// original : core.c 2003/02/26 18:03:12 Rev 1.7
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <errno.h>
#ifdef _WIN32
#define WIN32_LEAN_AND_MEAN
#include <windows.h>
#include <winsock2.h>
#include <io.h>
typedef int socklen_t;
#else
#include <sys/socket.h>
#include <netinet/in.h>
#include <netinet/tcp.h>
#include <net/if.h>
#include <sys/time.h>
#include <unistd.h>
#include <sys/ioctl.h>
#ifndef SIOCGIFCONF
#include <sys/sockio.h> // SIOCGIFCONF on Solaris, maybe others? [Shinomori]
#endif
#endif
#include <fcntl.h>
#include <string.h>
#include "socket.h"
#include "../common/mmo.h" // [Valaris] thanks to fov
#include "../common/timer.h"
#include "../common/utils.h"
#ifdef MEMWATCH
#include "memwatch.h"
#endif
fd_set readfds;
int fd_max;
time_t tick_;
time_t stall_time_ = 60;
int rfifo_size = 65536;
int wfifo_size = 65536;
#ifndef TCP_FRAME_LEN
#define TCP_FRAME_LEN 1053
#endif
struct socket_data *session[FD_SETSIZE];
static int null_parse(int fd);
static int (*default_func_parse)(int) = null_parse;
static int null_console_parse(char *buf);
static int (*default_console_parse)(char*) = null_console_parse;
static int connect_check(unsigned int ip);
/*======================================
* CORE : Set function
*--------------------------------------
*/
void set_defaultparse(int (*defaultparse)(int))
{
default_func_parse = defaultparse;
}
void set_nonblocking(int fd, int yes) {
setsockopt(fd,IPPROTO_TCP,TCP_NODELAY,(char *)&yes,sizeof yes);
}
static void setsocketopts(int fd)
{
int yes = 1; // reuse fix
setsockopt(fd,SOL_SOCKET,SO_REUSEADDR,(char *)&yes,sizeof yes);
#ifdef SO_REUSEPORT
setsockopt(fd,SOL_SOCKET,SO_REUSEPORT,(char *)&yes,sizeof yes);
#endif
set_nonblocking(fd, yes);
setsockopt(fd, SOL_SOCKET, SO_SNDBUF, (char *) &wfifo_size , sizeof(rfifo_size ));
setsockopt(fd, SOL_SOCKET, SO_RCVBUF, (char *) &rfifo_size , sizeof(rfifo_size ));
}
/*======================================
* CORE : Socket Sub Function
*--------------------------------------
*/
static int recv_to_fifo(int fd)
{
int len;
//printf("recv_to_fifo : %d %d\n",fd,session[fd]->eof);
if(session[fd]->eof)
return -1;
#ifdef _WIN32
len=recv(fd,session[fd]->rdata+session[fd]->rdata_size, RFIFOSPACE(fd), 0);
#else
len=read(fd,session[fd]->rdata+session[fd]->rdata_size,RFIFOSPACE(fd));
#endif
// printf (":::RECEIVE:::\n");
// dump(session[fd]->rdata, len); printf ("\n");
//{ int i; printf("recv %d : ",fd); for(i=0;i<len;i++){ printf("%02x ",RFIFOB(fd,session[fd]->rdata_size+i)); } printf("\n");}
if(len>0){
session[fd]->rdata_size+=len;
session[fd]->rdata_tick = tick_;
} else if(len<=0){
// value of connection is not necessary the same
// printf("set eof : connection #%d\n", fd);
session[fd]->eof=1;
}
return 0;
}
static int send_from_fifo(int fd)
{
int len;
//printf("send_from_fifo : %d\n",fd);
if(session[fd]->eof || session[fd]->wdata == 0)
return -1;
if (session[fd]->wdata_size == 0)
return 0;
#ifdef _WIN32
len=send(fd, session[fd]->wdata,session[fd]->wdata_size, 0);
#else
len=write(fd,session[fd]->wdata,session[fd]->wdata_size);
#endif
// printf (":::SEND:::\n");
// dump(session[fd]->wdata, len); printf ("\n");
//{ int i; printf("send %d : ",fd); for(i=0;i<len;i++){ printf("%02x ",session[fd]->wdata[i]); } printf("\n");}
if(len>0){
if(len<session[fd]->wdata_size){
memmove(session[fd]->wdata,session[fd]->wdata+len,session[fd]->wdata_size-len);
session[fd]->wdata_size-=len;
} else {
session[fd]->wdata_size=0;
}
} else if (errno != EAGAIN) {
// printf("set eof :%d\n",fd);
session[fd]->eof=1;
}
return 0;
}
void flush_fifos()
{
int i;
for(i=0;i<fd_max;i++)
if(session[i] != NULL &&
session[i]->func_send == send_from_fifo)
send_from_fifo(i);
}
static int null_parse(int fd)
{
printf("null_parse : %d\n",fd);
RFIFOSKIP(fd,RFIFOREST(fd));
return 0;
}
/*======================================
* CORE : Socket Function
*--------------------------------------
*/
static int connect_client(int listen_fd)
{
int fd;
struct sockaddr_in client_address;
int len;
#ifndef _WIN32
int result;
#endif
//printf("connect_client : %d\n",listen_fd);
len=sizeof(client_address);
fd = accept(listen_fd,(struct sockaddr*)&client_address,(socklen_t*)&len);
if(fd_max<=fd) fd_max=fd+1;
setsocketopts(fd);
if(fd==-1) {
perror("accept");
return -1;
} else if (!connect_check(*(unsigned int*)(&client_address.sin_addr))) {
close(fd);
return -1;
} else
FD_SET(fd,&readfds);
#ifdef _WIN32
{
unsigned long val = 1;
ioctlsocket(fd, FIONBIO, &val);
}
#else
result = fcntl(fd, F_SETFL, O_NONBLOCK);
#endif
CREATE(session[fd], struct socket_data, 1);
CREATE_A(session[fd]->rdata, unsigned char, rfifo_size);
CREATE_A(session[fd]->wdata, unsigned char, wfifo_size);
session[fd]->max_rdata = rfifo_size;
session[fd]->max_wdata = wfifo_size;
session[fd]->func_recv = recv_to_fifo;
session[fd]->func_send = send_from_fifo;
session[fd]->func_parse = default_func_parse;
session[fd]->client_addr = client_address;
session[fd]->rdata_tick = tick_;
//printf("new_session : %d %d\n",fd,session[fd]->eof);
return fd;
}
int make_listen_port(int port)
{
struct sockaddr_in server_address;
int fd;
int result;
fd = socket( AF_INET, SOCK_STREAM, 0 );
if(fd_max<=fd) fd_max=fd+1;
#ifdef _WIN32
{
unsigned long val = 1;
ioctlsocket(fd, FIONBIO, &val);
}
#else
result = fcntl(fd, F_SETFL, O_NONBLOCK);
#endif
setsocketopts(fd);
server_address.sin_family = AF_INET;
server_address.sin_addr.s_addr = htonl( INADDR_ANY );
server_address.sin_port = htons((unsigned short)port);
result = bind(fd, (struct sockaddr*)&server_address, sizeof(server_address));
if( result == -1 ) {
perror("bind");
exit(1);
}
result = listen( fd, 5 );
if( result == -1 ) { /* error */
perror("listen");
exit(1);
}
FD_SET(fd, &readfds );
CREATE(session[fd], struct socket_data, 1);
if(session[fd]==NULL){
printf("out of memory : make_listen_port\n");
exit(1);
}
memset(session[fd],0,sizeof(*session[fd]));
session[fd]->func_recv = connect_client;
return fd;
}
int make_listen_bind(long ip,int port)
{
struct sockaddr_in server_address;
int fd;
int result;
fd = socket( AF_INET, SOCK_STREAM, 0 );
if(fd_max<=fd) fd_max=fd+1;
#ifdef _WIN32
{
unsigned long val = 1;
ioctlsocket(fd, FIONBIO, &val);
}
#else
result = fcntl(fd, F_SETFL, O_NONBLOCK);
#endif
setsocketopts(fd);
server_address.sin_family = AF_INET;
server_address.sin_addr.s_addr = ip;
server_address.sin_port = htons((unsigned short)port);
result = bind(fd, (struct sockaddr*)&server_address, sizeof(server_address));
if( result == -1 ) {
perror("bind");
exit(1);
}
result = listen( fd, 5 );
if( result == -1 ) { /* error */
perror("listen");
exit(1);
}
FD_SET(fd, &readfds );
CREATE(session[fd], struct socket_data, 1);
if(session[fd]==NULL){
printf("out of memory : make_listen_bind\n");
exit(1);
}
memset(session[fd],0,sizeof(*session[fd]));
session[fd]->func_recv = connect_client;
return fd;
}
// Console Reciever [Wizputer]
int console_recieve(int i) {
int n;
char *buf;
CREATE_A(buf, char , 64);
memset(buf,0,sizeof(64));
n = read(0, buf , 64);
if ( n < 0 )
printf("Console input read error\n");
else
session[0]->func_console(buf);
return 0;
}
void set_defaultconsoleparse(int (*defaultparse)(char*))
{
default_console_parse = defaultparse;
}
static int null_console_parse(char *buf)
{
printf("null_console_parse : %s\n",buf);
return 0;
}
// Console Input [Wizputer]
int start_console(void) {
FD_SET(0,&readfds);
CREATE(session[0], struct socket_data, 1);
if(session[0]==NULL){
printf("out of memory : start_console\n");
exit(1);
}
memset(session[0],0,sizeof(*session[0]));
session[0]->func_recv = console_recieve;
session[0]->func_console = default_console_parse;
return 0;
}
int make_connection(long ip,int port)
{
struct sockaddr_in server_address;
int fd;
int result;
fd = socket( AF_INET, SOCK_STREAM, 0 );
if(fd_max<=fd)
fd_max=fd+1;
setsocketopts(fd);
server_address.sin_family = AF_INET;
server_address.sin_addr.s_addr = ip;
server_address.sin_port = htons((unsigned short)port);
#ifdef _WIN32
{
unsigned long val = 1;
ioctlsocket(fd, FIONBIO, &val);
}
#else
result = fcntl(fd, F_SETFL, O_NONBLOCK);
#endif
result = connect(fd, (struct sockaddr *)(&server_address),sizeof(struct sockaddr_in));
FD_SET(fd,&readfds);
CREATE(session[fd], struct socket_data, 1);
CREATE_A(session[fd]->rdata, unsigned char, rfifo_size);
CREATE_A(session[fd]->wdata, unsigned char, wfifo_size);
session[fd]->max_rdata = rfifo_size;
session[fd]->max_wdata = wfifo_size;
session[fd]->func_recv = recv_to_fifo;
session[fd]->func_send = send_from_fifo;
session[fd]->func_parse = default_func_parse;
session[fd]->rdata_tick = tick_;
return fd;
}
int delete_session(int fd)
{
if(fd<=0 || fd>=FD_SETSIZE)
return -1;
FD_CLR(fd,&readfds);
if(session[fd]){
if(session[fd]->rdata)
aFree(session[fd]->rdata);
if(session[fd]->wdata)
aFree(session[fd]->wdata);
if(session[fd]->session_data)
aFree(session[fd]->session_data);
aFree(session[fd]);
}
session[fd]=NULL;
//printf("delete_session:%d\n",fd);
return 0;
}
int realloc_fifo(int fd,int rfifo_size,int wfifo_size)
{
struct socket_data *s;
if (fd <= 0) return 0;
s = session[fd];
if( s->max_rdata != rfifo_size && s->rdata_size < rfifo_size){
RECREATE(s->rdata, unsigned char, rfifo_size);
s->max_rdata = rfifo_size;
}
if( s->max_wdata != wfifo_size && s->wdata_size < wfifo_size){
RECREATE(s->wdata, unsigned char, wfifo_size);
s->max_wdata = wfifo_size;
}
return 0;
}
int WFIFOSET(int fd,int len)
{
struct socket_data *s;
if (fd <= 0) return 0;
s = session[fd];
if (s == NULL || s->wdata == NULL)
return 0;
if( s->wdata_size+len+16384 > s->max_wdata ){
unsigned char *sin_addr = (unsigned char *)&s->client_addr.sin_addr;
realloc_fifo(fd,s->max_rdata, s->max_wdata <<1 );
printf("socket: %d (%d.%d.%d.%d) wdata expanded to %d bytes.\n",fd, sin_addr[0], sin_addr[1], sin_addr[2], sin_addr[3], s->max_wdata);
}
s->wdata_size=(s->wdata_size+(len)+2048 < s->max_wdata) ?
s->wdata_size+len : (printf("socket: %d wdata lost !!\n",fd),s->wdata_size);
if (s->wdata_size > (TCP_FRAME_LEN))
send_from_fifo(fd);
return 0;
}
int do_sendrecv(int next)
{
fd_set rfd,wfd;
struct timeval timeout;
int ret,i;
tick_ = time(0);
memcpy(&rfd, &readfds, sizeof(rfd));
FD_ZERO(&wfd);
for(i=0;i<fd_max;i++){
if(!session[i] && FD_ISSET(i,&readfds)){
printf("force clr fds %d\n",i);
FD_CLR(i,&readfds);
continue;
}
if(!session[i])
continue;
if(session[i]->wdata_size)
FD_SET(i,&wfd);
}
timeout.tv_sec = next/1000;
timeout.tv_usec = next%1000*1000;
ret = select(fd_max,&rfd,&wfd,NULL,&timeout);
if(ret<=0)
return 0;
for(i=0;i<fd_max;i++){
if(!session[i])
continue;
if(FD_ISSET(i,&wfd)){
//printf("write:%d\n",i);
if(session[i]->func_send)
session[i]->func_send(i);
}
if(FD_ISSET(i,&rfd)){
//printf("read:%d\n",i);
if(session[i]->func_recv)
session[i]->func_recv(i);
}
}
return 0;
}
int do_parsepacket(void)
{
int i;
for(i=0;i<fd_max;i++){
if(!session[i])
continue;
if ((session[i]->rdata_tick != 0) && ((tick_ - session[i]->rdata_tick) > stall_time_))
session[i]->eof = 1;
if(session[i]->rdata_size==0 && session[i]->eof==0)
continue;
if(session[i]->func_parse){
session[i]->func_parse(i);
if(!session[i])
continue;
}
RFIFOFLUSH(i);
}
return 0;
}
/* DDoS �U���� */
enum {
ACO_DENY_ALLOW=0,
ACO_ALLOW_DENY,
ACO_MUTUAL_FAILTURE,
};
struct _access_control {
unsigned int ip;
unsigned int mask;
};
static struct _access_control *access_allow;
static struct _access_control *access_deny;
static int access_order=ACO_DENY_ALLOW;
static int access_allownum=0;
static int access_denynum=0;
static int access_debug;
static int ddos_count = 10;
static int ddos_interval = 3000;
static int ddos_autoreset = 600*1000;
struct _connect_history {
struct _connect_history *next;
struct _connect_history *prev;
int status;
int count;
unsigned int ip;
unsigned int tick;
};
static struct _connect_history *connect_history[0x10000];
static int connect_check_(unsigned int ip);
// �ڑ��ł��邩�ǂ����̊m�F
// false : �ڑ�OK
// true : �ڑ�NG
static int connect_check(unsigned int ip) {
int result = connect_check_(ip);
if(access_debug) {
printf("connect_check: connection from %08x %s\n",
ip,result ? "allowed" : "denied");
}
return result;
}
static int connect_check_(unsigned int ip) {
struct _connect_history *hist = connect_history[ip & 0xFFFF];
struct _connect_history *hist_new;
int i,is_allowip = 0,is_denyip = 0,connect_ok = 0;
// allow , deny ���X�g�ɓ����Ă��邩�m�F
for(i = 0;i < access_allownum; i++) {
if((ip & access_allow[i].mask) == (access_allow[i].ip & access_allow[i].mask)) {
if(access_debug) {
printf("connect_check: match allow list from:%08x ip:%08x mask:%08x\n",
ip,access_allow[i].ip,access_allow[i].mask);
}
is_allowip = 1;
break;
}
}
for(i = 0;i < access_denynum; i++) {
if((ip & access_deny[i].mask) == (access_deny[i].ip & access_deny[i].mask)) {
if(access_debug) {
printf("connect_check: match deny list from:%08x ip:%08x mask:%08x\n",
ip,access_deny[i].ip,access_deny[i].mask);
}
is_denyip = 1;
break;
}
}
// �R�l�N�g�o���邩�ǂ����m�F
// connect_ok
// 0 : �������ɋ���
// 1 : �c��C�`�F�b�N�̌��ʎ���
// 2 : �������ɋ���
switch(access_order) {
case ACO_DENY_ALLOW:
default:
if(is_allowip) {
connect_ok = 2;
} else if(is_denyip) {
connect_ok = 0;
} else {
connect_ok = 1;
}
break;
case ACO_ALLOW_DENY:
if(is_denyip) {
connect_ok = 0;
} else if(is_allowip) {
connect_ok = 2;
} else {
connect_ok = 1;
}
break;
case ACO_MUTUAL_FAILTURE:
if(is_allowip) {
connect_ok = 2;
} else {
connect_ok = 0;
}
break;
}
// �ڑ������ׂ�
while(hist) {
if(ip == hist->ip) {
// ����IP����
if(hist->status) {
// ban �t���O��������
return (connect_ok == 2 ? 1 : 0);
} else if(DIFF_TICK(gettick(),hist->tick) < ddos_interval) {
// ddos_interval�b�ȓ��Ƀ��N�G�X�g�L��
hist->tick = gettick();
if(hist->count++ >= ddos_count) {
// ddos �U�������o
hist->status = 1;
printf("connect_check: ddos attack detected (%d.%d.%d.%d)\n",
ip & 0xFF,(ip >> 8) & 0xFF,(ip >> 16) & 0xFF,ip >> 24);
return (connect_ok == 2 ? 1 : 0);
} else {
return connect_ok;
}
} else {
// ddos_interval�b�ȓ��Ƀ��N�G�X�g�����̂Ń^�C�}�[�N���A
hist->tick = gettick();
hist->count = 0;
return connect_ok;
}
}
hist = hist->next;
}
// IP���X�g�ɖ����̂ŐV�K�쐬
hist_new = aCalloc(1,sizeof(struct _connect_history));
hist_new->ip = ip;
hist_new->tick = gettick();
if(connect_history[ip & 0xFFFF] != NULL) {
hist = connect_history[ip & 0xFFFF];
hist->prev = hist_new;
hist_new->next = hist;
}
connect_history[ip & 0xFFFF] = hist_new;
return connect_ok;
}
static int connect_check_clear(int tid,unsigned int tick,int id,int data) {
int i;
int clear = 0;
int list = 0;
struct _connect_history *hist , *hist2;
for(i = 0;i < 0x10000 ; i++) {
hist = connect_history[i];
while(hist) {
if(
(DIFF_TICK(tick,hist->tick) > ddos_interval * 3 && !hist->status) ||
(DIFF_TICK(tick,hist->tick) > ddos_autoreset && hist->status)
) {
// clear data
hist2 = hist->next;
if(hist->prev) {
hist->prev->next = hist->next;
} else {
connect_history[i] = hist->next;
}
if(hist->next) {
hist->next->prev = hist->prev;
}
aFree(hist);
hist = hist2;
clear++;
} else {
hist = hist->next;
list++;
}
}
}
if(access_debug) {
printf("connect_check_clear: clear = %d list = %d\n",clear,list);
}
return list;
}
// IP�}�X�N�`�F�b�N
int access_ipmask(const char *str,struct _access_control* acc)
{
unsigned int mask=0,i=0,m,ip, a0,a1,a2,a3;
if( !strcmp(str,"all") ) {
ip = 0;
mask = 0;
} else {
if( sscanf(str,"%d.%d.%d.%d%n",&a0,&a1,&a2,&a3,&i)!=4 || i==0) {
printf("access_ipmask: unknown format %s\n",str);
return 0;
}
ip = (a3 << 24) | (a2 << 16) | (a1 << 8) | a0;
if(sscanf(str+i,"/%d.%d.%d.%d",&a0,&a1,&a2,&a3)==4 ){
mask = (a3 << 24) | (a2 << 16) | (a1 << 8) | a0;
} else if(sscanf(str+i,"/%d",&m) == 1) {
for(i=0;i<m;i++) {
mask = (mask >> 1) | 0x80000000;
}
mask = ntohl(mask);
} else {
mask = 0xFFFFFFFF;
}
}
if(access_debug) {
printf("access_ipmask: ip:%08x mask:%08x %s\n",ip,mask,str);
}
acc->ip = ip;
acc->mask = mask;
return 1;
}
int socket_config_read(const char *cfgName) {
int i;
char line[1024],w1[1024],w2[1024];
FILE *fp;
fp=fopen(cfgName, "r");
if(fp==NULL){
printf("File not found: %s\n", cfgName);
return 1;
}
while(fgets(line,1020,fp)){
if(line[0] == '/' && line[1] == '/')
continue;
i=sscanf(line,"%[^:]: %[^\r\n]",w1,w2);
if(i!=2)
continue;
if(strcmpi(w1,"stall_time")==0){
stall_time_ = atoi(w2);
} else if(strcmpi(w1,"order")==0){
access_order=atoi(w2);
if(strcmpi(w2,"deny,allow")==0) access_order=ACO_DENY_ALLOW;
if(strcmpi(w2,"allow,deny")==0) access_order=ACO_ALLOW_DENY;
if(strcmpi(w2,"mutual-failture")==0) access_order=ACO_MUTUAL_FAILTURE;
} else if(strcmpi(w1,"allow")==0){
access_allow = aRealloc(access_allow,(access_allownum+1)*sizeof(struct _access_control));
if(access_ipmask(w2,&access_allow[access_allownum])) {
access_allownum++;
}
} else if(strcmpi(w1,"deny")==0){
access_deny = aRealloc(access_deny,(access_denynum+1)*sizeof(struct _access_control));
if(access_ipmask(w2,&access_deny[access_denynum])) {
access_denynum++;
}
} else if(!strcmpi(w1,"ddos_interval")){
ddos_interval = atoi(w2);
} else if(!strcmpi(w1,"ddos_count")){
ddos_count = atoi(w2);
} else if(!strcmpi(w1,"ddos_autoreset")){
ddos_autoreset = atoi(w2);
} else if(!strcmpi(w1,"debug")){
access_debug = atoi(w2);
} else if (strcmpi(w1, "import") == 0)
socket_config_read(w2);
}
fclose(fp);
return 0;
}
int RFIFOSKIP(int fd,int len)
{
struct socket_data *s;
if (fd <= 0) return 0;
s = session[fd];
if (s->rdata_size-s->rdata_pos-len<0) {
fprintf(stderr,"too many skip\n");
exit(1);
}
s->rdata_pos = s->rdata_pos+len;
return 0;
}
unsigned int addr_[16]; // ip addresses of local host (host byte order)
unsigned int naddr_ = 0; // # of ip addresses
int Net_Init(void)
{
#ifdef _WIN32
char** a;
unsigned int i;
char fullhost[255];
struct hostent* hent;
/* Start up the windows networking */
WSADATA wsaData;
if ( WSAStartup(WINSOCK_VERSION, &wsaData) != 0 ) {
printf("SYSERR: WinSock not available!\n");
exit(1);
}
if(gethostname(fullhost, sizeof(fullhost)) == SOCKET_ERROR) {
printf("Ugg.. no hostname defined!\n");
return 0;
}
// XXX This should look up the local IP addresses in the registry
// instead of calling gethostbyname. However, the way IP addresses
// are stored in the registry is annoyingly complex, so I'll leave
// this as T.B.D.
hent = gethostbyname(fullhost);
if (hent == NULL) {
printf("Cannot resolve our own hostname to a IP address");
return 0;
}
a = hent->h_addr_list;
for(i = 0; a[i] != 0 && i < 16; ++i) {
unsigned long addr1 = ntohl(*(unsigned long*) a[i]);
addr_[i] = addr1;
}
naddr_ = i;
#else
int pos;
int fdes = socket(AF_INET, SOCK_STREAM, 0);
char buf[16 * sizeof(struct ifreq)];
struct ifconf ic;
// The ioctl call will fail with Invalid Argument if there are more
// interfaces than will fit in the buffer
ic.ifc_len = sizeof(buf);
ic.ifc_buf = buf;
if(ioctl(fdes, SIOCGIFCONF, &ic) == -1) {
printf("SIOCGIFCONF failed!\n");
return 0;
}
for(pos = 0; pos < ic.ifc_len;)
{
struct ifreq * ir = (struct ifreq *) (ic.ifc_buf + pos);
struct sockaddr_in * a = (struct sockaddr_in *) &(ir->ifr_addr);
if(a->sin_family == AF_INET) {
u_long ad = ntohl(a->sin_addr.s_addr);
if(ad != INADDR_LOOPBACK) {
addr_[naddr_ ++] = ad;
if(naddr_ == 16)
break;
}
}
#if defined(_AIX) || defined(__APPLE__)
pos += ir->ifr_addr.sa_len; // For when we port athena to run on Mac's :)
pos += sizeof(ir->ifr_name);
#else
pos += sizeof(struct ifreq);
#endif
}
#endif
return(0);
}
void do_final_socket(void)
{
int i;
struct _connect_history *hist , *hist2;
for(i=0; i<fd_max; i++) {
if(session[i]) {
delete_session(i);
}
}
for(i=0; i<0x10000; i++) {
hist = connect_history[i];
while(hist) {
hist2 = hist->next;
aFree(hist);
hist = hist2;
}
}
if (access_allow)
aFree(access_allow);
if (access_deny)
aFree(access_deny);
// session[0] �̃_�~�[�f�[�^���폜
if (session[0]) {
aFree(session[0]->rdata);
aFree(session[0]->wdata);
aFree(session[0]);
}
}
void do_socket(void)
{
char *SOCKET_CONF_FILENAME = "conf/packet_athena.conf";
FD_ZERO(&readfds);
atexit(do_final_socket);
socket_config_read(SOCKET_CONF_FILENAME);
// session[0] �Ƀ_�~�[�f�[�^���m�ۂ���
CREATE(session[0], struct socket_data, 1);
CREATE_A(session[0]->rdata, unsigned char, rfifo_size);
CREATE_A(session[0]->wdata, unsigned char, wfifo_size);
session[0]->max_rdata = rfifo_size;
session[0]->max_wdata = wfifo_size;
// �Ƃ肠�����T�����Ƃɕs�v�ȃf�[�^���폜����
add_timer_interval(gettick()+1000,connect_check_clear,0,0,300*1000);
}