|  | /* | 
|  | * based on Windows Sockets 1.1 specs | 
|  | * | 
|  | * Copyright (C) 1993,1994,1996,1997 John Brezak, Erik Bos, Alex Korobka. | 
|  | * Copyright (C) 2005 Marcus Meissner | 
|  | * Copyright (C) 2006-2008 Kai Blin | 
|  | * | 
|  | * This library is free software; you can redistribute it and/or | 
|  | * modify it under the terms of the GNU Lesser General Public | 
|  | * License as published by the Free Software Foundation; either | 
|  | * version 2.1 of the License, or (at your option) any later version. | 
|  | * | 
|  | * This library is distributed in the hope that it will be useful, | 
|  | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
|  | * Lesser General Public License for more details. | 
|  | * | 
|  | * You should have received a copy of the GNU Lesser General Public | 
|  | * License along with this library; if not, write to the Free Software | 
|  | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA | 
|  | * | 
|  | * NOTE: If you make any changes to fix a particular app, make sure | 
|  | * they don't break something else like Netscape or telnet and ftp | 
|  | * clients and servers (www.winsite.com got a lot of those). | 
|  | */ | 
|  |  | 
|  | #include "config.h" | 
|  | #include "wine/port.h" | 
|  |  | 
|  | #include <stdarg.h> | 
|  | #include <stdio.h> | 
|  | #include <string.h> | 
|  | #include <sys/types.h> | 
|  | #ifdef HAVE_SYS_IPC_H | 
|  | # include <sys/ipc.h> | 
|  | #endif | 
|  | #ifdef HAVE_SYS_IOCTL_H | 
|  | # include <sys/ioctl.h> | 
|  | #endif | 
|  | #ifdef HAVE_SYS_FILIO_H | 
|  | # include <sys/filio.h> | 
|  | #endif | 
|  | #ifdef HAVE_SYS_SOCKIO_H | 
|  | # include <sys/sockio.h> | 
|  | #endif | 
|  |  | 
|  | #if defined(__EMX__) | 
|  | # include <sys/so_ioctl.h> | 
|  | #endif | 
|  |  | 
|  | #ifdef HAVE_SYS_PARAM_H | 
|  | # include <sys/param.h> | 
|  | #endif | 
|  |  | 
|  | #ifdef HAVE_SYS_MSG_H | 
|  | # include <sys/msg.h> | 
|  | #endif | 
|  | #ifdef HAVE_SYS_WAIT_H | 
|  | # include <sys/wait.h> | 
|  | #endif | 
|  | #ifdef HAVE_SYS_UIO_H | 
|  | # include <sys/uio.h> | 
|  | #endif | 
|  | #ifdef HAVE_SYS_SOCKET_H | 
|  | #include <sys/socket.h> | 
|  | #endif | 
|  | #ifdef HAVE_NETINET_IN_H | 
|  | # include <netinet/in.h> | 
|  | #endif | 
|  | #ifdef HAVE_NETINET_TCP_H | 
|  | # include <netinet/tcp.h> | 
|  | #endif | 
|  | #ifdef HAVE_ARPA_INET_H | 
|  | # include <arpa/inet.h> | 
|  | #endif | 
|  | #include <ctype.h> | 
|  | #include <fcntl.h> | 
|  | #include <errno.h> | 
|  | #ifdef HAVE_SYS_ERRNO_H | 
|  | #include <sys/errno.h> | 
|  | #endif | 
|  | #ifdef HAVE_NETDB_H | 
|  | #include <netdb.h> | 
|  | #endif | 
|  | #ifdef HAVE_UNISTD_H | 
|  | # include <unistd.h> | 
|  | #endif | 
|  | #include <stdlib.h> | 
|  | #ifdef HAVE_ARPA_NAMESER_H | 
|  | # include <arpa/nameser.h> | 
|  | #endif | 
|  | #ifdef HAVE_RESOLV_H | 
|  | # include <resolv.h> | 
|  | #endif | 
|  | #ifdef HAVE_NET_IF_H | 
|  | # include <net/if.h> | 
|  | #endif | 
|  |  | 
|  | #ifdef HAVE_NETIPX_IPX_H | 
|  | # include <netipx/ipx.h> | 
|  | # define HAVE_IPX | 
|  | #elif defined(HAVE_LINUX_IPX_H) | 
|  | # ifdef HAVE_ASM_TYPES_H | 
|  | #  include <asm/types.h> | 
|  | # endif | 
|  | # include <linux/ipx.h> | 
|  | # define HAVE_IPX | 
|  | #endif | 
|  |  | 
|  | #ifdef HAVE_POLL_H | 
|  | #include <poll.h> | 
|  | #endif | 
|  | #ifdef HAVE_SYS_POLL_H | 
|  | # include <sys/poll.h> | 
|  | #endif | 
|  | #ifdef HAVE_SYS_TIME_H | 
|  | # include <sys/time.h> | 
|  | #endif | 
|  |  | 
|  | #define NONAMELESSUNION | 
|  | #define NONAMELESSSTRUCT | 
|  | #include "ntstatus.h" | 
|  | #define WIN32_NO_STATUS | 
|  | #include "windef.h" | 
|  | #include "winbase.h" | 
|  | #include "wingdi.h" | 
|  | #include "winuser.h" | 
|  | #include "winerror.h" | 
|  | #include "winnls.h" | 
|  | #include "winsock2.h" | 
|  | #include "mswsock.h" | 
|  | #include "ws2tcpip.h" | 
|  | #include "ws2spi.h" | 
|  | #include "wsipx.h" | 
|  | #include "winnt.h" | 
|  | #include "iphlpapi.h" | 
|  | #include "wine/server.h" | 
|  | #include "wine/debug.h" | 
|  | #include "wine/unicode.h" | 
|  |  | 
|  | #ifdef HAVE_IPX | 
|  | # include "wsnwlink.h" | 
|  | #endif | 
|  |  | 
|  |  | 
|  | #if defined(__FreeBSD__) || defined(__FreeBSD_kernel__) | 
|  | # define sipx_network    sipx_addr.x_net | 
|  | # define sipx_node       sipx_addr.x_host.c_host | 
|  | #endif  /* __FreeBSD__ */ | 
|  |  | 
|  | #ifndef INADDR_NONE | 
|  | #define INADDR_NONE ~0UL | 
|  | #endif | 
|  |  | 
|  | WINE_DEFAULT_DEBUG_CHANNEL(winsock); | 
|  |  | 
|  | /* critical section to protect some non-reentrant net function */ | 
|  | extern CRITICAL_SECTION csWSgetXXXbyYYY; | 
|  |  | 
|  | union generic_unix_sockaddr | 
|  | { | 
|  | struct sockaddr addr; | 
|  | char data[128];  /* should be big enough for all families */ | 
|  | }; | 
|  |  | 
|  | static inline const char *debugstr_sockaddr( const struct WS_sockaddr *a ) | 
|  | { | 
|  | if (!a) return "(nil)"; | 
|  | return wine_dbg_sprintf("{ family %d, address %s, port %d }", | 
|  | ((const struct sockaddr_in *)a)->sin_family, | 
|  | inet_ntoa(((const struct sockaddr_in *)a)->sin_addr), | 
|  | ntohs(((const struct sockaddr_in *)a)->sin_port)); | 
|  | } | 
|  |  | 
|  | /* HANDLE<->SOCKET conversion (SOCKET is UINT_PTR). */ | 
|  | #define SOCKET2HANDLE(s) ((HANDLE)(s)) | 
|  | #define HANDLE2SOCKET(h) ((SOCKET)(h)) | 
|  |  | 
|  | /**************************************************************** | 
|  | * Async IO declarations | 
|  | ****************************************************************/ | 
|  |  | 
|  | typedef struct ws2_async | 
|  | { | 
|  | HANDLE                              hSocket; | 
|  | int                                 type; | 
|  | LPWSAOVERLAPPED                     user_overlapped; | 
|  | LPWSAOVERLAPPED_COMPLETION_ROUTINE  completion_func; | 
|  | IO_STATUS_BLOCK                     local_iosb; | 
|  | struct iovec                        iovec[WS_MSG_MAXIOVLEN]; | 
|  | int                                 n_iovecs; | 
|  | struct WS_sockaddr                  *addr; | 
|  | union | 
|  | { | 
|  | int val;     /* for send operations */ | 
|  | int *ptr;    /* for recv operations */ | 
|  | }                                   addrlen; | 
|  | DWORD                               flags; | 
|  | } ws2_async; | 
|  |  | 
|  | /****************************************************************/ | 
|  |  | 
|  | /* ----------------------------------- internal data */ | 
|  |  | 
|  | /* ws_... struct conversion flags */ | 
|  |  | 
|  | typedef struct          /* WSAAsyncSelect() control struct */ | 
|  | { | 
|  | HANDLE      service, event, sock; | 
|  | HWND        hWnd; | 
|  | UINT        uMsg; | 
|  | LONG        lEvent; | 
|  | } ws_select_info; | 
|  |  | 
|  | #define WS_MAX_SOCKETS_PER_PROCESS      128     /* reasonable guess */ | 
|  | #define WS_MAX_UDP_DATAGRAM             1024 | 
|  | static INT WINAPI WSA_DefaultBlockingHook( FARPROC x ); | 
|  |  | 
|  | /* hostent's, servent's and protent's are stored in one buffer per thread, | 
|  | * as documented on MSDN for the functions that return any of the buffers */ | 
|  | struct per_thread_data | 
|  | { | 
|  | int opentype; | 
|  | struct WS_hostent *he_buffer; | 
|  | struct WS_servent *se_buffer; | 
|  | struct WS_protoent *pe_buffer; | 
|  | int he_len; | 
|  | int se_len; | 
|  | int pe_len; | 
|  | }; | 
|  |  | 
|  | static INT num_startup;          /* reference counter */ | 
|  | static FARPROC blocking_hook = (FARPROC)WSA_DefaultBlockingHook; | 
|  |  | 
|  | /* function prototypes */ | 
|  | static struct WS_hostent *WS_dup_he(const struct hostent* p_he); | 
|  | static struct WS_protoent *WS_dup_pe(const struct protoent* p_pe); | 
|  | static struct WS_servent *WS_dup_se(const struct servent* p_se); | 
|  |  | 
|  | int WSAIOCTL_GetInterfaceCount(void); | 
|  | int WSAIOCTL_GetInterfaceName(int intNumber, char *intName); | 
|  |  | 
|  | UINT wsaErrno(void); | 
|  | UINT wsaHerrno(int errnr); | 
|  |  | 
|  | #define MAP_OPTION(opt) { WS_##opt, opt } | 
|  |  | 
|  | static const int ws_sock_map[][2] = | 
|  | { | 
|  | MAP_OPTION( SO_DEBUG ), | 
|  | MAP_OPTION( SO_ACCEPTCONN ), | 
|  | MAP_OPTION( SO_REUSEADDR ), | 
|  | MAP_OPTION( SO_KEEPALIVE ), | 
|  | MAP_OPTION( SO_DONTROUTE ), | 
|  | MAP_OPTION( SO_BROADCAST ), | 
|  | MAP_OPTION( SO_LINGER ), | 
|  | MAP_OPTION( SO_OOBINLINE ), | 
|  | MAP_OPTION( SO_SNDBUF ), | 
|  | MAP_OPTION( SO_RCVBUF ), | 
|  | MAP_OPTION( SO_ERROR ), | 
|  | MAP_OPTION( SO_TYPE ), | 
|  | #ifdef SO_RCVTIMEO | 
|  | MAP_OPTION( SO_RCVTIMEO ), | 
|  | #endif | 
|  | #ifdef SO_SNDTIMEO | 
|  | MAP_OPTION( SO_SNDTIMEO ), | 
|  | #endif | 
|  | }; | 
|  |  | 
|  | static const int ws_tcp_map[][2] = | 
|  | { | 
|  | #ifdef TCP_NODELAY | 
|  | MAP_OPTION( TCP_NODELAY ), | 
|  | #endif | 
|  | }; | 
|  |  | 
|  | static const int ws_ip_map[][2] = | 
|  | { | 
|  | MAP_OPTION( IP_MULTICAST_IF ), | 
|  | MAP_OPTION( IP_MULTICAST_TTL ), | 
|  | MAP_OPTION( IP_MULTICAST_LOOP ), | 
|  | MAP_OPTION( IP_ADD_MEMBERSHIP ), | 
|  | MAP_OPTION( IP_DROP_MEMBERSHIP ), | 
|  | MAP_OPTION( IP_OPTIONS ), | 
|  | #ifdef IP_HDRINCL | 
|  | MAP_OPTION( IP_HDRINCL ), | 
|  | #endif | 
|  | MAP_OPTION( IP_TOS ), | 
|  | MAP_OPTION( IP_TTL ), | 
|  | }; | 
|  |  | 
|  | static const int ws_af_map[][2] = | 
|  | { | 
|  | MAP_OPTION( AF_UNSPEC ), | 
|  | MAP_OPTION( AF_INET ), | 
|  | MAP_OPTION( AF_INET6 ), | 
|  | #ifdef HAVE_IPX | 
|  | MAP_OPTION( AF_IPX ), | 
|  | #endif | 
|  | {FROM_PROTOCOL_INFO, FROM_PROTOCOL_INFO}, | 
|  | }; | 
|  |  | 
|  | static const int ws_socktype_map[][2] = | 
|  | { | 
|  | MAP_OPTION( SOCK_DGRAM ), | 
|  | MAP_OPTION( SOCK_STREAM ), | 
|  | MAP_OPTION( SOCK_RAW ), | 
|  | {FROM_PROTOCOL_INFO, FROM_PROTOCOL_INFO}, | 
|  | }; | 
|  |  | 
|  | static const int ws_proto_map[][2] = | 
|  | { | 
|  | MAP_OPTION( IPPROTO_IP ), | 
|  | MAP_OPTION( IPPROTO_TCP ), | 
|  | MAP_OPTION( IPPROTO_UDP ), | 
|  | MAP_OPTION( IPPROTO_ICMP ), | 
|  | MAP_OPTION( IPPROTO_IGMP ), | 
|  | MAP_OPTION( IPPROTO_RAW ), | 
|  | {FROM_PROTOCOL_INFO, FROM_PROTOCOL_INFO}, | 
|  | }; | 
|  |  | 
|  | static const int ws_aiflag_map[][2] = | 
|  | { | 
|  | MAP_OPTION( AI_PASSIVE ), | 
|  | MAP_OPTION( AI_CANONNAME ), | 
|  | MAP_OPTION( AI_NUMERICHOST ), | 
|  | /* Linux/UNIX knows a lot more. But Windows only | 
|  | * has 3 as far as I could see. -Marcus | 
|  | */ | 
|  | }; | 
|  |  | 
|  | static const int ws_niflag_map[][2] = | 
|  | { | 
|  | MAP_OPTION( NI_NOFQDN ), | 
|  | MAP_OPTION( NI_NUMERICHOST ), | 
|  | MAP_OPTION( NI_NAMEREQD ), | 
|  | MAP_OPTION( NI_NUMERICSERV ), | 
|  | MAP_OPTION( NI_DGRAM ), | 
|  | }; | 
|  |  | 
|  | static const int ws_eai_map[][2] = | 
|  | { | 
|  | MAP_OPTION( EAI_AGAIN ), | 
|  | MAP_OPTION( EAI_BADFLAGS ), | 
|  | MAP_OPTION( EAI_FAIL ), | 
|  | MAP_OPTION( EAI_FAMILY ), | 
|  | MAP_OPTION( EAI_MEMORY ), | 
|  | /* Note: EAI_NODATA is deprecated, but still | 
|  | * used by Windows and Linux... We map the newer | 
|  | * EAI_NONAME to EAI_NODATA for now until Windows | 
|  | * changes too. | 
|  | */ | 
|  | #ifdef EAI_NODATA | 
|  | MAP_OPTION( EAI_NODATA ), | 
|  | #endif | 
|  | #ifdef EAI_NONAME | 
|  | { WS_EAI_NODATA, EAI_NONAME }, | 
|  | #endif | 
|  |  | 
|  | MAP_OPTION( EAI_SERVICE ), | 
|  | MAP_OPTION( EAI_SOCKTYPE ), | 
|  | { 0, 0 } | 
|  | }; | 
|  |  | 
|  | static const char magic_loopback_addr[] = {127, 12, 34, 56}; | 
|  |  | 
|  | static inline DWORD NtStatusToWSAError( const DWORD status ) | 
|  | { | 
|  | /* We only need to cover the status codes set by server async request handling */ | 
|  | DWORD wserr; | 
|  | switch ( status ) | 
|  | { | 
|  | case STATUS_SUCCESS:              wserr = 0;                     break; | 
|  | case STATUS_PENDING:              wserr = WSA_IO_PENDING;        break; | 
|  | case STATUS_OBJECT_TYPE_MISMATCH: wserr = WSAENOTSOCK;           break; | 
|  | case STATUS_INVALID_HANDLE:       wserr = WSAEBADF;              break; | 
|  | case STATUS_INVALID_PARAMETER:    wserr = WSAEINVAL;             break; | 
|  | case STATUS_PIPE_DISCONNECTED:    wserr = WSAESHUTDOWN;          break; | 
|  | case STATUS_CANCELLED:            wserr = WSA_OPERATION_ABORTED; break; | 
|  | case STATUS_TIMEOUT:              wserr = WSAETIMEDOUT;          break; | 
|  | case STATUS_NO_MEMORY:            wserr = WSAEFAULT;             break; | 
|  | default: | 
|  | if ( status >= WSABASEERR && status <= WSABASEERR+1004 ) | 
|  | /* It is not an NT status code but a winsock error */ | 
|  | wserr = status; | 
|  | else | 
|  | { | 
|  | wserr = RtlNtStatusToDosError( status ); | 
|  | FIXME( "Status code %08x converted to DOS error code %x\n", status, wserr ); | 
|  | } | 
|  | } | 
|  | return wserr; | 
|  | } | 
|  |  | 
|  | /* set last error code from NT status without mapping WSA errors */ | 
|  | static inline unsigned int set_error( unsigned int err ) | 
|  | { | 
|  | if (err) | 
|  | { | 
|  | err = NtStatusToWSAError( err ); | 
|  | SetLastError( err ); | 
|  | } | 
|  | return err; | 
|  | } | 
|  |  | 
|  | static inline int get_sock_fd( SOCKET s, DWORD access, unsigned int *options ) | 
|  | { | 
|  | int fd; | 
|  | if (set_error( wine_server_handle_to_fd( SOCKET2HANDLE(s), access, &fd, options ) )) | 
|  | return -1; | 
|  | return fd; | 
|  | } | 
|  |  | 
|  | static inline void release_sock_fd( SOCKET s, int fd ) | 
|  | { | 
|  | wine_server_release_fd( SOCKET2HANDLE(s), fd ); | 
|  | } | 
|  |  | 
|  | static void _enable_event( HANDLE s, unsigned int event, | 
|  | unsigned int sstate, unsigned int cstate ) | 
|  | { | 
|  | SERVER_START_REQ( enable_socket_event ) | 
|  | { | 
|  | req->handle = s; | 
|  | req->mask   = event; | 
|  | req->sstate = sstate; | 
|  | req->cstate = cstate; | 
|  | wine_server_call( req ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | } | 
|  |  | 
|  | static int _is_blocking(SOCKET s) | 
|  | { | 
|  | int ret; | 
|  | SERVER_START_REQ( get_socket_event ) | 
|  | { | 
|  | req->handle  = SOCKET2HANDLE(s); | 
|  | req->service = FALSE; | 
|  | req->c_event = 0; | 
|  | wine_server_call( req ); | 
|  | ret = (reply->state & FD_WINE_NONBLOCKING) == 0; | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static unsigned int _get_sock_mask(SOCKET s) | 
|  | { | 
|  | unsigned int ret; | 
|  | SERVER_START_REQ( get_socket_event ) | 
|  | { | 
|  | req->handle  = SOCKET2HANDLE(s); | 
|  | req->service = FALSE; | 
|  | req->c_event = 0; | 
|  | wine_server_call( req ); | 
|  | ret = reply->mask; | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static void _sync_sock_state(SOCKET s) | 
|  | { | 
|  | /* do a dummy wineserver request in order to let | 
|  | the wineserver run through its select loop once */ | 
|  | (void)_is_blocking(s); | 
|  | } | 
|  |  | 
|  | static int _get_sock_error(SOCKET s, unsigned int bit) | 
|  | { | 
|  | int events[FD_MAX_EVENTS]; | 
|  |  | 
|  | SERVER_START_REQ( get_socket_event ) | 
|  | { | 
|  | req->handle  = SOCKET2HANDLE(s); | 
|  | req->service = FALSE; | 
|  | req->c_event = 0; | 
|  | wine_server_set_reply( req, events, sizeof(events) ); | 
|  | wine_server_call( req ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | return events[bit]; | 
|  | } | 
|  |  | 
|  | static struct per_thread_data *get_per_thread_data(void) | 
|  | { | 
|  | struct per_thread_data * ptb = NtCurrentTeb()->WinSockData; | 
|  | /* lazy initialization */ | 
|  | if (!ptb) | 
|  | { | 
|  | ptb = HeapAlloc( GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*ptb) ); | 
|  | NtCurrentTeb()->WinSockData = ptb; | 
|  | } | 
|  | return ptb; | 
|  | } | 
|  |  | 
|  | static void free_per_thread_data(void) | 
|  | { | 
|  | struct per_thread_data * ptb = NtCurrentTeb()->WinSockData; | 
|  |  | 
|  | if (!ptb) return; | 
|  |  | 
|  | /* delete scratch buffers */ | 
|  | HeapFree( GetProcessHeap(), 0, ptb->he_buffer ); | 
|  | HeapFree( GetProcessHeap(), 0, ptb->se_buffer ); | 
|  | HeapFree( GetProcessHeap(), 0, ptb->pe_buffer ); | 
|  | ptb->he_buffer = NULL; | 
|  | ptb->se_buffer = NULL; | 
|  | ptb->pe_buffer = NULL; | 
|  |  | 
|  | HeapFree( GetProcessHeap(), 0, ptb ); | 
|  | NtCurrentTeb()->WinSockData = NULL; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		DllMain (WS2_32.init) | 
|  | */ | 
|  | BOOL WINAPI DllMain(HINSTANCE hInstDLL, DWORD fdwReason, LPVOID fImpLoad) | 
|  | { | 
|  | TRACE("%p 0x%x %p\n", hInstDLL, fdwReason, fImpLoad); | 
|  | switch (fdwReason) { | 
|  | case DLL_PROCESS_ATTACH: | 
|  | break; | 
|  | case DLL_PROCESS_DETACH: | 
|  | free_per_thread_data(); | 
|  | num_startup = 0; | 
|  | break; | 
|  | case DLL_THREAD_DETACH: | 
|  | free_per_thread_data(); | 
|  | break; | 
|  | } | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *          convert_sockopt() | 
|  | * | 
|  | * Converts socket flags from Windows format. | 
|  | * Return 1 if converted, 0 if not (error). | 
|  | */ | 
|  | static int convert_sockopt(INT *level, INT *optname) | 
|  | { | 
|  | int i; | 
|  | switch (*level) | 
|  | { | 
|  | case WS_SOL_SOCKET: | 
|  | *level = SOL_SOCKET; | 
|  | for(i=0; i<sizeof(ws_sock_map)/sizeof(ws_sock_map[0]); i++) { | 
|  | if( ws_sock_map[i][0] == *optname ) | 
|  | { | 
|  | *optname = ws_sock_map[i][1]; | 
|  | return 1; | 
|  | } | 
|  | } | 
|  | FIXME("Unknown SOL_SOCKET optname 0x%x\n", *optname); | 
|  | break; | 
|  | case WS_IPPROTO_TCP: | 
|  | *level = IPPROTO_TCP; | 
|  | for(i=0; i<sizeof(ws_tcp_map)/sizeof(ws_tcp_map[0]); i++) { | 
|  | if ( ws_tcp_map[i][0] == *optname ) | 
|  | { | 
|  | *optname = ws_tcp_map[i][1]; | 
|  | return 1; | 
|  | } | 
|  | } | 
|  | FIXME("Unknown IPPROTO_TCP optname 0x%x\n", *optname); | 
|  | break; | 
|  | case WS_IPPROTO_IP: | 
|  | *level = IPPROTO_IP; | 
|  | for(i=0; i<sizeof(ws_ip_map)/sizeof(ws_ip_map[0]); i++) { | 
|  | if (ws_ip_map[i][0] == *optname ) | 
|  | { | 
|  | *optname = ws_ip_map[i][1]; | 
|  | return 1; | 
|  | } | 
|  | } | 
|  | FIXME("Unknown IPPROTO_IP optname 0x%x\n", *optname); | 
|  | break; | 
|  | default: FIXME("Unimplemented or unknown socket level\n"); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* ----------------------------------- Per-thread info (or per-process?) */ | 
|  |  | 
|  | static char *strdup_lower(const char *str) | 
|  | { | 
|  | int i; | 
|  | char *ret = HeapAlloc( GetProcessHeap(), 0, strlen(str) + 1 ); | 
|  |  | 
|  | if (ret) | 
|  | { | 
|  | for (i = 0; str[i]; i++) ret[i] = tolower(str[i]); | 
|  | ret[i] = 0; | 
|  | } | 
|  | else SetLastError(WSAENOBUFS); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static inline int sock_error_p(int s) | 
|  | { | 
|  | unsigned int optval, optlen; | 
|  |  | 
|  | optlen = sizeof(optval); | 
|  | getsockopt(s, SOL_SOCKET, SO_ERROR, (void *) &optval, &optlen); | 
|  | if (optval) WARN("\t[%i] error: %d\n", s, optval); | 
|  | return optval != 0; | 
|  | } | 
|  |  | 
|  | /* Utility: get the SO_RCVTIMEO or SO_SNDTIMEO socket option | 
|  | * from an fd and return the value converted to milli seconds | 
|  | * or -1 if there is an infinite time out */ | 
|  | static inline int get_rcvsnd_timeo( int fd, int optname) | 
|  | { | 
|  | struct timeval tv; | 
|  | unsigned int len = sizeof(tv); | 
|  | int ret = getsockopt(fd, SOL_SOCKET, optname, &tv, &len); | 
|  | if( ret >= 0) | 
|  | ret = tv.tv_sec * 1000 + tv.tv_usec / 1000; | 
|  | if( ret <= 0 ) /* tv == {0,0} means infinite time out */ | 
|  | return -1; | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* macro wrappers for portability */ | 
|  | #ifdef SO_RCVTIMEO | 
|  | #define GET_RCVTIMEO(fd) get_rcvsnd_timeo( (fd), SO_RCVTIMEO) | 
|  | #else | 
|  | #define GET_RCVTIMEO(fd) (-1) | 
|  | #endif | 
|  |  | 
|  | #ifdef SO_SNDTIMEO | 
|  | #define GET_SNDTIMEO(fd) get_rcvsnd_timeo( (fd), SO_SNDTIMEO) | 
|  | #else | 
|  | #define GET_SNDTIMEO(fd) (-1) | 
|  | #endif | 
|  |  | 
|  | /* utility: given an fd, will block until one of the events occurs */ | 
|  | static inline int do_block( int fd, int events, int timeout ) | 
|  | { | 
|  | struct pollfd pfd; | 
|  | int ret; | 
|  |  | 
|  | pfd.fd = fd; | 
|  | pfd.events = events; | 
|  |  | 
|  | while ((ret = poll(&pfd, 1, timeout)) < 0) | 
|  | { | 
|  | if (errno != EINTR) | 
|  | return -1; | 
|  | } | 
|  | if( ret == 0 ) | 
|  | return 0; | 
|  | return pfd.revents; | 
|  | } | 
|  |  | 
|  | static int | 
|  | convert_af_w2u(int windowsaf) { | 
|  | int i; | 
|  |  | 
|  | for (i=0;i<sizeof(ws_af_map)/sizeof(ws_af_map[0]);i++) | 
|  | if (ws_af_map[i][0] == windowsaf) | 
|  | return ws_af_map[i][1]; | 
|  | FIXME("unhandled Windows address family %d\n", windowsaf); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | static int | 
|  | convert_af_u2w(int unixaf) { | 
|  | int i; | 
|  |  | 
|  | for (i=0;i<sizeof(ws_af_map)/sizeof(ws_af_map[0]);i++) | 
|  | if (ws_af_map[i][1] == unixaf) | 
|  | return ws_af_map[i][0]; | 
|  | FIXME("unhandled UNIX address family %d\n", unixaf); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | static int | 
|  | convert_proto_w2u(int windowsproto) { | 
|  | int i; | 
|  |  | 
|  | for (i=0;i<sizeof(ws_proto_map)/sizeof(ws_proto_map[0]);i++) | 
|  | if (ws_proto_map[i][0] == windowsproto) | 
|  | return ws_proto_map[i][1]; | 
|  | FIXME("unhandled Windows socket protocol %d\n", windowsproto); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | static int | 
|  | convert_proto_u2w(int unixproto) { | 
|  | int i; | 
|  |  | 
|  | for (i=0;i<sizeof(ws_proto_map)/sizeof(ws_proto_map[0]);i++) | 
|  | if (ws_proto_map[i][1] == unixproto) | 
|  | return ws_proto_map[i][0]; | 
|  | FIXME("unhandled UNIX socket protocol %d\n", unixproto); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | static int | 
|  | convert_socktype_w2u(int windowssocktype) { | 
|  | int i; | 
|  |  | 
|  | for (i=0;i<sizeof(ws_socktype_map)/sizeof(ws_socktype_map[0]);i++) | 
|  | if (ws_socktype_map[i][0] == windowssocktype) | 
|  | return ws_socktype_map[i][1]; | 
|  | FIXME("unhandled Windows socket type %d\n", windowssocktype); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | static int | 
|  | convert_socktype_u2w(int unixsocktype) { | 
|  | int i; | 
|  |  | 
|  | for (i=0;i<sizeof(ws_socktype_map)/sizeof(ws_socktype_map[0]);i++) | 
|  | if (ws_socktype_map[i][1] == unixsocktype) | 
|  | return ws_socktype_map[i][0]; | 
|  | FIXME("unhandled UNIX socket type %d\n", unixsocktype); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | /* ----------------------------------- API ----- | 
|  | * | 
|  | * Init / cleanup / error checking. | 
|  | */ | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSAStartup		(WS2_32.115) | 
|  | */ | 
|  | int WINAPI WSAStartup(WORD wVersionRequested, LPWSADATA lpWSAData) | 
|  | { | 
|  | TRACE("verReq=%x\n", wVersionRequested); | 
|  |  | 
|  | if (LOBYTE(wVersionRequested) < 1) | 
|  | return WSAVERNOTSUPPORTED; | 
|  |  | 
|  | if (!lpWSAData) return WSAEINVAL; | 
|  |  | 
|  | num_startup++; | 
|  |  | 
|  | /* that's the whole of the negotiation for now */ | 
|  | lpWSAData->wVersion = wVersionRequested; | 
|  | /* return winsock information */ | 
|  | lpWSAData->wHighVersion = 0x0202; | 
|  | strcpy(lpWSAData->szDescription, "WinSock 2.0" ); | 
|  | strcpy(lpWSAData->szSystemStatus, "Running" ); | 
|  | lpWSAData->iMaxSockets = WS_MAX_SOCKETS_PER_PROCESS; | 
|  | lpWSAData->iMaxUdpDg = WS_MAX_UDP_DATAGRAM; | 
|  | /* don't do anything with lpWSAData->lpVendorInfo */ | 
|  | /* (some apps don't allocate the space for this field) */ | 
|  |  | 
|  | TRACE("succeeded\n"); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSACleanup			(WS2_32.116) | 
|  | */ | 
|  | INT WINAPI WSACleanup(void) | 
|  | { | 
|  | if (num_startup) { | 
|  | num_startup--; | 
|  | return 0; | 
|  | } | 
|  | SetLastError(WSANOTINITIALISED); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSAGetLastError		(WINSOCK.111) | 
|  | *      WSAGetLastError		(WS2_32.111) | 
|  | */ | 
|  | INT WINAPI WSAGetLastError(void) | 
|  | { | 
|  | return GetLastError(); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSASetLastError		(WS2_32.112) | 
|  | */ | 
|  | void WINAPI WSASetLastError(INT iError) { | 
|  | SetLastError(iError); | 
|  | } | 
|  |  | 
|  | static struct WS_hostent *check_buffer_he(int size) | 
|  | { | 
|  | struct per_thread_data * ptb = get_per_thread_data(); | 
|  | if (ptb->he_buffer) | 
|  | { | 
|  | if (ptb->he_len >= size ) return ptb->he_buffer; | 
|  | HeapFree( GetProcessHeap(), 0, ptb->he_buffer ); | 
|  | } | 
|  | ptb->he_buffer = HeapAlloc( GetProcessHeap(), 0, (ptb->he_len = size) ); | 
|  | if (!ptb->he_buffer) SetLastError(WSAENOBUFS); | 
|  | return ptb->he_buffer; | 
|  | } | 
|  |  | 
|  | static struct WS_servent *check_buffer_se(int size) | 
|  | { | 
|  | struct per_thread_data * ptb = get_per_thread_data(); | 
|  | if (ptb->se_buffer) | 
|  | { | 
|  | if (ptb->se_len >= size ) return ptb->se_buffer; | 
|  | HeapFree( GetProcessHeap(), 0, ptb->se_buffer ); | 
|  | } | 
|  | ptb->se_buffer = HeapAlloc( GetProcessHeap(), 0, (ptb->se_len = size) ); | 
|  | if (!ptb->se_buffer) SetLastError(WSAENOBUFS); | 
|  | return ptb->se_buffer; | 
|  | } | 
|  |  | 
|  | static struct WS_protoent *check_buffer_pe(int size) | 
|  | { | 
|  | struct per_thread_data * ptb = get_per_thread_data(); | 
|  | if (ptb->pe_buffer) | 
|  | { | 
|  | if (ptb->pe_len >= size ) return ptb->pe_buffer; | 
|  | HeapFree( GetProcessHeap(), 0, ptb->pe_buffer ); | 
|  | } | 
|  | ptb->pe_buffer = HeapAlloc( GetProcessHeap(), 0, (ptb->pe_len = size) ); | 
|  | if (!ptb->pe_buffer) SetLastError(WSAENOBUFS); | 
|  | return ptb->pe_buffer; | 
|  | } | 
|  |  | 
|  | /* ----------------------------------- i/o APIs */ | 
|  |  | 
|  | #ifdef HAVE_IPX | 
|  | #define SUPPORTED_PF(pf) ((pf)==WS_AF_INET || (pf)== WS_AF_IPX || (pf) == WS_AF_INET6) | 
|  | #else | 
|  | #define SUPPORTED_PF(pf) ((pf)==WS_AF_INET || (pf) == WS_AF_INET6) | 
|  | #endif | 
|  |  | 
|  |  | 
|  | /**********************************************************************/ | 
|  |  | 
|  | /* Returns the length of the converted address if successful, 0 if it was too small to | 
|  | * start with. | 
|  | */ | 
|  | static unsigned int ws_sockaddr_ws2u(const struct WS_sockaddr* wsaddr, int wsaddrlen, | 
|  | union generic_unix_sockaddr *uaddr) | 
|  | { | 
|  | unsigned int uaddrlen = 0; | 
|  |  | 
|  | switch (wsaddr->sa_family) | 
|  | { | 
|  | #ifdef HAVE_IPX | 
|  | case WS_AF_IPX: | 
|  | { | 
|  | const struct WS_sockaddr_ipx* wsipx=(const struct WS_sockaddr_ipx*)wsaddr; | 
|  | struct sockaddr_ipx* uipx = (struct sockaddr_ipx *)uaddr; | 
|  |  | 
|  | if (wsaddrlen<sizeof(struct WS_sockaddr_ipx)) | 
|  | return 0; | 
|  |  | 
|  | uaddrlen = sizeof(struct sockaddr_ipx); | 
|  | memset( uaddr, 0, uaddrlen ); | 
|  | uipx->sipx_family=AF_IPX; | 
|  | uipx->sipx_port=wsipx->sa_socket; | 
|  | /* copy sa_netnum and sa_nodenum to sipx_network and sipx_node | 
|  | * in one go | 
|  | */ | 
|  | memcpy(&uipx->sipx_network,wsipx->sa_netnum,sizeof(uipx->sipx_network)+sizeof(uipx->sipx_node)); | 
|  | #ifdef IPX_FRAME_NONE | 
|  | uipx->sipx_type=IPX_FRAME_NONE; | 
|  | #endif | 
|  | break; | 
|  | } | 
|  | #endif | 
|  | case WS_AF_INET6: { | 
|  | struct sockaddr_in6* uin6 = (struct sockaddr_in6 *)uaddr; | 
|  | const struct WS_sockaddr_in6* win6 = (const struct WS_sockaddr_in6*)wsaddr; | 
|  |  | 
|  | /* Note: Windows has 2 versions of the sockaddr_in6 struct, one with | 
|  | * scope_id, one without. | 
|  | */ | 
|  | if (wsaddrlen >= sizeof(struct WS_sockaddr_in6_old)) { | 
|  | uaddrlen = sizeof(struct sockaddr_in6); | 
|  | memset( uaddr, 0, uaddrlen ); | 
|  | uin6->sin6_family   = AF_INET6; | 
|  | uin6->sin6_port     = win6->sin6_port; | 
|  | uin6->sin6_flowinfo = win6->sin6_flowinfo; | 
|  | #ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID | 
|  | if (wsaddrlen >= sizeof(struct WS_sockaddr_in6)) uin6->sin6_scope_id = win6->sin6_scope_id; | 
|  | #endif | 
|  | memcpy(&uin6->sin6_addr,&win6->sin6_addr,16); /* 16 bytes = 128 address bits */ | 
|  | break; | 
|  | } | 
|  | FIXME("bad size %d for WS_sockaddr_in6\n",wsaddrlen); | 
|  | return 0; | 
|  | } | 
|  | case WS_AF_INET: { | 
|  | struct sockaddr_in* uin = (struct sockaddr_in *)uaddr; | 
|  | const struct WS_sockaddr_in* win = (const struct WS_sockaddr_in*)wsaddr; | 
|  |  | 
|  | if (wsaddrlen<sizeof(struct WS_sockaddr_in)) | 
|  | return 0; | 
|  | uaddrlen = sizeof(struct sockaddr_in); | 
|  | memset( uaddr, 0, uaddrlen ); | 
|  | uin->sin_family = AF_INET; | 
|  | uin->sin_port   = win->sin_port; | 
|  | memcpy(&uin->sin_addr,&win->sin_addr,4); /* 4 bytes = 32 address bits */ | 
|  | break; | 
|  | } | 
|  | case WS_AF_UNSPEC: { | 
|  | /* Try to determine the needed space by the passed windows sockaddr space */ | 
|  | switch (wsaddrlen) { | 
|  | default: /* likely a ipv4 address */ | 
|  | case sizeof(struct WS_sockaddr_in): | 
|  | uaddrlen = sizeof(struct sockaddr_in); | 
|  | break; | 
|  | #ifdef HAVE_IPX | 
|  | case sizeof(struct WS_sockaddr_ipx): | 
|  | uaddrlen = sizeof(struct sockaddr_ipx); | 
|  | break; | 
|  | #endif | 
|  | case sizeof(struct WS_sockaddr_in6): | 
|  | case sizeof(struct WS_sockaddr_in6_old): | 
|  | uaddrlen = sizeof(struct sockaddr_in6); | 
|  | break; | 
|  | } | 
|  | memset( uaddr, 0, uaddrlen ); | 
|  | break; | 
|  | } | 
|  | default: | 
|  | FIXME("Unknown address family %d, return NULL.\n", wsaddr->sa_family); | 
|  | return 0; | 
|  | } | 
|  | return uaddrlen; | 
|  | } | 
|  |  | 
|  | static BOOL is_sockaddr_bound(const struct sockaddr *uaddr, int uaddrlen) | 
|  | { | 
|  | switch (uaddr->sa_family) | 
|  | { | 
|  | #ifdef HAVE_IPX | 
|  | case AF_IPX: | 
|  | FIXME("don't know how to tell if IPX socket is bound, assuming it is!\n"); | 
|  | return TRUE; | 
|  | #endif | 
|  | case AF_INET6: | 
|  | { | 
|  | static const struct sockaddr_in6 emptyAddr; | 
|  | const struct sockaddr_in6 *in6 = (const struct sockaddr_in6*) uaddr; | 
|  | return in6->sin6_port || memcmp(&in6->sin6_addr, &emptyAddr.sin6_addr, sizeof(struct in6_addr)); | 
|  | } | 
|  | case AF_INET: | 
|  | { | 
|  | static const struct sockaddr_in emptyAddr; | 
|  | const struct sockaddr_in *in = (const struct sockaddr_in*) uaddr; | 
|  | return in->sin_port || memcmp(&in->sin_addr, &emptyAddr.sin_addr, sizeof(struct in_addr)); | 
|  | } | 
|  | case AF_UNSPEC: | 
|  | return FALSE; | 
|  | default: | 
|  | FIXME("unknown address family %d\n", uaddr->sa_family); | 
|  | return TRUE; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* Returns 0 if successful, -1 if the buffer is too small */ | 
|  | static int ws_sockaddr_u2ws(const struct sockaddr* uaddr, struct WS_sockaddr* wsaddr, int* wsaddrlen) | 
|  | { | 
|  | int res; | 
|  |  | 
|  | switch(uaddr->sa_family) | 
|  | { | 
|  | #ifdef HAVE_IPX | 
|  | case AF_IPX: | 
|  | { | 
|  | const struct sockaddr_ipx* uipx=(const struct sockaddr_ipx*)uaddr; | 
|  | struct WS_sockaddr_ipx* wsipx=(struct WS_sockaddr_ipx*)wsaddr; | 
|  |  | 
|  | res=-1; | 
|  | switch (*wsaddrlen) /* how much can we copy? */ | 
|  | { | 
|  | default: | 
|  | res=0; /* enough */ | 
|  | *wsaddrlen = sizeof(*wsipx); | 
|  | wsipx->sa_socket=uipx->sipx_port; | 
|  | /* fall through */ | 
|  | case 13: | 
|  | case 12: | 
|  | memcpy(wsipx->sa_nodenum,uipx->sipx_node,sizeof(wsipx->sa_nodenum)); | 
|  | /* fall through */ | 
|  | case 11: | 
|  | case 10: | 
|  | case 9: | 
|  | case 8: | 
|  | case 7: | 
|  | case 6: | 
|  | memcpy(wsipx->sa_netnum,&uipx->sipx_network,sizeof(wsipx->sa_netnum)); | 
|  | /* fall through */ | 
|  | case 5: | 
|  | case 4: | 
|  | case 3: | 
|  | case 2: | 
|  | wsipx->sa_family=WS_AF_IPX; | 
|  | /* fall through */ | 
|  | case 1: | 
|  | case 0: | 
|  | /* way too small */ | 
|  | break; | 
|  | } | 
|  | } | 
|  | break; | 
|  | #endif | 
|  | case AF_INET6: { | 
|  | const struct sockaddr_in6* uin6 = (const struct sockaddr_in6*)uaddr; | 
|  | struct WS_sockaddr_in6_old* win6old = (struct WS_sockaddr_in6_old*)wsaddr; | 
|  |  | 
|  | if (*wsaddrlen < sizeof(struct WS_sockaddr_in6_old)) | 
|  | return -1; | 
|  | win6old->sin6_family   = WS_AF_INET6; | 
|  | win6old->sin6_port     = uin6->sin6_port; | 
|  | win6old->sin6_flowinfo = uin6->sin6_flowinfo; | 
|  | memcpy(&win6old->sin6_addr,&uin6->sin6_addr,16); /* 16 bytes = 128 address bits */ | 
|  | *wsaddrlen = sizeof(struct WS_sockaddr_in6_old); | 
|  | #ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID | 
|  | if (*wsaddrlen >= sizeof(struct WS_sockaddr_in6)) { | 
|  | struct WS_sockaddr_in6* win6 = (struct WS_sockaddr_in6*)wsaddr; | 
|  | win6->sin6_scope_id = uin6->sin6_scope_id; | 
|  | *wsaddrlen = sizeof(struct WS_sockaddr_in6); | 
|  | } | 
|  | #endif | 
|  | return 0; | 
|  | } | 
|  | case AF_INET: { | 
|  | const struct sockaddr_in* uin = (const struct sockaddr_in*)uaddr; | 
|  | struct WS_sockaddr_in* win = (struct WS_sockaddr_in*)wsaddr; | 
|  |  | 
|  | if (*wsaddrlen < sizeof(struct WS_sockaddr_in)) | 
|  | return -1; | 
|  | win->sin_family = WS_AF_INET; | 
|  | win->sin_port   = uin->sin_port; | 
|  | memcpy(&win->sin_addr,&uin->sin_addr,4); /* 4 bytes = 32 address bits */ | 
|  | memset(win->sin_zero, 0, 8); /* Make sure the null padding is null */ | 
|  | *wsaddrlen = sizeof(struct WS_sockaddr_in); | 
|  | return 0; | 
|  | } | 
|  | case AF_UNSPEC: { | 
|  | memset(wsaddr,0,*wsaddrlen); | 
|  | return 0; | 
|  | } | 
|  | default: | 
|  | FIXME("Unknown address family %d\n", uaddr->sa_family); | 
|  | return -1; | 
|  | } | 
|  | return res; | 
|  | } | 
|  |  | 
|  | /************************************************************************** | 
|  | * Functions for handling overlapped I/O | 
|  | **************************************************************************/ | 
|  |  | 
|  | /* user APC called upon async completion */ | 
|  | static void WINAPI ws2_async_apc( void *arg, IO_STATUS_BLOCK *iosb, ULONG reserved ) | 
|  | { | 
|  | ws2_async *wsa = arg; | 
|  |  | 
|  | if (wsa->completion_func) wsa->completion_func( NtStatusToWSAError(iosb->u.Status), | 
|  | iosb->Information, wsa->user_overlapped, | 
|  | wsa->flags ); | 
|  | HeapFree( GetProcessHeap(), 0, wsa ); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WS2_recv                (INTERNAL) | 
|  | * | 
|  | * Workhorse for both synchronous and asynchronous recv() operations. | 
|  | */ | 
|  | static int WS2_recv( int fd, struct iovec* iov, int count, | 
|  | struct WS_sockaddr *lpFrom, LPINT lpFromlen, | 
|  | LPDWORD lpFlags ) | 
|  | { | 
|  | struct msghdr hdr; | 
|  | union generic_unix_sockaddr unix_sockaddr; | 
|  | int n; | 
|  |  | 
|  | hdr.msg_name = NULL; | 
|  |  | 
|  | if ( lpFrom ) | 
|  | { | 
|  | hdr.msg_namelen = sizeof(unix_sockaddr); | 
|  | hdr.msg_name = &unix_sockaddr; | 
|  | } | 
|  | else | 
|  | hdr.msg_namelen = 0; | 
|  |  | 
|  | hdr.msg_iov = iov; | 
|  | hdr.msg_iovlen = count; | 
|  | #ifdef HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS | 
|  | hdr.msg_accrights = NULL; | 
|  | hdr.msg_accrightslen = 0; | 
|  | #else | 
|  | hdr.msg_control = NULL; | 
|  | hdr.msg_controllen = 0; | 
|  | hdr.msg_flags = 0; | 
|  | #endif | 
|  |  | 
|  | if ( (n = recvmsg(fd, &hdr, *lpFlags)) == -1 ) | 
|  | return -1; | 
|  |  | 
|  | /* if this socket is connected and lpFrom is not NULL, Linux doesn't give us | 
|  | * msg_name and msg_namelen from recvmsg, but it does set msg_namelen to zero. | 
|  | * | 
|  | * quoting linux 2.6 net/ipv4/tcp.c: | 
|  | *  "According to UNIX98, msg_name/msg_namelen are ignored | 
|  | *  on connected socket. I was just happy when found this 8) --ANK" | 
|  | * | 
|  | * likewise MSDN says that lpFrom and lpFromlen are ignored for | 
|  | * connection-oriented sockets, so don't try to update lpFrom. | 
|  | */ | 
|  | if ( lpFrom && hdr.msg_namelen && | 
|  | ws_sockaddr_u2ws( &unix_sockaddr.addr, lpFrom, lpFromlen ) != 0 ) | 
|  | { | 
|  | /* The from buffer was too small, but we read the data | 
|  | * anyway. Is that really bad? | 
|  | */ | 
|  | } | 
|  |  | 
|  | return n; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WS2_async_recv          (INTERNAL) | 
|  | * | 
|  | * Handler for overlapped recv() operations. | 
|  | */ | 
|  | static NTSTATUS WS2_async_recv( void* user, IO_STATUS_BLOCK* iosb, NTSTATUS status, ULONG_PTR *total ) | 
|  | { | 
|  | ws2_async* wsa = user; | 
|  | int result = 0, fd; | 
|  |  | 
|  | switch (status) | 
|  | { | 
|  | case STATUS_ALERTED: | 
|  | if ((status = wine_server_handle_to_fd( wsa->hSocket, FILE_READ_DATA, &fd, NULL ) )) | 
|  | break; | 
|  |  | 
|  | result = WS2_recv( fd, wsa->iovec, wsa->n_iovecs, | 
|  | wsa->addr, wsa->addrlen.ptr, &wsa->flags ); | 
|  | wine_server_release_fd( wsa->hSocket, fd ); | 
|  | if (result >= 0) | 
|  | { | 
|  | status = STATUS_SUCCESS; | 
|  | _enable_event( wsa->hSocket, FD_READ, 0, 0 ); | 
|  | } | 
|  | else | 
|  | { | 
|  | if (errno == EINTR || errno == EAGAIN) | 
|  | { | 
|  | status = STATUS_PENDING; | 
|  | _enable_event( wsa->hSocket, FD_READ, 0, 0 ); | 
|  | } | 
|  | else | 
|  | { | 
|  | result = 0; | 
|  | status = wsaErrno(); /* FIXME: is this correct ???? */ | 
|  | } | 
|  | } | 
|  | break; | 
|  | } | 
|  | if (status != STATUS_PENDING) | 
|  | { | 
|  | iosb->u.Status = status; | 
|  | iosb->Information = *total = result; | 
|  | } | 
|  | return status; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WS2_send                (INTERNAL) | 
|  | * | 
|  | * Workhorse for both synchronous and asynchronous send() operations. | 
|  | */ | 
|  | static int WS2_send( int fd, struct iovec* iov, int count, | 
|  | const struct WS_sockaddr *to, INT tolen, DWORD dwFlags ) | 
|  | { | 
|  | struct msghdr hdr; | 
|  | union generic_unix_sockaddr unix_addr; | 
|  |  | 
|  |  | 
|  | hdr.msg_name = NULL; | 
|  | hdr.msg_namelen = 0; | 
|  |  | 
|  | if ( to ) | 
|  | { | 
|  | hdr.msg_name = &unix_addr; | 
|  | hdr.msg_namelen = ws_sockaddr_ws2u( to, tolen, &unix_addr ); | 
|  | if ( !hdr.msg_namelen ) | 
|  | { | 
|  | errno = EFAULT; | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | #if defined(HAVE_IPX) && defined(SOL_IPX) | 
|  | if(to->sa_family == WS_AF_IPX) | 
|  | { | 
|  | struct sockaddr_ipx* uipx = (struct sockaddr_ipx*)hdr.msg_name; | 
|  | int val=0; | 
|  | unsigned int len=sizeof(int); | 
|  |  | 
|  | /* The packet type is stored at the ipx socket level; At least the linux kernel seems | 
|  | *  to do something with it in case hdr.msg_name is NULL. Nonetheless can we use it to store | 
|  | *  the packet type and then we can retrieve it using getsockopt. After that we can set the | 
|  | *  ipx type in the sockaddr_opx structure with the stored value. | 
|  | */ | 
|  | if(getsockopt(fd, SOL_IPX, IPX_TYPE, &val, &len) != -1) | 
|  | uipx->sipx_type = val; | 
|  | } | 
|  | #endif | 
|  | } | 
|  |  | 
|  | hdr.msg_iov = iov; | 
|  | hdr.msg_iovlen = count; | 
|  | #ifdef HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS | 
|  | hdr.msg_accrights = NULL; | 
|  | hdr.msg_accrightslen = 0; | 
|  | #else | 
|  | hdr.msg_control = NULL; | 
|  | hdr.msg_controllen = 0; | 
|  | hdr.msg_flags = 0; | 
|  | #endif | 
|  |  | 
|  | return sendmsg(fd, &hdr, dwFlags); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WS2_async_send          (INTERNAL) | 
|  | * | 
|  | * Handler for overlapped send() operations. | 
|  | */ | 
|  | static NTSTATUS WS2_async_send(void* user, IO_STATUS_BLOCK* iosb, NTSTATUS status, ULONG_PTR *total ) | 
|  | { | 
|  | ws2_async* wsa = user; | 
|  | int result = 0, fd; | 
|  |  | 
|  | switch (status) | 
|  | { | 
|  | case STATUS_ALERTED: | 
|  | if ((status = wine_server_handle_to_fd( wsa->hSocket, FILE_WRITE_DATA, &fd, NULL ) )) | 
|  | break; | 
|  |  | 
|  | /* check to see if the data is ready (non-blocking) */ | 
|  | result = WS2_send( fd, wsa->iovec, wsa->n_iovecs, wsa->addr, wsa->addrlen.val, wsa->flags ); | 
|  | wine_server_release_fd( wsa->hSocket, fd ); | 
|  |  | 
|  | if (result >= 0) | 
|  | { | 
|  | int totalLength = 0; | 
|  | int i; | 
|  | status = STATUS_SUCCESS; | 
|  | for (i = 0; i < wsa->n_iovecs; i++) | 
|  | totalLength += wsa->iovec[i].iov_len; | 
|  | if (result < totalLength) | 
|  | _enable_event( wsa->hSocket, FD_WRITE, 0, 0 ); | 
|  | } | 
|  | else | 
|  | { | 
|  | if (errno == EINTR || errno == EAGAIN) | 
|  | { | 
|  | status = STATUS_PENDING; | 
|  | _enable_event( wsa->hSocket, FD_WRITE, 0, 0 ); | 
|  | } | 
|  | else | 
|  | { | 
|  | /* We set the status to a winsock error code and check for that | 
|  | later in NtStatusToWSAError () */ | 
|  | status = wsaErrno(); | 
|  | result = 0; | 
|  | } | 
|  | } | 
|  | break; | 
|  | } | 
|  | if (status != STATUS_PENDING) | 
|  | { | 
|  | iosb->u.Status = status; | 
|  | iosb->Information = *total = result; | 
|  | } | 
|  | return status; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WS2_async_shutdown      (INTERNAL) | 
|  | * | 
|  | * Handler for shutdown() operations on overlapped sockets. | 
|  | */ | 
|  | static NTSTATUS WS2_async_shutdown( void* user, PIO_STATUS_BLOCK iosb, NTSTATUS status ) | 
|  | { | 
|  | ws2_async* wsa = user; | 
|  | int fd, err = 1; | 
|  |  | 
|  | switch (status) | 
|  | { | 
|  | case STATUS_ALERTED: | 
|  | if ((status = wine_server_handle_to_fd( wsa->hSocket, 0, &fd, NULL ) )) | 
|  | break; | 
|  |  | 
|  | switch ( wsa->type ) | 
|  | { | 
|  | case ASYNC_TYPE_READ:   err = shutdown( fd, 0 );  break; | 
|  | case ASYNC_TYPE_WRITE:  err = shutdown( fd, 1 );  break; | 
|  | } | 
|  | wine_server_release_fd( wsa->hSocket, fd ); | 
|  | status = err ? wsaErrno() : STATUS_SUCCESS; | 
|  | break; | 
|  | } | 
|  | iosb->u.Status = status; | 
|  | return status; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *  WS2_register_async_shutdown         (INTERNAL) | 
|  | * | 
|  | * Helper function for WS_shutdown() on overlapped sockets. | 
|  | */ | 
|  | static int WS2_register_async_shutdown( SOCKET s, int type ) | 
|  | { | 
|  | struct ws2_async *wsa; | 
|  | NTSTATUS status; | 
|  |  | 
|  | TRACE("s %ld type %d\n", s, type); | 
|  |  | 
|  | wsa = HeapAlloc( GetProcessHeap(), 0, sizeof(*wsa) ); | 
|  | if ( !wsa ) | 
|  | return WSAEFAULT; | 
|  |  | 
|  | wsa->hSocket         = SOCKET2HANDLE(s); | 
|  | wsa->type            = type; | 
|  | wsa->completion_func = NULL; | 
|  |  | 
|  | SERVER_START_REQ( register_async ) | 
|  | { | 
|  | req->handle = wsa->hSocket; | 
|  | req->type   = type; | 
|  | req->async.callback = WS2_async_shutdown; | 
|  | req->async.iosb     = &wsa->local_iosb; | 
|  | req->async.arg      = wsa; | 
|  | req->async.apc      = ws2_async_apc; | 
|  | req->async.cvalue   = 0; | 
|  | status = wine_server_call( req ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  |  | 
|  | if (status != STATUS_PENDING) | 
|  | { | 
|  | HeapFree( GetProcessHeap(), 0, wsa ); | 
|  | return NtStatusToWSAError( status ); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		accept		(WS2_32.1) | 
|  | */ | 
|  | SOCKET WINAPI WS_accept(SOCKET s, struct WS_sockaddr *addr, | 
|  | int *addrlen32) | 
|  | { | 
|  | SOCKET as; | 
|  | BOOL is_blocking; | 
|  |  | 
|  | TRACE("socket %04lx\n", s ); | 
|  | is_blocking = _is_blocking(s); | 
|  |  | 
|  | do { | 
|  | if (is_blocking) | 
|  | { | 
|  | int fd = get_sock_fd( s, FILE_READ_DATA, NULL ); | 
|  | if (fd == -1) return INVALID_SOCKET; | 
|  | /* block here */ | 
|  | do_block(fd, POLLIN, -1); | 
|  | _sync_sock_state(s); /* let wineserver notice connection */ | 
|  | release_sock_fd( s, fd ); | 
|  | /* retrieve any error codes from it */ | 
|  | SetLastError(_get_sock_error(s, FD_ACCEPT_BIT)); | 
|  | /* FIXME: care about the error? */ | 
|  | } | 
|  | SERVER_START_REQ( accept_socket ) | 
|  | { | 
|  | req->lhandle    = SOCKET2HANDLE(s); | 
|  | req->access     = GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE; | 
|  | req->attributes = OBJ_INHERIT; | 
|  | set_error( wine_server_call( req ) ); | 
|  | as = HANDLE2SOCKET( reply->handle ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | if (as) | 
|  | { | 
|  | if (addr) WS_getpeername(as, addr, addrlen32); | 
|  | return as; | 
|  | } | 
|  | } while (is_blocking); | 
|  | return INVALID_SOCKET; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		bind			(WS2_32.2) | 
|  | */ | 
|  | int WINAPI WS_bind(SOCKET s, const struct WS_sockaddr* name, int namelen) | 
|  | { | 
|  | int fd = get_sock_fd( s, 0, NULL ); | 
|  | int res = SOCKET_ERROR; | 
|  |  | 
|  | TRACE("socket %04lx, ptr %p %s, length %d\n", s, name, debugstr_sockaddr(name), namelen); | 
|  |  | 
|  | if (fd != -1) | 
|  | { | 
|  | if (!name || (name->sa_family && !SUPPORTED_PF(name->sa_family))) | 
|  | { | 
|  | SetLastError(WSAEAFNOSUPPORT); | 
|  | } | 
|  | else | 
|  | { | 
|  | union generic_unix_sockaddr uaddr; | 
|  | unsigned int uaddrlen = ws_sockaddr_ws2u(name, namelen, &uaddr); | 
|  | if (!uaddrlen) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | } | 
|  | else | 
|  | { | 
|  | #ifdef IPV6_V6ONLY | 
|  | const struct sockaddr_in6 *in6 = (const struct sockaddr_in6*) &uaddr; | 
|  | if (name->sa_family == WS_AF_INET6 && | 
|  | !memcmp(&in6->sin6_addr, &in6addr_any, sizeof(struct in6_addr))) | 
|  | { | 
|  | int enable = 1; | 
|  | if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &enable, sizeof(enable)) == -1) | 
|  | { | 
|  | release_sock_fd( s, fd ); | 
|  | SetLastError(WSAEAFNOSUPPORT); | 
|  | return INVALID_SOCKET; | 
|  | } | 
|  | } | 
|  | #endif | 
|  | if (name->sa_family == WS_AF_INET) | 
|  | { | 
|  | struct sockaddr_in *in4 = (struct sockaddr_in*) &uaddr; | 
|  | if (memcmp(&in4->sin_addr, magic_loopback_addr, 4) == 0) | 
|  | { | 
|  | /* Trying to bind to the default host interface, using | 
|  | * INADDR_ANY instead*/ | 
|  | WARN("Trying to bind to magic IP address, using " | 
|  | "INADDR_ANY instead.\n"); | 
|  | in4->sin_addr.s_addr = htonl(WS_INADDR_ANY); | 
|  | } | 
|  | } | 
|  | if (bind(fd, &uaddr.addr, uaddrlen) < 0) | 
|  | { | 
|  | int loc_errno = errno; | 
|  | WARN("\tfailure - errno = %i\n", errno); | 
|  | errno = loc_errno; | 
|  | switch (errno) | 
|  | { | 
|  | case EBADF: | 
|  | SetLastError(WSAENOTSOCK); | 
|  | break; | 
|  | case EADDRNOTAVAIL: | 
|  | SetLastError(WSAEINVAL); | 
|  | break; | 
|  | default: | 
|  | SetLastError(wsaErrno()); | 
|  | break; | 
|  | } | 
|  | } | 
|  | else | 
|  | { | 
|  | res=0; /* success */ | 
|  | } | 
|  | } | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  | } | 
|  | return res; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		closesocket		(WS2_32.3) | 
|  | */ | 
|  | int WINAPI WS_closesocket(SOCKET s) | 
|  | { | 
|  | TRACE("socket %04lx\n", s); | 
|  | if (CloseHandle(SOCKET2HANDLE(s))) return 0; | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		connect		(WS2_32.4) | 
|  | */ | 
|  | int WINAPI WS_connect(SOCKET s, const struct WS_sockaddr* name, int namelen) | 
|  | { | 
|  | int fd = get_sock_fd( s, FILE_READ_DATA, NULL ); | 
|  |  | 
|  | TRACE("socket %04lx, ptr %p %s, length %d\n", s, name, debugstr_sockaddr(name), namelen); | 
|  |  | 
|  | if (fd != -1) | 
|  | { | 
|  | union generic_unix_sockaddr uaddr; | 
|  | unsigned int uaddrlen = ws_sockaddr_ws2u(name, namelen, &uaddr); | 
|  |  | 
|  | if (!uaddrlen) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | } | 
|  | else | 
|  | { | 
|  | if (name->sa_family == WS_AF_INET) | 
|  | { | 
|  | struct sockaddr_in *in4 = (struct sockaddr_in*) &uaddr; | 
|  | if (memcmp(&in4->sin_addr, magic_loopback_addr, 4) == 0) | 
|  | { | 
|  | /* Trying to connect to magic replace-loopback address, | 
|  | * assuming we really want to connect to localhost */ | 
|  | TRACE("Trying to connect to magic IP address, using " | 
|  | "INADDR_LOOPBACK instead.\n"); | 
|  | in4->sin_addr.s_addr = htonl(WS_INADDR_LOOPBACK); | 
|  | } | 
|  | } | 
|  |  | 
|  | if (connect(fd, &uaddr.addr, uaddrlen) == 0) | 
|  | goto connect_success; | 
|  | } | 
|  |  | 
|  | if (errno == EINPROGRESS) | 
|  | { | 
|  | /* tell wineserver that a connection is in progress */ | 
|  | _enable_event(SOCKET2HANDLE(s), FD_CONNECT|FD_READ|FD_WRITE, | 
|  | FD_CONNECT|FD_READ|FD_WRITE, | 
|  | FD_WINE_CONNECTED|FD_WINE_LISTENING); | 
|  | if (_is_blocking(s)) | 
|  | { | 
|  | int result; | 
|  | /* block here */ | 
|  | do_block(fd, POLLIN | POLLOUT, -1); | 
|  | _sync_sock_state(s); /* let wineserver notice connection */ | 
|  | /* retrieve any error codes from it */ | 
|  | result = _get_sock_error(s, FD_CONNECT_BIT); | 
|  | if (result) | 
|  | SetLastError(result); | 
|  | else | 
|  | { | 
|  | goto connect_success; | 
|  | } | 
|  | } | 
|  | else | 
|  | { | 
|  | SetLastError(WSAEWOULDBLOCK); | 
|  | } | 
|  | } | 
|  | else | 
|  | { | 
|  | SetLastError(wsaErrno()); | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  | } | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | connect_success: | 
|  | release_sock_fd( s, fd ); | 
|  | _enable_event(SOCKET2HANDLE(s), FD_CONNECT|FD_READ|FD_WRITE, | 
|  | FD_WINE_CONNECTED|FD_READ|FD_WRITE, | 
|  | FD_CONNECT|FD_WINE_LISTENING); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAConnect             (WS2_32.30) | 
|  | */ | 
|  | int WINAPI WSAConnect( SOCKET s, const struct WS_sockaddr* name, int namelen, | 
|  | LPWSABUF lpCallerData, LPWSABUF lpCalleeData, | 
|  | LPQOS lpSQOS, LPQOS lpGQOS ) | 
|  | { | 
|  | if ( lpCallerData || lpCalleeData || lpSQOS || lpGQOS ) | 
|  | FIXME("unsupported parameters!\n"); | 
|  | return WS_connect( s, name, namelen ); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		getpeername		(WS2_32.5) | 
|  | */ | 
|  | int WINAPI WS_getpeername(SOCKET s, struct WS_sockaddr *name, int *namelen) | 
|  | { | 
|  | int fd; | 
|  | int res; | 
|  |  | 
|  | TRACE("socket: %04lx, ptr %p, len %08x\n", s, name, *namelen); | 
|  |  | 
|  | /* Check if what we've received is valid. Should we use IsBadReadPtr? */ | 
|  | if( (name == NULL) || (namelen == NULL) ) | 
|  | { | 
|  | SetLastError( WSAEFAULT ); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | fd = get_sock_fd( s, 0, NULL ); | 
|  | res = SOCKET_ERROR; | 
|  |  | 
|  | if (fd != -1) | 
|  | { | 
|  | union generic_unix_sockaddr uaddr; | 
|  | unsigned int uaddrlen = sizeof(uaddr); | 
|  |  | 
|  | if (getpeername(fd, &uaddr.addr, &uaddrlen) != 0) | 
|  | { | 
|  | SetLastError(wsaErrno()); | 
|  | } | 
|  | else if (ws_sockaddr_u2ws(&uaddr.addr, name, namelen) != 0) | 
|  | { | 
|  | /* The buffer was too small */ | 
|  | SetLastError(WSAEFAULT); | 
|  | } | 
|  | else | 
|  | { | 
|  | res=0; | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  | } | 
|  | return res; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		getsockname		(WS2_32.6) | 
|  | */ | 
|  | int WINAPI WS_getsockname(SOCKET s, struct WS_sockaddr *name, int *namelen) | 
|  | { | 
|  | int fd; | 
|  | int res; | 
|  |  | 
|  | TRACE("socket: %04lx, ptr %p, len %8x\n", s, name, *namelen); | 
|  |  | 
|  | /* Check if what we've received is valid. Should we use IsBadReadPtr? */ | 
|  | if( (name == NULL) || (namelen == NULL) ) | 
|  | { | 
|  | SetLastError( WSAEFAULT ); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | fd = get_sock_fd( s, 0, NULL ); | 
|  | res = SOCKET_ERROR; | 
|  |  | 
|  | if (fd != -1) | 
|  | { | 
|  | union generic_unix_sockaddr uaddr; | 
|  | unsigned int uaddrlen = sizeof(uaddr); | 
|  |  | 
|  | if (getsockname(fd, &uaddr.addr, &uaddrlen) != 0) | 
|  | { | 
|  | SetLastError(wsaErrno()); | 
|  | } | 
|  | else if (!is_sockaddr_bound(&uaddr.addr, uaddrlen)) | 
|  | { | 
|  | SetLastError(WSAEINVAL); | 
|  | } | 
|  | else if (ws_sockaddr_u2ws(&uaddr.addr, name, namelen) != 0) | 
|  | { | 
|  | /* The buffer was too small */ | 
|  | SetLastError(WSAEFAULT); | 
|  | } | 
|  | else | 
|  | { | 
|  | res=0; | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  | } | 
|  | return res; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		getsockopt		(WS2_32.7) | 
|  | */ | 
|  | INT WINAPI WS_getsockopt(SOCKET s, INT level, | 
|  | INT optname, char *optval, INT *optlen) | 
|  | { | 
|  | int fd; | 
|  | INT ret = 0; | 
|  |  | 
|  | TRACE("socket: %04lx, level 0x%x, name 0x%x, ptr %p, len %d\n", | 
|  | s, level, optname, optval, *optlen); | 
|  |  | 
|  | switch(level) | 
|  | { | 
|  | case WS_SOL_SOCKET: | 
|  | { | 
|  | switch(optname) | 
|  | { | 
|  | /* Handle common cases. The special cases are below, sorted | 
|  | * alphabetically */ | 
|  | case WS_SO_ACCEPTCONN: | 
|  | case WS_SO_BROADCAST: | 
|  | case WS_SO_DEBUG: | 
|  | case WS_SO_ERROR: | 
|  | case WS_SO_KEEPALIVE: | 
|  | case WS_SO_OOBINLINE: | 
|  | case WS_SO_RCVBUF: | 
|  | case WS_SO_REUSEADDR: | 
|  | case WS_SO_SNDBUF: | 
|  | case WS_SO_TYPE: | 
|  | if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
|  | return SOCKET_ERROR; | 
|  | convert_sockopt(&level, &optname); | 
|  | if (getsockopt(fd, level, optname, optval, (unsigned int *)optlen) != 0 ) | 
|  | { | 
|  | SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
|  | ret = SOCKET_ERROR; | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  | return ret; | 
|  |  | 
|  | case WS_SO_DONTLINGER: | 
|  | { | 
|  | struct linger lingval; | 
|  | unsigned int len = sizeof(struct linger); | 
|  |  | 
|  | if (!optlen || *optlen < sizeof(BOOL)|| !optval) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | if (getsockopt(fd, SOL_SOCKET, SO_LINGER, &lingval, &len) != 0 ) | 
|  | { | 
|  | SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
|  | ret = SOCKET_ERROR; | 
|  | } | 
|  | else | 
|  | { | 
|  | *(BOOL *)optval = (lingval.l_onoff) ? FALSE : TRUE; | 
|  | *optlen = sizeof(BOOL); | 
|  | } | 
|  |  | 
|  | release_sock_fd( s, fd ); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* As mentioned in setsockopt, Windows ignores this, so we | 
|  | * always return true here */ | 
|  | case WS_SO_DONTROUTE: | 
|  | if (!optlen || *optlen < sizeof(BOOL) || !optval) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | *(BOOL *)optval = TRUE; | 
|  | *optlen = sizeof(BOOL); | 
|  | return 0; | 
|  |  | 
|  | case WS_SO_LINGER: | 
|  | { | 
|  | struct linger lingval; | 
|  | unsigned int len = sizeof(struct linger); | 
|  |  | 
|  | /* struct linger and LINGER have different sizes */ | 
|  | if (!optlen || *optlen < sizeof(LINGER) || !optval) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | if (getsockopt(fd, SOL_SOCKET, SO_LINGER, &lingval, &len) != 0 ) | 
|  | { | 
|  | SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
|  | ret = SOCKET_ERROR; | 
|  | } | 
|  | else | 
|  | { | 
|  | ((LINGER *)optval)->l_onoff = lingval.l_onoff; | 
|  | ((LINGER *)optval)->l_linger = lingval.l_linger; | 
|  | *optlen = sizeof(struct linger); | 
|  | } | 
|  |  | 
|  | release_sock_fd( s, fd ); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | case WS_SO_MAX_MSG_SIZE: | 
|  | if (!optlen || *optlen < sizeof(int) || !optval) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | TRACE("getting global SO_MAX_MSG_SIZE = 65507\n"); | 
|  | *(int *)optval = 65507; | 
|  | *optlen = sizeof(int); | 
|  | return 0; | 
|  |  | 
|  | /* SO_OPENTYPE does not require a valid socket handle. */ | 
|  | case WS_SO_OPENTYPE: | 
|  | if (!optlen || *optlen < sizeof(int) || !optval) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | *(int *)optval = get_per_thread_data()->opentype; | 
|  | *optlen = sizeof(int); | 
|  | TRACE("getting global SO_OPENTYPE = 0x%x\n", *((int*)optval) ); | 
|  | return 0; | 
|  |  | 
|  | #ifdef SO_RCVTIMEO | 
|  | case WS_SO_RCVTIMEO: | 
|  | #endif | 
|  | #ifdef SO_SNDTIMEO | 
|  | case WS_SO_SNDTIMEO: | 
|  | #endif | 
|  | #if defined(SO_RCVTIMEO) || defined(SO_SNDTIMEO) | 
|  | { | 
|  | struct timeval tv; | 
|  | unsigned int len = sizeof(struct timeval); | 
|  |  | 
|  | if (!optlen || *optlen < sizeof(int)|| !optval) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | convert_sockopt(&level, &optname); | 
|  | if (getsockopt(fd, level, optname, &tv, &len) != 0 ) | 
|  | { | 
|  | SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
|  | ret = SOCKET_ERROR; | 
|  | } | 
|  | else | 
|  | { | 
|  | *(int *)optval = tv.tv_sec * 1000 + tv.tv_usec / 1000; | 
|  | *optlen = sizeof(int); | 
|  | } | 
|  |  | 
|  | release_sock_fd( s, fd ); | 
|  | return ret; | 
|  | } | 
|  | #endif | 
|  | default: | 
|  | TRACE("Unknown SOL_SOCKET optname: 0x%08x\n", optname); | 
|  | SetLastError(WSAENOPROTOOPT); | 
|  | return SOCKET_ERROR; | 
|  | } /* end switch(optname) */ | 
|  | }/* end case WS_SOL_SOCKET */ | 
|  | #ifdef HAVE_IPX | 
|  | case NSPROTO_IPX: | 
|  | { | 
|  | struct WS_sockaddr_ipx addr; | 
|  | IPX_ADDRESS_DATA *data; | 
|  | int namelen; | 
|  | switch(optname) | 
|  | { | 
|  | case IPX_PTYPE: | 
|  | if ((fd = get_sock_fd( s, 0, NULL )) == -1) return SOCKET_ERROR; | 
|  | #ifdef SOL_IPX | 
|  | if(getsockopt(fd, SOL_IPX, IPX_TYPE, optval, (unsigned int*)optlen) == -1) | 
|  | { | 
|  | ret = SOCKET_ERROR; | 
|  | } | 
|  | #else | 
|  | { | 
|  | struct ipx val; | 
|  | socklen_t len=sizeof(struct ipx); | 
|  | if(getsockopt(fd, 0, SO_DEFAULT_HEADERS, &val, &len) == -1 ) | 
|  | ret = SOCKET_ERROR; | 
|  | else | 
|  | *optval = (int)val.ipx_pt; | 
|  | } | 
|  | #endif | 
|  | TRACE("ptype: %d (fd: %d)\n", *(int*)optval, fd); | 
|  | release_sock_fd( s, fd ); | 
|  | return ret; | 
|  |  | 
|  | case IPX_ADDRESS: | 
|  | /* | 
|  | *  On a Win2000 system with one network card there are usually | 
|  | *  three ipx devices one with a speed of 28.8kbps, 10Mbps and 100Mbps. | 
|  | *  Using this call you can then retrieve info about this all. | 
|  | *  In case of Linux it is a bit different. Usually you have | 
|  | *  only "one" device active and further it is not possible to | 
|  | *  query things like the linkspeed. | 
|  | */ | 
|  | FIXME("IPX_ADDRESS\n"); | 
|  | namelen = sizeof(struct WS_sockaddr_ipx); | 
|  | memset(&addr, 0, sizeof(struct WS_sockaddr_ipx)); | 
|  | WS_getsockname(s, (struct WS_sockaddr*)&addr, &namelen); | 
|  |  | 
|  | data = (IPX_ADDRESS_DATA*)optval; | 
|  | memcpy(data->nodenum,addr.sa_nodenum,sizeof(data->nodenum)); | 
|  | memcpy(data->netnum,addr.sa_netnum,sizeof(data->netnum)); | 
|  | data->adapternum = 0; | 
|  | data->wan = FALSE; /* We are not on a wan for now .. */ | 
|  | data->status = FALSE; /* Since we are not on a wan, the wan link isn't up */ | 
|  | data->maxpkt = 1467; /* This value is the default one, at least on Win2k/WinXP */ | 
|  | data->linkspeed = 100000; /* Set the line speed in 100bit/s to 10 Mbit; | 
|  | * note 1MB = 1000kB in this case */ | 
|  | return 0; | 
|  |  | 
|  | case IPX_MAX_ADAPTER_NUM: | 
|  | FIXME("IPX_MAX_ADAPTER_NUM\n"); | 
|  | *(int*)optval = 1; /* As noted under IPX_ADDRESS we have just one card. */ | 
|  | return 0; | 
|  |  | 
|  | default: | 
|  | FIXME("IPX optname:%x\n", optname); | 
|  | return SOCKET_ERROR; | 
|  | }/* end switch(optname) */ | 
|  | } /* end case NSPROTO_IPX */ | 
|  | #endif | 
|  | /* Levels WS_IPPROTO_TCP and WS_IPPROTO_IP convert directly */ | 
|  | case WS_IPPROTO_TCP: | 
|  | switch(optname) | 
|  | { | 
|  | case WS_TCP_NODELAY: | 
|  | if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
|  | return SOCKET_ERROR; | 
|  | convert_sockopt(&level, &optname); | 
|  | if (getsockopt(fd, level, optname, optval, (unsigned int *)optlen) != 0 ) | 
|  | { | 
|  | SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
|  | ret = SOCKET_ERROR; | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  | return ret; | 
|  | } | 
|  | FIXME("Unknown IPPROTO_TCP optname 0x%08x\n", optname); | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | case WS_IPPROTO_IP: | 
|  | switch(optname) | 
|  | { | 
|  | case WS_IP_ADD_MEMBERSHIP: | 
|  | case WS_IP_DROP_MEMBERSHIP: | 
|  | #ifdef IP_HDRINCL | 
|  | case WS_IP_HDRINCL: | 
|  | #endif | 
|  | case WS_IP_MULTICAST_IF: | 
|  | case WS_IP_MULTICAST_LOOP: | 
|  | case WS_IP_MULTICAST_TTL: | 
|  | case WS_IP_OPTIONS: | 
|  | case WS_IP_TOS: | 
|  | case WS_IP_TTL: | 
|  | if ( (fd = get_sock_fd( s, 0, NULL )) == -1) | 
|  | return SOCKET_ERROR; | 
|  | convert_sockopt(&level, &optname); | 
|  | if (getsockopt(fd, level, optname, optval, (unsigned int *)optlen) != 0 ) | 
|  | { | 
|  | SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
|  | ret = SOCKET_ERROR; | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  | return ret; | 
|  | case WS_IP_DONTFRAGMENT: | 
|  | FIXME("WS_IP_DONTFRAGMENT is always false!\n"); | 
|  | *(BOOL*)optval = FALSE; | 
|  | return 0; | 
|  | } | 
|  | FIXME("Unknown IPPROTO_IP optname 0x%08x\n", optname); | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | default: | 
|  | FIXME("Unknown level: 0x%08x\n", level); | 
|  | return SOCKET_ERROR; | 
|  | } /* end switch(level) */ | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		htonl			(WINSOCK.8) | 
|  | *		htonl			(WS2_32.8) | 
|  | */ | 
|  | WS_u_long WINAPI WS_htonl(WS_u_long hostlong) | 
|  | { | 
|  | return htonl(hostlong); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		htons			(WINSOCK.9) | 
|  | *		htons			(WS2_32.9) | 
|  | */ | 
|  | WS_u_short WINAPI WS_htons(WS_u_short hostshort) | 
|  | { | 
|  | return htons(hostshort); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		WSAHtonl		(WS2_32.46) | 
|  | *  From MSDN description of error codes, this function should also | 
|  | *  check if WinSock has been initialized and the socket is a valid | 
|  | *  socket. But why? This function only translates a host byte order | 
|  | *  u_long into a network byte order u_long... | 
|  | */ | 
|  | int WINAPI WSAHtonl(SOCKET s, WS_u_long hostlong, WS_u_long *lpnetlong) | 
|  | { | 
|  | if (lpnetlong) | 
|  | { | 
|  | *lpnetlong = htonl(hostlong); | 
|  | return 0; | 
|  | } | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		WSAHtons		(WS2_32.47) | 
|  | *  From MSDN description of error codes, this function should also | 
|  | *  check if WinSock has been initialized and the socket is a valid | 
|  | *  socket. But why? This function only translates a host byte order | 
|  | *  u_short into a network byte order u_short... | 
|  | */ | 
|  | int WINAPI WSAHtons(SOCKET s, WS_u_short hostshort, WS_u_short *lpnetshort) | 
|  | { | 
|  |  | 
|  | if (lpnetshort) | 
|  | { | 
|  | *lpnetshort = htons(hostshort); | 
|  | return 0; | 
|  | } | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		inet_addr		(WINSOCK.10) | 
|  | *		inet_addr		(WS2_32.11) | 
|  | */ | 
|  | WS_u_long WINAPI WS_inet_addr(const char *cp) | 
|  | { | 
|  | if (!cp) return INADDR_NONE; | 
|  | return inet_addr(cp); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		ntohl			(WINSOCK.14) | 
|  | *		ntohl			(WS2_32.14) | 
|  | */ | 
|  | WS_u_long WINAPI WS_ntohl(WS_u_long netlong) | 
|  | { | 
|  | return ntohl(netlong); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		ntohs			(WINSOCK.15) | 
|  | *		ntohs			(WS2_32.15) | 
|  | */ | 
|  | WS_u_short WINAPI WS_ntohs(WS_u_short netshort) | 
|  | { | 
|  | return ntohs(netshort); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		inet_ntoa		(WS2_32.12) | 
|  | */ | 
|  | char* WINAPI WS_inet_ntoa(struct WS_in_addr in) | 
|  | { | 
|  | /* use "buffer for dummies" here because some applications have a | 
|  | * propensity to decode addresses in ws_hostent structure without | 
|  | * saving them first... | 
|  | */ | 
|  | static char dbuffer[16]; /* Yes, 16: 4*3 digits + 3 '.' + 1 '\0' */ | 
|  |  | 
|  | char* s = inet_ntoa(*((struct in_addr*)&in)); | 
|  | if( s ) | 
|  | { | 
|  | strcpy(dbuffer, s); | 
|  | return dbuffer; | 
|  | } | 
|  | SetLastError(wsaErrno()); | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | /********************************************************************** | 
|  | *              WSAIoctl                (WS2_32.50) | 
|  | * | 
|  | */ | 
|  | INT WINAPI WSAIoctl(SOCKET s, | 
|  | DWORD   dwIoControlCode, | 
|  | LPVOID  lpvInBuffer, | 
|  | DWORD   cbInBuffer, | 
|  | LPVOID  lpbOutBuffer, | 
|  | DWORD   cbOutBuffer, | 
|  | LPDWORD lpcbBytesReturned, | 
|  | LPWSAOVERLAPPED lpOverlapped, | 
|  | LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine) | 
|  | { | 
|  | TRACE("%ld, 0x%08x, %p, %d, %p, %d, %p, %p, %p\n", | 
|  | s, dwIoControlCode, lpvInBuffer, cbInBuffer, lpbOutBuffer, | 
|  | cbOutBuffer, lpcbBytesReturned, lpOverlapped, lpCompletionRoutine); | 
|  |  | 
|  | switch( dwIoControlCode ) | 
|  | { | 
|  | case WS_FIONBIO: | 
|  | if (cbInBuffer != sizeof(WS_u_long)) { | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | return WS_ioctlsocket( s, WS_FIONBIO, lpvInBuffer); | 
|  |  | 
|  | case WS_FIONREAD: | 
|  | if (cbOutBuffer != sizeof(WS_u_long)) { | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | return WS_ioctlsocket( s, WS_FIONREAD, lpbOutBuffer); | 
|  |  | 
|  | case WS_SIO_GET_INTERFACE_LIST: | 
|  | { | 
|  | INTERFACE_INFO* intArray = (INTERFACE_INFO*)lpbOutBuffer; | 
|  | DWORD size, numInt, apiReturn; | 
|  | int fd; | 
|  |  | 
|  | TRACE("-> SIO_GET_INTERFACE_LIST request\n"); | 
|  |  | 
|  | if (!lpbOutBuffer) | 
|  | { | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | if (!lpcbBytesReturned) | 
|  | { | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | fd = get_sock_fd( s, 0, NULL ); | 
|  | if (fd == -1) return SOCKET_ERROR; | 
|  |  | 
|  | apiReturn = GetAdaptersInfo(NULL, &size); | 
|  | if (apiReturn == ERROR_NO_DATA) | 
|  | { | 
|  | numInt = 0; | 
|  | } | 
|  | else if (apiReturn == ERROR_BUFFER_OVERFLOW) | 
|  | { | 
|  | PIP_ADAPTER_INFO table = HeapAlloc(GetProcessHeap(),0,size); | 
|  |  | 
|  | if (table) | 
|  | { | 
|  | if (GetAdaptersInfo(table, &size) == NO_ERROR) | 
|  | { | 
|  | PIP_ADAPTER_INFO ptr; | 
|  |  | 
|  | if (size*sizeof(INTERFACE_INFO)/sizeof(IP_ADAPTER_INFO) > cbOutBuffer) | 
|  | { | 
|  | WARN("Buffer too small = %u, cbOutBuffer = %u\n", size, cbOutBuffer); | 
|  | HeapFree(GetProcessHeap(),0,table); | 
|  | release_sock_fd( s, fd ); | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | for (ptr = table, numInt = 0; ptr; | 
|  | ptr = ptr->Next, intArray++, numInt++) | 
|  | { | 
|  | unsigned int addr, mask, bcast; | 
|  | struct ifreq ifInfo; | 
|  |  | 
|  | /* Socket Status Flags */ | 
|  | lstrcpynA(ifInfo.ifr_name, ptr->AdapterName, IFNAMSIZ); | 
|  | if (ioctl(fd, SIOCGIFFLAGS, &ifInfo) < 0) | 
|  | { | 
|  | ERR("Error obtaining status flags for socket!\n"); | 
|  | HeapFree(GetProcessHeap(),0,table); | 
|  | release_sock_fd( s, fd ); | 
|  | WSASetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | else | 
|  | { | 
|  | /* set flags; the values of IFF_* are not the same | 
|  | under Linux and Windows, therefore must generate | 
|  | new flags */ | 
|  | intArray->iiFlags = 0; | 
|  | if (ifInfo.ifr_flags & IFF_BROADCAST) | 
|  | intArray->iiFlags |= WS_IFF_BROADCAST; | 
|  | #ifdef IFF_POINTOPOINT | 
|  | if (ifInfo.ifr_flags & IFF_POINTOPOINT) | 
|  | intArray->iiFlags |= WS_IFF_POINTTOPOINT; | 
|  | #endif | 
|  | if (ifInfo.ifr_flags & IFF_LOOPBACK) | 
|  | intArray->iiFlags |= WS_IFF_LOOPBACK; | 
|  | if (ifInfo.ifr_flags & IFF_UP) | 
|  | intArray->iiFlags |= WS_IFF_UP; | 
|  | if (ifInfo.ifr_flags & IFF_MULTICAST) | 
|  | intArray->iiFlags |= WS_IFF_MULTICAST; | 
|  | } | 
|  |  | 
|  | addr = inet_addr(ptr->IpAddressList.IpAddress.String); | 
|  | mask = inet_addr(ptr->IpAddressList.IpMask.String); | 
|  | bcast = addr | ~mask; | 
|  | intArray->iiAddress.AddressIn.sin_family = AF_INET; | 
|  | intArray->iiAddress.AddressIn.sin_port = 0; | 
|  | intArray->iiAddress.AddressIn.sin_addr.WS_s_addr = | 
|  | addr; | 
|  | intArray->iiNetmask.AddressIn.sin_family = AF_INET; | 
|  | intArray->iiNetmask.AddressIn.sin_port = 0; | 
|  | intArray->iiNetmask.AddressIn.sin_addr.WS_s_addr = | 
|  | mask; | 
|  | intArray->iiBroadcastAddress.AddressIn.sin_family = | 
|  | AF_INET; | 
|  | intArray->iiBroadcastAddress.AddressIn.sin_port = 0; | 
|  | intArray->iiBroadcastAddress.AddressIn.sin_addr. | 
|  | WS_s_addr = bcast; | 
|  | } | 
|  | } | 
|  | else | 
|  | { | 
|  | ERR("Unable to get interface table!\n"); | 
|  | release_sock_fd( s, fd ); | 
|  | HeapFree(GetProcessHeap(),0,table); | 
|  | WSASetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | HeapFree(GetProcessHeap(),0,table); | 
|  | } | 
|  | else | 
|  | { | 
|  | release_sock_fd( s, fd ); | 
|  | WSASetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | } | 
|  | else | 
|  | { | 
|  | ERR("Unable to get interface table!\n"); | 
|  | release_sock_fd( s, fd ); | 
|  | WSASetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | /* Calculate the size of the array being returned */ | 
|  | *lpcbBytesReturned = sizeof(INTERFACE_INFO) * numInt; | 
|  | release_sock_fd( s, fd ); | 
|  | break; | 
|  | } | 
|  |  | 
|  | case WS_SIO_ADDRESS_LIST_CHANGE: | 
|  | FIXME("-> SIO_ADDRESS_LIST_CHANGE request: stub\n"); | 
|  | /* FIXME: error and return code depend on whether socket was created | 
|  | * with WSA_FLAG_OVERLAPPED, but there is no easy way to get this */ | 
|  | break; | 
|  |  | 
|  | case WS_SIO_ADDRESS_LIST_QUERY: | 
|  | { | 
|  | DWORD size; | 
|  |  | 
|  | TRACE("-> SIO_ADDRESS_LIST_QUERY request\n"); | 
|  |  | 
|  | if (!lpcbBytesReturned) | 
|  | { | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | if (GetAdaptersInfo(NULL, &size) == ERROR_BUFFER_OVERFLOW) | 
|  | { | 
|  | IP_ADAPTER_INFO *p, *table = HeapAlloc(GetProcessHeap(), 0, size); | 
|  | DWORD need, num; | 
|  |  | 
|  | if (!table || GetAdaptersInfo(table, &size)) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, table); | 
|  | WSASetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | for (p = table, num = 0; p; p = p->Next) | 
|  | if (p->IpAddressList.IpAddress.String[0]) num++; | 
|  |  | 
|  | need = sizeof(SOCKET_ADDRESS_LIST) + sizeof(SOCKET_ADDRESS) * (num - 1); | 
|  | need += sizeof(SOCKADDR) * num; | 
|  | *lpcbBytesReturned = need; | 
|  |  | 
|  | if (need > cbOutBuffer) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, table); | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | if (lpbOutBuffer) | 
|  | { | 
|  | unsigned int i; | 
|  | SOCKET_ADDRESS *sa; | 
|  | SOCKET_ADDRESS_LIST *sa_list = (SOCKET_ADDRESS_LIST *)lpbOutBuffer; | 
|  | SOCKADDR_IN *sockaddr; | 
|  |  | 
|  | sa = sa_list->Address; | 
|  | sockaddr = (SOCKADDR_IN *)((char *)sa + num * sizeof(SOCKET_ADDRESS)); | 
|  | sa_list->iAddressCount = num; | 
|  |  | 
|  | for (p = table, i = 0; p; p = p->Next) | 
|  | { | 
|  | if (!p->IpAddressList.IpAddress.String[0]) continue; | 
|  |  | 
|  | sa[i].lpSockaddr = (SOCKADDR *)&sockaddr[i]; | 
|  | sa[i].iSockaddrLength = sizeof(SOCKADDR); | 
|  |  | 
|  | sockaddr[i].sin_family = AF_INET; | 
|  | sockaddr[i].sin_port = 0; | 
|  | sockaddr[i].sin_addr.WS_s_addr = inet_addr(p->IpAddressList.IpAddress.String); | 
|  | i++; | 
|  | } | 
|  | } | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, table); | 
|  | return 0; | 
|  | } | 
|  | else | 
|  | { | 
|  | WARN("unable to get IP address list\n"); | 
|  | WSASetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | } | 
|  | case WS_SIO_FLUSH: | 
|  | FIXME("SIO_FLUSH: stub.\n"); | 
|  | break; | 
|  |  | 
|  | case WS_SIO_GET_EXTENSION_FUNCTION_POINTER: | 
|  | FIXME("SIO_GET_EXTENSION_FUNCTION_POINTER %s: stub\n", debugstr_guid(lpvInBuffer)); | 
|  | WSASetLastError(WSAEOPNOTSUPP); | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | default: | 
|  | FIXME("unsupported WS_IOCTL cmd (%08x)\n", dwIoControlCode); | 
|  | WSASetLastError(WSAEOPNOTSUPP); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		ioctlsocket		(WS2_32.10) | 
|  | */ | 
|  | int WINAPI WS_ioctlsocket(SOCKET s, LONG cmd, WS_u_long *argp) | 
|  | { | 
|  | int fd; | 
|  | long newcmd  = cmd; | 
|  |  | 
|  | TRACE("socket %04lx, cmd %08x, ptr %p\n", s, cmd, argp); | 
|  | /* broken apps like defcon pass the argp value directly instead of a pointer to it */ | 
|  | if(IS_INTRESOURCE(argp)) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | switch( cmd ) | 
|  | { | 
|  | case WS_FIONREAD: | 
|  | newcmd=FIONREAD; | 
|  | break; | 
|  |  | 
|  | case WS_FIONBIO: | 
|  | if( _get_sock_mask(s) ) | 
|  | { | 
|  | /* AsyncSelect()'ed sockets are always nonblocking */ | 
|  | if (*argp) return 0; | 
|  | SetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | fd = get_sock_fd( s, 0, NULL ); | 
|  | if (fd != -1) | 
|  | { | 
|  | int ret; | 
|  | if (*argp) | 
|  | { | 
|  | _enable_event(SOCKET2HANDLE(s), 0, FD_WINE_NONBLOCKING, 0); | 
|  | ret = fcntl( fd, F_SETFL, O_NONBLOCK ); | 
|  | } | 
|  | else | 
|  | { | 
|  | _enable_event(SOCKET2HANDLE(s), 0, 0, FD_WINE_NONBLOCKING); | 
|  | ret = fcntl( fd, F_SETFL, 0 ); | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  | if (!ret) return 0; | 
|  | SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
|  | } | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | case WS_SIOCATMARK: | 
|  | newcmd=SIOCATMARK; | 
|  | break; | 
|  |  | 
|  | case WS_FIOASYNC: | 
|  | WARN("Warning: WS1.1 shouldn't be using async I/O\n"); | 
|  | SetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | case SIOCGIFBRDADDR: | 
|  | case SIOCGIFNETMASK: | 
|  | case SIOCGIFADDR: | 
|  | /* These don't need any special handling.  They are used by | 
|  | WsControl, and are here to suppress an unnecessary warning. */ | 
|  | break; | 
|  |  | 
|  | default: | 
|  | /* Netscape tries hard to use bogus ioctl 0x667e */ | 
|  | /* FIXME: 0x667e above is ('f' << 8) | 126, and is a low word of | 
|  | * FIONBIO (_IOW('f', 126, u_long)), how that should be handled? | 
|  | */ | 
|  | WARN("\tunknown WS_IOCTL cmd (%08x)\n", cmd); | 
|  | break; | 
|  | } | 
|  |  | 
|  | fd = get_sock_fd( s, 0, NULL ); | 
|  | if (fd != -1) | 
|  | { | 
|  | if( ioctl(fd, newcmd, (char*)argp ) == 0 ) | 
|  | { | 
|  | release_sock_fd( s, fd ); | 
|  | return 0; | 
|  | } | 
|  | SetLastError((errno == EBADF) ? WSAENOTSOCK : wsaErrno()); | 
|  | release_sock_fd( s, fd ); | 
|  | } | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		listen		(WS2_32.13) | 
|  | */ | 
|  | int WINAPI WS_listen(SOCKET s, int backlog) | 
|  | { | 
|  | int fd = get_sock_fd( s, FILE_READ_DATA, NULL ); | 
|  |  | 
|  | TRACE("socket %04lx, backlog %d\n", s, backlog); | 
|  | if (fd != -1) | 
|  | { | 
|  | if (listen(fd, backlog) == 0) | 
|  | { | 
|  | release_sock_fd( s, fd ); | 
|  | _enable_event(SOCKET2HANDLE(s), FD_ACCEPT, | 
|  | FD_WINE_LISTENING, | 
|  | FD_CONNECT|FD_WINE_CONNECTED); | 
|  | return 0; | 
|  | } | 
|  | SetLastError(wsaErrno()); | 
|  | release_sock_fd( s, fd ); | 
|  | } | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		recv			(WS2_32.16) | 
|  | */ | 
|  | int WINAPI WS_recv(SOCKET s, char *buf, int len, int flags) | 
|  | { | 
|  | DWORD n, dwFlags = flags; | 
|  | WSABUF wsabuf; | 
|  |  | 
|  | wsabuf.len = len; | 
|  | wsabuf.buf = buf; | 
|  |  | 
|  | if ( WSARecvFrom(s, &wsabuf, 1, &n, &dwFlags, NULL, NULL, NULL, NULL) == SOCKET_ERROR ) | 
|  | return SOCKET_ERROR; | 
|  | else | 
|  | return n; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		recvfrom		(WS2_32.17) | 
|  | */ | 
|  | int WINAPI WS_recvfrom(SOCKET s, char *buf, INT len, int flags, | 
|  | struct WS_sockaddr *from, int *fromlen) | 
|  | { | 
|  | DWORD n, dwFlags = flags; | 
|  | WSABUF wsabuf; | 
|  |  | 
|  | wsabuf.len = len; | 
|  | wsabuf.buf = buf; | 
|  |  | 
|  | if ( WSARecvFrom(s, &wsabuf, 1, &n, &dwFlags, from, fromlen, NULL, NULL) == SOCKET_ERROR ) | 
|  | return SOCKET_ERROR; | 
|  | else | 
|  | return n; | 
|  | } | 
|  |  | 
|  | /* allocate a poll array for the corresponding fd sets */ | 
|  | static struct pollfd *fd_sets_to_poll( const WS_fd_set *readfds, const WS_fd_set *writefds, | 
|  | const WS_fd_set *exceptfds, int *count_ptr ) | 
|  | { | 
|  | int i, j = 0, count = 0; | 
|  | struct pollfd *fds; | 
|  |  | 
|  | if (readfds) count += readfds->fd_count; | 
|  | if (writefds) count += writefds->fd_count; | 
|  | if (exceptfds) count += exceptfds->fd_count; | 
|  | *count_ptr = count; | 
|  | if (!count) return NULL; | 
|  | if (!(fds = HeapAlloc( GetProcessHeap(), 0, count * sizeof(fds[0])))) return NULL; | 
|  | if (readfds) | 
|  | for (i = 0; i < readfds->fd_count; i++, j++) | 
|  | { | 
|  | fds[j].fd = get_sock_fd( readfds->fd_array[i], FILE_READ_DATA, NULL ); | 
|  | fds[j].events = POLLIN; | 
|  | fds[j].revents = 0; | 
|  | } | 
|  | if (writefds) | 
|  | for (i = 0; i < writefds->fd_count; i++, j++) | 
|  | { | 
|  | fds[j].fd = get_sock_fd( writefds->fd_array[i], FILE_WRITE_DATA, NULL ); | 
|  | fds[j].events = POLLOUT; | 
|  | fds[j].revents = 0; | 
|  | } | 
|  | if (exceptfds) | 
|  | for (i = 0; i < exceptfds->fd_count; i++, j++) | 
|  | { | 
|  | fds[j].fd = get_sock_fd( exceptfds->fd_array[i], 0, NULL ); | 
|  | fds[j].events = POLLHUP; | 
|  | fds[j].revents = 0; | 
|  | } | 
|  | return fds; | 
|  | } | 
|  |  | 
|  | /* release the file descriptor obtained in fd_sets_to_poll */ | 
|  | /* must be called with the original fd_set arrays, before calling get_poll_results */ | 
|  | static void release_poll_fds( const WS_fd_set *readfds, const WS_fd_set *writefds, | 
|  | const WS_fd_set *exceptfds, struct pollfd *fds ) | 
|  | { | 
|  | int i, j = 0; | 
|  |  | 
|  | if (readfds) | 
|  | { | 
|  | for (i = 0; i < readfds->fd_count; i++, j++) | 
|  | if (fds[j].fd != -1) release_sock_fd( readfds->fd_array[i], fds[j].fd ); | 
|  | } | 
|  | if (writefds) | 
|  | { | 
|  | for (i = 0; i < writefds->fd_count; i++, j++) | 
|  | if (fds[j].fd != -1) release_sock_fd( writefds->fd_array[i], fds[j].fd ); | 
|  | } | 
|  | if (exceptfds) | 
|  | { | 
|  | for (i = 0; i < exceptfds->fd_count; i++, j++) | 
|  | if (fds[j].fd != -1) | 
|  | { | 
|  | /* make sure we have a real error before releasing the fd */ | 
|  | if (!sock_error_p( fds[j].fd )) fds[j].revents = 0; | 
|  | release_sock_fd( exceptfds->fd_array[i], fds[j].fd ); | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | /* map the poll results back into the Windows fd sets */ | 
|  | static int get_poll_results( WS_fd_set *readfds, WS_fd_set *writefds, WS_fd_set *exceptfds, | 
|  | const struct pollfd *fds ) | 
|  | { | 
|  | int i, j = 0, k, total = 0; | 
|  |  | 
|  | if (readfds) | 
|  | { | 
|  | for (i = k = 0; i < readfds->fd_count; i++, j++) | 
|  | if (fds[j].revents) readfds->fd_array[k++] = readfds->fd_array[i]; | 
|  | readfds->fd_count = k; | 
|  | total += k; | 
|  | } | 
|  | if (writefds) | 
|  | { | 
|  | for (i = k = 0; i < writefds->fd_count; i++, j++) | 
|  | if (fds[j].revents) writefds->fd_array[k++] = writefds->fd_array[i]; | 
|  | writefds->fd_count = k; | 
|  | total += k; | 
|  | } | 
|  | if (exceptfds) | 
|  | { | 
|  | for (i = k = 0; i < exceptfds->fd_count; i++, j++) | 
|  | if (fds[j].revents) exceptfds->fd_array[k++] = exceptfds->fd_array[i]; | 
|  | exceptfds->fd_count = k; | 
|  | total += k; | 
|  | } | 
|  | return total; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		select			(WS2_32.18) | 
|  | */ | 
|  | int WINAPI WS_select(int nfds, WS_fd_set *ws_readfds, | 
|  | WS_fd_set *ws_writefds, WS_fd_set *ws_exceptfds, | 
|  | const struct WS_timeval* ws_timeout) | 
|  | { | 
|  | struct pollfd *pollfds; | 
|  | int count, ret, timeout = -1; | 
|  |  | 
|  | TRACE("read %p, write %p, excp %p timeout %p\n", | 
|  | ws_readfds, ws_writefds, ws_exceptfds, ws_timeout); | 
|  |  | 
|  | if (!(pollfds = fd_sets_to_poll( ws_readfds, ws_writefds, ws_exceptfds, &count )) && count) | 
|  | { | 
|  | SetLastError( ERROR_NOT_ENOUGH_MEMORY ); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | if (ws_timeout) timeout = (ws_timeout->tv_sec * 1000) + (ws_timeout->tv_usec + 999) / 1000; | 
|  |  | 
|  | ret = poll( pollfds, count, timeout ); | 
|  | release_poll_fds( ws_readfds, ws_writefds, ws_exceptfds, pollfds ); | 
|  |  | 
|  | if (ret == -1) SetLastError(wsaErrno()); | 
|  | else ret = get_poll_results( ws_readfds, ws_writefds, ws_exceptfds, pollfds ); | 
|  | HeapFree( GetProcessHeap(), 0, pollfds ); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* helper to send completion messages for client-only i/o operation case */ | 
|  | static void WS_AddCompletion( SOCKET sock, ULONG_PTR CompletionValue, NTSTATUS CompletionStatus, ULONG_PTR Information ) | 
|  | { | 
|  | NTSTATUS status; | 
|  |  | 
|  | SERVER_START_REQ( add_fd_completion ) | 
|  | { | 
|  | req->handle      = SOCKET2HANDLE(sock); | 
|  | req->cvalue      = CompletionValue; | 
|  | req->status      = CompletionStatus; | 
|  | req->information = Information; | 
|  | status = wine_server_call( req ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		send			(WS2_32.19) | 
|  | */ | 
|  | int WINAPI WS_send(SOCKET s, const char *buf, int len, int flags) | 
|  | { | 
|  | DWORD n; | 
|  | WSABUF wsabuf; | 
|  |  | 
|  | wsabuf.len = len; | 
|  | wsabuf.buf = (char*) buf; | 
|  |  | 
|  | if ( WSASendTo( s, &wsabuf, 1, &n, flags, NULL, 0, NULL, NULL) == SOCKET_ERROR ) | 
|  | return SOCKET_ERROR; | 
|  | else | 
|  | return n; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		WSASend			(WS2_32.72) | 
|  | */ | 
|  | INT WINAPI WSASend( SOCKET s, LPWSABUF lpBuffers, DWORD dwBufferCount, | 
|  | LPDWORD lpNumberOfBytesSent, DWORD dwFlags, | 
|  | LPWSAOVERLAPPED lpOverlapped, | 
|  | LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine ) | 
|  | { | 
|  | return WSASendTo( s, lpBuffers, dwBufferCount, lpNumberOfBytesSent, dwFlags, | 
|  | NULL, 0, lpOverlapped, lpCompletionRoutine ); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSASendDisconnect       (WS2_32.73) | 
|  | */ | 
|  | INT WINAPI WSASendDisconnect( SOCKET s, LPWSABUF lpBuffers ) | 
|  | { | 
|  | return WS_shutdown( s, SD_SEND ); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		WSASendTo		(WS2_32.74) | 
|  | */ | 
|  | INT WINAPI WSASendTo( SOCKET s, LPWSABUF lpBuffers, DWORD dwBufferCount, | 
|  | LPDWORD lpNumberOfBytesSent, DWORD dwFlags, | 
|  | const struct WS_sockaddr *to, int tolen, | 
|  | LPWSAOVERLAPPED lpOverlapped, | 
|  | LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine ) | 
|  | { | 
|  | unsigned int i, options; | 
|  | int n, fd, err; | 
|  | struct iovec iovec[WS_MSG_MAXIOVLEN]; | 
|  | int totalLength = 0; | 
|  | ULONG_PTR cvalue = (lpOverlapped && ((ULONG_PTR)lpOverlapped->hEvent & 1) == 0) ? (ULONG_PTR)lpOverlapped : 0; | 
|  |  | 
|  | TRACE("socket %04lx, wsabuf %p, nbufs %d, flags %d, to %p, tolen %d, ovl %p, func %p\n", | 
|  | s, lpBuffers, dwBufferCount, dwFlags, | 
|  | to, tolen, lpOverlapped, lpCompletionRoutine); | 
|  |  | 
|  | if (dwBufferCount > WS_MSG_MAXIOVLEN) | 
|  | { | 
|  | WSASetLastError( WSAEINVAL ); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | fd = get_sock_fd( s, FILE_WRITE_DATA, &options ); | 
|  | TRACE( "fd=%d, options=%x\n", fd, options ); | 
|  |  | 
|  | if ( fd == -1 ) return SOCKET_ERROR; | 
|  |  | 
|  | if ( !lpNumberOfBytesSent ) | 
|  | { | 
|  | err = WSAEFAULT; | 
|  | goto error; | 
|  | } | 
|  |  | 
|  | for ( i = 0; i < dwBufferCount; i++ ) | 
|  | { | 
|  | iovec[i].iov_base = lpBuffers[i].buf; | 
|  | iovec[i].iov_len  = lpBuffers[i].len; | 
|  | totalLength += lpBuffers[i].len; | 
|  | } | 
|  |  | 
|  | for (;;) | 
|  | { | 
|  | n = WS2_send( fd, iovec, dwBufferCount, to, tolen, dwFlags ); | 
|  | if (n != -1 || errno != EINTR) break; | 
|  | } | 
|  | if (n == -1 && errno != EAGAIN) | 
|  | { | 
|  | err = wsaErrno(); | 
|  | if (cvalue) WS_AddCompletion( s, cvalue, err, 0 ); | 
|  | goto error; | 
|  | } | 
|  |  | 
|  | if ((lpOverlapped || lpCompletionRoutine) && | 
|  | !(options & (FILE_SYNCHRONOUS_IO_ALERT | FILE_SYNCHRONOUS_IO_NONALERT))) | 
|  | { | 
|  | IO_STATUS_BLOCK *iosb; | 
|  | struct ws2_async *wsa = HeapAlloc( GetProcessHeap(), 0, sizeof(*wsa) ); | 
|  |  | 
|  | if ( !wsa ) | 
|  | { | 
|  | err = WSAEFAULT; | 
|  | goto error; | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  |  | 
|  | wsa->hSocket         = SOCKET2HANDLE(s); | 
|  | wsa->addr            = (struct WS_sockaddr *)to; | 
|  | wsa->addrlen.val     = tolen; | 
|  | wsa->flags           = 0; | 
|  | wsa->user_overlapped = lpOverlapped; | 
|  | wsa->completion_func = lpCompletionRoutine; | 
|  | wsa->n_iovecs        = dwBufferCount; | 
|  | memcpy( wsa->iovec, iovec, dwBufferCount * sizeof(*iovec) ); | 
|  |  | 
|  | iosb = lpOverlapped ? (IO_STATUS_BLOCK *)lpOverlapped : &wsa->local_iosb; | 
|  | if (n == -1) | 
|  | { | 
|  | iosb->u.Status = STATUS_PENDING; | 
|  | iosb->Information = 0; | 
|  |  | 
|  | SERVER_START_REQ( register_async ) | 
|  | { | 
|  | req->handle = wsa->hSocket; | 
|  | req->type   = ASYNC_TYPE_WRITE; | 
|  | req->async.callback = WS2_async_send; | 
|  | req->async.iosb     = iosb; | 
|  | req->async.arg      = wsa; | 
|  | req->async.apc      = ws2_async_apc; | 
|  | req->async.event    = lpCompletionRoutine ? 0 : lpOverlapped->hEvent; | 
|  | req->async.cvalue   = cvalue; | 
|  | err = wine_server_call( req ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  |  | 
|  | if (err != STATUS_PENDING) HeapFree( GetProcessHeap(), 0, wsa ); | 
|  | WSASetLastError( NtStatusToWSAError( err )); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | iosb->u.Status = STATUS_SUCCESS; | 
|  | iosb->Information = n; | 
|  | *lpNumberOfBytesSent = n; | 
|  | if (!wsa->completion_func) | 
|  | { | 
|  | if (cvalue) WS_AddCompletion( s, cvalue, STATUS_SUCCESS, n ); | 
|  | SetEvent( lpOverlapped->hEvent ); | 
|  | HeapFree( GetProcessHeap(), 0, wsa ); | 
|  | } | 
|  | else NtQueueApcThread( GetCurrentThread(), (PNTAPCFUNC)ws2_async_apc, | 
|  | (ULONG_PTR)wsa, (ULONG_PTR)iosb, 0 ); | 
|  | WSASetLastError(0); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | if ( _is_blocking(s) ) | 
|  | { | 
|  | /* On a blocking non-overlapped stream socket, | 
|  | * sending blocks until the entire buffer is sent. */ | 
|  | DWORD timeout_start = GetTickCount(); | 
|  | unsigned int first_buff = 0; | 
|  |  | 
|  | *lpNumberOfBytesSent = 0; | 
|  |  | 
|  | while (first_buff < dwBufferCount) | 
|  | { | 
|  | struct pollfd pfd; | 
|  | int timeout = GET_SNDTIMEO(fd); | 
|  |  | 
|  | if (n >= 0) | 
|  | { | 
|  | *lpNumberOfBytesSent += n; | 
|  | while (first_buff < dwBufferCount && iovec[first_buff].iov_len <= n) | 
|  | n -= iovec[first_buff++].iov_len; | 
|  | if (first_buff >= dwBufferCount) break; | 
|  | iovec[first_buff].iov_base = (char*)iovec[first_buff].iov_base + n; | 
|  | iovec[first_buff].iov_len -= n; | 
|  | } | 
|  |  | 
|  | if (timeout != -1) | 
|  | { | 
|  | timeout -= GetTickCount() - timeout_start; | 
|  | if (timeout < 0) timeout = 0; | 
|  | } | 
|  |  | 
|  | pfd.fd = fd; | 
|  | pfd.events = POLLOUT; | 
|  |  | 
|  | if (!timeout || !poll( &pfd, 1, timeout )) | 
|  | { | 
|  | err = WSAETIMEDOUT; | 
|  | goto error; /* msdn says a timeout in send is fatal */ | 
|  | } | 
|  |  | 
|  | n = WS2_send( fd, iovec + first_buff, dwBufferCount - first_buff, to, tolen, dwFlags ); | 
|  | if (n == -1 && errno != EAGAIN && errno != EINTR) | 
|  | { | 
|  | err = wsaErrno(); | 
|  | goto error; | 
|  | } | 
|  | } | 
|  | } | 
|  | else  /* non-blocking */ | 
|  | { | 
|  | if (n < totalLength) | 
|  | _enable_event(SOCKET2HANDLE(s), FD_WRITE, 0, 0); | 
|  | if (n == -1) | 
|  | { | 
|  | err = WSAEWOULDBLOCK; | 
|  | goto error; | 
|  | } | 
|  | *lpNumberOfBytesSent = n; | 
|  | } | 
|  |  | 
|  | TRACE(" -> %i bytes\n", *lpNumberOfBytesSent); | 
|  |  | 
|  | release_sock_fd( s, fd ); | 
|  | WSASetLastError(0); | 
|  | return 0; | 
|  |  | 
|  | error: | 
|  | release_sock_fd( s, fd ); | 
|  | WARN(" -> ERROR %d\n", err); | 
|  | WSASetLastError(err); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		sendto		(WS2_32.20) | 
|  | */ | 
|  | int WINAPI WS_sendto(SOCKET s, const char *buf, int len, int flags, | 
|  | const struct WS_sockaddr *to, int tolen) | 
|  | { | 
|  | DWORD n; | 
|  | WSABUF wsabuf; | 
|  |  | 
|  | wsabuf.len = len; | 
|  | wsabuf.buf = (char*) buf; | 
|  |  | 
|  | if ( WSASendTo(s, &wsabuf, 1, &n, flags, to, tolen, NULL, NULL) == SOCKET_ERROR ) | 
|  | return SOCKET_ERROR; | 
|  | else | 
|  | return n; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		setsockopt		(WS2_32.21) | 
|  | */ | 
|  | int WINAPI WS_setsockopt(SOCKET s, int level, int optname, | 
|  | const char *optval, int optlen) | 
|  | { | 
|  | int fd; | 
|  | int woptval; | 
|  | struct linger linger; | 
|  | struct timeval tval; | 
|  |  | 
|  | TRACE("socket: %04lx, level 0x%x, name 0x%x, ptr %p, len %d\n", | 
|  | s, level, optname, optval, optlen); | 
|  |  | 
|  | /* some broken apps pass the value directly instead of a pointer to it */ | 
|  | if(IS_INTRESOURCE(optval)) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | switch(level) | 
|  | { | 
|  | case WS_SOL_SOCKET: | 
|  | switch(optname) | 
|  | { | 
|  | /* Some options need some conversion before they can be sent to | 
|  | * setsockopt. The conversions are done here, then they will fall though | 
|  | * to the general case. Special options that are not passed to | 
|  | * setsockopt follow below that.*/ | 
|  |  | 
|  | case WS_SO_DONTLINGER: | 
|  | linger.l_onoff  = *((const int*)optval) ? 0: 1; | 
|  | linger.l_linger = 0; | 
|  | level = SOL_SOCKET; | 
|  | optname = SO_LINGER; | 
|  | optval = (char*)&linger; | 
|  | optlen = sizeof(struct linger); | 
|  | break; | 
|  |  | 
|  | case WS_SO_LINGER: | 
|  | linger.l_onoff  = ((LINGER*)optval)->l_onoff; | 
|  | linger.l_linger  = ((LINGER*)optval)->l_linger; | 
|  | /* FIXME: what is documented behavior if SO_LINGER optval | 
|  | is null?? */ | 
|  | level = SOL_SOCKET; | 
|  | optname = SO_LINGER; | 
|  | optval = (char*)&linger; | 
|  | optlen = sizeof(struct linger); | 
|  | break; | 
|  |  | 
|  | case WS_SO_RCVBUF: | 
|  | if (*(const int*)optval < 2048) | 
|  | { | 
|  | WARN("SO_RCVBF for %d bytes is too small: ignored\n", *(const int*)optval ); | 
|  | return 0; | 
|  | } | 
|  | /* Fall through */ | 
|  |  | 
|  | /* The options listed here don't need any special handling. Thanks to | 
|  | * the conversion happening above, options from there will fall through | 
|  | * to this, too.*/ | 
|  | case WS_SO_ACCEPTCONN: | 
|  | case WS_SO_BROADCAST: | 
|  | case WS_SO_ERROR: | 
|  | case WS_SO_KEEPALIVE: | 
|  | case WS_SO_OOBINLINE: | 
|  | /* BSD socket SO_REUSEADDR is not 100% compatible to winsock semantics. | 
|  | * however, using it the BSD way fixes bug 8513 and seems to be what | 
|  | * most programmers assume, anyway */ | 
|  | case WS_SO_REUSEADDR: | 
|  | case WS_SO_SNDBUF: | 
|  | case WS_SO_TYPE: | 
|  | convert_sockopt(&level, &optname); | 
|  | break; | 
|  |  | 
|  | /* SO_DEBUG is a privileged operation, ignore it. */ | 
|  | case WS_SO_DEBUG: | 
|  | TRACE("Ignoring SO_DEBUG\n"); | 
|  | return 0; | 
|  |  | 
|  | /* For some reason the game GrandPrixLegends does set SO_DONTROUTE on its | 
|  | * socket. According to MSDN, this option is silently ignored.*/ | 
|  | case WS_SO_DONTROUTE: | 
|  | TRACE("Ignoring SO_DONTROUTE\n"); | 
|  | return 0; | 
|  |  | 
|  | /* Stops two sockets from being bound to the same port. Always happens | 
|  | * on unix systems, so just drop it. */ | 
|  | case WS_SO_EXCLUSIVEADDRUSE: | 
|  | TRACE("Ignoring SO_EXCLUSIVEADDRUSE, is always set.\n"); | 
|  | return 0; | 
|  |  | 
|  | /* SO_OPENTYPE does not require a valid socket handle. */ | 
|  | case WS_SO_OPENTYPE: | 
|  | if (!optlen || optlen < sizeof(int) || !optval) | 
|  | { | 
|  | SetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | get_per_thread_data()->opentype = *(const int *)optval; | 
|  | TRACE("setting global SO_OPENTYPE = 0x%x\n", *((int*)optval) ); | 
|  | return 0; | 
|  |  | 
|  | #ifdef SO_RCVTIMEO | 
|  | case WS_SO_RCVTIMEO: | 
|  | #endif | 
|  | #ifdef SO_SNDTIMEO | 
|  | case WS_SO_SNDTIMEO: | 
|  | #endif | 
|  | #if defined(SO_RCVTIMEO) || defined(SO_SNDTIMEO) | 
|  | if (optval && optlen == sizeof(UINT32)) { | 
|  | /* WinSock passes milliseconds instead of struct timeval */ | 
|  | tval.tv_usec = (*(const UINT32*)optval % 1000) * 1000; | 
|  | tval.tv_sec = *(const UINT32*)optval / 1000; | 
|  | /* min of 500 milliseconds */ | 
|  | if (tval.tv_sec == 0 && tval.tv_usec < 500000) | 
|  | tval.tv_usec = 500000; | 
|  | optlen = sizeof(struct timeval); | 
|  | optval = (char*)&tval; | 
|  | } else if (optlen == sizeof(struct timeval)) { | 
|  | WARN("SO_SND/RCVTIMEO for %d bytes: assuming unixism\n", optlen); | 
|  | } else { | 
|  | WARN("SO_SND/RCVTIMEO for %d bytes is weird: ignored\n", optlen); | 
|  | return 0; | 
|  | } | 
|  | convert_sockopt(&level, &optname); | 
|  | break; | 
|  | #endif | 
|  |  | 
|  | default: | 
|  | TRACE("Unknown SOL_SOCKET optname: 0x%08x\n", optname); | 
|  | SetLastError(WSAENOPROTOOPT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | break; /* case WS_SOL_SOCKET */ | 
|  |  | 
|  | #ifdef HAVE_IPX | 
|  | case NSPROTO_IPX: | 
|  | switch(optname) | 
|  | { | 
|  | case IPX_PTYPE: | 
|  | fd = get_sock_fd( s, 0, NULL ); | 
|  | TRACE("trying to set IPX_PTYPE: %d (fd: %d)\n", *(const int*)optval, fd); | 
|  |  | 
|  | /* We try to set the ipx type on ipx socket level. */ | 
|  | #ifdef SOL_IPX | 
|  | if(setsockopt(fd, SOL_IPX, IPX_TYPE, optval, optlen) == -1) | 
|  | { | 
|  | ERR("IPX: could not set ipx option type; expect weird behaviour\n"); | 
|  | release_sock_fd( s, fd ); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | #else | 
|  | { | 
|  | struct ipx val; | 
|  | /* Should we retrieve val using a getsockopt call and then | 
|  | * set the modified one? */ | 
|  | val.ipx_pt = *optval; | 
|  | setsockopt(fd, 0, SO_DEFAULT_HEADERS, &val, sizeof(struct ipx)); | 
|  | } | 
|  | #endif | 
|  | release_sock_fd( s, fd ); | 
|  | return 0; | 
|  |  | 
|  | case IPX_FILTERPTYPE: | 
|  | /* Sets the receive filter packet type, at the moment we don't support it */ | 
|  | FIXME("IPX_FILTERPTYPE: %x\n", *optval); | 
|  | /* Returning 0 is better for now than returning a SOCKET_ERROR */ | 
|  | return 0; | 
|  |  | 
|  | default: | 
|  | FIXME("opt_name:%x\n", optname); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | break; /* case NSPROTO_IPX */ | 
|  | #endif | 
|  |  | 
|  | /* Levels WS_IPPROTO_TCP and WS_IPPROTO_IP convert directly */ | 
|  | case WS_IPPROTO_TCP: | 
|  | switch(optname) | 
|  | { | 
|  | case WS_TCP_NODELAY: | 
|  | convert_sockopt(&level, &optname); | 
|  | break; | 
|  | default: | 
|  | FIXME("Unknown IPPROTO_TCP optname 0x%08x\n", optname); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | break; | 
|  |  | 
|  | case WS_IPPROTO_IP: | 
|  | switch(optname) | 
|  | { | 
|  | case WS_IP_ADD_MEMBERSHIP: | 
|  | case WS_IP_DROP_MEMBERSHIP: | 
|  | #ifdef IP_HDRINCL | 
|  | case WS_IP_HDRINCL: | 
|  | #endif | 
|  | case WS_IP_MULTICAST_IF: | 
|  | case WS_IP_MULTICAST_LOOP: | 
|  | case WS_IP_MULTICAST_TTL: | 
|  | case WS_IP_OPTIONS: | 
|  | case WS_IP_TOS: | 
|  | case WS_IP_TTL: | 
|  | convert_sockopt(&level, &optname); | 
|  | break; | 
|  | case WS_IP_DONTFRAGMENT: | 
|  | FIXME("IP_DONTFRAGMENT is silently ignored!\n"); | 
|  | return 0; | 
|  | default: | 
|  | FIXME("Unknown IPPROTO_IP optname 0x%08x\n", optname); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | break; | 
|  |  | 
|  | default: | 
|  | FIXME("Unknown level: 0x%08x\n", level); | 
|  | return SOCKET_ERROR; | 
|  | } /* end switch(level) */ | 
|  |  | 
|  | /* avoid endianness issues if argument is a 16-bit int */ | 
|  | if (optval && optlen < sizeof(int)) | 
|  | { | 
|  | woptval= *((const INT16 *) optval); | 
|  | optval= (char*) &woptval; | 
|  | optlen=sizeof(int); | 
|  | } | 
|  | fd = get_sock_fd( s, 0, NULL ); | 
|  | if (fd == -1) return SOCKET_ERROR; | 
|  |  | 
|  | if (setsockopt(fd, level, optname, optval, optlen) == 0) | 
|  | { | 
|  | release_sock_fd( s, fd ); | 
|  | return 0; | 
|  | } | 
|  | TRACE("Setting socket error, %d\n", wsaErrno()); | 
|  | SetLastError(wsaErrno()); | 
|  | release_sock_fd( s, fd ); | 
|  |  | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		shutdown		(WS2_32.22) | 
|  | */ | 
|  | int WINAPI WS_shutdown(SOCKET s, int how) | 
|  | { | 
|  | int fd, err = WSAENOTSOCK; | 
|  | unsigned int options, clear_flags = 0; | 
|  |  | 
|  | fd = get_sock_fd( s, 0, &options ); | 
|  | TRACE("socket %04lx, how %i %x\n", s, how, options ); | 
|  |  | 
|  | if (fd == -1) | 
|  | return SOCKET_ERROR; | 
|  |  | 
|  | switch( how ) | 
|  | { | 
|  | case 0: /* drop receives */ | 
|  | clear_flags |= FD_READ; | 
|  | break; | 
|  | case 1: /* drop sends */ | 
|  | clear_flags |= FD_WRITE; | 
|  | break; | 
|  | case 2: /* drop all */ | 
|  | clear_flags |= FD_READ|FD_WRITE; | 
|  | default: | 
|  | clear_flags |= FD_WINE_LISTENING; | 
|  | } | 
|  |  | 
|  | if (!(options & (FILE_SYNCHRONOUS_IO_ALERT | FILE_SYNCHRONOUS_IO_NONALERT))) | 
|  | { | 
|  | switch ( how ) | 
|  | { | 
|  | case SD_RECEIVE: | 
|  | err = WS2_register_async_shutdown( s, ASYNC_TYPE_READ ); | 
|  | break; | 
|  | case SD_SEND: | 
|  | err = WS2_register_async_shutdown( s, ASYNC_TYPE_WRITE ); | 
|  | break; | 
|  | case SD_BOTH: | 
|  | default: | 
|  | err = WS2_register_async_shutdown( s, ASYNC_TYPE_READ ); | 
|  | if (!err) err = WS2_register_async_shutdown( s, ASYNC_TYPE_WRITE ); | 
|  | break; | 
|  | } | 
|  | if (err) goto error; | 
|  | } | 
|  | else /* non-overlapped mode */ | 
|  | { | 
|  | if ( shutdown( fd, how ) ) | 
|  | { | 
|  | err = wsaErrno(); | 
|  | goto error; | 
|  | } | 
|  | } | 
|  |  | 
|  | release_sock_fd( s, fd ); | 
|  | _enable_event( SOCKET2HANDLE(s), 0, 0, clear_flags ); | 
|  | if ( how > 1) WSAAsyncSelect( s, 0, 0, 0 ); | 
|  | return 0; | 
|  |  | 
|  | error: | 
|  | release_sock_fd( s, fd ); | 
|  | _enable_event( SOCKET2HANDLE(s), 0, 0, clear_flags ); | 
|  | WSASetLastError( err ); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		socket		(WS2_32.23) | 
|  | */ | 
|  | SOCKET WINAPI WS_socket(int af, int type, int protocol) | 
|  | { | 
|  | TRACE("af=%d type=%d protocol=%d\n", af, type, protocol); | 
|  |  | 
|  | return WSASocketA( af, type, protocol, NULL, 0, | 
|  | get_per_thread_data()->opentype ? 0 : WSA_FLAG_OVERLAPPED ); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		gethostbyaddr		(WS2_32.51) | 
|  | */ | 
|  | struct WS_hostent* WINAPI WS_gethostbyaddr(const char *addr, int len, int type) | 
|  | { | 
|  | struct WS_hostent *retval = NULL; | 
|  | struct hostent* host; | 
|  |  | 
|  | #ifdef HAVE_LINUX_GETHOSTBYNAME_R_6 | 
|  | char *extrabuf; | 
|  | int ebufsize=1024; | 
|  | struct hostent hostentry; | 
|  | int locerr=ENOBUFS; | 
|  | host = NULL; | 
|  | extrabuf=HeapAlloc(GetProcessHeap(),0,ebufsize) ; | 
|  | while(extrabuf) { | 
|  | int res = gethostbyaddr_r(addr, len, type, | 
|  | &hostentry, extrabuf, ebufsize, &host, &locerr); | 
|  | if( res != ERANGE) break; | 
|  | ebufsize *=2; | 
|  | extrabuf=HeapReAlloc(GetProcessHeap(),0,extrabuf,ebufsize) ; | 
|  | } | 
|  | if (!host) SetLastError((locerr < 0) ? wsaErrno() : wsaHerrno(locerr)); | 
|  | #else | 
|  | EnterCriticalSection( &csWSgetXXXbyYYY ); | 
|  | host = gethostbyaddr(addr, len, type); | 
|  | if (!host) SetLastError((h_errno < 0) ? wsaErrno() : wsaHerrno(h_errno)); | 
|  | #endif | 
|  | if( host != NULL ) retval = WS_dup_he(host); | 
|  | #ifdef  HAVE_LINUX_GETHOSTBYNAME_R_6 | 
|  | HeapFree(GetProcessHeap(),0,extrabuf); | 
|  | #else | 
|  | LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
|  | #endif | 
|  | TRACE("ptr %p, len %d, type %d ret %p\n", addr, len, type, retval); | 
|  | return retval; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		gethostbyname		(WS2_32.52) | 
|  | */ | 
|  | struct WS_hostent* WINAPI WS_gethostbyname(const char* name) | 
|  | { | 
|  | struct WS_hostent *retval = NULL; | 
|  | struct hostent*     host; | 
|  | #ifdef  HAVE_LINUX_GETHOSTBYNAME_R_6 | 
|  | char *extrabuf; | 
|  | int ebufsize=1024; | 
|  | struct hostent hostentry; | 
|  | int locerr = ENOBUFS; | 
|  | #endif | 
|  | char buf[100]; | 
|  | if( !name || !name[0]) { | 
|  | name = buf; | 
|  | if( gethostname( buf, 100) == -1) { | 
|  | SetLastError( WSAENOBUFS); /* appropriate ? */ | 
|  | return retval; | 
|  | } | 
|  | } | 
|  | #ifdef  HAVE_LINUX_GETHOSTBYNAME_R_6 | 
|  | host = NULL; | 
|  | extrabuf=HeapAlloc(GetProcessHeap(),0,ebufsize) ; | 
|  | while(extrabuf) { | 
|  | int res = gethostbyname_r(name, &hostentry, extrabuf, ebufsize, &host, &locerr); | 
|  | if( res != ERANGE) break; | 
|  | ebufsize *=2; | 
|  | extrabuf=HeapReAlloc(GetProcessHeap(),0,extrabuf,ebufsize) ; | 
|  | } | 
|  | if (!host) SetLastError((locerr < 0) ? wsaErrno() : wsaHerrno(locerr)); | 
|  | #else | 
|  | EnterCriticalSection( &csWSgetXXXbyYYY ); | 
|  | host = gethostbyname(name); | 
|  | if (!host) SetLastError((h_errno < 0) ? wsaErrno() : wsaHerrno(h_errno)); | 
|  | #endif | 
|  | if (host) retval = WS_dup_he(host); | 
|  | #ifdef  HAVE_LINUX_GETHOSTBYNAME_R_6 | 
|  | HeapFree(GetProcessHeap(),0,extrabuf); | 
|  | #else | 
|  | LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
|  | #endif | 
|  | if (retval && retval->h_addr_list[0][0] == 127 && | 
|  | strcmp(name, "localhost") != 0) | 
|  | { | 
|  | /* hostname != "localhost" but has loopback address. replace by our | 
|  | * special address.*/ | 
|  | memcpy(retval->h_addr_list[0], magic_loopback_addr, 4); | 
|  | } | 
|  | TRACE( "%s ret %p\n", debugstr_a(name), retval ); | 
|  | return retval; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		getprotobyname		(WS2_32.53) | 
|  | */ | 
|  | struct WS_protoent* WINAPI WS_getprotobyname(const char* name) | 
|  | { | 
|  | struct WS_protoent* retval = NULL; | 
|  | #ifdef HAVE_GETPROTOBYNAME | 
|  | struct protoent*     proto; | 
|  | EnterCriticalSection( &csWSgetXXXbyYYY ); | 
|  | if( (proto = getprotobyname(name)) != NULL ) | 
|  | { | 
|  | retval = WS_dup_pe(proto); | 
|  | } | 
|  | else { | 
|  | MESSAGE("protocol %s not found; You might want to add " | 
|  | "this to /etc/protocols\n", debugstr_a(name) ); | 
|  | SetLastError(WSANO_DATA); | 
|  | } | 
|  | LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
|  | #endif | 
|  | TRACE( "%s ret %p\n", debugstr_a(name), retval ); | 
|  | return retval; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		getprotobynumber	(WS2_32.54) | 
|  | */ | 
|  | struct WS_protoent* WINAPI WS_getprotobynumber(int number) | 
|  | { | 
|  | struct WS_protoent* retval = NULL; | 
|  | #ifdef HAVE_GETPROTOBYNUMBER | 
|  | struct protoent*     proto; | 
|  | EnterCriticalSection( &csWSgetXXXbyYYY ); | 
|  | if( (proto = getprotobynumber(number)) != NULL ) | 
|  | { | 
|  | retval = WS_dup_pe(proto); | 
|  | } | 
|  | else { | 
|  | MESSAGE("protocol number %d not found; You might want to add " | 
|  | "this to /etc/protocols\n", number ); | 
|  | SetLastError(WSANO_DATA); | 
|  | } | 
|  | LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
|  | #endif | 
|  | TRACE("%i ret %p\n", number, retval); | 
|  | return retval; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		getservbyname		(WS2_32.55) | 
|  | */ | 
|  | struct WS_servent* WINAPI WS_getservbyname(const char *name, const char *proto) | 
|  | { | 
|  | struct WS_servent* retval = NULL; | 
|  | struct servent*     serv; | 
|  | char *name_str; | 
|  | char *proto_str = NULL; | 
|  |  | 
|  | if (!(name_str = strdup_lower(name))) return NULL; | 
|  |  | 
|  | if (proto && *proto) | 
|  | { | 
|  | if (!(proto_str = strdup_lower(proto))) | 
|  | { | 
|  | HeapFree( GetProcessHeap(), 0, name_str ); | 
|  | return NULL; | 
|  | } | 
|  | } | 
|  |  | 
|  | EnterCriticalSection( &csWSgetXXXbyYYY ); | 
|  | serv = getservbyname(name_str, proto_str); | 
|  | if( serv != NULL ) | 
|  | { | 
|  | retval = WS_dup_se(serv); | 
|  | } | 
|  | else SetLastError(WSANO_DATA); | 
|  | LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
|  | HeapFree( GetProcessHeap(), 0, proto_str ); | 
|  | HeapFree( GetProcessHeap(), 0, name_str ); | 
|  | TRACE( "%s, %s ret %p\n", debugstr_a(name), debugstr_a(proto), retval ); | 
|  | return retval; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		freeaddrinfo		(WS2_32.@) | 
|  | */ | 
|  | void WINAPI WS_freeaddrinfo(struct WS_addrinfo *res) | 
|  | { | 
|  | while (res) { | 
|  | struct WS_addrinfo *next; | 
|  |  | 
|  | HeapFree(GetProcessHeap(),0,res->ai_canonname); | 
|  | HeapFree(GetProcessHeap(),0,res->ai_addr); | 
|  | next = res->ai_next; | 
|  | HeapFree(GetProcessHeap(),0,res); | 
|  | res = next; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* helper functions for getaddrinfo()/getnameinfo() */ | 
|  | static int convert_aiflag_w2u(int winflags) { | 
|  | int i, unixflags = 0; | 
|  |  | 
|  | for (i=0;i<sizeof(ws_aiflag_map)/sizeof(ws_aiflag_map[0]);i++) | 
|  | if (ws_aiflag_map[i][0] & winflags) { | 
|  | unixflags |= ws_aiflag_map[i][1]; | 
|  | winflags &= ~ws_aiflag_map[i][0]; | 
|  | } | 
|  | if (winflags) | 
|  | FIXME("Unhandled windows AI_xxx flags %x\n", winflags); | 
|  | return unixflags; | 
|  | } | 
|  |  | 
|  | static int convert_niflag_w2u(int winflags) { | 
|  | int i, unixflags = 0; | 
|  |  | 
|  | for (i=0;i<sizeof(ws_niflag_map)/sizeof(ws_niflag_map[0]);i++) | 
|  | if (ws_niflag_map[i][0] & winflags) { | 
|  | unixflags |= ws_niflag_map[i][1]; | 
|  | winflags &= ~ws_niflag_map[i][0]; | 
|  | } | 
|  | if (winflags) | 
|  | FIXME("Unhandled windows NI_xxx flags %x\n", winflags); | 
|  | return unixflags; | 
|  | } | 
|  |  | 
|  | static int convert_aiflag_u2w(int unixflags) { | 
|  | int i, winflags = 0; | 
|  |  | 
|  | for (i=0;i<sizeof(ws_aiflag_map)/sizeof(ws_aiflag_map[0]);i++) | 
|  | if (ws_aiflag_map[i][1] & unixflags) { | 
|  | winflags |= ws_aiflag_map[i][0]; | 
|  | unixflags &= ~ws_aiflag_map[i][1]; | 
|  | } | 
|  | if (unixflags) /* will warn usually */ | 
|  | WARN("Unhandled UNIX AI_xxx flags %x\n", unixflags); | 
|  | return winflags; | 
|  | } | 
|  |  | 
|  | static int convert_eai_u2w(int unixret) { | 
|  | int i; | 
|  |  | 
|  | for (i=0;ws_eai_map[i][0];i++) | 
|  | if (ws_eai_map[i][1] == unixret) | 
|  | return ws_eai_map[i][0]; | 
|  | return unixret; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		getaddrinfo		(WS2_32.@) | 
|  | */ | 
|  | int WINAPI WS_getaddrinfo(LPCSTR nodename, LPCSTR servname, const struct WS_addrinfo *hints, struct WS_addrinfo **res) | 
|  | { | 
|  | #ifdef HAVE_GETADDRINFO | 
|  | struct addrinfo *unixaires = NULL; | 
|  | int   result; | 
|  | struct addrinfo unixhints, *punixhints = NULL; | 
|  | CHAR *node = NULL, *serv = NULL; | 
|  |  | 
|  | if (nodename) | 
|  | if (!(node = strdup_lower(nodename))) return WSA_NOT_ENOUGH_MEMORY; | 
|  |  | 
|  | if (servname) { | 
|  | if (!(serv = strdup_lower(servname))) { | 
|  | HeapFree(GetProcessHeap(), 0, node); | 
|  | return WSA_NOT_ENOUGH_MEMORY; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (hints) { | 
|  | punixhints = &unixhints; | 
|  |  | 
|  | memset(&unixhints, 0, sizeof(unixhints)); | 
|  | punixhints->ai_flags    = convert_aiflag_w2u(hints->ai_flags); | 
|  | if (hints->ai_family == 0) /* wildcard, specific to getaddrinfo() */ | 
|  | punixhints->ai_family = 0; | 
|  | else | 
|  | punixhints->ai_family = convert_af_w2u(hints->ai_family); | 
|  | if (hints->ai_socktype == 0) /* wildcard, specific to getaddrinfo() */ | 
|  | punixhints->ai_socktype = 0; | 
|  | else | 
|  | punixhints->ai_socktype = convert_socktype_w2u(hints->ai_socktype); | 
|  | if (hints->ai_protocol == 0) /* wildcard, specific to getaddrinfo() */ | 
|  | punixhints->ai_protocol = 0; | 
|  | else | 
|  | punixhints->ai_protocol = convert_proto_w2u(hints->ai_protocol); | 
|  | } | 
|  |  | 
|  | /* getaddrinfo(3) is thread safe, no need to wrap in CS */ | 
|  | result = getaddrinfo(nodename, servname, punixhints, &unixaires); | 
|  |  | 
|  | TRACE("%s, %s %p -> %p %d\n", debugstr_a(nodename), debugstr_a(servname), hints, res, result); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, node); | 
|  | HeapFree(GetProcessHeap(), 0, serv); | 
|  |  | 
|  | if (!result) { | 
|  | struct addrinfo *xuai = unixaires; | 
|  | struct WS_addrinfo **xai = res; | 
|  |  | 
|  | *xai = NULL; | 
|  | while (xuai) { | 
|  | struct WS_addrinfo *ai = HeapAlloc(GetProcessHeap(),HEAP_ZERO_MEMORY, sizeof(struct WS_addrinfo)); | 
|  | int len; | 
|  |  | 
|  | if (!ai) | 
|  | goto outofmem; | 
|  |  | 
|  | *xai = ai;xai = &ai->ai_next; | 
|  | ai->ai_flags    = convert_aiflag_u2w(xuai->ai_flags); | 
|  | ai->ai_family   = convert_af_u2w(xuai->ai_family); | 
|  | ai->ai_socktype = convert_socktype_u2w(xuai->ai_socktype); | 
|  | ai->ai_protocol = convert_proto_u2w(xuai->ai_protocol); | 
|  | if (xuai->ai_canonname) { | 
|  | TRACE("canon name - %s\n",debugstr_a(xuai->ai_canonname)); | 
|  | ai->ai_canonname = HeapAlloc(GetProcessHeap(),0,strlen(xuai->ai_canonname)+1); | 
|  | if (!ai->ai_canonname) | 
|  | goto outofmem; | 
|  | strcpy(ai->ai_canonname,xuai->ai_canonname); | 
|  | } | 
|  | len = xuai->ai_addrlen; | 
|  | ai->ai_addr = HeapAlloc(GetProcessHeap(),0,len); | 
|  | if (!ai->ai_addr) | 
|  | goto outofmem; | 
|  | ai->ai_addrlen = len; | 
|  | do { | 
|  | int winlen = ai->ai_addrlen; | 
|  |  | 
|  | if (!ws_sockaddr_u2ws(xuai->ai_addr, ai->ai_addr, &winlen)) { | 
|  | ai->ai_addrlen = winlen; | 
|  | break; | 
|  | } | 
|  | len = 2*len; | 
|  | ai->ai_addr = HeapReAlloc(GetProcessHeap(),0,ai->ai_addr,len); | 
|  | if (!ai->ai_addr) | 
|  | goto outofmem; | 
|  | ai->ai_addrlen = len; | 
|  | } while (1); | 
|  | xuai = xuai->ai_next; | 
|  | } | 
|  | freeaddrinfo(unixaires); | 
|  | } else { | 
|  | result = convert_eai_u2w(result); | 
|  | *res = NULL; | 
|  | } | 
|  | return result; | 
|  |  | 
|  | outofmem: | 
|  | if (*res) WS_freeaddrinfo(*res); | 
|  | if (unixaires) freeaddrinfo(unixaires); | 
|  | *res = NULL; | 
|  | return WSA_NOT_ENOUGH_MEMORY; | 
|  | #else | 
|  | FIXME("getaddrinfo() failed, not found during buildtime.\n"); | 
|  | return EAI_FAIL; | 
|  | #endif | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		GetAddrInfoW		(WS2_32.@) | 
|  | */ | 
|  | int WINAPI GetAddrInfoW(LPCWSTR nodename, LPCWSTR servname, const ADDRINFOW *hints, PADDRINFOW *res) | 
|  | { | 
|  | FIXME("empty stub!\n"); | 
|  | return EAI_FAIL; | 
|  | } | 
|  |  | 
|  | int WINAPI WS_getnameinfo(const SOCKADDR *sa, WS_socklen_t salen, PCHAR host, | 
|  | DWORD hostlen, PCHAR serv, DWORD servlen, INT flags) | 
|  | { | 
|  | #ifdef HAVE_GETNAMEINFO | 
|  | int ret; | 
|  | union generic_unix_sockaddr sa_u; | 
|  | unsigned int size; | 
|  |  | 
|  | TRACE("%s %d %p %d %p %d %d\n", debugstr_sockaddr(sa), salen, host, hostlen, | 
|  | serv, servlen, flags); | 
|  |  | 
|  | size = ws_sockaddr_ws2u(sa, salen, &sa_u); | 
|  | if (!size) | 
|  | { | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return WSA_NOT_ENOUGH_MEMORY; | 
|  | } | 
|  | ret = getnameinfo(&sa_u.addr, size, host, hostlen, serv, servlen, convert_niflag_w2u(flags)); | 
|  | return convert_eai_u2w(ret); | 
|  | #else | 
|  | FIXME("getnameinfo() failed, not found during buildtime.\n"); | 
|  | return EAI_FAIL; | 
|  | #endif | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		getservbyport		(WS2_32.56) | 
|  | */ | 
|  | struct WS_servent* WINAPI WS_getservbyport(int port, const char *proto) | 
|  | { | 
|  | struct WS_servent* retval = NULL; | 
|  | #ifdef HAVE_GETSERVBYPORT | 
|  | struct servent*     serv; | 
|  | char *proto_str = NULL; | 
|  |  | 
|  | if (proto && *proto) | 
|  | { | 
|  | if (!(proto_str = strdup_lower(proto))) return NULL; | 
|  | } | 
|  | EnterCriticalSection( &csWSgetXXXbyYYY ); | 
|  | if( (serv = getservbyport(port, proto_str)) != NULL ) { | 
|  | retval = WS_dup_se(serv); | 
|  | } | 
|  | else SetLastError(WSANO_DATA); | 
|  | LeaveCriticalSection( &csWSgetXXXbyYYY ); | 
|  | HeapFree( GetProcessHeap(), 0, proto_str ); | 
|  | #endif | 
|  | TRACE("%d (i.e. port %d), %s ret %p\n", port, (int)ntohl(port), debugstr_a(proto), retval); | 
|  | return retval; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              gethostname           (WS2_32.57) | 
|  | */ | 
|  | int WINAPI WS_gethostname(char *name, int namelen) | 
|  | { | 
|  | TRACE("name %p, len %d\n", name, namelen); | 
|  |  | 
|  | if (gethostname(name, namelen) == 0) | 
|  | { | 
|  | TRACE("<- '%s'\n", name); | 
|  | return 0; | 
|  | } | 
|  | SetLastError((errno == EINVAL) ? WSAEFAULT : wsaErrno()); | 
|  | TRACE("<- ERROR !\n"); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  |  | 
|  | /* ------------------------------------- Windows sockets extensions -- * | 
|  | *								       * | 
|  | * ------------------------------------------------------------------- */ | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		WSAEnumNetworkEvents (WS2_32.36) | 
|  | */ | 
|  | int WINAPI WSAEnumNetworkEvents(SOCKET s, WSAEVENT hEvent, LPWSANETWORKEVENTS lpEvent) | 
|  | { | 
|  | int ret; | 
|  |  | 
|  | TRACE("%08lx, hEvent %p, lpEvent %p\n", s, hEvent, lpEvent ); | 
|  |  | 
|  | SERVER_START_REQ( get_socket_event ) | 
|  | { | 
|  | req->handle  = SOCKET2HANDLE(s); | 
|  | req->service = TRUE; | 
|  | req->c_event = hEvent; | 
|  | wine_server_set_reply( req, lpEvent->iErrorCode, sizeof(lpEvent->iErrorCode) ); | 
|  | if (!(ret = wine_server_call(req))) lpEvent->lNetworkEvents = reply->pmask & reply->mask; | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | if (!ret) return 0; | 
|  | SetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		WSAEventSelect (WS2_32.39) | 
|  | */ | 
|  | int WINAPI WSAEventSelect(SOCKET s, WSAEVENT hEvent, LONG lEvent) | 
|  | { | 
|  | int ret; | 
|  |  | 
|  | TRACE("%08lx, hEvent %p, event %08x\n", s, hEvent, lEvent); | 
|  |  | 
|  | SERVER_START_REQ( set_socket_event ) | 
|  | { | 
|  | req->handle = SOCKET2HANDLE(s); | 
|  | req->mask   = lEvent; | 
|  | req->event  = hEvent; | 
|  | req->window = 0; | 
|  | req->msg    = 0; | 
|  | ret = wine_server_call( req ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | if (!ret) return 0; | 
|  | SetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /********************************************************************** | 
|  | *      WSAGetOverlappedResult (WS2_32.40) | 
|  | */ | 
|  | BOOL WINAPI WSAGetOverlappedResult( SOCKET s, LPWSAOVERLAPPED lpOverlapped, | 
|  | LPDWORD lpcbTransfer, BOOL fWait, | 
|  | LPDWORD lpdwFlags ) | 
|  | { | 
|  | NTSTATUS status; | 
|  |  | 
|  | TRACE( "socket %04lx ovl %p trans %p, wait %d flags %p\n", | 
|  | s, lpOverlapped, lpcbTransfer, fWait, lpdwFlags ); | 
|  |  | 
|  | if ( lpOverlapped == NULL ) | 
|  | { | 
|  | ERR( "Invalid pointer\n" ); | 
|  | WSASetLastError(WSA_INVALID_PARAMETER); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | status = lpOverlapped->Internal; | 
|  | if (status == STATUS_PENDING) | 
|  | { | 
|  | if (!fWait) | 
|  | { | 
|  | SetLastError( WSA_IO_INCOMPLETE ); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | if (WaitForSingleObject( lpOverlapped->hEvent ? lpOverlapped->hEvent : SOCKET2HANDLE(s), | 
|  | INFINITE ) == WAIT_FAILED) | 
|  | return FALSE; | 
|  | status = lpOverlapped->Internal; | 
|  | } | 
|  |  | 
|  | if ( lpcbTransfer ) | 
|  | *lpcbTransfer = lpOverlapped->InternalHigh; | 
|  |  | 
|  | if ( lpdwFlags ) | 
|  | *lpdwFlags = lpOverlapped->u.s.Offset; | 
|  |  | 
|  | if (status) SetLastError( RtlNtStatusToDosError(status) ); | 
|  | return !status; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSAAsyncSelect			(WS2_32.101) | 
|  | */ | 
|  | INT WINAPI WSAAsyncSelect(SOCKET s, HWND hWnd, UINT uMsg, LONG lEvent) | 
|  | { | 
|  | int ret; | 
|  |  | 
|  | TRACE("%lx, hWnd %p, uMsg %08x, event %08x\n", s, hWnd, uMsg, lEvent); | 
|  |  | 
|  | SERVER_START_REQ( set_socket_event ) | 
|  | { | 
|  | req->handle = SOCKET2HANDLE(s); | 
|  | req->mask   = lEvent; | 
|  | req->event  = 0; | 
|  | req->window = hWnd; | 
|  | req->msg    = uMsg; | 
|  | ret = wine_server_call( req ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | if (!ret) return 0; | 
|  | SetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSACreateEvent          (WS2_32.31) | 
|  | * | 
|  | */ | 
|  | WSAEVENT WINAPI WSACreateEvent(void) | 
|  | { | 
|  | /* Create a manual-reset event, with initial state: unsignaled */ | 
|  | TRACE("\n"); | 
|  |  | 
|  | return CreateEventW(NULL, TRUE, FALSE, NULL); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSACloseEvent          (WS2_32.29) | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI WSACloseEvent(WSAEVENT event) | 
|  | { | 
|  | TRACE ("event=%p\n", event); | 
|  |  | 
|  | return CloseHandle(event); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSASocketA          (WS2_32.78) | 
|  | * | 
|  | */ | 
|  | SOCKET WINAPI WSASocketA(int af, int type, int protocol, | 
|  | LPWSAPROTOCOL_INFOA lpProtocolInfo, | 
|  | GROUP g, DWORD dwFlags) | 
|  | { | 
|  | INT len; | 
|  | WSAPROTOCOL_INFOW info; | 
|  |  | 
|  | TRACE("af=%d type=%d protocol=%d protocol_info=%p group=%d flags=0x%x\n", | 
|  | af, type, protocol, lpProtocolInfo, g, dwFlags); | 
|  |  | 
|  | if (!lpProtocolInfo) return WSASocketW(af, type, protocol, NULL, g, dwFlags); | 
|  |  | 
|  | memcpy(&info, lpProtocolInfo, FIELD_OFFSET(WSAPROTOCOL_INFOW, szProtocol)); | 
|  | len = MultiByteToWideChar(CP_ACP, 0, lpProtocolInfo->szProtocol, -1, | 
|  | info.szProtocol, WSAPROTOCOL_LEN + 1); | 
|  |  | 
|  | if (!len) | 
|  | { | 
|  | WSASetLastError( WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | return WSASocketW(af, type, protocol, &info, g, dwFlags); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSASocketW          (WS2_32.79) | 
|  | * | 
|  | */ | 
|  | SOCKET WINAPI WSASocketW(int af, int type, int protocol, | 
|  | LPWSAPROTOCOL_INFOW lpProtocolInfo, | 
|  | GROUP g, DWORD dwFlags) | 
|  | { | 
|  | SOCKET ret; | 
|  |  | 
|  | /* | 
|  | FIXME: The "advanced" parameters of WSASocketW (lpProtocolInfo, | 
|  | g, dwFlags except WSA_FLAG_OVERLAPPED) are ignored. | 
|  | */ | 
|  |  | 
|  | TRACE("af=%d type=%d protocol=%d protocol_info=%p group=%d flags=0x%x\n", | 
|  | af, type, protocol, lpProtocolInfo, g, dwFlags ); | 
|  |  | 
|  | /* hack for WSADuplicateSocket */ | 
|  | if (lpProtocolInfo && lpProtocolInfo->dwServiceFlags4 == 0xff00ff00) { | 
|  | ret = lpProtocolInfo->dwCatalogEntryId; | 
|  | TRACE("\tgot duplicate %04lx\n", ret); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* convert the socket family and type */ | 
|  | af = convert_af_w2u(af); | 
|  | type = convert_socktype_w2u(type); | 
|  |  | 
|  | if (lpProtocolInfo) | 
|  | { | 
|  | if (af == FROM_PROTOCOL_INFO) | 
|  | af = lpProtocolInfo->iAddressFamily; | 
|  | if (type == FROM_PROTOCOL_INFO) | 
|  | type = lpProtocolInfo->iSocketType; | 
|  | if (protocol == FROM_PROTOCOL_INFO) | 
|  | protocol = lpProtocolInfo->iProtocol; | 
|  | } | 
|  |  | 
|  | if ( af == AF_UNSPEC)  /* did they not specify the address family? */ | 
|  | switch(protocol) | 
|  | { | 
|  | case IPPROTO_TCP: | 
|  | if (type == SOCK_STREAM) { af = AF_INET; break; } | 
|  | case IPPROTO_UDP: | 
|  | if (type == SOCK_DGRAM)  { af = AF_INET; break; } | 
|  | default: SetLastError(WSAEPROTOTYPE); return INVALID_SOCKET; | 
|  | } | 
|  |  | 
|  | SERVER_START_REQ( create_socket ) | 
|  | { | 
|  | req->family     = af; | 
|  | req->type       = type; | 
|  | req->protocol   = protocol; | 
|  | req->access     = GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE; | 
|  | req->attributes = OBJ_INHERIT; | 
|  | req->flags      = dwFlags; | 
|  | set_error( wine_server_call( req ) ); | 
|  | ret = HANDLE2SOCKET( reply->handle ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | if (ret) | 
|  | { | 
|  | TRACE("\tcreated %04lx\n", ret ); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | if (GetLastError() == WSAEACCES) /* raw socket denied */ | 
|  | { | 
|  | if (type == SOCK_RAW) | 
|  | MESSAGE("WARNING: Trying to create a socket of type SOCK_RAW, this" | 
|  | " will fail unless you have special permissions.\n"); | 
|  | else | 
|  | MESSAGE("WS_SOCKET: Failed to create socket, this requires" | 
|  | " special permissions.\n"); | 
|  | SetLastError(WSAESOCKTNOSUPPORT); | 
|  | } | 
|  |  | 
|  | WARN("\t\tfailed!\n"); | 
|  | return INVALID_SOCKET; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSAJoinLeaf          (WS2_32.58) | 
|  | * | 
|  | */ | 
|  | SOCKET WINAPI WSAJoinLeaf( | 
|  | SOCKET s, | 
|  | const struct WS_sockaddr *addr, | 
|  | int addrlen, | 
|  | LPWSABUF lpCallerData, | 
|  | LPWSABUF lpCalleeData, | 
|  | LPQOS lpSQOS, | 
|  | LPQOS lpGQOS, | 
|  | DWORD dwFlags) | 
|  | { | 
|  | FIXME("stub.\n"); | 
|  | return INVALID_SOCKET; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      __WSAFDIsSet			(WS2_32.151) | 
|  | */ | 
|  | int WINAPI __WSAFDIsSet(SOCKET s, WS_fd_set *set) | 
|  | { | 
|  | int i = set->fd_count; | 
|  |  | 
|  | TRACE("(%ld,%p(%i))\n", s, set, i); | 
|  |  | 
|  | while (i--) | 
|  | if (set->fd_array[i] == s) return 1; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSAIsBlocking			(WINSOCK.114) | 
|  | *      WSAIsBlocking			(WS2_32.114) | 
|  | */ | 
|  | BOOL WINAPI WSAIsBlocking(void) | 
|  | { | 
|  | /* By default WinSock should set all its sockets to non-blocking mode | 
|  | * and poll in PeekMessage loop when processing "blocking" ones. This | 
|  | * function is supposed to tell if the program is in this loop. Our | 
|  | * blocking calls are truly blocking so we always return FALSE. | 
|  | * | 
|  | * Note: It is allowed to call this function without prior WSAStartup(). | 
|  | */ | 
|  |  | 
|  | TRACE("\n"); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSACancelBlockingCall		(WINSOCK.113) | 
|  | *      WSACancelBlockingCall		(WS2_32.113) | 
|  | */ | 
|  | INT WINAPI WSACancelBlockingCall(void) | 
|  | { | 
|  | TRACE("\n"); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static INT WINAPI WSA_DefaultBlockingHook( FARPROC x ) | 
|  | { | 
|  | FIXME("How was this called?\n"); | 
|  | return x(); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSASetBlockingHook (WS2_32.109) | 
|  | */ | 
|  | FARPROC WINAPI WSASetBlockingHook(FARPROC lpBlockFunc) | 
|  | { | 
|  | FARPROC prev = blocking_hook; | 
|  | blocking_hook = lpBlockFunc; | 
|  | TRACE("hook %p\n", lpBlockFunc); | 
|  | return prev; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *      WSAUnhookBlockingHook (WS2_32.110) | 
|  | */ | 
|  | INT WINAPI WSAUnhookBlockingHook(void) | 
|  | { | 
|  | blocking_hook = (FARPROC)WSA_DefaultBlockingHook; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  |  | 
|  | /* ----------------------------------- end of API stuff */ | 
|  |  | 
|  | /* ----------------------------------- helper functions - | 
|  | * | 
|  | * TODO: Merge WS_dup_..() stuff into one function that | 
|  | * would operate with a generic structure containing internal | 
|  | * pointers (via a template of some kind). | 
|  | */ | 
|  |  | 
|  | static int list_size(char** l, int item_size) | 
|  | { | 
|  | int i,j = 0; | 
|  | if(l) | 
|  | { for(i=0;l[i];i++) | 
|  | j += (item_size) ? item_size : strlen(l[i]) + 1; | 
|  | j += (i + 1) * sizeof(char*); } | 
|  | return j; | 
|  | } | 
|  |  | 
|  | static int list_dup(char** l_src, char** l_to, int item_size) | 
|  | { | 
|  | char *p; | 
|  | int i; | 
|  |  | 
|  | for (i = 0; l_src[i]; i++) ; | 
|  | p = (char *)(l_to + i + 1); | 
|  | for (i = 0; l_src[i]; i++) | 
|  | { | 
|  | int count = ( item_size ) ? item_size : strlen(l_src[i]) + 1; | 
|  | memcpy(p, l_src[i], count); | 
|  | l_to[i] = p; | 
|  | p += count; | 
|  | } | 
|  | l_to[i] = NULL; | 
|  | return p - (char *)l_to; | 
|  | } | 
|  |  | 
|  | /* ----- hostent */ | 
|  |  | 
|  | /* duplicate hostent entry | 
|  | * and handle all Win16/Win32 dependent things (struct size, ...) *correctly*. | 
|  | * Ditto for protoent and servent. | 
|  | */ | 
|  | static struct WS_hostent *WS_dup_he(const struct hostent* p_he) | 
|  | { | 
|  | char *p; | 
|  | struct WS_hostent *p_to; | 
|  |  | 
|  | int size = (sizeof(*p_he) + | 
|  | strlen(p_he->h_name) + 1 + | 
|  | list_size(p_he->h_aliases, 0) + | 
|  | list_size(p_he->h_addr_list, p_he->h_length)); | 
|  |  | 
|  | if (!(p_to = check_buffer_he(size))) return NULL; | 
|  | p_to->h_addrtype = p_he->h_addrtype; | 
|  | p_to->h_length = p_he->h_length; | 
|  |  | 
|  | p = (char *)(p_to + 1); | 
|  | p_to->h_name = p; | 
|  | strcpy(p, p_he->h_name); | 
|  | p += strlen(p) + 1; | 
|  |  | 
|  | p_to->h_aliases = (char **)p; | 
|  | p += list_dup(p_he->h_aliases, p_to->h_aliases, 0); | 
|  |  | 
|  | p_to->h_addr_list = (char **)p; | 
|  | list_dup(p_he->h_addr_list, p_to->h_addr_list, p_he->h_length); | 
|  | return p_to; | 
|  | } | 
|  |  | 
|  | /* ----- protoent */ | 
|  |  | 
|  | static struct WS_protoent *WS_dup_pe(const struct protoent* p_pe) | 
|  | { | 
|  | char *p; | 
|  | struct WS_protoent *p_to; | 
|  |  | 
|  | int size = (sizeof(*p_pe) + | 
|  | strlen(p_pe->p_name) + 1 + | 
|  | list_size(p_pe->p_aliases, 0)); | 
|  |  | 
|  | if (!(p_to = check_buffer_pe(size))) return NULL; | 
|  | p_to->p_proto = p_pe->p_proto; | 
|  |  | 
|  | p = (char *)(p_to + 1); | 
|  | p_to->p_name = p; | 
|  | strcpy(p, p_pe->p_name); | 
|  | p += strlen(p) + 1; | 
|  |  | 
|  | p_to->p_aliases = (char **)p; | 
|  | list_dup(p_pe->p_aliases, p_to->p_aliases, 0); | 
|  | return p_to; | 
|  | } | 
|  |  | 
|  | /* ----- servent */ | 
|  |  | 
|  | static struct WS_servent *WS_dup_se(const struct servent* p_se) | 
|  | { | 
|  | char *p; | 
|  | struct WS_servent *p_to; | 
|  |  | 
|  | int size = (sizeof(*p_se) + | 
|  | strlen(p_se->s_proto) + 1 + | 
|  | strlen(p_se->s_name) + 1 + | 
|  | list_size(p_se->s_aliases, 0)); | 
|  |  | 
|  | if (!(p_to = check_buffer_se(size))) return NULL; | 
|  | p_to->s_port = p_se->s_port; | 
|  |  | 
|  | p = (char *)(p_to + 1); | 
|  | p_to->s_name = p; | 
|  | strcpy(p, p_se->s_name); | 
|  | p += strlen(p) + 1; | 
|  |  | 
|  | p_to->s_proto = p; | 
|  | strcpy(p, p_se->s_proto); | 
|  | p += strlen(p) + 1; | 
|  |  | 
|  | p_to->s_aliases = (char **)p; | 
|  | list_dup(p_se->s_aliases, p_to->s_aliases, 0); | 
|  | return p_to; | 
|  | } | 
|  |  | 
|  | /* ----------------------------------- error handling */ | 
|  |  | 
|  | UINT wsaErrno(void) | 
|  | { | 
|  | int	loc_errno = errno; | 
|  | WARN("errno %d, (%s).\n", loc_errno, strerror(loc_errno)); | 
|  |  | 
|  | switch(loc_errno) | 
|  | { | 
|  | case EINTR:		return WSAEINTR; | 
|  | case EBADF:		return WSAEBADF; | 
|  | case EPERM: | 
|  | case EACCES:		return WSAEACCES; | 
|  | case EFAULT:		return WSAEFAULT; | 
|  | case EINVAL:		return WSAEINVAL; | 
|  | case EMFILE:		return WSAEMFILE; | 
|  | case EWOULDBLOCK:	return WSAEWOULDBLOCK; | 
|  | case EINPROGRESS:	return WSAEINPROGRESS; | 
|  | case EALREADY:		return WSAEALREADY; | 
|  | case ENOTSOCK:		return WSAENOTSOCK; | 
|  | case EDESTADDRREQ:	return WSAEDESTADDRREQ; | 
|  | case EMSGSIZE:		return WSAEMSGSIZE; | 
|  | case EPROTOTYPE:	return WSAEPROTOTYPE; | 
|  | case ENOPROTOOPT:	return WSAENOPROTOOPT; | 
|  | case EPROTONOSUPPORT:	return WSAEPROTONOSUPPORT; | 
|  | case ESOCKTNOSUPPORT:	return WSAESOCKTNOSUPPORT; | 
|  | case EOPNOTSUPP:	return WSAEOPNOTSUPP; | 
|  | case EPFNOSUPPORT:	return WSAEPFNOSUPPORT; | 
|  | case EAFNOSUPPORT:	return WSAEAFNOSUPPORT; | 
|  | case EADDRINUSE:	return WSAEADDRINUSE; | 
|  | case EADDRNOTAVAIL:	return WSAEADDRNOTAVAIL; | 
|  | case ENETDOWN:		return WSAENETDOWN; | 
|  | case ENETUNREACH:	return WSAENETUNREACH; | 
|  | case ENETRESET:		return WSAENETRESET; | 
|  | case ECONNABORTED:	return WSAECONNABORTED; | 
|  | case EPIPE: | 
|  | case ECONNRESET:	return WSAECONNRESET; | 
|  | case ENOBUFS:		return WSAENOBUFS; | 
|  | case EISCONN:		return WSAEISCONN; | 
|  | case ENOTCONN:		return WSAENOTCONN; | 
|  | case ESHUTDOWN:		return WSAESHUTDOWN; | 
|  | case ETOOMANYREFS:	return WSAETOOMANYREFS; | 
|  | case ETIMEDOUT:		return WSAETIMEDOUT; | 
|  | case ECONNREFUSED:	return WSAECONNREFUSED; | 
|  | case ELOOP:		return WSAELOOP; | 
|  | case ENAMETOOLONG:	return WSAENAMETOOLONG; | 
|  | case EHOSTDOWN:		return WSAEHOSTDOWN; | 
|  | case EHOSTUNREACH:	return WSAEHOSTUNREACH; | 
|  | case ENOTEMPTY:		return WSAENOTEMPTY; | 
|  | #ifdef EPROCLIM | 
|  | case EPROCLIM:		return WSAEPROCLIM; | 
|  | #endif | 
|  | #ifdef EUSERS | 
|  | case EUSERS:		return WSAEUSERS; | 
|  | #endif | 
|  | #ifdef EDQUOT | 
|  | case EDQUOT:		return WSAEDQUOT; | 
|  | #endif | 
|  | #ifdef ESTALE | 
|  | case ESTALE:		return WSAESTALE; | 
|  | #endif | 
|  | #ifdef EREMOTE | 
|  | case EREMOTE:		return WSAEREMOTE; | 
|  | #endif | 
|  |  | 
|  | /* just in case we ever get here and there are no problems */ | 
|  | case 0:			return 0; | 
|  | default: | 
|  | WARN("Unknown errno %d!\n", loc_errno); | 
|  | return WSAEOPNOTSUPP; | 
|  | } | 
|  | } | 
|  |  | 
|  | UINT wsaHerrno(int loc_errno) | 
|  | { | 
|  |  | 
|  | WARN("h_errno %d.\n", loc_errno); | 
|  |  | 
|  | switch(loc_errno) | 
|  | { | 
|  | case HOST_NOT_FOUND:	return WSAHOST_NOT_FOUND; | 
|  | case TRY_AGAIN:		return WSATRY_AGAIN; | 
|  | case NO_RECOVERY:	return WSANO_RECOVERY; | 
|  | case NO_DATA:		return WSANO_DATA; | 
|  | case ENOBUFS:		return WSAENOBUFS; | 
|  |  | 
|  | case 0:			return 0; | 
|  | default: | 
|  | WARN("Unknown h_errno %d!\n", loc_errno); | 
|  | return WSAEOPNOTSUPP; | 
|  | } | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *		WSARecv			(WS2_32.67) | 
|  | */ | 
|  | int WINAPI WSARecv(SOCKET s, LPWSABUF lpBuffers, DWORD dwBufferCount, | 
|  | LPDWORD NumberOfBytesReceived, LPDWORD lpFlags, | 
|  | LPWSAOVERLAPPED lpOverlapped, | 
|  | LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine) | 
|  | { | 
|  | return WSARecvFrom(s, lpBuffers, dwBufferCount, NumberOfBytesReceived, lpFlags, | 
|  | NULL, NULL, lpOverlapped, lpCompletionRoutine); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSARecvFrom             (WS2_32.69) | 
|  | */ | 
|  | INT WINAPI WSARecvFrom( SOCKET s, LPWSABUF lpBuffers, DWORD dwBufferCount, | 
|  | LPDWORD lpNumberOfBytesRecvd, LPDWORD lpFlags, struct WS_sockaddr *lpFrom, | 
|  | LPINT lpFromlen, LPWSAOVERLAPPED lpOverlapped, | 
|  | LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine ) | 
|  |  | 
|  | { | 
|  | unsigned int i, options; | 
|  | int n, fd, err; | 
|  | DWORD timeout_start = GetTickCount(); | 
|  | struct iovec iovec[WS_MSG_MAXIOVLEN]; | 
|  | ULONG_PTR cvalue = (lpOverlapped && ((ULONG_PTR)lpOverlapped->hEvent & 1) == 0) ? (ULONG_PTR)lpOverlapped : 0; | 
|  |  | 
|  | TRACE("socket %04lx, wsabuf %p, nbufs %d, flags %d, from %p, fromlen %d, ovl %p, func %p\n", | 
|  | s, lpBuffers, dwBufferCount, *lpFlags, lpFrom, | 
|  | (lpFromlen ? *lpFromlen : -1), | 
|  | lpOverlapped, lpCompletionRoutine); | 
|  |  | 
|  | if (dwBufferCount > WS_MSG_MAXIOVLEN) | 
|  | { | 
|  | WSASetLastError( WSAEINVAL ); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | fd = get_sock_fd( s, FILE_READ_DATA, &options ); | 
|  | TRACE( "fd=%d, options=%x\n", fd, options ); | 
|  |  | 
|  | if (fd == -1) return SOCKET_ERROR; | 
|  |  | 
|  | for (i = 0; i < dwBufferCount; i++) | 
|  | { | 
|  | iovec[i].iov_base = lpBuffers[i].buf; | 
|  | iovec[i].iov_len  = lpBuffers[i].len; | 
|  | } | 
|  |  | 
|  | for (;;) | 
|  | { | 
|  | n = WS2_recv( fd, iovec, dwBufferCount, lpFrom, lpFromlen, lpFlags ); | 
|  | if (n == -1) | 
|  | { | 
|  | if (errno == EINTR) continue; | 
|  | if (errno != EAGAIN) | 
|  | { | 
|  | err = wsaErrno(); | 
|  | if (cvalue) WS_AddCompletion( s, cvalue, err, 0 ); | 
|  | goto error; | 
|  | } | 
|  | } | 
|  | else | 
|  | *lpNumberOfBytesRecvd = n; | 
|  |  | 
|  | if ((lpOverlapped || lpCompletionRoutine) && | 
|  | !(options & (FILE_SYNCHRONOUS_IO_ALERT | FILE_SYNCHRONOUS_IO_NONALERT))) | 
|  | { | 
|  | IO_STATUS_BLOCK *iosb; | 
|  | struct ws2_async *wsa = HeapAlloc( GetProcessHeap(), 0, sizeof(*wsa) ); | 
|  |  | 
|  | if ( !wsa ) | 
|  | { | 
|  | err = WSAEFAULT; | 
|  | goto error; | 
|  | } | 
|  | release_sock_fd( s, fd ); | 
|  |  | 
|  | wsa->hSocket         = SOCKET2HANDLE(s); | 
|  | wsa->flags           = *lpFlags; | 
|  | wsa->addr            = lpFrom; | 
|  | wsa->addrlen.ptr     = lpFromlen; | 
|  | wsa->user_overlapped = lpOverlapped; | 
|  | wsa->completion_func = lpCompletionRoutine; | 
|  | wsa->n_iovecs        = dwBufferCount; | 
|  | memcpy( wsa->iovec, iovec, dwBufferCount * sizeof(*iovec) ); | 
|  |  | 
|  | iosb = lpOverlapped ? (IO_STATUS_BLOCK *)lpOverlapped : &wsa->local_iosb; | 
|  |  | 
|  | if (n == -1) | 
|  | { | 
|  | iosb->u.Status = STATUS_PENDING; | 
|  | iosb->Information = 0; | 
|  |  | 
|  | SERVER_START_REQ( register_async ) | 
|  | { | 
|  | req->handle = wsa->hSocket; | 
|  | req->type   = ASYNC_TYPE_READ; | 
|  | req->async.callback = WS2_async_recv; | 
|  | req->async.iosb     = iosb; | 
|  | req->async.arg      = wsa; | 
|  | req->async.apc      = ws2_async_apc; | 
|  | req->async.event    = lpCompletionRoutine ? 0 : lpOverlapped->hEvent; | 
|  | req->async.cvalue   = cvalue; | 
|  | err = wine_server_call( req ); | 
|  | } | 
|  | SERVER_END_REQ; | 
|  |  | 
|  | if (err != STATUS_PENDING) HeapFree( GetProcessHeap(), 0, wsa ); | 
|  | WSASetLastError( NtStatusToWSAError( err )); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | iosb->u.Status = STATUS_SUCCESS; | 
|  | iosb->Information = n; | 
|  | if (!wsa->completion_func) | 
|  | { | 
|  | if (cvalue) WS_AddCompletion( s, cvalue, STATUS_SUCCESS, n ); | 
|  | SetEvent( lpOverlapped->hEvent ); | 
|  | HeapFree( GetProcessHeap(), 0, wsa ); | 
|  | } | 
|  | else NtQueueApcThread( GetCurrentThread(), (PNTAPCFUNC)ws2_async_apc, | 
|  | (ULONG_PTR)wsa, (ULONG_PTR)iosb, 0 ); | 
|  | _enable_event(SOCKET2HANDLE(s), FD_READ, 0, 0); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | if (n != -1) break; | 
|  |  | 
|  | if ( _is_blocking(s) ) | 
|  | { | 
|  | struct pollfd pfd; | 
|  | int timeout = GET_RCVTIMEO(fd); | 
|  | if (timeout != -1) | 
|  | { | 
|  | timeout -= GetTickCount() - timeout_start; | 
|  | if (timeout < 0) timeout = 0; | 
|  | } | 
|  |  | 
|  | pfd.fd = fd; | 
|  | pfd.events = POLLIN; | 
|  | if (*lpFlags & WS_MSG_OOB) pfd.events |= POLLPRI; | 
|  |  | 
|  | if (!timeout || !poll( &pfd, 1, timeout )) | 
|  | { | 
|  | err = WSAETIMEDOUT; | 
|  | /* a timeout is not fatal */ | 
|  | _enable_event(SOCKET2HANDLE(s), FD_READ, 0, 0); | 
|  | goto error; | 
|  | } | 
|  | } | 
|  | else | 
|  | { | 
|  | _enable_event(SOCKET2HANDLE(s), FD_READ, 0, 0); | 
|  | err = WSAEWOULDBLOCK; | 
|  | goto error; | 
|  | } | 
|  | } | 
|  |  | 
|  | TRACE(" -> %i bytes\n", n); | 
|  | release_sock_fd( s, fd ); | 
|  | _enable_event(SOCKET2HANDLE(s), FD_READ, 0, 0); | 
|  |  | 
|  | return 0; | 
|  |  | 
|  | error: | 
|  | release_sock_fd( s, fd ); | 
|  | WARN(" -> ERROR %d\n", err); | 
|  | WSASetLastError( err ); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSCInstallProvider             (WS2_32.88) | 
|  | */ | 
|  | INT WINAPI WSCInstallProvider( const LPGUID lpProviderId, | 
|  | LPCWSTR lpszProviderDllPath, | 
|  | const LPWSAPROTOCOL_INFOW lpProtocolInfoList, | 
|  | DWORD dwNumberOfEntries, | 
|  | LPINT lpErrno ) | 
|  | { | 
|  | FIXME("(%s, %s, %p, %d, %p): stub !\n", debugstr_guid(lpProviderId), | 
|  | debugstr_w(lpszProviderDllPath), lpProtocolInfoList, | 
|  | dwNumberOfEntries, lpErrno); | 
|  | *lpErrno = 0; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSCDeinstallProvider             (WS2_32.83) | 
|  | */ | 
|  | INT WINAPI WSCDeinstallProvider(LPGUID lpProviderId, LPINT lpErrno) | 
|  | { | 
|  | FIXME("(%s, %p): stub !\n", debugstr_guid(lpProviderId), lpErrno); | 
|  | *lpErrno = 0; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAAccept                        (WS2_32.26) | 
|  | */ | 
|  | SOCKET WINAPI WSAAccept( SOCKET s, struct WS_sockaddr *addr, LPINT addrlen, | 
|  | LPCONDITIONPROC lpfnCondition, DWORD dwCallbackData) | 
|  | { | 
|  |  | 
|  | int ret = 0, size = 0; | 
|  | WSABUF CallerId, CallerData, CalleeId, CalleeData; | 
|  | /*        QOS SQOS, GQOS; */ | 
|  | GROUP g; | 
|  | SOCKET cs; | 
|  | SOCKADDR src_addr, dst_addr; | 
|  |  | 
|  | TRACE("Socket %04lx, sockaddr %p, addrlen %p, fnCondition %p, dwCallbackData %d\n", | 
|  | s, addr, addrlen, lpfnCondition, dwCallbackData); | 
|  |  | 
|  |  | 
|  | size = sizeof(src_addr); | 
|  | cs = WS_accept(s, &src_addr, &size); | 
|  |  | 
|  | if (cs == SOCKET_ERROR) return SOCKET_ERROR; | 
|  |  | 
|  | CallerId.buf = (char *)&src_addr; | 
|  | CallerId.len = sizeof(src_addr); | 
|  |  | 
|  | CallerData.buf = NULL; | 
|  | CallerData.len = (ULONG)NULL; | 
|  |  | 
|  | WS_getsockname(cs, &dst_addr, &size); | 
|  |  | 
|  | CalleeId.buf = (char *)&dst_addr; | 
|  | CalleeId.len = sizeof(dst_addr); | 
|  |  | 
|  |  | 
|  | ret = (*lpfnCondition)(&CallerId, &CallerData, NULL, NULL, | 
|  | &CalleeId, &CalleeData, &g, dwCallbackData); | 
|  |  | 
|  | switch (ret) | 
|  | { | 
|  | case CF_ACCEPT: | 
|  | if (addr && addrlen) | 
|  | addr = memcpy(addr, &src_addr, (*addrlen > size) ?  size : *addrlen ); | 
|  | return cs; | 
|  | case CF_DEFER: | 
|  | SERVER_START_REQ( set_socket_deferred ) | 
|  | { | 
|  | req->handle = SOCKET2HANDLE(s); | 
|  | req->deferred = SOCKET2HANDLE(cs); | 
|  | if ( !wine_server_call_err ( req ) ) | 
|  | { | 
|  | SetLastError( WSATRY_AGAIN ); | 
|  | WS_closesocket( cs ); | 
|  | } | 
|  | } | 
|  | SERVER_END_REQ; | 
|  | return SOCKET_ERROR; | 
|  | case CF_REJECT: | 
|  | WS_closesocket(cs); | 
|  | SetLastError(WSAECONNREFUSED); | 
|  | return SOCKET_ERROR; | 
|  | default: | 
|  | FIXME("Unknown return type from Condition function\n"); | 
|  | SetLastError(WSAENOTSOCK); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSADuplicateSocketA                      (WS2_32.32) | 
|  | */ | 
|  | int WINAPI WSADuplicateSocketA( SOCKET s, DWORD dwProcessId, LPWSAPROTOCOL_INFOA lpProtocolInfo ) | 
|  | { | 
|  | HANDLE hProcess; | 
|  |  | 
|  | TRACE("(%ld,%x,%p)\n", s, dwProcessId, lpProtocolInfo); | 
|  | memset(lpProtocolInfo, 0, sizeof(*lpProtocolInfo)); | 
|  | /* FIXME: WS_getsockopt(s, WS_SOL_SOCKET, SO_PROTOCOL_INFO, lpProtocolInfo, sizeof(*lpProtocolInfo)); */ | 
|  | /* I don't know what the real Windoze does next, this is a hack */ | 
|  | /* ...we could duplicate and then use ConvertToGlobalHandle on the duplicate, then let | 
|  | * the target use the global duplicate, or we could copy a reference to us to the structure | 
|  | * and let the target duplicate it from us, but let's do it as simple as possible */ | 
|  | hProcess = OpenProcess(PROCESS_DUP_HANDLE, FALSE, dwProcessId); | 
|  | DuplicateHandle(GetCurrentProcess(), SOCKET2HANDLE(s), | 
|  | hProcess, (LPHANDLE)&lpProtocolInfo->dwCatalogEntryId, | 
|  | 0, FALSE, DUPLICATE_SAME_ACCESS); | 
|  | CloseHandle(hProcess); | 
|  | lpProtocolInfo->dwServiceFlags4 = 0xff00ff00; /* magic */ | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSADuplicateSocketW                      (WS2_32.33) | 
|  | */ | 
|  | int WINAPI WSADuplicateSocketW( SOCKET s, DWORD dwProcessId, LPWSAPROTOCOL_INFOW lpProtocolInfo ) | 
|  | { | 
|  | HANDLE hProcess; | 
|  |  | 
|  | TRACE("(%ld,%x,%p)\n", s, dwProcessId, lpProtocolInfo); | 
|  |  | 
|  | memset(lpProtocolInfo, 0, sizeof(*lpProtocolInfo)); | 
|  | hProcess = OpenProcess(PROCESS_DUP_HANDLE, FALSE, dwProcessId); | 
|  | DuplicateHandle(GetCurrentProcess(), SOCKET2HANDLE(s), | 
|  | hProcess, (LPHANDLE)&lpProtocolInfo->dwCatalogEntryId, | 
|  | 0, FALSE, DUPLICATE_SAME_ACCESS); | 
|  | CloseHandle(hProcess); | 
|  | lpProtocolInfo->dwServiceFlags4 = 0xff00ff00; /* magic */ | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAInstallServiceClassA                  (WS2_32.48) | 
|  | */ | 
|  | int WINAPI WSAInstallServiceClassA(LPWSASERVICECLASSINFOA info) | 
|  | { | 
|  | FIXME("Request to install service %s\n",debugstr_a(info->lpszServiceClassName)); | 
|  | WSASetLastError(WSAEACCES); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAInstallServiceClassW                  (WS2_32.49) | 
|  | */ | 
|  | int WINAPI WSAInstallServiceClassW(LPWSASERVICECLASSINFOW info) | 
|  | { | 
|  | FIXME("Request to install service %s\n",debugstr_w(info->lpszServiceClassName)); | 
|  | WSASetLastError(WSAEACCES); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSARemoveServiceClass                    (WS2_32.70) | 
|  | */ | 
|  | int WINAPI WSARemoveServiceClass(LPGUID info) | 
|  | { | 
|  | FIXME("Request to remove service %p\n",info); | 
|  | WSASetLastError(WSATYPE_NOT_FOUND); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAStringToAddressA                      (WS2_32.80) | 
|  | */ | 
|  | INT WINAPI WSAStringToAddressA(LPSTR AddressString, | 
|  | INT AddressFamily, | 
|  | LPWSAPROTOCOL_INFOA lpProtocolInfo, | 
|  | LPSOCKADDR lpAddress, | 
|  | LPINT lpAddressLength) | 
|  | { | 
|  | INT res=0; | 
|  | LPSTR workBuffer=NULL,ptrPort; | 
|  |  | 
|  | TRACE( "(%s, %x, %p, %p, %p)\n", debugstr_a(AddressString), AddressFamily, | 
|  | lpProtocolInfo, lpAddress, lpAddressLength ); | 
|  |  | 
|  | if (!lpAddressLength || !lpAddress) return SOCKET_ERROR; | 
|  |  | 
|  | if (!AddressString) | 
|  | { | 
|  | WSASetLastError(WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | if (lpProtocolInfo) | 
|  | FIXME("ProtocolInfo not implemented.\n"); | 
|  |  | 
|  | workBuffer = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, | 
|  | strlen(AddressString) + 1); | 
|  | if (!workBuffer) | 
|  | { | 
|  | WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | strcpy(workBuffer, AddressString); | 
|  |  | 
|  | switch(AddressFamily) | 
|  | { | 
|  | case WS_AF_INET: | 
|  | { | 
|  | struct in_addr inetaddr; | 
|  |  | 
|  | /* If lpAddressLength is too small, tell caller the size we need */ | 
|  | if (*lpAddressLength < sizeof(SOCKADDR_IN)) | 
|  | { | 
|  | *lpAddressLength = sizeof(SOCKADDR_IN); | 
|  | res = WSAEFAULT; | 
|  | break; | 
|  | } | 
|  | memset(lpAddress, 0, sizeof(SOCKADDR_IN)); | 
|  |  | 
|  | ((LPSOCKADDR_IN)lpAddress)->sin_family = AF_INET; | 
|  |  | 
|  | ptrPort = strchr(workBuffer, ':'); | 
|  | if(ptrPort) | 
|  | { | 
|  | ((LPSOCKADDR_IN)lpAddress)->sin_port = (WS_u_short)atoi(ptrPort+1); | 
|  | *ptrPort = '\0'; | 
|  | } | 
|  | else | 
|  | { | 
|  | ((LPSOCKADDR_IN)lpAddress)->sin_port = 0; | 
|  | } | 
|  |  | 
|  | if(inet_aton(workBuffer, &inetaddr) > 0) | 
|  | { | 
|  | ((LPSOCKADDR_IN)lpAddress)->sin_addr.WS_s_addr = inetaddr.s_addr; | 
|  | res = 0; | 
|  | } | 
|  | else | 
|  | res = WSAEINVAL; | 
|  |  | 
|  | break; | 
|  |  | 
|  | } | 
|  | case WS_AF_INET6: | 
|  | { | 
|  | struct in6_addr inetaddr; | 
|  | /* If lpAddressLength is too small, tell caller the size we need */ | 
|  | if (*lpAddressLength < sizeof(SOCKADDR_IN6)) | 
|  | { | 
|  | *lpAddressLength = sizeof(SOCKADDR_IN6); | 
|  | res = WSAEFAULT; | 
|  | break; | 
|  | } | 
|  | #ifdef HAVE_INET_PTON | 
|  | memset(lpAddress, 0, sizeof(SOCKADDR_IN6)); | 
|  |  | 
|  | ((LPSOCKADDR_IN6)lpAddress)->sin6_family = WS_AF_INET6; | 
|  |  | 
|  | /* This one is a bit tricky. An IPv6 address contains colons, so the | 
|  | * check from IPv4 doesn't work like that. However, IPv6 addresses that | 
|  | * contain a port are written with braces like [fd12:3456:7890::1]:12345 | 
|  | * so what we will do is to look for ']', check if the next char is a | 
|  | * colon, and if it is, parse the port as in IPv4. */ | 
|  |  | 
|  | ptrPort = strchr(workBuffer, ']'); | 
|  | if(ptrPort && *(++ptrPort) == ':') | 
|  | { | 
|  | ((LPSOCKADDR_IN6)lpAddress)->sin6_port = (WS_u_short)atoi(ptrPort+1); | 
|  | *ptrPort = '\0'; | 
|  | } | 
|  | else | 
|  | { | 
|  | ((LPSOCKADDR_IN6)lpAddress)->sin6_port = 0; | 
|  | } | 
|  |  | 
|  | if(inet_pton(AF_INET6, workBuffer, &inetaddr) > 0) | 
|  | { | 
|  | memcpy(&((LPSOCKADDR_IN6)lpAddress)->sin6_addr, &inetaddr, | 
|  | sizeof(struct in6_addr)); | 
|  | res = 0; | 
|  | } | 
|  | else | 
|  | #endif /* HAVE_INET_PTON */ | 
|  | res = WSAEINVAL; | 
|  |  | 
|  | break; | 
|  | } | 
|  | default: | 
|  | /* According to MSDN, only AF_INET and AF_INET6 are supported. */ | 
|  | TRACE("Unsupported address family specified: %d.\n", AddressFamily); | 
|  | res = WSAEINVAL; | 
|  | } | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, workBuffer); | 
|  |  | 
|  | if (!res) return 0; | 
|  | WSASetLastError(res); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAStringToAddressW                      (WS2_32.81) | 
|  | * | 
|  | * Does anybody know if this functions allows to use hebrew/arabic/chinese... digits? | 
|  | * If this should be the case, it would be required to map these digits | 
|  | * to Unicode digits (0-9) using FoldString first. | 
|  | */ | 
|  | INT WINAPI WSAStringToAddressW(LPWSTR AddressString, | 
|  | INT AddressFamily, | 
|  | LPWSAPROTOCOL_INFOW lpProtocolInfo, | 
|  | LPSOCKADDR lpAddress, | 
|  | LPINT lpAddressLength) | 
|  | { | 
|  | INT sBuffer,res=0; | 
|  | LPSTR workBuffer=NULL; | 
|  | WSAPROTOCOL_INFOA infoA; | 
|  | LPWSAPROTOCOL_INFOA lpProtoInfoA = NULL; | 
|  |  | 
|  | TRACE( "(%s, %x, %p, %p, %p)\n", debugstr_w(AddressString), AddressFamily, lpProtocolInfo, | 
|  | lpAddress, lpAddressLength ); | 
|  |  | 
|  | if (!lpAddressLength || !lpAddress) return SOCKET_ERROR; | 
|  |  | 
|  | /* if ProtocolInfo is available - convert to ANSI variant */ | 
|  | if (lpProtocolInfo) | 
|  | { | 
|  | lpProtoInfoA = &infoA; | 
|  | memcpy( lpProtoInfoA, lpProtocolInfo, FIELD_OFFSET( WSAPROTOCOL_INFOA, szProtocol ) ); | 
|  |  | 
|  | if (!WideCharToMultiByte( CP_ACP, 0, lpProtocolInfo->szProtocol, -1, | 
|  | lpProtoInfoA->szProtocol, WSAPROTOCOL_LEN+1, NULL, NULL )) | 
|  | { | 
|  | WSASetLastError( WSAEINVAL); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (AddressString) | 
|  | { | 
|  | /* Translate AddressString to ANSI code page - assumes that only | 
|  | standard digits 0-9 are used with this API call */ | 
|  | sBuffer = WideCharToMultiByte( CP_ACP, 0, AddressString, -1, NULL, 0, NULL, NULL ); | 
|  | workBuffer = HeapAlloc( GetProcessHeap(), 0, sBuffer ); | 
|  |  | 
|  | if (workBuffer) | 
|  | { | 
|  | WideCharToMultiByte( CP_ACP, 0, AddressString, -1, workBuffer, sBuffer, NULL, NULL ); | 
|  | res = WSAStringToAddressA(workBuffer,AddressFamily,lpProtoInfoA, | 
|  | lpAddress,lpAddressLength); | 
|  | HeapFree( GetProcessHeap(), 0, workBuffer ); | 
|  | return res; | 
|  | } | 
|  | else | 
|  | res = WSA_NOT_ENOUGH_MEMORY; | 
|  | } | 
|  | else | 
|  | res = WSAEINVAL; | 
|  |  | 
|  | WSASetLastError(res); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAAddressToStringA                      (WS2_32.27) | 
|  | * | 
|  | *  See WSAAddressToStringW | 
|  | */ | 
|  | INT WINAPI WSAAddressToStringA( LPSOCKADDR sockaddr, DWORD len, | 
|  | LPWSAPROTOCOL_INFOA info, LPSTR string, | 
|  | LPDWORD lenstr ) | 
|  | { | 
|  | INT size; | 
|  | CHAR buffer[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */ | 
|  | CHAR *p; | 
|  |  | 
|  | TRACE( "(%p, %d, %p, %p, %p)\n", sockaddr, len, info, string, lenstr ); | 
|  |  | 
|  | if (!sockaddr || len < sizeof(SOCKADDR_IN)) return SOCKET_ERROR; | 
|  | if (!string || !lenstr) return SOCKET_ERROR; | 
|  |  | 
|  | /* sin_family is guaranteed to be the first u_short */ | 
|  | if (((SOCKADDR_IN *)sockaddr)->sin_family != AF_INET) return SOCKET_ERROR; | 
|  |  | 
|  | sprintf( buffer, "%u.%u.%u.%u:%u", | 
|  | (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 24 & 0xff), | 
|  | (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 16 & 0xff), | 
|  | (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 8 & 0xff), | 
|  | (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) & 0xff), | 
|  | ntohs( ((SOCKADDR_IN *)sockaddr)->sin_port ) ); | 
|  |  | 
|  | p = strchr( buffer, ':' ); | 
|  | if (!((SOCKADDR_IN *)sockaddr)->sin_port) *p = 0; | 
|  |  | 
|  | size = strlen( buffer ); | 
|  |  | 
|  | if (*lenstr <  size) | 
|  | { | 
|  | *lenstr = size; | 
|  | WSASetLastError(WSAEFAULT); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | strcpy( string, buffer ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAAddressToStringW                      (WS2_32.28) | 
|  | * | 
|  | * Convert a sockaddr address into a readable address string. | 
|  | * | 
|  | * PARAMS | 
|  | *  sockaddr [I]    Pointer to a sockaddr structure. | 
|  | *  len      [I]    Size of the sockaddr structure. | 
|  | *  info     [I]    Pointer to a WSAPROTOCOL_INFOW structure (optional). | 
|  | *  string   [I/O]  Pointer to a buffer to receive the address string. | 
|  | *  lenstr   [I/O]  Size of the receive buffer in WCHARs. | 
|  | * | 
|  | * RETURNS | 
|  | *  Success: 0 | 
|  | *  Failure: SOCKET_ERROR | 
|  | * | 
|  | * NOTES | 
|  | *  The 'info' parameter is ignored. | 
|  | * | 
|  | * BUGS | 
|  | *  Only supports AF_INET addresses. | 
|  | */ | 
|  | INT WINAPI WSAAddressToStringW( LPSOCKADDR sockaddr, DWORD len, | 
|  | LPWSAPROTOCOL_INFOW info, LPWSTR string, | 
|  | LPDWORD lenstr ) | 
|  | { | 
|  | INT size; | 
|  | WCHAR buffer[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */ | 
|  | static const WCHAR format[] = { '%','u','.','%','u','.','%','u','.','%','u',':','%','u',0 }; | 
|  | WCHAR *p; | 
|  |  | 
|  | TRACE( "(%p, %x, %p, %p, %p)\n", sockaddr, len, info, string, lenstr ); | 
|  |  | 
|  | if (!sockaddr || len < sizeof(SOCKADDR_IN)) return SOCKET_ERROR; | 
|  | if (!string || !lenstr) return SOCKET_ERROR; | 
|  |  | 
|  | /* sin_family is guaranteed to be the first u_short */ | 
|  | if (((SOCKADDR_IN *)sockaddr)->sin_family != AF_INET) return SOCKET_ERROR; | 
|  |  | 
|  | sprintfW( buffer, format, | 
|  | (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 24 & 0xff), | 
|  | (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 16 & 0xff), | 
|  | (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) >> 8 & 0xff), | 
|  | (unsigned int)(ntohl( ((SOCKADDR_IN *)sockaddr)->sin_addr.WS_s_addr ) & 0xff), | 
|  | ntohs( ((SOCKADDR_IN *)sockaddr)->sin_port ) ); | 
|  |  | 
|  | p = strchrW( buffer, ':' ); | 
|  | if (!((SOCKADDR_IN *)sockaddr)->sin_port) *p = 0; | 
|  |  | 
|  | size = lstrlenW( buffer ); | 
|  |  | 
|  | if (*lenstr <  size) | 
|  | { | 
|  | *lenstr = size; | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | lstrcpyW( string, buffer ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAEnumNameSpaceProvidersA                  (WS2_32.34) | 
|  | */ | 
|  | INT WINAPI WSAEnumNameSpaceProvidersA( LPDWORD len, LPWSANAMESPACE_INFOA buffer ) | 
|  | { | 
|  | FIXME( "(%p %p) Stub!\n", len, buffer ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAEnumNameSpaceProvidersW                  (WS2_32.35) | 
|  | */ | 
|  | INT WINAPI WSAEnumNameSpaceProvidersW( LPDWORD len, LPWSANAMESPACE_INFOW buffer ) | 
|  | { | 
|  | FIXME( "(%p %p) Stub!\n", len, buffer ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAGetQOSByName                             (WS2_32.41) | 
|  | */ | 
|  | BOOL WINAPI WSAGetQOSByName( SOCKET s, LPWSABUF lpQOSName, LPQOS lpQOS ) | 
|  | { | 
|  | FIXME( "(0x%04lx %p %p) Stub!\n", s, lpQOSName, lpQOS ); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAGetServiceClassInfoA                     (WS2_32.42) | 
|  | */ | 
|  | INT WINAPI WSAGetServiceClassInfoA( LPGUID provider, LPGUID service, LPDWORD len, | 
|  | LPWSASERVICECLASSINFOA info ) | 
|  | { | 
|  | FIXME( "(%s %s %p %p) Stub!\n", debugstr_guid(provider), debugstr_guid(service), | 
|  | len, info ); | 
|  | WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAGetServiceClassInfoW                     (WS2_32.43) | 
|  | */ | 
|  | INT WINAPI WSAGetServiceClassInfoW( LPGUID provider, LPGUID service, LPDWORD len, | 
|  | LPWSASERVICECLASSINFOW info ) | 
|  | { | 
|  | FIXME( "(%s %s %p %p) Stub!\n", debugstr_guid(provider), debugstr_guid(service), | 
|  | len, info ); | 
|  | WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAGetServiceClassNameByClassIdA            (WS2_32.44) | 
|  | */ | 
|  | INT WINAPI WSAGetServiceClassNameByClassIdA( LPGUID class, LPSTR service, LPDWORD len ) | 
|  | { | 
|  | FIXME( "(%s %p %p) Stub!\n", debugstr_guid(class), service, len ); | 
|  | WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAGetServiceClassNameByClassIdW            (WS2_32.45) | 
|  | */ | 
|  | INT WINAPI WSAGetServiceClassNameByClassIdW( LPGUID class, LPWSTR service, LPDWORD len ) | 
|  | { | 
|  | FIXME( "(%s %p %p) Stub!\n", debugstr_guid(class), service, len ); | 
|  | WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSALookupServiceBeginA                       (WS2_32.59) | 
|  | */ | 
|  | INT WINAPI WSALookupServiceBeginA( LPWSAQUERYSETA lpqsRestrictions, | 
|  | DWORD dwControlFlags, | 
|  | LPHANDLE lphLookup) | 
|  | { | 
|  | FIXME("(%p 0x%08x %p) Stub!\n", lpqsRestrictions, dwControlFlags, | 
|  | lphLookup); | 
|  | WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSALookupServiceBeginW                       (WS2_32.60) | 
|  | */ | 
|  | INT WINAPI WSALookupServiceBeginW( LPWSAQUERYSETW lpqsRestrictions, | 
|  | DWORD dwControlFlags, | 
|  | LPHANDLE lphLookup) | 
|  | { | 
|  | FIXME("(%p 0x%08x %p) Stub!\n", lpqsRestrictions, dwControlFlags, | 
|  | lphLookup); | 
|  | WSASetLastError(WSA_NOT_ENOUGH_MEMORY); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSALookupServiceBeginW                       (WS2_32.61) | 
|  | */ | 
|  | INT WINAPI WSALookupServiceEnd( HANDLE lookup ) | 
|  | { | 
|  | FIXME("(%p) Stub!\n", lookup ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSALookupServiceNextA                       (WS2_32.62) | 
|  | */ | 
|  | INT WINAPI WSALookupServiceNextA( HANDLE lookup, DWORD flags, LPDWORD len, LPWSAQUERYSETA results ) | 
|  | { | 
|  | FIXME( "(%p 0x%08x %p %p) Stub!\n", lookup, flags, len, results ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSALookupServiceNextW                       (WS2_32.63) | 
|  | */ | 
|  | INT WINAPI WSALookupServiceNextW( HANDLE lookup, DWORD flags, LPDWORD len, LPWSAQUERYSETW results ) | 
|  | { | 
|  | FIXME( "(%p 0x%08x %p %p) Stub!\n", lookup, flags, len, results ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSANtohl                                   (WS2_32.64) | 
|  | */ | 
|  | INT WINAPI WSANtohl( SOCKET s, WS_u_long netlong, WS_u_long* lphostlong ) | 
|  | { | 
|  | TRACE( "(0x%04lx 0x%08x %p)\n", s, netlong, lphostlong ); | 
|  |  | 
|  | if (!lphostlong) return WSAEFAULT; | 
|  |  | 
|  | *lphostlong = ntohl( netlong ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSANtohs                                   (WS2_32.65) | 
|  | */ | 
|  | INT WINAPI WSANtohs( SOCKET s, WS_u_short netshort, WS_u_short* lphostshort ) | 
|  | { | 
|  | TRACE( "(0x%04lx 0x%08x %p)\n", s, netshort, lphostshort ); | 
|  |  | 
|  | if (!lphostshort) return WSAEFAULT; | 
|  |  | 
|  | *lphostshort = ntohs( netshort ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSAProviderConfigChange                     (WS2_32.66) | 
|  | */ | 
|  | INT WINAPI WSAProviderConfigChange( LPHANDLE handle, LPWSAOVERLAPPED overlapped, | 
|  | LPWSAOVERLAPPED_COMPLETION_ROUTINE completion ) | 
|  | { | 
|  | FIXME( "(%p %p %p) Stub!\n", handle, overlapped, completion ); | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSARecvDisconnect                           (WS2_32.68) | 
|  | */ | 
|  | INT WINAPI WSARecvDisconnect( SOCKET s, LPWSABUF disconnectdata ) | 
|  | { | 
|  | TRACE( "(0x%04lx %p)\n", s, disconnectdata ); | 
|  |  | 
|  | return WS_shutdown( s, 0 ); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSASetServiceA                              (WS2_32.76) | 
|  | */ | 
|  | INT WINAPI WSASetServiceA( LPWSAQUERYSETA query, WSAESETSERVICEOP operation, DWORD flags ) | 
|  | { | 
|  | FIXME( "(%p 0x%08x 0x%08x) Stub!\n", query, operation, flags ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSASetServiceW                              (WS2_32.77) | 
|  | */ | 
|  | INT WINAPI WSASetServiceW( LPWSAQUERYSETW query, WSAESETSERVICEOP operation, DWORD flags ) | 
|  | { | 
|  | FIXME( "(%p 0x%08x 0x%08x) Stub!\n", query, operation, flags ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSCEnableNSProvider                         (WS2_32.84) | 
|  | */ | 
|  | INT WINAPI WSCEnableNSProvider( LPGUID provider, BOOL enable ) | 
|  | { | 
|  | FIXME( "(%s 0x%08x) Stub!\n", debugstr_guid(provider), enable ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSCGetProviderPath                          (WS2_32.86) | 
|  | */ | 
|  | INT WINAPI WSCGetProviderPath( LPGUID provider, LPWSTR path, LPINT len, LPINT errcode ) | 
|  | { | 
|  | FIXME( "(%s %p %p %p) Stub!\n", debugstr_guid(provider), path, len, errcode ); | 
|  |  | 
|  | if (!errcode || !provider || !len) return WSAEFAULT; | 
|  |  | 
|  | *errcode = WSAEINVAL; | 
|  | return SOCKET_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSCInstallNameSpace                         (WS2_32.87) | 
|  | */ | 
|  | INT WINAPI WSCInstallNameSpace( LPWSTR identifier, LPWSTR path, DWORD namespace, | 
|  | DWORD version, LPGUID provider ) | 
|  | { | 
|  | FIXME( "(%s %s 0x%08x 0x%08x %s) Stub!\n", debugstr_w(identifier), debugstr_w(path), | 
|  | namespace, version, debugstr_guid(provider) ); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSCUnInstallNameSpace                       (WS2_32.89) | 
|  | */ | 
|  | INT WINAPI WSCUnInstallNameSpace( LPGUID lpProviderId ) | 
|  | { | 
|  | FIXME("(%p) Stub!\n", lpProviderId); | 
|  | return NO_ERROR; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *              WSCWriteProviderOrder                       (WS2_32.91) | 
|  | */ | 
|  | INT WINAPI WSCWriteProviderOrder( LPDWORD entry, DWORD number ) | 
|  | { | 
|  | FIXME("(%p 0x%08x) Stub!\n", entry, number); | 
|  | return 0; | 
|  | } |