| /* | 
 |  * based on Windows Sockets 1.1 specs | 
 |  * (ftp.microsoft.com:/Advsys/winsock/spec11/WINSOCK.TXT) | 
 |  * | 
 |  * Copyright (C) 1993,1994,1996,1997 John Brezak, Erik Bos, Alex Korobka. | 
 |  * Copyright (C) 2005 Marcus Meissner | 
 |  * Copyright (C) 2006 Kai Blin | 
 |  * | 
 |  * This library is free software; you can redistribute it and/or | 
 |  * modify it under the terms of the GNU Lesser General Public | 
 |  * License as published by the Free Software Foundation; either | 
 |  * version 2.1 of the License, or (at your option) any later version. | 
 |  * | 
 |  * This library is distributed in the hope that it will be useful, | 
 |  * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
 |  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
 |  * Lesser General Public License for more details. | 
 |  * | 
 |  * You should have received a copy of the GNU Lesser General Public | 
 |  * License along with this library; if not, write to the Free Software | 
 |  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA | 
 |  * | 
 |  * NOTE: If you make any changes to fix a particular app, make sure | 
 |  * they don't break something else like Netscape or telnet and ftp | 
 |  * clients and servers (www.winsite.com got a lot of those). | 
 |  */ | 
 |  | 
 | #include "config.h" | 
 | #include "wine/port.h" | 
 |  | 
 | #include <stdarg.h> | 
 | #include <stdio.h> | 
 | #include <string.h> | 
 | #include <sys/types.h> | 
 | #ifdef HAVE_SYS_IPC_H | 
 | # include <sys/ipc.h> | 
 | #endif | 
 | #ifdef HAVE_SYS_IOCTL_H | 
 | # include <sys/ioctl.h> | 
 | #endif | 
 | #ifdef HAVE_SYS_FILIO_H | 
 | # include <sys/filio.h> | 
 | #endif | 
 | #ifdef HAVE_SYS_SOCKIO_H | 
 | # include <sys/sockio.h> | 
 | #endif | 
 |  | 
 | #if defined(__EMX__) | 
 | # include <sys/so_ioctl.h> | 
 | #endif | 
 |  | 
 | #ifdef HAVE_SYS_PARAM_H | 
 | # include <sys/param.h> | 
 | #endif | 
 |  | 
 | #ifdef HAVE_SYS_MSG_H | 
 | # include <sys/msg.h> | 
 | #endif | 
 | #ifdef HAVE_SYS_WAIT_H | 
 | # include <sys/wait.h> | 
 | #endif | 
 | #ifdef HAVE_SYS_UIO_H | 
 | # include <sys/uio.h> | 
 | #endif | 
 | #ifdef HAVE_SYS_SOCKET_H | 
 | #include <sys/socket.h> | 
 | #endif | 
 | #ifdef HAVE_NETINET_IN_H | 
 | # include <netinet/in.h> | 
 | #endif | 
 | #ifdef HAVE_NETINET_TCP_H | 
 | # include <netinet/tcp.h> | 
 | #endif | 
 | #ifdef HAVE_ARPA_INET_H | 
 | # include <arpa/inet.h> | 
 | #endif | 
 | #include <ctype.h> | 
 | #include <fcntl.h> | 
 | #include <errno.h> | 
 | #ifdef HAVE_SYS_ERRNO_H | 
 | #include <sys/errno.h> | 
 | #endif | 
 | #ifdef HAVE_NETDB_H | 
 | #include <netdb.h> | 
 | #endif | 
 | #ifdef HAVE_UNISTD_H | 
 | # include <unistd.h> | 
 | #endif | 
 | #include <stdlib.h> | 
 | #ifdef HAVE_ARPA_NAMESER_H | 
 | # include <arpa/nameser.h> | 
 | #endif | 
 | #ifdef HAVE_RESOLV_H | 
 | # include <resolv.h> | 
 | #endif | 
 | #ifdef HAVE_NET_IF_H | 
 | # include <net/if.h> | 
 | #endif | 
 |  | 
 | #ifdef HAVE_NETIPX_IPX_H | 
 | # include <netipx/ipx.h> | 
 | # define HAVE_IPX | 
 | #elif defined(HAVE_LINUX_IPX_H) | 
 | # ifdef HAVE_ASM_TYPES_H | 
 | #  include <asm/types.h> | 
 | # endif | 
 | # include <linux/ipx.h> | 
 | # define HAVE_IPX | 
 | #endif | 
 |  | 
 | #ifdef HAVE_POLL_H | 
 | #include <poll.h> | 
 | #endif | 
 | #ifdef HAVE_SYS_POLL_H | 
 | # include <sys/poll.h> | 
 | #endif | 
 | #ifdef HAVE_SYS_TIME_H | 
 | # include <sys/time.h> | 
 | #endif | 
 |  | 
 | #define NONAMELESSUNION | 
 | #define NONAMELESSSTRUCT | 
 | #include "ntstatus.h" | 
 | #define WIN32_NO_STATUS | 
 | #include "windef.h" | 
 | #include "winbase.h" | 
 | #include "wingdi.h" | 
 | #include "winuser.h" | 
 | #include "winerror.h" | 
 | #include "winnls.h" | 
 | #include "winsock2.h" | 
 | #include "mswsock.h" | 
 | #include "ws2tcpip.h" | 
 | #include "ws2spi.h" | 
 | #include "wsipx.h" | 
 | #include "winnt.h" | 
 | #include "iphlpapi.h" | 
 | #include "wine/server.h" | 
 | #include "wine/debug.h" | 
 | #include "wine/unicode.h" | 
 |  | 
 | #ifdef HAVE_IPX | 
 | # include "wsnwlink.h" | 
 | #endif | 
 |  | 
 |  | 
 | #if defined(__FreeBSD__) || defined(__FreeBSD_kernel__) | 
 | # define sipx_network    sipx_addr.x_net | 
 | # define sipx_node       sipx_addr.x_host.c_host | 
 | #endif  /* __FreeBSD__ */ | 
 |  | 
 | #ifndef INADDR_NONE | 
 | #define INADDR_NONE ~0UL | 
 | #endif | 
 |  | 
 | WINE_DEFAULT_DEBUG_CHANNEL(winsock); | 
 |  | 
 | /* critical section to protect some non-rentrant net function */ | 
 | extern CRITICAL_SECTION csWSgetXXXbyYYY; | 
 |  | 
 | union generic_unix_sockaddr | 
 | { | 
 |     struct sockaddr addr; | 
 |     char data[128];  /* should be big enough for all families */ | 
 | }; | 
 |  | 
 | static inline const char *debugstr_sockaddr( const struct WS_sockaddr *a ) | 
 | { | 
 |     if (!a) return "(nil)"; | 
 |     return wine_dbg_sprintf("{ family %d, address %s, port %d }", | 
 |                             ((const struct sockaddr_in *)a)->sin_family, | 
 |                             inet_ntoa(((const struct sockaddr_in *)a)->sin_addr), | 
 |                             ntohs(((const struct sockaddr_in *)a)->sin_port)); | 
 | } | 
 |  | 
 | /* HANDLE<->SOCKET conversion (SOCKET is UINT_PTR). */ | 
 | #define SOCKET2HANDLE(s) ((HANDLE)(s)) | 
 | #define HANDLE2SOCKET(h) ((SOCKET)(h)) | 
 |  | 
 | /**************************************************************** | 
 |  * Async IO declarations | 
 |  ****************************************************************/ | 
 |  | 
 | typedef struct ws2_async | 
 | { | 
 |     HANDLE                              hSocket; | 
 |     int                                 type; | 
 |     LPWSAOVERLAPPED                     user_overlapped; | 
 |     LPWSAOVERLAPPED_COMPLETION_ROUTINE  completion_func; | 
 |     IO_STATUS_BLOCK                     local_iosb; | 
 |     struct iovec                        iovec[WS_MSG_MAXIOVLEN]; | 
 |     int                                 n_iovecs; | 
 |     struct WS_sockaddr                  *addr; | 
 |     union | 
 |     { | 
 |         int val;     /* for send operations */ | 
 |         int *ptr;    /* for recv operations */ | 
 |     }                                   addrlen; | 
 |     DWORD                               flags; | 
 | } ws2_async; | 
 |  | 
 | /****************************************************************/ | 
 |  | 
 | /* ----------------------------------- internal data */ | 
 |  | 
 | /* ws_... struct conversion flags */ | 
 |  | 
 | typedef struct          /* WSAAsyncSelect() control struct */ | 
 | { | 
 |   HANDLE      service, event, sock; | 
 |   HWND        hWnd; | 
 |   UINT        uMsg; | 
 |   LONG        lEvent; | 
 | } ws_select_info; | 
 |  | 
 | #define WS_MAX_SOCKETS_PER_PROCESS      128     /* reasonable guess */ | 
 | #define WS_MAX_UDP_DATAGRAM             1024 | 
 | static INT WINAPI WSA_DefaultBlockingHook( FARPROC x ); | 
 |  | 
 | /* hostent's, servent's and protent's are stored in one buffer per thread, | 
 |  * as documented on MSDN for the functions that return any of the buffers */ | 
 | struct per_thread_data | 
 | { | 
 |     int opentype; | 
 |     struct WS_hostent *he_buffer; | 
 |     struct WS_servent *se_buffer; | 
 |     struct WS_protoent *pe_buffer; | 
 |     int he_len; | 
 |     int se_len; | 
 |     int pe_len; | 
 | }; | 
 |  | 
 | static INT num_startup;          /* reference counter */ | 
 | static FARPROC blocking_hook = (FARPROC)WSA_DefaultBlockingHook; | 
 |  | 
 | /* function prototypes */ | 
 | static struct WS_hostent *WS_dup_he(const struct hostent* p_he); | 
 | static struct WS_protoent *WS_dup_pe(const struct protoent* p_pe); | 
 | static struct WS_servent *WS_dup_se(const struct servent* p_se); | 
 |  | 
 | int WSAIOCTL_GetInterfaceCount(void); | 
 | int WSAIOCTL_GetInterfaceName(int intNumber, char *intName); | 
 |  | 
 | UINT wsaErrno(void); | 
 | UINT wsaHerrno(int errnr); | 
 |  | 
 | #define MAP_OPTION(opt) { WS_##opt, opt } | 
 |  | 
 | static const int ws_sock_map[][2] = | 
 | { | 
 |     MAP_OPTION( SO_DEBUG ), | 
 |     MAP_OPTION( SO_ACCEPTCONN ), | 
 |     MAP_OPTION( SO_REUSEADDR ), | 
 |     MAP_OPTION( SO_KEEPALIVE ), | 
 |     MAP_OPTION( SO_DONTROUTE ), | 
 |     MAP_OPTION( SO_BROADCAST ), | 
 |     MAP_OPTION( SO_LINGER ), | 
 |     MAP_OPTION( SO_OOBINLINE ), | 
 |     MAP_OPTION( SO_SNDBUF ), | 
 |     MAP_OPTION( SO_RCVBUF ), | 
 |     MAP_OPTION( SO_ERROR ), | 
 |     MAP_OPTION( SO_TYPE ), | 
 | #ifdef SO_RCVTIMEO | 
 |     MAP_OPTION( SO_RCVTIMEO ), | 
 | #endif | 
 | #ifdef SO_SNDTIMEO | 
 |     MAP_OPTION( SO_SNDTIMEO ), | 
 | #endif | 
 | }; | 
 |  | 
 | static const int ws_tcp_map[][2] = | 
 | { | 
 | #ifdef TCP_NODELAY | 
 |     MAP_OPTION( TCP_NODELAY ), | 
 | #endif | 
 | }; | 
 |  | 
 | static const int ws_ip_map[][2] = | 
 | { | 
 |     MAP_OPTION( IP_MULTICAST_IF ), | 
 |     MAP_OPTION( IP_MULTICAST_TTL ), | 
 |     MAP_OPTION( IP_MULTICAST_LOOP ), | 
 |     MAP_OPTION( IP_ADD_MEMBERSHIP ), | 
 |     MAP_OPTION( IP_DROP_MEMBERSHIP ), | 
 |     MAP_OPTION( IP_OPTIONS ), | 
 | #ifdef IP_HDRINCL | 
 |     MAP_OPTION( IP_HDRINCL ), | 
 | #endif | 
 |     MAP_OPTION( IP_TOS ), | 
 |     MAP_OPTION( IP_TTL ), | 
 | }; | 
 |  | 
 | static const int ws_af_map[][2] = | 
 | { | 
 |     MAP_OPTION( AF_UNSPEC ), | 
 |     MAP_OPTION( AF_INET ), | 
 |     MAP_OPTION( AF_INET6 ), | 
 | #ifdef HAVE_IPX | 
 |     MAP_OPTION( AF_IPX ), | 
 | #endif | 
 | }; | 
 |  | 
 | static const int ws_socktype_map[][2] = | 
 | { | 
 |     MAP_OPTION( SOCK_DGRAM ), | 
 |     MAP_OPTION( SOCK_STREAM ), | 
 |     MAP_OPTION( SOCK_RAW ), | 
 | }; | 
 |  | 
 | static const int ws_proto_map[][2] = | 
 | { | 
 |     MAP_OPTION( IPPROTO_IP ), | 
 |     MAP_OPTION( IPPROTO_TCP ), | 
 |     MAP_OPTION( IPPROTO_UDP ), | 
 |     MAP_OPTION( IPPROTO_ICMP ), | 
 |     MAP_OPTION( IPPROTO_IGMP ), | 
 |     MAP_OPTION( IPPROTO_RAW ), | 
 | }; | 
 |  | 
 | static const int ws_aiflag_map[][2] = | 
 | { | 
 |     MAP_OPTION( AI_PASSIVE ), | 
 |     MAP_OPTION( AI_CANONNAME ), | 
 |     MAP_OPTION( AI_NUMERICHOST ), | 
 |     /* Linux/UNIX knows a lot more. But Windows only | 
 |      * has 3 as far as I could see. -Marcus | 
 |      */ | 
 | }; | 
 |  | 
 | static const int ws_eai_map[][2] = | 
 | { | 
 |     MAP_OPTION( EAI_AGAIN ), | 
 |     MAP_OPTION( EAI_BADFLAGS ), | 
 |     MAP_OPTION( EAI_FAIL ), | 
 |     MAP_OPTION( EAI_FAMILY ), | 
 |     MAP_OPTION( EAI_MEMORY ), | 
 | /* Note: EAI_NODATA is deprecated, but still  | 
 |  * used by Windows and Linux... We map the newer | 
 |  * EAI_NONAME to EAI_NODATA for now until Windows | 
 |  * changes too. | 
 |  */ | 
 | #ifdef EAI_NODATA | 
 |     MAP_OPTION( EAI_NODATA ), | 
 | #endif | 
 | #ifdef EAI_NONAME | 
 |     { WS_EAI_NODATA, EAI_NONAME }, | 
 | #endif | 
 |  | 
 |     MAP_OPTION( EAI_SERVICE ), | 
 |     MAP_OPTION( EAI_SOCKTYPE ), | 
 |     { 0, 0 } | 
 | }; | 
 |  | 
 | static inline DWORD NtStatusToWSAError( const DWORD status ) | 
 | { | 
 |     /* We only need to cover the status codes set by server async request handling */ | 
 |     DWORD wserr; | 
 |     switch ( status ) | 
 |     { | 
 |     case STATUS_SUCCESS:              wserr = 0;                     break; | 
 |     case STATUS_PENDING:              wserr = WSA_IO_PENDING;        break; | 
 |     case STATUS_OBJECT_TYPE_MISMATCH: wserr = WSAENOTSOCK;           break; | 
 |     case STATUS_INVALID_HANDLE:       wserr = WSAEBADF;              break; | 
 |     case STATUS_INVALID_PARAMETER:    wserr = WSAEINVAL;             break; | 
 |     case STATUS_PIPE_DISCONNECTED:    wserr = WSAESHUTDOWN;          break; | 
 |     case STATUS_CANCELLED:            wserr = WSA_OPERATION_ABORTED; break; | 
 |     case STATUS_TIMEOUT:              wserr = WSAETIMEDOUT;          break; | 
 |     case STATUS_NO_MEMORY:            wserr = WSAEFAULT;             break; | 
 |     default: | 
 |         if ( status >= WSABASEERR && status <= WSABASEERR+1004 ) | 
 |             /* It is not an NT status code but a winsock error */ | 
 |             wserr = status; | 
 |         else | 
 |         { | 
 |             wserr = RtlNtStatusToDosError( status ); | 
 |             FIXME( "Status code %08x converted to DOS error code %x\n", status, wserr ); | 
 |         } | 
 |     } | 
 |     return wserr; | 
 | } | 
 |  | 
 | /* set last error code from NT status without mapping WSA errors */ | 
 | static inline unsigned int set_error( unsigned int err ) | 
 | { | 
 |     if (err) | 
 |     { | 
 |         err = NtStatusToWSAError( err ); | 
 |         SetLastError( err ); | 
 |     } | 
 |     return err; | 
 | } | 
 |  | 
 | static inline int get_sock_fd( SOCKET s, DWORD access, unsigned int *options ) | 
 | { | 
 |     int fd; | 
 |     if (set_error( wine_server_handle_to_fd( SOCKET2HANDLE(s), access, &fd, options ) )) | 
 |         return -1; | 
 |     return fd; | 
 | } | 
 |  | 
 | static inline void release_sock_fd( SOCKET s, int fd ) | 
 | { | 
 |     wine_server_release_fd( SOCKET2HANDLE(s), fd ); | 
 | } | 
 |  | 
 | static void _enable_event( HANDLE s, unsigned int event, | 
 |                            unsigned int sstate, unsigned int cstate ) | 
 | { | 
 |     SERVER_START_REQ( enable_socket_event ) | 
 |     { | 
 |         req->handle = s; | 
 |         req->mask   = event; | 
 |         req->sstate = sstate; | 
 |         req->cstate = cstate; | 
 |         wine_server_call( req ); | 
 |     } | 
 |     SERVER_END_REQ; | 
 | } | 
 |  | 
 | static int _is_blocking(SOCKET s) | 
 | { | 
 |     int ret; | 
 |     SERVER_START_REQ( get_socket_event ) | 
 |     { | 
 |         req->handle  = SOCKET2HANDLE(s); | 
 |         req->service = FALSE; | 
 |         req->c_event = 0; | 
 |         wine_server_call( req ); | 
 |         ret = (reply->state & FD_WINE_NONBLOCKING) == 0; | 
 |     } | 
 |     SERVER_END_REQ; | 
 |     return ret; | 
 | } | 
 |  | 
 | static unsigned int _get_sock_mask(SOCKET s) | 
 | { | 
 |     unsigned int ret; | 
 |     SERVER_START_REQ( get_socket_event ) | 
 |     { | 
 |         req->handle  = SOCKET2HANDLE(s); | 
 |         req->service = FALSE; | 
 |         req->c_event = 0; | 
 |         wine_server_call( req ); | 
 |         ret = reply->mask; | 
 |     } | 
 |     SERVER_END_REQ; | 
 |     return ret; | 
 | } | 
 |  | 
 | static void _sync_sock_state(SOCKET s) | 
 | { | 
 |     /* do a dummy wineserver request in order to let | 
 |        the wineserver run through its select loop once */ | 
 |     (void)_is_blocking(s); | 
 | } | 
 |  | 
 | static int _get_sock_error(SOCKET s, unsigned int bit) | 
 | { | 
 |     int events[FD_MAX_EVENTS]; | 
 |  | 
 |     SERVER_START_REQ( get_socket_event ) | 
 |     { | 
 |         req->handle  = SOCKET2HANDLE(s); | 
 |         req->service = FALSE; | 
 |         req->c_event = 0; | 
 |         wine_server_set_reply( req, events, sizeof(events) ); | 
 |         wine_server_call( req ); | 
 |     } | 
 |     SERVER_END_REQ; | 
 |     return events[bit]; | 
 | } | 
 |  | 
 | static struct per_thread_data *get_per_thread_data(void) | 
 | { | 
 |     struct per_thread_data * ptb = NtCurrentTeb()->WinSockData; | 
 |     /* lazy initialization */ | 
 |     if (!ptb) | 
 |     { | 
 |         ptb = HeapAlloc( GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*ptb) ); | 
 |         NtCurrentTeb()->WinSockData = ptb; | 
 |     } | 
 |     return ptb; | 
 | } | 
 |  | 
 | static void free_per_thread_data(void) | 
 | { | 
 |     struct per_thread_data * ptb = NtCurrentTeb()->WinSockData; | 
 |  | 
 |     if (!ptb) return; | 
 |  | 
 |     /* delete scratch buffers */ | 
 |     HeapFree( GetProcessHeap(), 0, ptb->he_buffer ); | 
 |     HeapFree( GetProcessHeap(), 0, ptb->se_buffer ); | 
 |     HeapFree( GetProcessHeap(), 0, ptb->pe_buffer ); | 
 |     ptb->he_buffer = NULL; | 
 |     ptb->se_buffer = NULL; | 
 |     ptb->pe_buffer = NULL; | 
 |  | 
 |     HeapFree( GetProcessHeap(), 0, ptb ); | 
 |     NtCurrentTeb()->WinSockData = NULL; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		DllMain (WS2_32.init) | 
 |  */ | 
 | BOOL WINAPI DllMain(HINSTANCE hInstDLL, DWORD fdwReason, LPVOID fImpLoad) | 
 | { | 
 |     TRACE("%p 0x%x %p\n", hInstDLL, fdwReason, fImpLoad); | 
 |     switch (fdwReason) { | 
 |     case DLL_PROCESS_ATTACH: | 
 |         break; | 
 |     case DLL_PROCESS_DETACH: | 
 |         free_per_thread_data(); | 
 |         num_startup = 0; | 
 |         break; | 
 |     case DLL_THREAD_DETACH: | 
 |         free_per_thread_data(); | 
 |         break; | 
 |     } | 
 |     return TRUE; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *          convert_sockopt() | 
 |  * | 
 |  * Converts socket flags from Windows format. | 
 |  * Return 1 if converted, 0 if not (error). | 
 |  */ | 
 | static int convert_sockopt(INT *level, INT *optname) | 
 | { | 
 |   int i; | 
 |   switch (*level) | 
 |   { | 
 |      case WS_SOL_SOCKET: | 
 |         *level = SOL_SOCKET; | 
 |         for(i=0; i<sizeof(ws_sock_map)/sizeof(ws_sock_map[0]); i++) { | 
 |             if( ws_sock_map[i][0] == *optname ) | 
 |             { | 
 |                 *optname = ws_sock_map[i][1]; | 
 |                 return 1; | 
 |             } | 
 |         } | 
 |         FIXME("Unknown SOL_SOCKET optname 0x%x\n", *optname); | 
 |         break; | 
 |      case WS_IPPROTO_TCP: | 
 |         *level = IPPROTO_TCP; | 
 |         for(i=0; i<sizeof(ws_tcp_map)/sizeof(ws_tcp_map[0]); i++) { | 
 |             if ( ws_tcp_map[i][0] == *optname ) | 
 |             { | 
 |                 *optname = ws_tcp_map[i][1]; | 
 |                 return 1; | 
 |             } | 
 |         } | 
 |         FIXME("Unknown IPPROTO_TCP optname 0x%x\n", *optname); | 
 | 	break; | 
 |      case WS_IPPROTO_IP: | 
 |         *level = IPPROTO_IP; | 
 |         for(i=0; i<sizeof(ws_ip_map)/sizeof(ws_ip_map[0]); i++) { | 
 |             if (ws_ip_map[i][0] == *optname ) | 
 |             { | 
 |                 *optname = ws_ip_map[i][1]; | 
 |                 return 1; | 
 |             } | 
 |         } | 
 | 	FIXME("Unknown IPPROTO_IP optname 0x%x\n", *optname); | 
 | 	break; | 
 |      default: FIXME("Unimplemented or unknown socket level\n"); | 
 |   } | 
 |   return 0; | 
 | } | 
 |  | 
 | static inline BOOL is_timeout_option( int optname ) | 
 | { | 
 | #ifdef SO_RCVTIMEO | 
 |     if (optname == SO_RCVTIMEO) return TRUE; | 
 | #endif | 
 | #ifdef SO_SNDTIMEO | 
 |     if (optname == SO_SNDTIMEO) return TRUE; | 
 | #endif | 
 |     return FALSE; | 
 | } | 
 |  | 
 | /* ----------------------------------- Per-thread info (or per-process?) */ | 
 |  | 
 | static char *strdup_lower(const char *str) | 
 | { | 
 |     int i; | 
 |     char *ret = HeapAlloc( GetProcessHeap(), 0, strlen(str) + 1 ); | 
 |  | 
 |     if (ret) | 
 |     { | 
 |         for (i = 0; str[i]; i++) ret[i] = tolower(str[i]); | 
 |         ret[i] = 0; | 
 |     } | 
 |     else SetLastError(WSAENOBUFS); | 
 |     return ret; | 
 | } | 
 |  | 
 | static inline int sock_error_p(int s) | 
 | { | 
 |     unsigned int optval, optlen; | 
 |  | 
 |     optlen = sizeof(optval); | 
 |     getsockopt(s, SOL_SOCKET, SO_ERROR, (void *) &optval, &optlen); | 
 |     if (optval) WARN("\t[%i] error: %d\n", s, optval); | 
 |     return optval != 0; | 
 | } | 
 |  | 
 | /* Utility: get the SO_RCVTIMEO or SO_SNDTIMEO socket option | 
 |  * from an fd and return the value converted to milli seconds | 
 |  * or -1 if there is an infinite time out */ | 
 | static inline int get_rcvsnd_timeo( int fd, int optname) | 
 | { | 
 |   struct timeval tv; | 
 |   unsigned int len = sizeof(tv); | 
 |   int ret = getsockopt(fd, SOL_SOCKET, optname, &tv, &len); | 
 |   if( ret >= 0) | 
 |       ret = tv.tv_sec * 1000 + tv.tv_usec / 1000; | 
 |   if( ret <= 0 ) /* tv == {0,0} means infinite time out */ | 
 |       return -1; | 
 |   return ret; | 
 | } | 
 |  | 
 | /* macro wrappers for portability */ | 
 | #ifdef SO_RCVTIMEO | 
 | #define GET_RCVTIMEO(fd) get_rcvsnd_timeo( (fd), SO_RCVTIMEO) | 
 | #else | 
 | #define GET_RCVTIMEO(fd) (-1) | 
 | #endif | 
 |  | 
 | #ifdef SO_SNDTIMEO | 
 | #define GET_SNDTIMEO(fd) get_rcvsnd_timeo( (fd), SO_SNDTIMEO) | 
 | #else | 
 | #define GET_SNDTIMEO(fd) (-1) | 
 | #endif | 
 |  | 
 | /* utility: given an fd, will block until one of the events occurs */ | 
 | static inline int do_block( int fd, int events, int timeout ) | 
 | { | 
 |   struct pollfd pfd; | 
 |   int ret; | 
 |  | 
 |   pfd.fd = fd; | 
 |   pfd.events = events; | 
 |  | 
 |   while ((ret = poll(&pfd, 1, timeout)) < 0) | 
 |   { | 
 |       if (errno != EINTR) | 
 |           return -1; | 
 |   } | 
 |   if( ret == 0 ) | 
 |       return 0; | 
 |   return pfd.revents; | 
 | } | 
 |  | 
 | static int | 
 | convert_af_w2u(int windowsaf) { | 
 |     int i; | 
 |  | 
 |     for (i=0;i<sizeof(ws_af_map)/sizeof(ws_af_map[0]);i++) | 
 |     	if (ws_af_map[i][0] == windowsaf) | 
 | 	    return ws_af_map[i][1]; | 
 |     FIXME("unhandled Windows address family %d\n", windowsaf); | 
 |     return -1; | 
 | } | 
 |  | 
 | static int | 
 | convert_af_u2w(int unixaf) { | 
 |     int i; | 
 |  | 
 |     for (i=0;i<sizeof(ws_af_map)/sizeof(ws_af_map[0]);i++) | 
 |     	if (ws_af_map[i][1] == unixaf) | 
 | 	    return ws_af_map[i][0]; | 
 |     FIXME("unhandled UNIX address family %d\n", unixaf); | 
 |     return -1; | 
 | } | 
 |  | 
 | static int | 
 | convert_proto_w2u(int windowsproto) { | 
 |     int i; | 
 |  | 
 |     for (i=0;i<sizeof(ws_proto_map)/sizeof(ws_proto_map[0]);i++) | 
 |     	if (ws_proto_map[i][0] == windowsproto) | 
 | 	    return ws_proto_map[i][1]; | 
 |     FIXME("unhandled Windows socket protocol %d\n", windowsproto); | 
 |     return -1; | 
 | } | 
 |  | 
 | static int | 
 | convert_proto_u2w(int unixproto) { | 
 |     int i; | 
 |  | 
 |     for (i=0;i<sizeof(ws_proto_map)/sizeof(ws_proto_map[0]);i++) | 
 |     	if (ws_proto_map[i][1] == unixproto) | 
 | 	    return ws_proto_map[i][0]; | 
 |     FIXME("unhandled UNIX socket protocol %d\n", unixproto); | 
 |     return -1; | 
 | } | 
 |  | 
 | static int | 
 | convert_socktype_w2u(int windowssocktype) { | 
 |     int i; | 
 |  | 
 |     for (i=0;i<sizeof(ws_socktype_map)/sizeof(ws_socktype_map[0]);i++) | 
 |     	if (ws_socktype_map[i][0] == windowssocktype) | 
 | 	    return ws_socktype_map[i][1]; | 
 |     FIXME("unhandled Windows socket type %d\n", windowssocktype); | 
 |     return -1; | 
 | } | 
 |  | 
 | static int | 
 | convert_socktype_u2w(int unixsocktype) { | 
 |     int i; | 
 |  | 
 |     for (i=0;i<sizeof(ws_socktype_map)/sizeof(ws_socktype_map[0]);i++) | 
 |     	if (ws_socktype_map[i][1] == unixsocktype) | 
 | 	    return ws_socktype_map[i][0]; | 
 |     FIXME("unhandled UNIX socket type %d\n", unixsocktype); | 
 |     return -1; | 
 | } | 
 |  | 
 | /* ----------------------------------- API ----- | 
 |  * | 
 |  * Init / cleanup / error checking. | 
 |  */ | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSAStartup		(WS2_32.115) | 
 |  */ | 
 | int WINAPI WSAStartup(WORD wVersionRequested, LPWSADATA lpWSAData) | 
 | { | 
 |     TRACE("verReq=%x\n", wVersionRequested); | 
 |  | 
 |     if (LOBYTE(wVersionRequested) < 1) | 
 |         return WSAVERNOTSUPPORTED; | 
 |  | 
 |     if (!lpWSAData) return WSAEINVAL; | 
 |  | 
 |     num_startup++; | 
 |  | 
 |     /* that's the whole of the negotiation for now */ | 
 |     lpWSAData->wVersion = wVersionRequested; | 
 |     /* return winsock information */ | 
 |     lpWSAData->wHighVersion = 0x0202; | 
 |     strcpy(lpWSAData->szDescription, "WinSock 2.0" ); | 
 |     strcpy(lpWSAData->szSystemStatus, "Running" ); | 
 |     lpWSAData->iMaxSockets = WS_MAX_SOCKETS_PER_PROCESS; | 
 |     lpWSAData->iMaxUdpDg = WS_MAX_UDP_DATAGRAM; | 
 |     /* don't do anything with lpWSAData->lpVendorInfo */ | 
 |     /* (some apps don't allocate the space for this field) */ | 
 |  | 
 |     TRACE("succeeded\n"); | 
 |     return 0; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSACleanup			(WS2_32.116) | 
 |  */ | 
 | INT WINAPI WSACleanup(void) | 
 | { | 
 |     if (num_startup) { | 
 |         num_startup--; | 
 |         return 0; | 
 |     } | 
 |     SetLastError(WSANOTINITIALISED); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSAGetLastError		(WINSOCK.111) | 
 |  *      WSAGetLastError		(WS2_32.111) | 
 |  */ | 
 | INT WINAPI WSAGetLastError(void) | 
 | { | 
 | 	return GetLastError(); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSASetLastError		(WS2_32.112) | 
 |  */ | 
 | void WINAPI WSASetLastError(INT iError) { | 
 |     SetLastError(iError); | 
 | } | 
 |  | 
 | static struct WS_hostent *check_buffer_he(int size) | 
 | { | 
 |     struct per_thread_data * ptb = get_per_thread_data(); | 
 |     if (ptb->he_buffer) | 
 |     { | 
 |         if (ptb->he_len >= size ) return ptb->he_buffer; | 
 |         HeapFree( GetProcessHeap(), 0, ptb->he_buffer ); | 
 |     } | 
 |     ptb->he_buffer = HeapAlloc( GetProcessHeap(), 0, (ptb->he_len = size) ); | 
 |     if (!ptb->he_buffer) SetLastError(WSAENOBUFS); | 
 |     return ptb->he_buffer; | 
 | } | 
 |  | 
 | static struct WS_servent *check_buffer_se(int size) | 
 | { | 
 |     struct per_thread_data * ptb = get_per_thread_data(); | 
 |     if (ptb->se_buffer) | 
 |     { | 
 |         if (ptb->se_len >= size ) return ptb->se_buffer; | 
 |         HeapFree( GetProcessHeap(), 0, ptb->se_buffer ); | 
 |     } | 
 |     ptb->se_buffer = HeapAlloc( GetProcessHeap(), 0, (ptb->se_len = size) ); | 
 |     if (!ptb->se_buffer) SetLastError(WSAENOBUFS); | 
 |     return ptb->se_buffer; | 
 | } | 
 |  | 
 | static struct WS_protoent *check_buffer_pe(int size) | 
 | { | 
 |     struct per_thread_data * ptb = get_per_thread_data(); | 
 |     if (ptb->pe_buffer) | 
 |     { | 
 |         if (ptb->pe_len >= size ) return ptb->pe_buffer; | 
 |         HeapFree( GetProcessHeap(), 0, ptb->pe_buffer ); | 
 |     } | 
 |     ptb->pe_buffer = HeapAlloc( GetProcessHeap(), 0, (ptb->pe_len = size) ); | 
 |     if (!ptb->pe_buffer) SetLastError(WSAENOBUFS); | 
 |     return ptb->pe_buffer; | 
 | } | 
 |  | 
 | /* ----------------------------------- i/o APIs */ | 
 |  | 
 | #ifdef HAVE_IPX | 
 | #define SUPPORTED_PF(pf) ((pf)==WS_AF_INET || (pf)== WS_AF_IPX || (pf) == WS_AF_INET6) | 
 | #else | 
 | #define SUPPORTED_PF(pf) ((pf)==WS_AF_INET || (pf) == WS_AF_INET6) | 
 | #endif | 
 |  | 
 |  | 
 | /**********************************************************************/ | 
 |  | 
 | /* Returns the length of the converted address if successful, 0 if it was too small to | 
 |  * start with. | 
 |  */ | 
 | static unsigned int ws_sockaddr_ws2u(const struct WS_sockaddr* wsaddr, int wsaddrlen, | 
 |                                      union generic_unix_sockaddr *uaddr) | 
 | { | 
 |     unsigned int uaddrlen = 0; | 
 |  | 
 |     switch (wsaddr->sa_family) | 
 |     { | 
 | #ifdef HAVE_IPX | 
 |     case WS_AF_IPX: | 
 |         { | 
 |             const struct WS_sockaddr_ipx* wsipx=(const struct WS_sockaddr_ipx*)wsaddr; | 
 |             struct sockaddr_ipx* uipx = (struct sockaddr_ipx *)uaddr; | 
 |  | 
 |             if (wsaddrlen<sizeof(struct WS_sockaddr_ipx)) | 
 |                 return 0; | 
 |  | 
 |             uaddrlen = sizeof(struct sockaddr_ipx); | 
 |             memset( uaddr, 0, uaddrlen ); | 
 |             uipx->sipx_family=AF_IPX; | 
 |             uipx->sipx_port=wsipx->sa_socket; | 
 |             /* copy sa_netnum and sa_nodenum to sipx_network and sipx_node | 
 |              * in one go | 
 |              */ | 
 |             memcpy(&uipx->sipx_network,wsipx->sa_netnum,sizeof(uipx->sipx_network)+sizeof(uipx->sipx_node)); | 
 | #ifdef IPX_FRAME_NONE | 
 |             uipx->sipx_type=IPX_FRAME_NONE; | 
 | #endif | 
 |             break; | 
 |         } | 
 | #endif | 
 |     case WS_AF_INET6: { | 
 |         struct sockaddr_in6* uin6 = (struct sockaddr_in6 *)uaddr; | 
 |         const struct WS_sockaddr_in6* win6 = (const struct WS_sockaddr_in6*)wsaddr; | 
 |  | 
 |         /* Note: Windows has 2 versions of the sockaddr_in6 struct, one with | 
 |          * scope_id, one without. Check: | 
 |          * http://msdn.microsoft.com/library/en-us/winsock/winsock/sockaddr_2.asp | 
 |          */ | 
 |         if (wsaddrlen >= sizeof(struct WS_sockaddr_in6_old)) { | 
 |             uaddrlen = sizeof(struct sockaddr_in6); | 
 |             memset( uaddr, 0, uaddrlen ); | 
 |             uin6->sin6_family   = AF_INET6; | 
 |             uin6->sin6_port     = win6->sin6_port; | 
 |             uin6->sin6_flowinfo = win6->sin6_flowinfo; | 
 | #ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID | 
 |             if (wsaddrlen >= sizeof(struct WS_sockaddr_in6)) uin6->sin6_scope_id = win6->sin6_scope_id; | 
 | #endif | 
 |             memcpy(&uin6->sin6_addr,&win6->sin6_addr,16); /* 16 bytes = 128 address bits */ | 
 |             break; | 
 |         } | 
 |         FIXME("bad size %d for WS_sockaddr_in6\n",wsaddrlen); | 
 |         return 0; | 
 |     } | 
 |     case WS_AF_INET: { | 
 |         struct sockaddr_in* uin = (struct sockaddr_in *)uaddr; | 
 |         const struct WS_sockaddr_in* win = (const struct WS_sockaddr_in*)wsaddr; | 
 |  | 
 |         if (wsaddrlen<sizeof(struct WS_sockaddr_in)) | 
 |             return 0; | 
 |         uaddrlen = sizeof(struct sockaddr_in); | 
 |         memset( uaddr, 0, uaddrlen ); | 
 |         uin->sin_family = AF_INET; | 
 |         uin->sin_port   = win->sin_port; | 
 |         memcpy(&uin->sin_addr,&win->sin_addr,4); /* 4 bytes = 32 address bits */ | 
 |         break; | 
 |     } | 
 |     case WS_AF_UNSPEC: { | 
 |         /* Try to determine the needed space by the passed windows sockaddr space */ | 
 |         switch (wsaddrlen) { | 
 |         default: /* likely a ipv4 address */ | 
 |         case sizeof(struct WS_sockaddr_in): | 
 |             uaddrlen = sizeof(struct sockaddr_in); | 
 |             break; | 
 | #ifdef HAVE_IPX | 
 |         case sizeof(struct WS_sockaddr_ipx): | 
 |             uaddrlen = sizeof(struct sockaddr_ipx); | 
 |             break; | 
 | #endif | 
 |         case sizeof(struct WS_sockaddr_in6): | 
 |         case sizeof(struct WS_sockaddr_in6_old): | 
 |             uaddrlen = sizeof(struct sockaddr_in6); | 
 |             break; | 
 |         } | 
 |         memset( uaddr, 0, uaddrlen ); | 
 |         break; | 
 |     } | 
 |     default: | 
 |         FIXME("Unknown address family %d, return NULL.\n", wsaddr->sa_family); | 
 |         return 0; | 
 |     } | 
 |     return uaddrlen; | 
 | } | 
 |  | 
 | static BOOL is_sockaddr_bound(const struct sockaddr *uaddr, int uaddrlen) | 
 | { | 
 |     switch (uaddr->sa_family) | 
 |     { | 
 | #ifdef HAVE_IPX | 
 |         case AF_IPX: | 
 |             FIXME("don't know how to tell if IPX socket is bound, assuming it is!\n"); | 
 |             return TRUE; | 
 | #endif | 
 |         case AF_INET6: | 
 |         { | 
 |             static const struct sockaddr_in6 emptyAddr; | 
 |             const struct sockaddr_in6 *in6 = (const struct sockaddr_in6*) uaddr; | 
 |             return in6->sin6_port || memcmp(&in6->sin6_addr, &emptyAddr.sin6_addr, sizeof(struct in6_addr)); | 
 |         } | 
 |         case AF_INET: | 
 |         { | 
 |             static const struct sockaddr_in emptyAddr; | 
 |             const struct sockaddr_in *in = (const struct sockaddr_in*) uaddr; | 
 |             return in->sin_port || memcmp(&in->sin_addr, &emptyAddr.sin_addr, sizeof(struct in_addr)); | 
 |         } | 
 |         case AF_UNSPEC: | 
 |             return FALSE; | 
 |         default: | 
 |             FIXME("unknown address family %d\n", uaddr->sa_family); | 
 |             return TRUE; | 
 |     } | 
 | } | 
 |  | 
 | /* Returns 0 if successful, -1 if the buffer is too small */ | 
 | static int ws_sockaddr_u2ws(const struct sockaddr* uaddr, struct WS_sockaddr* wsaddr, int* wsaddrlen) | 
 | { | 
 |     int res; | 
 |  | 
 |     switch(uaddr->sa_family) | 
 |     { | 
 | #ifdef HAVE_IPX | 
 |     case AF_IPX: | 
 |         { | 
 |             const struct sockaddr_ipx* uipx=(const struct sockaddr_ipx*)uaddr; | 
 |             struct WS_sockaddr_ipx* wsipx=(struct WS_sockaddr_ipx*)wsaddr; | 
 |  | 
 |             res=-1; | 
 |             switch (*wsaddrlen) /* how much can we copy? */ | 
 |             { | 
 |             default: | 
 |                 res=0; /* enough */ | 
 |                 *wsaddrlen = sizeof(*wsipx); | 
 |                 wsipx->sa_socket=uipx->sipx_port; | 
 |                 /* fall through */ | 
 |             case 13: | 
 |             case 12: | 
 |                 memcpy(wsipx->sa_nodenum,uipx->sipx_node,sizeof(wsipx->sa_nodenum)); | 
 |                 /* fall through */ | 
 |             case 11: | 
 |             case 10: | 
 |             case 9: | 
 |             case 8: | 
 |             case 7: | 
 |             case 6: | 
 |                 memcpy(wsipx->sa_netnum,&uipx->sipx_network,sizeof(wsipx->sa_netnum)); | 
 |                 /* fall through */ | 
 |             case 5: | 
 |             case 4: | 
 |             case 3: | 
 |             case 2: | 
 |                 wsipx->sa_family=WS_AF_IPX; | 
 |                 /* fall through */ | 
 |             case 1: | 
 |             case 0: | 
 |                 /* way too small */ | 
 |                 break; | 
 |             } | 
 |         } | 
 |         break; | 
 | #endif | 
 |     case AF_INET6: { | 
 |         const struct sockaddr_in6* uin6 = (const struct sockaddr_in6*)uaddr; | 
 |         struct WS_sockaddr_in6_old* win6old = (struct WS_sockaddr_in6_old*)wsaddr; | 
 |  | 
 |         if (*wsaddrlen < sizeof(struct WS_sockaddr_in6_old)) | 
 |             return -1; | 
 |         win6old->sin6_family   = WS_AF_INET6; | 
 |         win6old->sin6_port     = uin6->sin6_port; | 
 |         win6old->sin6_flowinfo = uin6->sin6_flowinfo; | 
 |         memcpy(&win6old->sin6_addr,&uin6->sin6_addr,16); /* 16 bytes = 128 address bits */ | 
 |         *wsaddrlen = sizeof(struct WS_sockaddr_in6_old); | 
 | #ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID | 
 |         if (*wsaddrlen >= sizeof(struct WS_sockaddr_in6)) { | 
 |             struct WS_sockaddr_in6* win6 = (struct WS_sockaddr_in6*)wsaddr; | 
 |             win6->sin6_scope_id = uin6->sin6_scope_id; | 
 |             *wsaddrlen = sizeof(struct WS_sockaddr_in6); | 
 |         } | 
 | #endif | 
 |         return 0; | 
 |     } | 
 |     case AF_INET: { | 
 |         const struct sockaddr_in* uin = (const struct sockaddr_in*)uaddr; | 
 |         struct WS_sockaddr_in* win = (struct WS_sockaddr_in*)wsaddr; | 
 |  | 
 |         if (*wsaddrlen < sizeof(struct WS_sockaddr_in)) | 
 |             return -1; | 
 |         win->sin_family = WS_AF_INET; | 
 |         win->sin_port   = uin->sin_port; | 
 |         memcpy(&win->sin_addr,&uin->sin_addr,4); /* 4 bytes = 32 address bits */ | 
 |         memset(&win->sin_zero, 0, 8); /* Make sure the null padding is null */ | 
 |         *wsaddrlen = sizeof(struct WS_sockaddr_in); | 
 |         return 0; | 
 |     } | 
 |     case AF_UNSPEC: { | 
 |         memset(wsaddr,0,*wsaddrlen); | 
 |         return 0; | 
 |     } | 
 |     default: | 
 |         FIXME("Unknown address family %d\n", uaddr->sa_family); | 
 |         return -1; | 
 |     } | 
 |     return res; | 
 | } | 
 |  | 
 | /************************************************************************** | 
 |  * Functions for handling overlapped I/O | 
 |  **************************************************************************/ | 
 |  | 
 | /* user APC called upon async completion */ | 
 | static void WINAPI ws2_async_apc( void *arg, IO_STATUS_BLOCK *iosb, ULONG reserved ) | 
 | { | 
 |     ws2_async *wsa = arg; | 
 |  | 
 |     if (wsa->completion_func) wsa->completion_func( NtStatusToWSAError(iosb->u.Status), | 
 |                                                     iosb->Information, wsa->user_overlapped, | 
 |                                                     wsa->flags ); | 
 |     HeapFree( GetProcessHeap(), 0, wsa ); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WS2_recv                (INTERNAL) | 
 |  * | 
 |  * Workhorse for both synchronous and asynchronous recv() operations. | 
 |  */ | 
 | static int WS2_recv( int fd, struct iovec* iov, int count, | 
 |                      struct WS_sockaddr *lpFrom, LPINT lpFromlen, | 
 |                       LPDWORD lpFlags ) | 
 | { | 
 |     struct msghdr hdr; | 
 |     union generic_unix_sockaddr unix_sockaddr; | 
 |     int n; | 
 |  | 
 |     hdr.msg_name = NULL; | 
 |  | 
 |     if ( lpFrom ) | 
 |     { | 
 |         hdr.msg_namelen = sizeof(unix_sockaddr); | 
 |         hdr.msg_name = &unix_sockaddr; | 
 |     } | 
 |     else | 
 |         hdr.msg_namelen = 0; | 
 |  | 
 |     hdr.msg_iov = iov; | 
 |     hdr.msg_iovlen = count; | 
 | #ifdef HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS | 
 |     hdr.msg_accrights = NULL; | 
 |     hdr.msg_accrightslen = 0; | 
 | #else | 
 |     hdr.msg_control = NULL; | 
 |     hdr.msg_controllen = 0; | 
 |     hdr.msg_flags = 0; | 
 | #endif | 
 |  | 
 |     if ( (n = recvmsg(fd, &hdr, *lpFlags)) == -1 ) | 
 |         return -1; | 
 |  | 
 |     if ( lpFrom && | 
 |          ws_sockaddr_u2ws( &unix_sockaddr.addr, lpFrom, lpFromlen ) != 0 ) | 
 |     { | 
 |         /* The from buffer was too small, but we read the data | 
 |          * anyway. Is that really bad? | 
 |          */ | 
 |     } | 
 |  | 
 |     return n; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WS2_async_recv          (INTERNAL) | 
 |  * | 
 |  * Handler for overlapped recv() operations. | 
 |  */ | 
 | static NTSTATUS WS2_async_recv( void* user, IO_STATUS_BLOCK* iosb, NTSTATUS status) | 
 | { | 
 |     ws2_async* wsa = user; | 
 |     int result = 0, fd; | 
 |  | 
 |     switch (status) | 
 |     { | 
 |     case STATUS_ALERTED: | 
 |         if ((status = wine_server_handle_to_fd( wsa->hSocket, FILE_READ_DATA, &fd, NULL ) )) | 
 |             break; | 
 |  | 
 |         result = WS2_recv( fd, wsa->iovec, wsa->n_iovecs, | 
 |                            wsa->addr, wsa->addrlen.ptr, &wsa->flags ); | 
 |         wine_server_release_fd( wsa->hSocket, fd ); | 
 |         if (result >= 0) | 
 |         { | 
 |             status = STATUS_SUCCESS; | 
 |             _enable_event( wsa->hSocket, FD_READ, 0, 0 ); | 
 |         } | 
 |         else | 
 |         { | 
 |             if (errno == EINTR || errno == EAGAIN) | 
 |             { | 
 |                 status = STATUS_PENDING; | 
 |                 _enable_event( wsa->hSocket, FD_READ, 0, 0 ); | 
 |             } | 
 |             else | 
 |             { | 
 |                 result = 0; | 
 |                 status = wsaErrno(); /* FIXME: is this correct ???? */ | 
 |             } | 
 |         } | 
 |         break; | 
 |     } | 
 |     if (status != STATUS_PENDING) | 
 |     { | 
 |         iosb->u.Status = status; | 
 |         iosb->Information = result; | 
 |     } | 
 |     return status; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WS2_send                (INTERNAL) | 
 |  * | 
 |  * Workhorse for both synchronous and asynchronous send() operations. | 
 |  */ | 
 | static int WS2_send( int fd, struct iovec* iov, int count, | 
 |                      const struct WS_sockaddr *to, INT tolen, DWORD dwFlags ) | 
 | { | 
 |     struct msghdr hdr; | 
 |     union generic_unix_sockaddr unix_addr; | 
 |  | 
 |  | 
 |     hdr.msg_name = NULL; | 
 |     hdr.msg_namelen = 0; | 
 |  | 
 |     if ( to ) | 
 |     { | 
 |         hdr.msg_name = &unix_addr; | 
 |         hdr.msg_namelen = ws_sockaddr_ws2u( to, tolen, &unix_addr ); | 
 |         if ( !hdr.msg_namelen ) | 
 |         { | 
 |             errno = EFAULT; | 
 |             return -1; | 
 |         } | 
 |  | 
 | #if defined(HAVE_IPX) && defined(SOL_IPX) | 
 |         if(to->sa_family == WS_AF_IPX) | 
 |         { | 
 |             struct sockaddr_ipx* uipx = (struct sockaddr_ipx*)hdr.msg_name; | 
 |             int val=0; | 
 |             unsigned int len=sizeof(int); | 
 |  | 
 |             /* The packet type is stored at the ipx socket level; At least the linux kernel seems | 
 |              *  to do something with it in case hdr.msg_name is NULL. Nonetheless can we use it to store | 
 |              *  the packet type and then we can retrieve it using getsockopt. After that we can set the | 
 |              *  ipx type in the sockaddr_opx structure with the stored value. | 
 |              */ | 
 |             if(getsockopt(fd, SOL_IPX, IPX_TYPE, &val, &len) != -1) | 
 |                 uipx->sipx_type = val; | 
 |         } | 
 | #endif | 
 |     } | 
 |  | 
 |     hdr.msg_iov = iov; | 
 |     hdr.msg_iovlen = count; | 
 | #ifdef HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS | 
 |     hdr.msg_accrights = NULL; | 
 |     hdr.msg_accrightslen = 0; | 
 | #else | 
 |     hdr.msg_control = NULL; | 
 |     hdr.msg_controllen = 0; | 
 |     hdr.msg_flags = 0; | 
 | #endif | 
 |  | 
 |     return sendmsg(fd, &hdr, dwFlags); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WS2_async_send          (INTERNAL) | 
 |  * | 
 |  * Handler for overlapped send() operations. | 
 |  */ | 
 | static NTSTATUS WS2_async_send(void* user, IO_STATUS_BLOCK* iosb, NTSTATUS status) | 
 | { | 
 |     ws2_async* wsa = user; | 
 |     int result = 0, fd; | 
 |  | 
 |     switch (status) | 
 |     { | 
 |     case STATUS_ALERTED: | 
 |         if ((status = wine_server_handle_to_fd( wsa->hSocket, FILE_WRITE_DATA, &fd, NULL ) )) | 
 |             break; | 
 |  | 
 |         /* check to see if the data is ready (non-blocking) */ | 
 |         result = WS2_send( fd, wsa->iovec, wsa->n_iovecs, wsa->addr, wsa->addrlen.val, wsa->flags ); | 
 |         wine_server_release_fd( wsa->hSocket, fd ); | 
 |  | 
 |         if (result >= 0) | 
 |         { | 
 |             status = STATUS_SUCCESS; | 
 |             _enable_event( wsa->hSocket, FD_WRITE, 0, 0 ); | 
 |         } | 
 |         else | 
 |         { | 
 |             if (errno == EINTR || errno == EAGAIN) | 
 |             { | 
 |                 status = STATUS_PENDING; | 
 |                 _enable_event( wsa->hSocket, FD_WRITE, 0, 0 ); | 
 |             } | 
 |             else | 
 |             { | 
 |                 /* We set the status to a winsock error code and check for that | 
 |                    later in NtStatusToWSAError () */ | 
 |                 status = wsaErrno(); | 
 |                 result = 0; | 
 |             } | 
 |         } | 
 |         break; | 
 |     } | 
 |     if (status != STATUS_PENDING) | 
 |     { | 
 |         iosb->u.Status = status; | 
 |         iosb->Information = result; | 
 |     } | 
 |     return status; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WS2_async_shutdown      (INTERNAL) | 
 |  * | 
 |  * Handler for shutdown() operations on overlapped sockets. | 
 |  */ | 
 | static NTSTATUS WS2_async_shutdown( void* user, PIO_STATUS_BLOCK iosb, NTSTATUS status ) | 
 | { | 
 |     ws2_async* wsa = user; | 
 |     int fd, err = 1; | 
 |  | 
 |     switch (status) | 
 |     { | 
 |     case STATUS_ALERTED: | 
 |         if ((status = wine_server_handle_to_fd( wsa->hSocket, 0, &fd, NULL ) )) | 
 |             break; | 
 |  | 
 |         switch ( wsa->type ) | 
 |         { | 
 |         case ASYNC_TYPE_READ:   err = shutdown( fd, 0 );  break; | 
 |         case ASYNC_TYPE_WRITE:  err = shutdown( fd, 1 );  break; | 
 |         } | 
 |         wine_server_release_fd( wsa->hSocket, fd ); | 
 |         status = err ? wsaErrno() : STATUS_SUCCESS; | 
 |         break; | 
 |     } | 
 |     iosb->u.Status = status; | 
 |     return status; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *  WS2_register_async_shutdown         (INTERNAL) | 
 |  * | 
 |  * Helper function for WS_shutdown() on overlapped sockets. | 
 |  */ | 
 | static int WS2_register_async_shutdown( SOCKET s, int type ) | 
 | { | 
 |     struct ws2_async *wsa; | 
 |     NTSTATUS status; | 
 |  | 
 |     TRACE("s %ld type %d\n", s, type); | 
 |  | 
 |     wsa = HeapAlloc( GetProcessHeap(), 0, sizeof(*wsa) ); | 
 |     if ( !wsa ) | 
 |         return WSAEFAULT; | 
 |  | 
 |     wsa->hSocket         = SOCKET2HANDLE(s); | 
 |     wsa->type            = type; | 
 |     wsa->completion_func = NULL; | 
 |  | 
 |     SERVER_START_REQ( register_async ) | 
 |     { | 
 |         req->handle = wsa->hSocket; | 
 |         req->type   = type; | 
 |         req->async.callback = WS2_async_shutdown; | 
 |         req->async.iosb     = &wsa->local_iosb; | 
 |         req->async.arg      = wsa; | 
 |         req->async.apc      = ws2_async_apc; | 
 |         status = wine_server_call( req ); | 
 |     } | 
 |     SERVER_END_REQ; | 
 |  | 
 |     if (status != STATUS_PENDING) | 
 |     { | 
 |         HeapFree( GetProcessHeap(), 0, wsa ); | 
 |         return NtStatusToWSAError( status ); | 
 |     } | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		accept		(WS2_32.1) | 
 |  */ | 
 | SOCKET WINAPI WS_accept(SOCKET s, struct WS_sockaddr *addr, | 
 |                                  int *addrlen32) | 
 | { | 
 |     SOCKET as; | 
 |     BOOL is_blocking; | 
 |  | 
 |     TRACE("socket %04lx\n", s ); | 
 |     is_blocking = _is_blocking(s); | 
 |  | 
 |     do { | 
 |         if (is_blocking) | 
 |         { | 
 |             int fd = get_sock_fd( s, FILE_READ_DATA, NULL ); | 
 |             if (fd == -1) return INVALID_SOCKET; | 
 |             /* block here */ | 
 |             do_block(fd, POLLIN, -1); | 
 |             _sync_sock_state(s); /* let wineserver notice connection */ | 
 |             release_sock_fd( s, fd ); | 
 |             /* retrieve any error codes from it */ | 
 |             SetLastError(_get_sock_error(s, FD_ACCEPT_BIT)); | 
 |             /* FIXME: care about the error? */ | 
 |         } | 
 |         SERVER_START_REQ( accept_socket ) | 
 |         { | 
 |             req->lhandle    = SOCKET2HANDLE(s); | 
 |             req->access     = GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE; | 
 |             req->attributes = OBJ_INHERIT; | 
 |             set_error( wine_server_call( req ) ); | 
 |             as = HANDLE2SOCKET( reply->handle ); | 
 |         } | 
 |         SERVER_END_REQ; | 
 |         if (as) | 
 |         { | 
 |             if (addr) WS_getpeername(as, addr, addrlen32); | 
 |             return as; | 
 |         } | 
 |     } while (is_blocking); | 
 |     return INVALID_SOCKET; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		bind			(WS2_32.2) | 
 |  */ | 
 | int WINAPI WS_bind(SOCKET s, const struct WS_sockaddr* name, int namelen) | 
 | { | 
 |     int fd = get_sock_fd( s, 0, NULL ); | 
 |     int res = SOCKET_ERROR; | 
 |  | 
 |     TRACE("socket %04lx, ptr %p %s, length %d\n", s, name, debugstr_sockaddr(name), namelen); | 
 |  | 
 |     if (fd != -1) | 
 |     { | 
 |         if (!name || (name->sa_family && !SUPPORTED_PF(name->sa_family))) | 
 |         { | 
 |             SetLastError(WSAEAFNOSUPPORT); | 
 |         } | 
 |         else | 
 |         { | 
 |             union generic_unix_sockaddr uaddr; | 
 |             unsigned int uaddrlen = ws_sockaddr_ws2u(name, namelen, &uaddr); | 
 |             if (!uaddrlen) | 
 |             { | 
 |                 SetLastError(WSAEFAULT); | 
 |             } | 
 |             else | 
 |             { | 
 |                 if (bind(fd, &uaddr.addr, uaddrlen) < 0) | 
 |                 { | 
 |                     int loc_errno = errno; | 
 |                     WARN("\tfailure - errno = %i\n", errno); | 
 |                     errno = loc_errno; | 
 |                     switch (errno) | 
 |                     { | 
 |                     case EBADF: | 
 |                         SetLastError(WSAENOTSOCK); | 
 |                         break; | 
 |                     case EADDRNOTAVAIL: | 
 |                         SetLastError(WSAEINVAL); | 
 |                         break; | 
 |                     default: | 
 |                         SetLastError(wsaErrno()); | 
 |                         break; | 
 |                     } | 
 |                 } | 
 |                 else | 
 |                 { | 
 |                     res=0; /* success */ | 
 |                 } | 
 |             } | 
 |         } | 
 |         release_sock_fd( s, fd ); | 
 |     } | 
 |     return res; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		closesocket		(WS2_32.3) | 
 |  */ | 
 | int WINAPI WS_closesocket(SOCKET s) | 
 | { | 
 |     TRACE("socket %04lx\n", s); | 
 |     if (CloseHandle(SOCKET2HANDLE(s))) return 0; | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		connect		(WS2_32.4) | 
 |  */ | 
 | int WINAPI WS_connect(SOCKET s, const struct WS_sockaddr* name, int namelen) | 
 | { | 
 |     int fd = get_sock_fd( s, FILE_READ_DATA, NULL ); | 
 |  | 
 |     TRACE("socket %04lx, ptr %p %s, length %d\n", s, name, debugstr_sockaddr(name), namelen); | 
 |  | 
 |     if (fd != -1) | 
 |     { | 
 |         union generic_unix_sockaddr uaddr; | 
 |         unsigned int uaddrlen = ws_sockaddr_ws2u(name, namelen, &uaddr); | 
 |  | 
 |         if (!uaddrlen) | 
 |         { | 
 |             SetLastError(WSAEFAULT); | 
 |         } | 
 |         else | 
 |         { | 
 |             if (connect(fd, &uaddr.addr, uaddrlen) == 0) | 
 |                 goto connect_success; | 
 |         } | 
 |  | 
 |         if (errno == EINPROGRESS) | 
 |         { | 
 |             /* tell wineserver that a connection is in progress */ | 
 |             _enable_event(SOCKET2HANDLE(s), FD_CONNECT|FD_READ|FD_WRITE, | 
 |                           FD_CONNECT|FD_READ|FD_WRITE, | 
 |                           FD_WINE_CONNECTED|FD_WINE_LISTENING); | 
 |             if (_is_blocking(s)) | 
 |             { | 
 |                 int result; | 
 |                 /* block here */ | 
 |                 do_block(fd, POLLIN | POLLOUT, -1); | 
 |                 _sync_sock_state(s); /* let wineserver notice connection */ | 
 |                 /* retrieve any error codes from it */ | 
 |                 result = _get_sock_error(s, FD_CONNECT_BIT); | 
 |                 if (result) | 
 |                     SetLastError(result); | 
 |                 else | 
 |                 { | 
 |                     goto connect_success; | 
 |                 } | 
 |             } | 
 |             else | 
 |             { | 
 |                 SetLastError(WSAEWOULDBLOCK); | 
 |             } | 
 |         } | 
 |         else | 
 |         { | 
 |             SetLastError(wsaErrno()); | 
 |         } | 
 |         release_sock_fd( s, fd ); | 
 |     } | 
 |     return SOCKET_ERROR; | 
 |  | 
 | connect_success: | 
 |     release_sock_fd( s, fd ); | 
 |     _enable_event(SOCKET2HANDLE(s), FD_CONNECT|FD_READ|FD_WRITE, | 
 |                   FD_WINE_CONNECTED|FD_READ|FD_WRITE, | 
 |                   FD_CONNECT|FD_WINE_LISTENING); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAConnect             (WS2_32.30) | 
 |  */ | 
 | int WINAPI WSAConnect( SOCKET s, const struct WS_sockaddr* name, int namelen, | 
 |                        LPWSABUF lpCallerData, LPWSABUF lpCalleeData, | 
 |                        LPQOS lpSQOS, LPQOS lpGQOS ) | 
 | { | 
 |     if ( lpCallerData || lpCalleeData || lpSQOS || lpGQOS ) | 
 |         FIXME("unsupported parameters!\n"); | 
 |     return WS_connect( s, name, namelen ); | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		getpeername		(WS2_32.5) | 
 |  */ | 
 | int WINAPI WS_getpeername(SOCKET s, struct WS_sockaddr *name, int *namelen) | 
 | { | 
 |     int fd; | 
 |     int res; | 
 |  | 
 |     TRACE("socket: %04lx, ptr %p, len %08x\n", s, name, *namelen); | 
 |  | 
 |     /* Check if what we've received is valid. Should we use IsBadReadPtr? */ | 
 |     if( (name == NULL) || (namelen == NULL) ) | 
 |     { | 
 |         SetLastError( WSAEFAULT ); | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     fd = get_sock_fd( s, 0, NULL ); | 
 |     res = SOCKET_ERROR; | 
 |  | 
 |     if (fd != -1) | 
 |     { | 
 |         union generic_unix_sockaddr uaddr; | 
 |         unsigned int uaddrlen = sizeof(uaddr); | 
 |  | 
 |         if (getpeername(fd, &uaddr.addr, &uaddrlen) != 0) | 
 |         { | 
 |             SetLastError(wsaErrno()); | 
 |         } | 
 |         else if (ws_sockaddr_u2ws(&uaddr.addr, name, namelen) != 0) | 
 |         { | 
 |             /* The buffer was too small */ | 
 |             SetLastError(WSAEFAULT); | 
 |         } | 
 |         else | 
 |         { | 
 |             res=0; | 
 |         } | 
 |         release_sock_fd( s, fd ); | 
 |     } | 
 |     return res; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		getsockname		(WS2_32.6) | 
 |  */ | 
 | int WINAPI WS_getsockname(SOCKET s, struct WS_sockaddr *name, int *namelen) | 
 | { | 
 |     int fd; | 
 |     int res; | 
 |  | 
 |     TRACE("socket: %04lx, ptr %p, len %8x\n", s, name, *namelen); | 
 |  | 
 |     /* Check if what we've received is valid. Should we use IsBadReadPtr? */ | 
 |     if( (name == NULL) || (namelen == NULL) ) | 
 |     { | 
 |         SetLastError( WSAEFAULT ); | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     fd = get_sock_fd( s, 0, NULL ); | 
 |     res = SOCKET_ERROR; | 
 |  | 
 |     if (fd != -1) | 
 |     { | 
 |         union generic_unix_sockaddr uaddr; | 
 |         unsigned int uaddrlen = sizeof(uaddr); | 
 |  | 
 |         if (getsockname(fd, &uaddr.addr, &uaddrlen) != 0) | 
 |         { | 
 |             SetLastError(wsaErrno()); | 
 |         } | 
 |         else if (!is_sockaddr_bound(&uaddr.addr, uaddrlen)) | 
 |         { | 
 |             SetLastError(WSAEINVAL); | 
 |         } | 
 |         else if (ws_sockaddr_u2ws(&uaddr.addr, name, namelen) != 0) | 
 |         { | 
 |             /* The buffer was too small */ | 
 |             SetLastError(WSAEFAULT); | 
 |         } | 
 |         else | 
 |         { | 
 |             res=0; | 
 |         } | 
 |         release_sock_fd( s, fd ); | 
 |     } | 
 |     return res; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		getsockopt		(WS2_32.7) | 
 |  */ | 
 | INT WINAPI WS_getsockopt(SOCKET s, INT level, | 
 |                                   INT optname, char *optval, INT *optlen) | 
 | { | 
 |     int fd; | 
 |     INT ret = 0; | 
 |  | 
 |     TRACE("socket: %04lx, level 0x%x, name 0x%x, ptr %p, len %d\n", | 
 |           s, level, optname, optval, *optlen); | 
 |  | 
 |     switch(level) | 
 |     { | 
 |     case WS_SOL_SOCKET: | 
 |     { | 
 |         switch(optname) | 
 |         { | 
 |         /* Handle common cases. The special cases are below, sorted | 
 |          * alphabetically */ | 
 |         case WS_SO_ACCEPTCONN: | 
 |         case WS_SO_BROADCAST: | 
 |         case WS_SO_DEBUG: | 
 |         case WS_SO_ERROR: | 
 |         case WS_SO_KEEPALIVE: | 
 |         case WS_SO_OOBINLINE: | 
 |         case WS_SO_RCVBUF: | 
 |         case WS_SO_SNDBUF: | 
 |         case WS_SO_TYPE: | 
 |             if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
 |                 return SOCKET_ERROR; | 
 |             convert_sockopt(&level, &optname); | 
 |             if (getsockopt(fd,(int) level, optname, optval, | 
 |                         (unsigned int *)optlen) != 0 ) | 
 |             { | 
 |                 SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
 |                 ret = SOCKET_ERROR; | 
 |             } | 
 |             release_sock_fd( s, fd ); | 
 |             return ret; | 
 |  | 
 |         case WS_SO_DONTLINGER: | 
 |         { | 
 |             struct linger lingval; | 
 |             unsigned int len = sizeof(struct linger); | 
 |  | 
 |             if (!optlen || *optlen < sizeof(BOOL)|| !optval) | 
 |             { | 
 |                 SetLastError(WSAEFAULT); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |             if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
 |                 return SOCKET_ERROR; | 
 |  | 
 |             if (getsockopt(fd, SOL_SOCKET, SO_LINGER, &lingval, &len) != 0 ) | 
 |             { | 
 |                 SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
 |                 ret = SOCKET_ERROR; | 
 |             } | 
 |             else | 
 |             { | 
 |                 *(BOOL *)optval = (lingval.l_onoff) ? FALSE : TRUE; | 
 |                 *optlen = sizeof(BOOL); | 
 |             } | 
 |  | 
 |             release_sock_fd( s, fd ); | 
 |             return ret; | 
 |         } | 
 |  | 
 |         /* As mentioned in setsockopt, Windows ignores this, so we | 
 |          * always return true here */ | 
 |         case WS_SO_DONTROUTE: | 
 |             if (!optlen || *optlen < sizeof(BOOL) || !optval) | 
 |             { | 
 |                 SetLastError(WSAEFAULT); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |             *(BOOL *)optval = TRUE; | 
 |             *optlen = sizeof(BOOL); | 
 |             return 0; | 
 |  | 
 |         case WS_SO_LINGER: | 
 |         { | 
 |             struct linger lingval; | 
 |             unsigned int len = sizeof(struct linger); | 
 |  | 
 |             /* struct linger and LINGER have different sizes */ | 
 |             if (!optlen || *optlen < sizeof(LINGER) || !optval) | 
 |             { | 
 |                 SetLastError(WSAEFAULT); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |             if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
 |                 return SOCKET_ERROR; | 
 |  | 
 |             if (getsockopt(fd, SOL_SOCKET, SO_LINGER, &lingval, &len) != 0 ) | 
 |             { | 
 |                 SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
 |                 ret = SOCKET_ERROR; | 
 |             } | 
 |             else | 
 |             { | 
 |                 ((LINGER *)optval)->l_onoff = lingval.l_onoff; | 
 |                 ((LINGER *)optval)->l_linger = lingval.l_linger; | 
 |                 *optlen = sizeof(struct linger); | 
 |             } | 
 |  | 
 |             release_sock_fd( s, fd ); | 
 |             return ret; | 
 |         } | 
 |  | 
 |         case WS_SO_MAX_MSG_SIZE: | 
 |             if (!optlen || *optlen < sizeof(int) || !optval) | 
 |             { | 
 |                 SetLastError(WSAEFAULT); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |             TRACE("getting global SO_MAX_MSG_SIZE = 65507\n"); | 
 |             *(int *)optval = 65507; | 
 |             *optlen = sizeof(int); | 
 |             return 0; | 
 |  | 
 |         /* SO_OPENTYPE does not require a valid socket handle. */ | 
 |         case WS_SO_OPENTYPE: | 
 |             if (!optlen || *optlen < sizeof(int) || !optval) | 
 |             { | 
 |                 SetLastError(WSAEFAULT); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |             *(int *)optval = get_per_thread_data()->opentype; | 
 |             *optlen = sizeof(int); | 
 |             TRACE("getting global SO_OPENTYPE = 0x%x\n", *((int*)optval) ); | 
 |             return 0; | 
 |  | 
 | #ifdef SO_RCVTIMEO | 
 |         case WS_SO_RCVTIMEO: | 
 | #endif | 
 | #ifdef SO_SNDTIMEO | 
 |         case WS_SO_SNDTIMEO: | 
 | #endif | 
 | #if defined(SO_RCVTIMEO) || defined(SO_SNDTIMEO) | 
 |         { | 
 |             struct timeval tv; | 
 |             unsigned int len = sizeof(struct timeval); | 
 |  | 
 |             if (!optlen || *optlen < sizeof(int)|| !optval) | 
 |             { | 
 |                 SetLastError(WSAEFAULT); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |             if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
 |                 return SOCKET_ERROR; | 
 |  | 
 |             convert_sockopt(&level, &optname); | 
 |             if (getsockopt(fd,(int) level, optname, &tv, &len) != 0 ) | 
 |             { | 
 |                 SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
 |                 ret = SOCKET_ERROR; | 
 |             } | 
 |             else | 
 |             { | 
 |                 *(int *)optval = tv.tv_sec * 1000 + tv.tv_usec / 1000; | 
 |                 *optlen = sizeof(int); | 
 |             } | 
 |  | 
 |             release_sock_fd( s, fd ); | 
 |             return ret; | 
 |         } | 
 | #endif | 
 |         /* As mentioned in setsockopt, the windows style SO_REUSEADDR is | 
 |          * not possible in Unix, so always return false here. */ | 
 |         case WS_SO_REUSEADDR: | 
 |             if (!optlen || *optlen < sizeof(int) || !optval) | 
 |             { | 
 |                 SetLastError(WSAEFAULT); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |             *(int *)optval = 0; | 
 |             *optlen = sizeof(int); | 
 |             return 0; | 
 |  | 
 |         default: | 
 |             TRACE("Unknown SOL_SOCKET optname: 0x%08x\n", optname); | 
 |             SetLastError(WSAENOPROTOOPT); | 
 |             return SOCKET_ERROR; | 
 |         } /* end switch(optname) */ | 
 |     }/* end case WS_SOL_SOCKET */ | 
 | #ifdef HAVE_IPX | 
 |     case NSPROTO_IPX: | 
 |     { | 
 |         struct WS_sockaddr_ipx addr; | 
 |         IPX_ADDRESS_DATA *data; | 
 |         int namelen; | 
 |         switch(optname) | 
 |         { | 
 |         case IPX_PTYPE: | 
 |             if ((fd = get_sock_fd( s, 0, NULL )) == -1) return SOCKET_ERROR; | 
 | #ifdef SOL_IPX | 
 |             if(getsockopt(fd, SOL_IPX, IPX_TYPE, optval, (unsigned int*)optlen) == -1) | 
 |             { | 
 |                 ret = SOCKET_ERROR; | 
 |             } | 
 | #else | 
 |             { | 
 |                 struct ipx val; | 
 |                 socklen_t len=sizeof(struct ipx); | 
 |                 if(getsockopt(fd, 0, SO_DEFAULT_HEADERS, &val, &len) == -1 ) | 
 |                     ret = SOCKET_ERROR; | 
 |                 else | 
 |                     *optval = (int)val.ipx_pt; | 
 |             } | 
 | #endif | 
 |             TRACE("ptype: %d (fd: %d)\n", *(int*)optval, fd); | 
 |             release_sock_fd( s, fd ); | 
 |             return ret; | 
 |  | 
 |         case IPX_ADDRESS: | 
 |             /* | 
 |             *  On a Win2000 system with one network card there are usually | 
 |             *  three ipx devices one with a speed of 28.8kbps, 10Mbps and 100Mbps. | 
 |             *  Using this call you can then retrieve info about this all. | 
 |             *  In case of Linux it is a bit different. Usually you have | 
 |             *  only "one" device active and further it is not possible to | 
 |             *  query things like the linkspeed. | 
 |             */ | 
 |             FIXME("IPX_ADDRESS\n"); | 
 |             namelen = sizeof(struct WS_sockaddr_ipx); | 
 |             memset(&addr, 0, sizeof(struct WS_sockaddr_ipx)); | 
 |             WS_getsockname(s, (struct WS_sockaddr*)&addr, &namelen); | 
 |  | 
 |             data = (IPX_ADDRESS_DATA*)optval; | 
 |                     memcpy(data->nodenum,&addr.sa_nodenum,sizeof(data->nodenum)); | 
 |                     memcpy(data->netnum,&addr.sa_netnum,sizeof(data->netnum)); | 
 |             data->adapternum = 0; | 
 |             data->wan = FALSE; /* We are not on a wan for now .. */ | 
 |             data->status = FALSE; /* Since we are not on a wan, the wan link isn't up */ | 
 |             data->maxpkt = 1467; /* This value is the default one, at least on Win2k/WinXP */ | 
 |             data->linkspeed = 100000; /* Set the line speed in 100bit/s to 10 Mbit; | 
 |                                        * note 1MB = 1000kB in this case */ | 
 |             return 0; | 
 |  | 
 |         case IPX_MAX_ADAPTER_NUM: | 
 |             FIXME("IPX_MAX_ADAPTER_NUM\n"); | 
 |             *(int*)optval = 1; /* As noted under IPX_ADDRESS we have just one card. */ | 
 |             return 0; | 
 |  | 
 |         default: | 
 |             FIXME("IPX optname:%x\n", optname); | 
 |             return SOCKET_ERROR; | 
 |         }/* end switch(optname) */ | 
 |     } /* end case NSPROTO_IPX */ | 
 | #endif | 
 |     /* Levels WS_IPPROTO_TCP and WS_IPPROTO_IP convert directly */ | 
 |     case WS_IPPROTO_TCP: | 
 |         switch(optname) | 
 |         { | 
 |         case WS_TCP_NODELAY: | 
 |             if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
 |                 return SOCKET_ERROR; | 
 |             convert_sockopt(&level, &optname); | 
 |             if (getsockopt(fd,(int) level, optname, optval, | 
 |                         (unsigned int *)optlen) != 0 ) | 
 |             { | 
 |                 SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
 |                 ret = SOCKET_ERROR; | 
 |             } | 
 |             release_sock_fd( s, fd ); | 
 |             return ret; | 
 |         } | 
 |         FIXME("Unknown IPPROTO_TCP optname 0x%08x\n", optname); | 
 |         return SOCKET_ERROR; | 
 |  | 
 |     case WS_IPPROTO_IP: | 
 |         switch(optname) | 
 |         { | 
 |         case WS_IP_ADD_MEMBERSHIP: | 
 |         case WS_IP_DROP_MEMBERSHIP: | 
 | #ifdef IP_HDRINCL | 
 |         case WS_IP_HDRINCL: | 
 | #endif | 
 |         case WS_IP_MULTICAST_IF: | 
 |         case WS_IP_MULTICAST_LOOP: | 
 |         case WS_IP_MULTICAST_TTL: | 
 |         case WS_IP_OPTIONS: | 
 |         case WS_IP_TOS: | 
 |         case WS_IP_TTL: | 
 |             if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
 |                 return SOCKET_ERROR; | 
 |             convert_sockopt(&level, &optname); | 
 |             if (getsockopt(fd,(int) level, optname, optval, | 
 |                         (unsigned int *)optlen) != 0 ) | 
 |             { | 
 |                 SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
 |                 ret = SOCKET_ERROR; | 
 |             } | 
 |             release_sock_fd( s, fd ); | 
 |             return ret; | 
 |         } | 
 |         FIXME("Unknown IPPROTO_IP optname 0x%08x\n", optname); | 
 |         return SOCKET_ERROR; | 
 |  | 
 |     default: | 
 |         FIXME("Unknown level: 0x%08x\n", level); | 
 |         return SOCKET_ERROR; | 
 |     } /* end switch(level) */ | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		htonl			(WINSOCK.8) | 
 |  *		htonl			(WS2_32.8) | 
 |  */ | 
 | WS_u_long WINAPI WS_htonl(WS_u_long hostlong) | 
 | { | 
 |     return htonl(hostlong); | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		htons			(WINSOCK.9) | 
 |  *		htons			(WS2_32.9) | 
 |  */ | 
 | WS_u_short WINAPI WS_htons(WS_u_short hostshort) | 
 | { | 
 |     return htons(hostshort); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		WSAHtonl		(WS2_32.46) | 
 |  *  From MSDN decription of error codes, this function should also | 
 |  *  check if WinSock has been initialized and the socket is a valid | 
 |  *  socket. But why? This function only translates a host byte order | 
 |  *  u_long into a network byte order u_long... | 
 |  */ | 
 | int WINAPI WSAHtonl(SOCKET s, WS_u_long hostlong, WS_u_long *lpnetlong) | 
 | { | 
 |     if (lpnetlong) | 
 |     { | 
 |         *lpnetlong = htonl(hostlong); | 
 |         return 0; | 
 |     } | 
 |     WSASetLastError(WSAEFAULT); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		WSAHtons		(WS2_32.47) | 
 |  *  From MSDN decription of error codes, this function should also | 
 |  *  check if WinSock has been initialized and the socket is a valid | 
 |  *  socket. But why? This function only translates a host byte order | 
 |  *  u_short into a network byte order u_short... | 
 |  */ | 
 | int WINAPI WSAHtons(SOCKET s, WS_u_short hostshort, WS_u_short *lpnetshort) | 
 | { | 
 |  | 
 |     if (lpnetshort) | 
 |     { | 
 |         *lpnetshort = htons(hostshort); | 
 |         return 0; | 
 |     } | 
 |     WSASetLastError(WSAEFAULT); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		inet_addr		(WINSOCK.10) | 
 |  *		inet_addr		(WS2_32.11) | 
 |  */ | 
 | WS_u_long WINAPI WS_inet_addr(const char *cp) | 
 | { | 
 |     if (!cp) return INADDR_NONE; | 
 |     return inet_addr(cp); | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		ntohl			(WINSOCK.14) | 
 |  *		ntohl			(WS2_32.14) | 
 |  */ | 
 | WS_u_long WINAPI WS_ntohl(WS_u_long netlong) | 
 | { | 
 |     return ntohl(netlong); | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		ntohs			(WINSOCK.15) | 
 |  *		ntohs			(WS2_32.15) | 
 |  */ | 
 | WS_u_short WINAPI WS_ntohs(WS_u_short netshort) | 
 | { | 
 |     return ntohs(netshort); | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		inet_ntoa		(WS2_32.12) | 
 |  */ | 
 | char* WINAPI WS_inet_ntoa(struct WS_in_addr in) | 
 | { | 
 |   /* use "buffer for dummies" here because some applications have a | 
 |    * propensity to decode addresses in ws_hostent structure without | 
 |    * saving them first... | 
 |    */ | 
 |     static char dbuffer[16]; /* Yes, 16: 4*3 digits + 3 '.' + 1 '\0' */ | 
 |  | 
 |     char* s = inet_ntoa(*((struct in_addr*)&in)); | 
 |     if( s ) | 
 |     { | 
 |         strcpy(dbuffer, s); | 
 |         return dbuffer; | 
 |     } | 
 |     SetLastError(wsaErrno()); | 
 |     return NULL; | 
 | } | 
 |  | 
 | /********************************************************************** | 
 |  *              WSAIoctl                (WS2_32.50) | 
 |  * | 
 |  */ | 
 | INT WINAPI WSAIoctl(SOCKET s, | 
 |                     DWORD   dwIoControlCode, | 
 |                     LPVOID  lpvInBuffer, | 
 |                     DWORD   cbInBuffer, | 
 |                     LPVOID  lpbOutBuffer, | 
 |                     DWORD   cbOutBuffer, | 
 |                     LPDWORD lpcbBytesReturned, | 
 |                     LPWSAOVERLAPPED lpOverlapped, | 
 |                     LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine) | 
 | { | 
 |    TRACE("%ld, 0x%08x, %p, %d, %p, %d, %p, %p, %p\n", | 
 |        s, dwIoControlCode, lpvInBuffer, cbInBuffer, lpbOutBuffer, | 
 |        cbOutBuffer, lpcbBytesReturned, lpOverlapped, lpCompletionRoutine); | 
 |  | 
 |    switch( dwIoControlCode ) | 
 |    { | 
 |    case WS_FIONBIO: | 
 |         if (cbInBuffer != sizeof(WS_u_long)) { | 
 |             WSASetLastError(WSAEFAULT); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |         return WS_ioctlsocket( s, WS_FIONBIO, lpvInBuffer); | 
 |  | 
 |    case WS_FIONREAD: | 
 |         if (cbOutBuffer != sizeof(WS_u_long)) { | 
 |             WSASetLastError(WSAEFAULT); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |         return WS_ioctlsocket( s, WS_FIONREAD, lpbOutBuffer); | 
 |  | 
 |    case WS_SIO_GET_INTERFACE_LIST: | 
 |        { | 
 |            INTERFACE_INFO* intArray = (INTERFACE_INFO*)lpbOutBuffer; | 
 |            DWORD size, numInt, apiReturn; | 
 |            int fd; | 
 |  | 
 |            TRACE("-> SIO_GET_INTERFACE_LIST request\n"); | 
 |  | 
 |            if (!lpbOutBuffer) | 
 |            { | 
 |                WSASetLastError(WSAEFAULT); | 
 |                return SOCKET_ERROR; | 
 |            } | 
 |            if (!lpcbBytesReturned) | 
 |            { | 
 |                WSASetLastError(WSAEFAULT); | 
 |                return SOCKET_ERROR; | 
 |            } | 
 |  | 
 |            fd = get_sock_fd( s, 0, NULL ); | 
 |            if (fd == -1) return SOCKET_ERROR; | 
 |  | 
 |            apiReturn = GetAdaptersInfo(NULL, &size); | 
 |            if (apiReturn == ERROR_NO_DATA) | 
 |            { | 
 |                numInt = 0; | 
 |            } | 
 |            else if (apiReturn == ERROR_BUFFER_OVERFLOW) | 
 |            { | 
 |                PIP_ADAPTER_INFO table = HeapAlloc(GetProcessHeap(),0,size); | 
 |  | 
 |                if (table) | 
 |                { | 
 |                   if (GetAdaptersInfo(table, &size) == NO_ERROR) | 
 |                   { | 
 |                      PIP_ADAPTER_INFO ptr; | 
 |  | 
 |                      if (size*sizeof(INTERFACE_INFO)/sizeof(IP_ADAPTER_INFO) > cbOutBuffer) | 
 |                      { | 
 |                         WARN("Buffer too small = %u, cbOutBuffer = %u\n", size, cbOutBuffer); | 
 |                         HeapFree(GetProcessHeap(),0,table); | 
 |                         release_sock_fd( s, fd ); | 
 |                         WSASetLastError(WSAEFAULT); | 
 |                         return SOCKET_ERROR; | 
 |                      } | 
 |                      for (ptr = table, numInt = 0; ptr; | 
 |                       ptr = ptr->Next, intArray++, numInt++) | 
 |                      { | 
 |                         unsigned int addr, mask, bcast; | 
 |                         struct ifreq ifInfo; | 
 |  | 
 |                         /* Socket Status Flags */ | 
 |                         lstrcpynA(ifInfo.ifr_name, ptr->AdapterName, IFNAMSIZ); | 
 |                         if (ioctl(fd, SIOCGIFFLAGS, &ifInfo) < 0) | 
 |                         { | 
 |                            ERR("Error obtaining status flags for socket!\n"); | 
 |                            HeapFree(GetProcessHeap(),0,table); | 
 |                            release_sock_fd( s, fd ); | 
 |                            WSASetLastError(WSAEINVAL); | 
 |                            return SOCKET_ERROR; | 
 |                         } | 
 |                         else | 
 |                         { | 
 |                            /* set flags; the values of IFF_* are not the same | 
 |                               under Linux and Windows, therefore must generate | 
 |                               new flags */ | 
 |                            intArray->iiFlags = 0; | 
 |                            if (ifInfo.ifr_flags & IFF_BROADCAST) | 
 |                               intArray->iiFlags |= WS_IFF_BROADCAST; | 
 | #ifdef IFF_POINTOPOINT | 
 |                            if (ifInfo.ifr_flags & IFF_POINTOPOINT) | 
 |                               intArray->iiFlags |= WS_IFF_POINTTOPOINT; | 
 | #endif | 
 |                            if (ifInfo.ifr_flags & IFF_LOOPBACK) | 
 |                               intArray->iiFlags |= WS_IFF_LOOPBACK; | 
 |                            if (ifInfo.ifr_flags & IFF_UP) | 
 |                               intArray->iiFlags |= WS_IFF_UP; | 
 |                            if (ifInfo.ifr_flags & IFF_MULTICAST) | 
 |                               intArray->iiFlags |= WS_IFF_MULTICAST; | 
 |                         } | 
 |  | 
 |                         addr = inet_addr(ptr->IpAddressList.IpAddress.String); | 
 |                         mask = inet_addr(ptr->IpAddressList.IpMask.String); | 
 |                         bcast = addr | (addr & !mask); | 
 |                         intArray->iiAddress.AddressIn.sin_family = AF_INET; | 
 |                         intArray->iiAddress.AddressIn.sin_port = 0; | 
 |                         intArray->iiAddress.AddressIn.sin_addr.WS_s_addr = | 
 |                          addr; | 
 |                         intArray->iiNetmask.AddressIn.sin_family = AF_INET; | 
 |                         intArray->iiNetmask.AddressIn.sin_port = 0; | 
 |                         intArray->iiNetmask.AddressIn.sin_addr.WS_s_addr = | 
 |                          mask; | 
 |                         intArray->iiBroadcastAddress.AddressIn.sin_family = | 
 |                          AF_INET; | 
 |                         intArray->iiBroadcastAddress.AddressIn.sin_port = 0; | 
 |                         intArray->iiBroadcastAddress.AddressIn.sin_addr. | 
 |                          WS_s_addr = bcast; | 
 |                      } | 
 |                   } | 
 |                   else | 
 |                   { | 
 |                      ERR("Unable to get interface table!\n"); | 
 |                      release_sock_fd( s, fd ); | 
 |                      HeapFree(GetProcessHeap(),0,table); | 
 |                      WSASetLastError(WSAEINVAL); | 
 |                      return SOCKET_ERROR; | 
 |                   } | 
 |                   HeapFree(GetProcessHeap(),0,table); | 
 |                } | 
 |                else | 
 |                { | 
 |                   release_sock_fd( s, fd ); | 
 |                   WSASetLastError(WSAEINVAL); | 
 |                   return SOCKET_ERROR; | 
 |                } | 
 |            } | 
 |            else | 
 |            { | 
 |                ERR("Unable to get interface table!\n"); | 
 |                release_sock_fd( s, fd ); | 
 |                WSASetLastError(WSAEINVAL); | 
 |                return SOCKET_ERROR; | 
 |            } | 
 |            /* Calculate the size of the array being returned */ | 
 |            *lpcbBytesReturned = sizeof(INTERFACE_INFO) * numInt; | 
 |            release_sock_fd( s, fd ); | 
 |            break; | 
 |        } | 
 |  | 
 |    case WS_SIO_ADDRESS_LIST_CHANGE: | 
 |        FIXME("-> SIO_ADDRESS_LIST_CHANGE request: stub\n"); | 
 |        /* FIXME: error and return code depend on whether socket was created | 
 |         * with WSA_FLAG_OVERLAPPED, but there is no easy way to get this */ | 
 |        break; | 
 |  | 
 |    case WS_SIO_ADDRESS_LIST_QUERY: | 
 |    { | 
 |         DWORD size; | 
 |  | 
 |         TRACE("-> SIO_ADDRESS_LIST_QUERY request\n"); | 
 |  | 
 |         if (!lpcbBytesReturned) | 
 |         { | 
 |             WSASetLastError(WSAEFAULT); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |  | 
 |         if (GetAdaptersInfo(NULL, &size) == ERROR_BUFFER_OVERFLOW) | 
 |         { | 
 |             IP_ADAPTER_INFO *p, *table = HeapAlloc(GetProcessHeap(), 0, size); | 
 |             DWORD need, num; | 
 |  | 
 |             if (!table || GetAdaptersInfo(table, &size)) | 
 |             { | 
 |                 HeapFree(GetProcessHeap(), 0, table); | 
 |                 WSASetLastError(WSAEINVAL); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |  | 
 |             for (p = table, num = 0; p; p = p->Next) | 
 |                 if (p->IpAddressList.IpAddress.String[0]) num++; | 
 |  | 
 |             need = sizeof(SOCKET_ADDRESS_LIST) + sizeof(SOCKET_ADDRESS) * (num - 1); | 
 |             need += sizeof(SOCKADDR) * num; | 
 |             *lpcbBytesReturned = need; | 
 |  | 
 |             if (need > cbOutBuffer) | 
 |             { | 
 |                 HeapFree(GetProcessHeap(), 0, table); | 
 |                 WSASetLastError(WSAEFAULT); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |  | 
 |             if (lpbOutBuffer) | 
 |             { | 
 |                 unsigned int i; | 
 |                 SOCKET_ADDRESS *sa; | 
 |                 SOCKET_ADDRESS_LIST *sa_list = (SOCKET_ADDRESS_LIST *)lpbOutBuffer; | 
 |                 SOCKADDR_IN *sockaddr; | 
 |  | 
 |                 sa = sa_list->Address; | 
 |                 sockaddr = (SOCKADDR_IN *)((char *)sa + num * sizeof(SOCKET_ADDRESS)); | 
 |                 sa_list->iAddressCount = num; | 
 |  | 
 |                 for (p = table, i = 0; p; p = p->Next) | 
 |                 { | 
 |                     if (!p->IpAddressList.IpAddress.String[0]) continue; | 
 |  | 
 |                     sa[i].lpSockaddr = (SOCKADDR *)&sockaddr[i]; | 
 |                     sa[i].iSockaddrLength = sizeof(SOCKADDR); | 
 |  | 
 |                     sockaddr[i].sin_family = AF_INET; | 
 |                     sockaddr[i].sin_port = 0; | 
 |                     sockaddr[i].sin_addr.WS_s_addr = inet_addr(p->IpAddressList.IpAddress.String); | 
 |                     i++; | 
 |                 } | 
 |             } | 
 |  | 
 |             HeapFree(GetProcessHeap(), 0, table); | 
 |             return 0; | 
 |         } | 
 |         else | 
 |         { | 
 |             WARN("unable to get IP address list\n"); | 
 |             WSASetLastError(WSAEINVAL); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |    } | 
 |    case WS_SIO_FLUSH: | 
 | 	FIXME("SIO_FLUSH: stub.\n"); | 
 | 	break; | 
 |  | 
 |    default: | 
 |        FIXME("unsupported WS_IOCTL cmd (%08x)\n", dwIoControlCode); | 
 |        WSASetLastError(WSAEOPNOTSUPP); | 
 |        return SOCKET_ERROR; | 
 |    } | 
 |  | 
 |    return 0; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		ioctlsocket		(WS2_32.10) | 
 |  */ | 
 | int WINAPI WS_ioctlsocket(SOCKET s, LONG cmd, WS_u_long *argp) | 
 | { | 
 |     int fd; | 
 |     long newcmd  = cmd; | 
 |  | 
 |     TRACE("socket %04lx, cmd %08x, ptr %p\n", s, cmd, argp); | 
 |  | 
 |     switch( cmd ) | 
 |     { | 
 |     case WS_FIONREAD: | 
 |         newcmd=FIONREAD; | 
 |         break; | 
 |  | 
 |     case WS_FIONBIO: | 
 |         if( _get_sock_mask(s) ) | 
 |         { | 
 |             /* AsyncSelect()'ed sockets are always nonblocking */ | 
 |             if (*argp) return 0; | 
 |             SetLastError(WSAEINVAL); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |         fd = get_sock_fd( s, 0, NULL ); | 
 |         if (fd != -1) | 
 |         { | 
 |             int ret; | 
 |             if (*argp) | 
 |             { | 
 |                 _enable_event(SOCKET2HANDLE(s), 0, FD_WINE_NONBLOCKING, 0); | 
 |                 ret = fcntl( fd, F_SETFL, O_NONBLOCK ); | 
 |             } | 
 |             else | 
 |             { | 
 |                 _enable_event(SOCKET2HANDLE(s), 0, 0, FD_WINE_NONBLOCKING); | 
 |                 ret = fcntl( fd, F_SETFL, 0 ); | 
 |             } | 
 |             release_sock_fd( s, fd ); | 
 |             if (!ret) return 0; | 
 |             SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
 |         } | 
 |         return SOCKET_ERROR; | 
 |  | 
 |     case WS_SIOCATMARK: | 
 |         newcmd=SIOCATMARK; | 
 |         break; | 
 |  | 
 |     case WS_FIOASYNC: | 
 |         WARN("Warning: WS1.1 shouldn't be using async I/O\n"); | 
 |         SetLastError(WSAEINVAL); | 
 |         return SOCKET_ERROR; | 
 |  | 
 |     case SIOCGIFBRDADDR: | 
 |     case SIOCGIFNETMASK: | 
 |     case SIOCGIFADDR: | 
 |         /* These don't need any special handling.  They are used by | 
 |            WsControl, and are here to suppress an unnecessary warning. */ | 
 |         break; | 
 |  | 
 |     default: | 
 |         /* Netscape tries hard to use bogus ioctl 0x667e */ | 
 |         /* FIXME: 0x667e above is ('f' << 8) | 126, and is a low word of | 
 |          * FIONBIO (_IOW('f', 126, u_long)), how that should be handled? | 
 |          */ | 
 |         WARN("\tunknown WS_IOCTL cmd (%08x)\n", cmd); | 
 |         break; | 
 |     } | 
 |  | 
 |     fd = get_sock_fd( s, 0, NULL ); | 
 |     if (fd != -1) | 
 |     { | 
 |         if( ioctl(fd, newcmd, (char*)argp ) == 0 ) | 
 |         { | 
 |             release_sock_fd( s, fd ); | 
 |             return 0; | 
 |         } | 
 |         SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
 |         release_sock_fd( s, fd ); | 
 |     } | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		listen		(WS2_32.13) | 
 |  */ | 
 | int WINAPI WS_listen(SOCKET s, int backlog) | 
 | { | 
 |     int fd = get_sock_fd( s, FILE_READ_DATA, NULL ); | 
 |  | 
 |     TRACE("socket %04lx, backlog %d\n", s, backlog); | 
 |     if (fd != -1) | 
 |     { | 
 | 	if (listen(fd, backlog) == 0) | 
 | 	{ | 
 |             release_sock_fd( s, fd ); | 
 | 	    _enable_event(SOCKET2HANDLE(s), FD_ACCEPT, | 
 | 			  FD_WINE_LISTENING, | 
 | 			  FD_CONNECT|FD_WINE_CONNECTED); | 
 | 	    return 0; | 
 | 	} | 
 | 	SetLastError(wsaErrno()); | 
 |         release_sock_fd( s, fd ); | 
 |     } | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		recv			(WS2_32.16) | 
 |  */ | 
 | int WINAPI WS_recv(SOCKET s, char *buf, int len, int flags) | 
 | { | 
 |     DWORD n, dwFlags = flags; | 
 |     WSABUF wsabuf; | 
 |  | 
 |     wsabuf.len = len; | 
 |     wsabuf.buf = buf; | 
 |  | 
 |     if ( WSARecvFrom(s, &wsabuf, 1, &n, &dwFlags, NULL, NULL, NULL, NULL) == SOCKET_ERROR ) | 
 |         return SOCKET_ERROR; | 
 |     else | 
 |         return n; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		recvfrom		(WS2_32.17) | 
 |  */ | 
 | int WINAPI WS_recvfrom(SOCKET s, char *buf, INT len, int flags, | 
 |                        struct WS_sockaddr *from, int *fromlen) | 
 | { | 
 |     DWORD n, dwFlags = flags; | 
 |     WSABUF wsabuf; | 
 |  | 
 |     wsabuf.len = len; | 
 |     wsabuf.buf = buf; | 
 |  | 
 |     if ( WSARecvFrom(s, &wsabuf, 1, &n, &dwFlags, from, fromlen, NULL, NULL) == SOCKET_ERROR ) | 
 |         return SOCKET_ERROR; | 
 |     else | 
 |         return n; | 
 | } | 
 |  | 
 | /* allocate a poll array for the corresponding fd sets */ | 
 | static struct pollfd *fd_sets_to_poll( const WS_fd_set *readfds, const WS_fd_set *writefds, | 
 |                                        const WS_fd_set *exceptfds, int *count_ptr ) | 
 | { | 
 |     int i, j = 0, count = 0; | 
 |     struct pollfd *fds; | 
 |  | 
 |     if (readfds) count += readfds->fd_count; | 
 |     if (writefds) count += writefds->fd_count; | 
 |     if (exceptfds) count += exceptfds->fd_count; | 
 |     *count_ptr = count; | 
 |     if (!count) return NULL; | 
 |     if (!(fds = HeapAlloc( GetProcessHeap(), 0, count * sizeof(fds[0])))) return NULL; | 
 |     if (readfds) | 
 |         for (i = 0; i < readfds->fd_count; i++, j++) | 
 |         { | 
 |             fds[j].fd = get_sock_fd( readfds->fd_array[i], FILE_READ_DATA, NULL ); | 
 |             fds[j].events = POLLIN; | 
 |             fds[j].revents = 0; | 
 |         } | 
 |     if (writefds) | 
 |         for (i = 0; i < writefds->fd_count; i++, j++) | 
 |         { | 
 |             fds[j].fd = get_sock_fd( writefds->fd_array[i], FILE_WRITE_DATA, NULL ); | 
 |             fds[j].events = POLLOUT; | 
 |             fds[j].revents = 0; | 
 |         } | 
 |     if (exceptfds) | 
 |         for (i = 0; i < exceptfds->fd_count; i++, j++) | 
 |         { | 
 |             fds[j].fd = get_sock_fd( exceptfds->fd_array[i], 0, NULL ); | 
 |             fds[j].events = POLLHUP; | 
 |             fds[j].revents = 0; | 
 |         } | 
 |     return fds; | 
 | } | 
 |  | 
 | /* release the file descriptor obtained in fd_sets_to_poll */ | 
 | /* must be called with the original fd_set arrays, before calling get_poll_results */ | 
 | static void release_poll_fds( const WS_fd_set *readfds, const WS_fd_set *writefds, | 
 |                               const WS_fd_set *exceptfds, struct pollfd *fds ) | 
 | { | 
 |     int i, j = 0; | 
 |  | 
 |     if (readfds) | 
 |     { | 
 |         for (i = 0; i < readfds->fd_count; i++, j++) | 
 |             if (fds[j].fd != -1) release_sock_fd( readfds->fd_array[i], fds[j].fd ); | 
 |     } | 
 |     if (writefds) | 
 |     { | 
 |         for (i = 0; i < writefds->fd_count; i++, j++) | 
 |             if (fds[j].fd != -1) release_sock_fd( writefds->fd_array[i], fds[j].fd ); | 
 |     } | 
 |     if (exceptfds) | 
 |     { | 
 |         for (i = 0; i < exceptfds->fd_count; i++, j++) | 
 |             if (fds[j].fd != -1) | 
 |             { | 
 |                 /* make sure we have a real error before releasing the fd */ | 
 |                 if (!sock_error_p( fds[j].fd )) fds[j].revents = 0; | 
 |                 release_sock_fd( exceptfds->fd_array[i], fds[j].fd ); | 
 |             } | 
 |     } | 
 | } | 
 |  | 
 | /* map the poll results back into the Windows fd sets */ | 
 | static int get_poll_results( WS_fd_set *readfds, WS_fd_set *writefds, WS_fd_set *exceptfds, | 
 |                              const struct pollfd *fds ) | 
 | { | 
 |     int i, j = 0, k, total = 0; | 
 |  | 
 |     if (readfds) | 
 |     { | 
 |         for (i = k = 0; i < readfds->fd_count; i++, j++) | 
 |             if (fds[j].revents) readfds->fd_array[k++] = readfds->fd_array[i]; | 
 |         readfds->fd_count = k; | 
 |         total += k; | 
 |     } | 
 |     if (writefds) | 
 |     { | 
 |         for (i = k = 0; i < writefds->fd_count; i++, j++) | 
 |             if (fds[j].revents) writefds->fd_array[k++] = writefds->fd_array[i]; | 
 |         writefds->fd_count = k; | 
 |         total += k; | 
 |     } | 
 |     if (exceptfds) | 
 |     { | 
 |         for (i = k = 0; i < exceptfds->fd_count; i++, j++) | 
 |             if (fds[j].revents) exceptfds->fd_array[k++] = exceptfds->fd_array[i]; | 
 |         exceptfds->fd_count = k; | 
 |         total += k; | 
 |     } | 
 |     return total; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		select			(WS2_32.18) | 
 |  */ | 
 | int WINAPI WS_select(int nfds, WS_fd_set *ws_readfds, | 
 |                      WS_fd_set *ws_writefds, WS_fd_set *ws_exceptfds, | 
 |                      const struct WS_timeval* ws_timeout) | 
 | { | 
 |     struct pollfd *pollfds; | 
 |     int count, ret, timeout = -1; | 
 |  | 
 |     TRACE("read %p, write %p, excp %p timeout %p\n", | 
 |           ws_readfds, ws_writefds, ws_exceptfds, ws_timeout); | 
 |  | 
 |     if (!(pollfds = fd_sets_to_poll( ws_readfds, ws_writefds, ws_exceptfds, &count )) && count) | 
 |     { | 
 |         SetLastError( ERROR_NOT_ENOUGH_MEMORY ); | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     if (ws_timeout) timeout = (ws_timeout->tv_sec * 1000) + (ws_timeout->tv_usec + 999) / 1000; | 
 |  | 
 |     ret = poll( pollfds, count, timeout ); | 
 |     release_poll_fds( ws_readfds, ws_writefds, ws_exceptfds, pollfds ); | 
 |  | 
 |     if (ret == -1) SetLastError(wsaErrno()); | 
 |     else ret = get_poll_results( ws_readfds, ws_writefds, ws_exceptfds, pollfds ); | 
 |     HeapFree( GetProcessHeap(), 0, pollfds ); | 
 |     return ret; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		send			(WS2_32.19) | 
 |  */ | 
 | int WINAPI WS_send(SOCKET s, const char *buf, int len, int flags) | 
 | { | 
 |     DWORD n; | 
 |     WSABUF wsabuf; | 
 |  | 
 |     wsabuf.len = len; | 
 |     wsabuf.buf = (char*) buf; | 
 |  | 
 |     if ( WSASendTo( s, &wsabuf, 1, &n, flags, NULL, 0, NULL, NULL) == SOCKET_ERROR ) | 
 |         return SOCKET_ERROR; | 
 |     else | 
 |         return n; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		WSASend			(WS2_32.72) | 
 |  */ | 
 | INT WINAPI WSASend( SOCKET s, LPWSABUF lpBuffers, DWORD dwBufferCount, | 
 |                     LPDWORD lpNumberOfBytesSent, DWORD dwFlags, | 
 |                     LPWSAOVERLAPPED lpOverlapped, | 
 |                     LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine ) | 
 | { | 
 |     return WSASendTo( s, lpBuffers, dwBufferCount, lpNumberOfBytesSent, dwFlags, | 
 |                       NULL, 0, lpOverlapped, lpCompletionRoutine ); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSASendDisconnect       (WS2_32.73) | 
 |  */ | 
 | INT WINAPI WSASendDisconnect( SOCKET s, LPWSABUF lpBuffers ) | 
 | { | 
 |     return WS_shutdown( s, SD_SEND ); | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		WSASendTo		(WS2_32.74) | 
 |  */ | 
 | INT WINAPI WSASendTo( SOCKET s, LPWSABUF lpBuffers, DWORD dwBufferCount, | 
 |                       LPDWORD lpNumberOfBytesSent, DWORD dwFlags, | 
 |                       const struct WS_sockaddr *to, int tolen, | 
 |                       LPWSAOVERLAPPED lpOverlapped, | 
 |                       LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine ) | 
 | { | 
 |     unsigned int i, options; | 
 |     int n, fd, err; | 
 |     struct iovec iovec[WS_MSG_MAXIOVLEN]; | 
 |  | 
 |     TRACE("socket %04lx, wsabuf %p, nbufs %d, flags %d, to %p, tolen %d, ovl %p, func %p\n", | 
 |           s, lpBuffers, dwBufferCount, dwFlags, | 
 |           to, tolen, lpOverlapped, lpCompletionRoutine); | 
 |  | 
 |     if (dwBufferCount > WS_MSG_MAXIOVLEN) | 
 |     { | 
 |         WSASetLastError( WSAEINVAL ); | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     fd = get_sock_fd( s, FILE_WRITE_DATA, &options ); | 
 |     TRACE( "fd=%d, options=%x\n", fd, options ); | 
 |  | 
 |     if ( fd == -1 ) return SOCKET_ERROR; | 
 |  | 
 |     if ( !lpNumberOfBytesSent ) | 
 |     { | 
 |         err = WSAEFAULT; | 
 |         goto error; | 
 |     } | 
 |  | 
 |     for ( i = 0; i < dwBufferCount; i++ ) | 
 |     { | 
 |         iovec[i].iov_base = lpBuffers[i].buf; | 
 |         iovec[i].iov_len  = lpBuffers[i].len; | 
 |     } | 
 |  | 
 |     for (;;) | 
 |     { | 
 |         n = WS2_send( fd, iovec, dwBufferCount, to, tolen, dwFlags ); | 
 |         if (n != -1 || errno != EINTR) break; | 
 |     } | 
 |     if (n == -1 && errno != EAGAIN) | 
 |     { | 
 |         err = wsaErrno(); | 
 |         goto error; | 
 |     } | 
 |  | 
 |     if ((lpOverlapped || lpCompletionRoutine) && | 
 |         !(options & (FILE_SYNCHRONOUS_IO_ALERT | FILE_SYNCHRONOUS_IO_NONALERT))) | 
 |     { | 
 |         IO_STATUS_BLOCK *iosb; | 
 |         struct ws2_async *wsa = HeapAlloc( GetProcessHeap(), 0, sizeof(*wsa) ); | 
 |  | 
 |         if ( !wsa ) | 
 |         { | 
 |             err = WSAEFAULT; | 
 |             goto error; | 
 |         } | 
 |         release_sock_fd( s, fd ); | 
 |  | 
 |         wsa->hSocket         = SOCKET2HANDLE(s); | 
 |         wsa->addr            = (struct WS_sockaddr *)to; | 
 |         wsa->addrlen.val     = tolen; | 
 |         wsa->flags           = 0; | 
 |         wsa->user_overlapped = lpOverlapped; | 
 |         wsa->completion_func = lpCompletionRoutine; | 
 |         wsa->n_iovecs        = dwBufferCount; | 
 |         memcpy( wsa->iovec, iovec, dwBufferCount * sizeof(*iovec) ); | 
 |  | 
 |         iosb = lpOverlapped ? (IO_STATUS_BLOCK *)lpOverlapped : &wsa->local_iosb; | 
 |         if (n == -1) | 
 |         { | 
 |             iosb->u.Status = STATUS_PENDING; | 
 |             iosb->Information = 0; | 
 |  | 
 |             SERVER_START_REQ( register_async ) | 
 |             { | 
 |                 req->handle = wsa->hSocket; | 
 |                 req->type   = ASYNC_TYPE_WRITE; | 
 |                 req->async.callback = WS2_async_send; | 
 |                 req->async.iosb     = iosb; | 
 |                 req->async.arg      = wsa; | 
 |                 req->async.apc      = ws2_async_apc; | 
 |                 req->async.event    = lpCompletionRoutine ? 0 : lpOverlapped->hEvent; | 
 |                 err = wine_server_call( req ); | 
 |             } | 
 |             SERVER_END_REQ; | 
 |  | 
 |             if (err != STATUS_PENDING) HeapFree( GetProcessHeap(), 0, wsa ); | 
 |             WSASetLastError( NtStatusToWSAError( err )); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |  | 
 |         iosb->u.Status = STATUS_SUCCESS; | 
 |         iosb->Information = n; | 
 |         *lpNumberOfBytesSent = n; | 
 |         if (!wsa->completion_func) | 
 |         { | 
 |             SetEvent( lpOverlapped->hEvent ); | 
 |             HeapFree( GetProcessHeap(), 0, wsa ); | 
 |         } | 
 |         else NtQueueApcThread( GetCurrentThread(), (PNTAPCFUNC)ws2_async_apc, | 
 |                                (ULONG_PTR)wsa, (ULONG_PTR)iosb, 0 ); | 
 |         return 0; | 
 |     } | 
 |  | 
 |     if ( _is_blocking(s) ) | 
 |     { | 
 |         /* On a blocking non-overlapped stream socket, | 
 |          * sending blocks until the entire buffer is sent. */ | 
 |         DWORD timeout_start = GetTickCount(); | 
 |         unsigned int first_buff = 0; | 
 |  | 
 |         *lpNumberOfBytesSent = 0; | 
 |  | 
 |         while (first_buff < dwBufferCount) | 
 |         { | 
 |             struct pollfd pfd; | 
 |             int timeout = GET_SNDTIMEO(fd); | 
 |  | 
 |             if (n >= 0) | 
 |             { | 
 |                 *lpNumberOfBytesSent += n; | 
 |                 while (first_buff < dwBufferCount && iovec[first_buff].iov_len <= n) | 
 |                     n -= iovec[first_buff++].iov_len; | 
 |                 if (first_buff >= dwBufferCount) break; | 
 |                 iovec[first_buff].iov_base = (char*)iovec[first_buff].iov_base + n; | 
 |                 iovec[first_buff].iov_len -= n; | 
 |             } | 
 |  | 
 |             if (timeout != -1) | 
 |             { | 
 |                 timeout -= timeout_start - GetTickCount(); | 
 |                 if (timeout < 0) timeout = 0; | 
 |             } | 
 |  | 
 |             pfd.fd = fd; | 
 |             pfd.events = POLLOUT; | 
 |  | 
 |             if (!timeout || !poll( &pfd, 1, timeout )) | 
 |             { | 
 |                 err = WSAETIMEDOUT; | 
 |                 goto error; /* msdn says a timeout in send is fatal */ | 
 |             } | 
 |  | 
 |             n = WS2_send( fd, iovec + first_buff, dwBufferCount - first_buff, to, tolen, dwFlags ); | 
 |             if (n == -1 && errno != EAGAIN && errno != EINTR) | 
 |             { | 
 |                 err = wsaErrno(); | 
 |                 goto error; | 
 |             } | 
 |         } | 
 |     } | 
 |     else  /* non-blocking */ | 
 |     { | 
 |         _enable_event(SOCKET2HANDLE(s), FD_WRITE, 0, 0); | 
 |         if (n == -1) | 
 |         { | 
 |             err = WSAEWOULDBLOCK; | 
 |             goto error; | 
 |         } | 
 |         *lpNumberOfBytesSent = n; | 
 |     } | 
 |  | 
 |     TRACE(" -> %i bytes\n", *lpNumberOfBytesSent); | 
 |  | 
 |     release_sock_fd( s, fd ); | 
 |     return 0; | 
 |  | 
 | error: | 
 |     release_sock_fd( s, fd ); | 
 |     WARN(" -> ERROR %d\n", err); | 
 |     WSASetLastError(err); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		sendto		(WS2_32.20) | 
 |  */ | 
 | int WINAPI WS_sendto(SOCKET s, const char *buf, int len, int flags, | 
 |                               const struct WS_sockaddr *to, int tolen) | 
 | { | 
 |     DWORD n; | 
 |     WSABUF wsabuf; | 
 |  | 
 |     wsabuf.len = len; | 
 |     wsabuf.buf = (char*) buf; | 
 |  | 
 |     if ( WSASendTo(s, &wsabuf, 1, &n, flags, to, tolen, NULL, NULL) == SOCKET_ERROR ) | 
 |         return SOCKET_ERROR; | 
 |     else | 
 |         return n; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		setsockopt		(WS2_32.21) | 
 |  */ | 
 | int WINAPI WS_setsockopt(SOCKET s, int level, int optname, | 
 |                                   const char *optval, int optlen) | 
 | { | 
 |     int fd; | 
 |     int woptval; | 
 |     struct linger linger; | 
 |     struct timeval tval; | 
 |  | 
 |     TRACE("socket: %04lx, level 0x%x, name 0x%x, ptr %p, len %d\n", | 
 |           s, level, optname, optval, optlen); | 
 |  | 
 |     switch(level) | 
 |     { | 
 |     case WS_SOL_SOCKET: | 
 |         switch(optname) | 
 |         { | 
 |         /* Some options need some conversion before they can be sent to | 
 |          * setsockopt. The conversions are done here, then they will fall though | 
 |          * to the general case. Special options that are not passed to | 
 |          * setsockopt follow below that.*/ | 
 |  | 
 |         case WS_SO_DONTLINGER: | 
 |             linger.l_onoff  = *((const int*)optval) ? 0: 1; | 
 |             linger.l_linger = 0; | 
 |             level = SOL_SOCKET; | 
 |             optname = SO_LINGER; | 
 |             optval = (char*)&linger; | 
 |             optlen = sizeof(struct linger); | 
 |             break; | 
 |  | 
 |         case WS_SO_LINGER: | 
 |             linger.l_onoff  = ((LINGER*)optval)->l_onoff; | 
 |             linger.l_linger  = ((LINGER*)optval)->l_linger; | 
 |             /* FIXME: what is documented behavior if SO_LINGER optval | 
 |                is null?? */ | 
 |             level = SOL_SOCKET; | 
 |             optname = SO_LINGER; | 
 |             optval = (char*)&linger; | 
 |             optlen = sizeof(struct linger); | 
 |             break; | 
 |  | 
 |         case WS_SO_RCVBUF: | 
 |             if (*(const int*)optval < 2048) | 
 |             { | 
 |                 WARN("SO_RCVBF for %d bytes is too small: ignored\n", *(const int*)optval ); | 
 |                 return 0; | 
 |             } | 
 |             /* Fall through */ | 
 |  | 
 |         /* The options listed here don't need any special handling. Thanks to | 
 |          * the conversion happening above, options from there will fall through | 
 |          * to this, too.*/ | 
 |         case WS_SO_ACCEPTCONN: | 
 |         case WS_SO_BROADCAST: | 
 |         case WS_SO_ERROR: | 
 |         case WS_SO_KEEPALIVE: | 
 |         case WS_SO_OOBINLINE: | 
 |         case WS_SO_SNDBUF: | 
 |         case WS_SO_TYPE: | 
 |             convert_sockopt(&level, &optname); | 
 |             break; | 
 |  | 
 |         /* SO_DEBUG is a privileged operation, ignore it. */ | 
 |         case WS_SO_DEBUG: | 
 |             TRACE("Ignoring SO_DEBUG\n"); | 
 |             return 0; | 
 |  | 
 |         /* For some reason the game GrandPrixLegends does set SO_DONTROUTE on its | 
 |          * socket. According to MSDN, this option is silently ignored.*/ | 
 |         case WS_SO_DONTROUTE: | 
 |             TRACE("Ignoring SO_DONTROUTE\n"); | 
 |             return 0; | 
 |  | 
 |         /* Stops two sockets from being bound to the same port. Always happens | 
 |          * on unix systems, so just drop it. */ | 
 |         case WS_SO_EXCLUSIVEADDRUSE: | 
 |             TRACE("Ignoring SO_EXCLUSIVEADDRUSE, is always set.\n"); | 
 |             return 0; | 
 |  | 
 |         /* SO_OPENTYPE does not require a valid socket handle. */ | 
 |         case WS_SO_OPENTYPE: | 
 |             if (!optlen || optlen < sizeof(int) || !optval) | 
 |             { | 
 |                 SetLastError(WSAEFAULT); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |             get_per_thread_data()->opentype = *(const int *)optval; | 
 |             TRACE("setting global SO_OPENTYPE = 0x%x\n", *((int*)optval) ); | 
 |             return 0; | 
 |  | 
 |         /* SO_REUSEADDR allows two applications to bind to the same port at at | 
 |          * same time. There is no direct way to do that in unix. While Wineserver | 
 |          * might do this, it does not seem useful for now, so just ignore it.*/ | 
 |         case WS_SO_REUSEADDR: | 
 |             TRACE("Ignoring SO_REUSEADDR, does not translate\n"); | 
 |             return 0; | 
 |  | 
 | #ifdef SO_RCVTIMEO | 
 |         case WS_SO_RCVTIMEO: | 
 | #endif | 
 | #ifdef SO_SNDTIMEO | 
 |         case WS_SO_SNDTIMEO: | 
 | #endif | 
 | #if defined(SO_RCVTIMEO) || defined(SO_SNDTIMEO) | 
 |             if (optval && optlen == sizeof(UINT32)) { | 
 |                 /* WinSock passes miliseconds instead of struct timeval */ | 
 |                 tval.tv_usec = (*(const UINT32*)optval % 1000) * 1000; | 
 |                 tval.tv_sec = *(const UINT32*)optval / 1000; | 
 |                 /* min of 500 milisec */ | 
 |                 if (tval.tv_sec == 0 && tval.tv_usec < 500000) | 
 |                     tval.tv_usec = 500000; | 
 |                 optlen = sizeof(struct timeval); | 
 |                 optval = (char*)&tval; | 
 |             } else if (optlen == sizeof(struct timeval)) { | 
 |                 WARN("SO_SND/RCVTIMEO for %d bytes: assuming unixism\n", optlen); | 
 |             } else { | 
 |                 WARN("SO_SND/RCVTIMEO for %d bytes is weird: ignored\n", optlen); | 
 |                 return 0; | 
 |             } | 
 |             convert_sockopt(&level, &optname); | 
 |             break; | 
 | #endif | 
 |  | 
 |         default: | 
 |             TRACE("Unknown SOL_SOCKET optname: 0x%08x\n", optname); | 
 |             SetLastError(WSAENOPROTOOPT); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |         break; /* case WS_SOL_SOCKET */ | 
 |  | 
 | #ifdef HAVE_IPX | 
 |     case NSPROTO_IPX: | 
 |         switch(optname) | 
 |         { | 
 |         case IPX_PTYPE: | 
 |             fd = get_sock_fd( s, 0, NULL ); | 
 |             TRACE("trying to set IPX_PTYPE: %d (fd: %d)\n", *(const int*)optval, fd); | 
 |  | 
 |             /* We try to set the ipx type on ipx socket level. */ | 
 | #ifdef SOL_IPX | 
 |             if(setsockopt(fd, SOL_IPX, IPX_TYPE, optval, optlen) == -1) | 
 |             { | 
 |                 ERR("IPX: could not set ipx option type; expect weird behaviour\n"); | 
 |                 release_sock_fd( s, fd ); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 | #else | 
 |             { | 
 |                 struct ipx val; | 
 |                 /* Should we retrieve val using a getsockopt call and then | 
 |                  * set the modified one? */ | 
 |                 val.ipx_pt = *optval; | 
 |                 setsockopt(fd, 0, SO_DEFAULT_HEADERS, &val, sizeof(struct ipx)); | 
 |             } | 
 | #endif | 
 |             release_sock_fd( s, fd ); | 
 |             return 0; | 
 |  | 
 |         case IPX_FILTERPTYPE: | 
 |             /* Sets the receive filter packet type, at the moment we don't support it */ | 
 |             FIXME("IPX_FILTERPTYPE: %x\n", *optval); | 
 |             /* Returning 0 is better for now than returning a SOCKET_ERROR */ | 
 |             return 0; | 
 |  | 
 |         default: | 
 |             FIXME("opt_name:%x\n", optname); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |         break; /* case NSPROTO_IPX */ | 
 | #endif | 
 |  | 
 |     /* Levels WS_IPPROTO_TCP and WS_IPPROTO_IP convert directly */ | 
 |     case WS_IPPROTO_TCP: | 
 |         switch(optname) | 
 |         { | 
 |         case WS_TCP_NODELAY: | 
 |             convert_sockopt(&level, &optname); | 
 |             break; | 
 |         default: | 
 |             FIXME("Unknown IPPROTO_TCP optname 0x%08x\n", optname); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |         break; | 
 |  | 
 |     case WS_IPPROTO_IP: | 
 |         switch(optname) | 
 |         { | 
 |         case WS_IP_ADD_MEMBERSHIP: | 
 |         case WS_IP_DROP_MEMBERSHIP: | 
 | #ifdef IP_HDRINCL | 
 |         case WS_IP_HDRINCL: | 
 | #endif | 
 |         case WS_IP_MULTICAST_IF: | 
 |         case WS_IP_MULTICAST_LOOP: | 
 |         case WS_IP_MULTICAST_TTL: | 
 |         case WS_IP_OPTIONS: | 
 |         case WS_IP_TOS: | 
 |         case WS_IP_TTL: | 
 |             convert_sockopt(&level, &optname); | 
 |             break; | 
 |         default: | 
 |             FIXME("Unknown IPPROTO_IP optname 0x%08x\n", optname); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |         break; | 
 |  | 
 |     default: | 
 |         FIXME("Unknown level: 0x%08x\n", level); | 
 |         return SOCKET_ERROR; | 
 |     } /* end switch(level) */ | 
 |  | 
 |     /* avoid endianness issues if argument is a 16-bit int */ | 
 |     if (optval && optlen < sizeof(int)) | 
 |     { | 
 |         woptval= *((const INT16 *) optval); | 
 |         optval= (char*) &woptval; | 
 |         optlen=sizeof(int); | 
 |     } | 
 |     fd = get_sock_fd( s, 0, NULL ); | 
 |     if (fd == -1) return SOCKET_ERROR; | 
 |  | 
 |     if (setsockopt(fd, level, optname, optval, optlen) == 0) | 
 |     { | 
 |         release_sock_fd( s, fd ); | 
 |         return 0; | 
 |     } | 
 |     TRACE("Setting socket error, %d\n", wsaErrno()); | 
 |     SetLastError(wsaErrno()); | 
 |     release_sock_fd( s, fd ); | 
 |  | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		shutdown		(WS2_32.22) | 
 |  */ | 
 | int WINAPI WS_shutdown(SOCKET s, int how) | 
 | { | 
 |     int fd, err = WSAENOTSOCK; | 
 |     unsigned int options, clear_flags = 0; | 
 |  | 
 |     fd = get_sock_fd( s, 0, &options ); | 
 |     TRACE("socket %04lx, how %i %x\n", s, how, options ); | 
 |  | 
 |     if (fd == -1) | 
 |         return SOCKET_ERROR; | 
 |  | 
 |     switch( how ) | 
 |     { | 
 |     case 0: /* drop receives */ | 
 |         clear_flags |= FD_READ; | 
 |         break; | 
 |     case 1: /* drop sends */ | 
 |         clear_flags |= FD_WRITE; | 
 |         break; | 
 |     case 2: /* drop all */ | 
 |         clear_flags |= FD_READ|FD_WRITE; | 
 |     default: | 
 |         clear_flags |= FD_WINE_LISTENING; | 
 |     } | 
 |  | 
 |     if (!(options & (FILE_SYNCHRONOUS_IO_ALERT | FILE_SYNCHRONOUS_IO_NONALERT))) | 
 |     { | 
 |         switch ( how ) | 
 |         { | 
 |         case SD_RECEIVE: | 
 |             err = WS2_register_async_shutdown( s, ASYNC_TYPE_READ ); | 
 |             break; | 
 |         case SD_SEND: | 
 |             err = WS2_register_async_shutdown( s, ASYNC_TYPE_WRITE ); | 
 |             break; | 
 |         case SD_BOTH: | 
 |         default: | 
 |             err = WS2_register_async_shutdown( s, ASYNC_TYPE_READ ); | 
 |             if (!err) err = WS2_register_async_shutdown( s, ASYNC_TYPE_WRITE ); | 
 |             break; | 
 |         } | 
 |         if (err) goto error; | 
 |     } | 
 |     else /* non-overlapped mode */ | 
 |     { | 
 |         if ( shutdown( fd, how ) ) | 
 |         { | 
 |             err = wsaErrno(); | 
 |             goto error; | 
 |         } | 
 |     } | 
 |  | 
 |     release_sock_fd( s, fd ); | 
 |     _enable_event( SOCKET2HANDLE(s), 0, 0, clear_flags ); | 
 |     if ( how > 1) WSAAsyncSelect( s, 0, 0, 0 ); | 
 |     return 0; | 
 |  | 
 | error: | 
 |     release_sock_fd( s, fd ); | 
 |     _enable_event( SOCKET2HANDLE(s), 0, 0, clear_flags ); | 
 |     WSASetLastError( err ); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		socket		(WS2_32.23) | 
 |  */ | 
 | SOCKET WINAPI WS_socket(int af, int type, int protocol) | 
 | { | 
 |     TRACE("af=%d type=%d protocol=%d\n", af, type, protocol); | 
 |  | 
 |     return WSASocketA( af, type, protocol, NULL, 0, | 
 |                        get_per_thread_data()->opentype ? 0 : WSA_FLAG_OVERLAPPED ); | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		gethostbyaddr		(WS2_32.51) | 
 |  */ | 
 | struct WS_hostent* WINAPI WS_gethostbyaddr(const char *addr, int len, int type) | 
 | { | 
 |     struct WS_hostent *retval = NULL; | 
 |     struct hostent* host; | 
 |  | 
 | #ifdef HAVE_LINUX_GETHOSTBYNAME_R_6 | 
 |     char *extrabuf; | 
 |     int ebufsize=1024; | 
 |     struct hostent hostentry; | 
 |     int locerr=ENOBUFS; | 
 |     host = NULL; | 
 |     extrabuf=HeapAlloc(GetProcessHeap(),0,ebufsize) ; | 
 |     while(extrabuf) { | 
 |         int res = gethostbyaddr_r(addr, len, type, | 
 |                                   &hostentry, extrabuf, ebufsize, &host, &locerr); | 
 |         if( res != ERANGE) break; | 
 |         ebufsize *=2; | 
 |         extrabuf=HeapReAlloc(GetProcessHeap(),0,extrabuf,ebufsize) ; | 
 |     } | 
 |     if (!host) SetLastError((locerr < 0) ? wsaErrno() : wsaHerrno(locerr)); | 
 | #else | 
 |     EnterCriticalSection( &csWSgetXXXbyYYY ); | 
 |     host = gethostbyaddr(addr, len, type); | 
 |     if (!host) SetLastError((h_errno < 0) ? wsaErrno() : wsaHerrno(h_errno)); | 
 | #endif | 
 |     if( host != NULL ) retval = WS_dup_he(host); | 
 | #ifdef  HAVE_LINUX_GETHOSTBYNAME_R_6 | 
 |     HeapFree(GetProcessHeap(),0,extrabuf); | 
 | #else | 
 |     LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
 | #endif | 
 |     TRACE("ptr %p, len %d, type %d ret %p\n", addr, len, type, retval); | 
 |     return retval; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		gethostbyname		(WS2_32.52) | 
 |  */ | 
 | struct WS_hostent* WINAPI WS_gethostbyname(const char* name) | 
 | { | 
 |     struct WS_hostent *retval = NULL; | 
 |     struct hostent*     host; | 
 | #ifdef  HAVE_LINUX_GETHOSTBYNAME_R_6 | 
 |     char *extrabuf; | 
 |     int ebufsize=1024; | 
 |     struct hostent hostentry; | 
 |     int locerr = ENOBUFS; | 
 | #endif | 
 |     char buf[100]; | 
 |     if( !name || !name[0]) { | 
 |         name = buf; | 
 |         if( gethostname( buf, 100) == -1) { | 
 |             SetLastError( WSAENOBUFS); /* appropriate ? */ | 
 |             return retval; | 
 |         } | 
 |     } | 
 | #ifdef  HAVE_LINUX_GETHOSTBYNAME_R_6 | 
 |     host = NULL; | 
 |     extrabuf=HeapAlloc(GetProcessHeap(),0,ebufsize) ; | 
 |     while(extrabuf) { | 
 |         int res = gethostbyname_r(name, &hostentry, extrabuf, ebufsize, &host, &locerr); | 
 |         if( res != ERANGE) break; | 
 |         ebufsize *=2; | 
 |         extrabuf=HeapReAlloc(GetProcessHeap(),0,extrabuf,ebufsize) ; | 
 |     } | 
 |     if (!host) SetLastError((locerr < 0) ? wsaErrno() : wsaHerrno(locerr)); | 
 | #else | 
 |     EnterCriticalSection( &csWSgetXXXbyYYY ); | 
 |     host = gethostbyname(name); | 
 |     if (!host) SetLastError((h_errno < 0) ? wsaErrno() : wsaHerrno(h_errno)); | 
 | #endif | 
 |     if (host) retval = WS_dup_he(host); | 
 | #ifdef  HAVE_LINUX_GETHOSTBYNAME_R_6 | 
 |     HeapFree(GetProcessHeap(),0,extrabuf); | 
 | #else | 
 |     LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
 | #endif | 
 |     TRACE( "%s ret %p\n", debugstr_a(name), retval ); | 
 |     return retval; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		getprotobyname		(WS2_32.53) | 
 |  */ | 
 | struct WS_protoent* WINAPI WS_getprotobyname(const char* name) | 
 | { | 
 |     struct WS_protoent* retval = NULL; | 
 | #ifdef HAVE_GETPROTOBYNAME | 
 |     struct protoent*     proto; | 
 |     EnterCriticalSection( &csWSgetXXXbyYYY ); | 
 |     if( (proto = getprotobyname(name)) != NULL ) | 
 |     { | 
 |         retval = WS_dup_pe(proto); | 
 |     } | 
 |     else { | 
 |         MESSAGE("protocol %s not found; You might want to add " | 
 |                 "this to /etc/protocols\n", debugstr_a(name) ); | 
 |         SetLastError(WSANO_DATA); | 
 |     } | 
 |     LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
 | #endif | 
 |     TRACE( "%s ret %p\n", debugstr_a(name), retval ); | 
 |     return retval; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		getprotobynumber	(WS2_32.54) | 
 |  */ | 
 | struct WS_protoent* WINAPI WS_getprotobynumber(int number) | 
 | { | 
 |     struct WS_protoent* retval = NULL; | 
 | #ifdef HAVE_GETPROTOBYNUMBER | 
 |     struct protoent*     proto; | 
 |     EnterCriticalSection( &csWSgetXXXbyYYY ); | 
 |     if( (proto = getprotobynumber(number)) != NULL ) | 
 |     { | 
 |         retval = WS_dup_pe(proto); | 
 |     } | 
 |     else { | 
 |         MESSAGE("protocol number %d not found; You might want to add " | 
 |                 "this to /etc/protocols\n", number ); | 
 |         SetLastError(WSANO_DATA); | 
 |     } | 
 |     LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
 | #endif | 
 |     TRACE("%i ret %p\n", number, retval); | 
 |     return retval; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		getservbyname		(WS2_32.55) | 
 |  */ | 
 | struct WS_servent* WINAPI WS_getservbyname(const char *name, const char *proto) | 
 | { | 
 |     struct WS_servent* retval = NULL; | 
 |     struct servent*     serv; | 
 |     char *name_str; | 
 |     char *proto_str = NULL; | 
 |  | 
 |     if (!(name_str = strdup_lower(name))) return NULL; | 
 |  | 
 |     if (proto && *proto) | 
 |     { | 
 |         if (!(proto_str = strdup_lower(proto))) | 
 |         { | 
 |             HeapFree( GetProcessHeap(), 0, name_str ); | 
 |             return NULL; | 
 |         } | 
 |     } | 
 |  | 
 |     EnterCriticalSection( &csWSgetXXXbyYYY ); | 
 |     serv = getservbyname(name_str, proto_str); | 
 |     if( serv != NULL ) | 
 |     { | 
 |         retval = WS_dup_se(serv); | 
 |     } | 
 |     else SetLastError(WSANO_DATA); | 
 |     LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
 |     HeapFree( GetProcessHeap(), 0, proto_str ); | 
 |     HeapFree( GetProcessHeap(), 0, name_str ); | 
 |     TRACE( "%s, %s ret %p\n", debugstr_a(name), debugstr_a(proto), retval ); | 
 |     return retval; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		freeaddrinfo		(WS2_32.@) | 
 |  */ | 
 | void WINAPI WS_freeaddrinfo(struct WS_addrinfo *res) | 
 | { | 
 |     while (res) { | 
 |         struct WS_addrinfo *next; | 
 |  | 
 |         HeapFree(GetProcessHeap(),0,res->ai_canonname); | 
 |         HeapFree(GetProcessHeap(),0,res->ai_addr); | 
 |         next = res->ai_next; | 
 |         HeapFree(GetProcessHeap(),0,res); | 
 |         res = next; | 
 |     } | 
 | } | 
 |  | 
 | /* helper functions for getaddrinfo() */ | 
 | static int convert_aiflag_w2u(int winflags) { | 
 |     int i, unixflags = 0; | 
 |  | 
 |     for (i=0;i<sizeof(ws_aiflag_map)/sizeof(ws_aiflag_map[0]);i++) | 
 |         if (ws_aiflag_map[i][0] & winflags) { | 
 |             unixflags |= ws_aiflag_map[i][1]; | 
 |             winflags &= ~ws_aiflag_map[i][0]; | 
 |         } | 
 |     if (winflags) | 
 |         FIXME("Unhandled windows AI_xxx flags %x\n", winflags); | 
 |     return unixflags; | 
 | } | 
 |  | 
 | static int convert_aiflag_u2w(int unixflags) { | 
 |     int i, winflags = 0; | 
 |  | 
 |     for (i=0;i<sizeof(ws_aiflag_map)/sizeof(ws_aiflag_map[0]);i++) | 
 |         if (ws_aiflag_map[i][1] & unixflags) { | 
 |             winflags |= ws_aiflag_map[i][0]; | 
 |             unixflags &= ~ws_aiflag_map[i][1]; | 
 |         } | 
 |     if (unixflags) /* will warn usually */ | 
 |         WARN("Unhandled UNIX AI_xxx flags %x\n", unixflags); | 
 |     return winflags; | 
 | } | 
 |  | 
 | static int convert_eai_u2w(int unixret) { | 
 |     int i; | 
 |  | 
 |     for (i=0;ws_eai_map[i][0];i++) | 
 |         if (ws_eai_map[i][1] == unixret) | 
 |             return ws_eai_map[i][0]; | 
 |     return unixret; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		getaddrinfo		(WS2_32.@) | 
 |  */ | 
 | int WINAPI WS_getaddrinfo(LPCSTR nodename, LPCSTR servname, const struct WS_addrinfo *hints, struct WS_addrinfo **res) | 
 | { | 
 | #if HAVE_GETADDRINFO | 
 |     struct addrinfo *unixaires = NULL; | 
 |     int   result; | 
 |     struct addrinfo unixhints, *punixhints = NULL; | 
 |     CHAR *node = NULL, *serv = NULL; | 
 |  | 
 |     if (nodename) | 
 |         if (!(node = strdup_lower(nodename))) return WSA_NOT_ENOUGH_MEMORY; | 
 |  | 
 |     if (servname) { | 
 |         if (!(serv = strdup_lower(servname))) { | 
 |             HeapFree(GetProcessHeap(), 0, node); | 
 |             return WSA_NOT_ENOUGH_MEMORY; | 
 |         } | 
 |     } | 
 |  | 
 |     if (hints) { | 
 |         punixhints = &unixhints; | 
 |  | 
 |         memset(&unixhints, 0, sizeof(unixhints)); | 
 |         punixhints->ai_flags    = convert_aiflag_w2u(hints->ai_flags); | 
 |         if (hints->ai_family == 0) /* wildcard, specific to getaddrinfo() */ | 
 |             punixhints->ai_family = 0; | 
 |         else | 
 |             punixhints->ai_family = convert_af_w2u(hints->ai_family); | 
 |         if (hints->ai_socktype == 0) /* wildcard, specific to getaddrinfo() */ | 
 |             punixhints->ai_socktype = 0; | 
 |         else | 
 |             punixhints->ai_socktype = convert_socktype_w2u(hints->ai_socktype); | 
 |         if (hints->ai_protocol == 0) /* wildcard, specific to getaddrinfo() */ | 
 |             punixhints->ai_protocol = 0; | 
 |         else | 
 |             punixhints->ai_protocol = convert_proto_w2u(hints->ai_protocol); | 
 |     } | 
 |  | 
 |     /* getaddrinfo(3) is thread safe, no need to wrap in CS */ | 
 |     result = getaddrinfo(nodename, servname, punixhints, &unixaires); | 
 |  | 
 |     TRACE("%s, %s %p -> %p %d\n", nodename, servname, hints, res, result); | 
 |  | 
 |     HeapFree(GetProcessHeap(), 0, node); | 
 |     HeapFree(GetProcessHeap(), 0, serv); | 
 |  | 
 |     if (!result) { | 
 |         struct addrinfo *xuai = unixaires; | 
 |         struct WS_addrinfo **xai = res; | 
 |  | 
 |         *xai = NULL; | 
 |         while (xuai) { | 
 |             struct WS_addrinfo *ai = HeapAlloc(GetProcessHeap(),HEAP_ZERO_MEMORY, sizeof(struct WS_addrinfo)); | 
 |             int len; | 
 |  | 
 |             if (!ai) | 
 |                 goto outofmem; | 
 |  | 
 |             *xai = ai;xai = &ai->ai_next; | 
 |             ai->ai_flags    = convert_aiflag_u2w(xuai->ai_flags); | 
 |             ai->ai_family   = convert_af_u2w(xuai->ai_family); | 
 |             ai->ai_socktype = convert_socktype_u2w(xuai->ai_socktype); | 
 |             ai->ai_protocol = convert_proto_u2w(xuai->ai_protocol); | 
 |             if (xuai->ai_canonname) { | 
 |                 TRACE("canon name - %s\n",debugstr_a(xuai->ai_canonname)); | 
 |                 ai->ai_canonname = HeapAlloc(GetProcessHeap(),0,strlen(xuai->ai_canonname)+1); | 
 |                 if (!ai->ai_canonname) | 
 |                     goto outofmem; | 
 |                 strcpy(ai->ai_canonname,xuai->ai_canonname); | 
 |             } | 
 |             len = xuai->ai_addrlen; | 
 |             ai->ai_addr = HeapAlloc(GetProcessHeap(),0,len); | 
 |             if (!ai->ai_addr) | 
 |                 goto outofmem; | 
 |             ai->ai_addrlen = len; | 
 |             do { | 
 |                 int winlen = ai->ai_addrlen; | 
 |  | 
 |                 if (!ws_sockaddr_u2ws(xuai->ai_addr, ai->ai_addr, &winlen)) { | 
 |                     ai->ai_addrlen = winlen; | 
 |                     break; | 
 |                 } | 
 |                 len = 2*len; | 
 |                 ai->ai_addr = HeapReAlloc(GetProcessHeap(),0,ai->ai_addr,len); | 
 |                 if (!ai->ai_addr) | 
 |                     goto outofmem; | 
 |                 ai->ai_addrlen = len; | 
 |             } while (1); | 
 |             xuai = xuai->ai_next; | 
 |         } | 
 |         freeaddrinfo(unixaires); | 
 |     } else { | 
 |         result = convert_eai_u2w(result); | 
 |     } | 
 |     return result; | 
 |  | 
 | outofmem: | 
 |     if (*res) WS_freeaddrinfo(*res); | 
 |     if (unixaires) freeaddrinfo(unixaires); | 
 |     *res = NULL; | 
 |     return WSA_NOT_ENOUGH_MEMORY; | 
 | #else | 
 |     FIXME("getaddrinfo() failed, not found during buildtime.\n"); | 
 |     return EAI_FAIL; | 
 | #endif | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		GetAddrInfoW		(WS2_32.@) | 
 |  */ | 
 | int WINAPI GetAddrInfoW(LPCWSTR nodename, LPCWSTR servname, const ADDRINFOW *hints, PADDRINFOW *res) | 
 | { | 
 |     FIXME("empty stub!\n"); | 
 |     return EAI_FAIL; | 
 | } | 
 |  | 
 | int WINAPI WS_getnameinfo(const SOCKADDR *sa, WS_socklen_t salen, PCHAR host, | 
 |                           DWORD hostlen, PCHAR serv, DWORD servlen, INT flags) | 
 | { | 
 | #if HAVE_GETNAMEINFO | 
 |     int ret; | 
 |     union generic_unix_sockaddr sa_u; | 
 |     unsigned int size; | 
 |  | 
 |     TRACE("%s %d %p %d %p %d %d\n", debugstr_sockaddr(sa), salen, host, hostlen, | 
 |           serv, servlen, flags); | 
 |  | 
 |     size = ws_sockaddr_ws2u(sa, salen, &sa_u); | 
 |     if (!size) | 
 |     { | 
 |         WSASetLastError(WSAEFAULT); | 
 |         return WSA_NOT_ENOUGH_MEMORY; | 
 |     } | 
 |     ret = getnameinfo(&sa_u.addr, size, host, hostlen, serv, servlen, convert_aiflag_w2u(flags)); | 
 |     return convert_eai_u2w(ret); | 
 | #else | 
 |     FIXME("getnameinfo() failed, not found during buildtime.\n"); | 
 |     return EAI_FAIL; | 
 | #endif | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		getservbyport		(WS2_32.56) | 
 |  */ | 
 | struct WS_servent* WINAPI WS_getservbyport(int port, const char *proto) | 
 | { | 
 |     struct WS_servent* retval = NULL; | 
 | #ifdef HAVE_GETSERVBYPORT | 
 |     struct servent*     serv; | 
 |     char *proto_str = NULL; | 
 |  | 
 |     if (proto && *proto) | 
 |     { | 
 |         if (!(proto_str = strdup_lower(proto))) return NULL; | 
 |     } | 
 |     EnterCriticalSection( &csWSgetXXXbyYYY ); | 
 |     if( (serv = getservbyport(port, proto_str)) != NULL ) { | 
 |         retval = WS_dup_se(serv); | 
 |     } | 
 |     else SetLastError(WSANO_DATA); | 
 |     LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
 |     HeapFree( GetProcessHeap(), 0, proto_str ); | 
 | #endif | 
 |     TRACE("%d (i.e. port %d), %s ret %p\n", port, (int)ntohl(port), debugstr_a(proto), retval); | 
 |     return retval; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *              gethostname           (WS2_32.57) | 
 |  */ | 
 | int WINAPI WS_gethostname(char *name, int namelen) | 
 | { | 
 |     TRACE("name %p, len %d\n", name, namelen); | 
 |  | 
 |     if (gethostname(name, namelen) == 0) | 
 |     { | 
 |         TRACE("<- '%s'\n", name); | 
 |         return 0; | 
 |     } | 
 |     SetLastError((errno == EINVAL) ? WSAEFAULT : wsaErrno()); | 
 |     TRACE("<- ERROR !\n"); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 |  | 
 | /* ------------------------------------- Windows sockets extensions -- * | 
 |  *								       * | 
 |  * ------------------------------------------------------------------- */ | 
 |  | 
 | /*********************************************************************** | 
 |  *		WSAEnumNetworkEvents (WS2_32.36) | 
 |  */ | 
 | int WINAPI WSAEnumNetworkEvents(SOCKET s, WSAEVENT hEvent, LPWSANETWORKEVENTS lpEvent) | 
 | { | 
 |     int ret; | 
 |  | 
 |     TRACE("%08lx, hEvent %p, lpEvent %p\n", s, hEvent, lpEvent ); | 
 |  | 
 |     SERVER_START_REQ( get_socket_event ) | 
 |     { | 
 |         req->handle  = SOCKET2HANDLE(s); | 
 |         req->service = TRUE; | 
 |         req->c_event = hEvent; | 
 |         wine_server_set_reply( req, lpEvent->iErrorCode, sizeof(lpEvent->iErrorCode) ); | 
 |         if (!(ret = wine_server_call(req))) lpEvent->lNetworkEvents = reply->pmask & reply->mask; | 
 |     } | 
 |     SERVER_END_REQ; | 
 |     if (!ret) return 0; | 
 |     SetLastError(WSAEINVAL); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *		WSAEventSelect (WS2_32.39) | 
 |  */ | 
 | int WINAPI WSAEventSelect(SOCKET s, WSAEVENT hEvent, LONG lEvent) | 
 | { | 
 |     int ret; | 
 |  | 
 |     TRACE("%08lx, hEvent %p, event %08x\n", s, hEvent, lEvent); | 
 |  | 
 |     SERVER_START_REQ( set_socket_event ) | 
 |     { | 
 |         req->handle = SOCKET2HANDLE(s); | 
 |         req->mask   = lEvent; | 
 |         req->event  = hEvent; | 
 |         req->window = 0; | 
 |         req->msg    = 0; | 
 |         ret = wine_server_call( req ); | 
 |     } | 
 |     SERVER_END_REQ; | 
 |     if (!ret) return 0; | 
 |     SetLastError(WSAEINVAL); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /********************************************************************** | 
 |  *      WSAGetOverlappedResult (WS2_32.40) | 
 |  */ | 
 | BOOL WINAPI WSAGetOverlappedResult( SOCKET s, LPWSAOVERLAPPED lpOverlapped, | 
 |                                     LPDWORD lpcbTransfer, BOOL fWait, | 
 |                                     LPDWORD lpdwFlags ) | 
 | { | 
 |     NTSTATUS status; | 
 |  | 
 |     TRACE( "socket %04lx ovl %p trans %p, wait %d flags %p\n", | 
 |            s, lpOverlapped, lpcbTransfer, fWait, lpdwFlags ); | 
 |  | 
 |     if ( lpOverlapped == NULL ) | 
 |     { | 
 |         ERR( "Invalid pointer\n" ); | 
 |         WSASetLastError(WSA_INVALID_PARAMETER); | 
 |         return FALSE; | 
 |     } | 
 |  | 
 |     status = lpOverlapped->Internal; | 
 |     if (status == STATUS_PENDING) | 
 |     { | 
 |         if (!fWait) | 
 |         { | 
 |             SetLastError( WSA_IO_INCOMPLETE ); | 
 |             return FALSE; | 
 |         } | 
 |  | 
 |         if (WaitForSingleObject( lpOverlapped->hEvent ? lpOverlapped->hEvent : SOCKET2HANDLE(s), | 
 |                                  INFINITE ) == WAIT_FAILED) | 
 |             return FALSE; | 
 |         status = lpOverlapped->Internal; | 
 |     } | 
 |  | 
 |     if ( lpcbTransfer ) | 
 |         *lpcbTransfer = lpOverlapped->InternalHigh; | 
 |  | 
 |     if ( lpdwFlags ) | 
 |         *lpdwFlags = lpOverlapped->u.s.Offset; | 
 |  | 
 |     if (status) SetLastError( RtlNtStatusToDosError(status) ); | 
 |     return !status; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSAAsyncSelect			(WS2_32.101) | 
 |  */ | 
 | INT WINAPI WSAAsyncSelect(SOCKET s, HWND hWnd, UINT uMsg, LONG lEvent) | 
 | { | 
 |     int ret; | 
 |  | 
 |     TRACE("%lx, hWnd %p, uMsg %08x, event %08x\n", s, hWnd, uMsg, lEvent); | 
 |  | 
 |     SERVER_START_REQ( set_socket_event ) | 
 |     { | 
 |         req->handle = SOCKET2HANDLE(s); | 
 |         req->mask   = lEvent; | 
 |         req->event  = 0; | 
 |         req->window = hWnd; | 
 |         req->msg    = uMsg; | 
 |         ret = wine_server_call( req ); | 
 |     } | 
 |     SERVER_END_REQ; | 
 |     if (!ret) return 0; | 
 |     SetLastError(WSAEINVAL); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSACreateEvent          (WS2_32.31) | 
 |  * | 
 |  */ | 
 | WSAEVENT WINAPI WSACreateEvent(void) | 
 | { | 
 |     /* Create a manual-reset event, with initial state: unsignaled */ | 
 |     TRACE("\n"); | 
 |  | 
 |     return CreateEventW(NULL, TRUE, FALSE, NULL); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSACloseEvent          (WS2_32.29) | 
 |  * | 
 |  */ | 
 | BOOL WINAPI WSACloseEvent(WSAEVENT event) | 
 | { | 
 |     TRACE ("event=%p\n", event); | 
 |  | 
 |     return CloseHandle(event); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSASocketA          (WS2_32.78) | 
 |  * | 
 |  */ | 
 | SOCKET WINAPI WSASocketA(int af, int type, int protocol, | 
 |                          LPWSAPROTOCOL_INFOA lpProtocolInfo, | 
 |                          GROUP g, DWORD dwFlags) | 
 | { | 
 |     INT len; | 
 |     WSAPROTOCOL_INFOW info; | 
 |  | 
 |     TRACE("af=%d type=%d protocol=%d protocol_info=%p group=%d flags=0x%x\n", | 
 |           af, type, protocol, lpProtocolInfo, g, dwFlags); | 
 |  | 
 |     if (!lpProtocolInfo) return WSASocketW(af, type, protocol, NULL, g, dwFlags); | 
 |  | 
 |     memcpy(&info, lpProtocolInfo, FIELD_OFFSET(WSAPROTOCOL_INFOW, szProtocol)); | 
 |     len = MultiByteToWideChar(CP_ACP, 0, lpProtocolInfo->szProtocol, -1, | 
 |                               info.szProtocol, WSAPROTOCOL_LEN + 1); | 
 |  | 
 |     if (!len) | 
 |     { | 
 |         WSASetLastError( WSAEINVAL); | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     return WSASocketW(af, type, protocol, &info, g, dwFlags); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSASocketW          (WS2_32.79) | 
 |  * | 
 |  */ | 
 | SOCKET WINAPI WSASocketW(int af, int type, int protocol, | 
 |                          LPWSAPROTOCOL_INFOW lpProtocolInfo, | 
 |                          GROUP g, DWORD dwFlags) | 
 | { | 
 |     SOCKET ret; | 
 |  | 
 |    /* | 
 |       FIXME: The "advanced" parameters of WSASocketW (lpProtocolInfo, | 
 |       g, dwFlags except WSA_FLAG_OVERLAPPED) are ignored. | 
 |    */ | 
 |  | 
 |    TRACE("af=%d type=%d protocol=%d protocol_info=%p group=%d flags=0x%x\n", | 
 |          af, type, protocol, lpProtocolInfo, g, dwFlags ); | 
 |  | 
 |     /* hack for WSADuplicateSocket */ | 
 |     if (lpProtocolInfo && lpProtocolInfo->dwServiceFlags4 == 0xff00ff00) { | 
 |       ret = lpProtocolInfo->dwCatalogEntryId; | 
 |       TRACE("\tgot duplicate %04lx\n", ret); | 
 |       return ret; | 
 |     } | 
 |  | 
 |     /* check and convert the socket family */ | 
 |     af = convert_af_w2u(af); | 
 |     if (af == -1) | 
 |     { | 
 |       FIXME("Unsupported socket family %d!\n", af); | 
 |       SetLastError(WSAEAFNOSUPPORT); | 
 |       return INVALID_SOCKET; | 
 |     } | 
 |  | 
 |     /* check the socket type */ | 
 |     type = convert_socktype_w2u(type); | 
 |     if (type == -1) | 
 |     { | 
 |       SetLastError(WSAESOCKTNOSUPPORT); | 
 |       return INVALID_SOCKET; | 
 |     } | 
 |  | 
 |     /* check the protocol type */ | 
 |     if ( protocol < 0 )  /* don't support negative values */ | 
 |     { | 
 |         SetLastError(WSAEPROTONOSUPPORT); | 
 |         return INVALID_SOCKET; | 
 |     } | 
 |  | 
 |     if ( af == AF_UNSPEC)  /* did they not specify the address family? */ | 
 |         switch(protocol) | 
 | 	{ | 
 |           case IPPROTO_TCP: | 
 |              if (type == SOCK_STREAM) { af = AF_INET; break; } | 
 |           case IPPROTO_UDP: | 
 |              if (type == SOCK_DGRAM)  { af = AF_INET; break; } | 
 |           default: SetLastError(WSAEPROTOTYPE); return INVALID_SOCKET; | 
 |         } | 
 |  | 
 |     SERVER_START_REQ( create_socket ) | 
 |     { | 
 |         req->family     = af; | 
 |         req->type       = type; | 
 |         req->protocol   = protocol; | 
 |         req->access     = GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE; | 
 |         req->attributes = OBJ_INHERIT; | 
 |         req->flags      = dwFlags; | 
 |         set_error( wine_server_call( req ) ); | 
 |         ret = HANDLE2SOCKET( reply->handle ); | 
 |     } | 
 |     SERVER_END_REQ; | 
 |     if (ret) | 
 |     { | 
 |         TRACE("\tcreated %04lx\n", ret ); | 
 |         return ret; | 
 |     } | 
 |  | 
 |     if (GetLastError() == WSAEACCES) /* raw socket denied */ | 
 |     { | 
 |         if (type == SOCK_RAW) | 
 |             MESSAGE("WARNING: Trying to create a socket of type SOCK_RAW, this" | 
 |                     " will fail unless you have special permissions.\n"); | 
 |         else | 
 |             MESSAGE("WS_SOCKET: Failed to create socket, this requires" | 
 |                     " special permissions.\n"); | 
 |         SetLastError(WSAESOCKTNOSUPPORT); | 
 |     } | 
 |  | 
 |     WARN("\t\tfailed!\n"); | 
 |     return INVALID_SOCKET; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSAJoinLeaf          (WS2_32.58) | 
 |  * | 
 |  */ | 
 | SOCKET WINAPI WSAJoinLeaf( | 
 |         SOCKET s, | 
 |         const struct WS_sockaddr *addr, | 
 |         int addrlen, | 
 |         LPWSABUF lpCallerData, | 
 |         LPWSABUF lpCalleeData, | 
 |         LPQOS lpSQOS, | 
 |         LPQOS lpGQOS, | 
 |         DWORD dwFlags) | 
 | { | 
 |     FIXME("stub.\n"); | 
 |     return INVALID_SOCKET; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *      __WSAFDIsSet			(WS2_32.151) | 
 |  */ | 
 | int WINAPI __WSAFDIsSet(SOCKET s, WS_fd_set *set) | 
 | { | 
 |   int i = set->fd_count; | 
 |  | 
 |   TRACE("(%ld,%p(%i))\n", s, set, i); | 
 |  | 
 |   while (i--) | 
 |       if (set->fd_array[i] == s) return 1; | 
 |   return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSAIsBlocking			(WINSOCK.114) | 
 |  *      WSAIsBlocking			(WS2_32.114) | 
 |  */ | 
 | BOOL WINAPI WSAIsBlocking(void) | 
 | { | 
 |   /* By default WinSock should set all its sockets to non-blocking mode | 
 |    * and poll in PeekMessage loop when processing "blocking" ones. This | 
 |    * function is supposed to tell if the program is in this loop. Our | 
 |    * blocking calls are truly blocking so we always return FALSE. | 
 |    * | 
 |    * Note: It is allowed to call this function without prior WSAStartup(). | 
 |    */ | 
 |  | 
 |   TRACE("\n"); | 
 |   return FALSE; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSACancelBlockingCall		(WINSOCK.113) | 
 |  *      WSACancelBlockingCall		(WS2_32.113) | 
 |  */ | 
 | INT WINAPI WSACancelBlockingCall(void) | 
 | { | 
 |     TRACE("\n"); | 
 |     return 0; | 
 | } | 
 |  | 
 | static INT WINAPI WSA_DefaultBlockingHook( FARPROC x ) | 
 | { | 
 |     FIXME("How was this called?\n"); | 
 |     return x(); | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSASetBlockingHook (WS2_32.109) | 
 |  */ | 
 | FARPROC WINAPI WSASetBlockingHook(FARPROC lpBlockFunc) | 
 | { | 
 |   FARPROC prev = blocking_hook; | 
 |   blocking_hook = lpBlockFunc; | 
 |   TRACE("hook %p\n", lpBlockFunc); | 
 |   return prev; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *      WSAUnhookBlockingHook (WS2_32.110) | 
 |  */ | 
 | INT WINAPI WSAUnhookBlockingHook(void) | 
 | { | 
 |     blocking_hook = (FARPROC)WSA_DefaultBlockingHook; | 
 |     return 0; | 
 | } | 
 |  | 
 |  | 
 | /* ----------------------------------- end of API stuff */ | 
 |  | 
 | /* ----------------------------------- helper functions - | 
 |  * | 
 |  * TODO: Merge WS_dup_..() stuff into one function that | 
 |  * would operate with a generic structure containing internal | 
 |  * pointers (via a template of some kind). | 
 |  */ | 
 |  | 
 | static int list_size(char** l, int item_size) | 
 | { | 
 |   int i,j = 0; | 
 |   if(l) | 
 |   { for(i=0;l[i];i++) | 
 | 	j += (item_size) ? item_size : strlen(l[i]) + 1; | 
 |     j += (i + 1) * sizeof(char*); } | 
 |   return j; | 
 | } | 
 |  | 
 | static int list_dup(char** l_src, char** l_to, int item_size) | 
 | { | 
 |    char *p; | 
 |    int i; | 
 |  | 
 |    for (i = 0; l_src[i]; i++) ; | 
 |    p = (char *)(l_to + i + 1); | 
 |    for (i = 0; l_src[i]; i++) | 
 |    { | 
 |        int count = ( item_size ) ? item_size : strlen(l_src[i]) + 1; | 
 |        memcpy(p, l_src[i], count); | 
 |        l_to[i] = p; | 
 |        p += count; | 
 |    } | 
 |    l_to[i] = NULL; | 
 |    return p - (char *)l_to; | 
 | } | 
 |  | 
 | /* ----- hostent */ | 
 |  | 
 | /* duplicate hostent entry | 
 |  * and handle all Win16/Win32 dependent things (struct size, ...) *correctly*. | 
 |  * Dito for protoent and servent. | 
 |  */ | 
 | static struct WS_hostent *WS_dup_he(const struct hostent* p_he) | 
 | { | 
 |     char *p; | 
 |     struct WS_hostent *p_to; | 
 |  | 
 |     int size = (sizeof(*p_he) + | 
 |                 strlen(p_he->h_name) + 1 + | 
 |                 list_size(p_he->h_aliases, 0) + | 
 |                 list_size(p_he->h_addr_list, p_he->h_length)); | 
 |  | 
 |     if (!(p_to = check_buffer_he(size))) return NULL; | 
 |     p_to->h_addrtype = p_he->h_addrtype; | 
 |     p_to->h_length = p_he->h_length; | 
 |  | 
 |     p = (char *)(p_to + 1); | 
 |     p_to->h_name = p; | 
 |     strcpy(p, p_he->h_name); | 
 |     p += strlen(p) + 1; | 
 |  | 
 |     p_to->h_aliases = (char **)p; | 
 |     p += list_dup(p_he->h_aliases, p_to->h_aliases, 0); | 
 |  | 
 |     p_to->h_addr_list = (char **)p; | 
 |     list_dup(p_he->h_addr_list, p_to->h_addr_list, p_he->h_length); | 
 |     return p_to; | 
 | } | 
 |  | 
 | /* ----- protoent */ | 
 |  | 
 | static struct WS_protoent *WS_dup_pe(const struct protoent* p_pe) | 
 | { | 
 |     char *p; | 
 |     struct WS_protoent *p_to; | 
 |  | 
 |     int size = (sizeof(*p_pe) + | 
 |                 strlen(p_pe->p_name) + 1 + | 
 |                 list_size(p_pe->p_aliases, 0)); | 
 |  | 
 |     if (!(p_to = check_buffer_pe(size))) return NULL; | 
 |     p_to->p_proto = p_pe->p_proto; | 
 |  | 
 |     p = (char *)(p_to + 1); | 
 |     p_to->p_name = p; | 
 |     strcpy(p, p_pe->p_name); | 
 |     p += strlen(p) + 1; | 
 |  | 
 |     p_to->p_aliases = (char **)p; | 
 |     list_dup(p_pe->p_aliases, p_to->p_aliases, 0); | 
 |     return p_to; | 
 | } | 
 |  | 
 | /* ----- servent */ | 
 |  | 
 | static struct WS_servent *WS_dup_se(const struct servent* p_se) | 
 | { | 
 |     char *p; | 
 |     struct WS_servent *p_to; | 
 |  | 
 |     int size = (sizeof(*p_se) + | 
 |                 strlen(p_se->s_proto) + 1 + | 
 |                 strlen(p_se->s_name) + 1 + | 
 |                 list_size(p_se->s_aliases, 0)); | 
 |  | 
 |     if (!(p_to = check_buffer_se(size))) return NULL; | 
 |     p_to->s_port = p_se->s_port; | 
 |  | 
 |     p = (char *)(p_to + 1); | 
 |     p_to->s_name = p; | 
 |     strcpy(p, p_se->s_name); | 
 |     p += strlen(p) + 1; | 
 |  | 
 |     p_to->s_proto = p; | 
 |     strcpy(p, p_se->s_proto); | 
 |     p += strlen(p) + 1; | 
 |  | 
 |     p_to->s_aliases = (char **)p; | 
 |     list_dup(p_se->s_aliases, p_to->s_aliases, 0); | 
 |     return p_to; | 
 | } | 
 |  | 
 | /* ----------------------------------- error handling */ | 
 |  | 
 | UINT wsaErrno(void) | 
 | { | 
 |     int	loc_errno = errno; | 
 |     WARN("errno %d, (%s).\n", loc_errno, strerror(loc_errno)); | 
 |  | 
 |     switch(loc_errno) | 
 |     { | 
 | 	case EINTR:		return WSAEINTR; | 
 | 	case EBADF:		return WSAEBADF; | 
 | 	case EPERM: | 
 | 	case EACCES:		return WSAEACCES; | 
 | 	case EFAULT:		return WSAEFAULT; | 
 | 	case EINVAL:		return WSAEINVAL; | 
 | 	case EMFILE:		return WSAEMFILE; | 
 | 	case EWOULDBLOCK:	return WSAEWOULDBLOCK; | 
 | 	case EINPROGRESS:	return WSAEINPROGRESS; | 
 | 	case EALREADY:		return WSAEALREADY; | 
 | 	case ENOTSOCK:		return WSAENOTSOCK; | 
 | 	case EDESTADDRREQ:	return WSAEDESTADDRREQ; | 
 | 	case EMSGSIZE:		return WSAEMSGSIZE; | 
 | 	case EPROTOTYPE:	return WSAEPROTOTYPE; | 
 | 	case ENOPROTOOPT:	return WSAENOPROTOOPT; | 
 | 	case EPROTONOSUPPORT:	return WSAEPROTONOSUPPORT; | 
 | 	case ESOCKTNOSUPPORT:	return WSAESOCKTNOSUPPORT; | 
 | 	case EOPNOTSUPP:	return WSAEOPNOTSUPP; | 
 | 	case EPFNOSUPPORT:	return WSAEPFNOSUPPORT; | 
 | 	case EAFNOSUPPORT:	return WSAEAFNOSUPPORT; | 
 | 	case EADDRINUSE:	return WSAEADDRINUSE; | 
 | 	case EADDRNOTAVAIL:	return WSAEADDRNOTAVAIL; | 
 | 	case ENETDOWN:		return WSAENETDOWN; | 
 | 	case ENETUNREACH:	return WSAENETUNREACH; | 
 | 	case ENETRESET:		return WSAENETRESET; | 
 | 	case ECONNABORTED:	return WSAECONNABORTED; | 
 | 	case EPIPE: | 
 | 	case ECONNRESET:	return WSAECONNRESET; | 
 | 	case ENOBUFS:		return WSAENOBUFS; | 
 | 	case EISCONN:		return WSAEISCONN; | 
 | 	case ENOTCONN:		return WSAENOTCONN; | 
 | 	case ESHUTDOWN:		return WSAESHUTDOWN; | 
 | 	case ETOOMANYREFS:	return WSAETOOMANYREFS; | 
 | 	case ETIMEDOUT:		return WSAETIMEDOUT; | 
 | 	case ECONNREFUSED:	return WSAECONNREFUSED; | 
 | 	case ELOOP:		return WSAELOOP; | 
 | 	case ENAMETOOLONG:	return WSAENAMETOOLONG; | 
 | 	case EHOSTDOWN:		return WSAEHOSTDOWN; | 
 | 	case EHOSTUNREACH:	return WSAEHOSTUNREACH; | 
 | 	case ENOTEMPTY:		return WSAENOTEMPTY; | 
 | #ifdef EPROCLIM | 
 | 	case EPROCLIM:		return WSAEPROCLIM; | 
 | #endif | 
 | #ifdef EUSERS | 
 | 	case EUSERS:		return WSAEUSERS; | 
 | #endif | 
 | #ifdef EDQUOT | 
 | 	case EDQUOT:		return WSAEDQUOT; | 
 | #endif | 
 | #ifdef ESTALE | 
 | 	case ESTALE:		return WSAESTALE; | 
 | #endif | 
 | #ifdef EREMOTE | 
 | 	case EREMOTE:		return WSAEREMOTE; | 
 | #endif | 
 |  | 
 |        /* just in case we ever get here and there are no problems */ | 
 | 	case 0:			return 0; | 
 |         default: | 
 | 		WARN("Unknown errno %d!\n", loc_errno); | 
 | 		return WSAEOPNOTSUPP; | 
 |     } | 
 | } | 
 |  | 
 | UINT wsaHerrno(int loc_errno) | 
 | { | 
 |  | 
 |     WARN("h_errno %d.\n", loc_errno); | 
 |  | 
 |     switch(loc_errno) | 
 |     { | 
 | 	case HOST_NOT_FOUND:	return WSAHOST_NOT_FOUND; | 
 | 	case TRY_AGAIN:		return WSATRY_AGAIN; | 
 | 	case NO_RECOVERY:	return WSANO_RECOVERY; | 
 | 	case NO_DATA:		return WSANO_DATA; | 
 | 	case ENOBUFS:		return WSAENOBUFS; | 
 |  | 
 | 	case 0:			return 0; | 
 |         default: | 
 | 		WARN("Unknown h_errno %d!\n", loc_errno); | 
 | 		return WSAEOPNOTSUPP; | 
 |     } | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *		WSARecv			(WS2_32.67) | 
 |  */ | 
 | int WINAPI WSARecv(SOCKET s, LPWSABUF lpBuffers, DWORD dwBufferCount, | 
 |                    LPDWORD NumberOfBytesReceived, LPDWORD lpFlags, | 
 |                    LPWSAOVERLAPPED lpOverlapped, | 
 |                    LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine) | 
 | { | 
 |     return WSARecvFrom(s, lpBuffers, dwBufferCount, NumberOfBytesReceived, lpFlags, | 
 |                        NULL, NULL, lpOverlapped, lpCompletionRoutine); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSARecvFrom             (WS2_32.69) | 
 |  */ | 
 | INT WINAPI WSARecvFrom( SOCKET s, LPWSABUF lpBuffers, DWORD dwBufferCount, | 
 |                         LPDWORD lpNumberOfBytesRecvd, LPDWORD lpFlags, struct WS_sockaddr *lpFrom, | 
 |                         LPINT lpFromlen, LPWSAOVERLAPPED lpOverlapped, | 
 |                         LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine ) | 
 |  | 
 | { | 
 |     unsigned int i, options; | 
 |     int n, fd, err; | 
 |     DWORD timeout_start = GetTickCount(); | 
 |     struct iovec iovec[WS_MSG_MAXIOVLEN]; | 
 |  | 
 |     TRACE("socket %04lx, wsabuf %p, nbufs %d, flags %d, from %p, fromlen %d, ovl %p, func %p\n", | 
 |           s, lpBuffers, dwBufferCount, *lpFlags, lpFrom, | 
 |           (lpFromlen ? *lpFromlen : -1), | 
 |           lpOverlapped, lpCompletionRoutine); | 
 |  | 
 |     if (dwBufferCount > WS_MSG_MAXIOVLEN) | 
 |     { | 
 |         WSASetLastError( WSAEINVAL ); | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     fd = get_sock_fd( s, FILE_READ_DATA, &options ); | 
 |     TRACE( "fd=%d, options=%x\n", fd, options ); | 
 |  | 
 |     if (fd == -1) return SOCKET_ERROR; | 
 |  | 
 |     for (i = 0; i < dwBufferCount; i++) | 
 |     { | 
 |         iovec[i].iov_base = lpBuffers[i].buf; | 
 |         iovec[i].iov_len  = lpBuffers[i].len; | 
 |     } | 
 |  | 
 |     for (;;) | 
 |     { | 
 |         n = WS2_recv( fd, iovec, dwBufferCount, lpFrom, lpFromlen, lpFlags ); | 
 |         if (n == -1) | 
 |         { | 
 |             if (errno == EINTR) continue; | 
 |             if (errno != EAGAIN) | 
 |             { | 
 |                 err = wsaErrno(); | 
 |                 goto error; | 
 |             } | 
 |         } | 
 |         else | 
 |             *lpNumberOfBytesRecvd = n; | 
 |  | 
 |         if ((lpOverlapped || lpCompletionRoutine) && | 
 |              !(options & (FILE_SYNCHRONOUS_IO_ALERT | FILE_SYNCHRONOUS_IO_NONALERT))) | 
 |         { | 
 |             IO_STATUS_BLOCK *iosb; | 
 |             struct ws2_async *wsa = HeapAlloc( GetProcessHeap(), 0, sizeof(*wsa) ); | 
 |  | 
 |             if ( !wsa ) | 
 |             { | 
 |                 err = WSAEFAULT; | 
 |                 goto error; | 
 |             } | 
 |             release_sock_fd( s, fd ); | 
 |  | 
 |             wsa->hSocket         = SOCKET2HANDLE(s); | 
 |             wsa->flags           = *lpFlags; | 
 |             wsa->addr            = lpFrom; | 
 |             wsa->addrlen.ptr     = lpFromlen; | 
 |             wsa->user_overlapped = lpOverlapped; | 
 |             wsa->completion_func = lpCompletionRoutine; | 
 |             wsa->n_iovecs        = dwBufferCount; | 
 |             memcpy( wsa->iovec, iovec, dwBufferCount * sizeof(*iovec) ); | 
 |  | 
 |             iosb = lpOverlapped ? (IO_STATUS_BLOCK *)lpOverlapped : &wsa->local_iosb; | 
 |  | 
 |             if (n == -1) | 
 |             { | 
 |                 iosb->u.Status = STATUS_PENDING; | 
 |                 iosb->Information = 0; | 
 |  | 
 |                 SERVER_START_REQ( register_async ) | 
 |                 { | 
 |                     req->handle = wsa->hSocket; | 
 |                     req->type   = ASYNC_TYPE_READ; | 
 |                     req->async.callback = WS2_async_recv; | 
 |                     req->async.iosb     = iosb; | 
 |                     req->async.arg      = wsa; | 
 |                     req->async.apc      = ws2_async_apc; | 
 |                     req->async.event    = lpCompletionRoutine ? 0 : lpOverlapped->hEvent; | 
 |                     err = wine_server_call( req ); | 
 |                 } | 
 |                 SERVER_END_REQ; | 
 |  | 
 |                 if (err != STATUS_PENDING) HeapFree( GetProcessHeap(), 0, wsa ); | 
 |                 WSASetLastError( NtStatusToWSAError( err )); | 
 |                 return SOCKET_ERROR; | 
 |             } | 
 |  | 
 |             iosb->u.Status = STATUS_SUCCESS; | 
 |             iosb->Information = n; | 
 |             if (!wsa->completion_func) | 
 |             { | 
 |                 SetEvent( lpOverlapped->hEvent ); | 
 |                 HeapFree( GetProcessHeap(), 0, wsa ); | 
 |             } | 
 |             else NtQueueApcThread( GetCurrentThread(), (PNTAPCFUNC)ws2_async_apc, | 
 |                                    (ULONG_PTR)wsa, (ULONG_PTR)iosb, 0 ); | 
 |             _enable_event(SOCKET2HANDLE(s), FD_READ, 0, 0); | 
 |             return 0; | 
 |         } | 
 |  | 
 |         if (n != -1) break; | 
 |  | 
 |         if ( _is_blocking(s) ) | 
 |         { | 
 |             struct pollfd pfd; | 
 |             int timeout = GET_RCVTIMEO(fd); | 
 |             if (timeout != -1) | 
 |             { | 
 |                 timeout -= GetTickCount() - timeout_start; | 
 |                 if (timeout < 0) timeout = 0; | 
 |             } | 
 |  | 
 |             pfd.fd = fd; | 
 |             pfd.events = POLLIN; | 
 |             if (*lpFlags & WS_MSG_OOB) pfd.events |= POLLPRI; | 
 |  | 
 |             if (!timeout || !poll( &pfd, 1, timeout )) | 
 |             { | 
 |                 err = WSAETIMEDOUT; | 
 |                 /* a timeout is not fatal */ | 
 |                 _enable_event(SOCKET2HANDLE(s), FD_READ, 0, 0); | 
 |                 goto error; | 
 |             } | 
 |         } | 
 |         else | 
 |         { | 
 |             _enable_event(SOCKET2HANDLE(s), FD_READ, 0, 0); | 
 |             err = WSAEWOULDBLOCK; | 
 |             goto error; | 
 |         } | 
 |     } | 
 |  | 
 |     TRACE(" -> %i bytes\n", n); | 
 |     release_sock_fd( s, fd ); | 
 |     _enable_event(SOCKET2HANDLE(s), FD_READ, 0, 0); | 
 |  | 
 |     return 0; | 
 |  | 
 | error: | 
 |     release_sock_fd( s, fd ); | 
 |     WARN(" -> ERROR %d\n", err); | 
 |     WSASetLastError( err ); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSCInstallProvider             (WS2_32.88) | 
 |  */ | 
 | INT WINAPI WSCInstallProvider( const LPGUID lpProviderId, | 
 |                                LPCWSTR lpszProviderDllPath, | 
 |                                const LPWSAPROTOCOL_INFOW lpProtocolInfoList, | 
 |                                DWORD dwNumberOfEntries, | 
 |                                LPINT lpErrno ) | 
 | { | 
 |     FIXME("(%s, %s, %p, %d, %p): stub !\n", debugstr_guid(lpProviderId), | 
 |           debugstr_w(lpszProviderDllPath), lpProtocolInfoList, | 
 |           dwNumberOfEntries, lpErrno); | 
 |     *lpErrno = 0; | 
 |     return 0; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSCDeinstallProvider             (WS2_32.83) | 
 |  */ | 
 | INT WINAPI WSCDeinstallProvider(LPGUID lpProviderId, LPINT lpErrno) | 
 | { | 
 |     FIXME("(%s, %p): stub !\n", debugstr_guid(lpProviderId), lpErrno); | 
 |     *lpErrno = 0; | 
 |     return 0; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAAccept                        (WS2_32.26) | 
 |  */ | 
 | SOCKET WINAPI WSAAccept( SOCKET s, struct WS_sockaddr *addr, LPINT addrlen, | 
 |                LPCONDITIONPROC lpfnCondition, DWORD dwCallbackData) | 
 | { | 
 |  | 
 |        int ret = 0, size = 0; | 
 |        WSABUF CallerId, CallerData, CalleeId, CalleeData; | 
 |        /*        QOS SQOS, GQOS; */ | 
 |        GROUP g; | 
 |        SOCKET cs; | 
 |        SOCKADDR src_addr, dst_addr; | 
 |  | 
 |        TRACE("Socket %04lx, sockaddr %p, addrlen %p, fnCondition %p, dwCallbackData %d\n", | 
 |                s, addr, addrlen, lpfnCondition, dwCallbackData); | 
 |  | 
 |  | 
 |        size = sizeof(src_addr); | 
 |        cs = WS_accept(s, &src_addr, &size); | 
 |  | 
 |        if (cs == SOCKET_ERROR) return SOCKET_ERROR; | 
 |  | 
 |        CallerId.buf = (char *)&src_addr; | 
 |        CallerId.len = sizeof(src_addr); | 
 |  | 
 |        CallerData.buf = NULL; | 
 |        CallerData.len = (ULONG)NULL; | 
 |  | 
 |        WS_getsockname(cs, &dst_addr, &size); | 
 |  | 
 |        CalleeId.buf = (char *)&dst_addr; | 
 |        CalleeId.len = sizeof(dst_addr); | 
 |  | 
 |  | 
 |        ret = (*lpfnCondition)(&CallerId, &CallerData, NULL, NULL, | 
 |                        &CalleeId, &CalleeData, &g, dwCallbackData); | 
 |  | 
 |        switch (ret) | 
 |        { | 
 |                case CF_ACCEPT: | 
 |                        if (addr && addrlen) | 
 |                                addr = memcpy(addr, &src_addr, (*addrlen > size) ?  size : *addrlen ); | 
 |                        return cs; | 
 |                case CF_DEFER: | 
 |                        SERVER_START_REQ( set_socket_deferred ) | 
 |                        { | 
 |                            req->handle = SOCKET2HANDLE(s); | 
 |                            req->deferred = SOCKET2HANDLE(cs); | 
 |                            if ( !wine_server_call_err ( req ) ) | 
 |                            { | 
 |                                SetLastError( WSATRY_AGAIN ); | 
 |                                WS_closesocket( cs ); | 
 |                            } | 
 |                        } | 
 |                        SERVER_END_REQ; | 
 |                        return SOCKET_ERROR; | 
 |                case CF_REJECT: | 
 |                        WS_closesocket(cs); | 
 |                        SetLastError(WSAECONNREFUSED); | 
 |                        return SOCKET_ERROR; | 
 |                default: | 
 |                        FIXME("Unknown return type from Condition function\n"); | 
 |                        SetLastError(WSAENOTSOCK); | 
 |                        return SOCKET_ERROR; | 
 |                } | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSADuplicateSocketA                      (WS2_32.32) | 
 |  */ | 
 | int WINAPI WSADuplicateSocketA( SOCKET s, DWORD dwProcessId, LPWSAPROTOCOL_INFOA lpProtocolInfo ) | 
 | { | 
 |    HANDLE hProcess; | 
 |  | 
 |    TRACE("(%ld,%x,%p)\n", s, dwProcessId, lpProtocolInfo); | 
 |    memset(lpProtocolInfo, 0, sizeof(*lpProtocolInfo)); | 
 |    /* FIXME: WS_getsockopt(s, WS_SOL_SOCKET, SO_PROTOCOL_INFO, lpProtocolInfo, sizeof(*lpProtocolInfo)); */ | 
 |    /* I don't know what the real Windoze does next, this is a hack */ | 
 |    /* ...we could duplicate and then use ConvertToGlobalHandle on the duplicate, then let | 
 |     * the target use the global duplicate, or we could copy a reference to us to the structure | 
 |     * and let the target duplicate it from us, but let's do it as simple as possible */ | 
 |    hProcess = OpenProcess(PROCESS_DUP_HANDLE, FALSE, dwProcessId); | 
 |    DuplicateHandle(GetCurrentProcess(), SOCKET2HANDLE(s), | 
 |                    hProcess, (LPHANDLE)&lpProtocolInfo->dwCatalogEntryId, | 
 |                    0, FALSE, DUPLICATE_SAME_ACCESS); | 
 |    CloseHandle(hProcess); | 
 |    lpProtocolInfo->dwServiceFlags4 = 0xff00ff00; /* magic */ | 
 |    return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSADuplicateSocketW                      (WS2_32.33) | 
 |  */ | 
 | int WINAPI WSADuplicateSocketW( SOCKET s, DWORD dwProcessId, LPWSAPROTOCOL_INFOW lpProtocolInfo ) | 
 | { | 
 |    HANDLE hProcess; | 
 |  | 
 |    TRACE("(%ld,%x,%p)\n", s, dwProcessId, lpProtocolInfo); | 
 |  | 
 |    memset(lpProtocolInfo, 0, sizeof(*lpProtocolInfo)); | 
 |    hProcess = OpenProcess(PROCESS_DUP_HANDLE, FALSE, dwProcessId); | 
 |    DuplicateHandle(GetCurrentProcess(), SOCKET2HANDLE(s), | 
 |                    hProcess, (LPHANDLE)&lpProtocolInfo->dwCatalogEntryId, | 
 |                    0, FALSE, DUPLICATE_SAME_ACCESS); | 
 |    CloseHandle(hProcess); | 
 |    lpProtocolInfo->dwServiceFlags4 = 0xff00ff00; /* magic */ | 
 |    return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAInstallServiceClassA                  (WS2_32.48) | 
 |  */ | 
 | int WINAPI WSAInstallServiceClassA(LPWSASERVICECLASSINFOA info) | 
 | { | 
 |     FIXME("Request to install service %s\n",debugstr_a(info->lpszServiceClassName)); | 
 |     WSASetLastError(WSAEACCES); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAInstallServiceClassW                  (WS2_32.49) | 
 |  */ | 
 | int WINAPI WSAInstallServiceClassW(LPWSASERVICECLASSINFOW info) | 
 | { | 
 |     FIXME("Request to install service %s\n",debugstr_w(info->lpszServiceClassName)); | 
 |     WSASetLastError(WSAEACCES); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSARemoveServiceClass                    (WS2_32.70) | 
 |  */ | 
 | int WINAPI WSARemoveServiceClass(LPGUID info) | 
 | { | 
 |     FIXME("Request to remove service %p\n",info); | 
 |     WSASetLastError(WSATYPE_NOT_FOUND); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAStringToAddressA                      (WS2_32.80) | 
 |  */ | 
 | INT WINAPI WSAStringToAddressA(LPSTR AddressString, | 
 |                                INT AddressFamily, | 
 |                                LPWSAPROTOCOL_INFOA lpProtocolInfo, | 
 |                                LPSOCKADDR lpAddress, | 
 |                                LPINT lpAddressLength) | 
 | { | 
 |     INT res=0; | 
 |     LPSTR workBuffer=NULL,ptrPort; | 
 |  | 
 |     TRACE( "(%s, %x, %p, %p, %p)\n", AddressString, AddressFamily, lpProtocolInfo, | 
 |            lpAddress, lpAddressLength ); | 
 |  | 
 |     if (!lpAddressLength || !lpAddress) return SOCKET_ERROR; | 
 |  | 
 |     if (!AddressString) | 
 |     { | 
 |         WSASetLastError(WSAEINVAL); | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     if (lpProtocolInfo) | 
 |         FIXME("ProtocolInfo not implemented.\n"); | 
 |  | 
 |     workBuffer = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, | 
 |                             strlen(AddressString) + 1); | 
 |     if (!workBuffer) | 
 |     { | 
 |         WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     strcpy(workBuffer, AddressString); | 
 |  | 
 |     switch(AddressFamily) | 
 |     { | 
 |     case WS_AF_INET: | 
 |     { | 
 |         struct in_addr inetaddr; | 
 |  | 
 |         /* If lpAddressLength is too small, tell caller the size we need */ | 
 |         if (*lpAddressLength < sizeof(SOCKADDR_IN)) | 
 |         { | 
 |             *lpAddressLength = sizeof(SOCKADDR_IN); | 
 |             res = WSAEFAULT; | 
 |             break; | 
 |         } | 
 |         memset(lpAddress, 0, sizeof(SOCKADDR_IN)); | 
 |  | 
 |         ((LPSOCKADDR_IN)lpAddress)->sin_family = AF_INET; | 
 |  | 
 |         ptrPort = strchr(workBuffer, ':'); | 
 |         if(ptrPort) | 
 |         { | 
 |             ((LPSOCKADDR_IN)lpAddress)->sin_port = (WS_u_short)atoi(ptrPort+1); | 
 |             *ptrPort = '\0'; | 
 |         } | 
 |         else | 
 |         { | 
 |             ((LPSOCKADDR_IN)lpAddress)->sin_port = 0; | 
 |         } | 
 |  | 
 |         if(inet_aton(workBuffer, &inetaddr) > 0) | 
 |         { | 
 |             ((LPSOCKADDR_IN)lpAddress)->sin_addr.WS_s_addr = inetaddr.s_addr; | 
 |             res = 0; | 
 |         } | 
 |         else | 
 |             res = WSAEINVAL; | 
 |  | 
 |         break; | 
 |  | 
 |     } | 
 |     case WS_AF_INET6: | 
 |     { | 
 |         struct in6_addr inetaddr; | 
 |         /* If lpAddressLength is too small, tell caller the size we need */ | 
 |         if (*lpAddressLength < sizeof(SOCKADDR_IN6)) | 
 |         { | 
 |             *lpAddressLength = sizeof(SOCKADDR_IN6); | 
 |             res = WSAEFAULT; | 
 |             break; | 
 |         } | 
 | #ifdef HAVE_INET_PTON | 
 |         memset(lpAddress, 0, sizeof(SOCKADDR_IN6)); | 
 |  | 
 |         ((LPSOCKADDR_IN6)lpAddress)->sin6_family = WS_AF_INET6; | 
 |  | 
 |         /* This one is a bit tricky. An IPv6 address contains colons, so the | 
 |          * check from IPv4 doesn't work like that. However, IPv6 addresses that | 
 |          * contain a port are written with braces like [fd12:3456:7890::1]:12345 | 
 |          * so what we will do is to look for ']', check if the next char is a | 
 |          * colon, and if it is, parse the port as in IPv4. */ | 
 |  | 
 |         ptrPort = strchr(workBuffer, ']'); | 
 |         if(ptrPort && *(++ptrPort) == ':') | 
 |         { | 
 |             ((LPSOCKADDR_IN6)lpAddress)->sin6_port = (WS_u_short)atoi(ptrPort+1); | 
 |             *ptrPort = '\0'; | 
 |         } | 
 |         else | 
 |         { | 
 |             ((LPSOCKADDR_IN6)lpAddress)->sin6_port = 0; | 
 |         } | 
 |  | 
 |         if(inet_pton(AF_INET6, workBuffer, &inetaddr) > 0) | 
 |         { | 
 |             memcpy(&((LPSOCKADDR_IN6)lpAddress)->sin6_addr, &inetaddr, | 
 |                     sizeof(struct in6_addr)); | 
 |             res = 0; | 
 |         } | 
 |         else | 
 | #endif /* HAVE_INET_PTON */ | 
 |             res = WSAEINVAL; | 
 |  | 
 |         break; | 
 |     } | 
 |     default: | 
 |         /* According to MSDN, only AF_INET and AF_INET6 are supported. */ | 
 |         TRACE("Unsupported address family specified: %d.\n", AddressFamily); | 
 |         res = WSAEINVAL; | 
 |     } | 
 |  | 
 |     HeapFree(GetProcessHeap(), 0, workBuffer); | 
 |  | 
 |     if (!res) return 0; | 
 |     WSASetLastError(res); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAStringToAddressW                      (WS2_32.81) | 
 |  * | 
 |  * Does anybody know if this functions allows to use hebrew/arabic/chinese... digits? | 
 |  * If this should be the case, it would be required to map these digits | 
 |  * to Unicode digits (0-9) using FoldString first. | 
 |  */ | 
 | INT WINAPI WSAStringToAddressW(LPWSTR AddressString, | 
 |                                INT AddressFamily, | 
 |                                LPWSAPROTOCOL_INFOW lpProtocolInfo, | 
 |                                LPSOCKADDR lpAddress, | 
 |                                LPINT lpAddressLength) | 
 | { | 
 |     INT sBuffer,res=0; | 
 |     LPSTR workBuffer=NULL; | 
 |     WSAPROTOCOL_INFOA infoA; | 
 |     LPWSAPROTOCOL_INFOA lpProtoInfoA = NULL; | 
 |  | 
 |     TRACE( "(%s, %x, %p, %p, %p)\n", debugstr_w(AddressString), AddressFamily, lpProtocolInfo, | 
 |            lpAddress, lpAddressLength ); | 
 |  | 
 |     if (!lpAddressLength || !lpAddress) return SOCKET_ERROR; | 
 |  | 
 |     /* if ProtocolInfo is available - convert to ANSI variant */ | 
 |     if (lpProtocolInfo) | 
 |     { | 
 |         lpProtoInfoA = &infoA; | 
 |         memcpy( lpProtoInfoA, lpProtocolInfo, FIELD_OFFSET( WSAPROTOCOL_INFOA, szProtocol ) ); | 
 |  | 
 |         if (!WideCharToMultiByte( CP_ACP, 0, lpProtocolInfo->szProtocol, -1, | 
 |                                   lpProtoInfoA->szProtocol, WSAPROTOCOL_LEN+1, NULL, NULL )) | 
 |         { | 
 |             WSASetLastError( WSAEINVAL); | 
 |             return SOCKET_ERROR; | 
 |         } | 
 |     } | 
 |  | 
 |     if (AddressString) | 
 |     { | 
 |         /* Translate AddressString to ANSI code page - assumes that only | 
 |            standard digits 0-9 are used with this API call */ | 
 |         sBuffer = WideCharToMultiByte( CP_ACP, 0, AddressString, -1, NULL, 0, NULL, NULL ); | 
 |         workBuffer = HeapAlloc( GetProcessHeap(), 0, sBuffer ); | 
 |  | 
 |         if (workBuffer) | 
 |         { | 
 |             WideCharToMultiByte( CP_ACP, 0, AddressString, -1, workBuffer, sBuffer, NULL, NULL ); | 
 |             res = WSAStringToAddressA(workBuffer,AddressFamily,lpProtoInfoA, | 
 |                                       lpAddress,lpAddressLength); | 
 |             HeapFree( GetProcessHeap(), 0, workBuffer ); | 
 |             return res; | 
 |         } | 
 |         else | 
 |             res = WSA_NOT_ENOUGH_MEMORY; | 
 |     } | 
 |     else | 
 |         res = WSAEINVAL; | 
 |  | 
 |     WSASetLastError(res); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAAddressToStringA                      (WS2_32.27) | 
 |  * | 
 |  *  See WSAAddressToStringW | 
 |  */ | 
 | INT WINAPI WSAAddressToStringA( LPSOCKADDR sockaddr, DWORD len, | 
 |                                 LPWSAPROTOCOL_INFOA info, LPSTR string, | 
 |                                 LPDWORD lenstr ) | 
 | { | 
 |     INT size; | 
 |     CHAR buffer[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */ | 
 |     CHAR *p; | 
 |  | 
 |     TRACE( "(%p, %d, %p, %p, %p)\n", sockaddr, len, info, string, lenstr ); | 
 |  | 
 |     if (!sockaddr || len < sizeof(SOCKADDR_IN)) return SOCKET_ERROR; | 
 |     if (!string || !lenstr) return SOCKET_ERROR; | 
 |  | 
 |     /* sin_family is guaranteed to be the first u_short */ | 
 |     if (((SOCKADDR_IN *)sockaddr)->sin_family != AF_INET) return SOCKET_ERROR; | 
 |  | 
 |     sprintf( buffer, "%u.%u.%u.%u:%u", | 
 |              (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 24 & 0xff), | 
 |              (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 16 & 0xff), | 
 |              (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 8 & 0xff), | 
 |              (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) & 0xff), | 
 |              ntohs( ((SOCKADDR_IN *)sockaddr)->sin_port ) ); | 
 |  | 
 |     p = strchr( buffer, ':' ); | 
 |     if (!((SOCKADDR_IN *)sockaddr)->sin_port) *p = 0; | 
 |  | 
 |     size = strlen( buffer ); | 
 |  | 
 |     if (*lenstr <  size) | 
 |     { | 
 |         *lenstr = size; | 
 |         WSASetLastError(WSAEFAULT); | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     strcpy( string, buffer ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAAddressToStringW                      (WS2_32.28) | 
 |  * | 
 |  * Convert a sockaddr address into a readable address string.  | 
 |  * | 
 |  * PARAMS | 
 |  *  sockaddr [I]    Pointer to a sockaddr structure. | 
 |  *  len      [I]    Size of the sockaddr structure. | 
 |  *  info     [I]    Pointer to a WSAPROTOCOL_INFOW structure (optional). | 
 |  *  string   [I/O]  Pointer to a buffer to receive the address string. | 
 |  *  lenstr   [I/O]  Size of the receive buffer in WCHARs. | 
 |  * | 
 |  * RETURNS | 
 |  *  Success: 0 | 
 |  *  Failure: SOCKET_ERROR | 
 |  * | 
 |  * NOTES | 
 |  *  The 'info' parameter is ignored. | 
 |  * | 
 |  * BUGS | 
 |  *  Only supports AF_INET addresses. | 
 |  */ | 
 | INT WINAPI WSAAddressToStringW( LPSOCKADDR sockaddr, DWORD len, | 
 |                                 LPWSAPROTOCOL_INFOW info, LPWSTR string, | 
 |                                 LPDWORD lenstr ) | 
 | { | 
 |     INT size; | 
 |     WCHAR buffer[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */ | 
 |     static const WCHAR format[] = { '%','u','.','%','u','.','%','u','.','%','u',':','%','u',0 }; | 
 |     WCHAR *p; | 
 |  | 
 |     TRACE( "(%p, %x, %p, %p, %p)\n", sockaddr, len, info, string, lenstr ); | 
 |  | 
 |     if (!sockaddr || len < sizeof(SOCKADDR_IN)) return SOCKET_ERROR; | 
 |     if (!string || !lenstr) return SOCKET_ERROR; | 
 |  | 
 |     /* sin_family is guaranteed to be the first u_short */ | 
 |     if (((SOCKADDR_IN *)sockaddr)->sin_family != AF_INET) return SOCKET_ERROR; | 
 |  | 
 |     sprintfW( buffer, format, | 
 |               (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 24 & 0xff), | 
 |               (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 16 & 0xff), | 
 |               (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 8 & 0xff), | 
 |               (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) & 0xff), | 
 |               ntohs( ((SOCKADDR_IN *)sockaddr)->sin_port ) ); | 
 |  | 
 |     p = strchrW( buffer, ':' ); | 
 |     if (!((SOCKADDR_IN *)sockaddr)->sin_port) *p = 0; | 
 |  | 
 |     size = lstrlenW( buffer ); | 
 |  | 
 |     if (*lenstr <  size) | 
 |     { | 
 |         *lenstr = size; | 
 |         return SOCKET_ERROR; | 
 |     } | 
 |  | 
 |     lstrcpyW( string, buffer ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAEnumNameSpaceProvidersA                  (WS2_32.34) | 
 |  */ | 
 | INT WINAPI WSAEnumNameSpaceProvidersA( LPDWORD len, LPWSANAMESPACE_INFOA buffer ) | 
 | { | 
 |     FIXME( "(%p %p) Stub!\n", len, buffer ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAEnumNameSpaceProvidersW                  (WS2_32.35) | 
 |  */ | 
 | INT WINAPI WSAEnumNameSpaceProvidersW( LPDWORD len, LPWSANAMESPACE_INFOW buffer ) | 
 | { | 
 |     FIXME( "(%p %p) Stub!\n", len, buffer ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAGetQOSByName                             (WS2_32.41) | 
 |  */ | 
 | BOOL WINAPI WSAGetQOSByName( SOCKET s, LPWSABUF lpQOSName, LPQOS lpQOS ) | 
 | { | 
 |     FIXME( "(0x%04lx %p %p) Stub!\n", s, lpQOSName, lpQOS ); | 
 |     return FALSE; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAGetServiceClassInfoA                     (WS2_32.42) | 
 |  */ | 
 | INT WINAPI WSAGetServiceClassInfoA( LPGUID provider, LPGUID service, LPDWORD len, | 
 |                                     LPWSASERVICECLASSINFOA info ) | 
 | { | 
 |     FIXME( "(%s %s %p %p) Stub!\n", debugstr_guid(provider), debugstr_guid(service), | 
 |            len, info ); | 
 |     WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
 |     return SOCKET_ERROR;  | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAGetServiceClassInfoW                     (WS2_32.43) | 
 |  */ | 
 | INT WINAPI WSAGetServiceClassInfoW( LPGUID provider, LPGUID service, LPDWORD len, | 
 |                                     LPWSASERVICECLASSINFOW info ) | 
 | { | 
 |     FIXME( "(%s %s %p %p) Stub!\n", debugstr_guid(provider), debugstr_guid(service), | 
 |            len, info ); | 
 |     WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAGetServiceClassNameByClassIdA            (WS2_32.44) | 
 |  */ | 
 | INT WINAPI WSAGetServiceClassNameByClassIdA( LPGUID class, LPSTR service, LPDWORD len ) | 
 | { | 
 |     FIXME( "(%s %p %p) Stub!\n", debugstr_guid(class), service, len ); | 
 |     WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAGetServiceClassNameByClassIdW            (WS2_32.45) | 
 |  */ | 
 | INT WINAPI WSAGetServiceClassNameByClassIdW( LPGUID class, LPWSTR service, LPDWORD len ) | 
 | { | 
 |     FIXME( "(%s %p %p) Stub!\n", debugstr_guid(class), service, len ); | 
 |     WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSALookupServiceBeginA                       (WS2_32.59) | 
 |  */ | 
 | INT WINAPI WSALookupServiceBeginA( LPWSAQUERYSETA lpqsRestrictions, | 
 |                                    DWORD dwControlFlags, | 
 |                                    LPHANDLE lphLookup) | 
 | { | 
 |     FIXME("(%p 0x%08x %p) Stub!\n", lpqsRestrictions, dwControlFlags, | 
 |             lphLookup); | 
 |     WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSALookupServiceBeginW                       (WS2_32.60) | 
 |  */ | 
 | INT WINAPI WSALookupServiceBeginW( LPWSAQUERYSETW lpqsRestrictions, | 
 |                                    DWORD dwControlFlags, | 
 |                                    LPHANDLE lphLookup) | 
 | { | 
 |     FIXME("(%p 0x%08x %p) Stub!\n", lpqsRestrictions, dwControlFlags, | 
 |             lphLookup); | 
 |     WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSALookupServiceBeginW                       (WS2_32.61) | 
 |  */ | 
 | INT WINAPI WSALookupServiceEnd( HANDLE lookup ) | 
 | { | 
 |     FIXME("(%p) Stub!\n", lookup ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSALookupServiceNextA                       (WS2_32.62) | 
 |  */ | 
 | INT WINAPI WSALookupServiceNextA( HANDLE lookup, DWORD flags, LPDWORD len, LPWSAQUERYSETA results ) | 
 | { | 
 |     FIXME( "(%p 0x%08x %p %p) Stub!\n", lookup, flags, len, results ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSALookupServiceNextW                       (WS2_32.63) | 
 |  */ | 
 | INT WINAPI WSALookupServiceNextW( HANDLE lookup, DWORD flags, LPDWORD len, LPWSAQUERYSETW results ) | 
 | { | 
 |     FIXME( "(%p 0x%08x %p %p) Stub!\n", lookup, flags, len, results ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSANtohl                                   (WS2_32.64) | 
 |  */ | 
 | INT WINAPI WSANtohl( SOCKET s, WS_u_long netlong, WS_u_long* lphostlong ) | 
 | { | 
 |     TRACE( "(0x%04lx 0x%08x %p)\n", s, netlong, lphostlong ); | 
 |  | 
 |     if (!lphostlong) return WSAEFAULT; | 
 |  | 
 |     *lphostlong = ntohl( netlong ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSANtohs                                   (WS2_32.65) | 
 |  */ | 
 | INT WINAPI WSANtohs( SOCKET s, WS_u_short netshort, WS_u_short* lphostshort ) | 
 | { | 
 |     TRACE( "(0x%04lx 0x%08x %p)\n", s, netshort, lphostshort ); | 
 |  | 
 |     if (!lphostshort) return WSAEFAULT; | 
 |  | 
 |     *lphostshort = ntohs( netshort ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSAProviderConfigChange                     (WS2_32.66) | 
 |  */ | 
 | INT WINAPI WSAProviderConfigChange( LPHANDLE handle, LPWSAOVERLAPPED overlapped, | 
 |                                     LPWSAOVERLAPPED_COMPLETION_ROUTINE completion ) | 
 | { | 
 |     FIXME( "(%p %p %p) Stub!\n", handle, overlapped, completion ); | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSARecvDisconnect                           (WS2_32.68) | 
 |  */ | 
 | INT WINAPI WSARecvDisconnect( SOCKET s, LPWSABUF disconnectdata ) | 
 | { | 
 |     TRACE( "(0x%04lx %p)\n", s, disconnectdata ); | 
 |  | 
 |     return WS_shutdown( s, 0 ); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSASetServiceA                              (WS2_32.76) | 
 |  */ | 
 | INT WINAPI WSASetServiceA( LPWSAQUERYSETA query, WSAESETSERVICEOP operation, DWORD flags ) | 
 | { | 
 |     FIXME( "(%p 0x%08x 0x%08x) Stub!\n", query, operation, flags ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSASetServiceW                              (WS2_32.77) | 
 |  */ | 
 | INT WINAPI WSASetServiceW( LPWSAQUERYSETW query, WSAESETSERVICEOP operation, DWORD flags ) | 
 | { | 
 |     FIXME( "(%p 0x%08x 0x%08x) Stub!\n", query, operation, flags ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSCEnableNSProvider                         (WS2_32.84) | 
 |  */ | 
 | INT WINAPI WSCEnableNSProvider( LPGUID provider, BOOL enable ) | 
 | { | 
 |     FIXME( "(%s 0x%08x) Stub!\n", debugstr_guid(provider), enable ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSCGetProviderPath                          (WS2_32.86) | 
 |  */ | 
 | INT WINAPI WSCGetProviderPath( LPGUID provider, LPWSTR path, LPINT len, LPINT errcode ) | 
 | { | 
 |     FIXME( "(%s %p %p %p) Stub!\n", debugstr_guid(provider), path, len, errcode ); | 
 |  | 
 |     if (!errcode || !provider || !len) return WSAEFAULT; | 
 |  | 
 |     *errcode = WSAEINVAL; | 
 |     return SOCKET_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSCInstallNameSpace                         (WS2_32.87) | 
 |  */ | 
 | INT WINAPI WSCInstallNameSpace( LPWSTR identifier, LPWSTR path, DWORD namespace, | 
 |                                 DWORD version, LPGUID provider ) | 
 | { | 
 |     FIXME( "(%s %s 0x%08x 0x%08x %s) Stub!\n", debugstr_w(identifier), debugstr_w(path), | 
 |            namespace, version, debugstr_guid(provider) ); | 
 |     return 0; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSCUnInstallNameSpace                       (WS2_32.89) | 
 |  */ | 
 | INT WINAPI WSCUnInstallNameSpace( LPGUID lpProviderId ) | 
 | { | 
 |     FIXME("(%p) Stub!\n", lpProviderId); | 
 |     return NO_ERROR; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *              WSCWriteProviderOrder                       (WS2_32.91) | 
 |  */ | 
 | INT WINAPI WSCWriteProviderOrder( LPDWORD entry, DWORD number ) | 
 | { | 
 |     FIXME("(%p 0x%08x) Stub!\n", entry, number); | 
 |     return 0; | 
 | } |