1 /* IOHandler.c - IOMultiplexer
2 * Copyright (C) 2012 Philipp Kreil (pk910)
4 * This program is free software: you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation, either version 3 of the License, or
7 * (at your option) any later version.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program. If not, see <http://www.gnu.org/licenses/>.
17 #include "IOHandler.h"
19 #include "IOHandler_SSL.h"
24 #define _WIN32_WINNT 0x501
34 #include <sys/socket.h>
35 #include <netinet/in.h>
36 #include <netinet/tcp.h>
40 #define EWOULDBLOCK EAGAIN
44 iohandler_log_callback *iolog_backend = NULL;
46 struct IODescriptor *first_descriptor = NULL;
47 struct IODescriptor *timer_priority = NULL;
50 static pthread_mutex_t io_thread_sync;
51 static pthread_mutex_t io_poll_sync;
54 void iohandler_log(enum IOLogType type, char *text, ...) {
56 char logBuf[MAXLOG+1];
59 va_start(arg_list, text);
60 pos = vsnprintf(logBuf, MAXLOG - 1, text, arg_list);
62 if (pos < 0 || pos > (MAXLOG - 1)) pos = MAXLOG - 1;
67 iolog_backend(type, logBuf);
71 extern struct IOEngine engine_select; /* select system call (should always be useable) */
72 extern struct IOEngine engine_kevent;
73 extern struct IOEngine engine_epoll;
74 extern struct IOEngine engine_win32;
76 struct IOEngine *engine = NULL;
78 static void iohandler_init_engine() {
80 IOTHREAD_MUTEX_INIT(io_thread_sync);
81 IOTHREAD_MUTEX_INIT(io_poll_sync);
84 if(!engine && engine_kevent.init && engine_kevent.init())
85 engine = &engine_kevent;
86 if(!engine && engine_epoll.init && engine_epoll.init())
87 engine = &engine_epoll;
88 if(!engine && engine_win32.init && engine_win32.init())
89 engine = &engine_win32;
92 if(engine_select.init())
93 engine = &engine_select;
95 iohandler_log(IOLOG_FATAL, "found no useable IO engine");
99 iohandler_log(IOLOG_DEBUG, "using %s IO engine", engine->name);
100 iohandler_ssl_init();
103 static void iohandler_append(struct IODescriptor *descriptor) {
104 IOSYNCHRONIZE(io_thread_sync);
105 struct timeval *timeout = ((descriptor->timeout.tv_sec || descriptor->timeout.tv_usec) ? &descriptor->timeout : NULL);
107 struct IODescriptor *iofd;
108 int set_priority = 1;
109 descriptor->timeout = *timeout;
111 iofd = timer_priority;
113 iofd = first_descriptor;
115 for(;;iofd = iofd->next) {
116 if(timeval_is_smaler(timeout, (&iofd->timeout))) {
117 descriptor->prev = iofd->prev;
118 descriptor->next = iofd;
120 iofd->prev->next = descriptor;
121 iofd->prev = descriptor;
123 timer_priority = descriptor;
126 if(iofd == timer_priority)
128 if(iofd->next == NULL) {
129 descriptor->next = NULL;
130 descriptor->prev = iofd;
131 iofd->next = descriptor;
133 timer_priority = descriptor;
138 descriptor->prev = NULL;
139 descriptor->next = NULL;
140 first_descriptor = descriptor;
141 timer_priority = descriptor;
145 descriptor->prev = NULL;
146 descriptor->next = first_descriptor;
148 first_descriptor->prev = descriptor;
149 first_descriptor = descriptor;
151 IODESYNCHRONIZE(io_thread_sync);
154 static void iohandler_remove(struct IODescriptor *descriptor, int engine_remove) {
155 //remove IODescriptor from the list
156 IOSYNCHRONIZE(io_thread_sync);
158 descriptor->prev->next = descriptor->next;
160 first_descriptor = descriptor->next;
162 descriptor->next->prev = descriptor->prev;
163 if(descriptor == timer_priority)
164 timer_priority = descriptor->next;
167 engine->remove(descriptor);
168 if(descriptor->readbuf.buffer)
169 free(descriptor->readbuf.buffer);
170 if(descriptor->writebuf.buffer)
171 free(descriptor->writebuf.buffer);
172 iohandler_log(IOLOG_DEBUG, "removed IODescriptor (%d) of type `%s`", descriptor->fd, iohandler_iotype_name(descriptor->type));
174 IODESYNCHRONIZE(io_thread_sync);
177 struct IODescriptor *iohandler_add(int sockfd, enum IOType type, struct timeval *timeout, iohandler_callback *callback) {
178 //just add a new IODescriptor
179 struct IODescriptor *descriptor = calloc(1, sizeof(*descriptor));
181 iohandler_log(IOLOG_ERROR, "could not allocate memory for IODescriptor in %s:%d", __FILE__, __LINE__);
184 descriptor->fd = (type == IOTYPE_STDIN ? fileno(stdin) : sockfd);
185 descriptor->type = type;
186 descriptor->state = (type == IOTYPE_STDIN ? IO_CONNECTED : IO_CLOSED);
187 descriptor->callback = callback;
189 descriptor->timeout = *timeout;
190 if(type != IOTYPE_TIMER) {
191 descriptor->readbuf.buffer = malloc(IO_READ_BUFLEN + 2);
192 descriptor->readbuf.bufpos = 0;
193 descriptor->readbuf.buflen = IO_READ_BUFLEN;
194 descriptor->writebuf.buffer = malloc(IO_READ_BUFLEN + 2);
195 descriptor->writebuf.bufpos = 0;
196 descriptor->writebuf.buflen = IO_READ_BUFLEN;
200 iohandler_init_engine();
205 engine->add(descriptor);
207 //add IODescriptor to the list
208 iohandler_append(descriptor);
210 iohandler_log(IOLOG_DEBUG, "added custom socket descriptor (%d) as type `%s`", sockfd, iohandler_iotype_name(type));
214 void iohandler_set_timeout(struct IODescriptor *descriptor, struct timeval *timeout) {
216 descriptor->prev->next = descriptor->next;
218 first_descriptor = descriptor->next;
220 descriptor->next->prev = descriptor->prev;
221 if(descriptor == timer_priority)
222 timer_priority = descriptor->next;
224 descriptor->timeout = *timeout;
226 descriptor->timeout.tv_sec = 0;
227 descriptor->timeout.tv_usec = 0;
229 iohandler_append(descriptor);
232 static void iohandler_increase_iobuf(struct IOBuffer *iobuf, size_t required) {
233 if(iobuf->buflen >= required) return;
234 char *new_buf = realloc(iobuf->buffer, required + 2);
236 iobuf->buffer = new_buf;
237 iobuf->buflen = required;
241 struct IODescriptor *iohandler_timer(struct timeval timeout, iohandler_callback *callback) {
242 struct IODescriptor *descriptor;
243 descriptor = iohandler_add(-1, IOTYPE_TIMER, &timeout, callback);
245 iohandler_log(IOLOG_ERROR, "could not allocate memory for IODescriptor in %s:%d", __FILE__, __LINE__);
248 iohandler_log(IOLOG_DEBUG, "added timer descriptor (sec: %d; usec: %d)", timeout.tv_sec, timeout.tv_usec);
252 struct IODescriptor *iohandler_connect(const char *hostname, unsigned int port, int ssl, const char *bindhost, iohandler_callback *callback) {
253 return iohandler_connect_flags(hostname, port, ssl, bindhost, callback, IOHANDLER_CONNECT_IPV4 | IOHANDLER_CONNECT_IPV6);
256 struct IODescriptor *iohandler_connect_flags(const char *hostname, unsigned int port, int ssl, const char *bindhost, iohandler_callback *callback, int flags) {
257 //non-blocking connect
259 struct addrinfo hints, *res;
260 struct sockaddr_in *ip4 = NULL;
261 struct sockaddr_in6 *ip6 = NULL;
263 struct sockaddr *dstaddr = NULL;
264 struct IODescriptor *descriptor;
267 iohandler_init_engine();
268 if(!engine) return NULL;
270 memset (&hints, 0, sizeof (hints));
271 hints.ai_family = PF_UNSPEC;
272 hints.ai_socktype = SOCK_STREAM;
273 hints.ai_flags |= AI_CANONNAME;
274 if ((result = getaddrinfo (hostname, NULL, &hints, &res))) {
275 iohandler_log(IOLOG_ERROR, "could not resolve %s to an IP address (%d)", hostname, result);
279 switch (res->ai_family) {
281 ip4 = (struct sockaddr_in *) res->ai_addr;
284 ip6 = (struct sockaddr_in6 *) res->ai_addr;
291 if(ip6 && (flags & IOHANDLER_CONNECT_IPV6)) {
292 sockfd = socket(AF_INET6, SOCK_STREAM, 0);
294 iohandler_log(IOLOG_ERROR, "could not create socket in %s:%d", __FILE__, __LINE__);
298 ip6->sin6_family = AF_INET6;
299 ip6->sin6_port = htons(port);
301 struct sockaddr_in6 *ip6vhost = NULL;
302 if (bindhost && !getaddrinfo(bindhost, NULL, &hints, &res)) {
304 switch (res->ai_family) {
306 ip6vhost = (struct sockaddr_in6 *) res->ai_addr;
314 ip6vhost->sin6_family = AF_INET6;
315 ip6vhost->sin6_port = htons(0);
316 bind(sockfd, (struct sockaddr*)ip6vhost, sizeof(*ip6vhost));
318 dstaddr = (struct sockaddr*)ip6;
319 dstaddrlen = sizeof(*ip6);
320 } else if(ip4 && (flags & IOHANDLER_CONNECT_IPV4)) {
321 sockfd = socket(AF_INET, SOCK_STREAM, 0);
323 iohandler_log(IOLOG_ERROR, "could not create socket in %s:%d", __FILE__, __LINE__);
327 ip4->sin_family = AF_INET;
328 ip4->sin_port = htons(port);
330 struct sockaddr_in *ip4vhost = NULL;
331 if (bindhost && !getaddrinfo(bindhost, NULL, &hints, &res)) {
333 switch (res->ai_family) {
335 ip4vhost = (struct sockaddr_in *) res->ai_addr;
343 ip4vhost->sin_family = AF_INET;
344 ip4vhost->sin_port = htons(0);
345 bind(sockfd, (struct sockaddr*)ip4vhost, sizeof(*ip4vhost));
347 dstaddr = (struct sockaddr*)ip4;
348 dstaddrlen = sizeof(*ip4);
353 #if defined(SO_NOSIGPIPE)
356 setsockopt(sockfd, SOL_SOCKET, SO_NOSIGPIPE, (void *)&set, sizeof(int));
359 signal(SIGPIPE, SIG_IGN);
362 //make sockfd unblocking
366 flags = fcntl(sockfd, F_GETFL);
367 fcntl(sockfd, F_SETFL, flags|O_NONBLOCK);
368 flags = fcntl(sockfd, F_GETFD);
369 fcntl(sockfd, F_SETFD, flags|FD_CLOEXEC);
372 /* I hope you're using the Win32 backend or something else that
373 * automatically marks the file descriptor non-blocking...
376 descriptor = iohandler_add(sockfd, IOTYPE_CLIENT, NULL, callback);
381 connect(sockfd, dstaddr, dstaddrlen); //returns EINPROGRESS here (nonblocking)
382 descriptor->state = IO_CONNECTING;
383 descriptor->ssl = (ssl ? 1 : 0);
384 descriptor->read_lines = 1;
385 engine->update(descriptor);
386 iohandler_log(IOLOG_DEBUG, "added client socket (%d) connecting to %s:%d", sockfd, hostname, port);
390 struct IODescriptor *iohandler_listen(const char *hostname, unsigned int port, iohandler_callback *callback) {
391 return iohandler_listen_flags(hostname, port, callback, IOHANDLER_LISTEN_IPV4 | IOHANDLER_LISTEN_IPV6);
394 struct IODescriptor *iohandler_listen_flags(const char *hostname, unsigned int port, iohandler_callback *callback, int flags) {
396 struct addrinfo hints, *res;
397 struct sockaddr_in *ip4 = NULL;
398 struct sockaddr_in6 *ip6 = NULL;
399 struct IODescriptor *descriptor;
403 iohandler_init_engine();
404 if(!engine) return NULL;
406 memset (&hints, 0, sizeof (hints));
407 hints.ai_family = PF_UNSPEC;
408 hints.ai_socktype = SOCK_STREAM;
409 hints.ai_flags |= AI_CANONNAME;
410 if (getaddrinfo (hostname, NULL, &hints, &res)) {
414 switch (res->ai_family) {
416 ip4 = (struct sockaddr_in *) res->ai_addr;
419 ip6 = (struct sockaddr_in6 *) res->ai_addr;
426 if(ip6 && (flags & IOHANDLER_LISTEN_IPV6)) {
427 sockfd = socket(AF_INET6, SOCK_STREAM, 0);
428 if(sockfd == -1) return NULL;
431 setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, (const char*)&opt, sizeof(opt));
433 ip6->sin6_family = AF_INET6;
434 ip6->sin6_port = htons(port);
436 bind(sockfd, (struct sockaddr*)ip6, sizeof(*ip6));
437 } else if(ip4 && (flags && IOHANDLER_LISTEN_IPV4)) {
438 sockfd = socket(AF_INET, SOCK_STREAM, 0);
439 if(sockfd == -1) return NULL;
442 setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, (const char*)&opt, sizeof(opt));
444 ip4->sin_family = AF_INET;
445 ip4->sin_port = htons(port);
447 bind(sockfd, (struct sockaddr*)ip4, sizeof(*ip4));
452 #if defined(SO_NOSIGPIPE)
455 setsockopt(sockfd, SOL_SOCKET, SO_NOSIGPIPE, (void *)&set, sizeof(int));
458 signal(SIGPIPE, SIG_IGN);
461 //make sockfd unblocking
465 flag = fcntl(sockfd, F_GETFL);
466 fcntl(sockfd, F_SETFL, flag|O_NONBLOCK);
467 flag = fcntl(sockfd, F_GETFD);
468 fcntl(sockfd, F_SETFD, flag|FD_CLOEXEC);
471 /* I hope you're using the Win32 backend or something else that
472 * automatically marks the file descriptor non-blocking...
475 descriptor = iohandler_add(sockfd, IOTYPE_SERVER, NULL, callback);
481 descriptor->state = IO_LISTENING;
482 engine->update(descriptor);
483 iohandler_log(IOLOG_DEBUG, "added server socket (%d) listening on %s:%d", sockfd, hostname, port);
487 struct IODescriptor *iohandler_listen_ssl(const char *hostname, unsigned int port, const char *certfile, const char *keyfile, iohandler_callback *callback) {
488 return iohandler_listen_ssl_flags(hostname, port, certfile, keyfile, callback, IOHANDLER_LISTEN_IPV4 | IOHANDLER_LISTEN_IPV6);
491 struct IODescriptor *iohandler_listen_ssl_flags(const char *hostname, unsigned int port, const char *certfile, const char *keyfile, iohandler_callback *callback, int flags) {
492 struct IODescriptor *descriptor = iohandler_listen_flags(hostname, port, callback, flags);
496 iohandler_ssl_listen(descriptor, certfile, keyfile);
497 if(descriptor->sslnode)
502 void iohandler_write(struct IODescriptor *iofd, const char *line) {
503 size_t linelen = strlen(line);
504 iohandler_send(iofd, line, linelen);
507 void iohandler_send(struct IODescriptor *iofd, const char *data, size_t datalen) {
508 if(iofd->type == IOTYPE_TIMER || iofd->state == IO_CLOSED) {
509 iohandler_log(IOLOG_ERROR, "could not write to socket (%s)", (iofd->type == IOTYPE_TIMER ? "IOTYPE_TIMER" : "IO_CLOSED"));
512 iohandler_log(IOLOG_DEBUG, "add %d to writebuf (fd: %d): %s", datalen, iofd->fd, data);
513 if(iofd->writebuf.buflen < iofd->writebuf.bufpos + datalen) {
514 iohandler_log(IOLOG_DEBUG, "increase writebuf (curr: %d) to %d (+%d bytes)", iofd->writebuf.buflen, iofd->writebuf.bufpos + datalen, (iofd->writebuf.bufpos + datalen - iofd->writebuf.buflen));
515 iohandler_increase_iobuf(&iofd->writebuf, iofd->writebuf.bufpos + datalen);
516 if(iofd->writebuf.buflen < iofd->writebuf.bufpos + datalen) {
517 iohandler_log(IOLOG_ERROR, "increase writebuf (curr: %d) to %d (+%d bytes) FAILED", iofd->writebuf.buflen, iofd->writebuf.bufpos + datalen, (iofd->writebuf.bufpos + datalen - iofd->writebuf.buflen));
521 memcpy(iofd->writebuf.buffer + iofd->writebuf.bufpos, data, datalen);
522 iofd->writebuf.bufpos += datalen;
523 engine->update(iofd);
526 void iohandler_printf(struct IODescriptor *iofd, const char *text, ...) {
528 char sendBuf[IO_LINE_LEN];
531 va_start(arg_list, text);
532 pos = vsnprintf(sendBuf, IO_LINE_LEN - 2, text, arg_list);
534 if (pos < 0 || pos > (IO_LINE_LEN - 2)) pos = IO_LINE_LEN - 2;
536 sendBuf[pos+1] = '\0';
537 iohandler_send(iofd, sendBuf, pos+1);
540 static int iohandler_try_write(struct IODescriptor *iofd) {
541 if(!iofd->writebuf.bufpos) return 0;
542 iohandler_log(IOLOG_DEBUG, "write writebuf (%d bytes) to socket (fd: %d)", iofd->writebuf.bufpos, iofd->fd);
545 res = iohandler_ssl_write(iofd, iofd->writebuf.buffer, iofd->writebuf.bufpos);
547 res = send(iofd->fd, iofd->writebuf.buffer, iofd->writebuf.bufpos, 0);
549 if (errno != EAGAIN && errno != EWOULDBLOCK)
550 iohandler_log(IOLOG_ERROR, "could not write to socket (fd: %d): %d - %s", iofd->fd, errno, strerror(errno));
554 iofd->writebuf.bufpos -= res;
555 if(iofd->state != IO_CLOSED)
556 engine->update(iofd);
561 void iohandler_close(struct IODescriptor *iofd) {
562 int engine_remove = 1;
563 iofd->state = IO_CLOSED;
564 if(iofd->writebuf.bufpos) {
565 //try to send everything before closing
569 flags = fcntl(iofd->fd, F_GETFL);
570 fcntl(iofd->fd, F_SETFL, flags & ~O_NONBLOCK);
571 flags = fcntl(iofd->fd, F_GETFD);
572 fcntl(iofd->fd, F_SETFD, flags|FD_CLOEXEC);
576 engine->remove(iofd);
578 iohandler_try_write(iofd);
582 iohandler_ssl_disconnect(iofd);
583 if(iofd->type == IOTYPE_SERVER || iofd->type == IOTYPE_CLIENT || iofd->type == IOTYPE_STDIN)
585 iohandler_remove(iofd, engine_remove);
588 void iohandler_update(struct IODescriptor *iofd) {
589 iohandler_log(IOLOG_DEBUG, "external call to iohandler_update (fd: %d)", iofd->fd);
590 engine->update(iofd);
593 static void iohandler_trigger_event(struct IOEvent *event) {
594 if(!event->iofd->callback) return;
595 iohandler_log(IOLOG_DEBUG, "triggering event (%s) for %s (fd: %d)", iohandler_ioeventtype_name(event->type), iohandler_iotype_name(event->iofd->type), event->iofd->fd);
596 event->iofd->callback(event);
599 void iohandler_events(struct IODescriptor *iofd, int readable, int writeable) {
600 struct IOEvent callback_event;
601 callback_event.type = IOEVENT_IGNORE;
602 callback_event.iofd = iofd;
603 switch(iofd->state) {
605 if(!readable && !writeable) {
606 if(!iofd->ssl_server_hs) {
607 callback_event.type = IOEVENT_SSLFAILED;
608 iofd->state = IO_CLOSED;
609 engine->update(iofd);
611 iohandler_close(iofd);
612 } else if(iofd->ssl_server_hs) {
613 iohandler_log(IOLOG_DEBUG, "triggering iohandler_ssl_server_handshake for %s (fd: %d)", iohandler_iotype_name(iofd->type), iofd->fd);
614 iohandler_ssl_server_handshake(iofd);
616 iohandler_log(IOLOG_DEBUG, "triggering iohandler_ssl_client_handshake for %s (fd: %d)", iohandler_iotype_name(iofd->type), iofd->fd);
617 iohandler_ssl_client_handshake(iofd);
621 if(iofd->type == IOTYPE_TIMER)
622 callback_event.type = IOEVENT_TIMEOUT;
626 callback_event.data.accept_fd = accept(iofd->fd, NULL, 0);
627 if(callback_event.data.accept_fd < 0) {
628 iohandler_log(IOLOG_ERROR, "could not accept client (server fd: %d): %d - %s", iofd->fd, errno, strerror(errno));
629 } else if(iofd->ssl) {
630 struct IODescriptor *client_iofd = iohandler_add(callback_event.data.accept_fd, IOTYPE_CLIENT, NULL, NULL);
631 iohandler_ssl_client_accepted(iofd, client_iofd);
633 callback_event.type = IOEVENT_ACCEPT;
637 if(readable) { //could not connect
638 callback_event.type = IOEVENT_NOTCONNECTED;
640 //arglen = sizeof(callback_event.data.errid);
641 //if (getsockopt(iofd->fd, SOL_SOCKET, SO_ERROR, &callback_event.data.errid, &arglen) < 0)
642 // callback_event.data.errid = errno;
643 iofd->state = IO_CLOSED;
644 engine->update(iofd);
645 } else if(writeable) {
646 if(iofd->ssl && !iofd->ssl_active) {
647 iohandler_log(IOLOG_DEBUG, "triggering iohandler_ssl_connect for %s (fd: %d)", iohandler_iotype_name(iofd->type), iofd->fd);
648 iohandler_ssl_connect(iofd);
651 if(iofd->ssl && iofd->ssl_server_hs)
652 callback_event.type = IOEVENT_CONNECTED;
654 callback_event.type = IOEVENT_SSLACCEPT;
655 callback_event.iofd = iofd->data;
656 callback_event.data.accept_iofd = iofd;
659 iofd->state = IO_CONNECTED;
660 engine->update(iofd);
665 if(iofd->read_lines) {
669 bytes = iohandler_ssl_read(iofd, iofd->readbuf.buffer + iofd->readbuf.bufpos, iofd->readbuf.buflen - iofd->readbuf.bufpos);
671 if(iofd->type == IOTYPE_STDIN)
675 bytes = read(iofd->fd, iofd->readbuf.buffer + iofd->readbuf.bufpos, iofd->readbuf.buflen - iofd->readbuf.bufpos);
678 bytes = recv(iofd->fd, iofd->readbuf.buffer + iofd->readbuf.bufpos, iofd->readbuf.buflen - iofd->readbuf.bufpos, 0);
681 if (errno != EAGAIN || errno != EWOULDBLOCK) {
682 iofd->state = IO_CLOSED;
683 engine->update(iofd);
684 callback_event.type = IOEVENT_CLOSED;
685 callback_event.data.errid = errno;
688 int i, used_bytes = 0;
689 iohandler_log(IOLOG_DEBUG, "received %d bytes (fd: %d). readbuf position: %d", bytes, iofd->fd, iofd->readbuf.bufpos);
690 iofd->readbuf.bufpos += bytes;
691 callback_event.type = IOEVENT_RECV;
692 for(i = 0; i < iofd->readbuf.bufpos; i++) {
693 if(iofd->readbuf.buffer[i] == '\r' && iofd->readbuf.buffer[i+1] == '\n')
694 iofd->readbuf.buffer[i] = 0;
695 else if(iofd->readbuf.buffer[i] == '\n' || iofd->readbuf.buffer[i] == '\r') {
696 iofd->readbuf.buffer[i] = 0;
697 callback_event.data.recv_str = iofd->readbuf.buffer + used_bytes;
698 iohandler_log(IOLOG_DEBUG, "parsed line (%d bytes): %s", i - used_bytes, iofd->readbuf.buffer + used_bytes);
700 iohandler_trigger_event(&callback_event);
701 } else if(i + 1 - used_bytes >= IO_LINE_LEN) { //512 max
702 iofd->readbuf.buffer[i] = 0;
703 callback_event.data.recv_str = iofd->readbuf.buffer + used_bytes;
704 iohandler_log(IOLOG_DEBUG, "parsed and stripped line (%d bytes): %s", i - used_bytes, iofd->readbuf.buffer + used_bytes);
705 for(; i < iofd->readbuf.bufpos; i++) { //skip the rest of the line
706 if(iofd->readbuf.buffer[i] == '\n' || (iofd->readbuf.buffer[i] == '\r' && iofd->readbuf.buffer[i+1] != '\n')) {
711 iohandler_trigger_event(&callback_event);
715 if(used_bytes == iofd->readbuf.bufpos) {
716 iofd->readbuf.bufpos = 0;
717 iohandler_log(IOLOG_DEBUG, "readbuf fully processed (set buffer position to 0)");
719 iohandler_log(IOLOG_DEBUG, "readbuf rest: %d bytes (used %d bytes)", iofd->readbuf.bufpos - used_bytes, used_bytes);
720 memmove(iofd->readbuf.buffer, iofd->readbuf.buffer + used_bytes, iofd->readbuf.bufpos - used_bytes);
721 iofd->readbuf.bufpos -= used_bytes;
724 callback_event.type = IOEVENT_IGNORE;
727 callback_event.type = IOEVENT_READABLE;
731 bytes = iohandler_try_write(iofd);
733 iofd->state = IO_CLOSED;
734 engine->update(iofd);
735 callback_event.type = IOEVENT_CLOSED;
736 callback_event.data.errid = errno;
741 if(callback_event.type == IOEVENT_IGNORE && !readable && !writeable)
742 callback_event.type = IOEVENT_TIMEOUT;
743 if(callback_event.type != IOEVENT_IGNORE)
744 iohandler_trigger_event(&callback_event);
747 void iohandler_poll() {
748 struct timeval timeout;
749 timeout.tv_sec = IO_MAX_TIMEOUT;
751 iohandler_poll_timeout(timeout);
754 void iohandler_poll_timeout(struct timeval timeout) {
756 IOSYNCHRONIZE(io_poll_sync); //quite senceless multithread support... better support will follow
757 engine->loop(&timeout);
758 IODESYNCHRONIZE(io_poll_sync);
762 //debugging functions
763 char *iohandler_iotype_name(enum IOType type) {
766 return "IOTYPE_UNKNOWN";
768 return "IOTYPE_SERVER";
770 return "IOTYPE_CLIENT";
772 return "IOTYPE_STDIN";
774 return "IOTYPE_TIMER";
776 return "(UNDEFINED)";
780 char *iohandler_iostatus_name(enum IOStatus status) {
785 return "IO_LISTENING";
787 return "IO_CONNECTING";
789 return "IO_CONNECTED";
793 return "(UNDEFINED)";
797 char *iohandler_ioeventtype_name(enum IOEventType type) {
800 return "IOEVENT_IGNORE";
801 case IOEVENT_READABLE:
802 return "IOEVENT_READABLE";
804 return "IOEVENT_RECV";
805 case IOEVENT_CONNECTED:
806 return "IOEVENT_CONNECTED";
807 case IOEVENT_NOTCONNECTED:
808 return "IOEVENT_NOTCONNECTED";
810 return "IOEVENT_CLOSED";
812 return "IOEVENT_ACCEPT";
813 case IOEVENT_TIMEOUT:
814 return "IOEVENT_TIMEOUT";
816 return "(UNDEFINED)";