diff options
| author | Diego Nehab <diego@tecgraf.puc-rio.br> | 2004-01-24 00:18:19 +0000 |
|---|---|---|
| committer | Diego Nehab <diego@tecgraf.puc-rio.br> | 2004-01-24 00:18:19 +0000 |
| commit | 0c9f420a3549df3fb331bb24157b65a3301641d4 (patch) | |
| tree | e1b6ce40b55a77ed2bc20493f10f8239b7c00071 /src/usocket.c | |
| parent | 42e0e74487ca62b58a8a1fa06580154c632b4942 (diff) | |
| download | luasocket-0c9f420a3549df3fb331bb24157b65a3301641d4.tar.gz luasocket-0c9f420a3549df3fb331bb24157b65a3301641d4.tar.bz2 luasocket-0c9f420a3549df3fb331bb24157b65a3301641d4.zip | |
New accept/connect code.
Better error checking.
Better tests.
__tostring implemented.
Diffstat (limited to 'src/usocket.c')
| -rw-r--r-- | src/usocket.c | 181 |
1 files changed, 118 insertions, 63 deletions
diff --git a/src/usocket.c b/src/usocket.c index 5afa1bf..bece354 100644 --- a/src/usocket.c +++ b/src/usocket.c | |||
| @@ -20,9 +20,11 @@ | |||
| 20 | 20 | ||
| 21 | #include "socket.h" | 21 | #include "socket.h" |
| 22 | 22 | ||
| 23 | static const char *sock_createstrerror(void); | 23 | static const char *sock_createstrerror(int err); |
| 24 | static const char *sock_bindstrerror(void); | 24 | static const char *sock_bindstrerror(int err); |
| 25 | static const char *sock_connectstrerror(void); | 25 | static const char *sock_connectstrerror(int err); |
| 26 | static const char *sock_acceptstrerror(int err); | ||
| 27 | static const char *sock_listenstrerror(int err); | ||
| 26 | 28 | ||
| 27 | /*-------------------------------------------------------------------------*\ | 29 | /*-------------------------------------------------------------------------*\ |
| 28 | * Initializes module | 30 | * Initializes module |
| @@ -46,19 +48,31 @@ int sock_open(void) | |||
| 46 | void sock_destroy(p_sock ps) | 48 | void sock_destroy(p_sock ps) |
| 47 | { | 49 | { |
| 48 | if (*ps != SOCK_INVALID) { | 50 | if (*ps != SOCK_INVALID) { |
| 51 | sock_setblocking(ps); | ||
| 49 | close(*ps); | 52 | close(*ps); |
| 50 | *ps = SOCK_INVALID; | 53 | *ps = SOCK_INVALID; |
| 51 | } | 54 | } |
| 52 | } | 55 | } |
| 53 | 56 | ||
| 54 | /*-------------------------------------------------------------------------*\ | 57 | /*-------------------------------------------------------------------------*\ |
| 58 | * Select with int timeout in ms | ||
| 59 | \*-------------------------------------------------------------------------*/ | ||
| 60 | int sock_select(int n, fd_set *rfds, fd_set *wfds, fd_set *efds, int timeout) | ||
| 61 | { | ||
| 62 | struct timeval tv; | ||
| 63 | tv.tv_sec = timeout / 1000; | ||
| 64 | tv.tv_usec = (timeout % 1000) * 1000; | ||
| 65 | return select(n, rfds, wfds, efds, timeout >= 0? &tv: NULL); | ||
| 66 | } | ||
| 67 | |||
| 68 | /*-------------------------------------------------------------------------*\ | ||
| 55 | * Creates and sets up a socket | 69 | * Creates and sets up a socket |
| 56 | \*-------------------------------------------------------------------------*/ | 70 | \*-------------------------------------------------------------------------*/ |
| 57 | const char *sock_create(p_sock ps, int domain, int type, int protocol) | 71 | const char *sock_create(p_sock ps, int domain, int type, int protocol) |
| 58 | { | 72 | { |
| 59 | int val = 1; | 73 | int val = 1; |
| 60 | t_sock sock = socket(domain, type, protocol); | 74 | t_sock sock = socket(domain, type, protocol); |
| 61 | if (sock == SOCK_INVALID) return sock_createstrerror(); | 75 | if (sock == SOCK_INVALID) return sock_createstrerror(errno); |
| 62 | *ps = sock; | 76 | *ps = sock; |
| 63 | sock_setnonblocking(ps); | 77 | sock_setnonblocking(ps); |
| 64 | setsockopt(*ps, SOL_SOCKET, SO_REUSEADDR, (char *) &val, sizeof(val)); | 78 | setsockopt(*ps, SOL_SOCKET, SO_REUSEADDR, (char *) &val, sizeof(val)); |
| @@ -79,27 +93,22 @@ const char *sock_connect(p_sock ps, SA *addr, socklen_t addr_len, p_tm tm) | |||
| 79 | /* if no error, we're done */ | 93 | /* if no error, we're done */ |
| 80 | if (err == 0) return NULL; | 94 | if (err == 0) return NULL; |
| 81 | /* make sure the system is trying to connect */ | 95 | /* make sure the system is trying to connect */ |
| 82 | if (errno != EINPROGRESS) return io_strerror(IO_ERROR); | 96 | if (errno != EINPROGRESS) return sock_connectstrerror(errno); |
| 83 | /* wait for a timeout or for the system's answer */ | 97 | /* wait for a timeout or for the system's answer */ |
| 84 | for ( ;; ) { | 98 | for ( ;; ) { |
| 85 | struct timeval tv; | ||
| 86 | fd_set rfds, wfds, efds; | 99 | fd_set rfds, wfds, efds; |
| 87 | int timeout = tm_getretry(tm); | ||
| 88 | tv.tv_sec = timeout / 1000; | ||
| 89 | tv.tv_usec = (timeout % 1000) * 1000; | ||
| 90 | FD_ZERO(&rfds); FD_SET(sock, &rfds); | 100 | FD_ZERO(&rfds); FD_SET(sock, &rfds); |
| 91 | FD_ZERO(&wfds); FD_SET(sock, &wfds); | 101 | FD_ZERO(&wfds); FD_SET(sock, &wfds); |
| 92 | FD_ZERO(&efds); FD_SET(sock, &efds); | 102 | FD_ZERO(&efds); FD_SET(sock, &efds); |
| 93 | /* we run select to avoid busy waiting */ | 103 | /* we run select to avoid busy waiting */ |
| 94 | err = select(sock+1, &rfds, &wfds, &efds, timeout >= 0? &tv: NULL); | 104 | do err = sock_select(sock+1, &rfds, &wfds, &efds, tm_getretry(tm)); |
| 95 | /* if select was interrupted, try again */ | 105 | while (err < 0 && errno == EINTR); |
| 96 | if (err < 0 && errno == EINTR) continue; | ||
| 97 | /* if selects readable, try reading */ | 106 | /* if selects readable, try reading */ |
| 98 | if (err > 0) { | 107 | if (err > 0) { |
| 99 | char dummy; | 108 | char dummy; |
| 100 | /* recv will set errno to the value a blocking connect would set */ | 109 | /* recv will set errno to the value a blocking connect would set */ |
| 101 | if (recv(sock, &dummy, 0, 0) < 0 && errno != EAGAIN) | 110 | if (recv(sock, &dummy, 0, 0) < 0 && errno != EWOULDBLOCK) |
| 102 | return sock_connectstrerror(); | 111 | return sock_connectstrerror(errno); |
| 103 | else | 112 | else |
| 104 | return NULL; | 113 | return NULL; |
| 105 | /* if no event happened, there was a timeout */ | 114 | /* if no event happened, there was a timeout */ |
| @@ -113,16 +122,24 @@ const char *sock_connect(p_sock ps, SA *addr, socklen_t addr_len, p_tm tm) | |||
| 113 | \*-------------------------------------------------------------------------*/ | 122 | \*-------------------------------------------------------------------------*/ |
| 114 | const char *sock_bind(p_sock ps, SA *addr, socklen_t addr_len) | 123 | const char *sock_bind(p_sock ps, SA *addr, socklen_t addr_len) |
| 115 | { | 124 | { |
| 116 | if (bind(*ps, addr, addr_len) < 0) return sock_bindstrerror(); | 125 | const char *err = NULL; |
| 117 | else return NULL; | 126 | sock_setblocking(ps); |
| 127 | if (bind(*ps, addr, addr_len) < 0) err = sock_bindstrerror(errno); | ||
| 128 | sock_setnonblocking(ps); | ||
| 129 | return err; | ||
| 118 | } | 130 | } |
| 119 | 131 | ||
| 120 | /*-------------------------------------------------------------------------*\ | 132 | /*-------------------------------------------------------------------------*\ |
| 121 | * | 133 | * |
| 122 | \*-------------------------------------------------------------------------*/ | 134 | \*-------------------------------------------------------------------------*/ |
| 123 | void sock_listen(p_sock ps, int backlog) | 135 | const char* sock_listen(p_sock ps, int backlog) |
| 124 | { | 136 | { |
| 125 | listen(*ps, backlog); | 137 | const char *err = NULL; |
| 138 | sock_setblocking(ps); | ||
| 139 | if (listen(*ps, backlog)) | ||
| 140 | err = sock_listenstrerror(errno); | ||
| 141 | sock_setnonblocking(ps); | ||
| 142 | return err; | ||
| 126 | } | 143 | } |
| 127 | 144 | ||
| 128 | /*-------------------------------------------------------------------------*\ | 145 | /*-------------------------------------------------------------------------*\ |
| @@ -130,35 +147,40 @@ void sock_listen(p_sock ps, int backlog) | |||
| 130 | \*-------------------------------------------------------------------------*/ | 147 | \*-------------------------------------------------------------------------*/ |
| 131 | void sock_shutdown(p_sock ps, int how) | 148 | void sock_shutdown(p_sock ps, int how) |
| 132 | { | 149 | { |
| 150 | sock_setblocking(ps); | ||
| 133 | shutdown(*ps, how); | 151 | shutdown(*ps, how); |
| 152 | sock_setnonblocking(ps); | ||
| 134 | } | 153 | } |
| 135 | 154 | ||
| 136 | /*-------------------------------------------------------------------------*\ | 155 | /*-------------------------------------------------------------------------*\ |
| 137 | * Accept with timeout | 156 | * Accept with timeout |
| 138 | \*-------------------------------------------------------------------------*/ | 157 | \*-------------------------------------------------------------------------*/ |
| 139 | int sock_accept(p_sock ps, p_sock pa, SA *addr, socklen_t *addr_len, p_tm tm) | 158 | const char *sock_accept(p_sock ps, p_sock pa, SA *addr, |
| 159 | socklen_t *addr_len, p_tm tm) | ||
| 140 | { | 160 | { |
| 141 | t_sock sock = *ps; | 161 | t_sock sock = *ps; |
| 142 | SA dummy_addr; | 162 | SA dummy_addr; |
| 143 | socklen_t dummy_len = sizeof(dummy_addr); | 163 | socklen_t dummy_len = sizeof(dummy_addr); |
| 144 | if (sock == SOCK_INVALID) return IO_CLOSED; | 164 | if (sock == SOCK_INVALID) return io_strerror(IO_CLOSED); |
| 145 | if (!addr) addr = &dummy_addr; | 165 | if (!addr) addr = &dummy_addr; |
| 146 | if (!addr_len) addr_len = &dummy_len; | 166 | if (!addr_len) addr_len = &dummy_len; |
| 147 | for (;;) { | 167 | for (;;) { |
| 148 | int timeout = tm_getretry(tm); | 168 | int err; |
| 149 | struct timeval tv; | ||
| 150 | fd_set fds; | 169 | fd_set fds; |
| 151 | *pa = accept(sock, addr, addr_len); | 170 | *pa = accept(sock, addr, addr_len); |
| 152 | if (*pa != SOCK_INVALID) return IO_DONE; | 171 | /* if result is valid, we are done */ |
| 153 | if (timeout == 0) return IO_TIMEOUT; | 172 | if (*pa != SOCK_INVALID) return NULL; |
| 154 | tv.tv_sec = timeout / 1000; | 173 | /* find out if we failed for a fatal reason */ |
| 155 | tv.tv_usec = (timeout % 1000) * 1000; | 174 | if (errno != EWOULDBLOCK && errno != ECONNABORTED) |
| 175 | return sock_acceptstrerror(errno); | ||
| 176 | /* call select just to avoid busy-wait. */ | ||
| 156 | FD_ZERO(&fds); | 177 | FD_ZERO(&fds); |
| 157 | FD_SET(sock, &fds); | 178 | FD_SET(sock, &fds); |
| 158 | /* call select just to avoid busy-wait. */ | 179 | do err = sock_select(sock+1, &fds, NULL, NULL, tm_getretry(tm)); |
| 159 | select(sock+1, &fds, NULL, NULL, timeout >= 0? &tv: NULL); | 180 | while (err < 0 && errno == EINTR); |
| 181 | if (err == 0) return io_strerror(IO_TIMEOUT); | ||
| 160 | } | 182 | } |
| 161 | return IO_TIMEOUT; /* can't get here */ | 183 | return io_strerror(IO_TIMEOUT); /* can't get here */ |
| 162 | } | 184 | } |
| 163 | 185 | ||
| 164 | /*-------------------------------------------------------------------------*\ | 186 | /*-------------------------------------------------------------------------*\ |
| @@ -176,18 +198,15 @@ int sock_send(p_sock ps, const char *data, size_t count, size_t *sent, | |||
| 176 | while (put < 0 && errno == EINTR); | 198 | while (put < 0 && errno == EINTR); |
| 177 | /* deal with failure */ | 199 | /* deal with failure */ |
| 178 | if (put <= 0) { | 200 | if (put <= 0) { |
| 179 | struct timeval tv; | ||
| 180 | fd_set fds; | 201 | fd_set fds; |
| 181 | /* in any case, nothing has been sent */ | 202 | /* in any case, nothing has been sent */ |
| 182 | *sent = 0; | 203 | *sent = 0; |
| 183 | /* here we know the connection has been closed */ | 204 | /* here we know the connection has been closed */ |
| 184 | if (errno == EPIPE) return IO_CLOSED; | 205 | if (errno == EPIPE) return IO_CLOSED; |
| 185 | /* run select to avoid busy wait */ | 206 | /* run select to avoid busy wait */ |
| 186 | tv.tv_sec = timeout / 1000; | ||
| 187 | tv.tv_usec = (timeout % 1000) * 1000; | ||
| 188 | FD_ZERO(&fds); | 207 | FD_ZERO(&fds); |
| 189 | FD_SET(sock, &fds); | 208 | FD_SET(sock, &fds); |
| 190 | if (select(sock+1, NULL, &fds, NULL, timeout >= 0? &tv: NULL) <= 0) { | 209 | if (sock_select(sock+1, NULL, &fds, NULL, timeout) <= 0) { |
| 191 | /* here the call was interrupted. calling again might work */ | 210 | /* here the call was interrupted. calling again might work */ |
| 192 | if (errno == EINTR) return IO_RETRY; | 211 | if (errno == EINTR) return IO_RETRY; |
| 193 | /* here there was no data before timeout */ | 212 | /* here there was no data before timeout */ |
| @@ -213,15 +232,12 @@ int sock_sendto(p_sock ps, const char *data, size_t count, size_t *sent, | |||
| 213 | do put = sendto(sock, data, count, 0, addr, addr_len); | 232 | do put = sendto(sock, data, count, 0, addr, addr_len); |
| 214 | while (put < 0 && errno == EINTR); | 233 | while (put < 0 && errno == EINTR); |
| 215 | if (put <= 0) { | 234 | if (put <= 0) { |
| 216 | struct timeval tv; | ||
| 217 | fd_set fds; | 235 | fd_set fds; |
| 218 | *sent = 0; | 236 | *sent = 0; |
| 219 | if (errno == EPIPE) return IO_CLOSED; | 237 | if (errno == EPIPE) return IO_CLOSED; |
| 220 | tv.tv_sec = timeout / 1000; | ||
| 221 | tv.tv_usec = (timeout % 1000) * 1000; | ||
| 222 | FD_ZERO(&fds); | 238 | FD_ZERO(&fds); |
| 223 | FD_SET(sock, &fds); | 239 | FD_SET(sock, &fds); |
| 224 | if (select(sock+1, NULL, &fds, NULL, timeout >= 0? &tv: NULL) <= 0) { | 240 | if (sock_select(sock+1, NULL, &fds, NULL, timeout) <= 0) { |
| 225 | if (errno == EINTR) return IO_RETRY; | 241 | if (errno == EINTR) return IO_RETRY; |
| 226 | else return IO_TIMEOUT; | 242 | else return IO_TIMEOUT; |
| 227 | } else return IO_DONE; | 243 | } else return IO_DONE; |
| @@ -242,16 +258,13 @@ int sock_recv(p_sock ps, char *data, size_t count, size_t *got, int timeout) | |||
| 242 | do taken = read(sock, data, count); | 258 | do taken = read(sock, data, count); |
| 243 | while (taken < 0 && errno == EINTR); | 259 | while (taken < 0 && errno == EINTR); |
| 244 | if (taken <= 0) { | 260 | if (taken <= 0) { |
| 245 | struct timeval tv; | ||
| 246 | fd_set fds; | 261 | fd_set fds; |
| 247 | int ret; | 262 | int ret; |
| 248 | *got = 0; | 263 | *got = 0; |
| 249 | if (taken == 0) return IO_CLOSED; | 264 | if (taken == 0) return IO_CLOSED; |
| 250 | tv.tv_sec = timeout / 1000; | ||
| 251 | tv.tv_usec = (timeout % 1000) * 1000; | ||
| 252 | FD_ZERO(&fds); | 265 | FD_ZERO(&fds); |
| 253 | FD_SET(sock, &fds); | 266 | FD_SET(sock, &fds); |
| 254 | ret = select(sock+1, &fds, NULL, NULL, timeout >= 0 ? &tv : NULL); | 267 | ret = sock_select(sock+1, &fds, NULL, NULL, timeout); |
| 255 | if (ret < 0 && errno == EINTR) return IO_RETRY; | 268 | if (ret < 0 && errno == EINTR) return IO_RETRY; |
| 256 | if (ret == 0) return IO_TIMEOUT; | 269 | if (ret == 0) return IO_TIMEOUT; |
| 257 | else return IO_DONE; | 270 | else return IO_DONE; |
| @@ -273,16 +286,13 @@ int sock_recvfrom(p_sock ps, char *data, size_t count, size_t *got, | |||
| 273 | do taken = recvfrom(sock, data, count, 0, addr, addr_len); | 286 | do taken = recvfrom(sock, data, count, 0, addr, addr_len); |
| 274 | while (taken < 0 && errno == EINTR); | 287 | while (taken < 0 && errno == EINTR); |
| 275 | if (taken <= 0) { | 288 | if (taken <= 0) { |
| 276 | struct timeval tv; | ||
| 277 | fd_set fds; | 289 | fd_set fds; |
| 278 | int ret; | 290 | int ret; |
| 279 | *got = 0; | 291 | *got = 0; |
| 280 | if (taken == 0) return IO_CLOSED; | 292 | if (taken == 0) return IO_CLOSED; |
| 281 | tv.tv_sec = timeout / 1000; | ||
| 282 | tv.tv_usec = (timeout % 1000) * 1000; | ||
| 283 | FD_ZERO(&fds); | 293 | FD_ZERO(&fds); |
| 284 | FD_SET(sock, &fds); | 294 | FD_SET(sock, &fds); |
| 285 | ret = select(sock+1, &fds, NULL, NULL, timeout >= 0 ? &tv : NULL); | 295 | ret = sock_select(sock+1, &fds, NULL, NULL, timeout); |
| 286 | if (ret < 0 && errno == EINTR) return IO_RETRY; | 296 | if (ret < 0 && errno == EINTR) return IO_RETRY; |
| 287 | if (ret == 0) return IO_TIMEOUT; | 297 | if (ret == 0) return IO_TIMEOUT; |
| 288 | else return IO_DONE; | 298 | else return IO_DONE; |
| @@ -315,53 +325,98 @@ void sock_setnonblocking(p_sock ps) | |||
| 315 | /*-------------------------------------------------------------------------*\ | 325 | /*-------------------------------------------------------------------------*\ |
| 316 | * Error translation functions | 326 | * Error translation functions |
| 317 | \*-------------------------------------------------------------------------*/ | 327 | \*-------------------------------------------------------------------------*/ |
| 328 | /* return error messages for the known errors reported by gethostbyname */ | ||
| 318 | const char *sock_hoststrerror(void) | 329 | const char *sock_hoststrerror(void) |
| 319 | { | 330 | { |
| 320 | switch (h_errno) { | 331 | switch (h_errno) { |
| 321 | case HOST_NOT_FOUND: return "host not found"; | 332 | case HOST_NOT_FOUND: return "host not found"; |
| 322 | case NO_ADDRESS: return "unable to resolve host name"; | 333 | case NO_ADDRESS: return "valid host but no ip found"; |
| 323 | case NO_RECOVERY: return "name server error"; | 334 | case NO_RECOVERY: return "name server error"; |
| 324 | case TRY_AGAIN: return "name server unavailable, try again later"; | 335 | case TRY_AGAIN: return "name server unavailable, try again later"; |
| 325 | default: return "unknown error"; | 336 | default: return "unknown error"; |
| 326 | } | 337 | } |
| 327 | } | 338 | } |
| 328 | 339 | ||
| 329 | static const char *sock_createstrerror(void) | 340 | /* return error messages for the known errors reported by socket */ |
| 341 | static const char *sock_createstrerror(int err) | ||
| 330 | { | 342 | { |
| 331 | switch (errno) { | 343 | switch (err) { |
| 344 | case EPROTONOSUPPORT: return "protocol not supported"; | ||
| 332 | case EACCES: return "access denied"; | 345 | case EACCES: return "access denied"; |
| 333 | case EMFILE: return "descriptor table is full"; | 346 | case EMFILE: return "process file table is full"; |
| 334 | case ENFILE: return "too many open files"; | 347 | case ENFILE: return "kernel file table is full"; |
| 348 | case EINVAL: return "unknown protocol or family"; | ||
| 335 | case ENOBUFS: return "insuffucient buffer space"; | 349 | case ENOBUFS: return "insuffucient buffer space"; |
| 336 | default: return "unknown error"; | 350 | default: return "unknown error"; |
| 337 | } | 351 | } |
| 338 | } | 352 | } |
| 339 | 353 | ||
| 340 | static const char *sock_bindstrerror(void) | 354 | /* return error messages for the known errors reported by accept */ |
| 355 | static const char *sock_acceptstrerror(int err) | ||
| 341 | { | 356 | { |
| 342 | switch (errno) { | 357 | switch (err) { |
| 358 | case EWOULDBLOCK: return io_strerror(IO_RETRY); | ||
| 343 | case EBADF: return "invalid descriptor"; | 359 | case EBADF: return "invalid descriptor"; |
| 344 | case EINVAL: return "socket already bound"; | 360 | case ENOBUFS: case ENOMEM: return "insuffucient buffer space"; |
| 345 | case EACCES: return "access denied"; | 361 | case ENOTSOCK: return "descriptor not a socket"; |
| 346 | case ENOTSOCK: return "not a socket descriptor"; | 362 | case EOPNOTSUPP: return "not supported"; |
| 363 | case EINTR: return "call interrupted"; | ||
| 364 | case ECONNABORTED: return "connection aborted"; | ||
| 365 | case EINVAL: return "not listening"; | ||
| 366 | case EMFILE: return "process file table is full"; | ||
| 367 | case ENFILE: return "kernel file table is full"; | ||
| 368 | case EFAULT: return "invalid memory address"; | ||
| 369 | default: return "unknown error"; | ||
| 370 | } | ||
| 371 | } | ||
| 372 | |||
| 373 | |||
| 374 | /* return error messages for the known errors reported by bind */ | ||
| 375 | static const char *sock_bindstrerror(int err) | ||
| 376 | { | ||
| 377 | switch (err) { | ||
| 378 | case EBADF: return "invalid descriptor"; | ||
| 379 | case ENOTSOCK: return "descriptor not a socket"; | ||
| 380 | case EADDRNOTAVAIL: return "address unavailable in local host"; | ||
| 347 | case EADDRINUSE: return "address already in use"; | 381 | case EADDRINUSE: return "address already in use"; |
| 348 | case EADDRNOTAVAIL: return "address unavailable"; | 382 | case EINVAL: return "already bound"; |
| 383 | case EACCES: return "access denied"; | ||
| 384 | case EFAULT: return "invalid memory address"; | ||
| 349 | case ENOMEM: return "out of memory"; | 385 | case ENOMEM: return "out of memory"; |
| 350 | default: return "unknown error"; | 386 | default: return "unknown error"; |
| 351 | } | 387 | } |
| 352 | } | 388 | } |
| 353 | 389 | ||
| 354 | static const char *sock_connectstrerror(void) | 390 | /* return error messages for the known errors reported by listen */ |
| 391 | static const char *sock_listenstrerror(int err) | ||
| 355 | { | 392 | { |
| 356 | switch (errno) { | 393 | switch (err) { |
| 394 | case EADDRINUSE: return "local address already in use"; | ||
| 357 | case EBADF: return "invalid descriptor"; | 395 | case EBADF: return "invalid descriptor"; |
| 358 | case ENOTSOCK: return "not a socket descriptor"; | 396 | case ENOTSOCK: return "descriptor not a socket"; |
| 359 | case EADDRNOTAVAIL: return "address not availabe"; | 397 | case EOPNOTSUPP: return "not supported"; |
| 360 | case ETIMEDOUT: return "connection timed out"; | 398 | default: return "unknown error"; |
| 399 | } | ||
| 400 | } | ||
| 401 | |||
| 402 | /* return error messages for the known errors reported by connect */ | ||
| 403 | static const char *sock_connectstrerror(int err) | ||
| 404 | { | ||
| 405 | switch (err) { | ||
| 406 | case EBADF: return "invalid descriptor"; | ||
| 407 | case EFAULT: return "invalid memory address"; | ||
| 408 | case ENOTSOCK: return "descriptor not a socket"; | ||
| 409 | case EADDRNOTAVAIL: return "address not available in local host"; | ||
| 410 | case EISCONN: return "already connected"; | ||
| 361 | case ECONNREFUSED: return "connection refused"; | 411 | case ECONNREFUSED: return "connection refused"; |
| 362 | case EACCES: return "access denied"; | 412 | case ETIMEDOUT: return io_strerror(IO_TIMEOUT); |
| 363 | case ENETUNREACH: return "network is unreachable"; | 413 | case ENETUNREACH: return "network is unreachable"; |
| 364 | case EADDRINUSE: return "address already in use"; | 414 | case EADDRINUSE: return "local address already in use"; |
| 415 | case EINPROGRESS: return "would block"; | ||
| 416 | case EALREADY: return "connect already in progress"; | ||
| 417 | case EAGAIN: return "not enough free ports"; | ||
| 418 | case EAFNOSUPPORT: return "address family not supported"; | ||
| 419 | case EPERM: return "broadcast not enabled or firewall block"; | ||
| 365 | default: return "unknown error"; | 420 | default: return "unknown error"; |
| 366 | } | 421 | } |
| 367 | } | 422 | } |
