Blame src/socket.c

Packit Service 31306d
/*
Packit Service 31306d
 * socket.c - socket functions for the library
Packit Service 31306d
 *
Packit Service 31306d
 * This file is part of the SSH Library
Packit Service 31306d
 *
Packit Service 31306d
 * Copyright (c) 2008-2010      by Aris Adamantiadis
Packit Service 31306d
 *
Packit Service 31306d
 * The SSH Library is free software; you can redistribute it and/or modify
Packit Service 31306d
 * it under the terms of the GNU Lesser General Public License as published by
Packit Service 31306d
 * the Free Software Foundation; either version 2.1 of the License, or (at your
Packit Service 31306d
 * option) any later version.
Packit Service 31306d
 *
Packit Service 31306d
 * The SSH Library is distributed in the hope that it will be useful, but
Packit Service 31306d
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
Packit Service 31306d
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
Packit Service 31306d
 * License for more details.
Packit Service 31306d
 *
Packit Service 31306d
 * You should have received a copy of the GNU Lesser General Public License
Packit Service 31306d
 * along with the SSH Library; see the file COPYING.  If not, write to
Packit Service 31306d
 * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
Packit Service 31306d
 * MA 02111-1307, USA.
Packit Service 31306d
 */
Packit Service 31306d
Packit Service 31306d
#include "config.h"
Packit Service 31306d
Packit Service 31306d
#include <errno.h>
Packit Service 31306d
#include <stdio.h>
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
#include <winsock2.h>
Packit Service 31306d
#include <ws2tcpip.h>
Packit Service 31306d
#if _MSC_VER >= 1400
Packit Service 31306d
#include <io.h>
Packit Service 31306d
#undef open
Packit Service 31306d
#define open _open
Packit Service 31306d
#undef close
Packit Service 31306d
#define close _close
Packit Service 31306d
#undef read
Packit Service 31306d
#define read _read
Packit Service 31306d
#undef write
Packit Service 31306d
#define write _write
Packit Service 31306d
#endif /* _MSC_VER */
Packit Service 31306d
#else /* _WIN32 */
Packit Service 31306d
#include <fcntl.h>
Packit Service 31306d
#include <sys/types.h>
Packit Service 31306d
#include <sys/wait.h>
Packit Service 31306d
#include <sys/socket.h>
Packit Service 31306d
#include <sys/un.h>
Packit Service 31306d
#include <signal.h>
Packit Service 31306d
#endif /* _WIN32 */
Packit Service 31306d
Packit Service 31306d
#include "libssh/priv.h"
Packit Service 31306d
#include "libssh/callbacks.h"
Packit Service 31306d
#include "libssh/socket.h"
Packit Service 31306d
#include "libssh/buffer.h"
Packit Service 31306d
#include "libssh/poll.h"
Packit Service 31306d
#include "libssh/session.h"
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @internal
Packit Service 31306d
 *
Packit Service 31306d
 * @defgroup libssh_socket The SSH socket functions.
Packit Service 31306d
 * @ingroup libssh
Packit Service 31306d
 *
Packit Service 31306d
 * Functions for handling sockets.
Packit Service 31306d
 *
Packit Service 31306d
 * @{
Packit Service 31306d
 */
Packit Service 31306d
Packit Service 31306d
enum ssh_socket_states_e {
Packit Service 31306d
	SSH_SOCKET_NONE,
Packit Service 31306d
	SSH_SOCKET_CONNECTING,
Packit Service 31306d
	SSH_SOCKET_CONNECTED,
Packit Service 31306d
	SSH_SOCKET_EOF,
Packit Service 31306d
	SSH_SOCKET_ERROR,
Packit Service 31306d
	SSH_SOCKET_CLOSED
Packit Service 31306d
};
Packit Service 31306d
Packit Service 31306d
struct ssh_socket_struct {
Packit Service 31306d
  socket_t fd;
Packit Service 31306d
  int fd_is_socket;
Packit Service 31306d
  int last_errno;
Packit Service 31306d
  int read_wontblock; /* reading now on socket will
Packit Service 31306d
                       not block */
Packit Service 31306d
  int write_wontblock;
Packit Service 31306d
  int data_except;
Packit Service 31306d
  enum ssh_socket_states_e state;
Packit Service 31306d
  ssh_buffer out_buffer;
Packit Service 31306d
  ssh_buffer in_buffer;
Packit Service 31306d
  ssh_session session;
Packit Service 31306d
  ssh_socket_callbacks callbacks;
Packit Service 31306d
  ssh_poll_handle poll_handle;
Packit Service 31306d
#ifndef _WIN32
Packit Service 31306d
  pid_t proxy_pid;
Packit Service 31306d
#endif
Packit Service 31306d
};
Packit Service 31306d
Packit Service 31306d
static int sockets_initialized = 0;
Packit Service 31306d
Packit Service 31306d
static ssize_t ssh_socket_unbuffered_read(ssh_socket s,
Packit Service 31306d
                                          void *buffer,
Packit Service 31306d
                                          uint32_t len);
Packit Service 31306d
static ssize_t ssh_socket_unbuffered_write(ssh_socket s,
Packit Service 31306d
                                           const void *buffer,
Packit Service 31306d
                                           uint32_t len);
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * \internal
Packit Service 31306d
 * \brief inits the socket system (windows specific)
Packit Service 31306d
 */
Packit Service 31306d
int ssh_socket_init(void)
Packit Service 31306d
{
Packit Service 31306d
    if (sockets_initialized == 0) {
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
        struct WSAData wsaData;
Packit Service 31306d
Packit Service 31306d
        /* Initiates use of the Winsock DLL by a process. */
Packit Service 31306d
        if (WSAStartup(MAKEWORD(2, 0), &wsaData) != 0) {
Packit Service 31306d
            return -1;
Packit Service 31306d
        }
Packit Service 31306d
#endif
Packit Service 31306d
        ssh_poll_init();
Packit Service 31306d
Packit Service 31306d
        sockets_initialized = 1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @brief Cleanup the socket system.
Packit Service 31306d
 */
Packit Service 31306d
void ssh_socket_cleanup(void)
Packit Service 31306d
{
Packit Service 31306d
    if (sockets_initialized == 1) {
Packit Service 31306d
        ssh_poll_cleanup();
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
        WSACleanup();
Packit Service 31306d
#endif
Packit Service 31306d
        sockets_initialized = 0;
Packit Service 31306d
    }
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * \internal
Packit Service 31306d
 * \brief creates a new Socket object
Packit Service 31306d
 */
Packit Service 31306d
ssh_socket ssh_socket_new(ssh_session session)
Packit Service 31306d
{
Packit Service 31306d
    ssh_socket s;
Packit Service 31306d
Packit Service 31306d
    s = calloc(1, sizeof(struct ssh_socket_struct));
Packit Service 31306d
    if (s == NULL) {
Packit Service 31306d
        ssh_set_error_oom(session);
Packit Service 31306d
        return NULL;
Packit Service 31306d
    }
Packit Service 31306d
    s->fd = SSH_INVALID_SOCKET;
Packit Service 31306d
    s->last_errno = -1;
Packit Service 31306d
    s->fd_is_socket = 1;
Packit Service 31306d
    s->session = session;
Packit Service 31306d
    s->in_buffer = ssh_buffer_new();
Packit Service 31306d
    if (s->in_buffer == NULL) {
Packit Service 31306d
        ssh_set_error_oom(session);
Packit Service 31306d
        SAFE_FREE(s);
Packit Service 31306d
        return NULL;
Packit Service 31306d
    }
Packit Service 31306d
    s->out_buffer=ssh_buffer_new();
Packit Service 31306d
    if (s->out_buffer == NULL) {
Packit Service 31306d
        ssh_set_error_oom(session);
Packit Service 31306d
        SSH_BUFFER_FREE(s->in_buffer);
Packit Service 31306d
        SAFE_FREE(s);
Packit Service 31306d
        return NULL;
Packit Service 31306d
    }
Packit Service 31306d
    s->read_wontblock = 0;
Packit Service 31306d
    s->write_wontblock = 0;
Packit Service 31306d
    s->data_except = 0;
Packit Service 31306d
    s->poll_handle = NULL;
Packit Service 31306d
    s->state=SSH_SOCKET_NONE;
Packit Service 31306d
    return s;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @internal
Packit Service 31306d
 * @brief Reset the state of a socket so it looks brand-new
Packit Service 31306d
 * @param[in] s socket to rest
Packit Service 31306d
 */
Packit Service 31306d
void ssh_socket_reset(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    s->fd = SSH_INVALID_SOCKET;
Packit Service 31306d
    s->last_errno = -1;
Packit Service 31306d
    s->fd_is_socket = 1;
Packit Service 31306d
    ssh_buffer_reinit(s->in_buffer);
Packit Service 31306d
    ssh_buffer_reinit(s->out_buffer);
Packit Service 31306d
    s->read_wontblock = 0;
Packit Service 31306d
    s->write_wontblock = 0;
Packit Service 31306d
    s->data_except = 0;
Packit Service 31306d
    s->poll_handle = NULL;
Packit Service 31306d
    s->state=SSH_SOCKET_NONE;
Packit Service 31306d
#ifndef _WIN32
Packit Service 31306d
    s->proxy_pid = 0;
Packit Service 31306d
#endif
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @internal
Packit Service 31306d
 * @brief the socket callbacks, i.e. callbacks to be called
Packit Service 31306d
 * upon a socket event.
Packit Service 31306d
 * @param s socket to set callbacks on.
Packit Service 31306d
 * @param callbacks a ssh_socket_callback object reference.
Packit Service 31306d
 */
Packit Service 31306d
Packit Service 31306d
void ssh_socket_set_callbacks(ssh_socket s, ssh_socket_callbacks callbacks)
Packit Service 31306d
{
Packit Service 31306d
    s->callbacks = callbacks;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @brief               SSH poll callback. This callback will be used when an event
Packit Service 31306d
 *                      caught on the socket.
Packit Service 31306d
 *
Packit Service 31306d
 * @param p             Poll object this callback belongs to.
Packit Service 31306d
 * @param fd            The raw socket.
Packit Service 31306d
 * @param revents       The current poll events on the socket.
Packit Service 31306d
 * @param userdata      Userdata to be passed to the callback function,
Packit Service 31306d
 *                      in this case the socket object.
Packit Service 31306d
 *
Packit Service 31306d
 * @return              0 on success, < 0 when the poll object has been removed
Packit Service 31306d
 *                      from its poll context.
Packit Service 31306d
 */
Packit Service 31306d
int ssh_socket_pollcallback(struct ssh_poll_handle_struct *p,
Packit Service 31306d
                            socket_t fd,
Packit Service 31306d
                            int revents,
Packit Service 31306d
                            void *v_s)
Packit Service 31306d
{
Packit Service 31306d
    ssh_socket s = (ssh_socket)v_s;
Packit Service 31306d
    char buffer[MAX_BUF_SIZE];
Packit Service 31306d
    ssize_t nread;
Packit Service 31306d
    int rc;
Packit Service 31306d
    int err = 0;
Packit Service 31306d
    socklen_t errlen = sizeof(err);
Packit Service 31306d
Packit Service 31306d
    /* Do not do anything if this socket was already closed */
Packit Service 31306d
    if (!ssh_socket_is_open(s)) {
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
    SSH_LOG(SSH_LOG_TRACE, "Poll callback on socket %d (%s%s%s), out buffer %d",fd,
Packit Service 31306d
            (revents & POLLIN) ? "POLLIN ":"",
Packit Service 31306d
            (revents & POLLOUT) ? "POLLOUT ":"",
Packit Service 31306d
            (revents & POLLERR) ? "POLLERR":"",
Packit Service 31306d
            ssh_buffer_get_len(s->out_buffer));
Packit Service 31306d
    if ((revents & POLLERR) || (revents & POLLHUP)) {
Packit Service 31306d
        /* Check if we are in a connecting state */
Packit Service 31306d
        if (s->state == SSH_SOCKET_CONNECTING) {
Packit Service 31306d
            s->state = SSH_SOCKET_ERROR;
Packit Service 31306d
            rc = getsockopt(fd, SOL_SOCKET, SO_ERROR, (char *)&err, &errlen);
Packit Service 31306d
            if (rc < 0) {
Packit Service 31306d
                err = errno;
Packit Service 31306d
            }
Packit Service 31306d
            ssh_socket_close(s);
Packit Service 31306d
            /* Overwrite ssh_socket_close() error with the real socket error */
Packit Service 31306d
            s->last_errno = err;
Packit Service 31306d
            errno = err;
Packit Service 31306d
Packit Service 31306d
            if (s->callbacks != NULL && s->callbacks->connected != NULL) {
Packit Service 31306d
                s->callbacks->connected(SSH_SOCKET_CONNECTED_ERROR,
Packit Service 31306d
                                        err,
Packit Service 31306d
                                        s->callbacks->userdata);
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            return -1;
Packit Service 31306d
        }
Packit Service 31306d
        /* Then we are in a more standard kind of error */
Packit Service 31306d
        /* force a read to get an explanation */
Packit Service 31306d
        revents |= POLLIN;
Packit Service 31306d
    }
Packit Service 31306d
    if ((revents & POLLIN) && s->state == SSH_SOCKET_CONNECTED) {
Packit Service 31306d
        s->read_wontblock = 1;
Packit Service 31306d
        nread = ssh_socket_unbuffered_read(s, buffer, sizeof(buffer));
Packit Service 31306d
        if (nread < 0) {
Packit Service 31306d
            if (p != NULL) {
Packit Service 31306d
                ssh_poll_remove_events(p, POLLIN);
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            if (s->callbacks != NULL && s->callbacks->exception != NULL) {
Packit Service 31306d
                s->callbacks->exception(SSH_SOCKET_EXCEPTION_ERROR,
Packit Service 31306d
                                        s->last_errno,
Packit Service 31306d
                                        s->callbacks->userdata);
Packit Service 31306d
            }
Packit Service 31306d
            return -2;
Packit Service 31306d
        }
Packit Service 31306d
        if (nread == 0) {
Packit Service 31306d
            if (p != NULL) {
Packit Service 31306d
                ssh_poll_remove_events(p, POLLIN);
Packit Service 31306d
            }
Packit Service 31306d
            if (s->callbacks != NULL && s->callbacks->exception != NULL) {
Packit Service 31306d
                s->callbacks->exception(SSH_SOCKET_EXCEPTION_EOF,
Packit Service 31306d
                                        0,
Packit Service 31306d
                                        s->callbacks->userdata);
Packit Service 31306d
            }
Packit Service 31306d
            return -2;
Packit Service 31306d
        }
Packit Service 31306d
Packit Service 31306d
        if (s->session->socket_counter != NULL) {
Packit Service 31306d
            s->session->socket_counter->in_bytes += nread;
Packit Service 31306d
        }
Packit Service 31306d
Packit Service 31306d
        /* Bufferize the data and then call the callback */
Packit Service 31306d
        rc = ssh_buffer_add_data(s->in_buffer, buffer, nread);
Packit Service 31306d
        if (rc < 0) {
Packit Service 31306d
            return -1;
Packit Service 31306d
        }
Packit Service 31306d
        if (s->callbacks != NULL && s->callbacks->data != NULL) {
Packit Service 31306d
            do {
Packit Service 31306d
                nread = s->callbacks->data(ssh_buffer_get(s->in_buffer),
Packit Service 31306d
                                       ssh_buffer_get_len(s->in_buffer),
Packit Service 31306d
                                       s->callbacks->userdata);
Packit Service 31306d
                ssh_buffer_pass_bytes(s->in_buffer, nread);
Packit Service 31306d
            } while ((nread > 0) && (s->state == SSH_SOCKET_CONNECTED));
Packit Service 31306d
Packit Service 31306d
            /* p may have been freed, so don't use it
Packit Service 31306d
             * anymore in this function */
Packit Service 31306d
            p = NULL;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
    if (revents & POLLOUT || revents & POLLWRNORM) {
Packit Service 31306d
#else
Packit Service 31306d
    if (revents & POLLOUT) {
Packit Service 31306d
#endif
Packit Service 31306d
        uint32_t len;
Packit Service 31306d
Packit Service 31306d
        /* First, POLLOUT is a sign we may be connected */
Packit Service 31306d
        if (s->state == SSH_SOCKET_CONNECTING) {
Packit Service 31306d
            SSH_LOG(SSH_LOG_PACKET, "Received POLLOUT in connecting state");
Packit Service 31306d
            s->state = SSH_SOCKET_CONNECTED;
Packit Service 31306d
            if (p != NULL) {
Packit Service 31306d
                ssh_poll_set_events(p, POLLOUT | POLLIN);
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            rc = ssh_socket_set_blocking(ssh_socket_get_fd(s));
Packit Service 31306d
            if (rc < 0) {
Packit Service 31306d
                return -1;
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            if (s->callbacks != NULL && s->callbacks->connected != NULL) {
Packit Service 31306d
                s->callbacks->connected(SSH_SOCKET_CONNECTED_OK,
Packit Service 31306d
                                        0,
Packit Service 31306d
                                        s->callbacks->userdata);
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            return 0;
Packit Service 31306d
        }
Packit Service 31306d
Packit Service 31306d
        /* So, we can write data */
Packit Service 31306d
        s->write_wontblock = 1;
Packit Service 31306d
        if (p != NULL) {
Packit Service 31306d
            ssh_poll_remove_events(p, POLLOUT);
Packit Service 31306d
        }
Packit Service 31306d
Packit Service 31306d
        /* If buffered data is pending, write it */
Packit Service 31306d
        len = ssh_buffer_get_len(s->out_buffer);
Packit Service 31306d
        if (len > 0) {
Packit Service 31306d
            ssh_socket_nonblocking_flush(s);
Packit Service 31306d
        } else if (s->callbacks != NULL && s->callbacks->controlflow != NULL) {
Packit Service 31306d
            /* Otherwise advertise the upper level that write can be done */
Packit Service 31306d
            SSH_LOG(SSH_LOG_TRACE,"sending control flow event");
Packit Service 31306d
            s->callbacks->controlflow(SSH_SOCKET_FLOW_WRITEWONTBLOCK,
Packit Service 31306d
                                      s->callbacks->userdata);
Packit Service 31306d
        }
Packit Service 31306d
        /* TODO: Find a way to put back POLLOUT when buffering occurs */
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* Return -1 if the poll handler disappeared */
Packit Service 31306d
    if (s->poll_handle == NULL) {
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** @internal
Packit Service 31306d
 * @brief returns the poll handle corresponding to the socket,
Packit Service 31306d
 * creates it if it does not exist.
Packit Service 31306d
 * @returns allocated and initialized ssh_poll_handle object
Packit Service 31306d
 */
Packit Service 31306d
ssh_poll_handle ssh_socket_get_poll_handle(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    if (s->poll_handle) {
Packit Service 31306d
        return s->poll_handle;
Packit Service 31306d
    }
Packit Service 31306d
    s->poll_handle = ssh_poll_new(s->fd,0,ssh_socket_pollcallback,s);
Packit Service 31306d
    return s->poll_handle;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief Deletes a socket object
Packit Service 31306d
 */
Packit Service 31306d
void ssh_socket_free(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    if (s == NULL) {
Packit Service 31306d
        return;
Packit Service 31306d
    }
Packit Service 31306d
    ssh_socket_close(s);
Packit Service 31306d
    SSH_BUFFER_FREE(s->in_buffer);
Packit Service 31306d
    SSH_BUFFER_FREE(s->out_buffer);
Packit Service 31306d
    SAFE_FREE(s);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
#ifndef _WIN32
Packit Service 31306d
int ssh_socket_unix(ssh_socket s, const char *path)
Packit Service 31306d
{
Packit Service 31306d
    struct sockaddr_un sunaddr;
Packit Service 31306d
    socket_t fd;
Packit Service 31306d
    sunaddr.sun_family = AF_UNIX;
Packit Service 31306d
    snprintf(sunaddr.sun_path, sizeof(sunaddr.sun_path), "%s", path);
Packit Service 31306d
Packit Service 31306d
    fd = socket(AF_UNIX, SOCK_STREAM, 0);
Packit Service 31306d
    if (fd == SSH_INVALID_SOCKET) {
Packit Service 31306d
        ssh_set_error(s->session, SSH_FATAL,
Packit Service 31306d
                      "Error from socket(AF_UNIX, SOCK_STREAM, 0): %s",
Packit Service 31306d
                      strerror(errno));
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (fcntl(fd, F_SETFD, 1) == -1) {
Packit Service 31306d
        ssh_set_error(s->session, SSH_FATAL,
Packit Service 31306d
                      "Error from fcntl(fd, F_SETFD, 1): %s",
Packit Service 31306d
                      strerror(errno));
Packit Service 31306d
        close(fd);
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (connect(fd, (struct sockaddr *) &sunaddr, sizeof(sunaddr)) < 0) {
Packit Service 31306d
        ssh_set_error(s->session, SSH_FATAL, "Error from connect(): %s",
Packit Service 31306d
                      strerror(errno));
Packit Service 31306d
        close(fd);
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
    ssh_socket_set_fd(s,fd);
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
#endif
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief closes a socket
Packit Service 31306d
 */
Packit Service 31306d
void ssh_socket_close(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    if (ssh_socket_is_open(s)) {
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
        CLOSE_SOCKET(s->fd);
Packit Service 31306d
        s->last_errno = WSAGetLastError();
Packit Service 31306d
#else
Packit Service 31306d
        CLOSE_SOCKET(s->fd);
Packit Service 31306d
        s->last_errno = errno;
Packit Service 31306d
#endif
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (s->poll_handle != NULL) {
Packit Service 31306d
        ssh_poll_free(s->poll_handle);
Packit Service 31306d
        s->poll_handle = NULL;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    s->state = SSH_SOCKET_CLOSED;
Packit Service 31306d
Packit Service 31306d
#ifndef _WIN32
Packit Service 31306d
    /* If the proxy command still runs try to kill it */
Packit Service 31306d
    if (s->proxy_pid != 0) {
Packit Service 31306d
        int status;
Packit Service 31306d
        pid_t pid = s->proxy_pid;
Packit Service 31306d
Packit Service 31306d
        s->proxy_pid = 0;
Packit Service 31306d
        kill(pid, SIGTERM);
Packit Service 31306d
        while (waitpid(pid, &status, 0) == -1) {
Packit Service 31306d
            if (errno != EINTR) {
Packit Service 31306d
                SSH_LOG(SSH_LOG_WARN, "waitpid failed: %s", strerror(errno));
Packit Service 31306d
                return;
Packit Service 31306d
            }
Packit Service 31306d
        }
Packit Service 31306d
        if (!WIFEXITED(status)) {
Packit Service 31306d
            SSH_LOG(SSH_LOG_WARN, "Proxy command exitted abnormally");
Packit Service 31306d
            return;
Packit Service 31306d
        }
Packit Service 31306d
        SSH_LOG(SSH_LOG_TRACE, "Proxy command returned %d", WEXITSTATUS(status));
Packit Service 31306d
    }
Packit Service 31306d
#endif
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @internal
Packit Service 31306d
 * @brief sets the file descriptor of the socket.
Packit Service 31306d
 * @param[out] s ssh_socket to update
Packit Service 31306d
 * @param[in] fd file descriptor to set
Packit Service 31306d
 * @warning this function updates boths the input and output
Packit Service 31306d
 * file descriptors
Packit Service 31306d
 */
Packit Service 31306d
void ssh_socket_set_fd(ssh_socket s, socket_t fd)
Packit Service 31306d
{
Packit Service 31306d
    s->fd = fd;
Packit Service 31306d
Packit Service 31306d
    if (s->poll_handle) {
Packit Service 31306d
        ssh_poll_set_fd(s->poll_handle,fd);
Packit Service 31306d
    } else {
Packit Service 31306d
        s->state = SSH_SOCKET_CONNECTING;
Packit Service 31306d
Packit Service 31306d
        /* POLLOUT is the event to wait for in a nonblocking connect */
Packit Service 31306d
        ssh_poll_set_events(ssh_socket_get_poll_handle(s), POLLOUT);
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
        ssh_poll_add_events(ssh_socket_get_poll_handle(s), POLLWRNORM);
Packit Service 31306d
#endif
Packit Service 31306d
    }
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief returns the input file descriptor of the socket
Packit Service 31306d
 */
Packit Service 31306d
socket_t ssh_socket_get_fd(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    return s->fd;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief returns nonzero if the socket is open
Packit Service 31306d
 */
Packit Service 31306d
int ssh_socket_is_open(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    return s->fd != SSH_INVALID_SOCKET;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief read len bytes from socket into buffer
Packit Service 31306d
 */
Packit Service 31306d
static ssize_t ssh_socket_unbuffered_read(ssh_socket s,
Packit Service 31306d
                                          void *buffer,
Packit Service 31306d
                                          uint32_t len)
Packit Service 31306d
{
Packit Service 31306d
    ssize_t rc = -1;
Packit Service 31306d
Packit Service 31306d
    if (s->data_except) {
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
    if (s->fd_is_socket) {
Packit Service 31306d
        rc = recv(s->fd,buffer, len, 0);
Packit Service 31306d
    } else {
Packit Service 31306d
        rc = read(s->fd,buffer, len);
Packit Service 31306d
    }
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
    s->last_errno = WSAGetLastError();
Packit Service 31306d
#else
Packit Service 31306d
    s->last_errno = errno;
Packit Service 31306d
#endif
Packit Service 31306d
    s->read_wontblock = 0;
Packit Service 31306d
Packit Service 31306d
    if (rc < 0) {
Packit Service 31306d
        s->data_except = 1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return rc;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief writes len bytes from buffer to socket
Packit Service 31306d
 */
Packit Service 31306d
static ssize_t ssh_socket_unbuffered_write(ssh_socket s,
Packit Service 31306d
                                           const void *buffer,
Packit Service 31306d
                                           uint32_t len)
Packit Service 31306d
{
Packit Service 31306d
    ssize_t w = -1;
Packit Service 31306d
    int flags = 0;
Packit Service 31306d
Packit Service 31306d
#ifdef MSG_NOSIGNAL
Packit Service 31306d
    flags |= MSG_NOSIGNAL;
Packit Service 31306d
#endif
Packit Service 31306d
Packit Service 31306d
    if (s->data_except) {
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (s->fd_is_socket) {
Packit Service 31306d
        w = send(s->fd, buffer, len, flags);
Packit Service 31306d
    } else {
Packit Service 31306d
        w = write(s->fd, buffer, len);
Packit Service 31306d
    }
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
    s->last_errno = WSAGetLastError();
Packit Service 31306d
#else
Packit Service 31306d
    s->last_errno = errno;
Packit Service 31306d
#endif
Packit Service 31306d
    s->write_wontblock = 0;
Packit Service 31306d
    /* Reactive the POLLOUT detector in the poll multiplexer system */
Packit Service 31306d
    if (s->poll_handle) {
Packit Service 31306d
        SSH_LOG(SSH_LOG_PACKET, "Enabling POLLOUT for socket");
Packit Service 31306d
        ssh_poll_set_events(s->poll_handle,ssh_poll_get_events(s->poll_handle) | POLLOUT);
Packit Service 31306d
    }
Packit Service 31306d
    if (w < 0) {
Packit Service 31306d
        s->data_except = 1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return w;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief returns nonzero if the current socket is in the fd_set
Packit Service 31306d
 */
Packit Service 31306d
int ssh_socket_fd_isset(ssh_socket s, fd_set *set)
Packit Service 31306d
{
Packit Service 31306d
    if(s->fd == SSH_INVALID_SOCKET) {
Packit Service 31306d
        return 0;
Packit Service 31306d
    }
Packit Service 31306d
    return FD_ISSET(s->fd,set);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief sets the current fd in a fd_set and updates the max_fd
Packit Service 31306d
 */
Packit Service 31306d
Packit Service 31306d
void ssh_socket_fd_set(ssh_socket s, fd_set *set, socket_t *max_fd)
Packit Service 31306d
{
Packit Service 31306d
    if (s->fd == SSH_INVALID_SOCKET) {
Packit Service 31306d
        return;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    FD_SET(s->fd,set);
Packit Service 31306d
Packit Service 31306d
    if (s->fd >= 0 &&
Packit Service 31306d
        s->fd >= *max_fd &&
Packit Service 31306d
        s->fd != SSH_INVALID_SOCKET) {
Packit Service 31306d
        *max_fd = s->fd + 1;
Packit Service 31306d
    }
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief buffered write of data
Packit Service 31306d
 * \returns SSH_OK, or SSH_ERROR
Packit Service 31306d
 * \warning has no effect on socket before a flush
Packit Service 31306d
 */
Packit Service 31306d
int ssh_socket_write(ssh_socket s, const void *buffer, int len)
Packit Service 31306d
{
Packit Service 31306d
    if (len > 0) {
Packit Service 31306d
        if (ssh_buffer_add_data(s->out_buffer, buffer, len) < 0) {
Packit Service 31306d
            ssh_set_error_oom(s->session);
Packit Service 31306d
            return SSH_ERROR;
Packit Service 31306d
        }
Packit Service 31306d
        ssh_socket_nonblocking_flush(s);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return SSH_OK;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
Packit Service 31306d
/** \internal
Packit Service 31306d
 * \brief starts a nonblocking flush of the output buffer
Packit Service 31306d
 *
Packit Service 31306d
 */
Packit Service 31306d
int ssh_socket_nonblocking_flush(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    ssh_session session = s->session;
Packit Service 31306d
    uint32_t len;
Packit Service 31306d
Packit Service 31306d
    if (!ssh_socket_is_open(s)) {
Packit Service 31306d
        session->alive = 0;
Packit Service 31306d
        if (s->callbacks && s->callbacks->exception) {
Packit Service 31306d
            s->callbacks->exception(SSH_SOCKET_EXCEPTION_ERROR,
Packit Service 31306d
                                    s->last_errno,
Packit Service 31306d
                                    s->callbacks->userdata);
Packit Service 31306d
        } else {
Packit Service 31306d
            ssh_set_error(session,
Packit Service 31306d
                          SSH_FATAL,
Packit Service 31306d
                          "Writing packet: error on socket (or connection "
Packit Service 31306d
                          "closed): %s",
Packit Service 31306d
                          strerror(s->last_errno));
Packit Service 31306d
        }
Packit Service 31306d
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    len = ssh_buffer_get_len(s->out_buffer);
Packit Service 31306d
    if (!s->write_wontblock && s->poll_handle && len > 0) {
Packit Service 31306d
        /* force the poll system to catch pollout events */
Packit Service 31306d
        ssh_poll_add_events(s->poll_handle, POLLOUT);
Packit Service 31306d
Packit Service 31306d
        return SSH_AGAIN;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (s->write_wontblock && len > 0) {
Packit Service 31306d
        ssize_t bwritten;
Packit Service 31306d
Packit Service 31306d
        bwritten = ssh_socket_unbuffered_write(s,
Packit Service 31306d
                                               ssh_buffer_get(s->out_buffer),
Packit Service 31306d
                                               len);
Packit Service 31306d
        if (bwritten < 0) {
Packit Service 31306d
            session->alive = 0;
Packit Service 31306d
            ssh_socket_close(s);
Packit Service 31306d
Packit Service 31306d
            if (s->callbacks && s->callbacks->exception) {
Packit Service 31306d
                s->callbacks->exception(SSH_SOCKET_EXCEPTION_ERROR,
Packit Service 31306d
                                        s->last_errno,
Packit Service 31306d
                                        s->callbacks->userdata);
Packit Service 31306d
            } else {
Packit Service 31306d
                ssh_set_error(session,
Packit Service 31306d
                              SSH_FATAL,
Packit Service 31306d
                              "Writing packet: error on socket (or connection "
Packit Service 31306d
                              "closed): %s",
Packit Service 31306d
                              strerror(s->last_errno));
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            return SSH_ERROR;
Packit Service 31306d
        }
Packit Service 31306d
Packit Service 31306d
        ssh_buffer_pass_bytes(s->out_buffer, bwritten);
Packit Service 31306d
        if (s->session->socket_counter != NULL) {
Packit Service 31306d
            s->session->socket_counter->out_bytes += bwritten;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* Is there some data pending? */
Packit Service 31306d
    len = ssh_buffer_get_len(s->out_buffer);
Packit Service 31306d
    if (s->poll_handle && len > 0) {
Packit Service 31306d
        /* force the poll system to catch pollout events */
Packit Service 31306d
        ssh_poll_add_events(s->poll_handle, POLLOUT);
Packit Service 31306d
Packit Service 31306d
        return SSH_AGAIN;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* all data written */
Packit Service 31306d
    return SSH_OK;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void ssh_socket_set_write_wontblock(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    s->write_wontblock = 1;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void ssh_socket_set_read_wontblock(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    s->read_wontblock = 1;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void ssh_socket_set_except(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    s->data_except = 1;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int ssh_socket_data_available(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    return s->read_wontblock;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int ssh_socket_data_writable(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    return s->write_wontblock;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** @internal
Packit Service 31306d
 * @brief returns the number of outgoing bytes currently buffered
Packit Service 31306d
 * @param s the socket
Packit Service 31306d
 * @returns numbers of bytes buffered, or 0 if the socket isn't connected
Packit Service 31306d
 */
Packit Service 31306d
int ssh_socket_buffered_write_bytes(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    if (s==NULL || s->out_buffer == NULL) {
Packit Service 31306d
        return 0;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return ssh_buffer_get_len(s->out_buffer);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
Packit Service 31306d
int ssh_socket_get_status(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    int r = 0;
Packit Service 31306d
Packit Service 31306d
    if (ssh_buffer_get_len(s->in_buffer) > 0) {
Packit Service 31306d
        r |= SSH_READ_PENDING;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (ssh_buffer_get_len(s->out_buffer) > 0) {
Packit Service 31306d
        r |= SSH_WRITE_PENDING;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (s->data_except) {
Packit Service 31306d
        r |= SSH_CLOSED_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return r;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int ssh_socket_get_poll_flags(ssh_socket s)
Packit Service 31306d
{
Packit Service 31306d
    int r = 0;
Packit Service 31306d
    if (s->poll_handle != NULL && (ssh_poll_get_events (s->poll_handle) & POLLIN) > 0) {
Packit Service 31306d
        r |= SSH_READ_PENDING;
Packit Service 31306d
    }
Packit Service 31306d
    if (s->poll_handle != NULL && (ssh_poll_get_events (s->poll_handle) & POLLOUT) > 0) {
Packit Service 31306d
        r |= SSH_WRITE_PENDING;
Packit Service 31306d
    }
Packit Service 31306d
    return r;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
int ssh_socket_set_nonblocking(socket_t fd)
Packit Service 31306d
{
Packit Service 31306d
    u_long nonblocking = 1;
Packit Service 31306d
    return ioctlsocket(fd, FIONBIO, &nonblocking);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int ssh_socket_set_blocking(socket_t fd)
Packit Service 31306d
{
Packit Service 31306d
    u_long nonblocking = 0;
Packit Service 31306d
    return ioctlsocket(fd, FIONBIO, &nonblocking);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
#else /* _WIN32 */
Packit Service 31306d
int ssh_socket_set_nonblocking(socket_t fd)
Packit Service 31306d
{
Packit Service 31306d
    return fcntl(fd, F_SETFL, O_NONBLOCK);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int ssh_socket_set_blocking(socket_t fd)
Packit Service 31306d
{
Packit Service 31306d
    return fcntl(fd, F_SETFL, 0);
Packit Service 31306d
}
Packit Service 31306d
#endif /* _WIN32 */
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @internal
Packit Service 31306d
 * @brief Launches a socket connection
Packit Service 31306d
 * If a the socket connected callback has been defined and
Packit Service 31306d
 * a poll object exists, this call will be non blocking.
Packit Service 31306d
 * @param s    socket to connect.
Packit Service 31306d
 * @param host hostname or ip address to connect to.
Packit Service 31306d
 * @param port port number to connect to.
Packit Service 31306d
 * @param bind_addr address to bind to, or NULL for default.
Packit Service 31306d
 * @returns SSH_OK socket is being connected.
Packit Service 31306d
 * @returns SSH_ERROR error while connecting to remote host.
Packit Service 31306d
 * @bug It only tries connecting to one of the available AI's
Packit Service 31306d
 * which is problematic for hosts having DNS fail-over.
Packit Service 31306d
 */
Packit Service 31306d
int ssh_socket_connect(ssh_socket s,
Packit Service 31306d
                       const char *host,
Packit Service 31306d
                       uint16_t port,
Packit Service 31306d
                       const char *bind_addr)
Packit Service 31306d
{
Packit Service 31306d
    socket_t fd;
Packit Service 31306d
    
Packit Service 31306d
    if (s->state != SSH_SOCKET_NONE) {
Packit Service 31306d
        ssh_set_error(s->session, SSH_FATAL,
Packit Service 31306d
                      "ssh_socket_connect called on socket not unconnected");
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
    fd = ssh_connect_host_nonblocking(s->session, host, bind_addr, port);
Packit Service 31306d
    SSH_LOG(SSH_LOG_PROTOCOL, "Nonblocking connection socket: %d", fd);
Packit Service 31306d
    if (fd == SSH_INVALID_SOCKET) {
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
    ssh_socket_set_fd(s,fd);
Packit Service 31306d
    
Packit Service 31306d
    return SSH_OK;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
#ifndef _WIN32
Packit Service 31306d
/**
Packit Service 31306d
 * @internal
Packit Service 31306d
 * @brief executes a command and redirect input and outputs
Packit Service 31306d
 * @param command command to execute
Packit Service 31306d
 * @param in input file descriptor
Packit Service 31306d
 * @param out output file descriptor
Packit Service 31306d
 */
Packit Service 31306d
void
Packit Service 31306d
ssh_execute_command(const char *command, socket_t in, socket_t out)
Packit Service 31306d
{
Packit Service 31306d
    const char *args[] = {"/bin/sh", "-c", command, NULL};
Packit Service 31306d
    /* Prepare /dev/null socket for the stderr redirection */
Packit Service 31306d
    int devnull = open("/dev/null", O_WRONLY);
Packit Service 31306d
    if (devnull == -1) {
Packit Service 31306d
        SSH_LOG(SSH_LOG_WARNING, "Failed to open /dev/null");
Packit Service 31306d
        exit(1);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* redirect in and out to stdin, stdout */
Packit Service 31306d
    dup2(in, 0);
Packit Service 31306d
    dup2(out, 1);
Packit Service 31306d
    /* Ignore anything on the stderr */
Packit Service 31306d
    dup2(devnull, STDERR_FILENO);
Packit Service 31306d
    close(in);
Packit Service 31306d
    close(out);
Packit Service 31306d
    execv(args[0], (char * const *)args);
Packit Service 31306d
    exit(1);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @internal
Packit Service 31306d
 * @brief Open a socket on a ProxyCommand
Packit Service 31306d
 * This call will always be nonblocking.
Packit Service 31306d
 * @param s    socket to connect.
Packit Service 31306d
 * @param command Command to execute.
Packit Service 31306d
 * @returns SSH_OK socket is being connected.
Packit Service 31306d
 * @returns SSH_ERROR error while executing the command.
Packit Service 31306d
 */
Packit Service 31306d
Packit Service 31306d
int
Packit Service 31306d
ssh_socket_connect_proxycommand(ssh_socket s, const char *command)
Packit Service 31306d
{
Packit Service 31306d
    socket_t pair[2];
Packit Service 31306d
    int pid;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    if (s->state != SSH_SOCKET_NONE) {
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = socketpair(PF_UNIX, SOCK_STREAM, 0, pair);
Packit Service 31306d
    if (rc < 0) {
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    SSH_LOG(SSH_LOG_PROTOCOL, "Executing proxycommand '%s'", command);
Packit Service 31306d
    pid = fork();
Packit Service 31306d
    if (pid == 0) {
Packit Service 31306d
        ssh_execute_command(command, pair[0], pair[0]);
Packit Service 31306d
        /* Does not return */
Packit Service 31306d
    }
Packit Service 31306d
    s->proxy_pid = pid;
Packit Service 31306d
    close(pair[0]);
Packit Service 31306d
    SSH_LOG(SSH_LOG_PROTOCOL, "ProxyCommand connection pipe: [%d,%d]",pair[0],pair[1]);
Packit Service 31306d
    ssh_socket_set_fd(s, pair[1]);
Packit Service 31306d
    s->state=SSH_SOCKET_CONNECTED;
Packit Service 31306d
    s->fd_is_socket=0;
Packit Service 31306d
    /* POLLOUT is the event to wait for in a nonblocking connect */
Packit Service 31306d
    ssh_poll_set_events(ssh_socket_get_poll_handle(s), POLLIN | POLLOUT);
Packit Service 31306d
    if (s->callbacks && s->callbacks->connected) {
Packit Service 31306d
        s->callbacks->connected(SSH_SOCKET_CONNECTED_OK, 0, s->callbacks->userdata);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return SSH_OK;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
#endif /* _WIN32 */
Packit Service 31306d
/** @} */