#include "ace/FILE_Connector.h" #include "ace/Handle_Ops.h" #include "ace/OS_NS_stdlib.h" #if defined (ACE_HAS_ALLOC_HOOKS) # include "ace/Malloc_Base.h" #endif /* ACE_HAS_ALLOC_HOOKS */ #if !defined (__ACE_INLINE__) #include "ace/FILE_Connector.inl" #endif /* __ACE_INLINE__ */ ACE_BEGIN_VERSIONED_NAMESPACE_DECL ACE_ALLOC_HOOK_DEFINE(ACE_FILE_Connector) void ACE_FILE_Connector::dump () const { #if defined (ACE_HAS_DUMP) ACE_TRACE ("ACE_FILE_Connector::dump"); ACELIB_DEBUG ((LM_DEBUG, ACE_BEGIN_DUMP, this)); ACELIB_DEBUG ((LM_DEBUG, ACE_TEXT ("\n"))); ACELIB_DEBUG ((LM_DEBUG, ACE_END_DUMP)); #endif /* ACE_HAS_DUMP */ } ACE_FILE_Connector::ACE_FILE_Connector () { ACE_TRACE ("ACE_FILE_Connector::ACE_FILE_Connector"); } int ACE_FILE_Connector::connect (ACE_FILE_IO &new_io, const ACE_FILE_Addr &remote_sap, ACE_Time_Value *timeout, const ACE_Addr &, int, int flags, int perms) { ACE_TRACE ("ACE_FILE_Connector::connect"); ACE_ASSERT (new_io.get_handle () == ACE_INVALID_HANDLE); ACE_HANDLE handle = ACE_INVALID_HANDLE; // Check to see if caller has requested that we create the filename. if (reinterpret_cast ( const_cast (remote_sap)) == ACE_Addr::sap_any) { // Create a new temporary file. // Use ACE_OS::mkstemp() if it is available since it avoids a // race condition, and subsequently a security hole due to that // race condition (specifically, a denial-of-service attack). // // However, using mkstemp() prevents us from doing a timed open // since it opens the file for us. Better to avoid the race // condition. char filename[] = "ace-file-XXXXXX"; handle = ACE_OS::mkstemp (filename); // mkstemp() replaces "XXXXXX" if (handle == ACE_INVALID_HANDLE || new_io.addr_.set (ACE_TEXT_CHAR_TO_TCHAR (filename)) != 0) return -1; new_io.set_handle (handle); return 0; } else new_io.addr_ = remote_sap; // class copy. handle = ACE::handle_timed_open (timeout, new_io.addr_.get_path_name (), flags, perms); new_io.set_handle (handle); return handle == ACE_INVALID_HANDLE ? -1 : 0; } ACE_END_VERSIONED_NAMESPACE_DECL