X-Git-Url: http://git.meshlink.io/?a=blobdiff_plain;f=src%2Fcompat%2Fwindows%2Fwincompat.c;h=3e6417ef2d2115acf87b3fdc6640938393c076c3;hb=5f7ef478c0571c3b833b4486bae73bd4b7ddbb3d;hp=d0d239cc7924f10542e8c81a37c785b85c5db86c;hpb=f8ac9afd843c50ab15d7645d6479f65e0ec562cc;p=catta diff --git a/src/compat/windows/wincompat.c b/src/compat/windows/wincompat.c index d0d239c..3e6417e 100644 --- a/src/compat/windows/wincompat.c +++ b/src/compat/windows/wincompat.c @@ -4,10 +4,13 @@ #include #include +#include + // helper: convert WSAGetLastError() to an errno constant static int wsa_errno(void) { switch(WSAGetLastError()) { + case WSAEACCES: return EACCES; case WSAECONNRESET: return ECONNRESET; case WSAEFAULT: return EFAULT; case WSAEINPROGRESS: return EINPROGRESS; @@ -16,15 +19,43 @@ static int wsa_errno(void) case WSAEMSGSIZE: return EMSGSIZE; case WSAENETDOWN: return ENETDOWN; case WSAENETRESET: return ENETRESET; + case WSAENOBUFS: return ENOBUFS; case WSAENOTCONN: return ENOTCONN; case WSAENOTSOCK: return ENOTSOCK; case WSAEOPNOTSUPP: return EOPNOTSUPP; + case WSAESHUTDOWN: return ESHUTDOWN; + case WSAETIMEDOUT: return ETIMEDOUT; case WSAEWOULDBLOCK: return EWOULDBLOCK; default: return EINVAL; } } +void winsock_init(void) +{ + WSADATA wsa; + int error; + + if((error = WSAStartup(MAKEWORD(2,2), &wsa)) != 0) + catta_log_error("WSAStartup() failed: %d", error); +} + +void winsock_exit(void) +{ + if(WSACleanup() == SOCKET_ERROR) + catta_log_warn("WSACleanup() failed: %d", WSAGetLastError()); +} + +char *errnostrsocket(void) +{ + static char buf[256]; + + FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, + NULL, WSAGetLastError(), 0, buf, sizeof(buf), NULL); + + return buf; +} + ssize_t recvmsg(int sockfd, struct msghdr *msg, int flags) { LPFN_WSARECVMSG WSARecvMsg = NULL; @@ -95,6 +126,7 @@ ssize_t recvmsg(int sockfd, struct msghdr *msg, int flags) } // DWORD has one bit more than ssize_t on 32bit + // XXX check for this condition before the WSARecvMsg call if(bytesrcvd > SSIZE_MAX) { errno = EINVAL; return -1; @@ -109,6 +141,146 @@ ssize_t recvmsg(int sockfd, struct msghdr *msg, int flags) return bytesrcvd; } +ssize_t sendmsg(int sockfd, const struct msghdr *msg, int flags) +{ + LPFN_WSASENDMSG WSASendMsg = NULL; + GUID wsaid = WSAID_WSASENDMSG; + DWORD b; + + DWORD bytessent; + WSAMSG wsamsg; + size_t i; + int r; + + // size_t is larger than DWORD on 64bit + if(msg->msg_iovlen > UINT32_MAX) { + errno = EINVAL; + return -1; + } + + // obtain the function pointer to WSASendMsg + r = WSAIoctl(sockfd, SIO_GET_EXTENSION_FUNCTION_POINTER, + &wsaid, sizeof(wsaid), &WSASendMsg, sizeof(WSASendMsg), + &b, NULL, NULL); + if(r == SOCKET_ERROR) { + errno = wsa_errno(); + return -1; + } + assert(b == sizeof(WSASendMsg)); + assert(WSASendMsg != NULL); + + // convert msghdr to WSAMSG structure + wsamsg.name = msg->msg_name; + wsamsg.namelen = msg->msg_namelen; + wsamsg.lpBuffers = malloc(msg->msg_iovlen * sizeof(WSABUF)); + wsamsg.dwBufferCount = msg->msg_iovlen; + wsamsg.Control.len = msg->msg_controllen; + wsamsg.Control.buf = msg->msg_control; + wsamsg.dwFlags = 0; // ignored + + if(wsamsg.lpBuffers == NULL) { + // malloc will have set errno + return -1; + } + + // re-wrap iovecs as WSABUFs + for(i=0; imsg_iovlen; i++) { + // size_t vs. u_long + if(msg->msg_iov[i].iov_len > ULONG_MAX) { + free(wsamsg.lpBuffers); + errno = EINVAL; + return -1; + } + + wsamsg.lpBuffers[i].len = msg->msg_iov[i].iov_len; + wsamsg.lpBuffers[i].buf = msg->msg_iov[i].iov_base; + } + + r = WSASendMsg(sockfd, &wsamsg, flags, &bytessent, NULL, NULL); + + // the allocated WSABUF wrappers are no longer needed + free(wsamsg.lpBuffers); + + if(r == SOCKET_ERROR) { + // XXX do we need special handling for ENETRESET, ETIMEDOUT? + errno = wsa_errno(); + return -1; + } + + // DWORD has one bit more than ssize_t on 32bit + // XXX check for this condition before sending anything + if(bytessent > SSIZE_MAX) { + errno = EINVAL; + return -1; + } + + return bytessent; +} + +int ioctl(int d, unsigned long request, int *p) +{ + u_long arg = 0; + + if(ioctlsocket(d, request, &arg) == SOCKET_ERROR) { + errno = wsa_errno(); + return -1; + } + + if(arg > INT_MAX) { + errno = EINVAL; + return -1; + } + + *p = arg; + return 0; +} + +int pipe(int pipefd[2]) +{ + int lsock = INVALID_SOCKET; + struct sockaddr_in laddr; + socklen_t laddrlen = sizeof(laddr); + + pipefd[0] = pipefd[1] = INVALID_SOCKET; + + // bind a listening socket to a TCP port on localhost + laddr.sin_family = AF_INET; + laddr.sin_port = 0; + laddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); + if((lsock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == SOCKET_ERROR) + goto fail; + if(bind(lsock, (struct sockaddr *)&laddr, sizeof(laddr)) == SOCKET_ERROR) + goto fail; + if(listen(lsock, 1) == SOCKET_ERROR) + goto fail; + + // determine which address (i.e. port) we got bound to + if(getsockname(lsock, (struct sockaddr *)&laddr, &laddrlen) == SOCKET_ERROR) + goto fail; + assert(laddrlen == sizeof(laddr)); + laddr.sin_family = AF_INET; + laddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); + + // connect and accept + if((pipefd[0] = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == SOCKET_ERROR) + goto fail; + if(connect(pipefd[0], (const struct sockaddr *)&laddr, sizeof(laddr)) == SOCKET_ERROR) + goto fail; + if((pipefd[1] = accept(lsock, NULL, NULL)) == SOCKET_ERROR) + goto fail; + + // close the listener + closesocket(lsock); + + return 0; + +fail: + errno = wsa_errno(); + closesocket(pipefd[0]); + closesocket(lsock); + return -1; +} + int uname(struct utsname *buf) { SYSTEM_INFO si;