/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#include "primpl.h"

#include <string.h>

#if defined(_WIN64)
#ifndef SO_UPDATE_CONNECT_CONTEXT
#define SO_UPDATE_CONNECT_CONTEXT 0x7010
#endif
#endif

/************************************************************************/

/* These two functions are only used in assertions. */
#if defined(DEBUG)

PRBool IsValidNetAddr(const PRNetAddr *addr)
{
    if ((addr != NULL)
#if defined(XP_UNIX) || defined(XP_OS2)
        && (addr->raw.family != PR_AF_LOCAL)
#endif
        && (addr->raw.family != PR_AF_INET6)
        && (addr->raw.family != PR_AF_INET)) {
        return PR_FALSE;
    }
    return PR_TRUE;
}

static PRBool IsValidNetAddrLen(const PRNetAddr *addr, PRInt32 addr_len)
{
    /*
     * The definition of the length of a Unix domain socket address
     * is not uniform, so we don't check it.
     */
    if ((addr != NULL)
#if defined(XP_UNIX) || defined(XP_OS2)
        && (addr->raw.family != AF_UNIX)
#endif
        && (PR_NETADDR_SIZE(addr) != addr_len)) {
#if defined(LINUX) && __GLIBC__ == 2 && __GLIBC_MINOR__ == 1
        /*
         * In glibc 2.1, struct sockaddr_in6 is 24 bytes.  In glibc 2.2
         * and in the 2.4 kernel, struct sockaddr_in6 has the scope_id
         * field and is 28 bytes.  It is possible for socket functions
         * to return an addr_len greater than sizeof(struct sockaddr_in6).
         * We need to allow that.  (Bugzilla bug #77264)
         */
        if ((PR_AF_INET6 == addr->raw.family)
            && (sizeof(addr->ipv6) == addr_len)) {
            return PR_TRUE;
        }
#endif
        /*
         * The accept(), getsockname(), etc. calls on some platforms
         * do not set the actual socket address length on return.
         * In this case, we verifiy addr_len is still the value we
         * passed in (i.e., sizeof(PRNetAddr)).
         */
#if defined(QNX)
        if (sizeof(PRNetAddr) == addr_len) {
            return PR_TRUE;
        }
#endif
        return PR_FALSE;
    }
    return PR_TRUE;
}

#endif /* DEBUG */

static PRInt32 PR_CALLBACK SocketWritev(PRFileDesc *fd, const PRIOVec *iov,
                                        PRInt32 iov_size, PRIntervalTime timeout)
{
    PRThread *me = _PR_MD_CURRENT_THREAD();
    int w = 0;
    const PRIOVec *tmp_iov;
#define LOCAL_MAXIOV    8
    PRIOVec local_iov[LOCAL_MAXIOV];
    PRIOVec *iov_copy = NULL;
    int tmp_out;
    int index, iov_cnt;
    int count=0, sz = 0;    /* 'count' is the return value. */

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }

    /*
     * Assume the first writev will succeed.  Copy iov's only on
     * failure.
     */
    tmp_iov = iov;
    for (index = 0; index < iov_size; index++) {
        sz += iov[index].iov_len;
    }

    iov_cnt = iov_size;

    while (sz > 0) {

        w = _PR_MD_WRITEV(fd, tmp_iov, iov_cnt, timeout);
        if (w < 0) {
            count = -1;
            break;
        }
        count += w;
        if (fd->secret->nonblocking) {
            break;
        }
        sz -= w;

        if (sz > 0) {
            /* find the next unwritten vector */
            for ( index = 0, tmp_out = count;
                  tmp_out >= iov[index].iov_len;
                  tmp_out -= iov[index].iov_len, index++) {;} /* nothing to execute */

            if (tmp_iov == iov) {
                /*
                 * The first writev failed so we
                 * must copy iov's around.
                 * Avoid calloc/free if there
                 * are few enough iov's.
                 */
                if (iov_size - index <= LOCAL_MAXIOV) {
                    iov_copy = local_iov;
                }
                else if ((iov_copy = (PRIOVec *) PR_CALLOC((iov_size - index) *
                                     sizeof *iov_copy)) == NULL) {
                    PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0);
                    return -1;
                }
                tmp_iov = iov_copy;
            }

            PR_ASSERT(tmp_iov == iov_copy);

            /* fill in the first partial read */
            iov_copy[0].iov_base = &(((char *)iov[index].iov_base)[tmp_out]);
            iov_copy[0].iov_len = iov[index].iov_len - tmp_out;
            index++;

            /* copy the remaining vectors */
            for (iov_cnt=1; index<iov_size; iov_cnt++, index++) {
                iov_copy[iov_cnt].iov_base = iov[index].iov_base;
                iov_copy[iov_cnt].iov_len = iov[index].iov_len;
            }
        }
    }

    if (iov_copy != local_iov) {
        PR_DELETE(iov_copy);
    }
    return count;
}

/************************************************************************/

PR_IMPLEMENT(PRFileDesc *) PR_ImportTCPSocket(PROsfd osfd)
{
    PRFileDesc *fd;

    if (!_pr_initialized) {
        _PR_ImplicitInitialization();
    }
    fd = PR_AllocFileDesc(osfd, PR_GetTCPMethods());
    if (fd != NULL) {
        _PR_MD_MAKE_NONBLOCK(fd);
        _PR_MD_INIT_FD_INHERITABLE(fd, PR_TRUE);
#ifdef _PR_NEED_SECRET_AF
        /* this means we can only import IPv4 sockets here.
         * but this is what the function in ptio.c does.
         * We need a way to import IPv6 sockets, too.
         */
        fd->secret->af = AF_INET;
#endif
    } else {
        _PR_MD_CLOSE_SOCKET(osfd);
    }
    return(fd);
}

PR_IMPLEMENT(PRFileDesc *) PR_ImportUDPSocket(PROsfd osfd)
{
    PRFileDesc *fd;

    if (!_pr_initialized) {
        _PR_ImplicitInitialization();
    }
    fd = PR_AllocFileDesc(osfd, PR_GetUDPMethods());
    if (fd != NULL) {
        _PR_MD_MAKE_NONBLOCK(fd);
        _PR_MD_INIT_FD_INHERITABLE(fd, PR_TRUE);
    } else {
        _PR_MD_CLOSE_SOCKET(osfd);
    }
    return(fd);
}


static const PRIOMethods* PR_GetSocketPollFdMethods(void);

PR_IMPLEMENT(PRFileDesc*) PR_CreateSocketPollFd(PROsfd osfd)
{
    PRFileDesc *fd;

    if (!_pr_initialized) {
        _PR_ImplicitInitialization();
    }

    fd = _PR_Getfd();

    if (fd == NULL) {
        PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0);
    }
    else
    {
        fd->secret->md.osfd = osfd;
        fd->secret->inheritable = _PR_TRI_FALSE;
        fd->secret->state = _PR_FILEDESC_OPEN;
        fd->methods = PR_GetSocketPollFdMethods();
    }

    return fd;
}  /* PR_CreateSocketPollFD */

PR_IMPLEMENT(PRStatus) PR_DestroySocketPollFd(PRFileDesc *fd)
{
    if (NULL == fd)
    {
        PR_SetError(PR_BAD_DESCRIPTOR_ERROR, 0);
        return PR_FAILURE;
    }
    fd->secret->state = _PR_FILEDESC_CLOSED;
    _PR_Putfd(fd);
    return PR_SUCCESS;
}  /* PR_DestroySocketPollFd */

static PRStatus PR_CALLBACK SocketConnect(
    PRFileDesc *fd, const PRNetAddr *addr, PRIntervalTime timeout)
{
    PRInt32 rv;    /* Return value of _PR_MD_CONNECT */
    const PRNetAddr *addrp = addr;
#if defined(_PR_INET6)
    PRNetAddr addrCopy;
#endif
    PRThread *me = _PR_MD_CURRENT_THREAD();

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return PR_FAILURE;
    }
#if defined(_PR_INET6)
    if (addr->raw.family == PR_AF_INET6) {
        addrCopy = *addr;
        addrCopy.raw.family = AF_INET6;
        addrp = &addrCopy;
    }
#endif

    rv = _PR_MD_CONNECT(fd, addrp, PR_NETADDR_SIZE(addr), timeout);
    PR_LOG(_pr_io_lm, PR_LOG_MAX, ("connect -> %d", rv));
    if (rv == 0) {
        return PR_SUCCESS;
    }
    else {
        return PR_FAILURE;
    }
}

static PRStatus PR_CALLBACK SocketConnectContinue(
    PRFileDesc *fd, PRInt16 out_flags)
{
    PROsfd osfd;
    int err;

    if (out_flags & PR_POLL_NVAL) {
        PR_SetError(PR_BAD_DESCRIPTOR_ERROR, 0);
        return PR_FAILURE;
    }
    if ((out_flags & (PR_POLL_WRITE | PR_POLL_EXCEPT | PR_POLL_ERR)) == 0) {
        PR_ASSERT(out_flags == 0);
        PR_SetError(PR_IN_PROGRESS_ERROR, 0);
        return PR_FAILURE;
    }

    osfd = fd->secret->md.osfd;

#if defined(XP_UNIX)

    err = _MD_unix_get_nonblocking_connect_error(osfd);
    if (err != 0) {
        _PR_MD_MAP_CONNECT_ERROR(err);
        return PR_FAILURE;
    }
    return PR_SUCCESS;

#elif defined(WIN32) || defined(WIN16)

    if (out_flags & PR_POLL_EXCEPT) {
        int len = sizeof(err);
        if (getsockopt(osfd, (int)SOL_SOCKET, SO_ERROR, (char *) &err, &len)
            == SOCKET_ERROR) {
            _PR_MD_MAP_GETSOCKOPT_ERROR(WSAGetLastError());
            return PR_FAILURE;
        }
        if (err != 0) {
            _PR_MD_MAP_CONNECT_ERROR(err);
        } else {
#if defined(_WIN64)
            if (fd->secret->overlappedActive) {
                PRInt32 rvSent;
                if (GetOverlappedResult(osfd, &fd->secret->ol, &rvSent, FALSE) == FALSE) {
                    err = WSAGetLastError();
                    PR_LOG(_pr_io_lm, PR_LOG_MIN,
                           ("SocketConnectContinue GetOverlappedResult failed %d\n", err));
                    if (err != ERROR_IO_INCOMPLETE) {
                        _PR_MD_MAP_CONNECT_ERROR(err);
                        fd->secret->overlappedActive = PR_FALSE;
                    }
                }
            }
            if (err == 0) {
                PR_SetError(PR_UNKNOWN_ERROR, 0);
            }
#else
            PR_SetError(PR_UNKNOWN_ERROR, 0);
#endif
        }
        return PR_FAILURE;
    }

    PR_ASSERT(out_flags & PR_POLL_WRITE);

#if defined(_WIN64)
    if (fd->secret->alreadyConnected) {
        fd->secret->alreadyConnected = PR_FALSE;
    }
    /* TCP Fast Open on Windows must use ConnectEx, which uses overlapped
     * input/output.
     * To get result we need to use GetOverlappedResult. */
    if (fd->secret->overlappedActive) {
        PR_ASSERT(fd->secret->nonblocking);
        PRInt32 rvSent;
        if (GetOverlappedResult(osfd, &fd->secret->ol, &rvSent, FALSE) == TRUE) {
            fd->secret->overlappedActive = PR_FALSE;
            PR_LOG(_pr_io_lm, PR_LOG_MIN,
                   ("SocketConnectContinue GetOverlappedResult succeeded\n"));
            /* When ConnectEx is used, all previously set socket options and
             * property are not enabled and to enable them
             * SO_UPDATE_CONNECT_CONTEXT option need to be set. */
            if (setsockopt((SOCKET)osfd, SOL_SOCKET, SO_UPDATE_CONNECT_CONTEXT, NULL, 0) != 0) {
                err = WSAGetLastError();
                PR_LOG(_pr_io_lm, PR_LOG_MIN,
                       ("SocketConnectContinue setting SO_UPDATE_CONNECT_CONTEXT failed %d\n", err));
                _PR_MD_MAP_SETSOCKOPT_ERROR(err);
                return PR_FAILURE;
            }
            return PR_SUCCESS;
        } else {
            err = WSAGetLastError();
            PR_LOG(_pr_io_lm, PR_LOG_MIN,
                   ("SocketConnectContinue GetOverlappedResult failed %d\n", err));
            if (err != ERROR_IO_INCOMPLETE) {
                _PR_MD_MAP_CONNECT_ERROR(err);
                fd->secret->overlappedActive = PR_FALSE;
                return PR_FAILURE;
            } else {
                PR_SetError(PR_IN_PROGRESS_ERROR, 0);
                return PR_FAILURE;
            }
        }
    }
#endif

    return PR_SUCCESS;

#elif defined(XP_OS2)

    err = _MD_os2_get_nonblocking_connect_error(osfd);
    if (err != 0) {
        _PR_MD_MAP_CONNECT_ERROR(err);
        return PR_FAILURE;
    }
    return PR_SUCCESS;


#else
    PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
    return PR_FAILURE;
#endif
}

PR_IMPLEMENT(PRStatus) PR_GetConnectStatus(const PRPollDesc *pd)
{
    /* Find the NSPR layer and invoke its connectcontinue method */
    PRFileDesc *bottom = PR_GetIdentitiesLayer(pd->fd, PR_NSPR_IO_LAYER);

    if (NULL == bottom) {
        PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0);
        return PR_FAILURE;
    }
    return SocketConnectContinue(bottom, pd->out_flags);
}

static PRFileDesc* PR_CALLBACK SocketAccept(PRFileDesc *fd, PRNetAddr *addr,
        PRIntervalTime timeout)
{
    PROsfd osfd;
    PRFileDesc *fd2;
    PRUint32 al;
    PRThread *me = _PR_MD_CURRENT_THREAD();
#ifdef WINNT
    PRNetAddr addrCopy;
#endif

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return 0;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return 0;
    }

#ifdef WINNT
    if (addr == NULL) {
        addr = &addrCopy;
    }
#endif
    al = sizeof(PRNetAddr);
    osfd = _PR_MD_ACCEPT(fd, addr, &al, timeout);
    if (osfd == -1) {
        return 0;
    }

    fd2 = PR_AllocFileDesc(osfd, PR_GetTCPMethods());
    if (!fd2) {
        _PR_MD_CLOSE_SOCKET(osfd);
        return NULL;
    }

    fd2->secret->nonblocking = fd->secret->nonblocking;
    fd2->secret->inheritable = fd->secret->inheritable;
#ifdef WINNT
    if (!fd2->secret->nonblocking && fd2->secret->inheritable != _PR_TRI_TRUE) {
        /*
         * The new socket has been associated with an I/O
         * completion port.  There is no going back.
         */
        fd2->secret->md.io_model_committed = PR_TRUE;
    }
    PR_ASSERT(al == PR_NETADDR_SIZE(addr));
    fd2->secret->md.accepted_socket = PR_TRUE;
    memcpy(&fd2->secret->md.peer_addr, addr, al);
#endif

    /*
     * On some platforms, the new socket created by accept()
     * inherits the nonblocking (or overlapped io) attribute
     * of the listening socket.  As an optimization, these
     * platforms can skip the following _PR_MD_MAKE_NONBLOCK
     * call.
     */
#if !defined(SOLARIS) && !defined(WINNT)
    _PR_MD_MAKE_NONBLOCK(fd2);
#endif

#ifdef _PR_INET6
    if (addr && (AF_INET6 == addr->raw.family)) {
        addr->raw.family = PR_AF_INET6;
    }
#endif
    PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE);
    PR_ASSERT(IsValidNetAddrLen(addr, al) == PR_TRUE);

    return fd2;
}

#ifdef WINNT
PR_IMPLEMENT(PRFileDesc*) PR_NTFast_Accept(PRFileDesc *fd, PRNetAddr *addr,
        PRIntervalTime timeout)
{
    PROsfd osfd;
    PRFileDesc *fd2;
    PRIntn al;
    PRThread *me = _PR_MD_CURRENT_THREAD();
    PRNetAddr addrCopy;

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return 0;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return 0;
    }

    if (addr == NULL) {
        addr = &addrCopy;
    }
    al = PR_NETADDR_SIZE(addr);
    osfd = _PR_MD_FAST_ACCEPT(fd, addr, &al, timeout, PR_TRUE, NULL, NULL);
    if (osfd == -1) {
        return 0;
    }

    fd2 = PR_AllocFileDesc(osfd, PR_GetTCPMethods());
    if (!fd2) {
        _PR_MD_CLOSE_SOCKET(osfd);
    } else {
        fd2->secret->nonblocking = fd->secret->nonblocking;
        fd2->secret->md.io_model_committed = PR_TRUE;
        PR_ASSERT(al == PR_NETADDR_SIZE(addr));
        fd2->secret->md.accepted_socket = PR_TRUE;
        memcpy(&fd2->secret->md.peer_addr, addr, al);
#ifdef _PR_INET6
        if (AF_INET6 == addr->raw.family) {
            addr->raw.family = PR_AF_INET6;
        }
#endif
#ifdef _PR_NEED_SECRET_AF
        fd2->secret->af = fd->secret->af;
#endif
    }
    return fd2;
}
#endif /* WINNT */


static PRStatus PR_CALLBACK SocketBind(PRFileDesc *fd, const PRNetAddr *addr)
{
    PRInt32 result;
    const PRNetAddr *addrp = addr;
#if defined(_PR_INET6)
    PRNetAddr addrCopy;
#endif

    PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE);

#ifdef XP_UNIX
    if (addr->raw.family == AF_UNIX) {
        /* Disallow relative pathnames */
        if (addr->local.path[0] != '/') {
            PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0);
            return PR_FAILURE;
        }
    }
#endif /* XP_UNIX */

#if defined(_PR_INET6)
    if (addr->raw.family == PR_AF_INET6) {
        addrCopy = *addr;
        addrCopy.raw.family = AF_INET6;
        addrp = &addrCopy;
    }
#endif
    result = _PR_MD_BIND(fd, addrp, PR_NETADDR_SIZE(addr));
    if (result < 0) {
        return PR_FAILURE;
    }
    return PR_SUCCESS;
}

static PRStatus PR_CALLBACK SocketListen(PRFileDesc *fd, PRIntn backlog)
{
    PRInt32 result;

    result = _PR_MD_LISTEN(fd, backlog);
    if (result < 0) {
        return PR_FAILURE;
    }
    return PR_SUCCESS;
}

static PRStatus PR_CALLBACK SocketShutdown(PRFileDesc *fd, PRIntn how)
{
    PRInt32 result;

    result = _PR_MD_SHUTDOWN(fd, how);
    if (result < 0) {
        return PR_FAILURE;
    }
    return PR_SUCCESS;
}

static PRInt32 PR_CALLBACK SocketRecv(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags,
                                      PRIntervalTime timeout)
{
    PRInt32 rv;
    PRThread *me = _PR_MD_CURRENT_THREAD();

    if ((flags != 0) && (flags != PR_MSG_PEEK)) {
        PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0);
        return -1;
    }
    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }

    PR_LOG(_pr_io_lm, PR_LOG_MAX,
           ("recv: fd=%p osfd=%" PR_PRIdOSFD " buf=%p amount=%d flags=%d",
            fd, fd->secret->md.osfd, buf, amount, flags));

#ifdef _PR_HAVE_PEEK_BUFFER
    if (fd->secret->peekBytes != 0) {
        rv = (amount < fd->secret->peekBytes) ?
             amount : fd->secret->peekBytes;
        memcpy(buf, fd->secret->peekBuffer, rv);
        if (flags == 0) {
            /* consume the bytes in the peek buffer */
            fd->secret->peekBytes -= rv;
            if (fd->secret->peekBytes != 0) {
                memmove(fd->secret->peekBuffer,
                        fd->secret->peekBuffer + rv,
                        fd->secret->peekBytes);
            }
        }
        return rv;
    }

    /* allocate peek buffer, if necessary */
    if ((PR_MSG_PEEK == flags) && _PR_FD_NEED_EMULATE_MSG_PEEK(fd)) {
        PR_ASSERT(0 == fd->secret->peekBytes);
        /* impose a max size on the peek buffer */
        if (amount > _PR_PEEK_BUFFER_MAX) {
            amount = _PR_PEEK_BUFFER_MAX;
        }
        if (fd->secret->peekBufSize < amount) {
            if (fd->secret->peekBuffer) {
                PR_Free(fd->secret->peekBuffer);
            }
            fd->secret->peekBufSize = amount;
            fd->secret->peekBuffer = PR_Malloc(amount);
            if (NULL == fd->secret->peekBuffer) {
                fd->secret->peekBufSize = 0;
                PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0);
                return -1;
            }
        }
    }
#endif

    rv = _PR_MD_RECV(fd, buf, amount, flags, timeout);
    PR_LOG(_pr_io_lm, PR_LOG_MAX, ("recv -> %d, error = %d, os error = %d",
                                   rv, PR_GetError(), PR_GetOSError()));

#ifdef _PR_HAVE_PEEK_BUFFER
    if ((PR_MSG_PEEK == flags) && _PR_FD_NEED_EMULATE_MSG_PEEK(fd)) {
        if (rv > 0) {
            memcpy(fd->secret->peekBuffer, buf, rv);
            fd->secret->peekBytes = rv;
        }
    }
#endif

    return rv;
}

static PRInt32 PR_CALLBACK SocketRead(PRFileDesc *fd, void *buf, PRInt32 amount)
{
    return SocketRecv(fd, buf, amount, 0, PR_INTERVAL_NO_TIMEOUT);
}

static PRInt32 PR_CALLBACK SocketSend(PRFileDesc *fd, const void *buf, PRInt32 amount,
                                      PRIntn flags, PRIntervalTime timeout)
{
    PRInt32 temp, count;
    PRThread *me = _PR_MD_CURRENT_THREAD();

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }

    count = 0;
    while (amount > 0) {
        PR_LOG(_pr_io_lm, PR_LOG_MAX,
               ("send: fd=%p osfd=%" PR_PRIdOSFD " buf=%p amount=%d",
                fd, fd->secret->md.osfd, buf, amount));
        temp = _PR_MD_SEND(fd, buf, amount, flags, timeout);
        if (temp < 0) {
            count = -1;
            break;
        }

        count += temp;
        if (fd->secret->nonblocking) {
            break;
        }
        buf = (const void*) ((const char*)buf + temp);

        amount -= temp;
    }
    PR_LOG(_pr_io_lm, PR_LOG_MAX, ("send -> %d", count));
    return count;
}

static PRInt32 PR_CALLBACK SocketWrite(PRFileDesc *fd, const void *buf, PRInt32 amount)
{
    return SocketSend(fd, buf, amount, 0, PR_INTERVAL_NO_TIMEOUT);
}

static PRStatus PR_CALLBACK SocketClose(PRFileDesc *fd)
{
    if (!fd || !fd->secret
        || (fd->secret->state != _PR_FILEDESC_OPEN
            && fd->secret->state != _PR_FILEDESC_CLOSED)) {
        PR_SetError(PR_BAD_DESCRIPTOR_ERROR, 0);
        return PR_FAILURE;
    }

    if (fd->secret->state == _PR_FILEDESC_OPEN) {
#if defined(_WIN64) && defined(WIN95)
        /* TCP Fast Open on Windows must use ConnectEx, which uses overlapped
         * input/output. Before closing such a socket we must cancelIO.
         */
        if (fd->secret->overlappedActive) {
            PR_ASSERT(fd->secret->nonblocking);
            if (CancelIo((HANDLE) fd->secret->md.osfd) == TRUE) {
                PR_LOG(_pr_io_lm, PR_LOG_MIN,
                       ("SocketClose - CancelIo succeeded\n"));
            } else {
                DWORD err = WSAGetLastError();
                PR_LOG(_pr_io_lm, PR_LOG_MIN,
                       ("SocketClose - CancelIo failed err=%x\n", err));
            }

            DWORD rvSent;
            if (GetOverlappedResult((HANDLE)fd->secret->md.osfd, &fd->secret->ol, &rvSent, FALSE) == TRUE) {
                fd->secret->overlappedActive = PR_FALSE;
                PR_LOG(_pr_io_lm, PR_LOG_MIN,
                       ("SocketClose GetOverlappedResult succeeded\n"));
            } else {
                DWORD err = WSAGetLastError();
                PR_LOG(_pr_io_lm, PR_LOG_MIN,
                       ("SocketClose GetOverlappedResult failed %d\n", err));
                if (err != ERROR_IO_INCOMPLETE) {
                    _PR_MD_MAP_CONNECT_ERROR(err);
                    fd->secret->overlappedActive = PR_FALSE;
                }
            }
        }

        if (fd->secret->overlappedActive &&
            _fd_waiting_for_overlapped_done_lock) {
            // Put osfd into the list to be checked later.
            PRFileDescList *forWaiting = PR_NEW(PRFileDescList);
            if (!forWaiting) {
                PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0);
                return PR_FAILURE;
            }
            forWaiting->fd = fd;

            PR_Lock(_fd_waiting_for_overlapped_done_lock);
            forWaiting->next = _fd_waiting_for_overlapped_done;
            _fd_waiting_for_overlapped_done = forWaiting;
            PR_Unlock(_fd_waiting_for_overlapped_done_lock);

            return PR_SUCCESS;
        }
#endif

        if (_PR_MD_CLOSE_SOCKET(fd->secret->md.osfd) < 0) {
            return PR_FAILURE;
        }
        fd->secret->state = _PR_FILEDESC_CLOSED;
    }

#ifdef _PR_HAVE_PEEK_BUFFER
    if (fd->secret->peekBuffer) {
        PR_ASSERT(fd->secret->peekBufSize > 0);
        PR_DELETE(fd->secret->peekBuffer);
        fd->secret->peekBufSize = 0;
        fd->secret->peekBytes = 0;
    }
#endif

    PR_FreeFileDesc(fd);
    return PR_SUCCESS;
}

static PRInt32 PR_CALLBACK SocketAvailable(PRFileDesc *fd)
{
    PRInt32 rv;
#ifdef _PR_HAVE_PEEK_BUFFER
    if (fd->secret->peekBytes != 0) {
        return fd->secret->peekBytes;
    }
#endif
    rv =  _PR_MD_SOCKETAVAILABLE(fd);
    return rv;
}

static PRInt64 PR_CALLBACK SocketAvailable64(PRFileDesc *fd)
{
    PRInt64 rv;
#ifdef _PR_HAVE_PEEK_BUFFER
    if (fd->secret->peekBytes != 0) {
        LL_I2L(rv, fd->secret->peekBytes);
        return rv;
    }
#endif
    LL_I2L(rv, _PR_MD_SOCKETAVAILABLE(fd));
    return rv;
}

static PRStatus PR_CALLBACK SocketSync(PRFileDesc *fd)
{
    return PR_SUCCESS;
}

static PRInt32 PR_CALLBACK SocketSendTo(
    PRFileDesc *fd, const void *buf, PRInt32 amount,
    PRIntn flags, const PRNetAddr *addr, PRIntervalTime timeout)
{
    PRInt32 temp, count;
    const PRNetAddr *addrp = addr;
#if defined(_PR_INET6)
    PRNetAddr addrCopy;
#endif
    PRThread *me = _PR_MD_CURRENT_THREAD();

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }

    PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE);
#if defined(_PR_INET6)
    if (addr->raw.family == PR_AF_INET6) {
        addrCopy = *addr;
        addrCopy.raw.family = AF_INET6;
        addrp = &addrCopy;
    }
#endif

    count = 0;
    do {
        temp = _PR_MD_SENDTO(fd, buf, amount, flags,
                             addrp, PR_NETADDR_SIZE(addr), timeout);
        if (temp < 0) {
            count = -1;
            break;
        }
        count += temp;
        if (fd->secret->nonblocking) {
            break;
        }
        buf = (const void*) ((const char*)buf + temp);
        amount -= temp;
    } while (amount > 0);
    return count;
}

#if defined(_WIN64) && defined(WIN95)
static PRInt32 PR_CALLBACK SocketTCPSendTo(
    PRFileDesc *fd, const void *buf, PRInt32 amount,
    PRIntn flags, const PRNetAddr *addr, PRIntervalTime timeout)
{
    PRInt32 temp, count;
    const PRNetAddr *addrp = addr;
#if defined(_PR_INET6)
    PRNetAddr addrCopy;
#endif
    PRThread *me = _PR_MD_CURRENT_THREAD();

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }

    PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE);
#if defined(_PR_INET6)
    if (addr->raw.family == PR_AF_INET6) {
        addrCopy = *addr;
        addrCopy.raw.family = AF_INET6;
        addrp = &addrCopy;
    }
#endif

    count = 0;
    while (amount > 0) {
        temp = _PR_MD_TCPSENDTO(fd, buf, amount, flags,
                                addrp, PR_NETADDR_SIZE(addr), timeout);
        if (temp < 0) {
            count = -1;
            break;
        }
        count += temp;
        if (fd->secret->nonblocking) {
            break;
        }
        buf = (const void*) ((const char*)buf + temp);
        amount -= temp;
    }
    return count;
}
#endif

static PRInt32 PR_CALLBACK SocketRecvFrom(PRFileDesc *fd, void *buf, PRInt32 amount,
        PRIntn flags, PRNetAddr *addr, PRIntervalTime timeout)
{
    PRInt32 rv;
    PRUint32 al;
    PRThread *me = _PR_MD_CURRENT_THREAD();

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }

    al = sizeof(PRNetAddr);
    rv = _PR_MD_RECVFROM(fd, buf, amount, flags, addr, &al, timeout);
#ifdef _PR_INET6
    if (addr && (AF_INET6 == addr->raw.family)) {
        addr->raw.family = PR_AF_INET6;
    }
#endif
    return rv;
}

static PRInt32 PR_CALLBACK SocketAcceptRead(PRFileDesc *sd, PRFileDesc **nd,
        PRNetAddr **raddr, void *buf, PRInt32 amount,
        PRIntervalTime timeout)
{
    PRInt32 rv;
    PRThread *me = _PR_MD_CURRENT_THREAD();

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }
    /* The socket must be in blocking mode. */
    if (sd->secret->nonblocking) {
        PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0);
        return -1;
    }
    *nd = NULL;

#if defined(WINNT)
    {
        PROsfd newSock;
        PRNetAddr *raddrCopy;

        if (raddr == NULL) {
            raddr = &raddrCopy;
        }
        rv = _PR_MD_ACCEPT_READ(sd, &newSock, raddr, buf, amount, timeout);
        if (rv < 0) {
            rv = -1;
        } else {
            /* Successfully accepted and read; create the new PRFileDesc */
            *nd = PR_AllocFileDesc(newSock, PR_GetTCPMethods());
            if (*nd == 0) {
                _PR_MD_CLOSE_SOCKET(newSock);
                /* PR_AllocFileDesc() has invoked PR_SetError(). */
                rv = -1;
            } else {
                (*nd)->secret->md.io_model_committed = PR_TRUE;
                (*nd)->secret->md.accepted_socket = PR_TRUE;
                memcpy(&(*nd)->secret->md.peer_addr, *raddr,
                       PR_NETADDR_SIZE(*raddr));
#ifdef _PR_INET6
                if (AF_INET6 == *raddr->raw.family) {
                    *raddr->raw.family = PR_AF_INET6;
                }
#endif
            }
        }
    }
#else
    rv = PR_EmulateAcceptRead(sd, nd, raddr, buf, amount, timeout);
#endif
    return rv;
}

#ifdef WINNT
PR_IMPLEMENT(PRInt32) PR_NTFast_AcceptRead(PRFileDesc *sd, PRFileDesc **nd,
        PRNetAddr **raddr, void *buf, PRInt32 amount,
        PRIntervalTime timeout)
{
    PRInt32 rv;
    PROsfd newSock;
    PRThread *me = _PR_MD_CURRENT_THREAD();
    PRNetAddr *raddrCopy;

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }
    *nd = NULL;

    if (raddr == NULL) {
        raddr = &raddrCopy;
    }
    rv = _PR_MD_FAST_ACCEPT_READ(sd, &newSock, raddr, buf, amount,
                                 timeout, PR_TRUE, NULL, NULL);
    if (rv < 0) {
        rv = -1;
    } else {
        /* Successfully accepted and read; create the new PRFileDesc */
        *nd = PR_AllocFileDesc(newSock, PR_GetTCPMethods());
        if (*nd == 0) {
            _PR_MD_CLOSE_SOCKET(newSock);
            /* PR_AllocFileDesc() has invoked PR_SetError(). */
            rv = -1;
        } else {
            (*nd)->secret->md.io_model_committed = PR_TRUE;
            (*nd)->secret->md.accepted_socket = PR_TRUE;
            memcpy(&(*nd)->secret->md.peer_addr, *raddr,
                   PR_NETADDR_SIZE(*raddr));
#ifdef _PR_INET6
            if (AF_INET6 == *raddr->raw.family) {
                *raddr->raw.family = PR_AF_INET6;
            }
#endif
#ifdef _PR_NEED_SECRET_AF
            (*nd)->secret->af = sd->secret->af;
#endif
        }
    }
    return rv;
}

PR_IMPLEMENT(PRInt32) PR_NTFast_AcceptRead_WithTimeoutCallback(
    PRFileDesc *sd, PRFileDesc **nd,
    PRNetAddr **raddr, void *buf, PRInt32 amount,
    PRIntervalTime timeout,
    _PR_AcceptTimeoutCallback callback,
    void *callbackArg)
{
    PRInt32 rv;
    PROsfd newSock;
    PRThread *me = _PR_MD_CURRENT_THREAD();
    PRNetAddr *raddrCopy;

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }
    *nd = NULL;

    if (raddr == NULL) {
        raddr = &raddrCopy;
    }
    rv = _PR_MD_FAST_ACCEPT_READ(sd, &newSock, raddr, buf, amount,
                                 timeout, PR_TRUE, callback, callbackArg);
    if (rv < 0) {
        rv = -1;
    } else {
        /* Successfully accepted and read; create the new PRFileDesc */
        *nd = PR_AllocFileDesc(newSock, PR_GetTCPMethods());
        if (*nd == 0) {
            _PR_MD_CLOSE_SOCKET(newSock);
            /* PR_AllocFileDesc() has invoked PR_SetError(). */
            rv = -1;
        } else {
            (*nd)->secret->md.io_model_committed = PR_TRUE;
            (*nd)->secret->md.accepted_socket = PR_TRUE;
            memcpy(&(*nd)->secret->md.peer_addr, *raddr,
                   PR_NETADDR_SIZE(*raddr));
#ifdef _PR_INET6
            if (AF_INET6 == *raddr->raw.family) {
                *raddr->raw.family = PR_AF_INET6;
            }
#endif
#ifdef _PR_NEED_SECRET_AF
            (*nd)->secret->af = sd->secret->af;
#endif
        }
    }
    return rv;
}
#endif /* WINNT */

#ifdef WINNT
PR_IMPLEMENT(void)
PR_NTFast_UpdateAcceptContext(PRFileDesc *socket, PRFileDesc *acceptSocket)
{
    _PR_MD_UPDATE_ACCEPT_CONTEXT(
        socket->secret->md.osfd, acceptSocket->secret->md.osfd);
}
#endif /* WINNT */

static PRInt32 PR_CALLBACK SocketSendFile(
    PRFileDesc *sd, PRSendFileData *sfd,
    PRTransmitFileFlags flags, PRIntervalTime timeout)
{
    PRInt32 rv;
    PRThread *me = _PR_MD_CURRENT_THREAD();

    if (_PR_PENDING_INTERRUPT(me)) {
        me->flags &= ~_PR_INTERRUPT;
        PR_SetError(PR_PENDING_INTERRUPT_ERROR, 0);
        return -1;
    }
    if (_PR_IO_PENDING(me)) {
        PR_SetError(PR_IO_PENDING_ERROR, 0);
        return -1;
    }
    /* The socket must be in blocking mode. */
    if (sd->secret->nonblocking) {
        PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0);
        return -1;
    }
#if defined(WINNT)
    rv = _PR_MD_SENDFILE(sd, sfd, flags, timeout);
    if ((rv >= 0) && (flags == PR_TRANSMITFILE_CLOSE_SOCKET)) {
        /*
         * This should be kept the same as SocketClose, except
         * that _PR_MD_CLOSE_SOCKET(sd->secret->md.osfd) should
         * not be called because the socket will be recycled.
         */
        PR_FreeFileDesc(sd);
    }
#else
    rv = PR_EmulateSendFile(sd, sfd, flags, timeout);
#endif  /* WINNT */

    return rv;
}

static PRInt32 PR_CALLBACK SocketTransmitFile(PRFileDesc *sd, PRFileDesc *fd,
        const void *headers, PRInt32 hlen, PRTransmitFileFlags flags,
        PRIntervalTime timeout)
{
    PRSendFileData sfd;

    sfd.fd = fd;
    sfd.file_offset = 0;
    sfd.file_nbytes = 0;
    sfd.header = headers;
    sfd.hlen = hlen;
    sfd.trailer = NULL;
    sfd.tlen = 0;

    return(SocketSendFile(sd, &sfd, flags, timeout));
}

static PRStatus PR_CALLBACK SocketGetName(PRFileDesc *fd, PRNetAddr *addr)
{
    PRInt32 result;
    PRUint32 addrlen;

    addrlen = sizeof(PRNetAddr);
    result = _PR_MD_GETSOCKNAME(fd, addr, &addrlen);
    if (result < 0) {
        return PR_FAILURE;
    }
#ifdef _PR_INET6
    if (AF_INET6 == addr->raw.family) {
        addr->raw.family = PR_AF_INET6;
    }
#endif
    PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE);
    PR_ASSERT(IsValidNetAddrLen(addr, addrlen) == PR_TRUE);
    return PR_SUCCESS;
}

static PRStatus PR_CALLBACK SocketGetPeerName(PRFileDesc *fd, PRNetAddr *addr)
{
    PRInt32 result;
    PRUint32 addrlen;

    addrlen = sizeof(PRNetAddr);
    result = _PR_MD_GETPEERNAME(fd, addr, &addrlen);
    if (result < 0) {
        return PR_FAILURE;
    }
#ifdef _PR_INET6
    if (AF_INET6 == addr->raw.family) {
        addr->raw.family = PR_AF_INET6;
    }
#endif
    PR_ASSERT(IsValidNetAddr(addr) == PR_TRUE);
    PR_ASSERT(IsValidNetAddrLen(addr, addrlen) == PR_TRUE);
    return PR_SUCCESS;
}

static PRInt16 PR_CALLBACK SocketPoll(
    PRFileDesc *fd, PRInt16 in_flags, PRInt16 *out_flags)
{
    *out_flags = 0;

#if defined(_WIN64)
    if (in_flags & PR_POLL_WRITE) {
        if (fd->secret->alreadyConnected) {
            *out_flags = PR_POLL_WRITE;
            return PR_POLL_WRITE;
        }
    }
#endif
    return in_flags;
}  /* SocketPoll */

static PRIOMethods tcpMethods = {
    PR_DESC_SOCKET_TCP,
    SocketClose,
    SocketRead,
    SocketWrite,
    SocketAvailable,
    SocketAvailable64,
    SocketSync,
    (PRSeekFN)_PR_InvalidInt,
    (PRSeek64FN)_PR_InvalidInt64,
    (PRFileInfoFN)_PR_InvalidStatus,
    (PRFileInfo64FN)_PR_InvalidStatus,
    SocketWritev,
    SocketConnect,
    SocketAccept,
    SocketBind,
    SocketListen,
    SocketShutdown,
    SocketRecv,
    SocketSend,
    (PRRecvfromFN)_PR_InvalidInt,
#if defined(_WIN64) && defined(WIN95)
    SocketTCPSendTo, /* This is for fast open. We imitate Linux interface. */
#else
    (PRSendtoFN)_PR_InvalidInt,
#endif
    SocketPoll,
    SocketAcceptRead,
    SocketTransmitFile,
    SocketGetName,
    SocketGetPeerName,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt,
    _PR_SocketGetSocketOption,
    _PR_SocketSetSocketOption,
    SocketSendFile,
    SocketConnectContinue,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt
};

static PRIOMethods udpMethods = {
    PR_DESC_SOCKET_UDP,
    SocketClose,
    SocketRead,
    SocketWrite,
    SocketAvailable,
    SocketAvailable64,
    SocketSync,
    (PRSeekFN)_PR_InvalidInt,
    (PRSeek64FN)_PR_InvalidInt64,
    (PRFileInfoFN)_PR_InvalidStatus,
    (PRFileInfo64FN)_PR_InvalidStatus,
    SocketWritev,
    SocketConnect,
    (PRAcceptFN)_PR_InvalidDesc,
    SocketBind,
    SocketListen,
    SocketShutdown,
    SocketRecv,
    SocketSend,
    SocketRecvFrom,
    SocketSendTo,
    SocketPoll,
    (PRAcceptreadFN)_PR_InvalidInt,
    (PRTransmitfileFN)_PR_InvalidInt,
    SocketGetName,
    SocketGetPeerName,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt,
    _PR_SocketGetSocketOption,
    _PR_SocketSetSocketOption,
    (PRSendfileFN)_PR_InvalidInt,
    (PRConnectcontinueFN)_PR_InvalidStatus,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt
};


static PRIOMethods socketpollfdMethods = {
    (PRDescType) 0,
    (PRCloseFN)_PR_InvalidStatus,
    (PRReadFN)_PR_InvalidInt,
    (PRWriteFN)_PR_InvalidInt,
    (PRAvailableFN)_PR_InvalidInt,
    (PRAvailable64FN)_PR_InvalidInt64,
    (PRFsyncFN)_PR_InvalidStatus,
    (PRSeekFN)_PR_InvalidInt,
    (PRSeek64FN)_PR_InvalidInt64,
    (PRFileInfoFN)_PR_InvalidStatus,
    (PRFileInfo64FN)_PR_InvalidStatus,
    (PRWritevFN)_PR_InvalidInt,
    (PRConnectFN)_PR_InvalidStatus,
    (PRAcceptFN)_PR_InvalidDesc,
    (PRBindFN)_PR_InvalidStatus,
    (PRListenFN)_PR_InvalidStatus,
    (PRShutdownFN)_PR_InvalidStatus,
    (PRRecvFN)_PR_InvalidInt,
    (PRSendFN)_PR_InvalidInt,
    (PRRecvfromFN)_PR_InvalidInt,
    (PRSendtoFN)_PR_InvalidInt,
    SocketPoll,
    (PRAcceptreadFN)_PR_InvalidInt,
    (PRTransmitfileFN)_PR_InvalidInt,
    (PRGetsocknameFN)_PR_InvalidStatus,
    (PRGetpeernameFN)_PR_InvalidStatus,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt,
    (PRGetsocketoptionFN)_PR_InvalidStatus,
    (PRSetsocketoptionFN)_PR_InvalidStatus,
    (PRSendfileFN)_PR_InvalidInt,
    (PRConnectcontinueFN)_PR_InvalidStatus,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt,
    (PRReservedFN)_PR_InvalidInt
};

PR_IMPLEMENT(const PRIOMethods*) PR_GetTCPMethods()
{
    return &tcpMethods;
}

PR_IMPLEMENT(const PRIOMethods*) PR_GetUDPMethods()
{
    return &udpMethods;
}

static const PRIOMethods* PR_GetSocketPollFdMethods()
{
    return &socketpollfdMethods;
}  /* PR_GetSocketPollFdMethods */

#if !defined(_PR_INET6) || defined(_PR_INET6_PROBE)
PR_EXTERN(PRStatus) _pr_push_ipv6toipv4_layer(PRFileDesc *fd);

#if defined(_PR_INET6_PROBE)

extern PRBool _pr_ipv6_is_present(void);

PR_IMPLEMENT(PRBool) _pr_test_ipv6_socket()
{
    PROsfd osfd;

    osfd = _PR_MD_SOCKET(AF_INET6, SOCK_STREAM, 0);
    if (osfd != -1) {
        _PR_MD_CLOSE_SOCKET(osfd);
        return PR_TRUE;
    }
    return PR_FALSE;
}
#endif  /* _PR_INET6_PROBE */

#endif

PR_IMPLEMENT(PRFileDesc*) PR_Socket(PRInt32 domain, PRInt32 type, PRInt32 proto)
{
    PROsfd osfd;
    PRFileDesc *fd;
    PRInt32 tmp_domain = domain;

    if (!_pr_initialized) {
        _PR_ImplicitInitialization();
    }
    if (PR_AF_INET != domain
        && PR_AF_INET6 != domain
#if defined(XP_UNIX) || defined(XP_OS2)
        && PR_AF_LOCAL != domain
#endif
       ) {
        PR_SetError(PR_ADDRESS_NOT_SUPPORTED_ERROR, 0);
        return NULL;
    }

#if defined(_PR_INET6_PROBE)
    if (PR_AF_INET6 == domain) {
        domain = _pr_ipv6_is_present() ? AF_INET6 : AF_INET;
    }
#elif defined(_PR_INET6)
    if (PR_AF_INET6 == domain) {
        domain = AF_INET6;
    }
#else
    if (PR_AF_INET6 == domain) {
        domain = AF_INET;
    }
#endif  /* _PR_INET6 */
    osfd = _PR_MD_SOCKET(domain, type, proto);
    if (osfd == -1) {
        return 0;
    }
    if (type == SOCK_STREAM) {
        fd = PR_AllocFileDesc(osfd, PR_GetTCPMethods());
    }
    else {
        fd = PR_AllocFileDesc(osfd, PR_GetUDPMethods());
    }
    /*
     * Make the sockets non-blocking
     */
    if (fd != NULL) {
        _PR_MD_MAKE_NONBLOCK(fd);
        _PR_MD_INIT_FD_INHERITABLE(fd, PR_FALSE);
#ifdef _PR_NEED_SECRET_AF
        fd->secret->af = domain;
#endif
#if defined(_PR_INET6_PROBE) || !defined(_PR_INET6)
        /*
         * For platforms with no support for IPv6
         * create layered socket for IPv4-mapped IPv6 addresses
         */
        if (PR_AF_INET6 == tmp_domain && PR_AF_INET == domain) {
            if (PR_FAILURE == _pr_push_ipv6toipv4_layer(fd)) {
                PR_Close(fd);
                fd = NULL;
            }
        }
#endif
    } else {
        _PR_MD_CLOSE_SOCKET(osfd);
    }

    return fd;
}

PR_IMPLEMENT(PRFileDesc *) PR_NewTCPSocket(void)
{
    PRInt32 domain = AF_INET;

    return PR_Socket(domain, SOCK_STREAM, 0);
}

PR_IMPLEMENT(PRFileDesc*) PR_NewUDPSocket(void)
{
    PRInt32 domain = AF_INET;

    return PR_Socket(domain, SOCK_DGRAM, 0);
}

PR_IMPLEMENT(PRFileDesc *) PR_OpenTCPSocket(PRIntn af)
{
    return PR_Socket(af, SOCK_STREAM, 0);
}

PR_IMPLEMENT(PRFileDesc*) PR_OpenUDPSocket(PRIntn af)
{
    return PR_Socket(af, SOCK_DGRAM, 0);
}

PR_IMPLEMENT(PRStatus) PR_NewTCPSocketPair(PRFileDesc *f[])
{
#ifdef XP_UNIX
    PRInt32 rv, osfd[2];

    if (!_pr_initialized) {
        _PR_ImplicitInitialization();
    }

    rv = _PR_MD_SOCKETPAIR(AF_UNIX, SOCK_STREAM, 0, osfd);
    if (rv == -1) {
        return PR_FAILURE;
    }

    f[0] = PR_AllocFileDesc(osfd[0], PR_GetTCPMethods());
    if (!f[0]) {
        _PR_MD_CLOSE_SOCKET(osfd[0]);
        _PR_MD_CLOSE_SOCKET(osfd[1]);
        /* PR_AllocFileDesc() has invoked PR_SetError(). */
        return PR_FAILURE;
    }
    f[1] = PR_AllocFileDesc(osfd[1], PR_GetTCPMethods());
    if (!f[1]) {
        PR_Close(f[0]);
        _PR_MD_CLOSE_SOCKET(osfd[1]);
        /* PR_AllocFileDesc() has invoked PR_SetError(). */
        return PR_FAILURE;
    }
    _PR_MD_MAKE_NONBLOCK(f[0]);
    _PR_MD_INIT_FD_INHERITABLE(f[0], PR_FALSE);
    _PR_MD_MAKE_NONBLOCK(f[1]);
    _PR_MD_INIT_FD_INHERITABLE(f[1], PR_FALSE);
    return PR_SUCCESS;
#elif defined(WINNT)
    /*
     * A socket pair is often used for interprocess communication,
     * so we need to make sure neither socket is associated with
     * the I/O completion port; otherwise it can't be used by a
     * child process.
     *
     * The default implementation below cannot be used for NT
     * because PR_Accept would have associated the I/O completion
     * port with the listening and accepted sockets.
     */
    SOCKET listenSock;
    SOCKET osfd[2];
    struct sockaddr_in selfAddr, peerAddr;
    int addrLen;

    if (!_pr_initialized) {
        _PR_ImplicitInitialization();
    }

    osfd[0] = osfd[1] = INVALID_SOCKET;
    listenSock = socket(AF_INET, SOCK_STREAM, 0);
    if (listenSock == INVALID_SOCKET) {
        goto failed;
    }
    selfAddr.sin_family = AF_INET;
    selfAddr.sin_port = 0;
    selfAddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); /* BugZilla: 35408 */
    addrLen = sizeof(selfAddr);
    if (bind(listenSock, (struct sockaddr *) &selfAddr,
             addrLen) == SOCKET_ERROR) {
        goto failed;
    }
    if (getsockname(listenSock, (struct sockaddr *) &selfAddr,
                    &addrLen) == SOCKET_ERROR) {
        goto failed;
    }
    if (listen(listenSock, 5) == SOCKET_ERROR) {
        goto failed;
    }
    osfd[0] = socket(AF_INET, SOCK_STREAM, 0);
    if (osfd[0] == INVALID_SOCKET) {
        goto failed;
    }
    selfAddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);

    /*
     * Only a thread is used to do the connect and accept.
     * I am relying on the fact that connect returns
     * successfully as soon as the connect request is put
     * into the listen queue (but before accept is called).
     * This is the behavior of the BSD socket code.  If
     * connect does not return until accept is called, we
     * will need to create another thread to call connect.
     */
    if (connect(osfd[0], (struct sockaddr *) &selfAddr,
                addrLen) == SOCKET_ERROR) {
        goto failed;
    }
    /*
     * A malicious local process may connect to the listening
     * socket, so we need to verify that the accepted connection
     * is made from our own socket osfd[0].
     */
    if (getsockname(osfd[0], (struct sockaddr *) &selfAddr,
                    &addrLen) == SOCKET_ERROR) {
        goto failed;
    }
    osfd[1] = accept(listenSock, (struct sockaddr *) &peerAddr, &addrLen);
    if (osfd[1] == INVALID_SOCKET) {
        goto failed;
    }
    if (peerAddr.sin_port != selfAddr.sin_port) {
        /* the connection we accepted is not from osfd[0] */
        PR_SetError(PR_INSUFFICIENT_RESOURCES_ERROR, 0);
        goto failed;
    }
    closesocket(listenSock);

    f[0] = PR_AllocFileDesc(osfd[0], PR_GetTCPMethods());
    if (!f[0]) {
        closesocket(osfd[0]);
        closesocket(osfd[1]);
        /* PR_AllocFileDesc() has invoked PR_SetError(). */
        return PR_FAILURE;
    }
    f[1] = PR_AllocFileDesc(osfd[1], PR_GetTCPMethods());
    if (!f[1]) {
        PR_Close(f[0]);
        closesocket(osfd[1]);
        /* PR_AllocFileDesc() has invoked PR_SetError(). */
        return PR_FAILURE;
    }
    _PR_MD_INIT_FD_INHERITABLE(f[0], PR_FALSE);
    _PR_MD_INIT_FD_INHERITABLE(f[1], PR_FALSE);
    return PR_SUCCESS;

failed:
    if (listenSock != INVALID_SOCKET) {
        closesocket(listenSock);
    }
    if (osfd[0] != INVALID_SOCKET) {
        closesocket(osfd[0]);
    }
    if (osfd[1] != INVALID_SOCKET) {
        closesocket(osfd[1]);
    }
    return PR_FAILURE;
#else /* not Unix or NT */
    /*
     * default implementation
     */
    PRFileDesc *listenSock;
    PRNetAddr selfAddr, peerAddr;
    PRUint16 port;

    f[0] = f[1] = NULL;
    listenSock = PR_NewTCPSocket();
    if (listenSock == NULL) {
        goto failed;
    }
    PR_InitializeNetAddr(PR_IpAddrLoopback, 0, &selfAddr); /* BugZilla: 35408 */
    if (PR_Bind(listenSock, &selfAddr) == PR_FAILURE) {
        goto failed;
    }
    if (PR_GetSockName(listenSock, &selfAddr) == PR_FAILURE) {
        goto failed;
    }
    port = ntohs(selfAddr.inet.port);
    if (PR_Listen(listenSock, 5) == PR_FAILURE) {
        goto failed;
    }
    f[0] = PR_NewTCPSocket();
    if (f[0] == NULL) {
        goto failed;
    }
#ifdef _PR_CONNECT_DOES_NOT_BIND
    /*
     * If connect does not implicitly bind the socket (e.g., on
     * BeOS), we have to bind the socket so that we can get its
     * port with getsockname later.
     */
    PR_InitializeNetAddr(PR_IpAddrLoopback, 0, &selfAddr);
    if (PR_Bind(f[0], &selfAddr) == PR_FAILURE) {
        goto failed;
    }
#endif
    PR_InitializeNetAddr(PR_IpAddrLoopback, port, &selfAddr);

    /*
     * Only a thread is used to do the connect and accept.
     * I am relying on the fact that PR_Connect returns
     * successfully as soon as the connect request is put
     * into the listen queue (but before PR_Accept is called).
     * This is the behavior of the BSD socket code.  If
     * connect does not return until accept is called, we
     * will need to create another thread to call connect.
     */
    if (PR_Connect(f[0], &selfAddr, PR_INTERVAL_NO_TIMEOUT)
        == PR_FAILURE) {
        goto failed;
    }
    /*
     * A malicious local process may connect to the listening
     * socket, so we need to verify that the accepted connection
     * is made from our own socket f[0].
     */
    if (PR_GetSockName(f[0], &selfAddr) == PR_FAILURE) {
        goto failed;
    }
    f[1] = PR_Accept(listenSock, &peerAddr, PR_INTERVAL_NO_TIMEOUT);
    if (f[1] == NULL) {
        goto failed;
    }
    if (peerAddr.inet.port != selfAddr.inet.port) {
        /* the connection we accepted is not from f[0] */
        PR_SetError(PR_INSUFFICIENT_RESOURCES_ERROR, 0);
        goto failed;
    }
    PR_Close(listenSock);
    return PR_SUCCESS;

failed:
    if (listenSock) {
        PR_Close(listenSock);
    }
    if (f[0]) {
        PR_Close(f[0]);
    }
    if (f[1]) {
        PR_Close(f[1]);
    }
    return PR_FAILURE;
#endif
}

PR_IMPLEMENT(PROsfd)
PR_FileDesc2NativeHandle(PRFileDesc *fd)
{
    if (fd) {
        fd = PR_GetIdentitiesLayer(fd, PR_NSPR_IO_LAYER);
    }
    if (!fd) {
        PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0);
        return -1;
    }
    return fd->secret->md.osfd;
}

PR_IMPLEMENT(void)
PR_ChangeFileDescNativeHandle(PRFileDesc *fd, PROsfd handle)
{
    if (fd) {
        fd->secret->md.osfd = handle;
    }
}

/*
** Select compatibility
**
*/

PR_IMPLEMENT(void) PR_FD_ZERO(PR_fd_set *set)
{
    memset(set, 0, sizeof(PR_fd_set));
}

PR_IMPLEMENT(void) PR_FD_SET(PRFileDesc *fh, PR_fd_set *set)
{
    PR_ASSERT( set->hsize < PR_MAX_SELECT_DESC );

    set->harray[set->hsize++] = fh;
}

PR_IMPLEMENT(void) PR_FD_CLR(PRFileDesc *fh, PR_fd_set *set)
{
    PRUint32 index, index2;

    for (index = 0; index<set->hsize; index++)
        if (set->harray[index] == fh) {
            for (index2=index; index2 < (set->hsize-1); index2++) {
                set->harray[index2] = set->harray[index2+1];
            }
            set->hsize--;
            break;
        }
}

PR_IMPLEMENT(PRInt32) PR_FD_ISSET(PRFileDesc *fh, PR_fd_set *set)
{
    PRUint32 index;
    for (index = 0; index<set->hsize; index++)
        if (set->harray[index] == fh) {
            return 1;
        }
    return 0;
}

PR_IMPLEMENT(void) PR_FD_NSET(PROsfd fd, PR_fd_set *set)
{
    PR_ASSERT( set->nsize < PR_MAX_SELECT_DESC );

    set->narray[set->nsize++] = fd;
}

PR_IMPLEMENT(void) PR_FD_NCLR(PROsfd fd, PR_fd_set *set)
{
    PRUint32 index, index2;

    for (index = 0; index<set->nsize; index++)
        if (set->narray[index] == fd) {
            for (index2=index; index2 < (set->nsize-1); index2++) {
                set->narray[index2] = set->narray[index2+1];
            }
            set->nsize--;
            break;
        }
}

PR_IMPLEMENT(PRInt32) PR_FD_NISSET(PROsfd fd, PR_fd_set *set)
{
    PRUint32 index;
    for (index = 0; index<set->nsize; index++)
        if (set->narray[index] == fd) {
            return 1;
        }
    return 0;
}


#if !defined(NEED_SELECT)
#include "obsolete/probslet.h"

#define PD_INCR 20

static PRPollDesc *_pr_setfd(
    PR_fd_set *set, PRInt16 flags, PRPollDesc *polldesc)
{
    PRUintn fsidx, pdidx;
    PRPollDesc *poll = polldesc;

    if (NULL == set) {
        return poll;
    }

    /* First set the pr file handle osfds */
    for (fsidx = 0; fsidx < set->hsize; fsidx++)
    {
        for (pdidx = 0; 1; pdidx++)
        {
            if ((PRFileDesc*)-1 == poll[pdidx].fd)
            {
                /* our vector is full - extend and condition it */
                poll = (PRPollDesc*)PR_Realloc(
                           poll, (pdidx + 1 + PD_INCR) * sizeof(PRPollDesc));
                if (NULL == poll) {
                    goto out_of_memory;
                }
                memset(
                    poll + pdidx * sizeof(PRPollDesc),
                    0, PD_INCR * sizeof(PRPollDesc));
                poll[pdidx + PD_INCR].fd = (PRFileDesc*)-1;
            }
            if ((NULL == poll[pdidx].fd)
                || (poll[pdidx].fd == set->harray[fsidx]))
            {
                /* PR_ASSERT(0 == (poll[pdidx].in_flags & flags)); */
                /* either empty or prevously defined */
                poll[pdidx].fd = set->harray[fsidx];  /* possibly redundant */
                poll[pdidx].in_flags |= flags;  /* possibly redundant */
                break;
            }
        }
    }

#if 0
    /* Second set the native osfds */
    for (fsidx = 0; fsidx < set->nsize; fsidx++)
    {
        for (pdidx = 0; ((PRFileDesc*)-1 != poll[pdidx].fd); pdidx++)
        {
            if ((PRFileDesc*)-1 == poll[pdidx].fd)
            {
                /* our vector is full - extend and condition it */
                poll = PR_Realloc(
                           poll, (pdidx + PD_INCR) * sizeof(PRPollDesc));
                if (NULL == poll) {
                    goto out_of_memory;
                }
                memset(
                    poll + pdidx * sizeof(PRPollDesc),
                    0, PD_INCR * sizeof(PRPollDesc));
                poll[(pdidx + PD_INCR)].fd = (PRFileDesc*)-1;
            }
            if ((NULL == poll[pdidx].fd)
                || (poll[pdidx].fd == set->narray[fsidx]))
            {
                /* either empty or prevously defined */
                poll[pdidx].fd = set->narray[fsidx];
                PR_ASSERT(0 == (poll[pdidx].in_flags & flags));
                poll[pdidx].in_flags |= flags;
                break;
            }
        }
    }
#endif /* 0 */

    return poll;

out_of_memory:
    if (NULL != polldesc) {
        PR_DELETE(polldesc);
    }
    return NULL;
}  /* _pr_setfd */

#endif /* !defined(NEED_SELECT) */

PR_IMPLEMENT(PRInt32) PR_Select(
    PRInt32 unused, PR_fd_set *pr_rd, PR_fd_set *pr_wr,
    PR_fd_set *pr_ex, PRIntervalTime timeout)
{

#if !defined(NEED_SELECT)
    PRInt32 npds = 0;
    /*
    ** Find out how many fds are represented in the three lists.
    ** Then allocate a polling descriptor for the logical union
    ** (there can't be any overlapping) and call PR_Poll().
    */

    PRPollDesc *copy, *poll;

    static PRBool warning = PR_TRUE;
    if (warning) {
        warning = _PR_Obsolete( "PR_Select()", "PR_Poll()");
    }

    /* try to get an initial guesss at how much space we need */
    npds = 0;
    if ((NULL != pr_rd) && ((pr_rd->hsize + pr_rd->nsize - npds) > 0)) {
        npds = pr_rd->hsize + pr_rd->nsize;
    }
    if ((NULL != pr_wr) && ((pr_wr->hsize + pr_wr->nsize - npds) > 0)) {
        npds = pr_wr->hsize + pr_wr->nsize;
    }
    if ((NULL != pr_ex) && ((pr_ex->hsize + pr_ex->nsize - npds) > 0)) {
        npds = pr_ex->hsize + pr_ex->nsize;
    }

    if (0 == npds)
    {
        PR_Sleep(timeout);
        return 0;
    }

    copy = poll = (PRPollDesc*)PR_Calloc(npds + PD_INCR, sizeof(PRPollDesc));
    if (NULL == poll) {
        goto out_of_memory;
    }
    poll[npds + PD_INCR - 1].fd = (PRFileDesc*)-1;

    poll = _pr_setfd(pr_rd, PR_POLL_READ, poll);
    if (NULL == poll) {
        goto out_of_memory;
    }
    poll = _pr_setfd(pr_wr, PR_POLL_WRITE, poll);
    if (NULL == poll) {
        goto out_of_memory;
    }
    poll = _pr_setfd(pr_ex, PR_POLL_EXCEPT, poll);
    if (NULL == poll) {
        goto out_of_memory;
    }
    unused = 0;
    while (NULL != poll[unused].fd && (PRFileDesc*)-1 != poll[unused].fd)
    {
        ++unused;
    }

    PR_ASSERT(unused > 0);
    npds = PR_Poll(poll, unused, timeout);

    if (npds > 0)
    {
        /* Copy the results back into the fd sets */
        if (NULL != pr_rd) {
            pr_rd->nsize = pr_rd->hsize = 0;
        }
        if (NULL != pr_wr) {
            pr_wr->nsize = pr_wr->hsize = 0;
        }
        if (NULL != pr_ex) {
            pr_ex->nsize = pr_ex->hsize = 0;
        }
        for (copy = &poll[unused - 1]; copy >= poll; --copy)
        {
            if (copy->out_flags & PR_POLL_NVAL)
            {
                PR_SetError(PR_BAD_DESCRIPTOR_ERROR, 0);
                npds = -1;
                break;
            }
            if (copy->out_flags & PR_POLL_READ)
                if (NULL != pr_rd) {
                    pr_rd->harray[pr_rd->hsize++] = copy->fd;
                }
            if (copy->out_flags & PR_POLL_WRITE)
                if (NULL != pr_wr) {
                    pr_wr->harray[pr_wr->hsize++] = copy->fd;
                }
            if (copy->out_flags & PR_POLL_EXCEPT)
                if (NULL != pr_ex) {
                    pr_ex->harray[pr_ex->hsize++] = copy->fd;
                }
        }
    }
    PR_DELETE(poll);

    return npds;
out_of_memory:
    PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0);
    return -1;

#endif /* !defined(NEED_SELECT) */

}