2008-12-09 21:36:07 +00:00
|
|
|
/* ipxwrapper - Winsock functions
|
|
|
|
* Copyright (C) 2008 Daniel Collins <solemnwarning@solemnwarning.net>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU General Public License version 2 as published by
|
|
|
|
* the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along with
|
|
|
|
* this program; if not, write to the Free Software Foundation, Inc., 51
|
|
|
|
* Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <windows.h>
|
|
|
|
#include <winsock2.h>
|
|
|
|
#include <wsipx.h>
|
|
|
|
#include <mswsock.h>
|
|
|
|
#include <nspapi.h>
|
|
|
|
|
|
|
|
#include "winstuff.h"
|
|
|
|
|
|
|
|
#include "ipxwrapper.h"
|
|
|
|
|
|
|
|
INT APIENTRY EnumProtocolsA(LPINT protocols, LPVOID buf, LPDWORD bsptr) {
|
|
|
|
int bufsize = *bsptr, rval, i, want_ipx = 0;
|
|
|
|
|
|
|
|
PROTOCOL_INFO *pinfo = buf;
|
|
|
|
|
|
|
|
rval = r_EnumProtocolsA(protocols, buf, bsptr);
|
|
|
|
if(rval == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!protocols) {
|
|
|
|
want_ipx = 1;
|
|
|
|
}else{
|
|
|
|
for(i = 0; protocols[i]; i++) {
|
|
|
|
if(protocols[i] == NSPROTO_IPX) {
|
|
|
|
want_ipx = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(want_ipx) {
|
|
|
|
for(i = 0; i < rval; i++) {
|
|
|
|
if(pinfo[i].iProtocol == NSPROTO_IPX) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(i == rval) {
|
|
|
|
*bsptr += sizeof(PROTOCOL_INFO);
|
|
|
|
rval++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(*bsptr > bufsize) {
|
|
|
|
SetLastError(ERROR_INSUFFICIENT_BUFFER);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
pinfo[i].dwServiceFlags = 5641;
|
|
|
|
pinfo[i].iAddressFamily = AF_IPX;
|
|
|
|
pinfo[i].iMaxSockAddr = 16;
|
|
|
|
pinfo[i].iMinSockAddr = 14;
|
|
|
|
pinfo[i].iSocketType = SOCK_DGRAM;
|
|
|
|
pinfo[i].iProtocol = NSPROTO_IPX;
|
|
|
|
pinfo[i].dwMessageSize = 576;
|
|
|
|
pinfo[i].lpProtocol = "IPX";
|
|
|
|
}
|
|
|
|
|
|
|
|
return rval;
|
|
|
|
}
|
|
|
|
|
|
|
|
INT APIENTRY EnumProtocolsW(LPINT protocols, LPVOID buf, LPDWORD bsptr) {
|
|
|
|
int bufsize = *bsptr, rval, i, want_ipx = 0;
|
|
|
|
|
|
|
|
PROTOCOL_INFO *pinfo = buf;
|
|
|
|
|
|
|
|
rval = r_EnumProtocolsW(protocols, buf, bsptr);
|
|
|
|
if(rval == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!protocols) {
|
|
|
|
want_ipx = 1;
|
|
|
|
}else{
|
|
|
|
for(i = 0; protocols[i]; i++) {
|
|
|
|
if(protocols[i] == NSPROTO_IPX) {
|
|
|
|
want_ipx = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(want_ipx) {
|
|
|
|
for(i = 0; i < rval; i++) {
|
|
|
|
if(pinfo[i].iProtocol == NSPROTO_IPX) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(i == rval) {
|
|
|
|
*bsptr += sizeof(PROTOCOL_INFO);
|
|
|
|
rval++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(*bsptr > bufsize) {
|
|
|
|
SetLastError(ERROR_INSUFFICIENT_BUFFER);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
pinfo[i].dwServiceFlags = 5641;
|
|
|
|
pinfo[i].iAddressFamily = AF_IPX;
|
|
|
|
pinfo[i].iMaxSockAddr = 16;
|
|
|
|
pinfo[i].iMinSockAddr = 14;
|
|
|
|
pinfo[i].iSocketType = SOCK_DGRAM;
|
|
|
|
pinfo[i].iProtocol = NSPROTO_IPX;
|
|
|
|
pinfo[i].dwMessageSize = 576;
|
|
|
|
pinfo[i].lpProtocol = (char*)L"IPX";
|
|
|
|
}
|
|
|
|
|
|
|
|
return rval;
|
|
|
|
}
|
|
|
|
|
|
|
|
int PASCAL WSARecvEx(SOCKET fd, char *buf, int len, int *flags) {
|
|
|
|
ipx_socket *ptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(ptr) {
|
|
|
|
if(!(ptr->flags & IPX_BOUND)) {
|
|
|
|
RETURN_WSA(WSAEINVAL, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct ipx_packet *packet = malloc(PACKET_BUF_SIZE);
|
|
|
|
if(!packet) {
|
|
|
|
RETURN_WSA(ERROR_OUTOFMEMORY, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
int rval = r_WSARecvEx(fd, (char*)packet, PACKET_BUF_SIZE, flags);
|
|
|
|
if(rval == -1) {
|
|
|
|
RETURN(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(packet->size <= len) {
|
|
|
|
memcpy(buf, packet->data, packet->size);
|
|
|
|
len = packet->size;
|
|
|
|
free(packet);
|
|
|
|
|
|
|
|
*flags = 0;
|
|
|
|
RETURN(len);
|
|
|
|
}else{
|
|
|
|
memcpy(buf, packet->data, len);
|
|
|
|
len = packet->size;
|
|
|
|
free(packet);
|
|
|
|
|
|
|
|
*flags = MSG_PARTIAL;
|
|
|
|
RETURN(len);
|
|
|
|
}
|
|
|
|
}else{
|
|
|
|
RETURN(r_WSARecvEx(fd, buf, len, flags));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
SOCKET WSAAPI socket(int af, int type, int protocol) {
|
|
|
|
debug("socket(%d, %d, %d)", af, type, protocol);
|
|
|
|
|
|
|
|
if(af == AF_IPX) {
|
|
|
|
ipx_socket *nsock = malloc(sizeof(ipx_socket));
|
|
|
|
if(!nsock) {
|
|
|
|
RETURN_WSA(ERROR_OUTOFMEMORY, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
INIT_SOCKET(nsock);
|
|
|
|
|
|
|
|
nsock->fd = r_socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
if(nsock->fd == -1) {
|
|
|
|
debug("...failed: %s", w32_error(WSAGetLastError()));
|
|
|
|
|
|
|
|
free(nsock);
|
|
|
|
RETURN(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(protocol) {
|
|
|
|
nsock->s_ptype = NSPROTO_IPX - protocol;
|
|
|
|
}
|
|
|
|
|
|
|
|
lock_mutex();
|
|
|
|
|
|
|
|
nsock->next = sockets;
|
|
|
|
sockets = nsock;
|
|
|
|
|
|
|
|
debug("...success: fd=%d", nsock->fd);
|
|
|
|
RETURN(nsock->fd);
|
|
|
|
}else{
|
|
|
|
return r_socket(af, type, protocol);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int WSAAPI closesocket(SOCKET fd) {
|
|
|
|
debug("closesocket(%d)", fd);
|
|
|
|
|
|
|
|
if(r_closesocket(fd) == SOCKET_ERROR) {
|
|
|
|
debug("...failed");
|
|
|
|
RETURN(SOCKET_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
ipx_socket *ptr = get_socket(fd);
|
|
|
|
ipx_socket *pptr = sockets;
|
|
|
|
|
|
|
|
debug("...success");
|
|
|
|
|
|
|
|
if(ptr == sockets) {
|
|
|
|
sockets = ptr->next;
|
|
|
|
free(ptr);
|
|
|
|
}else{
|
|
|
|
while(ptr && pptr->next) {
|
|
|
|
if(ptr == pptr->next) {
|
|
|
|
pptr->next = ptr->next;
|
|
|
|
free(ptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
pptr = pptr->next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
RETURN(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int WSAAPI bind(SOCKET fd, const struct sockaddr *addr, int addrlen) {
|
|
|
|
ipx_socket *ptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(ptr) {
|
|
|
|
struct sockaddr_ipx *ipxaddr = (struct sockaddr_ipx*)addr;
|
2011-04-24 01:23:10 +00:00
|
|
|
char net_s[12], node_s[18];
|
2008-12-09 21:36:07 +00:00
|
|
|
|
2011-04-24 01:23:10 +00:00
|
|
|
NET_TO_STRING(net_s, ipxaddr->sa_netnum);
|
|
|
|
NODE_TO_STRING(node_s, ipxaddr->sa_nodenum);
|
2008-12-09 21:36:07 +00:00
|
|
|
|
2011-04-24 01:23:10 +00:00
|
|
|
debug("bind(%d, net=%s node=%s socket=%hu)", fd, net_s, node_s, ntohs(ipxaddr->sa_socket));
|
2008-12-09 21:36:07 +00:00
|
|
|
|
2011-04-24 01:23:10 +00:00
|
|
|
if(ptr->flags & IPX_BOUND) {
|
|
|
|
debug("bind failed: socket already bound");
|
|
|
|
RETURN_WSA(WSAEINVAL, -1);
|
|
|
|
}
|
2008-12-09 21:36:07 +00:00
|
|
|
|
2011-04-24 01:23:10 +00:00
|
|
|
/* Network number 00:00:00:00 is specified as the "current" network, this code
|
|
|
|
* treats it as a wildcard when used for the network OR node numbers.
|
|
|
|
*
|
|
|
|
* According to MSDN 6, IPX socket numbers are unique to systems rather than
|
|
|
|
* interfaces and as such, the same socket number cannot be bound to more than
|
|
|
|
* one interface, my code lacks any "catch all" address like INADDR_ANY as I have
|
|
|
|
* not found any mentions of an equivalent address for IPX. This means that a
|
|
|
|
* given socket number may only be used on one interface.
|
|
|
|
*
|
|
|
|
* If you know the above information about IPX socket numbers to be incorrect,
|
|
|
|
* PLEASE email me with corrections!
|
|
|
|
*/
|
|
|
|
|
|
|
|
unsigned char z6[] = {0,0,0,0,0,0};
|
|
|
|
ipx_nic *nic = nics;
|
|
|
|
|
|
|
|
while(nic) {
|
|
|
|
if(
|
|
|
|
(memcmp(ipxaddr->sa_netnum, nic->ipx_net, 4) == 0 || memcmp(ipxaddr->sa_netnum, z6, 4) == 0) &&
|
|
|
|
(memcmp(ipxaddr->sa_nodenum, nic->ipx_node, 6) == 0 || memcmp(ipxaddr->sa_nodenum, z6, 6) == 0)
|
|
|
|
) {
|
|
|
|
break;
|
|
|
|
}
|
2008-12-09 21:36:07 +00:00
|
|
|
|
2011-04-24 01:23:10 +00:00
|
|
|
nic = nic->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!nic) {
|
|
|
|
debug("bind failed: no such address");
|
|
|
|
RETURN_WSA(WSAEADDRNOTAVAIL, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(ptr->netnum, nic->ipx_net, 4);
|
|
|
|
memcpy(ptr->nodenum, nic->ipx_node, 6);
|
|
|
|
|
|
|
|
if(ipxaddr->sa_socket == 0) {
|
|
|
|
/* Automatic socket allocations start at 1024, I have no idea if
|
|
|
|
* this is normal IPX behaviour, but IP does it and it doesn't seem
|
|
|
|
* to interfere with any IPX software I've tested.
|
|
|
|
*/
|
|
|
|
|
|
|
|
uint16_t s = 1024;
|
|
|
|
ipx_socket *socket = sockets;
|
2008-12-09 21:36:07 +00:00
|
|
|
|
2011-04-24 01:23:10 +00:00
|
|
|
while(socket) {
|
|
|
|
if(ntohs(socket->socket) == s && socket->flags & IPX_BOUND) {
|
|
|
|
if(s == 65535) {
|
|
|
|
debug("bind failed: out of sockets?!");
|
|
|
|
RETURN_WSA(WSAEADDRNOTAVAIL, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
s++;
|
|
|
|
socket = sockets;
|
|
|
|
|
|
|
|
continue;
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
2011-04-24 01:23:10 +00:00
|
|
|
socket = socket->next;
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
2011-04-24 01:23:10 +00:00
|
|
|
ptr->socket = htons(s);
|
|
|
|
}else{
|
|
|
|
/* Test if any bound socket is using the requested socket number. */
|
|
|
|
|
|
|
|
ipx_socket *socket = sockets;
|
|
|
|
|
|
|
|
while(socket) {
|
|
|
|
if(socket->socket == ipxaddr->sa_socket && socket->flags & IPX_BOUND) {
|
|
|
|
debug("bind failed: requested socket in use");
|
|
|
|
RETURN_WSA(WSAEADDRINUSE, -1);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
2011-04-24 01:23:10 +00:00
|
|
|
|
|
|
|
socket = socket->next;
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
2011-04-24 01:23:10 +00:00
|
|
|
ptr->socket = ipxaddr->sa_socket;
|
|
|
|
}
|
|
|
|
|
|
|
|
NET_TO_STRING(net_s, nic->ipx_net);
|
|
|
|
NODE_TO_STRING(node_s, nic->ipx_node);
|
|
|
|
|
|
|
|
debug("bind address: net=%s node=%s socket=%hu", net_s, node_s, ntohs(ptr->socket));
|
|
|
|
|
|
|
|
/* TODO: Bind fake socket in socket() call rather than here?
|
|
|
|
*
|
|
|
|
* I think I put the bind() call for it here so that the fd given to the
|
|
|
|
* program would be in the expected un-bound state, although I'm not sure
|
|
|
|
* if there are any winsock calls it could ONLY make on such a socket.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct sockaddr_in bind_addr;
|
|
|
|
bind_addr.sin_family = AF_INET;
|
|
|
|
bind_addr.sin_port = 0;
|
|
|
|
bind_addr.sin_addr.s_addr = inet_addr("127.0.0.1");
|
|
|
|
|
|
|
|
int rval = r_bind(fd, (struct sockaddr*)&bind_addr, sizeof(bind_addr));
|
|
|
|
|
|
|
|
if(rval == 0) {
|
2008-12-09 21:36:07 +00:00
|
|
|
ptr->flags |= IPX_BOUND;
|
|
|
|
}else{
|
2011-04-24 01:23:10 +00:00
|
|
|
debug("Binding fake socket failed: %s", w32_error(WSAGetLastError()));
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
RETURN(rval);
|
|
|
|
}else{
|
|
|
|
RETURN(r_bind(fd, addr, addrlen));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int WSAAPI getsockname(SOCKET fd, struct sockaddr *addr, int *addrlen) {
|
|
|
|
struct sockaddr_ipx *ipxaddr = (struct sockaddr_ipx*)addr;
|
|
|
|
ipx_socket *ptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(ptr) {
|
|
|
|
if(ptr->flags & IPX_BOUND) {
|
|
|
|
if(*addrlen < sizeof(struct sockaddr_ipx)) {
|
|
|
|
*addrlen = sizeof(struct sockaddr_ipx);
|
|
|
|
RETURN_WSA(WSAEFAULT, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
ipxaddr->sa_family = AF_IPX;
|
|
|
|
memcpy(ipxaddr->sa_netnum, ptr->netnum, 4);
|
|
|
|
memcpy(ipxaddr->sa_nodenum, ptr->nodenum, 6);
|
2011-04-24 01:26:21 +00:00
|
|
|
ipxaddr->sa_socket = ptr->socket;
|
2008-12-09 21:36:07 +00:00
|
|
|
|
|
|
|
*addrlen = sizeof(struct sockaddr_ipx);
|
|
|
|
|
|
|
|
RETURN(0);
|
|
|
|
}else{
|
|
|
|
RETURN_WSA(WSAEINVAL, -1);
|
|
|
|
}
|
|
|
|
}else{
|
|
|
|
RETURN(r_getsockname(fd, addr, addrlen));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int WSAAPI recvfrom(SOCKET fd, char *buf, int len, int flags, struct sockaddr *addr, int *addrlen) {
|
|
|
|
struct sockaddr_ipx *from = (struct sockaddr_ipx*)addr;
|
|
|
|
ipx_socket *ptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(ptr) {
|
|
|
|
if(!(ptr->flags & IPX_BOUND)) {
|
|
|
|
RETURN_WSA(WSAEINVAL, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct ipx_packet *packet = malloc(PACKET_BUF_SIZE);
|
|
|
|
if(!packet) {
|
|
|
|
RETURN_WSA(ERROR_OUTOFMEMORY, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
int rval = r_recv(fd, (char*)packet, PACKET_BUF_SIZE, flags);
|
|
|
|
if(rval == -1) {
|
|
|
|
free(packet);
|
|
|
|
RETURN(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(from) {
|
|
|
|
from->sa_family = AF_IPX;
|
|
|
|
memcpy(from->sa_netnum, packet->src_net, 4);
|
|
|
|
memcpy(from->sa_nodenum, packet->src_node, 6);
|
|
|
|
from->sa_socket = htons(packet->src_socket);
|
|
|
|
|
|
|
|
if(addrlen) {
|
|
|
|
*addrlen = sizeof(struct sockaddr_ipx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(packet->size <= len) {
|
|
|
|
memcpy(buf, packet->data, packet->size);
|
|
|
|
rval = packet->size;
|
|
|
|
free(packet);
|
|
|
|
|
|
|
|
RETURN(rval);
|
|
|
|
}else{
|
|
|
|
memcpy(buf, packet->data, len);
|
|
|
|
free(packet);
|
|
|
|
|
|
|
|
RETURN_WSA(WSAEMSGSIZE, -1);
|
|
|
|
}
|
|
|
|
}else{
|
|
|
|
RETURN(r_recvfrom(fd, buf, len, flags, addr, addrlen));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int WSAAPI recv(SOCKET fd, char *buf, int len, int flags) {
|
|
|
|
ipx_socket *ptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(ptr) {
|
|
|
|
if(!(ptr->flags & IPX_BOUND)) {
|
|
|
|
RETURN_WSA(WSAEINVAL, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct ipx_packet *packet = malloc(PACKET_BUF_SIZE);
|
|
|
|
if(!packet) {
|
|
|
|
RETURN_WSA(ERROR_OUTOFMEMORY, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
int rval = r_recv(fd, (char*)packet, PACKET_BUF_SIZE, flags);
|
|
|
|
if(rval == -1) {
|
|
|
|
free(packet);
|
|
|
|
RETURN(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(packet->size <= len) {
|
|
|
|
memcpy(buf, packet->data, packet->size);
|
|
|
|
rval = packet->size;
|
|
|
|
free(packet);
|
|
|
|
|
|
|
|
RETURN(rval);
|
|
|
|
}else{
|
|
|
|
memcpy(buf, packet->data, len);
|
|
|
|
free(packet);
|
|
|
|
|
|
|
|
RETURN_WSA(WSAEMSGSIZE, -1);
|
|
|
|
}
|
|
|
|
}else{
|
|
|
|
RETURN(r_recv(fd, buf, len, flags));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#define CHECK_OPTLEN(size) \
|
|
|
|
if(*optlen < size) {\
|
|
|
|
*optlen = size;\
|
|
|
|
RETURN_WSA(WSAEFAULT, -1);\
|
|
|
|
}\
|
|
|
|
*optlen = size;
|
|
|
|
|
|
|
|
int WSAAPI getsockopt(SOCKET fd, int level, int optname, char FAR *optval, int FAR *optlen) {
|
|
|
|
int* intval = (int*)optval;
|
|
|
|
|
|
|
|
ipx_socket *ptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(ptr) {
|
|
|
|
if(level == NSPROTO_IPX) {
|
|
|
|
if(optname == IPX_PTYPE) {
|
|
|
|
CHECK_OPTLEN(sizeof(int));
|
|
|
|
*intval = ptr->s_ptype;
|
2008-12-11 21:27:40 +00:00
|
|
|
|
|
|
|
RETURN(0);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(optname == IPX_FILTERPTYPE) {
|
|
|
|
CHECK_OPTLEN(sizeof(int));
|
|
|
|
*intval = ptr->f_ptype;
|
2008-12-11 21:27:40 +00:00
|
|
|
|
|
|
|
RETURN(0);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(optname == IPX_MAXSIZE) {
|
|
|
|
CHECK_OPTLEN(sizeof(int));
|
|
|
|
*intval = MAX_PACKET_SIZE;
|
2008-12-11 21:27:40 +00:00
|
|
|
|
|
|
|
RETURN(0);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(optname == IPX_ADDRESS) {
|
|
|
|
CHECK_OPTLEN(sizeof(IPX_ADDRESS_DATA));
|
|
|
|
|
|
|
|
IPX_ADDRESS_DATA *ipxdata = (IPX_ADDRESS_DATA*)optval;
|
|
|
|
|
|
|
|
ipx_nic *nic = nics;
|
|
|
|
int i = 0;
|
|
|
|
|
|
|
|
while(nic && i < ipxdata->adapternum) {
|
|
|
|
nic = nic->next;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!nic) {
|
|
|
|
WSASetLastError(ERROR_NO_DATA);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-04-24 01:37:25 +00:00
|
|
|
memcpy(ipxdata->netnum, nic->ipx_net, 4);
|
|
|
|
memcpy(ipxdata->nodenum, nic->ipx_node, 6);
|
2008-12-09 21:36:07 +00:00
|
|
|
|
|
|
|
/* TODO: LAN/WAN detection, link speed detection */
|
|
|
|
ipxdata->wan = FALSE;
|
|
|
|
ipxdata->status = FALSE;
|
|
|
|
ipxdata->maxpkt = MAX_PACKET_SIZE;
|
|
|
|
ipxdata->linkspeed = 100000; /* 10MBps */
|
2008-12-11 21:27:40 +00:00
|
|
|
|
|
|
|
RETURN(0);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
2011-04-24 01:37:25 +00:00
|
|
|
/* NOTE: IPX_MAX_ADAPTER_NUM implies it may be the maximum index
|
|
|
|
* for referencing an IPX interface. This behaviour makes no sense
|
|
|
|
* and a code example in MSDN implies it should be the number of
|
|
|
|
* IPX interfaces, this code follows the latter.
|
|
|
|
*/
|
2008-12-09 21:36:07 +00:00
|
|
|
if(optname == IPX_MAX_ADAPTER_NUM) {
|
|
|
|
CHECK_OPTLEN(sizeof(int));
|
|
|
|
|
|
|
|
*intval = 0;
|
|
|
|
|
|
|
|
ipx_nic *nic = nics;
|
|
|
|
while(nic) {
|
|
|
|
(*intval)++;
|
|
|
|
nic = nic->next;
|
|
|
|
}
|
2008-12-11 21:27:40 +00:00
|
|
|
|
|
|
|
RETURN(0);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
2008-12-11 21:27:40 +00:00
|
|
|
RETURN_WSA(WSAENOPROTOOPT, -1);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
RETURN(r_getsockopt(fd, level, optname, optval, optlen));
|
|
|
|
}
|
|
|
|
|
|
|
|
int WSAAPI setsockopt(SOCKET fd, int level, int optname, const char FAR *optval, int optlen) {
|
|
|
|
int *intval = (int*)optval;
|
|
|
|
BOOL *bval = (BOOL*)optval;
|
|
|
|
|
|
|
|
ipx_socket *sockptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(sockptr) {
|
|
|
|
if(level == NSPROTO_IPX) {
|
|
|
|
if(optname == IPX_PTYPE) {
|
|
|
|
sockptr->s_ptype = *intval;
|
2008-12-11 21:27:40 +00:00
|
|
|
RETURN(0);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(optname == IPX_FILTERPTYPE) {
|
|
|
|
sockptr->f_ptype = *intval;
|
|
|
|
sockptr->flags |= IPX_FILTER;
|
2008-12-11 21:27:40 +00:00
|
|
|
|
|
|
|
RETURN(0);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(optname == IPX_STOPFILTERPTYPE) {
|
|
|
|
sockptr->flags &= ~IPX_FILTER;
|
2008-12-11 21:27:40 +00:00
|
|
|
RETURN(0);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
2008-12-11 21:27:40 +00:00
|
|
|
RETURN_WSA(WSAENOPROTOOPT, -1);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(level == SOL_SOCKET) {
|
|
|
|
if(optname == SO_BROADCAST) {
|
|
|
|
if(*bval == TRUE) {
|
|
|
|
sockptr->flags |= IPX_BROADCAST;
|
|
|
|
}else{
|
|
|
|
sockptr->flags &= ~IPX_BROADCAST;
|
|
|
|
}
|
2008-12-11 21:30:34 +00:00
|
|
|
|
|
|
|
RETURN(0);
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
RETURN(r_setsockopt(fd, level, optname, optval, optlen));
|
|
|
|
}
|
|
|
|
|
|
|
|
int WSAAPI sendto(SOCKET fd, const char *buf, int len, int flags, const struct sockaddr *addr, int addrlen) {
|
|
|
|
struct sockaddr_ipx *ipxaddr = (struct sockaddr_ipx*)addr;
|
|
|
|
|
|
|
|
ipx_socket *sockptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(sockptr) {
|
|
|
|
if(!addr || addrlen < sizeof(struct sockaddr_ipx)) {
|
|
|
|
RETURN_WSA(WSAEDESTADDRREQ, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!(sockptr->flags & IPX_SEND)) {
|
|
|
|
RETURN_WSA(WSAESHUTDOWN, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!(sockptr->flags & IPX_BOUND)) {
|
2011-04-24 02:08:37 +00:00
|
|
|
debug("sendto() on unbound socket, attempting implicit bind");
|
2008-12-11 21:52:28 +00:00
|
|
|
|
2011-04-24 02:08:37 +00:00
|
|
|
struct sockaddr_ipx bind_addr;
|
|
|
|
|
|
|
|
bind_addr.sa_family = AF_IPX;
|
|
|
|
memcpy(bind_addr.sa_netnum, ipxaddr->sa_netnum, 4);
|
|
|
|
memset(bind_addr.sa_nodenum, 0, 6);
|
|
|
|
bind_addr.sa_socket = 0;
|
|
|
|
|
|
|
|
if(bind(fd, (struct sockaddr*)&bind_addr, sizeof(bind_addr)) == -1) {
|
2008-12-11 21:52:28 +00:00
|
|
|
RETURN(-1);
|
|
|
|
}
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(len > MAX_PACKET_SIZE) {
|
|
|
|
RETURN_WSA(WSAEMSGSIZE, -1);
|
|
|
|
}
|
|
|
|
|
2011-04-24 02:08:37 +00:00
|
|
|
int psize = sizeof(ipx_packet)+len-1;
|
2008-12-09 21:36:07 +00:00
|
|
|
|
2011-04-24 02:08:37 +00:00
|
|
|
ipx_packet *packet = malloc(psize);
|
2008-12-09 21:36:07 +00:00
|
|
|
if(!packet) {
|
|
|
|
RETURN_WSA(ERROR_OUTOFMEMORY, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
INIT_PACKET(packet);
|
|
|
|
packet->ptype = sockptr->s_ptype;
|
|
|
|
|
|
|
|
memcpy(packet->dest_net, ipxaddr->sa_netnum, 4);
|
|
|
|
memcpy(packet->dest_node, ipxaddr->sa_nodenum, 6);
|
|
|
|
packet->dest_socket = ipxaddr->sa_socket;
|
|
|
|
|
2011-04-24 02:08:37 +00:00
|
|
|
memcpy(packet->src_net, sockptr->netnum, 4);
|
|
|
|
memcpy(packet->src_node, sockptr->nodenum, 6);
|
|
|
|
packet->src_socket = sockptr->socket;
|
|
|
|
|
2008-12-09 21:36:07 +00:00
|
|
|
packet->size = htons(len);
|
|
|
|
memcpy(packet->data, buf, len);
|
|
|
|
|
2011-04-24 02:08:37 +00:00
|
|
|
/* TODO: Only send out enabled interfaces */
|
2008-12-09 21:36:07 +00:00
|
|
|
|
2011-04-24 02:08:37 +00:00
|
|
|
struct sockaddr_in saddr;
|
|
|
|
saddr.sin_family = AF_INET;
|
|
|
|
saddr.sin_addr.s_addr = INADDR_BROADCAST;
|
|
|
|
saddr.sin_port = htons(PORT);
|
2008-12-09 21:36:07 +00:00
|
|
|
|
2011-04-24 02:08:37 +00:00
|
|
|
int sval = r_sendto(net_fd, (char*)packet, psize, 0, (struct sockaddr*)&saddr, sizeof(saddr));
|
|
|
|
if(sval == -1) {
|
|
|
|
len = -1;
|
2008-12-09 21:36:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
free(packet);
|
|
|
|
RETURN(len);
|
|
|
|
}else{
|
|
|
|
RETURN(r_sendto(fd, buf, len, flags, addr, addrlen));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int PASCAL shutdown(SOCKET fd, int cmd) {
|
|
|
|
ipx_socket *sockptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(sockptr) {
|
|
|
|
if(cmd == SD_SEND || cmd == SD_BOTH) {
|
|
|
|
sockptr->flags &= ~IPX_SEND;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(cmd == SD_RECEIVE || cmd == SD_BOTH) {
|
|
|
|
sockptr->flags &= ~IPX_RECV;
|
|
|
|
}
|
|
|
|
|
|
|
|
RETURN(0);
|
|
|
|
}else{
|
|
|
|
RETURN(r_shutdown(fd, cmd));
|
|
|
|
}
|
|
|
|
}
|
2010-01-09 16:20:18 +00:00
|
|
|
|
|
|
|
int PASCAL ioctlsocket(SOCKET fd, long cmd, u_long *argp) {
|
|
|
|
ipx_socket *sockptr = get_socket(fd);
|
|
|
|
|
|
|
|
if(sockptr && cmd == FIONREAD) {
|
|
|
|
ipx_packet packet;
|
|
|
|
fd_set fdset;
|
|
|
|
struct timeval tv = {0,0};
|
|
|
|
|
|
|
|
FD_ZERO(&fdset);
|
|
|
|
FD_SET(sockptr->fd, &fdset);
|
|
|
|
|
|
|
|
int r = select(1, &fdset, NULL, NULL, &tv);
|
|
|
|
if(r == -1) {
|
|
|
|
RETURN(-1);
|
|
|
|
}else if(r == 0) {
|
|
|
|
*(unsigned long*)argp = 0;
|
|
|
|
RETURN(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
r = r_recv(sockptr->fd, (char*)&packet, sizeof(packet), MSG_PEEK);
|
|
|
|
if(r == -1 && WSAGetLastError() != WSAEMSGSIZE) {
|
|
|
|
RETURN(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
*(unsigned long*)argp = packet.size;
|
|
|
|
RETURN(0);
|
|
|
|
}else{
|
|
|
|
RETURN(r_ioctlsocket(fd, cmd, argp));
|
|
|
|
}
|
|
|
|
}
|