- {
-#ifdef WATT32
- extern int _watt_do_exit;
- _watt_do_exit = 0;
- dbug_init();
- if (sock_init())
- return (0);
-#elif defined(OPENSSL_SYS_WINDOWS)
- if (!wsa_init_done)
- {
- int err;
-
-#ifdef SIGINT
- signal(SIGINT,(void (*)(int))ssl_sock_cleanup);
-#endif
- wsa_init_done=1;
- memset(&wsa_state,0,sizeof(wsa_state));
- if (WSAStartup(0x0101,&wsa_state)!=0)
- {
- err=WSAGetLastError();
- BIO_printf(bio_err,"unable to start WINSOCK, error code=%d\n",err);
- return(0);
- }
-
-#ifdef OPENSSL_SYS_WIN16
- EnumTaskWindows(GetCurrentTask(),enumproc,0L);
- lpTopWndProc=(FARPROC)GetWindowLong(topWnd,GWL_WNDPROC);
- lpTopHookProc=MakeProcInstance((FARPROC)topHookProc,_hInstance);
-
- SetWindowLong(topWnd,GWL_WNDPROC,(LONG)lpTopHookProc);
-#endif /* OPENSSL_SYS_WIN16 */
- }
-#endif /* OPENSSL_SYS_WINDOWS */
- return(1);
- }
-
-int init_client(int *sock, char *host, int port)
- {
- unsigned char ip[4];
- short p=0;
-
- if (!host_ip(host,&(ip[0])))
- {
- return(0);
- }
- if (p != 0) port=p;
- return(init_client_ip(sock,ip,port));
- }
-
-static int init_client_ip(int *sock, unsigned char ip[4], int port)
- {
- unsigned long addr;
- struct sockaddr_in them;
- int s,i;
-
- if (!ssl_sock_init()) return(0);
-
- memset((char *)&them,0,sizeof(them));
- them.sin_family=AF_INET;
- them.sin_port=htons((unsigned short)port);
- addr=(unsigned long)
- ((unsigned long)ip[0]<<24L)|
- ((unsigned long)ip[1]<<16L)|
- ((unsigned long)ip[2]<< 8L)|
- ((unsigned long)ip[3]);
- them.sin_addr.s_addr=htonl(addr);
-
- s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
- if (s == INVALID_SOCKET) { perror("socket"); return(0); }
-
-#ifndef OPENSSL_SYS_MPE
- i=0;
- i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
- if (i < 0) { perror("keepalive"); return(0); }
-#endif
-
- if (connect(s,(struct sockaddr *)&them,sizeof(them)) == -1)
- { close(s); perror("connect"); return(0); }
- *sock=s;
- return(1);
- }
-
-int do_server(int port, int *ret, int (*cb)(), char *context)
- {
- int sock;
- char *name;
- int accept_socket;
- int i;
-
- if (!init_server(&accept_socket,port)) return(0);
-
- if (ret != NULL)
- {
- *ret=accept_socket;
- /* return(1);*/
- }
- for (;;)
- {
- if (do_accept(accept_socket,&sock,&name) == 0)
- {
- SHUTDOWN(accept_socket);
- return(0);
- }
- i=(*cb)(name,sock, context);
- if (name != NULL) OPENSSL_free(name);
- SHUTDOWN2(sock);
- if (i < 0)
- {
- SHUTDOWN2(accept_socket);
- return(i);
- }
- }
- }
-
-static int init_server_long(int *sock, int port, char *ip)
- {
- int ret=0;
- struct sockaddr_in server;
- int s= -1,i;
-
- if (!ssl_sock_init()) return(0);
-
- memset((char *)&server,0,sizeof(server));
- server.sin_family=AF_INET;
- server.sin_port=htons((unsigned short)port);
- if (ip == NULL)
- server.sin_addr.s_addr=INADDR_ANY;
- else
+{
+# ifdef WATT32
+ extern int _watt_do_exit;
+ _watt_do_exit = 0;
+ if (sock_init())
+ return (0);
+# elif defined(OPENSSL_SYS_WINDOWS)
+ if (!wsa_init_done) {
+ int err;
+
+# ifdef SIGINT
+ signal(SIGINT, (void (*)(int))ssl_sock_cleanup);
+# endif
+ wsa_init_done = 1;
+ memset(&wsa_state, 0, sizeof(wsa_state));
+ if (WSAStartup(0x0101, &wsa_state) != 0) {
+ err = WSAGetLastError();
+ BIO_printf(bio_err, "unable to start WINSOCK, error code=%d\n",
+ err);
+ return (0);
+ }
+ }
+# elif defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)
+ WORD wVerReq;
+ WSADATA wsaData;
+ int err;
+
+ if (!wsa_init_done) {
+
+# ifdef SIGINT
+ signal(SIGINT, (void (*)(int))sock_cleanup);
+# endif
+
+ wsa_init_done = 1;
+ wVerReq = MAKEWORD(2, 0);
+ err = WSAStartup(wVerReq, &wsaData);
+ if (err != 0) {
+ BIO_printf(bio_err, "unable to start WINSOCK2, error code=%d\n",
+ err);
+ return (0);
+ }
+ }
+# endif
+ return (1);
+}
+
+int init_client(int *sock, const char *host, int port, int type)
+{
+ unsigned char ip[4];
+
+ ip[0] = ip[1] = ip[2] = ip[3] = 0;
+ if (!host_ip(host, &(ip[0])))
+ return 0;
+ return init_client_ip(sock, ip, port, type);
+}
+
+static int init_client_ip(int *sock, const unsigned char ip[4], int port,
+ int type)
+{
+ unsigned long addr;
+ struct sockaddr_in them;
+ int s, i;
+
+ if (!ssl_sock_init())
+ return (0);
+
+ memset((char *)&them, 0, sizeof(them));
+ them.sin_family = AF_INET;
+ them.sin_port = htons((unsigned short)port);
+ addr = (unsigned long)
+ ((unsigned long)ip[0] << 24L) |
+ ((unsigned long)ip[1] << 16L) |
+ ((unsigned long)ip[2] << 8L) | ((unsigned long)ip[3]);
+ them.sin_addr.s_addr = htonl(addr);
+
+ if (type == SOCK_STREAM)
+ s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
+ else /* ( type == SOCK_DGRAM) */
+ s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
+
+ if (s == INVALID_SOCKET) {
+ perror("socket");
+ return (0);
+ }
+# if defined(SO_KEEPALIVE)
+ if (type == SOCK_STREAM) {
+ i = 0;
+ i = setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, (char *)&i, sizeof(i));
+ if (i < 0) {
+ closesocket(s);
+ perror("keepalive");
+ return (0);
+ }
+ }
+# endif
+
+ if (connect(s, (struct sockaddr *)&them, sizeof(them)) == -1) {
+ closesocket(s);
+ perror("connect");
+ return (0);
+ }
+ *sock = s;
+ return (1);
+}
+
+# ifndef NO_SYS_UN_H
+int init_client_unix(int *sock, const char *server)
+{
+ struct sockaddr_un them;
+ int s;
+
+ if (strlen(server) > (UNIX_PATH_MAX + 1))
+ return (0);
+ if (!ssl_sock_init())
+ return (0);
+
+ s = socket(AF_UNIX, SOCK_STREAM, 0);
+ if (s == INVALID_SOCKET) {
+ perror("socket");
+ return (0);
+ }
+
+ memset((char *)&them, 0, sizeof(them));
+ them.sun_family = AF_UNIX;
+ strcpy(them.sun_path, server);
+
+ if (connect(s, (struct sockaddr *)&them, sizeof(them)) == -1) {
+ closesocket(s);
+ perror("connect");
+ return (0);
+ }
+ *sock = s;
+ return (1);
+}
+# endif
+
+int do_server(int port, int type, int *ret,
+ int (*cb) (char *hostname, int s, int stype,
+ unsigned char *context), unsigned char *context,
+ int naccept)
+{
+ int sock;
+ char *name = NULL;
+ int accept_socket = 0;
+ int i;
+
+ if (!init_server(&accept_socket, port, type))
+ return (0);
+
+ if (ret != NULL) {
+ *ret = accept_socket;
+ /* return(1); */
+ }
+ for (;;) {
+ if (type == SOCK_STREAM) {
+# ifdef OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL
+ if (do_accept(accept_socket, &sock, NULL) == 0)
+# else
+ if (do_accept(accept_socket, &sock, &name) == 0)
+# endif
+ {
+ SHUTDOWN(accept_socket);
+ return (0);
+ }
+ } else
+ sock = accept_socket;
+ i = (*cb) (name, sock, type, context);
+ if (name != NULL)
+ OPENSSL_free(name);
+ if (type == SOCK_STREAM)
+ SHUTDOWN2(sock);
+ if (naccept != -1)
+ naccept--;
+ if (i < 0 || naccept == 0) {
+ SHUTDOWN2(accept_socket);
+ return (i);
+ }
+ }
+}
+
+# ifndef NO_SYS_UN_H
+int do_server_unix(const char *path, int *ret,
+ int (*cb) (char *hostname, int s, int stype,
+ unsigned char *context), unsigned char *context,
+ int naccept)
+{
+ int sock;
+ int accept_socket = 0;
+ int i;
+
+ if (!init_server_unix(&accept_socket, path))
+ return (0);
+
+ if (ret != NULL)
+ *ret = accept_socket;
+ for (;;) {
+ if (do_accept_unix(accept_socket, &sock) == 0) {
+ SHUTDOWN(accept_socket);
+ i = 0;
+ goto out;
+ }
+ i = (*cb) (NULL, sock, 0, context);
+ SHUTDOWN2(sock);
+ if (naccept != -1)
+ naccept--;
+ if (i < 0 || naccept == 0) {
+ SHUTDOWN2(accept_socket);
+ goto out;
+ }
+ }
+ out:
+ unlink(path);
+ return (i);
+}
+# endif
+
+static int init_server_long(int *sock, int port, char *ip, int type)
+{
+ int ret = 0;
+ struct sockaddr_in server;
+ int s = -1;
+
+ if (!ssl_sock_init())
+ return (0);
+
+ memset((char *)&server, 0, sizeof(server));
+ server.sin_family = AF_INET;
+ server.sin_port = htons((unsigned short)port);
+ if (ip == NULL)
+ server.sin_addr.s_addr = INADDR_ANY;
+ else