K2LL33D SHELL

 Apache/2.4.7 (Ubuntu)
 Linux sman1baleendah 3.13.0-24-generic #46-Ubuntu SMP Thu Apr 10 19:11:08 UTC 2014 x86_64
 uid=33(www-data) gid=33(www-data) groups=33(www-data)
 safemode : OFF
 MySQL: ON | Perl: ON | cURL: OFF | WGet: ON
  >  / usr / lib / python2.7 / dist-packages / twisted / internet / iocpreactor / iocpsupport /
server ip : 104.21.89.46

your ip : 172.69.58.250

H O M E


Filename/usr/lib/python2.7/dist-packages/twisted/internet/iocpreactor/iocpsupport/iocpsupport.pyx
Size10.18 kb
Permissionrw-r--r--
Ownerroot : root
Create time27-Apr-2025 09:56
Last modified27-Mar-2012 20:27
Last accessed07-Jul-2025 20:56
Actionsedit | rename | delete | download (gzip)
Viewtext | code | image
# Copyright (c) Twisted Matrix Laboratories.
# See LICENSE for details.


# HANDLE and SOCKET are pointer-sized (they are 64 bit wide in 64-bit builds)
ctypedef size_t HANDLE
ctypedef size_t SOCKET
ctypedef unsigned long DWORD
# it's really a pointer, but we use it as an integer
ctypedef size_t ULONG_PTR
ctypedef int BOOL

cdef extern from 'io.h':
long _get_osfhandle(int filehandle)

cdef extern from 'errno.h':
int errno
enum:
EBADF

cdef extern from 'winsock2.h':
pass

cdef extern from 'ws2tcpip.h':
pass

cdef extern from 'windows.h':
ctypedef struct OVERLAPPED:
pass
HANDLE CreateIoCompletionPort(HANDLE fileHandle, HANDLE existing, ULONG_PTR key, DWORD numThreads)
BOOL GetQueuedCompletionStatus(HANDLE port, DWORD *bytes, ULONG_PTR *key, OVERLAPPED **ov, DWORD timeout)
BOOL PostQueuedCompletionStatus(HANDLE port, DWORD bytes, ULONG_PTR key, OVERLAPPED *ov)
DWORD GetLastError()
BOOL CloseHandle(HANDLE h)
enum:
INVALID_HANDLE_VALUE
void DebugBreak()

cdef extern from 'python.h':
struct PyObject:
pass
void *PyMem_Malloc(size_t n) except NULL
void PyMem_Free(void *p)
struct PyThreadState:
pass
PyThreadState *PyEval_SaveThread()
void PyEval_RestoreThread(PyThreadState *tstate)
void Py_INCREF(object o)
void Py_XINCREF(object o)
void Py_DECREF(object o)
void Py_XDECREF(object o)
int PyObject_AsWriteBuffer(object obj, void **buffer, Py_ssize_t *buffer_len) except -1
int PyObject_AsReadBuffer(object obj, void **buffer, Py_ssize_t *buffer_len) except -1
object PyString_FromString(char *v)
object PyString_FromStringAndSize(char *v, Py_ssize_t len)
object PyBuffer_New(Py_ssize_t size)
char *PyString_AsString(object obj) except NULL
object PySequence_Fast(object o, char *m)
# object PySequence_Fast_GET_ITEM(object o, Py_ssize_t i)
PyObject** PySequence_Fast_ITEMS(object o)
PyObject* PySequence_ITEM(PyObject *o, Py_ssize_t i)
Py_ssize_t PySequence_Fast_GET_SIZE(object o)

cdef extern from '':
struct sockaddr:
unsigned short int sa_family
char sa_data[0]
cdef struct in_addr:
unsigned long s_addr
struct sockaddr_in:
int sin_port
in_addr sin_addr
cdef struct in6_addr:
char s6_addr[16]
struct sockaddr_in6:
short int sin6_family
unsigned short int sin6_port
unsigned long int sin6_flowinfo
in6_addr sin6_addr
unsigned long int sin6_scope_id
int getsockopt(SOCKET s, int level, int optname, char *optval, int *optlen)
enum:
SOL_SOCKET
SO_PROTOCOL_INFO
SOCKET_ERROR
ERROR_IO_PENDING
AF_INET
AF_INET6
INADDR_ANY
ctypedef struct WSAPROTOCOL_INFO:
int iMaxSockAddr
int iAddressFamily
int WSAGetLastError()
char *inet_ntoa(in_addr ina)
unsigned long inet_addr(char *cp)
unsigned short ntohs(unsigned short netshort)
unsigned short htons(unsigned short hostshort)
ctypedef struct WSABUF:
long len
char *buf
# cdef struct TRANSMIT_FILE_BUFFERS:
# pass
int WSARecv(SOCKET s, WSABUF *buffs, DWORD buffcount, DWORD *bytes, DWORD *flags, OVERLAPPED *ov, void *crud)
int WSARecvFrom(SOCKET s, WSABUF *buffs, DWORD buffcount, DWORD *bytes, DWORD *flags, sockaddr *fromaddr, int *fromlen, OVERLAPPED *ov, void *crud)
int WSASend(SOCKET s, WSABUF *buffs, DWORD buffcount, DWORD *bytes, DWORD flags, OVERLAPPED *ov, void *crud)
int WSAAddressToStringA(sockaddr *lpsaAddress, DWORD dwAddressLength,
WSAPROTOCOL_INFO *lpProtocolInfo,
char *lpszAddressString,
DWORD *lpdwAddressStringLength)
int WSAStringToAddressA(char *AddressString, int AddressFamily,
WSAPROTOCOL_INFO *lpProtocolInfo,
sockaddr *lpAddress, int *lpAddressLength)

cdef extern from 'string.h':
void *memset(void *s, int c, size_t n)

cdef extern from 'winsock_pointers.h':
int initWinsockPointers()
BOOL (*lpAcceptEx)(SOCKET listening, SOCKET accepting, void *buffer, DWORD recvlen, DWORD locallen, DWORD remotelen, DWORD *bytes, OVERLAPPED *ov)
void (*lpGetAcceptExSockaddrs)(void *buffer, DWORD recvlen, DWORD locallen, DWORD remotelen, sockaddr **localaddr, int *locallen, sockaddr **remoteaddr, int *remotelen)
BOOL (*lpConnectEx)(SOCKET s, sockaddr *name, int namelen, void *buff, DWORD sendlen, DWORD *sentlen, OVERLAPPED *ov)
# BOOL (*lpTransmitFile)(SOCKET s, HANDLE hFile, DWORD size, DWORD buffer_size, OVERLAPPED *ov, TRANSMIT_FILE_BUFFERS *buff, DWORD flags)

cdef struct myOVERLAPPED:
OVERLAPPED ov
PyObject *obj

cdef myOVERLAPPED *makeOV() except NULL:
cdef myOVERLAPPED *res
res = <myOVERLAPPED *>PyMem_Malloc(sizeof(myOVERLAPPED))
if not res:
raise MemoryError
memset(res, 0, sizeof(myOVERLAPPED))
return res

cdef void raise_error(int err, object message) except *:
if not err:
err = GetLastError()
raise WindowsError(message, err)

class Event:
def __init__(self, callback, owner, **kw):
self.callback = callback
self.owner = owner
for k, v in kw.items():
setattr(self, k, v)

cdef class CompletionPort:
cdef HANDLE port
def __init__(self):
cdef HANDLE res
res = CreateIoCompletionPort(INVALID_HANDLE_VALUE, 0, 0, 0)
if not res:
raise_error(0, 'CreateIoCompletionPort')
self.port = res

def addHandle(self, HANDLE handle, size_t key=0):
cdef HANDLE res
res = CreateIoCompletionPort(handle, self.port, key, 0)
if not res:
raise_error(0, 'CreateIoCompletionPort')

def getEvent(self, long timeout):
cdef PyThreadState *_save
cdef unsigned long bytes, rc
cdef size_t key
cdef myOVERLAPPED *ov

_save = PyEval_SaveThread()
rc = GetQueuedCompletionStatus(self.port, &bytes, &key, <OVERLAPPED **>&ov, timeout)
PyEval_RestoreThread(_save)

if not rc:
rc = GetLastError()
else:
rc = 0

obj = None
if ov:
if ov.obj:
obj = <object>ov.obj
Py_DECREF(obj) # we are stealing a reference here
PyMem_Free(ov)

return (rc, bytes, key, obj)

def postEvent(self, unsigned long bytes, size_t key, obj):
cdef myOVERLAPPED *ov
cdef unsigned long rc

if obj is not None:
ov = makeOV()
Py_INCREF(obj) # give ov its own reference to obj
ov.obj = <PyObject *>obj
else:
ov = NULL

rc = PostQueuedCompletionStatus(self.port, bytes, key, <OVERLAPPED *>ov)
if not rc:
if ov:
Py_DECREF(obj)
PyMem_Free(ov)
raise_error(0, 'PostQueuedCompletionStatus')

def __del__(self):
CloseHandle(self.port)

def makesockaddr(object buff):
cdef void *mem_buffer
cdef Py_ssize_t size

PyObject_AsReadBuffer(buff, &mem_buffer, &size)
# XXX: this should really return the address family as well
return _makesockaddr(<sockaddr *>mem_buffer, size)

cdef object _makesockaddr(sockaddr *addr, Py_ssize_t len):
cdef sockaddr_in *sin
cdef sockaddr_in6 *sin6
cdef char buff[256]
cdef int rc
cdef DWORD buff_size = sizeof(buff)
if not len:
return None
if addr.sa_family == AF_INET:
sin = <sockaddr_in *>addr
return PyString_FromString(inet_ntoa(sin.sin_addr)), ntohs(sin.sin_port)
elif addr.sa_family == AF_INET6:
sin6 = <sockaddr_in6 *>addr
rc = WSAAddressToStringA(addr, sizeof(sockaddr_in6), NULL, buff, &buff_size)
if rc == SOCKET_ERROR:
raise_error(0, 'WSAAddressToString')
host, sa_port = PyString_FromString(buff), ntohs(sin6.sin6_port)
host, port = host.rsplit(':', 1)
port = int(port)
assert host[0] == '['
assert host[-1] == ']'
assert port == sa_port
return host[1:-1], port
else:
return PyString_FromStringAndSize(addr.sa_data, sizeof(addr.sa_data))


cdef object fillinetaddr(sockaddr_in *dest, object addr):
cdef unsigned short port
cdef unsigned long res
cdef char *hoststr
host, port = addr

hoststr = PyString_AsString(host)
res = inet_addr(hoststr)
if res == INADDR_ANY:
raise ValueError, 'invalid IP address'
dest.sin_addr.s_addr = res

dest.sin_port = htons(port)


cdef object fillinet6addr(sockaddr_in6 *dest, object addr):
cdef unsigned short port
cdef unsigned long res
cdef char *hoststr
cdef int addrlen = sizeof(sockaddr_in6)
host, port, flow, scope = addr
host = host.split("%")[0] # remove scope ID, if any

hoststr = PyString_AsString(host)
cdef int parseresult = WSAStringToAddressA(hoststr, AF_INET6, NULL,
<sockaddr *>dest, &addrlen)
if parseresult == SOCKET_ERROR:
raise ValueError, 'invalid IPv6 address %r' % (host,)
if parseresult != 0:
raise RuntimeError, 'undefined error occurred during address parsing'
# sin6_host field was handled by WSAStringToAddress
dest.sin6_port = htons(port)
dest.sin6_flowinfo = flow
dest.sin6_scope_id = scope


def AllocateReadBuffer(int size):
return PyBuffer_New(size)

def maxAddrLen(long s):
cdef WSAPROTOCOL_INFO wsa_pi
cdef int size, rc

size = sizeof(wsa_pi)
rc = getsockopt(s, SOL_SOCKET, SO_PROTOCOL_INFO, <char *>&wsa_pi, &size)
if rc == SOCKET_ERROR:
raise_error(WSAGetLastError(), 'getsockopt')
return wsa_pi.iMaxSockAddr

cdef int getAddrFamily(SOCKET s) except *:
cdef WSAPROTOCOL_INFO wsa_pi
cdef int size, rc

size = sizeof(wsa_pi)
rc = getsockopt(s, SOL_SOCKET, SO_PROTOCOL_INFO, <char *>&wsa_pi, &size)
if rc == SOCKET_ERROR:
raise_error(WSAGetLastError(), 'getsockopt')
return wsa_pi.iAddressFamily

import socket # for WSAStartup
if not initWinsockPointers():
raise ValueError, 'Failed to initialize Winsock function vectors'

have_connectex = (lpConnectEx != NULL)

include 'acceptex.pxi'
include 'connectex.pxi'
include 'wsarecv.pxi'
include 'wsasend.pxi'