/*++ Copyright (c) 1995-1997 Microsoft Corporation Module Name: icsocket.hxx Abstract: Contains types, manifests, prototypes for Internet Socket Class (ICSocket) functions and methods (in common\icsocket.cxx) Author: Richard L Firth (rfirth) 24-May-1995 Revision History: 24-May-1995 rfirth Created 20-March-1996 arthurbi Created the CSOCKET class. 08-Apr-1997 rfirth Changed to ICSocket class (Internet CSocket to avoid issues with MFC). Base socket implementation. Secure sockets is a derived class in ssocket.hxx/.cxx --*/ // // manifests // #define HOST_INADDR_ANY 0x00000000 #define HOST_INADDR_NONE 0xffffffff #define HOST_INADDR_LOOPBACK 0x0100007f // // common flags for ConnectSocket(), SocketSend(), SocketReceive(), // SocketDataAvailable() // #define SF_ENCRYPT 0x00000001 // encrypt data (send) #define SF_DECRYPT 0x00000002 // decrypt data (receive) #define SF_EXPAND 0x00000004 // input buffer can be expanded to fit (receive) #define SF_COMPRESS 0x00000008 // input buffer can be compressed to fit (receive) #define SF_RECEIVE_ALL 0x00000010 // loop until buffer full/all data received (receive) #define SF_INDICATE 0x00000020 // provide status callbacks #define SF_NON_BLOCKING 0x00000040 // socket is non-blocking #define SF_WAIT 0x00000080 // wait for data if non-blocking #define SF_IGNORE_CONNRESET 0x00000100 // SPX_SUPPORT #define SF_SENDING_DATA 0x00000200 // data is being sent through the socket, errors may now apply. #define SF_SCH_REDO 0x00000400 // schannel is redone. #define SF_CONNECTIONLESS 0x00000800 // send/receive datagrams #define SF_EXPEDITED 0x00001000 // function expected to complete quickly (test with select()) #define SF_AUTHORIZED 0x00002000 // set if we added an authorization header #define SF_RANDOM 0x00004000 // set if we connect to address list entry chosen at random #define SF_FORCE 0x00008000 // set if the name must be resolved (ResolveHost) #define SF_SECURE 0x00010000 // set if this is a secure (SSL/PCT) socket object #define SF_NO_WAIT 0x00020000 // set if one-shot operation required (Receive) #define SF_KEEP_ALIVE 0x00040000 // set if connection is keep-alive #define SF_PIPELINED 0x00080000 // set if connection is pipelined (HTTP 1.1) #define SF_PERUSER 0x00100000 // set if authorization header is added so response marked per-user in shared cache #define SF_AUTHENTICATED 0x00200000 // set if authentication was successful on this socket. #define SF_TUNNEL 0x00400000 // set if this connection is a nested CONNECT directly to a proxy // // types // // // SOCKET_BUFFER_ID - which socket buffer we are dealing with // typedef enum { ReceiveBuffer = SO_RCVBUF, SendBuffer = SO_SNDBUF } SOCKET_BUFFER_ID; // // timeout types for SetSocketTimeout // #define SEND_TIMEOUT 1 #define RECEIVE_TIMEOUT 0 // // macros // #define IS_VALID_NON_LOOPBACK_IP_ADDRESS(address) \ (((address) != HOST_INADDR_ANY) \ && ((address) != HOST_INADDR_NONE) \ && ((address) != HOST_INADDR_LOOPBACK)) // // prototypes // LPSTR MapNetAddressToName( IN LPSTR lpszAddress, OUT LPSTR * lplpszMappedName ); //DWORD //GetServiceAddress( // IN LPSTR HostName, // IN DWORD Port, // OUT LPADDRESS_INFO_LIST AddressList // ); // //BOOL //IsNetAddress( // IN LPSTR lpszAddress // ); // //#if INET_DEBUG // //DEBUG_FUNCTION //VOID //InitializeAddressList( // IN LPADDRESS_INFO_LIST AddressList // ); // //DEBUG_FUNCTION //VOID //FreeAddressList( // IN LPADDRESS_INFO_LIST AddressList // ); // //DEBUG_FUNCTION //BOOL //IsAddressListEmpty( // IN LPADDRESS_INFO_LIST AddressList // ); // //#else // //#define InitializeAddressList(AddressList) \ // (AddressList)->AddressCount = 0; \ // (AddressList)->Addresses = NULL // //#define FreeAddressList(AddressList) \ // if ((AddressList)->AddressCount != 0) { \ // (AddressList)->Addresses = (LPCSADDR_INFO)FREE_MEMORY((HLOCAL)((AddressList)->Addresses)); \ // (AddressList)->AddressCount = 0; \ // } // //#define IsAddressListEmpty(AddressList) \ // (((AddressList)->AddressCount == 0) ? TRUE : FALSE) // //#endif // INET_DEBUG // //DWORD //DestinationAddressFromAddressList( // IN LPADDRESS_INFO_LIST lpAddressList, // IN DWORD dwIndex, // OUT LPBYTE lpbDestinationAddress, // IN OUT LPDWORD lpdwDestinationAddressLength // ); // //DWORD //InterfaceAddressFromSocket( // IN SOCKET Socket, // OUT LPBYTE lpbInterfaceAddress, // IN OUT LPDWORD lpdwInterfaceAddressLength // ); // // classes // // // forward references // class CFsm_SocketConnect; class CFsm_SocketSend; class CFsm_SocketReceive; class CServerInfo; // // ICSocket - abstracts a TCP/IP connection // class ICSocket { protected: LIST_ENTRY m_List; // keep-alive list DWORD m_dwTimeout; // keep-alive expiry BOOL m_fTimeoutWraps; LONG m_ReferenceCount; SOCKET m_Socket; DWORD m_dwFlags; INTERNET_PORT m_Port; // needed for keep-alive INTERNET_PORT m_SourcePort; BOOL m_bAborted; DWORD m_SocksAddress; INTERNET_PORT m_SocksPort; //HINTERNET m_hRequest; BOOL m_fExemptConnLImit; #if INET_DEBUG #define ICSOCKET_SIGNATURE 0x6b636f53 // "Sock" DWORD m_Signature; #define SIGN_ICSOCKET() \ m_Signature = ICSOCKET_SIGNATURE #define CHECK_ICSOCKET() \ INET_ASSERT((m_Signature == ICSOCKET_SIGNATURE) || (m_Signature == SECURE_SOCKET_SIGNATURE)) #else #define SIGN_ICSOCKET() \ /* NOTHING */ #define CHECK_ICSOCKET() \ /* NOTHING */ #endif public: ICSocket(); virtual ~ICSocket(); void ExemptConnLimit(void) { m_fExemptConnLImit = TRUE; } BOOL ConnLimitExempted(void) const { return m_fExemptConnLImit; } void ResetExemptFlag(void) { m_fExemptConnLImit = FALSE; } VOID Destroy( VOID ); PLIST_ENTRY List(VOID) { return &m_List; } PLIST_ENTRY Next(VOID) { return m_List.Flink; } BOOL IsOnList(VOID) { return ((m_List.Flink == NULL) && (m_List.Blink == NULL)) ? FALSE : TRUE; } VOID Reference( VOID ); BOOL Dereference( VOID ); LONG ReferenceCount(VOID) const { return m_ReferenceCount; } BOOL IsValid(VOID) { return (m_Socket != INVALID_SOCKET) ? TRUE : FALSE; } BOOL IsInvalid(VOID) { return !IsValid(); } BOOL IsOpen(VOID) { return IsValid(); } BOOL IsClosed(VOID) { return !IsOpen(); } SOCKET GetSocket(VOID) const { return m_Socket; } VOID SetSocket(SOCKET Socket) { m_Socket = Socket; } BOOL IsNonBlocking(VOID) { return (m_dwFlags & SF_NON_BLOCKING) ? TRUE : FALSE; } BOOL IsSecure(VOID) const { return (m_dwFlags & SF_SECURE) ? TRUE : FALSE; } VOID SetEncryption(VOID) { m_dwFlags |= SF_ENCRYPT | SF_DECRYPT; } VOID ResetEncryption(VOID) { m_dwFlags &= ~(SF_ENCRYPT | SF_DECRYPT); } DWORD GetFlags(VOID) const { return m_dwFlags; } VOID SetAuthorized(VOID) { m_dwFlags |= SF_AUTHORIZED; } BOOL IsAuthorized(VOID) { return (m_dwFlags & SF_AUTHORIZED) ? TRUE : FALSE; } VOID SetAuthenticated(VOID) { m_dwFlags |= SF_AUTHENTICATED; } BOOL IsAuthenticated(VOID) { return (m_dwFlags & SF_AUTHENTICATED) ? TRUE : FALSE; } VOID SetPerUser (VOID) { m_dwFlags |= SF_PERUSER; } BOOL IsPerUser(VOID) { return (m_dwFlags & SF_PERUSER) ? TRUE : FALSE; } VOID SetKeepAlive(VOID) { m_dwFlags |= SF_KEEP_ALIVE; } VOID ResetKeepAlive(VOID) { m_dwFlags &= ~SF_KEEP_ALIVE; } BOOL IsKeepAlive(VOID) { return (m_dwFlags & SF_KEEP_ALIVE) ? TRUE : FALSE; } VOID SetPipelined(VOID) { m_dwFlags |= SF_PIPELINED; } VOID ResetPipelined(VOID) { m_dwFlags &= ~SF_PIPELINED; } BOOL IsPipelined(VOID) { return (m_dwFlags & SF_PIPELINED) ? TRUE : FALSE; } BOOL Match(DWORD dwFlags) { return ((m_dwFlags & dwFlags) == dwFlags) ? TRUE : FALSE; } virtual BOOL MatchTunnelSemantics(DWORD dwFlags, LPSTR pszHostName = NULL) { return ((m_dwFlags & SF_TUNNEL) == (dwFlags & SF_TUNNEL)) ? TRUE : FALSE; } VOID SetPort(INTERNET_PORT Port) { m_Port = Port; } INTERNET_PORT GetPort(VOID) const { return m_Port; } VOID SetSourcePort(VOID); VOID SetSourcePort(INTERNET_PORT Port) { m_SourcePort = Port; } INTERNET_PORT GetSourcePort(VOID) const { return m_SourcePort; } VOID SetAborted(VOID) { m_bAborted = TRUE; } BOOL IsAborted(VOID) const { return m_bAborted; } DWORD GetServiceAddress( IN LPSTR HostName, IN DWORD Port ); virtual DWORD Connect( IN LONG Timeout, IN INT Retries, IN DWORD dwFlags ); DWORD SocketConnect( IN LONG Timeout, IN INT Retries, IN DWORD dwFlags, IN CServerInfo *pServerInfo ); DWORD Connect_Start( IN CFsm_SocketConnect * Fsm ); DWORD Connect_Continue( IN CFsm_SocketConnect * Fsm ); DWORD Connect_Error( IN CFsm_SocketConnect * Fsm ); DWORD Connect_Finish( IN CFsm_SocketConnect * Fsm ); int SocksConnect( IN LPSOCKADDR_IN pSockaddr, IN INT nLen ); virtual DWORD Disconnect( IN DWORD dwFlags = 0 ); DWORD Close( VOID ); DWORD Abort( VOID ); DWORD Shutdown( IN DWORD dwControl ); BOOL IsReset( VOID ); virtual DWORD Send( IN LPVOID lpBuffer, IN DWORD dwBufferLength, IN DWORD dwFlags ); DWORD Send_Start( IN CFsm_SocketSend * Fsm ); virtual DWORD Receive( IN OUT LPVOID* lplpBuffer, IN OUT LPDWORD lpdwBufferLength, IN OUT LPDWORD lpdwBufferRemaining, IN OUT LPDWORD lpdwBytesReceived, IN DWORD dwExtraSpace, IN DWORD dwFlags, OUT LPBOOL lpbEof ); DWORD Receive_Start( IN CFsm_SocketReceive * Fsm ); DWORD Receive_Continue( IN CFsm_SocketReceive * Fsm ); DWORD Receive_Finish( IN CFsm_SocketReceive * Fsm ); DWORD SetTimeout( IN DWORD Type, IN int Timeout ); DWORD SetLinger( IN BOOL Linger, IN int Timeout ); DWORD SetNonBlockingMode( IN BOOL bNonBlocking ); DWORD GetBufferLength( IN SOCKET_BUFFER_ID SocketBufferId ); DWORD GetBufferLength( IN SOCKET_BUFFER_ID SocketBufferId, OUT LPDWORD lpdwBufferLength ); DWORD SetBufferLength( IN SOCKET_BUFFER_ID SocketBufferId, IN DWORD dwBufferLength ); DWORD SetSendCoalescing( IN BOOL bOnOff ); // This code needs to handle system time roll over. // SetExpireTime is passed the duration, and we calculate the ultimate time // However, this may result in a rollover -- e.g. if the current time is // 0xffffff00, the ultimate time could be 0x000000fd // HasExpired is passed the current tick count, however, and in the past // would return TRUE immediately. // Thus we set a flag is we need to wait for system time rollover to happen, VOID SetExpiryTime( IN DWORD dwTimeout = GlobalKeepAliveSocketTimeout ) { DWORD dw = GetTickCountWrap(); m_dwTimeout = dw + dwTimeout; m_fTimeoutWraps = (m_dwTimeout < dw); } DWORD GetExpiryTime(VOID) const { return m_dwTimeout; } BOOL HasExpired( IN DWORD dwTime = GetTickCountWrap() ) { if (m_fTimeoutWraps) { m_fTimeoutWraps = ((LONG)dwTime < 0); } return ((m_dwTimeout == 0) || m_fTimeoutWraps) ? FALSE : (dwTime > m_dwTimeout); } DWORD DataAvailable( OUT LPDWORD lpdwDataAvailable ); DWORD DataAvailable2( OUT LPVOID lpBuffer, IN DWORD dwBufferLength, OUT LPDWORD lpdwBytesAvailable ); DWORD WaitForReceive( IN DWORD Timeout ); DWORD AllocateQueryBuffer( OUT LPVOID * lplpBuffer, OUT LPDWORD lpdwBufferLength ); VOID FreeQueryBuffer( IN LPVOID lpBuffer ); DWORD EnableSocks( IN LPSTR lpSocksHost, IN INTERNET_PORT ipSocksPort ); BOOL IsSocks(VOID) { return m_SocksAddress != 0; } DWORD CreateSocket( IN DWORD dwFlags, IN int nFamily, IN int nType, IN int nProtocol ); DWORD GetSockName( IN PSOCKADDR psaSockName, IN int SockNameSize ); DWORD GetPeerName( IN PSOCKADDR psaSockName, IN int SockNameSize ); DWORD Listen( VOID ); DWORD DirectConnect( IN PSOCKADDR psaRemoteSock ); DWORD SelectAccept( IN ICSocket & acceptSocket, IN DWORD dwTimeout ); DWORD GetBytesAvailable( OUT LPDWORD lpdwBytesAvailable ); //VOID //SetServiceAddress( // IN LPADDRESS_INFO_LIST AddressList // ) //{ // m_fOwnAddressList = FALSE; // m_AddressList.Addresses = AddressList->Addresses; // m_AddressList.AddressCount = AddressList->AddressCount; //} //DWORD //GetServiceAddress( // IN LPSTR HostName OPTIONAL, // IN LPSTR ServiceName OPTIONAL, // IN LPGUID ServiceGuid OPTIONAL, // IN DWORD NameSpace, // IN DWORD Port, // IN DWORD ProtocolCharacteristics // ) //{ // return ::GetServiceAddress( // HostName, // ServiceName, // ServiceGuid, // NameSpace, // Port, // ProtocolCharacteristics, // &m_AddressList // ); //} // // friend functions // friend ICSocket * ContainingICSocket( LPVOID lpAddress ); };