00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011 #include "rubysocket.h"
00012
00013 static VALUE sock_s_unpack_sockaddr_in(VALUE, VALUE);
00014
00015 void
00016 rsock_sys_fail_host_port(const char *mesg, VALUE host, VALUE port)
00017 {
00018 rsock_syserr_fail_host_port(errno, mesg, host, port);
00019 }
00020
00021 void
00022 rsock_syserr_fail_host_port(int err, const char *mesg, VALUE host, VALUE port)
00023 {
00024 VALUE message;
00025
00026 message = rb_sprintf("%s for %+"PRIsVALUE" port % "PRIsVALUE"",
00027 mesg, host, port);
00028
00029 rb_syserr_fail_str(err, message);
00030 }
00031
00032 void
00033 rsock_sys_fail_path(const char *mesg, VALUE path)
00034 {
00035 rsock_syserr_fail_path(errno, mesg, path);
00036 }
00037
00038 void
00039 rsock_syserr_fail_path(int err, const char *mesg, VALUE path)
00040 {
00041 VALUE message;
00042
00043 if (RB_TYPE_P(path, T_STRING)) {
00044 message = rb_sprintf("%s for % "PRIsVALUE"", mesg, path);
00045 rb_syserr_fail_str(err, message);
00046 }
00047 else {
00048 rb_syserr_fail(err, mesg);
00049 }
00050 }
00051
00052 void
00053 rsock_sys_fail_sockaddr(const char *mesg, struct sockaddr *addr, socklen_t len)
00054 {
00055 rsock_syserr_fail_sockaddr(errno, mesg, addr, len);
00056 }
00057
00058 void
00059 rsock_syserr_fail_sockaddr(int err, const char *mesg, struct sockaddr *addr, socklen_t len)
00060 {
00061 VALUE rai;
00062
00063 rai = rsock_addrinfo_new(addr, len, PF_UNSPEC, 0, 0, Qnil, Qnil);
00064
00065 rsock_syserr_fail_raddrinfo(err, mesg, rai);
00066 }
00067
00068 void
00069 rsock_sys_fail_raddrinfo(const char *mesg, VALUE rai)
00070 {
00071 rsock_syserr_fail_raddrinfo(errno, mesg, rai);
00072 }
00073
00074 void
00075 rsock_syserr_fail_raddrinfo(int err, const char *mesg, VALUE rai)
00076 {
00077 VALUE str, message;
00078
00079 str = rsock_addrinfo_inspect_sockaddr(rai);
00080 message = rb_sprintf("%s for %"PRIsVALUE"", mesg, str);
00081
00082 rb_syserr_fail_str(err, message);
00083 }
00084
00085 void
00086 rsock_sys_fail_raddrinfo_or_sockaddr(const char *mesg, VALUE addr, VALUE rai)
00087 {
00088 rsock_syserr_fail_raddrinfo_or_sockaddr(errno, mesg, addr, rai);
00089 }
00090
00091 void
00092 rsock_syserr_fail_raddrinfo_or_sockaddr(int err, const char *mesg, VALUE addr, VALUE rai)
00093 {
00094 if (NIL_P(rai)) {
00095 StringValue(addr);
00096
00097 rsock_syserr_fail_sockaddr(err, mesg,
00098 (struct sockaddr *)RSTRING_PTR(addr),
00099 (socklen_t)RSTRING_LEN(addr));
00100 }
00101 else
00102 rsock_syserr_fail_raddrinfo(err, mesg, rai);
00103 }
00104
00105 static void
00106 setup_domain_and_type(VALUE domain, int *dv, VALUE type, int *tv)
00107 {
00108 *dv = rsock_family_arg(domain);
00109 *tv = rsock_socktype_arg(type);
00110 }
00111
00112
00113
00114
00115
00116
00117
00118
00119
00120
00121
00122
00123
00124
00125
00126
00127
00128
00129
00130 static VALUE
00131 sock_initialize(int argc, VALUE *argv, VALUE sock)
00132 {
00133 VALUE domain, type, protocol;
00134 int fd;
00135 int d, t;
00136
00137 rb_scan_args(argc, argv, "21", &domain, &type, &protocol);
00138 if (NIL_P(protocol))
00139 protocol = INT2FIX(0);
00140
00141 rb_secure(3);
00142 setup_domain_and_type(domain, &d, type, &t);
00143 fd = rsock_socket(d, t, NUM2INT(protocol));
00144 if (fd < 0) rb_sys_fail("socket(2)");
00145
00146 return rsock_init_sock(sock, fd);
00147 }
00148
00149 #if defined HAVE_SOCKETPAIR
00150 static VALUE
00151 io_call_close(VALUE io)
00152 {
00153 return rb_funcall(io, rb_intern("close"), 0, 0);
00154 }
00155
00156 static VALUE
00157 io_close(VALUE io)
00158 {
00159 return rb_rescue(io_call_close, io, 0, 0);
00160 }
00161
00162 static VALUE
00163 pair_yield(VALUE pair)
00164 {
00165 return rb_ensure(rb_yield, pair, io_close, rb_ary_entry(pair, 1));
00166 }
00167 #endif
00168
00169 #if defined HAVE_SOCKETPAIR
00170
00171 static int
00172 rsock_socketpair0(int domain, int type, int protocol, int sv[2])
00173 {
00174 int ret;
00175
00176 #ifdef SOCK_CLOEXEC
00177 static int try_sock_cloexec = 1;
00178 if (try_sock_cloexec) {
00179 ret = socketpair(domain, type|SOCK_CLOEXEC, protocol, sv);
00180 if (ret == -1 && errno == EINVAL) {
00181
00182 ret = socketpair(domain, type, protocol, sv);
00183 if (ret != -1) {
00184
00185
00186
00187
00188 try_sock_cloexec = 0;
00189 }
00190 }
00191 }
00192 else {
00193 ret = socketpair(domain, type, protocol, sv);
00194 }
00195 #else
00196 ret = socketpair(domain, type, protocol, sv);
00197 #endif
00198
00199 if (ret == -1) {
00200 return -1;
00201 }
00202
00203 rb_fd_fix_cloexec(sv[0]);
00204 rb_fd_fix_cloexec(sv[1]);
00205
00206 return ret;
00207 }
00208
00209 static int
00210 rsock_socketpair(int domain, int type, int protocol, int sv[2])
00211 {
00212 int ret;
00213
00214 ret = rsock_socketpair0(domain, type, protocol, sv);
00215 if (ret < 0 && (errno == EMFILE || errno == ENFILE)) {
00216 rb_gc();
00217 ret = rsock_socketpair0(domain, type, protocol, sv);
00218 }
00219
00220 return ret;
00221 }
00222
00223
00224
00225
00226
00227
00228
00229
00230
00231
00232
00233
00234
00235
00236
00237
00238
00239
00240
00241
00242
00243
00244
00245
00246
00247
00248
00249
00250
00251
00252 VALUE
00253 rsock_sock_s_socketpair(int argc, VALUE *argv, VALUE klass)
00254 {
00255 VALUE domain, type, protocol;
00256 int d, t, p, sp[2];
00257 int ret;
00258 VALUE s1, s2, r;
00259
00260 rb_scan_args(argc, argv, "21", &domain, &type, &protocol);
00261 if (NIL_P(protocol))
00262 protocol = INT2FIX(0);
00263
00264 setup_domain_and_type(domain, &d, type, &t);
00265 p = NUM2INT(protocol);
00266 ret = rsock_socketpair(d, t, p, sp);
00267 if (ret < 0) {
00268 rb_sys_fail("socketpair(2)");
00269 }
00270 rb_fd_fix_cloexec(sp[0]);
00271 rb_fd_fix_cloexec(sp[1]);
00272
00273 s1 = rsock_init_sock(rb_obj_alloc(klass), sp[0]);
00274 s2 = rsock_init_sock(rb_obj_alloc(klass), sp[1]);
00275 r = rb_assoc_new(s1, s2);
00276 if (rb_block_given_p()) {
00277 return rb_ensure(pair_yield, r, io_close, s1);
00278 }
00279 return r;
00280 }
00281 #else
00282 #define rsock_sock_s_socketpair rb_f_notimplement
00283 #endif
00284
00285
00286
00287
00288
00289
00290
00291
00292
00293
00294
00295
00296
00297
00298
00299
00300
00301
00302
00303
00304
00305
00306
00307
00308
00309
00310
00311
00312
00313
00314
00315
00316
00317
00318
00319
00320
00321
00322
00323
00324
00325
00326
00327
00328
00329
00330
00331
00332
00333
00334
00335
00336
00337
00338
00339
00340
00341
00342
00343
00344
00345
00346
00347
00348
00349
00350
00351
00352
00353
00354
00355
00356
00357
00358
00359
00360
00361
00362
00363
00364
00365
00366
00367
00368
00369
00370
00371
00372
00373
00374
00375
00376
00377
00378
00379
00380
00381
00382
00383
00384
00385
00386
00387
00388
00389
00390
00391
00392
00393
00394
00395
00396 static VALUE
00397 sock_connect(VALUE sock, VALUE addr)
00398 {
00399 VALUE rai;
00400 rb_io_t *fptr;
00401 int fd, n;
00402
00403 SockAddrStringValueWithAddrinfo(addr, rai);
00404 addr = rb_str_new4(addr);
00405 GetOpenFile(sock, fptr);
00406 fd = fptr->fd;
00407 n = rsock_connect(fd, (struct sockaddr*)RSTRING_PTR(addr), RSTRING_SOCKLEN(addr), 0);
00408 if (n < 0) {
00409 rsock_sys_fail_raddrinfo_or_sockaddr("connect(2)", addr, rai);
00410 }
00411
00412 return INT2FIX(n);
00413 }
00414
00415
00416
00417
00418
00419
00420
00421
00422
00423
00424
00425
00426
00427
00428
00429
00430
00431
00432
00433
00434
00435
00436
00437
00438
00439
00440
00441
00442
00443
00444
00445
00446
00447
00448
00449
00450
00451
00452
00453
00454
00455
00456
00457 static VALUE
00458 sock_connect_nonblock(VALUE sock, VALUE addr)
00459 {
00460 VALUE rai;
00461 rb_io_t *fptr;
00462 int n;
00463
00464 SockAddrStringValueWithAddrinfo(addr, rai);
00465 addr = rb_str_new4(addr);
00466 GetOpenFile(sock, fptr);
00467 rb_io_set_nonblock(fptr);
00468 n = connect(fptr->fd, (struct sockaddr*)RSTRING_PTR(addr), RSTRING_SOCKLEN(addr));
00469 if (n < 0) {
00470 if (errno == EINPROGRESS)
00471 rb_readwrite_sys_fail(RB_IO_WAIT_WRITABLE, "connect(2) would block");
00472 rsock_sys_fail_raddrinfo_or_sockaddr("connect(2)", addr, rai);
00473 }
00474
00475 return INT2FIX(n);
00476 }
00477
00478
00479
00480
00481
00482
00483
00484
00485
00486
00487
00488
00489
00490
00491
00492
00493
00494
00495
00496
00497
00498
00499
00500
00501
00502
00503
00504
00505
00506
00507
00508
00509
00510
00511
00512
00513
00514
00515
00516
00517
00518
00519
00520
00521
00522
00523
00524
00525
00526
00527
00528
00529
00530
00531
00532
00533
00534
00535
00536
00537
00538
00539
00540
00541
00542
00543
00544
00545
00546
00547
00548
00549
00550
00551
00552
00553
00554
00555
00556
00557
00558
00559
00560
00561
00562
00563
00564 static VALUE
00565 sock_bind(VALUE sock, VALUE addr)
00566 {
00567 VALUE rai;
00568 rb_io_t *fptr;
00569
00570 SockAddrStringValueWithAddrinfo(addr, rai);
00571 GetOpenFile(sock, fptr);
00572 if (bind(fptr->fd, (struct sockaddr*)RSTRING_PTR(addr), RSTRING_SOCKLEN(addr)) < 0)
00573 rsock_sys_fail_raddrinfo_or_sockaddr("bind(2)", addr, rai);
00574
00575 return INT2FIX(0);
00576 }
00577
00578
00579
00580
00581
00582
00583
00584
00585
00586
00587
00588
00589
00590
00591
00592
00593
00594
00595
00596
00597
00598
00599
00600
00601
00602
00603
00604
00605
00606
00607
00608
00609
00610
00611
00612
00613
00614
00615
00616
00617
00618
00619
00620
00621
00622
00623
00624
00625
00626
00627
00628
00629
00630
00631
00632
00633
00634
00635
00636
00637
00638
00639
00640
00641
00642
00643
00644
00645
00646
00647
00648 VALUE
00649 rsock_sock_listen(VALUE sock, VALUE log)
00650 {
00651 rb_io_t *fptr;
00652 int backlog;
00653
00654 backlog = NUM2INT(log);
00655 GetOpenFile(sock, fptr);
00656 if (listen(fptr->fd, backlog) < 0)
00657 rb_sys_fail("listen(2)");
00658
00659 return INT2FIX(0);
00660 }
00661
00662
00663
00664
00665
00666
00667
00668
00669
00670
00671
00672
00673
00674
00675
00676
00677
00678
00679
00680
00681
00682
00683
00684
00685
00686
00687
00688
00689
00690
00691
00692
00693
00694
00695
00696
00697
00698
00699
00700
00701
00702
00703
00704
00705
00706
00707
00708
00709
00710
00711
00712
00713
00714
00715
00716
00717
00718
00719
00720
00721
00722
00723
00724
00725
00726
00727
00728
00729
00730
00731
00732
00733
00734
00735
00736
00737
00738
00739
00740
00741
00742
00743
00744
00745
00746
00747
00748
00749
00750
00751
00752
00753
00754
00755
00756
00757
00758
00759
00760
00761
00762
00763
00764
00765
00766
00767 static VALUE
00768 sock_recvfrom(int argc, VALUE *argv, VALUE sock)
00769 {
00770 return rsock_s_recvfrom(sock, argc, argv, RECV_SOCKET);
00771 }
00772
00773
00774
00775
00776
00777
00778
00779
00780
00781
00782
00783
00784
00785
00786
00787
00788
00789
00790
00791
00792
00793
00794
00795
00796
00797
00798
00799
00800
00801
00802
00803
00804
00805
00806
00807
00808
00809
00810
00811
00812
00813
00814
00815
00816
00817
00818
00819
00820
00821
00822
00823
00824
00825
00826
00827
00828
00829
00830
00831
00832
00833
00834
00835 static VALUE
00836 sock_recvfrom_nonblock(int argc, VALUE *argv, VALUE sock)
00837 {
00838 return rsock_s_recvfrom_nonblock(sock, argc, argv, RECV_SOCKET);
00839 }
00840
00841
00842
00843
00844
00845
00846
00847
00848
00849
00850
00851
00852
00853
00854
00855 static VALUE
00856 sock_accept(VALUE sock)
00857 {
00858 rb_io_t *fptr;
00859 VALUE sock2;
00860 union_sockaddr buf;
00861 socklen_t len = (socklen_t)sizeof buf;
00862
00863 GetOpenFile(sock, fptr);
00864 sock2 = rsock_s_accept(rb_cSocket,fptr->fd,&buf.addr,&len);
00865
00866 return rb_assoc_new(sock2, rsock_io_socket_addrinfo(sock2, &buf.addr, len));
00867 }
00868
00869
00870
00871
00872
00873
00874
00875
00876
00877
00878
00879
00880
00881
00882
00883
00884
00885
00886
00887
00888
00889
00890
00891
00892
00893
00894
00895
00896
00897
00898
00899
00900
00901
00902
00903
00904
00905
00906
00907
00908
00909
00910
00911
00912
00913
00914
00915
00916
00917
00918
00919
00920 static VALUE
00921 sock_accept_nonblock(VALUE sock)
00922 {
00923 rb_io_t *fptr;
00924 VALUE sock2;
00925 union_sockaddr buf;
00926 socklen_t len = (socklen_t)sizeof buf;
00927
00928 GetOpenFile(sock, fptr);
00929 sock2 = rsock_s_accept_nonblock(rb_cSocket, fptr, &buf.addr, &len);
00930 return rb_assoc_new(sock2, rsock_io_socket_addrinfo(sock2, &buf.addr, len));
00931 }
00932
00933
00934
00935
00936
00937
00938
00939
00940
00941
00942
00943
00944
00945
00946
00947
00948
00949
00950
00951
00952
00953
00954
00955
00956
00957
00958
00959
00960
00961
00962
00963
00964
00965
00966
00967
00968
00969
00970
00971 static VALUE
00972 sock_sysaccept(VALUE sock)
00973 {
00974 rb_io_t *fptr;
00975 VALUE sock2;
00976 union_sockaddr buf;
00977 socklen_t len = (socklen_t)sizeof buf;
00978
00979 GetOpenFile(sock, fptr);
00980 sock2 = rsock_s_accept(0,fptr->fd,&buf.addr,&len);
00981
00982 return rb_assoc_new(sock2, rsock_io_socket_addrinfo(sock2, &buf.addr, len));
00983 }
00984
00985 #ifdef HAVE_GETHOSTNAME
00986
00987
00988
00989
00990
00991
00992
00993
00994
00995
00996
00997 static VALUE
00998 sock_gethostname(VALUE obj)
00999 {
01000 #ifndef HOST_NAME_MAX
01001 # define HOST_NAME_MAX 1024
01002 #endif
01003 long len = HOST_NAME_MAX;
01004 VALUE name;
01005
01006 rb_secure(3);
01007 name = rb_str_new(0, len);
01008 while (gethostname(RSTRING_PTR(name), len) < 0) {
01009 int e = errno;
01010 switch (e) {
01011 case ENAMETOOLONG:
01012 #ifdef __linux__
01013 case EINVAL:
01014
01015 #endif
01016 break;
01017 default:
01018 rb_syserr_fail(e, "gethostname(3)");
01019 }
01020 rb_str_modify_expand(name, len);
01021 len += len;
01022 }
01023 rb_str_resize(name, strlen(RSTRING_PTR(name)));
01024 return name;
01025 }
01026 #else
01027 #ifdef HAVE_UNAME
01028
01029 #include <sys/utsname.h>
01030
01031 static VALUE
01032 sock_gethostname(VALUE obj)
01033 {
01034 struct utsname un;
01035
01036 rb_secure(3);
01037 uname(&un);
01038 return rb_str_new2(un.nodename);
01039 }
01040 #else
01041 #define sock_gethostname rb_f_notimplement
01042 #endif
01043 #endif
01044
01045 static VALUE
01046 make_addrinfo(struct rb_addrinfo *res0, int norevlookup)
01047 {
01048 VALUE base, ary;
01049 struct addrinfo *res;
01050
01051 if (res0 == NULL) {
01052 rb_raise(rb_eSocket, "host not found");
01053 }
01054 base = rb_ary_new();
01055 for (res = res0->ai; res; res = res->ai_next) {
01056 ary = rsock_ipaddr(res->ai_addr, res->ai_addrlen, norevlookup);
01057 if (res->ai_canonname) {
01058 RARRAY_PTR(ary)[2] = rb_str_new2(res->ai_canonname);
01059 }
01060 rb_ary_push(ary, INT2FIX(res->ai_family));
01061 rb_ary_push(ary, INT2FIX(res->ai_socktype));
01062 rb_ary_push(ary, INT2FIX(res->ai_protocol));
01063 rb_ary_push(base, ary);
01064 }
01065 return base;
01066 }
01067
01068 static VALUE
01069 sock_sockaddr(struct sockaddr *addr, socklen_t len)
01070 {
01071 char *ptr;
01072
01073 switch (addr->sa_family) {
01074 case AF_INET:
01075 ptr = (char*)&((struct sockaddr_in*)addr)->sin_addr.s_addr;
01076 len = (socklen_t)sizeof(((struct sockaddr_in*)addr)->sin_addr.s_addr);
01077 break;
01078 #ifdef AF_INET6
01079 case AF_INET6:
01080 ptr = (char*)&((struct sockaddr_in6*)addr)->sin6_addr.s6_addr;
01081 len = (socklen_t)sizeof(((struct sockaddr_in6*)addr)->sin6_addr.s6_addr);
01082 break;
01083 #endif
01084 default:
01085 rb_raise(rb_eSocket, "unknown socket family:%d", addr->sa_family);
01086 break;
01087 }
01088 return rb_str_new(ptr, len);
01089 }
01090
01091
01092
01093
01094
01095
01096
01097
01098
01099
01100 static VALUE
01101 sock_s_gethostbyname(VALUE obj, VALUE host)
01102 {
01103 rb_secure(3);
01104 return rsock_make_hostent(host, rsock_addrinfo(host, Qnil, SOCK_STREAM, AI_CANONNAME), sock_sockaddr);
01105 }
01106
01107
01108
01109
01110
01111
01112
01113
01114
01115
01116 static VALUE
01117 sock_s_gethostbyaddr(int argc, VALUE *argv)
01118 {
01119 VALUE addr, family;
01120 struct hostent *h;
01121 char **pch;
01122 VALUE ary, names;
01123 int t = AF_INET;
01124
01125 rb_scan_args(argc, argv, "11", &addr, &family);
01126 StringValue(addr);
01127 if (!NIL_P(family)) {
01128 t = rsock_family_arg(family);
01129 }
01130 #ifdef AF_INET6
01131 else if (RSTRING_LEN(addr) == 16) {
01132 t = AF_INET6;
01133 }
01134 #endif
01135 h = gethostbyaddr(RSTRING_PTR(addr), RSTRING_SOCKLEN(addr), t);
01136 if (h == NULL) {
01137 #ifdef HAVE_HSTRERROR
01138 extern int h_errno;
01139 rb_raise(rb_eSocket, "%s", (char*)hstrerror(h_errno));
01140 #else
01141 rb_raise(rb_eSocket, "host not found");
01142 #endif
01143 }
01144 ary = rb_ary_new();
01145 rb_ary_push(ary, rb_str_new2(h->h_name));
01146 names = rb_ary_new();
01147 rb_ary_push(ary, names);
01148 if (h->h_aliases != NULL) {
01149 for (pch = h->h_aliases; *pch; pch++) {
01150 rb_ary_push(names, rb_str_new2(*pch));
01151 }
01152 }
01153 rb_ary_push(ary, INT2NUM(h->h_addrtype));
01154 #ifdef h_addr
01155 for (pch = h->h_addr_list; *pch; pch++) {
01156 rb_ary_push(ary, rb_str_new(*pch, h->h_length));
01157 }
01158 #else
01159 rb_ary_push(ary, rb_str_new(h->h_addr, h->h_length));
01160 #endif
01161
01162 return ary;
01163 }
01164
01165
01166
01167
01168
01169
01170
01171
01172
01173
01174
01175
01176
01177
01178 static VALUE
01179 sock_s_getservbyname(int argc, VALUE *argv)
01180 {
01181 VALUE service, proto;
01182 struct servent *sp;
01183 long port;
01184 const char *servicename, *protoname = "tcp";
01185
01186 rb_scan_args(argc, argv, "11", &service, &proto);
01187 StringValue(service);
01188 if (!NIL_P(proto)) StringValue(proto);
01189 servicename = StringValueCStr(service);
01190 if (!NIL_P(proto)) protoname = StringValueCStr(proto);
01191 sp = getservbyname(servicename, protoname);
01192 if (sp) {
01193 port = ntohs(sp->s_port);
01194 }
01195 else {
01196 char *end;
01197
01198 port = STRTOUL(servicename, &end, 0);
01199 if (*end != '\0') {
01200 rb_raise(rb_eSocket, "no such service %s/%s", servicename, protoname);
01201 }
01202 }
01203 return INT2FIX(port);
01204 }
01205
01206
01207
01208
01209
01210
01211
01212
01213
01214
01215
01216
01217
01218
01219 static VALUE
01220 sock_s_getservbyport(int argc, VALUE *argv)
01221 {
01222 VALUE port, proto;
01223 struct servent *sp;
01224 long portnum;
01225 const char *protoname = "tcp";
01226
01227 rb_scan_args(argc, argv, "11", &port, &proto);
01228 portnum = NUM2LONG(port);
01229 if (portnum != (uint16_t)portnum) {
01230 const char *s = portnum > 0 ? "big" : "small";
01231 rb_raise(rb_eRangeError, "integer %ld too %s to convert into `int16_t'", portnum, s);
01232 }
01233 if (!NIL_P(proto)) protoname = StringValueCStr(proto);
01234
01235 sp = getservbyport((int)htons((uint16_t)portnum), protoname);
01236 if (!sp) {
01237 rb_raise(rb_eSocket, "no such service for port %d/%s", (int)portnum, protoname);
01238 }
01239 return rb_tainted_str_new2(sp->s_name);
01240 }
01241
01242
01243
01244
01245
01246
01247
01248
01249
01250
01251
01252
01253
01254
01255
01256
01257
01258
01259
01260
01261
01262
01263
01264
01265
01266
01267
01268
01269
01270
01271
01272
01273
01274 static VALUE
01275 sock_s_getaddrinfo(int argc, VALUE *argv)
01276 {
01277 VALUE host, port, family, socktype, protocol, flags, ret, revlookup;
01278 struct addrinfo hints;
01279 struct rb_addrinfo *res;
01280 int norevlookup;
01281
01282 rb_scan_args(argc, argv, "25", &host, &port, &family, &socktype, &protocol, &flags, &revlookup);
01283
01284 MEMZERO(&hints, struct addrinfo, 1);
01285 hints.ai_family = NIL_P(family) ? PF_UNSPEC : rsock_family_arg(family);
01286
01287 if (!NIL_P(socktype)) {
01288 hints.ai_socktype = rsock_socktype_arg(socktype);
01289 }
01290 if (!NIL_P(protocol)) {
01291 hints.ai_protocol = NUM2INT(protocol);
01292 }
01293 if (!NIL_P(flags)) {
01294 hints.ai_flags = NUM2INT(flags);
01295 }
01296 if (NIL_P(revlookup) || !rsock_revlookup_flag(revlookup, &norevlookup)) {
01297 norevlookup = rsock_do_not_reverse_lookup;
01298 }
01299 res = rsock_getaddrinfo(host, port, &hints, 0);
01300
01301 ret = make_addrinfo(res, norevlookup);
01302 rb_freeaddrinfo(res);
01303 return ret;
01304 }
01305
01306
01307
01308
01309
01310
01311
01312
01313
01314
01315
01316
01317
01318
01319
01320
01321
01322
01323
01324
01325
01326
01327
01328 static VALUE
01329 sock_s_getnameinfo(int argc, VALUE *argv)
01330 {
01331 VALUE sa, af = Qnil, host = Qnil, port = Qnil, flags, tmp;
01332 char *hptr, *pptr;
01333 char hbuf[1024], pbuf[1024];
01334 int fl;
01335 struct rb_addrinfo *res = NULL;
01336 struct addrinfo hints, *r;
01337 int error, saved_errno;
01338 union_sockaddr ss;
01339 struct sockaddr *sap;
01340 socklen_t salen;
01341
01342 sa = flags = Qnil;
01343 rb_scan_args(argc, argv, "11", &sa, &flags);
01344
01345 fl = 0;
01346 if (!NIL_P(flags)) {
01347 fl = NUM2INT(flags);
01348 }
01349 tmp = rb_check_sockaddr_string_type(sa);
01350 if (!NIL_P(tmp)) {
01351 sa = tmp;
01352 if (sizeof(ss) < (size_t)RSTRING_LEN(sa)) {
01353 rb_raise(rb_eTypeError, "sockaddr length too big");
01354 }
01355 memcpy(&ss, RSTRING_PTR(sa), RSTRING_LEN(sa));
01356 if (!VALIDATE_SOCKLEN(&ss.addr, RSTRING_LEN(sa))) {
01357 rb_raise(rb_eTypeError, "sockaddr size differs - should not happen");
01358 }
01359 sap = &ss.addr;
01360 salen = RSTRING_SOCKLEN(sa);
01361 goto call_nameinfo;
01362 }
01363 tmp = rb_check_array_type(sa);
01364 if (!NIL_P(tmp)) {
01365 sa = tmp;
01366 MEMZERO(&hints, struct addrinfo, 1);
01367 if (RARRAY_LEN(sa) == 3) {
01368 af = RARRAY_PTR(sa)[0];
01369 port = RARRAY_PTR(sa)[1];
01370 host = RARRAY_PTR(sa)[2];
01371 }
01372 else if (RARRAY_LEN(sa) >= 4) {
01373 af = RARRAY_PTR(sa)[0];
01374 port = RARRAY_PTR(sa)[1];
01375 host = RARRAY_PTR(sa)[3];
01376 if (NIL_P(host)) {
01377 host = RARRAY_PTR(sa)[2];
01378 }
01379 else {
01380
01381
01382
01383
01384 #ifdef AI_NUMERICHOST
01385 hints.ai_flags |= AI_NUMERICHOST;
01386 #endif
01387 }
01388 }
01389 else {
01390 rb_raise(rb_eArgError, "array size should be 3 or 4, %ld given",
01391 RARRAY_LEN(sa));
01392 }
01393
01394 if (NIL_P(host)) {
01395 hptr = NULL;
01396 }
01397 else {
01398 strncpy(hbuf, StringValuePtr(host), sizeof(hbuf));
01399 hbuf[sizeof(hbuf) - 1] = '\0';
01400 hptr = hbuf;
01401 }
01402
01403 if (NIL_P(port)) {
01404 strcpy(pbuf, "0");
01405 pptr = NULL;
01406 }
01407 else if (FIXNUM_P(port)) {
01408 snprintf(pbuf, sizeof(pbuf), "%ld", NUM2LONG(port));
01409 pptr = pbuf;
01410 }
01411 else {
01412 strncpy(pbuf, StringValuePtr(port), sizeof(pbuf));
01413 pbuf[sizeof(pbuf) - 1] = '\0';
01414 pptr = pbuf;
01415 }
01416 hints.ai_socktype = (fl & NI_DGRAM) ? SOCK_DGRAM : SOCK_STREAM;
01417
01418 hints.ai_family = NIL_P(af) ? PF_UNSPEC : rsock_family_arg(af);
01419 error = rb_getaddrinfo(hptr, pptr, &hints, &res);
01420 if (error) goto error_exit_addr;
01421 sap = res->ai->ai_addr;
01422 salen = res->ai->ai_addrlen;
01423 }
01424 else {
01425 rb_raise(rb_eTypeError, "expecting String or Array");
01426 }
01427
01428 call_nameinfo:
01429 error = rb_getnameinfo(sap, salen, hbuf, sizeof(hbuf),
01430 pbuf, sizeof(pbuf), fl);
01431 if (error) goto error_exit_name;
01432 if (res) {
01433 for (r = res->ai->ai_next; r; r = r->ai_next) {
01434 char hbuf2[1024], pbuf2[1024];
01435
01436 sap = r->ai_addr;
01437 salen = r->ai_addrlen;
01438 error = rb_getnameinfo(sap, salen, hbuf2, sizeof(hbuf2),
01439 pbuf2, sizeof(pbuf2), fl);
01440 if (error) goto error_exit_name;
01441 if (strcmp(hbuf, hbuf2) != 0|| strcmp(pbuf, pbuf2) != 0) {
01442 rb_freeaddrinfo(res);
01443 rb_raise(rb_eSocket, "sockaddr resolved to multiple nodename");
01444 }
01445 }
01446 rb_freeaddrinfo(res);
01447 }
01448 return rb_assoc_new(rb_str_new2(hbuf), rb_str_new2(pbuf));
01449
01450 error_exit_addr:
01451 saved_errno = errno;
01452 if (res) rb_freeaddrinfo(res);
01453 errno = saved_errno;
01454 rsock_raise_socket_error("getaddrinfo", error);
01455
01456 error_exit_name:
01457 saved_errno = errno;
01458 if (res) rb_freeaddrinfo(res);
01459 errno = saved_errno;
01460 rsock_raise_socket_error("getnameinfo", error);
01461
01462 UNREACHABLE;
01463 }
01464
01465
01466
01467
01468
01469
01470
01471
01472
01473
01474
01475
01476
01477
01478
01479 static VALUE
01480 sock_s_pack_sockaddr_in(VALUE self, VALUE port, VALUE host)
01481 {
01482 struct rb_addrinfo *res = rsock_addrinfo(host, port, 0, 0);
01483 VALUE addr = rb_str_new((char*)res->ai->ai_addr, res->ai->ai_addrlen);
01484
01485 rb_freeaddrinfo(res);
01486 OBJ_INFECT(addr, port);
01487 OBJ_INFECT(addr, host);
01488
01489 return addr;
01490 }
01491
01492
01493
01494
01495
01496
01497
01498
01499
01500
01501
01502
01503
01504
01505 static VALUE
01506 sock_s_unpack_sockaddr_in(VALUE self, VALUE addr)
01507 {
01508 struct sockaddr_in * sockaddr;
01509 VALUE host;
01510
01511 sockaddr = (struct sockaddr_in*)SockAddrStringValuePtr(addr);
01512 if (RSTRING_LEN(addr) <
01513 (char*)&((struct sockaddr *)sockaddr)->sa_family +
01514 sizeof(((struct sockaddr *)sockaddr)->sa_family) -
01515 (char*)sockaddr)
01516 rb_raise(rb_eArgError, "too short sockaddr");
01517 if (((struct sockaddr *)sockaddr)->sa_family != AF_INET
01518 #ifdef INET6
01519 && ((struct sockaddr *)sockaddr)->sa_family != AF_INET6
01520 #endif
01521 ) {
01522 #ifdef INET6
01523 rb_raise(rb_eArgError, "not an AF_INET/AF_INET6 sockaddr");
01524 #else
01525 rb_raise(rb_eArgError, "not an AF_INET sockaddr");
01526 #endif
01527 }
01528 host = rsock_make_ipaddr((struct sockaddr*)sockaddr, RSTRING_SOCKLEN(addr));
01529 OBJ_INFECT(host, addr);
01530 return rb_assoc_new(INT2NUM(ntohs(sockaddr->sin_port)), host);
01531 }
01532
01533 #ifdef HAVE_SYS_UN_H
01534
01535
01536
01537
01538
01539
01540
01541
01542
01543
01544
01545 static VALUE
01546 sock_s_pack_sockaddr_un(VALUE self, VALUE path)
01547 {
01548 struct sockaddr_un sockaddr;
01549 VALUE addr;
01550
01551 StringValue(path);
01552 INIT_SOCKADDR_UN(&sockaddr, sizeof(struct sockaddr_un));
01553 if (sizeof(sockaddr.sun_path) < (size_t)RSTRING_LEN(path)) {
01554 rb_raise(rb_eArgError, "too long unix socket path (%"PRIuSIZE" bytes given but %"PRIuSIZE" bytes max)",
01555 (size_t)RSTRING_LEN(path), sizeof(sockaddr.sun_path));
01556 }
01557 memcpy(sockaddr.sun_path, RSTRING_PTR(path), RSTRING_LEN(path));
01558 addr = rb_str_new((char*)&sockaddr, rsock_unix_sockaddr_len(path));
01559 OBJ_INFECT(addr, path);
01560
01561 return addr;
01562 }
01563
01564
01565
01566
01567
01568
01569
01570
01571
01572
01573
01574
01575
01576 static VALUE
01577 sock_s_unpack_sockaddr_un(VALUE self, VALUE addr)
01578 {
01579 struct sockaddr_un * sockaddr;
01580 VALUE path;
01581
01582 sockaddr = (struct sockaddr_un*)SockAddrStringValuePtr(addr);
01583 if (RSTRING_LEN(addr) <
01584 (char*)&((struct sockaddr *)sockaddr)->sa_family +
01585 sizeof(((struct sockaddr *)sockaddr)->sa_family) -
01586 (char*)sockaddr)
01587 rb_raise(rb_eArgError, "too short sockaddr");
01588 if (((struct sockaddr *)sockaddr)->sa_family != AF_UNIX) {
01589 rb_raise(rb_eArgError, "not an AF_UNIX sockaddr");
01590 }
01591 if (sizeof(struct sockaddr_un) < (size_t)RSTRING_LEN(addr)) {
01592 rb_raise(rb_eTypeError, "too long sockaddr_un - %ld longer than %d",
01593 RSTRING_LEN(addr), (int)sizeof(struct sockaddr_un));
01594 }
01595 path = rsock_unixpath_str(sockaddr, RSTRING_SOCKLEN(addr));
01596 OBJ_INFECT(path, addr);
01597 return path;
01598 }
01599 #endif
01600
01601 #if defined(HAVE_GETIFADDRS) || defined(SIOCGLIFCONF) || defined(SIOCGIFCONF) || defined(_WIN32)
01602
01603 static socklen_t
01604 sockaddr_len(struct sockaddr *addr)
01605 {
01606 if (addr == NULL)
01607 return 0;
01608
01609 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN
01610 if (addr->sa_len != 0)
01611 return addr->sa_len;
01612 #endif
01613
01614 switch (addr->sa_family) {
01615 case AF_INET:
01616 return (socklen_t)sizeof(struct sockaddr_in);
01617
01618 #ifdef AF_INET6
01619 case AF_INET6:
01620 return (socklen_t)sizeof(struct sockaddr_in6);
01621 #endif
01622
01623 #ifdef HAVE_SYS_UN_H
01624 case AF_UNIX:
01625 return (socklen_t)sizeof(struct sockaddr_un);
01626 #endif
01627
01628 #ifdef AF_PACKET
01629 case AF_PACKET:
01630 return (socklen_t)(offsetof(struct sockaddr_ll, sll_addr) + ((struct sockaddr_ll *)addr)->sll_halen);
01631 #endif
01632
01633 default:
01634 return (socklen_t)(offsetof(struct sockaddr, sa_family) + sizeof(addr->sa_family));
01635 }
01636 }
01637
01638 socklen_t
01639 rsock_sockaddr_len(struct sockaddr *addr)
01640 {
01641 return sockaddr_len(addr);
01642 }
01643
01644 static VALUE
01645 sockaddr_obj(struct sockaddr *addr, socklen_t len)
01646 {
01647 #if defined(AF_INET6) && defined(__KAME__)
01648 struct sockaddr_in6 addr6;
01649 #endif
01650
01651 if (addr == NULL)
01652 return Qnil;
01653
01654 len = sockaddr_len(addr);
01655
01656 #if defined(__KAME__) && defined(AF_INET6)
01657 if (addr->sa_family == AF_INET6) {
01658
01659
01660
01661 len = (socklen_t)sizeof(struct sockaddr_in6);
01662 memcpy(&addr6, addr, len);
01663 addr = (struct sockaddr *)&addr6;
01664 if (IN6_IS_ADDR_LINKLOCAL(&addr6.sin6_addr) &&
01665 addr6.sin6_scope_id == 0 &&
01666 (addr6.sin6_addr.s6_addr[2] || addr6.sin6_addr.s6_addr[3])) {
01667 addr6.sin6_scope_id = (addr6.sin6_addr.s6_addr[2] << 8) | addr6.sin6_addr.s6_addr[3];
01668 addr6.sin6_addr.s6_addr[2] = 0;
01669 addr6.sin6_addr.s6_addr[3] = 0;
01670 }
01671 }
01672 #endif
01673
01674 return rsock_addrinfo_new(addr, len, addr->sa_family, 0, 0, Qnil, Qnil);
01675 }
01676
01677 VALUE
01678 rsock_sockaddr_obj(struct sockaddr *addr, socklen_t len)
01679 {
01680 return sockaddr_obj(addr, len);
01681 }
01682
01683 #endif
01684
01685 #if defined(HAVE_GETIFADDRS) || (defined(SIOCGLIFCONF) && defined(SIOCGLIFNUM) && !defined(__hpux)) || defined(SIOCGIFCONF) || defined(_WIN32)
01686
01687
01688
01689
01690
01691
01692
01693
01694
01695
01696
01697
01698
01699
01700
01701 static VALUE
01702 socket_s_ip_address_list(VALUE self)
01703 {
01704 #if defined(HAVE_GETIFADDRS)
01705 struct ifaddrs *ifp = NULL;
01706 struct ifaddrs *p;
01707 int ret;
01708 VALUE list;
01709
01710 ret = getifaddrs(&ifp);
01711 if (ret == -1) {
01712 rb_sys_fail("getifaddrs");
01713 }
01714
01715 list = rb_ary_new();
01716 for (p = ifp; p; p = p->ifa_next) {
01717 if (p->ifa_addr != NULL && IS_IP_FAMILY(p->ifa_addr->sa_family)) {
01718 struct sockaddr *addr = p->ifa_addr;
01719 #if defined(AF_INET6) && defined(__sun)
01720
01721
01722
01723
01724
01725 struct sockaddr_in6 addr6;
01726 if (addr->sa_family == AF_INET6) {
01727 socklen_t len = (socklen_t)sizeof(struct sockaddr_in6);
01728 memcpy(&addr6, addr, len);
01729 addr = (struct sockaddr *)&addr6;
01730 if (IN6_IS_ADDR_LINKLOCAL(&addr6.sin6_addr) &&
01731 addr6.sin6_scope_id == 0) {
01732 unsigned int ifindex = if_nametoindex(p->ifa_name);
01733 if (ifindex != 0) {
01734 addr6.sin6_scope_id = ifindex;
01735 }
01736 }
01737 }
01738 #endif
01739 rb_ary_push(list, sockaddr_obj(addr, sockaddr_len(addr)));
01740 }
01741 }
01742
01743 freeifaddrs(ifp);
01744
01745 return list;
01746 #elif defined(SIOCGLIFCONF) && defined(SIOCGLIFNUM) && !defined(__hpux)
01747
01748
01749 int fd = -1;
01750 int ret;
01751 struct lifnum ln;
01752 struct lifconf lc;
01753 char *reason = NULL;
01754 int save_errno;
01755 int i;
01756 VALUE list = Qnil;
01757
01758 lc.lifc_buf = NULL;
01759
01760 fd = socket(AF_INET, SOCK_DGRAM, 0);
01761 if (fd == -1)
01762 rb_sys_fail("socket(2)");
01763
01764 memset(&ln, 0, sizeof(ln));
01765 ln.lifn_family = AF_UNSPEC;
01766
01767 ret = ioctl(fd, SIOCGLIFNUM, &ln);
01768 if (ret == -1) {
01769 reason = "SIOCGLIFNUM";
01770 goto finish;
01771 }
01772
01773 memset(&lc, 0, sizeof(lc));
01774 lc.lifc_family = AF_UNSPEC;
01775 lc.lifc_flags = 0;
01776 lc.lifc_len = sizeof(struct lifreq) * ln.lifn_count;
01777 lc.lifc_req = xmalloc(lc.lifc_len);
01778
01779 ret = ioctl(fd, SIOCGLIFCONF, &lc);
01780 if (ret == -1) {
01781 reason = "SIOCGLIFCONF";
01782 goto finish;
01783 }
01784
01785 list = rb_ary_new();
01786 for (i = 0; i < ln.lifn_count; i++) {
01787 struct lifreq *req = &lc.lifc_req[i];
01788 if (IS_IP_FAMILY(req->lifr_addr.ss_family)) {
01789 if (req->lifr_addr.ss_family == AF_INET6 &&
01790 IN6_IS_ADDR_LINKLOCAL(&((struct sockaddr_in6 *)(&req->lifr_addr))->sin6_addr) &&
01791 ((struct sockaddr_in6 *)(&req->lifr_addr))->sin6_scope_id == 0) {
01792 struct lifreq req2;
01793 memcpy(req2.lifr_name, req->lifr_name, LIFNAMSIZ);
01794 ret = ioctl(fd, SIOCGLIFINDEX, &req2);
01795 if (ret == -1) {
01796 reason = "SIOCGLIFINDEX";
01797 goto finish;
01798 }
01799 ((struct sockaddr_in6 *)(&req->lifr_addr))->sin6_scope_id = req2.lifr_index;
01800 }
01801 rb_ary_push(list, sockaddr_obj((struct sockaddr *)&req->lifr_addr, req->lifr_addrlen));
01802 }
01803 }
01804
01805 finish:
01806 save_errno = errno;
01807 if (lc.lifc_buf != NULL)
01808 xfree(lc.lifc_req);
01809 if (fd != -1)
01810 close(fd);
01811 errno = save_errno;
01812
01813 if (reason)
01814 rb_sys_fail(reason);
01815 return list;
01816
01817 #elif defined(SIOCGIFCONF)
01818 int fd = -1;
01819 int ret;
01820 #define EXTRA_SPACE ((int)(sizeof(struct ifconf) + sizeof(union_sockaddr)))
01821 char initbuf[4096+EXTRA_SPACE];
01822 char *buf = initbuf;
01823 int bufsize;
01824 struct ifconf conf;
01825 struct ifreq *req;
01826 VALUE list = Qnil;
01827 const char *reason = NULL;
01828 int save_errno;
01829
01830 fd = socket(AF_INET, SOCK_DGRAM, 0);
01831 if (fd == -1)
01832 rb_sys_fail("socket(2)");
01833
01834 bufsize = sizeof(initbuf);
01835 buf = initbuf;
01836
01837 retry:
01838 conf.ifc_len = bufsize;
01839 conf.ifc_req = (struct ifreq *)buf;
01840
01841
01842
01843 ret = ioctl(fd, SIOCGIFCONF, &conf);
01844 if (ret == -1) {
01845 reason = "SIOCGIFCONF";
01846 goto finish;
01847 }
01848
01849
01850
01851 if (bufsize - EXTRA_SPACE < conf.ifc_len) {
01852 if (bufsize < conf.ifc_len) {
01853
01854 bufsize = conf.ifc_len + EXTRA_SPACE;
01855 }
01856 else {
01857 bufsize = bufsize << 1;
01858 }
01859 if (buf == initbuf)
01860 buf = NULL;
01861 buf = xrealloc(buf, bufsize);
01862 goto retry;
01863 }
01864
01865 close(fd);
01866 fd = -1;
01867
01868 list = rb_ary_new();
01869 req = conf.ifc_req;
01870 while ((char*)req < (char*)conf.ifc_req + conf.ifc_len) {
01871 struct sockaddr *addr = &req->ifr_addr;
01872 if (IS_IP_FAMILY(addr->sa_family)) {
01873 rb_ary_push(list, sockaddr_obj(addr, sockaddr_len(addr)));
01874 }
01875 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN
01876 # ifndef _SIZEOF_ADDR_IFREQ
01877 # define _SIZEOF_ADDR_IFREQ(r) \
01878 (sizeof(struct ifreq) + \
01879 (sizeof(struct sockaddr) < (r).ifr_addr.sa_len ? \
01880 (r).ifr_addr.sa_len - sizeof(struct sockaddr) : \
01881 0))
01882 # endif
01883 req = (struct ifreq *)((char*)req + _SIZEOF_ADDR_IFREQ(*req));
01884 #else
01885 req = (struct ifreq *)((char*)req + sizeof(struct ifreq));
01886 #endif
01887 }
01888
01889 finish:
01890
01891 save_errno = errno;
01892 if (buf != initbuf)
01893 xfree(buf);
01894 if (fd != -1)
01895 close(fd);
01896 errno = save_errno;
01897
01898 if (reason)
01899 rb_sys_fail(reason);
01900 return list;
01901
01902 #undef EXTRA_SPACE
01903 #elif defined(_WIN32)
01904 typedef struct ip_adapter_unicast_address_st {
01905 unsigned LONG_LONG dummy0;
01906 struct ip_adapter_unicast_address_st *Next;
01907 struct {
01908 struct sockaddr *lpSockaddr;
01909 int iSockaddrLength;
01910 } Address;
01911 int dummy1;
01912 int dummy2;
01913 int dummy3;
01914 long dummy4;
01915 long dummy5;
01916 long dummy6;
01917 } ip_adapter_unicast_address_t;
01918 typedef struct ip_adapter_anycast_address_st {
01919 unsigned LONG_LONG dummy0;
01920 struct ip_adapter_anycast_address_st *Next;
01921 struct {
01922 struct sockaddr *lpSockaddr;
01923 int iSockaddrLength;
01924 } Address;
01925 } ip_adapter_anycast_address_t;
01926 typedef struct ip_adapter_addresses_st {
01927 unsigned LONG_LONG dummy0;
01928 struct ip_adapter_addresses_st *Next;
01929 void *dummy1;
01930 ip_adapter_unicast_address_t *FirstUnicastAddress;
01931 ip_adapter_anycast_address_t *FirstAnycastAddress;
01932 void *dummy2;
01933 void *dummy3;
01934 void *dummy4;
01935 void *dummy5;
01936 void *dummy6;
01937 BYTE dummy7[8];
01938 DWORD dummy8;
01939 DWORD dummy9;
01940 DWORD dummy10;
01941 DWORD IfType;
01942 int OperStatus;
01943 DWORD dummy12;
01944 DWORD dummy13[16];
01945 void *dummy14;
01946 } ip_adapter_addresses_t;
01947 typedef ULONG (WINAPI *GetAdaptersAddresses_t)(ULONG, ULONG, PVOID, ip_adapter_addresses_t *, PULONG);
01948 HMODULE h;
01949 GetAdaptersAddresses_t pGetAdaptersAddresses;
01950 ULONG len;
01951 DWORD ret;
01952 ip_adapter_addresses_t *adapters;
01953 VALUE list;
01954
01955 h = LoadLibrary("iphlpapi.dll");
01956 if (!h)
01957 rb_notimplement();
01958 pGetAdaptersAddresses = (GetAdaptersAddresses_t)GetProcAddress(h, "GetAdaptersAddresses");
01959 if (!pGetAdaptersAddresses) {
01960 FreeLibrary(h);
01961 rb_notimplement();
01962 }
01963
01964 ret = pGetAdaptersAddresses(AF_UNSPEC, 0, NULL, NULL, &len);
01965 if (ret != ERROR_SUCCESS && ret != ERROR_BUFFER_OVERFLOW) {
01966 errno = rb_w32_map_errno(ret);
01967 FreeLibrary(h);
01968 rb_sys_fail("GetAdaptersAddresses");
01969 }
01970 adapters = (ip_adapter_addresses_t *)ALLOCA_N(BYTE, len);
01971 ret = pGetAdaptersAddresses(AF_UNSPEC, 0, NULL, adapters, &len);
01972 if (ret != ERROR_SUCCESS) {
01973 errno = rb_w32_map_errno(ret);
01974 FreeLibrary(h);
01975 rb_sys_fail("GetAdaptersAddresses");
01976 }
01977
01978 list = rb_ary_new();
01979 for (; adapters; adapters = adapters->Next) {
01980 ip_adapter_unicast_address_t *uni;
01981 ip_adapter_anycast_address_t *any;
01982 if (adapters->OperStatus != 1)
01983 continue;
01984 for (uni = adapters->FirstUnicastAddress; uni; uni = uni->Next) {
01985 #ifndef INET6
01986 if (uni->Address.lpSockaddr->sa_family == AF_INET)
01987 #else
01988 if (IS_IP_FAMILY(uni->Address.lpSockaddr->sa_family))
01989 #endif
01990 rb_ary_push(list, sockaddr_obj(uni->Address.lpSockaddr, uni->Address.iSockaddrLength));
01991 }
01992 for (any = adapters->FirstAnycastAddress; any; any = any->Next) {
01993 #ifndef INET6
01994 if (any->Address.lpSockaddr->sa_family == AF_INET)
01995 #else
01996 if (IS_IP_FAMILY(any->Address.lpSockaddr->sa_family))
01997 #endif
01998 rb_ary_push(list, sockaddr_obj(any->Address.lpSockaddr, any->Address.iSockaddrLength));
01999 }
02000 }
02001
02002 FreeLibrary(h);
02003 return list;
02004 #endif
02005 }
02006 #else
02007 #define socket_s_ip_address_list rb_f_notimplement
02008 #endif
02009
02010 void
02011 Init_socket()
02012 {
02013 rsock_init_basicsocket();
02014
02015
02016
02017
02018
02019
02020
02021
02022
02023
02024
02025
02026
02027
02028
02029
02030
02031
02032
02033
02034
02035
02036
02037
02038
02039
02040
02041
02042
02043
02044
02045
02046
02047
02048
02049
02050
02051
02052
02053
02054
02055
02056
02057
02058
02059
02060
02061
02062
02063
02064
02065
02066
02067
02068
02069
02070
02071
02072
02073
02074
02075
02076
02077
02078
02079
02080
02081
02082
02083
02084
02085
02086
02087
02088
02089
02090
02091
02092
02093
02094
02095
02096
02097
02098
02099
02100
02101
02102
02103
02104
02105
02106
02107
02108
02109
02110
02111
02112
02113
02114
02115
02116
02117
02118
02119
02120
02121
02122
02123
02124
02125
02126
02127
02128
02129
02130 rb_cSocket = rb_define_class("Socket", rb_cBasicSocket);
02131
02132 rsock_init_socket_init();
02133
02134 rb_define_method(rb_cSocket, "initialize", sock_initialize, -1);
02135 rb_define_method(rb_cSocket, "connect", sock_connect, 1);
02136 rb_define_method(rb_cSocket, "connect_nonblock", sock_connect_nonblock, 1);
02137 rb_define_method(rb_cSocket, "bind", sock_bind, 1);
02138 rb_define_method(rb_cSocket, "listen", rsock_sock_listen, 1);
02139 rb_define_method(rb_cSocket, "accept", sock_accept, 0);
02140 rb_define_method(rb_cSocket, "accept_nonblock", sock_accept_nonblock, 0);
02141 rb_define_method(rb_cSocket, "sysaccept", sock_sysaccept, 0);
02142
02143 rb_define_method(rb_cSocket, "recvfrom", sock_recvfrom, -1);
02144 rb_define_method(rb_cSocket, "recvfrom_nonblock", sock_recvfrom_nonblock, -1);
02145
02146 rb_define_singleton_method(rb_cSocket, "socketpair", rsock_sock_s_socketpair, -1);
02147 rb_define_singleton_method(rb_cSocket, "pair", rsock_sock_s_socketpair, -1);
02148 rb_define_singleton_method(rb_cSocket, "gethostname", sock_gethostname, 0);
02149 rb_define_singleton_method(rb_cSocket, "gethostbyname", sock_s_gethostbyname, 1);
02150 rb_define_singleton_method(rb_cSocket, "gethostbyaddr", sock_s_gethostbyaddr, -1);
02151 rb_define_singleton_method(rb_cSocket, "getservbyname", sock_s_getservbyname, -1);
02152 rb_define_singleton_method(rb_cSocket, "getservbyport", sock_s_getservbyport, -1);
02153 rb_define_singleton_method(rb_cSocket, "getaddrinfo", sock_s_getaddrinfo, -1);
02154 rb_define_singleton_method(rb_cSocket, "getnameinfo", sock_s_getnameinfo, -1);
02155 rb_define_singleton_method(rb_cSocket, "sockaddr_in", sock_s_pack_sockaddr_in, 2);
02156 rb_define_singleton_method(rb_cSocket, "pack_sockaddr_in", sock_s_pack_sockaddr_in, 2);
02157 rb_define_singleton_method(rb_cSocket, "unpack_sockaddr_in", sock_s_unpack_sockaddr_in, 1);
02158 #ifdef HAVE_SYS_UN_H
02159 rb_define_singleton_method(rb_cSocket, "sockaddr_un", sock_s_pack_sockaddr_un, 1);
02160 rb_define_singleton_method(rb_cSocket, "pack_sockaddr_un", sock_s_pack_sockaddr_un, 1);
02161 rb_define_singleton_method(rb_cSocket, "unpack_sockaddr_un", sock_s_unpack_sockaddr_un, 1);
02162 #endif
02163
02164 rb_define_singleton_method(rb_cSocket, "ip_address_list", socket_s_ip_address_list, 0);
02165 }
02166