Commit a7e8ae9e18e0a3deb118af9d1c55aeb8a8317b60
1 parent
edc121a5
Exists in
master
and in
3 other branches
Removendo warnings em windows, incluindo suporte a sessoes em net_connect()
Showing
3 changed files
with
114 additions
and
155 deletions
Show diff stats
host.c
| ... | ... | @@ -569,7 +569,7 @@ static int do_connect(H3270 *hSession, const char *n) |
| 569 | 569 | |
| 570 | 570 | /* Attempt contact. */ |
| 571 | 571 | hSession->ever_3270 = False; |
| 572 | - hSession->net_sock = net_connect(chost, port, localprocess_cmd != CN, &resolving,&pending); | |
| 572 | + hSession->net_sock = net_connect(hSession, chost, port, localprocess_cmd != CN, &resolving,&pending); | |
| 573 | 573 | |
| 574 | 574 | if (hSession->net_sock < 0 && !resolving) |
| 575 | 575 | { | ... | ... |
telnet.c
| ... | ... | @@ -353,8 +353,7 @@ static void output_possible(H3270 *session); |
| 353 | 353 | |
| 354 | 354 | |
| 355 | 355 | #if defined(_WIN32) /*[*/ |
| 356 | -void | |
| 357 | -sockstart(void) | |
| 356 | +void sockstart(H3270 *session) | |
| 358 | 357 | { |
| 359 | 358 | static int initted = 0; |
| 360 | 359 | WORD wVersionRequested; |
| ... | ... | @@ -367,15 +366,24 @@ sockstart(void) |
| 367 | 366 | |
| 368 | 367 | wVersionRequested = MAKEWORD(2, 2); |
| 369 | 368 | |
| 370 | - if (WSAStartup(wVersionRequested, &wsaData) != 0) { | |
| 371 | - #warning Notify User | |
| 372 | - fprintf(stderr, "WSAStartup failed: %s\n",win32_strerror(GetLastError())); | |
| 369 | + if (WSAStartup(wVersionRequested, &wsaData) != 0) | |
| 370 | + { | |
| 371 | + lib3270_popup_dialog( session, | |
| 372 | + LIB3270_NOTIFY_CRITICAL, | |
| 373 | + N_( "Network startup error" ), | |
| 374 | + N_( "WSAStartup failed" ), | |
| 375 | + "%s", win32_strerror(GetLastError()) ); | |
| 376 | + | |
| 373 | 377 | _exit(1); |
| 374 | 378 | } |
| 375 | 379 | |
| 376 | - if (LOBYTE(wsaData.wVersion) != 2 || HIBYTE(wsaData.wVersion) != 2) { | |
| 377 | - #warning Notify User | |
| 378 | - fprintf(stderr, "Bad winsock version: %d.%d\n",LOBYTE(wsaData.wVersion), HIBYTE(wsaData.wVersion)); | |
| 380 | + if (LOBYTE(wsaData.wVersion) != 2 || HIBYTE(wsaData.wVersion) != 2) | |
| 381 | + { | |
| 382 | + lib3270_popup_dialog( session, | |
| 383 | + LIB3270_NOTIFY_CRITICAL, | |
| 384 | + N_( "Network startup error" ), | |
| 385 | + N_( "Bad winsock version" ), | |
| 386 | + N_( "Can´t use winsock version %d.%d" ), LOBYTE(wsaData.wVersion), HIBYTE(wsaData.wVersion)); | |
| 379 | 387 | _exit(1); |
| 380 | 388 | } |
| 381 | 389 | } |
| ... | ... | @@ -408,13 +416,18 @@ void popup_a_sockerr(H3270 *session, char *fmt, ...) |
| 408 | 416 | |
| 409 | 417 | } |
| 410 | 418 | |
| 411 | -/* | |
| 412 | - * net_connect | |
| 413 | - * Establish a telnet socket to the given host passed as an argument. | |
| 419 | +/** | |
| 420 | + * Establish a telnet socket to the given host passed as an argument. | |
| 421 | + * | |
| 414 | 422 | * Called only once and is responsible for setting up the telnet |
| 415 | - * variables. Returns the file descriptor of the connected socket. | |
| 423 | + * variables. | |
| 424 | + * | |
| 425 | + * @param session Handle to the session descriptor. | |
| 426 | + * | |
| 427 | + * | |
| 428 | + * @return The file descriptor of the connected socket. | |
| 416 | 429 | */ |
| 417 | -int net_connect(const char *host, char *portname, Boolean ls, Boolean *resolving, Boolean *pending) | |
| 430 | +int net_connect(H3270 *session, const char *host, char *portname, Boolean ls, Boolean *resolving, Boolean *pending) | |
| 418 | 431 | { |
| 419 | 432 | struct servent *sp; |
| 420 | 433 | struct hostent *hp; |
| ... | ... | @@ -427,11 +440,11 @@ int net_connect(const char *host, char *portname, Boolean ls, Boolean *resolving |
| 427 | 440 | int mtu = OMTU; |
| 428 | 441 | #endif /*]*/ |
| 429 | 442 | |
| 430 | -# define close_fail { (void) SOCK_CLOSE(h3270.sock); h3270.sock = -1; return -1; } | |
| 443 | +#define close_fail { (void) SOCK_CLOSE(session->sock); session->sock = -1; return -1; } | |
| 431 | 444 | |
| 432 | -#if defined(_WIN32) /*[*/ | |
| 433 | - sockstart(); | |
| 434 | -#endif /*]*/ | |
| 445 | +#if defined(_WIN32) | |
| 446 | + sockstart(session); | |
| 447 | +#endif | |
| 435 | 448 | |
| 436 | 449 | if (netrbuf == (unsigned char *)NULL) |
| 437 | 450 | netrbuf = (unsigned char *)Malloc(BUFSZ); |
| ... | ... | @@ -453,10 +466,10 @@ int net_connect(const char *host, char *portname, Boolean ls, Boolean *resolving |
| 453 | 466 | *resolving = False; |
| 454 | 467 | *pending = False; |
| 455 | 468 | |
| 456 | - Replace(h3270.hostname, NewString(host)); | |
| 469 | + Replace(session->hostname, NewString(host)); | |
| 457 | 470 | |
| 458 | 471 | /* get the passthru host and port number */ |
| 459 | - if (h3270.passthru_host) { | |
| 472 | + if (session->passthru_host) { | |
| 460 | 473 | const char *hn; |
| 461 | 474 | |
| 462 | 475 | hn = getenv("INTERNET_HOST"); |
| ... | ... | @@ -491,9 +504,9 @@ int net_connect(const char *host, char *portname, Boolean ls, Boolean *resolving |
| 491 | 504 | "or service: %s", portname); |
| 492 | 505 | return -1; |
| 493 | 506 | } |
| 494 | - h3270.current_port = ntohs(sp->s_port); | |
| 507 | + session->current_port = ntohs(sp->s_port); | |
| 495 | 508 | } else |
| 496 | - h3270.current_port = (unsigned short)lport; | |
| 509 | + session->current_port = (unsigned short)lport; | |
| 497 | 510 | } |
| 498 | 511 | if (proxy_type < 0) |
| 499 | 512 | return -1; |
| ... | ... | @@ -501,199 +514,142 @@ int net_connect(const char *host, char *portname, Boolean ls, Boolean *resolving |
| 501 | 514 | |
| 502 | 515 | /* fill in the socket address of the given host */ |
| 503 | 516 | (void) memset((char *) &haddr, 0, sizeof(haddr)); |
| 504 | - if (h3270.passthru_host) { | |
| 517 | + if (session->passthru_host) { | |
| 505 | 518 | haddr.sin.sin_family = AF_INET; |
| 506 | 519 | (void) memmove(&haddr.sin.sin_addr, passthru_haddr, |
| 507 | 520 | passthru_len); |
| 508 | 521 | haddr.sin.sin_port = passthru_port; |
| 509 | 522 | ha_len = sizeof(struct sockaddr_in); |
| 510 | 523 | } else if (proxy_type > 0) { |
| 511 | - status_resolving(&h3270,1); | |
| 524 | + status_resolving(session,1); | |
| 512 | 525 | if (resolve_host_and_port(proxy_host, proxy_portname, |
| 513 | 526 | &proxy_port, &haddr.sa, &ha_len, errmsg, |
| 514 | 527 | sizeof(errmsg)) < 0) { |
| 515 | 528 | popup_an_error(NULL,errmsg); |
| 516 | - status_resolving(&h3270,0); | |
| 529 | + status_resolving(session,0); | |
| 517 | 530 | return -1; |
| 518 | - status_resolving(&h3270,0); | |
| 531 | + status_resolving(session,0); | |
| 519 | 532 | } |
| 520 | 533 | } else { |
| 521 | -/* | |
| 522 | -#if defined(LOCAL_PROCESS) | |
| 523 | - if (ls) { | |
| 524 | - local_process = True; | |
| 525 | - } else { | |
| 526 | -#endif | |
| 527 | -#if defined(LOCAL_PROCESS) | |
| 528 | - local_process = False; | |
| 529 | -#endif | |
| 530 | -*/ | |
| 531 | - status_resolving(&h3270,1); | |
| 534 | + status_resolving(session,1); | |
| 532 | 535 | if (resolve_host_and_port(host, portname, |
| 533 | - &h3270.current_port, &haddr.sa, &ha_len, | |
| 536 | + &session->current_port, &haddr.sa, &ha_len, | |
| 534 | 537 | errmsg, sizeof(errmsg)) < 0) { |
| 535 | - popup_an_error(NULL,errmsg); | |
| 538 | + popup_an_error(session,errmsg); | |
| 536 | 539 | status_resolving(&h3270,0); |
| 537 | 540 | return -1; |
| 538 | - status_resolving(&h3270,0); | |
| 541 | + status_resolving(session,0); | |
| 539 | 542 | } |
| 540 | -/* | |
| 541 | -#if defined(LOCAL_PROCESS) | |
| 542 | - } | |
| 543 | -#endif | |
| 544 | -*/ | |
| 545 | 543 | } |
| 546 | 544 | |
| 547 | -/* | |
| 548 | -#if defined(LOCAL_PROCESS) | |
| 549 | - if (local_process) { | |
| 550 | - int amaster; | |
| 551 | - struct winsize w; | |
| 552 | - | |
| 553 | - w.ws_row = XMIT_ROWS; | |
| 554 | - w.ws_col = XMIT_COLS; | |
| 555 | - w.ws_xpixel = 0; | |
| 556 | - w.ws_ypixel = 0; | |
| 557 | - | |
| 558 | - switch (forkpty(&amaster, NULL, NULL, &w)) { | |
| 559 | - case -1: // failed | |
| 560 | - popup_an_errno(errno, "forkpty"); | |
| 561 | - close_fail; | |
| 562 | - case 0: // child | |
| 563 | - putenv("TERM=xterm"); | |
| 564 | - if (strchr(host, ' ') != CN) { | |
| 565 | - (void) execlp("/bin/sh", "sh", "-c", host, | |
| 566 | - NULL); | |
| 567 | - } else { | |
| 568 | - char *arg1; | |
| 569 | - | |
| 570 | - arg1 = strrchr(host, '/'); | |
| 571 | - (void) execlp(host, | |
| 572 | - (arg1 == CN) ? host : arg1 + 1, | |
| 573 | - NULL); | |
| 574 | - } | |
| 575 | - perror(host); | |
| 576 | - #warning Notify User | |
| 577 | - _exit(1); | |
| 578 | - break; | |
| 579 | - default: // parent | |
| 580 | - sock = amaster; | |
| 581 | -#if !defined(_WIN32) | |
| 582 | - (void) fcntl(sock, F_SETFD, 1); | |
| 583 | -#endif | |
| 584 | - net_connected(); | |
| 585 | - host_in3270(CONNECTED_ANSI); | |
| 586 | - break; | |
| 587 | - } | |
| 588 | - } else { | |
| 589 | -#endif | |
| 590 | -*/ | |
| 591 | - /* create the socket */ | |
| 592 | - if ((h3270.sock = socket(haddr.sa.sa_family, SOCK_STREAM, 0)) == -1) { | |
| 593 | - popup_a_sockerr(NULL, N_( "socket" ) ); | |
| 594 | - return -1; | |
| 595 | - } | |
| 545 | + /* create the socket */ | |
| 546 | + if ((session->sock = socket(haddr.sa.sa_family, SOCK_STREAM, 0)) == -1) { | |
| 547 | + popup_a_sockerr(session, N_( "socket" ) ); | |
| 548 | + return -1; | |
| 549 | + } | |
| 596 | 550 | |
| 597 | - /* set options for inline out-of-band data and keepalives */ | |
| 598 | - if (setsockopt(h3270.sock, SOL_SOCKET, SO_OOBINLINE, (char *)&on, | |
| 599 | - sizeof(on)) < 0) { | |
| 600 | - popup_a_sockerr(NULL, N_( "setsockopt(%s)" ), "SO_OOBINLINE"); | |
| 601 | - close_fail; | |
| 602 | - } | |
| 603 | - if (setsockopt(h3270.sock, SOL_SOCKET, SO_KEEPALIVE, (char *)&on, | |
| 604 | - sizeof(on)) < 0) { | |
| 605 | - popup_a_sockerr(NULL, N_( "setsockopt(%s)" ), "SO_KEEPALIVE"); | |
| 606 | - close_fail; | |
| 607 | - } | |
| 551 | + /* set options for inline out-of-band data and keepalives */ | |
| 552 | + if (setsockopt(session->sock, SOL_SOCKET, SO_OOBINLINE, (char *)&on, | |
| 553 | + sizeof(on)) < 0) { | |
| 554 | + popup_a_sockerr(session, N_( "setsockopt(%s)" ), "SO_OOBINLINE"); | |
| 555 | + close_fail; | |
| 556 | + } | |
| 557 | + if (setsockopt(session->sock, SOL_SOCKET, SO_KEEPALIVE, (char *)&on, | |
| 558 | + sizeof(on)) < 0) { | |
| 559 | + popup_a_sockerr(session, N_( "setsockopt(%s)" ), "SO_KEEPALIVE"); | |
| 560 | + close_fail; | |
| 561 | + } | |
| 608 | 562 | #if defined(OMTU) /*[*/ |
| 609 | - if (setsockopt(h3270.sock, SOL_SOCKET, SO_SNDBUF, (char *)&mtu, | |
| 610 | - sizeof(mtu)) < 0) { | |
| 611 | - popup_a_sockerr( N_( "setsockopt(%s)" ), "SO_SNDBUF"); | |
| 612 | - close_fail; | |
| 613 | - } | |
| 563 | + if (setsockopt(session->sock, SOL_SOCKET, SO_SNDBUF, (char *)&mtu,sizeof(mtu)) < 0) | |
| 564 | + { | |
| 565 | + popup_a_sockerr(session, N_( "setsockopt(%s)" ), "SO_SNDBUF"); | |
| 566 | + close_fail; | |
| 567 | + } | |
| 614 | 568 | #endif /*]*/ |
| 615 | 569 | |
| 616 | - /* set the socket to be non-delaying */ | |
| 570 | + /* set the socket to be non-delaying */ | |
| 617 | 571 | #if defined(_WIN32) /*[*/ |
| 618 | - if (non_blocking(False) < 0) | |
| 572 | + if (non_blocking(False) < 0) | |
| 619 | 573 | #else /*][*/ |
| 620 | - if (non_blocking(True) < 0) | |
| 574 | + if (non_blocking(True) < 0) | |
| 621 | 575 | #endif /*]*/ |
| 622 | - close_fail; | |
| 576 | + close_fail; | |
| 623 | 577 | |
| 624 | 578 | #if !defined(_WIN32) /*[*/ |
| 625 | - /* don't share the socket with our children */ | |
| 626 | - (void) fcntl(h3270.sock, F_SETFD, 1); | |
| 579 | + /* don't share the socket with our children */ | |
| 580 | + (void) fcntl(session->sock, F_SETFD, 1); | |
| 627 | 581 | #endif /*]*/ |
| 628 | 582 | |
| 629 | - /* init ssl */ | |
| 583 | + /* init ssl */ | |
| 630 | 584 | #if defined(HAVE_LIBSSL) /*[*/ |
| 631 | - last_ssl_error = 0; | |
| 632 | - if (h3270.ssl_host) | |
| 633 | - ssl_init(); | |
| 585 | + last_ssl_error = 0; | |
| 586 | + if (session->ssl_host) | |
| 587 | + ssl_init(); | |
| 634 | 588 | #endif /*]*/ |
| 635 | 589 | |
| 636 | - /* connect */ | |
| 637 | - status_connecting(&h3270,1); | |
| 638 | - if (connect(h3270.sock, &haddr.sa, ha_len) == -1) { | |
| 639 | - if (socket_errno() == SE_EWOULDBLOCK | |
| 590 | + /* connect */ | |
| 591 | + status_connecting(session,1); | |
| 592 | + if (connect(session->sock, &haddr.sa, ha_len) == -1) { | |
| 593 | + if (socket_errno() == SE_EWOULDBLOCK | |
| 640 | 594 | #if defined(SE_EINPROGRESS) /*[*/ |
| 641 | - || socket_errno() == SE_EINPROGRESS | |
| 595 | + || socket_errno() == SE_EINPROGRESS | |
| 642 | 596 | #endif /*]*/ |
| 643 | 597 | ) { |
| 644 | - trace_dsn("Connection pending.\n"); | |
| 645 | - *pending = True; | |
| 598 | + trace_dsn("Connection pending.\n"); | |
| 599 | + *pending = True; | |
| 646 | 600 | #if !defined(_WIN32) /*[*/ |
| 647 | - output_id = AddOutput(h3270.sock, &h3270, output_possible); | |
| 601 | + output_id = AddOutput(session->sock, session, output_possible); | |
| 648 | 602 | #endif /*]*/ |
| 649 | - } else { | |
| 650 | - popup_a_sockerr(NULL, N_( "Can't connect to %s:%d" ),h3270.hostname, h3270.current_port); | |
| 651 | - close_fail; | |
| 652 | - } | |
| 653 | 603 | } else { |
| 654 | - if (non_blocking(False) < 0) | |
| 655 | - close_fail; | |
| 656 | - net_connected(&h3270); | |
| 604 | + popup_a_sockerr(session, N_( "Can't connect to %s:%d" ),session->hostname, session->current_port); | |
| 605 | + close_fail; | |
| 657 | 606 | } |
| 658 | -/* | |
| 659 | -#if defined(LOCAL_PROCESS) | |
| 607 | + } else { | |
| 608 | + if (non_blocking(False) < 0) | |
| 609 | + close_fail; | |
| 610 | + net_connected(session); | |
| 660 | 611 | } |
| 661 | -#endif | |
| 662 | -*/ | |
| 663 | 612 | |
| 664 | 613 | /* set up temporary termtype */ |
| 665 | - if (appres.termname == CN && h3270.std_ds_host) { | |
| 614 | + if (appres.termname == CN && session->std_ds_host) { | |
| 666 | 615 | (void) sprintf(ttype_tmpval, "IBM-327%c-%d", |
| 667 | - appres.m3279 ? '9' : '8', h3270.model_num); | |
| 668 | - h3270.termtype = ttype_tmpval; | |
| 616 | + appres.m3279 ? '9' : '8', session->model_num); | |
| 617 | + session->termtype = ttype_tmpval; | |
| 669 | 618 | } |
| 670 | 619 | |
| 671 | 620 | /* all done */ |
| 672 | 621 | #if defined(_WIN32) /*[*/ |
| 673 | - if (h3270.sock_handle == NULL) { | |
| 622 | + if (session->sock_handle == NULL) { | |
| 674 | 623 | char ename[256]; |
| 675 | 624 | |
| 676 | 625 | sprintf(ename, "wc3270-%d", getpid()); |
| 677 | 626 | |
| 678 | - h3270.sock_handle = CreateEvent(NULL, TRUE, FALSE, ename); | |
| 679 | - if (h3270.sock_handle == NULL) | |
| 627 | + session->sock_handle = CreateEvent(NULL, TRUE, FALSE, ename); | |
| 628 | + if (session->sock_handle == NULL) | |
| 680 | 629 | { |
| 681 | - #warning Notify User | |
| 682 | - Log("Cannot create socket handle: %s\n",win32_strerror(GetLastError())); | |
| 630 | + lib3270_popup_dialog( session, | |
| 631 | + LIB3270_NOTIFY_CRITICAL, | |
| 632 | + N_( "Network startup error" ), | |
| 633 | + N_( "Cannot create socket handle" ), | |
| 634 | + "%s", win32_strerror(GetLastError()) ); | |
| 635 | + | |
| 683 | 636 | _exit(1); |
| 684 | 637 | } |
| 685 | 638 | } |
| 686 | 639 | |
| 687 | - if (WSAEventSelect(h3270.sock, h3270.sock_handle, FD_READ | FD_CONNECT | FD_CLOSE) != 0) | |
| 640 | + if (WSAEventSelect(session->sock, session->sock_handle, FD_READ | FD_CONNECT | FD_CLOSE) != 0) | |
| 688 | 641 | { |
| 689 | - #warning Notify User | |
| 690 | - Log("WSAEventSelect failed: %s\n",win32_strerror(GetLastError())); | |
| 642 | + lib3270_popup_dialog( session, | |
| 643 | + LIB3270_NOTIFY_CRITICAL, | |
| 644 | + N_( "Network startup error" ), | |
| 645 | + N_( "WSAEventSelect failed" ), | |
| 646 | + "%s", win32_strerror(GetLastError()) ); | |
| 691 | 647 | _exit(1); |
| 692 | 648 | } |
| 693 | 649 | |
| 694 | - return (int) h3270.sock_handle; | |
| 650 | + return (int) session->sock_handle; | |
| 695 | 651 | #else /*][*/ |
| 696 | - return h3270.sock; | |
| 652 | + return session->sock; | |
| 697 | 653 | #endif /*]*/ |
| 698 | 654 | } |
| 699 | 655 | #undef close_fail |
| ... | ... | @@ -953,8 +909,11 @@ void net_input(H3270 *session) |
| 953 | 909 | case WSAEINVAL: |
| 954 | 910 | return; |
| 955 | 911 | default: |
| 956 | - #warning Notify User! | |
| 957 | - Log("second connect() failed: %s\n",win32_strerror(err)); | |
| 912 | + lib3270_popup_dialog( &h3270, | |
| 913 | + LIB3270_NOTIFY_CRITICAL, | |
| 914 | + N_( "Network startup error" ), | |
| 915 | + N_( "Second connect() failed" ), | |
| 916 | + "%s", win32_strerror(GetLastError()) ); | |
| 958 | 917 | _exit(1); |
| 959 | 918 | } |
| 960 | 919 | } | ... | ... |
telnetc.h
| ... | ... | @@ -34,7 +34,7 @@ LIB3270_INTERNAL Boolean net_add_dummy_tn3270e(void); |
| 34 | 34 | LIB3270_INTERNAL void net_add_eor(unsigned char *buf, int len); |
| 35 | 35 | LIB3270_INTERNAL void net_break(void); |
| 36 | 36 | LIB3270_INTERNAL void net_charmode(void); |
| 37 | -LIB3270_INTERNAL int net_connect(const char *, char *, Boolean, Boolean *, Boolean *); | |
| 37 | +LIB3270_INTERNAL int net_connect(H3270 *session, const char *, char *, Boolean, Boolean *, Boolean *); | |
| 38 | 38 | LIB3270_INTERNAL void net_disconnect(void); |
| 39 | 39 | LIB3270_INTERNAL void net_exception(H3270 *session); |
| 40 | 40 | LIB3270_INTERNAL void net_hexansi_out(unsigned char *buf, int len); | ... | ... |