1 /* ClientSocket.c - NeonServ v5.2
2 * Copyright (C) 2011 Philipp Kreil (pk910)
4 * This program is free software: you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation, either version 3 of the License, or
7 * (at your option) any later version.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program. If not, see <http://www.gnu.org/licenses/>.
18 #include "ClientSocket.h"
19 #include "IRCParser.h"
22 #include "WHOHandler.h"
23 #include "HandleInfoHandler.h"
27 struct ClientSocket *data;
32 static struct socket_list *sockets = NULL;
33 static char buffer[BUF_SIZ];
35 static void init_sockets() {
36 sockets = malloc(sizeof(*sockets));
39 perror("malloc() failed");
46 struct ClientSocket* create_socket(char *host, int port, char *pass, char *nick, char *ident, char *realname) {
47 if(sockets == NULL) init_sockets();
48 struct ClientSocket *client = malloc(sizeof(*client));
51 perror("malloc() failed");
54 client->host = strdup(host);
56 printf("Connect: %s:%d\n", client->host, client->port);
57 client->pass = (pass == NULL ? NULL : strdup(pass));
58 client->nick = strdup(nick);
59 client->ident = strdup(ident);
60 client->realname = strdup(realname);
63 client->bufferpos = 0;
64 client->traffic_in = 0;
65 client->traffic_out = 0;
66 client->connection_time = 0;
70 client->whoqueue_first = NULL;
71 client->whoqueue_last = NULL;
72 client->handleinfo_first = NULL;
73 client->handleinfo_last = NULL;
74 client->next = sockets->data;
75 sockets->data = client;
81 int connect_socket(struct ClientSocket *client) {
82 if((client->flags & SOCKET_FLAG_CONNECTED)) return 1;
84 struct sockaddr_in addr;
86 addr.sin_addr.s_addr = inet_addr(client->host);
87 if (addr.sin_addr.s_addr == INADDR_NONE) {
88 host = gethostbyname(client->host);
92 memcpy(&(addr.sin_addr), host->h_addr_list[0], 4);
94 sock = socket(PF_INET, SOCK_STREAM, 0);
97 perror("socket() failed");
101 addr.sin_port = htons(client->port);
102 addr.sin_family = AF_INET;
104 if (connect(sock, (struct sockaddr*)&addr, sizeof(addr)) == -1)
106 perror("connect() failed");
111 client->flags |= SOCKET_FLAG_CONNECTED | SOCKET_FLAG_RECONNECT;
112 client->connection_time = time(0);
115 if(client->flags & SOCKET_FLAG_SSL) {
120 //send the IRC Headers
124 if(client->pass && strcmp(client->pass, "")) {
125 len = sprintf(sendBuf, "PASS :%s\n", client->pass);
126 write_socket(client, sendBuf, len);
128 len = sprintf(sendBuf, "USER %s 0 0 :%s\n", client->ident, client->realname);
129 write_socket(client, sendBuf, len);
130 len = sprintf(sendBuf, "NICK %s\n", client->nick);
131 write_socket(client, sendBuf, len);
138 int connect_socket(struct ClientSocket *client) {
139 if((client->flags & SOCKET_FLAG_CONNECTED)) return 1;
140 struct hostent *host;
141 struct sockaddr_in addr;
143 if (!inet_aton(client->host, &addr.sin_addr))
145 host = gethostbyname(client->host);
148 perror("gethostbyname() failed");
151 addr.sin_addr = *(struct in_addr*)host->h_addr;
153 sock = socket(PF_INET, SOCK_STREAM, 0);
156 perror("socket() failed");
160 addr.sin_port = htons(client->port);
161 addr.sin_family = AF_INET;
163 if (connect(sock, (struct sockaddr*)&addr, sizeof(addr)) == -1)
165 perror("connect() failed");
170 client->flags |= SOCKET_FLAG_CONNECTED | SOCKET_FLAG_RECONNECT;
171 client->connection_time = time(0);
173 if(client->flags & SOCKET_FLAG_SSL) {
177 //send the IRC Headers
181 if(client->pass && strcmp(client->pass, "")) {
182 len = sprintf(sendBuf, "PASS :%s\n", client->pass);
183 write_socket(client, sendBuf, len);
185 len = sprintf(sendBuf, "USER %s 0 0 :%s\n", client->ident, client->realname);
186 write_socket(client, sendBuf, len);
187 len = sprintf(sendBuf, "NICK %s\n", client->nick);
188 write_socket(client, sendBuf, len);
195 int close_socket(struct ClientSocket *client) {
196 if(client == NULL) return 0;
197 if((client->flags & SOCKET_FLAG_CONNECTED))
199 if(client->flags & SOCKET_FLAG_SSL)
200 ssl_disconnect(client);
201 struct ClientSocket *sock, *last_sock = NULL;
202 for (sock = sockets->data; sock; sock = sock->next) {
205 last_sock->next = sock->next;
207 sockets->data = sock->next;
213 queue_destroy(client);
214 if(client->whoqueue_first)
215 clear_whoqueue(client);
216 if(client->handleinfo_first)
217 clear_handleinfoqueue(client);
224 int write_socket_force(struct ClientSocket *client, char* msg, int len) {
225 printf("[send %d] %s", len, msg);
226 if(!(client->flags & SOCKET_FLAG_SSL) || ssl_write(client, msg, len) == -2) {
228 send(client->sock, msg, len, 0);
230 write(client->sock, msg, len);
233 client->traffic_out += len;
237 int write_socket(struct ClientSocket *client, char* msg, int len) {
238 if(!(client && (client->flags & SOCKET_FLAG_CONNECTED))) return 0;
239 if(client->flags & SOCKET_FLAG_USE_QUEUE)
240 return queue_add(client, msg, len);
242 return write_socket_force(client, msg, len);
245 void socket_loop(int timeout_seconds) {
246 if(sockets == NULL) return;
248 struct timeval timeout;
249 struct ClientSocket *sock;
250 int ret = 0, bytes, i;
253 for (sock = sockets->data; sock; sock = sock->next) {
254 if(!(sock->flags & SOCKET_FLAG_CONNECTED)) continue; //skip disconnected sockets
255 FD_SET(sock->sock, &fds);
259 timeout.tv_sec = timeout_seconds;
261 ret = select(ret + 1, &fds, NULL, NULL, &timeout);
263 for (sock = sockets->data; sock; sock = sock->next) {
264 if((sock->flags & SOCKET_FLAG_CONNECTED) && FD_ISSET(sock->sock, &fds)) {
265 if(sock->bufferpos != 0) {
266 if(!(sock->flags & SOCKET_FLAG_SSL) || (bytes = ssl_read(sock, buffer, sizeof(buffer))) == -2) {
268 bytes = recv(sock->sock, buffer, sizeof(buffer), 0);
270 bytes = read(sock->sock, buffer, sizeof(buffer));
274 for(i = 0; i < bytes; i++) {
275 if(sock->bufferpos + i == BUF_SIZ*2) break; //buffer overflow
276 sock->buffer[sock->bufferpos + i] = buffer[i];
278 sock->bufferpos += i;
281 if(!(sock->flags & SOCKET_FLAG_SSL) || (bytes = ssl_read(sock, sock->buffer, sizeof(sock->buffer))) == -2) {
283 bytes = recv(sock->sock, sock->buffer, sizeof(sock->buffer), 0);
285 bytes = read(sock->sock, sock->buffer, sizeof(sock->buffer));
289 sock->bufferpos = bytes;
293 sock->flags &= ~(SOCKET_FLAG_CONNECTED | SOCKET_FLAG_READY);
294 bot_disconnect(sock);
298 if(sock->flags & SOCKET_FLAG_SSL)
299 ssl_disconnect(sock);
301 sock->traffic_in += bytes;
302 int used = parse_lines(sock, sock->buffer, sock->bufferpos);
303 if(used == sock->bufferpos + 1) {
304 //used all bytes so just reset the bufferpos
307 for(i = 0; i < sock->bufferpos - used; i++) {
308 sock->buffer[i] = sock->buffer[i+used];
310 sock->bufferpos -= used;
313 } else if(!(sock->flags & SOCKET_FLAG_CONNECTED) && (sock->flags & SOCKET_FLAG_RECONNECT)) {
314 if(time(0) - sock->connection_time >= SOCKET_RECONNECT_TIME) {
315 connect_socket(sock);
322 putsock(struct ClientSocket *client, const char *text, ...)
325 char sendBuf[MAXLEN];
327 if (!(client && (client->flags & SOCKET_FLAG_CONNECTED))) return;
329 va_start(arg_list, text);
330 pos = vsnprintf(sendBuf, MAXLEN - 2, text, arg_list);
332 if (pos < 0 || pos > (MAXLEN - 2)) pos = MAXLEN - 2;
334 sendBuf[pos+1] = '\0';
335 write_socket(client, sendBuf, pos+1);
338 struct ClientSocket* getBots(int flags, struct ClientSocket* last_bot) {
339 struct ClientSocket *sock = (last_bot ? last_bot->next : sockets->data);
340 if(sock == NULL) return NULL;
341 for (; sock; sock = sock->next) {
342 if(!flags || (sock->flags & flags) == flags)
348 void free_sockets() {
350 struct ClientSocket *client, *next;
351 for (client = sockets->data; client; client = next) {
353 if((client->flags & SOCKET_FLAG_CONNECTED))
355 if(client->flags & SOCKET_FLAG_SSL)
356 ssl_disconnect(client);
358 queue_destroy(client);