Annotation of libwww/Library/src/HTHost.c, revision 2.71
2.1 frystyk 1: /* HTHost.c
2: ** REMOTE HOST INFORMATION
3: **
4: ** (c) COPYRIGHT MIT 1995.
5: ** Please first read the full copyright statement in the file COPYRIGH.
2.71 ! kahan 6: ** @(#) $Id: HTHost.c,v 2.70 2000/06/23 14:23:52 kahan Exp $
2.1 frystyk 7: **
8: ** This object manages the information that we know about a remote host.
9: ** This can for example be what type of host it is, and what version
10: ** it is using. We also keep track of persistent connections
11: **
12: ** April 96 HFN Written
13: */
14:
15: /* Library include files */
2.44 frystyk 16: #include "wwwsys.h"
2.1 frystyk 17: #include "WWWUtil.h"
18: #include "HTParse.h"
19: #include "HTAlert.h"
20: #include "HTError.h"
21: #include "HTNetMan.h"
22: #include "HTTrans.h"
2.13 frystyk 23: #include "HTTPUtil.h"
24: #include "HTTCP.h"
2.1 frystyk 25: #include "HTHost.h" /* Implemented here */
2.13 frystyk 26: #include "HTHstMan.h"
2.1 frystyk 27:
2.48 frystyk 28: #define HOST_OBJECT_TTL 43200L /* Default host timeout is 12 h */
2.29 frystyk 29:
2.48 frystyk 30: #define TCP_IDLE_PASSIVE 120L /* Passive TTL in s on an idle connection */
31: #define TCP_IDLE_ACTIVE 60000L /* Active TTL in ms on an idle connection */
2.29 frystyk 32:
2.45 frystyk 33: #define MAX_PIPES 50 /* maximum number of pipelined requests */
2.50 frystyk 34: #define MAX_HOST_RECOVER 1 /* Max number of auto recovery */
2.32 frystyk 35: #define DEFAULT_DELAY 30 /* Default write flush delay in ms */
2.1 frystyk 36:
2.13 frystyk 37: struct _HTInputStream {
38: const HTInputStreamClass * isa;
2.1 frystyk 39: };
40:
2.13 frystyk 41: PRIVATE int HostEvent(SOCKET soc, void * pVoid, HTEventType type);
42:
43: /* Type definitions and global variables etc. local to this module */
2.48 frystyk 44: PRIVATE time_t HostTimeout = HOST_OBJECT_TTL; /* Timeout for host objects */
2.53 frystyk 45: PRIVATE time_t HTPassiveTimeout = TCP_IDLE_PASSIVE; /* Passive timeout in s */
46: PRIVATE ms_t HTActiveTimeout = TCP_IDLE_ACTIVE; /* Active timeout in ms */
2.1 frystyk 47:
2.8 frystyk 48: PRIVATE HTList ** HostTable = NULL;
49: PRIVATE HTList * PendHost = NULL; /* List of pending host elements */
2.1 frystyk 50:
2.40 kahan 51: /* JK: New functions for interruption the automatic pending request
52: activation */
53: PRIVATE HTHost_ActivateRequestCallback * ActivateReqCBF = NULL;
54: PRIVATE int HTHost_ActivateRequest (HTNet *net);
55: PRIVATE BOOL DoPendingReqLaunch = YES; /* controls automatic activation
56: of pending requests */
57:
2.13 frystyk 58: PRIVATE int EventTimeout = -1; /* Global Host event timeout */
59:
2.36 frystyk 60: PRIVATE ms_t WriteDelay = DEFAULT_DELAY; /* Delay in ms */
2.26 frystyk 61:
2.45 frystyk 62: PRIVATE int MaxPipelinedRequests = MAX_PIPES;
63:
2.1 frystyk 64: /* ------------------------------------------------------------------------- */
65:
66: PRIVATE void free_object (HTHost * me)
67: {
68: if (me) {
2.30 frystyk 69: int i;
2.1 frystyk 70: HT_FREE(me->hostname);
71: HT_FREE(me->type);
2.12 frystyk 72: HT_FREE(me->server);
73: HT_FREE(me->user_agent);
74: HT_FREE(me->range_units);
2.30 frystyk 75:
76: /* Delete the channel (if any) */
2.3 eric 77: if (me->channel) {
2.5 eric 78: HTChannel_delete(me->channel, HT_OK);
2.3 eric 79: me->channel = NULL;
80: }
2.30 frystyk 81:
82: /* Unregister the events */
2.18 eric 83: for (i = 0; i < HTEvent_TYPES; i++)
84: HTEvent_delete(me->events[i]);
2.30 frystyk 85:
86: /* Delete the timer (if any) */
87: if (me->timer) HTTimer_delete(me->timer);
88:
89: /* Delete the queues */
2.8 frystyk 90: HTList_delete(me->pipeline);
91: HTList_delete(me->pending);
2.1 frystyk 92: HT_FREE(me);
93: }
94: }
95:
96: PRIVATE BOOL delete_object (HTList * list, HTHost * me)
97: {
2.59 frystyk 98: HTTRACE(CORE_TRACE, "Host info... object %p from list %p\n" _ me _ list);
2.1 frystyk 99: HTList_removeObject(list, (void *) me);
100: free_object(me);
101: return YES;
102: }
103:
2.13 frystyk 104: PRIVATE BOOL isLastInPipe (HTHost * host, HTNet * net)
105: {
106: return HTList_lastObject(host->pipeline) == net;
107: }
108:
2.51 frystyk 109: PRIVATE BOOL killPipeline (HTHost * host, HTEventType type)
2.48 frystyk 110: {
111: if (host) {
112: int piped = HTList_count(host->pipeline);
113: int pending = HTList_count(host->pending);
114: int cnt;
115:
2.59 frystyk 116: HTTRACE(CORE_TRACE, "Host kill... Pipeline due to %s event\n" _ HTEvent_type2str(type));
2.51 frystyk 117:
2.48 frystyk 118: /* Terminate all net objects in pending queue */
119: for (cnt=0; cnt<pending; cnt++) {
120: HTNet * net = HTList_removeLastObject(host->pending);
2.56 frystyk 121: if (net) {
2.59 frystyk 122: HTTRACE(CORE_TRACE, "Host kill... Terminating net object %p from pending queue\n" _ net);
2.56 frystyk 123: net->registeredFor = 0;
124: (*net->event.cbf)(HTChannel_socket(host->channel), net->event.param, type);
2.58 frystyk 125: if (host->lock == net) host->lock = NULL;
2.56 frystyk 126: }
2.48 frystyk 127: }
128:
129: /* Terminate all net objects in pipeline */
130: if (piped >= 1) {
131:
132: /*
133: ** Terminte all net objects in the pipeline
134: */
135: for (cnt=0; cnt<piped; cnt++) {
136: HTNet * net = HTList_firstObject(host->pipeline);
2.56 frystyk 137: if (net) {
2.59 frystyk 138: HTTRACE(CORE_TRACE, "Host kill... Terminating net object %p from pipe line\n" _ net);
2.56 frystyk 139: net->registeredFor = 0;
140: (*net->event.cbf)(HTChannel_socket(host->channel), net->event.param, type);
141: }
2.48 frystyk 142: }
143: }
144: return YES;
145: }
146: return NO;
147: }
148:
149: /*
2.51 frystyk 150: ** Silently close an idle persistent connection after
2.53 frystyk 151: ** HTActiveTimeout secs
2.51 frystyk 152: */
153: PRIVATE int IdleTimeoutEvent (HTTimer * timer, void * param, HTEventType type)
154: {
155: HTHost * host = (HTHost *) param;
156: SOCKET sockfd = HTChannel_socket(host->channel);
2.67 raff 157:
2.51 frystyk 158: HTTimer_delete(timer);
159: host->timer = NULL;
2.67 raff 160:
161: return HostEvent (sockfd, host, HTEvent_CLOSE);
2.51 frystyk 162: }
163:
164: /*
2.13 frystyk 165: ** HostEvent - host event manager - recieves events from the event
166: ** manager and dispatches them to the client net objects by calling the
167: ** net object's cbf.
168: **
169: */
170: PRIVATE int HostEvent (SOCKET soc, void * pVoid, HTEventType type)
171: {
172: HTHost * host = (HTHost *)pVoid;
173:
2.61 frystyk 174: if (type == HTEvent_READ || type == HTEvent_CLOSE || type == HTEvent_ACCEPT) {
2.13 frystyk 175: HTNet * targetNet;
176:
177: /* call the first net object */
178: do {
179: int ret;
2.49 frystyk 180:
181: /* netscape and apache servers can do a lazy close well after usage
182: * of previous socket has been dispensed by the library,
183: * the section below makes sure the event does not get miss attributed
184: */
2.66 frystyk 185: if (HTChannel_socket(host->channel) != soc && type != HTEvent_ACCEPT && !host->listening) {
186: HTTRACE(CORE_TRACE, "Host Event.. wild socket %d type = %s real socket is %d\n" _ soc _
187: type == HTEvent_CLOSE ? "Event_Close" : "Event_Read" _
188: HTChannel_socket(host->channel));
189: return HT_OK;
2.49 frystyk 190: }
191:
2.13 frystyk 192: targetNet = (HTNet *)HTList_firstObject(host->pipeline);
193: if (targetNet) {
2.59 frystyk 194: HTTRACE(CORE_TRACE, "Host Event.. READ passed to `%s\'\n" _
2.28 frystyk 195: HTAnchor_physical(HTRequest_anchor(HTNet_request(targetNet))));
2.13 frystyk 196: if ((ret = (*targetNet->event.cbf)(HTChannel_socket(host->channel),
197: targetNet->event.param, type)) != HT_OK)
198: return ret;
199: }
200: if (targetNet == NULL && host->remainingRead > 0) {
2.59 frystyk 201: HTTRACE(CORE_TRACE, "HostEvent... Error: %d bytes left to read and nowhere to put them\n" _
2.31 frystyk 202: host->remainingRead);
2.13 frystyk 203: host->remainingRead = 0;
204: /*
205: ** Fall through to close the channel
206: */
207: }
208: /* call pipelined net object to eat all the data in the channel */
209: } while (host->remainingRead > 0);
210:
211: /* last target net should have set remainingRead to 0 */
212: if (targetNet)
213: return HT_OK;
214:
215: /* If there was notargetNet, it should be a close */
2.59 frystyk 216: HTTRACE(CORE_TRACE, "Host Event.. host %p `%s\' closed connection.\n" _
217: host _ host->hostname);
2.13 frystyk 218:
219: /* Is there garbage in the channel? Let's check: */
220: {
221: char buf[256];
222: int ret;
2.28 frystyk 223: memset(buf, '\0', sizeof(buf));
2.68 kahan 224: if (HTChannel_socket(host->channel) != INVSOC) {
225: while ((ret = NETREAD(HTChannel_socket(host->channel), buf, sizeof(buf)-1)) > 0) {
2.59 frystyk 226: HTTRACE(CORE_TRACE, "Host Event.. Host %p `%s\' had %d extraneous bytes: `%s\'\n" _
2.68 kahan 227: host _ host->hostname _ ret _ buf);
2.28 frystyk 228: memset(buf, '\0', sizeof(buf));
2.68 kahan 229: }
230: }
2.13 frystyk 231: }
232: HTHost_clearChannel(host, HT_OK);
2.28 frystyk 233: return HT_OK; /* extra garbage does not constitute an application error */
2.13 frystyk 234:
2.18 eric 235: } else if (type == HTEvent_WRITE || type == HTEvent_CONNECT) {
2.13 frystyk 236: HTNet * targetNet = (HTNet *)HTList_lastObject(host->pipeline);
237: if (targetNet) {
2.59 frystyk 238: HTTRACE(CORE_TRACE, "Host Event.. WRITE passed to `%s\'\n" _
2.28 frystyk 239: HTAnchor_physical(HTRequest_anchor(HTNet_request(targetNet))));
2.13 frystyk 240: return (*targetNet->event.cbf)(HTChannel_socket(host->channel), targetNet->event.param, type);
241: }
2.59 frystyk 242: HTTRACE(CORE_TRACE, "Host Event Host %p (`%s\') dispatched with event %s but doesn't have a target - %d requests made, %d requests in pipe, %d pending\n" _
243: host _
244: host ? host->hostname : "<null>" _
245: HTEvent_type2str(type) _
246: host ? host->reqsMade : -1 _
247: HTList_count(host->pipeline) _
2.56 frystyk 248: HTList_count(host->pending));
2.55 frystyk 249: #if 0
2.59 frystyk 250: HTDEBUGBREAK("Host Event.. Host %p (`%s\') dispatched with event %d\n" _
251: host _ host ? host->hostname : "<null>" _ type);
2.13 frystyk 252: return HT_ERROR;
2.55 frystyk 253: #else
254: return HT_OK;
255: #endif
2.14 frystyk 256: } else if (type == HTEvent_TIMEOUT) {
2.51 frystyk 257: killPipeline(host, HTEvent_TIMEOUT);
2.14 frystyk 258: } else {
2.59 frystyk 259: HTTRACE(CORE_TRACE, "Don't know how to handle OOB data from `%s\'?\n" _
2.44 frystyk 260: host->hostname);
2.14 frystyk 261: }
2.13 frystyk 262: return HT_OK;
263: }
264:
2.1 frystyk 265: /*
266: ** Search the host info cache for a host object or create a new one
267: ** and add it. Examples of host names are
268: **
269: ** www.w3.org
270: ** www.foo.com:8000
271: ** 18.52.0.18
272: **
273: ** Returns Host object or NULL if error. You may get back an already
274: ** existing host object - you're not guaranteed a new one each time.
275: */
2.15 eric 276: PUBLIC HTHost * HTHost_new (char * host, u_short u_port)
2.1 frystyk 277: {
278: HTList * list = NULL; /* Current list in cache */
279: HTHost * pres = NULL;
2.13 frystyk 280: int hash = 0;
2.1 frystyk 281: if (!host) {
2.59 frystyk 282: HTTRACE(CORE_TRACE, "Host info... Bad argument\n");
2.1 frystyk 283: return NULL;
284: }
285:
286: /* Find a hash for this host */
287: {
288: char *ptr;
289: for (ptr=host; *ptr; ptr++)
2.13 frystyk 290: hash = (int) ((hash * 3 + (*(unsigned char *) ptr)) % HOST_HASH_SIZE);
2.1 frystyk 291: if (!HostTable) {
2.13 frystyk 292: if ((HostTable = (HTList **) HT_CALLOC(HOST_HASH_SIZE,
2.1 frystyk 293: sizeof(HTList *))) == NULL)
294: HT_OUTOFMEM("HTHost_find");
295: }
296: if (!HostTable[hash]) HostTable[hash] = HTList_new();
297: list = HostTable[hash];
298: }
299:
300: /* Search the cache */
301: {
302: HTList * cur = list;
303: while ((pres = (HTHost *) HTList_nextObject(cur))) {
2.15 eric 304: if (!strcmp(pres->hostname, host) && u_port == pres->u_port) {
2.8 frystyk 305: if (HTHost_isIdle(pres) && time(NULL)>pres->ntime+HostTimeout){
2.59 frystyk 306: HTTRACE(CORE_TRACE, "Host info... Collecting host info %p\n" _ pres);
2.1 frystyk 307: delete_object(list, pres);
308: pres = NULL;
309: }
310: break;
311: }
312: }
313: }
314:
2.8 frystyk 315: /* If not found then create new Host object, else use existing one */
2.1 frystyk 316: if (pres) {
317: if (pres->channel) {
2.32 frystyk 318:
319: /*
320: ** If we have a TTL for this TCP connection then
321: ** check that we haven't passed it.
322: */
323: if (pres->expires > 0) {
324: time_t t = time(NULL);
2.51 frystyk 325: if (HTHost_isIdle(pres) && pres->expires < t) {
2.59 frystyk 326: HTTRACE(CORE_TRACE, "Host info... Persistent channel %p gotten cold\n" _
2.32 frystyk 327: pres->channel);
2.48 frystyk 328: HTHost_clearChannel(pres, HT_OK);
2.32 frystyk 329: } else {
2.53 frystyk 330: pres->expires = t + HTPassiveTimeout;
2.59 frystyk 331: HTTRACE(CORE_TRACE, "Host info... REUSING CHANNEL %p\n" _ pres->channel);
2.32 frystyk 332: }
333: }
2.55 frystyk 334: } else {
2.59 frystyk 335: HTTRACE(CORE_TRACE, "Host info... Found Host %p with no active channel\n" _ pres);
2.1 frystyk 336: }
337: } else {
338: if ((pres = (HTHost *) HT_CALLOC(1, sizeof(HTHost))) == NULL)
339: HT_OUTOFMEM("HTHost_add");
2.13 frystyk 340: pres->hash = hash;
2.1 frystyk 341: StrAllocCopy(pres->hostname, host);
2.15 eric 342: pres->u_port = u_port;
2.1 frystyk 343: pres->ntime = time(NULL);
2.8 frystyk 344: pres->mode = HT_TP_SINGLE;
2.26 frystyk 345: pres->delay = WriteDelay;
2.71 ! kahan 346: pres->inFlush = NO;
2.18 eric 347: {
2.26 frystyk 348: int i;
349: for (i = 0; i < HTEvent_TYPES; i++)
350: pres->events[i]= HTEvent_new(HostEvent, pres, HT_PRIORITY_MAX, EventTimeout);
2.18 eric 351: }
2.59 frystyk 352: HTTRACE(CORE_TRACE, "Host info... added `%s\' with host %p to list %p\n" _
353: host _ pres _ list);
2.1 frystyk 354: HTList_addObject(list, (void *) pres);
355: }
356: return pres;
2.9 frystyk 357: }
358:
2.15 eric 359: PUBLIC HTHost * HTHost_newWParse (HTRequest * request, char * url, u_short u_port)
2.13 frystyk 360: {
2.32 frystyk 361: char * port;
362: char * fullhost = NULL;
363: char * parsedHost = NULL;
364: SockA * sin;
365: HTHost * me;
366: char * proxy = HTRequest_proxy(request);
2.13 frystyk 367:
2.32 frystyk 368: fullhost = HTParse(proxy ? proxy : url, "", PARSE_HOST);
2.13 frystyk 369:
2.66 frystyk 370: /* If there's an @ then use the stuff after it as a hostname */
2.32 frystyk 371: if (fullhost) {
372: char * at_sign;
373: if ((at_sign = strchr(fullhost, '@')) != NULL)
374: parsedHost = at_sign+1;
375: else
376: parsedHost = fullhost;
377: }
378: if (!parsedHost || !*parsedHost) {
379: HTRequest_addError(request, ERR_FATAL, NO, HTERR_NO_HOST,
2.52 frystyk 380: NULL, 0, "HTHost_newWParse");
2.32 frystyk 381: HT_FREE(fullhost);
382: return NULL;
383: }
2.55 frystyk 384:
385: /* See if the default port should be overridden */
386: if ((port = strchr(parsedHost, ':')) != NULL) {
2.32 frystyk 387: *port++ = '\0';
2.55 frystyk 388: if (*port && isdigit((int) *port)) u_port = (u_short) atol(port);
2.32 frystyk 389: }
2.59 frystyk 390: HTTRACE(PROT_TRACE, "HTHost parse Looking up `%s\' on port %u\n" _ parsedHost _ u_port);
2.55 frystyk 391:
2.32 frystyk 392: /* Find information about this host */
393: if ((me = HTHost_new(parsedHost, u_port)) == NULL) {
2.59 frystyk 394: HTTRACE(PROT_TRACE, "HTHost parse Can't get host info\n");
2.32 frystyk 395: me->tcpstate = TCP_ERROR;
396: return NULL;
397: }
398: sin = &me->sock_addr;
399: memset((void *) sin, '\0', sizeof(SockA));
2.13 frystyk 400: #ifdef DECNET
2.32 frystyk 401: sin->sdn_family = AF_DECnet;
402: net->sock_addr.sdn_objnum = port ? (unsigned char)(strtol(port, (char **) 0, 10)) : DNP_OBJ;
2.13 frystyk 403: #else /* Internet */
2.32 frystyk 404: sin->sin_family = AF_INET;
405: sin->sin_port = htons(u_port);
2.13 frystyk 406: #endif
2.32 frystyk 407: HT_FREE(fullhost); /* parsedHost points into fullhost */
408: return me;
2.13 frystyk 409: }
410:
2.9 frystyk 411: /*
412: ** Search the host info cache for a host object. Examples of host names:
413: **
414: ** www.w3.org
415: ** www.foo.com:8000
416: ** 18.52.0.18
417: **
418: ** Returns Host object or NULL if not found.
419: */
420: PUBLIC HTHost * HTHost_find (char * host)
421: {
422: HTList * list = NULL; /* Current list in cache */
423: HTHost * pres = NULL;
2.59 frystyk 424: HTTRACE(CORE_TRACE, "Host info... Looking for `%s\'\n" _ host ? host : "<null>");
2.9 frystyk 425:
426: /* Find a hash for this host */
427: if (host && HostTable) {
428: int hash = 0;
429: char *ptr;
430: for (ptr=host; *ptr; ptr++)
2.13 frystyk 431: hash = (int) ((hash * 3 + (*(unsigned char *) ptr)) % HOST_HASH_SIZE);
2.9 frystyk 432: if (!HostTable[hash]) return NULL;
433: list = HostTable[hash];
434:
435: /* Search the cache */
436: {
437: HTList * cur = list;
438: while ((pres = (HTHost *) HTList_nextObject(cur))) {
439: if (!strcmp(pres->hostname, host)) {
440: if (time(NULL) > pres->ntime + HostTimeout) {
2.59 frystyk 441: HTTRACE(CORE_TRACE, "Host info... Collecting host %p\n" _ pres);
2.9 frystyk 442: delete_object(list, pres);
443: pres = NULL;
444: } else {
2.59 frystyk 445: HTTRACE(CORE_TRACE, "Host info... Found `%s\'\n" _ host);
2.9 frystyk 446: }
447: return pres;
448: }
449: }
450: }
451: }
452: return NULL;
2.1 frystyk 453: }
454:
455: /*
2.62 frystyk 456: ** Cleanup the host list
457: */
458: PUBLIC void HTHost_deleteAll (void)
459: {
460: HTList * list;
461: HTHost * host;
462: int i;
463:
464: if (!HostTable)
465: return;
466:
467: for (i=0; i < HOST_HASH_SIZE; i++) {
468: list = HostTable[i];
469: if (!list) continue;
470:
471: while ((host = (HTHost *) HTList_removeFirstObject(list)) != NULL)
472: free_object(host);
473:
474: HTList_delete(list);
475: }
476:
477: HT_FREE(HostTable);
478: HostTable = NULL;
479: }
480:
481: /*
2.8 frystyk 482: ** Get and set the hostname of the remote host
483: */
484: PUBLIC char * HTHost_name (HTHost * host)
485: {
486: return host ? host->hostname : NULL;
487: }
488:
489: /*
2.1 frystyk 490: ** Get and set the type class of the remote host
491: */
492: PUBLIC char * HTHost_class (HTHost * host)
493: {
494: return host ? host->type : NULL;
495: }
496:
497: PUBLIC void HTHost_setClass (HTHost * host, char * s_class)
498: {
499: if (host && s_class) StrAllocCopy(host->type, s_class);
500: }
501:
502: /*
503: ** Get and set the version of the remote host
504: */
505: PUBLIC int HTHost_version (HTHost *host)
506: {
507: return host ? host->version : 0;
508: }
509:
510: PUBLIC void HTHost_setVersion (HTHost * host, int version)
511: {
512: if (host) host->version = version;
513: }
514:
515: /*
2.53 frystyk 516: ** Get and set the passive timeout for persistent entries.
2.1 frystyk 517: */
2.53 frystyk 518: PUBLIC BOOL HTHost_setPersistTimeout (time_t timeout)
2.1 frystyk 519: {
2.53 frystyk 520: if (timeout > 0) {
521: HTPassiveTimeout = timeout;
522: return YES;
523: }
524: return NO;
525: }
526:
527: PUBLIC time_t HTHost_persistTimeout (void)
528: {
529: return HTPassiveTimeout;
530: }
531:
532: /*
533: ** Get and set the active timeout for persistent entries.
534: */
535: PUBLIC BOOL HTHost_setActiveTimeout (ms_t timeout)
536: {
537: if (timeout > 1000) {
538: HTActiveTimeout = timeout;
539: return YES;
540: }
541: return NO;
2.1 frystyk 542: }
543:
2.53 frystyk 544: PUBLIC ms_t HTHost_activeTimeout (void)
2.1 frystyk 545: {
2.53 frystyk 546: return HTActiveTimeout;
2.1 frystyk 547: }
548:
549: /* Persistent Connection Expiration
550: ** --------------------------------
551: ** Should normally not be used. If, then use calendar time.
552: */
553: PUBLIC void HTHost_setPersistExpires (HTHost * host, time_t expires)
554: {
555: if (host) host->expires = expires;
556: }
557:
558: PUBLIC time_t HTHost_persistExpires (HTHost * host)
559: {
560: return host ? host->expires : -1;
561: }
562:
2.22 eric 563: PUBLIC void HTHost_setReqsPerConnection (HTHost * host, int reqs)
564: {
565: if (host) host->reqsPerConnection = reqs;
566: }
567:
568: PUBLIC int HTHost_reqsPerConnection (HTHost * host)
569: {
570: return host ? host->reqsPerConnection : -1;
571: }
572:
573: PUBLIC void HTHost_setReqsMade (HTHost * host, int reqs)
574: {
575: if (host) host->reqsMade = reqs;
576: }
577:
578: PUBLIC int HTHost_reqsMade (HTHost * host)
579: {
580: return host ? host->reqsMade : -1;
581: }
582:
2.1 frystyk 583: /*
2.6 frystyk 584: ** Public methods for this host
585: */
586: PUBLIC HTMethod HTHost_publicMethods (HTHost * me)
587: {
588: return me ? me->methods : METHOD_INVALID;
589: }
590:
591: PUBLIC void HTHost_setPublicMethods (HTHost * me, HTMethod methodset)
592: {
593: if (me) me->methods = methodset;
594: }
595:
596: PUBLIC void HTHost_appendPublicMethods (HTHost * me, HTMethod methodset)
597: {
598: if (me) me->methods |= methodset;
599: }
600:
601: /*
602: ** Get and set the server name of the remote host
603: */
604: PUBLIC char * HTHost_server (HTHost * host)
605: {
606: return host ? host->server : NULL;
607: }
608:
609: PUBLIC BOOL HTHost_setServer (HTHost * host, const char * server)
610: {
611: if (host && server) {
612: StrAllocCopy(host->server, server);
613: return YES;
614: }
615: return NO;
616: }
617:
618: /*
619: ** Get and set the userAgent name of the remote host
620: */
621: PUBLIC char * HTHost_userAgent (HTHost * host)
622: {
623: return host ? host->user_agent : NULL;
624: }
625:
626: PUBLIC BOOL HTHost_setUserAgent (HTHost * host, const char * userAgent)
627: {
628: if (host && userAgent) {
629: StrAllocCopy(host->user_agent, userAgent);
630: return YES;
2.12 frystyk 631: }
632: return NO;
633: }
634:
635: /*
636: ** Get and set acceptable range units
637: */
638: PUBLIC char * HTHost_rangeUnits (HTHost * host)
639: {
640: return host ? host->range_units : NULL;
641: }
642:
643: PUBLIC BOOL HTHost_setRangeUnits (HTHost * host, const char * units)
644: {
645: if (host && units) {
646: StrAllocCopy(host->range_units, units);
647: return YES;
648: }
649: return NO;
650: }
651:
652: /*
653: ** Checks whether a specific range unit is OK. We always say
654: ** YES except if we have a specific statement from the server that
655: ** it doesn't understand byte ranges - that is - it has sent "none"
656: ** in a "Accept-Range" response header
657: */
658: PUBLIC BOOL HTHost_isRangeUnitAcceptable (HTHost * host, const char * unit)
659: {
660: if (host && unit) {
661: #if 0
662: if (host->range_units) {
2.63 frystyk 663: char * start = HTStrCaseStr(host->range_units, "none");
2.12 frystyk 664:
665: /*
666: ** Check that "none" is infact a token. It could be part of some
667: ** other valid string, so we'd better check for it.
668: */
669: if (start) {
670:
671:
672: }
673: return NO;
674: }
675: #endif
676: return strcasecomp(unit, "bytes") ? NO : YES;
2.6 frystyk 677: }
678: return NO;
679: }
680:
2.1 frystyk 681: /*
682: ** As soon as we know that this host accepts persistent connections,
683: ** we associated the channel with the host.
684: ** We don't want more than MaxSockets-2 connections to be persistent in
685: ** order to avoid deadlock.
686: */
2.13 frystyk 687: PUBLIC BOOL HTHost_setPersistent (HTHost * host,
688: BOOL persistent,
689: HTTransportMode mode)
2.1 frystyk 690: {
2.13 frystyk 691: if (!host) return NO;
692:
693: if (!persistent) {
694: /*
695: ** We use the HT_IGNORE status code as we don't want to free
696: ** the stream at this point in time. The situation we want to
697: ** avoid is that we free the channel from within the stream pipe.
698: ** This will lead to an infinite look having the stream freing
699: ** itself.
700: */
2.30 frystyk 701: host->persistent = NO;
2.13 frystyk 702: return HTHost_clearChannel(host, HT_IGNORE);
703: }
704:
2.18 eric 705: /*
706: ** Set the host persistent if not already. Also update the mode to
707: ** the new one - it may have changed
708: */
709: HTHost_setMode(host, mode);
710: if (!host->persistent) {
2.13 frystyk 711: SOCKET sockfd = HTChannel_socket(host->channel);
2.8 frystyk 712: if (sockfd != INVSOC && HTNet_availablePersistentSockets() > 0) {
2.13 frystyk 713: host->persistent = YES;
2.53 frystyk 714: host->expires = time(NULL) + HTPassiveTimeout; /* Default timeout */
2.13 frystyk 715: HTChannel_setHost(host->channel, host);
2.8 frystyk 716: HTNet_increasePersistentSocket();
2.59 frystyk 717: HTTRACE(CORE_TRACE, "Host info... added host %p as persistent\n" _ host);
2.1 frystyk 718: return YES;
719: } else {
2.59 frystyk 720: HTTRACE(CORE_TRACE, "Host info... no room for persistent socket %d\n" _
2.7 frystyk 721: sockfd);
2.18 eric 722: return NO;
2.1 frystyk 723: }
2.18 eric 724: } else {
2.59 frystyk 725: HTTRACE(CORE_TRACE, "Host info... %p already persistent\n" _ host);
2.18 eric 726: return YES;
2.1 frystyk 727: }
728: return NO;
729: }
730:
731: /*
2.13 frystyk 732: ** Check whether we have a persistent channel or not
733: */
734: PUBLIC BOOL HTHost_isPersistent (HTHost * host)
735: {
736: return host && host->persistent;
737: }
738:
739: /*
2.1 frystyk 740: ** Find persistent channel associated with this host.
741: */
742: PUBLIC HTChannel * HTHost_channel (HTHost * host)
743: {
744: return host ? host->channel : NULL;
745: }
746:
2.30 frystyk 747:
2.1 frystyk 748: /*
2.30 frystyk 749: ** Check whether we have got a "close" notification, for example in the
750: ** connection header
751: */
752: PUBLIC BOOL HTHost_setCloseNotification (HTHost * host, BOOL mode)
753: {
754: if (host) {
755: host->close_notification = mode;
2.37 frystyk 756: return YES;
2.30 frystyk 757: }
758: return NO;
759: }
760:
761: PUBLIC BOOL HTHost_closeNotification (HTHost * host)
762: {
763: return host && host->close_notification;
764: }
765:
766: /*
2.1 frystyk 767: ** Clear the persistent entry by deleting the channel object. Note that
768: ** the channel object is only deleted if it's not used anymore.
769: */
2.8 frystyk 770: PUBLIC BOOL HTHost_clearChannel (HTHost * host, int status)
2.1 frystyk 771: {
772: if (host && host->channel) {
2.8 frystyk 773: HTChannel_setHost(host->channel, NULL);
2.10 frystyk 774:
2.13 frystyk 775: HTEvent_unregister(HTChannel_socket(host->channel), HTEvent_READ);
776: HTEvent_unregister(HTChannel_socket(host->channel), HTEvent_WRITE);
2.18 eric 777: host->registeredFor = 0;
2.13 frystyk 778:
2.10 frystyk 779: /*
780: ** We don't want to recursively delete ourselves so if we are
781: ** called from within the stream pipe then don't delete the channel
782: ** at this point
783: */
2.8 frystyk 784: HTChannel_delete(host->channel, status);
2.18 eric 785: host->expires = 0;
2.1 frystyk 786: host->channel = NULL;
2.22 eric 787: host->tcpstate = TCP_BEGIN;
788: host->reqsMade = 0;
2.32 frystyk 789: if (HTHost_isPersistent(host)) {
790: HTNet_decreasePersistentSocket();
791: host->persistent = NO;
792: }
793: host->close_notification = NO;
2.45 frystyk 794: host->broken_pipe = NO;
2.32 frystyk 795: host->mode = HT_TP_SINGLE;
2.67 raff 796:
797: host->recovered = 0;
2.32 frystyk 798:
2.59 frystyk 799: HTTRACE(CORE_TRACE, "Host info... removed host %p as persistent\n" _ host);
2.32 frystyk 800:
801: if (!HTList_isEmpty(host->pending)) {
2.59 frystyk 802: HTTRACE(CORE_TRACE, "Host has %d object(s) pending - attempting launch\n" _ HTList_count(host->pending));
2.32 frystyk 803: HTHost_launchPending(host);
804: }
2.1 frystyk 805: return YES;
806: }
807: return NO;
808: }
809:
2.37 frystyk 810: PUBLIC BOOL HTHost_doRecover (HTHost * host)
811: {
812: return host ? host->do_recover : NO;
813: }
814:
2.1 frystyk 815: /*
2.18 eric 816: ** Move all entries in the pipeline and move the rest to the pending
817: ** queue. They will get launched at a later point in time.
818: */
819: PUBLIC BOOL HTHost_recoverPipe (HTHost * host)
820: {
821: if (host) {
822: int piped = HTList_count(host->pipeline);
2.64 frystyk 823:
824: /*
825: ** First check that we haven't already recovered more than we want
826: */
827: if (host->recovered > MAX_HOST_RECOVER) {
828: HTTRACE(CORE_TRACE, "Host recover %p already %d times - not doing it anymore\n" _ host _ host->recovered);
829: return NO;
830: }
831:
832: /*
833: ** If we decided to recover and actually have something in the pipe
834: ** then go ahead.
835: */
2.18 eric 836: if (piped > 0) {
837: int cnt;
2.24 frystyk 838: host->recovered++;
2.64 frystyk 839: HTTRACE(CORE_TRACE, "Host recover %p recovered %d times. Moving %d Net objects from pipe line to pending queue\n" _ host _ host->recovered _ piped);
2.18 eric 840:
841: /*
842: ** Unregister this host for all events
843: */
844: HTEvent_unregister(HTChannel_socket(host->channel), HTEvent_READ);
845: HTEvent_unregister(HTChannel_socket(host->channel), HTEvent_WRITE);
846: host->registeredFor = 0;
847:
848: /*
849: ** Set new mode to single until we know what is going on
850: */
851: host->mode = HT_TP_SINGLE;
852:
853: /*
854: ** Move all net objects from the net object to the pending queue.
855: */
856: if (!host->pending) host->pending = HTList_new();
857: for (cnt=0; cnt<piped; cnt++) {
858: HTNet * net = HTList_removeLastObject(host->pipeline);
2.59 frystyk 859: HTTRACE(CORE_TRACE, "Host recover Resetting net object %p\n" _ net);
2.18 eric 860: net->registeredFor = 0;
861: (*net->event.cbf)(HTChannel_socket(host->channel), net->event.param, HTEvent_RESET);
862: HTList_appendObject(host->pending, net);
2.57 frystyk 863: host->lock = net;
2.18 eric 864: }
2.37 frystyk 865:
2.18 eric 866: HTChannel_setSemaphore(host->channel, 0);
867: HTHost_clearChannel(host, HT_INTERRUPTED);
2.37 frystyk 868: host->do_recover = NO;
2.18 eric 869: }
2.24 frystyk 870: return YES;
2.18 eric 871: }
872: return NO;
873: }
874:
875: /*
2.51 frystyk 876: ** Terminate a pipeline prematurely, for example because of timeout,
877: ** interruption, etc.
878: */
879: PUBLIC BOOL HTHost_killPipe (HTHost * host)
880: {
881: return killPipeline(host, HTEvent_CLOSE);
882: }
883:
884: /*
2.8 frystyk 885: ** Handle the connection mode. The mode may change mode in the
886: ** middle of a connection.
887: */
888: PUBLIC HTTransportMode HTHost_mode (HTHost * host, BOOL * active)
889: {
890: return host ? host->mode : HT_TP_SINGLE;
891: }
892:
893: /*
894: ** If the new mode is lower than the old mode then adjust the pipeline
895: ** accordingly. That is, if we are going into single mode then move
896: ** all entries in the pipeline and move the rest to the pending
897: ** queue. They will get launched at a later point in time.
898: */
899: PUBLIC BOOL HTHost_setMode (HTHost * host, HTTransportMode mode)
900: {
901: if (host) {
902: /*
903: ** Check the new mode and see if we must adjust the queues.
904: */
905: if (mode == HT_TP_SINGLE && host->mode > mode) {
906: int piped = HTList_count(host->pipeline);
907: if (piped > 0) {
908: int cnt;
2.59 frystyk 909: HTTRACE(CORE_TRACE, "Host info... Moving %d Net objects from pipe line to pending queue\n" _ piped);
2.8 frystyk 910: if (!host->pending) host->pending = HTList_new();
911: for (cnt=0; cnt<piped; cnt++) {
2.18 eric 912: HTNet * net = HTList_removeLastObject(host->pipeline);
2.59 frystyk 913: HTTRACE(CORE_TRACE, "Host info... Resetting net object %p\n" _ net);
2.13 frystyk 914: (*net->event.cbf)(HTChannel_socket(host->channel), net->event.param, HTEvent_RESET);
2.8 frystyk 915: HTList_appendObject(host->pending, net);
916: }
2.18 eric 917: HTChannel_setSemaphore(host->channel, 0);
918: HTHost_clearChannel(host, HT_INTERRUPTED);
2.8 frystyk 919: }
2.24 frystyk 920: }
921:
922: /*
923: ** If we know that this host is bad then we don't allow anything than
924: ** single mode. We can't recover connections for the rest of our life
925: */
926: if (mode == HT_TP_PIPELINE && host->recovered > MAX_HOST_RECOVER) {
2.59 frystyk 927: HTTRACE(PROT_TRACE, "Host info... %p is bad for pipelining so we won't do it!!!\n" _
2.24 frystyk 928: host);
929: } else {
930: host->mode = mode;
2.59 frystyk 931: HTTRACE(PROT_TRACE, "Host info... New mode is %d for host %p\n" _ host->mode _ host);
2.24 frystyk 932: }
2.8 frystyk 933: }
934: return NO;
935: }
936:
937: /*
938: ** Check whether a host is idle meaning if it is ready for a new
939: ** request which depends on the mode of the host. If the host is
940: ** idle, i.e. ready for use then return YES else NO. If the host supports
941: ** persistent connections then still only return idle if no requests are
942: ** ongoing.
943: */
944: PUBLIC BOOL HTHost_isIdle (HTHost * host)
945: {
2.32 frystyk 946: return (host && HTList_isEmpty(host->pipeline));
2.8 frystyk 947: }
948:
2.13 frystyk 949: PRIVATE BOOL _roomInPipe (HTHost * host)
950: {
951: int count;
2.34 frystyk 952: if (!host ||
953: (host->reqsPerConnection && host->reqsMade >= host->reqsPerConnection) ||
2.45 frystyk 954: HTHost_closeNotification(host) || host->broken_pipe)
2.32 frystyk 955: return NO;
2.13 frystyk 956: count = HTList_count(host->pipeline);
957: switch (host->mode) {
958: case HT_TP_SINGLE:
959: return count <= 0;
960: case HT_TP_PIPELINE:
2.51 frystyk 961: return (host->recovered < MAX_HOST_RECOVER) ?
962: (count < MaxPipelinedRequests) : (count <= 0);
2.13 frystyk 963: case HT_TP_INTERLEAVE:
964: return YES;
965: }
966: return NO;
967: }
968:
2.8 frystyk 969: /*
970: ** Add a net object to the host object. If the host
971: ** is idle then add to active list (pipeline) else add
972: ** it to the pending list
973: ** Return HT_PENDING if we must pend, HT_OK, or HT_ERROR
974: */
975: PUBLIC int HTHost_addNet (HTHost * host, HTNet * net)
976: {
977: if (host && net) {
978: int status = HT_OK;
2.32 frystyk 979: BOOL doit = (host->doit==net);
2.8 frystyk 980:
2.18 eric 981: /*
982: ** If we don't have a socket already then check to see if we can get
983: ** one. Otherwise we put the host object into our pending queue.
2.52 frystyk 984: */
2.18 eric 985: if (!host->channel && HTNet_availableSockets() <= 0) {
2.56 frystyk 986:
987: /* Create list for pending Host objects */
2.8 frystyk 988: if (!PendHost) PendHost = HTList_new();
2.56 frystyk 989:
990: /* Add the host object ad pending if not already */
991: if (HTList_indexOf(PendHost, host) < 0) HTList_addObject(PendHost, host);
992:
993: /*
994: ** Add the Net object to the Host object. If it is the current Net
995: ** obejct holding the lock then add it to the beginning of the list.
996: ** Otherwise add it to the end
997: */
2.52 frystyk 998: if (!host->pending) host->pending = HTList_new();
2.56 frystyk 999: if (host->lock == net)
1000: HTList_appendObject(host->pending, net);
1001: else
1002: HTList_addObject(host->pending, net);
1003:
2.59 frystyk 1004: HTTRACE(CORE_TRACE, "Host info... Added Net %p (request %p) as pending on pending Host %p, %d requests made, %d requests in pipe, %d pending\n" _
1005: net _ net->request _ host _ host->reqsMade _
1006: HTList_count(host->pipeline) _ HTList_count(host->pending));
2.52 frystyk 1007: return HT_PENDING;
2.8 frystyk 1008: }
1009:
2.45 frystyk 1010: #if 0
2.18 eric 1011: /*
2.45 frystyk 1012: ** First check whether the net object is already on either queue.
1013: ** Do NOT add extra copies of the HTNet object to
1014: ** the pipeline or pending list (if it's already on the list).
1015: */
1016: if (HTList_indexOf(host->pipeline, net) >= 0) {
2.59 frystyk 1017: HTTRACE(CORE_TRACE, "Host info... The Net %p (request %p) is already in pipe,"
1018: " %d requests made, %d requests in pipe, %d pending\n" _
1019: net _ net->request _ host->reqsMade _
1020: HTList_count(host->pipeline) _
2.45 frystyk 1021: HTList_count(host->pending));
2.59 frystyk 1022: HTDEBUGBREAK("Net object %p registered multiple times in pipeline\n" _
2.45 frystyk 1023: net);
1024: return HT_OK;
1025: }
2.44 frystyk 1026:
2.45 frystyk 1027: if (HTList_indexOf(host->pending, net) >= 0) {
2.59 frystyk 1028: HTTRACE(CORE_TRACE, "Host info... The Net %p (request %p) already pending,"
1029: " %d requests made, %d requests in pipe, %d pending\n" _
1030: net _ net->request _ host->reqsMade _
1031: HTList_count(host->pipeline) _
2.45 frystyk 1032: HTList_count(host->pending));
2.59 frystyk 1033: HTDEBUGBREAK("Net object %p registered multiple times in pending queue\n" _
2.45 frystyk 1034: net);
1035:
1036: return HT_PENDING;
1037: }
1038: #endif
2.44 frystyk 1039:
1040: /*
2.18 eric 1041: ** Add net object to either active or pending queue.
1042: */
2.44 frystyk 1043: if (_roomInPipe(host) && (HTList_isEmpty(host->pending) || doit)) {
2.32 frystyk 1044: if (doit) host->doit = NULL;
2.8 frystyk 1045: if (!host->pipeline) host->pipeline = HTList_new();
1046: HTList_addObject(host->pipeline, net);
2.32 frystyk 1047: host->reqsMade++;
2.59 frystyk 1048: HTTRACE(CORE_TRACE, "Host info... Added Net %p (request %p) to pipe on Host %p, %d requests made, %d requests in pipe, %d pending\n" _
1049: net _ net->request _ host _ host->reqsMade _
1050: HTList_count(host->pipeline) _ HTList_count(host->pending));
2.18 eric 1051:
2.13 frystyk 1052: /*
2.30 frystyk 1053: ** If we have been idle then make sure we delete the timer
2.13 frystyk 1054: */
2.30 frystyk 1055: if (host->timer) {
1056: HTTimer_delete(host->timer);
1057: host->timer = NULL;
1058: }
2.40 kahan 1059:
1060: /*JK: New CBF function
1061: ** Call any user-defined callback to say the request will
1062: ** be processed.
1063: */
1064: HTHost_ActivateRequest (net);
2.30 frystyk 1065:
2.8 frystyk 1066: } else {
1067: if (!host->pending) host->pending = HTList_new();
2.44 frystyk 1068: HTList_addObject(host->pending, net);
2.59 frystyk 1069: HTTRACE(CORE_TRACE, "Host info... Added Net %p (request %p) as pending on Host %p, %d requests made, %d requests in pipe, %d pending\n" _
1070: net _ net->request _
1071: host _ host->reqsMade _
1072: HTList_count(host->pipeline) _ HTList_count(host->pending));
2.8 frystyk 1073: status = HT_PENDING;
1074: }
1075: return status;
1076: }
1077: return HT_ERROR;
1078: }
1079:
2.51 frystyk 1080: PRIVATE BOOL HTHost_free (HTHost * host, int status)
2.13 frystyk 1081: {
2.32 frystyk 1082: if (host->channel) {
2.13 frystyk 1083:
2.32 frystyk 1084: /* Check if we should keep the socket open */
1085: if (HTHost_isPersistent(host)) {
2.48 frystyk 1086: int piped = HTList_count(host->pipeline);
2.37 frystyk 1087: if (HTHost_closeNotification(host)) {
2.59 frystyk 1088: HTTRACE(CORE_TRACE, "Host Object. got close notifiation on socket %d\n" _
2.37 frystyk 1089: HTChannel_socket(host->channel));
1090:
1091: /*
1092: ** If more than a single element (this one) in the pipe
1093: ** then we have to recover gracefully
1094: */
1095: if (piped > 1) {
1096: host->reqsPerConnection = host->reqsMade - piped;
2.59 frystyk 1097: HTTRACE(CORE_TRACE, "%d requests made, %d in pipe, max %d requests pr connection\n" _
1098: host->reqsMade _ piped _ host->reqsPerConnection);
2.37 frystyk 1099: host->do_recover = YES;
2.70 kahan 1100: /* @@ JK: not clear yet if I need or not to set the channel to NULL. I think not */
1101: /* HTChannel_delete(host->channel, status); */
1102: if (HTChannel_delete(host->channel, status)) {
1103: HTTRACE(CORE_TRACE, "Host Event.. clearing channel on host %p (%s)\n" _ host _ host->hostname);
1104: host->channel = NULL;
1105: }
2.38 frystyk 1106: } else {
1107: HTChannel_setSemaphore(host->channel, 0);
1108: HTHost_clearChannel(host, status);
2.37 frystyk 1109: }
2.48 frystyk 1110: } else if (piped<=1 && host->reqsMade==host->reqsPerConnection) {
2.59 frystyk 1111: HTTRACE(CORE_TRACE, "Host Object. closing persistent socket %d\n" _
2.70 kahan 1112: HTChannel_socket(host->channel));
2.32 frystyk 1113:
1114: /*
1115: ** By lowering the semaphore we make sure that the channel
1116: ** is gonna be deleted
1117: */
1118: HTChannel_setSemaphore(host->channel, 0);
1119: HTHost_clearChannel(host, status);
1120:
1121: } else {
2.59 frystyk 1122: HTTRACE(CORE_TRACE, "Host Object. keeping persistent socket %d\n" _
2.70 kahan 1123: HTChannel_socket(host->channel));
2.62 frystyk 1124: if (HTChannel_delete(host->channel, status)) {
2.59 frystyk 1125: HTDEBUGBREAK("Host Event.. Channel unexpected deleted from host %p (%s)\n" _ host _ host->hostname);
2.62 frystyk 1126: host->channel = NULL;
1127: }
2.32 frystyk 1128: /*
1129: ** If connection is idle then set a timer so that we close the
1130: ** connection if idle too long
1131: */
2.48 frystyk 1132: if (piped<=1 && HTList_isEmpty(host->pending) && !host->timer) {
1133: host->timer = HTTimer_new(NULL, IdleTimeoutEvent,
2.53 frystyk 1134: host, HTActiveTimeout, YES, NO);
2.59 frystyk 1135: HTTRACE(PROT_TRACE, "Host........ Object %p going idle...\n" _ host);
2.32 frystyk 1136: }
1137: }
1138: return YES;
1139: } else {
2.59 frystyk 1140: HTTRACE(CORE_TRACE, "Host Object. closing socket %d\n" _ HTChannel_socket(host->channel));
2.47 frystyk 1141: HTChannel_setSemaphore(host->channel, 0);
2.41 frystyk 1142: HTHost_clearChannel(host, status);
2.32 frystyk 1143: }
2.13 frystyk 1144: }
2.32 frystyk 1145: return NO;
2.13 frystyk 1146: }
1147:
2.51 frystyk 1148: PUBLIC BOOL HTHost_deleteNet (HTHost * host, HTNet * net, int status)
2.8 frystyk 1149: {
1150: if (host && net) {
2.59 frystyk 1151: HTTRACE(CORE_TRACE, "Host info... Remove %p from pipe\n" _ net);
2.51 frystyk 1152:
1153: /* If the Net object is in the pipeline then also update the channel */
1154: if (host->pipeline && HTList_indexOf(host->pipeline, net) >= 0) {
1155: HTHost_free(host, status);
1156: HTList_removeObjectAll(host->pipeline, net);
1157: }
1158:
2.44 frystyk 1159: HTList_removeObjectAll(host->pending, net); /* just to make sure */
2.62 frystyk 1160: host->lock = HTList_firstObject(host->pending);
2.8 frystyk 1161: return YES;
1162: }
1163: return NO;
1164: }
1165:
1166: /*
1167: ** Handle pending host objects.
1168: ** There are two ways we can end up with pending reqyests:
1169: ** 1) If we are out of sockets then register new host objects as pending.
1170: ** 2) If we are pending on a connection then register new net objects as
1171: ** pending
1172: ** This set of functions handles pending host objects and can start new
1173: ** requests as resources get available
1174: */
1175:
1176: /*
1177: ** Check this host object for any pending requests and return the next
1178: ** registered Net object.
1179: */
1180: PUBLIC HTNet * HTHost_nextPendingNet (HTHost * host)
1181: {
1182: HTNet * net = NULL;
2.32 frystyk 1183: if (host && host->pending) {
2.18 eric 1184: /*JK 23/Sep/96 Bug correction. Associated the following lines to the
1185: **above if. There was a missing pair of brackets.
1186: */
1187: if ((net = (HTNet *) HTList_removeFirstObject(host->pending)) != NULL) {
2.59 frystyk 1188: HTTRACE(CORE_TRACE, "Host info... Popping %p from pending net queue on host %p\n" _
1189: net _ host);
2.33 frystyk 1190: #if 0
1191: {
1192: HTRequest * request = HTNet_request(net);
1193: char * uri = HTAnchor_address((HTAnchor *) HTRequest_anchor(request));
1194: fprintf(stderr, "Popping '%s'\n", uri);
1195: }
1196: #endif
2.32 frystyk 1197: host->doit = net;
2.18 eric 1198: }
2.8 frystyk 1199: }
1200: return net;
1201: }
1202:
1203: /*
2.13 frystyk 1204: ** Return the current list of pending host objects waiting for a socket
2.8 frystyk 1205: */
1206: PUBLIC HTHost * HTHost_nextPendingHost (void)
1207: {
1208: HTHost * host = NULL;
1209: if (PendHost) {
1210: if ((host = (HTHost *) HTList_removeFirstObject(PendHost)) != NULL)
2.59 frystyk 1211: HTTRACE(PROT_TRACE, "Host info... Popping %p from pending host queue\n" _
2.8 frystyk 1212: host);
1213: }
1214: return host;
1215: }
1216:
1217: /*
1218: ** Start the next pending request if any. First we look for pending
1219: ** requests for the same host and then we check for any other pending
1220: ** hosts
1221: */
1222: PUBLIC BOOL HTHost_launchPending (HTHost * host)
1223: {
2.52 frystyk 1224: HTNet * net = NULL;
2.8 frystyk 1225: if (!host) {
2.59 frystyk 1226: HTTRACE(PROT_TRACE, "Host info... Bad arguments\n");
2.8 frystyk 1227: return NO;
1228: }
1229:
1230: /*
2.52 frystyk 1231: ** In pipeline we can only have one doing writing at a time.
1232: ** We therefore check that there are no other Net object
1233: ** registered for write
2.8 frystyk 1234: */
2.52 frystyk 1235: if (host->mode == HT_TP_PIPELINE) {
1236: net = (HTNet *) HTList_lastObject(host->pipeline);
1237: if (net && net->registeredFor == HTEvent_WRITE)
1238: return NO;
1239: }
2.8 frystyk 1240:
2.52 frystyk 1241: /*
1242: ** Check the current Host object for pending Net objects
1243: */
1244: if (_roomInPipe(host) && DoPendingReqLaunch &&
1245: (net = HTHost_nextPendingNet(host))) {
1246: HTHost_ActivateRequest(net);
2.59 frystyk 1247: HTTRACE(CORE_TRACE, "Launch pending net object %p with %d reqs in pipe (%d reqs made)\n" _
1248: net _ HTList_count(host->pipeline) _ host->reqsMade);
2.52 frystyk 1249: return HTNet_execute(net, HTEvent_WRITE);
1250: }
2.13 frystyk 1251:
2.52 frystyk 1252: /*
1253: ** Check for other pending Host objects
1254: */
1255: if (DoPendingReqLaunch && HTNet_availableSockets() > 0) {
1256: HTHost * pending = HTHost_nextPendingHost();
1257: if (pending && (net = HTHost_nextPendingNet(pending))) {
1258: if (!pending->pipeline) pending->pipeline = HTList_new();
1259: HTList_addObject(pending->pipeline, net);
1260: host->reqsMade++;
2.59 frystyk 1261: HTTRACE(CORE_TRACE, "Launch pending host object %p, net %p with %d reqs in pipe (%d reqs made)\n" _
1262: pending _ net _ HTList_count(pending->pipeline) _ pending->reqsMade);
2.52 frystyk 1263: HTHost_ActivateRequest(net);
1264: return HTNet_execute(net, HTEvent_WRITE);
2.8 frystyk 1265: }
2.52 frystyk 1266: }
1267: return YES;
2.13 frystyk 1268: }
1269:
1270: PUBLIC HTNet * HTHost_firstNet (HTHost * host)
1271: {
1272: return (HTNet *) HTList_firstObject(host->pipeline);
2.60 frystyk 1273: }
1274:
1275: PUBLIC int HTHost_numberOfOutstandingNetObjects (HTHost * host)
1276: {
1277: return host ? HTList_count(host->pipeline) : -1;
1278: }
1279:
1280: PUBLIC int HTHost_numberOfPendingNetObjects (HTHost * host)
1281: {
1282: return host ? HTList_count(host->pending) : -1;
2.13 frystyk 1283: }
1284:
1285: /*
1286: ** The host event manager keeps track of the state of it's client engines
1287: ** (typically HTTPEvent), accepting multiple blocks on read or write from
1288: ** multiple pipelined engines. It then registers its own engine
1289: ** (HostEvent) with the event manager.
1290: */
2.66 frystyk 1291: PUBLIC int HTHost_connect (HTHost * host, HTNet * net, char * url)
2.13 frystyk 1292: {
2.42 frystyk 1293: HTRequest * request = HTNet_request(net);
2.52 frystyk 1294: int status = HT_OK;
2.42 frystyk 1295: if (!host) {
1296: HTProtocol * protocol = HTNet_protocol(net);
1297: if ((host = HTHost_newWParse(request, url, HTProtocol_id(protocol))) == NULL)
2.45 frystyk 1298: return HT_ERROR;
2.52 frystyk 1299:
1300: /*
1301: ** If not already locked and without a channel
2.55 frystyk 1302: ** then lock the darn thing with the first Net object
1303: ** pending.
2.52 frystyk 1304: */
1305: if (!host->lock && !host->channel) {
2.55 frystyk 1306: HTNet * next_pending = NULL;
2.42 frystyk 1307: host->forceWriteFlush = YES;
2.55 frystyk 1308: host->lock = (next_pending = HTList_firstObject(host->pending)) ?
1309: next_pending : net;
2.59 frystyk 1310: HTTRACE(CORE_TRACE, "Host connect Grabbing lock on Host %p with %p\n" _ host _ host->lock);
2.42 frystyk 1311: }
1312: HTNet_setHost(net, host);
1313: }
1314:
1315: if (!host->lock || (host->lock && host->lock == net)) {
2.66 frystyk 1316: status = HTDoConnect(net);
2.55 frystyk 1317: if (status == HT_PENDING)
1318: return HT_WOULD_BLOCK;
1319: else if (status == HT_WOULD_BLOCK) {
2.42 frystyk 1320: host->lock = net;
2.52 frystyk 1321: return status;
2.55 frystyk 1322: } else {
1323:
1324: /*
1325: ** See if there is already a new pending request that should
1326: ** take over the current lock
1327: */
1328: HTNet * next_pending = NULL;
1329: if ((next_pending = HTList_firstObject(host->pending))) {
2.59 frystyk 1330: HTTRACE(CORE_TRACE, "Host connect Changing lock on Host %p to %p\n" _
2.66 frystyk 1331: host _ next_pending);
2.55 frystyk 1332: host->lock = next_pending;
1333: } else {
2.59 frystyk 1334: HTTRACE(CORE_TRACE, "Host connect Unlocking Host %p\n" _ host);
2.55 frystyk 1335: host->lock = NULL;
1336: }
1337: return status;
2.42 frystyk 1338: }
1339: } else {
2.59 frystyk 1340: HTTRACE(CORE_TRACE, "Host connect Host %p already locked with %p\n" _ host _ host->lock);
2.42 frystyk 1341: if ((status = HTHost_addNet(host, net)) == HT_PENDING) {
1342: return HT_PENDING;
1343: }
2.54 frystyk 1344: }
1345: return HT_ERROR; /* @@@ - some more deletion and stuff here? */
1346: }
1347:
2.66 frystyk 1348: PUBLIC int HTHost_listen (HTHost * host, HTNet * net, char * url)
2.54 frystyk 1349: {
1350: HTRequest * request = HTNet_request(net);
1351: int status = HT_OK;
1352: if (!host) {
1353: HTProtocol * protocol = HTNet_protocol(net);
1354: if ((host = HTHost_newWParse(request, url, HTProtocol_id(protocol))) == NULL)
1355: return HT_ERROR;
1356:
1357: /*
1358: ** If not already locked and without a channel
2.66 frystyk 1359: ** then lock the darn thing with the first Net object
1360: ** pending.
2.54 frystyk 1361: */
1362: if (!host->lock && !host->channel) {
1363: host->forceWriteFlush = YES;
1364: host->lock = net;
1365: }
1366: HTNet_setHost(net, host);
1367: }
1368:
2.66 frystyk 1369: /*
1370: ** See if we already have a dedicated listen Net object. If not
1371: ** then create one.
1372: */
1373: if (!host->listening) host->listening = HTNet_new(host);
2.54 frystyk 1374:
2.66 frystyk 1375: /*
1376: ** Start listening on the Net object
1377: */
1378: status = HTDoListen(host->listening, net, HT_BACKLOG);
1379: if (status != HT_OK) {
1380: HTTRACE(CORE_TRACE, "Host listen. On Host %p resulted in %d\n" _ host _ status);
1381: return status;
1382: }
1383: return HT_OK;
1384: }
2.54 frystyk 1385:
2.66 frystyk 1386: PUBLIC int HTHost_accept (HTHost * host, HTNet * net, char * url)
1387: {
1388: int status = HT_OK;
1389: if (!host || !host->listening) {
1390: HTTRACE(CORE_TRACE, "Host accept. No host object or not listening on anything\n");
1391: return HT_ERROR;
1392: }
2.54 frystyk 1393:
2.66 frystyk 1394: if (!host->lock || (host->lock && host->lock == net)) {
1395: status = HTDoAccept(host->listening, net);
1396: if (status == HT_PENDING)
1397: return HT_WOULD_BLOCK;
1398: else if (status == HT_WOULD_BLOCK) {
2.54 frystyk 1399: host->lock = net;
1400: return status;
2.66 frystyk 1401: } else {
1402:
1403: /*
1404: ** See if there is already a new pending request that should
1405: ** take over the current lock
1406: */
1407: HTNet * next_pending = NULL;
1408: if ((next_pending = HTList_firstObject(host->pending))) {
1409: HTTRACE(CORE_TRACE, "Host connect Changing lock on Host %p to %p\n" _
1410: host _ next_pending);
1411: host->lock = next_pending;
1412: } else {
1413: HTTRACE(CORE_TRACE, "Host connect Unlocking Host %p\n" _ host);
1414: host->lock = NULL;
1415: }
1416: return status;
1417: }
1418: } else {
1419: HTTRACE(CORE_TRACE, "Host connect Host %p already locked with %p\n" _ host _ host->lock);
1420: if ((status = HTHost_addNet(host, net)) == HT_PENDING) {
1421: return HT_PENDING;
2.54 frystyk 1422: }
2.42 frystyk 1423: }
2.66 frystyk 1424: return HT_ERROR;
2.13 frystyk 1425: }
1426:
1427: /*
1428: ** Rules: SINGLE: one element in pipe, either reading or writing
1429: ** PIPE: n element in pipe, n-1 reading, 1 writing
1430: */
1431: PUBLIC int HTHost_register (HTHost * host, HTNet * net, HTEventType type)
1432: {
2.40 kahan 1433: HTEvent *event;
1434:
2.13 frystyk 1435: if (host && net) {
1436:
2.28 frystyk 1437: if (type == HTEvent_CLOSE) {
2.13 frystyk 1438:
2.28 frystyk 1439: /*
1440: ** Unregister this host for all events
1441: */
1442: HTEvent_unregister(HTChannel_socket(host->channel), HTEvent_READ);
1443: HTEvent_unregister(HTChannel_socket(host->channel), HTEvent_WRITE);
1444: host->registeredFor = 0;
2.13 frystyk 1445: return YES;
2.28 frystyk 1446:
1447: } else {
1448:
1449: /* net object may already be registered */
1450: if (HTEvent_BITS(type) & net->registeredFor)
1451: return NO;
1452: net->registeredFor ^= HTEvent_BITS(type);
1453:
1454: /* host object may already be registered */
1455: if (host->registeredFor & HTEvent_BITS(type))
1456: return YES;
1457: host->registeredFor ^= HTEvent_BITS(type);
2.46 frystyk 1458:
1459: #ifdef WWW_WIN_ASYNC
1460: /* Make sure we are registered for CLOSE on windows */
1461: event = *(host->events+HTEvent_INDEX(HTEvent_CLOSE));
1462: HTEvent_register(HTChannel_socket(host->channel), HTEvent_CLOSE, event);
1463: #endif /* WWW_WIN_ASYNC */
1464:
1465: /* JK: register a request in the event structure */
2.40 kahan 1466: event = *(host->events+HTEvent_INDEX(type));
1467: event->request = HTNet_request (net);
2.28 frystyk 1468: return HTEvent_register(HTChannel_socket(host->channel),
2.40 kahan 1469: type, event);
2.28 frystyk 1470: }
2.52 frystyk 1471:
1472: return YES;
2.13 frystyk 1473: }
2.65 frystyk 1474: HTTRACE(CORE_TRACE, "HTHost...... Don't register event with bad arguments\n");
2.13 frystyk 1475: return NO;
1476: }
1477:
1478: PUBLIC int HTHost_unregister (HTHost * host, HTNet * net, HTEventType type)
1479: {
1480: if (host && net) {
1481:
2.28 frystyk 1482: /* net object may not be registered */
2.13 frystyk 1483: if (!(HTEvent_BITS(type) & net->registeredFor))
1484: return NO;
1485: net->registeredFor ^= HTEvent_BITS(type);
1486:
2.28 frystyk 1487: /* host object may not be registered */
2.13 frystyk 1488: if (!(host->registeredFor & HTEvent_BITS(type)))
1489: return YES;
1490: host->registeredFor ^= HTEvent_BITS(type);
1491:
1492: /* stay registered for READ to catch a socket close */
1493: /* WRITE and CONNECT can be unregistered, though */
1494: if ((type == HTEvent_WRITE && isLastInPipe(host, net)) ||
1495: type == HTEvent_CONNECT)
1496: /* if we are blocked downstream, shut down the whole pipe */
1497: HTEvent_unregister(HTChannel_socket(host->channel), type);
1498: return YES;
1499: }
1500: return NO;
1501: }
1502:
1503: /*
1504: ** The reader tells HostEvent that it's stream did not finish the data
1505: */
1506: PUBLIC BOOL HTHost_setRemainingRead (HTHost * host, size_t remaining)
1507: {
1508: if (host == NULL) return NO;
1509: host->remainingRead = remaining;
2.59 frystyk 1510: HTTRACE(PROT_TRACE, "Host........ %d bytes remaining \n" _ remaining);
2.45 frystyk 1511: if (host->broken_pipe && remaining == 0) {
2.59 frystyk 1512: HTTRACE(PROT_TRACE, "Host........ Emtied out connection\n");
2.45 frystyk 1513: }
2.13 frystyk 1514: return YES;
1515: }
1516:
2.32 frystyk 1517: PUBLIC size_t HTHost_remainingRead (HTHost * host)
1518: {
1519: return host ? host->remainingRead : -1;
1520: }
1521:
2.13 frystyk 1522: PUBLIC SockA * HTHost_getSockAddr (HTHost * host)
1523: {
1524: if (!host) return NULL;
1525: return &host->sock_addr;
1526: }
1527:
1528: PUBLIC BOOL HTHost_setHome (HTHost * host, int home)
1529: {
1530: if (!host) return NO;
1531: host->home = home;
1532: return YES;
1533: }
1534:
1535: PUBLIC int HTHost_home (HTHost * host)
1536: {
1537: if (!host) return 0;
1538: return host->home;
1539: }
1540:
2.27 frystyk 1541: PUBLIC BOOL HTHost_setRetry (HTHost * host, int retry)
1542: {
1543: if (!host) return NO;
1544: host->retry = retry;
1545: return YES;
1546: }
1547:
1548: PUBLIC BOOL HTHost_decreaseRetry (HTHost * host)
1549: {
2.44 frystyk 1550: if (!host) return NO;
1551:
1552: if (host->retry > 0) host->retry--;
1553: return YES;
1554:
2.27 frystyk 1555: }
1556:
1557: PUBLIC int HTHost_retry (HTHost * host)
1558: {
1559: if (!host) return 0;
1560: return host->retry;
1561: }
1562:
2.13 frystyk 1563: #if 0 /* Is a macro right now */
2.21 frystyk 1564: PRIVATE BOOL HTHost_setDNS5 (HTHost * host, HTdns * dns)
2.13 frystyk 1565: {
1566: if (!host) return NO;
1567: host->dns = dns;
1568: return YES;
1569: }
1570: #endif
1571:
1572: PUBLIC BOOL HTHost_setChannel (HTHost * host, HTChannel * channel)
1573: {
1574: if (!host) return NO;
1575: host->channel = channel;
1576: return YES;
1577: }
1578:
1579: PUBLIC HTNet * HTHost_getReadNet(HTHost * host)
1580: {
2.38 frystyk 1581: return host ? (HTNet *) HTList_firstObject(host->pipeline) : NULL;
2.13 frystyk 1582: }
1583:
1584: PUBLIC HTNet * HTHost_getWriteNet(HTHost * host)
1585: {
1586: return host ? (HTNet *) HTList_lastObject(host->pipeline) : NULL;
1587: }
1588:
1589: /*
1590: ** Create the input stream and bind it to the channel
1591: ** Please read the description in the HTIOStream module for the parameters
1592: */
1593: PUBLIC HTInputStream * HTHost_getInput (HTHost * host, HTTransport * tp,
1594: void * param, int mode)
1595: {
1596: if (host && host->channel && tp) {
1597: HTChannel * ch = host->channel;
1598: HTInputStream * input = (*tp->input_new)(host, ch, param, mode);
1599: HTChannel_setInput(ch, input);
1600: return HTChannel_getChannelIStream(ch);
1601: }
2.59 frystyk 1602: HTTRACE(CORE_TRACE, "Host Object. Can't create input stream\n");
2.13 frystyk 1603: return NULL;
1604: }
1605:
1606: PUBLIC HTOutputStream * HTHost_getOutput (HTHost * host, HTTransport * tp,
1607: void * param, int mode)
1608: {
1609: if (host && host->channel && tp) {
1610: HTChannel * ch = host->channel;
1611: HTOutputStream * output = (*tp->output_new)(host, ch, param, mode);
1612: HTChannel_setOutput(ch, output);
1613: return output;
1614: }
2.59 frystyk 1615: HTTRACE(CORE_TRACE, "Host Object. Can't create output stream\n");
2.13 frystyk 1616: return NULL;
1617: }
1618:
1619: PUBLIC HTOutputStream * HTHost_output (HTHost * host, HTNet * net)
1620: {
1621: if (host && host->channel && net) {
1622: HTOutputStream * output = HTChannel_output(host->channel);
1623: return output;
1624: }
1625: return NULL;
1626: }
1627:
1628: PUBLIC int HTHost_read(HTHost * host, HTNet * net)
1629: {
1630: HTInputStream * input = HTChannel_input(host->channel);
1631: if (net != HTHost_getReadNet(host)) {
1632: HTHost_register(host, net, HTEvent_READ);
1633: return HT_WOULD_BLOCK;
1634: }
2.17 frystyk 1635:
1636: /*
1637: ** If there is no input channel then this can either mean that
1638: ** we have lost the channel or an error occurred. We return
1639: ** HT_CLOSED as this is a sign to the caller that we don't
1640: ** have a channel
1641: */
1642: return input ? (*input->isa->read)(input) : HT_CLOSED;
2.13 frystyk 1643: }
1644:
1645: PUBLIC BOOL HTHost_setConsumed(HTHost * host, size_t bytes)
1646: {
1647: HTInputStream * input;
1648: if (!host || !host->channel) return NO;
1649: if ((input = HTChannel_input(host->channel)) == NULL)
1650: return NO;
2.59 frystyk 1651: HTTRACE(CORE_TRACE, "Host........ passing %d bytes as consumed to %p\n" _ bytes _ input);
2.13 frystyk 1652: return (*input->isa->consumed)(input, bytes);
1653: }
1654:
1655: PUBLIC int HTHost_hash (HTHost * host)
1656: {
1657: return host ? host->hash : -1;
1658: }
1659:
2.26 frystyk 1660: PUBLIC BOOL HTHost_setWriteDelay (HTHost * host, ms_t delay)
2.13 frystyk 1661: {
2.26 frystyk 1662: if (host && delay >= 0) {
1663: host->delay = delay;
1664: return YES;
1665: }
1666: return NO;
1667: }
1668:
1669: PUBLIC ms_t HTHost_writeDelay (HTHost * host)
1670: {
1671: return host ? host->delay : 0;
1672: }
1673:
1674: PUBLIC int HTHost_findWriteDelay (HTHost * host, ms_t lastFlushTime, int buffSize)
1675: {
2.35 frystyk 1676: #if 0
2.15 eric 1677: unsigned short mtu;
2.18 eric 1678: int ret = -1;
2.15 eric 1679: int socket = HTChannel_socket(host->channel);
2.18 eric 1680: #ifndef WWW_MSWINDOWS
2.15 eric 1681: ret = ioctl(socket, 666, (unsigned long)&mtu);
2.18 eric 1682: #endif /* WWW_MSWINDOWS */
2.15 eric 1683: if ((ret == 0 && buffSize >= mtu) || host->forceWriteFlush)
2.13 frystyk 1684: return 0;
2.26 frystyk 1685: return host->delay;
2.35 frystyk 1686: #else
1687: return host->forceWriteFlush ? 0 : host->delay;
1688: #endif
2.13 frystyk 1689: }
1690:
2.26 frystyk 1691: PUBLIC BOOL HTHost_setDefaultWriteDelay (ms_t delay)
1692: {
1693: if (delay >= 0) {
1694: WriteDelay = delay;
2.59 frystyk 1695: HTTRACE(CORE_TRACE, "Host........ Default write delay is %d ms\n" _ delay);
2.26 frystyk 1696: return YES;
1697: }
1698: return NO;
1699: }
1700:
1701: PUBLIC ms_t HTHost_defaultWriteDelay (void)
1702: {
1703: return WriteDelay;
1704: }
1705:
2.13 frystyk 1706: PUBLIC int HTHost_forceFlush(HTHost * host)
1707: {
2.35 frystyk 1708: HTNet * targetNet = (HTNet *) HTList_lastObject(host->pipeline);
2.13 frystyk 1709: int ret;
2.35 frystyk 1710: if (targetNet == NULL) return HT_ERROR;
2.71 ! kahan 1711: /* JK: The following test was proposed by Heiner Kallweit, as there's a problem
! 1712: ** while using SSL because of a recursive call to this function. We tested the
! 1713: ** fix and it doesn't seem to introduce any side effects... but one never knows,
! 1714: ** thus this comment. This seems more like a bug in the SSL code than here.
! 1715: */
! 1716: if (host->inFlush) {
! 1717: HTTRACE(CORE_TRACE, "Host Event.. FLUSH requested for `%s\'\n, but ignoring it as we're already processing a flush in this host" _
! 1718: HTAnchor_physical(HTRequest_anchor(HTNet_request(targetNet))));
! 1719: return HT_OK;
! 1720: }
2.59 frystyk 1721: HTTRACE(CORE_TRACE, "Host Event.. FLUSH passed to `%s\'\n" _
2.28 frystyk 1722: HTAnchor_physical(HTRequest_anchor(HTNet_request(targetNet))));
2.13 frystyk 1723: host->forceWriteFlush = YES;
2.71 ! kahan 1724: host->inFlush = YES;
2.13 frystyk 1725: ret = (*targetNet->event.cbf)(HTChannel_socket(host->channel), targetNet->event.param, HTEvent_FLUSH);
2.35 frystyk 1726: host->forceWriteFlush = NO;
2.71 ! kahan 1727: host->inFlush = NO;
2.13 frystyk 1728: return ret;
2.39 frystyk 1729: }
1730:
1731: /*
1732: ** Context pointer to be used as a user defined context
1733: */
1734: PUBLIC void HTHost_setContext (HTHost * me, void * context)
1735: {
2.40 kahan 1736: if (me) me->context = context;
2.39 frystyk 1737: }
1738:
1739: PUBLIC void * HTHost_context (HTHost * me)
1740: {
2.40 kahan 1741: return me ? me->context : NULL;
2.1 frystyk 1742: }
2.11 kahan 1743:
2.13 frystyk 1744: PUBLIC int HTHost_eventTimeout (void)
1745: {
1746: return EventTimeout;
1747: }
2.11 kahan 1748:
2.13 frystyk 1749: PUBLIC void HTHost_setEventTimeout (int millis)
1750: {
1751: EventTimeout = millis;
2.59 frystyk 1752: HTTRACE(CORE_TRACE, "Host........ Setting event timeout to %d ms\n" _ millis);
2.13 frystyk 1753: }
2.40 kahan 1754:
2.45 frystyk 1755: PUBLIC BOOL HTHost_setMaxPipelinedRequests (int max)
1756: {
1757: if (max > 1) {
1758: MaxPipelinedRequests = max;
1759: return YES;
1760: }
1761: return NO;
1762: }
2.40 kahan 1763:
2.45 frystyk 1764: PUBLIC int HTHost_maxPipelinedRequests (void)
2.40 kahan 1765: {
2.45 frystyk 1766: return MaxPipelinedRequests;
1767: }
1768:
1769: PUBLIC void HTHost_setActivateRequestCallback (HTHost_ActivateRequestCallback * cbf)
1770: {
2.59 frystyk 1771: HTTRACE(CORE_TRACE, "HTHost...... Registering %p\n" _ cbf);
2.40 kahan 1772: ActivateReqCBF = cbf;
1773: }
1774:
2.45 frystyk 1775: PRIVATE int HTHost_ActivateRequest (HTNet * net)
2.40 kahan 1776: {
2.45 frystyk 1777: HTRequest * request = NULL;
1778: if (!ActivateReqCBF) {
2.59 frystyk 1779: HTTRACE(CORE_TRACE, "HTHost...... No ActivateRequest callback handler registered\n");
2.45 frystyk 1780: return HT_ERROR;
1781: }
1782: request = HTNet_request(net);
1783: return (*ActivateReqCBF)(request);
2.40 kahan 1784: }
1785:
1786: PUBLIC void HTHost_disable_PendingReqLaunch (void)
1787: {
2.45 frystyk 1788: DoPendingReqLaunch = NO;
2.40 kahan 1789: }
1790:
1791: PUBLIC void HTHost_enable_PendingReqLaunch (void)
1792: {
2.45 frystyk 1793: DoPendingReqLaunch = YES;
2.40 kahan 1794: }
1795:
Webmaster