openldap/libraries/libldap/os-ip.c

705 lines
14 KiB
C
Raw Normal View History

/* $OpenLDAP$ */
1998-08-09 08:43:13 +08:00
/*
2002-01-05 05:17:25 +08:00
* Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
1998-12-29 04:53:15 +08:00
* COPYING RESTRICTIONS APPLY, see COPYRIGHT file
*/
/* Portions
1998-08-09 08:43:13 +08:00
* Copyright (c) 1995 Regents of the University of Michigan.
* All rights reserved.
*
* os-ip.c -- platform-specific TCP & UDP related code
*/
1998-10-25 10:02:31 +08:00
#include "portable.h"
1998-08-09 08:43:13 +08:00
#include <stdio.h>
1999-06-03 08:37:44 +08:00
#include <ac/stdlib.h>
1998-08-09 08:43:13 +08:00
1998-10-25 10:02:31 +08:00
#include <ac/errno.h>
#include <ac/socket.h>
#include <ac/string.h>
#include <ac/time.h>
#include <ac/unistd.h>
1998-08-21 03:42:38 +08:00
1998-10-25 10:02:31 +08:00
#ifdef HAVE_IO_H
#include <io.h>
#endif /* HAVE_IO_H */
1998-08-09 08:43:13 +08:00
#include "ldap-int.h"
1998-08-09 08:43:13 +08:00
1999-07-13 14:21:14 +08:00
int ldap_int_tblsize = 0;
2002-06-19 14:44:16 +08:00
#if defined( HAVE_GETADDRINFO ) && defined( HAVE_INET_NTOP )
int ldap_int_inet4or6 = AF_UNSPEC;
#endif
1998-08-09 08:43:13 +08:00
/*
* nonblock connect code
* written by Lars Uffmann, <lars.uffmann@mediaway.net>.
*
* Copyright 1999, Lars Uffmann, All rights reserved.
* This software is not subject to any license of my employer
* mediaWays GmbH.
*
* OpenLDAP COPYING RESTRICTIONS APPLY, see COPYRIGHT file
*
* Read about the rationale in ldap_connect_timeout:
* ftp://koobera.math.uic.edu/www/docs/connect.html.
1998-08-09 08:43:13 +08:00
*/
#define osip_debug(ld,fmt,arg1,arg2,arg3) \
do { \
2000-05-11 17:47:55 +08:00
ldap_log_printf(NULL, LDAP_DEBUG_TRACE, fmt, arg1, arg2, arg3); \
} while(0)
static void
ldap_pvt_set_errno(int err)
1998-08-09 08:43:13 +08:00
{
errno = err;
}
int
ldap_int_timeval_dup( struct timeval **dest, const struct timeval *src )
{
struct timeval *new;
assert( dest != NULL );
if (src == NULL) {
*dest = NULL;
return 0;
}
new = (struct timeval *) LDAP_MALLOC(sizeof(struct timeval));
if( new == NULL ) {
*dest = NULL;
return 1;
}
AC_MEMCPY( (char *) new, (const char *) src, sizeof(struct timeval));
*dest = new;
return 0;
}
static int
ldap_pvt_ndelay_on(LDAP *ld, int fd)
{
osip_debug(ld, "ldap_ndelay_on: %d\n",fd,0,0);
return ber_pvt_socket_set_nonblock( fd, 1 );
}
static int
ldap_pvt_ndelay_off(LDAP *ld, int fd)
{
osip_debug(ld, "ldap_ndelay_off: %d\n",fd,0,0);
return ber_pvt_socket_set_nonblock( fd, 0 );
}
static ber_socket_t
ldap_int_socket(LDAP *ld, int family, int type )
{
ber_socket_t s = socket(family, type, 0);
osip_debug(ld, "ldap_new_socket: %d\n",s,0,0);
return ( s );
}
static int
ldap_pvt_close_socket(LDAP *ld, int s)
{
osip_debug(ld, "ldap_close_socket: %d\n",s,0,0);
return tcp_close(s);
}
static int
ldap_int_prepare_socket(LDAP *ld, int s, int proto )
{
osip_debug(ld, "ldap_prepare_socket: %d\n", s,0,0);
1998-08-09 08:43:13 +08:00
#ifdef TCP_NODELAY
if( proto == LDAP_PROTO_TCP ) {
int dummy = 1;
if ( setsockopt( s, IPPROTO_TCP, TCP_NODELAY,
(char*) &dummy, sizeof(dummy) ) == AC_SOCKET_ERROR )
{
osip_debug(ld, "ldap_prepare_socket: "
"setsockopt(%d, TCP_NODELAY) failed (ignored).\n",
s, 0, 0);
}
}
#endif
return 0;
}
#ifndef HAVE_WINSOCK
#undef TRACE
#define TRACE do { \
osip_debug(ld, \
2000-05-11 17:47:55 +08:00
"ldap_is_socket_ready: error on socket %d: errno: %d (%s)\n", \
s, \
errno, \
2000-05-11 17:47:55 +08:00
sock_errstr(errno) ); \
} while( 0 )
/*
* check the socket for errors after select returned.
*/
static int
ldap_pvt_is_socket_ready(LDAP *ld, int s)
{
osip_debug(ld, "ldap_is_sock_ready: %d\n",s,0,0);
#if defined( notyet ) /* && defined( SO_ERROR ) */
{
int so_errno;
socklen_t dummy = sizeof(so_errno);
2000-10-18 08:27:31 +08:00
if ( getsockopt( s, SOL_SOCKET, SO_ERROR, &so_errno, &dummy )
2000-10-18 11:24:50 +08:00
== AC_SOCKET_ERROR )
2000-10-18 08:27:31 +08:00
{
return -1;
}
if ( so_errno ) {
ldap_pvt_set_errno(so_errno);
TRACE;
return -1;
}
return 0;
}
#else
{
/* error slippery */
struct sockaddr_in sin;
char ch;
socklen_t dummy = sizeof(sin);
2000-10-18 08:27:31 +08:00
if ( getpeername( s, (struct sockaddr *) &sin, &dummy )
2000-10-18 11:24:50 +08:00
== AC_SOCKET_ERROR )
2000-10-18 08:27:31 +08:00
{
/* XXX: needs to be replace with ber_stream_read() */
read(s, &ch, 1);
TRACE;
return -1;
}
return 0;
}
#endif
return -1;
}
#undef TRACE
#endif /* HAVE_WINSOCK */
static int
ldap_pvt_connect(LDAP *ld, ber_socket_t s,
struct sockaddr *sin, socklen_t addrlen,
int async)
{
struct timeval tv, *opt_tv=NULL;
fd_set wfds, *z=NULL;
2000-05-11 17:47:55 +08:00
#ifdef HAVE_WINSOCK
fd_set efds;
#endif
#ifdef LDAP_CONNECTIONLESS
/* We could do a connect() but that would interfere with
* attempts to poll a broadcast address
*/
if (LDAP_IS_UDP(ld)) {
if (ld->ld_options.ldo_peer)
ldap_memfree(ld->ld_options.ldo_peer);
ld->ld_options.ldo_peer=ldap_memalloc(sizeof(struct sockaddr));
AC_MEMCPY(ld->ld_options.ldo_peer,sin,sizeof(struct sockaddr));
return ( 0 );
}
#endif
if ( (opt_tv = ld->ld_options.ldo_tm_net) != NULL ) {
tv.tv_usec = opt_tv->tv_usec;
tv.tv_sec = opt_tv->tv_sec;
}
osip_debug(ld, "ldap_connect_timeout: fd: %d tm: %ld async: %d\n",
s, opt_tv ? tv.tv_sec : -1L, async);
if ( ldap_pvt_ndelay_on(ld, s) == -1 )
return ( -1 );
2000-10-18 11:24:50 +08:00
if ( connect(s, sin, addrlen) != AC_SOCKET_ERROR )
{
if ( ldap_pvt_ndelay_off(ld, s) == -1 )
return ( -1 );
return ( 0 );
}
1998-10-25 10:02:31 +08:00
#ifdef HAVE_WINSOCK
ldap_pvt_set_errno( WSAGetLastError() );
1998-10-25 10:02:31 +08:00
#endif
if ( errno != EINPROGRESS && errno != EWOULDBLOCK ) {
return ( -1 );
}
1998-08-09 08:43:13 +08:00
#ifdef notyet
if ( async ) return ( -2 );
#endif
1998-08-09 08:43:13 +08:00
FD_ZERO(&wfds);
FD_SET(s, &wfds );
2000-05-11 17:47:55 +08:00
#ifdef HAVE_WINSOCK
FD_ZERO(&efds);
FD_SET(s, &efds );
#endif
if ( select(ldap_int_tblsize, z, &wfds,
#ifdef HAVE_WINSOCK
&efds,
#else
z,
#endif
2000-10-18 11:24:50 +08:00
opt_tv ? &tv : NULL) == AC_SOCKET_ERROR )
2000-10-18 08:27:31 +08:00
{
return ( -1 );
2000-10-18 08:27:31 +08:00
}
2000-05-11 17:47:55 +08:00
#ifdef HAVE_WINSOCK
/* This means the connection failed */
2000-10-18 08:27:31 +08:00
if ( FD_ISSET(s, &efds) ) {
int so_errno;
int dummy = sizeof(so_errno);
2002-01-10 13:30:23 +08:00
if ( getsockopt( s, SOL_SOCKET, SO_ERROR,
(char *) &so_errno, &dummy ) == AC_SOCKET_ERROR || !so_errno )
{
/* impossible */
so_errno = WSAGetLastError();
}
ldap_pvt_set_errno(so_errno);
2000-05-11 17:47:55 +08:00
osip_debug(ld, "ldap_pvt_connect: error on socket %d: "
"errno: %d (%s)\n", s, errno, sock_errstr(errno));
return -1;
}
#endif
if ( FD_ISSET(s, &wfds) ) {
#ifndef HAVE_WINSOCK
if ( ldap_pvt_is_socket_ready(ld, s) == -1 )
return ( -1 );
#endif
if ( ldap_pvt_ndelay_off(ld, s) == -1 )
return ( -1 );
return ( 0 );
}
osip_debug(ld, "ldap_connect_timeout: timed out\n",0,0,0);
ldap_pvt_set_errno( ETIMEDOUT );
return ( -1 );
}
1999-08-04 04:02:44 +08:00
#ifndef HAVE_INET_ATON
int
ldap_pvt_inet_aton( const char *host, struct in_addr *in)
{
unsigned long u = inet_addr( host );
if ( u != 0xffffffff || u != (unsigned long) -1 ) {
in->s_addr = u;
return 1;
}
return 0;
}
1999-08-04 04:02:44 +08:00
#endif
int
ldap_connect_to_host(LDAP *ld, Sockbuf *sb,
int proto,
const char *host,
2001-10-07 10:40:16 +08:00
unsigned long address, int port, int async )
{
struct sockaddr_in sin;
ber_socket_t s = AC_SOCKET_INVALID;
int rc, i, use_hp = 0;
struct hostent *hp = NULL;
char *ha_buf=NULL, *p, *q;
int socktype;
switch(proto) {
2002-02-21 23:39:35 +08:00
case LDAP_PROTO_TCP: socktype = SOCK_STREAM;
osip_debug(ld, "ldap_connect_to_host: TCP %s:%d\n",host,port,0);
break;
case LDAP_PROTO_UDP: socktype = SOCK_DGRAM;
osip_debug(ld, "ldap_connect_to_host: TCP %s:%d\n",host,port,0);
break;
default:
osip_debug(ld, "ldap_connect_to_host: unknown proto: %d\n",
proto, 0, 0);
return -1;
}
if (host != NULL) {
2001-05-10 07:41:38 +08:00
#if defined( HAVE_GETADDRINFO ) && defined( HAVE_INET_NTOP )
char serv[7];
int err;
struct addrinfo hints, *res, *sai;
memset( &hints, '\0', sizeof(hints) );
2002-06-19 14:44:16 +08:00
hints.ai_family = ldap_int_inet4or6;
hints.ai_socktype = socktype;
2001-10-07 10:40:16 +08:00
snprintf(serv, sizeof serv, "%d", port );
if ( ( err = getaddrinfo(host, serv, &hints, &res) ) ) {
2001-05-10 07:41:38 +08:00
osip_debug(ld, "ldap_connect_to_host: getaddrinfo failed: %s\n",
AC_GAI_STRERROR(err), 0, 0);
return -1;
}
rc = -1;
for( sai=res; sai != NULL; sai=sai->ai_next) {
if( sai->ai_addr == NULL ) {
osip_debug(ld, "ldap_connect_to_host: getaddrinfo "
"ai_addr is NULL?\n", 0, 0, 0);
continue;
}
/* we assume AF_x and PF_x are equal for all x */
s = ldap_int_socket( ld, sai->ai_family, socktype );
2000-10-18 08:27:31 +08:00
if ( s == AC_SOCKET_INVALID ) {
continue;
}
if ( ldap_int_prepare_socket(ld, s, proto ) == -1 ) {
ldap_pvt_close_socket(ld, s);
break;
}
switch (sai->ai_family) {
#ifdef LDAP_PF_INET6
case AF_INET6: {
char addr[INET6_ADDRSTRLEN];
inet_ntop( AF_INET6,
&((struct sockaddr_in6 *)sai->ai_addr)->sin6_addr,
addr, sizeof addr);
osip_debug(ld, "ldap_connect_to_host: Trying %s %s\n",
addr, serv, 0);
} break;
#endif
case AF_INET: {
char addr[INET_ADDRSTRLEN];
inet_ntop( AF_INET,
&((struct sockaddr_in *)sai->ai_addr)->sin_addr,
addr, sizeof addr);
osip_debug(ld, "ldap_connect_to_host: Trying %s:%s\n",
addr, serv, 0);
} break;
}
rc = ldap_pvt_connect(ld, s, sai->ai_addr, sai->ai_addrlen, async);
if ( (rc == 0) || (rc == -2) ) {
ber_sockbuf_ctrl( sb, LBER_SB_OPT_SET_FD, &s );
break;
}
ldap_pvt_close_socket(ld, s);
}
freeaddrinfo(res);
return rc;
2001-05-10 07:41:38 +08:00
#else
struct in_addr in;
1999-08-04 04:02:44 +08:00
if (! inet_aton( host, &in) ) {
int local_h_errno;
struct hostent he_buf;
rc = ldap_pvt_gethostbyname_a(host, &he_buf, &ha_buf,
&hp, &local_h_errno);
if ( (rc < 0) || (hp == NULL) ) {
#ifdef HAVE_WINSOCK
ldap_pvt_set_errno( WSAGetLastError() );
#else
/* not exactly right, but... */
ldap_pvt_set_errno( EHOSTUNREACH );
#endif
if (ha_buf) LDAP_FREE(ha_buf);
return -1;
1998-08-09 08:43:13 +08:00
}
use_hp = 1;
1998-08-09 08:43:13 +08:00
}
address = in.s_addr;
#endif
1998-08-09 08:43:13 +08:00
}
rc = s = -1;
for ( i = 0; !use_hp || (hp->h_addr_list[i] != 0); ++i, rc = -1 ) {
s = ldap_int_socket( ld, PF_INET, socktype );
2000-10-18 08:27:31 +08:00
if ( s == AC_SOCKET_INVALID ) {
/* use_hp ? continue : break; */
break;
}
if ( ldap_int_prepare_socket( ld, s, proto ) == -1 ) {
ldap_pvt_close_socket(ld, s);
break;
1998-08-09 08:43:13 +08:00
}
2000-06-11 06:39:30 +08:00
(void)memset((char *)&sin, '\0', sizeof(struct sockaddr_in));
sin.sin_family = AF_INET;
2001-10-07 10:40:16 +08:00
sin.sin_port = htons((short) port);
p = (char *)&sin.sin_addr;
q = use_hp ? (char *)hp->h_addr_list[i] : (char *)&address;
AC_MEMCPY(p, q, sizeof(sin.sin_addr) );
1998-08-09 08:43:13 +08:00
osip_debug(ld, "ldap_connect_to_host: Trying %s:%d\n",
2001-10-07 10:40:16 +08:00
inet_ntoa(sin.sin_addr),port,0);
rc = ldap_pvt_connect(ld, s,
(struct sockaddr *)&sin, sizeof(struct sockaddr_in),
async);
if ( (rc == 0) || (rc == -2) ) {
ber_sockbuf_ctrl( sb, LBER_SB_OPT_SET_FD, &s );
break;
}
ldap_pvt_close_socket(ld, s);
1998-08-09 08:43:13 +08:00
if (!use_hp)
break;
}
if (ha_buf) LDAP_FREE(ha_buf);
return rc;
}
1998-08-09 08:43:13 +08:00
#if defined( LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND ) || \
defined( HAVE_CYRUS_SASL )
1998-08-09 08:43:13 +08:00
char *
ldap_host_connected_to( Sockbuf *sb )
1998-08-09 08:43:13 +08:00
{
struct hostent *hp;
socklen_t len;
struct sockaddr sa;
char *addr;
char *host;
1998-08-09 08:43:13 +08:00
/* buffers for gethostbyaddr_r */
struct hostent he_buf;
int local_h_errno;
char *ha_buf=NULL;
ber_socket_t sd;
(void)memset( (char *)&sa, '\0', sizeof( struct sockaddr ));
len = sizeof( sa );
ber_sockbuf_ctrl( sb, LBER_SB_OPT_GET_FD, &sd );
if ( getpeername( sd, &sa, &len ) == -1 ) {
1998-08-09 08:43:13 +08:00
return( NULL );
}
/*
* do a reverse lookup on the addr to get the official hostname.
* this is necessary for kerberos to work right, since the official
* hostname is used as the kerberos instance.
*/
switch (sa.sa_family) {
#ifdef LDAP_PF_LOCAL
case AF_LOCAL:
return LDAP_STRDUP( ldap_int_hostname );
#endif
#ifdef LDAP_PF_INET6
case AF_INET6:
addr = (char *) &((struct sockaddr_in6 *)&sa)->sin6_addr;
len = sizeof( struct in6_addr );
break;
#endif
case AF_INET:
addr = (char *) &((struct sockaddr_in *)&sa)->sin_addr;
len = sizeof( struct in_addr );
{
struct sockaddr_in localhost;
localhost.sin_addr.s_addr = htonl( INADDR_ANY );
if( memcmp ( &localhost.sin_addr,
&((struct sockaddr_in *)&sa)->sin_addr,
sizeof(localhost.sin_addr) ) == 0 )
{
return LDAP_STRDUP( ldap_int_hostname );
}
#ifdef INADDR_LOOPBACK
localhost.sin_addr.s_addr = htonl( INADDR_LOOPBACK );
if( memcmp ( &localhost.sin_addr,
&((struct sockaddr_in *)&sa)->sin_addr,
sizeof(localhost.sin_addr) ) == 0 )
{
return LDAP_STRDUP( ldap_int_hostname );
}
#endif
}
break;
default:
return( NULL );
break;
}
host = NULL;
if ((ldap_pvt_gethostbyaddr_a( addr, len,
sa.sa_family, &he_buf, &ha_buf,
&hp,&local_h_errno ) == 0 ) &&
(hp != NULL) && ( hp->h_name != NULL ) )
{
host = LDAP_STRDUP( hp->h_name );
1998-08-09 08:43:13 +08:00
}
LDAP_FREE( ha_buf );
return host;
1998-08-09 08:43:13 +08:00
}
#endif
1998-08-09 08:43:13 +08:00
/* for UNIX */
struct selectinfo {
fd_set si_readfds;
fd_set si_writefds;
fd_set si_use_readfds;
fd_set si_use_writefds;
};
void
ldap_mark_select_write( LDAP *ld, Sockbuf *sb )
1998-08-09 08:43:13 +08:00
{
struct selectinfo *sip;
ber_socket_t sd;
1998-08-09 08:43:13 +08:00
sip = (struct selectinfo *)ld->ld_selectinfo;
ber_sockbuf_ctrl( sb, LBER_SB_OPT_GET_FD, &sd );
if ( !FD_ISSET( sd, &sip->si_writefds )) {
FD_SET( sd, &sip->si_writefds );
1998-08-09 08:43:13 +08:00
}
}
void
ldap_mark_select_read( LDAP *ld, Sockbuf *sb )
1998-08-09 08:43:13 +08:00
{
struct selectinfo *sip;
ber_socket_t sd;
1998-08-09 08:43:13 +08:00
sip = (struct selectinfo *)ld->ld_selectinfo;
ber_sockbuf_ctrl( sb, LBER_SB_OPT_GET_FD, &sd );
if ( !FD_ISSET( sd, &sip->si_readfds )) {
FD_SET( sd, &sip->si_readfds );
1998-08-09 08:43:13 +08:00
}
}
void
ldap_mark_select_clear( LDAP *ld, Sockbuf *sb )
1998-08-09 08:43:13 +08:00
{
struct selectinfo *sip;
ber_socket_t sd;
1998-08-09 08:43:13 +08:00
sip = (struct selectinfo *)ld->ld_selectinfo;
ber_sockbuf_ctrl( sb, LBER_SB_OPT_GET_FD, &sd );
FD_CLR( sd, &sip->si_writefds );
FD_CLR( sd, &sip->si_readfds );
1998-08-09 08:43:13 +08:00
}
int
ldap_is_write_ready( LDAP *ld, Sockbuf *sb )
1998-08-09 08:43:13 +08:00
{
struct selectinfo *sip;
ber_socket_t sd;
1998-08-09 08:43:13 +08:00
sip = (struct selectinfo *)ld->ld_selectinfo;
ber_sockbuf_ctrl( sb, LBER_SB_OPT_GET_FD, &sd );
return( FD_ISSET( sd, &sip->si_use_writefds ));
1998-08-09 08:43:13 +08:00
}
int
ldap_is_read_ready( LDAP *ld, Sockbuf *sb )
1998-08-09 08:43:13 +08:00
{
struct selectinfo *sip;
ber_socket_t sd;
1998-08-09 08:43:13 +08:00
sip = (struct selectinfo *)ld->ld_selectinfo;
ber_sockbuf_ctrl( sb, LBER_SB_OPT_GET_FD, &sd );
return( FD_ISSET( sd, &sip->si_use_readfds ));
1998-08-09 08:43:13 +08:00
}
void *
ldap_new_select_info( void )
1998-08-09 08:43:13 +08:00
{
struct selectinfo *sip;
if (( sip = (struct selectinfo *)LDAP_CALLOC( 1,
1998-08-09 08:43:13 +08:00
sizeof( struct selectinfo ))) != NULL ) {
FD_ZERO( &sip->si_readfds );
FD_ZERO( &sip->si_writefds );
}
return( (void *)sip );
}
void
ldap_free_select_info( void *sip )
1998-08-09 08:43:13 +08:00
{
LDAP_FREE( sip );
1998-08-09 08:43:13 +08:00
}
1999-07-13 14:21:14 +08:00
void
ldap_int_ip_init( void )
1998-08-09 08:43:13 +08:00
{
1999-07-13 14:21:14 +08:00
int tblsize;
1998-10-25 10:02:31 +08:00
#if defined( HAVE_SYSCONF )
1999-07-13 14:21:14 +08:00
tblsize = sysconf( _SC_OPEN_MAX );
1998-10-25 10:02:31 +08:00
#elif defined( HAVE_GETDTABLESIZE )
1999-07-13 14:21:14 +08:00
tblsize = getdtablesize();
#else
1999-07-13 14:21:14 +08:00
tblsize = FD_SETSIZE;
#endif /* !USE_SYSCONF */
#ifdef FD_SETSIZE
1999-07-13 14:21:14 +08:00
if( tblsize > FD_SETSIZE )
tblsize = FD_SETSIZE;
#endif /* FD_SETSIZE*/
1999-07-13 14:21:14 +08:00
ldap_int_tblsize = tblsize;
}
int
2001-12-24 14:36:44 +08:00
ldap_int_select( LDAP *ld, struct timeval *timeout )
1999-07-13 14:21:14 +08:00
{
struct selectinfo *sip;
2002-03-30 01:46:28 +08:00
#ifdef NEW_LOGGING
LDAP_LOG (( "os-ip", LDAP_LEVEL_ENTRY, "ldap_int_select\n" ));
#else
2001-12-24 14:36:44 +08:00
Debug( LDAP_DEBUG_TRACE, "ldap_int_select\n", 0, 0, 0 );
2002-03-30 01:46:28 +08:00
#endif
1999-07-13 14:21:14 +08:00
if ( ldap_int_tblsize == 0 )
ldap_int_ip_init();
1998-08-09 08:43:13 +08:00
sip = (struct selectinfo *)ld->ld_selectinfo;
sip->si_use_readfds = sip->si_readfds;
sip->si_use_writefds = sip->si_writefds;
1999-07-13 14:21:14 +08:00
return( select( ldap_int_tblsize,
&sip->si_use_readfds, &sip->si_use_writefds,
NULL, timeout ));
1998-08-09 08:43:13 +08:00
}