2 * Dolda Connect - Modular multiuser Direct Connect-style client
3 * Copyright (C) 2004 Fredrik Tolf <fredrik@dolda2000.com>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 * Note: This code is still ugly, since I copied it almost verbatim
22 * from the daemon's parser. It would need serious cleanups, but at
23 * least it works for now.
38 #include <sys/socket.h>
39 #include <netinet/in.h>
40 #include <arpa/inet.h>
47 #include <arpa/nameser.h>
51 #include <doldaconnect/uilib.h>
54 #define DOLCON_SRV_NAME "_dolcon._tcp"
65 struct respclass *next;
75 struct respclass *classes;
85 int (*callback)(struct dc_response *resp);
89 void dc_uimisc_disconnected(void);
91 /* The first command must be the nameless connect command and second
92 * the notification command. */
93 static struct command *commands = NULL;
94 static struct qcmd *queue = NULL, *queueend = NULL;
95 static struct dc_response *respqueue = NULL, *respqueueend = NULL;
96 static int state = -1;
98 static iconv_t ichandle;
99 static int resetreader = 1;
100 static struct addrinfo *hostlist = NULL, *curhost = NULL;
108 static void message(int bits, char *format, ...)
117 if((v = getenv("LIBDCUI_MSG")) != NULL)
118 hb = strtol(v, NULL, 0) & 65535;
122 va_start(args, format);
123 vfprintf(stderr, format, args);
128 static char *formataddress(struct sockaddr *arg, socklen_t arglen)
130 struct sockaddr_in *ipv4;
132 struct sockaddr_in6 *ipv6;
134 static char *ret = NULL;
140 switch(arg->sa_family)
143 ret = sprintf2("Unix socket (%s)", ((struct sockaddr_un *)arg)->sun_path);
146 ipv4 = (struct sockaddr_in *)arg;
147 if(inet_ntop(AF_INET, &ipv4->sin_addr, buf, sizeof(buf)) == NULL)
149 ret = sprintf2("%s:%i", buf, (int)ntohs(ipv4->sin_port));
153 ipv6 = (struct sockaddr_in6 *)arg;
154 if(inet_ntop(AF_INET6, &ipv6->sin6_addr, buf, sizeof(buf)) == NULL)
156 ret = sprintf2("[%s]:%i", buf, (int)ntohs(ipv6->sin6_port));
160 errno = EPFNOSUPPORT;
165 static struct dc_response *makeresp(void)
167 struct dc_response *new;
169 new = smalloc(sizeof(*new));
182 static void freeqcmd(struct qcmd *qcmd)
184 if(qcmd->buf != NULL)
189 static void unlinkqueue(void)
193 if((qcmd = queue) == NULL)
201 static struct qcmd *makeqcmd(wchar_t *name)
211 for(cmd = commands; cmd != NULL; cmd = cmd->next)
213 if((cmd->name != NULL) && !wcscmp(cmd->name, name))
217 errno = ENOSYS; /* Bleh */
221 new = smalloc(sizeof(*new));
226 new->callback = NULL;
231 queue = queueend = new;
233 queueend->next = new;
239 static wchar_t *quoteword(wchar_t *word)
241 wchar_t *wp, *buf, *bp;
251 for(wp = word; *wp != L'\0'; wp++)
253 if(!dq && iswspace(*wp))
255 if((*wp == L'\\') || (*wp == L'\"'))
262 bp = buf = smalloc(sizeof(wchar_t) * (numc + numbs + (dq?2:0) + 1));
265 for(wp = word; *wp != L'\0'; wp++)
267 if((*wp == L'\\') || (*wp == L'\"'))
277 static struct command *makecmd(wchar_t *name)
281 new = smalloc(sizeof(*new));
284 new->next = commands;
289 static struct respclass *addresp(struct command *cmd, int code, ...)
291 struct respclass *new;
296 va_start(args, code);
298 while((resps[i++] = va_arg(args, int)) != RESP_END);
301 new = smalloc(sizeof(*new));
306 new->wordt = smalloc(sizeof(int) * i);
307 memcpy(new->wordt, resps, sizeof(int) * i);
311 new->next = cmd->classes;
316 #include "initcmds.h"
320 if((ichandle = iconv_open("wchar_t", "utf-8")) == (iconv_t)-1)
322 dc_srv_local = sstrdup("");
327 void dc_cleanup(void)
329 iconv_close(ichandle);
332 void dc_disconnect(void)
334 struct dc_response *resp;
342 while((resp = dc_getresp()) != NULL)
344 dc_uimisc_disconnected();
345 if(servinfo.hostname != NULL)
346 free(servinfo.hostname);
347 memset(&servinfo, 0, sizeof(servinfo));
350 void dc_freeresp(struct dc_response *resp)
354 for(i = 0; i < resp->numlines; i++)
356 for(o = 0; o < resp->rlines[i].argc; o++)
357 free(resp->rlines[i].argv[o]);
358 free(resp->rlines[i].argv);
364 struct dc_response *dc_getresp(void)
366 struct dc_response *ret;
368 if((ret = respqueue) == NULL)
370 respqueue = ret->next;
371 if(respqueue == NULL)
374 respqueue->prev = NULL;
378 struct dc_response *dc_gettaggedresp(int tag)
380 struct dc_response *resp;
382 for(resp = respqueue; resp != NULL; resp = resp->next)
386 if(resp->prev != NULL)
387 resp->prev->next = resp->next;
388 if(resp->next != NULL)
389 resp->next->prev = resp->prev;
390 if(resp == respqueue)
391 respqueue = resp->next;
392 if(resp == respqueueend)
393 respqueueend = resp->prev;
400 struct dc_response *dc_gettaggedrespsync(int tag)
403 struct dc_response *resp;
405 while((resp = dc_gettaggedresp(tag)) == NULL)
410 pfd.events |= POLLOUT;
411 if(poll(&pfd, 1, -1) < 0)
413 if((pfd.revents & POLLIN) && dc_handleread())
415 if((pfd.revents & POLLOUT) && dc_handlewrite())
421 int dc_wantwrite(void)
426 if((queue != NULL) && (queue->buflen > 0))
433 int dc_getstate(void)
438 int dc_queuecmd(int (*callback)(struct dc_response *), void *data, ...)
446 wchar_t *part, *tpart;
447 size_t bufsize, bufdata;
450 bufsize = bufdata = 0;
453 while((part = va_arg(al, wchar_t *)) != NULL)
455 if(!wcscmp(part, L"%a"))
457 for(toks = va_arg(al, wchar_t **); *toks != NULL; toks++)
461 if((tpart = quoteword(part)) != NULL)
467 bufcat(buf, part, wcslen(part));
476 if(!wcscmp(tpart, L"i"))
479 part = swprintf2(L"%i", va_arg(al, int));
480 } else if(!wcscmp(tpart, L"li")) {
482 part = swprintf2(L"%ji", (intmax_t)va_arg(al, dc_lnum_t));
483 } else if(!wcscmp(tpart, L"s")) {
485 part = icmbstowcs(sarg = va_arg(al, char *), NULL);
492 } else if(!wcscmp(tpart, L"ls")) {
494 part = va_arg(al, wchar_t *);
495 } else if(!wcscmp(tpart, L"ll")) {
497 part = swprintf2(L"%lli", va_arg(al, long long));
498 } else if(!wcscmp(tpart, L"f")) {
500 part = swprintf2(L"%f", va_arg(al, double));
501 } else if(!wcscmp(tpart, L"x")) {
503 part = swprintf2(L"%x", va_arg(al, int));
513 if((tpart = quoteword(part)) != NULL)
524 if((qcmd = makeqcmd(part)) == NULL)
532 qcmd->callback = callback;
536 bufcat(buf, part, wcslen(part));
542 bufcat(buf, L"\r\n\0", 3);
543 if((final = icwcstombs(buf, "utf-8")) == NULL)
551 qcmd->buflen = strlen(final);
555 int dc_handleread(void)
562 /* Ewww... this really is soo ugly. I need to clean this up some day. */
563 static int pstate = 0;
564 static char inbuf[128];
565 static size_t inbufdata = 0;
566 static wchar_t *cbuf = NULL;
567 static size_t cbufsize = 0, cbufdata = 0;
568 static wchar_t *pptr = NULL;
569 static wchar_t **argv = NULL;
571 static size_t args = 0;
572 static wchar_t *cw = NULL;
573 static size_t cwsize = 0, cwdata = 0;
574 static struct dc_response *curresp = NULL;
576 static int unlink = 0;
583 optlen = sizeof(ret);
584 getsockopt(fd, SOL_SOCKET, SO_ERROR, &ret, &optlen);
589 message(2, "could not connect to %s: %s\n", formataddress(curhost->ai_addr, curhost->ai_addrlen), strerror(ret));
590 for(curhost = curhost->ai_next; curhost != NULL; curhost = curhost->ai_next)
592 if((newfd = socket(curhost->ai_family, curhost->ai_socktype, curhost->ai_protocol)) < 0)
601 fcntl(fd, F_SETFL, fcntl(fd, F_GETFL) | O_NONBLOCK);
602 message(4, "connecting to %s\n", formataddress(curhost->ai_addr, curhost->ai_addrlen));
603 if(connect(fd, (struct sockaddr *)curhost->ai_addr, curhost->ai_addrlen))
605 if(errno == EINPROGRESS)
607 message(2, "could not connect to %s: %s\n", formataddress(curhost->ai_addr, curhost->ai_addrlen), strerror(ret));
619 if(curhost->ai_canonname != NULL)
620 servinfo.hostname = sstrdup(curhost->ai_canonname);
621 servinfo.family = curhost->ai_family;
635 dc_freeresp(curresp);
640 ret = read(fd, inbuf + inbufdata, 128 - inbufdata);
643 if((errno == EAGAIN) || (errno == EINTR))
649 } else if(ret == 0) {
658 if(cbufsize == cbufdata)
662 if((cbuf = realloc(cbuf, sizeof(wchar_t) * (cbufsize += 256))) == NULL)
672 p2 = (char *)(cbuf + cbufdata);
673 len = sizeof(wchar_t) * (cbufsize - cbufdata);
674 ret = iconv(ichandle, &p1, &inbufdata, &p2, &len);
675 memmove(inbuf, p1, inbufdata);
676 cbufdata = cbufsize - (len / sizeof(wchar_t));
682 /* XXX Is this really OK? */
704 while(!done && (pptr - cbuf < cbufdata))
713 if(pptr == cbuf + cbufdata - 1)
718 if(*(++pptr) == L'\n')
722 curresp = makeresp();
723 if((argc > 0) && ((curresp->code = wcstol(argv[0], NULL, 10)) >= 600))
725 curresp->cmdname = L".notify";
726 curresp->internal = commands->next;
730 if((curresp->cmdname = queue->cmd->name) == NULL)
731 curresp->cmdname = L".connect";
732 curresp->data = queue->data;
733 curresp->tag = queue->tag;
734 curresp->internal = (void *)(queue->cmd);
738 sizebuf(&curresp->rlines, &curresp->linessize, curresp->numlines + 1, sizeof(*(curresp->rlines)), 1);
739 curresp->rlines[curresp->numlines].argc = argc;
740 curresp->rlines[curresp->numlines].argv = argv;
746 if((curresp->code >= 600) || (queue == NULL) || (queue->callback == NULL))
749 ret = queue->callback(curresp);
752 if(respqueue == NULL)
754 respqueue = respqueueend = curresp;
756 curresp->next = NULL;
757 curresp->prev = respqueueend;
758 respqueueend->next = curresp;
759 respqueueend = curresp;
761 } else if(ret == 1) {
762 dc_freeresp(curresp);
768 wmemmove(cbuf, pptr, cbufdata -= (pptr - cbuf));
782 if(iswspace(*pptr) || ((argc == 0) && (*pptr == L'-')))
795 sizebuf(&argv, &args, argc + 1, sizeof(*argv), 1);
800 } else if(*pptr == L'\"') {
803 } else if(*pptr == L'\\') {
804 if(pptr == cbuf + cbufdata - 1)
809 addtobuf(cw, *(++pptr));
812 addtobuf(cw, *(pptr++));
819 } else if(*pptr == L'\\') {
820 addtobuf(cw, *(++pptr));
833 #if UNIX_AUTH_STYLE == 1
834 static void mkcreds(struct msghdr *msg)
837 static char buf[CMSG_SPACE(sizeof(*ucred))];
838 struct cmsghdr *cmsg;
840 msg->msg_control = buf;
841 msg->msg_controllen = sizeof(buf);
842 cmsg = CMSG_FIRSTHDR(msg);
843 cmsg->cmsg_level = SOL_SOCKET;
844 cmsg->cmsg_type = SCM_CREDENTIALS;
845 cmsg->cmsg_len = CMSG_LEN(sizeof(*ucred));
846 ucred = (struct ucred *)CMSG_DATA(cmsg);
847 ucred->pid = getpid();
848 ucred->uid = getuid();
849 ucred->gid = getgid();
850 msg->msg_controllen = cmsg->cmsg_len;
854 int dc_handlewrite(void)
864 if(queue->buflen > 0)
866 memset(&msg, 0, sizeof(msg));
867 msg.msg_iov = &bufvec;
869 bufvec.iov_base = queue->buf;
870 bufvec.iov_len = queue->buflen;
871 #if UNIX_AUTH_STYLE == 1
872 if((servinfo.family == PF_UNIX) && !servinfo.sentcreds)
875 servinfo.sentcreds = 1;
878 ret = sendmsg(fd, &msg, MSG_NOSIGNAL | MSG_DONTWAIT);
881 if((errno == EAGAIN) || (errno == EINTR))
889 memmove(queue->buf, queue->buf + ret, queue->buflen -= ret);
898 * It kind of sucks that libresolv doesn't have any DNS parsing
899 * routines. We'll have to do it manually.
901 static char *readname(unsigned char *msg, unsigned char *eom, unsigned char **p)
905 size_t namesize, namedata, len;
908 namesize = namedata = 0;
916 } else if(len == 0xc0) {
917 tp = msg + *((*p)++);
918 if((tname = readname(msg, eom, &tp)) == NULL)
924 bufcat(name, tname, strlen(tname));
928 } else if(*p + len >= eom) {
933 bufcat(name, *p, len);
939 static int skipname(unsigned char *msg, unsigned char *eom, unsigned char **p)
949 } else if(len == 0xc0) {
952 } else if(*p + len >= eom) {
959 static int getsrvrr(char *name, char **host, int *port)
962 char *name2, *rrname;
963 unsigned char *eom, *p;
964 unsigned char buf[1024];
965 int flags, num, class, type;
969 if(!(_res.options & RES_INIT))
974 /* res_querydomain doesn't work for some reason */
975 if(name[strlen(name) - 1] == '.')
976 name2 = sprintf2("%s.%s", DOLCON_SRV_NAME, name);
978 name2 = sprintf2("%s.%s.", DOLCON_SRV_NAME, name);
979 ret = res_query(name2, C_IN, T_SRV, buf, sizeof(buf));
987 * Assume transaction ID is correct.
989 * Flags check: FA0F masks in request/response flag, opcode,
990 * truncated flag and status code, and ignores authoritativeness,
991 * recursion flags and DNSSEC and reserved bits.
993 flags = (buf[2] << 8) + buf[3];
994 if((flags & 0xfa0f) != 0x8000)
999 /* Skip the query entries */
1000 num = (buf[4] << 8) + buf[5];
1002 for(i = 0; i < num; i++)
1004 if(skipname(buf, eom, &p))
1009 p += 4; /* Type and class */
1012 num = (buf[6] << 8) + buf[7];
1013 for(i = 0; i < num; i++)
1015 if((rrname = readname(buf, eom, &p)) == NULL)
1022 class = *(p++) << 8;
1027 if((class == C_IN) && (type == T_SRV) && !strcmp(rrname, name2))
1031 /* Noone will want to have alternative DC servers, so
1032 * don't care about priority and weigth */
1038 *port = *(p++) << 8;
1043 if((rrname = readname(buf, eom, &p)) == NULL)
1056 static int getsrvrr(char *name, char **host, int *port)
1063 static struct addrinfo *gaicat(struct addrinfo *l1, struct addrinfo *l2)
1069 for(p = l1; p->ai_next != NULL; p = p->ai_next);
1074 /* This isn't actually correct, in any sense of the word. It only
1075 * works on systems whose getaddrinfo implementation saves the
1076 * sockaddr in the same malloc block as the struct addrinfo. Those
1077 * systems include at least FreeBSD and glibc-based systems, though,
1078 * so it should not be any immediate threat, and it allows me to not
1079 * implement a getaddrinfo wrapper. It can always be changed, should
1080 * the need arise. */
1081 static struct addrinfo *unixgai(int type, char *path)
1084 struct addrinfo *ai;
1085 struct sockaddr_un *un;
1087 buf = smalloc(sizeof(*ai) + sizeof(*un));
1088 memset(buf, 0, sizeof(*ai) + sizeof(*un));
1089 ai = (struct addrinfo *)buf;
1090 un = (struct sockaddr_un *)(buf + sizeof(*ai));
1092 ai->ai_family = AF_UNIX;
1093 ai->ai_socktype = type;
1094 ai->ai_protocol = 0;
1095 ai->ai_addrlen = sizeof(*un);
1096 ai->ai_addr = (struct sockaddr *)un;
1097 ai->ai_canonname = NULL;
1099 un->sun_family = PF_UNIX;
1100 strncpy(un->sun_path, path, sizeof(un->sun_path) - 1);
1104 static struct addrinfo *resolvtcp(char *name, int port)
1106 struct addrinfo hint, *ret;
1109 memset(&hint, 0, sizeof(hint));
1110 hint.ai_socktype = SOCK_STREAM;
1111 hint.ai_flags = AI_NUMERICSERV | AI_CANONNAME;
1112 snprintf(tmp, sizeof(tmp), "%i", port);
1113 if(!getaddrinfo(name, tmp, &hint, &ret))
1118 static struct addrinfo *resolvsrv(char *name)
1120 struct addrinfo *ret;
1124 if(getsrvrr(name, &realname, &port))
1126 message(4, "SRV RR resolved: %s -> %s\n", name, realname);
1127 ret = resolvtcp(realname, port);
1132 static struct addrinfo *resolvhost(char *host)
1135 struct addrinfo *ret;
1138 if(strchr(host, '/'))
1139 return(unixgai(SOCK_STREAM, host));
1140 if((strchr(host, ':') == NULL) && ((ret = resolvsrv(host)) != NULL))
1143 if((*host == '[') && ((p = strchr(host, ']')) != NULL))
1145 hp = memcpy(smalloc(p - host), host + 1, (p - host) - 1);
1146 hp[(p - host) - 1] = 0;
1147 if(strchr(hp, ':') != NULL) {
1153 ret = resolvtcp(hp, port);
1161 if((p = strrchr(hp, ':')) != NULL) {
1167 ret = resolvtcp(hp, port);
1174 static struct addrinfo *getlocalai(void)
1176 struct addrinfo *ret;
1181 if((getuid() != 0) && ((pwd = getpwuid(getuid())) != NULL))
1183 tmp = sprintf2("/tmp/doldacond-%s", pwd->pw_name);
1184 ret = unixgai(SOCK_STREAM, tmp);
1187 ret = gaicat(ret, unixgai(SOCK_STREAM, "/var/run/doldacond.sock"));
1191 static struct addrinfo *defaulthost(void)
1193 struct addrinfo *ret;
1197 if(((tmp = getenv("DCSERVER")) != NULL) && *tmp) {
1198 message(4, "using DCSERVER: %s\n", tmp);
1199 return(resolvhost(tmp));
1202 ret = gaicat(ret, resolvtcp("localhost", 1500));
1203 if(!getdomainname(dn, sizeof(dn)) && *dn && strcmp(dn, "(none)"))
1204 ret = gaicat(ret, resolvsrv(dn));
1208 static int dc_connectai(struct addrinfo *hosts, struct qcmd **cnctcmd)
1216 if(hostlist != NULL)
1217 freeaddrinfo(hostlist);
1219 for(curhost = hostlist; curhost != NULL; curhost = curhost->ai_next)
1221 if((fd = socket(curhost->ai_family, curhost->ai_socktype, curhost->ai_protocol)) < 0)
1224 freeaddrinfo(hostlist);
1229 fcntl(fd, F_SETFL, fcntl(fd, F_GETFL) | O_NONBLOCK);
1230 message(4, "connecting to %s\n", formataddress(curhost->ai_addr, curhost->ai_addrlen));
1231 if(connect(fd, (struct sockaddr *)curhost->ai_addr, curhost->ai_addrlen))
1233 if(errno == EINPROGRESS)
1238 message(2, "could not connect to %s: %s\n", formataddress(curhost->ai_addr, curhost->ai_addrlen), strerror(errno));
1242 if(curhost->ai_canonname != NULL)
1243 servinfo.hostname = sstrdup(curhost->ai_canonname);
1244 servinfo.family = curhost->ai_family;
1251 qcmd = makeqcmd(NULL);
1262 static int dc_connect2(char *host, struct qcmd **cnctcmd)
1264 struct addrinfo *ai;
1268 if(host == dc_srv_local) {
1269 message(4, "connect start: Unix\n");
1271 } else if(!host || !*host) {
1272 message(4, "connect start: default\n");
1275 message(4, "connect start: host %s\n", host);
1276 ai = resolvhost(host);
1280 ret = dc_connectai(ai, &qcmd);
1281 if((ret >= 0) && (cnctcmd != NULL))
1286 int dc_connect(char *host)
1288 return(dc_connect2(host, NULL));
1291 int dc_connectsync(char *host, struct dc_response **respbuf)
1295 struct dc_response *resp;
1297 if((ret = dc_connect2(host, &cc)) < 0)
1299 resp = dc_gettaggedrespsync(cc->tag);
1311 int dc_connectsync2(char *host, int rev)
1314 struct dc_response *resp;
1316 if((ret = dc_connectsync(host, &resp)) < 0)
1318 if(dc_checkprotocol(resp, rev))
1322 errno = EPROTONOSUPPORT;
1329 struct dc_intresp *dc_interpret(struct dc_response *resp)
1332 struct dc_intresp *iresp;
1333 struct command *cmd;
1334 struct respclass *cls;
1338 if((resp->numlines == 0) || (resp->rlines[0].argc == 0) || (resp->curline >= resp->numlines))
1340 code = wcstol(resp->rlines[0].argv[0], NULL, 10);
1341 cmd = (struct command *)(resp->internal);
1342 for(cls = cmd->classes; cls != NULL; cls = cls->next)
1344 if(cls->code == code)
1349 if(cls->nwords >= resp->rlines[resp->curline].argc)
1351 iresp = smalloc(sizeof(*iresp));
1356 for(i = 0; i < cls->nwords; i++)
1358 switch(cls->wordt[i])
1363 sizebuf(&(iresp->argv), &args, iresp->argc + 1, sizeof(*(iresp->argv)), 1);
1364 iresp->argv[iresp->argc].val.str = swcsdup(resp->rlines[resp->curline].argv[i + 1]);
1365 iresp->argv[iresp->argc].type = cls->wordt[i];
1369 sizebuf(&(iresp->argv), &args, iresp->argc + 1, sizeof(*(iresp->argv)), 1);
1370 iresp->argv[iresp->argc].val.num = wcstol(resp->rlines[resp->curline].argv[i + 1], NULL, 0);
1371 iresp->argv[iresp->argc].type = cls->wordt[i];
1375 sizebuf(&(iresp->argv), &args, iresp->argc + 1, sizeof(*(iresp->argv)), 1);
1376 iresp->argv[iresp->argc].val.flnum = wcstod(resp->rlines[resp->curline].argv[i + 1], NULL);
1377 iresp->argv[iresp->argc].type = cls->wordt[i];
1381 sizebuf(&(iresp->argv), &args, iresp->argc + 1, sizeof(*(iresp->argv)), 1);
1382 iresp->argv[iresp->argc].val.lnum = wcstoll(resp->rlines[resp->curline].argv[i + 1], NULL, 0);
1383 iresp->argv[iresp->argc].type = cls->wordt[i];
1392 void dc_freeires(struct dc_intresp *ires)
1396 for(i = 0; i < ires->argc; i++)
1398 if(ires->argv[i].type == RESP_STR)
1399 free(ires->argv[i].val.str);
1405 int dc_checkprotocol(struct dc_response *resp, int revision)
1407 struct dc_intresp *ires;
1410 if(resp->code != 201)
1413 if((ires = dc_interpret(resp)) == NULL)
1415 low = ires->argv[0].val.num;
1416 high = ires->argv[1].val.num;
1418 if((revision < low) || (revision > high))
1423 const char *dc_gethostname(void)
1425 return(servinfo.hostname);