| 1 | /********** | 
|---|
| 2 | This library is free software; you can redistribute it and/or modify it under | 
|---|
| 3 | the terms of the GNU Lesser General Public License as published by the | 
|---|
| 4 | Free Software Foundation; either version 3 of the License, or (at your | 
|---|
| 5 | option) any later version. (See <http://www.gnu.org/copyleft/lesser.html>.) | 
|---|
| 6 |  | 
|---|
| 7 | This library is distributed in the hope that it will be useful, but WITHOUT | 
|---|
| 8 | ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS | 
|---|
| 9 | FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public License for | 
|---|
| 10 | more details. | 
|---|
| 11 |  | 
|---|
| 12 | You should have received a copy of the GNU Lesser General Public License | 
|---|
| 13 | along with this library; if not, write to the Free Software Foundation, Inc., | 
|---|
| 14 | 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301  USA | 
|---|
| 15 | **********/ | 
|---|
| 16 | // "mTunnel" multicast access service | 
|---|
| 17 | // Copyright (c) 1996-2020 Live Networks, Inc.  All rights reserved. | 
|---|
| 18 | // Helper routines to implement 'group sockets' | 
|---|
| 19 | // Implementation | 
|---|
| 20 |  | 
|---|
| 21 | #include "GroupsockHelper.hh" | 
|---|
| 22 |  | 
|---|
| 23 | #if (defined(__WIN32__) || defined(_WIN32)) && !defined(__MINGW32__) | 
|---|
| 24 | #include <time.h> | 
|---|
| 25 | extern "C"int initializeWinsockIfNecessary(); | 
|---|
| 26 | #else | 
|---|
| 27 | #include <stdarg.h> | 
|---|
| 28 | #include <time.h> | 
|---|
| 29 | #include <sys/time.h> | 
|---|
| 30 | #if !defined(_WIN32) | 
|---|
| 31 | #include <netinet/tcp.h> | 
|---|
| 32 | #ifdef __ANDROID_NDK__ | 
|---|
| 33 | #include <android/ndk-version.h> | 
|---|
| 34 | #define ANDROID_OLD_NDK __NDK_MAJOR__ < 17 | 
|---|
| 35 | #endif | 
|---|
| 36 | #endif | 
|---|
| 37 | #include <fcntl.h> | 
|---|
| 38 | #define initializeWinsockIfNecessary() 1 | 
|---|
| 39 | #endif | 
|---|
| 40 | #if defined(__WIN32__) || defined(_WIN32) || defined(_QNX4) | 
|---|
| 41 | #else | 
|---|
| 42 | #include <signal.h> | 
|---|
| 43 | #define USE_SIGNALS 1 | 
|---|
| 44 | #endif | 
|---|
| 45 | #include <stdio.h> | 
|---|
| 46 |  | 
|---|
| 47 | // By default, use INADDR_ANY for the sending and receiving interfaces: | 
|---|
| 48 | netAddressBits SendingInterfaceAddr = INADDR_ANY; | 
|---|
| 49 | netAddressBits ReceivingInterfaceAddr = INADDR_ANY; | 
|---|
| 50 |  | 
|---|
| 51 | static void socketErr(UsageEnvironment& env, char const* errorMsg) { | 
|---|
| 52 | env.setResultErrMsg(errorMsg); | 
|---|
| 53 | } | 
|---|
| 54 |  | 
|---|
| 55 | NoReuse::NoReuse(UsageEnvironment& env) | 
|---|
| 56 | : fEnv(env) { | 
|---|
| 57 | groupsockPriv(fEnv)->reuseFlag = 0; | 
|---|
| 58 | } | 
|---|
| 59 |  | 
|---|
| 60 | NoReuse::~NoReuse() { | 
|---|
| 61 | groupsockPriv(fEnv)->reuseFlag = 1; | 
|---|
| 62 | reclaimGroupsockPriv(fEnv); | 
|---|
| 63 | } | 
|---|
| 64 |  | 
|---|
| 65 |  | 
|---|
| 66 | _groupsockPriv* groupsockPriv(UsageEnvironment& env) { | 
|---|
| 67 | if (env.groupsockPriv == NULL) { // We need to create it | 
|---|
| 68 | _groupsockPriv* result = new _groupsockPriv; | 
|---|
| 69 | result->socketTable = NULL; | 
|---|
| 70 | result->reuseFlag = 1; // default value => allow reuse of socket numbers | 
|---|
| 71 | env.groupsockPriv = result; | 
|---|
| 72 | } | 
|---|
| 73 | return (_groupsockPriv*)(env.groupsockPriv); | 
|---|
| 74 | } | 
|---|
| 75 |  | 
|---|
| 76 | void reclaimGroupsockPriv(UsageEnvironment& env) { | 
|---|
| 77 | _groupsockPriv* priv = (_groupsockPriv*)(env.groupsockPriv); | 
|---|
| 78 | if (priv->socketTable == NULL && priv->reuseFlag == 1/*default value*/) { | 
|---|
| 79 | // We can delete the structure (to save space); it will get created again, if needed: | 
|---|
| 80 | delete priv; | 
|---|
| 81 | env.groupsockPriv = NULL; | 
|---|
| 82 | } | 
|---|
| 83 | } | 
|---|
| 84 |  | 
|---|
| 85 | static int createSocket(int type) { | 
|---|
| 86 | // Call "socket()" to create a (IPv4) socket of the specified type. | 
|---|
| 87 | // But also set it to have the 'close on exec' property (if we can) | 
|---|
| 88 | int sock; | 
|---|
| 89 |  | 
|---|
| 90 | #ifdef SOCK_CLOEXEC | 
|---|
| 91 | sock = socket(AF_INET, type|SOCK_CLOEXEC, 0); | 
|---|
| 92 | if (sock != -1 || errno != EINVAL) return sock; | 
|---|
| 93 | // An "errno" of EINVAL likely means that the system wasn't happy with the SOCK_CLOEXEC; fall through and try again without it: | 
|---|
| 94 | #endif | 
|---|
| 95 |  | 
|---|
| 96 | sock = socket(AF_INET, type, 0); | 
|---|
| 97 | #ifdef FD_CLOEXEC | 
|---|
| 98 | if (sock != -1) fcntl(sock, F_SETFD, FD_CLOEXEC); | 
|---|
| 99 | #endif | 
|---|
| 100 | return sock; | 
|---|
| 101 | } | 
|---|
| 102 |  | 
|---|
| 103 | int setupDatagramSocket(UsageEnvironment& env, Port port) { | 
|---|
| 104 | if (!initializeWinsockIfNecessary()) { | 
|---|
| 105 | socketErr(env, "Failed to initialize 'winsock': "); | 
|---|
| 106 | return -1; | 
|---|
| 107 | } | 
|---|
| 108 |  | 
|---|
| 109 | int newSocket = createSocket(SOCK_DGRAM); | 
|---|
| 110 | if (newSocket < 0) { | 
|---|
| 111 | socketErr(env, "unable to create datagram socket: "); | 
|---|
| 112 | return newSocket; | 
|---|
| 113 | } | 
|---|
| 114 |  | 
|---|
| 115 | int reuseFlag = groupsockPriv(env)->reuseFlag; | 
|---|
| 116 | reclaimGroupsockPriv(env); | 
|---|
| 117 | if (setsockopt(newSocket, SOL_SOCKET, SO_REUSEADDR, | 
|---|
| 118 | (const char*)&reuseFlag, sizeof reuseFlag) < 0) { | 
|---|
| 119 | socketErr(env, "setsockopt(SO_REUSEADDR) error: "); | 
|---|
| 120 | closeSocket(newSocket); | 
|---|
| 121 | return -1; | 
|---|
| 122 | } | 
|---|
| 123 |  | 
|---|
| 124 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 125 | // Windoze doesn't properly handle SO_REUSEPORT or IP_MULTICAST_LOOP | 
|---|
| 126 | #else | 
|---|
| 127 | #ifdef SO_REUSEPORT | 
|---|
| 128 | if (setsockopt(newSocket, SOL_SOCKET, SO_REUSEPORT, | 
|---|
| 129 | (const char*)&reuseFlag, sizeof reuseFlag) < 0) { | 
|---|
| 130 | socketErr(env, "setsockopt(SO_REUSEPORT) error: "); | 
|---|
| 131 | closeSocket(newSocket); | 
|---|
| 132 | return -1; | 
|---|
| 133 | } | 
|---|
| 134 | #endif | 
|---|
| 135 |  | 
|---|
| 136 | #ifdef IP_MULTICAST_LOOP | 
|---|
| 137 | const u_int8_t loop = 1; | 
|---|
| 138 | if (setsockopt(newSocket, IPPROTO_IP, IP_MULTICAST_LOOP, | 
|---|
| 139 | (const char*)&loop, sizeof loop) < 0) { | 
|---|
| 140 | socketErr(env, "setsockopt(IP_MULTICAST_LOOP) error: "); | 
|---|
| 141 | closeSocket(newSocket); | 
|---|
| 142 | return -1; | 
|---|
| 143 | } | 
|---|
| 144 | #endif | 
|---|
| 145 | #endif | 
|---|
| 146 |  | 
|---|
| 147 | // Note: Windoze requires binding, even if the port number is 0 | 
|---|
| 148 | netAddressBits addr = INADDR_ANY; | 
|---|
| 149 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 150 | #else | 
|---|
| 151 | if (port.num() != 0 || ReceivingInterfaceAddr != INADDR_ANY) { | 
|---|
| 152 | #endif | 
|---|
| 153 | if (port.num() == 0) addr = ReceivingInterfaceAddr; | 
|---|
| 154 | MAKE_SOCKADDR_IN(name, addr, port.num()); | 
|---|
| 155 | if (bind(newSocket, (struct sockaddr*)&name, sizeof name) != 0) { | 
|---|
| 156 | char tmpBuffer[100]; | 
|---|
| 157 | sprintf(tmpBuffer, "bind() error (port number: %d): ", | 
|---|
| 158 | ntohs(port.num())); | 
|---|
| 159 | socketErr(env, tmpBuffer); | 
|---|
| 160 | closeSocket(newSocket); | 
|---|
| 161 | return -1; | 
|---|
| 162 | } | 
|---|
| 163 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 164 | #else | 
|---|
| 165 | } | 
|---|
| 166 | #endif | 
|---|
| 167 |  | 
|---|
| 168 | // Set the sending interface for multicasts, if it's not the default: | 
|---|
| 169 | if (SendingInterfaceAddr != INADDR_ANY) { | 
|---|
| 170 | struct in_addr addr; | 
|---|
| 171 | addr.s_addr = SendingInterfaceAddr; | 
|---|
| 172 |  | 
|---|
| 173 | if (setsockopt(newSocket, IPPROTO_IP, IP_MULTICAST_IF, | 
|---|
| 174 | (const char*)&addr, sizeof addr) < 0) { | 
|---|
| 175 | socketErr(env, "error setting outgoing multicast interface: "); | 
|---|
| 176 | closeSocket(newSocket); | 
|---|
| 177 | return -1; | 
|---|
| 178 | } | 
|---|
| 179 | } | 
|---|
| 180 |  | 
|---|
| 181 | return newSocket; | 
|---|
| 182 | } | 
|---|
| 183 |  | 
|---|
| 184 | Boolean makeSocketNonBlocking(int sock) { | 
|---|
| 185 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 186 | unsigned long arg = 1; | 
|---|
| 187 | return ioctlsocket(sock, FIONBIO, &arg) == 0; | 
|---|
| 188 | #elif defined(VXWORKS) | 
|---|
| 189 | int arg = 1; | 
|---|
| 190 | return ioctl(sock, FIONBIO, (int)&arg) == 0; | 
|---|
| 191 | #else | 
|---|
| 192 | int curFlags = fcntl(sock, F_GETFL, 0); | 
|---|
| 193 | return fcntl(sock, F_SETFL, curFlags|O_NONBLOCK) >= 0; | 
|---|
| 194 | #endif | 
|---|
| 195 | } | 
|---|
| 196 |  | 
|---|
| 197 | Boolean makeSocketBlocking(int sock, unsigned writeTimeoutInMilliseconds) { | 
|---|
| 198 | Boolean result; | 
|---|
| 199 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 200 | unsigned long arg = 0; | 
|---|
| 201 | result = ioctlsocket(sock, FIONBIO, &arg) == 0; | 
|---|
| 202 | #elif defined(VXWORKS) | 
|---|
| 203 | int arg = 0; | 
|---|
| 204 | result = ioctl(sock, FIONBIO, (int)&arg) == 0; | 
|---|
| 205 | #else | 
|---|
| 206 | int curFlags = fcntl(sock, F_GETFL, 0); | 
|---|
| 207 | result = fcntl(sock, F_SETFL, curFlags&(~O_NONBLOCK)) >= 0; | 
|---|
| 208 | #endif | 
|---|
| 209 |  | 
|---|
| 210 | if (writeTimeoutInMilliseconds > 0) { | 
|---|
| 211 | #ifdef SO_SNDTIMEO | 
|---|
| 212 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 213 | DWORD msto = (DWORD)writeTimeoutInMilliseconds; | 
|---|
| 214 | setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, (char *)&msto, sizeof(msto) ); | 
|---|
| 215 | #else | 
|---|
| 216 | struct timeval tv; | 
|---|
| 217 | tv.tv_sec = writeTimeoutInMilliseconds/1000; | 
|---|
| 218 | tv.tv_usec = (writeTimeoutInMilliseconds%1000)*1000; | 
|---|
| 219 | setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, (char *)&tv, sizeof tv); | 
|---|
| 220 | #endif | 
|---|
| 221 | #endif | 
|---|
| 222 | } | 
|---|
| 223 |  | 
|---|
| 224 | return result; | 
|---|
| 225 | } | 
|---|
| 226 |  | 
|---|
| 227 | Boolean setSocketKeepAlive(int sock) { | 
|---|
| 228 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 229 | // How do we do this in Windows?  For now, just make this a no-op in Windows: | 
|---|
| 230 | #else | 
|---|
| 231 | int const keepalive_enabled = 1; | 
|---|
| 232 | if (setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE, (void*)&keepalive_enabled, sizeof keepalive_enabled) < 0) { | 
|---|
| 233 | return False; | 
|---|
| 234 | } | 
|---|
| 235 |  | 
|---|
| 236 | #ifdef TCP_KEEPIDLE | 
|---|
| 237 | int const keepalive_time = 180; | 
|---|
| 238 | if (setsockopt(sock, IPPROTO_TCP, TCP_KEEPIDLE, (void*)&keepalive_time, sizeof keepalive_time) < 0) { | 
|---|
| 239 | return False; | 
|---|
| 240 | } | 
|---|
| 241 | #endif | 
|---|
| 242 |  | 
|---|
| 243 | int const keepalive_count = 5; | 
|---|
| 244 | if (setsockopt(sock, IPPROTO_TCP, TCP_KEEPCNT, (void*)&keepalive_count, sizeof keepalive_count) < 0) { | 
|---|
| 245 | return False; | 
|---|
| 246 | } | 
|---|
| 247 |  | 
|---|
| 248 | int const keepalive_interval = 20; | 
|---|
| 249 | if (setsockopt(sock, IPPROTO_TCP, TCP_KEEPINTVL, (void*)&keepalive_interval, sizeof keepalive_interval) < 0) { | 
|---|
| 250 | return False; | 
|---|
| 251 | } | 
|---|
| 252 | #endif | 
|---|
| 253 |  | 
|---|
| 254 | return True; | 
|---|
| 255 | } | 
|---|
| 256 |  | 
|---|
| 257 | int setupStreamSocket(UsageEnvironment& env, | 
|---|
| 258 | Port port, Boolean makeNonBlocking, Boolean setKeepAlive) { | 
|---|
| 259 | if (!initializeWinsockIfNecessary()) { | 
|---|
| 260 | socketErr(env, "Failed to initialize 'winsock': "); | 
|---|
| 261 | return -1; | 
|---|
| 262 | } | 
|---|
| 263 |  | 
|---|
| 264 | int newSocket = createSocket(SOCK_STREAM); | 
|---|
| 265 | if (newSocket < 0) { | 
|---|
| 266 | socketErr(env, "unable to create stream socket: "); | 
|---|
| 267 | return newSocket; | 
|---|
| 268 | } | 
|---|
| 269 |  | 
|---|
| 270 | int reuseFlag = groupsockPriv(env)->reuseFlag; | 
|---|
| 271 | reclaimGroupsockPriv(env); | 
|---|
| 272 | if (setsockopt(newSocket, SOL_SOCKET, SO_REUSEADDR, | 
|---|
| 273 | (const char*)&reuseFlag, sizeof reuseFlag) < 0) { | 
|---|
| 274 | socketErr(env, "setsockopt(SO_REUSEADDR) error: "); | 
|---|
| 275 | closeSocket(newSocket); | 
|---|
| 276 | return -1; | 
|---|
| 277 | } | 
|---|
| 278 |  | 
|---|
| 279 | // SO_REUSEPORT doesn't really make sense for TCP sockets, so we | 
|---|
| 280 | // normally don't set them.  However, if you really want to do this | 
|---|
| 281 | // #define REUSE_FOR_TCP | 
|---|
| 282 | #ifdef REUSE_FOR_TCP | 
|---|
| 283 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 284 | // Windoze doesn't properly handle SO_REUSEPORT | 
|---|
| 285 | #else | 
|---|
| 286 | #ifdef SO_REUSEPORT | 
|---|
| 287 | if (setsockopt(newSocket, SOL_SOCKET, SO_REUSEPORT, | 
|---|
| 288 | (const char*)&reuseFlag, sizeof reuseFlag) < 0) { | 
|---|
| 289 | socketErr(env, "setsockopt(SO_REUSEPORT) error: "); | 
|---|
| 290 | closeSocket(newSocket); | 
|---|
| 291 | return -1; | 
|---|
| 292 | } | 
|---|
| 293 | #endif | 
|---|
| 294 | #endif | 
|---|
| 295 | #endif | 
|---|
| 296 |  | 
|---|
| 297 | // Note: Windoze requires binding, even if the port number is 0 | 
|---|
| 298 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 299 | #else | 
|---|
| 300 | if (port.num() != 0 || ReceivingInterfaceAddr != INADDR_ANY) { | 
|---|
| 301 | #endif | 
|---|
| 302 | MAKE_SOCKADDR_IN(name, ReceivingInterfaceAddr, port.num()); | 
|---|
| 303 | if (bind(newSocket, (struct sockaddr*)&name, sizeof name) != 0) { | 
|---|
| 304 | char tmpBuffer[100]; | 
|---|
| 305 | sprintf(tmpBuffer, "bind() error (port number: %d): ", | 
|---|
| 306 | ntohs(port.num())); | 
|---|
| 307 | socketErr(env, tmpBuffer); | 
|---|
| 308 | closeSocket(newSocket); | 
|---|
| 309 | return -1; | 
|---|
| 310 | } | 
|---|
| 311 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 312 | #else | 
|---|
| 313 | } | 
|---|
| 314 | #endif | 
|---|
| 315 |  | 
|---|
| 316 | if (makeNonBlocking) { | 
|---|
| 317 | if (!makeSocketNonBlocking(newSocket)) { | 
|---|
| 318 | socketErr(env, "failed to make non-blocking: "); | 
|---|
| 319 | closeSocket(newSocket); | 
|---|
| 320 | return -1; | 
|---|
| 321 | } | 
|---|
| 322 | } | 
|---|
| 323 |  | 
|---|
| 324 | // Set the keep alive mechanism for the TCP socket, to avoid "ghost sockets" | 
|---|
| 325 | //    that remain after an interrupted communication. | 
|---|
| 326 | if (setKeepAlive) { | 
|---|
| 327 | if (!setSocketKeepAlive(newSocket)) { | 
|---|
| 328 | socketErr(env, "failed to set keep alive: "); | 
|---|
| 329 | closeSocket(newSocket); | 
|---|
| 330 | return -1; | 
|---|
| 331 | } | 
|---|
| 332 | } | 
|---|
| 333 |  | 
|---|
| 334 | return newSocket; | 
|---|
| 335 | } | 
|---|
| 336 |  | 
|---|
| 337 | int readSocket(UsageEnvironment& env, | 
|---|
| 338 | int socket, unsigned char* buffer, unsigned bufferSize, | 
|---|
| 339 | struct sockaddr_in& fromAddress) { | 
|---|
| 340 | SOCKLEN_T addressSize = sizeof fromAddress; | 
|---|
| 341 | int bytesRead = recvfrom(socket, (char*)buffer, bufferSize, 0, | 
|---|
| 342 | (struct sockaddr*)&fromAddress, | 
|---|
| 343 | &addressSize); | 
|---|
| 344 | if (bytesRead < 0) { | 
|---|
| 345 | //##### HACK to work around bugs in Linux and Windows: | 
|---|
| 346 | int err = env.getErrno(); | 
|---|
| 347 | if (err == 111 /*ECONNREFUSED (Linux)*/ | 
|---|
| 348 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 349 | // What a piece of crap Windows is.  Sometimes | 
|---|
| 350 | // recvfrom() returns -1, but with an 'errno' of 0. | 
|---|
| 351 | // This appears not to be a real error; just treat | 
|---|
| 352 | // it as if it were a read of zero bytes, and hope | 
|---|
| 353 | // we don't have to do anything else to 'reset' | 
|---|
| 354 | // this alleged error: | 
|---|
| 355 | || err == 0 || err == EWOULDBLOCK | 
|---|
| 356 | #else | 
|---|
| 357 | || err == EAGAIN | 
|---|
| 358 | #endif | 
|---|
| 359 | || err == 113 /*EHOSTUNREACH (Linux)*/) { // Why does Linux return this for datagram sock? | 
|---|
| 360 | fromAddress.sin_addr.s_addr = 0; | 
|---|
| 361 | return 0; | 
|---|
| 362 | } | 
|---|
| 363 | //##### END HACK | 
|---|
| 364 | socketErr(env, "recvfrom() error: "); | 
|---|
| 365 | } else if (bytesRead == 0) { | 
|---|
| 366 | // "recvfrom()" on a stream socket can return 0 if the remote end has closed the connection.  Treat this as an error: | 
|---|
| 367 | return -1; | 
|---|
| 368 | } | 
|---|
| 369 |  | 
|---|
| 370 | return bytesRead; | 
|---|
| 371 | } | 
|---|
| 372 |  | 
|---|
| 373 | Boolean writeSocket(UsageEnvironment& env, | 
|---|
| 374 | int socket, struct in_addr address, portNumBits portNum, | 
|---|
| 375 | u_int8_t ttlArg, | 
|---|
| 376 | unsigned char* buffer, unsigned bufferSize) { | 
|---|
| 377 | // Before sending, set the socket's TTL: | 
|---|
| 378 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 379 | #define TTL_TYPE int | 
|---|
| 380 | #else | 
|---|
| 381 | #define TTL_TYPE u_int8_t | 
|---|
| 382 | #endif | 
|---|
| 383 | TTL_TYPE ttl = (TTL_TYPE)ttlArg; | 
|---|
| 384 | if (setsockopt(socket, IPPROTO_IP, IP_MULTICAST_TTL, | 
|---|
| 385 | (const char*)&ttl, sizeof ttl) < 0) { | 
|---|
| 386 | socketErr(env, "setsockopt(IP_MULTICAST_TTL) error: "); | 
|---|
| 387 | return False; | 
|---|
| 388 | } | 
|---|
| 389 |  | 
|---|
| 390 | return writeSocket(env, socket, address, portNum, buffer, bufferSize); | 
|---|
| 391 | } | 
|---|
| 392 |  | 
|---|
| 393 | Boolean writeSocket(UsageEnvironment& env, | 
|---|
| 394 | int socket, struct in_addr address, portNumBits portNum, | 
|---|
| 395 | unsigned char* buffer, unsigned bufferSize) { | 
|---|
| 396 | do { | 
|---|
| 397 | MAKE_SOCKADDR_IN(dest, address.s_addr, portNum); | 
|---|
| 398 | int bytesSent = sendto(socket, (char*)buffer, bufferSize, 0, | 
|---|
| 399 | (struct sockaddr*)&dest, sizeof dest); | 
|---|
| 400 | if (bytesSent != (int)bufferSize) { | 
|---|
| 401 | char tmpBuf[100]; | 
|---|
| 402 | sprintf(tmpBuf, "writeSocket(%d), sendTo() error: wrote %d bytes instead of %u: ", socket, bytesSent, bufferSize); | 
|---|
| 403 | socketErr(env, tmpBuf); | 
|---|
| 404 | break; | 
|---|
| 405 | } | 
|---|
| 406 |  | 
|---|
| 407 | return True; | 
|---|
| 408 | } while (0); | 
|---|
| 409 |  | 
|---|
| 410 | return False; | 
|---|
| 411 | } | 
|---|
| 412 |  | 
|---|
| 413 | void ignoreSigPipeOnSocket(int socketNum) { | 
|---|
| 414 | #ifdef USE_SIGNALS | 
|---|
| 415 | #ifdef SO_NOSIGPIPE | 
|---|
| 416 | int set_option = 1; | 
|---|
| 417 | setsockopt(socketNum, SOL_SOCKET, SO_NOSIGPIPE, &set_option, sizeof set_option); | 
|---|
| 418 | #else | 
|---|
| 419 | signal(SIGPIPE, SIG_IGN); | 
|---|
| 420 | #endif | 
|---|
| 421 | #endif | 
|---|
| 422 | } | 
|---|
| 423 |  | 
|---|
| 424 | static unsigned getBufferSize(UsageEnvironment& env, int bufOptName, | 
|---|
| 425 | int socket) { | 
|---|
| 426 | unsigned curSize; | 
|---|
| 427 | SOCKLEN_T sizeSize = sizeof curSize; | 
|---|
| 428 | if (getsockopt(socket, SOL_SOCKET, bufOptName, | 
|---|
| 429 | (char*)&curSize, &sizeSize) < 0) { | 
|---|
| 430 | socketErr(env, "getBufferSize() error: "); | 
|---|
| 431 | return 0; | 
|---|
| 432 | } | 
|---|
| 433 |  | 
|---|
| 434 | return curSize; | 
|---|
| 435 | } | 
|---|
| 436 | unsigned getSendBufferSize(UsageEnvironment& env, int socket) { | 
|---|
| 437 | return getBufferSize(env, SO_SNDBUF, socket); | 
|---|
| 438 | } | 
|---|
| 439 | unsigned getReceiveBufferSize(UsageEnvironment& env, int socket) { | 
|---|
| 440 | return getBufferSize(env, SO_RCVBUF, socket); | 
|---|
| 441 | } | 
|---|
| 442 |  | 
|---|
| 443 | static unsigned setBufferTo(UsageEnvironment& env, int bufOptName, | 
|---|
| 444 | int socket, unsigned requestedSize) { | 
|---|
| 445 | SOCKLEN_T sizeSize = sizeof requestedSize; | 
|---|
| 446 | setsockopt(socket, SOL_SOCKET, bufOptName, (char*)&requestedSize, sizeSize); | 
|---|
| 447 |  | 
|---|
| 448 | // Get and return the actual, resulting buffer size: | 
|---|
| 449 | return getBufferSize(env, bufOptName, socket); | 
|---|
| 450 | } | 
|---|
| 451 | unsigned setSendBufferTo(UsageEnvironment& env, | 
|---|
| 452 | int socket, unsigned requestedSize) { | 
|---|
| 453 | return setBufferTo(env, SO_SNDBUF, socket, requestedSize); | 
|---|
| 454 | } | 
|---|
| 455 | unsigned setReceiveBufferTo(UsageEnvironment& env, | 
|---|
| 456 | int socket, unsigned requestedSize) { | 
|---|
| 457 | return setBufferTo(env, SO_RCVBUF, socket, requestedSize); | 
|---|
| 458 | } | 
|---|
| 459 |  | 
|---|
| 460 | static unsigned increaseBufferTo(UsageEnvironment& env, int bufOptName, | 
|---|
| 461 | int socket, unsigned requestedSize) { | 
|---|
| 462 | // First, get the current buffer size.  If it's already at least | 
|---|
| 463 | // as big as what we're requesting, do nothing. | 
|---|
| 464 | unsigned curSize = getBufferSize(env, bufOptName, socket); | 
|---|
| 465 |  | 
|---|
| 466 | // Next, try to increase the buffer to the requested size, | 
|---|
| 467 | // or to some smaller size, if that's not possible: | 
|---|
| 468 | while (requestedSize > curSize) { | 
|---|
| 469 | SOCKLEN_T sizeSize = sizeof requestedSize; | 
|---|
| 470 | if (setsockopt(socket, SOL_SOCKET, bufOptName, | 
|---|
| 471 | (char*)&requestedSize, sizeSize) >= 0) { | 
|---|
| 472 | // success | 
|---|
| 473 | return requestedSize; | 
|---|
| 474 | } | 
|---|
| 475 | requestedSize = (requestedSize+curSize)/2; | 
|---|
| 476 | } | 
|---|
| 477 |  | 
|---|
| 478 | return getBufferSize(env, bufOptName, socket); | 
|---|
| 479 | } | 
|---|
| 480 | unsigned increaseSendBufferTo(UsageEnvironment& env, | 
|---|
| 481 | int socket, unsigned requestedSize) { | 
|---|
| 482 | return increaseBufferTo(env, SO_SNDBUF, socket, requestedSize); | 
|---|
| 483 | } | 
|---|
| 484 | unsigned increaseReceiveBufferTo(UsageEnvironment& env, | 
|---|
| 485 | int socket, unsigned requestedSize) { | 
|---|
| 486 | return increaseBufferTo(env, SO_RCVBUF, socket, requestedSize); | 
|---|
| 487 | } | 
|---|
| 488 |  | 
|---|
| 489 | static void clearMulticastAllSocketOption(int socket) { | 
|---|
| 490 | #ifdef IP_MULTICAST_ALL | 
|---|
| 491 | // This option is defined in modern versions of Linux to overcome a bug in the Linux kernel's default behavior. | 
|---|
| 492 | // When set to 0, it ensures that we receive only packets that were sent to the specified IP multicast address, | 
|---|
| 493 | // even if some other process on the same system has joined a different multicast group with the same port number. | 
|---|
| 494 | int multicastAll = 0; | 
|---|
| 495 | (void)setsockopt(socket, IPPROTO_IP, IP_MULTICAST_ALL, (void*)&multicastAll, sizeof multicastAll); | 
|---|
| 496 | // Ignore the call's result.  Should it fail, we'll still receive packets (just perhaps more than intended) | 
|---|
| 497 | #endif | 
|---|
| 498 | } | 
|---|
| 499 |  | 
|---|
| 500 | Boolean socketJoinGroup(UsageEnvironment& env, int socket, | 
|---|
| 501 | netAddressBits groupAddress){ | 
|---|
| 502 | if (!IsMulticastAddress(groupAddress)) return True; // ignore this case | 
|---|
| 503 |  | 
|---|
| 504 | struct ip_mreq imr; | 
|---|
| 505 | imr.imr_multiaddr.s_addr = groupAddress; | 
|---|
| 506 | imr.imr_interface.s_addr = ReceivingInterfaceAddr; | 
|---|
| 507 | if (setsockopt(socket, IPPROTO_IP, IP_ADD_MEMBERSHIP, | 
|---|
| 508 | (const char*)&imr, sizeof (struct ip_mreq)) < 0) { | 
|---|
| 509 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 510 | if (env.getErrno() != 0) { | 
|---|
| 511 | // That piece-of-shit toy operating system (Windows) sometimes lies | 
|---|
| 512 | // about setsockopt() failing! | 
|---|
| 513 | #endif | 
|---|
| 514 | socketErr(env, "setsockopt(IP_ADD_MEMBERSHIP) error: "); | 
|---|
| 515 | return False; | 
|---|
| 516 | #if defined(__WIN32__) || defined(_WIN32) | 
|---|
| 517 | } | 
|---|
| 518 | #endif | 
|---|
| 519 | } | 
|---|
| 520 |  | 
|---|
| 521 | clearMulticastAllSocketOption(socket); | 
|---|
| 522 |  | 
|---|
| 523 | return True; | 
|---|
| 524 | } | 
|---|
| 525 |  | 
|---|
| 526 | Boolean socketLeaveGroup(UsageEnvironment&, int socket, | 
|---|
| 527 | netAddressBits groupAddress) { | 
|---|
| 528 | if (!IsMulticastAddress(groupAddress)) return True; // ignore this case | 
|---|
| 529 |  | 
|---|
| 530 | struct ip_mreq imr; | 
|---|
| 531 | imr.imr_multiaddr.s_addr = groupAddress; | 
|---|
| 532 | imr.imr_interface.s_addr = ReceivingInterfaceAddr; | 
|---|
| 533 | if (setsockopt(socket, IPPROTO_IP, IP_DROP_MEMBERSHIP, | 
|---|
| 534 | (const char*)&imr, sizeof (struct ip_mreq)) < 0) { | 
|---|
| 535 | return False; | 
|---|
| 536 | } | 
|---|
| 537 |  | 
|---|
| 538 | return True; | 
|---|
| 539 | } | 
|---|
| 540 |  | 
|---|
| 541 | // The source-specific join/leave operations require special setsockopt() | 
|---|
| 542 | // commands, and a special structure (ip_mreq_source).  If the include files | 
|---|
| 543 | // didn't define these, we do so here: | 
|---|
| 544 | #if !defined(IP_ADD_SOURCE_MEMBERSHIP) | 
|---|
| 545 | struct ip_mreq_source { | 
|---|
| 546 | struct  in_addr imr_multiaddr;  /* IP multicast address of group */ | 
|---|
| 547 | struct  in_addr imr_sourceaddr; /* IP address of source */ | 
|---|
| 548 | struct  in_addr imr_interface;  /* local IP address of interface */ | 
|---|
| 549 | }; | 
|---|
| 550 | #endif | 
|---|
| 551 |  | 
|---|
| 552 | #ifndef IP_ADD_SOURCE_MEMBERSHIP | 
|---|
| 553 |  | 
|---|
| 554 | #ifdef LINUX | 
|---|
| 555 | #define IP_ADD_SOURCE_MEMBERSHIP   39 | 
|---|
| 556 | #define IP_DROP_SOURCE_MEMBERSHIP 40 | 
|---|
| 557 | #else | 
|---|
| 558 | #define IP_ADD_SOURCE_MEMBERSHIP   25 | 
|---|
| 559 | #define IP_DROP_SOURCE_MEMBERSHIP 26 | 
|---|
| 560 | #endif | 
|---|
| 561 |  | 
|---|
| 562 | #endif | 
|---|
| 563 |  | 
|---|
| 564 | Boolean socketJoinGroupSSM(UsageEnvironment& env, int socket, | 
|---|
| 565 | netAddressBits groupAddress, | 
|---|
| 566 | netAddressBits sourceFilterAddr) { | 
|---|
| 567 | if (!IsMulticastAddress(groupAddress)) return True; // ignore this case | 
|---|
| 568 |  | 
|---|
| 569 | struct ip_mreq_source imr; | 
|---|
| 570 | #if ANDROID_OLD_NDK | 
|---|
| 571 | imr.imr_multiaddr = groupAddress; | 
|---|
| 572 | imr.imr_sourceaddr = sourceFilterAddr; | 
|---|
| 573 | imr.imr_interface = ReceivingInterfaceAddr; | 
|---|
| 574 | #else | 
|---|
| 575 | imr.imr_multiaddr.s_addr = groupAddress; | 
|---|
| 576 | imr.imr_sourceaddr.s_addr = sourceFilterAddr; | 
|---|
| 577 | imr.imr_interface.s_addr = ReceivingInterfaceAddr; | 
|---|
| 578 | #endif | 
|---|
| 579 | if (setsockopt(socket, IPPROTO_IP, IP_ADD_SOURCE_MEMBERSHIP, | 
|---|
| 580 | (const char*)&imr, sizeof (struct ip_mreq_source)) < 0) { | 
|---|
| 581 | socketErr(env, "setsockopt(IP_ADD_SOURCE_MEMBERSHIP) error: "); | 
|---|
| 582 | return False; | 
|---|
| 583 | } | 
|---|
| 584 |  | 
|---|
| 585 | clearMulticastAllSocketOption(socket); | 
|---|
| 586 |  | 
|---|
| 587 | return True; | 
|---|
| 588 | } | 
|---|
| 589 |  | 
|---|
| 590 | Boolean socketLeaveGroupSSM(UsageEnvironment& /*env*/, int socket, | 
|---|
| 591 | netAddressBits groupAddress, | 
|---|
| 592 | netAddressBits sourceFilterAddr) { | 
|---|
| 593 | if (!IsMulticastAddress(groupAddress)) return True; // ignore this case | 
|---|
| 594 |  | 
|---|
| 595 | struct ip_mreq_source imr; | 
|---|
| 596 | #if ANDROID_OLD_NDK | 
|---|
| 597 | imr.imr_multiaddr = groupAddress; | 
|---|
| 598 | imr.imr_sourceaddr = sourceFilterAddr; | 
|---|
| 599 | imr.imr_interface = ReceivingInterfaceAddr; | 
|---|
| 600 | #else | 
|---|
| 601 | imr.imr_multiaddr.s_addr = groupAddress; | 
|---|
| 602 | imr.imr_sourceaddr.s_addr = sourceFilterAddr; | 
|---|
| 603 | imr.imr_interface.s_addr = ReceivingInterfaceAddr; | 
|---|
| 604 | #endif | 
|---|
| 605 | if (setsockopt(socket, IPPROTO_IP, IP_DROP_SOURCE_MEMBERSHIP, | 
|---|
| 606 | (const char*)&imr, sizeof (struct ip_mreq_source)) < 0) { | 
|---|
| 607 | return False; | 
|---|
| 608 | } | 
|---|
| 609 |  | 
|---|
| 610 | return True; | 
|---|
| 611 | } | 
|---|
| 612 |  | 
|---|
| 613 | static Boolean getSourcePort0(int socket, portNumBits& resultPortNum/*host order*/) { | 
|---|
| 614 | sockaddr_in test; test.sin_port = 0; | 
|---|
| 615 | SOCKLEN_T len = sizeof test; | 
|---|
| 616 | if (getsockname(socket, (struct sockaddr*)&test, &len) < 0) return False; | 
|---|
| 617 |  | 
|---|
| 618 | resultPortNum = ntohs(test.sin_port); | 
|---|
| 619 | return True; | 
|---|
| 620 | } | 
|---|
| 621 |  | 
|---|
| 622 | Boolean getSourcePort(UsageEnvironment& env, int socket, Port& port) { | 
|---|
| 623 | portNumBits portNum = 0; | 
|---|
| 624 | if (!getSourcePort0(socket, portNum) || portNum == 0) { | 
|---|
| 625 | // Hack - call bind(), then try again: | 
|---|
| 626 | MAKE_SOCKADDR_IN(name, INADDR_ANY, 0); | 
|---|
| 627 | bind(socket, (struct sockaddr*)&name, sizeof name); | 
|---|
| 628 |  | 
|---|
| 629 | if (!getSourcePort0(socket, portNum) || portNum == 0) { | 
|---|
| 630 | socketErr(env, "getsockname() error: "); | 
|---|
| 631 | return False; | 
|---|
| 632 | } | 
|---|
| 633 | } | 
|---|
| 634 |  | 
|---|
| 635 | port = Port(portNum); | 
|---|
| 636 | return True; | 
|---|
| 637 | } | 
|---|
| 638 |  | 
|---|
| 639 | static Boolean badAddressForUs(netAddressBits addr) { | 
|---|
| 640 | // Check for some possible erroneous addresses: | 
|---|
| 641 | netAddressBits nAddr = htonl(addr); | 
|---|
| 642 | return (nAddr == 0x7F000001 /* 127.0.0.1 */ | 
|---|
| 643 | || nAddr == 0 | 
|---|
| 644 | || nAddr == (netAddressBits)(~0)); | 
|---|
| 645 | } | 
|---|
| 646 |  | 
|---|
| 647 | Boolean loopbackWorks = 1; | 
|---|
| 648 |  | 
|---|
| 649 | netAddressBits ourIPAddress(UsageEnvironment& env) { | 
|---|
| 650 | static netAddressBits ourAddress = 0; | 
|---|
| 651 | int sock = -1; | 
|---|
| 652 | struct in_addr testAddr; | 
|---|
| 653 |  | 
|---|
| 654 | if (ReceivingInterfaceAddr != INADDR_ANY) { | 
|---|
| 655 | // Hack: If we were told to receive on a specific interface address, then | 
|---|
| 656 | // define this to be our ip address: | 
|---|
| 657 | ourAddress = ReceivingInterfaceAddr; | 
|---|
| 658 | } | 
|---|
| 659 |  | 
|---|
| 660 | if (ourAddress == 0) { | 
|---|
| 661 | // We need to find our source address | 
|---|
| 662 | struct sockaddr_in fromAddr; | 
|---|
| 663 | fromAddr.sin_addr.s_addr = 0; | 
|---|
| 664 |  | 
|---|
| 665 | // Get our address by sending a (0-TTL) multicast packet, | 
|---|
| 666 | // receiving it, and looking at the source address used. | 
|---|
| 667 | // (This is kinda bogus, but it provides the best guarantee | 
|---|
| 668 | // that other nodes will think our address is the same as we do.) | 
|---|
| 669 | do { | 
|---|
| 670 | loopbackWorks = 0; // until we learn otherwise | 
|---|
| 671 |  | 
|---|
| 672 | #ifndef DISABLE_LOOPBACK_IP_ADDRESS_CHECK | 
|---|
| 673 | testAddr.s_addr = our_inet_addr( "228.67.43.91"); // arbitrary | 
|---|
| 674 | Port testPort(15947); // ditto | 
|---|
| 675 |  | 
|---|
| 676 | sock = setupDatagramSocket(env, testPort); | 
|---|
| 677 | if (sock < 0) break; | 
|---|
| 678 |  | 
|---|
| 679 | if (!socketJoinGroup(env, sock, testAddr.s_addr)) break; | 
|---|
| 680 |  | 
|---|
| 681 | unsigned char testString[] = "hostIdTest"; | 
|---|
| 682 | unsigned testStringLength = sizeof testString; | 
|---|
| 683 |  | 
|---|
| 684 | if (!writeSocket(env, sock, testAddr, testPort.num(), 0, | 
|---|
| 685 | testString, testStringLength)) break; | 
|---|
| 686 |  | 
|---|
| 687 | // Block until the socket is readable (with a 5-second timeout): | 
|---|
| 688 | fd_set rd_set; | 
|---|
| 689 | FD_ZERO(&rd_set); | 
|---|
| 690 | FD_SET((unsigned)sock, &rd_set); | 
|---|
| 691 | const unsigned numFds = sock+1; | 
|---|
| 692 | struct timeval timeout; | 
|---|
| 693 | timeout.tv_sec = 5; | 
|---|
| 694 | timeout.tv_usec = 0; | 
|---|
| 695 | int result = select(numFds, &rd_set, NULL, NULL, &timeout); | 
|---|
| 696 | if (result <= 0) break; | 
|---|
| 697 |  | 
|---|
| 698 | unsigned char readBuffer[20]; | 
|---|
| 699 | int bytesRead = readSocket(env, sock, | 
|---|
| 700 | readBuffer, sizeof readBuffer, | 
|---|
| 701 | fromAddr); | 
|---|
| 702 | if (bytesRead != (int)testStringLength | 
|---|
| 703 | || strncmp((char*)readBuffer, (char*)testString, testStringLength) != 0) { | 
|---|
| 704 | break; | 
|---|
| 705 | } | 
|---|
| 706 |  | 
|---|
| 707 | // We use this packet's source address, if it's good: | 
|---|
| 708 | loopbackWorks = !badAddressForUs(fromAddr.sin_addr.s_addr); | 
|---|
| 709 | #endif | 
|---|
| 710 | } while (0); | 
|---|
| 711 |  | 
|---|
| 712 | if (sock >= 0) { | 
|---|
| 713 | socketLeaveGroup(env, sock, testAddr.s_addr); | 
|---|
| 714 | closeSocket(sock); | 
|---|
| 715 | } | 
|---|
| 716 |  | 
|---|
| 717 | if (!loopbackWorks) do { | 
|---|
| 718 | // We couldn't find our address using multicast loopback, | 
|---|
| 719 | // so try instead to look it up directly - by first getting our host name, and then resolving this host name | 
|---|
| 720 | char hostname[100]; | 
|---|
| 721 | hostname[0] = '\0'; | 
|---|
| 722 | int result = gethostname(hostname, sizeof hostname); | 
|---|
| 723 | if (result != 0 || hostname[0] == '\0') { | 
|---|
| 724 | env.setResultErrMsg( "initial gethostname() failed"); | 
|---|
| 725 | break; | 
|---|
| 726 | } | 
|---|
| 727 |  | 
|---|
| 728 | // Try to resolve "hostname" to an IP address: | 
|---|
| 729 | NetAddressList addresses(hostname); | 
|---|
| 730 | NetAddressList::Iterator iter(addresses); | 
|---|
| 731 | NetAddress const* address; | 
|---|
| 732 |  | 
|---|
| 733 | // Take the first address that's not bad: | 
|---|
| 734 | netAddressBits addr = 0; | 
|---|
| 735 | while ((address = iter.nextAddress()) != NULL) { | 
|---|
| 736 | netAddressBits a = *(netAddressBits*)(address->data()); | 
|---|
| 737 | if (!badAddressForUs(a)) { | 
|---|
| 738 | addr = a; | 
|---|
| 739 | break; | 
|---|
| 740 | } | 
|---|
| 741 | } | 
|---|
| 742 |  | 
|---|
| 743 | // Assign the address that we found to "fromAddr" (as if the 'loopback' method had worked), to simplify the code below: | 
|---|
| 744 | fromAddr.sin_addr.s_addr = addr; | 
|---|
| 745 | } while (0); | 
|---|
| 746 |  | 
|---|
| 747 | // Make sure we have a good address: | 
|---|
| 748 | netAddressBits from = fromAddr.sin_addr.s_addr; | 
|---|
| 749 | if (badAddressForUs(from)) { | 
|---|
| 750 | char tmp[100]; | 
|---|
| 751 | sprintf(tmp, "This computer has an invalid IP address: %s", AddressString(from).val()); | 
|---|
| 752 | env.setResultMsg(tmp); | 
|---|
| 753 | from = 0; | 
|---|
| 754 | } | 
|---|
| 755 |  | 
|---|
| 756 | ourAddress = from; | 
|---|
| 757 |  | 
|---|
| 758 | // Use our newly-discovered IP address, and the current time, | 
|---|
| 759 | // to initialize the random number generator's seed: | 
|---|
| 760 | struct timeval timeNow; | 
|---|
| 761 | gettimeofday(&timeNow, NULL); | 
|---|
| 762 | unsigned seed = ourAddress^timeNow.tv_sec^timeNow.tv_usec; | 
|---|
| 763 | our_srandom(seed); | 
|---|
| 764 | } | 
|---|
| 765 | return ourAddress; | 
|---|
| 766 | } | 
|---|
| 767 |  | 
|---|
| 768 | netAddressBits chooseRandomIPv4SSMAddress(UsageEnvironment& env) { | 
|---|
| 769 | // First, a hack to ensure that our random number generator is seeded: | 
|---|
| 770 | (void) ourIPAddress(env); | 
|---|
| 771 |  | 
|---|
| 772 | // Choose a random address in the range [232.0.1.0, 232.255.255.255) | 
|---|
| 773 | // i.e., [0xE8000100, 0xE8FFFFFF) | 
|---|
| 774 | netAddressBits const first = 0xE8000100, lastPlus1 = 0xE8FFFFFF; | 
|---|
| 775 | netAddressBits const range = lastPlus1 - first; | 
|---|
| 776 |  | 
|---|
| 777 | return ntohl(first + ((netAddressBits)our_random())%range); | 
|---|
| 778 | } | 
|---|
| 779 |  | 
|---|
| 780 | char const* timestampString() { | 
|---|
| 781 | struct timeval tvNow; | 
|---|
| 782 | gettimeofday(&tvNow, NULL); | 
|---|
| 783 |  | 
|---|
| 784 | #if !defined(_WIN32_WCE) | 
|---|
| 785 | static char timeString[9]; // holds hh:mm:ss plus trailing '\0' | 
|---|
| 786 |  | 
|---|
| 787 | time_t tvNow_t = tvNow.tv_sec; | 
|---|
| 788 | char const* ctimeResult = ctime(&tvNow_t); | 
|---|
| 789 | if (ctimeResult == NULL) { | 
|---|
| 790 | sprintf(timeString, "??:??:??"); | 
|---|
| 791 | } else { | 
|---|
| 792 | char const* from = &ctimeResult[11]; | 
|---|
| 793 | int i; | 
|---|
| 794 | for (i = 0; i < 8; ++i) { | 
|---|
| 795 | timeString[i] = from[i]; | 
|---|
| 796 | } | 
|---|
| 797 | timeString[i] = '\0'; | 
|---|
| 798 | } | 
|---|
| 799 | #else | 
|---|
| 800 | // WinCE apparently doesn't have "ctime()", so instead, construct | 
|---|
| 801 | // a timestamp string just using the integer and fractional parts | 
|---|
| 802 | // of "tvNow": | 
|---|
| 803 | static char timeString[50]; | 
|---|
| 804 | sprintf(timeString, "%lu.%06ld", tvNow.tv_sec, tvNow.tv_usec); | 
|---|
| 805 | #endif | 
|---|
| 806 |  | 
|---|
| 807 | return (char const*)&timeString; | 
|---|
| 808 | } | 
|---|
| 809 |  | 
|---|
| 810 | #if (defined(__WIN32__) || defined(_WIN32)) && !defined(__MINGW32__) | 
|---|
| 811 | // For Windoze, we need to implement our own gettimeofday() | 
|---|
| 812 |  | 
|---|
| 813 | // used to make sure that static variables in gettimeofday() aren't initialized simultaneously by multiple threads | 
|---|
| 814 | static LONG initializeLock_gettimeofday = 0; | 
|---|
| 815 |  | 
|---|
| 816 | #if !defined(_WIN32_WCE) | 
|---|
| 817 | #include <sys/timeb.h> | 
|---|
| 818 | #endif | 
|---|
| 819 |  | 
|---|
| 820 | int gettimeofday(struct timeval* tp, int* /*tz*/) { | 
|---|
| 821 | static LARGE_INTEGER tickFrequency, epochOffset; | 
|---|
| 822 |  | 
|---|
| 823 | static Boolean isInitialized = False; | 
|---|
| 824 |  | 
|---|
| 825 | LARGE_INTEGER tickNow; | 
|---|
| 826 |  | 
|---|
| 827 | #if !defined(_WIN32_WCE) | 
|---|
| 828 | QueryPerformanceCounter(&tickNow); | 
|---|
| 829 | #else | 
|---|
| 830 | tickNow.QuadPart = GetTickCount(); | 
|---|
| 831 | #endif | 
|---|
| 832 |  | 
|---|
| 833 | if (!isInitialized) { | 
|---|
| 834 | if(1 == InterlockedIncrement(&initializeLock_gettimeofday)) { | 
|---|
| 835 | #if !defined(_WIN32_WCE) | 
|---|
| 836 | // For our first call, use "ftime()", so that we get a time with a proper epoch. | 
|---|
| 837 | // For subsequent calls, use "QueryPerformanceCount()", because it's more fine-grain. | 
|---|
| 838 | struct timeb tb; | 
|---|
| 839 | ftime(&tb); | 
|---|
| 840 | tp->tv_sec = tb.time; | 
|---|
| 841 | tp->tv_usec = 1000*tb.millitm; | 
|---|
| 842 |  | 
|---|
| 843 | // Also get our counter frequency: | 
|---|
| 844 | QueryPerformanceFrequency(&tickFrequency); | 
|---|
| 845 | #else | 
|---|
| 846 | /* FILETIME of Jan 1 1970 00:00:00. */ | 
|---|
| 847 | const LONGLONG epoch = 116444736000000000LL; | 
|---|
| 848 | FILETIME fileTime; | 
|---|
| 849 | LARGE_INTEGER time; | 
|---|
| 850 | GetSystemTimeAsFileTime(&fileTime); | 
|---|
| 851 |  | 
|---|
| 852 | time.HighPart = fileTime.dwHighDateTime; | 
|---|
| 853 | time.LowPart = fileTime.dwLowDateTime; | 
|---|
| 854 |  | 
|---|
| 855 | // convert to from 100ns time to unix timestamp in seconds, 1000*1000*10 | 
|---|
| 856 | tp->tv_sec = (long)((time.QuadPart - epoch) / 10000000L); | 
|---|
| 857 |  | 
|---|
| 858 | /* | 
|---|
| 859 | GetSystemTimeAsFileTime has just a seconds resolution, | 
|---|
| 860 | thats why wince-version of gettimeofday is not 100% accurate, usec accuracy would be calculated like this: | 
|---|
| 861 | // convert 100 nanoseconds to usec | 
|---|
| 862 | tp->tv_usec= (long)((time.QuadPart - epoch)%10000000L) / 10L; | 
|---|
| 863 | */ | 
|---|
| 864 | tp->tv_usec = 0; | 
|---|
| 865 |  | 
|---|
| 866 | // resolution of GetTickCounter() is always milliseconds | 
|---|
| 867 | tickFrequency.QuadPart = 1000; | 
|---|
| 868 | #endif | 
|---|
| 869 | // compute an offset to add to subsequent counter times, so we get a proper epoch: | 
|---|
| 870 | epochOffset.QuadPart | 
|---|
| 871 | = tp->tv_sec * tickFrequency.QuadPart + (tp->tv_usec * tickFrequency.QuadPart) / 1000000L - tickNow.QuadPart; | 
|---|
| 872 |  | 
|---|
| 873 | // next caller can use ticks for time calculation | 
|---|
| 874 | isInitialized = True; | 
|---|
| 875 | return 0; | 
|---|
| 876 | } else { | 
|---|
| 877 | InterlockedDecrement(&initializeLock_gettimeofday); | 
|---|
| 878 | // wait until first caller has initialized static values | 
|---|
| 879 | while(!isInitialized){ | 
|---|
| 880 | Sleep(1); | 
|---|
| 881 | } | 
|---|
| 882 | } | 
|---|
| 883 | } | 
|---|
| 884 |  | 
|---|
| 885 | // adjust our tick count so that we get a proper epoch: | 
|---|
| 886 | tickNow.QuadPart += epochOffset.QuadPart; | 
|---|
| 887 |  | 
|---|
| 888 | tp->tv_sec =  (long)(tickNow.QuadPart / tickFrequency.QuadPart); | 
|---|
| 889 | tp->tv_usec = (long)(((tickNow.QuadPart % tickFrequency.QuadPart) * 1000000L) / tickFrequency.QuadPart); | 
|---|
| 890 |  | 
|---|
| 891 | return 0; | 
|---|
| 892 | } | 
|---|
| 893 | #endif | 
|---|
| 894 | #undef ANDROID_OLD_NDK | 
|---|
| 895 |  | 
|---|