Code:
/ DotNET / DotNET / 8.0 / untmp / whidbey / REDBITS / ndp / fx / src / Net / System / Net / ServicePoint.cs / 1 / ServicePoint.cs
//------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- namespace System.Net { using System.Net.Sockets; using System.Net.NetworkInformation; using System.Collections; using System.IO; using System.Threading; using System.Security.Permissions; using System.Security.Cryptography.X509Certificates; using System.ComponentModel; using System.Runtime.InteropServices; using System.Net.Security; using System.Globalization; public delegate IPEndPoint BindIPEndPoint(ServicePoint servicePoint, IPEndPoint remoteEndPoint, int retryCount); // ServicePoints are never created directly but always handed out by the // ServicePointManager. The ServicePointManager and the ServicePoints must be in // the same name space so that the ServicePointManager can call the // internal constructor ////// public class ServicePoint { internal const int LoopbackConnectionLimit = Int32.MaxValue; private int m_ConnectionLeaseTimeout; private TimerThread.Queue m_ConnectionLeaseTimerQueue; private bool m_ProxyServicePoint; private bool m_UserChangedLimit; private bool m_UseNagleAlgorithm; private TriState m_HostLoopbackGuess; private int m_ReceiveBufferSize; private bool m_Expect100Continue; private bool m_Understands100Continue; private HttpBehaviour m_HttpBehaviour; private string m_LookupString; private int m_ConnectionLimit; private Hashtable m_ConnectionGroupList; private Uri m_Address; private string m_Host; private int m_Port; private TimerThread.Queue m_IdlingQueue; private TimerThread.Timer m_ExpiringTimer; private DateTime m_IdleSince; private string m_ConnectionName; private int m_CurrentConnections; private bool m_HostMode; private BindIPEndPoint m_BindIPEndPointDelegate = null; private static readonly AsyncCallback m_ConnectCallbackDelegate = new AsyncCallback(ConnectSocketCallback); #if !FEATURE_PAL private object m_ServerCertificateOrBytes; private object m_ClientCertificateOrBytes; #endif // !FEATURE_PAL internal string LookupString { get { return m_LookupString; } } internal string Hostname { get { return m_HostName; } } public BindIPEndPoint BindIPEndPointDelegate { get { return m_BindIPEndPointDelegate; } set { ExceptionHelper.InfrastructurePermission.Demand(); m_BindIPEndPointDelegate = value; } } // // constructors // internal ServicePoint(Uri address, TimerThread.Queue defaultIdlingQueue, int defaultConnectionLimit, string lookupString, bool userChangedLimit, bool proxyServicePoint) { GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::.ctor(" + lookupString+")"); m_ProxyServicePoint = proxyServicePoint; m_Address = address; m_ConnectionName = address.Scheme; m_Host = address.DnsSafeHost; m_Port = address.Port; m_IdlingQueue = defaultIdlingQueue; m_ConnectionLimit = defaultConnectionLimit; m_HostLoopbackGuess = TriState.Unspecified; m_LookupString = lookupString; m_UserChangedLimit = userChangedLimit; m_UseNagleAlgorithm = ServicePointManager.UseNagleAlgorithm; m_Expect100Continue = ServicePointManager.Expect100Continue; m_ConnectionGroupList = new Hashtable(10); m_ConnectionLeaseTimeout = System.Threading.Timeout.Infinite; m_ReceiveBufferSize = -1; // it would be safer to make sure the server is 1.1 // but assume it is at the beginning, and update it later m_Understands100Continue = true; m_HttpBehaviour = HttpBehaviour.Unknown; // upon creation, the service point should be idle, by default m_IdleSince = DateTime.Now; m_ExpiringTimer = m_IdlingQueue.CreateTimer(ServicePointManager.IdleServicePointTimeoutDelegate, this); } internal ServicePoint(string host, int port, TimerThread.Queue defaultIdlingQueue, int defaultConnectionLimit, string lookupString, bool userChangedLimit, bool proxyServicePoint) { GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::.ctor(" + lookupString+")"); m_ProxyServicePoint = proxyServicePoint; m_ConnectionName = "ByHost:"+host+":"+port.ToString(CultureInfo.InvariantCulture); m_IdlingQueue = defaultIdlingQueue; m_ConnectionLimit = defaultConnectionLimit; m_HostLoopbackGuess = TriState.Unspecified; m_LookupString = lookupString; m_UserChangedLimit = userChangedLimit; m_ConnectionGroupList = new Hashtable(10); m_ConnectionLeaseTimeout = System.Threading.Timeout.Infinite; m_ReceiveBufferSize = -1; m_Host = host; m_Port = port; m_HostMode = true; // upon creation, the service point should be idle, by default m_IdleSince = DateTime.Now; m_ExpiringTimer = m_IdlingQueue.CreateTimer(ServicePointManager.IdleServicePointTimeoutDelegate, this); } // methods /*++ FindConnectionGroup - Searches for the a Group object that actually holds the connections that we want to peak at. Input: request - Request that's being submitted. connName - Connection Name if needed Returns: ConnectionGroup --*/ private ConnectionGroup FindConnectionGroup(string connName, bool dontCreate) { string lookupStr = ConnectionGroup.MakeQueryStr(connName); GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::FindConnectionGroup() lookupStr:[" + ValidationHelper.ToString(connName) + "]"); ConnectionGroup entry = m_ConnectionGroupList[lookupStr] as ConnectionGroup; if (entry==null && !dontCreate) { entry = new ConnectionGroup(this, connName); GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::FindConnectionGroup() adding ConnectionGroup lookupStr:[" + lookupStr + "]"); m_ConnectionGroupList[lookupStr] = entry; } else { GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::FindConnectionGroup() using existing ConnectionGroup"); } GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::FindConnectionGroup() returning ConnectionGroup:" + ValidationHelper.ToString(entry) + (entry!=null ? " ConnLimit:" + entry.ConnectionLimit.ToString() : "")); return entry; } ///Provides connection management for other classes. ////// internal Socket GetConnection(PooledStream PooledStream, object owner, bool async, out IPAddress address, ref Socket abortSocket, ref Socket abortSocket6, int timeout) { Socket socket = null; Socket socket6 = null; Socket finalSocket = null; Exception innerException = null; WebExceptionStatus ws = WebExceptionStatus.ConnectFailure; address = null; // // if we will not create a tunnel through a proxy then create // and connect the socket we will use for the connection // // // IPv6 Support: If IPv6 is enabled, then we create a second socket that ServicePoint // will use if it wants to connect via IPv6. // if ( Socket.SupportsIPv4 ) { socket = new Socket(AddressFamily.InterNetwork,SocketType.Stream,ProtocolType.Tcp); } if ( Socket.OSSupportsIPv6 ) { socket6 = new Socket(AddressFamily.InterNetworkV6,SocketType.Stream,ProtocolType.Tcp); } abortSocket = socket; abortSocket6 = socket6; // // Setup socket timeouts for sync requests // // ConnectSocketState state = null; if (async) { state = new ConnectSocketState(this, PooledStream, owner, socket, socket6); } ws = ConnectSocket(socket,socket6,ref finalSocket, ref address, state, timeout, out innerException); if (ws == WebExceptionStatus.Pending) { return null; } if (ws != WebExceptionStatus.Success) { throw new WebException( NetRes.GetWebStatusString(ws), ws == WebExceptionStatus.ProxyNameResolutionFailure || ws == WebExceptionStatus.NameResolutionFailure ? Host : null, innerException, ws, null, /* no response */ WebExceptionInternalStatus.ServicePointFatal); } // // There should be no means for socket to be null at this // point, but the damage is greater if we just carry on // without ensuring that it's good. // if ( finalSocket == null ) { throw new IOException(SR.GetString(SR.net_io_transportfailure)); } CompleteGetConnection(socket, socket6, finalSocket, address); return finalSocket; } ////// Tempory for getting a new Connection for FTP client, for the time being /// ////// private void CompleteGetConnection(Socket socket, Socket socket6, Socket finalSocket, IPAddress address) { // // Decide which socket to retain // if ( finalSocket.AddressFamily == AddressFamily.InterNetwork ) { if ( socket6 != null ) { socket6.Close(); socket6 = null; } } else { if (socket != null) { socket.Close(); socket = null; } } // make this configurable from the user: if (!UseNagleAlgorithm) { finalSocket.SetSocketOption(SocketOptionLevel.Tcp, SocketOptionName.NoDelay, 1); } if (ReceiveBufferSize != -1) { finalSocket.SetSocketOption(SocketOptionLevel.Socket, SocketOptionName.ReceiveBuffer, ReceiveBufferSize); } //return CreateConnection(NetworkStream stream, IPAddress address); //return new NetworkStream(finalSocket, true); } /*++ SubmitRequest - Submit a request for sending. The service point submit handler. This is called when a request needs to be submitted to the network. This routine is asynchronous; the caller passes in an HttpSubmitDelegate that is invoked when the caller can use the underlying network. The delegate is invoked with the stream that it can write to. In this version, we use HttpWebRequest. In the future we use IRequest Input: Request - Request that's being submitted. SubmitDelegate - Delegate to be invoked. Returns: Nothing. --*/ internal virtual void SubmitRequest(HttpWebRequest request) { SubmitRequest(request, null); } // userReqeustThread says whether we can post IO from this thread or not. internal void SubmitRequest(HttpWebRequest request, string connName) { // // We attempt to locate a free connection sitting on our list // avoiding multiple loops of the same the list. // We do this, by enumerating the list of the connections, // looking for Free items, and the least busy item // Connection connToUse; ConnectionGroup connGroup; lock(this) { GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::SubmitRequest() Finding ConnectionGroup:[" + connName + "]"); connGroup = FindConnectionGroup(connName, false); GlobalLog.Assert(connGroup != null, "ServicePoint#{0}::SubmitRequest()|connGroup == null", ValidationHelper.HashString(this)); } do { connToUse = connGroup.FindConnection(request, connName); // The request could be already aborted if (connToUse == null) return; GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::SubmitRequest() Using Connection#" + ValidationHelper.HashString(connToUse)); // finally sumbit delegate if (connToUse.SubmitRequest(request)) { break; } } while (true); } // properties ////// Complete the GetConnection(...) call, the function was divided for async completion /// ////// public int ConnectionLeaseTimeout { get { return m_ConnectionLeaseTimeout; } set { if ( !ValidationHelper.ValidateRange(value, Timeout.Infinite, Int32.MaxValue)) { throw new ArgumentOutOfRangeException("value"); } if (value != m_ConnectionLeaseTimeout) { m_ConnectionLeaseTimeout = value; m_ConnectionLeaseTimerQueue = null; } } } ////// Gets and sets timeout for when connections should be recycled. /// ////// internal TimerThread.Queue ConnectionLeaseTimerQueue { get { TimerThread.Queue queue = m_ConnectionLeaseTimerQueue; if (queue == null) { queue = TimerThread.GetOrCreateQueue(ConnectionLeaseTimeout); m_ConnectionLeaseTimerQueue = queue; } return m_ConnectionLeaseTimerQueue; } } // Only the scheme and hostport, for example http://www.microsoft.com ///Returns a timer queue that can be used internally to create timers of /// ConnectionLeaseTimeout duration. ////// public Uri Address { get { if(m_HostMode){ throw new NotSupportedException(SR.GetString(SR.net_servicePointAddressNotSupportedInHostMode)); } // Don't let low-trust apps discover the proxy information. if (m_ProxyServicePoint) { ExceptionHelper.WebPermissionUnrestricted.Demand(); } return m_Address; } } internal Uri InternalAddress { get { GlobalLog.Assert(!m_HostMode, "ServicePoint#{0}::InternalAddress|Can't be used in Host Mode.", ValidationHelper.HashString(this)); return m_Address; } } internal string Host { get { if(m_HostMode){ return m_Host; } return m_Address.Host; } } internal int Port { get { return m_Port; } } // // Gets or sets the maximum idle time allowed for connections of this ServicePoint and then for ServicePoint itself // Default value coming in ctor is ServicePointManager.s_MaxServicePointIdleTime which 100 sec // public int MaxIdleTime { get { return m_IdlingQueue.Duration; } set { if ( !ValidationHelper.ValidateRange(value, Timeout.Infinite, Int32.MaxValue)) { throw new ArgumentOutOfRangeException("value"); } // Already set? if (value == m_IdlingQueue.Duration) return; lock(this) { // Make sure we can cancel the existing one. If not, we already idled out. if (m_ExpiringTimer == null || m_ExpiringTimer.Cancel()) { m_IdlingQueue = TimerThread.GetOrCreateQueue(value); if (m_ExpiringTimer != null) { // Need to create a one-off timer for the remaining period. double elapsedDouble = (DateTime.Now - m_IdleSince).TotalMilliseconds; int elapsed = elapsedDouble >= (double) Int32.MaxValue ? Int32.MaxValue : (int) elapsedDouble; int timeLeft = value == Timeout.Infinite ? Timeout.Infinite : elapsed >= value ? 0 : value - elapsed; m_ExpiringTimer = TimerThread.CreateQueue(timeLeft).CreateTimer(ServicePointManager.IdleServicePointTimeoutDelegate, this); } } } } } ////// Gets the Uniform Resource Identifier of the ///. /// /// public bool UseNagleAlgorithm { get { return m_UseNagleAlgorithm; } set { m_UseNagleAlgorithm = value; } } ////// Gets or sets the Nagling algorithm on the connections that are created to this ///. /// Changing this value does not affect existing connections but only to new ones that are created from that moment on. /// /// public int ReceiveBufferSize { get { return m_ReceiveBufferSize; } set { if ( !ValidationHelper.ValidateRange(value, -1, Int32.MaxValue)) { throw new ArgumentOutOfRangeException("value"); } m_ReceiveBufferSize = value; } } ////// Gets and sets the socket's receive buffer size. /// ////// public bool Expect100Continue { set { m_Expect100Continue = value; } get { return m_Expect100Continue; } } ////// Gets or sets indication whether 100-continue behaviour is desired when using this ///. /// Changing this value does not affect existing connections but only to new ones that are created from that moment on. /// /// public DateTime IdleSince { get { return m_IdleSince; } } // HTTP Server Version ////// Gets the date/time that the ///went idle. /// /// public virtual Version ProtocolVersion { get { return (m_HttpBehaviour>HttpBehaviour.HTTP10 || m_HttpBehaviour == HttpBehaviour.Unknown) ? HttpVersion.Version11 : HttpVersion.Version10; } } // Contains set accessor for Version property. Version is a read-only // property at the API internal HttpBehaviour HttpBehaviour { get { return m_HttpBehaviour; } set { m_HttpBehaviour = value; // // if version is greater than HTTP/1.1, and server undesrtood // 100 Continue so far, keep expecting it. // m_Understands100Continue = m_Understands100Continue && (m_HttpBehaviour>HttpBehaviour.HTTP10 || m_HttpBehaviour == HttpBehaviour.Unknown); } } ////// The version of the protocol being used on this ///. /// /// public string ConnectionName { get { return m_ConnectionName; } } /* ////// Gets the connection name established by the ///that created the connection. /// /// Gets the connection mode in use by the internal ConnectionModes ConnectionMode { get { return m_HttpBehaviour>=HttpBehaviour.HTTP11 ? ConnectionModes.Pipeline : ConnectionModes.Persistent; } } */ ///. One of the /// values. /// /// Removes the specified Connection group from the ServicePoint, destroys safe and unsafe groups, but not internal. /// public bool CloseConnectionGroup(string connectionGroupName) { GlobalLog.Enter("ServicePoint#" + ValidationHelper.HashString(this) + "::CloseConnectionGroup() lookupStr:[" + connectionGroupName + "]"); if ( ReleaseConnectionGroup(HttpWebRequest.GenerateConnectionGroup(connectionGroupName, false, false).ToString()) || ReleaseConnectionGroup(HttpWebRequest.GenerateConnectionGroup(connectionGroupName, true, false).ToString()) || ConnectionPoolManager.RemoveConnectionPool(this, connectionGroupName)) { GlobalLog.Leave("ServicePoint#" + ValidationHelper.HashString(this) + "::CloseConnectionGroup()","true"); return true; } GlobalLog.Leave("ServicePoint#" + ValidationHelper.HashString(this) + "::CloseConnectionGroup()","false"); return false; } ////// public int ConnectionLimit { get { // If there hasn't been a DNS resolution yet, make a guess based on the host name. It might change // when DNS is finally done, but that's ok. It can change anyway based on other factors like redirects. if (!m_UserChangedLimit && m_IPAddressInfoList == null && m_HostLoopbackGuess == TriState.Unspecified) { // This can only happen the first time through, and before any ConnectionGroups are made. lock (this) { if (!m_UserChangedLimit && m_IPAddressInfoList == null && m_HostLoopbackGuess == TriState.Unspecified) { // First check if it's just an IP address anyway. IPAddress addr = null; if (IPAddress.TryParse(m_Host,out addr)) { m_HostLoopbackGuess = IsAddressListLoopback(new IPAddress[] { addr }) ? TriState.True : TriState.False; } else { m_HostLoopbackGuess = NclUtilities.GuessWhetherHostIsLoopback(m_Host) ? TriState.True : TriState.False; } } } } return m_UserChangedLimit || (m_IPAddressInfoList == null ? m_HostLoopbackGuess != TriState.True : !m_IPAddressesAreLoopback) ? m_ConnectionLimit : LoopbackConnectionLimit; } set { if (value <= 0) { throw new ArgumentOutOfRangeException("value"); } if (!m_UserChangedLimit || m_ConnectionLimit != value) { lock (this) { if (!m_UserChangedLimit || m_ConnectionLimit != value) { m_ConnectionLimit = value; m_UserChangedLimit = true; // Don't want to call ResolveConnectionLimit() or ConnectionLimit before setting m_UserChangedLimit // in order to avoid the 'guess' logic in ConnectionLimit. ResolveConnectionLimit(); } } } } } // Must be called under lock. private void ResolveConnectionLimit() { int limit = ConnectionLimit; foreach (ConnectionGroup cg in m_ConnectionGroupList.Values) { cg.ConnectionLimit = limit; } } ////// Gets or sets the maximum number of connections allowed on this ///. /// /// public int CurrentConnections { get { int connections = 0; lock(this) { foreach (ConnectionGroup group in m_ConnectionGroupList.Values) { connections += group.CurrentConnections; } } return connections; } } #if !FEATURE_PAL ////// Gets the current number of connections associated with this /// ///. /// /// public X509Certificate Certificate { get { object chkCert = m_ServerCertificateOrBytes; if (chkCert != null && chkCert.GetType() == typeof(byte[])) return (X509Certificate)(m_ServerCertificateOrBytes = new X509Certificate((byte[]) chkCert)); else return chkCert as X509Certificate; } } internal void UpdateServerCertificate(X509Certificate certificate) { if (certificate != null) m_ServerCertificateOrBytes = certificate.GetRawCertData(); else m_ServerCertificateOrBytes = null; } ////// Gets the certificate received for this ///. /// /// public X509Certificate ClientCertificate { get { object chkCert = m_ClientCertificateOrBytes; if (chkCert != null && chkCert.GetType() == typeof(byte[])) return (X509Certificate)(m_ClientCertificateOrBytes = new X509Certificate((byte[]) chkCert)); else return chkCert as X509Certificate; } } internal void UpdateClientCertificate(X509Certificate certificate) { if (certificate != null) m_ClientCertificateOrBytes = certificate.GetRawCertData(); else m_ClientCertificateOrBytes = null; } #endif // !FEATURE_PAL ////// Gets the Client Certificate sent by us to the Server. /// ////// public bool SupportsPipelining { get { return (m_HttpBehaviour>HttpBehaviour.HTTP10 || m_HttpBehaviour==HttpBehaviour.Unknown); } } // // Internal Properties // internal bool Understands100Continue { set { m_Understands100Continue = value; } get { return m_Understands100Continue; } } // // InternalProxyServicePoint // // Indicates if we are using this service point to represent // a proxy connection, if so we may have to use special // semantics when creating connections // internal bool InternalProxyServicePoint { get { return m_ProxyServicePoint; } } // // IncrementConnection // // call to indicate that we now are starting a new // connection within this service point // internal void IncrementConnection() { GlobalLog.Enter("ServicePoint#" + ValidationHelper.HashString(this) + "::IncrementConnection()", m_CurrentConnections.ToString()); // we need these to be atomic operations lock(this) { m_CurrentConnections++; if (m_CurrentConnections==1) { GlobalLog.Assert(m_ExpiringTimer != null, "ServicePoint#{0}::IncrementConnection|First connection active, but ServicePoint wasn't idle.", ValidationHelper.HashString(this)); // m_ExpiringTimer.Cancel(); m_ExpiringTimer = null; } } GlobalLog.Leave("ServicePoint#" + ValidationHelper.HashString(this) + "::IncrementConnection()", m_CurrentConnections.ToString()); } // // DecrementConnection // // call to indicate that we now are removing // a connection within this connection group // internal void DecrementConnection() { // The timer thread is allowed to call this. (It doesn't call user code and doesn't block.) GlobalLog.ThreadContract(ThreadKinds.Unknown, ThreadKinds.SafeSources | ThreadKinds.Timer, "ServicePoint#" + ValidationHelper.HashString(this) + "::DecrementConnection"); GlobalLog.Enter("ServicePoint#" + ValidationHelper.HashString(this) + "::DecrementConnection()", m_CurrentConnections.ToString()); // we need these to be atomic operations lock(this) { m_CurrentConnections--; if (m_CurrentConnections==0) { GlobalLog.Assert(m_ExpiringTimer == null, "ServicePoint#{0}::DecrementConnection|Expiring timer set on non-idle ServicePoint.", ValidationHelper.HashString(this)); m_IdleSince = DateTime.Now; m_ExpiringTimer = m_IdlingQueue.CreateTimer(ServicePointManager.IdleServicePointTimeoutDelegate, this); } else if ( m_CurrentConnections < 0 ) { m_CurrentConnections = 0; } } GlobalLog.Leave("ServicePoint#" + ValidationHelper.HashString(this) + "::DecrementConnection()", m_CurrentConnections.ToString()); } /* // Consider removing. internal bool UserDefinedLimit { get { return m_UserChangedLimit; } } */ #if !FEATURE_PAL internal RemoteCertValidationCallback SetupHandshakeDoneProcedure(TlsStream secureStream, Object request) { // Use a private adapter to connect tlsstream and this service point return HandshakeDoneProcedure.CreateAdapter(this, secureStream, request); } // This is an adapter class that ties a servicePoint and a TlsStream on the SSL handshake completion private class HandshakeDoneProcedure { TlsStream m_SecureStream; Object m_Request; ServicePoint m_ServicePoint; internal static RemoteCertValidationCallback CreateAdapter(ServicePoint serviePoint, TlsStream secureStream, Object request) { HandshakeDoneProcedure adapter = new HandshakeDoneProcedure(serviePoint, secureStream, request); return new RemoteCertValidationCallback(adapter.CertValidationCallback); } private HandshakeDoneProcedure (ServicePoint serviePoint, TlsStream secureStream, Object request) { m_ServicePoint = serviePoint; m_SecureStream = secureStream; m_Request = request; } private bool CertValidationCallback(string hostName, X509Certificate certificate, X509Chain chain, SslPolicyErrors sslPolicyErrors) { m_ServicePoint.UpdateServerCertificate(certificate); m_ServicePoint.UpdateClientCertificate(m_SecureStream.ClientCertificate); bool useDefault = true; // If a policy is set, call the user callback inside the ExecutionContext. if (ServicePointManager.GetLegacyCertificatePolicy() != null && (m_Request is WebRequest)) { useDefault = false; bool checkResult = ServicePointManager.CertPolicyValidationCallback. Invoke(hostName, m_ServicePoint, certificate, (WebRequest) m_Request, chain, sslPolicyErrors); if (checkResult == false){ if (!ServicePointManager.CertPolicyValidationCallback.UsesDefault || ServicePointManager.ServerCertificateValidationCallback == null) return checkResult; } } if (ServicePointManager.ServerCertificateValidationCallback != null) { useDefault = false; return ServicePointManager.ServerCertValidationCallback. Invoke(m_Request, certificate, chain, sslPolicyErrors); } if (useDefault) return sslPolicyErrors == SslPolicyErrors.None; return true; } } #endif // !FEATURE_PAL ////// Indicates that the ///supports pipelined connections. /// /// internal bool ReleaseConnectionGroup(string connName) { // // look up the ConnectionGroup based on the name // lock(this) { ConnectionGroup connectionGroup = FindConnectionGroup(connName, true); // // force all connections on the ConnectionGroup to not be KeepAlive // if (connectionGroup == null) { return false; } connectionGroup.DisableKeepAliveOnConnections(); // // remove ConnectionGroup from our Hashtable // m_ConnectionGroupList.Remove(connName); } return true; } ////// Sets connections in this group to not be KeepAlive. /// This is called to force cleanup of the ConnectionGroup by the /// NTLM and Negotiate authentication modules. /// ////// internal void ReleaseAllConnectionGroups() { // The timer thread is allowed to call this. (It doesn't call user code and doesn't block.) GlobalLog.ThreadContract(ThreadKinds.Unknown, ThreadKinds.SafeSources | ThreadKinds.Timer, "ServicePoint#" + ValidationHelper.HashString(this) + "::ReleaseAllConnectionGroups"); // To avoid deadlock (can't lock a ServicePoint followed by a Connection), copy out all the // connection groups in a lock, then release them all outside of it. ArrayList cgs = new ArrayList(m_ConnectionGroupList.Count); lock(this) { foreach (ConnectionGroup cg in m_ConnectionGroupList.Values) { cgs.Add(cg); } m_ConnectionGroupList.Clear(); } foreach (ConnectionGroup cg in cgs) { cg.DisableKeepAliveOnConnections(); } } ////// - Sets all connections in all connections groups to not be KeepAlive. /// - Causes all connections to be closed, if they are not active /// - Removes all references to all connection groups and their connections /// does essentially a "ReleaseConnectionGroup" of each group in this ServicePoint /// ////// private class ConnectSocketState { internal ConnectSocketState(ServicePoint servicePoint, PooledStream pooledStream, object owner, Socket s4, Socket s6) { this.servicePoint = servicePoint; this.pooledStream = pooledStream; this.owner = owner; this.s4 = s4; this.s6 = s6; } internal ServicePoint servicePoint; internal Socket s4; internal Socket s6; internal object owner; internal IPAddress[] addresses; internal int currentIndex; internal int i; internal int unsuccessfulAttempts; internal bool connectFailure; internal PooledStream pooledStream; } ///Internal class, used to store state for async Connect ////// private static void ConnectSocketCallback(IAsyncResult asyncResult) { ConnectSocketState state = (ConnectSocketState)asyncResult.AsyncState; Socket socket = null; IPAddress address = null; Exception innerException = null; Exception exception = null; WebExceptionStatus ws = WebExceptionStatus.ConnectFailure; try { ws = state.servicePoint.ConnectSocketInternal(state.connectFailure, state.s4, state.s6, ref socket, ref address, state, asyncResult, Timeout.Infinite, out innerException); } catch (SocketException socketException) { exception = socketException; } catch (ObjectDisposedException socketException) { exception = socketException; } if (ws == WebExceptionStatus.Pending) { return; } if (ws == WebExceptionStatus.Success) { try { state.servicePoint.CompleteGetConnection(state.s4, state.s6, socket, address); } catch (SocketException socketException) { exception = socketException; } catch (ObjectDisposedException socketException) { exception = socketException; } } else { exception = new WebException( NetRes.GetWebStatusString(ws), ws == WebExceptionStatus.ProxyNameResolutionFailure || ws == WebExceptionStatus.NameResolutionFailure ? state.servicePoint.Host : null, innerException, ws, null, /* no response */ WebExceptionInternalStatus.ServicePointFatal); } try { state.pooledStream.ConnectionCallback(state.owner, exception, socket, address); } catch { if (socket != null && socket.CleanedUp) return; // The connection was aborted and requests dispatched throw; } } private void BindUsingDelegate(Socket socket, IPEndPoint remoteIPEndPoint) { IPEndPoint clonedRemoteIPEndPoint = new IPEndPoint(remoteIPEndPoint.Address, remoteIPEndPoint.Port); int retryCount; for (retryCount=0; retryCountProviates an async callback that is called when Connect completes [part of ConnectSocket(...)] ////// This is the real logic for doing the Connect with IPv4 and IPv6 addresses, see ConnectSocket for details /// private WebExceptionStatus ConnectSocketInternal(bool connectFailure, Socket s4, Socket s6, ref Socket socket, ref IPAddress address, ConnectSocketState state, IAsyncResult asyncResult, int timeout, out Exception exception) { IPEndPoint remoteIPEndPoint; exception = null; bool timedOut = false; // // so, here we are: we have the EndPoint we need to connect to, all we // need to do is call into winsock and try to connect to this HTTP server. // // this is how we do it: // we'll keep trying to Connect() until either: // (1) Connect() succeeds (on which we increment the number of connections opened) or // (2) we can't get any new address for this host. // // (1) is pretty easy, here's how we do (2): // If the hostinformation is every marked as failed, we will automatically refresh it // the next time it is read. // If we fail the first time using the DNS information and the DNS information is recent, // which mean's it either hasn't been tried or it failed, we will mark the // hostinformation as failed, and quit. Otherwise we'll refresh the DNS information and // try one more time. If we fail the second time, then we'll mark the DNS information // as failed and quit. IPAddress[] addresses = null; for (int unsuccessfulAttempts = 0; unsuccessfulAttempts < 2; unsuccessfulAttempts++) { int currentIndex; int i = 0; // Use asyncResult to make sure it is only called at initiation time. if (asyncResult == null) { // the second time, determine if the list was recent. GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::ConnectSocketInternal() calling GetIPAddressInfoList() timeout:" + timeout.ToString()); addresses = GetIPAddressInfoList(out currentIndex, addresses, timeout, out timedOut); //the addresses were recent, or we couldn't resolve the addresses. if (addresses == null || addresses.Length == 0 || timedOut) break; } else { GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::ConnectSocketInternal() resuming previous state"); addresses = state.addresses; currentIndex = state.currentIndex; i = state.i; unsuccessfulAttempts = state.unsuccessfulAttempts; } //otherwise, try all of the addresses in the list. for (; i < addresses.Length; i++) { IPAddress ipAddressInfo = addresses[currentIndex]; try { remoteIPEndPoint = new IPEndPoint(ipAddressInfo, m_Port); Socket attemptSocket; if ( remoteIPEndPoint.Address.AddressFamily==AddressFamily.InterNetwork ) { attemptSocket = s4; } else { attemptSocket = s6; } if (state != null) { if (asyncResult != null) { IAsyncResult asyncResultCopy = asyncResult; asyncResult = null; attemptSocket.EndConnect(asyncResultCopy); } else { GlobalLog.Print("ServicePoint#" + ValidationHelper.HashString(this) + "::ConnectSocketInternal() calling BeginConnect() to:" + remoteIPEndPoint.ToString()); // save off our state and do our async call state.addresses = addresses; state.currentIndex = currentIndex; state.i = i; state.unsuccessfulAttempts = unsuccessfulAttempts; state.connectFailure = connectFailure; if (BindIPEndPointDelegate != null && !attemptSocket.IsBound) { BindUsingDelegate(attemptSocket, remoteIPEndPoint); } attemptSocket.UnsafeBeginConnect(remoteIPEndPoint, m_ConnectCallbackDelegate, state); return WebExceptionStatus.Pending; } } else { if (BindIPEndPointDelegate != null && !attemptSocket.IsBound) { BindUsingDelegate(attemptSocket, remoteIPEndPoint); } attemptSocket.InternalConnect(remoteIPEndPoint); } socket = attemptSocket; address = ipAddressInfo; exception = null; UpdateCurrentIndex(addresses, currentIndex); return WebExceptionStatus.Success; } catch (ObjectDisposedException) { // This can happen if the request has been aborted and the attemptSocket got closed. return WebExceptionStatus.RequestCanceled; } catch (Exception e) { if (NclUtilities.IsFatal(e)) throw; exception = e; connectFailure = true; } currentIndex++; if (currentIndex >= addresses.Length) { currentIndex = 0; } } } Failed(addresses); return connectFailure ? WebExceptionStatus.ConnectFailure : timedOut ? WebExceptionStatus.Timeout : InternalProxyServicePoint ? WebExceptionStatus.ProxyNameResolutionFailure : WebExceptionStatus.NameResolutionFailure; } /* // Consider removing. ////// //internal WebExceptionStatus ConnectSocket(Socket s4, Socket s6, ref Socket socket, out Exception exception) { // return ConnectSocket( s4, s6, ref socket, null, out exception); //} private WebExceptionStatus ConnectSocket(Socket s4, Socket s6, ref Socket socket, int timeout, out Exception exception) { IPAddress address = null; return ConnectSocket(s4, s6, ref socket, ref address, null, timeout, out exception); } */ ////// this method actually returns the socket that was /// used to connect to the remote host. This is because the host may /// have multiple addresses, and on here do we actually know which /// one we used ! /// ////// private WebExceptionStatus ConnectSocket(Socket s4, Socket s6, ref Socket socket, ref IPAddress address, ConnectSocketState state, int timeout, out Exception exception) { // // we need this for the call to connect() // return ConnectSocketInternal(false, s4, s6, ref socket, ref address, state, null, timeout, out exception); } [System.Diagnostics.Conditional("DEBUG")] internal void Debug(int requestHash) { foreach(ConnectionGroup connectGroup in m_ConnectionGroupList.Values) { if (connectGroup!=null) { try { connectGroup.Debug(requestHash); } catch { } } } } // // Previously: class IPHostInformation // private string m_HostName = String.Empty; private IPAddress[] m_IPAddressInfoList; private int m_CurrentAddressInfoIndex; private bool m_ConnectedSinceDns = false; private bool m_AddressListFailed = false; private DateTime m_LastDnsResolve; private bool m_IPAddressesAreLoopback; private void Failed(IPAddress[] addresses) { if (addresses == m_IPAddressInfoList){ lock(this){ if (addresses == m_IPAddressInfoList){ m_AddressListFailed = true; } } } } //if dns round robin is enabled, we don't want to update the index //because other connections may have skipped to the next address. //we need a better mechanism to handle dead connections private void UpdateCurrentIndex(IPAddress[] addresses, int currentIndex) { if (addresses == m_IPAddressInfoList && (m_CurrentAddressInfoIndex != currentIndex || !m_ConnectedSinceDns)){ lock(this){ if (addresses == m_IPAddressInfoList){ if (!ServicePointManager.EnableDnsRoundRobin ) { m_CurrentAddressInfoIndex = currentIndex; } m_ConnectedSinceDns = true; } } } } private bool HasTimedOut { get { int dnsRefreshTimeout = ServicePointManager.DnsRefreshTimeout; return dnsRefreshTimeout != Timeout.Infinite && (m_LastDnsResolve + new TimeSpan(0, 0, 0, 0, dnsRefreshTimeout)) < DateTime.UtcNow; } } // If addresses is specified, we determine if the addresslist is recent // If the answer is yes, we return null. Whether its recent is determined by whether // or not the current hostinformation has ever been marked as succeeded or failed (meaning // even tried). If it isn't recent, we'll refresh the addresslist. private IPAddress[] GetIPAddressInfoList(out int currentIndex, IPAddress[] addresses, int timeout, out bool timedOut) { IPHostEntry ipHostEntry = null; currentIndex = 0; bool needDnsResolution = false; bool dnsResolutionFailed = false; timedOut = false; // Phase 1: Decide if we need to do a DNS resolution lock (this) { // return null if the current hostinformation has never been marked as succeeded or failed // (the hostinformation hasn't been used) and it hasn't changed. if (addresses != null && !m_ConnectedSinceDns && !m_AddressListFailed && addresses == m_IPAddressInfoList) return null; // refresh the list if its already failed, or if the addresslist isn't recent if (m_IPAddressInfoList == null || m_AddressListFailed || addresses == m_IPAddressInfoList || HasTimedOut) { m_CurrentAddressInfoIndex = 0; m_ConnectedSinceDns = false; m_AddressListFailed = false; m_LastDnsResolve = DateTime.UtcNow; needDnsResolution = true; } } // Phase 2: If we have to do a DNS resolution now, then do it now if (needDnsResolution) { try { GlobalLog.Print("IPHostInformation#" + ValidationHelper.HashString(this) + "::GetIPAddressInfoList() calling Dns.InternalResolveFast() for:" + m_Host + " timeout:" + (uint) timeout); ipHostEntry = Dns.InternalResolveFast(m_Host, timeout, out timedOut); GlobalLog.Print("IPHostInformation#" + ValidationHelper.HashString(this) + "::GetIPAddressInfoList() Dns.InternalResolveFast() returns:" + ValidationHelper.ToString(ipHostEntry) + " timedOut:" + timedOut); if (timedOut) { dnsResolutionFailed = true; } } catch (Exception exception) { if (NclUtilities.IsFatal(exception)) throw; dnsResolutionFailed = true; GlobalLog.Print("IPHostInformation#" + ValidationHelper.HashString(this) + "::GetIPAddressInfoList() Dns.InternalResolveFast() failed with exception:\r\n" + exception.ToString()); } } // Phase 3: If we did a DNS resolution, then deal with the results safely under a lock lock (this) { if (needDnsResolution) { m_IPAddressInfoList = null; if (!dnsResolutionFailed) { if (ipHostEntry!=null && ipHostEntry.AddressList!=null && ipHostEntry.AddressList.Length>0) { SetAddressList(ipHostEntry); } else { GlobalLog.Print("IPHostInformation#" + ValidationHelper.HashString(this) + "::GetIPAddressInfoList() Dns.InternalResolveFast() failed with null"); } } else { GlobalLog.Print("IPHostInformation#" + ValidationHelper.HashString(this) + "::GetIPAddressInfoList() Dns.InternalResolveFast() had thrown an exception"); } } if (m_IPAddressInfoList!=null && m_IPAddressInfoList.Length > 0) { GlobalLog.Print("IPHostInformation#" + ValidationHelper.HashString(this) + "::GetIPAddressInfoList() m_IPAddressInfoList = "+m_IPAddressInfoList); currentIndex = m_CurrentAddressInfoIndex; //auto increment index for next connect request if round robin is enabled if (ServicePointManager.EnableDnsRoundRobin) { m_CurrentAddressInfoIndex++; if (m_CurrentAddressInfoIndex >= m_IPAddressInfoList.Length) { m_CurrentAddressInfoIndex = 0; } } return m_IPAddressInfoList; } } GlobalLog.Print("IPHostInformation#" + ValidationHelper.HashString(this) + "::GetIPAddressInfoList() GetIPAddressInfoList returning null"); return null; } // // Called under lock(this) // private void SetAddressList(IPHostEntry ipHostEntry) { GlobalLog.Print("IPHostInformation#" + ValidationHelper.HashString(this) + "::SetAddressList("+ipHostEntry.HostName+")"); // // Create an array of IPAddress of the appropriate size, then // get a list of our local addresses. Walk through the input // address list. Copy each address in the address list into // our array, and if the address is a loopback address, mark it as // such. // // Only update the member with successfull final result. // In case of an exception m_IPAddressInfoList will stay as null // bool wasLoopback = m_IPAddressesAreLoopback; bool wasNull = m_IPAddressInfoList == null; m_IPAddressesAreLoopback = IsAddressListLoopback(ipHostEntry.AddressList); m_IPAddressInfoList = ipHostEntry.AddressList; m_HostName = ipHostEntry.HostName; if (wasNull || wasLoopback != m_IPAddressesAreLoopback) { ResolveConnectionLimit(); } } private static bool IsAddressListLoopback(IPAddress[] addressList) { GlobalLog.Print("IPHostInformation::CheckAddressList(" + addressList.Length + ")"); // // Walk through each member of the input list, copying it into our temp array. // int i, k; IPAddress[] localAddresses = null; try { localAddresses = NclUtilities.LocalAddresses; } catch (Exception exception) { if (NclUtilities.IsFatal(exception)) throw; // ATTN: If LocalAddresses has failed terribly we will treat just resolved name as a remote server. // if (Logging.On) { Logging.PrintError(Logging.Web, SR.GetString(SR.net_log_retrieving_localhost_exception, exception)); Logging.PrintWarning(Logging.Web, SR.GetString(SR.net_log_resolved_servicepoint_may_not_be_remote_server)); } } for (i = 0; i < addressList.Length; i++) { // First, check to see if the current address is a loopback address. if (IPAddress.IsLoopback(addressList[i])) { continue; } if (localAddresses != null) { // See if the current IP address is a local address, and if // so mark it as such. for (k = 0; k < localAddresses.Length; k++) { // // IPv6 Changes: Use .Equals for this check ! // if (addressList[i].Equals(localAddresses[k])) { break; } } if (k < localAddresses.Length) { continue; } } break; } return i == addressList.Length; } } }private implimentation of ConnectSocket(...) ///
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- FixedPageAutomationPeer.cs
- DbParameterCollection.cs
- entityreference_tresulttype.cs
- FormsAuthenticationUserCollection.cs
- GeometryCollection.cs
- EncoderParameters.cs
- AccessDataSource.cs
- StateFinalizationActivity.cs
- QueryStringConverter.cs
- LinqExpressionNormalizer.cs
- _SafeNetHandles.cs
- RelationshipDetailsRow.cs
- SetterBaseCollection.cs
- UriTemplateClientFormatter.cs
- InvokePatternIdentifiers.cs
- DataService.cs
- TrustLevelCollection.cs
- BCLDebug.cs
- CellLabel.cs
- MasterPageBuildProvider.cs
- SystemColors.cs
- HttpGetServerProtocol.cs
- NativeCompoundFileAPIs.cs
- FieldBuilder.cs
- XmlSerializableReader.cs
- ExtractedStateEntry.cs
- Axis.cs
- PrinterUnitConvert.cs
- HGlobalSafeHandle.cs
- KnownBoxes.cs
- StackOverflowException.cs
- RSAPKCS1KeyExchangeFormatter.cs
- SchemaCollectionPreprocessor.cs
- SecurityElement.cs
- GroupBox.cs
- XmlTextAttribute.cs
- WsatConfiguration.cs
- XmlSignatureManifest.cs
- BamlRecords.cs
- ConfigUtil.cs
- EndEvent.cs
- LoginView.cs
- PagePropertiesChangingEventArgs.cs
- StandardCommands.cs
- RtfFormatStack.cs
- DictionaryKeyPropertyAttribute.cs
- TableRowCollection.cs
- CodeTypeOfExpression.cs
- ListViewGroupConverter.cs
- TextParagraphCache.cs
- SoapExtensionReflector.cs
- MessageSecurityOverHttpElement.cs
- ComponentCollection.cs
- HitTestParameters3D.cs
- ExpanderAutomationPeer.cs
- GPPOINT.cs
- EventToken.cs
- DrawingDrawingContext.cs
- ScrollBar.cs
- SafeCryptoHandles.cs
- WmpBitmapEncoder.cs
- AliasedSlot.cs
- BindingOperations.cs
- Underline.cs
- StructuralObject.cs
- IInstanceTable.cs
- MapPathBasedVirtualPathProvider.cs
- VoiceInfo.cs
- InheritanceAttribute.cs
- HttpCachePolicyWrapper.cs
- JapaneseLunisolarCalendar.cs
- DesignerCategoryAttribute.cs
- EditorBrowsableAttribute.cs
- CompileLiteralTextParser.cs
- PopupRoot.cs
- cache.cs
- PasswordRecovery.cs
- ValueType.cs
- MediaElement.cs
- Point4DConverter.cs
- ShapingEngine.cs
- SqlDataSourceStatusEventArgs.cs
- ToolStripItemCollection.cs
- SmtpReplyReader.cs
- DecimalAnimationBase.cs
- MessageBox.cs
- AnonymousIdentificationModule.cs
- ScriptResourceMapping.cs
- DataTableMapping.cs
- XmlSerializationGeneratedCode.cs
- WebPageTraceListener.cs
- ApplicationSecurityInfo.cs
- CacheRequest.cs
- ConnectionPoolManager.cs
- updateconfighost.cs
- ContractUtils.cs
- TypeElement.cs
- _SSPIWrapper.cs
- SharedStatics.cs
- RestHandlerFactory.cs