⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 b_sock.c

📁 mediastreamer2是开源的网络传输媒体流的库
💻 C
📖 第 1 页 / 共 2 页
字号:
		i=GHBN_NUM;	if (i == GHBN_NUM) /* no hit*/		{		BIO_ghbn_miss++;		/* Note: under VMS with SOCKETSHR, it seems like the first		 * parameter is 'char *', instead of 'const char *'		 */		ret=gethostbyname(#  ifndef CONST_STRICT		    (char *)#  endif		    name);		if (ret == NULL)			goto end;		if (j > 128) /* too big to cache */			{#  if 0			/* If we were trying to make this function thread-safe (which			 * is bound to fail), we'd have to give up in this case			 * (or allocate more memory). */			ret = NULL;#  endif			goto end;			}		/* else add to cache */		if (ghbn_cache[lowi].ent != NULL)			ghbn_free(ghbn_cache[lowi].ent); /* XXX not thread-safe */		ghbn_cache[lowi].name[0] = '\0';		if((ret=ghbn_cache[lowi].ent=ghbn_dup(ret)) == NULL)			{			BIOerr(BIO_F_BIO_GETHOSTBYNAME,ERR_R_MALLOC_FAILURE);			goto end;			}		strncpy(ghbn_cache[lowi].name,name,128);		ghbn_cache[lowi].order=BIO_ghbn_miss+BIO_ghbn_hits;		}	else		{		BIO_ghbn_hits++;		ret= ghbn_cache[i].ent;		ghbn_cache[i].order=BIO_ghbn_miss+BIO_ghbn_hits;		}end:#  if 0	CRYPTO_w_unlock(CRYPTO_LOCK_GETHOSTBYNAME);#  endif	return(ret);#endif	}int BIO_sock_init(void)	{#ifdef OPENSSL_SYS_WINDOWS	static struct WSAData wsa_state;	if (!wsa_init_done)		{		int err;	  #ifdef SIGINT		signal(SIGINT,(void (*)(int))BIO_sock_cleanup);#endif		wsa_init_done=1;		memset(&wsa_state,0,sizeof(wsa_state));		if (WSAStartup(0x0101,&wsa_state)!=0)			{			err=WSAGetLastError();			SYSerr(SYS_F_WSASTARTUP,err);			BIOerr(BIO_F_BIO_SOCK_INIT,BIO_R_WSASTARTUP);			return(-1);			}		}#endif /* OPENSSL_SYS_WINDOWS */#ifdef WATT32	extern int _watt_do_exit;	_watt_do_exit = 0;    /* don't make sock_init() call exit() */	if (sock_init())		return (-1);#endif#if defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)    WORD wVerReq;    WSADATA wsaData;    int err;    if (!wsa_init_done)    {   # ifdef SIGINT        signal(SIGINT,(void (*)(int))BIO_sock_cleanup);# endif        wsa_init_done=1;        wVerReq = MAKEWORD( 2, 0 );        err = WSAStartup(wVerReq,&wsaData);        if (err != 0)        {            SYSerr(SYS_F_WSASTARTUP,err);            BIOerr(BIO_F_BIO_SOCK_INIT,BIO_R_WSASTARTUP);            return(-1);			}		}#endif	return(1);	}void BIO_sock_cleanup(void)	{#ifdef OPENSSL_SYS_WINDOWS	if (wsa_init_done)		{		wsa_init_done=0;#ifndef OPENSSL_SYS_WINCE		WSACancelBlockingCall();#endif		WSACleanup();		}#elif defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)   if (wsa_init_done)        {        wsa_init_done=0;        WSACleanup();		}#endif	}#if !defined(OPENSSL_SYS_VMS) || __VMS_VER >= 70000000int BIO_socket_ioctl(int fd, long type, void *arg)	{	int i;#ifdef __DJGPP__	i=ioctlsocket(fd,type,(char *)arg);#else	i=ioctlsocket(fd,type,arg);#endif /* __DJGPP__ */	if (i < 0)		SYSerr(SYS_F_IOCTLSOCKET,get_last_socket_error());	return(i);	}#endif /* __VMS_VER *//* The reason I have implemented this instead of using sscanf is because * Visual C 1.52c gives an unresolved external when linking a DLL :-( */static int get_ip(const char *str, unsigned char ip[4])	{	unsigned int tmp[4];	int num=0,c,ok=0;	tmp[0]=tmp[1]=tmp[2]=tmp[3]=0;	for (;;)		{		c= *(str++);		if ((c >= '0') && (c <= '9'))			{			ok=1;			tmp[num]=tmp[num]*10+c-'0';			if (tmp[num] > 255) return(0);			}		else if (c == '.')			{			if (!ok) return(-1);			if (num == 3) return(0);			num++;			ok=0;			}		else if (c == '\0' && (num == 3) && ok)			break;		else			return(0);		}	ip[0]=tmp[0];	ip[1]=tmp[1];	ip[2]=tmp[2];	ip[3]=tmp[3];	return(1);	}int BIO_get_accept_socket(char *host, int bind_mode)	{	int ret=0;	struct sockaddr_in server,client;	int s=INVALID_SOCKET,cs;	unsigned char ip[4];	unsigned short port;	char *str=NULL,*e;	const char *h,*p;	unsigned long l;	int err_num;	if (BIO_sock_init() != 1) return(INVALID_SOCKET);	if ((str=BUF_strdup(host)) == NULL) return(INVALID_SOCKET);	h=p=NULL;	h=str;	for (e=str; *e; e++)		{		if (*e == ':')			{			p= &(e[1]);			*e='\0';			}		else if (*e == '/')			{			*e='\0';			break;			}		}	if (p == NULL)		{		p=h;		h="*";		}	if (!BIO_get_port(p,&port)) goto err;	memset((char *)&server,0,sizeof(server));	server.sin_family=AF_INET;	server.sin_port=htons(port);	if (strcmp(h,"*") == 0)		server.sin_addr.s_addr=INADDR_ANY;	else		{                if (!BIO_get_host_ip(h,&(ip[0]))) goto err;		l=(unsigned long)			((unsigned long)ip[0]<<24L)|			((unsigned long)ip[1]<<16L)|			((unsigned long)ip[2]<< 8L)|			((unsigned long)ip[3]);		server.sin_addr.s_addr=htonl(l);		}again:	s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);	if (s == INVALID_SOCKET)		{		SYSerr(SYS_F_SOCKET,get_last_socket_error());		ERR_add_error_data(3,"port='",host,"'");		BIOerr(BIO_F_BIO_GET_ACCEPT_SOCKET,BIO_R_UNABLE_TO_CREATE_SOCKET);		goto err;		}#ifdef SO_REUSEADDR	if (bind_mode == BIO_BIND_REUSEADDR)		{		int i=1;		ret=setsockopt(s,SOL_SOCKET,SO_REUSEADDR,(char *)&i,sizeof(i));		bind_mode=BIO_BIND_NORMAL;		}#endif	if (bind(s,(struct sockaddr *)&server,sizeof(server)) == -1)		{#ifdef SO_REUSEADDR		err_num=get_last_socket_error();		if ((bind_mode == BIO_BIND_REUSEADDR_IF_UNUSED) &&			(err_num == EADDRINUSE))			{			memcpy((char *)&client,(char *)&server,sizeof(server));			if (strcmp(h,"*") == 0)				client.sin_addr.s_addr=htonl(0x7F000001);			cs=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);			if (cs != INVALID_SOCKET)				{				int ii;				ii=connect(cs,(struct sockaddr *)&client,					sizeof(client));				closesocket(cs);				if (ii == INVALID_SOCKET)					{					bind_mode=BIO_BIND_REUSEADDR;					closesocket(s);					goto again;					}				/* else error */				}			/* else error */			}#endif		SYSerr(SYS_F_BIND,err_num);		ERR_add_error_data(3,"port='",host,"'");		BIOerr(BIO_F_BIO_GET_ACCEPT_SOCKET,BIO_R_UNABLE_TO_BIND_SOCKET);		goto err;		}	if (listen(s,MAX_LISTEN) == -1)		{		SYSerr(SYS_F_BIND,get_last_socket_error());		ERR_add_error_data(3,"port='",host,"'");		BIOerr(BIO_F_BIO_GET_ACCEPT_SOCKET,BIO_R_UNABLE_TO_LISTEN_SOCKET);		goto err;		}	ret=1;err:	if (str != NULL) OPENSSL_free(str);	if ((ret == 0) && (s != INVALID_SOCKET))		{		closesocket(s);		s= INVALID_SOCKET;		}	return(s);	}int BIO_accept(int sock, char **addr)	{	int ret=INVALID_SOCKET;	static struct sockaddr_in from;	unsigned long l;	unsigned short port;	int len;	char *p;	memset((char *)&from,0,sizeof(from));	len=sizeof(from);	/* Note: under VMS with SOCKETSHR the fourth parameter is currently	 * of type (int *) whereas under other systems it is (void *) if	 * you don't have a cast it will choke the compiler: if you do	 * have a cast then you can either go for (int *) or (void *).	 */	ret=accept(sock,(struct sockaddr *)&from,(void *)&len);	if (ret == INVALID_SOCKET)		{		if(BIO_sock_should_retry(ret)) return -2;		SYSerr(SYS_F_ACCEPT,get_last_socket_error());		BIOerr(BIO_F_BIO_ACCEPT,BIO_R_ACCEPT_ERROR);		goto end;		}	if (addr == NULL) goto end;	l=ntohl(from.sin_addr.s_addr);	port=ntohs(from.sin_port);	if (*addr == NULL)		{		if ((p=OPENSSL_malloc(24)) == NULL)			{			BIOerr(BIO_F_BIO_ACCEPT,ERR_R_MALLOC_FAILURE);			goto end;			}		*addr=p;		}	BIO_snprintf(*addr,24,"%d.%d.%d.%d:%d",		     (unsigned char)(l>>24L)&0xff,		     (unsigned char)(l>>16L)&0xff,		     (unsigned char)(l>> 8L)&0xff,		     (unsigned char)(l     )&0xff,		     port);end:	return(ret);	}int BIO_set_tcp_ndelay(int s, int on)	{	int ret=0;#if defined(TCP_NODELAY) && (defined(IPPROTO_TCP) || defined(SOL_TCP))	int opt;#ifdef SOL_TCP	opt=SOL_TCP;#else#ifdef IPPROTO_TCP	opt=IPPROTO_TCP;#endif#endif		ret=setsockopt(s,opt,TCP_NODELAY,(char *)&on,sizeof(on));#endif	return(ret == 0);	}#endifint BIO_socket_nbio(int s, int mode)	{	int ret= -1;	int l;	l=mode;#ifdef FIONBIO	ret=BIO_socket_ioctl(s,FIONBIO,&l);#endif	return(ret == 0);	}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -