operation on non-socket" }, |
| { WSAEDESTADDRREQ, "Destination address required" }, |
| { WSAEMSGSIZE, "Message too long" }, |
| { WSAEPROTOTYPE, "Protocol wrong type for socket" }, |
| { WSAENOPROTOOPT, "Protocol not available" }, |
| { WSAEPROTONOSUPPORT, "Protocol not supported" }, |
| { WSAESOCKTNOSUPPORT, "Socket type not supported" }, |
| { WSAEOPNOTSUPP, "Operation not supported" }, |
| { WSAEPFNOSUPPORT, "Protocol family not supported" }, |
| { WSAEAFNOSUPPORT, "Address family not supported" }, |
| { WSAEADDRINUSE, "Address already in use" }, |
| { WSAEADDRNOTAVAIL, |
| "Can't assign requested address" }, |
| { WSAENETDOWN, "Network is down" }, |
| { WSAENETUNREACH, "Network is unreachable" }, |
| { WSAENETRESET, |
| "Network dropped connection on reset" }, |
| { WSAECONNABORTED, |
| "Software caused connection abort" }, |
| { WSAECONNRESET, "Connection reset by peer" }, |
| { WSAENOBUFS, "No buffer space available" }, |
| { WSAEISCONN, "Socket is already connected" }, |
| { WSAENOTCONN, "Socket is not connected" }, |
| { WSAESHUTDOWN, "Can't send after socket shutdown" }, |
| { WSAETOOMANYREFS, |
| "Too many references: can't splice" }, |
| { WSAETIMEDOUT, "Operation timed out" }, |
| { WSAECONNREFUSED, "Connection refused" }, |
| { WSAELOOP, "Too many levels of symbolic links" }, |
| { WSAENAMETOOLONG, "File name too long" }, |
| { WSAEHOSTDOWN, "Host is down" }, |
| { WSAEHOSTUNREACH, "No route to host" }, |
| { WSAENOTEMPTY, "Directory not empty" }, |
| { WSAEPROCLIM, "Too many processes" }, |
| { WSAEUSERS, "Too many users" }, |
| { WSAEDQUOT, "Disc quota exceeded" }, |
| { WSAESTALE, "Stale NFS file handle" }, |
| { WSAEREMOTE, "Too many levels of remote in path" }, |
| { WSASYSNOTREADY, |
| "Network subsystem is unvailable" }, |
| { WSAVERNOTSUPPORTED, |
| "WinSock version is not supported" }, |
| { WSANOTINITIALISED, |
| "Successful WSAStartup() not yet performed" }, |
| { WSAEDISCON, "Graceful shutdown in progress" }, |
| /* Resolver errors */ |
| { WSAHOST_NOT_FOUND, "No such host is known" }, |
| { WSATRY_AGAIN, "Host not found, or server failed" }, |
| { WSANO_RECOVERY, |
| "Unexpected server error encountered" }, |
| { WSANO_DATA, "Valid name without requested data" }, |
| { WSANO_ADDRESS, "No address, look for MX record" }, |
| { 0, NULL } |
| }; |
| PyObject *v; |
| const char *msg = "winsock error"; |
| |
| for (msgp = msgs; msgp->msg; msgp++) { |
| if (err_no == msgp->no) { |
| msg = msgp->msg; |
| break; |
| } |
| } |
| |
| v = Py_BuildValue("(is)", err_no, msg); |
| if (v != NULL) { |
| PyErr_SetObject(PySocket_Error, v); |
| Py_DECREF(v); |
| } |
| return NULL; |
| } |
| else |
| #endif |
| |
| #if defined(PYOS_OS2) |
| if (sock_errno() != NO_ERROR) { |
| APIRET rc; |
| ULONG msglen; |
| char outbuf[100]; |
| int myerrorcode = sock_errno(); |
| |
| /* Retrieve Socket-Related Error Message from MPTN.MSG File */ |
| rc = DosGetMessage(NULL, 0, outbuf, sizeof(outbuf), |
| myerrorcode - SOCBASEERR + 26, "mptn.msg", &msglen); |
| if (rc == NO_ERROR) { |
| PyObject *v; |
| |
| outbuf[msglen] = '\0'; /* OS/2 Doesn't Guarantee a Terminator */ |
| if (strlen(outbuf) > 0) { /* If Non-Empty Msg, Trim CRLF */ |
| char *lastc = &outbuf[ strlen(outbuf)-1 ]; |
| while (lastc > outbuf && isspace(*lastc)) |
| *lastc-- = '\0'; /* Trim Trailing Whitespace (CRLF) */ |
| } |
| v = Py_BuildValue("(is)", myerrorcode, outbuf); |
| if (v != NULL) { |
| PyErr_SetObject(PySocket_Error, v); |
| Py_DECREF(v); |
| } |
| return NULL; |
| } |
| } |
| #endif |
| |
| return PyErr_SetFromErrno(PySocket_Error); |
| } |
| |
| |
| static PyObject * |
| PyH_Err(int h_error) |
| { |
| PyObject *v; |
| |
| #ifdef HAVE_HSTRERROR |
| v = Py_BuildValue("(is)", h_error, (char *)hstrerror(h_error)); |
| #else |
| v = Py_BuildValue("(is)", h_error, "host not found"); |
| #endif |
| if (v != NULL) { |
| PyErr_SetObject(PyH_Error, v); |
| Py_DECREF(v); |
| } |
| |
| return NULL; |
| } |
| |
| |
| static PyObject * |
| PyGAI_Err(int error) |
| { |
| PyObject *v; |
| |
| if (error == EAI_SYSTEM) |
| return PySocket_Err(); |
| |
| #ifdef HAVE_GAI_STRERROR |
| v = Py_BuildValue("(is)", error, gai_strerror(error)); |
| #else |
| v = Py_BuildValue("(is)", error, "getaddrinfo failed"); |
| #endif |
| if (v != NULL) { |
| PyErr_SetObject(PyGAI_Error, v); |
| Py_DECREF(v); |
| } |
| |
| return NULL; |
| } |
| |
| |
| /* The object holding a socket. It holds some extra information, |
| like the address family, which is used to decode socket address |
| arguments properly. */ |
| |
| typedef struct { |
| PyObject_HEAD |
| SOCKET_T sock_fd; /* Socket file descriptor */ |
| int sock_family; /* Address family, e.g., AF_INET */ |
| int sock_type; /* Socket type, e.g., SOCK_STREAM */ |
| int sock_proto; /* Protocol type, usually 0 */ |
| union sock_addr { |
| struct sockaddr_in in; |
| #ifdef AF_UNIX |
| struct sockaddr_un un; |
| #endif |
| #ifdef INET6 |
| struct sockaddr_in6 in6; |
| struct sockaddr_storage storage; |
| #endif |
| #ifdef HAVE_NETPACKET_PACKET_H |
| struct sockaddr_ll ll; |
| #endif |
| } sock_addr; |
| } PySocketSockObject; |
| |
| #ifdef USE_SSL |
| |
| #define X509_NAME_MAXLEN 256 |
| |
| typedef struct { |
| PyObject_HEAD |
| PySocketSockObject *Socket; /* Socket on which we're layered */ |
| SSL_CTX* ctx; |
| SSL* ssl; |
| X509* server_cert; |
| BIO* sbio; |
| char server[X509_NAME_MAXLEN]; |
| char issuer[X509_NAME_MAXLEN]; |
| |
| } PySSLObject; |
| |
| staticforward PyTypeObject PySSL_Type; |
| staticforward PyObject *PySSL_SSLwrite(PySSLObject *self, PyObject *args); |
| staticforward PyObject *PySSL_SSLread(PySSLObject *self, PyObject *args); |
| |
| #define PySSLObject_Check(v) ((v)->ob_type == &PySSL_Type) |
| |
| #endif /* USE_SSL */ |
| |
| /* A forward reference to the Socktype type object. |
| The Socktype variable contains pointers to various functions, |
| some of which call newsockobject(), which uses Socktype, so |
| there has to be a circular reference. */ |
| |
| staticforward PyTypeObject PySocketSock_Type; |
| |
| |
| /* Create a new socket object. |
| This just creates the object and initializes it. |
| If the creation fails, return NULL and set an exception (implicit |
| in NEWOBJ()). */ |
| |
| static PySocketSockObject * |
| PySocketSock_New(SOCKET_T fd, int family, int type, int proto) |
| { |
| #ifdef RISCOS |
| int block = 1; |
| #endif |
| PySocketSockObject *s; |
| PySocketSock_Type.ob_type = &PyType_Type; |
| s = PyObject_New(PySocketSockObject, &PySocketSock_Type); |
| if (s != NULL) { |
| s->sock_fd = fd; |
| s->sock_family = family; |
| s->sock_type = type; |
| s->sock_proto = proto; |
| #ifdef RISCOS |
| if(taskwindow) { |
| socketioctl(s->sock_fd, 0x80046679, (u_long*)&block); |
| } |
| #endif |
| } |
| return s; |
| } |
| |
| |
| /* Lock to allow python interpreter to continue, but only allow one |
| thread to be in gethostbyname */ |
| #ifdef USE_GETHOSTBYNAME_LOCK |
| PyThread_type_lock gethostbyname_lock; |
| #endif |
| |
| |
| /* Convert a string specifying a host name or one of a few symbolic |
| names to a numeric IP address. This usually calls gethostbyname() |
| to do the work; the names "" and "<broadcast>" are special. |
| Return the length (IPv4 should be 4 bytes), or negative if |
| an error occurred; then an exception is raised. */ |
| |
| static int |
| setipaddr(char* name, struct sockaddr * addr_ret, int af) |
| { |
| struct addrinfo hints, *res; |
| int error; |
| |
| memset((void *) addr_ret, '\0', sizeof(*addr_ret)); |
| if (name[0] == '\0') { |
| int siz; |
| memset(&hints, 0, sizeof(hints)); |
| hints.ai_family = af; |
| hints.ai_socktype = SOCK_DGRAM; /*dummy*/ |
| hints.ai_flags = AI_PASSIVE; |
| error = getaddrinfo(NULL, "0", &hints, &res); |
| if (error) { |
| PyGAI_Err(error); |
| return -1; |
| } |
| switch (res->ai_family) { |
| case AF_INET: |
| siz = 4; |
| break; |
| #ifdef INET6 |
| case AF_INET6: |
| siz = 16; |
| break; |
| #endif |
| default: |
| freeaddrinfo(res); |
| PyErr_SetString(PySocket_Error, |
| "unsupported address family"); |
| return -1; |
| } |
| if (res->ai_next) { |
| PyErr_SetString(PySocket_Error, |
| "wildcard resolved to multiple address"); |
| return -1; |
| } |
| memcpy(addr_ret, res->ai_addr, res->ai_addrlen); |
| freeaddrinfo(res); |
| return siz; |
| } |
| if (name[0] == '<' && strcmp(name, "<broadcast>") == 0) { |
| struct sockaddr_in *sin; |
| if (af != PF_INET && af != PF_UNSPEC) { |
| PyErr_SetString(PySocket_Error, |
| "address family mismatched"); |
| return -1; |
| } |
| sin = (struct sockaddr_in *)addr_ret; |
| memset((void *) sin, '\0', sizeof(*sin)); |
| sin->sin_family = AF_INET; |
| #ifdef HAVE_SOCKADDR_SA_LEN |
| sin->sin_len = sizeof(*sin); |
| #endif |
| sin->sin_addr.s_addr = INADDR_BROADCAST; |
| return sizeof(sin->sin_addr); |
| } |
| memset(&hints, 0, sizeof(hints)); |
| hints.ai_family = af; |
| error = getaddrinfo(name, NULL, &hints, &res); |
| if (error) { |
| PyGAI_Err(error); |
| return -1; |
| } |
| memcpy((char *) addr_ret, res->ai_addr, res->ai_addrlen); |
| freeaddrinfo(res); |
| switch (addr_ret->sa_family) { |
| case AF_INET: |
| return 4; |
| #ifdef INET6 |
| case AF_INET6: |
| return 16; |
| #endif |
| default: |
| PyErr_SetString(PySocket_Error, "unknown address family"); |
| return -1; |
| } |
| } |
| |
| |
| /* Create a string object representing an IP address. |
| This is always a string of the form 'dd.dd.dd.dd' (with variable |
| size numbers). */ |
| |
| static PyObject * |
| makeipaddr(struct sockaddr *addr, int addrlen) |
| { |
| char buf[NI_MAXHOST]; |
| int error; |
| |
| error = getnameinfo(addr, addrlen, buf, sizeof(buf), NULL, 0, |
| NI_NUMERICHOST); |
| if (error) { |
| PyGAI_Err(error); |
| return NULL; |
| } |
| return PyString_FromString(buf); |
| } |
| |
| |
| /* Create an object representing the given socket address, |
| suitable for passing it back to bind(), connect() etc. |
| The family field of the sockaddr structure is inspected |
| to determine what kind of address it really is. */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| makesockaddr(int sockfd, struct sockaddr *addr, int addrlen) |
| { |
| if (addrlen == 0) { |
| /* No address -- may be recvfrom() from known socket */ |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| #ifdef __BEOS__ |
| /* XXX: BeOS version of accept() doesn't set family correctly */ |
| addr->sa_family = AF_INET; |
| #endif |
| |
| switch (addr->sa_family) { |
| |
| case AF_INET: |
| { |
| struct sockaddr_in *a; |
| PyObject *addrobj = makeipaddr(addr, sizeof(*a)); |
| PyObject *ret = NULL; |
| if (addrobj) { |
| a = (struct sockaddr_in *)addr; |
| ret = Py_BuildValue("Oi", addrobj, ntohs(a->sin_port)); |
| Py_DECREF(addrobj); |
| } |
| return ret; |
| } |
| |
| #ifdef AF_UNIX |
| case AF_UNIX: |
| { |
| struct sockaddr_un *a = (struct sockaddr_un *) addr; |
| return PyString_FromString(a->sun_path); |
| } |
| #endif /* AF_UNIX */ |
| |
| #ifdef INET6 |
| case AF_INET6: |
| { |
| struct sockaddr_in6 *a; |
| PyObject *addrobj = makeipaddr(addr, sizeof(*a)); |
| PyObject *ret = NULL; |
| if (addrobj) { |
| a = (struct sockaddr_in6 *)addr; |
| ret = Py_BuildValue("Oiii", addrobj, ntohs(a->sin6_port), |
| a->sin6_flowinfo, a->sin6_scope_id); |
| Py_DECREF(addrobj); |
| } |
| return ret; |
| } |
| #endif |
| |
| #ifdef HAVE_NETPACKET_PACKET_H |
| case AF_PACKET: |
| { |
| struct sockaddr_ll *a = (struct sockaddr_ll *)addr; |
| char *ifname = ""; |
| struct ifreq ifr; |
| /* need to look up interface name give index */ |
| if (a->sll_ifindex) { |
| ifr.ifr_ifindex = a->sll_ifindex; |
| if (ioctl(sockfd, SIOCGIFNAME, &ifr) == 0) |
| ifname = ifr.ifr_name; |
| } |
| return Py_BuildValue("shbhs#", ifname, ntohs(a->sll_protocol), |
| a->sll_pkttype, a->sll_hatype, |
| a->sll_addr, a->sll_halen); |
| } |
| #endif |
| |
| /* More cases here... */ |
| |
| default: |
| /* If we don't know the address family, don't raise an |
| exception -- return it as a tuple. */ |
| return Py_BuildValue("is#", |
| addr->sa_family, |
| addr->sa_data, |
| sizeof(addr->sa_data)); |
| |
| } |
| } |
| |
| |
| /* Parse a socket address argument according to the socket object's |
| address family. Return 1 if the address was in the proper format, |
| 0 of not. The address is returned through addr_ret, its length |
| through len_ret. */ |
| |
| static int |
| getsockaddrarg(PySocketSockObject *s, PyObject *args, |
| struct sockaddr **addr_ret, int *len_ret) |
| { |
| switch (s->sock_family) { |
| |
| #ifdef AF_UNIX |
| case AF_UNIX: |
| { |
| struct sockaddr_un* addr; |
| char *path; |
| int len; |
| addr = (struct sockaddr_un* )&(s->sock_addr).un; |
| if (!PyArg_Parse(args, "t#", &path, &len)) |
| return 0; |
| if (len > sizeof addr->sun_path) { |
| PyErr_SetString(PySocket_Error, |
| "AF_UNIX path too long"); |
| return 0; |
| } |
| addr->sun_family = s->sock_family; |
| memcpy(addr->sun_path, path, len); |
| addr->sun_path[len] = 0; |
| *addr_ret = (struct sockaddr *) addr; |
| *len_ret = len + sizeof(*addr) - sizeof(addr->sun_path); |
| return 1; |
| } |
| #endif /* AF_UNIX */ |
| |
| case AF_INET: |
| { |
| struct sockaddr_in* addr; |
| char *host; |
| int port; |
| addr=(struct sockaddr_in*)&(s->sock_addr).in; |
| if (!PyTuple_Check(args)) { |
| PyErr_Format(PyExc_TypeError, |
| "getsockaddrarg: AF_INET address must be tuple, not %.500s", |
| args->ob_type->tp_name); |
| return 0; |
| } |
| if (!PyArg_ParseTuple(args, "si:getsockaddrarg", &host, &port)) |
| return 0; |
| if (setipaddr(host, (struct sockaddr *)addr, AF_INET) < 0) |
| return 0; |
| addr->sin_family = AF_INET; |
| addr->sin_port = htons((short)port); |
| *addr_ret = (struct sockaddr *) addr; |
| *len_ret = sizeof *addr; |
| return 1; |
| } |
| |
| #ifdef INET6 |
| case AF_INET6: |
| { |
| struct sockaddr_in6* addr; |
| char *host; |
| int port, flowinfo, scope_id; |
| addr = (struct sockaddr_in6*)&(s->sock_addr).in6; |
| flowinfo = scope_id = 0; |
| if (!PyArg_ParseTuple(args, "si|ii", &host, &port, &flowinfo, |
| &scope_id)) { |
| return 0; |
| } |
| if (setipaddr(host, (struct sockaddr *)addr, AF_INET6) < 0) |
| return 0; |
| addr->sin6_family = s->sock_family; |
| addr->sin6_port = htons((short)port); |
| addr->sin6_flowinfo = flowinfo; |
| addr->sin6_scope_id = scope_id; |
| *addr_ret = (struct sockaddr *) addr; |
| *len_ret = sizeof *addr; |
| return 1; |
| } |
| #endif |
| |
| #ifdef HAVE_NETPACKET_PACKET_H |
| case AF_PACKET: |
| { |
| struct sockaddr_ll* addr; |
| struct ifreq ifr; |
| char *interfaceName; |
| int protoNumber; |
| int hatype = 0; |
| int pkttype = 0; |
| char *haddr; |
| |
| if (!PyArg_ParseTuple(args, "si|iis", &interfaceName, |
| &protoNumber, &pkttype, &hatype, &haddr)) |
| return 0; |
| strncpy(ifr.ifr_name, interfaceName, sizeof(ifr.ifr_name)); |
| ifr.ifr_name[(sizeof(ifr.ifr_name))-1] = '\0'; |
| if (ioctl(s->sock_fd, SIOCGIFINDEX, &ifr) < 0) { |
| PySocket_Err(); |
| return 0; |
| } |
| addr = &(s->sock_addr.ll); |
| addr->sll_family = AF_PACKET; |
| addr->sll_protocol = htons((short)protoNumber); |
| addr->sll_ifindex = ifr.ifr_ifindex; |
| addr->sll_pkttype = pkttype; |
| addr->sll_hatype = hatype; |
| *addr_ret = (struct sockaddr *) addr; |
| *len_ret = sizeof *addr; |
| return 1; |
| } |
| #endif |
| |
| /* More cases here... */ |
| |
| default: |
| PyErr_SetString(PySocket_Error, "getsockaddrarg: bad family"); |
| return 0; |
| |
| } |
| } |
| |
| |
| /* Get the address length according to the socket object's address family. |
| Return 1 if the family is known, 0 otherwise. The length is returned |
| through len_ret. */ |
| |
| static int |
| getsockaddrlen(PySocketSockObject *s, socklen_t *len_ret) |
| { |
| switch (s->sock_family) { |
| |
| #ifdef AF_UNIX |
| case AF_UNIX: |
| { |
| *len_ret = sizeof (struct sockaddr_un); |
| return 1; |
| } |
| #endif /* AF_UNIX */ |
| |
| case AF_INET: |
| { |
| *len_ret = sizeof (struct sockaddr_in); |
| return 1; |
| } |
| |
| #ifdef INET6 |
| case AF_INET6: |
| { |
| *len_ret = sizeof (struct sockaddr_in6); |
| return 1; |
| } |
| #endif |
| |
| #ifdef HAVE_NETPACKET_PACKET_H |
| case AF_PACKET: |
| { |
| *len_ret = sizeof (struct sockaddr_ll); |
| return 1; |
| } |
| #endif |
| |
| /* More cases here... */ |
| |
| default: |
| PyErr_SetString(PySocket_Error, "getsockaddrlen: bad family"); |
| return 0; |
| |
| } |
| } |
| |
| |
| /* s.accept() method */ |
| |
| static PyObject * |
| PySocketSock_accept(PySocketSockObject *s) |
| { |
| char addrbuf[256]; |
| SOCKET_T newfd; |
| socklen_t addrlen; |
| PyObject *sock = NULL; |
| PyObject *addr = NULL; |
| PyObject *res = NULL; |
| |
| if (!getsockaddrlen(s, &addrlen)) |
| return NULL; |
| memset(addrbuf, 0, addrlen); |
| Py_BEGIN_ALLOW_THREADS |
| newfd = accept(s->sock_fd, (struct sockaddr *) addrbuf, &addrlen); |
| Py_END_ALLOW_THREADS |
| #ifdef MS_WINDOWS |
| if (newfd == INVALID_SOCKET) |
| #else |
| if (newfd < 0) |
| #endif |
| return PySocket_Err(); |
| |
| /* Create the new object with unspecified family, |
| to avoid calls to bind() etc. on it. */ |
| sock = (PyObject *) PySocketSock_New(newfd, |
| s->sock_family, |
| s->sock_type, |
| s->sock_proto); |
| if (sock == NULL) { |
| SOCKETCLOSE(newfd); |
| goto finally; |
| } |
| addr = makesockaddr(s->sock_fd, (struct sockaddr *)addrbuf, |
| addrlen); |
| if (addr == NULL) |
| goto finally; |
| |
| res = Py_BuildValue("OO", sock, addr); |
| |
| finally: |
| Py_XDECREF(sock); |
| Py_XDECREF(addr); |
| return res; |
| } |
| |
| static char accept_doc[] = |
| "accept() -> (socket object, address info)\n\ |
| \n\ |
| Wait for an incoming connection. Return a new socket representing the\n\ |
| connection, and the address of the client. For IP sockets, the address\n\ |
| info is a pair (hostaddr, port)."; |
| |
| |
| /* s.setblocking(1 | 0) method */ |
| |
| static PyObject * |
| PySocketSock_setblocking(PySocketSockObject *s, PyObject *arg) |
| { |
| int block; |
| #ifndef RISCOS |
| #ifndef MS_WINDOWS |
| int delay_flag; |
| #endif |
| #endif |
| block = PyInt_AsLong(arg); |
| if (block == -1 && PyErr_Occurred()) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| #ifdef __BEOS__ |
| block = !block; |
| setsockopt( s->sock_fd, SOL_SOCKET, SO_NONBLOCK, |
| (void *)(&block), sizeof( int ) ); |
| #else |
| #ifndef RISCOS |
| #ifndef MS_WINDOWS |
| #ifdef PYOS_OS2 |
| block = !block; |
| ioctl(s->sock_fd, FIONBIO, (caddr_t)&block, sizeof(block)); |
| #else /* !PYOS_OS2 */ |
| delay_flag = fcntl (s->sock_fd, F_GETFL, 0); |
| if (block) |
| delay_flag &= (~O_NDELAY); |
| else |
| delay_flag |= O_NDELAY; |
| fcntl (s->sock_fd, F_SETFL, delay_flag); |
| #endif /* !PYOS_OS2 */ |
| #else /* MS_WINDOWS */ |
| block = !block; |
| ioctlsocket(s->sock_fd, FIONBIO, (u_long*)&block); |
| #endif /* MS_WINDOWS */ |
| #endif /* __BEOS__ */ |
| #endif /* RISCOS */ |
| Py_END_ALLOW_THREADS |
| |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| static char setblocking_doc[] = |
| "setblocking(flag)\n\ |
| \n\ |
| Set the socket to blocking (flag is true) or non-blocking (false).\n\ |
| This uses the FIONBIO ioctl with the O_NDELAY flag."; |
| |
| |
| #ifdef RISCOS |
| /* s.sleeptaskw(1 | 0) method */ |
| |
| static PyObject * |
| PySocketSock_sleeptaskw(PySocketSockObject *s,PyObject *args) |
| { |
| int block; |
| int delay_flag; |
| if (!PyArg_GetInt(args, &block)) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| socketioctl(s->sock_fd, 0x80046679, (u_long*)&block); |
| Py_END_ALLOW_THREADS |
| |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| static char sleeptaskw_doc[] = |
| "sleeptaskw(flag)\n\ |
| \n\ |
| Allow sleeps in taskwindows."; |
| #endif |
| |
| |
| /* s.setsockopt() method. |
| With an integer third argument, sets an integer option. |
| With a string third argument, sets an option from a buffer; |
| use optional built-in module 'struct' to encode the string. */ |
| |
| static PyObject * |
| PySocketSock_setsockopt(PySocketSockObject *s, PyObject *args) |
| { |
| int level; |
| int optname; |
| int res; |
| char *buf; |
| int buflen; |
| int flag; |
| |
| if (PyArg_ParseTuple(args, "iii:setsockopt", |
| &level, &optname, &flag)) { |
| buf = (char *) &flag; |
| buflen = sizeof flag; |
| } |
| else { |
| PyErr_Clear(); |
| if (!PyArg_ParseTuple(args, "iis#:setsockopt", |
| &level, &optname, &buf, &buflen)) |
| return NULL; |
| } |
| res = setsockopt(s->sock_fd, level, optname, (void *)buf, buflen); |
| if (res < 0) |
| return PySocket_Err(); |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| static char setsockopt_doc[] = |
| "setsockopt(level, option, value)\n\ |
| \n\ |
| Set a socket option. See the Unix manual for level and option.\n\ |
| The value argument can either be an integer or a string."; |
| |
| |
| /* s.getsockopt() method. |
| With two arguments, retrieves an integer option. |
| With a third integer argument, retrieves a string buffer of that size; |
| use optional built-in module 'struct' to decode the string. */ |
| |
| static PyObject * |
| PySocketSock_getsockopt(PySocketSockObject *s, PyObject *args) |
| { |
| int level; |
| int optname; |
| int res; |
| PyObject *buf; |
| socklen_t buflen = 0; |
| |
| #ifdef __BEOS__ |
| /* We have incomplete socket support. */ |
| PyErr_SetString(PySocket_Error, "getsockopt not supported"); |
| return NULL; |
| #else |
| |
| if (!PyArg_ParseTuple(args, "ii|i:getsockopt", |
| &level, &optname, &buflen)) |
| return NULL; |
| |
| if (buflen == 0) { |
| int flag = 0; |
| socklen_t flagsize = sizeof flag; |
| res = getsockopt(s->sock_fd, level, optname, |
| (void *)&flag, &flagsize); |
| if (res < 0) |
| return PySocket_Err(); |
| return PyInt_FromLong(flag); |
| } |
| if (buflen <= 0 || buflen > 1024) { |
| PyErr_SetString(PySocket_Error, |
| "getsockopt buflen out of range"); |
| return NULL; |
| } |
| buf = PyString_FromStringAndSize((char *)NULL, buflen); |
| if (buf == NULL) |
| return NULL; |
| res = getsockopt(s->sock_fd, level, optname, |
| (void *)PyString_AS_STRING(buf), &buflen); |
| if (res < 0) { |
| Py_DECREF(buf); |
| return PySocket_Err(); |
| } |
| _PyString_Resize(&buf, buflen); |
| return buf; |
| #endif /* __BEOS__ */ |
| } |
| |
| static char getsockopt_doc[] = |
| "getsockopt(level, option[, buffersize]) -> value\n\ |
| \n\ |
| Get a socket option. See the Unix manual for level and option.\n\ |
| If a nonzero buffersize argument is given, the return value is a\n\ |
| string of that length; otherwise it is an integer."; |
| |
| |
| /* s.bind(sockaddr) method */ |
| |
| static PyObject * |
| PySocketSock_bind(PySocketSockObject *s, PyObject *addro) |
| { |
| struct sockaddr *addr; |
| int addrlen; |
| int res; |
| |
| if (!getsockaddrarg(s, addro, &addr, &addrlen)) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| res = bind(s->sock_fd, addr, addrlen); |
| Py_END_ALLOW_THREADS |
| if (res < 0) |
| return PySocket_Err(); |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| static char bind_doc[] = |
| "bind(address)\n\ |
| \n\ |
| Bind the socket to a local address. For IP sockets, the address is a\n\ |
| pair (host, port); the host must refer to the local host. For raw packet\n\ |
| sockets the address is a tuple (ifname, proto [,pkttype [,hatype]])"; |
| |
| |
| /* s.close() method. |
| Set the file descriptor to -1 so operations tried subsequently |
| will surely fail. */ |
| |
| static PyObject * |
| PySocketSock_close(PySocketSockObject *s) |
| { |
| SOCKET_T fd; |
| |
| if ((fd = s->sock_fd) != -1) { |
| s->sock_fd = -1; |
| Py_BEGIN_ALLOW_THREADS |
| (void) SOCKETCLOSE(fd); |
| Py_END_ALLOW_THREADS |
| } |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| static char close_doc[] = |
| "close()\n\ |
| \n\ |
| Close the socket. It cannot be used after this call."; |
| |
| |
| /* s.connect(sockaddr) method */ |
| |
| static PyObject * |
| PySocketSock_connect(PySocketSockObject *s, PyObject *addro) |
| { |
| struct sockaddr *addr; |
| int addrlen; |
| int res; |
| |
| if (!getsockaddrarg(s, addro, &addr, &addrlen)) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| res = connect(s->sock_fd, addr, addrlen); |
| Py_END_ALLOW_THREADS |
| if (res < 0) |
| return PySocket_Err(); |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| static char connect_doc[] = |
| "connect(address)\n\ |
| \n\ |
| Connect the socket to a remote address. For IP sockets, the address\n\ |
| is a pair (host, port)."; |
| |
| |
| /* s.connect_ex(sockaddr) method */ |
| |
| static PyObject * |
| PySocketSock_connect_ex(PySocketSockObject *s, PyObject *addro) |
| { |
| struct sockaddr *addr; |
| int addrlen; |
| int res; |
| |
| if (!getsockaddrarg(s, addro, &addr, &addrlen)) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| res = connect(s->sock_fd, addr, addrlen); |
| Py_END_ALLOW_THREADS |
| if (res != 0) |
| res = errno; |
| return PyInt_FromLong((long) res); |
| } |
| |
| static char connect_ex_doc[] = |
| "connect_ex(address)\n\ |
| \n\ |
| This is like connect(address), but returns an error code (the errno value)\n\ |
| instead of raising an exception when an error occurs."; |
| |
| |
| /* s.fileno() method */ |
| |
| static PyObject * |
| PySocketSock_fileno(PySocketSockObject *s) |
| { |
| #if SIZEOF_SOCKET_T <= SIZEOF_LONG |
| return PyInt_FromLong((long) s->sock_fd); |
| #else |
| return PyLong_FromLongLong((LONG_LONG)s->sock_fd); |
| #endif |
| } |
| |
| static char fileno_doc[] = |
| "fileno() -> integer\n\ |
| \n\ |
| Return the integer file descriptor of the socket."; |
| |
| |
| #ifndef NO_DUP |
| /* s.dup() method */ |
| |
| static PyObject * |
| PySocketSock_dup(PySocketSockObject *s) |
| { |
| SOCKET_T newfd; |
| PyObject *sock; |
| |
| newfd = dup(s->sock_fd); |
| if (newfd < 0) |
| return PySocket_Err(); |
| sock = (PyObject *) PySocketSock_New(newfd, |
| s->sock_family, |
| s->sock_type, |
| s->sock_proto); |
| if (sock == NULL) |
| SOCKETCLOSE(newfd); |
| return sock; |
| } |
| |
| static char dup_doc[] = |
| "dup() -> socket object\n\ |
| \n\ |
| Return a new socket object connected to the same system resource."; |
| |
| #endif |
| |
| |
| /* s.getsockname() method */ |
| |
| static PyObject * |
| PySocketSock_getsockname(PySocketSockObject *s) |
| { |
| char addrbuf[256]; |
| int res; |
| socklen_t addrlen; |
| |
| if (!getsockaddrlen(s, &addrlen)) |
| return NULL; |
| memset(addrbuf, 0, addrlen); |
| Py_BEGIN_ALLOW_THREADS |
| res = getsockname(s->sock_fd, (struct sockaddr *) addrbuf, &addrlen); |
| Py_END_ALLOW_THREADS |
| if (res < 0) |
| return PySocket_Err(); |
| return makesockaddr(s->sock_fd, (struct sockaddr *) addrbuf, addrlen); |
| } |
| |
| static char getsockname_doc[] = |
| "getsockname() -> address info\n\ |
| \n\ |
| Return the address of the local endpoint. For IP sockets, the address\n\ |
| info is a pair (hostaddr, port)."; |
| |
| |
| #ifdef HAVE_GETPEERNAME /* Cray APP doesn't have this :-( */ |
| /* s.getpeername() method */ |
| |
| static PyObject * |
| PySocketSock_getpeername(PySocketSockObject *s) |
| { |
| char addrbuf[256]; |
| int res; |
| socklen_t addrlen; |
| |
| if (!getsockaddrlen(s, &addrlen)) |
| return NULL; |
| memset(addrbuf, 0, addrlen); |
| Py_BEGIN_ALLOW_THREADS |
| res = getpeername(s->sock_fd, (struct sockaddr *) addrbuf, &addrlen); |
| Py_END_ALLOW_THREADS |
| if (res < 0) |
| return PySocket_Err(); |
| return makesockaddr(s->sock_fd, (struct sockaddr *) addrbuf, addrlen); |
| } |
| |
| static char getpeername_doc[] = |
| "getpeername() -> address info\n\ |
| \n\ |
| Return the address of the remote endpoint. For IP sockets, the address\n\ |
| info is a pair (hostaddr, port)."; |
| |
| #endif /* HAVE_GETPEERNAME */ |
| |
| |
| /* s.listen(n) method */ |
| |
| static PyObject * |
| PySocketSock_listen(PySocketSockObject *s, PyObject *arg) |
| { |
| int backlog; |
| int res; |
| |
| backlog = PyInt_AsLong(arg); |
| if (backlog == -1 && PyErr_Occurred()) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| if (backlog < 1) |
| backlog = 1; |
| res = listen(s->sock_fd, backlog); |
| Py_END_ALLOW_THREADS |
| if (res < 0) |
| return PySocket_Err(); |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| static char listen_doc[] = |
| "listen(backlog)\n\ |
| \n\ |
| Enable a server to accept connections. The backlog argument must be at\n\ |
| least 1; it specifies the number of unaccepted connection that the system\n\ |
| will allow before refusing new connections."; |
| |
| |
| #ifndef NO_DUP |
| /* s.makefile(mode) method. |
| Create a new open file object referring to a dupped version of |
| the socket's file descriptor. (The dup() call is necessary so |
| that the open file and socket objects may be closed independent |
| of each other.) |
| The mode argument specifies 'r' or 'w' passed to fdopen(). */ |
| |
| static PyObject * |
| PySocketSock_makefile(PySocketSockObject *s, PyObject *args) |
| { |
| extern int fclose(FILE *); |
| char *mode = "r"; |
| int bufsize = -1; |
| #ifdef MS_WIN32 |
| Py_intptr_t fd; |
| #else |
| int fd; |
| #endif |
| FILE *fp; |
| PyObject *f; |
| |
| if (!PyArg_ParseTuple(args, "|si:makefile", &mode, &bufsize)) |
| return NULL; |
| #ifdef MS_WIN32 |
| if (((fd = _open_osfhandle(s->sock_fd, _O_BINARY)) < 0) || |
| ((fd = dup(fd)) < 0) || ((fp = fdopen(fd, mode)) == NULL)) |
| #else |
| if ((fd = dup(s->sock_fd)) < 0 || (fp = fdopen(fd, mode)) == NULL) |
| #endif |
| { |
| if (fd >= 0) |
| SOCKETCLOSE(fd); |
| return PySocket_Err(); |
| } |
| f = PyFile_FromFile(fp, "<socket>", mode, fclose); |
| if (f != NULL) |
| PyFile_SetBufSize(f, bufsize); |
| return f; |
| } |
| |
| static char makefile_doc[] = |
| "makefile([mode[, buffersize]]) -> file object\n\ |
| \n\ |
| Return a regular file object corresponding to the socket.\n\ |
| The mode and buffersize arguments are as for the built-in open() function."; |
| |
| #endif /* NO_DUP */ |
| |
| |
| /* s.recv(nbytes [,flags]) method */ |
| |
| static PyObject * |
| PySocketSock_recv(PySocketSockObject *s, PyObject *args) |
| { |
| int len, n, flags = 0; |
| PyObject *buf; |
| if (!PyArg_ParseTuple(args, "i|i:recv", &len, &flags)) |
| return NULL; |
| buf = PyString_FromStringAndSize((char *) 0, len); |
| if (buf == NULL) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| n = recv(s->sock_fd, PyString_AS_STRING(buf), len, flags); |
| Py_END_ALLOW_THREADS |
| if (n < 0) { |
| Py_DECREF(buf); |
| return PySocket_Err(); |
| } |
| if (n != len && _PyString_Resize(&buf, n) < 0) |
| return NULL; |
| return buf; |
| } |
| |
| static char recv_doc[] = |
| "recv(buffersize[, flags]) -> data\n\ |
| \n\ |
| Receive up to buffersize bytes from the socket. For the optional flags\n\ |
| argument, see the Unix manual. When no data is available, block until\n\ |
| at least one byte is available or until the remote end is closed. When\n\ |
| the remote end is closed and all data is read, return the empty string."; |
| |
| |
| /* s.recvfrom(nbytes [,flags]) method */ |
| |
| static PyObject * |
| PySocketSock_recvfrom(PySocketSockObject *s, PyObject *args) |
| { |
| char addrbuf[256]; |
| PyObject *buf = NULL; |
| PyObject *addr = NULL; |
| PyObject *ret = NULL; |
| |
| int len, n, flags = 0; |
| socklen_t addrlen; |
| if (!PyArg_ParseTuple(args, "i|i:recvfrom", &len, &flags)) |
| return NULL; |
| if (!getsockaddrlen(s, &addrlen)) |
| return NULL; |
| buf = PyString_FromStringAndSize((char *) 0, len); |
| if (buf == NULL) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| memset(addrbuf, 0, addrlen); |
| n = recvfrom(s->sock_fd, PyString_AS_STRING(buf), len, flags, |
| #ifndef MS_WINDOWS |
| #if defined(PYOS_OS2) |
| (struct sockaddr *)addrbuf, &addrlen |
| #else |
| (void *)addrbuf, &addrlen |
| #endif |
| #else |
| (struct sockaddr *)addrbuf, &addrlen |
| #endif |
| ); |
| Py_END_ALLOW_THREADS |
| if (n < 0) { |
| Py_DECREF(buf); |
| return PySocket_Err(); |
| } |
| if (n != len && _PyString_Resize(&buf, n) < 0) |
| return NULL; |
| |
| if (!(addr = makesockaddr(s->sock_fd, (struct sockaddr *)addrbuf, addrlen))) |
| goto finally; |
| |
| ret = Py_BuildValue("OO", buf, addr); |
| finally: |
| Py_XDECREF(addr); |
| Py_XDECREF(buf); |
| return ret; |
| } |
| |
| static char recvfrom_doc[] = |
| "recvfrom(buffersize[, flags]) -> (data, address info)\n\ |
| \n\ |
| Like recv(buffersize, flags) but also return the sender's address info."; |
| |
| |
| /* s.send(data [,flags]) method */ |
| |
| static PyObject * |
| PySocketSock_send(PySocketSockObject *s, PyObject *args) |
| { |
| char *buf; |
| int len, n, flags = 0; |
| if (!PyArg_ParseTuple(args, "s#|i:send", &buf, &len, &flags)) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| n = send(s->sock_fd, buf, len, flags); |
| Py_END_ALLOW_THREADS |
| if (n < 0) |
| return PySocket_Err(); |
| return PyInt_FromLong((long)n); |
| } |
| |
| static char send_doc[] = |
| "send(data[, flags])\n\ |
| \n\ |
| Send a data string to the socket. For the optional flags\n\ |
| argument, see the Unix manual."; |
| |
| |
| /* s.sendto(data, [flags,] sockaddr) method */ |
| |
| static PyObject * |
| PySocketSock_sendto(PySocketSockObject *s, PyObject *args) |
| { |
| PyObject *addro; |
| char *buf; |
| struct sockaddr *addr; |
| int addrlen, len, n, flags; |
| flags = 0; |
| if (!PyArg_ParseTuple(args, "s#O:sendto", &buf, &len, &addro)) { |
| PyErr_Clear(); |
| if (!PyArg_ParseTuple(args, "s#iO:sendto", |
| &buf, &len, &flags, &addro)) |
| return NULL; |
| } |
| if (!getsockaddrarg(s, addro, &addr, &addrlen)) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| n = sendto(s->sock_fd, buf, len, flags, addr, addrlen); |
| Py_END_ALLOW_THREADS |
| if (n < 0) |
| return PySocket_Err(); |
| return PyInt_FromLong((long)n); |
| } |
| |
| static char sendto_doc[] = |
| "sendto(data[, flags], address)\n\ |
| \n\ |
| Like send(data, flags) but allows specifying the destination address.\n\ |
| For IP sockets, the address is a pair (hostaddr, port)."; |
| |
| |
| /* s.shutdown(how) method */ |
| |
| static PyObject * |
| PySocketSock_shutdown(PySocketSockObject *s, PyObject *arg) |
| { |
| int how; |
| int res; |
| |
| how = PyInt_AsLong(arg); |
| if (how == -1 && PyErr_Occurred()) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| res = shutdown(s->sock_fd, how); |
| Py_END_ALLOW_THREADS |
| if (res < 0) |
| return PySocket_Err(); |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| static char shutdown_doc[] = |
| "shutdown(flag)\n\ |
| \n\ |
| Shut down the reading side of the socket (flag == 0), the writing side\n\ |
| of the socket (flag == 1), or both ends (flag == 2)."; |
| |
| |
| /* List of methods for socket objects */ |
| |
| static PyMethodDef PySocketSock_methods[] = { |
| {"accept", (PyCFunction)PySocketSock_accept, METH_NOARGS, |
| accept_doc}, |
| {"bind", (PyCFunction)PySocketSock_bind, METH_O, |
| bind_doc}, |
| {"close", (PyCFunction)PySocketSock_close, METH_NOARGS, |
| close_doc}, |
| {"connect", (PyCFunction)PySocketSock_connect, METH_O, |
| connect_doc}, |
| {"connect_ex", (PyCFunction)PySocketSock_connect_ex, METH_O, |
| connect_ex_doc}, |
| #ifndef NO_DUP |
| {"dup", (PyCFunction)PySocketSock_dup, METH_NOARGS, |
| dup_doc}, |
| #endif |
| {"fileno", (PyCFunction)PySocketSock_fileno, METH_NOARGS, |
| fileno_doc}, |
| #ifdef HAVE_GETPEERNAME |
| {"getpeername", (PyCFunction)PySocketSock_getpeername, |
| METH_NOARGS, getpeername_doc}, |
| #endif |
| {"getsockname", (PyCFunction)PySocketSock_getsockname, |
| METH_NOARGS, getsockname_doc}, |
| {"getsockopt", (PyCFunction)PySocketSock_getsockopt, METH_VARARGS, |
| getsockopt_doc}, |
| {"listen", (PyCFunction)PySocketSock_listen, METH_O, |
| listen_doc}, |
| #ifndef NO_DUP |
| {"makefile", (PyCFunction)PySocketSock_makefile, METH_VARARGS, |
| makefile_doc}, |
| #endif |
| {"recv", (PyCFunction)PySocketSock_recv, METH_VARARGS, |
| recv_doc}, |
| {"recvfrom", (PyCFunction)PySocketSock_recvfrom, METH_VARARGS, |
| recvfrom_doc}, |
| {"send", (PyCFunction)PySocketSock_send, METH_VARARGS, |
| send_doc}, |
| {"sendto", (PyCFunction)PySocketSock_sendto, METH_VARARGS, |
| sendto_doc}, |
| {"setblocking", (PyCFunction)PySocketSock_setblocking, METH_O, |
| setblocking_doc}, |
| {"setsockopt", (PyCFunction)PySocketSock_setsockopt, METH_VARARGS, |
| setsockopt_doc}, |
| {"shutdown", (PyCFunction)PySocketSock_shutdown, METH_O, |
| shutdown_doc}, |
| #ifdef RISCOS |
| {"sleeptaskw", (PyCFunction)PySocketSock_sleeptaskw, METH_VARARGS, |
| sleeptaskw_doc}, |
| #endif |
| {NULL, NULL} /* sentinel */ |
| }; |
| |
| |
| /* Deallocate a socket object in response to the last Py_DECREF(). |
| First close the file description. */ |
| |
| static void |
| PySocketSock_dealloc(PySocketSockObject *s) |
| { |
| if (s->sock_fd != -1) |
| (void) SOCKETCLOSE(s->sock_fd); |
| PyObject_Del(s); |
| } |
| |
| |
| /* Return a socket object's named attribute. */ |
| |
| static PyObject * |
| PySocketSock_getattr(PySocketSockObject *s, char *name) |
| { |
| return Py_FindMethod(PySocketSock_methods, (PyObject *) s, name); |
| } |
| |
| |
| static PyObject * |
| PySocketSock_repr(PySocketSockObject *s) |
| { |
| char buf[512]; |
| #if SIZEOF_SOCKET_T > SIZEOF_LONG |
| if (s->sock_fd > LONG_MAX) { |
| /* this can occur on Win64, and actually there is a special |
| ugly printf formatter for decimal pointer length integer |
| printing, only bother if necessary*/ |
| PyErr_SetString(PyExc_OverflowError, |
| "no printf formatter to display the socket descriptor in decimal"); |
| return NULL; |
| } |
| #endif |
| sprintf(buf, |
| "<socket object, fd=%ld, family=%d, type=%d, protocol=%d>", |
| (long)s->sock_fd, s->sock_family, s->sock_type, s->sock_proto); |
| return PyString_FromString(buf); |
| } |
| |
| |
| /* Type object for socket objects. */ |
| |
| static PyTypeObject PySocketSock_Type = { |
| PyObject_HEAD_INIT(0) /* Must fill in type value later */ |
| 0, |
| "socket", |
| sizeof(PySocketSockObject), |
| 0, |
| (destructor)PySocketSock_dealloc, /*tp_dealloc*/ |
| 0, /*tp_print*/ |
| (getattrfunc)PySocketSock_getattr, /*tp_getattr*/ |
| 0, /*tp_setattr*/ |
| 0, /*tp_compare*/ |
| (reprfunc)PySocketSock_repr, /*tp_repr*/ |
| 0, /*tp_as_number*/ |
| 0, /*tp_as_sequence*/ |
| 0, /*tp_as_mapping*/ |
| }; |
| |
| |
| /* Python interface to gethostname(). */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_gethostname(PyObject *self, PyObject *args) |
| { |
| char buf[1024]; |
| int res; |
| if (!PyArg_ParseTuple(args, ":gethostname")) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| res = gethostname(buf, (int) sizeof buf - 1); |
| Py_END_ALLOW_THREADS |
| if (res < 0) |
| return PySocket_Err(); |
| buf[sizeof buf - 1] = '\0'; |
| return PyString_FromString(buf); |
| } |
| |
| static char gethostname_doc[] = |
| "gethostname() -> string\n\ |
| \n\ |
| Return the current host name."; |
| |
| |
| /* Python interface to gethostbyname(name). */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_gethostbyname(PyObject *self, PyObject *args) |
| { |
| char *name; |
| struct sockaddr_storage addrbuf; |
| |
| if (!PyArg_ParseTuple(args, "s:gethostbyname", &name)) |
| return NULL; |
| if (setipaddr(name, (struct sockaddr *)&addrbuf, AF_INET) < 0) |
| return NULL; |
| return makeipaddr((struct sockaddr *)&addrbuf, |
| sizeof(struct sockaddr_in)); |
| } |
| |
| static char gethostbyname_doc[] = |
| "gethostbyname(host) -> address\n\ |
| \n\ |
| Return the IP address (a string of the form '255.255.255.255') for a host."; |
| |
| |
| /* Convenience function common to gethostbyname_ex and gethostbyaddr */ |
| |
| static PyObject * |
| gethost_common(struct hostent *h, struct sockaddr *addr, int alen, int af) |
| { |
| char **pch; |
| PyObject *rtn_tuple = (PyObject *)NULL; |
| PyObject *name_list = (PyObject *)NULL; |
| PyObject *addr_list = (PyObject *)NULL; |
| PyObject *tmp; |
| |
| if (h == NULL) { |
| /* Let's get real error message to return */ |
| PyH_Err(h_errno); |
| return NULL; |
| } |
| if (h->h_addrtype != af) { |
| #ifdef HAVE_STRERROR |
| /* Let's get real error message to return */ |
| PyErr_SetString(PySocket_Error, (char *)strerror(EAFNOSUPPORT)); |
| #else |
| PyErr_SetString(PySocket_Error, |
| "Address family not supported by protocol family"); |
| #endif |
| return NULL; |
| } |
| switch (af) { |
| case AF_INET: |
| if (alen < sizeof(struct sockaddr_in)) |
| return NULL; |
| break; |
| #ifdef INET6 |
| case AF_INET6: |
| if (alen < sizeof(struct sockaddr_in6)) |
| return NULL; |
| break; |
| #endif |
| } |
| if ((name_list = PyList_New(0)) == NULL) |
| goto err; |
| if ((addr_list = PyList_New(0)) == NULL) |
| goto err; |
| for (pch = h->h_aliases; *pch != NULL; pch++) { |
| int status; |
| tmp = PyString_FromString(*pch); |
| if (tmp == NULL) |
| goto err; |
| status = PyList_Append(name_list, tmp); |
| Py_DECREF(tmp); |
| if (status) |
| goto err; |
| } |
| for (pch = h->h_addr_list; *pch != NULL; pch++) { |
| int status; |
| switch (af) { |
| case AF_INET: |
| { |
| struct sockaddr_in sin; |
| memset(&sin, 0, sizeof(sin)); |
| sin.sin_family = af; |
| #ifdef HAVE_SOCKADDR_SA_LEN |
| sin.sin_len = sizeof(sin); |
| #endif |
| memcpy(&sin.sin_addr, *pch, sizeof(sin.sin_addr)); |
| tmp = makeipaddr((struct sockaddr *)&sin, sizeof(sin)); |
| if (pch == h->h_addr_list && alen >= sizeof(sin)) |
| memcpy((char *) addr, &sin, sizeof(sin)); |
| break; |
| } |
| #ifdef INET6 |
| case AF_INET6: |
| { |
| struct sockaddr_in6 sin6; |
| memset(&sin6, 0, sizeof(sin6)); |
| sin6.sin6_family = af; |
| #ifdef HAVE_SOCKADDR_SA_LEN |
| sin6.sin6_len = sizeof(sin6); |
| #endif |
| memcpy(&sin6.sin6_addr, *pch, sizeof(sin6.sin6_addr)); |
| tmp = makeipaddr((struct sockaddr *)&sin6, |
| sizeof(sin6)); |
| if (pch == h->h_addr_list && alen >= sizeof(sin6)) |
| memcpy((char *) addr, &sin6, sizeof(sin6)); |
| break; |
| } |
| #endif |
| default: /* can't happen */ |
| PyErr_SetString(PySocket_Error, |
| "unsupported address family"); |
| return NULL; |
| } |
| if (tmp == NULL) |
| goto err; |
| status = PyList_Append(addr_list, tmp); |
| Py_DECREF(tmp); |
| if (status) |
| goto err; |
| } |
| rtn_tuple = Py_BuildValue("sOO", h->h_name, name_list, addr_list); |
| err: |
| Py_XDECREF(name_list); |
| Py_XDECREF(addr_list); |
| return rtn_tuple; |
| } |
| |
| |
| /* Python interface to gethostbyname_ex(name). */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_gethostbyname_ex(PyObject *self, PyObject *args) |
| { |
| char *name; |
| struct hostent *h; |
| struct sockaddr_storage addr; |
| struct sockaddr *sa; |
| PyObject *ret; |
| #ifdef HAVE_GETHOSTBYNAME_R |
| struct hostent hp_allocated; |
| #ifdef HAVE_GETHOSTBYNAME_R_3_ARG |
| struct hostent_data data; |
| #else |
| char buf[16384]; |
| int buf_len = (sizeof buf) - 1; |
| int errnop; |
| #endif |
| #if defined(HAVE_GETHOSTBYNAME_R_3_ARG) || defined(HAVE_GETHOSTBYNAME_R_6_ARG) |
| int result; |
| #endif |
| #endif /* HAVE_GETHOSTBYNAME_R */ |
| |
| if (!PyArg_ParseTuple(args, "s:gethostbyname_ex", &name)) |
| return NULL; |
| if (setipaddr(name, (struct sockaddr *)&addr, PF_INET) < 0) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| #ifdef HAVE_GETHOSTBYNAME_R |
| #if defined(HAVE_GETHOSTBYNAME_R_6_ARG) |
| result = gethostbyname_r(name, &hp_allocated, buf, buf_len, &h, &errnop); |
| #elif defined(HAVE_GETHOSTBYNAME_R_5_ARG) |
| h = gethostbyname_r(name, &hp_allocated, buf, buf_len, &errnop); |
| #else /* HAVE_GETHOSTBYNAME_R_3_ARG */ |
| memset((void *) &data, '\0', sizeof(data)); |
| result = gethostbyname_r(name, &hp_allocated, &data); |
| h = (result != 0) ? NULL : &hp_allocated; |
| #endif |
| #else /* not HAVE_GETHOSTBYNAME_R */ |
| #ifdef USE_GETHOSTBYNAME_LOCK |
| PyThread_acquire_lock(gethostbyname_lock, 1); |
| #endif |
| h = gethostbyname(name); |
| #endif /* HAVE_GETHOSTBYNAME_R */ |
| Py_END_ALLOW_THREADS |
| /* Some C libraries would require addr.__ss_family instead of addr.ss_family. |
| Therefore, we cast the sockaddr_storage into sockaddr to access sa_family. */ |
| sa = (struct sockaddr*)&addr; |
| ret = gethost_common(h, (struct sockaddr *)&addr, sizeof(addr), sa->sa_family); |
| #ifdef USE_GETHOSTBYNAME_LOCK |
| PyThread_release_lock(gethostbyname_lock); |
| #endif |
| return ret; |
| } |
| |
| static char ghbn_ex_doc[] = |
| "gethostbyname_ex(host) -> (name, aliaslist, addresslist)\n\ |
| \n\ |
| Return the true host name, a list of aliases, and a list of IP addresses,\n\ |
| for a host. The host argument is a string giving a host name or IP number."; |
| |
| |
| /* Python interface to gethostbyaddr(IP). */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_gethostbyaddr(PyObject *self, PyObject *args) |
| { |
| #ifdef INET6 |
| struct sockaddr_storage addr; |
| #else |
| struct sockaddr_in addr; |
| #endif |
| struct sockaddr *sa = (struct sockaddr *)&addr; |
| char *ip_num; |
| struct hostent *h; |
| PyObject *ret; |
| #ifdef HAVE_GETHOSTBYNAME_R |
| struct hostent hp_allocated; |
| #ifdef HAVE_GETHOSTBYNAME_R_3_ARG |
| struct hostent_data data; |
| #else |
| char buf[16384]; |
| int buf_len = (sizeof buf) - 1; |
| int errnop; |
| #endif |
| #if defined(HAVE_GETHOSTBYNAME_R_3_ARG) || defined(HAVE_GETHOSTBYNAME_R_6_ARG) |
| int result; |
| #endif |
| #endif /* HAVE_GETHOSTBYNAME_R */ |
| char *ap; |
| int al; |
| int af; |
| |
| if (!PyArg_ParseTuple(args, "s:gethostbyaddr", &ip_num)) |
| return NULL; |
| af = PF_UNSPEC; |
| if (setipaddr(ip_num, sa, af) < 0) |
| return NULL; |
| af = sa->sa_family; |
| ap = NULL; |
| al = 0; |
| switch (af) { |
| case AF_INET: |
| ap = (char *)&((struct sockaddr_in *)sa)->sin_addr; |
| al = sizeof(((struct sockaddr_in *)sa)->sin_addr); |
| break; |
| #ifdef INET6 |
| case AF_INET6: |
| ap = (char *)&((struct sockaddr_in6 *)sa)->sin6_addr; |
| al = sizeof(((struct sockaddr_in6 *)sa)->sin6_addr); |
| break; |
| #endif |
| default: |
| PyErr_SetString(PySocket_Error, "unsupported address family"); |
| return NULL; |
| } |
| Py_BEGIN_ALLOW_THREADS |
| #ifdef HAVE_GETHOSTBYNAME_R |
| #if defined(HAVE_GETHOSTBYNAME_R_6_ARG) |
| result = gethostbyaddr_r(ap, al, af, |
| &hp_allocated, buf, buf_len, |
| &h, &errnop); |
| #elif defined(HAVE_GETHOSTBYNAME_R_5_ARG) |
| h = gethostbyaddr_r(ap, al, af, |
| &hp_allocated, buf, buf_len, &errnop); |
| #else /* HAVE_GETHOSTBYNAME_R_3_ARG */ |
| memset((void *) &data, '\0', sizeof(data)); |
| result = gethostbyaddr_r(ap, al, af, &hp_allocated, &data); |
| h = (result != 0) ? NULL : &hp_allocated; |
| #endif |
| #else /* not HAVE_GETHOSTBYNAME_R */ |
| #ifdef USE_GETHOSTBYNAME_LOCK |
| PyThread_acquire_lock(gethostbyname_lock, 1); |
| #endif |
| h = gethostbyaddr(ap, al, af); |
| #endif /* HAVE_GETHOSTBYNAME_R */ |
| Py_END_ALLOW_THREADS |
| ret = gethost_common(h, (struct sockaddr *)&addr, sizeof(addr), af); |
| #ifdef USE_GETHOSTBYNAME_LOCK |
| PyThread_release_lock(gethostbyname_lock); |
| #endif |
| return ret; |
| } |
| |
| static char gethostbyaddr_doc[] = |
| "gethostbyaddr(host) -> (name, aliaslist, addresslist)\n\ |
| \n\ |
| Return the true host name, a list of aliases, and a list of IP addresses,\n\ |
| for a host. The host argument is a string giving a host name or IP number."; |
| |
| |
| /* Python interface to getservbyname(name). |
| This only returns the port number, since the other info is already |
| known or not useful (like the list of aliases). */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_getservbyname(PyObject *self, PyObject *args) |
| { |
| char *name, *proto; |
| struct servent *sp; |
| if (!PyArg_ParseTuple(args, "ss:getservbyname", &name, &proto)) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| sp = getservbyname(name, proto); |
| Py_END_ALLOW_THREADS |
| if (sp == NULL) { |
| PyErr_SetString(PySocket_Error, "service/proto not found"); |
| return NULL; |
| } |
| return PyInt_FromLong((long) ntohs(sp->s_port)); |
| } |
| |
| static char getservbyname_doc[] = |
| "getservbyname(servicename, protocolname) -> integer\n\ |
| \n\ |
| Return a port number from a service name and protocol name.\n\ |
| The protocol name should be 'tcp' or 'udp'."; |
| |
| |
| /* Python interface to getprotobyname(name). |
| This only returns the protocol number, since the other info is |
| already known or not useful (like the list of aliases). */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_getprotobyname(PyObject *self, PyObject *args) |
| { |
| char *name; |
| struct protoent *sp; |
| #ifdef __BEOS__ |
| /* Not available in BeOS yet. - [cjh] */ |
| PyErr_SetString( PySocket_Error, "getprotobyname not supported" ); |
| return NULL; |
| #else |
| if (!PyArg_ParseTuple(args, "s:getprotobyname", &name)) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| sp = getprotobyname(name); |
| Py_END_ALLOW_THREADS |
| if (sp == NULL) { |
| PyErr_SetString(PySocket_Error, "protocol not found"); |
| return NULL; |
| } |
| return PyInt_FromLong((long) sp->p_proto); |
| #endif |
| } |
| |
| static char getprotobyname_doc[] = |
| "getprotobyname(name) -> integer\n\ |
| \n\ |
| Return the protocol number for the named protocol. (Rarely used.)"; |
| |
| |
| /* Python interface to socket(family, type, proto). |
| The third (protocol) argument is optional. |
| Return a new socket object. */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_socket(PyObject *self, PyObject *args) |
| { |
| PySocketSockObject *s; |
| SOCKET_T fd; |
| int family, type, proto = 0; |
| if (!PyArg_ParseTuple(args, "ii|i:socket", &family, &type, &proto)) |
| return NULL; |
| Py_BEGIN_ALLOW_THREADS |
| fd = socket(family, type, proto); |
| Py_END_ALLOW_THREADS |
| #ifdef MS_WINDOWS |
| if (fd == INVALID_SOCKET) |
| #else |
| if (fd < 0) |
| #endif |
| return PySocket_Err(); |
| s = PySocketSock_New(fd, family, type, proto); |
| /* If the object can't be created, don't forget to close the |
| file descriptor again! */ |
| if (s == NULL) |
| (void) SOCKETCLOSE(fd); |
| /* From now on, ignore SIGPIPE and let the error checking |
| do the work. */ |
| #ifdef SIGPIPE |
| (void) signal(SIGPIPE, SIG_IGN); |
| #endif |
| return (PyObject *) s; |
| } |
| |
| static char socket_doc[] = |
| "socket(family, type[, proto]) -> socket object\n\ |
| \n\ |
| Open a socket of the given type. The family argument specifies the\n\ |
| address family; it is normally AF_INET, sometimes AF_UNIX.\n\ |
| The type argument specifies whether this is a stream (SOCK_STREAM)\n\ |
| or datagram (SOCK_DGRAM) socket. The protocol argument defaults to 0,\n\ |
| specifying the default protocol."; |
| |
| |
| #ifndef NO_DUP |
| /* Create a socket object from a numeric file description. |
| Useful e.g. if stdin is a socket. |
| Additional arguments as for socket(). */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_fromfd(PyObject *self, PyObject *args) |
| { |
| PySocketSockObject *s; |
| SOCKET_T fd; |
| int family, type, proto = 0; |
| if (!PyArg_ParseTuple(args, "iii|i:fromfd", |
| &fd, &family, &type, &proto)) |
| return NULL; |
| /* Dup the fd so it and the socket can be closed independently */ |
| fd = dup(fd); |
| if (fd < 0) |
| return PySocket_Err(); |
| s = PySocketSock_New(fd, family, type, proto); |
| /* From now on, ignore SIGPIPE and let the error checking |
| do the work. */ |
| #ifdef SIGPIPE |
| (void) signal(SIGPIPE, SIG_IGN); |
| #endif |
| return (PyObject *) s; |
| } |
| |
| static char fromfd_doc[] = |
| "fromfd(fd, family, type[, proto]) -> socket object\n\ |
| \n\ |
| Create a socket object from the given file descriptor.\n\ |
| The remaining arguments are the same as for socket()."; |
| |
| #endif /* NO_DUP */ |
| |
| |
| static PyObject * |
| PySocket_ntohs(PyObject *self, PyObject *args) |
| { |
| int x1, x2; |
| |
| if (!PyArg_ParseTuple(args, "i:ntohs", &x1)) { |
| return NULL; |
| } |
| x2 = (int)ntohs((short)x1); |
| return PyInt_FromLong(x2); |
| } |
| |
| static char ntohs_doc[] = |
| "ntohs(integer) -> integer\n\ |
| \n\ |
| Convert a 16-bit integer from network to host byte order."; |
| |
| |
| static PyObject * |
| PySocket_ntohl(PyObject *self, PyObject *args) |
| { |
| int x1, x2; |
| |
| if (!PyArg_ParseTuple(args, "i:ntohl", &x1)) { |
| return NULL; |
| } |
| x2 = ntohl(x1); |
| return PyInt_FromLong(x2); |
| } |
| |
| static char ntohl_doc[] = |
| "ntohl(integer) -> integer\n\ |
| \n\ |
| Convert a 32-bit integer from network to host byte order."; |
| |
| |
| static PyObject * |
| PySocket_htons(PyObject *self, PyObject *args) |
| { |
| int x1, x2; |
| |
| if (!PyArg_ParseTuple(args, "i:htons", &x1)) { |
| return NULL; |
| } |
| x2 = (int)htons((short)x1); |
| return PyInt_FromLong(x2); |
| } |
| |
| static char htons_doc[] = |
| "htons(integer) -> integer\n\ |
| \n\ |
| Convert a 16-bit integer from host to network byte order."; |
| |
| |
| static PyObject * |
| PySocket_htonl(PyObject *self, PyObject *args) |
| { |
| int x1, x2; |
| |
| if (!PyArg_ParseTuple(args, "i:htonl", &x1)) { |
| return NULL; |
| } |
| x2 = htonl(x1); |
| return PyInt_FromLong(x2); |
| } |
| |
| static char htonl_doc[] = |
| "htonl(integer) -> integer\n\ |
| \n\ |
| Convert a 32-bit integer from host to network byte order."; |
| |
| /* |
| * socket.inet_aton() and socket.inet_ntoa() functions |
| * |
| * written 20 Aug 1999 by Ben Gertzfield <che@debian.org> <- blame him! |
| * |
| */ |
| |
| static char inet_aton_doc[] = |
| "inet_aton(string) -> packed 32-bit IP representation\n\ |
| \n\ |
| Convert an IP address in string format (123.45.67.89) to the 32-bit packed\n\ |
| binary format used in low-level network functions."; |
| |
| static PyObject* |
| PySocket_inet_aton(PyObject *self, PyObject *args) |
| { |
| #ifndef INADDR_NONE |
| #define INADDR_NONE (-1) |
| #endif |
| |
| /* Have to use inet_addr() instead */ |
| char *ip_addr; |
| unsigned long packed_addr; |
| |
| if (!PyArg_ParseTuple(args, "s:inet_aton", &ip_addr)) { |
| return NULL; |
| } |
| #ifdef USE_GUSI1 |
| packed_addr = inet_addr(ip_addr).s_addr; |
| #else |
| packed_addr = inet_addr(ip_addr); |
| #endif |
| |
| if (packed_addr == INADDR_NONE) { /* invalid address */ |
| PyErr_SetString(PySocket_Error, |
| "illegal IP address string passed to inet_aton"); |
| return NULL; |
| } |
| |
| return PyString_FromStringAndSize((char *) &packed_addr, |
| sizeof(packed_addr)); |
| } |
| |
| static char inet_ntoa_doc[] = |
| "inet_ntoa(packed_ip) -> ip_address_string\n\ |
| \n\ |
| Convert an IP address from 32-bit packed binary format to string format"; |
| |
| static PyObject* |
| PySocket_inet_ntoa(PyObject *self, PyObject *args) |
| { |
| char *packed_str; |
| int addr_len; |
| struct in_addr packed_addr; |
| |
| if (!PyArg_ParseTuple(args, "s#:inet_ntoa", &packed_str, &addr_len)) { |
| return NULL; |
| } |
| |
| if (addr_len != sizeof(packed_addr)) { |
| PyErr_SetString(PySocket_Error, |
| "packed IP wrong length for inet_ntoa"); |
| return NULL; |
| } |
| |
| memcpy(&packed_addr, packed_str, addr_len); |
| |
| return PyString_FromString(inet_ntoa(packed_addr)); |
| } |
| |
| /* Python interface to getaddrinfo(host, port). */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_getaddrinfo(PyObject *self, PyObject *args) |
| { |
| struct addrinfo hints, *res0, *res; |
| PyObject *pobj = (PyObject *)NULL; |
| char pbuf[30]; |
| char *hptr, *pptr; |
| int family, socktype, protocol, flags; |
| int error; |
| PyObject *all = (PyObject *)NULL; |
| PyObject *single = (PyObject *)NULL; |
| |
| family = socktype = protocol = flags = 0; |
| family = PF_UNSPEC; |
| if (!PyArg_ParseTuple(args, "zO|iiii:getaddrinfo", |
| &hptr, &pobj, &family, &socktype, |
| &protocol, &flags)) { |
| return NULL; |
| } |
| if (PyInt_Check(pobj)) { |
| PyOS_snprintf(pbuf, sizeof(pbuf), "%ld", PyInt_AsLong(pobj)); |
| pptr = pbuf; |
| } else if (PyString_Check(pobj)) { |
| pptr = PyString_AsString(pobj); |
| } else if (pobj == Py_None) { |
| pptr = (char *)NULL; |
| } else { |
| PyErr_SetString(PySocket_Error, "Int or String expected"); |
| return NULL; |
| } |
| memset(&hints, 0, sizeof(hints)); |
| hints.ai_family = family; |
| hints.ai_socktype = socktype; |
| hints.ai_protocol = protocol; |
| hints.ai_flags = flags; |
| error = getaddrinfo(hptr, pptr, &hints, &res0); |
| if (error) { |
| PyGAI_Err(error); |
| return NULL; |
| } |
| |
| if ((all = PyList_New(0)) == NULL) |
| goto err; |
| for (res = res0; res; res = res->ai_next) { |
| PyObject *addr = |
| makesockaddr(-1, res->ai_addr, res->ai_addrlen); |
| if (addr == NULL) |
| goto err; |
| single = Py_BuildValue("iiisO", res->ai_family, |
| res->ai_socktype, res->ai_protocol, |
| res->ai_canonname ? res->ai_canonname : "", |
| addr); |
| Py_DECREF(addr); |
| if (single == NULL) |
| goto err; |
| |
| if (PyList_Append(all, single)) |
| goto err; |
| Py_XDECREF(single); |
| } |
| return all; |
| err: |
| Py_XDECREF(single); |
| Py_XDECREF(all); |
| return (PyObject *)NULL; |
| } |
| |
| static char getaddrinfo_doc[] = |
| "socket.getaddrinfo(host, port [, family, socktype, proto, flags])\n\ |
| --> List of (family, socktype, proto, canonname, sockaddr)\n\ |
| \n\ |
| Resolve host and port into addrinfo struct."; |
| |
| /* Python interface to getnameinfo(sa, flags). */ |
| |
| /*ARGSUSED*/ |
| static PyObject * |
| PySocket_getnameinfo(PyObject *self, PyObject *args) |
| { |
| PyObject *sa = (PyObject *)NULL; |
| int flags; |
| char *hostp; |
| int n, port, flowinfo, scope_id; |
| char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; |
| struct addrinfo hints, *res = NULL; |
| int error; |
| PyObject *ret = (PyObject *)NULL; |
| |
| flags = flowinfo = scope_id = 0; |
| if (PyArg_ParseTuple(args, "Oi:getnameinfo", &sa, &flags) == 0) |
| return NULL; |
| n = PyArg_ParseTuple(sa, "si|ii", &hostp, &port, &flowinfo, scope_id); |
| if (n == 0) |
| goto fail; |
| PyOS_snprintf(pbuf, sizeof(pbuf), "%d", port); |
| memset(&hints, 0, sizeof(hints)); |
| hints.ai_family = PF_UNSPEC; |
| hints.ai_socktype = SOCK_DGRAM; /* make numeric port happy */ |
| error = getaddrinfo(hostp, pbuf, &hints, &res); |
| if (error) { |
| PyGAI_Err(error); |
| goto fail; |
| } |
| if (res->ai_next) { |
| PyErr_SetString(PySocket_Error, |
| "sockaddr resolved to multiple addresses"); |
| goto fail; |
| } |
| switch (res->ai_family) { |
| case AF_INET: |
| { |
| char *t1; |
| int t2; |
| if (PyArg_ParseTuple(sa, "si", &t1, &t2) == 0) { |
| PyErr_SetString(PySocket_Error, |
| "IPv4 sockaddr must be 2 tuple"); |
| goto fail; |
| } |
| break; |
| } |
| #ifdef INET6 |
| case AF_INET6: |
| { |
| struct sockaddr_in6 *sin6; |
| sin6 = (struct sockaddr_in6 *)res->ai_addr; |
| sin6->sin6_flowinfo = flowinfo; |
| sin6->sin6_scope_id = scope_id; |
| break; |
| } |
| #endif |
| } |
| error = getnameinfo(res->ai_addr, res->ai_addrlen, |
| hbuf, sizeof(hbuf), pbuf, sizeof(pbuf), flags); |
| if (error) { |
| PyGAI_Err(error); |
| goto fail; |
| } |
| ret = Py_BuildValue("ss", hbuf, pbuf); |
| |
| fail: |
| if (res) |
| freeaddrinfo(res); |
| Py_XDECREF(sa); |
| return ret; |
| } |
| |
| static char getnameinfo_doc[] = |
| "socket.getnameinfo(sockaddr, flags) --> (host, port)\n\ |
| \n\ |
| Get host and port for a sockaddr."; |
| |
| /* XXX It might be helpful to augment the error message generated |
| below with the name of the SSL function that generated the error. |
| I expect it's obvious most of the time. |
| */ |
| |
| #ifdef USE_SSL |
| static PyObject * |
| PySSL_SetError(SSL *ssl, int ret) |
| { |
| PyObject *v, *n, *s; |
| char *errstr; |
| int err; |
| |
| assert(ret <= 0); |
| |
| err = SSL_get_error(ssl, ret); |
| n = PyInt_FromLong(err); |
| if (n == NULL) |
| return NULL; |
| v = PyTuple_New(2); |
| if (v == NULL) { |
| Py_DECREF(n); |
| return NULL; |
| } |
| |
| switch (SSL_get_error(ssl, ret)) { |
| case SSL_ERROR_ZERO_RETURN: |
| errstr = "TLS/SSL connection has been closed"; |
| break; |
| case SSL_ERROR_WANT_READ: |
| errstr = "The operation did not complete (read)"; |
| break; |
| case SSL_ERROR_WANT_WRITE: |
| errstr = "The operation did not complete (write)"; |
| break; |
| case SSL_ERROR_WANT_X509_LOOKUP: |
| errstr = "The operation did not complete (X509 lookup)"; |
| break; |
| case SSL_ERROR_SYSCALL: |
| case SSL_ERROR_SSL: |
| { |
| unsigned long e = ERR_get_error(); |
| if (e == 0) { |
| /* an EOF was observed that violates the protocol */ |
| errstr = "EOF occurred in violation of protocol"; |
| } else if (e == -1) { |
| /* the underlying BIO reported an I/O error */ |
| Py_DECREF(v); |
| Py_DECREF(n); |
| return PySocket_Err(); |
| } else { |
| /* XXX Protected by global interpreter lock */ |
| errstr = ERR_error_string(e, NULL); |
| } |
| break; |
| } |
| default: |
| errstr = "Invalid error code"; |
| } |
| s = PyString_FromString(errstr); |
| if (s == NULL) { |
| Py_DECREF(v); |
| Py_DECREF(n); |
| } |
| PyTuple_SET_ITEM(v, 0, n); |
| PyTuple_SET_ITEM(v, 1, s); |
| PyErr_SetObject(PySSLErrorObject, v); |
| return NULL; |
| } |
| |
| /* This is a C function to be called for new object initialization */ |
| static PySSLObject * |
| newPySSLObject(PySocketSockObject *Sock, char *key_file, char *cert_file) |
| { |
| PySSLObject *self; |
| char *errstr = NULL; |
| int ret; |
| |
| self = PyObject_New(PySSLObject, &PySSL_Type); /* Create new object */ |
| if (self == NULL){ |
| errstr = "newPySSLObject error"; |
| goto fail; |
| } |
| memset(self->server, '\0', sizeof(char) * X509_NAME_MAXLEN); |
| memset(self->issuer, '\0', sizeof(char) * X509_NAME_MAXLEN); |
| self->server_cert = NULL; |
| self->ssl = NULL; |
| self->ctx = NULL; |
| self->Socket = NULL; |
| |
| if ((key_file && !cert_file) || (!key_file && cert_file)) { |
| errstr = "Both the key & certificate files must be specified"; |
| goto fail; |
| } |
| |
| self->ctx = SSL_CTX_new(SSLv23_method()); /* Set up context */ |
| if (self->ctx == NULL) { |
| errstr = "SSL_CTX_new error"; |
| goto fail; |
| } |
| |
| if (key_file) { |
| if (SSL_CTX_use_PrivateKey_file(self->ctx, key_file, |
| SSL_FILETYPE_PEM) < 1) { |
| errstr = "SSL_CTX_use_PrivateKey_file error"; |
| goto fail; |
| } |
| |
| if (SSL_CTX_use_certificate_chain_file(self->ctx, |
| cert_file) < 1) { |
| errstr = "SSL_CTX_use_certificate_chain_file error"; |
| goto fail; |
| } |
| } |
| |
| SSL_CTX_set_verify(self->ctx, |
| SSL_VERIFY_NONE, NULL); /* set verify lvl */ |
| self->ssl = SSL_new(self->ctx); /* New ssl struct */ |
| SSL_set_fd(self->ssl, Sock->sock_fd); /* Set the socket for SSL */ |
| SSL_set_connect_state(self->ssl); |
| |
| /* Actually negotiate SSL connection */ |
| /* XXX If SSL_connect() returns 0, it's also a failure. */ |
| ret = SSL_connect(self->ssl); |
| if (ret <= 0) { |
| PySSL_SetError(self->ssl, ret); |
| goto fail; |
| } |
| self->ssl->debug = 1; |
| |
| if ((self->server_cert = SSL_get_peer_certificate(self->ssl))) { |
| X509_NAME_oneline(X509_get_subject_name(self->server_cert), |
| self->server, X509_NAME_MAXLEN); |
| X509_NAME_oneline(X509_get_issuer_name(self->server_cert), |
| self->issuer, X509_NAME_MAXLEN); |
| } |
| self->Socket = Sock; |
| Py_INCREF(self->Socket); |
| return self; |
| fail: |
| if (errstr) |
| PyErr_SetString(PySSLErrorObject, errstr); |
| Py_DECREF(self); |
| return NULL; |
| } |
| |
| /* This is the Python function called for new object initialization */ |
| static PyObject * |
| PySocket_ssl(PyObject *self, PyObject *args) |
| { |
| PySSLObject *rv; |
| PySocketSockObject *Sock; |
| char *key_file = NULL; |
| char *cert_file = NULL; |
| |
| if (!PyArg_ParseTuple(args, "O!|zz:ssl", |
| &PySocketSock_Type, (PyObject*)&Sock, |
| &key_file, &cert_file)) |
| return NULL; |
| |
| rv = newPySSLObject(Sock, key_file, cert_file); |
| if (rv == NULL) |
| return NULL; |
| return (PyObject *)rv; |
| } |
| |
| static char ssl_doc[] = |
| "ssl(socket, [keyfile, certfile]) -> sslobject"; |
| |
| /* SSL object methods */ |
| |
| static PyObject * |
| PySSL_server(PySSLObject *self) |
| { |
| return PyString_FromString(self->server); |
| } |
| |
| static PyObject * |
| PySSL_issuer(PySSLObject *self) |
| { |
| return PyString_FromString(self->issuer); |
| } |
| |
| |
| static void PySSL_dealloc(PySSLObject *self) |
| { |
| if (self->server_cert) /* Possible not to have one? */ |
| X509_free (self->server_cert); |
| if (self->ssl) |
| SSL_free(self->ssl); |
| if (self->ctx) |
| SSL_CTX_free(self->ctx); |
| Py_XDECREF(self->Socket); |
| PyObject_Del(self); |
| } |
| |
| static PyObject *PySSL_SSLwrite(PySSLObject *self, PyObject *args) |
| { |
| char *data; |
| int len; |
| |
| if (!PyArg_ParseTuple(args, "s#:write", &data, &len)) |
| return NULL; |
| |
| len = SSL_write(self->ssl, data, len); |
| if (len > 0) |
| return PyInt_FromLong(len); |
| else |
| return PySSL_SetError(self->ssl, len); |
| } |
| |
| static char PySSL_SSLwrite_doc[] = |
| "write(s) -> len\n\ |
| \n\ |
| Writes the string s into the SSL object. Returns the number\n\ |
| of bytes written."; |
| |
| static PyObject *PySSL_SSLread(PySSLObject *self, PyObject *args) |
| { |
| PyObject *buf; |
| int count = 0; |
| int len = 1024; |
| |
| if (!PyArg_ParseTuple(args, "|i:read", &len)) |
| return NULL; |
| |
| if (!(buf = PyString_FromStringAndSize((char *) 0, len))) |
| return NULL; |
| |
| count = SSL_read(self->ssl, PyString_AsString(buf), len); |
| if (count <= 0) { |
| Py_DECREF(buf); |
| return PySSL_SetError(self->ssl, count); |
| } |
| if (count != len && _PyString_Resize(&buf, count) < 0) |
| return NULL; |
| return buf; |
| } |
| |
| static char PySSL_SSLread_doc[] = |
| "read([len]) -> string\n\ |
| \n\ |
| Read up to len bytes from the SSL socket."; |
| |
| static PyMethodDef PySSLMethods[] = { |
| {"write", (PyCFunction)PySSL_SSLwrite, 1, |
| PySSL_SSLwrite_doc}, |
| {"read", (PyCFunction)PySSL_SSLread, 1, |
| PySSL_SSLread_doc}, |
| {"server", (PyCFunction)PySSL_server, METH_NOARGS}, |
| {"issuer", (PyCFunction)PySSL_issuer, METH_NOARGS}, |
| {NULL, NULL} |
| }; |
| |
| static PyObject *PySSL_getattr(PySSLObject *self, char *name) |
| { |
| return Py_FindMethod(PySSLMethods, (PyObject *)self, name); |
| } |
| |
| staticforward PyTypeObject PySSL_Type = { |
| PyObject_HEAD_INIT(NULL) |
| 0, /*ob_size*/ |
| "SSL", /*tp_name*/ |
| sizeof(PySSLObject), /*tp_basicsize*/ |
| 0, /*tp_itemsize*/ |
| /* methods */ |
| (destructor)PySSL_dealloc, /*tp_dealloc*/ |
| 0, /*tp_print*/ |
| (getattrfunc)PySSL_getattr, /*tp_getattr*/ |
| 0, /*tp_setattr*/ |
| 0, /*tp_compare*/ |
| 0, /*tp_repr*/ |
| 0, /*tp_as_number*/ |
| 0, /*tp_as_sequence*/ |
| 0, /*tp_as_mapping*/ |
| 0, /*tp_hash*/ |
| }; |
| |
| /* helper routines for seeding the SSL PRNG */ |
| static PyObject * |
| PySSL_RAND_add(PyObject *self, PyObject *args) |
| { |
| char *buf; |
| int len; |
| double entropy; |
| |
| if (!PyArg_ParseTuple(args, "s#d:RAND_add", &buf, &len, &entropy)) |
| return NULL; |
| RAND_add(buf, len, entropy); |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| static char PySSL_RAND_add_doc[] = |
| "RAND_add(string, entropy)\n\ |
| \n\ |
| Mix string into the OpenSSL PRNG state. entropy (a float) is a lower\n\ |
| bound on the entropy contained in string."; |
| |
| static PyObject * |
| PySSL_RAND_status(PyObject *self) |
| { |
| return PyInt_FromLong(RAND_status()); |
| } |
| |
| static char PySSL_RAND_status_doc[] = |
| "RAND_status() -> 0 or 1\n\ |
| \n\ |
| Returns 1 if the OpenSSL PRNG has been seeded with enough data and 0 if not.\n\ |
| It is necessary to seed the PRNG with RAND_add() on some platforms before\n\ |
| using the ssl() function."; |
| |
| static PyObject * |
| PySSL_RAND_egd(PyObject *self, PyObject *arg) |
| { |
| int bytes; |
| |
| if (!PyString_Check(arg)) |
| return PyErr_Format(PyExc_TypeError, |
| "RAND_egd() expected string, found %s", |
| arg->ob_type->tp_name); |
| bytes = RAND_egd(PyString_AS_STRING(arg)); |
| if (bytes == -1) { |
| PyErr_SetString(PySSLErrorObject, |
| "EGD connection failed or EGD did not return " |
| "enough data to seed the PRNG"); |
| return NULL; |
| } |
| return PyInt_FromLong(bytes); |
| } |
| |
| static char PySSL_RAND_egd_doc[] = |
| "RAND_egd(path) -> bytes |
| \n\ |
| Queries the entropy gather daemon (EGD) on socket path. Returns number\n\ |
| of bytes read. Raises socket.sslerror if connection to EGD fails or\n\ |
| if it does provide enough data to seed PRNG."; |
| |
| #endif /* USE_SSL */ |
| |
| |
| /* List of functions exported by this module. */ |
| |
| static PyMethodDef PySocket_methods[] = { |
| {"gethostbyname", PySocket_gethostbyname, |
| METH_VARARGS, gethostbyname_doc}, |
| {"gethostbyname_ex", PySocket_gethostbyname_ex, |
| METH_VARARGS, ghbn_ex_doc}, |
| {"gethostbyaddr", PySocket_gethostbyaddr, |
| METH_VARARGS, gethostbyaddr_doc}, |
| {"gethostname", PySocket_gethostname, |
| METH_VARARGS, gethostname_doc}, |
| {"getservbyname", PySocket_getservbyname, |
| METH_VARARGS, getservbyname_doc}, |
| {"getprotobyname", PySocket_getprotobyname, |
| METH_VARARGS,getprotobyname_doc}, |
| {"socket", PySocket_socket, |
| METH_VARARGS, socket_doc}, |
| #ifndef NO_DUP |
| {"fromfd", PySocket_fromfd, |
| METH_VARARGS, fromfd_doc}, |
| #endif |
| {"ntohs", PySocket_ntohs, |
| METH_VARARGS, ntohs_doc}, |
| {"ntohl", PySocket_ntohl, |
| METH_VARARGS, ntohl_doc}, |
| {"htons", PySocket_htons, |
| METH_VARARGS, htons_doc}, |
| {"htonl", PySocket_htonl, |
| METH_VARARGS, htonl_doc}, |
| {"inet_aton", PySocket_inet_aton, |
| METH_VARARGS, inet_aton_doc}, |
| {"inet_ntoa", PySocket_inet_ntoa, |
| METH_VARARGS, inet_ntoa_doc}, |
| {"getaddrinfo", PySocket_getaddrinfo, |
| METH_VARARGS, getaddrinfo_doc}, |
| {"getnameinfo", PySocket_getnameinfo, |
| METH_VARARGS, getnameinfo_doc}, |
| #ifdef USE_SSL |
| {"ssl", PySocket_ssl, |
| METH_VARARGS, ssl_doc}, |
| {"RAND_add", PySSL_RAND_add, METH_VARARGS, |
| PySSL_RAND_add_doc}, |
| {"RAND_egd", PySSL_RAND_egd, METH_O, |
| PySSL_RAND_egd_doc}, |
| {"RAND_status", (PyCFunction)PySSL_RAND_status, METH_NOARGS, |
| PySSL_RAND_status_doc}, |
| #endif /* USE_SSL */ |
| {NULL, NULL} /* Sentinel */ |
| }; |
| |
| |
| /* Convenience routine to export an integer value. |
| * |
| * Errors are silently ignored, for better or for worse... |
| */ |
| static void |
| insint(PyObject *d, char *name, int value) |
| { |
| PyObject *v = PyInt_FromLong((long) value); |
| if (!v || PyDict_SetItemString(d, name, v)) |
| PyErr_Clear(); |
| |
| Py_XDECREF(v); |
| } |
| |
| |
| #ifdef MS_WINDOWS |
| |
| /* Additional initialization and cleanup for NT/Windows */ |
| |
| static void |
| NTcleanup(void) |
| { |
| WSACleanup(); |
| } |
| |
| static int |
| NTinit(void) |
| { |
| WSADATA WSAData; |
| int ret; |
| char buf[100]; |
| ret = WSAStartup(0x0101, &WSAData); |
| switch (ret) { |
| case 0: /* no error */ |
| atexit(NTcleanup); |
| return 1; |
| case WSASYSNOTREADY: |
| PyErr_SetString(PyExc_ImportError, |
| "WSAStartup failed: network not ready"); |
| break; |
| case WSAVERNOTSUPPORTED: |
| case WSAEINVAL: |
| PyErr_SetString(PyExc_ImportError, |
| "WSAStartup failed: requested version not supported"); |
| break; |
| default: |
| sprintf(buf, "WSAStartup failed: error code %d", ret); |
| PyErr_SetString(PyExc_ImportError, buf); |
| break; |
| } |
| return 0; |
| } |
| |
| #endif /* MS_WINDOWS */ |
| |
| #if defined(PYOS_OS2) |
| |
| /* Additional initialization and cleanup for OS/2 */ |
| |
| static void |
| OS2cleanup(void) |
| { |
| /* No cleanup is necessary for OS/2 Sockets */ |
| } |
| |
| static int |
| OS2init(void) |
| { |
| char reason[64]; |
| int rc = sock_init(); |
| |
| if (rc == 0) { |
| atexit(OS2cleanup); |
| return 1; /* Indicate Success */ |
| } |
| |
| sprintf(reason, "OS/2 TCP/IP Error# %d", sock_errno()); |
| PyErr_SetString(PyExc_ImportError, reason); |
| |
| return 0; /* Indicate Failure */ |
| } |
| |
| #endif /* PYOS_OS2 */ |
| |
| /* Initialize this module. |
| * This is called when the first 'import socket' is done, |
| * via a table in config.c, if config.c is compiled with USE_SOCKET |
| * defined. |
| * |
| * For MS_WINDOWS (which means any Windows variant), this module |
| * is actually called "_socket", and there's a wrapper "socket.py" |
| * which implements some missing functionality (such as makefile(), |
| * dup() and fromfd()). The import of "_socket" may fail with an |
| * ImportError exception if initialization of WINSOCK fails. When |
| * WINSOCK is initialized succesfully, a call to WSACleanup() is |
| * scheduled to be made at exit time. |
| * |
| * For OS/2, this module is also called "_socket" and uses a wrapper |
| * "socket.py" which implements that functionality that is missing |
| * when PC operating systems don't put socket descriptors in the |
| * operating system's filesystem layer. |
| */ |
| |
| static char module_doc[] = |
| "Implementation module for socket operations. See the socket module\n\ |
| for documentation."; |
| |
| static char sockettype_doc[] = |
| "A socket represents one endpoint of a network connection.\n\ |
| \n\ |
| Methods:\n\ |
| \n\ |
| accept() -- accept a connection, returning new socket and client address\n\ |
| bind() -- bind the socket to a local address\n\ |
| close() -- close the socket\n\ |
| connect() -- connect the socket to a remote address\n\ |
| connect_ex() -- connect, return an error code instead of an exception \n\ |
| dup() -- return a new socket object identical to the current one (*)\n\ |
| fileno() -- return underlying file descriptor\n\ |
| getpeername() -- return remote address (*)\n\ |
| getsockname() -- return local address\n\ |
| getsockopt() -- get socket options\n\ |
| listen() -- start listening for incoming connections\n\ |
| makefile() -- return a file object corresponding tot the socket (*)\n\ |
| recv() -- receive data\n\ |
| recvfrom() -- receive data and sender's address\n\ |
| send() -- send data\n\ |
| sendto() -- send data to a given address\n\ |
| setblocking() -- set or clear the blocking I/O flag\n\ |
| setsockopt() -- set socket options\n\ |
| shutdown() -- shut down traffic in one or both directions\n\ |
| \n\ |
| (*) not available on all platforms!)"; |
| |
| DL_EXPORT(void) |
| init_socket(void) |
| { |
| PyObject *m, *d; |
| #ifdef RISCOS |
| _kernel_swi_regs r; |
| r.r[0]=0; |
| _kernel_swi(0x43380, &r, &r); |
| taskwindow = r.r[0]; |
| #else |
| #ifdef MS_WINDOWS |
| if (!NTinit()) |
| return; |
| #else |
| #if defined(__TOS_OS2__) |
| if (!OS2init()) |
| return; |
| #endif /* __TOS_OS2__ */ |
| #endif /* MS_WINDOWS */ |
| #endif /* RISCOS */ |
| #ifdef USE_SSL |
| PySSL_Type.ob_type = &PyType_Type; |
| #endif |
| m = Py_InitModule3("_socket", PySocket_methods, module_doc); |
| d = PyModule_GetDict(m); |
| PySocket_Error = PyErr_NewException("socket.error", NULL, NULL); |
| if (PySocket_Error == NULL) |
| return; |
| PyDict_SetItemString(d, "error", PySocket_Error); |
| PyH_Error = PyErr_NewException("socket.herror", PySocket_Error, NULL); |
| if (PyH_Error == NULL) |
| return; |
| PyDict_SetItemString(d, "herror", PyH_Error); |
| PyGAI_Error = PyErr_NewException("socket.gaierror", PySocket_Error, |
| NULL); |
| if (PyGAI_Error == NULL) |
| return; |
| PyDict_SetItemString(d, "gaierror", PyGAI_Error); |
| #ifdef USE_SSL |
| SSL_load_error_strings(); |
| SSLeay_add_ssl_algorithms(); |
| PySSLErrorObject = PyErr_NewException("socket.sslerror", NULL, NULL); |
| if (PySSLErrorObject == NULL) |
| return; |
| PyDict_SetItemString(d, "sslerror", PySSLErrorObject); |
| if (PyDict_SetItemString(d, "SSLType", |
| (PyObject *)&PySSL_Type) != 0) |
| return; |
| PyModule_AddIntConstant(m, "SSL_ERROR_ZERO_RETURN", |
| SSL_ERROR_ZERO_RETURN); |
| PyModule_AddIntConstant(m, "SSL_ERROR_WANT_READ", |
| SSL_ERROR_WANT_READ); |
| PyModule_AddIntConstant(m, "SSL_ERROR_WANT_WRITE", |
| SSL_ERROR_WANT_WRITE); |
| PyModule_AddIntConstant(m, "SSL_ERROR_WANT_X509_LOOKUP", |
| SSL_ERROR_WANT_X509_LOOKUP); |
| PyModule_AddIntConstant(m, "SSL_ERROR_SYSCALL", |
| SSL_ERROR_SYSCALL); |
| PyModule_AddIntConstant(m, "SSL_ERROR_SSL", |
| SSL_ERROR_SSL); |
| #endif /* USE_SSL */ |
| PySocketSock_Type.ob_type = &PyType_Type; |
| PySocketSock_Type.tp_doc = sockettype_doc; |
| if (PyDict_SetItemString(d, "SocketType", |
| (PyObject *)&PySocketSock_Type) != 0) |
| return; |
| |
| /* Address families (we only support AF_INET and AF_UNIX) */ |
| #ifdef AF_UNSPEC |
| insint(d, "AF_UNSPEC", AF_UNSPEC); |
| #endif |
| insint(d, "AF_INET", AF_INET); |
| #ifdef AF_INET6 |
| insint(d, "AF_INET6", AF_INET6); |
| #endif /* AF_INET6 */ |
| #ifdef AF_UNIX |
| insint(d, "AF_UNIX", AF_UNIX); |
| #endif /* AF_UNIX */ |
| #ifdef AF_AX25 |
| insint(d, "AF_AX25", AF_AX25); /* Amateur Radio AX.25 */ |
| #endif |
| #ifdef AF_IPX |
| insint(d, "AF_IPX", AF_IPX); /* Novell IPX */ |
| #endif |
| #ifdef AF_APPLETALK |
| insint(d, "AF_APPLETALK", AF_APPLETALK); /* Appletalk DDP */ |
| #endif |
| #ifdef AF_NETROM |
| insint(d, "AF_NETROM", AF_NETROM); /* Amateur radio NetROM */ |
| #endif |
| #ifdef AF_BRIDGE |
| insint(d, "AF_BRIDGE", AF_BRIDGE); /* Multiprotocol bridge */ |
| #endif |
| #ifdef AF_AAL5 |
| insint(d, "AF_AAL5", AF_AAL5); /* Reserved for Werner's ATM */ |
| #endif |
| #ifdef AF_X25 |
| insint(d, "AF_X25", AF_X25); /* Reserved for X.25 project */ |
| #endif |
| #ifdef AF_INET6 |
| insint(d, "AF_INET6", AF_INET6); /* IP version 6 */ |
| #endif |
| #ifdef AF_ROSE |
| insint(d, "AF_ROSE", AF_ROSE); /* Amateur Radio X.25 PLP */ |
| #endif |
| #ifdef HAVE_NETPACKET_PACKET_H |
| insint(d, "AF_PACKET", AF_PACKET); |
| insint(d, "PF_PACKET", PF_PACKET); |
| insint(d, "PACKET_HOST", PACKET_HOST); |
| insint(d, "PACKET_BROADCAST", PACKET_BROADCAST); |
| insint(d, "PACKET_MULTICAST", PACKET_MULTICAST); |
| insint(d, "PACKET_OTHERHOST", PACKET_OTHERHOST); |
| insint(d, "PACKET_OUTGOING", PACKET_OUTGOING); |
| insint(d, "PACKET_LOOPBACK", PACKET_LOOPBACK); |
| insint(d, "PACKET_FASTROUTE", PACKET_FASTROUTE); |
| #endif |
| |
| /* Socket types */ |
| insint(d, "SOCK_STREAM", SOCK_STREAM); |
| insint(d, "SOCK_DGRAM", SOCK_DGRAM); |
| #ifndef __BEOS__ |
| /* We have incomplete socket support. */ |
| insint(d, "SOCK_RAW", SOCK_RAW); |
| insint(d, "SOCK_SEQPACKET", SOCK_SEQPACKET); |
| insint(d, "SOCK_RDM", SOCK_RDM); |
| #endif |
| |
| #ifdef SO_DEBUG |
| insint(d, "SO_DEBUG", SO_DEBUG); |
| #endif |
| #ifdef SO_ACCEPTCONN |
| insint(d, "SO_ACCEPTCONN", SO_ACCEPTCONN); |
| #endif |
| #ifdef SO_REUSEADDR |
| insint(d, "SO_REUSEADDR", SO_REUSEADDR); |
| #endif |
| #ifdef SO_KEEPALIVE |
| insint(d, "SO_KEEPALIVE", SO_KEEPALIVE); |
| #endif |
| #ifdef SO_DONTROUTE |
| insint(d, "SO_DONTROUTE", SO_DONTROUTE); |
| #endif |
| #ifdef SO_BROADCAST |
| insint(d, "SO_BROADCAST", SO_BROADCAST); |
| #endif |
| #ifdef SO_USELOOPBACK |
| insint(d, "SO_USELOOPBACK", SO_USELOOPBACK); |
| #endif |
| #ifdef SO_LINGER |
| insint(d, "SO_LINGER", SO_LINGER); |
| #endif |
| #ifdef SO_OOBINLINE |
| insint(d, "SO_OOBINLINE", SO_OOBINLINE); |
| #endif |
| #ifdef SO_REUSEPORT |
| insint(d, "SO_REUSEPORT", SO_REUSEPORT); |
| #endif |
| #ifdef SO_SNDBUF |
| insint(d, "SO_SNDBUF", SO_SNDBUF); |
| #endif |
| #ifdef SO_RCVBUF |
| insint(d, "SO_RCVBUF", SO_RCVBUF); |
| #endif |
| #ifdef SO_SNDLOWAT |
| insint(d, "SO_SNDLOWAT", SO_SNDLOWAT); |
| #endif |
| #ifdef SO_RCVLOWAT |
| insint(d, "SO_RCVLOWAT", SO_RCVLOWAT); |
| #endif |
| #ifdef SO_SNDTIMEO |
| insint(d, "SO_SNDTIMEO", SO_SNDTIMEO); |
| #endif |
| #ifdef SO_RCVTIMEO |
| insint(d, "SO_RCVTIMEO", SO_RCVTIMEO); |
| #endif |
| #ifdef SO_ERROR |
| insint(d, "SO_ERROR", SO_ERROR); |
| #endif |
| #ifdef SO_TYPE |
| insint(d, "SO_TYPE", SO_TYPE); |
| #endif |
| |
| /* Maximum number of connections for "listen" */ |
| #ifdef SOMAXCONN |
| insint(d, "SOMAXCONN", SOMAXCONN); |
| #else |
| insint(d, "SOMAXCONN", 5); /* Common value */ |
| #endif |
| |
| /* Flags for send, recv */ |
| #ifdef MSG_OOB |
| insint(d, "MSG_OOB", MSG_OOB); |
| #endif |
| #ifdef MSG_PEEK |
| insint(d, "MSG_PEEK", MSG_PEEK); |
| #endif |
| #ifdef MSG_DONTROUTE |
| insint(d, "MSG_DONTROUTE", MSG_DONTROUTE); |
| #endif |
| #ifdef MSG_DONTWAIT |
| insint(d, "MSG_DONTWAIT", MSG_DONTWAIT); |
| #endif |
| #ifdef MSG_EOR |
| insint(d, "MSG_EOR", MSG_EOR); |
| #endif |
| #ifdef MSG_TRUNC |
| insint(d, "MSG_TRUNC", MSG_TRUNC); |
| #endif |
| #ifdef MSG_CTRUNC |
| insint(d, "MSG_CTRUNC", MSG_CTRUNC); |
| #endif |
| #ifdef MSG_WAITALL |
| insint(d, "MSG_WAITALL", MSG_WAITALL); |
| #endif |
| #ifdef MSG_BTAG |
| insint(d, "MSG_BTAG", MSG_BTAG); |
| #endif |
| #ifdef MSG_ETAG |
| insint(d, "MSG_ETAG", MSG_ETAG); |
| #endif |
| |
| /* Protocol level and numbers, usable for [gs]etsockopt */ |
| #ifdef SOL_SOCKET |
| insint(d, "SOL_SOCKET", SOL_SOCKET); |
| #endif |
| #ifdef SOL_IP |
| insint(d, "SOL_IP", SOL_IP); |
| #else |
| insint(d, "SOL_IP", 0); |
| #endif |
| #ifdef SOL_IPX |
| insint(d, "SOL_IPX", SOL_IPX); |
| #endif |
| #ifdef SOL_AX25 |
| insint(d, "SOL_AX25", SOL_AX25); |
| #endif |
| #ifdef SOL_ATALK |
| insint(d, "SOL_ATALK", SOL_ATALK); |
| #endif |
| #ifdef SOL_NETROM |
| insint(d, "SOL_NETROM", SOL_NETROM); |
| #endif |
| #ifdef SOL_ROSE |
| insint(d, "SOL_ROSE", SOL_ROSE); |
| #endif |
| #ifdef SOL_TCP |
| insint(d, "SOL_TCP", SOL_TCP); |
| #else |
| insint(d, "SOL_TCP", 6); |
| #endif |
| #ifdef SOL_UDP |
| insint(d, "SOL_UDP", SOL_UDP); |
| #else |
| insint(d, "SOL_UDP", 17); |
| #endif |
| #ifdef IPPROTO_IP |
| insint(d, "IPPROTO_IP", IPPROTO_IP); |
| #else |
| insint(d, "IPPROTO_IP", 0); |
| #endif |
| #ifdef IPPROTO_HOPOPTS |
| insint(d, "IPPROTO_HOPOPTS", IPPROTO_HOPOPTS); |
| #endif |
| #ifdef IPPROTO_ICMP |
| insint(d, "IPPROTO_ICMP", IPPROTO_ICMP); |
| #else |
| insint(d, "IPPROTO_ICMP", 1); |
| #endif |
| #ifdef IPPROTO_IGMP |
| insint(d, "IPPROTO_IGMP", IPPROTO_IGMP); |
| #endif |
| #ifdef IPPROTO_GGP |
| insint(d, "IPPROTO_GGP", IPPROTO_GGP); |
| #endif |
| #ifdef IPPROTO_IPV4 |
| insint(d, "IPPROTO_IPV4", IPPROTO_IPV4); |
| #endif |
| #ifdef IPPROTO_IPIP |
| insint(d, "IPPROTO_IPIP", IPPROTO_IPIP); |
| #endif |
| #ifdef IPPROTO_TCP |
| insint(d, "IPPROTO_TCP", IPPROTO_TCP); |
| #else |
| insint(d, "IPPROTO_TCP", 6); |
| #endif |
| #ifdef IPPROTO_EGP |
| insint(d, "IPPROTO_EGP", IPPROTO_EGP); |
| #endif |
| #ifdef IPPROTO_PUP |
| insint(d, "IPPROTO_PUP", IPPROTO_PUP); |
| #endif |
| #ifdef IPPROTO_UDP |
| insint(d, "IPPROTO_UDP", IPPROTO_UDP); |
| #else |
| insint(d, "IPPROTO_UDP", 17); |
| #endif |
| #ifdef IPPROTO_IDP |
| insint(d, "IPPROTO_IDP", IPPROTO_IDP); |
| #endif |
| #ifdef IPPROTO_HELLO |
| insint(d, "IPPROTO_HELLO", IPPROTO_HELLO); |
| #endif |
| #ifdef IPPROTO_ND |
| insint(d, "IPPROTO_ND", IPPROTO_ND); |
| #endif |
| #ifdef IPPROTO_TP |
| insint(d, "IPPROTO_TP", IPPROTO_TP); |
| #endif |
| #ifdef IPPROTO_IPV6 |
| insint(d, "IPPROTO_IPV6", IPPROTO_IPV6); |
| #endif |
| #ifdef IPPROTO_ROUTING |
| insint(d, "IPPROTO_ROUTING", IPPROTO_ROUTING); |
| #endif |
| #ifdef IPPROTO_FRAGMENT |
| insint(d, "IPPROTO_FRAGMENT", IPPROTO_FRAGMENT); |
| #endif |
| #ifdef IPPROTO_RSVP |
| insint(d, "IPPROTO_RSVP", IPPROTO_RSVP); |
| #endif |
| #ifdef IPPROTO_GRE |
| insint(d, "IPPROTO_GRE", IPPROTO_GRE); |
| #endif |
| #ifdef IPPROTO_ESP |
| insint(d, "IPPROTO_ESP", IPPROTO_ESP); |
| #endif |
| #ifdef IPPROTO_AH |
| insint(d, "IPPROTO_AH", IPPROTO_AH); |
| #endif |
| #ifdef IPPROTO_MOBILE |
| insint(d, "IPPROTO_MOBILE", IPPROTO_MOBILE); |
| #endif |
| #ifdef IPPROTO_ICMPV6 |
| insint(d, "IPPROTO_ICMPV6", IPPROTO_ICMPV6); |
| #endif |
| #ifdef IPPROTO_NONE |
| insint(d, "IPPROTO_NONE", IPPROTO_NONE); |
| #endif |
| #ifdef IPPROTO_DSTOPTS |
| insint(d, "IPPROTO_DSTOPTS", IPPROTO_DSTOPTS); |
| #endif |
| #ifdef IPPROTO_XTP |
| insint(d, "IPPROTO_XTP", IPPROTO_XTP); |
| #endif |
| #ifdef IPPROTO_EON |
| insint(d, "IPPROTO_EON", IPPROTO_EON); |
| #endif |
| #ifdef IPPROTO_PIM |
| insint(d, "IPPROTO_PIM", IPPROTO_PIM); |
| #endif |
| #ifdef IPPROTO_IPCOMP |
| insint(d, "IPPROTO_IPCOMP", IPPROTO_IPCOMP); |
| #endif |
| #ifdef IPPROTO_VRRP |
| insint(d, "IPPROTO_VRRP", IPPROTO_VRRP); |
| #endif |
| #ifdef IPPROTO_BIP |
| insint(d, "IPPROTO_BIP", IPPROTO_BIP); |
| #endif |
| /**/ |
| #ifdef IPPROTO_RAW |
| insint(d, "IPPROTO_RAW", IPPROTO_RAW); |
| #else |
| insint(d, "IPPROTO_RAW", 255); |
| #endif |
| #ifdef IPPROTO_MAX |
| insint(d, "IPPROTO_MAX", IPPROTO_MAX); |
| #endif |
| |
| /* Some port configuration */ |
| #ifdef IPPORT_RESERVED |
| insint(d, "IPPORT_RESERVED", IPPORT_RESERVED); |
| #else |
| insint(d, "IPPORT_RESERVED", 1024); |
| #endif |
| #ifdef IPPORT_USERRESERVED |
| insint(d, "IPPORT_USERRESERVED", IPPORT_USERRESERVED); |
| #else |
| insint(d, "IPPORT_USERRESERVED", 5000); |
| #endif |
| |
| /* Some reserved IP v.4 addresses */ |
| #ifdef INADDR_ANY |
| insint(d, "INADDR_ANY", INADDR_ANY); |
| #else |
| insint(d, "INADDR_ANY", 0x00000000); |
| #endif |
| #ifdef INADDR_BROADCAST |
| insint(d, "INADDR_BROADCAST", INADDR_BROADCAST); |
| #else |
| insint(d, "INADDR_BROADCAST", 0xffffffff); |
| #endif |
| #ifdef INADDR_LOOPBACK |
| insint(d, "INADDR_LOOPBACK", INADDR_LOOPBACK); |
| #else |
| insint(d, "INADDR_LOOPBACK", 0x7F000001); |
| #endif |
| #ifdef INADDR_UNSPEC_GROUP |
| insint(d, "INADDR_UNSPEC_GROUP", INADDR_UNSPEC_GROUP); |
| #else |
| insint(d, "INADDR_UNSPEC_GROUP", 0xe0000000); |
| #endif |
| #ifdef INADDR_ALLHOSTS_GROUP |
| insint(d, "INADDR_ALLHOSTS_GROUP", INADDR_ALLHOSTS_GROUP); |
| #else |
| insint(d, "INADDR_ALLHOSTS_GROUP", 0xe0000001); |
| #endif |
| #ifdef INADDR_MAX_LOCAL_GROUP |
| insint(d, "INADDR_MAX_LOCAL_GROUP", INADDR_MAX_LOCAL_GROUP); |
| #else |
| insint(d, "INADDR_MAX_LOCAL_GROUP", 0xe00000ff); |
| #endif |
| #ifdef INADDR_NONE |
| insint(d, "INADDR_NONE", INADDR_NONE); |
| #else |
| insint(d, "INADDR_NONE", 0xffffffff); |
| #endif |
| |
| /* IPv4 [gs]etsockopt options */ |
| #ifdef IP_OPTIONS |
| insint(d, "IP_OPTIONS", IP_OPTIONS); |
| #endif |
| #ifdef IP_HDRINCL |
| insint(d, "IP_HDRINCL", IP_HDRINCL); |
| #endif |
| #ifdef IP_TOS |
| insint(d, "IP_TOS", IP_TOS); |
| #endif |
| #ifdef IP_TTL |
| insint(d, "IP_TTL", IP_TTL); |
| #endif |
| #ifdef IP_RECVOPTS |
| insint(d, "IP_RECVOPTS", IP_RECVOPTS); |
| #endif |
| #ifdef IP_RECVRETOPTS |
| insint(d, "IP_RECVRETOPTS", IP_RECVRETOPTS); |
| #endif |
| #ifdef IP_RECVDSTADDR |
| insint(d, "IP_RECVDSTADDR", IP_RECVDSTADDR); |
| #endif |
| #ifdef IP_RETOPTS |
| insint(d, "IP_RETOPTS", IP_RETOPTS); |
| #endif |
| #ifdef IP_MULTICAST_IF |
| insint(d, "IP_MULTICAST_IF", IP_MULTICAST_IF); |
| #endif |
| #ifdef IP_MULTICAST_TTL |
| insint(d, "IP_MULTICAST_TTL", IP_MULTICAST_TTL); |
| #endif |
| #ifdef IP_MULTICAST_LOOP |
| insint(d, "IP_MULTICAST_LOOP", IP_MULTICAST_LOOP); |
| #endif |
| #ifdef IP_ADD_MEMBERSHIP |
| insint(d, "IP_ADD_MEMBERSHIP", IP_ADD_MEMBERSHIP); |
| #endif |
| #ifdef IP_DROP_MEMBERSHIP |
| insint(d, "IP_DROP_MEMBERSHIP", IP_DROP_MEMBERSHIP); |
| #endif |
| #ifdef IP_DEFAULT_MULTICAST_TTL |
| insint(d, "IP_DEFAULT_MULTICAST_TTL", IP_DEFAULT_MULTICAST_TTL); |
| #endif |
| #ifdef IP_DEFAULT_MULTICAST_LOOP |
| insint(d, "IP_DEFAULT_MULTICAST_LOOP", IP_DEFAULT_MULTICAST_LOOP); |
| #endif |
| #ifdef IP_MAX_MEMBERSHIPS |
| insint(d, "IP_MAX_MEMBERSHIPS", IP_MAX_MEMBERSHIPS); |
| #endif |
| |
| /* IPv6 [gs]etsockopt options, defined in RFC2553 */ |
| #ifdef IPV6_JOIN_GROUP |
| insint(d, "IPV6_JOIN_GROUP", IPV6_JOIN_GROUP); |
| #endif |
| #ifdef IPV6_LEAVE_GROUP |
| insint(d, "IPV6_LEAVE_GROUP", IPV6_LEAVE_GROUP); |
| #endif |
| #ifdef IPV6_MULTICAST_HOPS |
| insint(d, "IPV6_MULTICAST_HOPS", IPV6_MULTICAST_HOPS); |
| #endif |
| #ifdef IPV6_MULTICAST_IF |
| insint(d, "IPV6_MULTICAST_IF", IPV6_MULTICAST_IF); |
| #endif |
| #ifdef IPV6_MULTICAST_LOOP |
| insint(d, "IPV6_MULTICAST_LOOP", IPV6_MULTICAST_LOOP); |
| #endif |
| #ifdef IPV6_UNICAST_HOPS |
| insint(d, "IPV6_UNICAST_HOPS", IPV6_UNICAST_HOPS); |
| #endif |
| |
| /* TCP options */ |
| #ifdef TCP_NODELAY |
| insint(d, "TCP_NODELAY", TCP_NODELAY); |
| #endif |
| #ifdef TCP_MAXSEG |
| insint(d, "TCP_MAXSEG", TCP_MAXSEG); |
| #endif |
| |
| /* IPX options */ |
| #ifdef IPX_TYPE |
| insint(d, "IPX_TYPE", IPX_TYPE); |
| #endif |
| |
| /* get{addr,name}info parameters */ |
| #ifdef EAI_ADDRFAMILY |
| insint(d, "EAI_ADDRFAMILY", EAI_ADDRFAMILY); |
| #endif |
| #ifdef EAI_AGAIN |
| insint(d, "EAI_AGAIN", EAI_AGAIN); |
| #endif |
| #ifdef EAI_BADFLAGS |
| insint(d, "EAI_BADFLAGS", EAI_BADFLAGS); |
| #endif |
| #ifdef EAI_FAIL |
| insint(d, "EAI_FAIL", EAI_FAIL); |
| #endif |
| #ifdef EAI_FAMILY |
| insint(d, "EAI_FAMILY", EAI_FAMILY); |
| #endif |
| #ifdef EAI_MEMORY |
| insint(d, "EAI_MEMORY", EAI_MEMORY); |
| #endif |
| #ifdef EAI_NODATA |
| insint(d, "EAI_NODATA", EAI_NODATA); |
| #endif |
| #ifdef EAI_NONAME |
| insint(d, "EAI_NONAME", EAI_NONAME); |
| #endif |
| #ifdef EAI_SERVICE |
| insint(d, "EAI_SERVICE", EAI_SERVICE); |
| #endif |
| #ifdef EAI_SOCKTYPE |
| insint(d, "EAI_SOCKTYPE", EAI_SOCKTYPE); |
| #endif |
| #ifdef EAI_SYSTEM |
| insint(d, "EAI_SYSTEM", EAI_SYSTEM); |
| #endif |
| #ifdef EAI_BADHINTS |
| insint(d, "EAI_BADHINTS", EAI_BADHINTS); |
| #endif |
| #ifdef EAI_PROTOCOL |
| insint(d, "EAI_PROTOCOL", EAI_PROTOCOL); |
| #endif |
| #ifdef EAI_MAX |
| insint(d, "EAI_MAX", EAI_MAX); |
| #endif |
| #ifdef AI_PASSIVE |
| insint(d, "AI_PASSIVE", AI_PASSIVE); |
| #endif |
| #ifdef AI_CANONNAME |
| insint(d, "AI_CANONNAME", AI_CANONNAME); |
| #endif |
| #ifdef AI_NUMERICHOST |
| insint(d, "AI_NUMERICHOST", AI_NUMERICHOST); |
| #endif |
| #ifdef AI_MASK |
| insint(d, "AI_MASK", AI_MASK); |
| #endif |
| #ifdef AI_ALL |
| insint(d, "AI_ALL", AI_ALL); |
| #endif |
| #ifdef AI_V4MAPPED_CFG |
| insint(d, "AI_V4MAPPED_CFG", AI_V4MAPPED_CFG); |
| #endif |
| #ifdef AI_ADDRCONFIG |
| insint(d, "AI_ADDRCONFIG", AI_ADDRCONFIG); |
| #endif |
| #ifdef AI_V4MAPPED |
| insint(d, "AI_V4MAPPED", AI_V4MAPPED); |
| #endif |
| #ifdef AI_DEFAULT |
| insint(d, "AI_DEFAULT", AI_DEFAULT); |
| #endif |
| #ifdef NI_MAXHOST |
| insint(d, "NI_MAXHOST", NI_MAXHOST); |
| #endif |
| #ifdef NI_MAXSERV |
| insint(d, "NI_MAXSERV", NI_MAXSERV); |
| #endif |
| #ifdef NI_NOFQDN |
| insint(d, "NI_NOFQDN", NI_NOFQDN); |
| #endif |
| #ifdef NI_NUMERICHOST |
| insint(d, "NI_NUMERICHOST", NI_NUMERICHOST); |
| #endif |
| #ifdef NI_NAMEREQD |
| insint(d, "NI_NAMEREQD", NI_NAMEREQD); |
| #endif |
| #ifdef NI_NUMERICSERV |
| insint(d, "NI_NUMERICSERV", NI_NUMERICSERV); |
| #endif |
| #ifdef NI_DGRAM |
| insint(d, "NI_DGRAM", NI_DGRAM); |
| #endif |
| |
| /* Initialize gethostbyname lock */ |
| #ifdef USE_GETHOSTBYNAME_LOCK |
| gethostbyname_lock = PyThread_allocate_lock(); |
| #endif |
| } |
| |
| /* Simplistic emulation code for inet_pton that only works for IPv4 */ |
| #ifndef HAVE_INET_PTON |
| int |
| inet_pton (int af, const char *src, void *dst) |
| { |
| if(af == AF_INET){ |
| long packed_addr; |
| #ifdef USE_GUSI1 |
| packed_addr = (long)inet_addr(src).s_addr; |
| #else |
| packed_addr = inet_addr(src); |
| #endif |
| if (packed_addr == INADDR_NONE) |
| return 0; |
| memcpy(dst, &packed_addr, 4); |
| return 1; |
| } |
| /* Should set errno to EAFNOSUPPORT */ |
| return -1; |
| } |
| |
| const char * |
| inet_ntop(int af, const void *src, char *dst, socklen_t size) |
| { |
| if (af == AF_INET) { |
| struct in_addr packed_addr; |
| if (size < 16) |
| /* Should set errno to ENOSPC. */ |
| return NULL; |
| memcpy(&packed_addr, src, sizeof(packed_addr)); |
| return strncpy(dst, inet_ntoa(packed_addr), size); |
| } |
| /* Should set errno to EAFNOSUPPORT */ |
| return NULL; |
| } |
| #endif |