cpython/Modules/socketmodule.c

3649 lines
89 KiB
C
Raw Normal View History

1991-06-25 18:36:08 -03:00
/* Socket module */
/* SSL support based on patches by Brian E Gallew and Laszlo Kovacs */
1991-06-25 18:36:08 -03:00
/*
This module provides an interface to Berkeley socket IPC.
Limitations:
- only AF_INET, AF_INET6 and AF_UNIX address families are supported in a
portable manner, though AF_PACKET is supported under Linux.
1991-07-27 18:42:02 -03:00
- no read/write operations (use send/recv or makefile instead)
- additional restrictions apply on Windows
1991-06-25 18:36:08 -03:00
1995-03-16 11:43:47 -04:00
Module interface:
1991-06-25 18:36:08 -03:00
1995-03-16 11:43:47 -04:00
- socket.error: exception raised for socket specific errors
- socket.gaierror: exception raised for getaddrinfo/getnameinfo errors,
a subclass of socket.error
- socket.herror: exception raised for gethostby* errors,
a subclass of socket.error
- socket.gethostbyname(hostname) --> host IP address (string: 'dd.dd.dd.dd')
- socket.gethostbyaddr(IP address) --> (hostname, [alias, ...], [IP addr, ...])
1995-03-16 11:43:47 -04:00
- socket.gethostname() --> host name (string: 'spam' or 'spam.domain.com')
- socket.getprotobyname(protocolname) --> protocol number
1995-03-16 11:43:47 -04:00
- socket.getservbyname(servicename, protocolname) --> port number
- socket.socket(family, type [, proto]) --> new socket object
- socket.ntohs(16 bit value) --> new int object
- socket.ntohl(32 bit value) --> new int object
- socket.htons(16 bit value) --> new int object
- socket.htonl(32 bit value) --> new int object
- socket.getaddrinfo(host, port [, family, socktype, proto, flags])
--> List of (family, socktype, proto, canonname, sockaddr)
- socket.getnameinfo(sockaddr, flags) --> (host, port)
1995-03-16 11:43:47 -04:00
- socket.AF_INET, socket.SOCK_STREAM, etc.: constants from <socket.h>
- socket.inet_aton(IP address) -> 32-bit packed IP representation
- socket.inet_ntoa(packed IP) -> IP address string
- socket.ssl(socket, keyfile, certfile) -> new ssl object
1991-06-25 18:36:08 -03:00
- an Internet socket address is a pair (hostname, port)
where hostname can be anything recognized by gethostbyname()
(including the dd.dd.dd.dd notation) and port is in host byte order
- where a hostname is returned, the dd.dd.dd.dd notation is used
1995-03-16 11:43:47 -04:00
- a UNIX domain socket address is a string specifying the pathname
- an AF_PACKET socket address is a tuple containing a string
specifying the ethernet interface and an integer specifying
the Ethernet protocol number to be received. For example:
("eth0",0x1234). Optional 3rd,4th,5th elements in the tuple
specify packet-type and ha-type/addr -- these are ignored by
networking code, but accepted since they are returned by the
getsockname() method.
1991-06-25 18:36:08 -03:00
Socket methods:
1991-07-27 18:42:02 -03:00
- s.accept() --> new socket object, sockaddr
- s.bind(sockaddr) --> None
1995-03-16 11:43:47 -04:00
- s.close() --> None
- s.connect(sockaddr) --> None
- s.connect_ex(sockaddr) --> 0 or errno (handy for e.g. async connect)
1995-03-16 11:43:47 -04:00
- s.fileno() --> file descriptor
- s.dup() --> same as socket.fromfd(os.dup(s.fileno(), ...)
- s.getpeername() --> sockaddr
1995-03-16 11:43:47 -04:00
- s.getsockname() --> sockaddr
- s.getsockopt(level, optname[, buflen]) --> int or string
- s.listen(backlog) --> None
- s.makefile([mode[, bufsize]]) --> file object
1995-03-16 11:43:47 -04:00
- s.recv(buflen [,flags]) --> string
- s.recvfrom(buflen [,flags]) --> string, sockaddr
- s.send(string [,flags]) --> nbytes
- s.sendto(string, [flags,] sockaddr) --> nbytes
1995-03-16 11:43:47 -04:00
- s.setblocking(0 | 1) --> None
- s.setsockopt(level, optname, value) --> None
- s.shutdown(how) --> None
- repr(s) --> "<socket object, fd=%d, family=%d, type=%d, protocol=%d>"
1991-06-25 18:36:08 -03:00
*/
1994-10-10 14:59:00 -03:00
#include "Python.h"
/* Hacks for gethostbyname_r(). On some non-Linux platforms, the configure
script doesn't get this right, so we hardcode some platform checks below.
On the other hand, not all Linux versions agree, so there the settings
computed by the configure script are needed! */
#ifndef linux
#undef HAVE_GETHOSTBYNAME_R_3_ARG
#undef HAVE_GETHOSTBYNAME_R_5_ARG
#undef HAVE_GETHOSTBYNAME_R_6_ARG
#endif
#ifndef WITH_THREAD
#undef HAVE_GETHOSTBYNAME_R
#endif
#ifdef HAVE_GETHOSTBYNAME_R
#if defined(_AIX) || defined(__osf__)
#define HAVE_GETHOSTBYNAME_R_3_ARG
#elif defined(__sun) || defined(__sgi)
#define HAVE_GETHOSTBYNAME_R_5_ARG
#elif defined(linux)
/* Rely on the configure script */
#else
#undef HAVE_GETHOSTBYNAME_R
#endif
#endif
#if !defined(HAVE_GETHOSTBYNAME_R) && defined(WITH_THREAD) && !defined(MS_WINDOWS)
#define USE_GETHOSTBYNAME_LOCK
#endif
#ifdef USE_GETHOSTBYNAME_LOCK
1998-10-01 17:42:43 -03:00
#include "pythread.h"
#endif
1991-06-25 18:36:08 -03:00
1996-12-05 19:43:35 -04:00
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
1997-11-22 17:53:48 -04:00
#if defined(PYCC_VACPP)
#include <types.h>
#include <io.h>
#include <sys/ioctl.h>
#include <utils.h>
#include <ctype.h>
#endif
#if defined(PYOS_OS2)
#define INCL_DOS
#define INCL_DOSERRORS
#define INCL_NOPMAPI
#include <os2.h>
#endif
2001-03-02 02:34:14 -04:00
#ifdef RISCOS
#define NO_DUP
#undef off_t
#undef uid_t
#undef gid_t
#undef errno
#include <signal.h>
#include "socklib.h"
#include "inetlib.h"
#include "netdb.h"
#include "unixlib.h"
#include "netinet/in.h"
#include "sys/ioctl.h"
#else /*RISCOS*/
#include <sys/types.h>
1991-07-27 18:42:02 -03:00
#include <signal.h>
1996-06-28 17:15:15 -03:00
#ifndef MS_WINDOWS
#include <netdb.h>
1991-06-25 18:36:08 -03:00
#include <sys/socket.h>
#include <netinet/in.h>
#if !(defined(__BEOS__) || defined(__CYGWIN__))
#include <netinet/tcp.h>
#endif
/* Headers needed for inet_ntoa() and inet_addr() */
#ifdef __BEOS__
#include <net/netdb.h>
#else
#ifndef USE_GUSI1
#include <arpa/inet.h>
#endif
#endif
#include <fcntl.h>
#else
#include <winsock.h>
#include <fcntl.h>
#endif
2001-03-02 02:34:14 -04:00
#endif /*RISCOS*/
#ifdef HAVE_SYS_UN_H
1991-06-25 18:36:08 -03:00
#include <sys/un.h>
#else
#undef AF_UNIX
#endif
#ifdef HAVE_NETPACKET_PACKET_H
#include <sys/ioctl.h>
#include <net/if.h>
#include <netpacket/packet.h>
#endif
2001-06-24 18:28:42 -03:00
#ifdef HAVE_STDDEF_H
#include <stddef.h>
#endif
#ifndef offsetof
#define offsetof(type, member) ((size_t)(&((type *)0)->member))
#endif
#ifndef O_NDELAY
#define O_NDELAY O_NONBLOCK /* For QNX only? */
#endif
#ifdef USE_GUSI1
1996-02-14 11:57:45 -04:00
/* fdopen() isn't declared in stdio.h (sigh) */
#include <GUSI.h>
#endif
#include "addrinfo.h"
#ifdef USE_SSL
#include "openssl/rsa.h"
#include "openssl/crypto.h"
#include "openssl/x509.h"
#include "openssl/pem.h"
#include "openssl/ssl.h"
#include "openssl/err.h"
#include "openssl/rand.h"
#endif /* USE_SSL */
#ifndef HAVE_INET_PTON
int inet_pton (int af, const char *src, void *dst);
const char *inet_ntop(int af, const void *src, char *dst, socklen_t size);
#endif
#ifdef __APPLE__
/* On OS X, getaddrinfo returns no error indication of lookup
failure, so we must use the emulation instead of the libinfo
implementation. Unfortunately, performing an autoconf test
for this bug would require DNS access for the machine performing
the configuration, which is not acceptable. Therefore, we
determine the bug just by checking for __APPLE__. If this bug
gets ever fixed, perhaps checking for sys/version.h would be
appropriate, which is 10/0 on the system with the bug. */
#undef HAVE_GETADDRINFO
/* avoid clashes with the C library definition of the symbol. */
#define getaddrinfo fake_getaddrinfo
#endif
/* I know this is a bad practice, but it is the easiest... */
#if !defined(HAVE_GETADDRINFO)
#include "getaddrinfo.c"
#endif
#if !defined(HAVE_GETNAMEINFO)
#include "getnameinfo.c"
#endif
#if defined(MS_WINDOWS) || defined(__BEOS__)
/* BeOS suffers from the same socket dichotomy as Win32... - [cjh] */
/* seem to be a few differences in the API */
#define SOCKETCLOSE closesocket
#define NO_DUP /* Actually it exists on NT 3.5, but what the heck... */
#endif
/* abstract the socket file descriptor type */
#ifdef MS_WINDOWS
typedef SOCKET SOCKET_T;
# ifdef MS_WIN64
# define SIZEOF_SOCKET_T 8
# else
# define SIZEOF_SOCKET_T 4
# endif
#else
typedef int SOCKET_T;
# define SIZEOF_SOCKET_T SIZEOF_INT
#endif
#ifdef MS_WIN32
# define EAFNOSUPPORT WSAEAFNOSUPPORT
# define snprintf _snprintf
#endif
1997-11-22 17:53:48 -04:00
#if defined(PYOS_OS2)
#define SOCKETCLOSE soclose
1997-11-22 17:53:48 -04:00
#define NO_DUP /* Sockets are Not Actual File Handles under OS/2 */
#endif
#ifndef SOCKETCLOSE
#define SOCKETCLOSE close
#endif
/* Global variable holding the exception type for errors detected
by this module (but not argument type or memory errors, etc.). */
1994-10-10 14:59:00 -03:00
static PyObject *PySocket_Error;
static PyObject *PyH_Error;
static PyObject *PyGAI_Error;
#ifdef USE_SSL
static PyObject *PySSLErrorObject;
#endif /* USE_SSL */
2001-03-02 02:34:14 -04:00
#ifdef RISCOS
/* Global variable which is !=0 if Python is running in a RISC OS taskwindow */
static int taskwindow;
#endif
/* Convenience function to raise an error according to errno
and return a NULL pointer from a function. */
1991-06-25 18:36:08 -03:00
1994-10-10 14:59:00 -03:00
static PyObject *
PySocket_Err(void)
1991-06-25 18:36:08 -03:00
{
#ifdef MS_WINDOWS
int err_no = WSAGetLastError();
if (err_no) {
static struct { int no; const char *msg; } *msgp, msgs[] = {
{ WSAEINTR, "Interrupted system call" },
{ WSAEBADF, "Bad file descriptor" },
{ WSAEACCES, "Permission denied" },
{ WSAEFAULT, "Bad address" },
{ WSAEINVAL, "Invalid argument" },
{ WSAEMFILE, "Too many open files" },
2001-03-02 02:34:14 -04:00
{ WSAEWOULDBLOCK,
"The socket operation could not complete "
"without blocking" },
{ WSAEINPROGRESS, "Operation now in progress" },
{ WSAEALREADY, "Operation already in progress" },
{ WSAENOTSOCK, "Socket operation on non-socket" },
{ WSAEDESTADDRREQ, "Destination address required" },
{ WSAEMSGSIZE, "Message too long" },
{ WSAEPROTOTYPE, "Protocol wrong type for socket" },
{ WSAENOPROTOOPT, "Protocol not available" },
{ WSAEPROTONOSUPPORT, "Protocol not supported" },
{ WSAESOCKTNOSUPPORT, "Socket type not supported" },
{ WSAEOPNOTSUPP, "Operation not supported" },
{ WSAEPFNOSUPPORT, "Protocol family not supported" },
{ WSAEAFNOSUPPORT, "Address family not supported" },
{ WSAEADDRINUSE, "Address already in use" },
{ WSAEADDRNOTAVAIL,
"Can't assign requested address" },
{ WSAENETDOWN, "Network is down" },
{ WSAENETUNREACH, "Network is unreachable" },
2001-03-02 02:34:14 -04:00
{ WSAENETRESET,
"Network dropped connection on reset" },
2001-03-02 02:34:14 -04:00
{ WSAECONNABORTED,
"Software caused connection abort" },
{ WSAECONNRESET, "Connection reset by peer" },
{ WSAENOBUFS, "No buffer space available" },
{ WSAEISCONN, "Socket is already connected" },
{ WSAENOTCONN, "Socket is not connected" },
{ WSAESHUTDOWN, "Can't send after socket shutdown" },
{ WSAETOOMANYREFS,
"Too many references: can't splice" },
{ WSAETIMEDOUT, "Operation timed out" },
{ WSAECONNREFUSED, "Connection refused" },
{ WSAELOOP, "Too many levels of symbolic links" },
{ WSAENAMETOOLONG, "File name too long" },
{ WSAEHOSTDOWN, "Host is down" },
{ WSAEHOSTUNREACH, "No route to host" },
{ WSAENOTEMPTY, "Directory not empty" },
{ WSAEPROCLIM, "Too many processes" },
{ WSAEUSERS, "Too many users" },
{ WSAEDQUOT, "Disc quota exceeded" },
{ WSAESTALE, "Stale NFS file handle" },
{ WSAEREMOTE, "Too many levels of remote in path" },
{ WSASYSNOTREADY,
"Network subsystem is unvailable" },
{ WSAVERNOTSUPPORTED,
"WinSock version is not supported" },
2001-03-02 02:34:14 -04:00
{ WSANOTINITIALISED,
"Successful WSAStartup() not yet performed" },
{ WSAEDISCON, "Graceful shutdown in progress" },
/* Resolver errors */
{ WSAHOST_NOT_FOUND, "No such host is known" },
{ WSATRY_AGAIN, "Host not found, or server failed" },
{ WSANO_RECOVERY,
"Unexpected server error encountered" },
{ WSANO_DATA, "Valid name without requested data" },
{ WSANO_ADDRESS, "No address, look for MX record" },
{ 0, NULL }
};
1994-10-10 14:59:00 -03:00
PyObject *v;
const char *msg = "winsock error";
2001-03-02 02:34:14 -04:00
for (msgp = msgs; msgp->msg; msgp++) {
if (err_no == msgp->no) {
msg = msgp->msg;
break;
}
}
v = Py_BuildValue("(is)", err_no, msg);
if (v != NULL) {
1994-10-10 14:59:00 -03:00
PyErr_SetObject(PySocket_Error, v);
Py_DECREF(v);
}
return NULL;
}
else
#endif
1997-11-22 17:53:48 -04:00
#if defined(PYOS_OS2)
if (sock_errno() != NO_ERROR) {
APIRET rc;
ULONG msglen;
char outbuf[100];
int myerrorcode = sock_errno();
/* Retrieve Socket-Related Error Message from MPTN.MSG File */
rc = DosGetMessage(NULL, 0, outbuf, sizeof(outbuf),
myerrorcode - SOCBASEERR + 26, "mptn.msg", &msglen);
if (rc == NO_ERROR) {
PyObject *v;
outbuf[msglen] = '\0'; /* OS/2 Doesn't Guarantee a Terminator */
if (strlen(outbuf) > 0) { /* If Non-Empty Msg, Trim CRLF */
char *lastc = &outbuf[ strlen(outbuf)-1 ];
while (lastc > outbuf && isspace(*lastc))
*lastc-- = '\0'; /* Trim Trailing Whitespace (CRLF) */
}
v = Py_BuildValue("(is)", myerrorcode, outbuf);
if (v != NULL) {
PyErr_SetObject(PySocket_Error, v);
Py_DECREF(v);
}
return NULL;
}
}
#endif
1994-10-10 14:59:00 -03:00
return PyErr_SetFromErrno(PySocket_Error);
1991-06-25 18:36:08 -03:00
}
static PyObject *
PyH_Err(int h_error)
{
PyObject *v;
#ifdef HAVE_HSTRERROR
v = Py_BuildValue("(is)", h_error, (char *)hstrerror(h_error));
#else
v = Py_BuildValue("(is)", h_error, "host not found");
#endif
if (v != NULL) {
PyErr_SetObject(PyH_Error, v);
Py_DECREF(v);
}
return NULL;
}
static PyObject *
PyGAI_Err(int error)
{
PyObject *v;
if (error == EAI_SYSTEM)
return PySocket_Err();
#ifdef HAVE_GAI_STRERROR
v = Py_BuildValue("(is)", error, gai_strerror(error));
#else
v = Py_BuildValue("(is)", error, "getaddrinfo failed");
#endif
if (v != NULL) {
PyErr_SetObject(PyGAI_Error, v);
Py_DECREF(v);
}
return NULL;
}
/* The object holding a socket. It holds some extra information,
like the address family, which is used to decode socket address
arguments properly. */
1991-06-25 18:36:08 -03:00
typedef struct {
1994-10-10 14:59:00 -03:00
PyObject_HEAD
SOCKET_T sock_fd; /* Socket file descriptor */
int sock_family; /* Address family, e.g., AF_INET */
int sock_type; /* Socket type, e.g., SOCK_STREAM */
int sock_proto; /* Protocol type, usually 0 */
union sock_addr {
struct sockaddr_in in;
#ifdef AF_UNIX
struct sockaddr_un un;
#endif
#ifdef INET6
struct sockaddr_in6 in6;
struct sockaddr_storage storage;
#endif
#ifdef HAVE_NETPACKET_PACKET_H
struct sockaddr_ll ll;
2001-03-02 02:34:14 -04:00
#endif
} sock_addr;
1994-10-10 14:59:00 -03:00
} PySocketSockObject;
1991-06-25 18:36:08 -03:00
#ifdef USE_SSL
#define X509_NAME_MAXLEN 256
typedef struct {
PyObject_HEAD
PySocketSockObject *Socket; /* Socket on which we're layered */
SSL_CTX* ctx;
SSL* ssl;
X509* server_cert;
BIO* sbio;
char server[X509_NAME_MAXLEN];
char issuer[X509_NAME_MAXLEN];
} PySSLObject;
staticforward PyTypeObject PySSL_Type;
staticforward PyObject *PySSL_SSLwrite(PySSLObject *self, PyObject *args);
staticforward PyObject *PySSL_SSLread(PySSLObject *self, PyObject *args);
#define PySSLObject_Check(v) ((v)->ob_type == &PySSL_Type)
#endif /* USE_SSL */
2001-03-02 02:34:14 -04:00
/* A forward reference to the Socktype type object.
The Socktype variable contains pointers to various functions,
1994-10-10 14:59:00 -03:00
some of which call newsockobject(), which uses Socktype, so
there has to be a circular reference. */
1994-10-10 14:59:00 -03:00
staticforward PyTypeObject PySocketSock_Type;
1991-06-25 18:36:08 -03:00
/* Create a new socket object.
This just creates the object and initializes it.
If the creation fails, return NULL and set an exception (implicit
in NEWOBJ()). */
1994-10-10 14:59:00 -03:00
static PySocketSockObject *
PySocketSock_New(SOCKET_T fd, int family, int type, int proto)
1991-06-25 18:36:08 -03:00
{
2001-03-02 02:34:14 -04:00
#ifdef RISCOS
int block = 1;
#endif
1994-10-10 14:59:00 -03:00
PySocketSockObject *s;
1996-05-23 19:54:50 -03:00
PySocketSock_Type.ob_type = &PyType_Type;
s = PyObject_New(PySocketSockObject, &PySocketSock_Type);
1991-06-25 18:36:08 -03:00
if (s != NULL) {
s->sock_fd = fd;
s->sock_family = family;
s->sock_type = type;
s->sock_proto = proto;
2001-03-02 02:34:14 -04:00
#ifdef RISCOS
if(taskwindow) {
socketioctl(s->sock_fd, 0x80046679, (u_long*)&block);
}
#endif
1991-06-25 18:36:08 -03:00
}
return s;
}
2001-03-02 02:34:14 -04:00
/* Lock to allow python interpreter to continue, but only allow one
thread to be in gethostbyname */
#ifdef USE_GETHOSTBYNAME_LOCK
PyThread_type_lock gethostbyname_lock;
#endif
/* Convert a string specifying a host name or one of a few symbolic
names to a numeric IP address. This usually calls gethostbyname()
to do the work; the names "" and "<broadcast>" are special.
Return the length (IPv4 should be 4 bytes), or negative if
an error occurred; then an exception is raised. */
1991-06-25 18:36:08 -03:00
static int
setipaddr(char* name, struct sockaddr * addr_ret, int af)
1991-06-25 18:36:08 -03:00
{
struct addrinfo hints, *res;
int error;
1991-06-25 18:36:08 -03:00
1996-12-05 19:43:35 -04:00
memset((void *) addr_ret, '\0', sizeof(*addr_ret));
if (name[0] == '\0') {
int siz;
memset(&hints, 0, sizeof(hints));
hints.ai_family = af;
hints.ai_socktype = SOCK_DGRAM; /*dummy*/
hints.ai_flags = AI_PASSIVE;
error = getaddrinfo(NULL, "0", &hints, &res);
if (error) {
PyGAI_Err(error);
return -1;
}
switch (res->ai_family) {
case AF_INET:
siz = 4;
break;
#ifdef INET6
case AF_INET6:
siz = 16;
break;
#endif
default:
freeaddrinfo(res);
PyErr_SetString(PySocket_Error,
"unsupported address family");
return -1;
}
if (res->ai_next) {
PyErr_SetString(PySocket_Error,
"wildcard resolved to multiple address");
return -1;
}
memcpy(addr_ret, res->ai_addr, res->ai_addrlen);
freeaddrinfo(res);
return siz;
1991-06-25 18:36:08 -03:00
}
if (name[0] == '<' && strcmp(name, "<broadcast>") == 0) {
struct sockaddr_in *sin;
if (af != PF_INET && af != PF_UNSPEC) {
PyErr_SetString(PySocket_Error,
"address family mismatched");
return -1;
}
sin = (struct sockaddr_in *)addr_ret;
memset((void *) sin, '\0', sizeof(*sin));
sin->sin_family = AF_INET;
#ifdef HAVE_SOCKADDR_SA_LEN
sin->sin_len = sizeof(*sin);
#endif
sin->sin_addr.s_addr = INADDR_BROADCAST;
return sizeof(sin->sin_addr);
1991-06-25 18:36:08 -03:00
}
memset(&hints, 0, sizeof(hints));
hints.ai_family = af;
error = getaddrinfo(name, NULL, &hints, &res);
if (error) {
PyGAI_Err(error);
return -1;
}
memcpy((char *) addr_ret, res->ai_addr, res->ai_addrlen);
freeaddrinfo(res);
switch (addr_ret->sa_family) {
case AF_INET:
return 4;
#ifdef INET6
case AF_INET6:
return 16;
#endif
default:
PyErr_SetString(PySocket_Error, "unknown address family");
1991-06-25 18:36:08 -03:00
return -1;
}
}
/* Create a string object representing an IP address.
This is always a string of the form 'dd.dd.dd.dd' (with variable
size numbers). */
1994-10-10 14:59:00 -03:00
static PyObject *
makeipaddr(struct sockaddr *addr, int addrlen)
{
char buf[NI_MAXHOST];
int error;
error = getnameinfo(addr, addrlen, buf, sizeof(buf), NULL, 0,
NI_NUMERICHOST);
if (error) {
PyGAI_Err(error);
return NULL;
}
1994-10-10 14:59:00 -03:00
return PyString_FromString(buf);
}
/* Create an object representing the given socket address,
suitable for passing it back to bind(), connect() etc.
The family field of the sockaddr structure is inspected
to determine what kind of address it really is. */
1991-06-25 18:36:08 -03:00
/*ARGSUSED*/
1994-10-10 14:59:00 -03:00
static PyObject *
makesockaddr(int sockfd, struct sockaddr *addr, int addrlen)
1991-06-25 18:36:08 -03:00
{
if (addrlen == 0) {
/* No address -- may be recvfrom() from known socket */
1994-10-10 14:59:00 -03:00
Py_INCREF(Py_None);
return Py_None;
}
#ifdef __BEOS__
/* XXX: BeOS version of accept() doesn't set family correctly */
addr->sa_family = AF_INET;
#endif
switch (addr->sa_family) {
case AF_INET:
{
struct sockaddr_in *a;
PyObject *addrobj = makeipaddr(addr, sizeof(*a));
PyObject *ret = NULL;
if (addrobj) {
a = (struct sockaddr_in *)addr;
ret = Py_BuildValue("Oi", addrobj, ntohs(a->sin_port));
Py_DECREF(addrobj);
}
return ret;
1991-06-25 18:36:08 -03:00
}
#ifdef AF_UNIX
case AF_UNIX:
{
1991-06-25 18:36:08 -03:00
struct sockaddr_un *a = (struct sockaddr_un *) addr;
1994-10-10 14:59:00 -03:00
return PyString_FromString(a->sun_path);
1991-06-25 18:36:08 -03:00
}
#endif /* AF_UNIX */
#ifdef INET6
case AF_INET6:
{
struct sockaddr_in6 *a;
PyObject *addrobj = makeipaddr(addr, sizeof(*a));
PyObject *ret = NULL;
if (addrobj) {
a = (struct sockaddr_in6 *)addr;
ret = Py_BuildValue("Oiii", addrobj, ntohs(a->sin6_port),
a->sin6_flowinfo, a->sin6_scope_id);
Py_DECREF(addrobj);
}
return ret;
}
#endif
#ifdef HAVE_NETPACKET_PACKET_H
case AF_PACKET:
{
struct sockaddr_ll *a = (struct sockaddr_ll *)addr;
char *ifname = "";
struct ifreq ifr;
/* need to look up interface name give index */
if (a->sll_ifindex) {
ifr.ifr_ifindex = a->sll_ifindex;
if (ioctl(sockfd, SIOCGIFNAME, &ifr) == 0)
ifname = ifr.ifr_name;
}
return Py_BuildValue("shbhs#", ifname, ntohs(a->sll_protocol),
2001-03-02 02:34:14 -04:00
a->sll_pkttype, a->sll_hatype,
a->sll_addr, a->sll_halen);
}
#endif
2001-03-02 02:34:14 -04:00
/* More cases here... */
default:
/* If we don't know the address family, don't raise an
exception -- return it as a tuple. */
return Py_BuildValue("is#",
addr->sa_family,
addr->sa_data,
sizeof(addr->sa_data));
}
1991-06-25 18:36:08 -03:00
}
/* Parse a socket address argument according to the socket object's
address family. Return 1 if the address was in the proper format,
0 of not. The address is returned through addr_ret, its length
through len_ret. */
1991-06-25 18:36:08 -03:00
static int
2001-03-02 02:34:14 -04:00
getsockaddrarg(PySocketSockObject *s, PyObject *args,
struct sockaddr **addr_ret, int *len_ret)
1991-06-25 18:36:08 -03:00
{
switch (s->sock_family) {
#ifdef AF_UNIX
case AF_UNIX:
{
struct sockaddr_un* addr;
char *path;
1991-06-25 18:36:08 -03:00
int len;
addr = (struct sockaddr_un* )&(s->sock_addr).un;
if (!PyArg_Parse(args, "t#", &path, &len))
1991-06-25 18:36:08 -03:00
return 0;
if (len > sizeof addr->sun_path) {
PyErr_SetString(PySocket_Error,
"AF_UNIX path too long");
return 0;
}
addr->sun_family = s->sock_family;
memcpy(addr->sun_path, path, len);
addr->sun_path[len] = 0;
*addr_ret = (struct sockaddr *) addr;
*len_ret = len + sizeof(*addr) - sizeof(addr->sun_path);
1991-06-25 18:36:08 -03:00
return 1;
}
#endif /* AF_UNIX */
1991-06-25 18:36:08 -03:00
case AF_INET:
{
struct sockaddr_in* addr;
char *host;
1991-06-25 18:36:08 -03:00
int port;
addr=(struct sockaddr_in*)&(s->sock_addr).in;
if (!PyTuple_Check(args)) {
PyErr_Format(PyExc_TypeError,
"getsockaddrarg: AF_INET address must be tuple, not %.500s",
args->ob_type->tp_name);
return 0;
}
if (!PyArg_ParseTuple(args, "si:getsockaddrarg", &host, &port))
1991-06-25 18:36:08 -03:00
return 0;
if (setipaddr(host, (struct sockaddr *)addr, AF_INET) < 0)
1991-06-25 18:36:08 -03:00
return 0;
addr->sin_family = AF_INET;
addr->sin_port = htons((short)port);
*addr_ret = (struct sockaddr *) addr;
*len_ret = sizeof *addr;
1991-06-25 18:36:08 -03:00
return 1;
}
#ifdef INET6
case AF_INET6:
{
struct sockaddr_in6* addr;
char *host;
int port, flowinfo, scope_id;
addr = (struct sockaddr_in6*)&(s->sock_addr).in6;
flowinfo = scope_id = 0;
if (!PyArg_ParseTuple(args, "si|ii", &host, &port, &flowinfo,
&scope_id)) {
return 0;
}
if (setipaddr(host, (struct sockaddr *)addr, AF_INET6) < 0)
return 0;
addr->sin6_family = s->sock_family;
addr->sin6_port = htons((short)port);
addr->sin6_flowinfo = flowinfo;
addr->sin6_scope_id = scope_id;
*addr_ret = (struct sockaddr *) addr;
*len_ret = sizeof *addr;
return 1;
}
#endif
#ifdef HAVE_NETPACKET_PACKET_H
case AF_PACKET:
{
struct sockaddr_ll* addr;
struct ifreq ifr;
char *interfaceName;
int protoNumber;
int hatype = 0;
int pkttype = 0;
char *haddr;
2001-03-02 02:34:14 -04:00
if (!PyArg_ParseTuple(args, "si|iis", &interfaceName,
&protoNumber, &pkttype, &hatype, &haddr))
return 0;
strncpy(ifr.ifr_name, interfaceName, sizeof(ifr.ifr_name));
ifr.ifr_name[(sizeof(ifr.ifr_name))-1] = '\0';
if (ioctl(s->sock_fd, SIOCGIFINDEX, &ifr) < 0) {
PySocket_Err();
return 0;
}
addr = &(s->sock_addr.ll);
addr->sll_family = AF_PACKET;
addr->sll_protocol = htons((short)protoNumber);
addr->sll_ifindex = ifr.ifr_ifindex;
addr->sll_pkttype = pkttype;
addr->sll_hatype = hatype;
*addr_ret = (struct sockaddr *) addr;
*len_ret = sizeof *addr;
return 1;
}
2001-03-02 02:34:14 -04:00
#endif
/* More cases here... */
default:
1994-10-10 14:59:00 -03:00
PyErr_SetString(PySocket_Error, "getsockaddrarg: bad family");
return 0;
}
1991-06-25 18:36:08 -03:00
}
2001-03-02 02:34:14 -04:00
/* Get the address length according to the socket object's address family.
Return 1 if the family is known, 0 otherwise. The length is returned
through len_ret. */
static int
getsockaddrlen(PySocketSockObject *s, socklen_t *len_ret)
{
switch (s->sock_family) {
#ifdef AF_UNIX
case AF_UNIX:
{
*len_ret = sizeof (struct sockaddr_un);
return 1;
}
#endif /* AF_UNIX */
case AF_INET:
{
*len_ret = sizeof (struct sockaddr_in);
return 1;
}
#ifdef INET6
case AF_INET6:
{
*len_ret = sizeof (struct sockaddr_in6);
return 1;
}
#endif
#ifdef HAVE_NETPACKET_PACKET_H
case AF_PACKET:
{
*len_ret = sizeof (struct sockaddr_ll);
return 1;
}
#endif
2001-03-02 02:34:14 -04:00
/* More cases here... */
default:
PyErr_SetString(PySocket_Error, "getsockaddrlen: bad family");
return 0;
}
}
/* s.accept() method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_accept(PySocketSockObject *s)
1991-06-25 18:36:08 -03:00
{
char addrbuf[256];
SOCKET_T newfd;
socklen_t addrlen;
PyObject *sock = NULL;
PyObject *addr = NULL;
PyObject *res = NULL;
if (!getsockaddrlen(s, &addrlen))
return NULL;
memset(addrbuf, 0, addrlen);
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
1991-06-25 18:36:08 -03:00
newfd = accept(s->sock_fd, (struct sockaddr *) addrbuf, &addrlen);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
#ifdef MS_WINDOWS
if (newfd == INVALID_SOCKET)
#else
1991-06-25 18:36:08 -03:00
if (newfd < 0)
#endif
1994-10-10 14:59:00 -03:00
return PySocket_Err();
/* Create the new object with unspecified family,
to avoid calls to bind() etc. on it. */
1994-10-10 14:59:00 -03:00
sock = (PyObject *) PySocketSock_New(newfd,
s->sock_family,
s->sock_type,
s->sock_proto);
if (sock == NULL) {
SOCKETCLOSE(newfd);
goto finally;
}
2001-03-02 02:34:14 -04:00
addr = makesockaddr(s->sock_fd, (struct sockaddr *)addrbuf,
addrlen);
if (addr == NULL)
goto finally;
res = Py_BuildValue("OO", sock, addr);
finally:
1994-10-10 14:59:00 -03:00
Py_XDECREF(sock);
Py_XDECREF(addr);
1991-06-25 18:36:08 -03:00
return res;
}
static char accept_doc[] =
"accept() -> (socket object, address info)\n\
\n\
Wait for an incoming connection. Return a new socket representing the\n\
connection, and the address of the client. For IP sockets, the address\n\
info is a pair (hostaddr, port).";
/* s.setblocking(1 | 0) method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_setblocking(PySocketSockObject *s, PyObject *arg)
{
int block;
2001-03-02 02:34:14 -04:00
#ifndef RISCOS
#ifndef MS_WINDOWS
int delay_flag;
2001-03-02 02:34:14 -04:00
#endif
#endif
block = PyInt_AsLong(arg);
if (block == -1 && PyErr_Occurred())
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
#ifdef __BEOS__
block = !block;
setsockopt( s->sock_fd, SOL_SOCKET, SO_NONBLOCK,
(void *)(&block), sizeof( int ) );
#else
2001-03-02 02:34:14 -04:00
#ifndef RISCOS
1996-06-28 17:15:15 -03:00
#ifndef MS_WINDOWS
1997-11-22 17:53:48 -04:00
#ifdef PYOS_OS2
block = !block;
ioctl(s->sock_fd, FIONBIO, (caddr_t)&block, sizeof(block));
#else /* !PYOS_OS2 */
delay_flag = fcntl (s->sock_fd, F_GETFL, 0);
if (block)
delay_flag &= (~O_NDELAY);
else
delay_flag |= O_NDELAY;
fcntl (s->sock_fd, F_SETFL, delay_flag);
1997-11-22 17:53:48 -04:00
#endif /* !PYOS_OS2 */
#else /* MS_WINDOWS */
block = !block;
ioctlsocket(s->sock_fd, FIONBIO, (u_long*)&block);
1997-11-22 17:53:48 -04:00
#endif /* MS_WINDOWS */
#endif /* __BEOS__ */
2001-03-02 02:34:14 -04:00
#endif /* RISCOS */
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
1994-10-10 14:59:00 -03:00
Py_INCREF(Py_None);
return Py_None;
}
static char setblocking_doc[] =
"setblocking(flag)\n\
\n\
Set the socket to blocking (flag is true) or non-blocking (false).\n\
This uses the FIONBIO ioctl with the O_NDELAY flag.";
2001-03-02 02:34:14 -04:00
#ifdef RISCOS
/* s.sleeptaskw(1 | 0) method */
static PyObject *
PySocketSock_sleeptaskw(PySocketSockObject *s,PyObject *args)
{
int block;
int delay_flag;
if (!PyArg_GetInt(args, &block))
return NULL;
Py_BEGIN_ALLOW_THREADS
socketioctl(s->sock_fd, 0x80046679, (u_long*)&block);
Py_END_ALLOW_THREADS
Py_INCREF(Py_None);
return Py_None;
}
static char sleeptaskw_doc[] =
"sleeptaskw(flag)\n\
\n\
Allow sleeps in taskwindows.";
#endif
/* s.setsockopt() method.
With an integer third argument, sets an integer option.
With a string third argument, sets an option from a buffer;
use optional built-in module 'struct' to encode the string. */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_setsockopt(PySocketSockObject *s, PyObject *args)
{
int level;
int optname;
int res;
char *buf;
int buflen;
int flag;
if (PyArg_ParseTuple(args, "iii:setsockopt",
&level, &optname, &flag)) {
buf = (char *) &flag;
buflen = sizeof flag;
}
else {
1994-10-10 14:59:00 -03:00
PyErr_Clear();
if (!PyArg_ParseTuple(args, "iis#:setsockopt",
&level, &optname, &buf, &buflen))
return NULL;
}
res = setsockopt(s->sock_fd, level, optname, (void *)buf, buflen);
if (res < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
Py_INCREF(Py_None);
return Py_None;
}
static char setsockopt_doc[] =
"setsockopt(level, option, value)\n\
\n\
Set a socket option. See the Unix manual for level and option.\n\
The value argument can either be an integer or a string.";
/* s.getsockopt() method.
With two arguments, retrieves an integer option.
With a third integer argument, retrieves a string buffer of that size;
use optional built-in module 'struct' to decode the string. */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_getsockopt(PySocketSockObject *s, PyObject *args)
{
int level;
int optname;
int res;
1994-10-10 14:59:00 -03:00
PyObject *buf;
socklen_t buflen = 0;
#ifdef __BEOS__
/* We have incomplete socket support. */
PyErr_SetString(PySocket_Error, "getsockopt not supported");
return NULL;
#else
if (!PyArg_ParseTuple(args, "ii|i:getsockopt",
&level, &optname, &buflen))
return NULL;
2001-03-02 02:34:14 -04:00
if (buflen == 0) {
int flag = 0;
socklen_t flagsize = sizeof flag;
res = getsockopt(s->sock_fd, level, optname,
(void *)&flag, &flagsize);
if (res < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
return PyInt_FromLong(flag);
}
if (buflen <= 0 || buflen > 1024) {
PyErr_SetString(PySocket_Error,
"getsockopt buflen out of range");
return NULL;
}
1994-10-10 14:59:00 -03:00
buf = PyString_FromStringAndSize((char *)NULL, buflen);
if (buf == NULL)
return NULL;
res = getsockopt(s->sock_fd, level, optname,
(void *)PyString_AS_STRING(buf), &buflen);
if (res < 0) {
1994-10-10 14:59:00 -03:00
Py_DECREF(buf);
return PySocket_Err();
}
1994-10-10 14:59:00 -03:00
_PyString_Resize(&buf, buflen);
return buf;
#endif /* __BEOS__ */
}
static char getsockopt_doc[] =
"getsockopt(level, option[, buffersize]) -> value\n\
\n\
Get a socket option. See the Unix manual for level and option.\n\
If a nonzero buffersize argument is given, the return value is a\n\
string of that length; otherwise it is an integer.";
/* s.bind(sockaddr) method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_bind(PySocketSockObject *s, PyObject *addro)
1991-06-25 18:36:08 -03:00
{
struct sockaddr *addr;
int addrlen;
int res;
if (!getsockaddrarg(s, addro, &addr, &addrlen))
1991-06-25 18:36:08 -03:00
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
res = bind(s->sock_fd, addr, addrlen);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
if (res < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
Py_INCREF(Py_None);
return Py_None;
1991-06-25 18:36:08 -03:00
}
static char bind_doc[] =
"bind(address)\n\
\n\
Bind the socket to a local address. For IP sockets, the address is a\n\
pair (host, port); the host must refer to the local host. For raw packet\n\
sockets the address is a tuple (ifname, proto [,pkttype [,hatype]])";
/* s.close() method.
Set the file descriptor to -1 so operations tried subsequently
will surely fail. */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_close(PySocketSockObject *s)
1991-06-25 18:36:08 -03:00
{
SOCKET_T fd;
if ((fd = s->sock_fd) != -1) {
s->sock_fd = -1;
1996-10-12 11:07:22 -03:00
Py_BEGIN_ALLOW_THREADS
(void) SOCKETCLOSE(fd);
1996-10-12 11:07:22 -03:00
Py_END_ALLOW_THREADS
}
1994-10-10 14:59:00 -03:00
Py_INCREF(Py_None);
return Py_None;
1991-06-25 18:36:08 -03:00
}
static char close_doc[] =
"close()\n\
\n\
Close the socket. It cannot be used after this call.";
/* s.connect(sockaddr) method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_connect(PySocketSockObject *s, PyObject *addro)
1991-06-25 18:36:08 -03:00
{
struct sockaddr *addr;
int addrlen;
int res;
if (!getsockaddrarg(s, addro, &addr, &addrlen))
1991-06-25 18:36:08 -03:00
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
res = connect(s->sock_fd, addr, addrlen);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
if (res < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
Py_INCREF(Py_None);
return Py_None;
1991-06-25 18:36:08 -03:00
}
static char connect_doc[] =
"connect(address)\n\
\n\
Connect the socket to a remote address. For IP sockets, the address\n\
is a pair (host, port).";
/* s.connect_ex(sockaddr) method */
static PyObject *
PySocketSock_connect_ex(PySocketSockObject *s, PyObject *addro)
{
struct sockaddr *addr;
int addrlen;
int res;
if (!getsockaddrarg(s, addro, &addr, &addrlen))
return NULL;
Py_BEGIN_ALLOW_THREADS
res = connect(s->sock_fd, addr, addrlen);
Py_END_ALLOW_THREADS
if (res != 0)
res = errno;
return PyInt_FromLong((long) res);
}
static char connect_ex_doc[] =
"connect_ex(address)\n\
\n\
This is like connect(address), but returns an error code (the errno value)\n\
instead of raising an exception when an error occurs.";
/* s.fileno() method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_fileno(PySocketSockObject *s)
{
#if SIZEOF_SOCKET_T <= SIZEOF_LONG
1994-10-10 14:59:00 -03:00
return PyInt_FromLong((long) s->sock_fd);
#else
return PyLong_FromLongLong((LONG_LONG)s->sock_fd);
#endif
}
static char fileno_doc[] =
"fileno() -> integer\n\
\n\
Return the integer file descriptor of the socket.";
#ifndef NO_DUP
/* s.dup() method */
static PyObject *
PySocketSock_dup(PySocketSockObject *s)
{
SOCKET_T newfd;
PyObject *sock;
newfd = dup(s->sock_fd);
if (newfd < 0)
return PySocket_Err();
sock = (PyObject *) PySocketSock_New(newfd,
s->sock_family,
s->sock_type,
s->sock_proto);
if (sock == NULL)
SOCKETCLOSE(newfd);
return sock;
}
static char dup_doc[] =
"dup() -> socket object\n\
\n\
Return a new socket object connected to the same system resource.";
#endif
/* s.getsockname() method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_getsockname(PySocketSockObject *s)
{
char addrbuf[256];
int res;
socklen_t addrlen;
if (!getsockaddrlen(s, &addrlen))
return NULL;
memset(addrbuf, 0, addrlen);
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
res = getsockname(s->sock_fd, (struct sockaddr *) addrbuf, &addrlen);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
if (res < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
return makesockaddr(s->sock_fd, (struct sockaddr *) addrbuf, addrlen);
}
static char getsockname_doc[] =
"getsockname() -> address info\n\
\n\
Return the address of the local endpoint. For IP sockets, the address\n\
info is a pair (hostaddr, port).";
#ifdef HAVE_GETPEERNAME /* Cray APP doesn't have this :-( */
/* s.getpeername() method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_getpeername(PySocketSockObject *s)
{
char addrbuf[256];
int res;
socklen_t addrlen;
if (!getsockaddrlen(s, &addrlen))
return NULL;
memset(addrbuf, 0, addrlen);
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
res = getpeername(s->sock_fd, (struct sockaddr *) addrbuf, &addrlen);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
if (res < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
return makesockaddr(s->sock_fd, (struct sockaddr *) addrbuf, addrlen);
}
static char getpeername_doc[] =
"getpeername() -> address info\n\
\n\
Return the address of the remote endpoint. For IP sockets, the address\n\
info is a pair (hostaddr, port).";
#endif /* HAVE_GETPEERNAME */
/* s.listen(n) method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_listen(PySocketSockObject *s, PyObject *arg)
1991-06-25 18:36:08 -03:00
{
int backlog;
int res;
backlog = PyInt_AsLong(arg);
if (backlog == -1 && PyErr_Occurred())
1991-06-25 18:36:08 -03:00
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
if (backlog < 1)
backlog = 1;
res = listen(s->sock_fd, backlog);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
if (res < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
Py_INCREF(Py_None);
return Py_None;
1991-06-25 18:36:08 -03:00
}
static char listen_doc[] =
"listen(backlog)\n\
\n\
Enable a server to accept connections. The backlog argument must be at\n\
least 1; it specifies the number of unaccepted connection that the system\n\
will allow before refusing new connections.";
#ifndef NO_DUP
/* s.makefile(mode) method.
Create a new open file object referring to a dupped version of
the socket's file descriptor. (The dup() call is necessary so
that the open file and socket objects may be closed independent
of each other.)
The mode argument specifies 'r' or 'w' passed to fdopen(). */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_makefile(PySocketSockObject *s, PyObject *args)
1991-06-25 18:36:08 -03:00
{
extern int fclose(FILE *);
char *mode = "r";
int bufsize = -1;
#ifdef MS_WIN32
Py_intptr_t fd;
#else
int fd;
2001-03-02 02:34:14 -04:00
#endif
FILE *fp;
PyObject *f;
if (!PyArg_ParseTuple(args, "|si:makefile", &mode, &bufsize))
1991-06-25 18:36:08 -03:00
return NULL;
#ifdef MS_WIN32
if (((fd = _open_osfhandle(s->sock_fd, _O_BINARY)) < 0) ||
((fd = dup(fd)) < 0) || ((fp = fdopen(fd, mode)) == NULL))
#else
if ((fd = dup(s->sock_fd)) < 0 || (fp = fdopen(fd, mode)) == NULL)
#endif
{
if (fd >= 0)
SOCKETCLOSE(fd);
1994-10-10 14:59:00 -03:00
return PySocket_Err();
}
f = PyFile_FromFile(fp, "<socket>", mode, fclose);
if (f != NULL)
PyFile_SetBufSize(f, bufsize);
return f;
}
static char makefile_doc[] =
"makefile([mode[, buffersize]]) -> file object\n\
\n\
Return a regular file object corresponding to the socket.\n\
The mode and buffersize arguments are as for the built-in open() function.";
#endif /* NO_DUP */
2001-03-02 02:34:14 -04:00
/* s.recv(nbytes [,flags]) method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_recv(PySocketSockObject *s, PyObject *args)
{
int len, n, flags = 0;
1994-10-10 14:59:00 -03:00
PyObject *buf;
if (!PyArg_ParseTuple(args, "i|i:recv", &len, &flags))
return NULL;
1994-10-10 14:59:00 -03:00
buf = PyString_FromStringAndSize((char *) 0, len);
1991-06-25 18:36:08 -03:00
if (buf == NULL)
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
n = recv(s->sock_fd, PyString_AS_STRING(buf), len, flags);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
1995-09-13 15:39:47 -03:00
if (n < 0) {
Py_DECREF(buf);
1994-10-10 14:59:00 -03:00
return PySocket_Err();
1995-09-13 15:39:47 -03:00
}
if (n != len && _PyString_Resize(&buf, n) < 0)
1991-06-25 18:36:08 -03:00
return NULL;
return buf;
}
static char recv_doc[] =
"recv(buffersize[, flags]) -> data\n\
\n\
Receive up to buffersize bytes from the socket. For the optional flags\n\
argument, see the Unix manual. When no data is available, block until\n\
at least one byte is available or until the remote end is closed. When\n\
the remote end is closed and all data is read, return the empty string.";
/* s.recvfrom(nbytes [,flags]) method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_recvfrom(PySocketSockObject *s, PyObject *args)
1991-06-25 18:36:08 -03:00
{
char addrbuf[256];
PyObject *buf = NULL;
PyObject *addr = NULL;
PyObject *ret = NULL;
int len, n, flags = 0;
socklen_t addrlen;
if (!PyArg_ParseTuple(args, "i|i:recvfrom", &len, &flags))
return NULL;
if (!getsockaddrlen(s, &addrlen))
return NULL;
1994-10-10 14:59:00 -03:00
buf = PyString_FromStringAndSize((char *) 0, len);
if (buf == NULL)
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
memset(addrbuf, 0, addrlen);
n = recvfrom(s->sock_fd, PyString_AS_STRING(buf), len, flags,
#ifndef MS_WINDOWS
#if defined(PYOS_OS2)
1997-11-22 17:53:48 -04:00
(struct sockaddr *)addrbuf, &addrlen
#else
(void *)addrbuf, &addrlen
#endif
#else
(struct sockaddr *)addrbuf, &addrlen
#endif
);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
1995-09-13 15:39:47 -03:00
if (n < 0) {
Py_DECREF(buf);
1994-10-10 14:59:00 -03:00
return PySocket_Err();
1995-09-13 15:39:47 -03:00
}
if (n != len && _PyString_Resize(&buf, n) < 0)
1991-06-25 18:36:08 -03:00
return NULL;
2001-03-02 02:34:14 -04:00
if (!(addr = makesockaddr(s->sock_fd, (struct sockaddr *)addrbuf, addrlen)))
goto finally;
1994-10-10 14:59:00 -03:00
ret = Py_BuildValue("OO", buf, addr);
finally:
1994-10-10 14:59:00 -03:00
Py_XDECREF(addr);
Py_XDECREF(buf);
return ret;
1991-06-25 18:36:08 -03:00
}
static char recvfrom_doc[] =
"recvfrom(buffersize[, flags]) -> (data, address info)\n\
\n\
Like recv(buffersize, flags) but also return the sender's address info.";
/* s.send(data [,flags]) method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_send(PySocketSockObject *s, PyObject *args)
{
char *buf;
int len, n, flags = 0;
if (!PyArg_ParseTuple(args, "s#|i:send", &buf, &len, &flags))
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
n = send(s->sock_fd, buf, len, flags);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
if (n < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
return PyInt_FromLong((long)n);
}
static char send_doc[] =
"send(data[, flags])\n\
\n\
Send a data string to the socket. For the optional flags\n\
argument, see the Unix manual.";
/* s.sendto(data, [flags,] sockaddr) method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_sendto(PySocketSockObject *s, PyObject *args)
1991-06-25 18:36:08 -03:00
{
1994-10-10 14:59:00 -03:00
PyObject *addro;
char *buf;
1991-06-25 18:36:08 -03:00
struct sockaddr *addr;
int addrlen, len, n, flags;
flags = 0;
if (!PyArg_ParseTuple(args, "s#O:sendto", &buf, &len, &addro)) {
1994-10-10 14:59:00 -03:00
PyErr_Clear();
if (!PyArg_ParseTuple(args, "s#iO:sendto",
&buf, &len, &flags, &addro))
return NULL;
1991-06-25 18:36:08 -03:00
}
if (!getsockaddrarg(s, addro, &addr, &addrlen))
1991-06-25 18:36:08 -03:00
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
n = sendto(s->sock_fd, buf, len, flags, addr, addrlen);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
1991-06-25 18:36:08 -03:00
if (n < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
return PyInt_FromLong((long)n);
1991-06-25 18:36:08 -03:00
}
static char sendto_doc[] =
"sendto(data[, flags], address)\n\
\n\
Like send(data, flags) but allows specifying the destination address.\n\
For IP sockets, the address is a pair (hostaddr, port).";
/* s.shutdown(how) method */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_shutdown(PySocketSockObject *s, PyObject *arg)
1991-06-25 18:36:08 -03:00
{
int how;
int res;
how = PyInt_AsLong(arg);
if (how == -1 && PyErr_Occurred())
1991-06-25 18:36:08 -03:00
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
res = shutdown(s->sock_fd, how);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
if (res < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
Py_INCREF(Py_None);
return Py_None;
1991-06-25 18:36:08 -03:00
}
static char shutdown_doc[] =
"shutdown(flag)\n\
\n\
Shut down the reading side of the socket (flag == 0), the writing side\n\
of the socket (flag == 1), or both ends (flag == 2).";
/* List of methods for socket objects */
1991-06-25 18:36:08 -03:00
1994-10-10 14:59:00 -03:00
static PyMethodDef PySocketSock_methods[] = {
{"accept", (PyCFunction)PySocketSock_accept, METH_NOARGS,
2001-03-02 02:34:14 -04:00
accept_doc},
{"bind", (PyCFunction)PySocketSock_bind, METH_O,
2001-03-02 02:34:14 -04:00
bind_doc},
{"close", (PyCFunction)PySocketSock_close, METH_NOARGS,
2001-03-02 02:34:14 -04:00
close_doc},
{"connect", (PyCFunction)PySocketSock_connect, METH_O,
2001-03-02 02:34:14 -04:00
connect_doc},
{"connect_ex", (PyCFunction)PySocketSock_connect_ex, METH_O,
2001-03-02 02:34:14 -04:00
connect_ex_doc},
#ifndef NO_DUP
{"dup", (PyCFunction)PySocketSock_dup, METH_NOARGS,
2001-03-02 02:34:14 -04:00
dup_doc},
#endif
{"fileno", (PyCFunction)PySocketSock_fileno, METH_NOARGS,
2001-03-02 02:34:14 -04:00
fileno_doc},
#ifdef HAVE_GETPEERNAME
{"getpeername", (PyCFunction)PySocketSock_getpeername,
METH_NOARGS, getpeername_doc},
2001-03-02 02:34:14 -04:00
#endif
{"getsockname", (PyCFunction)PySocketSock_getsockname,
METH_NOARGS, getsockname_doc},
2001-03-02 02:34:14 -04:00
{"getsockopt", (PyCFunction)PySocketSock_getsockopt, METH_VARARGS,
getsockopt_doc},
{"listen", (PyCFunction)PySocketSock_listen, METH_O,
2001-03-02 02:34:14 -04:00
listen_doc},
#ifndef NO_DUP
2001-03-02 02:34:14 -04:00
{"makefile", (PyCFunction)PySocketSock_makefile, METH_VARARGS,
makefile_doc},
#endif
{"recv", (PyCFunction)PySocketSock_recv, METH_VARARGS,
recv_doc},
{"recvfrom", (PyCFunction)PySocketSock_recvfrom, METH_VARARGS,
recvfrom_doc},
{"send", (PyCFunction)PySocketSock_send, METH_VARARGS,
send_doc},
{"sendto", (PyCFunction)PySocketSock_sendto, METH_VARARGS,
sendto_doc},
{"setblocking", (PyCFunction)PySocketSock_setblocking, METH_O,
2001-03-02 02:34:14 -04:00
setblocking_doc},
{"setsockopt", (PyCFunction)PySocketSock_setsockopt, METH_VARARGS,
setsockopt_doc},
{"shutdown", (PyCFunction)PySocketSock_shutdown, METH_O,
2001-03-02 02:34:14 -04:00
shutdown_doc},
#ifdef RISCOS
{"sleeptaskw", (PyCFunction)PySocketSock_sleeptaskw, METH_VARARGS,
sleeptaskw_doc},
#endif
{NULL, NULL} /* sentinel */
1991-06-25 18:36:08 -03:00
};
1994-10-10 14:59:00 -03:00
/* Deallocate a socket object in response to the last Py_DECREF().
First close the file description. */
1991-06-25 18:36:08 -03:00
static void
PySocketSock_dealloc(PySocketSockObject *s)
1991-06-25 18:36:08 -03:00
{
if (s->sock_fd != -1)
(void) SOCKETCLOSE(s->sock_fd);
PyObject_Del(s);
1991-06-25 18:36:08 -03:00
}
/* Return a socket object's named attribute. */
1994-10-10 14:59:00 -03:00
static PyObject *
PySocketSock_getattr(PySocketSockObject *s, char *name)
1991-06-25 18:36:08 -03:00
{
1994-10-10 14:59:00 -03:00
return Py_FindMethod(PySocketSock_methods, (PyObject *) s, name);
1991-06-25 18:36:08 -03:00
}
static PyObject *
PySocketSock_repr(PySocketSockObject *s)
{
char buf[512];
#if SIZEOF_SOCKET_T > SIZEOF_LONG
if (s->sock_fd > LONG_MAX) {
/* this can occur on Win64, and actually there is a special
ugly printf formatter for decimal pointer length integer
printing, only bother if necessary*/
PyErr_SetString(PyExc_OverflowError,
"no printf formatter to display the socket descriptor in decimal");
return NULL;
}
#endif
2001-03-02 02:34:14 -04:00
sprintf(buf,
"<socket object, fd=%ld, family=%d, type=%d, protocol=%d>",
(long)s->sock_fd, s->sock_family, s->sock_type, s->sock_proto);
1996-02-27 11:21:19 -04:00
return PyString_FromString(buf);
}
/* Type object for socket objects. */
1994-10-10 14:59:00 -03:00
static PyTypeObject PySocketSock_Type = {
1996-05-23 19:54:50 -03:00
PyObject_HEAD_INIT(0) /* Must fill in type value later */
1991-06-25 18:36:08 -03:00
0,
"socket",
1994-10-10 14:59:00 -03:00
sizeof(PySocketSockObject),
1991-06-25 18:36:08 -03:00
0,
1994-10-10 14:59:00 -03:00
(destructor)PySocketSock_dealloc, /*tp_dealloc*/
1991-06-25 18:36:08 -03:00
0, /*tp_print*/
1994-10-10 14:59:00 -03:00
(getattrfunc)PySocketSock_getattr, /*tp_getattr*/
1991-06-25 18:36:08 -03:00
0, /*tp_setattr*/
0, /*tp_compare*/
(reprfunc)PySocketSock_repr, /*tp_repr*/
1991-06-25 18:36:08 -03:00
0, /*tp_as_number*/
0, /*tp_as_sequence*/
0, /*tp_as_mapping*/
};
1991-07-27 18:42:02 -03:00
/* Python interface to gethostname(). */
/*ARGSUSED*/
1994-10-10 14:59:00 -03:00
static PyObject *
PySocket_gethostname(PyObject *self, PyObject *args)
1991-07-27 18:42:02 -03:00
{
char buf[1024];
int res;
if (!PyArg_ParseTuple(args, ":gethostname"))
1991-07-27 18:42:02 -03:00
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
res = gethostname(buf, (int) sizeof buf - 1);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
if (res < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
1991-07-27 18:42:02 -03:00
buf[sizeof buf - 1] = '\0';
1994-10-10 14:59:00 -03:00
return PyString_FromString(buf);
1991-07-27 18:42:02 -03:00
}
static char gethostname_doc[] =
"gethostname() -> string\n\
\n\
Return the current host name.";
/* Python interface to gethostbyname(name). */
/*ARGSUSED*/
1994-10-10 14:59:00 -03:00
static PyObject *
PySocket_gethostbyname(PyObject *self, PyObject *args)
{
char *name;
struct sockaddr_storage addrbuf;
if (!PyArg_ParseTuple(args, "s:gethostbyname", &name))
return NULL;
if (setipaddr(name, (struct sockaddr *)&addrbuf, AF_INET) < 0)
return NULL;
return makeipaddr((struct sockaddr *)&addrbuf,
sizeof(struct sockaddr_in));
}
static char gethostbyname_doc[] =
"gethostbyname(host) -> address\n\
\n\
Return the IP address (a string of the form '255.255.255.255') for a host.";
/* Convenience function common to gethostbyname_ex and gethostbyaddr */
static PyObject *
gethost_common(struct hostent *h, struct sockaddr *addr, int alen, int af)
{
1996-02-27 11:21:19 -04:00
char **pch;
PyObject *rtn_tuple = (PyObject *)NULL;
PyObject *name_list = (PyObject *)NULL;
PyObject *addr_list = (PyObject *)NULL;
PyObject *tmp;
if (h == NULL) {
2001-03-02 02:34:14 -04:00
/* Let's get real error message to return */
PyH_Err(h_errno);
return NULL;
}
if (h->h_addrtype != af) {
#ifdef HAVE_STRERROR
/* Let's get real error message to return */
PyErr_SetString(PySocket_Error, (char *)strerror(EAFNOSUPPORT));
#else
PyErr_SetString(PySocket_Error,
"Address family not supported by protocol family");
#endif
return NULL;
}
switch (af) {
case AF_INET:
if (alen < sizeof(struct sockaddr_in))
return NULL;
break;
#ifdef INET6
case AF_INET6:
if (alen < sizeof(struct sockaddr_in6))
return NULL;
break;
#endif
}
if ((name_list = PyList_New(0)) == NULL)
goto err;
if ((addr_list = PyList_New(0)) == NULL)
goto err;
for (pch = h->h_aliases; *pch != NULL; pch++) {
int status;
tmp = PyString_FromString(*pch);
if (tmp == NULL)
goto err;
status = PyList_Append(name_list, tmp);
Py_DECREF(tmp);
if (status)
goto err;
}
for (pch = h->h_addr_list; *pch != NULL; pch++) {
int status;
switch (af) {
case AF_INET:
{
struct sockaddr_in sin;
memset(&sin, 0, sizeof(sin));
sin.sin_family = af;
#ifdef HAVE_SOCKADDR_SA_LEN
sin.sin_len = sizeof(sin);
#endif
memcpy(&sin.sin_addr, *pch, sizeof(sin.sin_addr));
tmp = makeipaddr((struct sockaddr *)&sin, sizeof(sin));
if (pch == h->h_addr_list && alen >= sizeof(sin))
memcpy((char *) addr, &sin, sizeof(sin));
break;
}
#ifdef INET6
case AF_INET6:
{
struct sockaddr_in6 sin6;
memset(&sin6, 0, sizeof(sin6));
sin6.sin6_family = af;
#ifdef HAVE_SOCKADDR_SA_LEN
sin6.sin6_len = sizeof(sin6);
#endif
memcpy(&sin6.sin6_addr, *pch, sizeof(sin6.sin6_addr));
tmp = makeipaddr((struct sockaddr *)&sin6,
sizeof(sin6));
if (pch == h->h_addr_list && alen >= sizeof(sin6))
memcpy((char *) addr, &sin6, sizeof(sin6));
break;
}
#endif
default: /* can't happen */
PyErr_SetString(PySocket_Error,
"unsupported address family");
return NULL;
}
if (tmp == NULL)
goto err;
status = PyList_Append(addr_list, tmp);
Py_DECREF(tmp);
if (status)
goto err;
}
rtn_tuple = Py_BuildValue("sOO", h->h_name, name_list, addr_list);
err:
Py_XDECREF(name_list);
Py_XDECREF(addr_list);
return rtn_tuple;
}
/* Python interface to gethostbyname_ex(name). */
/*ARGSUSED*/
static PyObject *
PySocket_gethostbyname_ex(PyObject *self, PyObject *args)
{
char *name;
struct hostent *h;
struct sockaddr_storage addr;
struct sockaddr *sa;
PyObject *ret;
#ifdef HAVE_GETHOSTBYNAME_R
struct hostent hp_allocated;
#ifdef HAVE_GETHOSTBYNAME_R_3_ARG
struct hostent_data data;
#else
char buf[16384];
int buf_len = (sizeof buf) - 1;
int errnop;
#endif
#if defined(HAVE_GETHOSTBYNAME_R_3_ARG) || defined(HAVE_GETHOSTBYNAME_R_6_ARG)
int result;
#endif
#endif /* HAVE_GETHOSTBYNAME_R */
if (!PyArg_ParseTuple(args, "s:gethostbyname_ex", &name))
return NULL;
if (setipaddr(name, (struct sockaddr *)&addr, PF_INET) < 0)
return NULL;
Py_BEGIN_ALLOW_THREADS
#ifdef HAVE_GETHOSTBYNAME_R
#if defined(HAVE_GETHOSTBYNAME_R_6_ARG)
result = gethostbyname_r(name, &hp_allocated, buf, buf_len, &h, &errnop);
#elif defined(HAVE_GETHOSTBYNAME_R_5_ARG)
h = gethostbyname_r(name, &hp_allocated, buf, buf_len, &errnop);
#else /* HAVE_GETHOSTBYNAME_R_3_ARG */
memset((void *) &data, '\0', sizeof(data));
result = gethostbyname_r(name, &hp_allocated, &data);
h = (result != 0) ? NULL : &hp_allocated;
#endif
#else /* not HAVE_GETHOSTBYNAME_R */
#ifdef USE_GETHOSTBYNAME_LOCK
PyThread_acquire_lock(gethostbyname_lock, 1);
#endif
h = gethostbyname(name);
#endif /* HAVE_GETHOSTBYNAME_R */
Py_END_ALLOW_THREADS
/* Some C libraries would require addr.__ss_family instead of addr.ss_family.
Therefore, we cast the sockaddr_storage into sockaddr to access sa_family. */
sa = (struct sockaddr*)&addr;
ret = gethost_common(h, (struct sockaddr *)&addr, sizeof(addr), sa->sa_family);
#ifdef USE_GETHOSTBYNAME_LOCK
PyThread_release_lock(gethostbyname_lock);
#endif
return ret;
}
static char ghbn_ex_doc[] =
"gethostbyname_ex(host) -> (name, aliaslist, addresslist)\n\
\n\
Return the true host name, a list of aliases, and a list of IP addresses,\n\
for a host. The host argument is a string giving a host name or IP number.";
/* Python interface to gethostbyaddr(IP). */
/*ARGSUSED*/
static PyObject *
PySocket_gethostbyaddr(PyObject *self, PyObject *args)
{
#ifdef INET6
struct sockaddr_storage addr;
#else
2001-03-02 02:34:14 -04:00
struct sockaddr_in addr;
#endif
struct sockaddr *sa = (struct sockaddr *)&addr;
char *ip_num;
struct hostent *h;
PyObject *ret;
#ifdef HAVE_GETHOSTBYNAME_R
struct hostent hp_allocated;
#ifdef HAVE_GETHOSTBYNAME_R_3_ARG
struct hostent_data data;
#else
char buf[16384];
int buf_len = (sizeof buf) - 1;
int errnop;
#endif
#if defined(HAVE_GETHOSTBYNAME_R_3_ARG) || defined(HAVE_GETHOSTBYNAME_R_6_ARG)
int result;
#endif
#endif /* HAVE_GETHOSTBYNAME_R */
char *ap;
int al;
int af;
if (!PyArg_ParseTuple(args, "s:gethostbyaddr", &ip_num))
return NULL;
af = PF_UNSPEC;
if (setipaddr(ip_num, sa, af) < 0)
return NULL;
af = sa->sa_family;
ap = NULL;
al = 0;
switch (af) {
case AF_INET:
ap = (char *)&((struct sockaddr_in *)sa)->sin_addr;
al = sizeof(((struct sockaddr_in *)sa)->sin_addr);
break;
#ifdef INET6
case AF_INET6:
ap = (char *)&((struct sockaddr_in6 *)sa)->sin6_addr;
al = sizeof(((struct sockaddr_in6 *)sa)->sin6_addr);
break;
#endif
default:
PyErr_SetString(PySocket_Error, "unsupported address family");
return NULL;
}
Py_BEGIN_ALLOW_THREADS
#ifdef HAVE_GETHOSTBYNAME_R
#if defined(HAVE_GETHOSTBYNAME_R_6_ARG)
result = gethostbyaddr_r(ap, al, af,
&hp_allocated, buf, buf_len,
&h, &errnop);
#elif defined(HAVE_GETHOSTBYNAME_R_5_ARG)
h = gethostbyaddr_r(ap, al, af,
&hp_allocated, buf, buf_len, &errnop);
#else /* HAVE_GETHOSTBYNAME_R_3_ARG */
memset((void *) &data, '\0', sizeof(data));
result = gethostbyaddr_r(ap, al, af, &hp_allocated, &data);
h = (result != 0) ? NULL : &hp_allocated;
#endif
#else /* not HAVE_GETHOSTBYNAME_R */
#ifdef USE_GETHOSTBYNAME_LOCK
PyThread_acquire_lock(gethostbyname_lock, 1);
#endif
h = gethostbyaddr(ap, al, af);
#endif /* HAVE_GETHOSTBYNAME_R */
Py_END_ALLOW_THREADS
ret = gethost_common(h, (struct sockaddr *)&addr, sizeof(addr), af);
#ifdef USE_GETHOSTBYNAME_LOCK
PyThread_release_lock(gethostbyname_lock);
#endif
return ret;
}
static char gethostbyaddr_doc[] =
"gethostbyaddr(host) -> (name, aliaslist, addresslist)\n\
\n\
Return the true host name, a list of aliases, and a list of IP addresses,\n\
for a host. The host argument is a string giving a host name or IP number.";
/* Python interface to getservbyname(name).
This only returns the port number, since the other info is already
known or not useful (like the list of aliases). */
/*ARGSUSED*/
1994-10-10 14:59:00 -03:00
static PyObject *
PySocket_getservbyname(PyObject *self, PyObject *args)
{
char *name, *proto;
struct servent *sp;
if (!PyArg_ParseTuple(args, "ss:getservbyname", &name, &proto))
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
sp = getservbyname(name, proto);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
if (sp == NULL) {
1994-10-10 14:59:00 -03:00
PyErr_SetString(PySocket_Error, "service/proto not found");
return NULL;
}
1994-10-10 14:59:00 -03:00
return PyInt_FromLong((long) ntohs(sp->s_port));
}
static char getservbyname_doc[] =
"getservbyname(servicename, protocolname) -> integer\n\
\n\
Return a port number from a service name and protocol name.\n\
The protocol name should be 'tcp' or 'udp'.";
1996-12-19 12:35:04 -04:00
/* Python interface to getprotobyname(name).
This only returns the protocol number, since the other info is
already known or not useful (like the list of aliases). */
/*ARGSUSED*/
static PyObject *
PySocket_getprotobyname(PyObject *self, PyObject *args)
1996-12-19 12:35:04 -04:00
{
char *name;
struct protoent *sp;
#ifdef __BEOS__
/* Not available in BeOS yet. - [cjh] */
PyErr_SetString( PySocket_Error, "getprotobyname not supported" );
return NULL;
#else
if (!PyArg_ParseTuple(args, "s:getprotobyname", &name))
1996-12-19 12:35:04 -04:00
return NULL;
Py_BEGIN_ALLOW_THREADS
sp = getprotobyname(name);
Py_END_ALLOW_THREADS
if (sp == NULL) {
PyErr_SetString(PySocket_Error, "protocol not found");
return NULL;
}
return PyInt_FromLong((long) sp->p_proto);
#endif
1996-12-19 12:35:04 -04:00
}
static char getprotobyname_doc[] =
"getprotobyname(name) -> integer\n\
\n\
Return the protocol number for the named protocol. (Rarely used.)";
1996-12-19 12:35:04 -04:00
/* Python interface to socket(family, type, proto).
The third (protocol) argument is optional.
Return a new socket object. */
1991-06-25 18:36:08 -03:00
/*ARGSUSED*/
1994-10-10 14:59:00 -03:00
static PyObject *
PySocket_socket(PyObject *self, PyObject *args)
1991-06-25 18:36:08 -03:00
{
1994-10-10 14:59:00 -03:00
PySocketSockObject *s;
SOCKET_T fd;
int family, type, proto = 0;
if (!PyArg_ParseTuple(args, "ii|i:socket", &family, &type, &proto))
return NULL;
1994-10-10 14:59:00 -03:00
Py_BEGIN_ALLOW_THREADS
1991-06-25 18:36:08 -03:00
fd = socket(family, type, proto);
1994-10-10 14:59:00 -03:00
Py_END_ALLOW_THREADS
1996-06-28 17:15:15 -03:00
#ifdef MS_WINDOWS
1996-06-12 01:04:22 -03:00
if (fd == INVALID_SOCKET)
#else
1991-06-25 18:36:08 -03:00
if (fd < 0)
1996-06-12 01:04:22 -03:00
#endif
1994-10-10 14:59:00 -03:00
return PySocket_Err();
s = PySocketSock_New(fd, family, type, proto);
/* If the object can't be created, don't forget to close the
file descriptor again! */
1991-06-25 18:36:08 -03:00
if (s == NULL)
(void) SOCKETCLOSE(fd);
1991-07-27 18:42:02 -03:00
/* From now on, ignore SIGPIPE and let the error checking
do the work. */
2001-03-02 02:34:14 -04:00
#ifdef SIGPIPE
1991-07-27 18:42:02 -03:00
(void) signal(SIGPIPE, SIG_IGN);
2001-03-02 02:34:14 -04:00
#endif
1994-10-10 14:59:00 -03:00
return (PyObject *) s;
1991-06-25 18:36:08 -03:00
}
static char socket_doc[] =
"socket(family, type[, proto]) -> socket object\n\
\n\
Open a socket of the given type. The family argument specifies the\n\
address family; it is normally AF_INET, sometimes AF_UNIX.\n\
The type argument specifies whether this is a stream (SOCK_STREAM)\n\
or datagram (SOCK_DGRAM) socket. The protocol argument defaults to 0,\n\
specifying the default protocol.";
#ifndef NO_DUP
/* Create a socket object from a numeric file description.
Useful e.g. if stdin is a socket.
Additional arguments as for socket(). */
/*ARGSUSED*/
1994-10-10 14:59:00 -03:00
static PyObject *
PySocket_fromfd(PyObject *self, PyObject *args)
{
1994-10-10 14:59:00 -03:00
PySocketSockObject *s;
SOCKET_T fd;
int family, type, proto = 0;
if (!PyArg_ParseTuple(args, "iii|i:fromfd",
&fd, &family, &type, &proto))
return NULL;
/* Dup the fd so it and the socket can be closed independently */
fd = dup(fd);
if (fd < 0)
1994-10-10 14:59:00 -03:00
return PySocket_Err();
s = PySocketSock_New(fd, family, type, proto);
/* From now on, ignore SIGPIPE and let the error checking
do the work. */
2001-03-02 02:34:14 -04:00
#ifdef SIGPIPE
(void) signal(SIGPIPE, SIG_IGN);
2001-03-02 02:34:14 -04:00
#endif
1994-10-10 14:59:00 -03:00
return (PyObject *) s;
}
static char fromfd_doc[] =
"fromfd(fd, family, type[, proto]) -> socket object\n\
\n\
Create a socket object from the given file descriptor.\n\
The remaining arguments are the same as for socket().";
#endif /* NO_DUP */
static PyObject *
PySocket_ntohs(PyObject *self, PyObject *args)
{
int x1, x2;
if (!PyArg_ParseTuple(args, "i:ntohs", &x1)) {
return NULL;
}
x2 = (int)ntohs((short)x1);
return PyInt_FromLong(x2);
}
static char ntohs_doc[] =
"ntohs(integer) -> integer\n\
\n\
Convert a 16-bit integer from network to host byte order.";
static PyObject *
PySocket_ntohl(PyObject *self, PyObject *args)
{
int x1, x2;
if (!PyArg_ParseTuple(args, "i:ntohl", &x1)) {
return NULL;
}
x2 = ntohl(x1);
return PyInt_FromLong(x2);
}
static char ntohl_doc[] =
"ntohl(integer) -> integer\n\
\n\
Convert a 32-bit integer from network to host byte order.";
static PyObject *
PySocket_htons(PyObject *self, PyObject *args)
{
int x1, x2;
if (!PyArg_ParseTuple(args, "i:htons", &x1)) {
return NULL;
}
x2 = (int)htons((short)x1);
return PyInt_FromLong(x2);
}
static char htons_doc[] =
"htons(integer) -> integer\n\
\n\
Convert a 16-bit integer from host to network byte order.";
static PyObject *
PySocket_htonl(PyObject *self, PyObject *args)
{
int x1, x2;
if (!PyArg_ParseTuple(args, "i:htonl", &x1)) {
return NULL;
}
x2 = htonl(x1);
return PyInt_FromLong(x2);
}
static char htonl_doc[] =
"htonl(integer) -> integer\n\
\n\
Convert a 32-bit integer from host to network byte order.";
/*
* socket.inet_aton() and socket.inet_ntoa() functions
*
* written 20 Aug 1999 by Ben Gertzfield <che@debian.org> <- blame him!
*
*/
2001-03-02 02:34:14 -04:00
static char inet_aton_doc[] =
"inet_aton(string) -> packed 32-bit IP representation\n\
\n\
Convert an IP address in string format (123.45.67.89) to the 32-bit packed\n\
binary format used in low-level network functions.";
static PyObject*
PySocket_inet_aton(PyObject *self, PyObject *args)
{
#ifndef INADDR_NONE
#define INADDR_NONE (-1)
#endif
/* Have to use inet_addr() instead */
char *ip_addr;
unsigned long packed_addr;
if (!PyArg_ParseTuple(args, "s:inet_aton", &ip_addr)) {
return NULL;
}
#ifdef USE_GUSI1
packed_addr = inet_addr(ip_addr).s_addr;
#else
packed_addr = inet_addr(ip_addr);
#endif
if (packed_addr == INADDR_NONE) { /* invalid address */
PyErr_SetString(PySocket_Error,
"illegal IP address string passed to inet_aton");
return NULL;
}
return PyString_FromStringAndSize((char *) &packed_addr,
sizeof(packed_addr));
}
2001-03-02 02:34:14 -04:00
static char inet_ntoa_doc[] =
2000-03-07 10:05:16 -04:00
"inet_ntoa(packed_ip) -> ip_address_string\n\
\n\
Convert an IP address from 32-bit packed binary format to string format";
static PyObject*
PySocket_inet_ntoa(PyObject *self, PyObject *args)
{
char *packed_str;
int addr_len;
struct in_addr packed_addr;
if (!PyArg_ParseTuple(args, "s#:inet_ntoa", &packed_str, &addr_len)) {
return NULL;
}
2001-03-02 02:34:14 -04:00
if (addr_len != sizeof(packed_addr)) {
PyErr_SetString(PySocket_Error,
"packed IP wrong length for inet_ntoa");
return NULL;
}
memcpy(&packed_addr, packed_str, addr_len);
return PyString_FromString(inet_ntoa(packed_addr));
}
/* Python interface to getaddrinfo(host, port). */
/*ARGSUSED*/
static PyObject *
PySocket_getaddrinfo(PyObject *self, PyObject *args)
{
struct addrinfo hints, *res0, *res;
PyObject *pobj = (PyObject *)NULL;
char pbuf[30];
char *hptr, *pptr;
int family, socktype, protocol, flags;
int error;
PyObject *all = (PyObject *)NULL;
PyObject *single = (PyObject *)NULL;
family = socktype = protocol = flags = 0;
family = PF_UNSPEC;
if (!PyArg_ParseTuple(args, "zO|iiii:getaddrinfo",
&hptr, &pobj, &family, &socktype,
&protocol, &flags)) {
return NULL;
}
if (PyInt_Check(pobj)) {
PyOS_snprintf(pbuf, sizeof(pbuf), "%ld", PyInt_AsLong(pobj));
pptr = pbuf;
} else if (PyString_Check(pobj)) {
pptr = PyString_AsString(pobj);
} else if (pobj == Py_None) {
pptr = (char *)NULL;
} else {
PyErr_SetString(PySocket_Error, "Int or String expected");
return NULL;
}
memset(&hints, 0, sizeof(hints));
hints.ai_family = family;
hints.ai_socktype = socktype;
hints.ai_protocol = protocol;
hints.ai_flags = flags;
error = getaddrinfo(hptr, pptr, &hints, &res0);
if (error) {
PyGAI_Err(error);
return NULL;
}
if ((all = PyList_New(0)) == NULL)
goto err;
for (res = res0; res; res = res->ai_next) {
PyObject *addr =
makesockaddr(-1, res->ai_addr, res->ai_addrlen);
if (addr == NULL)
goto err;
single = Py_BuildValue("iiisO", res->ai_family,
res->ai_socktype, res->ai_protocol,
res->ai_canonname ? res->ai_canonname : "",
addr);
Py_DECREF(addr);
if (single == NULL)
goto err;
if (PyList_Append(all, single))
goto err;
Py_XDECREF(single);
}
return all;
err:
Py_XDECREF(single);
Py_XDECREF(all);
return (PyObject *)NULL;
}
static char getaddrinfo_doc[] =
"socket.getaddrinfo(host, port [, family, socktype, proto, flags])\n\
--> List of (family, socktype, proto, canonname, sockaddr)\n\
\n\
Resolve host and port into addrinfo struct.";
/* Python interface to getnameinfo(sa, flags). */
/*ARGSUSED*/
static PyObject *
PySocket_getnameinfo(PyObject *self, PyObject *args)
{
PyObject *sa = (PyObject *)NULL;
int flags;
char *hostp;
int n, port, flowinfo, scope_id;
char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
struct addrinfo hints, *res = NULL;
int error;
PyObject *ret = (PyObject *)NULL;
flags = flowinfo = scope_id = 0;
if (PyArg_ParseTuple(args, "Oi:getnameinfo", &sa, &flags) == 0)
return NULL;
n = PyArg_ParseTuple(sa, "si|ii", &hostp, &port, &flowinfo, scope_id);
if (n == 0)
goto fail;
PyOS_snprintf(pbuf, sizeof(pbuf), "%d", port);
memset(&hints, 0, sizeof(hints));
hints.ai_family = PF_UNSPEC;
hints.ai_socktype = SOCK_DGRAM; /* make numeric port happy */
error = getaddrinfo(hostp, pbuf, &hints, &res);
if (error) {
PyGAI_Err(error);
goto fail;
}
if (res->ai_next) {
PyErr_SetString(PySocket_Error,
"sockaddr resolved to multiple addresses");
goto fail;
}
switch (res->ai_family) {
case AF_INET:
{
char *t1;
int t2;
if (PyArg_ParseTuple(sa, "si", &t1, &t2) == 0) {
PyErr_SetString(PySocket_Error,
"IPv4 sockaddr must be 2 tuple");
goto fail;
}
break;
}
#ifdef INET6
case AF_INET6:
{
struct sockaddr_in6 *sin6;
sin6 = (struct sockaddr_in6 *)res->ai_addr;
sin6->sin6_flowinfo = flowinfo;
sin6->sin6_scope_id = scope_id;
break;
}
#endif
}
error = getnameinfo(res->ai_addr, res->ai_addrlen,
hbuf, sizeof(hbuf), pbuf, sizeof(pbuf), flags);
if (error) {
PyGAI_Err(error);
goto fail;
}
ret = Py_BuildValue("ss", hbuf, pbuf);
fail:
if (res)
freeaddrinfo(res);
Py_XDECREF(sa);
return ret;
}
static char getnameinfo_doc[] =
"socket.getnameinfo(sockaddr, flags) --> (host, port)\n\
\n\
Get host and port for a sockaddr.";
/* XXX It might be helpful to augment the error message generated
below with the name of the SSL function that generated the error.
I expect it's obvious most of the time.
*/
#ifdef USE_SSL
static PyObject *
PySSL_SetError(SSL *ssl, int ret)
{
PyObject *v, *n, *s;
char *errstr;
int err;
assert(ret <= 0);
err = SSL_get_error(ssl, ret);
n = PyInt_FromLong(err);
if (n == NULL)
return NULL;
v = PyTuple_New(2);
if (v == NULL) {
Py_DECREF(n);
return NULL;
}
switch (SSL_get_error(ssl, ret)) {
case SSL_ERROR_ZERO_RETURN:
errstr = "TLS/SSL connection has been closed";
break;
case SSL_ERROR_WANT_READ:
errstr = "The operation did not complete (read)";
break;
case SSL_ERROR_WANT_WRITE:
errstr = "The operation did not complete (write)";
break;
case SSL_ERROR_WANT_X509_LOOKUP:
errstr = "The operation did not complete (X509 lookup)";
break;
case SSL_ERROR_SYSCALL:
case SSL_ERROR_SSL:
{
unsigned long e = ERR_get_error();
if (e == 0) {
/* an EOF was observed that violates the protocol */
errstr = "EOF occurred in violation of protocol";
} else if (e == -1) {
/* the underlying BIO reported an I/O error */
Py_DECREF(v);
Py_DECREF(n);
return PySocket_Err();
} else {
/* XXX Protected by global interpreter lock */
errstr = ERR_error_string(e, NULL);
}
break;
}
default:
errstr = "Invalid error code";
}
s = PyString_FromString(errstr);
if (s == NULL) {
Py_DECREF(v);
Py_DECREF(n);
}
PyTuple_SET_ITEM(v, 0, n);
PyTuple_SET_ITEM(v, 1, s);
PyErr_SetObject(PySSLErrorObject, v);
return NULL;
}
/* This is a C function to be called for new object initialization */
static PySSLObject *
newPySSLObject(PySocketSockObject *Sock, char *key_file, char *cert_file)
{
PySSLObject *self;
char *errstr = NULL;
int ret;
self = PyObject_New(PySSLObject, &PySSL_Type); /* Create new object */
if (self == NULL){
errstr = "newPySSLObject error";
goto fail;
}
memset(self->server, '\0', sizeof(char) * X509_NAME_MAXLEN);
memset(self->issuer, '\0', sizeof(char) * X509_NAME_MAXLEN);
self->server_cert = NULL;
self->ssl = NULL;
self->ctx = NULL;
self->Socket = NULL;
2001-03-02 02:34:14 -04:00
if ((key_file && !cert_file) || (!key_file && cert_file)) {
errstr = "Both the key & certificate files must be specified";
goto fail;
}
self->ctx = SSL_CTX_new(SSLv23_method()); /* Set up context */
if (self->ctx == NULL) {
errstr = "SSL_CTX_new error";
goto fail;
}
if (key_file) {
if (SSL_CTX_use_PrivateKey_file(self->ctx, key_file,
SSL_FILETYPE_PEM) < 1) {
errstr = "SSL_CTX_use_PrivateKey_file error";
goto fail;
}
if (SSL_CTX_use_certificate_chain_file(self->ctx,
cert_file) < 1) {
errstr = "SSL_CTX_use_certificate_chain_file error";
goto fail;
}
}
SSL_CTX_set_verify(self->ctx,
SSL_VERIFY_NONE, NULL); /* set verify lvl */
self->ssl = SSL_new(self->ctx); /* New ssl struct */
SSL_set_fd(self->ssl, Sock->sock_fd); /* Set the socket for SSL */
SSL_set_connect_state(self->ssl);
/* Actually negotiate SSL connection */
/* XXX If SSL_connect() returns 0, it's also a failure. */
ret = SSL_connect(self->ssl);
if (ret <= 0) {
PySSL_SetError(self->ssl, ret);
goto fail;
}
self->ssl->debug = 1;
if ((self->server_cert = SSL_get_peer_certificate(self->ssl))) {
X509_NAME_oneline(X509_get_subject_name(self->server_cert),
self->server, X509_NAME_MAXLEN);
X509_NAME_oneline(X509_get_issuer_name(self->server_cert),
self->issuer, X509_NAME_MAXLEN);
}
self->Socket = Sock;
Py_INCREF(self->Socket);
return self;
fail:
if (errstr)
PyErr_SetString(PySSLErrorObject, errstr);
Py_DECREF(self);
return NULL;
}
/* This is the Python function called for new object initialization */
static PyObject *
PySocket_ssl(PyObject *self, PyObject *args)
{
PySSLObject *rv;
PySocketSockObject *Sock;
char *key_file = NULL;
char *cert_file = NULL;
2001-03-02 02:34:14 -04:00
if (!PyArg_ParseTuple(args, "O!|zz:ssl",
&PySocketSock_Type, (PyObject*)&Sock,
&key_file, &cert_file))
return NULL;
2001-03-02 02:34:14 -04:00
rv = newPySSLObject(Sock, key_file, cert_file);
if (rv == NULL)
return NULL;
return (PyObject *)rv;
}
static char ssl_doc[] =
"ssl(socket, [keyfile, certfile]) -> sslobject";
/* SSL object methods */
static PyObject *
PySSL_server(PySSLObject *self)
{
return PyString_FromString(self->server);
}
static PyObject *
PySSL_issuer(PySSLObject *self)
{
return PyString_FromString(self->issuer);
}
static void PySSL_dealloc(PySSLObject *self)
{
if (self->server_cert) /* Possible not to have one? */
X509_free (self->server_cert);
if (self->ssl)
SSL_free(self->ssl);
if (self->ctx)
SSL_CTX_free(self->ctx);
Py_XDECREF(self->Socket);
PyObject_Del(self);
}
static PyObject *PySSL_SSLwrite(PySSLObject *self, PyObject *args)
{
char *data;
int len;
2001-03-02 02:34:14 -04:00
if (!PyArg_ParseTuple(args, "s#:write", &data, &len))
return NULL;
2001-03-02 02:34:14 -04:00
len = SSL_write(self->ssl, data, len);
if (len > 0)
return PyInt_FromLong(len);
else
return PySSL_SetError(self->ssl, len);
}
static char PySSL_SSLwrite_doc[] =
"write(s) -> len\n\
\n\
Writes the string s into the SSL object. Returns the number\n\
of bytes written.";
static PyObject *PySSL_SSLread(PySSLObject *self, PyObject *args)
{
PyObject *buf;
int count = 0;
int len = 1024;
2001-03-02 02:34:14 -04:00
if (!PyArg_ParseTuple(args, "|i:read", &len))
return NULL;
2001-03-02 02:34:14 -04:00
if (!(buf = PyString_FromStringAndSize((char *) 0, len)))
return NULL;
2001-03-02 02:34:14 -04:00
count = SSL_read(self->ssl, PyString_AsString(buf), len);
if (count <= 0) {
Py_DECREF(buf);
return PySSL_SetError(self->ssl, count);
}
if (count != len && _PyString_Resize(&buf, count) < 0)
return NULL;
return buf;
}
static char PySSL_SSLread_doc[] =
"read([len]) -> string\n\
\n\
Read up to len bytes from the SSL socket.";
static PyMethodDef PySSLMethods[] = {
{"write", (PyCFunction)PySSL_SSLwrite, 1,
PySSL_SSLwrite_doc},
{"read", (PyCFunction)PySSL_SSLread, 1,
PySSL_SSLread_doc},
{"server", (PyCFunction)PySSL_server, METH_NOARGS},
{"issuer", (PyCFunction)PySSL_issuer, METH_NOARGS},
{NULL, NULL}
};
static PyObject *PySSL_getattr(PySSLObject *self, char *name)
{
return Py_FindMethod(PySSLMethods, (PyObject *)self, name);
}
staticforward PyTypeObject PySSL_Type = {
PyObject_HEAD_INIT(NULL)
0, /*ob_size*/
"SSL", /*tp_name*/
sizeof(PySSLObject), /*tp_basicsize*/
0, /*tp_itemsize*/
/* methods */
(destructor)PySSL_dealloc, /*tp_dealloc*/
0, /*tp_print*/
(getattrfunc)PySSL_getattr, /*tp_getattr*/
0, /*tp_setattr*/
0, /*tp_compare*/
0, /*tp_repr*/
0, /*tp_as_number*/
0, /*tp_as_sequence*/
0, /*tp_as_mapping*/
0, /*tp_hash*/
};
/* helper routines for seeding the SSL PRNG */
static PyObject *
PySSL_RAND_add(PyObject *self, PyObject *args)
{
char *buf;
int len;
double entropy;
if (!PyArg_ParseTuple(args, "s#d:RAND_add", &buf, &len, &entropy))
return NULL;
RAND_add(buf, len, entropy);
Py_INCREF(Py_None);
return Py_None;
}
static char PySSL_RAND_add_doc[] =
"RAND_add(string, entropy)\n\
\n\
Mix string into the OpenSSL PRNG state. entropy (a float) is a lower\n\
bound on the entropy contained in string.";
static PyObject *
PySSL_RAND_status(PyObject *self)
{
return PyInt_FromLong(RAND_status());
}
static char PySSL_RAND_status_doc[] =
"RAND_status() -> 0 or 1\n\
\n\
Returns 1 if the OpenSSL PRNG has been seeded with enough data and 0 if not.\n\
It is necessary to seed the PRNG with RAND_add() on some platforms before\n\
using the ssl() function.";
static PyObject *
PySSL_RAND_egd(PyObject *self, PyObject *arg)
{
int bytes;
if (!PyString_Check(arg))
return PyErr_Format(PyExc_TypeError,
"RAND_egd() expected string, found %s",
arg->ob_type->tp_name);
bytes = RAND_egd(PyString_AS_STRING(arg));
if (bytes == -1) {
PyErr_SetString(PySSLErrorObject,
"EGD connection failed or EGD did not return "
"enough data to seed the PRNG");
return NULL;
}
return PyInt_FromLong(bytes);
}
static char PySSL_RAND_egd_doc[] =
"RAND_egd(path) -> bytes\n\
\n\
Queries the entropy gather daemon (EGD) on socket path. Returns number\n\
of bytes read. Raises socket.sslerror if connection to EGD fails or\n\
if it does provide enough data to seed PRNG.";
#endif /* USE_SSL */
/* List of functions exported by this module. */
1994-10-10 14:59:00 -03:00
static PyMethodDef PySocket_methods[] = {
2001-03-02 02:34:14 -04:00
{"gethostbyname", PySocket_gethostbyname,
METH_VARARGS, gethostbyname_doc},
2001-03-02 02:34:14 -04:00
{"gethostbyname_ex", PySocket_gethostbyname_ex,
METH_VARARGS, ghbn_ex_doc},
2001-03-02 02:34:14 -04:00
{"gethostbyaddr", PySocket_gethostbyaddr,
METH_VARARGS, gethostbyaddr_doc},
2001-03-02 02:34:14 -04:00
{"gethostname", PySocket_gethostname,
METH_VARARGS, gethostname_doc},
2001-03-02 02:34:14 -04:00
{"getservbyname", PySocket_getservbyname,
METH_VARARGS, getservbyname_doc},
2001-03-02 02:34:14 -04:00
{"getprotobyname", PySocket_getprotobyname,
METH_VARARGS,getprotobyname_doc},
2001-03-02 02:34:14 -04:00
{"socket", PySocket_socket,
METH_VARARGS, socket_doc},
#ifndef NO_DUP
2001-03-02 02:34:14 -04:00
{"fromfd", PySocket_fromfd,
METH_VARARGS, fromfd_doc},
#endif
2001-03-02 02:34:14 -04:00
{"ntohs", PySocket_ntohs,
METH_VARARGS, ntohs_doc},
2001-03-02 02:34:14 -04:00
{"ntohl", PySocket_ntohl,
METH_VARARGS, ntohl_doc},
2001-03-02 02:34:14 -04:00
{"htons", PySocket_htons,
METH_VARARGS, htons_doc},
2001-03-02 02:34:14 -04:00
{"htonl", PySocket_htonl,
METH_VARARGS, htonl_doc},
2001-03-02 02:34:14 -04:00
{"inet_aton", PySocket_inet_aton,
METH_VARARGS, inet_aton_doc},
2001-03-02 02:34:14 -04:00
{"inet_ntoa", PySocket_inet_ntoa,
METH_VARARGS, inet_ntoa_doc},
{"getaddrinfo", PySocket_getaddrinfo,
METH_VARARGS, getaddrinfo_doc},
{"getnameinfo", PySocket_getnameinfo,
METH_VARARGS, getnameinfo_doc},
#ifdef USE_SSL
2001-03-02 02:34:14 -04:00
{"ssl", PySocket_ssl,
METH_VARARGS, ssl_doc},
{"RAND_add", PySSL_RAND_add, METH_VARARGS,
PySSL_RAND_add_doc},
{"RAND_egd", PySSL_RAND_egd, METH_O,
PySSL_RAND_egd_doc},
{"RAND_status", (PyCFunction)PySSL_RAND_status, METH_NOARGS,
PySSL_RAND_status_doc},
#endif /* USE_SSL */
{NULL, NULL} /* Sentinel */
1991-06-25 18:36:08 -03:00
};
/* Convenience routine to export an integer value.
*
* Errors are silently ignored, for better or for worse...
*/
1991-06-25 18:36:08 -03:00
static void
insint(PyObject *d, char *name, int value)
1991-06-25 18:36:08 -03:00
{
1994-10-10 14:59:00 -03:00
PyObject *v = PyInt_FromLong((long) value);
if (!v || PyDict_SetItemString(d, name, v))
PyErr_Clear();
Py_XDECREF(v);
1991-06-25 18:36:08 -03:00
}
#ifdef MS_WINDOWS
/* Additional initialization and cleanup for NT/Windows */
static void
NTcleanup(void)
{
WSACleanup();
}
static int
NTinit(void)
{
WSADATA WSAData;
int ret;
char buf[100];
ret = WSAStartup(0x0101, &WSAData);
switch (ret) {
case 0: /* no error */
atexit(NTcleanup);
return 1;
case WSASYSNOTREADY:
PyErr_SetString(PyExc_ImportError,
"WSAStartup failed: network not ready");
break;
case WSAVERNOTSUPPORTED:
case WSAEINVAL:
PyErr_SetString(PyExc_ImportError,
"WSAStartup failed: requested version not supported");
break;
default:
sprintf(buf, "WSAStartup failed: error code %d", ret);
PyErr_SetString(PyExc_ImportError, buf);
break;
}
return 0;
}
#endif /* MS_WINDOWS */
1997-11-22 17:53:48 -04:00
#if defined(PYOS_OS2)
/* Additional initialization and cleanup for OS/2 */
static void
OS2cleanup(void)
1997-11-22 17:53:48 -04:00
{
/* No cleanup is necessary for OS/2 Sockets */
}
static int
OS2init(void)
1997-11-22 17:53:48 -04:00
{
char reason[64];
int rc = sock_init();
if (rc == 0) {
atexit(OS2cleanup);
return 1; /* Indicate Success */
1997-11-22 17:53:48 -04:00
}
sprintf(reason, "OS/2 TCP/IP Error# %d", sock_errno());
PyErr_SetString(PyExc_ImportError, reason);
return 0; /* Indicate Failure */
1997-11-22 17:53:48 -04:00
}
#endif /* PYOS_OS2 */
/* Initialize this module.
1997-11-22 17:53:48 -04:00
* This is called when the first 'import socket' is done,
* via a table in config.c, if config.c is compiled with USE_SOCKET
* defined.
*
* For MS_WINDOWS (which means any Windows variant), this module
* is actually called "_socket", and there's a wrapper "socket.py"
* which implements some missing functionality (such as makefile(),
* dup() and fromfd()). The import of "_socket" may fail with an
* ImportError exception if initialization of WINSOCK fails. When
* WINSOCK is initialized succesfully, a call to WSACleanup() is
* scheduled to be made at exit time.
*
* For OS/2, this module is also called "_socket" and uses a wrapper
* "socket.py" which implements that functionality that is missing
* when PC operating systems don't put socket descriptors in the
* operating system's filesystem layer.
*/
static char module_doc[] =
"Implementation module for socket operations. See the socket module\n\
for documentation.";
static char sockettype_doc[] =
"A socket represents one endpoint of a network connection.\n\
\n\
Methods:\n\
\n\
accept() -- accept a connection, returning new socket and client address\n\
bind() -- bind the socket to a local address\n\
close() -- close the socket\n\
connect() -- connect the socket to a remote address\n\
connect_ex() -- connect, return an error code instead of an exception \n\
dup() -- return a new socket object identical to the current one (*)\n\
fileno() -- return underlying file descriptor\n\
getpeername() -- return remote address (*)\n\
getsockname() -- return local address\n\
getsockopt() -- get socket options\n\
listen() -- start listening for incoming connections\n\
makefile() -- return a file object corresponding tot the socket (*)\n\
recv() -- receive data\n\
recvfrom() -- receive data and sender's address\n\
send() -- send data\n\
sendto() -- send data to a given address\n\
setblocking() -- set or clear the blocking I/O flag\n\
setsockopt() -- set socket options\n\
shutdown() -- shut down traffic in one or both directions\n\
\n\
(*) not available on all platforms!)";
DL_EXPORT(void)
init_socket(void)
1991-06-25 18:36:08 -03:00
{
1994-10-10 14:59:00 -03:00
PyObject *m, *d;
2001-03-02 02:34:14 -04:00
#ifdef RISCOS
_kernel_swi_regs r;
r.r[0]=0;
_kernel_swi(0x43380, &r, &r);
taskwindow = r.r[0];
#else
#ifdef MS_WINDOWS
if (!NTinit())
return;
#else
#if defined(__TOS_OS2__)
1997-11-22 17:53:48 -04:00
if (!OS2init())
return;
#endif /* __TOS_OS2__ */
#endif /* MS_WINDOWS */
2001-03-02 02:34:14 -04:00
#endif /* RISCOS */
#ifdef USE_SSL
PySSL_Type.ob_type = &PyType_Type;
#endif
m = Py_InitModule3("_socket", PySocket_methods, module_doc);
1994-10-10 14:59:00 -03:00
d = PyModule_GetDict(m);
PySocket_Error = PyErr_NewException("socket.error", NULL, NULL);
if (PySocket_Error == NULL)
return;
PyDict_SetItemString(d, "error", PySocket_Error);
PyH_Error = PyErr_NewException("socket.herror", PySocket_Error, NULL);
if (PyH_Error == NULL)
return;
PyDict_SetItemString(d, "herror", PyH_Error);
PyGAI_Error = PyErr_NewException("socket.gaierror", PySocket_Error,
NULL);
if (PyGAI_Error == NULL)
return;
PyDict_SetItemString(d, "gaierror", PyGAI_Error);
#ifdef USE_SSL
SSL_load_error_strings();
SSLeay_add_ssl_algorithms();
PySSLErrorObject = PyErr_NewException("socket.sslerror", NULL, NULL);
if (PySSLErrorObject == NULL)
return;
PyDict_SetItemString(d, "sslerror", PySSLErrorObject);
if (PyDict_SetItemString(d, "SSLType",
(PyObject *)&PySSL_Type) != 0)
return;
2001-10-10 21:00:17 -03:00
PyModule_AddIntConstant(m, "SSL_ERROR_ZERO_RETURN",
SSL_ERROR_ZERO_RETURN);
PyModule_AddIntConstant(m, "SSL_ERROR_WANT_READ",
SSL_ERROR_WANT_READ);
PyModule_AddIntConstant(m, "SSL_ERROR_WANT_WRITE",
SSL_ERROR_WANT_WRITE);
PyModule_AddIntConstant(m, "SSL_ERROR_WANT_X509_LOOKUP",
SSL_ERROR_WANT_X509_LOOKUP);
PyModule_AddIntConstant(m, "SSL_ERROR_SYSCALL",
SSL_ERROR_SYSCALL);
PyModule_AddIntConstant(m, "SSL_ERROR_SSL",
SSL_ERROR_SSL);
#endif /* USE_SSL */
PySocketSock_Type.ob_type = &PyType_Type;
PySocketSock_Type.tp_doc = sockettype_doc;
1997-06-02 19:18:09 -03:00
if (PyDict_SetItemString(d, "SocketType",
(PyObject *)&PySocketSock_Type) != 0)
return;
/* Address families (we only support AF_INET and AF_UNIX) */
#ifdef AF_UNSPEC
insint(d, "AF_UNSPEC", AF_UNSPEC);
#endif
1991-06-25 18:36:08 -03:00
insint(d, "AF_INET", AF_INET);
#ifdef AF_INET6
insint(d, "AF_INET6", AF_INET6);
#endif /* AF_INET6 */
#ifdef AF_UNIX
1991-06-25 18:36:08 -03:00
insint(d, "AF_UNIX", AF_UNIX);
#endif /* AF_UNIX */
#ifdef AF_AX25
insint(d, "AF_AX25", AF_AX25); /* Amateur Radio AX.25 */
#endif
#ifdef AF_IPX
insint(d, "AF_IPX", AF_IPX); /* Novell IPX */
#endif
#ifdef AF_APPLETALK
insint(d, "AF_APPLETALK", AF_APPLETALK); /* Appletalk DDP */
#endif
#ifdef AF_NETROM
insint(d, "AF_NETROM", AF_NETROM); /* Amateur radio NetROM */
#endif
#ifdef AF_BRIDGE
insint(d, "AF_BRIDGE", AF_BRIDGE); /* Multiprotocol bridge */
#endif
#ifdef AF_AAL5
insint(d, "AF_AAL5", AF_AAL5); /* Reserved for Werner's ATM */
#endif
#ifdef AF_X25
insint(d, "AF_X25", AF_X25); /* Reserved for X.25 project */
#endif
#ifdef AF_INET6
insint(d, "AF_INET6", AF_INET6); /* IP version 6 */
#endif
#ifdef AF_ROSE
insint(d, "AF_ROSE", AF_ROSE); /* Amateur Radio X.25 PLP */
#endif
#ifdef HAVE_NETPACKET_PACKET_H
insint(d, "AF_PACKET", AF_PACKET);
insint(d, "PF_PACKET", PF_PACKET);
insint(d, "PACKET_HOST", PACKET_HOST);
insint(d, "PACKET_BROADCAST", PACKET_BROADCAST);
insint(d, "PACKET_MULTICAST", PACKET_MULTICAST);
insint(d, "PACKET_OTHERHOST", PACKET_OTHERHOST);
insint(d, "PACKET_OUTGOING", PACKET_OUTGOING);
insint(d, "PACKET_LOOPBACK", PACKET_LOOPBACK);
insint(d, "PACKET_FASTROUTE", PACKET_FASTROUTE);
2001-03-02 02:34:14 -04:00
#endif
/* Socket types */
1991-06-25 18:36:08 -03:00
insint(d, "SOCK_STREAM", SOCK_STREAM);
insint(d, "SOCK_DGRAM", SOCK_DGRAM);
#ifndef __BEOS__
/* We have incomplete socket support. */
1991-06-25 18:36:08 -03:00
insint(d, "SOCK_RAW", SOCK_RAW);
insint(d, "SOCK_SEQPACKET", SOCK_SEQPACKET);
insint(d, "SOCK_RDM", SOCK_RDM);
#endif
1995-02-07 11:39:52 -04:00
#ifdef SO_DEBUG
insint(d, "SO_DEBUG", SO_DEBUG);
#endif
#ifdef SO_ACCEPTCONN
insint(d, "SO_ACCEPTCONN", SO_ACCEPTCONN);
#endif
#ifdef SO_REUSEADDR
insint(d, "SO_REUSEADDR", SO_REUSEADDR);
#endif
#ifdef SO_KEEPALIVE
insint(d, "SO_KEEPALIVE", SO_KEEPALIVE);
#endif
#ifdef SO_DONTROUTE
insint(d, "SO_DONTROUTE", SO_DONTROUTE);
#endif
#ifdef SO_BROADCAST
insint(d, "SO_BROADCAST", SO_BROADCAST);
#endif
#ifdef SO_USELOOPBACK
insint(d, "SO_USELOOPBACK", SO_USELOOPBACK);
#endif
#ifdef SO_LINGER
insint(d, "SO_LINGER", SO_LINGER);
#endif
#ifdef SO_OOBINLINE
insint(d, "SO_OOBINLINE", SO_OOBINLINE);
#endif
#ifdef SO_REUSEPORT
insint(d, "SO_REUSEPORT", SO_REUSEPORT);
#endif
#ifdef SO_SNDBUF
insint(d, "SO_SNDBUF", SO_SNDBUF);
#endif
#ifdef SO_RCVBUF
insint(d, "SO_RCVBUF", SO_RCVBUF);
#endif
#ifdef SO_SNDLOWAT
insint(d, "SO_SNDLOWAT", SO_SNDLOWAT);
#endif
#ifdef SO_RCVLOWAT
insint(d, "SO_RCVLOWAT", SO_RCVLOWAT);
#endif
#ifdef SO_SNDTIMEO
insint(d, "SO_SNDTIMEO", SO_SNDTIMEO);
#endif
#ifdef SO_RCVTIMEO
insint(d, "SO_RCVTIMEO", SO_RCVTIMEO);
#endif
#ifdef SO_ERROR
insint(d, "SO_ERROR", SO_ERROR);
#endif
#ifdef SO_TYPE
insint(d, "SO_TYPE", SO_TYPE);
#endif
/* Maximum number of connections for "listen" */
#ifdef SOMAXCONN
insint(d, "SOMAXCONN", SOMAXCONN);
#else
insint(d, "SOMAXCONN", 5); /* Common value */
#endif
/* Flags for send, recv */
#ifdef MSG_OOB
insint(d, "MSG_OOB", MSG_OOB);
#endif
#ifdef MSG_PEEK
insint(d, "MSG_PEEK", MSG_PEEK);
#endif
#ifdef MSG_DONTROUTE
insint(d, "MSG_DONTROUTE", MSG_DONTROUTE);
#endif
#ifdef MSG_DONTWAIT
insint(d, "MSG_DONTWAIT", MSG_DONTWAIT);
#endif
1995-02-07 11:39:52 -04:00
#ifdef MSG_EOR
insint(d, "MSG_EOR", MSG_EOR);
#endif
#ifdef MSG_TRUNC
insint(d, "MSG_TRUNC", MSG_TRUNC);
#endif
#ifdef MSG_CTRUNC
insint(d, "MSG_CTRUNC", MSG_CTRUNC);
#endif
#ifdef MSG_WAITALL
insint(d, "MSG_WAITALL", MSG_WAITALL);
#endif
#ifdef MSG_BTAG
insint(d, "MSG_BTAG", MSG_BTAG);
#endif
#ifdef MSG_ETAG
insint(d, "MSG_ETAG", MSG_ETAG);
#endif
/* Protocol level and numbers, usable for [gs]etsockopt */
#ifdef SOL_SOCKET
insint(d, "SOL_SOCKET", SOL_SOCKET);
#endif
#ifdef SOL_IP
insint(d, "SOL_IP", SOL_IP);
#else
insint(d, "SOL_IP", 0);
#endif
#ifdef SOL_IPX
insint(d, "SOL_IPX", SOL_IPX);
#endif
#ifdef SOL_AX25
insint(d, "SOL_AX25", SOL_AX25);
#endif
#ifdef SOL_ATALK
insint(d, "SOL_ATALK", SOL_ATALK);
#endif
#ifdef SOL_NETROM
insint(d, "SOL_NETROM", SOL_NETROM);
#endif
#ifdef SOL_ROSE
insint(d, "SOL_ROSE", SOL_ROSE);
#endif
#ifdef SOL_TCP
insint(d, "SOL_TCP", SOL_TCP);
#else
insint(d, "SOL_TCP", 6);
#endif
#ifdef SOL_UDP
insint(d, "SOL_UDP", SOL_UDP);
#else
insint(d, "SOL_UDP", 17);
#endif
1995-02-07 11:39:52 -04:00
#ifdef IPPROTO_IP
insint(d, "IPPROTO_IP", IPPROTO_IP);
#else
insint(d, "IPPROTO_IP", 0);
1995-02-07 11:39:52 -04:00
#endif
#ifdef IPPROTO_HOPOPTS
insint(d, "IPPROTO_HOPOPTS", IPPROTO_HOPOPTS);
#endif
1995-02-07 11:39:52 -04:00
#ifdef IPPROTO_ICMP
insint(d, "IPPROTO_ICMP", IPPROTO_ICMP);
#else
insint(d, "IPPROTO_ICMP", 1);
1995-02-07 11:39:52 -04:00
#endif
#ifdef IPPROTO_IGMP
insint(d, "IPPROTO_IGMP", IPPROTO_IGMP);
#endif
#ifdef IPPROTO_GGP
insint(d, "IPPROTO_GGP", IPPROTO_GGP);
#endif
#ifdef IPPROTO_IPV4
insint(d, "IPPROTO_IPV4", IPPROTO_IPV4);
#endif
#ifdef IPPROTO_IPIP
insint(d, "IPPROTO_IPIP", IPPROTO_IPIP);
#endif
1995-02-07 11:39:52 -04:00
#ifdef IPPROTO_TCP
insint(d, "IPPROTO_TCP", IPPROTO_TCP);
#else
insint(d, "IPPROTO_TCP", 6);
1995-02-07 11:39:52 -04:00
#endif
#ifdef IPPROTO_EGP
insint(d, "IPPROTO_EGP", IPPROTO_EGP);
#endif
#ifdef IPPROTO_PUP
insint(d, "IPPROTO_PUP", IPPROTO_PUP);
#endif
#ifdef IPPROTO_UDP
insint(d, "IPPROTO_UDP", IPPROTO_UDP);
#else
insint(d, "IPPROTO_UDP", 17);
1995-02-07 11:39:52 -04:00
#endif
#ifdef IPPROTO_IDP
insint(d, "IPPROTO_IDP", IPPROTO_IDP);
#endif
#ifdef IPPROTO_HELLO
insint(d, "IPPROTO_HELLO", IPPROTO_HELLO);
#endif
#ifdef IPPROTO_ND
insint(d, "IPPROTO_ND", IPPROTO_ND);
#endif
#ifdef IPPROTO_TP
insint(d, "IPPROTO_TP", IPPROTO_TP);
#endif
#ifdef IPPROTO_IPV6
insint(d, "IPPROTO_IPV6", IPPROTO_IPV6);
#endif
#ifdef IPPROTO_ROUTING
insint(d, "IPPROTO_ROUTING", IPPROTO_ROUTING);
#endif
#ifdef IPPROTO_FRAGMENT
insint(d, "IPPROTO_FRAGMENT", IPPROTO_FRAGMENT);
#endif
#ifdef IPPROTO_RSVP
insint(d, "IPPROTO_RSVP", IPPROTO_RSVP);
#endif
#ifdef IPPROTO_GRE
insint(d, "IPPROTO_GRE", IPPROTO_GRE);
#endif
#ifdef IPPROTO_ESP
insint(d, "IPPROTO_ESP", IPPROTO_ESP);
#endif
#ifdef IPPROTO_AH
insint(d, "IPPROTO_AH", IPPROTO_AH);
#endif
#ifdef IPPROTO_MOBILE
insint(d, "IPPROTO_MOBILE", IPPROTO_MOBILE);
#endif
#ifdef IPPROTO_ICMPV6
insint(d, "IPPROTO_ICMPV6", IPPROTO_ICMPV6);
#endif
#ifdef IPPROTO_NONE
insint(d, "IPPROTO_NONE", IPPROTO_NONE);
#endif
#ifdef IPPROTO_DSTOPTS
insint(d, "IPPROTO_DSTOPTS", IPPROTO_DSTOPTS);
#endif
1995-02-07 11:39:52 -04:00
#ifdef IPPROTO_XTP
insint(d, "IPPROTO_XTP", IPPROTO_XTP);
#endif
#ifdef IPPROTO_EON
insint(d, "IPPROTO_EON", IPPROTO_EON);
#endif
#ifdef IPPROTO_PIM
insint(d, "IPPROTO_PIM", IPPROTO_PIM);
#endif
#ifdef IPPROTO_IPCOMP
insint(d, "IPPROTO_IPCOMP", IPPROTO_IPCOMP);
#endif
#ifdef IPPROTO_VRRP
insint(d, "IPPROTO_VRRP", IPPROTO_VRRP);
#endif
1995-02-07 11:39:52 -04:00
#ifdef IPPROTO_BIP
insint(d, "IPPROTO_BIP", IPPROTO_BIP);
#endif
/**/
#ifdef IPPROTO_RAW
insint(d, "IPPROTO_RAW", IPPROTO_RAW);
#else
insint(d, "IPPROTO_RAW", 255);
1995-02-07 11:39:52 -04:00
#endif
#ifdef IPPROTO_MAX
insint(d, "IPPROTO_MAX", IPPROTO_MAX);
#endif
/* Some port configuration */
#ifdef IPPORT_RESERVED
insint(d, "IPPORT_RESERVED", IPPORT_RESERVED);
#else
insint(d, "IPPORT_RESERVED", 1024);
#endif
#ifdef IPPORT_USERRESERVED
insint(d, "IPPORT_USERRESERVED", IPPORT_USERRESERVED);
#else
insint(d, "IPPORT_USERRESERVED", 5000);
#endif
1995-02-17 11:11:07 -04:00
/* Some reserved IP v.4 addresses */
#ifdef INADDR_ANY
insint(d, "INADDR_ANY", INADDR_ANY);
#else
insint(d, "INADDR_ANY", 0x00000000);
#endif
#ifdef INADDR_BROADCAST
insint(d, "INADDR_BROADCAST", INADDR_BROADCAST);
#else
insint(d, "INADDR_BROADCAST", 0xffffffff);
#endif
#ifdef INADDR_LOOPBACK
insint(d, "INADDR_LOOPBACK", INADDR_LOOPBACK);
#else
insint(d, "INADDR_LOOPBACK", 0x7F000001);
#endif
#ifdef INADDR_UNSPEC_GROUP
insint(d, "INADDR_UNSPEC_GROUP", INADDR_UNSPEC_GROUP);
#else
insint(d, "INADDR_UNSPEC_GROUP", 0xe0000000);
#endif
#ifdef INADDR_ALLHOSTS_GROUP
insint(d, "INADDR_ALLHOSTS_GROUP", INADDR_ALLHOSTS_GROUP);
#else
insint(d, "INADDR_ALLHOSTS_GROUP", 0xe0000001);
#endif
#ifdef INADDR_MAX_LOCAL_GROUP
insint(d, "INADDR_MAX_LOCAL_GROUP", INADDR_MAX_LOCAL_GROUP);
#else
insint(d, "INADDR_MAX_LOCAL_GROUP", 0xe00000ff);
#endif
#ifdef INADDR_NONE
insint(d, "INADDR_NONE", INADDR_NONE);
#else
insint(d, "INADDR_NONE", 0xffffffff);
#endif
/* IPv4 [gs]etsockopt options */
1995-02-07 11:39:52 -04:00
#ifdef IP_OPTIONS
insint(d, "IP_OPTIONS", IP_OPTIONS);
#endif
#ifdef IP_HDRINCL
insint(d, "IP_HDRINCL", IP_HDRINCL);
#endif
#ifdef IP_TOS
insint(d, "IP_TOS", IP_TOS);
#endif
#ifdef IP_TTL
insint(d, "IP_TTL", IP_TTL);
#endif
#ifdef IP_RECVOPTS
insint(d, "IP_RECVOPTS", IP_RECVOPTS);
#endif
#ifdef IP_RECVRETOPTS
insint(d, "IP_RECVRETOPTS", IP_RECVRETOPTS);
#endif
#ifdef IP_RECVDSTADDR
insint(d, "IP_RECVDSTADDR", IP_RECVDSTADDR);
#endif
#ifdef IP_RETOPTS
insint(d, "IP_RETOPTS", IP_RETOPTS);
#endif
#ifdef IP_MULTICAST_IF
insint(d, "IP_MULTICAST_IF", IP_MULTICAST_IF);
#endif
#ifdef IP_MULTICAST_TTL
insint(d, "IP_MULTICAST_TTL", IP_MULTICAST_TTL);
#endif
#ifdef IP_MULTICAST_LOOP
insint(d, "IP_MULTICAST_LOOP", IP_MULTICAST_LOOP);
#endif
#ifdef IP_ADD_MEMBERSHIP
insint(d, "IP_ADD_MEMBERSHIP", IP_ADD_MEMBERSHIP);
#endif
#ifdef IP_DROP_MEMBERSHIP
insint(d, "IP_DROP_MEMBERSHIP", IP_DROP_MEMBERSHIP);
#endif
#ifdef IP_DEFAULT_MULTICAST_TTL
insint(d, "IP_DEFAULT_MULTICAST_TTL", IP_DEFAULT_MULTICAST_TTL);
#endif
#ifdef IP_DEFAULT_MULTICAST_LOOP
insint(d, "IP_DEFAULT_MULTICAST_LOOP", IP_DEFAULT_MULTICAST_LOOP);
#endif
#ifdef IP_MAX_MEMBERSHIPS
insint(d, "IP_MAX_MEMBERSHIPS", IP_MAX_MEMBERSHIPS);
#endif
/* IPv6 [gs]etsockopt options, defined in RFC2553 */
#ifdef IPV6_JOIN_GROUP
insint(d, "IPV6_JOIN_GROUP", IPV6_JOIN_GROUP);
#endif
#ifdef IPV6_LEAVE_GROUP
insint(d, "IPV6_LEAVE_GROUP", IPV6_LEAVE_GROUP);
#endif
#ifdef IPV6_MULTICAST_HOPS
insint(d, "IPV6_MULTICAST_HOPS", IPV6_MULTICAST_HOPS);
#endif
#ifdef IPV6_MULTICAST_IF
insint(d, "IPV6_MULTICAST_IF", IPV6_MULTICAST_IF);
#endif
#ifdef IPV6_MULTICAST_LOOP
insint(d, "IPV6_MULTICAST_LOOP", IPV6_MULTICAST_LOOP);
#endif
#ifdef IPV6_UNICAST_HOPS
insint(d, "IPV6_UNICAST_HOPS", IPV6_UNICAST_HOPS);
#endif
/* TCP options */
#ifdef TCP_NODELAY
insint(d, "TCP_NODELAY", TCP_NODELAY);
#endif
#ifdef TCP_MAXSEG
insint(d, "TCP_MAXSEG", TCP_MAXSEG);
#endif
/* IPX options */
#ifdef IPX_TYPE
insint(d, "IPX_TYPE", IPX_TYPE);
#endif
/* get{addr,name}info parameters */
#ifdef EAI_ADDRFAMILY
insint(d, "EAI_ADDRFAMILY", EAI_ADDRFAMILY);
#endif
#ifdef EAI_AGAIN
insint(d, "EAI_AGAIN", EAI_AGAIN);
#endif
#ifdef EAI_BADFLAGS
insint(d, "EAI_BADFLAGS", EAI_BADFLAGS);
#endif
#ifdef EAI_FAIL
insint(d, "EAI_FAIL", EAI_FAIL);
#endif
#ifdef EAI_FAMILY
insint(d, "EAI_FAMILY", EAI_FAMILY);
#endif
#ifdef EAI_MEMORY
insint(d, "EAI_MEMORY", EAI_MEMORY);
#endif
#ifdef EAI_NODATA
insint(d, "EAI_NODATA", EAI_NODATA);
#endif
#ifdef EAI_NONAME
insint(d, "EAI_NONAME", EAI_NONAME);
#endif
#ifdef EAI_SERVICE
insint(d, "EAI_SERVICE", EAI_SERVICE);
#endif
#ifdef EAI_SOCKTYPE
insint(d, "EAI_SOCKTYPE", EAI_SOCKTYPE);
#endif
#ifdef EAI_SYSTEM
insint(d, "EAI_SYSTEM", EAI_SYSTEM);
#endif
#ifdef EAI_BADHINTS
insint(d, "EAI_BADHINTS", EAI_BADHINTS);
#endif
#ifdef EAI_PROTOCOL
insint(d, "EAI_PROTOCOL", EAI_PROTOCOL);
#endif
#ifdef EAI_MAX
insint(d, "EAI_MAX", EAI_MAX);
#endif
#ifdef AI_PASSIVE
insint(d, "AI_PASSIVE", AI_PASSIVE);
#endif
#ifdef AI_CANONNAME
insint(d, "AI_CANONNAME", AI_CANONNAME);
#endif
#ifdef AI_NUMERICHOST
insint(d, "AI_NUMERICHOST", AI_NUMERICHOST);
#endif
#ifdef AI_MASK
insint(d, "AI_MASK", AI_MASK);
#endif
#ifdef AI_ALL
insint(d, "AI_ALL", AI_ALL);
#endif
#ifdef AI_V4MAPPED_CFG
insint(d, "AI_V4MAPPED_CFG", AI_V4MAPPED_CFG);
#endif
#ifdef AI_ADDRCONFIG
insint(d, "AI_ADDRCONFIG", AI_ADDRCONFIG);
#endif
#ifdef AI_V4MAPPED
insint(d, "AI_V4MAPPED", AI_V4MAPPED);
#endif
#ifdef AI_DEFAULT
insint(d, "AI_DEFAULT", AI_DEFAULT);
#endif
#ifdef NI_MAXHOST
insint(d, "NI_MAXHOST", NI_MAXHOST);
#endif
#ifdef NI_MAXSERV
insint(d, "NI_MAXSERV", NI_MAXSERV);
#endif
#ifdef NI_NOFQDN
insint(d, "NI_NOFQDN", NI_NOFQDN);
#endif
#ifdef NI_NUMERICHOST
insint(d, "NI_NUMERICHOST", NI_NUMERICHOST);
#endif
#ifdef NI_NAMEREQD
insint(d, "NI_NAMEREQD", NI_NAMEREQD);
#endif
#ifdef NI_NUMERICSERV
insint(d, "NI_NUMERICSERV", NI_NUMERICSERV);
#endif
#ifdef NI_DGRAM
insint(d, "NI_DGRAM", NI_DGRAM);
#endif
/* Initialize gethostbyname lock */
#ifdef USE_GETHOSTBYNAME_LOCK
gethostbyname_lock = PyThread_allocate_lock();
#endif
1991-06-25 18:36:08 -03:00
}
/* Simplistic emulation code for inet_pton that only works for IPv4 */
#ifndef HAVE_INET_PTON
2001-06-24 18:35:43 -03:00
int
inet_pton (int af, const char *src, void *dst)
{
if(af == AF_INET){
long packed_addr;
#ifdef USE_GUSI1
packed_addr = (long)inet_addr(src).s_addr;
#else
packed_addr = inet_addr(src);
#endif
if (packed_addr == INADDR_NONE)
return 0;
memcpy(dst, &packed_addr, 4);
return 1;
}
/* Should set errno to EAFNOSUPPORT */
return -1;
}
const char *
inet_ntop(int af, const void *src, char *dst, socklen_t size)
{
if (af == AF_INET) {
struct in_addr packed_addr;
if (size < 16)
/* Should set errno to ENOSPC. */
return NULL;
memcpy(&packed_addr, src, sizeof(packed_addr));
return strncpy(dst, inet_ntoa(packed_addr), size);
}
/* Should set errno to EAFNOSUPPORT */
return NULL;
}
#endif