touched up httpd code
This commit is contained in:
parent
0048331293
commit
f070058372
@ -58,6 +58,7 @@
|
||||
|
||||
#elif defined(__DOS__)
|
||||
/* TODO */
|
||||
# include <errno.h>
|
||||
|
||||
#else
|
||||
# include "../cmn/syscall.h"
|
||||
@ -261,6 +262,7 @@ static qse_httpd_errnum_t skerr_to_errnum (int e)
|
||||
}
|
||||
|
||||
#define SKERR_TO_ERRNUM() skerr_to_errnum(errno)
|
||||
|
||||
#endif
|
||||
|
||||
|
||||
@ -369,26 +371,43 @@ static qse_httpd_errnum_t direrr_to_errnum (qse_dir_errnum_t e)
|
||||
|
||||
#define MAX_SEND_SIZE 4096
|
||||
|
||||
static qse_ssize_t __send_file (
|
||||
int out_fd, qse_ubi_t in_fd, qse_foff_t* offset, qse_size_t count)
|
||||
static QSE_INLINE qse_ssize_t __send_file (
|
||||
qse_httpd_t* httpd, int out_fd, qse_ubi_t in_fd,
|
||||
qse_foff_t* offset, qse_size_t count)
|
||||
{
|
||||
#if defined(HAVE_SENDFILE) && defined(HAVE_SENDFILE64)
|
||||
/* TODO: os2 warp 4.5 has send_file. support it??? load it dynamically??? */
|
||||
|
||||
#if defined(__DOS__)
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
|
||||
#elif defined(HAVE_SENDFILE) && defined(HAVE_SENDFILE64)
|
||||
|
||||
qse_ssize_t ret;
|
||||
qse_ubi_t infd = qse_fio_gethandleasubi (in_fd.ptr);
|
||||
|
||||
#if !defined(_LP64) && (QSE_SIZEOF_VOID_P<8) && defined(HAVE_SENDFILE64)
|
||||
return sendfile64 (out_fd, infd.i, offset, count);
|
||||
ret = sendfile64 (out_fd, infd.i, offset, count);
|
||||
#else
|
||||
return sendfile (out_fd, infd.i, offset, count);
|
||||
ret = sendfile (out_fd, infd.i, offset, count);
|
||||
#endif
|
||||
if (ret <= -1) qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
return ret;
|
||||
|
||||
#elif defined(HAVE_SENDFILE)
|
||||
|
||||
qse_ssize_t ret;
|
||||
qse_ubi_t infd = qse_fio_gethandleasubi (in_fd.ptr);
|
||||
return sendfile (out_fd, infd.i, offset, count);
|
||||
ret = sendfile (out_fd, infd.i, offset, count);
|
||||
if (ret <= -1) qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
return ret;
|
||||
|
||||
#elif defined(HAVE_SENDFILE64)
|
||||
qse_ssize_t ret;
|
||||
qse_ubi_t infd = qse_fio_gethandleasubi (in_fd.ptr);
|
||||
return sendfile64 (out_fd, in_fd.i, offset, count);
|
||||
ret = sendfile64 (out_fd, in_fd.i, offset, count);
|
||||
if (ret <= -1) qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
return ret;
|
||||
|
||||
#elif defined(HAVE_SENDFILEV) || defined(HAVE_SENDFILEV64)
|
||||
|
||||
@ -398,7 +417,7 @@ static qse_ssize_t __send_file (
|
||||
struct sendfilevec vec;
|
||||
#endif
|
||||
size_t xfer;
|
||||
ssize_t n;
|
||||
ssize_t ret;
|
||||
|
||||
vec.sfv_fd = in_fd.i;
|
||||
vec.sfv_flag = 0;
|
||||
@ -414,77 +433,105 @@ static qse_ssize_t __send_file (
|
||||
vec.sfv_len = count;
|
||||
|
||||
#if !defined(_LP64) && (QSE_SIZEOF_VOID_P<8) && defined(HAVE_SENDFILE64)
|
||||
n = sendfilev64 (out_fd, &vec, 1, &xfer);
|
||||
ret = sendfilev64 (out_fd, &vec, 1, &xfer);
|
||||
#else
|
||||
n = sendfilev (out_fd, &vec, 1, &xfer);
|
||||
ret = sendfilev (out_fd, &vec, 1, &xfer);
|
||||
#endif
|
||||
if (offset) *offset = *offset + xfer;
|
||||
|
||||
if (ret <= -1) qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
else if (offset) *offset = *offset + xfer;
|
||||
|
||||
/* TODO: xfer contains number of byte written even on failure
|
||||
on success xfer == n.
|
||||
on failure xfer != n.
|
||||
on success xfer == ret.
|
||||
on failure xfer != ret.
|
||||
*/
|
||||
return n;
|
||||
return ret;
|
||||
|
||||
#else
|
||||
|
||||
qse_mchar_t buf[MAX_SEND_SIZE];
|
||||
qse_ssize_t n;
|
||||
qse_ssize_t ret;
|
||||
qse_foff_t foff;
|
||||
|
||||
#if 0
|
||||
if (offset && QSE_LSEEK (in_fd.i, *offset, SEEK_SET) != *offset)
|
||||
if (offset && (foff = qse_fio_seek (in_fd.ptr, *offset, QSE_FIO_BEGIN)) != *offset)
|
||||
{
|
||||
if (foff == (qse_foff_t)-1)
|
||||
qse_httpd_seterrnum (httpd, fioerr_to_errnum(qse_fio_geterrnum(in_fd.ptr)));
|
||||
else
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ESYSERR);
|
||||
return (qse_ssize_t)-1;
|
||||
}
|
||||
|
||||
if (count > QSE_COUNTOF(buf)) count = QSE_COUNTOF(buf);
|
||||
n = QSE_READ (in_fd.i, buf, count);
|
||||
if (n == (qse_ssize_t)-1 || n == 0) return n;
|
||||
#endif
|
||||
ret = qse_fio_read (in_fd.ptr, buf, count);
|
||||
if (ret > 0)
|
||||
{
|
||||
ret = send (out_fd, buf, ret, 0);
|
||||
if (ret > 0)
|
||||
{
|
||||
if (offset) *offset = *offset + ret;
|
||||
}
|
||||
else if (ret <= -1) qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
}
|
||||
else if (ret <= -1)
|
||||
{
|
||||
qse_httpd_seterrnum (httpd, fioerr_to_errnum(qse_fio_geterrnum(in_fd.ptr)));
|
||||
}
|
||||
|
||||
if (offset && qse_fio_seek (in_fd.ptr, *offset, QSE_FIO_BEGIN) != *offset)
|
||||
return (qse_ssize_t)-1;
|
||||
|
||||
if (count > QSE_COUNTOF(buf)) count = QSE_COUNTOF(buf);
|
||||
n = qse_fio_read (in_fd.ptr, buf, count);
|
||||
if (n == (qse_ssize_t)-1 || n == 0) return n;
|
||||
|
||||
n = send (out_fd, buf, n, 0);
|
||||
if (n > 0 && offset) *offset = *offset + n;
|
||||
|
||||
return n;
|
||||
return ret;
|
||||
|
||||
#endif
|
||||
}
|
||||
|
||||
/* ------------------------------------------------------------------- */
|
||||
|
||||
#if defined(HAVE_SSL)
|
||||
static qse_ssize_t __send_file_ssl (
|
||||
SSL* out, qse_ubi_t in_fd, qse_foff_t* offset, qse_size_t count)
|
||||
static QSE_INLINE qse_ssize_t __send_file_ssl (
|
||||
qse_httpd_t* httpd, void* xout, qse_ubi_t in_fd,
|
||||
qse_foff_t* offset, qse_size_t count)
|
||||
{
|
||||
#if defined(HAVE_SSL)
|
||||
qse_mchar_t buf[MAX_SEND_SIZE];
|
||||
qse_ssize_t n;
|
||||
qse_ssize_t ret;
|
||||
qse_foff_t foff;
|
||||
SSL* out = (SSL*)xout;
|
||||
|
||||
#if 0
|
||||
if (offset && QSE_LSEEK (in_fd.i, *offset, SEEK_SET) != *offset)
|
||||
if (offset && (foff = qse_fio_seek (in_fd.ptr, *offset, QSE_FIO_BEGIN)) != *offset)
|
||||
{
|
||||
if (foff == (qse_foff_t)-1)
|
||||
qse_httpd_seterrnum (httpd, fioerr_to_errnum(qse_fio_geterrnum(in_fd.ptr)));
|
||||
else
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ESYSERR);
|
||||
return (qse_ssize_t)-1;
|
||||
}
|
||||
|
||||
if (count > QSE_COUNTOF(buf)) count = QSE_COUNTOF(buf);
|
||||
n = QSE_READ (in_fd.i, buf, count);
|
||||
if (n == (qse_ssize_t)-1 || n == 0) return n;
|
||||
ret = qse_fio_read (in_fd.ptr, buf, count);
|
||||
if (ret > 0)
|
||||
{
|
||||
ret = SSL_write (out, buf, count);
|
||||
if (ret > 0)
|
||||
{
|
||||
if (offset) *offset = *offset + ret;
|
||||
}
|
||||
else if (ret <= -1)
|
||||
{
|
||||
if (SSL_get_error(out, ret) == SSL_ERROR_WANT_WRITE)
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_EAGAIN);
|
||||
else
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ESYSERR);
|
||||
}
|
||||
}
|
||||
else if (ret <= -1)
|
||||
{
|
||||
qse_httpd_seterrnum (httpd, fioerr_to_errnum(qse_fio_geterrnum(in_fd.ptr)));
|
||||
}
|
||||
|
||||
return ret;
|
||||
#else
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
#endif
|
||||
if (offset && qse_fio_seek (in_fd.ptr, *offset, QSE_FIO_BEGIN) != *offset)
|
||||
return (qse_ssize_t)-1;
|
||||
|
||||
if (count > QSE_COUNTOF(buf)) count = QSE_COUNTOF(buf);
|
||||
n = qse_fio_read (in_fd.ptr, buf, count);
|
||||
if (n == (qse_ssize_t)-1 || n == 0) return n;
|
||||
|
||||
n = SSL_write (out, buf, count);
|
||||
if (n > 0 && offset) *offset = *offset + n;
|
||||
|
||||
return n;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* ------------------------------------------------------------------- */
|
||||
|
||||
@ -585,6 +632,10 @@ void* qse_httpd_getxtnstd (qse_httpd_t* httpd)
|
||||
|
||||
static int server_open (qse_httpd_t* httpd, qse_httpd_server_t* server)
|
||||
{
|
||||
#if defined(__DOS__)
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
#else
|
||||
int fd = -1, flag;
|
||||
qse_skad_t addr;
|
||||
int addrsize;
|
||||
@ -599,53 +650,53 @@ static int server_open (qse_httpd_t* httpd, qse_httpd_server_t* server)
|
||||
fd = socket (qse_skadfamily(&addr), SOCK_STREAM, IPPROTO_TCP);
|
||||
if (fd <= -1) goto oops;
|
||||
|
||||
#if defined(FD_CLOEXEC)
|
||||
#if defined(FD_CLOEXEC)
|
||||
flag = fcntl (fd, F_GETFD);
|
||||
if (flag >= 0) fcntl (fd, F_SETFD, flag | FD_CLOEXEC);
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#if defined(SO_REUSEADDR)
|
||||
#if defined(SO_REUSEADDR)
|
||||
flag = 1;
|
||||
setsockopt (fd, SOL_SOCKET, SO_REUSEADDR, (void*)&flag, QSE_SIZEOF(flag));
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/* TODO: linux. use capset() to set required capabilities just in case */
|
||||
#if defined(IP_TRANSPARENT)
|
||||
#if defined(IP_TRANSPARENT)
|
||||
/* remove the ip routing restriction that a packet can only
|
||||
* be sent using a local ip address. this option is useful
|
||||
* if transparency is achieved with TPROXY */
|
||||
|
||||
/*
|
||||
ip rule add fwmark 0x1/0x1 lookup 100
|
||||
ip route add local 0.0.0.0/0 dev lo table 100
|
||||
/*
|
||||
ip rule add fwmark 0x1/0x1 lookup 100
|
||||
ip route add local 0.0.0.0/0 dev lo table 100
|
||||
|
||||
iptables -t mangle -N DIVERT
|
||||
iptables -t mangle -A PREROUTING -p tcp -m socket --transparent -j DIVERT
|
||||
iptables -t mangle -A DIVERT -j MARK --set-mark 0x1/0x1
|
||||
iptables -t mangle -A DIVERT -j ACCEPT
|
||||
iptables -t mangle -N DIVERT
|
||||
iptables -t mangle -A PREROUTING -p tcp -m socket --transparent -j DIVERT
|
||||
iptables -t mangle -A DIVERT -j MARK --set-mark 0x1/0x1
|
||||
iptables -t mangle -A DIVERT -j ACCEPT
|
||||
|
||||
iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY --tproxy-mark 0x1/0x1 --on-port 8000
|
||||
iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY --tproxy-mark 0x1/0x1 --on-port 8000
|
||||
|
||||
----------------------------------------------------------------------
|
||||
----------------------------------------------------------------------
|
||||
|
||||
if the socket is bound to 99.99.99.99:8000, you may do...
|
||||
iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY --tproxy-mark 0x1/0x1 --on-ip 99.99.99.99 --on-port 8000
|
||||
if the socket is bound to 99.99.99.99:8000, you may do...
|
||||
iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY --tproxy-mark 0x1/0x1 --on-ip 99.99.99.99 --on-port 8000
|
||||
|
||||
iptables -t mangle -A PREROUTING -p tcp ! -s 127.0.0.0/255.0.0.0 --dport 80 -j TPROXY --tproxy-mark 0x1/0x1 --on-ip 0.0.0.0 --on-port 8000
|
||||
iptables -t mangle -A PREROUTING -p tcp ! -s 127.0.0.0/255.0.0.0 --dport 80 -j TPROXY --tproxy-mark 0x1/0x1 --on-ip 0.0.0.0 --on-port 8000
|
||||
|
||||
IP_TRANSPRENT is needed for:
|
||||
- accepting TPROXYed connections
|
||||
- binding to a non-local IP address (IP address the local system doesn't have)
|
||||
- using a non-local IP address as a source
|
||||
-
|
||||
*/
|
||||
IP_TRANSPRENT is needed for:
|
||||
- accepting TPROXYed connections
|
||||
- binding to a non-local IP address (IP address the local system doesn't have)
|
||||
- using a non-local IP address as a source
|
||||
-
|
||||
*/
|
||||
flag = 1;
|
||||
setsockopt (fd, SOL_IP, IP_TRANSPARENT, &flag, QSE_SIZEOF(flag));
|
||||
#endif
|
||||
#endif
|
||||
|
||||
if (server->flags & QSE_HTTPD_SERVER_BINDTONWIF)
|
||||
{
|
||||
#if defined(SO_BINDTODEVICE)
|
||||
#if defined(SO_BINDTODEVICE)
|
||||
qse_mchar_t tmp[64];
|
||||
qse_size_t len;
|
||||
|
||||
@ -656,7 +707,7 @@ IP_TRANSPRENT is needed for:
|
||||
/* TODO: logging ... */
|
||||
goto oops;
|
||||
}
|
||||
#endif
|
||||
#endif
|
||||
}
|
||||
|
||||
/* Solaris 8 returns EINVAL if QSE_SIZEOF(addr) is passed in as the
|
||||
@ -664,7 +715,7 @@ IP_TRANSPRENT is needed for:
|
||||
/*if (bind (s, (struct sockaddr*)&addr, QSE_SIZEOF(addr)) <= -1) goto oops_esocket;*/
|
||||
if (bind (fd, (struct sockaddr*)&addr, addrsize) <= -1)
|
||||
{
|
||||
#if defined(IPV6_V6ONLY) && defined(EADDRINUSE)
|
||||
#if defined(IPV6_V6ONLY) && defined(EADDRINUSE)
|
||||
if (errno == EADDRINUSE && qse_skadfamily(&addr) == AF_INET6)
|
||||
{
|
||||
int on = 1;
|
||||
@ -672,34 +723,35 @@ IP_TRANSPRENT is needed for:
|
||||
if (bind (fd, (struct sockaddr*)&addr, addrsize) <= -1) goto oops;
|
||||
}
|
||||
else goto oops;
|
||||
#else
|
||||
#else
|
||||
goto oops;
|
||||
#endif
|
||||
#endif
|
||||
}
|
||||
|
||||
|
||||
if (listen (fd, 10) <= -1) goto oops;
|
||||
|
||||
#if defined(O_NONBLOCK)
|
||||
#if defined(O_NONBLOCK)
|
||||
flag = fcntl (fd, F_GETFL);
|
||||
if (flag >= 0) fcntl (fd, F_SETFL, flag | O_NONBLOCK);
|
||||
#endif
|
||||
#endif
|
||||
|
||||
server->handle.i = fd;
|
||||
return 0;
|
||||
|
||||
oops:
|
||||
qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
#if defined(_WIN32)
|
||||
#if defined(_WIN32)
|
||||
if (fd != INVALID_SOCKET) closesocket (fd);
|
||||
#elif defined(__OS2__)
|
||||
#elif defined(__OS2__)
|
||||
if (fd >= 0) soclose (fd);
|
||||
#elif defined(__DOS__)
|
||||
/* TODO: */
|
||||
#else
|
||||
#elif defined(__DOS__)
|
||||
/* TODO: */
|
||||
#else
|
||||
if (fd >= 0) QSE_CLOSE (fd);
|
||||
#endif
|
||||
#endif
|
||||
return -1;
|
||||
#endif
|
||||
}
|
||||
|
||||
static void server_close (qse_httpd_t* httpd, qse_httpd_server_t* server)
|
||||
@ -718,13 +770,18 @@ static void server_close (qse_httpd_t* httpd, qse_httpd_server_t* server)
|
||||
static int server_accept (
|
||||
qse_httpd_t* httpd, qse_httpd_server_t* server, qse_httpd_client_t* client)
|
||||
{
|
||||
#if defined(__DOS__)
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
|
||||
#else
|
||||
qse_skad_t addr;
|
||||
|
||||
#if defined(HAVE_SOCKLEN_T)
|
||||
#if defined(HAVE_SOCKLEN_T)
|
||||
socklen_t addrlen;
|
||||
#else
|
||||
#else
|
||||
int addrlen;
|
||||
#endif
|
||||
#endif
|
||||
int fd, flag;
|
||||
|
||||
addrlen = QSE_SIZEOF(addr);
|
||||
@ -735,7 +792,7 @@ static int server_accept (
|
||||
return -1;
|
||||
}
|
||||
|
||||
#if 0
|
||||
#if 0
|
||||
if (fd >= FD_SETSIZE)
|
||||
{
|
||||
qse_fprintf (QSE_STDERR, QSE_T("Error: too many client?\n"));
|
||||
@ -743,17 +800,17 @@ qse_fprintf (QSE_STDERR, QSE_T("Error: too many client?\n"));
|
||||
QSE_CLOSE (fd);
|
||||
return -1;
|
||||
}
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#if defined(FD_CLOEXEC)
|
||||
#if defined(FD_CLOEXEC)
|
||||
flag = fcntl (fd, F_GETFD);
|
||||
if (flag >= 0) fcntl (fd, F_SETFD, flag | FD_CLOEXEC);
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#if defined(O_NONBLOCK)
|
||||
#if defined(O_NONBLOCK)
|
||||
flag = fcntl (fd, F_GETFL);
|
||||
if (flag >= 0) fcntl (fd, F_SETFL, flag | O_NONBLOCK);
|
||||
#endif
|
||||
#endif
|
||||
|
||||
if (qse_skadtonwad (&addr, &client->remote_addr) <= -1)
|
||||
{
|
||||
@ -769,7 +826,7 @@ qse_fprintf (QSE_STDERR, QSE_T("Error: too many client?\n"));
|
||||
client->local_addr = server->nwad;
|
||||
}
|
||||
|
||||
#if defined(SO_ORIGINAL_DST)
|
||||
#if defined(SO_ORIGINAL_DST)
|
||||
/* if REDIRECT is used, SO_ORIGINAL_DST returns the original
|
||||
* destination. If TPROXY is used, getsockname() above returns
|
||||
* the original address. */
|
||||
@ -780,28 +837,37 @@ qse_fprintf (QSE_STDERR, QSE_T("Error: too many client?\n"));
|
||||
{
|
||||
client->orgdst_addr = client->local_addr;
|
||||
}
|
||||
#else
|
||||
#else
|
||||
client->orgdst_addr = client->local_addr;
|
||||
#endif
|
||||
#endif
|
||||
|
||||
|
||||
#if 0
|
||||
#if 0
|
||||
client->initial_ifindex = resolve_ifindex (fd, client->local_addr);
|
||||
if (client->ifindex <= -1)
|
||||
{
|
||||
/* the local_address is not one of a local address.
|
||||
* it's probably proxied. */
|
||||
}
|
||||
#endif
|
||||
#endif
|
||||
|
||||
client->handle.i = fd;
|
||||
return 0;
|
||||
#endif
|
||||
}
|
||||
|
||||
/* ------------------------------------------------------------------- */
|
||||
|
||||
static int peer_open (qse_httpd_t* httpd, qse_httpd_peer_t* peer)
|
||||
{
|
||||
#if defined(__DOS__)
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
|
||||
#else
|
||||
|
||||
/* -------------------------------------------------------------------- */
|
||||
|
||||
qse_skad_t connaddr, bindaddr;
|
||||
int connaddrsize, bindaddrsize;
|
||||
int connected = 1;
|
||||
@ -810,7 +876,7 @@ static int peer_open (qse_httpd_t* httpd, qse_httpd_peer_t* peer)
|
||||
unsigned long cmd;
|
||||
#elif defined(__OS2__)
|
||||
int fd = -1;
|
||||
int flag;
|
||||
int cmd;
|
||||
#elif defined(__DOS__)
|
||||
int fd = -1;
|
||||
int flag;
|
||||
@ -830,10 +896,10 @@ static int peer_open (qse_httpd_t* httpd, qse_httpd_peer_t* peer)
|
||||
fd = socket (qse_skadfamily(&connaddr), SOCK_STREAM, IPPROTO_TCP);
|
||||
if (fd <= -1) goto oops;
|
||||
|
||||
#if defined(IP_TRANSPARENT)
|
||||
#if defined(IP_TRANSPARENT)
|
||||
flag = 1;
|
||||
setsockopt (fd, SOL_IP, IP_TRANSPARENT, &flag, QSE_SIZEOF(flag));
|
||||
#endif
|
||||
#endif
|
||||
|
||||
if (bind (fd, (struct sockaddr*)&bindaddr, bindaddrsize) <= -1)
|
||||
{
|
||||
@ -841,7 +907,6 @@ static int peer_open (qse_httpd_t* httpd, qse_httpd_peer_t* peer)
|
||||
/* TODO: some logging for this failure though */
|
||||
}
|
||||
|
||||
|
||||
#if defined(_WIN32)
|
||||
cmd = 1;
|
||||
if (ioctlsocket(fd, FIONBIO, &cmd) == SOCKET_ERROR) goto oops;
|
||||
@ -854,11 +919,25 @@ static int peer_open (qse_httpd_t* httpd, qse_httpd_peer_t* peer)
|
||||
|
||||
cmd = 0;
|
||||
if (ioctlsocket(fd, FIONBIO, &cmd) == SOCKET_ERROR) goto oops;
|
||||
|
||||
#elif defined(__OS2__)
|
||||
/* TODO: */
|
||||
|
||||
cmd = 1;
|
||||
if (ioctl(fd, FIONBIO, &cmd, QSE_SIZEOF(cmd)) == -1) goto oops;
|
||||
|
||||
if (connect (fd, (struct sockaddr*)&connaddr, connaddrsize) == -1)
|
||||
{
|
||||
if (sock_errno() != SOCEINPROGRESS) goto oops;
|
||||
connected = 0;
|
||||
}
|
||||
|
||||
cmd = 0;
|
||||
if (ioctl(fd, FIONBIO, &cmd, QSE_SIZEOF(cmd)) == -1) goto oops;
|
||||
|
||||
#elif defined(__DOS__)
|
||||
|
||||
/* TODO: */
|
||||
|
||||
#else
|
||||
|
||||
#if defined(FD_CLOEXEC)
|
||||
@ -877,6 +956,7 @@ static int peer_open (qse_httpd_t* httpd, qse_httpd_peer_t* peer)
|
||||
|
||||
/* restore flags */
|
||||
if (fcntl (fd, F_SETFL, flag) <= -1) goto oops;
|
||||
|
||||
#endif
|
||||
|
||||
peer->handle.i = fd;
|
||||
@ -894,6 +974,9 @@ oops:
|
||||
if (fd >= 0) QSE_CLOSE (fd);
|
||||
#endif
|
||||
return -1;
|
||||
|
||||
/* -------------------------------------------------------------------- */
|
||||
#endif
|
||||
}
|
||||
|
||||
static void peer_close (qse_httpd_t* httpd, qse_httpd_peer_t* peer)
|
||||
@ -932,13 +1015,32 @@ static int peer_connected (qse_httpd_t* httpd, qse_httpd_peer_t* peer)
|
||||
return 1; /* connection completed */
|
||||
|
||||
#elif defined(__OS2__)
|
||||
/* TODO */
|
||||
httpd->errnum = QSE_HTTPD_ENOIMPL;
|
||||
return -1;
|
||||
|
||||
int len;
|
||||
int ret;
|
||||
|
||||
len = QSE_SIZEOF(ret);
|
||||
if (getsockopt (peer->handle.i, SOL_SOCKET, SO_ERROR, (char*)&ret, &len) == -1)
|
||||
{
|
||||
qse_httpd_seterrnum (httpd, skerr_to_errnum (ret));
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (ret == SOCEINPROGRESS) return 0;
|
||||
if (ret != 0)
|
||||
{
|
||||
qse_httpd_seterrnum (httpd, skerr_to_errnum (ret));
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 1; /* connection completed */
|
||||
|
||||
#elif defined(__DOS__)
|
||||
|
||||
/* TODO */
|
||||
httpd->errnum = QSE_HTTPD_ENOIMPL;
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
|
||||
#else
|
||||
|
||||
#if defined(HAVE_SOCKLEN_T)
|
||||
@ -970,18 +1072,28 @@ static qse_ssize_t peer_recv (
|
||||
qse_httpd_t* httpd, qse_httpd_peer_t* peer,
|
||||
qse_mchar_t* buf, qse_size_t bufsize)
|
||||
{
|
||||
#if defined(__DOS__)
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
#else
|
||||
qse_ssize_t ret = recv (peer->handle.i, buf, bufsize, 0);
|
||||
if (ret <= -1) qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
return ret;
|
||||
#endif
|
||||
}
|
||||
|
||||
static qse_ssize_t peer_send (
|
||||
qse_httpd_t* httpd, qse_httpd_peer_t* peer,
|
||||
const qse_mchar_t* buf, qse_size_t bufsize)
|
||||
{
|
||||
#if defined(__DOS__)
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
#else
|
||||
qse_ssize_t ret = send (peer->handle.i, buf, bufsize, 0);
|
||||
if (ret <= -1) qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
return ret;
|
||||
#endif
|
||||
}
|
||||
|
||||
/* ------------------------------------------------------------------- */
|
||||
@ -1076,6 +1188,12 @@ static int mux_readable (qse_httpd_t* httpd, qse_ubi_t handle, const qse_ntime_t
|
||||
|
||||
tv = tmout? QSE_SECNSEC_TO_MSEC (tmout->sec, tmout->nsec): -1;
|
||||
return os2_select (&handle.i, 1, 0, 0, tv);
|
||||
|
||||
#elif defined(__DOS__)
|
||||
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
|
||||
#else
|
||||
fd_set r;
|
||||
struct timeval tv, * tvp;
|
||||
@ -1101,6 +1219,12 @@ static int mux_writable (qse_httpd_t* httpd, qse_ubi_t handle, const qse_ntime_t
|
||||
long tv;
|
||||
tv = tmout? QSE_SECNSEC_TO_MSEC (tmout->sec, tmout->nsec): -1;
|
||||
return os2_select (&handle.i, 0, 1, 0, tv);
|
||||
|
||||
#elif defined(__DOS__)
|
||||
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
|
||||
#else
|
||||
fd_set w;
|
||||
struct timeval tv, * tvp;
|
||||
@ -1468,7 +1592,9 @@ static void client_close (
|
||||
static void client_shutdown (
|
||||
qse_httpd_t* httpd, qse_httpd_client_t* client)
|
||||
{
|
||||
#if defined(SHUT_RDWR)
|
||||
#if defined(__DOS__)
|
||||
/* TODO */
|
||||
#elif defined(SHUT_RDWR)
|
||||
shutdown (client->handle.i, SHUT_RDWR);
|
||||
#else
|
||||
shutdown (client->handle.i, 2);
|
||||
@ -1481,7 +1607,7 @@ static qse_ssize_t client_recv (
|
||||
{
|
||||
if (client->status & CLIENT_SECURE)
|
||||
{
|
||||
#if defined(HAVE_SSL)
|
||||
#if defined(HAVE_SSL)
|
||||
int ret = SSL_read (client->handle2.ptr, buf, bufsize);
|
||||
if (ret <= -1)
|
||||
{
|
||||
@ -1497,16 +1623,22 @@ static qse_ssize_t client_recv (
|
||||
client->status &= ~CLIENT_PENDING;
|
||||
|
||||
return ret;
|
||||
#else
|
||||
#else
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
#endif
|
||||
#endif
|
||||
}
|
||||
else
|
||||
{
|
||||
#if defined(__DOS__)
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
#else
|
||||
qse_ssize_t ret;
|
||||
ret = recv (client->handle.i, buf, bufsize, 0);
|
||||
if (ret <= -1) qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
return ret;
|
||||
#endif
|
||||
}
|
||||
}
|
||||
|
||||
@ -1516,7 +1648,7 @@ static qse_ssize_t client_send (
|
||||
{
|
||||
if (client->status & CLIENT_SECURE)
|
||||
{
|
||||
#if defined(HAVE_SSL)
|
||||
#if defined(HAVE_SSL)
|
||||
int ret = SSL_write (client->handle2.ptr, buf, bufsize);
|
||||
if (ret <= -1)
|
||||
{
|
||||
@ -1526,15 +1658,21 @@ static qse_ssize_t client_send (
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ESYSERR);
|
||||
}
|
||||
return ret;
|
||||
#else
|
||||
#else
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
#endif
|
||||
#endif
|
||||
}
|
||||
else
|
||||
{
|
||||
#if defined(__DOS__)
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
#else
|
||||
qse_ssize_t ret = send (client->handle.i, buf, bufsize, 0);
|
||||
if (ret <= -1) qse_httpd_seterrnum (httpd, SKERR_TO_ERRNUM());
|
||||
return ret;
|
||||
#endif
|
||||
}
|
||||
}
|
||||
|
||||
@ -1544,15 +1682,11 @@ static qse_ssize_t client_sendfile (
|
||||
{
|
||||
if (client->status & CLIENT_SECURE)
|
||||
{
|
||||
#if defined(HAVE_SSL)
|
||||
return __send_file_ssl (client->handle2.ptr, handle, offset, count);
|
||||
#else
|
||||
return -1;
|
||||
#endif
|
||||
return __send_file_ssl (httpd, client->handle2.ptr, handle, offset, count);
|
||||
}
|
||||
else
|
||||
{
|
||||
return __send_file (client->handle.i, handle, offset, count);
|
||||
return __send_file (httpd, client->handle.i, handle, offset, count);
|
||||
}
|
||||
}
|
||||
|
||||
@ -1561,7 +1695,7 @@ static int client_accepted (qse_httpd_t* httpd, qse_httpd_client_t* client)
|
||||
|
||||
if (client->status & CLIENT_SECURE)
|
||||
{
|
||||
#if defined(HAVE_SSL)
|
||||
#if defined(HAVE_SSL)
|
||||
int ret;
|
||||
SSL* ssl;
|
||||
httpd_xtn_t* xtn;
|
||||
@ -1570,6 +1704,7 @@ static int client_accepted (qse_httpd_t* httpd, qse_httpd_client_t* client)
|
||||
if (!xtn->ssl_ctx)
|
||||
{
|
||||
/* delayed initialization of ssl */
|
||||
/* TODO: certificate from options */
|
||||
if (init_xtn_ssl (xtn, "http01.pem", "http01.key") <= -1)
|
||||
{
|
||||
return -1;
|
||||
@ -1616,10 +1751,10 @@ qse_fflush (QSE_STDOUT);
|
||||
}
|
||||
qse_printf (QSE_T("SSL ACCEPTED %d\n"), client->handle.i);
|
||||
qse_fflush (QSE_STDOUT);
|
||||
#else
|
||||
qse_fprintf (QSE_STDERR, QSE_T("Error: NO SSL SUPPORT\n"));
|
||||
#else
|
||||
qse_httpd_seterrnum (httpd, QSE_HTTPD_ENOIMPL);
|
||||
return -1;
|
||||
#endif
|
||||
#endif
|
||||
}
|
||||
|
||||
return 1; /* accept completed */
|
||||
@ -1629,13 +1764,13 @@ static void client_closed (qse_httpd_t* httpd, qse_httpd_client_t* client)
|
||||
{
|
||||
if (client->status & CLIENT_SECURE)
|
||||
{
|
||||
#if defined(HAVE_SSL)
|
||||
#if defined(HAVE_SSL)
|
||||
if (client->handle2.ptr)
|
||||
{
|
||||
SSL_shutdown ((SSL*)client->handle2.ptr); /* is this needed? */
|
||||
SSL_free ((SSL*)client->handle2.ptr);
|
||||
}
|
||||
#endif
|
||||
#endif
|
||||
}
|
||||
}
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user