Release 980301
[wine] / misc / winsock.c
1 /*
2  * based on Windows Sockets 1.1 specs
3  * (ftp.microsoft.com:/Advsys/winsock/spec11/WINSOCK.TXT)
4  * 
5  * (C) 1993,1994,1996,1997 John Brezak, Erik Bos, Alex Korobka.
6  *
7  * NOTE: If you make any changes to fix a particular app, make sure 
8  * they don't break something else like Netscape or telnet and ftp 
9  * clients and servers (www.winsite.com got a lot of those).
10  *
11  */
12  
13 #include <stdio.h>
14 #include <string.h>
15 #include <signal.h>
16 #include <sys/types.h>
17 #include <sys/ipc.h>
18 #include <sys/ioctl.h>
19 #if defined(__svr4__)
20 #include <sys/filio.h>
21 #include <sys/ioccom.h>
22 #include <sys/sockio.h>
23 #endif
24 #if defined(__EMX__)
25 #include <sys/so_ioctl.h>
26 #include <sys/param.h>
27 #endif
28 #include <sys/msg.h>
29 #include <sys/wait.h>
30 #include <sys/socket.h>
31 #include <netinet/in.h>
32 #include <arpa/inet.h>
33 #include <ctype.h>
34 #include <fcntl.h>
35 #include <errno.h>
36 #include <netdb.h>
37 #include <unistd.h>
38
39 #include "winsock.h"
40 #include "windows.h"
41 #include "winnt.h"
42 #include "heap.h"
43 #include "ldt.h"
44 #include "task.h"
45 #include "message.h"
46 #include "miscemu.h"
47 #include "debug.h"
48
49 #define DEBUG_SOCKADDR 0
50 #define dump_sockaddr(a) \
51         fprintf(stderr, "sockaddr_in: family %d, address %s, port %d\n", \
52                         ((struct sockaddr_in *)a)->sin_family, \
53                         inet_ntoa(((struct sockaddr_in *)a)->sin_addr), \
54                         ntohs(((struct sockaddr_in *)a)->sin_port))
55
56 #pragma pack(4)
57
58 /* ----------------------------------- internal data */
59
60 extern int h_errno;
61
62 static HANDLE32         _WSHeap = 0;
63 static unsigned char*   _ws_stub = NULL;
64 static LPWSINFO         _wsi_list = NULL;
65
66 #define WS_ALLOC(size) \
67         HeapAlloc(_WSHeap, HEAP_ZERO_MEMORY, (size) )
68 #define WS_FREE(ptr) \
69         HeapFree(_WSHeap, 0, (ptr) )
70
71 #define WS_PTR2HANDLE(ptr) \
72         ((short)((int)(ptr) - (int)_ws_stub))
73 #define WS_HANDLE2PTR(handle) \
74         ((unsigned)((int)_ws_stub + (int)(handle)))
75
76 #define WSI_CHECK_RANGE(pwsi, pws) \
77         ( ((unsigned)(pws) > (unsigned)(pwsi)) && \
78           ((unsigned)(pws) < ((unsigned)(pwsi) + sizeof(WSINFO))) )
79
80 static INT32         _ws_sock_ops[] =
81        { WS_SO_DEBUG, WS_SO_REUSEADDR, WS_SO_KEEPALIVE, WS_SO_DONTROUTE,
82          WS_SO_BROADCAST, WS_SO_LINGER, WS_SO_OOBINLINE, WS_SO_SNDBUF,
83          WS_SO_RCVBUF, WS_SO_ERROR, WS_SO_TYPE, WS_SO_DONTLINGER, 0 };
84 static int           _px_sock_ops[] =
85        { SO_DEBUG, SO_REUSEADDR, SO_KEEPALIVE, SO_DONTROUTE, SO_BROADCAST,
86          SO_LINGER, SO_OOBINLINE, SO_SNDBUF, SO_RCVBUF, SO_ERROR, SO_TYPE,
87          SO_LINGER };
88
89 static int   _check_ws(LPWSINFO pwsi, ws_socket* pws);
90 static char* _check_buffer(LPWSINFO pwsi, int size);
91
92 extern void EVENT_AddIO( int fd, unsigned flag );
93 extern void EVENT_DeleteIO( int fd, unsigned flag );
94
95 /***********************************************************************
96  *          convert_sockopt()
97  *
98  * Converts socket flags from Windows format.
99  */
100 static void convert_sockopt(INT32 *level, INT32 *optname)
101 {
102   int i;
103   switch (*level)
104   {
105      case WS_SOL_SOCKET:
106         *level = SOL_SOCKET;
107         for(i=0; _ws_sock_ops[i]; i++)
108             if( _ws_sock_ops[i] == *optname ) break;
109         if( _ws_sock_ops[i] ) *optname = _px_sock_ops[i];
110         else fprintf(stderr, "convert_sockopt() unknown optname %d\n", *optname);
111         break;
112      case WS_IPPROTO_TCP:
113         *optname = IPPROTO_TCP;
114   }
115 }
116
117 /* ----------------------------------- Per-thread info (or per-process?) */
118
119 static LPWSINFO wsi_find(HTASK16 hTask)
120
121     TDB*           pTask = (TDB*)GlobalLock16(hTask);
122     if( pTask )
123     {
124         if( pTask->pwsi ) return pTask->pwsi;
125         else
126         {
127             LPWSINFO pwsi = _wsi_list;
128             while( pwsi && pwsi->tid != hTask ) pwsi = pwsi->next;
129             if( pwsi )
130                 fprintf(stderr,"loose wsi struct! pwsi=0x%08x, task=0x%04x\n", 
131                                         (unsigned)pwsi, hTask );
132             return pwsi; 
133         }
134     }
135     return NULL;
136 }
137
138 static ws_socket* wsi_alloc_socket(LPWSINFO pwsi, int fd)
139 {
140     /* Initialize a new entry in the socket table */
141
142     if( pwsi->last_free >= 0 )
143     {
144         int i = pwsi->last_free;
145
146         pwsi->last_free = pwsi->sock[i].flags;  /* free list */
147         pwsi->sock[i].fd = fd;
148         pwsi->sock[i].flags = 0;
149         return &pwsi->sock[i];
150     }
151     return NULL;
152 }
153
154 static int wsi_strtolo(LPWSINFO pwsi, const char* name, const char* opt)
155 {
156     /* Stuff a lowercase copy of the string into the local buffer */
157
158     int i = strlen(name) + 2;
159     char* p = _check_buffer(pwsi, i + ((opt)?strlen(opt):0));
160
161     if( p )
162     {
163         do *p++ = tolower(*name); while(*name++);
164         i = (p - (char*)(pwsi->buffer));
165         if( opt ) do *p++ = tolower(*opt); while(*opt++);
166         return i;
167     }
168     return 0;
169 }
170
171 static fd_set* fd_set_import( fd_set* fds, LPWSINFO pwsi, void* wsfds, int* highfd, BOOL32 b32 )
172 {
173     /* translate Winsock fd set into local fd set */
174
175     if( wsfds ) 
176     { 
177 #define wsfds16 ((ws_fd_set16*)wsfds)
178 #define wsfds32 ((ws_fd_set32*)wsfds)
179         ws_socket* pws;
180         int i, count;
181
182         FD_ZERO(fds);
183         count = b32 ? wsfds32->fd_count : wsfds16->fd_count;
184
185         for( i = 0; i < count; i++ )
186         {
187              pws = (b32) ? (ws_socket*)WS_HANDLE2PTR(wsfds32->fd_array[i])
188                          : (ws_socket*)WS_HANDLE2PTR(wsfds16->fd_array[i]);
189              if( _check_ws(pwsi, pws) )
190              {
191                     if( pws->fd > *highfd ) *highfd = pws->fd;
192                     FD_SET(pws->fd, fds);
193              }
194         }
195 #undef wsfds32
196 #undef wsfds16
197         return fds;
198     }
199     return NULL;
200 }
201
202 __inline__ static int sock_error_p(int s)
203 {
204     unsigned int optval, optlen;
205
206     optlen = sizeof(optval);
207     getsockopt(s, SOL_SOCKET, SO_ERROR, &optval, &optlen);
208     if (optval) dprintf_warn(winsock, "\t[%i] error: %d\n", s, optval);
209     return optval != 0;
210 }
211
212 static int fd_set_export( LPWSINFO pwsi, fd_set* fds, fd_set* exceptfds, void* wsfds, BOOL32 b32 )
213 {
214     int num_err = 0;
215
216     /* translate local fd set into Winsock fd set, adding
217      * errors to exceptfds (only if app requested it) */
218
219     if( wsfds )
220     {
221 #define wsfds16 ((ws_fd_set16*)wsfds)
222 #define wsfds32 ((ws_fd_set32*)wsfds)
223         int i, j, count = (b32) ? wsfds32->fd_count : wsfds16->fd_count;
224
225         for( i = 0, j = 0; i < count; i++ )
226         {
227             ws_socket *pws = (b32) ? (ws_socket*)WS_HANDLE2PTR(wsfds32->fd_array[i])
228                                    : (ws_socket*)WS_HANDLE2PTR(wsfds16->fd_array[i]);
229             if( _check_ws(pwsi, pws) )
230             {
231                 int fd = pws->fd;
232
233                 if( FD_ISSET(fd, fds) )
234                 {
235                     if ( exceptfds && sock_error_p(fd) )
236                     {
237                         FD_SET(fd, exceptfds);
238                         num_err++;
239                     }
240                     else if( b32 )
241                              wsfds32->fd_array[j++] = wsfds32->fd_array[i];
242                          else
243                              wsfds16->fd_array[j++] = wsfds16->fd_array[i];
244                 }
245             }
246         }
247
248         if( b32 ) wsfds32->fd_count = j;
249         else wsfds16->fd_count = j;
250
251         dprintf_info(winsock, "\n");
252 #undef wsfds32
253 #undef wsfds16
254     }
255     return num_err;
256 }
257
258 HANDLE16 __ws_gethandle( void* ptr )
259 {
260     return (HANDLE16)WS_PTR2HANDLE(ptr);
261 }
262
263 void* __ws_memalloc( int size )
264 {
265     return WS_ALLOC(size);
266 }
267
268 void __ws_memfree(void* ptr)
269 {
270     WS_FREE(ptr);
271 }
272
273 /* ----------------------------------- API ----- 
274  *
275  * Init / cleanup / error checking.
276  */
277
278 /***********************************************************************
279  *      WSAStartup16()                  (WINSOCK.115)
280  *
281  * Create socket control struct, attach it to the global list and
282  * update a pointer in the task struct.
283  */
284 INT16 WINAPI WSAStartup16(UINT16 wVersionRequested, LPWSADATA lpWSAData)
285 {
286     WSADATA WINSOCK_data = { 0x0101, 0x0101,
287                           "WINE Sockets 1.1",
288                         #ifdef linux
289                                 "Linux/i386",
290                         #elif defined(__NetBSD__)
291                                 "NetBSD/i386",
292                         #elif defined(sunos)
293                                 "SunOS",
294                         #elif defined(__FreeBSD__)
295                                 "FreeBSD",
296                         #elif defined(__OpenBSD__)
297                                 "OpenBSD/i386",
298                         #else
299                                 "Unknown",
300                         #endif
301                            WS_MAX_SOCKETS_PER_PROCESS,
302                            WS_MAX_UDP_DATAGRAM, (SEGPTR)NULL };
303     HTASK16             tid = GetCurrentTask();
304     LPWSINFO            pwsi;
305
306     dprintf_info(winsock, "WSAStartup: verReq=%x\n", wVersionRequested);
307
308     if (LOBYTE(wVersionRequested) < 1 || (LOBYTE(wVersionRequested) == 1 &&
309         HIBYTE(wVersionRequested) < 1)) return WSAVERNOTSUPPORTED;
310
311     if (!lpWSAData) return WSAEINVAL;
312
313     /* initialize socket heap */
314
315     if( !_ws_stub )
316     {
317         _WSHeap = HeapCreate(HEAP_ZERO_MEMORY, 8120, 32768);
318         if( !(_ws_stub = WS_ALLOC(0x10)) )
319         {
320             fprintf(stderr,"Fatal: failed to create WinSock heap\n");
321             return 0;
322         }
323     }
324     if( _WSHeap == 0 ) return WSASYSNOTREADY;
325
326     /* create socket array for this task */
327   
328     pwsi = wsi_find(GetCurrentTask());
329     if( pwsi == NULL )
330     {
331         TDB* pTask = (TDB*)GlobalLock16( tid );
332
333         if( (pwsi = (LPWSINFO)WS_ALLOC( sizeof(WSINFO))) )
334         {
335             int i = 0;
336             pwsi->tid = tid;
337             for( i = 0; i < WS_MAX_SOCKETS_PER_PROCESS; i++ )
338             {
339                 pwsi->sock[i].fd = -1; 
340                 pwsi->sock[i].flags = i + 1; 
341             }
342             pwsi->sock[WS_MAX_SOCKETS_PER_PROCESS - 1].flags = -1;
343         }
344         else return WSASYSNOTREADY;
345
346         /* add this control struct to the global list */
347
348         pwsi->prev = NULL;
349         if( _wsi_list ) 
350             _wsi_list->prev = pwsi;
351         pwsi->next = _wsi_list; 
352         _wsi_list = pwsi;
353         pTask->pwsi = pwsi;
354     }
355     else pwsi->num_startup++;
356
357     /* return winsock information */
358
359     memcpy(lpWSAData, &WINSOCK_data, sizeof(WINSOCK_data));
360
361     dprintf_info(winsock, "WSAStartup: succeeded\n");
362     return 0;
363 }
364
365 /***********************************************************************
366  *      WSAStartup32()                  (WSOCK32.115)
367  */
368 INT32 WINAPI WSAStartup32(UINT32 wVersionRequested, LPWSADATA lpWSAData)
369 {
370     return WSAStartup16( wVersionRequested, lpWSAData );
371 }
372
373 /***********************************************************************
374  *      WSACleanup()                    (WINSOCK.116)
375  *
376  * Cleanup functions of varying impact.
377  */
378 void WINSOCK_Shutdown()
379 {
380     /* Called on exit(), has to remove all outstanding async DNS processes.  */
381
382     WINSOCK_cancel_task_aops( 0, __ws_memfree );
383 }
384
385 INT32 WINSOCK_DeleteTaskWSI( TDB* pTask, LPWSINFO pwsi )
386 {
387     /* WSACleanup() backend, called on task termination as well.
388      * Real DLL would have registered its own signal handler with
389      * TaskSetSignalHandler() and waited until USIG_TERMINATION/USIG_GPF
390      * but this scheme is much more straightforward.
391      */
392
393     int i, j, n;
394
395     if( --pwsi->num_startup > 0 ) return 0;
396
397     SIGNAL_MaskAsyncEvents( TRUE );
398     WINSOCK_cancel_task_aops( pTask->hSelf, __ws_memfree );
399     SIGNAL_MaskAsyncEvents( FALSE );
400
401     /* unlink socket control struct */
402
403     if( pwsi == _wsi_list ) 
404         _wsi_list = pwsi->next;
405     else
406         pwsi->prev->next = pwsi->next;
407     if( pwsi->next ) pwsi->next->prev = pwsi->prev; 
408
409     if( _wsi_list == NULL ) 
410         WINSOCK_Shutdown();     /* just in case */
411
412     if( pwsi->flags & WSI_BLOCKINGCALL )
413         dprintf_info(winsock,"\tinside blocking call!\n");
414
415 /* FIXME: aop_control() doesn't decrement pwsi->num_async_rq
416  *
417  *    if( pwsi->num_async_rq )
418  *        dprintf_warn(winsock,"\thave %i outstanding async ops!\n", pwsi->num_async_rq );
419  */
420
421     for(i = 0, j = 0, n = 0; i < WS_MAX_SOCKETS_PER_PROCESS; i++)
422         if( pwsi->sock[i].fd != -1 )
423         {
424             if( pwsi->sock[i].psop )
425             {
426                 n++;
427                 WSAAsyncSelect32( (SOCKET16)WS_PTR2HANDLE(pwsi->sock + i), 0, 0, 0 );
428             }
429             close(pwsi->sock[i].fd); j++; 
430         }
431     if( j ) 
432           dprintf_info(winsock,"\tclosed %i sockets, killed %i async selects!\n", j, n);
433
434     /* delete scratch buffers */
435
436     if( pwsi->buffer ) SEGPTR_FREE(pwsi->buffer);
437     if( pwsi->dbuffer ) SEGPTR_FREE(pwsi->dbuffer);
438         
439     if( pTask )
440         pTask->pwsi = NULL;
441     memset( pwsi, 0, sizeof(WSINFO) );
442     WS_FREE(pwsi);
443     return 0;
444 }
445
446 INT32 WINAPI WSACleanup(void)
447 {
448     HTASK16     hTask = GetCurrentTask();
449
450     dprintf_info(winsock, "WSACleanup(%04x)\n", hTask );
451     if( hTask )
452     {
453         LPWSINFO pwsi = wsi_find(hTask);
454         if( pwsi )
455             return WINSOCK_DeleteTaskWSI( (TDB*)GlobalLock16(hTask), pwsi );
456         return SOCKET_ERROR;
457     }
458     else
459         WINSOCK_Shutdown(); /* remove all outstanding DNS requests */
460     return 0;
461 }
462
463
464 /***********************************************************************
465  *      WSAGetLastError()               (WSOCK32.111)(WINSOCK.111)
466  */
467 INT32 WINAPI WSAGetLastError(void)
468 {
469     LPWSINFO pwsi = wsi_find(GetCurrentTask());
470     INT16    ret = (pwsi) ? pwsi->err : WSANOTINITIALISED;
471
472     dprintf_info(winsock, "WSAGetLastError(%08x) = %i\n", 
473                     (unsigned)pwsi, (int)ret);
474     return ret;
475 }
476
477 /***********************************************************************
478  *      WSASetLastError32()             (WSOCK32.112)
479  */
480 void WINAPI WSASetLastError32(INT32 iError)
481 {
482     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
483
484     dprintf_info(winsock, "WSASetLastError(%08x): %d\n", (unsigned)pwsi, (int)iError);
485     if( pwsi ) pwsi->err = iError;
486 }
487
488 /***********************************************************************
489  *      WSASetLastError16()             (WINSOCK.112)
490  */
491 void WINAPI WSASetLastError16(INT16 iError)
492 {
493     WSASetLastError32(iError);
494 }
495
496 int _check_ws(LPWSINFO pwsi, ws_socket* pws)
497 {
498     if( pwsi )
499         if( pwsi->flags & WSI_BLOCKINGCALL ) pwsi->err = WSAEINPROGRESS;
500         else if( WSI_CHECK_RANGE(pwsi, pws) ) return 1;
501                  else pwsi->err = WSAENOTSOCK;
502     return 0;
503 }
504
505 char* _check_buffer(LPWSINFO pwsi, int size)
506 {
507     if( pwsi->buffer && pwsi->buflen >= size ) return pwsi->buffer;
508     else SEGPTR_FREE(pwsi->buffer);
509
510     pwsi->buffer = (char*)SEGPTR_ALLOC((pwsi->buflen = size)); 
511     return pwsi->buffer;
512 }
513
514 /* ----------------------------------- i/o APIs */
515
516 /***********************************************************************
517  *              accept()                (WSOCK32.1)
518  */
519 SOCKET32 WINAPI WINSOCK_accept32(SOCKET32 s, struct sockaddr *addr,
520                                  INT32 *addrlen32)
521 {
522     ws_socket*  pws  = (ws_socket*)WS_HANDLE2PTR((SOCKET16)s);
523     LPWSINFO    pwsi = wsi_find(GetCurrentTask());
524
525     dprintf_info(winsock, "WS_ACCEPT(%08x): socket %04x\n", 
526                                   (unsigned)pwsi, (UINT16)s ); 
527     if( _check_ws(pwsi, pws) )
528     {
529         int     sock, fd_flags;
530
531         fd_flags = fcntl(pws->fd, F_GETFL, 0);
532
533         if( (sock = accept(pws->fd, addr, addrlen32)) >= 0 )
534         {
535             ws_socket*  pnew = wsi_alloc_socket(pwsi, sock); 
536             if( pnew )
537             {
538                 s = (SOCKET32)WS_PTR2HANDLE(pnew);
539                 if( pws->psop && pws->flags & WS_FD_ACCEPT )
540                 {
541                     EVENT_AddIO( pws->fd, EVENT_IO_READ );      /* reenabler */
542
543                     /* async select the accept()'ed socket */
544                     WSAAsyncSelect32( s, pws->psop->hWnd, pws->psop->uMsg,
545                                       pws->flags & ~WS_FD_ACCEPT );
546                 }
547                 return s;
548             } 
549             else pwsi->err = WSAENOBUFS;
550         } 
551         else pwsi->err = wsaErrno();
552     }
553     return INVALID_SOCKET32;
554 }
555
556 /***********************************************************************
557  *              accept()                (WINSOCK.1)
558  */
559 SOCKET16 WINAPI WINSOCK_accept16(SOCKET16 s, struct sockaddr* addr,
560                                  INT16* addrlen16 )
561 {
562     INT32 addrlen32 = addrlen16 ? *addrlen16 : 0;
563     SOCKET32 retSocket = WINSOCK_accept32( s, addr, &addrlen32 );
564     if( addrlen16 ) *addrlen16 = (INT16)addrlen32;
565     return (SOCKET16)retSocket;
566 }
567
568 /***********************************************************************
569  *              bind()                  (WSOCK32.2)
570  */
571 INT32 WINAPI WINSOCK_bind32(SOCKET32 s, struct sockaddr *name, INT32 namelen)
572 {
573     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
574     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
575
576     dprintf_info(winsock, "WS_BIND(%08x): socket %04x, ptr %8x, length %d\n", 
577                            (unsigned)pwsi, s, (int) name, namelen);
578 #if DEBUG_SOCKADDR
579     dump_sockaddr(name);
580 #endif
581
582     if ( _check_ws(pwsi, pws) )
583       if ( namelen >= sizeof(*name) ) 
584         if ( ((struct ws_sockaddr_in *)name)->sin_family == AF_INET )
585           if ( bind(pws->fd, name, namelen) < 0 ) 
586           {
587              int        loc_errno = errno;
588              dprintf_warn(winsock, "\tfailure - errno = %i\n", errno);
589              errno = loc_errno;
590              switch(errno)
591              {
592                 case EBADF: pwsi->err = WSAENOTSOCK; break;
593                 case EADDRNOTAVAIL: pwsi->err = WSAEINVAL; break;
594                 default: pwsi->err = wsaErrno();
595              }
596           }
597           else return 0; /* success */
598         else pwsi->err = WSAEAFNOSUPPORT;
599       else pwsi->err = WSAEFAULT;
600     return SOCKET_ERROR;
601 }
602
603 /***********************************************************************
604  *              bind()                  (WINSOCK.2)
605  */
606 INT16 WINAPI WINSOCK_bind16(SOCKET16 s, struct sockaddr *name, INT16 namelen)
607 {
608   return (INT16)WINSOCK_bind32( s, name, namelen );
609 }
610
611 /***********************************************************************
612  *              closesocket()           (WSOCK32.3)
613  */
614 INT32 WINAPI WINSOCK_closesocket32(SOCKET32 s)
615 {
616     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
617     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
618
619     dprintf_info(winsock, "WS_CLOSE(%08x): socket %08x\n", (unsigned)pwsi, s);
620
621     if( _check_ws(pwsi, pws) )
622     { 
623         int     fd = pws->fd;
624
625         if( pws->psop ) WSAAsyncSelect32( s, 0, 0, 0 );
626
627         pws->fd = -1;
628         pws->flags = (unsigned)pwsi->last_free;
629         pwsi->last_free = pws - &pwsi->sock[0]; /* add to free list */
630
631         if( close(fd) == 0 ) 
632             return 0;
633         pwsi->err = (errno == EBADF) ? WSAENOTSOCK : wsaErrno();
634     }
635     return SOCKET_ERROR;
636 }
637
638 /***********************************************************************
639  *              closesocket()           (WINSOCK.3)
640  */
641 INT16 WINAPI WINSOCK_closesocket16(SOCKET16 s)
642 {
643     return (INT16)WINSOCK_closesocket32(s);
644 }
645
646 /***********************************************************************
647  *              connect()               (WSOCK32.4)
648  */
649 INT32 WINAPI WINSOCK_connect32(SOCKET32 s, struct sockaddr *name, INT32 namelen)
650 {
651   ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
652   LPWSINFO      pwsi = wsi_find(GetCurrentTask());
653
654   dprintf_info(winsock, "WS_CONNECT(%08x): socket %04x, ptr %8x, length %d\n", 
655                            (unsigned)pwsi, s, (int) name, namelen);
656 #if DEBUG_SOCKADDR
657   dump_sockaddr(name);
658 #endif
659
660   if( _check_ws(pwsi, pws) )
661   {
662     if (connect(pws->fd, name, namelen) == 0) 
663     { 
664         if( pws->psop && (pws->flags & WS_FD_CONNECT) )
665         {
666             /* application did AsyncSelect() but then went
667              * ahead and called connect() without waiting for 
668              * notification.
669              *
670              * FIXME: Do we have to post a notification message 
671              *        in this case?
672              */
673
674             if( !(pws->flags & WS_FD_CONNECTED) )
675             {
676                 if( pws->flags & (WS_FD_READ | WS_FD_CLOSE) )
677                     EVENT_AddIO( pws->fd, EVENT_IO_READ );
678                 else
679                     EVENT_DeleteIO( pws->fd, EVENT_IO_READ );
680                 if( pws->flags & WS_FD_WRITE )
681                     EVENT_AddIO( pws->fd, EVENT_IO_WRITE );
682                 else
683                     EVENT_DeleteIO( pws->fd, EVENT_IO_WRITE );
684             }
685         }
686         pws->flags |= WS_FD_CONNECTED;
687         pws->flags &= ~(WS_FD_INACTIVE | WS_FD_CONNECT | WS_FD_LISTENING);
688         return 0; 
689     }
690     pwsi->err = (errno == EINPROGRESS) ? WSAEWOULDBLOCK : wsaErrno();
691   }
692   return SOCKET_ERROR;
693 }
694
695 /***********************************************************************
696  *              connect()               (WINSOCK.4)
697  */
698 INT16 WINAPI WINSOCK_connect16(SOCKET16 s, struct sockaddr *name, INT16 namelen)
699 {
700   return (INT16)WINSOCK_connect32( s, name, namelen );
701 }
702
703 /***********************************************************************
704  *              getpeername()           (WSOCK32.5)
705  */
706 INT32 WINAPI WINSOCK_getpeername32(SOCKET32 s, struct sockaddr *name,
707                                    INT32 *namelen)
708 {
709     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
710     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
711
712     dprintf_info(winsock, "WS_GETPEERNAME(%08x): socket: %04x, ptr %8x, ptr %8x\n", 
713                            (unsigned)pwsi, s, (int) name, *namelen);
714     if( _check_ws(pwsi, pws) )
715     {
716         if (getpeername(pws->fd, name, namelen) == 0) 
717             return 0; 
718         pwsi->err = (h_errno < 0) ? wsaErrno() : wsaHerrno();
719     }
720     return SOCKET_ERROR;
721 }
722
723 /***********************************************************************
724  *              getpeername()           (WINSOCK.5)
725  */
726 INT16 WINAPI WINSOCK_getpeername16(SOCKET16 s, struct sockaddr *name,
727                                    INT16 *namelen16)
728 {
729     INT32 namelen32 = *namelen16;
730     INT32 retVal = WINSOCK_getpeername32( s, name, &namelen32 );
731
732 #if DEBUG_SOCKADDR
733     dump_sockaddr(name);
734 #endif
735
736    *namelen16 = namelen32;
737     return (INT16)retVal;
738 }
739
740 /***********************************************************************
741  *              getsockname()           (WSOCK32.6)
742  */
743 INT32 WINAPI WINSOCK_getsockname32(SOCKET32 s, struct sockaddr *name,
744                                    INT32 *namelen)
745 {
746     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
747     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
748
749     dprintf_info(winsock, "WS_GETSOCKNAME(%08x): socket: %04x, ptr %8x, ptr %8x\n", 
750                           (unsigned)pwsi, s, (int) name, (int) *namelen);
751     if( _check_ws(pwsi, pws) )
752     {
753         if (getsockname(pws->fd, name, namelen) == 0)
754             return 0; 
755         pwsi->err = (h_errno < 0) ? wsaErrno() : wsaHerrno();
756     }
757     return SOCKET_ERROR;
758 }
759
760 /***********************************************************************
761  *              getsockname()           (WINSOCK.6)
762  */
763 INT16 WINAPI WINSOCK_getsockname16(SOCKET16 s, struct sockaddr *name,
764                                    INT16 *namelen16)
765 {
766     INT32 retVal;
767
768     if( namelen16 )
769     {
770         INT32 namelen32 = *namelen16;
771         retVal = WINSOCK_getsockname32( s, name, &namelen32 );
772        *namelen16 = namelen32;
773
774 #if DEBUG_SOCKADDR
775     dump_sockaddr(name);
776 #endif
777
778     }
779     else retVal = SOCKET_ERROR;
780     return (INT16)retVal;
781 }
782
783
784 /***********************************************************************
785  *              getsockopt()            (WSOCK32.7)
786  */
787 INT32 WINAPI WINSOCK_getsockopt32(SOCKET32 s, INT32 level, 
788                                   INT32 optname, char *optval, INT32 *optlen)
789 {
790     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
791     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
792
793     dprintf_info(winsock, "WS_GETSOCKOPT(%08x): socket: %04x, opt %d, ptr %8x, ptr %8x\n", 
794                            (unsigned)pwsi, s, level, (int) optval, (int) *optlen);
795     if( _check_ws(pwsi, pws) )
796     {
797         convert_sockopt(&level, &optname);
798         if (getsockopt(pws->fd, (int) level, optname, optval, optlen) == 0 )
799             return 0;
800         pwsi->err = (errno == EBADF) ? WSAENOTSOCK : wsaErrno();
801     }
802     return SOCKET_ERROR;
803 }
804
805 /***********************************************************************
806  *              getsockopt()            (WINSOCK.7)
807  */
808 INT16 WINAPI WINSOCK_getsockopt16(SOCKET16 s, INT16 level,
809                                   INT16 optname, char *optval, INT16 *optlen)
810 {
811     INT32 optlen32;
812     INT32 *p = &optlen32;
813     INT32 retVal;
814     if( optlen ) optlen32 = *optlen; else p = NULL;
815     retVal = WINSOCK_getsockopt32( s, (UINT16)level, optname, optval, p );
816     if( optlen ) *optlen = optlen32;
817     return (INT16)retVal;
818 }
819
820 /***********************************************************************
821  *              htonl()                 (WINSOCK.8)(WSOCK32.8)
822  */
823 u_long WINAPI WINSOCK_htonl(u_long hostlong)   { return( htonl(hostlong) ); }
824 /***********************************************************************
825  *              htons()                 (WINSOCK.9)(WSOCK32.9)
826  */
827 u_short WINAPI WINSOCK_htons(u_short hostshort) { return( htons(hostshort) ); }
828 /***********************************************************************
829  *              inet_addr()             (WINSOCK.10)(WSOCK32.10)
830  */
831 u_long WINAPI WINSOCK_inet_addr(char *cp)      { return( inet_addr(cp) ); }
832 /***********************************************************************
833  *              htohl()                 (WINSOCK.14)(WSOCK32.14)
834  */
835 u_long WINAPI WINSOCK_ntohl(u_long netlong)    { return( ntohl(netlong) ); }
836 /***********************************************************************
837  *              ntohs()                 (WINSOCK.15)(WSOCK32.15)
838  */
839 u_short WINAPI WINSOCK_ntohs(u_short netshort)  { return( ntohs(netshort) ); }
840
841 /***********************************************************************
842  *              inet_ntoa()             (WINSOCK.11)(WSOCK32.11)
843  */
844 char* WINAPI WINSOCK_inet_ntoa32(struct in_addr in)
845 {
846   /* use "buffer for dummies" here because some applications have 
847    * propensity to decode addresses in ws_hostent structure without 
848    * saving them first...
849    */
850
851     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
852
853     if( pwsi )
854     {
855         char*   s = inet_ntoa(in);
856         if( s ) 
857         {
858             if( pwsi->dbuffer == NULL )
859                 if((pwsi->dbuffer = (char*) SEGPTR_ALLOC(32)) == NULL )
860                 {
861                     pwsi->err = WSAENOBUFS;
862                     return NULL;
863                 }
864             strncpy(pwsi->dbuffer, s, 32 );
865             return pwsi->dbuffer; 
866         }
867         pwsi->err = wsaErrno();
868     }
869     return NULL;
870 }
871
872 SEGPTR WINAPI WINSOCK_inet_ntoa16(struct in_addr in)
873 {
874   char* retVal = WINSOCK_inet_ntoa32(in);
875   return retVal ? SEGPTR_GET(retVal) : (SEGPTR)NULL;
876 }
877
878 /***********************************************************************
879  *              ioctlsocket()           (WSOCK32.12)
880  */
881 INT32 WINAPI WINSOCK_ioctlsocket32(SOCKET32 s, UINT32 cmd, UINT32 *argp)
882 {
883   ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
884   LPWSINFO      pwsi = wsi_find(GetCurrentTask());
885
886   dprintf_info(winsock, "WS_IOCTL(%08x): socket %04x, cmd %08x, ptr %8x\n", 
887                           (unsigned)pwsi, s, cmd, (unsigned) argp);
888   if( _check_ws(pwsi, pws) )
889   {
890     long        newcmd  = cmd;
891
892     switch( cmd )
893     {
894         case WS_FIONREAD:   
895                 newcmd=FIONREAD; 
896                 break;
897
898         case WS_FIONBIO:    
899                 newcmd=FIONBIO;  
900                 if( pws->psop && *argp == 0 ) 
901                 {
902                     /* AsyncSelect()'ed sockets are always nonblocking */
903                     pwsi->err = WSAEINVAL; 
904                     return SOCKET_ERROR; 
905                 }
906                 break;
907
908         case WS_SIOCATMARK: 
909                 newcmd=SIOCATMARK; 
910                 break;
911
912         case WS_IOW('f',125,u_long): 
913                 fprintf(stderr,"Warning: WS1.1 shouldn't be using async I/O\n");
914                 pwsi->err = WSAEINVAL; 
915                 return SOCKET_ERROR;
916
917         default:          
918                 /* Netscape tries hard to use bogus ioctl 0x667e */
919                 dprintf_warn(winsock, "\tunknown WS_IOCTL cmd (%08x)\n", cmd);
920     }
921     if( ioctl(pws->fd, newcmd, (char*)argp ) == 0 ) return 0;
922     pwsi->err = (errno == EBADF) ? WSAENOTSOCK : wsaErrno(); 
923   }
924   return SOCKET_ERROR;
925 }
926
927 /***********************************************************************
928  *              ioctlsocket()           (WINSOCK.12)
929  */
930 INT16 WINAPI WINSOCK_ioctlsocket16(SOCKET16 s, UINT32 cmd, UINT32 *argp)
931 {
932     return (INT16)WINSOCK_ioctlsocket32( s, cmd, argp );
933 }
934
935
936 /***********************************************************************
937  *              listen()                (WSOCK32.13)
938  */
939 INT32 WINAPI WINSOCK_listen32(SOCKET32 s, INT32 backlog)
940 {
941     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
942     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
943
944     dprintf_info(winsock, "WS_LISTEN(%08x): socket %04x, backlog %d\n", 
945                             (unsigned)pwsi, s, backlog);
946     if( _check_ws(pwsi, pws) )
947     {
948         if (listen(pws->fd, backlog) == 0)
949         {
950             if( !pws->psop )
951             {
952                 int  fd_flags = fcntl(pws->fd, F_GETFL, 0);
953                 if( !(fd_flags & O_NONBLOCK) ) pws->flags |= WS_FD_ACCEPT;
954             }
955             pws->flags |= WS_FD_LISTENING;
956             pws->flags &= ~(WS_FD_INACTIVE | WS_FD_CONNECT | WS_FD_CONNECTED); /* just in case */
957             return 0;
958         }
959         pwsi->err = wsaErrno();
960     }
961     else if( pwsi ) pwsi->err = WSAENOTSOCK;
962     return SOCKET_ERROR;
963 }
964
965 /***********************************************************************
966  *              listen()                (WINSOCK.13)
967  */
968 INT16 WINAPI WINSOCK_listen16(SOCKET16 s, INT16 backlog)
969 {
970     return (INT16)WINSOCK_listen32( s, backlog );
971 }
972
973
974 /***********************************************************************
975  *              recv()                  (WSOCK32.16)
976  */
977 INT32 WINAPI WINSOCK_recv32(SOCKET32 s, char *buf, INT32 len, INT32 flags)
978 {
979     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
980     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
981
982     dprintf_info(winsock, "WS_RECV(%08x): socket %04x, buf %8x, len %d, "
983                     "flags %d\n", (unsigned)pwsi, s, (unsigned)buf, 
984                     len, flags);
985     if( _check_ws(pwsi, pws) )
986     {
987         INT32 length;
988         if ((length = recv(pws->fd, buf, len, flags)) >= 0) 
989         { 
990             dprintf_info(winsock, " -> %i bytes\n", length);
991
992             if( pws->psop && (pws->flags & (WS_FD_READ | WS_FD_CLOSE)) )
993                 EVENT_AddIO( pws->fd, EVENT_IO_READ );  /* reenabler */
994
995             return length;
996         }
997         pwsi->err = wsaErrno();
998     }
999     else if( pwsi ) pwsi->err = WSAENOTSOCK;
1000     dprintf_warn(winsock, " -> ERROR\n");
1001     return SOCKET_ERROR;
1002 }
1003
1004 /***********************************************************************
1005  *              recv()                  (WINSOCK.16)
1006  */
1007 INT16 WINAPI WINSOCK_recv16(SOCKET16 s, char *buf, INT16 len, INT16 flags)
1008 {
1009     return (INT16)WINSOCK_recv32( s, buf, len, flags );
1010 }
1011
1012
1013 /***********************************************************************
1014  *              recvfrom()              (WSOCK32.17)
1015  */
1016 INT32 WINAPI WINSOCK_recvfrom32(SOCKET32 s, char *buf, INT32 len, INT32 flags, 
1017                                 struct sockaddr *from, INT32 *fromlen32)
1018 {
1019     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
1020     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
1021
1022     dprintf_info(winsock, "WS_RECVFROM(%08x): socket %04x, ptr %08x, "
1023                     "len %d, flags %d\n", (unsigned)pwsi, s, (unsigned)buf,
1024                     len, flags);
1025 #if DEBUG_SOCKADDR
1026     if( from ) dump_sockaddr(from);
1027     else fprintf(stderr, "\tfrom = NULL\n");
1028 #endif
1029
1030     if( _check_ws(pwsi, pws) )
1031     {
1032         int length;
1033
1034         if ((length = recvfrom(pws->fd, buf, len, flags, from, fromlen32)) >= 0)
1035         {
1036             dprintf_info(winsock, " -> %i bytes\n", length);
1037
1038             if( pws->psop && (pws->flags & (WS_FD_READ | WS_FD_CLOSE)) )
1039                 EVENT_AddIO( pws->fd, EVENT_IO_READ );  /* reenabler */
1040
1041             return (INT16)length;
1042         }
1043         pwsi->err = wsaErrno();
1044     }
1045     else if( pwsi ) pwsi->err = WSAENOTSOCK;
1046     dprintf_warn(winsock, " -> ERROR\n");
1047     return SOCKET_ERROR;
1048 }
1049
1050 /***********************************************************************
1051  *              recvfrom()              (WINSOCK.17)
1052  */
1053 INT16 WINAPI WINSOCK_recvfrom16(SOCKET16 s, char *buf, INT16 len, INT16 flags,
1054                                 struct sockaddr *from, INT16 *fromlen16)
1055 {
1056     INT32 fromlen32;
1057     INT32 *p = &fromlen32;
1058     INT32 retVal;
1059
1060     if( fromlen16 ) fromlen32 = *fromlen16; else p = NULL;
1061     retVal = WINSOCK_recvfrom32( s, buf, len, flags, from, p );
1062     if( fromlen16 ) *fromlen16 = fromlen32;
1063     return (INT16)retVal;
1064 }
1065
1066 /***********************************************************************
1067  *              select()                (WINSOCK.18)(WSOCK32.18)
1068  */
1069 static INT32 __ws_select( BOOL32 b32, void *ws_readfds, void *ws_writefds, void *ws_exceptfds,
1070                           struct timeval *timeout )
1071 {
1072     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
1073         
1074     dprintf_info(winsock, "WS_SELECT(%08x): read %8x, write %8x, excp %8x\n", 
1075     (unsigned) pwsi, (unsigned) ws_readfds, (unsigned) ws_writefds, (unsigned) ws_exceptfds);
1076
1077     if( pwsi )
1078     {
1079         int         highfd = 0;
1080         fd_set      readfds, writefds, exceptfds;
1081         fd_set     *p_read, *p_write, *p_except;
1082
1083         p_read = fd_set_import(&readfds, pwsi, ws_readfds, &highfd, b32);
1084         p_write = fd_set_import(&writefds, pwsi, ws_writefds, &highfd, b32);
1085         p_except = fd_set_import(&exceptfds, pwsi, ws_exceptfds, &highfd, b32);
1086
1087         if( (highfd = select(highfd + 1, p_read, p_write, p_except, timeout)) > 0 )
1088         {
1089             fd_set_export(pwsi, &readfds, p_except, ws_readfds, b32);
1090             fd_set_export(pwsi, &writefds, p_except, ws_writefds, b32);
1091
1092             if (p_except && ws_exceptfds)
1093             {
1094 #define wsfds16 ((ws_fd_set16*)ws_exceptfds)
1095 #define wsfds32 ((ws_fd_set32*)ws_exceptfds)
1096                 int i, j, count = (b32) ? wsfds32->fd_count : wsfds16->fd_count;
1097
1098                 for (i = j = 0; i < count; i++)
1099                 {
1100                     ws_socket *pws = (b32) ? (ws_socket *)WS_HANDLE2PTR(wsfds32->fd_array[i])
1101                                            : (ws_socket *)WS_HANDLE2PTR(wsfds16->fd_array[i]);
1102                     if( _check_ws(pwsi, pws) && FD_ISSET(pws->fd, &exceptfds) )
1103                     {
1104                         if( b32 )
1105                                 wsfds32->fd_array[j++] = wsfds32->fd_array[i];
1106                         else
1107                                 wsfds16->fd_array[j++] = wsfds16->fd_array[i];
1108                     }
1109                 }
1110                 if( b32 )
1111                     wsfds32->fd_count = j;
1112                 else
1113                     wsfds16->fd_count = j;
1114 #undef wsfds32
1115 #undef wsfds16
1116             }
1117             return highfd; 
1118         }
1119         if( ws_readfds ) ((ws_fd_set32*)ws_readfds)->fd_count = 0;
1120         if( ws_writefds ) ((ws_fd_set32*)ws_writefds)->fd_count = 0;
1121         if( ws_exceptfds ) ((ws_fd_set32*)ws_exceptfds)->fd_count = 0;
1122
1123         if( highfd == 0 ) return 0;
1124         pwsi->err = wsaErrno();
1125     } 
1126     return SOCKET_ERROR;
1127 }
1128
1129 INT16 WINAPI WINSOCK_select16(INT16 nfds, ws_fd_set16 *ws_readfds,
1130                               ws_fd_set16 *ws_writefds, ws_fd_set16 *ws_exceptfds,
1131                               struct timeval *timeout)
1132 {
1133     return (INT16)__ws_select( FALSE, ws_readfds, ws_writefds, ws_exceptfds, timeout );
1134 }
1135
1136 INT32 WINAPI WINSOCK_select32(INT32 nfds, ws_fd_set32 *ws_readfds,
1137                               ws_fd_set32 *ws_writefds, ws_fd_set32 *ws_exceptfds,
1138                               struct timeval *timeout)
1139 {
1140     /* struct timeval is the same for both 32- and 16-bit code */
1141     return (INT32)__ws_select( TRUE, ws_readfds, ws_writefds, ws_exceptfds, timeout );
1142 }
1143
1144
1145 /***********************************************************************
1146  *              send()                  (WSOCK32.19)
1147  */
1148 INT32 WINAPI WINSOCK_send32(SOCKET32 s, char *buf, INT32 len, INT32 flags)
1149 {
1150     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
1151     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
1152
1153     dprintf_info(winsock, "WS_SEND(%08x): socket %04x, ptr %08x, length %d, flags %d\n", 
1154                            (unsigned)pwsi, s, (unsigned) buf, len, flags);
1155     if( _check_ws(pwsi, pws) )
1156     {
1157         int     length;
1158
1159         if ((length = send(pws->fd, buf, len, flags)) < 0 ) 
1160         {
1161             pwsi->err = wsaErrno();
1162             if( pwsi->err == WSAEWOULDBLOCK && 
1163                 pws->psop && pws->flags & WS_FD_WRITE )
1164                 EVENT_AddIO( pws->fd, EVENT_IO_WRITE ); /* reenabler */
1165         }
1166         else return (INT16)length;
1167     }
1168     else if( pwsi ) pwsi->err = WSAENOTSOCK;
1169     return SOCKET_ERROR;
1170 }
1171
1172 /***********************************************************************
1173  *              send()                  (WINSOCK.19)
1174  */
1175 INT16 WINAPI WINSOCK_send16(SOCKET16 s, char *buf, INT16 len, INT16 flags)
1176 {
1177     return WINSOCK_send32( s, buf, len, flags );
1178 }
1179
1180 /***********************************************************************
1181  *              sendto()                (WSOCK32.20)
1182  */
1183 INT32 WINAPI WINSOCK_sendto32(SOCKET32 s, char *buf, INT32 len, INT32 flags,
1184                               struct sockaddr *to, INT32 tolen)
1185 {
1186     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
1187     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
1188
1189     dprintf_info(winsock, "WS_SENDTO(%08x): socket %04x, ptr %08x, length %d, flags %d\n",
1190                           (unsigned)pwsi, s, (unsigned) buf, len, flags);
1191     if( _check_ws(pwsi, pws) )
1192     {
1193         INT32   length;
1194
1195         if ((length = sendto(pws->fd, buf, len, flags, to, tolen)) < 0 )
1196         {
1197             pwsi->err = wsaErrno();
1198             if( pwsi->err == WSAEWOULDBLOCK &&
1199                 pws->psop && pws->flags & WS_FD_WRITE )
1200                 EVENT_AddIO( pws->fd, EVENT_IO_WRITE ); /* reenabler */
1201         } 
1202         else return length;
1203     }
1204     else if( pwsi ) pwsi->err = WSAENOTSOCK;
1205     return SOCKET_ERROR;
1206 }
1207
1208 /***********************************************************************
1209  *              sendto()                (WINSOCK.20)
1210  */
1211 INT16 WINAPI WINSOCK_sendto16(SOCKET16 s, char *buf, INT16 len, INT16 flags,
1212                               struct sockaddr *to, INT16 tolen)
1213 {
1214     return (INT16)WINSOCK_sendto32( s, buf, len, flags, to, tolen );
1215 }
1216
1217 /***********************************************************************
1218  *              setsockopt()            (WSOCK32.21)
1219  */
1220 INT32 WINAPI WINSOCK_setsockopt32(SOCKET16 s, INT32 level, INT32 optname, 
1221                                   char *optval, INT32 optlen)
1222 {
1223     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
1224     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
1225
1226     dprintf_info(winsock, "WS_SETSOCKOPT(%08x): socket %04x, lev %d, opt %d, ptr %08x, len %d\n",
1227                           (unsigned)pwsi, s, level, optname, (int) optval, optlen);
1228     if( _check_ws(pwsi, pws) )
1229     {
1230         convert_sockopt(&level, &optname);
1231         if (setsockopt(pws->fd, level, optname, optval, optlen) == 0) return 0;
1232         pwsi->err = wsaErrno();
1233     }
1234     else if( pwsi ) pwsi->err = WSAENOTSOCK;
1235     return SOCKET_ERROR;
1236 }
1237
1238 /***********************************************************************
1239  *              setsockopt()            (WINSOCK.21)
1240  */
1241 INT16 WINAPI WINSOCK_setsockopt16(SOCKET16 s, INT16 level, INT16 optname,
1242                                   char *optval, INT16 optlen)
1243 {
1244     INT32 linger32[2];
1245     if( !optval ) return SOCKET_ERROR;
1246     if( optname == SO_LINGER )
1247     {
1248         INT16* ptr = (INT16*)optval;
1249         linger32[0] = ptr[0];
1250         linger32[1] = ptr[1];
1251         optval = (char*)&linger32;
1252         optlen = sizeof(linger32);
1253     }
1254     return (INT16)WINSOCK_setsockopt32( s, (UINT16)level, optname, optval, optlen );
1255 }
1256
1257
1258 /***********************************************************************
1259  *              shutdown()              (WSOCK32.22)
1260  */
1261 INT32 WINAPI WINSOCK_shutdown32(SOCKET32 s, INT32 how)
1262 {
1263     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
1264     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
1265
1266     dprintf_info(winsock, "WS_SHUTDOWN(%08x): socket %04x, how %i\n",
1267                             (unsigned)pwsi, s, how );
1268     if( _check_ws(pwsi, pws) )
1269     {
1270         if( pws->psop )
1271             switch( how )
1272             {
1273                 case 0: /* drop receives */
1274                         if( pws->flags & (WS_FD_READ | WS_FD_CLOSE) )
1275                             EVENT_DeleteIO( pws->fd, EVENT_IO_READ );
1276                         pws->flags &= ~(WS_FD_READ | WS_FD_CLOSE);
1277 #ifdef SHUT_RD
1278                         how = SHUT_RD;
1279 #endif
1280                         break;
1281
1282                 case 1: /* drop sends */
1283                         if( pws->flags & WS_FD_WRITE )
1284                             EVENT_DeleteIO( pws->fd, EVENT_IO_WRITE );
1285                         pws->flags &= ~WS_FD_WRITE;
1286 #ifdef SHUT_WR
1287                         how = SHUT_WR;
1288 #endif
1289                         break;
1290
1291                 case 2: /* drop all */
1292 #ifdef SHUT_RDWR
1293                         how = SHUT_RDWR;
1294 #endif
1295                 default:
1296                         WSAAsyncSelect32( s, 0, 0, 0 );
1297                         break;
1298             }
1299
1300         if (shutdown(pws->fd, how) == 0) 
1301         {
1302             if( how > 1 ) 
1303             {
1304                 pws->flags &= ~(WS_FD_CONNECTED | WS_FD_LISTENING);
1305                 pws->flags |= WS_FD_INACTIVE;
1306             }
1307             return 0;
1308         }
1309         pwsi->err = wsaErrno();
1310     } 
1311     else if( pwsi ) pwsi->err = WSAENOTSOCK;
1312     return SOCKET_ERROR;
1313 }
1314
1315 /***********************************************************************
1316  *              shutdown()              (WINSOCK.22)
1317  */
1318 INT16 WINAPI WINSOCK_shutdown16(SOCKET16 s, INT16 how)
1319 {
1320     return (INT16)WINSOCK_shutdown32( s, how );
1321 }
1322
1323
1324 /***********************************************************************
1325  *              socket()                (WSOCK32.23)
1326  */
1327 SOCKET32 WINAPI WINSOCK_socket32(INT32 af, INT32 type, INT32 protocol)
1328 {
1329   LPWSINFO      pwsi = wsi_find(GetCurrentTask());
1330
1331   dprintf_info(winsock, "WS_SOCKET(%08x): af=%d type=%d protocol=%d\n", 
1332                           (unsigned)pwsi, af, type, protocol);
1333
1334   if( pwsi )
1335   {
1336     int         sock;
1337
1338     /* check the socket family */
1339     switch(af) 
1340     {
1341         case AF_INET:
1342         case AF_UNSPEC: break;
1343         default:        pwsi->err = WSAEAFNOSUPPORT; 
1344                         return INVALID_SOCKET32;
1345     }
1346
1347     /* check the socket type */
1348     switch(type) 
1349     {
1350         case SOCK_STREAM:
1351         case SOCK_DGRAM:
1352         case SOCK_RAW:  break;
1353         default:        pwsi->err = WSAESOCKTNOSUPPORT; 
1354                         return INVALID_SOCKET32;
1355     }
1356
1357     /* check the protocol type */
1358     if ( protocol < 0 )  /* don't support negative values */
1359     { pwsi->err = WSAEPROTONOSUPPORT; return INVALID_SOCKET32; }
1360
1361     if ( af == AF_UNSPEC)  /* did they not specify the address family? */
1362         switch(protocol) 
1363         {
1364           case IPPROTO_TCP:
1365              if (type == SOCK_STREAM) { af = AF_INET; break; }
1366           case IPPROTO_UDP:
1367              if (type == SOCK_DGRAM)  { af = AF_INET; break; }
1368           default: pwsi->err = WSAEPROTOTYPE; return INVALID_SOCKET32;
1369         }
1370
1371     if ((sock = socket(af, type, protocol)) >= 0) 
1372     {
1373         ws_socket*      pnew = wsi_alloc_socket(pwsi, sock);
1374
1375         dprintf_info(winsock,"\tcreated %i (handle %04x)\n", sock, (UINT16)WS_PTR2HANDLE(pnew));
1376
1377         if( pnew ) 
1378         {
1379             pnew->flags |= WS_FD_INACTIVE;
1380             return (SOCKET16)WS_PTR2HANDLE(pnew);
1381         }
1382         
1383         close(sock);
1384         pwsi->err = WSAENOBUFS;
1385         return INVALID_SOCKET32;
1386     }
1387
1388     if (errno == EPERM) /* raw socket denied */
1389     {
1390         fprintf(stderr, "WS_SOCKET: not enough privileges\n");
1391         pwsi->err = WSAESOCKTNOSUPPORT;
1392     } else pwsi->err = wsaErrno();
1393   }
1394  
1395   dprintf_warn(winsock, "\t\tfailed!\n");
1396   return INVALID_SOCKET32;
1397 }
1398
1399 /***********************************************************************
1400  *              socket()                (WINSOCK.23)
1401  */
1402 SOCKET16 WINAPI WINSOCK_socket16(INT16 af, INT16 type, INT16 protocol)
1403 {
1404     return (SOCKET16)WINSOCK_socket32( af, type, protocol );
1405 }
1406     
1407
1408 /* ----------------------------------- DNS services
1409  *
1410  * IMPORTANT: 16-bit API structures have SEGPTR pointers inside them.
1411  * Also, we have to use wsock32 stubs to convert structures and
1412  * error codes from Unix to WSA, hence there is no direct mapping in 
1413  * the relay32/wsock32.spec.
1414  */
1415
1416 static char*    NULL_STRING = "NULL";
1417
1418 /***********************************************************************
1419  *              gethostbyaddr()         (WINSOCK.51)(WSOCK32.51)
1420  */
1421 static struct WIN_hostent* __ws_gethostbyaddr(const char *addr, int len, int type, int dup_flag)
1422 {
1423     LPWSINFO            pwsi = wsi_find(GetCurrentTask());
1424
1425     if( pwsi )
1426     {
1427         struct hostent* host;
1428         if( (host = gethostbyaddr(addr, len, type)) != NULL )
1429             if( WS_dup_he(pwsi, host, dup_flag) )
1430                 return (struct WIN_hostent*)(pwsi->buffer);
1431             else 
1432                 pwsi->err = WSAENOBUFS;
1433         else 
1434             pwsi->err = (h_errno < 0) ? wsaErrno() : wsaHerrno();
1435     }
1436     return NULL;
1437 }
1438
1439 SEGPTR WINAPI WINSOCK_gethostbyaddr16(const char *addr, INT16 len, INT16 type)
1440 {
1441     struct WIN_hostent* retval;
1442     dprintf_info(winsock, "WS_GetHostByAddr16: ptr %08x, len %d, type %d\n",
1443                             (unsigned) addr, len, type);
1444     retval = __ws_gethostbyaddr( addr, len, type, WS_DUP_SEGPTR );
1445     return retval ? SEGPTR_GET(retval) : ((SEGPTR)NULL);
1446 }
1447
1448 struct WIN_hostent* WINAPI WINSOCK_gethostbyaddr32(const char *addr, INT32 len,
1449                                                 INT32 type)
1450 {
1451     dprintf_info(winsock, "WS_GetHostByAddr32: ptr %08x, len %d, type %d\n",
1452                              (unsigned) addr, len, type);
1453     return __ws_gethostbyaddr(addr, len, type, WS_DUP_LINEAR);
1454 }
1455
1456 /***********************************************************************
1457  *              gethostbyname()         (WINSOCK.52)(WSOCK32.52)
1458  */
1459 static struct WIN_hostent * __ws_gethostbyname(const char *name, int dup_flag)
1460 {
1461     LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1462
1463     if( pwsi )
1464     {
1465         struct hostent*     host;
1466         if( (host = gethostbyname(name)) != NULL )
1467              if( WS_dup_he(pwsi, host, dup_flag) )
1468                  return (struct WIN_hostent*)(pwsi->buffer);
1469              else pwsi->err = WSAENOBUFS;
1470         else pwsi->err = (h_errno < 0) ? wsaErrno() : wsaHerrno();
1471     }
1472     return NULL;
1473 }
1474
1475 SEGPTR WINAPI WINSOCK_gethostbyname16(const char *name)
1476 {
1477     struct WIN_hostent* retval;
1478     dprintf_info(winsock, "WS_GetHostByName16: %s\n", (name)?name:NULL_STRING);
1479     retval = __ws_gethostbyname( name, WS_DUP_SEGPTR );
1480     return (retval)? SEGPTR_GET(retval) : ((SEGPTR)NULL) ;
1481 }
1482
1483 struct WIN_hostent* WINAPI WINSOCK_gethostbyname32(const char* name)
1484 {
1485     dprintf_info(winsock, "WS_GetHostByName32: %s\n", (name)?name:NULL_STRING);
1486     return __ws_gethostbyname( name, WS_DUP_LINEAR );
1487 }
1488
1489
1490 /***********************************************************************
1491  *              getprotobyname()        (WINSOCK.53)(WSOCK32.53)
1492  */
1493 static struct WIN_protoent* __ws_getprotobyname(const char *name, int dup_flag)
1494 {
1495     LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1496
1497     if( pwsi )
1498     {
1499         struct protoent*     proto;
1500         if( (proto = getprotobyname(name)) != NULL )
1501             if( WS_dup_pe(pwsi, proto, dup_flag) )
1502                 return (struct WIN_protoent*)(pwsi->buffer);
1503             else pwsi->err = WSAENOBUFS;
1504         else pwsi->err = (h_errno < 0) ? wsaErrno() : wsaHerrno();
1505     }
1506     return NULL;
1507 }
1508
1509 SEGPTR WINAPI WINSOCK_getprotobyname16(const char *name)
1510 {
1511     struct WIN_protoent* retval;
1512     dprintf_info(winsock, "WS_GetProtoByName16: %s\n", (name)?name:NULL_STRING);
1513     retval = __ws_getprotobyname(name, WS_DUP_SEGPTR);
1514     return retval ? SEGPTR_GET(retval) : ((SEGPTR)NULL);
1515 }
1516
1517 struct WIN_protoent* WINAPI WINSOCK_getprotobyname32(const char* name)
1518 {
1519     dprintf_info(winsock, "WS_GetProtoByName32: %s\n", (name)?name:NULL_STRING);
1520     return __ws_getprotobyname(name, WS_DUP_LINEAR);
1521 }
1522
1523
1524 /***********************************************************************
1525  *              getprotobynumber()      (WINSOCK.54)(WSOCK32.54)
1526  */
1527 static struct WIN_protoent* __ws_getprotobynumber(int number, int dup_flag)
1528 {
1529     LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1530
1531     if( pwsi )
1532     {
1533         struct protoent*     proto;
1534         if( (proto = getprotobynumber(number)) != NULL )
1535             if( WS_dup_pe(pwsi, proto, dup_flag) )
1536                 return (struct WIN_protoent*)(pwsi->buffer);
1537             else pwsi->err = WSAENOBUFS;
1538         else pwsi->err = WSANO_DATA;
1539     }
1540     return NULL;
1541 }
1542
1543 SEGPTR WINAPI WINSOCK_getprotobynumber16(INT16 number)
1544 {
1545     struct WIN_protoent* retval;
1546     dprintf_info(winsock, "WS_GetProtoByNumber16: %i\n", number);
1547     retval = __ws_getprotobynumber(number, WS_DUP_SEGPTR);
1548     return retval ? SEGPTR_GET(retval) : ((SEGPTR)NULL);
1549 }
1550
1551 struct WIN_protoent* WINAPI WINSOCK_getprotobynumber32(INT32 number)
1552 {
1553     dprintf_info(winsock, "WS_GetProtoByNumber32: %i\n", number);
1554     return __ws_getprotobynumber(number, WS_DUP_LINEAR);
1555 }
1556
1557
1558 /***********************************************************************
1559  *              getservbyname()         (WINSOCK.55)(WSOCK32.55)
1560  */
1561 struct WIN_servent* __ws_getservbyname(const char *name, const char *proto, int dup_flag)
1562 {
1563     LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1564
1565     if( pwsi )
1566     {
1567         struct servent*     serv;
1568         int i = wsi_strtolo( pwsi, name, proto );
1569
1570         if( i )
1571             if( (serv = getservbyname(pwsi->buffer, pwsi->buffer + i)) != NULL )
1572                 if( WS_dup_se(pwsi, serv, dup_flag) )
1573                     return (struct WIN_servent*)(pwsi->buffer);
1574                 else pwsi->err = WSAENOBUFS;
1575             else pwsi->err = (h_errno < 0) ? wsaErrno() : wsaHerrno();
1576         else pwsi->err = WSAENOBUFS;
1577     }
1578     return NULL;
1579 }
1580
1581 SEGPTR WINAPI WINSOCK_getservbyname16(const char *name, const char *proto)
1582 {
1583     struct WIN_servent* retval;
1584     dprintf_info(winsock, "WS_GetServByName16: '%s', '%s'\n",
1585                             (name)?name:NULL_STRING, (proto)?proto:NULL_STRING);
1586     retval = __ws_getservbyname(name, proto, WS_DUP_SEGPTR);
1587     return retval ? SEGPTR_GET(retval) : ((SEGPTR)NULL);
1588 }
1589
1590 struct WIN_servent* WINAPI WINSOCK_getservbyname32(const char *name, const char *proto)
1591 {
1592     dprintf_info(winsock, "WS_GetServByName32: '%s', '%s'\n",
1593                             (name)?name:NULL_STRING, (proto)?proto:NULL_STRING);
1594     return __ws_getservbyname(name, proto, WS_DUP_LINEAR);
1595 }
1596
1597
1598 /***********************************************************************
1599  *              getservbyport()         (WINSOCK.56)(WSOCK32.56)
1600  */
1601 static struct WIN_servent* __ws_getservbyport(int port, const char* proto, int dup_flag)
1602 {
1603     LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1604
1605     if( pwsi )
1606     {
1607         struct servent*     serv;
1608         int i = wsi_strtolo( pwsi, proto, NULL );
1609
1610         if( i )
1611             if( (serv = getservbyport(port, pwsi->buffer)) != NULL )
1612                 if( WS_dup_se(pwsi, serv, dup_flag) )
1613                     return (struct WIN_servent*)(pwsi->buffer);
1614                 else pwsi->err = WSAENOBUFS;
1615             else pwsi->err = (h_errno < 0) ? wsaErrno() : wsaHerrno();
1616         else pwsi->err = WSAENOBUFS;
1617     }
1618     return NULL;
1619 }
1620
1621 SEGPTR WINAPI WINSOCK_getservbyport16(INT16 port, const char *proto)
1622 {
1623     struct WIN_servent* retval;
1624     dprintf_info(winsock, "WS_GetServByPort16: %i, '%s'\n",
1625                             (int)port, (proto)?proto:NULL_STRING);
1626     retval = __ws_getservbyport(port, proto, WS_DUP_SEGPTR);
1627     return retval ? SEGPTR_GET(retval) : ((SEGPTR)NULL);
1628 }
1629
1630 struct WIN_servent* WINAPI WINSOCK_getservbyport32(INT32 port, const char *proto)
1631 {
1632     dprintf_info(winsock, "WS_GetServByPort32: %i, '%s'\n",
1633                             (int)port, (proto)?proto:NULL_STRING);
1634     return __ws_getservbyport(port, proto, WS_DUP_LINEAR);
1635 }
1636
1637
1638 /***********************************************************************
1639  *              gethostname()           (WSOCK32.57)
1640  */
1641 INT32 WINAPI WINSOCK_gethostname32(char *name, INT32 namelen)
1642 {
1643     LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1644
1645     dprintf_info(winsock, "WS_GetHostName(%08x): name %s, len %d\n",
1646                           (unsigned)pwsi, (name)?name:NULL_STRING, namelen);
1647     if( pwsi )
1648     {
1649         if (gethostname(name, namelen) == 0) return 0;
1650         pwsi->err = (errno == EINVAL) ? WSAEFAULT : wsaErrno();
1651     }
1652     return SOCKET_ERROR;
1653 }
1654
1655 /***********************************************************************
1656  *              gethostname()           (WINSOCK.57)
1657  */
1658 INT16 WINAPI WINSOCK_gethostname16(char *name, INT16 namelen)
1659 {
1660     return (INT16)WINSOCK_gethostname32(name, namelen);
1661 }
1662
1663
1664 /* ------------------------------------- Windows sockets extensions -- *
1665  *                                                                     *
1666  * ------------------------------------------------------------------- */
1667
1668
1669 /***********************************************************************
1670  *          Asynchronous DNS services
1671  */
1672
1673 /* winsock_dns.c */
1674 extern HANDLE16 __WSAsyncDBQuery(LPWSINFO pwsi, HWND32 hWnd, UINT32 uMsg, INT32 type, LPCSTR init,
1675                                  INT32 len, LPCSTR proto, void* sbuf, INT32 buflen, UINT32 flag);
1676
1677 /***********************************************************************
1678  *       WSAAsyncGetHostByAddr()        (WINSOCK.102)
1679  */
1680 HANDLE16 WINAPI WSAAsyncGetHostByAddr16(HWND16 hWnd, UINT16 uMsg, LPCSTR addr,
1681                                INT16 len, INT16 type, SEGPTR sbuf, INT16 buflen)
1682 {
1683   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1684
1685   dprintf_info(winsock, "WS_AsyncGetHostByAddr16(%08x): hwnd %04x, msg %04x, addr %08x[%i]\n",
1686                           (unsigned)pwsi, hWnd, uMsg, (unsigned)addr , len );
1687
1688   if( pwsi ) 
1689     return __WSAsyncDBQuery(pwsi, hWnd, uMsg, type, addr, len,
1690                             NULL, (void*)sbuf, buflen, WSMSG_ASYNC_HOSTBYADDR );
1691   return 0;
1692 }
1693
1694 /***********************************************************************
1695  *       WSAAsyncGetHostByAddr()        (WSOCK32.102)
1696  */
1697 HANDLE32 WINAPI WSAAsyncGetHostByAddr32(HWND32 hWnd, UINT32 uMsg, LPCSTR addr,
1698                                INT32 len, INT32 type, LPSTR sbuf, INT32 buflen)
1699 {
1700   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1701
1702   dprintf_info(winsock, "WS_AsyncGetHostByAddr32(%08x): hwnd %04x, msg %08x, addr %08x[%i]\n",
1703                           (unsigned)pwsi, (HWND16)hWnd, uMsg, (unsigned)addr , len );
1704
1705   if( pwsi )
1706     return __WSAsyncDBQuery(pwsi, hWnd, uMsg, type, addr, len,
1707                             NULL, (void*)sbuf, buflen, WSMSG_ASYNC_HOSTBYADDR | WSMSG_ASYNC_WIN32);
1708   return 0;
1709 }
1710
1711
1712 /***********************************************************************
1713  *       WSAAsyncGetHostByName()        (WINSOCK.103)
1714  */
1715 HANDLE16 WINAPI WSAAsyncGetHostByName16(HWND16 hWnd, UINT16 uMsg, LPCSTR name, 
1716                                       SEGPTR sbuf, INT16 buflen)
1717 {
1718   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1719
1720   dprintf_info(winsock, "WS_AsyncGetHostByName16(%08x): hwnd %04x, msg %04x, host %s, 
1721 buffer %i\n", (unsigned)pwsi, hWnd, uMsg, (name)?name:NULL_STRING, (int)buflen );
1722
1723   if( pwsi )
1724     return __WSAsyncDBQuery(pwsi, hWnd, uMsg, 0, name, 0,
1725                             NULL, (void*)sbuf, buflen, WSMSG_ASYNC_HOSTBYNAME );
1726   return 0;
1727 }                     
1728
1729 /***********************************************************************
1730  *       WSAAsyncGetHostByName32()      (WSOCK32.103)
1731  */
1732 HANDLE32 WINAPI WSAAsyncGetHostByName32(HWND32 hWnd, UINT32 uMsg, LPCSTR name, 
1733                                         LPSTR sbuf, INT32 buflen)
1734 {
1735   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1736   dprintf_info(winsock, "WS_AsyncGetHostByName32(%08x): hwnd %04x, msg %08x, host %s, 
1737 buffer %i\n", (unsigned)pwsi, (HWND16)hWnd, uMsg, (name)?name:NULL_STRING, (int)buflen );
1738   if( pwsi )
1739     return __WSAsyncDBQuery(pwsi, hWnd, uMsg, 0, name, 0,
1740                             NULL, (void*)sbuf, buflen, WSMSG_ASYNC_HOSTBYNAME | WSMSG_ASYNC_WIN32);
1741   return 0;
1742 }                     
1743
1744
1745 /***********************************************************************
1746  *       WSAAsyncGetProtoByName()       (WINSOCK.105)
1747  */
1748 HANDLE16 WINAPI WSAAsyncGetProtoByName16(HWND16 hWnd, UINT16 uMsg, LPCSTR name, 
1749                                          SEGPTR sbuf, INT16 buflen)
1750 {
1751   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1752
1753   dprintf_info(winsock, "WS_AsyncGetProtoByName16(%08x): hwnd %04x, msg %08x, protocol %s\n",
1754                           (unsigned)pwsi, (HWND16)hWnd, uMsg, (name)?name:NULL_STRING );
1755
1756   if( pwsi )
1757     return __WSAsyncDBQuery(pwsi, hWnd, uMsg, 0, name, 0,
1758                             NULL, (void*)sbuf, buflen, WSMSG_ASYNC_PROTOBYNAME );
1759   return 0;
1760 }
1761
1762 /***********************************************************************
1763  *       WSAAsyncGetProtoByName()       (WSOCK32.105)
1764  */
1765 HANDLE32 WINAPI WSAAsyncGetProtoByName32(HWND32 hWnd, UINT32 uMsg, LPCSTR name,
1766                                          LPSTR sbuf, INT32 buflen)
1767 {
1768   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1769
1770   dprintf_info(winsock, "WS_AsyncGetProtoByName32(%08x): hwnd %04x, msg %08x, protocol %s\n",
1771                           (unsigned)pwsi, (HWND16)hWnd, uMsg, (name)?name:NULL_STRING );
1772
1773   if( pwsi )
1774     return __WSAsyncDBQuery(pwsi, hWnd, uMsg, 0, name, 0,
1775                             NULL, (void*)sbuf, buflen, WSMSG_ASYNC_PROTOBYNAME | WSMSG_ASYNC_WIN32);
1776   return 0;
1777 }
1778
1779
1780 /***********************************************************************
1781  *       WSAAsyncGetProtoByNumber()     (WINSOCK.104)
1782  */
1783 HANDLE16 WINAPI WSAAsyncGetProtoByNumber16(HWND16 hWnd, UINT16 uMsg, INT16 number, 
1784                                            SEGPTR sbuf, INT16 buflen)
1785 {
1786   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1787
1788   dprintf_info(winsock, "WS_AsyncGetProtoByNumber16(%08x): hwnd %04x, msg %04x, num %i\n",
1789                           (unsigned)pwsi, hWnd, uMsg, number );
1790
1791   if( pwsi )
1792     return __WSAsyncDBQuery(pwsi, hWnd, uMsg, number, NULL, 0,
1793                             NULL, (void*)sbuf, buflen, WSMSG_ASYNC_PROTOBYNUM );
1794   return 0;
1795 }
1796
1797 /***********************************************************************
1798  *       WSAAsyncGetProtoByNumber()     (WSOCK32.104)
1799  */
1800 HANDLE32 WINAPI WSAAsyncGetProtoByNumber32(HWND32 hWnd, UINT32 uMsg, INT32 number,
1801                                            LPSTR sbuf, INT32 buflen)
1802 {
1803   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1804
1805   dprintf_info(winsock, "WS_AsyncGetProtoByNumber32(%08x): hwnd %04x, msg %08x, num %i\n",
1806                           (unsigned)pwsi, (HWND16)hWnd, uMsg, number );
1807
1808   if( pwsi )
1809     return __WSAsyncDBQuery(pwsi, hWnd, uMsg, number, NULL, 0,
1810                             NULL, (void*)sbuf, buflen, WSMSG_ASYNC_PROTOBYNUM | WSMSG_ASYNC_WIN32);
1811   return 0;
1812 }
1813
1814
1815 /***********************************************************************
1816  *       WSAAsyncGetServByName()        (WINSOCK.107)
1817  */
1818 HANDLE16 WINAPI WSAAsyncGetServByName16(HWND16 hWnd, UINT16 uMsg, LPCSTR name, 
1819                                         LPCSTR proto, SEGPTR sbuf, INT16 buflen)
1820 {
1821   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1822
1823   dprintf_info(winsock, "WS_AsyncGetServByName16(%08x): hwnd %04x, msg %04x, name %s, proto %s\n",
1824                    (unsigned)pwsi, hWnd, uMsg, (name)?name:NULL_STRING, (proto)?proto:NULL_STRING );
1825
1826   if( pwsi )
1827   {
1828       int i = wsi_strtolo( pwsi, name, proto );
1829
1830       if( i )
1831           return __WSAsyncDBQuery(pwsi, hWnd, uMsg, 0, pwsi->buffer, 0,
1832                     pwsi->buffer + i, (void*)sbuf, buflen, WSMSG_ASYNC_SERVBYNAME );
1833   }
1834   return 0;
1835 }
1836
1837 /***********************************************************************
1838  *       WSAAsyncGetServByName()        (WSOCK32.107)
1839  */
1840 HANDLE32 WINAPI WSAAsyncGetServByName32(HWND32 hWnd, UINT32 uMsg, LPCSTR name,
1841                                         LPCSTR proto, LPSTR sbuf, INT32 buflen)
1842 {
1843   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1844
1845   dprintf_info(winsock, "WS_AsyncGetServByName32(%08x): hwnd %04x, msg %08x, name %s, proto %s\n",
1846            (unsigned)pwsi, (HWND16)hWnd, uMsg, (name)?name:NULL_STRING, (proto)?proto:NULL_STRING );
1847   if( pwsi )
1848   {
1849       int i = wsi_strtolo( pwsi, name, proto );
1850
1851       if( i )
1852           return __WSAsyncDBQuery(pwsi, hWnd, uMsg, 0, pwsi->buffer, 0,
1853                  pwsi->buffer + i, (void*)sbuf, buflen, WSMSG_ASYNC_SERVBYNAME | WSMSG_ASYNC_WIN32);
1854   }
1855   return 0;
1856 }
1857
1858
1859 /***********************************************************************
1860  *       WSAAsyncGetServByPort()        (WINSOCK.106)
1861  */
1862 HANDLE16 WINAPI WSAAsyncGetServByPort16(HWND16 hWnd, UINT16 uMsg, INT16 port, 
1863                                         LPCSTR proto, SEGPTR sbuf, INT16 buflen)
1864 {
1865   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1866
1867   dprintf_info(winsock, "WS_AsyncGetServByPort16(%08x): hwnd %04x, msg %04x, port %i, proto %s\n",
1868                            (unsigned)pwsi, hWnd, uMsg, port, (proto)?proto:NULL_STRING );
1869
1870   if( pwsi )
1871   {
1872       int i = wsi_strtolo( pwsi, proto, NULL );
1873
1874       if( i )
1875           return __WSAsyncDBQuery(pwsi, hWnd, uMsg, port, pwsi->buffer, 0,
1876                 NULL, (void*)sbuf, buflen, WSMSG_ASYNC_SERVBYPORT );
1877   }
1878   return 0;
1879 }
1880
1881 /***********************************************************************
1882  *       WSAAsyncGetServByPort()        (WSOCK32.106)
1883  */
1884 HANDLE32 WINAPI WSAAsyncGetServByPort32(HWND32 hWnd, UINT32 uMsg, INT32 port,
1885                                         LPCSTR proto, LPSTR sbuf, INT32 buflen)
1886 {
1887   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
1888
1889   dprintf_info(winsock, "WS_AsyncGetServByPort32(%08x): hwnd %04x, msg %08x, port %i, proto %s\n",
1890                            (unsigned)pwsi, (HWND16)hWnd, uMsg, port, (proto)?proto:NULL_STRING );
1891
1892   if( pwsi )
1893   {
1894       int i = wsi_strtolo( pwsi, proto, NULL );
1895
1896       if( i )
1897           return __WSAsyncDBQuery(pwsi, hWnd, uMsg, port, pwsi->buffer, 0,
1898                  NULL, (void*)sbuf, buflen, WSMSG_ASYNC_SERVBYPORT | WSMSG_ASYNC_WIN32);
1899   }
1900   return 0;
1901 }
1902
1903
1904 /***********************************************************************
1905  *       WSACancelAsyncRequest()        (WINSOCK.108)(WSOCK32.109)
1906  */
1907 INT32 WINAPI WSACancelAsyncRequest32(HANDLE32 hAsyncTaskHandle)
1908 {
1909     INT32               retVal = SOCKET_ERROR;
1910     LPWSINFO            pwsi = wsi_find(GetCurrentTask());
1911     ws_async_op*        p_aop = (ws_async_op*)WS_HANDLE2PTR(hAsyncTaskHandle);
1912
1913     dprintf_info(winsock, "WS_CancelAsyncRequest(%08x): handle %08x\n", 
1914                            (unsigned)pwsi, hAsyncTaskHandle);
1915     if( pwsi )
1916     {
1917         SIGNAL_MaskAsyncEvents( TRUE ); /* block SIGIO */
1918         if( WINSOCK_cancel_async_op(p_aop) )
1919         {
1920             WS_FREE(p_aop);
1921             pwsi->num_async_rq--;
1922             retVal = 0;
1923         }
1924         else pwsi->err = WSAEINVAL;
1925         SIGNAL_MaskAsyncEvents( FALSE );
1926     }
1927     return retVal;
1928 }
1929
1930 INT16 WINAPI WSACancelAsyncRequest16(HANDLE16 hAsyncTaskHandle)
1931 {
1932     return (HANDLE16)WSACancelAsyncRequest16((HANDLE32)hAsyncTaskHandle);
1933 }
1934
1935 /***********************************************************************
1936  *      WSAAsyncSelect()                (WINSOCK.101)(WSOCK32.101)
1937  */
1938
1939 static ws_select_op* __ws_select_list = NULL;
1940
1941 BOOL32 WINSOCK_HandleIO( int* max_fd, int num_pending, 
1942                          fd_set pending_set[3], fd_set event_set[3] )
1943 {
1944     /* This function is called by the event dispatcher
1945      * with the pending_set[] containing the result of select() and
1946      * the event_set[] containing all fd that are being watched */
1947
1948     ws_select_op*       psop = __ws_select_list;
1949     BOOL32              bPost = FALSE;
1950     DWORD               dwEvent, dwErrBytes;
1951     int                 num_posted;
1952
1953     dprintf_info(winsock,"WINSOCK_HandleIO: %i pending descriptors\n", num_pending );
1954
1955     for( num_posted = dwEvent = 0 ; psop; psop = psop->next )
1956     {
1957         unsigned        flags = psop->pws->flags;
1958         int             fd = psop->pws->fd;
1959         int             r, w, e;
1960
1961         w = 0;
1962         if( (r = FD_ISSET( fd, &pending_set[EVENT_IO_READ] )) ||
1963             (w = FD_ISSET( fd, &pending_set[EVENT_IO_WRITE] )) ||
1964             (e = FD_ISSET( fd, &pending_set[EVENT_IO_EXCEPT] )) )
1965         {
1966             /* This code removes WS_FD flags on one-shot events (WS_FD_CLOSE, 
1967              * WS_FD_CONNECT), otherwise it clears descriptors in the io_set.
1968              * Reenabling calls turn them back on.
1969              */
1970
1971             dprintf_info(winsock,"\tchecking psop = 0x%08x\n", (unsigned) psop );
1972
1973             num_pending--;
1974
1975             /* Now figure out what kind of event we've got. The worst problem
1976              * we have to contend with is that some out of control applications 
1977              * really want to use mutually exclusive AsyncSelect() flags all at
1978              * the same time.
1979              */
1980
1981             if((flags & WS_FD_ACCEPT) && (flags & WS_FD_LISTENING))
1982             {
1983                 /* WS_FD_ACCEPT is valid only if the socket is in the
1984                  * listening state */
1985
1986                 FD_CLR( fd, &event_set[EVENT_IO_WRITE] );
1987                 if( r )
1988                 {
1989                     FD_CLR( fd, &event_set[EVENT_IO_READ] ); /* reenabled by the next accept() */
1990                     dwEvent = WSAMAKESELECTREPLY( WS_FD_ACCEPT, 0 );
1991                     bPost = TRUE;
1992                 } 
1993                 else continue;
1994             }
1995             else if( flags & WS_FD_CONNECT )
1996             {
1997                 /* connecting socket */
1998
1999                 if( w || (w = FD_ISSET( fd, &pending_set[EVENT_IO_WRITE] )) )
2000                 {
2001                     /* ready to write means that socket is connected 
2002                      *
2003                      * FIXME: Netscape calls AsyncSelect( s, ... WS_FD_CONNECT .. )
2004                      * right after s = socket() and somehow "s" becomes writeable 
2005                      * before it goes through connect()!?!?
2006                      */
2007
2008                     psop->pws->flags |= WS_FD_CONNECTED;
2009                     psop->pws->flags &= ~(WS_FD_CONNECT | WS_FD_INACTIVE);
2010                     dwEvent = WSAMAKESELECTREPLY( WS_FD_CONNECT, 0 );
2011
2012                     if( flags & (WS_FD_READ | WS_FD_CLOSE))
2013                         FD_SET( fd, &event_set[EVENT_IO_READ] );
2014                     else 
2015                         FD_CLR( fd, &event_set[EVENT_IO_READ] );
2016                     if( flags & WS_FD_WRITE ) 
2017                         FD_SET( fd, &event_set[EVENT_IO_WRITE] );
2018                     else 
2019                         FD_CLR( fd, &event_set[EVENT_IO_WRITE] );
2020                     bPost = TRUE;
2021                 }
2022                 else if( r )
2023                 {
2024                     /* failure - do read() to get correct errno */
2025
2026                     if( read( fd, &dwErrBytes, sizeof(dwErrBytes) ) == -1 )
2027                     {
2028                         dwEvent = WSAMAKESELECTREPLY( WS_FD_CONNECT, wsaErrno() );
2029                         bPost = TRUE;
2030                     }
2031                 }
2032                 /* otherwise bPost stays FALSE, should probably clear event_set  */
2033             }
2034             else 
2035             {
2036                 /* connected socket, no WS_FD_OOB code for now. */
2037
2038                 if( flags & WS_FD_WRITE &&
2039                    (w || (w = FD_ISSET( fd, &pending_set[EVENT_IO_WRITE] ))) )
2040                 {
2041                     /* this will be reenabled when send() or sendto() fail with
2042                      * WSAEWOULDBLOCK */
2043
2044                     if( PostMessage32A( psop->hWnd, psop->uMsg, (WPARAM32)WS_PTR2HANDLE(psop->pws), 
2045                                       (LPARAM)WSAMAKESELECTREPLY( WS_FD_WRITE, 0 ) ) )
2046                     {
2047                         dprintf_info(winsock, "\t    hwnd %04x - %04x, %08x\n",
2048                                 psop->hWnd, psop->uMsg, (unsigned)MAKELONG(WS_FD_WRITE, 0) );
2049                         FD_CLR( fd, &event_set[EVENT_IO_WRITE] );
2050                         num_posted++;
2051                     }
2052                 }
2053
2054                 if( r && (flags & (WS_FD_READ | WS_FD_CLOSE)) )
2055                 {
2056                     int val = (flags & WS_FD_RAW);
2057
2058                      /* WS_FD_RAW is set by the WSAAsyncSelect() init */
2059
2060                     bPost = TRUE;
2061                     if( !val && ioctl( fd, FIONREAD, (char*)&dwErrBytes) == -1 )
2062                     {
2063                         /* weirdness */
2064
2065                         dwEvent = WSAMAKESELECTREPLY( WS_FD_READ, wsaErrno() );
2066                     }
2067                     else if( val || dwErrBytes )
2068                     {
2069                         /* got pending data, will be reenabled by recv() or recvfrom() */
2070
2071                         FD_CLR( fd, &event_set[EVENT_IO_READ] );
2072                         dwEvent = WSAMAKESELECTREPLY( WS_FD_READ, 0 );
2073                     }
2074                     else
2075                     {
2076                         /* 0 bytes to read - connection reset by peer? */
2077
2078                         do
2079                             val = read( fd, (char*)&dwErrBytes, sizeof(dwErrBytes));
2080                         while( errno == EINTR );
2081                         if( errno != EWOULDBLOCK )
2082                         {
2083                             switch( val )
2084                             {
2085                                 case  0: errno = ENETDOWN;      /* soft reset, fall through */
2086                                 case -1:                        /* hard reset */
2087                                          dwEvent = WSAMAKESELECTREPLY( WS_FD_CLOSE, wsaErrno() );
2088                                          break;
2089
2090                                 default: bPost = FALSE;
2091                                          continue;              /* FIXME: this is real bad */
2092                             }
2093                         }
2094                         else { bPost = FALSE; continue; }       /* more weirdness */
2095
2096                         /* this is it, this socket is closed */
2097
2098                         psop->pws->flags &= ~(WS_FD_READ | WS_FD_CLOSE | WS_FD_WRITE);
2099                         FD_CLR( fd, &event_set[EVENT_IO_READ] );
2100                         FD_CLR( fd, &event_set[EVENT_IO_WRITE] );
2101
2102                         if( *max_fd == (fd + 1) ) (*max_fd)--;
2103                     }
2104                 }
2105             }
2106
2107             if( bPost )
2108             {
2109                 dprintf_info(winsock, "\t    hwnd %04x - %04x, %08x\n", 
2110                                 psop->hWnd, psop->uMsg, (unsigned)dwEvent );
2111                 PostMessage32A( psop->hWnd, psop->uMsg, 
2112                               (WPARAM32)WS_PTR2HANDLE(psop->pws), (LPARAM)dwEvent );
2113                 bPost = FALSE;
2114                 num_posted++;
2115             }
2116         }
2117         if( num_pending <= 0 ) break;
2118     }
2119
2120     dprintf_info(winsock, "\tdone, %i posted events\n", num_posted );
2121     return ( num_posted ) ? TRUE : FALSE;
2122 }
2123
2124 INT32 WINAPI WSAAsyncSelect32(SOCKET32 s, HWND32 hWnd, UINT32 uMsg, UINT32 lEvent)
2125 {
2126     ws_socket*    pws  = (ws_socket*)WS_HANDLE2PTR(s);
2127     LPWSINFO      pwsi = wsi_find(GetCurrentTask());
2128
2129     dprintf_info(winsock, "WS_AsyncSelect(%08x): %04x, hWnd %04x, uMsg %08x, event %08x\n",
2130                           (unsigned)pwsi, (SOCKET16)s, (HWND16)hWnd, uMsg, (unsigned)lEvent );
2131     if( _check_ws(pwsi, pws) )
2132     {
2133         ws_select_op* psop;
2134
2135         if( (psop = pws->psop) )
2136         {
2137             /* delete previous control struct */
2138
2139             if( psop == __ws_select_list )
2140                 __ws_select_list = psop->next;
2141             else
2142                 psop->prev->next = psop->next; 
2143             if( psop->next ) psop->next->prev = psop->prev;
2144
2145             if( pws->flags & (WS_FD_ACCEPT | WS_FD_CONNECT | WS_FD_READ | WS_FD_CLOSE) )
2146                 EVENT_DeleteIO( pws->fd, EVENT_IO_READ );
2147             if( pws->flags & (WS_FD_CONNECT | WS_FD_WRITE) )
2148                 EVENT_DeleteIO( pws->fd, EVENT_IO_WRITE );
2149
2150             dprintf_info(winsock,"\tremoving psop = 0x%08x\n", (unsigned) psop );
2151
2152             WS_FREE( pws->psop );
2153             pws->flags &= ~(WS_FD_RAW | WS_FD_ACCEPT | WS_FD_CONNECT | 
2154                             WS_FD_READ | WS_FD_WRITE | WS_FD_CLOSE);
2155             pws->psop = NULL;
2156         }
2157
2158         if( lEvent )
2159         {
2160             psop = (ws_select_op*)WS_ALLOC(sizeof(ws_select_op));
2161             if( psop )
2162             {
2163                 int sock_type, bytes = sizeof(int);
2164
2165                 WINSOCK_unblock_io( pws->fd, TRUE );
2166
2167                 psop->prev = NULL;
2168                 psop->next = __ws_select_list;
2169                 if( __ws_select_list )
2170                     __ws_select_list->prev = psop;
2171                 __ws_select_list = psop;
2172                 
2173                 psop->pws = pws;
2174                 psop->hWnd = hWnd;
2175                 psop->uMsg = uMsg;
2176
2177                 pws->psop = psop;
2178                 pws->flags |= (0x0000FFFF & lEvent);
2179                 getsockopt(pws->fd, SOL_SOCKET, SO_TYPE, &sock_type, &bytes);
2180                 if( sock_type == SOCK_RAW ) pws->flags |= WS_FD_RAW;
2181
2182                 if( lEvent & (WS_FD_ACCEPT | WS_FD_CONNECT | WS_FD_READ | WS_FD_CLOSE) )
2183                     EVENT_AddIO( pws->fd, EVENT_IO_READ );
2184                 if( lEvent & (WS_FD_CONNECT | WS_FD_WRITE) )
2185                     EVENT_AddIO( pws->fd, EVENT_IO_WRITE );
2186
2187                 /* TODO: handle WS_FD_ACCEPT right away if the socket is readable */
2188
2189                 dprintf_info(winsock,"\tcreating psop = 0x%08x\n", (unsigned)psop );
2190
2191                 return 0; /* success */
2192             }
2193             else pwsi->err = WSAENOBUFS;
2194         } 
2195         else return 0;
2196     } 
2197     else if( pwsi ) pwsi->err = WSAEINVAL;
2198     return SOCKET_ERROR; 
2199 }
2200
2201 INT16 WINAPI WSAAsyncSelect16(SOCKET16 s, HWND16 hWnd, UINT16 wMsg, UINT32 lEvent)
2202 {
2203     return (INT16)WSAAsyncSelect32( s, hWnd, wMsg, lEvent );
2204 }
2205
2206
2207 /***********************************************************************
2208  *      __WSAFDIsSet()                  (WINSOCK.151)
2209  */
2210 INT16 WINAPI __WSAFDIsSet16(SOCKET16 s, ws_fd_set16 *set)
2211 {
2212   int i = set->fd_count;
2213   
2214   dprintf_info(winsock, "__WSAFDIsSet16(%d,%8lx(%i))\n", s,(unsigned long)set, i);
2215     
2216   while (i--)
2217       if (set->fd_array[i] == s) return 1;
2218   return 0;
2219 }                                                            
2220
2221 /***********************************************************************
2222  *      __WSAFDIsSet()                  (WSOCK32.151)
2223  */
2224 INT32 WINAPI __WSAFDIsSet32(SOCKET32 s, ws_fd_set32 *set)
2225 {
2226   int i = set->fd_count;
2227
2228   dprintf_info(winsock, "__WSAFDIsSet32(%d,%8lx(%i))\n", s,(unsigned long)set, i);
2229
2230   while (i--)
2231       if (set->fd_array[i] == s) return 1;
2232   return 0;
2233 }
2234
2235 /***********************************************************************
2236  *      WSAIsBlocking()                 (WINSOCK.114)(WSOCK32.114)
2237  */
2238 BOOL32 WINAPI WSAIsBlocking(void)
2239 {
2240   /* By default WinSock should set all its sockets to non-blocking mode
2241    * and poll in PeekMessage loop when processing "blocking" ones. This 
2242    * function is supposed to tell if the program is in this loop. Our 
2243    * blocking calls are truly blocking so we always return FALSE.
2244    *
2245    * Note: It is allowed to call this function without prior WSAStartup().
2246    */
2247
2248   dprintf_info(winsock, "WS_IsBlocking()\n");
2249   return FALSE;
2250 }
2251
2252 /***********************************************************************
2253  *      WSACancelBlockingCall()         (WINSOCK.113)(WSOCK32.113)
2254  */
2255 INT32 WINAPI WSACancelBlockingCall(void)
2256 {
2257   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
2258
2259   dprintf_info(winsock, "WS_CancelBlockingCall(%08x)\n", (unsigned)pwsi);
2260
2261   if( pwsi ) return 0;
2262   return SOCKET_ERROR;
2263 }
2264
2265
2266 /***********************************************************************
2267  *      WSASetBlockingHook16()          (WINSOCK.109)
2268  */
2269 FARPROC16 WINAPI WSASetBlockingHook16(FARPROC16 lpBlockFunc)
2270 {
2271   FARPROC16             prev;
2272   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
2273
2274   dprintf_info(winsock, "WS_SetBlockingHook16(%08x): hook %08x\n", 
2275                           (unsigned)pwsi, (unsigned) lpBlockFunc);
2276   if( pwsi ) 
2277   { 
2278       prev = (FARPROC16)pwsi->blocking_hook; 
2279       pwsi->blocking_hook = (DWORD)lpBlockFunc; 
2280       pwsi->flags &= ~WSI_BLOCKINGHOOK32;
2281       return prev; 
2282   }
2283   return 0;
2284 }
2285
2286
2287 /***********************************************************************
2288  *      WSASetBlockingHook32()
2289  */
2290 FARPROC32 WINAPI WSASetBlockingHook32(FARPROC32 lpBlockFunc)
2291 {
2292   FARPROC32             prev;
2293   LPWSINFO              pwsi = wsi_find(GetCurrentTask());
2294
2295   dprintf_info(winsock, "WS_SetBlockingHook32(%08x): hook %08x\n",
2296                           (unsigned)pwsi, (unsigned) lpBlockFunc);
2297   if( pwsi ) {
2298       prev = (FARPROC32)pwsi->blocking_hook;
2299       pwsi->blocking_hook = (DWORD)lpBlockFunc;
2300       pwsi->flags |= WSI_BLOCKINGHOOK32;
2301       return prev;
2302   }
2303   return NULL;
2304 }
2305
2306
2307 /***********************************************************************
2308  *      WSAUnhookBlockingHook16()       (WINSOCK.110)
2309  */
2310 INT16 WINAPI WSAUnhookBlockingHook16(void)
2311 {
2312     LPWSINFO              pwsi = wsi_find(GetCurrentTask());
2313
2314     dprintf_info(winsock, "WS_UnhookBlockingHook16(%08x)\n", (unsigned)pwsi);
2315     if( pwsi ) return (INT16)(pwsi->blocking_hook = 0);
2316     return SOCKET_ERROR;
2317 }
2318
2319
2320 /***********************************************************************
2321  *      WSAUnhookBlockingHook32()
2322  */
2323 INT32 WINAPI WSAUnhookBlockingHook32(void)
2324 {
2325     LPWSINFO              pwsi = wsi_find(GetCurrentTask());
2326
2327     dprintf_info(winsock, "WS_UnhookBlockingHook32(%08x)\n", (unsigned)pwsi);
2328     if( pwsi )
2329     {
2330         pwsi->blocking_hook = 0;
2331         pwsi->flags &= ~WSI_BLOCKINGHOOK32;
2332         return 0;
2333     }
2334     return SOCKET_ERROR;
2335 }
2336
2337 /*
2338  *      TCP/IP action codes.
2339  */
2340
2341
2342 #define WSCNTL_TCPIP_QUERY_INFO             0x00000000
2343 #define WSCNTL_TCPIP_SET_INFO               0x00000001
2344 #define WSCNTL_TCPIP_ICMP_ECHO              0x00000002
2345 #define WSCNTL_TCPIP_TEST                   0x00000003
2346
2347
2348 /***********************************************************************
2349  *      WsControl()
2350  *
2351  * WsControl seems to be an undocumented Win95 function. A lot of 
2352  * discussion about WsControl can be found on the net, e.g.
2353  * Subject:      Re: WSOCK32.DLL WsControl Exported Function
2354  * From:         "Peter Rindfuss" <rindfuss-s@medea.wz-berlin.de>
2355  * Date:         1997/08/17
2356  */
2357
2358 DWORD WINAPI WsControl(DWORD protocoll,DWORD action,
2359                       LPVOID inbuf,LPDWORD inbuflen,
2360                       LPVOID outbuf,LPDWORD outbuflen) 
2361 {
2362
2363   switch (action) {
2364   case WSCNTL_TCPIP_ICMP_ECHO:
2365     {
2366       unsigned int addr = *(unsigned int*)inbuf;
2367 #if 0
2368       int timeout= *(unsigned int*)(inbuf+4);
2369       short x1 = *(unsigned short*)(inbuf+8);
2370       short sendbufsize = *(unsigned short*)(inbuf+10);
2371       char x2 = *(unsigned char*)(inbuf+12);
2372       char ttl = *(unsigned char*)(inbuf+13);
2373       char service = *(unsigned char*)(inbuf+14);
2374       char type= *(unsigned char*)(inbuf+15); /* 0x2: don't fragment*/
2375 #endif      
2376       
2377       fprintf(stdnimp,"WsControl(ICMP_ECHO) to 0x%08x stub \n",
2378               addr);
2379       break;
2380     }
2381   default:
2382     fprintf(stdnimp,"WsControl(%lx,%lx,%p,%p,%p,%p) stub\n",
2383             protocoll,action,inbuf,inbuflen,outbuf,outbuflen);
2384   }
2385   return FALSE;
2386 }
2387 /*********************************************************
2388  *       WS_s_perror         WSOCK32.1108 
2389  */
2390 void WINAPI WS_s_perror(LPCSTR message)
2391 {
2392     fprintf(stdnimp,"s_perror %s stub\n",message);
2393         return;
2394 }
2395
2396
2397 /* ----------------------------------- end of API stuff */
2398
2399 /* ----------------------------------- helper functions -
2400  *
2401  * TODO: Merge WS_dup_..() stuff into one function that
2402  * would operate with a generic structure containing internal
2403  * pointers (via a template of some kind).
2404  */
2405
2406 static int list_size(char** l, int item_size)
2407 {
2408   int i,j = 0;
2409   if(l)
2410   { for(i=0;l[i];i++) 
2411         j += (item_size) ? item_size : strlen(l[i]) + 1;
2412     j += (i + 1) * sizeof(char*); }
2413   return j;
2414 }
2415
2416 static int list_dup(char** l_src, char* ref, char* base, int item_size)
2417
2418    /* base is either either equal to ref or 0 or SEGPTR */
2419
2420    char*                p = ref;
2421    char**               l_to = (char**)ref;
2422    int                  i,j,k;
2423
2424    for(j=0;l_src[j];j++) ;
2425    p += (j + 1) * sizeof(char*);
2426    for(i=0;i<j;i++)
2427    { l_to[i] = base + (p - ref);
2428      k = ( item_size ) ? item_size : strlen(l_src[i]) + 1;
2429      memcpy(p, l_src[i], k); p += k; }
2430    l_to[i] = NULL;
2431    return (p - ref);
2432 }
2433
2434 /* ----- hostent */
2435
2436 static int hostent_size(struct hostent* p_he)
2437 {
2438   int size = 0;
2439   if( p_he )
2440   { size  = sizeof(struct hostent); 
2441     size += strlen(p_he->h_name) + 1;
2442     size += list_size(p_he->h_aliases, 0);  
2443     size += list_size(p_he->h_addr_list, p_he->h_length ); }
2444   return size;
2445 }
2446
2447 int WS_dup_he(LPWSINFO pwsi, struct hostent* p_he, int flag)
2448 {
2449    /* Convert hostent structure into ws_hostent so that the data fits 
2450     * into pwsi->buffer. Internal pointers can be linear, SEGPTR, or 
2451     * relative to pwsi->buffer depending on "flag" value. Returns size
2452     * of the data copied (also in the pwsi->buflen).
2453     */
2454
2455    int size = hostent_size(p_he);
2456    if( size )
2457    {
2458      struct ws_hostent* p_to;
2459      char* p_name,*p_aliases,*p_addr,*p_base,*p;
2460
2461      _check_buffer(pwsi, size);
2462      p_to = (struct ws_hostent*)pwsi->buffer;
2463      p = pwsi->buffer;
2464      p_base = (flag & WS_DUP_OFFSET) ? NULL
2465                                      : ((flag & WS_DUP_SEGPTR) ? (char*)SEGPTR_GET(p) : p);
2466      p += sizeof(struct ws_hostent);
2467      p_name = p;
2468      strcpy(p, p_he->h_name); p += strlen(p) + 1;
2469      p_aliases = p;
2470      p += list_dup(p_he->h_aliases, p, p_base + (p - pwsi->buffer), 0);
2471      p_addr = p;
2472      list_dup(p_he->h_addr_list, p, p_base + (p - pwsi->buffer), p_he->h_length);
2473
2474      p_to->h_addrtype = (INT16)p_he->h_addrtype; 
2475      p_to->h_length = (INT16)p_he->h_length;
2476      p_to->h_name = (SEGPTR)(p_base + (p_name - pwsi->buffer));
2477      p_to->h_aliases = (SEGPTR)(p_base + (p_aliases - pwsi->buffer));
2478      p_to->h_addr_list = (SEGPTR)(p_base + (p_addr - pwsi->buffer));
2479
2480      size += (sizeof(struct ws_hostent) - sizeof(struct hostent));
2481    }
2482    return size;
2483 }
2484
2485 /* ----- protoent */
2486
2487 static int protoent_size(struct protoent* p_pe)
2488 {
2489   int size = 0;
2490   if( p_pe )
2491   { size  = sizeof(struct protoent);
2492     size += strlen(p_pe->p_name) + 1;
2493     size += list_size(p_pe->p_aliases, 0); }
2494   return size;
2495 }
2496
2497 int WS_dup_pe(LPWSINFO pwsi, struct protoent* p_pe, int flag)
2498 {
2499    int size = protoent_size(p_pe);
2500    if( size )
2501    {
2502      struct ws_protoent* p_to;
2503      char* p_name,*p_aliases,*p_base,*p;
2504
2505      _check_buffer(pwsi, size);
2506      p_to = (struct ws_protoent*)pwsi->buffer;
2507      p = pwsi->buffer; 
2508      p_base = (flag & WS_DUP_OFFSET) ? NULL
2509                                      : ((flag & WS_DUP_SEGPTR) ? (char*)SEGPTR_GET(p) : p);
2510      p += sizeof(struct ws_protoent);
2511      p_name = p;
2512      strcpy(p, p_pe->p_name); p += strlen(p) + 1;
2513      p_aliases = p;
2514      list_dup(p_pe->p_aliases, p, p_base + (p - pwsi->buffer), 0);
2515
2516      p_to->p_proto = (INT16)p_pe->p_proto;
2517      p_to->p_name = (SEGPTR)(p_base) + (p_name - pwsi->buffer);
2518      p_to->p_aliases = (SEGPTR)((p_base) + (p_aliases - pwsi->buffer)); 
2519
2520      size += (sizeof(struct ws_protoent) - sizeof(struct protoent));
2521    }
2522    return size;
2523 }
2524
2525 /* ----- servent */
2526
2527 static int servent_size(struct servent* p_se)
2528 {
2529   int size = 0;
2530   if( p_se )
2531   { size += sizeof(struct servent);
2532     size += strlen(p_se->s_proto) + strlen(p_se->s_name) + 2;
2533     size += list_size(p_se->s_aliases, 0); }
2534   return size;
2535 }
2536
2537 int WS_dup_se(LPWSINFO pwsi, struct servent* p_se, int flag)
2538 {
2539    int size = servent_size(p_se);
2540    if( size )
2541    {
2542      struct ws_servent* p_to;
2543      char* p_name,*p_aliases,*p_proto,*p_base,*p;
2544
2545      _check_buffer(pwsi, size);
2546      p_to = (struct ws_servent*)pwsi->buffer;
2547      p = pwsi->buffer;
2548      p_base = (flag & WS_DUP_OFFSET) ? NULL 
2549                                      : ((flag & WS_DUP_SEGPTR) ? (char*)SEGPTR_GET(p) : p);
2550      p += sizeof(struct ws_servent);
2551      p_name = p;
2552      strcpy(p, p_se->s_name); p += strlen(p) + 1;
2553      p_proto = p;
2554      strcpy(p, p_se->s_proto); p += strlen(p) + 1;
2555      p_aliases = p;
2556      list_dup(p_se->s_aliases, p, p_base + (p - pwsi->buffer), 0);
2557
2558      p_to->s_port = (INT16)p_se->s_port;
2559      p_to->s_name = (SEGPTR)(p_base + (p_name - pwsi->buffer));
2560      p_to->s_proto = (SEGPTR)(p_base + (p_proto - pwsi->buffer));
2561      p_to->s_aliases = (SEGPTR)(p_base + (p_aliases - pwsi->buffer)); 
2562
2563      size += (sizeof(struct ws_servent) - sizeof(struct servent));
2564    }
2565    return size;
2566 }
2567
2568 /* ----------------------------------- error handling */
2569
2570 UINT16 wsaErrno(void)
2571 {
2572     int loc_errno = errno; 
2573 #if defined(__FreeBSD__)
2574        dprintf_err(winsock, "winsock: errno %d, (%s).\n", 
2575                                          errno, strerror(errno));
2576 #else
2577        dprintf_err(winsock, "winsock: errno %d\n", errno);
2578 #endif
2579
2580     switch(loc_errno)
2581     {
2582         case EINTR:             return WSAEINTR;
2583         case EBADF:             return WSAEBADF;
2584         case EACCES:            return WSAEACCES;
2585         case EFAULT:            return WSAEFAULT;
2586         case EINVAL:            return WSAEINVAL;
2587         case EMFILE:            return WSAEMFILE;
2588         case EWOULDBLOCK:       return WSAEWOULDBLOCK;
2589         case EINPROGRESS:       return WSAEINPROGRESS;
2590         case EALREADY:          return WSAEALREADY;
2591         case ENOTSOCK:          return WSAENOTSOCK;
2592         case EDESTADDRREQ:      return WSAEDESTADDRREQ;
2593         case EMSGSIZE:          return WSAEMSGSIZE;
2594         case EPROTOTYPE:        return WSAEPROTOTYPE;
2595         case ENOPROTOOPT:       return WSAENOPROTOOPT;
2596         case EPROTONOSUPPORT:   return WSAEPROTONOSUPPORT;
2597         case ESOCKTNOSUPPORT:   return WSAESOCKTNOSUPPORT;
2598         case EOPNOTSUPP:        return WSAEOPNOTSUPP;
2599         case EPFNOSUPPORT:      return WSAEPFNOSUPPORT;
2600         case EAFNOSUPPORT:      return WSAEAFNOSUPPORT;
2601         case EADDRINUSE:        return WSAEADDRINUSE;
2602         case EADDRNOTAVAIL:     return WSAEADDRNOTAVAIL;
2603         case ENETDOWN:          return WSAENETDOWN;
2604         case ENETUNREACH:       return WSAENETUNREACH;
2605         case ENETRESET:         return WSAENETRESET;
2606         case ECONNABORTED:      return WSAECONNABORTED;
2607         case ECONNRESET:        return WSAECONNRESET;
2608         case ENOBUFS:           return WSAENOBUFS;
2609         case EISCONN:           return WSAEISCONN;
2610         case ENOTCONN:          return WSAENOTCONN;
2611         case ESHUTDOWN:         return WSAESHUTDOWN;
2612         case ETOOMANYREFS:      return WSAETOOMANYREFS;
2613         case ETIMEDOUT:         return WSAETIMEDOUT;
2614         case ECONNREFUSED:      return WSAECONNREFUSED;
2615         case ELOOP:             return WSAELOOP;
2616         case ENAMETOOLONG:      return WSAENAMETOOLONG;
2617         case EHOSTDOWN:         return WSAEHOSTDOWN;
2618         case EHOSTUNREACH:      return WSAEHOSTUNREACH;
2619         case ENOTEMPTY:         return WSAENOTEMPTY;
2620 #ifdef EPROCLIM
2621         case EPROCLIM:          return WSAEPROCLIM;
2622 #endif
2623 #ifdef EUSERS
2624         case EUSERS:            return WSAEUSERS;
2625 #endif
2626 #ifdef EDQUOT
2627         case EDQUOT:            return WSAEDQUOT;
2628 #endif
2629 #ifdef ESTALE
2630         case ESTALE:            return WSAESTALE;
2631 #endif
2632 #ifdef EREMOTE
2633         case EREMOTE:           return WSAEREMOTE;
2634 #endif
2635
2636        /* just in case we ever get here and there are no problems */
2637         case 0:                 return 0;
2638         default:
2639                 fprintf(stderr, "winsock: unknown errno %d!\n", errno);
2640                 return WSAEOPNOTSUPP;
2641     }
2642 }
2643
2644 UINT16 wsaHerrno(void)
2645 {
2646     int         loc_errno = h_errno;
2647
2648 #if defined(__FreeBSD__)
2649     dprintf_err(winsock, "winsock: h_errno %d, (%s).\n", 
2650                     h_errno, strerror(h_errno));
2651 #else
2652     dprintf_err(winsock, "winsock: h_errno %d.\n", h_errno);
2653 #endif
2654
2655     switch(loc_errno)
2656     {
2657         case HOST_NOT_FOUND:    return WSAHOST_NOT_FOUND;
2658         case TRY_AGAIN:         return WSATRY_AGAIN;
2659         case NO_RECOVERY:       return WSANO_RECOVERY;
2660         case NO_DATA:           return WSANO_DATA; 
2661
2662         case 0:                 return 0;
2663         default:
2664                 fprintf(stderr, "winsock: unknown h_errno %d!\n", h_errno);
2665                 return WSAEOPNOTSUPP;
2666     }
2667 }
2668
2669