2000-09-03 17:30:41 +08:00
|
|
|
/*
|
|
|
|
+----------------------------------------------------------------------+
|
2001-12-11 23:32:16 +08:00
|
|
|
| PHP Version 4 |
|
2000-09-03 17:30:41 +08:00
|
|
|
+----------------------------------------------------------------------+
|
2001-12-11 23:32:16 +08:00
|
|
|
| Copyright (c) 1997-2002 The PHP Group |
|
2000-09-03 17:30:41 +08:00
|
|
|
+----------------------------------------------------------------------+
|
|
|
|
| This source file is subject to version 2.02 of the PHP license, |
|
|
|
|
| that is bundled with this package in the file LICENSE, and is |
|
|
|
|
| available at through the world-wide-web at |
|
|
|
|
| http://www.php.net/license/2_02.txt. |
|
|
|
|
| If you did not receive a copy of the PHP license and are unable to |
|
|
|
|
| obtain it through the world-wide-web, please send a note to |
|
|
|
|
| license@php.net so we can mail you a copy immediately. |
|
|
|
|
+----------------------------------------------------------------------+
|
2002-02-28 16:29:35 +08:00
|
|
|
| Author: Stig Venaas <venaas@uninett.no> |
|
2002-08-20 06:59:10 +08:00
|
|
|
| Streams work by Wez Furlong <wez@thebrainroom.com> |
|
2000-09-03 17:30:41 +08:00
|
|
|
+----------------------------------------------------------------------+
|
|
|
|
*/
|
|
|
|
/* $Id$ */
|
|
|
|
|
2002-04-30 08:16:00 +08:00
|
|
|
/*#define DEBUG_MAIN_NETWORK 1*/
|
2002-03-16 05:03:08 +08:00
|
|
|
|
2000-09-04 20:58:08 +08:00
|
|
|
#include "php.h"
|
|
|
|
|
2002-03-16 20:07:27 +08:00
|
|
|
#include <stddef.h>
|
|
|
|
|
2000-09-03 17:30:41 +08:00
|
|
|
#ifdef PHP_WIN32
|
|
|
|
#include <windows.h>
|
|
|
|
#include <winsock.h>
|
|
|
|
#define O_RDONLY _O_RDONLY
|
|
|
|
#include "win32/param.h"
|
2002-09-09 19:23:11 +08:00
|
|
|
#elif defined(NETWARE)
|
|
|
|
#ifdef NEW_LIBC
|
|
|
|
#include <sys/timeval.h>
|
|
|
|
#include <sys/param.h>
|
|
|
|
#else
|
|
|
|
#include "netware/time_nw.h"
|
|
|
|
#endif
|
2000-09-03 17:30:41 +08:00
|
|
|
#else
|
|
|
|
#include <sys/param.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#if HAVE_SYS_SOCKET_H
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#endif
|
|
|
|
|
2001-08-11 04:18:42 +08:00
|
|
|
#ifndef _FCNTL_H
|
|
|
|
#include <fcntl.h>
|
|
|
|
#endif
|
|
|
|
|
2001-11-04 20:35:49 +08:00
|
|
|
#ifdef HAVE_SYS_SELECT_H
|
|
|
|
#include <sys/select.h>
|
|
|
|
#endif
|
2002-03-19 11:49:03 +08:00
|
|
|
#if HAVE_SYS_POLL_H
|
|
|
|
#include <sys/poll.h>
|
|
|
|
#endif
|
2001-11-04 20:35:49 +08:00
|
|
|
|
2002-09-09 19:23:11 +08:00
|
|
|
#if defined(NETWARE)
|
|
|
|
#ifdef USE_WINSOCK
|
|
|
|
/*#include <ws2nlm.h>*/
|
|
|
|
#include <novsock2.h>
|
|
|
|
#else
|
|
|
|
/* New headers for socket stuff */
|
|
|
|
#ifdef NEW_LIBC
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <sys/select.h>
|
|
|
|
#endif
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#endif
|
|
|
|
#elif !defined(PHP_WIN32)
|
2000-09-03 17:30:41 +08:00
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netdb.h>
|
2001-01-22 01:29:15 +08:00
|
|
|
#if HAVE_ARPA_INET_H
|
2000-09-03 17:30:41 +08:00
|
|
|
#include <arpa/inet.h>
|
2001-01-22 01:29:15 +08:00
|
|
|
#endif
|
2001-02-25 05:14:18 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef HAVE_INET_ATON
|
2002-07-20 00:22:36 +08:00
|
|
|
int inet_aton(const char *, struct in_addr *);
|
2000-09-03 17:30:41 +08:00
|
|
|
#endif
|
|
|
|
|
2000-09-06 03:06:29 +08:00
|
|
|
#include "php_network.h"
|
|
|
|
|
2002-09-09 19:23:11 +08:00
|
|
|
#if defined(PHP_WIN32) || defined(__riscos__) || defined(NETWARE)
|
2000-09-03 17:30:41 +08:00
|
|
|
#undef AF_UNIX
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(AF_UNIX)
|
|
|
|
#include <sys/un.h>
|
|
|
|
#endif
|
|
|
|
|
2002-03-20 01:49:02 +08:00
|
|
|
#include "ext/standard/file.h"
|
|
|
|
|
2000-09-03 17:30:41 +08:00
|
|
|
#ifdef PHP_WIN32
|
|
|
|
# define SOCK_ERR INVALID_SOCKET
|
|
|
|
# define SOCK_CONN_ERR SOCKET_ERROR
|
|
|
|
#else
|
|
|
|
# define SOCK_ERR -1
|
|
|
|
# define SOCK_CONN_ERR -1
|
|
|
|
#endif
|
|
|
|
|
2001-01-13 21:02:19 +08:00
|
|
|
#ifdef HAVE_GETADDRINFO
|
2001-01-13 19:48:47 +08:00
|
|
|
#ifdef HAVE_GAI_STRERROR
|
|
|
|
# define PHP_GAI_STRERROR(x) (gai_strerror(x))
|
|
|
|
#else
|
|
|
|
# define PHP_GAI_STRERROR(x) (php_gai_strerror(x))
|
2001-06-06 21:06:12 +08:00
|
|
|
/* {{{ php_gai_strerror
|
|
|
|
*/
|
2001-01-13 21:02:19 +08:00
|
|
|
static char *php_gai_strerror(int code)
|
|
|
|
{
|
2001-01-13 19:48:47 +08:00
|
|
|
static struct {
|
|
|
|
int code;
|
|
|
|
const char *msg;
|
|
|
|
} values[] = {
|
|
|
|
# ifdef EAI_ADDRFAMILY
|
|
|
|
{EAI_ADDRFAMILY, "Address family for hostname not supported"},
|
|
|
|
# endif
|
|
|
|
{EAI_AGAIN, "Temporary failure in name resolution"},
|
|
|
|
{EAI_BADFLAGS, "Bad value for ai_flags"},
|
|
|
|
{EAI_FAIL, "Non-recoverable failure in name resolution"},
|
|
|
|
{EAI_FAMILY, "ai_family not supported"},
|
|
|
|
{EAI_MEMORY, "Memory allocation failure"},
|
|
|
|
# ifdef EAI_NODATA
|
|
|
|
{EAI_NODATA, "No address associated with hostname"},
|
|
|
|
# endif
|
|
|
|
{EAI_NONAME, "Name or service not known"},
|
|
|
|
{EAI_SERVICE, "Servname not supported for ai_socktype"},
|
|
|
|
{EAI_SOCKTYPE, "ai_socktype not supported"},
|
|
|
|
{EAI_SYSTEM, "System error"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; values[i].msg != NULL; i++) {
|
|
|
|
if (values[i].code == code) {
|
|
|
|
return (char *)values[i].msg;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return "Unknown error";
|
|
|
|
}
|
2001-06-06 21:06:12 +08:00
|
|
|
/* }}} */
|
2001-01-13 19:48:47 +08:00
|
|
|
#endif
|
2001-01-13 21:02:19 +08:00
|
|
|
#endif
|
2001-01-13 19:48:47 +08:00
|
|
|
|
2001-06-06 21:06:12 +08:00
|
|
|
/* {{{ php_network_freeaddresses
|
|
|
|
*/
|
2000-09-05 21:56:11 +08:00
|
|
|
static void php_network_freeaddresses(struct sockaddr **sal)
|
|
|
|
{
|
|
|
|
struct sockaddr **sap;
|
2000-09-03 17:30:41 +08:00
|
|
|
|
2000-09-05 21:56:11 +08:00
|
|
|
if (sal == NULL)
|
|
|
|
return;
|
|
|
|
for (sap = sal; *sap != NULL; sap++)
|
2000-09-06 01:37:44 +08:00
|
|
|
efree(*sap);
|
|
|
|
efree(sal);
|
2000-09-05 21:56:11 +08:00
|
|
|
}
|
2001-06-06 21:06:12 +08:00
|
|
|
/* }}} */
|
2000-09-05 21:56:11 +08:00
|
|
|
|
2001-06-06 21:06:12 +08:00
|
|
|
/* {{{ php_network_getaddresses
|
2002-01-07 06:45:43 +08:00
|
|
|
* Returns number of addresses, 0 for none/error
|
2001-06-06 21:06:12 +08:00
|
|
|
*/
|
2002-08-26 06:17:56 +08:00
|
|
|
static int php_network_getaddresses(const char *host, struct sockaddr ***sal TSRMLS_DC)
|
2000-09-03 17:30:41 +08:00
|
|
|
{
|
2000-09-05 21:56:11 +08:00
|
|
|
struct sockaddr **sap;
|
2002-01-07 06:45:43 +08:00
|
|
|
int n;
|
2001-01-13 19:48:47 +08:00
|
|
|
|
|
|
|
if (host == NULL) {
|
2002-01-07 06:45:43 +08:00
|
|
|
return 0;
|
2001-01-13 19:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2000-09-05 21:56:11 +08:00
|
|
|
#ifdef HAVE_GETADDRINFO
|
2001-01-13 19:48:47 +08:00
|
|
|
struct addrinfo hints, *res, *sai;
|
2000-09-03 17:30:41 +08:00
|
|
|
|
2001-01-13 19:48:47 +08:00
|
|
|
memset(&hints, '\0', sizeof(hints));
|
2002-08-17 21:56:39 +08:00
|
|
|
# ifdef HAVE_IPV6
|
2001-01-13 19:48:47 +08:00
|
|
|
hints.ai_family = AF_UNSPEC;
|
2002-08-17 21:56:39 +08:00
|
|
|
# else
|
|
|
|
hints.ai_family = AF_INET;
|
|
|
|
# endif
|
2001-01-17 14:40:48 +08:00
|
|
|
if ((n = getaddrinfo(host, NULL, &hints, &res))) {
|
2002-08-26 02:45:02 +08:00
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "php_network_getaddresses: getaddrinfo failed: %s", PHP_GAI_STRERROR(n));
|
2002-01-07 06:45:43 +08:00
|
|
|
return 0;
|
2002-01-21 15:54:56 +08:00
|
|
|
} else if (res == NULL) {
|
2002-08-26 02:45:02 +08:00
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "php_network_getaddresses: getaddrinfo failed (null result pointer)");
|
2002-01-21 15:54:56 +08:00
|
|
|
return 0;
|
2001-01-13 19:48:47 +08:00
|
|
|
}
|
2000-09-05 21:56:11 +08:00
|
|
|
|
2001-01-13 19:48:47 +08:00
|
|
|
sai = res;
|
2002-01-07 06:45:43 +08:00
|
|
|
for (n = 1; (sai = sai->ai_next) != NULL; n++);
|
|
|
|
*sal = emalloc((n + 1) * sizeof(*sal));
|
2001-01-13 19:48:47 +08:00
|
|
|
sai = res;
|
2000-09-05 21:56:11 +08:00
|
|
|
sap = *sal;
|
2001-01-13 19:48:47 +08:00
|
|
|
do {
|
|
|
|
switch (sai->ai_family) {
|
2000-10-19 20:18:02 +08:00
|
|
|
# ifdef HAVE_IPV6
|
2001-01-13 19:48:47 +08:00
|
|
|
case AF_INET6:
|
2000-09-06 01:37:44 +08:00
|
|
|
*sap = emalloc(sizeof(struct sockaddr_in6));
|
2000-09-05 21:56:11 +08:00
|
|
|
*(struct sockaddr_in6 *)*sap =
|
|
|
|
*((struct sockaddr_in6 *)sai->ai_addr);
|
2001-01-13 19:48:47 +08:00
|
|
|
sap++;
|
|
|
|
break;
|
2000-09-05 21:56:11 +08:00
|
|
|
# endif
|
2001-01-13 19:48:47 +08:00
|
|
|
case AF_INET:
|
2000-09-06 01:37:44 +08:00
|
|
|
*sap = emalloc(sizeof(struct sockaddr_in));
|
2000-09-05 21:56:11 +08:00
|
|
|
*(struct sockaddr_in *)*sap =
|
|
|
|
*((struct sockaddr_in *)sai->ai_addr);
|
2001-01-13 19:48:47 +08:00
|
|
|
sap++;
|
2000-09-18 23:15:27 +08:00
|
|
|
break;
|
2001-01-13 19:48:47 +08:00
|
|
|
}
|
|
|
|
} while ((sai = sai->ai_next) != NULL);
|
|
|
|
freeaddrinfo(res);
|
2000-09-05 21:56:11 +08:00
|
|
|
#else
|
|
|
|
struct hostent *host_info;
|
|
|
|
struct in_addr in;
|
|
|
|
|
|
|
|
if (!inet_aton(host, &in)) {
|
|
|
|
/* XXX NOT THREAD SAFE */
|
|
|
|
host_info = gethostbyname(host);
|
2001-01-13 19:48:47 +08:00
|
|
|
if (host_info == NULL) {
|
2002-08-26 02:45:02 +08:00
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "php_network_getaddresses: gethostbyname failed");
|
2002-01-07 06:45:43 +08:00
|
|
|
return 0;
|
2001-01-13 19:48:47 +08:00
|
|
|
}
|
2000-09-05 21:56:11 +08:00
|
|
|
in = *((struct in_addr *) host_info->h_addr);
|
|
|
|
}
|
|
|
|
|
2000-09-06 01:37:44 +08:00
|
|
|
*sal = emalloc(2 * sizeof(*sal));
|
2000-09-05 21:56:11 +08:00
|
|
|
sap = *sal;
|
2000-09-06 01:37:44 +08:00
|
|
|
*sap = emalloc(sizeof(struct sockaddr_in));
|
2000-09-05 21:56:11 +08:00
|
|
|
(*sap)->sa_family = AF_INET;
|
|
|
|
((struct sockaddr_in *)*sap)->sin_addr = in;
|
|
|
|
sap++;
|
2002-01-07 06:45:43 +08:00
|
|
|
n = 1;
|
2000-09-05 21:56:11 +08:00
|
|
|
#endif
|
2001-01-13 19:48:47 +08:00
|
|
|
}
|
|
|
|
*sap = NULL;
|
2002-01-07 06:45:43 +08:00
|
|
|
return n;
|
2000-09-03 17:30:41 +08:00
|
|
|
}
|
2001-06-06 21:06:12 +08:00
|
|
|
/* }}} */
|
2000-09-03 17:30:41 +08:00
|
|
|
|
2001-05-06 02:36:22 +08:00
|
|
|
/* {{{ php_connect_nonb */
|
|
|
|
PHPAPI int php_connect_nonb(int sockfd,
|
2002-01-06 19:54:19 +08:00
|
|
|
const struct sockaddr *addr,
|
2001-05-06 02:36:22 +08:00
|
|
|
socklen_t addrlen,
|
|
|
|
struct timeval *timeout)
|
|
|
|
{
|
|
|
|
/* probably won't work on Win32, someone else might try it (read: fix it ;) */
|
|
|
|
|
|
|
|
#if (!defined(__BEOS__) && !defined(PHP_WIN32)) && (defined(O_NONBLOCK) || defined(O_NDELAY))
|
|
|
|
|
|
|
|
#ifndef O_NONBLOCK
|
|
|
|
#define O_NONBLOCK O_NDELAY
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int flags;
|
|
|
|
int n;
|
|
|
|
int error = 0;
|
|
|
|
socklen_t len;
|
|
|
|
int ret = 0;
|
|
|
|
fd_set rset;
|
|
|
|
fd_set wset;
|
|
|
|
|
|
|
|
if (timeout == NULL) {
|
|
|
|
/* blocking mode */
|
|
|
|
return connect(sockfd, addr, addrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
flags = fcntl(sockfd, F_GETFL, 0);
|
|
|
|
fcntl(sockfd, F_SETFL, flags | O_NONBLOCK);
|
|
|
|
|
|
|
|
if ((n = connect(sockfd, addr, addrlen)) < 0) {
|
|
|
|
if (errno != EINPROGRESS) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n == 0) {
|
|
|
|
goto ok;
|
|
|
|
}
|
|
|
|
|
|
|
|
FD_ZERO(&rset);
|
|
|
|
FD_SET(sockfd, &rset);
|
|
|
|
|
|
|
|
wset = rset;
|
|
|
|
|
|
|
|
if ((n = select(sockfd + 1, &rset, &wset, NULL, timeout)) == 0) {
|
|
|
|
error = ETIMEDOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(FD_ISSET(sockfd, &rset) || FD_ISSET(sockfd, &wset)) {
|
|
|
|
len = sizeof(error);
|
|
|
|
/*
|
|
|
|
BSD-derived systems set errno correctly
|
|
|
|
Solaris returns -1 from getsockopt in case of error
|
|
|
|
*/
|
|
|
|
if (getsockopt(sockfd, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
|
|
|
|
ret = -1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* whoops: sockfd has disappeared */
|
|
|
|
ret = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ok:
|
|
|
|
fcntl(sockfd, F_SETFL, flags);
|
|
|
|
|
|
|
|
if(error) {
|
|
|
|
errno = error;
|
|
|
|
ret = -1;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
#else /* !defined(PHP_WIN32) && ... */
|
2002-06-11 11:55:28 +08:00
|
|
|
#ifdef PHP_WIN32
|
|
|
|
return php_connect_nonb_win32((SOCKET) sockfd, addr, addrlen, timeout);
|
|
|
|
#endif
|
2001-05-06 02:36:22 +08:00
|
|
|
return connect(sockfd, addr, addrlen);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
/* }}} */
|
|
|
|
|
2002-06-11 11:55:28 +08:00
|
|
|
#ifdef PHP_WIN32
|
|
|
|
/* {{{ php_connect_nonb_win32 */
|
|
|
|
PHPAPI int php_connect_nonb_win32(SOCKET sockfd,
|
|
|
|
const struct sockaddr *addr,
|
|
|
|
socklen_t addrlen,
|
|
|
|
struct timeval *timeout)
|
|
|
|
{
|
|
|
|
int error = 0, error_len, ret;
|
|
|
|
u_long non_block = TRUE, block = FALSE;
|
|
|
|
|
|
|
|
fd_set rset, wset;
|
|
|
|
|
|
|
|
if (timeout == NULL) {
|
|
|
|
/* blocking mode */
|
|
|
|
return connect(sockfd, addr, addrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set the socket to be non-blocking */
|
|
|
|
ioctlsocket(sockfd, FIONBIO, &non_block);
|
|
|
|
|
|
|
|
if (connect(sockfd, addr, addrlen) == SOCKET_ERROR) {
|
|
|
|
if (WSAGetLastError() != WSAEWOULDBLOCK) {
|
|
|
|
return SOCKET_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
FD_ZERO(&rset);
|
|
|
|
FD_SET(sockfd, &rset);
|
|
|
|
|
|
|
|
FD_ZERO(&wset);
|
|
|
|
FD_SET(sockfd, &wset);
|
|
|
|
|
|
|
|
if ((ret = select(sockfd + 1, &rset, &wset, NULL, timeout)) == 0) {
|
|
|
|
WSASetLastError(WSAETIMEDOUT);
|
|
|
|
return SOCKET_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret == SOCKET_ERROR) {
|
|
|
|
return SOCKET_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(FD_ISSET(sockfd, &rset) || FD_ISSET(sockfd, &wset)) {
|
|
|
|
error_len = sizeof(error);
|
|
|
|
if (getsockopt(sockfd, SOL_SOCKET, SO_ERROR, (char *) &error, &error_len) == SOCKET_ERROR) {
|
|
|
|
return SOCKET_ERROR;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* whoops: sockfd has disappeared */
|
|
|
|
return SOCKET_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set the socket back to blocking */
|
|
|
|
ioctlsocket(sockfd, FIONBIO, &block);
|
|
|
|
|
|
|
|
if (error) {
|
|
|
|
WSASetLastError(error);
|
|
|
|
return SOCKET_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* }}} */
|
|
|
|
#endif
|
|
|
|
|
2001-06-06 21:06:12 +08:00
|
|
|
/* {{{ php_hostconnect
|
2000-09-03 17:30:41 +08:00
|
|
|
* Creates a socket of type socktype and connects to the given host and
|
|
|
|
* port, returns the created socket on success, else returns -1.
|
2000-09-04 03:12:28 +08:00
|
|
|
* timeout gives timeout in seconds, 0 means blocking mode.
|
2000-09-03 17:30:41 +08:00
|
|
|
*/
|
2002-08-26 06:17:56 +08:00
|
|
|
int php_hostconnect(const char *host, unsigned short port, int socktype, struct timeval *timeout TSRMLS_DC)
|
2000-09-03 17:30:41 +08:00
|
|
|
{
|
2002-07-20 04:34:35 +08:00
|
|
|
int n, repeatto, s;
|
2000-09-05 21:56:11 +08:00
|
|
|
struct sockaddr **sal, **psal;
|
2002-07-23 02:46:26 +08:00
|
|
|
struct timeval individual_timeout;
|
|
|
|
int set_timeout = 0;
|
2002-07-20 04:34:35 +08:00
|
|
|
#ifdef PHP_WIN32
|
|
|
|
int err;
|
|
|
|
#endif
|
2001-05-06 02:36:22 +08:00
|
|
|
|
2002-08-26 06:17:56 +08:00
|
|
|
n = php_network_getaddresses(host, &sal TSRMLS_CC);
|
2002-01-07 06:45:43 +08:00
|
|
|
|
|
|
|
if (n == 0)
|
2000-09-03 17:30:41 +08:00
|
|
|
return -1;
|
2000-09-05 21:56:11 +08:00
|
|
|
|
2002-07-23 02:46:26 +08:00
|
|
|
if (timeout != NULL) {
|
|
|
|
/* is this a good idea? 5s? */
|
|
|
|
repeatto = timeout->tv_sec / n > 5;
|
|
|
|
if (repeatto) {
|
|
|
|
individual_timeout.tv_sec = timeout->tv_sec / n;
|
|
|
|
} else {
|
|
|
|
individual_timeout.tv_sec = timeout->tv_sec;
|
|
|
|
}
|
2002-01-07 06:45:43 +08:00
|
|
|
|
2002-07-23 02:46:26 +08:00
|
|
|
individual_timeout.tv_usec = timeout->tv_usec;
|
|
|
|
} else {
|
|
|
|
individual_timeout.tv_sec = 0;
|
|
|
|
individual_timeout.tv_usec = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Boolean indicating whether to pass a timeout */
|
|
|
|
set_timeout = individual_timeout.tv_sec + individual_timeout.tv_usec;
|
|
|
|
|
2000-09-05 21:56:11 +08:00
|
|
|
psal = sal;
|
|
|
|
while (*sal != NULL) {
|
|
|
|
s = socket((*sal)->sa_family, socktype, 0);
|
|
|
|
if (s != SOCK_ERR) {
|
|
|
|
switch ((*sal)->sa_family) {
|
2000-10-19 20:18:02 +08:00
|
|
|
#if defined( HAVE_GETADDRINFO ) && defined( HAVE_IPV6 )
|
2001-05-06 02:36:22 +08:00
|
|
|
case AF_INET6:
|
|
|
|
{
|
|
|
|
struct sockaddr_in6 *sa =
|
|
|
|
(struct sockaddr_in6 *)*sal;
|
|
|
|
|
|
|
|
sa->sin6_family = (*sal)->sa_family;
|
|
|
|
sa->sin6_port = htons(port);
|
|
|
|
if (php_connect_nonb(s, (struct sockaddr *) sa,
|
2002-07-23 02:46:26 +08:00
|
|
|
sizeof(*sa), (set_timeout) ? &individual_timeout : NULL) != SOCK_CONN_ERR)
|
2001-05-06 02:36:22 +08:00
|
|
|
goto ok;
|
|
|
|
}
|
|
|
|
break;
|
2000-09-05 21:56:11 +08:00
|
|
|
#endif
|
2001-05-06 02:36:22 +08:00
|
|
|
case AF_INET:
|
|
|
|
{
|
|
|
|
struct sockaddr_in *sa =
|
|
|
|
(struct sockaddr_in *)*sal;
|
2000-09-05 21:56:11 +08:00
|
|
|
|
2001-05-06 02:36:22 +08:00
|
|
|
sa->sin_family = (*sal)->sa_family;
|
|
|
|
sa->sin_port = htons(port);
|
|
|
|
if (php_connect_nonb(s, (struct sockaddr *) sa,
|
2002-07-23 02:46:26 +08:00
|
|
|
sizeof(*sa), (set_timeout) ? &individual_timeout : NULL) != SOCK_CONN_ERR)
|
2001-05-06 02:36:22 +08:00
|
|
|
goto ok;
|
2000-09-05 21:56:11 +08:00
|
|
|
|
2001-05-06 02:36:22 +08:00
|
|
|
}
|
|
|
|
break;
|
2000-09-05 21:56:11 +08:00
|
|
|
}
|
2002-06-11 11:55:28 +08:00
|
|
|
#ifdef PHP_WIN32
|
|
|
|
/* Preserve the last error */
|
|
|
|
err = WSAGetLastError();
|
|
|
|
#endif
|
2000-09-05 21:56:11 +08:00
|
|
|
close (s);
|
|
|
|
}
|
|
|
|
sal++;
|
2000-09-03 17:30:41 +08:00
|
|
|
}
|
2000-09-05 21:56:11 +08:00
|
|
|
php_network_freeaddresses(psal);
|
2002-08-26 02:45:02 +08:00
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "php_hostconnect: connect failed");
|
2002-06-11 11:55:28 +08:00
|
|
|
|
|
|
|
#ifdef PHP_WIN32
|
|
|
|
/* Restore the last error */
|
|
|
|
WSASetLastError(err);
|
|
|
|
#endif
|
|
|
|
|
2000-09-05 21:56:11 +08:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
ok:
|
|
|
|
php_network_freeaddresses(psal);
|
2000-09-03 17:30:41 +08:00
|
|
|
return s;
|
|
|
|
}
|
2001-06-06 21:06:12 +08:00
|
|
|
/* }}} */
|
2000-09-03 17:30:41 +08:00
|
|
|
|
2002-01-07 06:45:43 +08:00
|
|
|
/* {{{ php_any_addr
|
|
|
|
* Fills the any (wildcard) address into php_sockaddr_storage
|
|
|
|
*/
|
|
|
|
void php_any_addr(int family, php_sockaddr_storage *addr, unsigned short port)
|
|
|
|
{
|
|
|
|
memset(addr, 0, sizeof(php_sockaddr_storage));
|
|
|
|
switch (family) {
|
|
|
|
#ifdef HAVE_IPV6
|
|
|
|
case AF_INET6: {
|
|
|
|
struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *) addr;
|
|
|
|
sin6->sin6_family = AF_INET6;
|
|
|
|
sin6->sin6_port = htons(port);
|
|
|
|
sin6->sin6_addr = in6addr_any;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
case AF_INET: {
|
|
|
|
struct sockaddr_in *sin = (struct sockaddr_in *) addr;
|
|
|
|
sin->sin_family = AF_INET;
|
|
|
|
sin->sin_port = htons(port);
|
|
|
|
sin->sin_addr.s_addr = INADDR_ANY;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* }}} */
|
|
|
|
|
2002-02-10 20:35:29 +08:00
|
|
|
/* {{{ php_sockaddr_size
|
|
|
|
* Returns the size of struct sockaddr_xx for the family
|
|
|
|
*/
|
|
|
|
int php_sockaddr_size(php_sockaddr_storage *addr)
|
|
|
|
{
|
|
|
|
switch (((struct sockaddr *)addr)->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
return sizeof(struct sockaddr_in);
|
2002-02-12 19:00:15 +08:00
|
|
|
#ifdef HAVE_IPV6
|
2002-02-10 20:35:29 +08:00
|
|
|
case AF_INET6:
|
|
|
|
return sizeof(struct sockaddr_in6);
|
|
|
|
#endif
|
|
|
|
#ifdef AF_UNIX
|
|
|
|
case AF_UNIX:
|
|
|
|
return sizeof(struct sockaddr_un);
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* }}} */
|
|
|
|
|
2002-03-19 02:54:32 +08:00
|
|
|
PHPAPI php_stream *_php_stream_sock_open_from_socket(int socket, int persistent STREAMS_DC TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
2002-03-16 09:58:13 +08:00
|
|
|
php_stream *stream;
|
|
|
|
php_netstream_data_t *sock;
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
sock = pemalloc(sizeof(php_netstream_data_t), persistent);
|
|
|
|
memset(sock, 0, sizeof(php_netstream_data_t));
|
|
|
|
|
|
|
|
sock->is_blocked = 1;
|
2002-09-24 02:12:39 +08:00
|
|
|
sock->timeout.tv_sec = FG(default_socket_timeout);
|
2002-03-16 05:03:08 +08:00
|
|
|
sock->socket = socket;
|
|
|
|
|
2002-03-18 06:50:59 +08:00
|
|
|
stream = php_stream_alloc_rel(&php_stream_socket_ops, sock, persistent, "r+");
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
if (stream == NULL)
|
|
|
|
pefree(sock, persistent);
|
|
|
|
|
|
|
|
return stream;
|
|
|
|
}
|
|
|
|
|
2002-03-18 06:50:59 +08:00
|
|
|
PHPAPI php_stream *_php_stream_sock_open_host(const char *host, unsigned short port,
|
2002-07-23 02:46:26 +08:00
|
|
|
int socktype, struct timeval *timeout, int persistent STREAMS_DC TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
|
|
|
int socket;
|
|
|
|
|
2002-08-26 06:17:56 +08:00
|
|
|
socket = php_hostconnect(host, port, socktype, timeout TSRMLS_CC);
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
if (socket == -1)
|
|
|
|
return NULL;
|
|
|
|
|
2002-03-18 06:50:59 +08:00
|
|
|
return php_stream_sock_open_from_socket_rel(socket, persistent);
|
2002-03-16 05:03:08 +08:00
|
|
|
}
|
|
|
|
|
2002-03-18 06:50:59 +08:00
|
|
|
PHPAPI php_stream *_php_stream_sock_open_unix(const char *path, int pathlen, int persistent,
|
2002-03-19 02:54:32 +08:00
|
|
|
struct timeval *timeout STREAMS_DC TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
|
|
|
#if defined(AF_UNIX)
|
|
|
|
int socketd;
|
|
|
|
struct sockaddr_un unix_addr;
|
|
|
|
|
|
|
|
socketd = socket(PF_UNIX, SOCK_STREAM, 0);
|
|
|
|
if (socketd == SOCK_ERR)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
memset(&unix_addr, 0, sizeof(unix_addr));
|
|
|
|
unix_addr.sun_family = AF_UNIX;
|
2002-03-17 21:19:27 +08:00
|
|
|
|
2002-04-19 18:06:41 +08:00
|
|
|
/* we need to be binary safe on systems that support an abstract
|
2002-03-17 21:19:27 +08:00
|
|
|
* namespace */
|
|
|
|
if (pathlen >= sizeof(unix_addr.sun_path)) {
|
|
|
|
/* On linux, when the path begins with a NUL byte we are
|
|
|
|
* referring to an abstract namespace. In theory we should
|
|
|
|
* allow an extra byte below, since we don't need the NULL.
|
|
|
|
* BUT, to get into this branch of code, the name is too long,
|
|
|
|
* so we don't care. */
|
|
|
|
pathlen = sizeof(unix_addr.sun_path) - 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(unix_addr.sun_path, path, pathlen);
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
if (php_connect_nonb(socketd, (struct sockaddr *) &unix_addr, sizeof(unix_addr), timeout) == SOCK_CONN_ERR)
|
|
|
|
return NULL;
|
|
|
|
|
2002-03-18 06:50:59 +08:00
|
|
|
return php_stream_sock_open_from_socket_rel(socketd, persistent);
|
2002-03-16 05:03:08 +08:00
|
|
|
#else
|
|
|
|
return NULL;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
#if HAVE_OPENSSL_EXT
|
2002-09-13 05:52:09 +08:00
|
|
|
PHPAPI int php_stream_sock_ssl_activate_with_method(php_stream *stream, int activate, SSL_METHOD *method, php_stream *session_stream TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
2002-03-16 09:58:13 +08:00
|
|
|
php_netstream_data_t *sock = (php_netstream_data_t*)stream->abstract;
|
2002-09-09 06:26:11 +08:00
|
|
|
php_netstream_data_t *psock = NULL;
|
2002-03-16 09:58:13 +08:00
|
|
|
SSL_CTX *ctx = NULL;
|
2002-03-16 05:03:08 +08:00
|
|
|
|
2002-09-09 06:26:11 +08:00
|
|
|
|
2002-08-11 19:25:24 +08:00
|
|
|
if (!php_stream_is(stream, PHP_STREAM_IS_SOCKET)) {
|
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "php_stream_sock_ssl_activate_with_method: stream is not a network stream");
|
2002-03-16 05:03:08 +08:00
|
|
|
return FAILURE;
|
2002-08-11 19:25:24 +08:00
|
|
|
}
|
2002-09-13 05:52:09 +08:00
|
|
|
|
|
|
|
if (session_stream) {
|
|
|
|
if (!php_stream_is(session_stream, PHP_STREAM_IS_SOCKET)) {
|
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "php_stream_sock_ssl_activate_with_method: session_stream is not a network stream");
|
|
|
|
return FAILURE;
|
|
|
|
}
|
|
|
|
psock = (php_netstream_data_t*)session_stream->abstract;
|
|
|
|
}
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
if (activate == sock->ssl_active)
|
|
|
|
return SUCCESS; /* already in desired mode */
|
|
|
|
|
|
|
|
if (activate && sock->ssl_handle == NULL) {
|
|
|
|
ctx = SSL_CTX_new(method);
|
2002-08-11 19:25:24 +08:00
|
|
|
if (ctx == NULL) {
|
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "php_stream_sock_ssl_activate_with_method: failed to create an SSL context");
|
2002-03-16 05:03:08 +08:00
|
|
|
return FAILURE;
|
2002-08-11 19:25:24 +08:00
|
|
|
}
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
sock->ssl_handle = SSL_new(ctx);
|
|
|
|
if (sock->ssl_handle == NULL) {
|
2002-08-11 19:25:24 +08:00
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "php_stream_sock_ssl_activate_with_method: failed to create an SSL handle");
|
2002-03-16 05:03:08 +08:00
|
|
|
SSL_CTX_free(ctx);
|
|
|
|
return FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
SSL_set_fd(sock->ssl_handle, sock->socket);
|
2002-09-09 06:26:11 +08:00
|
|
|
|
|
|
|
if (psock) {
|
|
|
|
SSL_copy_session_id(sock->ssl_handle, psock->ssl_handle);
|
|
|
|
}
|
2002-03-16 05:03:08 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (activate) {
|
|
|
|
if (SSL_connect(sock->ssl_handle) <= 0) {
|
2002-08-11 19:25:24 +08:00
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "php_stream_sock_ssl_activate_with_method: SSL handshake/connection failed");
|
2002-03-16 05:03:08 +08:00
|
|
|
SSL_shutdown(sock->ssl_handle);
|
|
|
|
return FAILURE;
|
|
|
|
}
|
|
|
|
sock->ssl_active = activate;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
SSL_shutdown(sock->ssl_handle);
|
|
|
|
sock->ssl_active = 0;
|
|
|
|
}
|
|
|
|
return SUCCESS;
|
|
|
|
}
|
2002-09-09 06:26:11 +08:00
|
|
|
|
2002-03-16 05:03:08 +08:00
|
|
|
#endif
|
|
|
|
|
2002-03-19 02:54:32 +08:00
|
|
|
PHPAPI void php_stream_sock_set_timeout(php_stream *stream, struct timeval *timeout TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
2002-03-16 09:58:13 +08:00
|
|
|
php_netstream_data_t *sock = (php_netstream_data_t*)stream->abstract;
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
if (!php_stream_is(stream, PHP_STREAM_IS_SOCKET))
|
|
|
|
return;
|
|
|
|
|
|
|
|
sock->timeout = *timeout;
|
|
|
|
sock->timeout_event = 0;
|
|
|
|
}
|
|
|
|
|
2002-08-10 11:03:03 +08:00
|
|
|
PHPAPI int php_set_sock_blocking(int socketd, int block TSRMLS_DC)
|
2002-08-10 05:02:36 +08:00
|
|
|
{
|
|
|
|
int ret = SUCCESS;
|
|
|
|
int flags;
|
|
|
|
int myflag = 0;
|
|
|
|
|
|
|
|
#ifdef PHP_WIN32
|
|
|
|
/* with ioctlsocket, a non-zero sets nonblocking, a zero sets blocking */
|
|
|
|
flags = !block;
|
|
|
|
if (ioctlsocket(socketd, FIONBIO, &flags)==SOCKET_ERROR){
|
2002-08-26 02:45:02 +08:00
|
|
|
php_error_docref(NULL TSRMLS_CC, E_WARNING, "%s", WSAGetLastError());
|
2002-08-10 05:02:36 +08:00
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
flags = fcntl(socketd, F_GETFL);
|
|
|
|
#ifdef O_NONBLOCK
|
|
|
|
myflag = O_NONBLOCK; /* POSIX version */
|
|
|
|
#elif defined(O_NDELAY)
|
|
|
|
myflag = O_NDELAY; /* old non-POSIX version */
|
|
|
|
#endif
|
|
|
|
if (!block) {
|
|
|
|
flags |= myflag;
|
|
|
|
} else {
|
2002-09-23 09:47:04 +08:00
|
|
|
flags &= ~myflag;
|
2002-08-10 05:02:36 +08:00
|
|
|
}
|
|
|
|
fcntl(socketd, F_SETFL, flags);
|
|
|
|
#endif
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2002-03-19 02:54:32 +08:00
|
|
|
PHPAPI size_t php_stream_sock_set_chunk_size(php_stream *stream, size_t size TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
|
|
|
size_t oldsize;
|
|
|
|
|
2002-09-23 09:47:04 +08:00
|
|
|
oldsize = stream->chunk_size;
|
|
|
|
stream->chunk_size = size;
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
return oldsize;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define TOREAD(sock) ((sock)->writepos - (sock)->readpos)
|
|
|
|
#define READPTR(sock) ((sock)->readbuf + (sock)->readpos)
|
|
|
|
#define WRITEPTR(sock) ((sock)->readbuf + (sock)->writepos)
|
|
|
|
|
2002-03-19 02:54:32 +08:00
|
|
|
static size_t php_sockop_write(php_stream *stream, const char *buf, size_t count TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
2002-03-16 09:58:13 +08:00
|
|
|
php_netstream_data_t *sock = (php_netstream_data_t*)stream->abstract;
|
2002-04-11 06:42:32 +08:00
|
|
|
size_t didwrite;
|
|
|
|
|
2002-03-16 05:03:08 +08:00
|
|
|
#if HAVE_OPENSSL_EXT
|
|
|
|
if (sock->ssl_active)
|
2002-04-11 06:42:32 +08:00
|
|
|
didwrite = SSL_write(sock->ssl_handle, buf, count);
|
|
|
|
else
|
2002-03-16 05:03:08 +08:00
|
|
|
#endif
|
2002-04-11 06:42:32 +08:00
|
|
|
didwrite = send(sock->socket, buf, count, 0);
|
|
|
|
|
|
|
|
php_stream_notify_progress_increment(stream->context, didwrite, 0);
|
|
|
|
|
|
|
|
return didwrite;
|
2002-03-16 05:03:08 +08:00
|
|
|
}
|
2002-04-16 04:11:12 +08:00
|
|
|
|
|
|
|
#if ZEND_DEBUG && DEBUG_MAIN_NETWORK
|
|
|
|
static inline void dump_sock_state(char *msg, php_netstream_data_t *sock TSRMLS_DC)
|
|
|
|
{
|
2002-04-30 08:16:00 +08:00
|
|
|
printf("%s: blocked=%d timeout_event=%d eof=%d inbuf=%d timeout=%d\n", msg, sock->is_blocked, sock->timeout_event, sock->eof, TOREAD(sock), sock->timeout);
|
2002-04-16 04:11:12 +08:00
|
|
|
}
|
|
|
|
# define DUMP_SOCK_STATE(msg, sock) dump_sock_state(msg, sock TSRMLS_CC)
|
|
|
|
#else
|
|
|
|
# define DUMP_SOCK_STATE(msg, sock) /* nothing */
|
|
|
|
#endif
|
|
|
|
|
2002-03-19 02:54:32 +08:00
|
|
|
static void php_sock_stream_wait_for_data(php_stream *stream, php_netstream_data_t *sock TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
2002-04-30 08:20:34 +08:00
|
|
|
fd_set fdr, tfdr;
|
2002-03-16 05:03:08 +08:00
|
|
|
int retval;
|
|
|
|
struct timeval timeout, *ptimeout;
|
|
|
|
|
|
|
|
FD_ZERO(&fdr);
|
|
|
|
FD_SET(sock->socket, &fdr);
|
|
|
|
sock->timeout_event = 0;
|
|
|
|
|
|
|
|
if (sock->timeout.tv_sec == -1)
|
|
|
|
ptimeout = NULL;
|
|
|
|
else
|
|
|
|
ptimeout = &timeout;
|
|
|
|
|
2002-04-16 04:11:12 +08:00
|
|
|
|
2002-03-16 05:03:08 +08:00
|
|
|
while(1) {
|
|
|
|
tfdr = fdr;
|
|
|
|
timeout = sock->timeout;
|
|
|
|
|
2002-04-16 04:11:12 +08:00
|
|
|
DUMP_SOCK_STATE("wait_for_data", sock);
|
|
|
|
|
2002-04-30 08:20:34 +08:00
|
|
|
retval = select(sock->socket + 1, &tfdr, NULL, NULL, ptimeout);
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
if (retval == 0)
|
|
|
|
sock->timeout_event = 1;
|
|
|
|
|
|
|
|
if (retval >= 0)
|
|
|
|
break;
|
|
|
|
}
|
2002-04-16 04:11:12 +08:00
|
|
|
DUMP_SOCK_STATE("wait_for_data: done", sock);
|
2002-03-16 05:03:08 +08:00
|
|
|
}
|
|
|
|
|
2002-03-19 02:54:32 +08:00
|
|
|
static size_t php_sockop_read(php_stream *stream, char *buf, size_t count TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
2002-03-16 09:58:13 +08:00
|
|
|
php_netstream_data_t *sock = (php_netstream_data_t*)stream->abstract;
|
2002-09-23 09:47:04 +08:00
|
|
|
size_t nr_bytes = 0;
|
2002-03-16 05:03:08 +08:00
|
|
|
|
2002-03-19 11:49:03 +08:00
|
|
|
if (buf == NULL && count == 0) {
|
|
|
|
/* check for EOF condition */
|
2002-08-10 05:02:36 +08:00
|
|
|
|
2002-04-16 04:11:12 +08:00
|
|
|
DUMP_SOCK_STATE("check for EOF", sock);
|
2002-03-19 11:49:03 +08:00
|
|
|
|
|
|
|
if (sock->eof)
|
|
|
|
return EOF;
|
|
|
|
|
|
|
|
/* no data in the buffer - lets examine the socket */
|
2002-08-10 05:02:36 +08:00
|
|
|
#if HAVE_SYS_POLL_H && HAVE_POLL
|
2002-03-19 11:49:03 +08:00
|
|
|
{
|
|
|
|
struct pollfd topoll;
|
|
|
|
|
|
|
|
topoll.fd = sock->socket;
|
|
|
|
topoll.events = POLLIN;
|
|
|
|
topoll.revents = 0;
|
|
|
|
|
|
|
|
if (poll(&topoll, 1, 0) == 1) {
|
|
|
|
return topoll.revents & POLLHUP ? EOF : 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2002-09-23 09:47:04 +08:00
|
|
|
/* presume that we are not yet at the eof */
|
2002-03-19 11:49:03 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2002-09-23 09:47:04 +08:00
|
|
|
|
|
|
|
if(sock->is_blocked) {
|
|
|
|
php_sock_stream_wait_for_data(stream, sock TSRMLS_CC);
|
|
|
|
if (sock->timeout_event)
|
|
|
|
return 0;
|
2002-03-19 11:49:03 +08:00
|
|
|
}
|
2002-03-16 05:03:08 +08:00
|
|
|
|
2002-09-23 09:47:04 +08:00
|
|
|
#if HAVE_OPENSSL_EXT
|
|
|
|
if (sock->ssl_active)
|
|
|
|
nr_bytes = SSL_read(sock->ssl_handle, buf, count);
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
|
|
|
|
nr_bytes = recv(sock->socket, buf, count, 0);
|
|
|
|
|
|
|
|
php_stream_notify_progress_increment(stream->context, nr_bytes, 0);
|
2002-03-16 05:03:08 +08:00
|
|
|
|
2002-09-23 09:47:04 +08:00
|
|
|
if(nr_bytes == 0 || (nr_bytes < 0 && streams_socket_errno != EWOULDBLOCK)) {
|
|
|
|
sock->eof = 1;
|
2002-03-16 05:03:08 +08:00
|
|
|
}
|
2002-09-23 09:47:04 +08:00
|
|
|
|
|
|
|
return nr_bytes;
|
2002-03-16 05:03:08 +08:00
|
|
|
}
|
|
|
|
|
2002-09-23 09:47:04 +08:00
|
|
|
|
2002-03-19 02:54:32 +08:00
|
|
|
static int php_sockop_close(php_stream *stream, int close_handle TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
2002-03-16 09:58:13 +08:00
|
|
|
php_netstream_data_t *sock = (php_netstream_data_t*)stream->abstract;
|
2002-03-16 05:03:08 +08:00
|
|
|
|
2002-03-16 22:39:51 +08:00
|
|
|
if (close_handle) {
|
2002-03-16 05:03:08 +08:00
|
|
|
#if HAVE_OPENSSL_EXT
|
2002-03-16 22:39:51 +08:00
|
|
|
if (sock->ssl_active) {
|
|
|
|
SSL_shutdown(sock->ssl_handle);
|
|
|
|
sock->ssl_active = 0;
|
2002-04-16 04:11:12 +08:00
|
|
|
}
|
|
|
|
if (sock->ssl_handle) {
|
2002-03-16 22:39:51 +08:00
|
|
|
SSL_free(sock->ssl_handle);
|
|
|
|
sock->ssl_handle = NULL;
|
|
|
|
}
|
2002-03-16 05:03:08 +08:00
|
|
|
#endif
|
|
|
|
|
2002-03-16 22:39:51 +08:00
|
|
|
shutdown(sock->socket, 0);
|
|
|
|
closesocket(sock->socket);
|
|
|
|
|
|
|
|
}
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
pefree(sock, php_stream_is_persistent(stream));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2002-03-19 02:54:32 +08:00
|
|
|
static int php_sockop_flush(php_stream *stream TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
2002-03-16 09:58:13 +08:00
|
|
|
php_netstream_data_t *sock = (php_netstream_data_t*)stream->abstract;
|
2002-03-16 05:03:08 +08:00
|
|
|
return fsync(sock->socket);
|
|
|
|
}
|
|
|
|
|
2002-03-28 08:49:00 +08:00
|
|
|
static int php_sockop_stat(php_stream *stream, php_stream_statbuf *ssb TSRMLS_DC)
|
|
|
|
{
|
|
|
|
php_netstream_data_t *sock = (php_netstream_data_t*)stream->abstract;
|
|
|
|
return fstat(sock->socket, &ssb->sb);
|
|
|
|
}
|
|
|
|
|
2002-08-20 06:59:10 +08:00
|
|
|
static int php_sockop_set_option(php_stream *stream, int option, int value, void *ptrparam TSRMLS_DC)
|
|
|
|
{
|
|
|
|
int oldmode;
|
|
|
|
php_netstream_data_t *sock = (php_netstream_data_t*)stream->abstract;
|
|
|
|
|
|
|
|
switch(option) {
|
|
|
|
case PHP_STREAM_OPTION_BLOCKING:
|
|
|
|
|
|
|
|
oldmode = sock->is_blocked;
|
|
|
|
|
|
|
|
/* no need to change anything */
|
|
|
|
if (value == oldmode)
|
|
|
|
return oldmode;
|
|
|
|
|
|
|
|
if (SUCCESS == php_set_sock_blocking(sock->socket, value TSRMLS_CC)) {
|
|
|
|
sock->is_blocked = value;
|
|
|
|
return oldmode;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-03-19 02:54:32 +08:00
|
|
|
static int php_sockop_cast(php_stream *stream, int castas, void **ret TSRMLS_DC)
|
2002-03-16 05:03:08 +08:00
|
|
|
{
|
2002-03-16 09:58:13 +08:00
|
|
|
php_netstream_data_t *sock = (php_netstream_data_t*)stream->abstract;
|
2002-03-16 05:03:08 +08:00
|
|
|
|
|
|
|
switch(castas) {
|
|
|
|
case PHP_STREAM_AS_STDIO:
|
|
|
|
#if HAVE_OPENSSL_EXT
|
|
|
|
if (sock->ssl_active)
|
|
|
|
return FAILURE;
|
|
|
|
#endif
|
|
|
|
if (ret) {
|
|
|
|
*ret = fdopen(sock->socket, stream->mode);
|
|
|
|
if (*ret)
|
|
|
|
return SUCCESS;
|
|
|
|
return FAILURE;
|
|
|
|
}
|
|
|
|
return SUCCESS;
|
|
|
|
case PHP_STREAM_AS_FD:
|
|
|
|
case PHP_STREAM_AS_SOCKETD:
|
|
|
|
#if HAVE_OPENSSL_EXT
|
|
|
|
if (sock->ssl_active)
|
|
|
|
return FAILURE;
|
|
|
|
#endif
|
|
|
|
if (ret)
|
|
|
|
*ret = (void*)sock->socket;
|
|
|
|
return SUCCESS;
|
|
|
|
default:
|
|
|
|
return FAILURE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
php_stream_ops php_stream_socket_ops = {
|
|
|
|
php_sockop_write, php_sockop_read,
|
|
|
|
php_sockop_close, php_sockop_flush,
|
2002-03-28 08:49:00 +08:00
|
|
|
"socket",
|
2002-09-23 09:47:04 +08:00
|
|
|
NULL, /* seek */
|
2002-03-16 05:03:08 +08:00
|
|
|
php_sockop_cast,
|
2002-08-20 06:59:10 +08:00
|
|
|
php_sockop_stat,
|
|
|
|
php_sockop_set_option
|
2002-03-16 05:03:08 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2000-09-03 17:30:41 +08:00
|
|
|
/*
|
|
|
|
* Local variables:
|
|
|
|
* tab-width: 8
|
|
|
|
* c-basic-offset: 8
|
|
|
|
* End:
|
2001-09-09 21:29:31 +08:00
|
|
|
* vim600: sw=4 ts=4 fdm=marker
|
|
|
|
* vim<600: sw=4 ts=4
|
2000-09-03 17:30:41 +08:00
|
|
|
*/
|