| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038703970407041704270437044704570467047704870497050705170527053705470557056705770587059706070617062706370647065706670677068706970707071707270737074707570767077707870797080708170827083708470857086708770887089709070917092709370947095709670977098709971007101710271037104710571067107710871097110711171127113711471157116711771187119712071217122712371247125712671277128712971307131713271337134713571367137713871397140714171427143714471457146714771487149715071517152715371547155715671577158715971607161716271637164716571667167716871697170717171727173717471757176717771787179718071817182718371847185718671877188718971907191719271937194719571967197719871997200720172027203720472057206720772087209721072117212721372147215721672177218721972207221722272237224722572267227722872297230723172327233723472357236723772387239724072417242724372447245724672477248724972507251725272537254725572567257725872597260726172627263726472657266726772687269727072717272727372747275727672777278727972807281728272837284728572867287728872897290729172927293729472957296729772987299730073017302730373047305730673077308730973107311731273137314731573167317731873197320732173227323732473257326732773287329733073317332733373347335733673377338733973407341734273437344734573467347734873497350735173527353735473557356735773587359736073617362736373647365736673677368736973707371737273737374737573767377737873797380738173827383738473857386738773887389739073917392739373947395739673977398739974007401740274037404740574067407740874097410741174127413741474157416741774187419742074217422742374247425742674277428742974307431743274337434743574367437743874397440744174427443744474457446744774487449745074517452745374547455745674577458745974607461746274637464746574667467746874697470747174727473747474757476747774787479748074817482748374847485748674877488748974907491749274937494749574967497749874997500750175027503750475057506750775087509751075117512751375147515751675177518751975207521752275237524752575267527752875297530753175327533753475357536753775387539754075417542754375447545754675477548754975507551755275537554755575567557755875597560756175627563756475657566756775687569757075717572757375747575757675777578757975807581758275837584758575867587758875897590759175927593759475957596759775987599760076017602760376047605760676077608760976107611761276137614761576167617761876197620762176227623762476257626762776287629763076317632763376347635763676377638763976407641764276437644764576467647764876497650765176527653765476557656765776587659766076617662766376647665766676677668766976707671767276737674767576767677767876797680768176827683768476857686768776887689769076917692769376947695769676977698769977007701770277037704770577067707770877097710771177127713771477157716771777187719772077217722772377247725772677277728772977307731773277337734773577367737773877397740774177427743774477457746774777487749775077517752775377547755775677577758775977607761776277637764776577667767776877697770777177727773777477757776777777787779778077817782778377847785778677877788778977907791779277937794779577967797779877997800780178027803780478057806780778087809781078117812781378147815781678177818781978207821782278237824782578267827782878297830783178327833783478357836783778387839784078417842784378447845784678477848784978507851785278537854785578567857785878597860786178627863786478657866786778687869787078717872787378747875787678777878787978807881788278837884788578867887788878897890789178927893789478957896789778987899790079017902790379047905790679077908790979107911791279137914791579167917791879197920792179227923792479257926792779287929793079317932793379347935793679377938793979407941794279437944794579467947794879497950795179527953795479557956795779587959796079617962796379647965796679677968796979707971797279737974797579767977797879797980798179827983798479857986798779887989799079917992799379947995799679977998799980008001800280038004800580068007800880098010801180128013801480158016801780188019802080218022802380248025802680278028802980308031803280338034803580368037803880398040804180428043804480458046804780488049805080518052805380548055805680578058805980608061806280638064806580668067806880698070807180728073807480758076807780788079808080818082808380848085808680878088808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118811981208121812281238124812581268127812881298130813181328133813481358136813781388139814081418142814381448145814681478148814981508151815281538154815581568157815881598160816181628163816481658166816781688169817081718172817381748175817681778178817981808181818281838184818581868187818881898190819181928193819481958196819781988199820082018202820382048205820682078208820982108211821282138214821582168217821882198220822182228223822482258226822782288229823082318232823382348235823682378238823982408241824282438244824582468247824882498250825182528253825482558256825782588259826082618262826382648265826682678268826982708271827282738274827582768277827882798280828182828283828482858286828782888289829082918292829382948295829682978298829983008301830283038304830583068307830883098310831183128313831483158316831783188319832083218322832383248325832683278328832983308331833283338334833583368337833883398340834183428343834483458346834783488349835083518352835383548355835683578358835983608361836283638364836583668367836883698370837183728373837483758376837783788379838083818382838383848385838683878388838983908391839283938394839583968397839883998400840184028403840484058406840784088409841084118412841384148415841684178418841984208421842284238424842584268427842884298430843184328433843484358436843784388439844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658466846784688469847084718472847384748475847684778478847984808481848284838484848584868487848884898490849184928493849484958496849784988499850085018502850385048505850685078508850985108511851285138514851585168517851885198520852185228523852485258526 | ////  GCDAsyncSocket.m//  //  This class is in the public domain.//  Originally created by Robbie Hanson in Q4 2010.//  Updated and maintained by Deusty LLC and the Apple development community.////  https://github.com/robbiehanson/CocoaAsyncSocket//#import "GCDAsyncSocket.h"#if TARGET_OS_IPHONE#import <CFNetwork/CFNetwork.h>#endif#import <TargetConditionals.h>#import <arpa/inet.h>#import <fcntl.h>#import <ifaddrs.h>#import <netdb.h>#import <netinet/in.h>#import <net/if.h>#import <sys/socket.h>#import <sys/types.h>#import <sys/ioctl.h>#import <sys/poll.h>#import <sys/uio.h>#import <sys/un.h>#import <unistd.h>#if ! __has_feature(objc_arc)#warning This file must be compiled with ARC. Use -fobjc-arc flag (or convert project to ARC).// For more information see: https://github.com/robbiehanson/CocoaAsyncSocket/wiki/ARC#endif#ifndef GCDAsyncSocketLoggingEnabled#define GCDAsyncSocketLoggingEnabled 0#endif#if GCDAsyncSocketLoggingEnabled// Logging Enabled - See log level below// Logging uses the CocoaLumberjack framework (which is also GCD based).// https://github.com/robbiehanson/CocoaLumberjack// // It allows us to do a lot of logging without significantly slowing down the code.#import "DDLog.h"#define LogAsync   YES#define LogContext GCDAsyncSocketLoggingContext#define LogObjc(flg, frmt, ...) LOG_OBJC_MAYBE(LogAsync, logLevel, flg, LogContext, frmt, ##__VA_ARGS__)#define LogC(flg, frmt, ...)    LOG_C_MAYBE(LogAsync, logLevel, flg, LogContext, frmt, ##__VA_ARGS__)#define LogError(frmt, ...)     LogObjc(LOG_FLAG_ERROR,   (@"%@: " frmt), THIS_FILE, ##__VA_ARGS__)#define LogWarn(frmt, ...)      LogObjc(LOG_FLAG_WARN,    (@"%@: " frmt), THIS_FILE, ##__VA_ARGS__)#define LogInfo(frmt, ...)      LogObjc(LOG_FLAG_INFO,    (@"%@: " frmt), THIS_FILE, ##__VA_ARGS__)#define LogVerbose(frmt, ...)   LogObjc(LOG_FLAG_VERBOSE, (@"%@: " frmt), THIS_FILE, ##__VA_ARGS__)#define LogCError(frmt, ...)    LogC(LOG_FLAG_ERROR,   (@"%@: " frmt), THIS_FILE, ##__VA_ARGS__)#define LogCWarn(frmt, ...)     LogC(LOG_FLAG_WARN,    (@"%@: " frmt), THIS_FILE, ##__VA_ARGS__)#define LogCInfo(frmt, ...)     LogC(LOG_FLAG_INFO,    (@"%@: " frmt), THIS_FILE, ##__VA_ARGS__)#define LogCVerbose(frmt, ...)  LogC(LOG_FLAG_VERBOSE, (@"%@: " frmt), THIS_FILE, ##__VA_ARGS__)#define LogTrace()              LogObjc(LOG_FLAG_VERBOSE, @"%@: %@", THIS_FILE, THIS_METHOD)#define LogCTrace()             LogC(LOG_FLAG_VERBOSE, @"%@: %s", THIS_FILE, __FUNCTION__)#ifndef GCDAsyncSocketLogLevel#define GCDAsyncSocketLogLevel LOG_LEVEL_VERBOSE#endif// Log levels : off, error, warn, info, verbosestatic const int logLevel = GCDAsyncSocketLogLevel;#else// Logging Disabled#define LogError(frmt, ...)     {}#define LogWarn(frmt, ...)      {}#define LogInfo(frmt, ...)      {}#define LogVerbose(frmt, ...)   {}#define LogCError(frmt, ...)    {}#define LogCWarn(frmt, ...)     {}#define LogCInfo(frmt, ...)     {}#define LogCVerbose(frmt, ...)  {}#define LogTrace()              {}#define LogCTrace(frmt, ...)    {}#endif/** * Seeing a return statements within an inner block * can sometimes be mistaken for a return point of the enclosing method. * This makes inline blocks a bit easier to read.**/#define return_from_block  return/** * A socket file descriptor is really just an integer. * It represents the index of the socket within the kernel. * This makes invalid file descriptor comparisons easier to read.**/#define SOCKET_NULL -1NSString *const GCDAsyncSocketException = @"GCDAsyncSocketException";NSString *const GCDAsyncSocketErrorDomain = @"GCDAsyncSocketErrorDomain";NSString *const GCDAsyncSocketQueueName = @"GCDAsyncSocket";NSString *const GCDAsyncSocketThreadName = @"GCDAsyncSocket-CFStream";NSString *const GCDAsyncSocketManuallyEvaluateTrust = @"GCDAsyncSocketManuallyEvaluateTrust";#if TARGET_OS_IPHONENSString *const GCDAsyncSocketUseCFStreamForTLS = @"GCDAsyncSocketUseCFStreamForTLS";#endifNSString *const GCDAsyncSocketSSLPeerID = @"GCDAsyncSocketSSLPeerID";NSString *const GCDAsyncSocketSSLProtocolVersionMin = @"GCDAsyncSocketSSLProtocolVersionMin";NSString *const GCDAsyncSocketSSLProtocolVersionMax = @"GCDAsyncSocketSSLProtocolVersionMax";NSString *const GCDAsyncSocketSSLSessionOptionFalseStart = @"GCDAsyncSocketSSLSessionOptionFalseStart";NSString *const GCDAsyncSocketSSLSessionOptionSendOneByteRecord = @"GCDAsyncSocketSSLSessionOptionSendOneByteRecord";NSString *const GCDAsyncSocketSSLCipherSuites = @"GCDAsyncSocketSSLCipherSuites";NSString *const GCDAsyncSocketSSLALPN = @"GCDAsyncSocketSSLALPN";#if !TARGET_OS_IPHONENSString *const GCDAsyncSocketSSLDiffieHellmanParameters = @"GCDAsyncSocketSSLDiffieHellmanParameters";#endifenum GCDAsyncSocketFlags{	kSocketStarted                 = 1 <<  0,  // If set, socket has been started (accepting/connecting)	kConnected                     = 1 <<  1,  // If set, the socket is connected	kForbidReadsWrites             = 1 <<  2,  // If set, no new reads or writes are allowed	kReadsPaused                   = 1 <<  3,  // If set, reads are paused due to possible timeout	kWritesPaused                  = 1 <<  4,  // If set, writes are paused due to possible timeout	kDisconnectAfterReads          = 1 <<  5,  // If set, disconnect after no more reads are queued	kDisconnectAfterWrites         = 1 <<  6,  // If set, disconnect after no more writes are queued	kSocketCanAcceptBytes          = 1 <<  7,  // If set, we know socket can accept bytes. If unset, it's unknown.	kReadSourceSuspended           = 1 <<  8,  // If set, the read source is suspended	kWriteSourceSuspended          = 1 <<  9,  // If set, the write source is suspended	kQueuedTLS                     = 1 << 10,  // If set, we've queued an upgrade to TLS	kStartingReadTLS               = 1 << 11,  // If set, we're waiting for TLS negotiation to complete	kStartingWriteTLS              = 1 << 12,  // If set, we're waiting for TLS negotiation to complete	kSocketSecure                  = 1 << 13,  // If set, socket is using secure communication via SSL/TLS	kSocketHasReadEOF              = 1 << 14,  // If set, we have read EOF from socket	kReadStreamClosed              = 1 << 15,  // If set, we've read EOF plus prebuffer has been drained	kDealloc                       = 1 << 16,  // If set, the socket is being deallocated#if TARGET_OS_IPHONE	kAddedStreamsToRunLoop         = 1 << 17,  // If set, CFStreams have been added to listener thread	kUsingCFStreamForTLS           = 1 << 18,  // If set, we're forced to use CFStream instead of SecureTransport	kSecureSocketHasBytesAvailable = 1 << 19,  // If set, CFReadStream has notified us of bytes available#endif};enum GCDAsyncSocketConfig{	kIPv4Disabled              = 1 << 0,  // If set, IPv4 is disabled	kIPv6Disabled              = 1 << 1,  // If set, IPv6 is disabled	kPreferIPv6                = 1 << 2,  // If set, IPv6 is preferred over IPv4	kAllowHalfDuplexConnection = 1 << 3,  // If set, the socket will stay open even if the read stream closes};#if TARGET_OS_IPHONE  static NSThread *cfstreamThread;  // Used for CFStreams  static uint64_t cfstreamThreadRetainCount;   // setup & teardown  static dispatch_queue_t cfstreamThreadSetupQueue; // setup & teardown#endif////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark -/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////** * A PreBuffer is used when there is more data available on the socket * than is being requested by current read request. * In this case we slurp up all data from the socket (to minimize sys calls), * and store additional yet unread data in a "prebuffer". *  * The prebuffer is entirely drained before we read from the socket again. * In other words, a large chunk of data is written is written to the prebuffer. * The prebuffer is then drained via a series of one or more reads (for subsequent read request(s)). *  * A ring buffer was once used for this purpose. * But a ring buffer takes up twice as much memory as needed (double the size for mirroring). * In fact, it generally takes up more than twice the needed size as everything has to be rounded up to vm_page_size. * And since the prebuffer is always completely drained after being written to, a full ring buffer isn't needed. *  * The current design is very simple and straight-forward, while also keeping memory requirements lower.**/@interface GCDAsyncSocketPreBuffer : NSObject{	uint8_t *preBuffer;	size_t preBufferSize;		uint8_t *readPointer;	uint8_t *writePointer;}- (instancetype)initWithCapacity:(size_t)numBytes NS_DESIGNATED_INITIALIZER;- (void)ensureCapacityForWrite:(size_t)numBytes;- (size_t)availableBytes;- (uint8_t *)readBuffer;- (void)getReadBuffer:(uint8_t **)bufferPtr availableBytes:(size_t *)availableBytesPtr;- (size_t)availableSpace;- (uint8_t *)writeBuffer;- (void)getWriteBuffer:(uint8_t **)bufferPtr availableSpace:(size_t *)availableSpacePtr;- (void)didRead:(size_t)bytesRead;- (void)didWrite:(size_t)bytesWritten;- (void)reset;@end@implementation GCDAsyncSocketPreBuffer// Cover the superclass' designated initializer- (instancetype)init NS_UNAVAILABLE{	NSAssert(0, @"Use the designated initializer");	return nil;}- (instancetype)initWithCapacity:(size_t)numBytes{	if ((self = [super init]))	{		preBufferSize = numBytes;		preBuffer = malloc(preBufferSize);				readPointer = preBuffer;		writePointer = preBuffer;	}	return self;}- (void)dealloc{	if (preBuffer)		free(preBuffer);}- (void)ensureCapacityForWrite:(size_t)numBytes{	size_t availableSpace = [self availableSpace];		if (numBytes > availableSpace)	{		size_t additionalBytes = numBytes - availableSpace;				size_t newPreBufferSize = preBufferSize + additionalBytes;		uint8_t *newPreBuffer = realloc(preBuffer, newPreBufferSize);				size_t readPointerOffset = readPointer - preBuffer;		size_t writePointerOffset = writePointer - preBuffer;				preBuffer = newPreBuffer;		preBufferSize = newPreBufferSize;				readPointer = preBuffer + readPointerOffset;		writePointer = preBuffer + writePointerOffset;	}}- (size_t)availableBytes{	return writePointer - readPointer;}- (uint8_t *)readBuffer{	return readPointer;}- (void)getReadBuffer:(uint8_t **)bufferPtr availableBytes:(size_t *)availableBytesPtr{	if (bufferPtr) *bufferPtr = readPointer;	if (availableBytesPtr) *availableBytesPtr = [self availableBytes];}- (void)didRead:(size_t)bytesRead{	readPointer += bytesRead;		if (readPointer == writePointer)	{		// The prebuffer has been drained. Reset pointers.		readPointer  = preBuffer;		writePointer = preBuffer;	}}- (size_t)availableSpace{	return preBufferSize - (writePointer - preBuffer);}- (uint8_t *)writeBuffer{	return writePointer;}- (void)getWriteBuffer:(uint8_t **)bufferPtr availableSpace:(size_t *)availableSpacePtr{	if (bufferPtr) *bufferPtr = writePointer;	if (availableSpacePtr) *availableSpacePtr = [self availableSpace];}- (void)didWrite:(size_t)bytesWritten{	writePointer += bytesWritten;}- (void)reset{	readPointer  = preBuffer;	writePointer = preBuffer;}@end////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark -/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////** * The GCDAsyncReadPacket encompasses the instructions for any given read. * The content of a read packet allows the code to determine if we're: *  - reading to a certain length *  - reading to a certain separator *  - or simply reading the first chunk of available data**/@interface GCDAsyncReadPacket : NSObject{  @public	NSMutableData *buffer;	NSUInteger startOffset;	NSUInteger bytesDone;	NSUInteger maxLength;	NSTimeInterval timeout;	NSUInteger readLength;	NSData *term;	BOOL bufferOwner;	NSUInteger originalBufferLength;	long tag;}- (instancetype)initWithData:(NSMutableData *)d                 startOffset:(NSUInteger)s                   maxLength:(NSUInteger)m                     timeout:(NSTimeInterval)t                  readLength:(NSUInteger)l                  terminator:(NSData *)e                         tag:(long)i NS_DESIGNATED_INITIALIZER;- (void)ensureCapacityForAdditionalDataOfLength:(NSUInteger)bytesToRead;- (NSUInteger)optimalReadLengthWithDefault:(NSUInteger)defaultValue shouldPreBuffer:(BOOL *)shouldPreBufferPtr;- (NSUInteger)readLengthForNonTermWithHint:(NSUInteger)bytesAvailable;- (NSUInteger)readLengthForTermWithHint:(NSUInteger)bytesAvailable shouldPreBuffer:(BOOL *)shouldPreBufferPtr;- (NSUInteger)readLengthForTermWithPreBuffer:(GCDAsyncSocketPreBuffer *)preBuffer found:(BOOL *)foundPtr;- (NSInteger)searchForTermAfterPreBuffering:(ssize_t)numBytes;@end@implementation GCDAsyncReadPacket// Cover the superclass' designated initializer- (instancetype)init NS_UNAVAILABLE{	NSAssert(0, @"Use the designated initializer");	return nil;}- (instancetype)initWithData:(NSMutableData *)d                 startOffset:(NSUInteger)s                   maxLength:(NSUInteger)m                     timeout:(NSTimeInterval)t                  readLength:(NSUInteger)l                  terminator:(NSData *)e                         tag:(long)i{	if((self = [super init]))	{		bytesDone = 0;		maxLength = m;		timeout = t;		readLength = l;		term = [e copy];		tag = i;				if (d)		{			buffer = d;			startOffset = s;			bufferOwner = NO;			originalBufferLength = [d length];		}		else		{			if (readLength > 0)				buffer = [[NSMutableData alloc] initWithLength:readLength];			else				buffer = [[NSMutableData alloc] initWithLength:0];						startOffset = 0;			bufferOwner = YES;			originalBufferLength = 0;		}	}	return self;}/** * Increases the length of the buffer (if needed) to ensure a read of the given size will fit.**/- (void)ensureCapacityForAdditionalDataOfLength:(NSUInteger)bytesToRead{	NSUInteger buffSize = [buffer length];	NSUInteger buffUsed = startOffset + bytesDone;		NSUInteger buffSpace = buffSize - buffUsed;		if (bytesToRead > buffSpace)	{		NSUInteger buffInc = bytesToRead - buffSpace;				[buffer increaseLengthBy:buffInc];	}}/** * This method is used when we do NOT know how much data is available to be read from the socket. * This method returns the default value unless it exceeds the specified readLength or maxLength. *  * Furthermore, the shouldPreBuffer decision is based upon the packet type, * and whether the returned value would fit in the current buffer without requiring a resize of the buffer.**/- (NSUInteger)optimalReadLengthWithDefault:(NSUInteger)defaultValue shouldPreBuffer:(BOOL *)shouldPreBufferPtr{	NSUInteger result;		if (readLength > 0)	{		// Read a specific length of data		result = readLength - bytesDone;				// There is no need to prebuffer since we know exactly how much data we need to read.		// Even if the buffer isn't currently big enough to fit this amount of data,		// it would have to be resized eventually anyway.				if (shouldPreBufferPtr)			*shouldPreBufferPtr = NO;	}	else	{		// Either reading until we find a specified terminator,		// or we're simply reading all available data.		// 		// In other words, one of:		// 		// - readDataToData packet		// - readDataWithTimeout packet				if (maxLength > 0)			result =  MIN(defaultValue, (maxLength - bytesDone));		else			result = defaultValue;				// Since we don't know the size of the read in advance,		// the shouldPreBuffer decision is based upon whether the returned value would fit		// in the current buffer without requiring a resize of the buffer.		// 		// This is because, in all likelyhood, the amount read from the socket will be less than the default value.		// Thus we should avoid over-allocating the read buffer when we can simply use the pre-buffer instead.				if (shouldPreBufferPtr)		{			NSUInteger buffSize = [buffer length];			NSUInteger buffUsed = startOffset + bytesDone;						NSUInteger buffSpace = buffSize - buffUsed;						if (buffSpace >= result)				*shouldPreBufferPtr = NO;			else				*shouldPreBufferPtr = YES;		}	}		return result;}/** * For read packets without a set terminator, returns the amount of data * that can be read without exceeding the readLength or maxLength. *  * The given parameter indicates the number of bytes estimated to be available on the socket, * which is taken into consideration during the calculation. *  * The given hint MUST be greater than zero.**/- (NSUInteger)readLengthForNonTermWithHint:(NSUInteger)bytesAvailable{	NSAssert(term == nil, @"This method does not apply to term reads");	NSAssert(bytesAvailable > 0, @"Invalid parameter: bytesAvailable");		if (readLength > 0)	{		// Read a specific length of data				return MIN(bytesAvailable, (readLength - bytesDone));				// No need to avoid resizing the buffer.		// If the user provided their own buffer,		// and told us to read a certain length of data that exceeds the size of the buffer,		// then it is clear that our code will resize the buffer during the read operation.		// 		// This method does not actually do any resizing.		// The resizing will happen elsewhere if needed.	}	else	{		// Read all available data				NSUInteger result = bytesAvailable;				if (maxLength > 0)		{			result = MIN(result, (maxLength - bytesDone));		}				// No need to avoid resizing the buffer.		// If the user provided their own buffer,		// and told us to read all available data without giving us a maxLength,		// then it is clear that our code might resize the buffer during the read operation.		// 		// This method does not actually do any resizing.		// The resizing will happen elsewhere if needed.				return result;	}}/** * For read packets with a set terminator, returns the amount of data * that can be read without exceeding the maxLength. *  * The given parameter indicates the number of bytes estimated to be available on the socket, * which is taken into consideration during the calculation. *  * To optimize memory allocations, mem copies, and mem moves * the shouldPreBuffer boolean value will indicate if the data should be read into a prebuffer first, * or if the data can be read directly into the read packet's buffer.**/- (NSUInteger)readLengthForTermWithHint:(NSUInteger)bytesAvailable shouldPreBuffer:(BOOL *)shouldPreBufferPtr{	NSAssert(term != nil, @"This method does not apply to non-term reads");	NSAssert(bytesAvailable > 0, @"Invalid parameter: bytesAvailable");			NSUInteger result = bytesAvailable;		if (maxLength > 0)	{		result = MIN(result, (maxLength - bytesDone));	}		// Should the data be read into the read packet's buffer, or into a pre-buffer first?	// 	// One would imagine the preferred option is the faster one.	// So which one is faster?	// 	// Reading directly into the packet's buffer requires:	// 1. Possibly resizing packet buffer (malloc/realloc)	// 2. Filling buffer (read)	// 3. Searching for term (memcmp)	// 4. Possibly copying overflow into prebuffer (malloc/realloc, memcpy)	// 	// Reading into prebuffer first:	// 1. Possibly resizing prebuffer (malloc/realloc)	// 2. Filling buffer (read)	// 3. Searching for term (memcmp)	// 4. Copying underflow into packet buffer (malloc/realloc, memcpy)	// 5. Removing underflow from prebuffer (memmove)	// 	// Comparing the performance of the two we can see that reading	// data into the prebuffer first is slower due to the extra memove.	// 	// However:	// The implementation of NSMutableData is open source via core foundation's CFMutableData.	// Decreasing the length of a mutable data object doesn't cause a realloc.	// In other words, the capacity of a mutable data object can grow, but doesn't shrink.	// 	// This means the prebuffer will rarely need a realloc.	// The packet buffer, on the other hand, may often need a realloc.	// This is especially true if we are the buffer owner.	// Furthermore, if we are constantly realloc'ing the packet buffer,	// and then moving the overflow into the prebuffer,	// then we're consistently over-allocating memory for each term read.	// And now we get into a bit of a tradeoff between speed and memory utilization.	// 	// The end result is that the two perform very similarly.	// And we can answer the original question very simply by another means.	// 	// If we can read all the data directly into the packet's buffer without resizing it first,	// then we do so. Otherwise we use the prebuffer.		if (shouldPreBufferPtr)	{		NSUInteger buffSize = [buffer length];		NSUInteger buffUsed = startOffset + bytesDone;				if ((buffSize - buffUsed) >= result)			*shouldPreBufferPtr = NO;		else			*shouldPreBufferPtr = YES;	}		return result;}/** * For read packets with a set terminator, * returns the amount of data that can be read from the given preBuffer, * without going over a terminator or the maxLength. *  * It is assumed the terminator has not already been read.**/- (NSUInteger)readLengthForTermWithPreBuffer:(GCDAsyncSocketPreBuffer *)preBuffer found:(BOOL *)foundPtr{	NSAssert(term != nil, @"This method does not apply to non-term reads");	NSAssert([preBuffer availableBytes] > 0, @"Invoked with empty pre buffer!");		// We know that the terminator, as a whole, doesn't exist in our own buffer.	// But it is possible that a _portion_ of it exists in our buffer.	// So we're going to look for the terminator starting with a portion of our own buffer.	// 	// Example:	// 	// term length      = 3 bytes	// bytesDone        = 5 bytes	// preBuffer length = 5 bytes	// 	// If we append the preBuffer to our buffer,	// it would look like this:	// 	// ---------------------	// |B|B|B|B|B|P|P|P|P|P|	// ---------------------	// 	// So we start our search here:	// 	// ---------------------	// |B|B|B|B|B|P|P|P|P|P|	// -------^-^-^---------	// 	// And move forwards...	// 	// ---------------------	// |B|B|B|B|B|P|P|P|P|P|	// ---------^-^-^-------	// 	// Until we find the terminator or reach the end.	// 	// ---------------------	// |B|B|B|B|B|P|P|P|P|P|	// ---------------^-^-^-		BOOL found = NO;		NSUInteger termLength = [term length];	NSUInteger preBufferLength = [preBuffer availableBytes];		if ((bytesDone + preBufferLength) < termLength)	{		// Not enough data for a full term sequence yet		return preBufferLength;	}		NSUInteger maxPreBufferLength;	if (maxLength > 0) {		maxPreBufferLength = MIN(preBufferLength, (maxLength - bytesDone));				// Note: maxLength >= termLength	}	else {		maxPreBufferLength = preBufferLength;	}		uint8_t seq[termLength];	const void *termBuf = [term bytes];		NSUInteger bufLen = MIN(bytesDone, (termLength - 1));	uint8_t *buf = (uint8_t *)[buffer mutableBytes] + startOffset + bytesDone - bufLen;		NSUInteger preLen = termLength - bufLen;	const uint8_t *pre = [preBuffer readBuffer];		NSUInteger loopCount = bufLen + maxPreBufferLength - termLength + 1; // Plus one. See example above.		NSUInteger result = maxPreBufferLength;		NSUInteger i;	for (i = 0; i < loopCount; i++)	{		if (bufLen > 0)		{			// Combining bytes from buffer and preBuffer						memcpy(seq, buf, bufLen);			memcpy(seq + bufLen, pre, preLen);						if (memcmp(seq, termBuf, termLength) == 0)			{				result = preLen;				found = YES;				break;			}						buf++;			bufLen--;			preLen++;		}		else		{			// Comparing directly from preBuffer						if (memcmp(pre, termBuf, termLength) == 0)			{				NSUInteger preOffset = pre - [preBuffer readBuffer]; // pointer arithmetic								result = preOffset + termLength;				found = YES;				break;			}						pre++;		}	}		// There is no need to avoid resizing the buffer in this particular situation.		if (foundPtr) *foundPtr = found;	return result;}/** * For read packets with a set terminator, scans the packet buffer for the term. * It is assumed the terminator had not been fully read prior to the new bytes. *  * If the term is found, the number of excess bytes after the term are returned. * If the term is not found, this method will return -1. *  * Note: A return value of zero means the term was found at the very end. *  * Prerequisites: * The given number of bytes have been added to the end of our buffer. * Our bytesDone variable has NOT been changed due to the prebuffered bytes.**/- (NSInteger)searchForTermAfterPreBuffering:(ssize_t)numBytes{	NSAssert(term != nil, @"This method does not apply to non-term reads");		// The implementation of this method is very similar to the above method.	// See the above method for a discussion of the algorithm used here.		uint8_t *buff = [buffer mutableBytes];	NSUInteger buffLength = bytesDone + numBytes;		const void *termBuff = [term bytes];	NSUInteger termLength = [term length];		// Note: We are dealing with unsigned integers,	// so make sure the math doesn't go below zero.		NSUInteger i = ((buffLength - numBytes) >= termLength) ? (buffLength - numBytes - termLength + 1) : 0;		while (i + termLength <= buffLength)	{		uint8_t *subBuffer = buff + startOffset + i;				if (memcmp(subBuffer, termBuff, termLength) == 0)		{			return buffLength - (i + termLength);		}				i++;	}		return -1;}@end////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark -/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////** * The GCDAsyncWritePacket encompasses the instructions for any given write.**/@interface GCDAsyncWritePacket : NSObject{  @public	NSData *buffer;	NSUInteger bytesDone;	long tag;	NSTimeInterval timeout;}- (instancetype)initWithData:(NSData *)d timeout:(NSTimeInterval)t tag:(long)i NS_DESIGNATED_INITIALIZER;@end@implementation GCDAsyncWritePacket// Cover the superclass' designated initializer- (instancetype)init NS_UNAVAILABLE{	NSAssert(0, @"Use the designated initializer");	return nil;}- (instancetype)initWithData:(NSData *)d timeout:(NSTimeInterval)t tag:(long)i{	if((self = [super init]))	{		buffer = d; // Retain not copy. For performance as documented in header file.		bytesDone = 0;		timeout = t;		tag = i;	}	return self;}@end////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark -/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////** * The GCDAsyncSpecialPacket encompasses special instructions for interruptions in the read/write queues. * This class my be altered to support more than just TLS in the future.**/@interface GCDAsyncSpecialPacket : NSObject{  @public	NSDictionary *tlsSettings;}- (instancetype)initWithTLSSettings:(NSDictionary <NSString*,NSObject*>*)settings NS_DESIGNATED_INITIALIZER;@end@implementation GCDAsyncSpecialPacket// Cover the superclass' designated initializer- (instancetype)init NS_UNAVAILABLE{	NSAssert(0, @"Use the designated initializer");	return nil;}- (instancetype)initWithTLSSettings:(NSDictionary <NSString*,NSObject*>*)settings{	if((self = [super init]))	{		tlsSettings = [settings copy];	}	return self;}@end////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark -////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////@implementation GCDAsyncSocket{	uint32_t flags;	uint16_t config;		__weak id<GCDAsyncSocketDelegate> delegate;	dispatch_queue_t delegateQueue;		int socket4FD;	int socket6FD;	int socketUN;	NSURL *socketUrl;	int stateIndex;	NSData * connectInterface4;	NSData * connectInterface6;	NSData * connectInterfaceUN;		dispatch_queue_t socketQueue;		dispatch_source_t accept4Source;	dispatch_source_t accept6Source;	dispatch_source_t acceptUNSource;	dispatch_source_t connectTimer;	dispatch_source_t readSource;	dispatch_source_t writeSource;	dispatch_source_t readTimer;	dispatch_source_t writeTimer;		NSMutableArray *readQueue;	NSMutableArray *writeQueue;		GCDAsyncReadPacket *currentRead;	GCDAsyncWritePacket *currentWrite;		unsigned long socketFDBytesAvailable;		GCDAsyncSocketPreBuffer *preBuffer;		#if TARGET_OS_IPHONE	CFStreamClientContext streamContext;	CFReadStreamRef readStream;	CFWriteStreamRef writeStream;#endif	SSLContextRef sslContext;	GCDAsyncSocketPreBuffer *sslPreBuffer;	size_t sslWriteCachedLength;	OSStatus sslErrCode;    OSStatus lastSSLHandshakeError;		void *IsOnSocketQueueOrTargetQueueKey;		id userData;    NSTimeInterval alternateAddressDelay;}- (instancetype)init{	return [self initWithDelegate:nil delegateQueue:NULL socketQueue:NULL];}- (instancetype)initWithSocketQueue:(dispatch_queue_t)sq{	return [self initWithDelegate:nil delegateQueue:NULL socketQueue:sq];}- (instancetype)initWithDelegate:(id<GCDAsyncSocketDelegate>)aDelegate delegateQueue:(dispatch_queue_t)dq{	return [self initWithDelegate:aDelegate delegateQueue:dq socketQueue:NULL];}- (instancetype)initWithDelegate:(id<GCDAsyncSocketDelegate>)aDelegate delegateQueue:(dispatch_queue_t)dq socketQueue:(dispatch_queue_t)sq{	if((self = [super init]))	{		delegate = aDelegate;		delegateQueue = dq;				#if !OS_OBJECT_USE_OBJC		if (dq) dispatch_retain(dq);		#endif				socket4FD = SOCKET_NULL;		socket6FD = SOCKET_NULL;		socketUN = SOCKET_NULL;		socketUrl = nil;		stateIndex = 0;				if (sq)		{			NSAssert(sq != dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_LOW, 0),			         @"The given socketQueue parameter must not be a concurrent queue.");			NSAssert(sq != dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_HIGH, 0),			         @"The given socketQueue parameter must not be a concurrent queue.");			NSAssert(sq != dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0),			         @"The given socketQueue parameter must not be a concurrent queue.");						socketQueue = sq;			#if !OS_OBJECT_USE_OBJC			dispatch_retain(sq);			#endif		}		else		{			socketQueue = dispatch_queue_create([GCDAsyncSocketQueueName UTF8String], NULL);		}				// The dispatch_queue_set_specific() and dispatch_get_specific() functions take a "void *key" parameter.		// From the documentation:		//		// > Keys are only compared as pointers and are never dereferenced.		// > Thus, you can use a pointer to a static variable for a specific subsystem or		// > any other value that allows you to identify the value uniquely.		//		// We're just going to use the memory address of an ivar.		// Specifically an ivar that is explicitly named for our purpose to make the code more readable.		//		// However, it feels tedious (and less readable) to include the "&" all the time:		// dispatch_get_specific(&IsOnSocketQueueOrTargetQueueKey)		//		// So we're going to make it so it doesn't matter if we use the '&' or not,		// by assigning the value of the ivar to the address of the ivar.		// Thus: IsOnSocketQueueOrTargetQueueKey == &IsOnSocketQueueOrTargetQueueKey;				IsOnSocketQueueOrTargetQueueKey = &IsOnSocketQueueOrTargetQueueKey;				void *nonNullUnusedPointer = (__bridge void *)self;		dispatch_queue_set_specific(socketQueue, IsOnSocketQueueOrTargetQueueKey, nonNullUnusedPointer, NULL);				readQueue = [[NSMutableArray alloc] initWithCapacity:5];		currentRead = nil;				writeQueue = [[NSMutableArray alloc] initWithCapacity:5];		currentWrite = nil;				preBuffer = [[GCDAsyncSocketPreBuffer alloc] initWithCapacity:(1024 * 4)];        alternateAddressDelay = 0.3;	}	return self;}- (void)dealloc{	LogInfo(@"%@ - %@ (start)", THIS_METHOD, self);		// Set dealloc flag.	// This is used by closeWithError to ensure we don't accidentally retain ourself.	flags |= kDealloc;		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		[self closeWithError:nil];	}	else	{		dispatch_sync(socketQueue, ^{			[self closeWithError:nil];		});	}		delegate = nil;		#if !OS_OBJECT_USE_OBJC	if (delegateQueue) dispatch_release(delegateQueue);	#endif	delegateQueue = NULL;		#if !OS_OBJECT_USE_OBJC	if (socketQueue) dispatch_release(socketQueue);	#endif	socketQueue = NULL;		LogInfo(@"%@ - %@ (finish)", THIS_METHOD, self);}#pragma mark -+ (nullable instancetype)socketFromConnectedSocketFD:(int)socketFD socketQueue:(nullable dispatch_queue_t)sq error:(NSError**)error {  return [self socketFromConnectedSocketFD:socketFD delegate:nil delegateQueue:NULL socketQueue:sq error:error];}+ (nullable instancetype)socketFromConnectedSocketFD:(int)socketFD delegate:(nullable id<GCDAsyncSocketDelegate>)aDelegate delegateQueue:(nullable dispatch_queue_t)dq error:(NSError**)error {  return [self socketFromConnectedSocketFD:socketFD delegate:aDelegate delegateQueue:dq socketQueue:NULL error:error];}+ (nullable instancetype)socketFromConnectedSocketFD:(int)socketFD delegate:(nullable id<GCDAsyncSocketDelegate>)aDelegate delegateQueue:(nullable dispatch_queue_t)dq socketQueue:(nullable dispatch_queue_t)sq error:(NSError* __autoreleasing *)error{  __block BOOL errorOccured = NO;    GCDAsyncSocket *socket = [[[self class] alloc] initWithDelegate:aDelegate delegateQueue:dq socketQueue:sq];    dispatch_sync(socket->socketQueue, ^{ @autoreleasepool {    struct sockaddr addr;    socklen_t addr_size = sizeof(struct sockaddr);    int retVal = getpeername(socketFD, (struct sockaddr *)&addr, &addr_size);    if (retVal)    {      NSString *errMsg = NSLocalizedStringWithDefaultValue(@"GCDAsyncSocketOtherError",                                                           @"GCDAsyncSocket", [NSBundle mainBundle],                                                           @"Attempt to create socket from socket FD failed. getpeername() failed", nil);            NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};      errorOccured = YES;      if (error)        *error = [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketOtherError userInfo:userInfo];      return;    }        if (addr.sa_family == AF_INET)    {      socket->socket4FD = socketFD;    }    else if (addr.sa_family == AF_INET6)    {      socket->socket6FD = socketFD;    }    else    {      NSString *errMsg = NSLocalizedStringWithDefaultValue(@"GCDAsyncSocketOtherError",                                                           @"GCDAsyncSocket", [NSBundle mainBundle],                                                           @"Attempt to create socket from socket FD failed. socket FD is neither IPv4 nor IPv6", nil);            NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};            errorOccured = YES;      if (error)        *error = [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketOtherError userInfo:userInfo];      return;    }        socket->flags = kSocketStarted;    [socket didConnect:socket->stateIndex];  }});    return errorOccured? nil: socket;}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Configuration////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////- (id)delegate{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		return delegate;	}	else	{		__block id result;				dispatch_sync(socketQueue, ^{            result = self->delegate;		});				return result;	}}- (void)setDelegate:(id)newDelegate synchronously:(BOOL)synchronously{	dispatch_block_t block = ^{        self->delegate = newDelegate;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey)) {		block();	}	else {		if (synchronously)			dispatch_sync(socketQueue, block);		else			dispatch_async(socketQueue, block);	}}- (void)setDelegate:(id<GCDAsyncSocketDelegate>)newDelegate{	[self setDelegate:newDelegate synchronously:NO];}- (void)synchronouslySetDelegate:(id<GCDAsyncSocketDelegate>)newDelegate{	[self setDelegate:newDelegate synchronously:YES];}- (dispatch_queue_t)delegateQueue{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		return delegateQueue;	}	else	{		__block dispatch_queue_t result;				dispatch_sync(socketQueue, ^{            result = self->delegateQueue;		});				return result;	}}- (void)setDelegateQueue:(dispatch_queue_t)newDelegateQueue synchronously:(BOOL)synchronously{	dispatch_block_t block = ^{				#if !OS_OBJECT_USE_OBJC        if (self->delegateQueue) dispatch_release(self->delegateQueue);		if (newDelegateQueue) dispatch_retain(newDelegateQueue);		#endif		        self->delegateQueue = newDelegateQueue;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey)) {		block();	}	else {		if (synchronously)			dispatch_sync(socketQueue, block);		else			dispatch_async(socketQueue, block);	}}- (void)setDelegateQueue:(dispatch_queue_t)newDelegateQueue{	[self setDelegateQueue:newDelegateQueue synchronously:NO];}- (void)synchronouslySetDelegateQueue:(dispatch_queue_t)newDelegateQueue{	[self setDelegateQueue:newDelegateQueue synchronously:YES];}- (void)getDelegate:(id<GCDAsyncSocketDelegate> *)delegatePtr delegateQueue:(dispatch_queue_t *)delegateQueuePtr{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		if (delegatePtr) *delegatePtr = delegate;		if (delegateQueuePtr) *delegateQueuePtr = delegateQueue;	}	else	{		__block id dPtr = NULL;		__block dispatch_queue_t dqPtr = NULL;				dispatch_sync(socketQueue, ^{            dPtr = self->delegate;            dqPtr = self->delegateQueue;		});				if (delegatePtr) *delegatePtr = dPtr;		if (delegateQueuePtr) *delegateQueuePtr = dqPtr;	}}- (void)setDelegate:(id)newDelegate delegateQueue:(dispatch_queue_t)newDelegateQueue synchronously:(BOOL)synchronously{	dispatch_block_t block = ^{		        self->delegate = newDelegate;				#if !OS_OBJECT_USE_OBJC        if (self->delegateQueue) dispatch_release(self->delegateQueue);		if (newDelegateQueue) dispatch_retain(newDelegateQueue);		#endif		        self->delegateQueue = newDelegateQueue;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey)) {		block();	}	else {		if (synchronously)			dispatch_sync(socketQueue, block);		else			dispatch_async(socketQueue, block);	}}- (void)setDelegate:(id<GCDAsyncSocketDelegate>)newDelegate delegateQueue:(dispatch_queue_t)newDelegateQueue{	[self setDelegate:newDelegate delegateQueue:newDelegateQueue synchronously:NO];}- (void)synchronouslySetDelegate:(id<GCDAsyncSocketDelegate>)newDelegate delegateQueue:(dispatch_queue_t)newDelegateQueue{	[self setDelegate:newDelegate delegateQueue:newDelegateQueue synchronously:YES];}- (BOOL)isIPv4Enabled{	// Note: YES means kIPv4Disabled is OFF		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		return ((config & kIPv4Disabled) == 0);	}	else	{		__block BOOL result;				dispatch_sync(socketQueue, ^{            result = ((self->config & kIPv4Disabled) == 0);		});				return result;	}}- (void)setIPv4Enabled:(BOOL)flag{	// Note: YES means kIPv4Disabled is OFF		dispatch_block_t block = ^{				if (flag)            self->config &= ~kIPv4Disabled;		else            self->config |= kIPv4Disabled;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_async(socketQueue, block);}- (BOOL)isIPv6Enabled{	// Note: YES means kIPv6Disabled is OFF		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		return ((config & kIPv6Disabled) == 0);	}	else	{		__block BOOL result;				dispatch_sync(socketQueue, ^{            result = ((self->config & kIPv6Disabled) == 0);		});				return result;	}}- (void)setIPv6Enabled:(BOOL)flag{	// Note: YES means kIPv6Disabled is OFF		dispatch_block_t block = ^{				if (flag)            self->config &= ~kIPv6Disabled;		else            self->config |= kIPv6Disabled;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_async(socketQueue, block);}- (BOOL)isIPv4PreferredOverIPv6{	// Note: YES means kPreferIPv6 is OFF		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		return ((config & kPreferIPv6) == 0);	}	else	{		__block BOOL result;				dispatch_sync(socketQueue, ^{            result = ((self->config & kPreferIPv6) == 0);		});				return result;	}}- (void)setIPv4PreferredOverIPv6:(BOOL)flag{	// Note: YES means kPreferIPv6 is OFF		dispatch_block_t block = ^{				if (flag)            self->config &= ~kPreferIPv6;		else            self->config |= kPreferIPv6;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_async(socketQueue, block);}- (NSTimeInterval) alternateAddressDelay {    __block NSTimeInterval delay;    dispatch_block_t block = ^{        delay = self->alternateAddressDelay;    };    if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))        block();    else        dispatch_sync(socketQueue, block);    return delay;}- (void) setAlternateAddressDelay:(NSTimeInterval)delay {    dispatch_block_t block = ^{        self->alternateAddressDelay = delay;    };    if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))        block();    else        dispatch_async(socketQueue, block);}- (id)userData{	__block id result = nil;		dispatch_block_t block = ^{		        result = self->userData;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		return result;}- (void)setUserData:(id)arbitraryUserData{	dispatch_block_t block = ^{		        if (self->userData != arbitraryUserData)		{            self->userData = arbitraryUserData;		}	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_async(socketQueue, block);}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Accepting////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////- (BOOL)acceptOnPort:(uint16_t)port error:(NSError **)errPtr{	return [self acceptOnInterface:nil port:port error:errPtr];}- (BOOL)acceptOnInterface:(NSString *)inInterface port:(uint16_t)port error:(NSError **)errPtr{	LogTrace();		// Just in-case interface parameter is immutable.	NSString *interface = [inInterface copy];		__block BOOL result = NO;	__block NSError *err = nil;		// CreateSocket Block	// This block will be invoked within the dispatch block below.		int(^createSocket)(int, NSData*) = ^int (int domain, NSData *interfaceAddr) {				int socketFD = socket(domain, SOCK_STREAM, 0);				if (socketFD == SOCKET_NULL)		{			NSString *reason = @"Error in socket() function";			err = [self errorWithErrno:errno reason:reason];						return SOCKET_NULL;		}				int status;				// Set socket options				status = fcntl(socketFD, F_SETFL, O_NONBLOCK);		if (status == -1)		{			NSString *reason = @"Error enabling non-blocking IO on socket (fcntl)";			err = [self errorWithErrno:errno reason:reason];						LogVerbose(@"close(socketFD)");			close(socketFD);			return SOCKET_NULL;		}				int reuseOn = 1;		status = setsockopt(socketFD, SOL_SOCKET, SO_REUSEADDR, &reuseOn, sizeof(reuseOn));		if (status == -1)		{			NSString *reason = @"Error enabling address reuse (setsockopt)";			err = [self errorWithErrno:errno reason:reason];						LogVerbose(@"close(socketFD)");			close(socketFD);			return SOCKET_NULL;		}				// Bind socket				status = bind(socketFD, (const struct sockaddr *)[interfaceAddr bytes], (socklen_t)[interfaceAddr length]);		if (status == -1)		{			NSString *reason = @"Error in bind() function";			err = [self errorWithErrno:errno reason:reason];						LogVerbose(@"close(socketFD)");			close(socketFD);			return SOCKET_NULL;		}				// Listen				status = listen(socketFD, 1024);		if (status == -1)		{			NSString *reason = @"Error in listen() function";			err = [self errorWithErrno:errno reason:reason];						LogVerbose(@"close(socketFD)");			close(socketFD);			return SOCKET_NULL;		}				return socketFD;	};		// Create dispatch block and run on socketQueue		dispatch_block_t block = ^{ @autoreleasepool {		        if (self->delegate == nil) // Must have delegate set		{			NSString *msg = @"Attempting to accept without a delegate. Set a delegate first.";			err = [self badConfigError:msg];						return_from_block;		}		        if (self->delegateQueue == NULL) // Must have delegate queue set		{			NSString *msg = @"Attempting to accept without a delegate queue. Set a delegate queue first.";			err = [self badConfigError:msg];						return_from_block;		}		        BOOL isIPv4Disabled = (self->config & kIPv4Disabled) ? YES : NO;        BOOL isIPv6Disabled = (self->config & kIPv6Disabled) ? YES : NO;				if (isIPv4Disabled && isIPv6Disabled) // Must have IPv4 or IPv6 enabled		{			NSString *msg = @"Both IPv4 and IPv6 have been disabled. Must enable at least one protocol first.";			err = [self badConfigError:msg];						return_from_block;		}				if (![self isDisconnected]) // Must be disconnected		{			NSString *msg = @"Attempting to accept while connected or accepting connections. Disconnect first.";			err = [self badConfigError:msg];						return_from_block;		}				// Clear queues (spurious read/write requests post disconnect)        [self->readQueue removeAllObjects];        [self->writeQueue removeAllObjects];				// Resolve interface from description				NSMutableData *interface4 = nil;		NSMutableData *interface6 = nil;				[self getInterfaceAddress4:&interface4 address6:&interface6 fromDescription:interface port:port];				if ((interface4 == nil) && (interface6 == nil))		{			NSString *msg = @"Unknown interface. Specify valid interface by name (e.g. \"en1\") or IP address.";			err = [self badParamError:msg];						return_from_block;		}				if (isIPv4Disabled && (interface6 == nil))		{			NSString *msg = @"IPv4 has been disabled and specified interface doesn't support IPv6.";			err = [self badParamError:msg];						return_from_block;		}				if (isIPv6Disabled && (interface4 == nil))		{			NSString *msg = @"IPv6 has been disabled and specified interface doesn't support IPv4.";			err = [self badParamError:msg];						return_from_block;		}				BOOL enableIPv4 = !isIPv4Disabled && (interface4 != nil);		BOOL enableIPv6 = !isIPv6Disabled && (interface6 != nil);				// Create sockets, configure, bind, and listen				if (enableIPv4)		{			LogVerbose(@"Creating IPv4 socket");            self->socket4FD = createSocket(AF_INET, interface4);			            if (self->socket4FD == SOCKET_NULL)			{				return_from_block;			}		}				if (enableIPv6)		{			LogVerbose(@"Creating IPv6 socket");						if (enableIPv4 && (port == 0))			{				// No specific port was specified, so we allowed the OS to pick an available port for us.				// Now we need to make sure the IPv6 socket listens on the same port as the IPv4 socket.								struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)[interface6 mutableBytes];				addr6->sin6_port = htons([self localPort4]);			}			            self->socket6FD = createSocket(AF_INET6, interface6);			            if (self->socket6FD == SOCKET_NULL)			{                if (self->socket4FD != SOCKET_NULL)				{					LogVerbose(@"close(socket4FD)");                    close(self->socket4FD);                    self->socket4FD = SOCKET_NULL;				}								return_from_block;			}		}				// Create accept sources				if (enableIPv4)		{            self->accept4Source = dispatch_source_create(DISPATCH_SOURCE_TYPE_READ, self->socket4FD, 0, self->socketQueue);			            int socketFD = self->socket4FD;            dispatch_source_t acceptSource = self->accept4Source;						__weak GCDAsyncSocket *weakSelf = self;			            dispatch_source_set_event_handler(self->accept4Source, ^{ @autoreleasepool {			#pragma clang diagnostic push			#pragma clang diagnostic warning "-Wimplicit-retain-self"								__strong GCDAsyncSocket *strongSelf = weakSelf;				if (strongSelf == nil) return_from_block;								LogVerbose(@"event4Block");								unsigned long i = 0;				unsigned long numPendingConnections = dispatch_source_get_data(acceptSource);								LogVerbose(@"numPendingConnections: %lu", numPendingConnections);								while ([strongSelf doAccept:socketFD] && (++i < numPendingConnections));							#pragma clang diagnostic pop			}});						            dispatch_source_set_cancel_handler(self->accept4Source, ^{			#pragma clang diagnostic push			#pragma clang diagnostic warning "-Wimplicit-retain-self"								#if !OS_OBJECT_USE_OBJC				LogVerbose(@"dispatch_release(accept4Source)");				dispatch_release(acceptSource);				#endif								LogVerbose(@"close(socket4FD)");				close(socketFD);						#pragma clang diagnostic pop			});						LogVerbose(@"dispatch_resume(accept4Source)");            dispatch_resume(self->accept4Source);		}				if (enableIPv6)		{            self->accept6Source = dispatch_source_create(DISPATCH_SOURCE_TYPE_READ, self->socket6FD, 0, self->socketQueue);			            int socketFD = self->socket6FD;            dispatch_source_t acceptSource = self->accept6Source;						__weak GCDAsyncSocket *weakSelf = self;			            dispatch_source_set_event_handler(self->accept6Source, ^{ @autoreleasepool {			#pragma clang diagnostic push			#pragma clang diagnostic warning "-Wimplicit-retain-self"								__strong GCDAsyncSocket *strongSelf = weakSelf;				if (strongSelf == nil) return_from_block;								LogVerbose(@"event6Block");								unsigned long i = 0;				unsigned long numPendingConnections = dispatch_source_get_data(acceptSource);								LogVerbose(@"numPendingConnections: %lu", numPendingConnections);								while ([strongSelf doAccept:socketFD] && (++i < numPendingConnections));							#pragma clang diagnostic pop			}});			            dispatch_source_set_cancel_handler(self->accept6Source, ^{			#pragma clang diagnostic push			#pragma clang diagnostic warning "-Wimplicit-retain-self"								#if !OS_OBJECT_USE_OBJC				LogVerbose(@"dispatch_release(accept6Source)");				dispatch_release(acceptSource);				#endif								LogVerbose(@"close(socket6FD)");				close(socketFD);							#pragma clang diagnostic pop			});						LogVerbose(@"dispatch_resume(accept6Source)");            dispatch_resume(self->accept6Source);		}		        self->flags |= kSocketStarted;				result = YES;	}};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		if (result == NO)	{		LogInfo(@"Error in accept: %@", err);				if (errPtr)			*errPtr = err;	}		return result;}- (BOOL)acceptOnUrl:(NSURL *)url error:(NSError **)errPtr{	LogTrace();		__block BOOL result = NO;	__block NSError *err = nil;		// CreateSocket Block	// This block will be invoked within the dispatch block below.		int(^createSocket)(int, NSData*) = ^int (int domain, NSData *interfaceAddr) {				int socketFD = socket(domain, SOCK_STREAM, 0);				if (socketFD == SOCKET_NULL)		{			NSString *reason = @"Error in socket() function";			err = [self errorWithErrno:errno reason:reason];						return SOCKET_NULL;		}				int status;				// Set socket options				status = fcntl(socketFD, F_SETFL, O_NONBLOCK);		if (status == -1)		{			NSString *reason = @"Error enabling non-blocking IO on socket (fcntl)";			err = [self errorWithErrno:errno reason:reason];						LogVerbose(@"close(socketFD)");			close(socketFD);			return SOCKET_NULL;		}				int reuseOn = 1;		status = setsockopt(socketFD, SOL_SOCKET, SO_REUSEADDR, &reuseOn, sizeof(reuseOn));		if (status == -1)		{			NSString *reason = @"Error enabling address reuse (setsockopt)";			err = [self errorWithErrno:errno reason:reason];						LogVerbose(@"close(socketFD)");			close(socketFD);			return SOCKET_NULL;		}				// Bind socket				status = bind(socketFD, (const struct sockaddr *)[interfaceAddr bytes], (socklen_t)[interfaceAddr length]);		if (status == -1)		{			NSString *reason = @"Error in bind() function";			err = [self errorWithErrno:errno reason:reason];						LogVerbose(@"close(socketFD)");			close(socketFD);			return SOCKET_NULL;		}				// Listen				status = listen(socketFD, 1024);		if (status == -1)		{			NSString *reason = @"Error in listen() function";			err = [self errorWithErrno:errno reason:reason];						LogVerbose(@"close(socketFD)");			close(socketFD);			return SOCKET_NULL;		}				return socketFD;	};		// Create dispatch block and run on socketQueue		dispatch_block_t block = ^{ @autoreleasepool {		        if (self->delegate == nil) // Must have delegate set		{			NSString *msg = @"Attempting to accept without a delegate. Set a delegate first.";			err = [self badConfigError:msg];						return_from_block;		}		        if (self->delegateQueue == NULL) // Must have delegate queue set		{			NSString *msg = @"Attempting to accept without a delegate queue. Set a delegate queue first.";			err = [self badConfigError:msg];						return_from_block;		}				if (![self isDisconnected]) // Must be disconnected		{			NSString *msg = @"Attempting to accept while connected or accepting connections. Disconnect first.";			err = [self badConfigError:msg];						return_from_block;		}				// Clear queues (spurious read/write requests post disconnect)        [self->readQueue removeAllObjects];        [self->writeQueue removeAllObjects];				// Remove a previous socket				NSError *error = nil;		NSFileManager *fileManager = [NSFileManager defaultManager];		NSString *urlPath = url.path;		if (urlPath && [fileManager fileExistsAtPath:urlPath]) {			if (![fileManager removeItemAtURL:url error:&error]) {				NSString *msg = @"Could not remove previous unix domain socket at given url.";				err = [self otherError:msg];								return_from_block;			}		}				// Resolve interface from description				NSData *interface = [self getInterfaceAddressFromUrl:url];				if (interface == nil)		{			NSString *msg = @"Invalid unix domain url. Specify a valid file url that does not exist (e.g. \"file:///tmp/socket\")";			err = [self badParamError:msg];						return_from_block;		}				// Create sockets, configure, bind, and listen				LogVerbose(@"Creating unix domain socket");        self->socketUN = createSocket(AF_UNIX, interface);		        if (self->socketUN == SOCKET_NULL)		{			return_from_block;		}		        self->socketUrl = url;				// Create accept sources		        self->acceptUNSource = dispatch_source_create(DISPATCH_SOURCE_TYPE_READ, self->socketUN, 0, self->socketQueue);		        int socketFD = self->socketUN;        dispatch_source_t acceptSource = self->acceptUNSource;				__weak GCDAsyncSocket *weakSelf = self;		        dispatch_source_set_event_handler(self->acceptUNSource, ^{ @autoreleasepool {						__strong GCDAsyncSocket *strongSelf = weakSelf;						LogVerbose(@"eventUNBlock");						unsigned long i = 0;			unsigned long numPendingConnections = dispatch_source_get_data(acceptSource);						LogVerbose(@"numPendingConnections: %lu", numPendingConnections);						while ([strongSelf doAccept:socketFD] && (++i < numPendingConnections));		}});		        dispatch_source_set_cancel_handler(self->acceptUNSource, ^{			#if !OS_OBJECT_USE_OBJC			LogVerbose(@"dispatch_release(acceptUNSource)");			dispatch_release(acceptSource);#endif						LogVerbose(@"close(socketUN)");			close(socketFD);		});				LogVerbose(@"dispatch_resume(acceptUNSource)");        dispatch_resume(self->acceptUNSource);		        self->flags |= kSocketStarted;				result = YES;	}};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		if (result == NO)	{		LogInfo(@"Error in accept: %@", err);				if (errPtr)			*errPtr = err;	}		return result;	}- (BOOL)doAccept:(int)parentSocketFD{	LogTrace();		int socketType;	int childSocketFD;	NSData *childSocketAddress;		if (parentSocketFD == socket4FD)	{		socketType = 0;				struct sockaddr_in addr;		socklen_t addrLen = sizeof(addr);				childSocketFD = accept(parentSocketFD, (struct sockaddr *)&addr, &addrLen);				if (childSocketFD == -1)		{			LogWarn(@"Accept failed with error: %@", [self errnoError]);			return NO;		}				childSocketAddress = [NSData dataWithBytes:&addr length:addrLen];	}	else if (parentSocketFD == socket6FD)	{		socketType = 1;				struct sockaddr_in6 addr;		socklen_t addrLen = sizeof(addr);				childSocketFD = accept(parentSocketFD, (struct sockaddr *)&addr, &addrLen);				if (childSocketFD == -1)		{			LogWarn(@"Accept failed with error: %@", [self errnoError]);			return NO;		}				childSocketAddress = [NSData dataWithBytes:&addr length:addrLen];	}	else // if (parentSocketFD == socketUN)	{		socketType = 2;				struct sockaddr_un addr;		socklen_t addrLen = sizeof(addr);				childSocketFD = accept(parentSocketFD, (struct sockaddr *)&addr, &addrLen);				if (childSocketFD == -1)		{			LogWarn(@"Accept failed with error: %@", [self errnoError]);			return NO;		}				childSocketAddress = [NSData dataWithBytes:&addr length:addrLen];	}		// Enable non-blocking IO on the socket		int result = fcntl(childSocketFD, F_SETFL, O_NONBLOCK);	if (result == -1)	{		LogWarn(@"Error enabling non-blocking IO on accepted socket (fcntl)");		LogVerbose(@"close(childSocketFD)");		close(childSocketFD);		return NO;	}		// Prevent SIGPIPE signals		int nosigpipe = 1;	setsockopt(childSocketFD, SOL_SOCKET, SO_NOSIGPIPE, &nosigpipe, sizeof(nosigpipe));		// Notify delegate		if (delegateQueue)	{		__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;				dispatch_async(delegateQueue, ^{ @autoreleasepool {						// Query delegate for custom socket queue						dispatch_queue_t childSocketQueue = NULL;						if ([theDelegate respondsToSelector:@selector(newSocketQueueForConnectionFromAddress:onSocket:)])			{				childSocketQueue = [theDelegate newSocketQueueForConnectionFromAddress:childSocketAddress				                                                              onSocket:self];			}						// Create GCDAsyncSocket instance for accepted socket						GCDAsyncSocket *acceptedSocket = [[[self class] alloc] initWithDelegate:theDelegate                                                                      delegateQueue:self->delegateQueue																		socketQueue:childSocketQueue];						if (socketType == 0)				acceptedSocket->socket4FD = childSocketFD;			else if (socketType == 1)				acceptedSocket->socket6FD = childSocketFD;			else				acceptedSocket->socketUN = childSocketFD;						acceptedSocket->flags = (kSocketStarted | kConnected);						// Setup read and write sources for accepted socket						dispatch_async(acceptedSocket->socketQueue, ^{ @autoreleasepool {								[acceptedSocket setupReadAndWriteSourcesForNewlyConnectedSocket:childSocketFD];			}});						// Notify delegate						if ([theDelegate respondsToSelector:@selector(socket:didAcceptNewSocket:)])			{				[theDelegate socket:self didAcceptNewSocket:acceptedSocket];			}						// Release the socket queue returned from the delegate (it was retained by acceptedSocket)			#if !OS_OBJECT_USE_OBJC			if (childSocketQueue) dispatch_release(childSocketQueue);			#endif						// The accepted socket should have been retained by the delegate.			// Otherwise it gets properly released when exiting the block.		}});	}		return YES;}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Connecting/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////** * This method runs through the various checks required prior to a connection attempt. * It is shared between the connectToHost and connectToAddress methods. * **/- (BOOL)preConnectWithInterface:(NSString *)interface error:(NSError **)errPtr{	NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");		if (delegate == nil) // Must have delegate set	{		if (errPtr)		{			NSString *msg = @"Attempting to connect without a delegate. Set a delegate first.";			*errPtr = [self badConfigError:msg];		}		return NO;	}		if (delegateQueue == NULL) // Must have delegate queue set	{		if (errPtr)		{			NSString *msg = @"Attempting to connect without a delegate queue. Set a delegate queue first.";			*errPtr = [self badConfigError:msg];		}		return NO;	}		if (![self isDisconnected]) // Must be disconnected	{		if (errPtr)		{			NSString *msg = @"Attempting to connect while connected or accepting connections. Disconnect first.";			*errPtr = [self badConfigError:msg];		}		return NO;	}		BOOL isIPv4Disabled = (config & kIPv4Disabled) ? YES : NO;	BOOL isIPv6Disabled = (config & kIPv6Disabled) ? YES : NO;		if (isIPv4Disabled && isIPv6Disabled) // Must have IPv4 or IPv6 enabled	{		if (errPtr)		{			NSString *msg = @"Both IPv4 and IPv6 have been disabled. Must enable at least one protocol first.";			*errPtr = [self badConfigError:msg];		}		return NO;	}		if (interface)	{		NSMutableData *interface4 = nil;		NSMutableData *interface6 = nil;				[self getInterfaceAddress4:&interface4 address6:&interface6 fromDescription:interface port:0];				if ((interface4 == nil) && (interface6 == nil))		{			if (errPtr)			{				NSString *msg = @"Unknown interface. Specify valid interface by name (e.g. \"en1\") or IP address.";				*errPtr = [self badParamError:msg];			}			return NO;		}				if (isIPv4Disabled && (interface6 == nil))		{			if (errPtr)			{				NSString *msg = @"IPv4 has been disabled and specified interface doesn't support IPv6.";				*errPtr = [self badParamError:msg];			}			return NO;		}				if (isIPv6Disabled && (interface4 == nil))		{			if (errPtr)			{				NSString *msg = @"IPv6 has been disabled and specified interface doesn't support IPv4.";				*errPtr = [self badParamError:msg];			}			return NO;		}				connectInterface4 = interface4;		connectInterface6 = interface6;	}		// Clear queues (spurious read/write requests post disconnect)	[readQueue removeAllObjects];	[writeQueue removeAllObjects];		return YES;}- (BOOL)preConnectWithUrl:(NSURL *)url error:(NSError **)errPtr{	NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");		if (delegate == nil) // Must have delegate set	{		if (errPtr)		{			NSString *msg = @"Attempting to connect without a delegate. Set a delegate first.";			*errPtr = [self badConfigError:msg];		}		return NO;	}		if (delegateQueue == NULL) // Must have delegate queue set	{		if (errPtr)		{			NSString *msg = @"Attempting to connect without a delegate queue. Set a delegate queue first.";			*errPtr = [self badConfigError:msg];		}		return NO;	}		if (![self isDisconnected]) // Must be disconnected	{		if (errPtr)		{			NSString *msg = @"Attempting to connect while connected or accepting connections. Disconnect first.";			*errPtr = [self badConfigError:msg];		}		return NO;	}		NSData *interface = [self getInterfaceAddressFromUrl:url];		if (interface == nil)	{		if (errPtr)		{			NSString *msg = @"Unknown interface. Specify valid interface by name (e.g. \"en1\") or IP address.";			*errPtr = [self badParamError:msg];		}		return NO;	}		connectInterfaceUN = interface;		// Clear queues (spurious read/write requests post disconnect)	[readQueue removeAllObjects];	[writeQueue removeAllObjects];		return YES;}- (BOOL)connectToHost:(NSString*)host onPort:(uint16_t)port error:(NSError **)errPtr{	return [self connectToHost:host onPort:port withTimeout:-1 error:errPtr];}- (BOOL)connectToHost:(NSString *)host               onPort:(uint16_t)port          withTimeout:(NSTimeInterval)timeout                error:(NSError **)errPtr{	return [self connectToHost:host onPort:port viaInterface:nil withTimeout:timeout error:errPtr];}- (BOOL)connectToHost:(NSString *)inHost               onPort:(uint16_t)port         viaInterface:(NSString *)inInterface          withTimeout:(NSTimeInterval)timeout                error:(NSError **)errPtr{	LogTrace();		// Just in case immutable objects were passed	NSString *host = [inHost copy];	NSString *interface = [inInterface copy];		__block BOOL result = NO;	__block NSError *preConnectErr = nil;		dispatch_block_t block = ^{ @autoreleasepool {				// Check for problems with host parameter				if ([host length] == 0)		{			NSString *msg = @"Invalid host parameter (nil or \"\"). Should be a domain name or IP address string.";			preConnectErr = [self badParamError:msg];						return_from_block;		}				// Run through standard pre-connect checks				if (![self preConnectWithInterface:interface error:&preConnectErr])		{			return_from_block;		}				// We've made it past all the checks.		// It's time to start the connection process.		        self->flags |= kSocketStarted;				LogVerbose(@"Dispatching DNS lookup...");				// It's possible that the given host parameter is actually a NSMutableString.		// So we want to copy it now, within this block that will be executed synchronously.		// This way the asynchronous lookup block below doesn't have to worry about it changing.				NSString *hostCpy = [host copy];		        int aStateIndex = self->stateIndex;		__weak GCDAsyncSocket *weakSelf = self;				dispatch_queue_t globalConcurrentQueue = dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);		dispatch_async(globalConcurrentQueue, ^{ @autoreleasepool {		#pragma clang diagnostic push		#pragma clang diagnostic warning "-Wimplicit-retain-self"						NSError *lookupErr = nil;			NSMutableArray *addresses = [[self class] lookupHost:hostCpy port:port error:&lookupErr];						__strong GCDAsyncSocket *strongSelf = weakSelf;			if (strongSelf == nil) return_from_block;						if (lookupErr)			{				dispatch_async(strongSelf->socketQueue, ^{ @autoreleasepool {										[strongSelf lookup:aStateIndex didFail:lookupErr];				}});			}			else			{				NSData *address4 = nil;				NSData *address6 = nil;								for (NSData *address in addresses)				{					if (!address4 && [[self class] isIPv4Address:address])					{						address4 = address;					}					else if (!address6 && [[self class] isIPv6Address:address])					{						address6 = address;					}				}								dispatch_async(strongSelf->socketQueue, ^{ @autoreleasepool {										[strongSelf lookup:aStateIndex didSucceedWithAddress4:address4 address6:address6];				}});			}					#pragma clang diagnostic pop		}});				[self startConnectTimeout:timeout];				result = YES;	}};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);			if (errPtr) *errPtr = preConnectErr;	return result;}- (BOOL)connectToAddress:(NSData *)remoteAddr error:(NSError **)errPtr{	return [self connectToAddress:remoteAddr viaInterface:nil withTimeout:-1 error:errPtr];}- (BOOL)connectToAddress:(NSData *)remoteAddr withTimeout:(NSTimeInterval)timeout error:(NSError **)errPtr{	return [self connectToAddress:remoteAddr viaInterface:nil withTimeout:timeout error:errPtr];}- (BOOL)connectToAddress:(NSData *)inRemoteAddr            viaInterface:(NSString *)inInterface             withTimeout:(NSTimeInterval)timeout                   error:(NSError **)errPtr{	LogTrace();		// Just in case immutable objects were passed	NSData *remoteAddr = [inRemoteAddr copy];	NSString *interface = [inInterface copy];		__block BOOL result = NO;	__block NSError *err = nil;		dispatch_block_t block = ^{ @autoreleasepool {				// Check for problems with remoteAddr parameter				NSData *address4 = nil;		NSData *address6 = nil;				if ([remoteAddr length] >= sizeof(struct sockaddr))		{			const struct sockaddr *sockaddr = (const struct sockaddr *)[remoteAddr bytes];						if (sockaddr->sa_family == AF_INET)			{				if ([remoteAddr length] == sizeof(struct sockaddr_in))				{					address4 = remoteAddr;				}			}			else if (sockaddr->sa_family == AF_INET6)			{				if ([remoteAddr length] == sizeof(struct sockaddr_in6))				{					address6 = remoteAddr;				}			}		}				if ((address4 == nil) && (address6 == nil))		{			NSString *msg = @"A valid IPv4 or IPv6 address was not given";			err = [self badParamError:msg];						return_from_block;		}		        BOOL isIPv4Disabled = (self->config & kIPv4Disabled) ? YES : NO;        BOOL isIPv6Disabled = (self->config & kIPv6Disabled) ? YES : NO;				if (isIPv4Disabled && (address4 != nil))		{			NSString *msg = @"IPv4 has been disabled and an IPv4 address was passed.";			err = [self badParamError:msg];						return_from_block;		}				if (isIPv6Disabled && (address6 != nil))		{			NSString *msg = @"IPv6 has been disabled and an IPv6 address was passed.";			err = [self badParamError:msg];						return_from_block;		}				// Run through standard pre-connect checks				if (![self preConnectWithInterface:interface error:&err])		{			return_from_block;		}				// We've made it past all the checks.		// It's time to start the connection process.				if (![self connectWithAddress4:address4 address6:address6 error:&err])		{			return_from_block;		}		        self->flags |= kSocketStarted;				[self startConnectTimeout:timeout];				result = YES;	}};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		if (result == NO)	{		if (errPtr)			*errPtr = err;	}		return result;}- (BOOL)connectToUrl:(NSURL *)url withTimeout:(NSTimeInterval)timeout error:(NSError **)errPtr{	LogTrace();		__block BOOL result = NO;	__block NSError *err = nil;		dispatch_block_t block = ^{ @autoreleasepool {				// Check for problems with host parameter				if ([url.path length] == 0)		{			NSString *msg = @"Invalid unix domain socket url.";			err = [self badParamError:msg];						return_from_block;		}				// Run through standard pre-connect checks				if (![self preConnectWithUrl:url error:&err])		{			return_from_block;		}				// We've made it past all the checks.		// It's time to start the connection process.		        self->flags |= kSocketStarted;				// Start the normal connection process				NSError *connectError = nil;        if (![self connectWithAddressUN:self->connectInterfaceUN error:&connectError])		{			[self closeWithError:connectError];						return_from_block;		}		[self startConnectTimeout:timeout];				result = YES;	}};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		if (result == NO)	{		if (errPtr)			*errPtr = err;	}		return result;}- (BOOL)connectToNetService:(NSNetService *)netService error:(NSError **)errPtr{	NSArray* addresses = [netService addresses];	for (NSData* address in addresses)	{		BOOL result = [self connectToAddress:address error:errPtr];		if (result)		{			return YES;		}	}		return NO;}- (void)lookup:(int)aStateIndex didSucceedWithAddress4:(NSData *)address4 address6:(NSData *)address6{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");	NSAssert(address4 || address6, @"Expected at least one valid address");		if (aStateIndex != stateIndex)	{		LogInfo(@"Ignoring lookupDidSucceed, already disconnected");				// The connect operation has been cancelled.		// That is, socket was disconnected, or connection has already timed out.		return;	}		// Check for problems		BOOL isIPv4Disabled = (config & kIPv4Disabled) ? YES : NO;	BOOL isIPv6Disabled = (config & kIPv6Disabled) ? YES : NO;		if (isIPv4Disabled && (address6 == nil))	{		NSString *msg = @"IPv4 has been disabled and DNS lookup found no IPv6 address.";				[self closeWithError:[self otherError:msg]];		return;	}		if (isIPv6Disabled && (address4 == nil))	{		NSString *msg = @"IPv6 has been disabled and DNS lookup found no IPv4 address.";				[self closeWithError:[self otherError:msg]];		return;	}		// Start the normal connection process		NSError *err = nil;	if (![self connectWithAddress4:address4 address6:address6 error:&err])	{		[self closeWithError:err];	}}/** * This method is called if the DNS lookup fails. * This method is executed on the socketQueue. *  * Since the DNS lookup executed synchronously on a global concurrent queue, * the original connection request may have already been cancelled or timed-out by the time this method is invoked. * The lookupIndex tells us whether the lookup is still valid or not.**/- (void)lookup:(int)aStateIndex didFail:(NSError *)error{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");			if (aStateIndex != stateIndex)	{		LogInfo(@"Ignoring lookup:didFail: - already disconnected");				// The connect operation has been cancelled.		// That is, socket was disconnected, or connection has already timed out.		return;	}		[self endConnectTimeout];	[self closeWithError:error];}- (BOOL)bindSocket:(int)socketFD toInterface:(NSData *)connectInterface error:(NSError **)errPtr{    // Bind the socket to the desired interface (if needed)        if (connectInterface)    {        LogVerbose(@"Binding socket...");                if ([[self class] portFromAddress:connectInterface] > 0)        {            // Since we're going to be binding to a specific port,            // we should turn on reuseaddr to allow us to override sockets in time_wait.                        int reuseOn = 1;            setsockopt(socketFD, SOL_SOCKET, SO_REUSEADDR, &reuseOn, sizeof(reuseOn));        }                const struct sockaddr *interfaceAddr = (const struct sockaddr *)[connectInterface bytes];                int result = bind(socketFD, interfaceAddr, (socklen_t)[connectInterface length]);        if (result != 0)        {            if (errPtr)                *errPtr = [self errorWithErrno:errno reason:@"Error in bind() function"];                        return NO;        }    }        return YES;}- (int)createSocket:(int)family connectInterface:(NSData *)connectInterface errPtr:(NSError **)errPtr{    int socketFD = socket(family, SOCK_STREAM, 0);        if (socketFD == SOCKET_NULL)    {        if (errPtr)            *errPtr = [self errorWithErrno:errno reason:@"Error in socket() function"];                return socketFD;    }        if (![self bindSocket:socketFD toInterface:connectInterface error:errPtr])    {        [self closeSocket:socketFD];                return SOCKET_NULL;    }        // Prevent SIGPIPE signals        int nosigpipe = 1;    setsockopt(socketFD, SOL_SOCKET, SO_NOSIGPIPE, &nosigpipe, sizeof(nosigpipe));        return socketFD;}- (void)connectSocket:(int)socketFD address:(NSData *)address stateIndex:(int)aStateIndex{    // If there already is a socket connected, we close socketFD and return    if (self.isConnected)    {        [self closeSocket:socketFD];        return;    }        // Start the connection process in a background queue        __weak GCDAsyncSocket *weakSelf = self;        dispatch_queue_t globalConcurrentQueue = dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);    dispatch_async(globalConcurrentQueue, ^{#pragma clang diagnostic push#pragma clang diagnostic warning "-Wimplicit-retain-self"                int result = connect(socketFD, (const struct sockaddr *)[address bytes], (socklen_t)[address length]);        int err = errno;                __strong GCDAsyncSocket *strongSelf = weakSelf;        if (strongSelf == nil) return_from_block;                dispatch_async(strongSelf->socketQueue, ^{ @autoreleasepool {                        if (strongSelf.isConnected)            {                [strongSelf closeSocket:socketFD];                return_from_block;            }                        if (result == 0)            {                [self closeUnusedSocket:socketFD];                                [strongSelf didConnect:aStateIndex];            }            else            {                [strongSelf closeSocket:socketFD];                                // If there are no more sockets trying to connect, we inform the error to the delegate                if (strongSelf.socket4FD == SOCKET_NULL && strongSelf.socket6FD == SOCKET_NULL)                {                    NSError *error = [strongSelf errorWithErrno:err reason:@"Error in connect() function"];                    [strongSelf didNotConnect:aStateIndex error:error];                }            }        }});        #pragma clang diagnostic pop    });        LogVerbose(@"Connecting...");}- (void)closeSocket:(int)socketFD{    if (socketFD != SOCKET_NULL &&        (socketFD == socket6FD || socketFD == socket4FD))    {        close(socketFD);                if (socketFD == socket4FD)        {            LogVerbose(@"close(socket4FD)");            socket4FD = SOCKET_NULL;        }        else if (socketFD == socket6FD)        {            LogVerbose(@"close(socket6FD)");            socket6FD = SOCKET_NULL;        }    }}- (void)closeUnusedSocket:(int)usedSocketFD{    if (usedSocketFD != socket4FD)    {        [self closeSocket:socket4FD];    }    else if (usedSocketFD != socket6FD)    {        [self closeSocket:socket6FD];    }}- (BOOL)connectWithAddress4:(NSData *)address4 address6:(NSData *)address6 error:(NSError **)errPtr{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");		LogVerbose(@"IPv4: %@:%hu", [[self class] hostFromAddress:address4], [[self class] portFromAddress:address4]);	LogVerbose(@"IPv6: %@:%hu", [[self class] hostFromAddress:address6], [[self class] portFromAddress:address6]);		// Determine socket type		BOOL preferIPv6 = (config & kPreferIPv6) ? YES : NO;		// Create and bind the sockets        if (address4)    {        LogVerbose(@"Creating IPv4 socket");                socket4FD = [self createSocket:AF_INET connectInterface:connectInterface4 errPtr:errPtr];    }        if (address6)    {        LogVerbose(@"Creating IPv6 socket");                socket6FD = [self createSocket:AF_INET6 connectInterface:connectInterface6 errPtr:errPtr];    }        if (socket4FD == SOCKET_NULL && socket6FD == SOCKET_NULL)    {        return NO;    }		int socketFD, alternateSocketFD;	NSData *address, *alternateAddress;	    if ((preferIPv6 && socket6FD != SOCKET_NULL) || socket4FD == SOCKET_NULL)    {        socketFD = socket6FD;        alternateSocketFD = socket4FD;        address = address6;        alternateAddress = address4;    }    else    {        socketFD = socket4FD;        alternateSocketFD = socket6FD;        address = address4;        alternateAddress = address6;    }    int aStateIndex = stateIndex;        [self connectSocket:socketFD address:address stateIndex:aStateIndex];        if (alternateAddress)    {        dispatch_after(dispatch_time(DISPATCH_TIME_NOW, (int64_t)(alternateAddressDelay * NSEC_PER_SEC)), socketQueue, ^{            [self connectSocket:alternateSocketFD address:alternateAddress stateIndex:aStateIndex];        });    }		return YES;}- (BOOL)connectWithAddressUN:(NSData *)address error:(NSError **)errPtr{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");		// Create the socket		int socketFD;		LogVerbose(@"Creating unix domain socket");		socketUN = socket(AF_UNIX, SOCK_STREAM, 0);		socketFD = socketUN;		if (socketFD == SOCKET_NULL)	{		if (errPtr)			*errPtr = [self errorWithErrno:errno reason:@"Error in socket() function"];				return NO;	}		// Bind the socket to the desired interface (if needed)		LogVerbose(@"Binding socket...");		int reuseOn = 1;	setsockopt(socketFD, SOL_SOCKET, SO_REUSEADDR, &reuseOn, sizeof(reuseOn));//	const struct sockaddr *interfaceAddr = (const struct sockaddr *)[address bytes];//	//	int result = bind(socketFD, interfaceAddr, (socklen_t)[address length]);//	if (result != 0)//	{//		if (errPtr)//			*errPtr = [self errnoErrorWithReason:@"Error in bind() function"];//		//		return NO;//	}		// Prevent SIGPIPE signals		int nosigpipe = 1;	setsockopt(socketFD, SOL_SOCKET, SO_NOSIGPIPE, &nosigpipe, sizeof(nosigpipe));		// Start the connection process in a background queue		int aStateIndex = stateIndex;		dispatch_queue_t globalConcurrentQueue = dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);	dispatch_async(globalConcurrentQueue, ^{				const struct sockaddr *addr = (const struct sockaddr *)[address bytes];		int result = connect(socketFD, addr, addr->sa_len);		if (result == 0)		{            dispatch_async(self->socketQueue, ^{ @autoreleasepool {								[self didConnect:aStateIndex];			}});		}		else		{			// TODO: Bad file descriptor			perror("connect");			NSError *error = [self errorWithErrno:errno reason:@"Error in connect() function"];			            dispatch_async(self->socketQueue, ^{ @autoreleasepool {								[self didNotConnect:aStateIndex error:error];			}});		}	});		LogVerbose(@"Connecting...");		return YES;}- (void)didConnect:(int)aStateIndex{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");			if (aStateIndex != stateIndex)	{		LogInfo(@"Ignoring didConnect, already disconnected");				// The connect operation has been cancelled.		// That is, socket was disconnected, or connection has already timed out.		return;	}		flags |= kConnected;		[self endConnectTimeout];		#if TARGET_OS_IPHONE	// The endConnectTimeout method executed above incremented the stateIndex.	aStateIndex = stateIndex;	#endif		// Setup read/write streams (as workaround for specific shortcomings in the iOS platform)	// 	// Note:	// There may be configuration options that must be set by the delegate before opening the streams.	// The primary example is the kCFStreamNetworkServiceTypeVoIP flag, which only works on an unopened stream.	// 	// Thus we wait until after the socket:didConnectToHost:port: delegate method has completed.	// This gives the delegate time to properly configure the streams if needed.		dispatch_block_t SetupStreamsPart1 = ^{		#if TARGET_OS_IPHONE				if (![self createReadAndWriteStream])		{			[self closeWithError:[self otherError:@"Error creating CFStreams"]];			return;		}				if (![self registerForStreamCallbacksIncludingReadWrite:NO])		{			[self closeWithError:[self otherError:@"Error in CFStreamSetClient"]];			return;		}				#endif	};	dispatch_block_t SetupStreamsPart2 = ^{		#if TARGET_OS_IPHONE		        if (aStateIndex != self->stateIndex)		{			// The socket has been disconnected.			return;		}				if (![self addStreamsToRunLoop])		{			[self closeWithError:[self otherError:@"Error in CFStreamScheduleWithRunLoop"]];			return;		}				if (![self openStreams])		{			[self closeWithError:[self otherError:@"Error creating CFStreams"]];			return;		}				#endif	};		// Notify delegate		NSString *host = [self connectedHost];	uint16_t port = [self connectedPort];	NSURL *url = [self connectedUrl];		__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;	if (delegateQueue && host != nil && [theDelegate respondsToSelector:@selector(socket:didConnectToHost:port:)])	{		SetupStreamsPart1();				dispatch_async(delegateQueue, ^{ @autoreleasepool {						[theDelegate socket:self didConnectToHost:host port:port];			            dispatch_async(self->socketQueue, ^{ @autoreleasepool {								SetupStreamsPart2();			}});		}});	}	else if (delegateQueue && url != nil && [theDelegate respondsToSelector:@selector(socket:didConnectToUrl:)])	{		SetupStreamsPart1();				dispatch_async(delegateQueue, ^{ @autoreleasepool {						[theDelegate socket:self didConnectToUrl:url];			            dispatch_async(self->socketQueue, ^{ @autoreleasepool {								SetupStreamsPart2();			}});		}});	}	else	{		SetupStreamsPart1();		SetupStreamsPart2();	}			// Get the connected socket		int socketFD = (socket4FD != SOCKET_NULL) ? socket4FD : (socket6FD != SOCKET_NULL) ? socket6FD : socketUN;		// Enable non-blocking IO on the socket		int result = fcntl(socketFD, F_SETFL, O_NONBLOCK);	if (result == -1)	{		NSString *errMsg = @"Error enabling non-blocking IO on socket (fcntl)";		[self closeWithError:[self otherError:errMsg]];				return;	}		// Setup our read/write sources		[self setupReadAndWriteSourcesForNewlyConnectedSocket:socketFD];		// Dequeue any pending read/write requests		[self maybeDequeueRead];	[self maybeDequeueWrite];}- (void)didNotConnect:(int)aStateIndex error:(NSError *)error{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");			if (aStateIndex != stateIndex)	{		LogInfo(@"Ignoring didNotConnect, already disconnected");				// The connect operation has been cancelled.		// That is, socket was disconnected, or connection has already timed out.		return;	}		[self closeWithError:error];}- (void)startConnectTimeout:(NSTimeInterval)timeout{	if (timeout >= 0.0)	{		connectTimer = dispatch_source_create(DISPATCH_SOURCE_TYPE_TIMER, 0, 0, socketQueue);				__weak GCDAsyncSocket *weakSelf = self;				dispatch_source_set_event_handler(connectTimer, ^{ @autoreleasepool {		#pragma clang diagnostic push		#pragma clang diagnostic warning "-Wimplicit-retain-self"					__strong GCDAsyncSocket *strongSelf = weakSelf;			if (strongSelf == nil) return_from_block;						[strongSelf doConnectTimeout];					#pragma clang diagnostic pop		}});				#if !OS_OBJECT_USE_OBJC		dispatch_source_t theConnectTimer = connectTimer;		dispatch_source_set_cancel_handler(connectTimer, ^{		#pragma clang diagnostic push		#pragma clang diagnostic warning "-Wimplicit-retain-self"						LogVerbose(@"dispatch_release(connectTimer)");			dispatch_release(theConnectTimer);					#pragma clang diagnostic pop		});		#endif				dispatch_time_t tt = dispatch_time(DISPATCH_TIME_NOW, (int64_t)(timeout * NSEC_PER_SEC));		dispatch_source_set_timer(connectTimer, tt, DISPATCH_TIME_FOREVER, 0);				dispatch_resume(connectTimer);	}}- (void)endConnectTimeout{	LogTrace();		if (connectTimer)	{		dispatch_source_cancel(connectTimer);		connectTimer = NULL;	}		// Increment stateIndex.	// This will prevent us from processing results from any related background asynchronous operations.	// 	// Note: This should be called from close method even if connectTimer is NULL.	// This is because one might disconnect a socket prior to a successful connection which had no timeout.		stateIndex++;		if (connectInterface4)	{		connectInterface4 = nil;	}	if (connectInterface6)	{		connectInterface6 = nil;	}}- (void)doConnectTimeout{	LogTrace();		[self endConnectTimeout];	[self closeWithError:[self connectTimeoutError]];}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Disconnecting////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////- (void)closeWithError:(NSError *)error{	LogTrace();	NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");		[self endConnectTimeout];		if (currentRead != nil)  [self endCurrentRead];	if (currentWrite != nil) [self endCurrentWrite];		[readQueue removeAllObjects];	[writeQueue removeAllObjects];		[preBuffer reset];		#if TARGET_OS_IPHONE	{		if (readStream || writeStream)		{			[self removeStreamsFromRunLoop];						if (readStream)			{				CFReadStreamSetClient(readStream, kCFStreamEventNone, NULL, NULL);				CFReadStreamClose(readStream);				CFRelease(readStream);				readStream = NULL;			}			if (writeStream)			{				CFWriteStreamSetClient(writeStream, kCFStreamEventNone, NULL, NULL);				CFWriteStreamClose(writeStream);				CFRelease(writeStream);				writeStream = NULL;			}		}	}	#endif		[sslPreBuffer reset];	sslErrCode = lastSSLHandshakeError = noErr;		if (sslContext)	{		// Getting a linker error here about the SSLx() functions?		// You need to add the Security Framework to your application.				SSLClose(sslContext);				#if TARGET_OS_IPHONE || (__MAC_OS_X_VERSION_MIN_REQUIRED >= 1080)		CFRelease(sslContext);		#else		SSLDisposeContext(sslContext);		#endif				sslContext = NULL;	}		// For some crazy reason (in my opinion), cancelling a dispatch source doesn't	// invoke the cancel handler if the dispatch source is paused.	// So we have to unpause the source if needed.	// This allows the cancel handler to be run, which in turn releases the source and closes the socket.		if (!accept4Source && !accept6Source && !acceptUNSource && !readSource && !writeSource)	{		LogVerbose(@"manually closing close");		if (socket4FD != SOCKET_NULL)		{			LogVerbose(@"close(socket4FD)");			close(socket4FD);			socket4FD = SOCKET_NULL;		}		if (socket6FD != SOCKET_NULL)		{			LogVerbose(@"close(socket6FD)");			close(socket6FD);			socket6FD = SOCKET_NULL;		}				if (socketUN != SOCKET_NULL)		{			LogVerbose(@"close(socketUN)");			close(socketUN);			socketUN = SOCKET_NULL;			unlink(socketUrl.path.fileSystemRepresentation);			socketUrl = nil;		}	}	else	{		if (accept4Source)		{			LogVerbose(@"dispatch_source_cancel(accept4Source)");			dispatch_source_cancel(accept4Source);						// We never suspend accept4Source						accept4Source = NULL;		}				if (accept6Source)		{			LogVerbose(@"dispatch_source_cancel(accept6Source)");			dispatch_source_cancel(accept6Source);						// We never suspend accept6Source						accept6Source = NULL;		}				if (acceptUNSource)		{			LogVerbose(@"dispatch_source_cancel(acceptUNSource)");			dispatch_source_cancel(acceptUNSource);						// We never suspend acceptUNSource						acceptUNSource = NULL;		}			if (readSource)		{			LogVerbose(@"dispatch_source_cancel(readSource)");			dispatch_source_cancel(readSource);						[self resumeReadSource];						readSource = NULL;		}				if (writeSource)		{			LogVerbose(@"dispatch_source_cancel(writeSource)");			dispatch_source_cancel(writeSource);						[self resumeWriteSource];						writeSource = NULL;		}				// The sockets will be closed by the cancel handlers of the corresponding source				socket4FD = SOCKET_NULL;		socket6FD = SOCKET_NULL;		socketUN = SOCKET_NULL;	}		// If the client has passed the connect/accept method, then the connection has at least begun.	// Notify delegate that it is now ending.	BOOL shouldCallDelegate = (flags & kSocketStarted) ? YES : NO;	BOOL isDeallocating = (flags & kDealloc) ? YES : NO;		// Clear stored socket info and all flags (config remains as is)	socketFDBytesAvailable = 0;	flags = 0;	sslWriteCachedLength = 0;		if (shouldCallDelegate)	{		__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;		__strong id theSelf = isDeallocating ? nil : self;				if (delegateQueue && [theDelegate respondsToSelector: @selector(socketDidDisconnect:withError:)])		{			dispatch_async(delegateQueue, ^{ @autoreleasepool {								[theDelegate socketDidDisconnect:theSelf withError:error];			}});		}		}}- (void)disconnect{	dispatch_block_t block = ^{ @autoreleasepool {		        if (self->flags & kSocketStarted)		{			[self closeWithError:nil];		}	}};		// Synchronous disconnection, as documented in the header file		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);}- (void)disconnectAfterReading{	dispatch_async(socketQueue, ^{ @autoreleasepool {		        if (self->flags & kSocketStarted)		{            self->flags |= (kForbidReadsWrites | kDisconnectAfterReads);			[self maybeClose];		}	}});}- (void)disconnectAfterWriting{	dispatch_async(socketQueue, ^{ @autoreleasepool {		        if (self->flags & kSocketStarted)		{            self->flags |= (kForbidReadsWrites | kDisconnectAfterWrites);			[self maybeClose];		}	}});}- (void)disconnectAfterReadingAndWriting{	dispatch_async(socketQueue, ^{ @autoreleasepool {		        if (self->flags & kSocketStarted)		{            self->flags |= (kForbidReadsWrites | kDisconnectAfterReads | kDisconnectAfterWrites);			[self maybeClose];		}	}});}/** * Closes the socket if possible. * That is, if all writes have completed, and we're set to disconnect after writing, * or if all reads have completed, and we're set to disconnect after reading.**/- (void)maybeClose{	NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");		BOOL shouldClose = NO;		if (flags & kDisconnectAfterReads)	{		if (([readQueue count] == 0) && (currentRead == nil))		{			if (flags & kDisconnectAfterWrites)			{				if (([writeQueue count] == 0) && (currentWrite == nil))				{					shouldClose = YES;				}			}			else			{				shouldClose = YES;			}		}	}	else if (flags & kDisconnectAfterWrites)	{		if (([writeQueue count] == 0) && (currentWrite == nil))		{			shouldClose = YES;		}	}		if (shouldClose)	{		[self closeWithError:nil];	}}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Errors////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////- (NSError *)badConfigError:(NSString *)errMsg{	NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketBadConfigError userInfo:userInfo];}- (NSError *)badParamError:(NSString *)errMsg{	NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketBadParamError userInfo:userInfo];}+ (NSError *)gaiError:(int)gai_error{	NSString *errMsg = [NSString stringWithCString:gai_strerror(gai_error) encoding:NSASCIIStringEncoding];	NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:@"kCFStreamErrorDomainNetDB" code:gai_error userInfo:userInfo];}- (NSError *)errorWithErrno:(int)err reason:(NSString *)reason{	NSString *errMsg = [NSString stringWithUTF8String:strerror(err)];	NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg,							   NSLocalizedFailureReasonErrorKey : reason};		return [NSError errorWithDomain:NSPOSIXErrorDomain code:err userInfo:userInfo];}- (NSError *)errnoError{	NSString *errMsg = [NSString stringWithUTF8String:strerror(errno)];	NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:NSPOSIXErrorDomain code:errno userInfo:userInfo];}- (NSError *)sslError:(OSStatus)ssl_error{	NSString *msg = @"Error code definition can be found in Apple's SecureTransport.h";	NSDictionary *userInfo = @{NSLocalizedRecoverySuggestionErrorKey : msg};		return [NSError errorWithDomain:@"kCFStreamErrorDomainSSL" code:ssl_error userInfo:userInfo];}- (NSError *)connectTimeoutError{	NSString *errMsg = NSLocalizedStringWithDefaultValue(@"GCDAsyncSocketConnectTimeoutError",	                                                     @"GCDAsyncSocket", [NSBundle mainBundle],	                                                     @"Attempt to connect to host timed out", nil);		NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketConnectTimeoutError userInfo:userInfo];}/** * Returns a standard AsyncSocket maxed out error.**/- (NSError *)readMaxedOutError{	NSString *errMsg = NSLocalizedStringWithDefaultValue(@"GCDAsyncSocketReadMaxedOutError",														 @"GCDAsyncSocket", [NSBundle mainBundle],														 @"Read operation reached set maximum length", nil);		NSDictionary *info = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketReadMaxedOutError userInfo:info];}/** * Returns a standard AsyncSocket write timeout error.**/- (NSError *)readTimeoutError{	NSString *errMsg = NSLocalizedStringWithDefaultValue(@"GCDAsyncSocketReadTimeoutError",	                                                     @"GCDAsyncSocket", [NSBundle mainBundle],	                                                     @"Read operation timed out", nil);		NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketReadTimeoutError userInfo:userInfo];}/** * Returns a standard AsyncSocket write timeout error.**/- (NSError *)writeTimeoutError{	NSString *errMsg = NSLocalizedStringWithDefaultValue(@"GCDAsyncSocketWriteTimeoutError",	                                                     @"GCDAsyncSocket", [NSBundle mainBundle],	                                                     @"Write operation timed out", nil);		NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketWriteTimeoutError userInfo:userInfo];}- (NSError *)connectionClosedError{	NSString *errMsg = NSLocalizedStringWithDefaultValue(@"GCDAsyncSocketClosedError",	                                                     @"GCDAsyncSocket", [NSBundle mainBundle],	                                                     @"Socket closed by remote peer", nil);		NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketClosedError userInfo:userInfo];}- (NSError *)otherError:(NSString *)errMsg{	NSDictionary *userInfo = @{NSLocalizedDescriptionKey : errMsg};		return [NSError errorWithDomain:GCDAsyncSocketErrorDomain code:GCDAsyncSocketOtherError userInfo:userInfo];}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Diagnostics////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////- (BOOL)isDisconnected{	__block BOOL result = NO;		dispatch_block_t block = ^{        result = (self->flags & kSocketStarted) ? NO : YES;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		return result;}- (BOOL)isConnected{	__block BOOL result = NO;		dispatch_block_t block = ^{        result = (self->flags & kConnected) ? YES : NO;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		return result;}- (NSString *)connectedHost{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		if (socket4FD != SOCKET_NULL)			return [self connectedHostFromSocket4:socket4FD];		if (socket6FD != SOCKET_NULL)			return [self connectedHostFromSocket6:socket6FD];				return nil;	}	else	{		__block NSString *result = nil;				dispatch_sync(socketQueue, ^{ @autoreleasepool {			            if (self->socket4FD != SOCKET_NULL)                result = [self connectedHostFromSocket4:self->socket4FD];            else if (self->socket6FD != SOCKET_NULL)                result = [self connectedHostFromSocket6:self->socket6FD];		}});				return result;	}}- (uint16_t)connectedPort{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		if (socket4FD != SOCKET_NULL)			return [self connectedPortFromSocket4:socket4FD];		if (socket6FD != SOCKET_NULL)			return [self connectedPortFromSocket6:socket6FD];				return 0;	}	else	{		__block uint16_t result = 0;				dispatch_sync(socketQueue, ^{			// No need for autorelease pool			            if (self->socket4FD != SOCKET_NULL)                result = [self connectedPortFromSocket4:self->socket4FD];            else if (self->socket6FD != SOCKET_NULL)                result = [self connectedPortFromSocket6:self->socket6FD];		});				return result;	}}- (NSURL *)connectedUrl{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		if (socketUN != SOCKET_NULL)			return [self connectedUrlFromSocketUN:socketUN];				return nil;	}	else	{		__block NSURL *result = nil;				dispatch_sync(socketQueue, ^{ @autoreleasepool {			            if (self->socketUN != SOCKET_NULL)                result = [self connectedUrlFromSocketUN:self->socketUN];		}});				return result;	}}- (NSString *)localHost{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		if (socket4FD != SOCKET_NULL)			return [self localHostFromSocket4:socket4FD];		if (socket6FD != SOCKET_NULL)			return [self localHostFromSocket6:socket6FD];				return nil;	}	else	{		__block NSString *result = nil;				dispatch_sync(socketQueue, ^{ @autoreleasepool {			            if (self->socket4FD != SOCKET_NULL)                result = [self localHostFromSocket4:self->socket4FD];            else if (self->socket6FD != SOCKET_NULL)                result = [self localHostFromSocket6:self->socket6FD];		}});				return result;	}}- (uint16_t)localPort{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		if (socket4FD != SOCKET_NULL)			return [self localPortFromSocket4:socket4FD];		if (socket6FD != SOCKET_NULL)			return [self localPortFromSocket6:socket6FD];				return 0;	}	else	{		__block uint16_t result = 0;				dispatch_sync(socketQueue, ^{			// No need for autorelease pool			            if (self->socket4FD != SOCKET_NULL)                result = [self localPortFromSocket4:self->socket4FD];            else if (self->socket6FD != SOCKET_NULL)                result = [self localPortFromSocket6:self->socket6FD];		});				return result;	}}- (NSString *)connectedHost4{	if (socket4FD != SOCKET_NULL)		return [self connectedHostFromSocket4:socket4FD];		return nil;}- (NSString *)connectedHost6{	if (socket6FD != SOCKET_NULL)		return [self connectedHostFromSocket6:socket6FD];		return nil;}- (uint16_t)connectedPort4{	if (socket4FD != SOCKET_NULL)		return [self connectedPortFromSocket4:socket4FD];		return 0;}- (uint16_t)connectedPort6{	if (socket6FD != SOCKET_NULL)		return [self connectedPortFromSocket6:socket6FD];		return 0;}- (NSString *)localHost4{	if (socket4FD != SOCKET_NULL)		return [self localHostFromSocket4:socket4FD];		return nil;}- (NSString *)localHost6{	if (socket6FD != SOCKET_NULL)		return [self localHostFromSocket6:socket6FD];		return nil;}- (uint16_t)localPort4{	if (socket4FD != SOCKET_NULL)		return [self localPortFromSocket4:socket4FD];		return 0;}- (uint16_t)localPort6{	if (socket6FD != SOCKET_NULL)		return [self localPortFromSocket6:socket6FD];		return 0;}- (NSString *)connectedHostFromSocket4:(int)socketFD{	struct sockaddr_in sockaddr4;	socklen_t sockaddr4len = sizeof(sockaddr4);		if (getpeername(socketFD, (struct sockaddr *)&sockaddr4, &sockaddr4len) < 0)	{		return nil;	}	return [[self class] hostFromSockaddr4:&sockaddr4];}- (NSString *)connectedHostFromSocket6:(int)socketFD{	struct sockaddr_in6 sockaddr6;	socklen_t sockaddr6len = sizeof(sockaddr6);		if (getpeername(socketFD, (struct sockaddr *)&sockaddr6, &sockaddr6len) < 0)	{		return nil;	}	return [[self class] hostFromSockaddr6:&sockaddr6];}- (uint16_t)connectedPortFromSocket4:(int)socketFD{	struct sockaddr_in sockaddr4;	socklen_t sockaddr4len = sizeof(sockaddr4);		if (getpeername(socketFD, (struct sockaddr *)&sockaddr4, &sockaddr4len) < 0)	{		return 0;	}	return [[self class] portFromSockaddr4:&sockaddr4];}- (uint16_t)connectedPortFromSocket6:(int)socketFD{	struct sockaddr_in6 sockaddr6;	socklen_t sockaddr6len = sizeof(sockaddr6);		if (getpeername(socketFD, (struct sockaddr *)&sockaddr6, &sockaddr6len) < 0)	{		return 0;	}	return [[self class] portFromSockaddr6:&sockaddr6];}- (NSURL *)connectedUrlFromSocketUN:(int)socketFD{	struct sockaddr_un sockaddr;	socklen_t sockaddrlen = sizeof(sockaddr);		if (getpeername(socketFD, (struct sockaddr *)&sockaddr, &sockaddrlen) < 0)	{		return 0;	}	return [[self class] urlFromSockaddrUN:&sockaddr];}- (NSString *)localHostFromSocket4:(int)socketFD{	struct sockaddr_in sockaddr4;	socklen_t sockaddr4len = sizeof(sockaddr4);		if (getsockname(socketFD, (struct sockaddr *)&sockaddr4, &sockaddr4len) < 0)	{		return nil;	}	return [[self class] hostFromSockaddr4:&sockaddr4];}- (NSString *)localHostFromSocket6:(int)socketFD{	struct sockaddr_in6 sockaddr6;	socklen_t sockaddr6len = sizeof(sockaddr6);		if (getsockname(socketFD, (struct sockaddr *)&sockaddr6, &sockaddr6len) < 0)	{		return nil;	}	return [[self class] hostFromSockaddr6:&sockaddr6];}- (uint16_t)localPortFromSocket4:(int)socketFD{	struct sockaddr_in sockaddr4;	socklen_t sockaddr4len = sizeof(sockaddr4);		if (getsockname(socketFD, (struct sockaddr *)&sockaddr4, &sockaddr4len) < 0)	{		return 0;	}	return [[self class] portFromSockaddr4:&sockaddr4];}- (uint16_t)localPortFromSocket6:(int)socketFD{	struct sockaddr_in6 sockaddr6;	socklen_t sockaddr6len = sizeof(sockaddr6);		if (getsockname(socketFD, (struct sockaddr *)&sockaddr6, &sockaddr6len) < 0)	{		return 0;	}	return [[self class] portFromSockaddr6:&sockaddr6];}- (NSData *)connectedAddress{	__block NSData *result = nil;		dispatch_block_t block = ^{        if (self->socket4FD != SOCKET_NULL)		{			struct sockaddr_in sockaddr4;			socklen_t sockaddr4len = sizeof(sockaddr4);			            if (getpeername(self->socket4FD, (struct sockaddr *)&sockaddr4, &sockaddr4len) == 0)			{				result = [[NSData alloc] initWithBytes:&sockaddr4 length:sockaddr4len];			}		}		        if (self->socket6FD != SOCKET_NULL)		{			struct sockaddr_in6 sockaddr6;			socklen_t sockaddr6len = sizeof(sockaddr6);			            if (getpeername(self->socket6FD, (struct sockaddr *)&sockaddr6, &sockaddr6len) == 0)			{				result = [[NSData alloc] initWithBytes:&sockaddr6 length:sockaddr6len];			}		}	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		return result;}- (NSData *)localAddress{	__block NSData *result = nil;		dispatch_block_t block = ^{        if (self->socket4FD != SOCKET_NULL)		{			struct sockaddr_in sockaddr4;			socklen_t sockaddr4len = sizeof(sockaddr4);			            if (getsockname(self->socket4FD, (struct sockaddr *)&sockaddr4, &sockaddr4len) == 0)			{				result = [[NSData alloc] initWithBytes:&sockaddr4 length:sockaddr4len];			}		}		        if (self->socket6FD != SOCKET_NULL)		{			struct sockaddr_in6 sockaddr6;			socklen_t sockaddr6len = sizeof(sockaddr6);			            if (getsockname(self->socket6FD, (struct sockaddr *)&sockaddr6, &sockaddr6len) == 0)			{				result = [[NSData alloc] initWithBytes:&sockaddr6 length:sockaddr6len];			}		}	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		return result;}- (BOOL)isIPv4{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		return (socket4FD != SOCKET_NULL);	}	else	{		__block BOOL result = NO;				dispatch_sync(socketQueue, ^{            result = (self->socket4FD != SOCKET_NULL);		});				return result;	}}- (BOOL)isIPv6{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		return (socket6FD != SOCKET_NULL);	}	else	{		__block BOOL result = NO;				dispatch_sync(socketQueue, ^{            result = (self->socket6FD != SOCKET_NULL);		});				return result;	}}- (BOOL)isSecure{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		return (flags & kSocketSecure) ? YES : NO;	}	else	{		__block BOOL result;				dispatch_sync(socketQueue, ^{            result = (self->flags & kSocketSecure) ? YES : NO;		});				return result;	}}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Utilities/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////** * Finds the address of an interface description. * An inteface description may be an interface name (en0, en1, lo0) or corresponding IP (192.168.4.34). *  * The interface description may optionally contain a port number at the end, separated by a colon. * If a non-zero port parameter is provided, any port number in the interface description is ignored. *  * The returned value is a 'struct sockaddr' wrapped in an NSMutableData object.**/- (void)getInterfaceAddress4:(NSMutableData **)interfaceAddr4Ptr                    address6:(NSMutableData **)interfaceAddr6Ptr             fromDescription:(NSString *)interfaceDescription                        port:(uint16_t)port{	NSMutableData *addr4 = nil;	NSMutableData *addr6 = nil;		NSString *interface = nil;		NSArray *components = [interfaceDescription componentsSeparatedByString:@":"];	if ([components count] > 0)	{		NSString *temp = [components objectAtIndex:0];		if ([temp length] > 0)		{			interface = temp;		}	}	if ([components count] > 1 && port == 0)	{		NSString *temp = [components objectAtIndex:1];		long portL = strtol([temp UTF8String], NULL, 10);				if (portL > 0 && portL <= UINT16_MAX)		{			port = (uint16_t)portL;		}	}		if (interface == nil)	{		// ANY address				struct sockaddr_in sockaddr4;		memset(&sockaddr4, 0, sizeof(sockaddr4));				sockaddr4.sin_len         = sizeof(sockaddr4);		sockaddr4.sin_family      = AF_INET;		sockaddr4.sin_port        = htons(port);		sockaddr4.sin_addr.s_addr = htonl(INADDR_ANY);				struct sockaddr_in6 sockaddr6;		memset(&sockaddr6, 0, sizeof(sockaddr6));				sockaddr6.sin6_len       = sizeof(sockaddr6);		sockaddr6.sin6_family    = AF_INET6;		sockaddr6.sin6_port      = htons(port);		sockaddr6.sin6_addr      = in6addr_any;				addr4 = [NSMutableData dataWithBytes:&sockaddr4 length:sizeof(sockaddr4)];		addr6 = [NSMutableData dataWithBytes:&sockaddr6 length:sizeof(sockaddr6)];	}	else if ([interface isEqualToString:@"localhost"] || [interface isEqualToString:@"loopback"])	{		// LOOPBACK address				struct sockaddr_in sockaddr4;		memset(&sockaddr4, 0, sizeof(sockaddr4));				sockaddr4.sin_len         = sizeof(sockaddr4);		sockaddr4.sin_family      = AF_INET;		sockaddr4.sin_port        = htons(port);		sockaddr4.sin_addr.s_addr = htonl(INADDR_LOOPBACK);				struct sockaddr_in6 sockaddr6;		memset(&sockaddr6, 0, sizeof(sockaddr6));				sockaddr6.sin6_len       = sizeof(sockaddr6);		sockaddr6.sin6_family    = AF_INET6;		sockaddr6.sin6_port      = htons(port);		sockaddr6.sin6_addr      = in6addr_loopback;				addr4 = [NSMutableData dataWithBytes:&sockaddr4 length:sizeof(sockaddr4)];		addr6 = [NSMutableData dataWithBytes:&sockaddr6 length:sizeof(sockaddr6)];	}	else	{		const char *iface = [interface UTF8String];				struct ifaddrs *addrs;		const struct ifaddrs *cursor;				if ((getifaddrs(&addrs) == 0))		{			cursor = addrs;			while (cursor != NULL)			{				if ((addr4 == nil) && (cursor->ifa_addr->sa_family == AF_INET))				{					// IPv4										struct sockaddr_in nativeAddr4;					memcpy(&nativeAddr4, cursor->ifa_addr, sizeof(nativeAddr4));										if (strcmp(cursor->ifa_name, iface) == 0)					{						// Name match												nativeAddr4.sin_port = htons(port);												addr4 = [NSMutableData dataWithBytes:&nativeAddr4 length:sizeof(nativeAddr4)];					}					else					{						char ip[INET_ADDRSTRLEN];												const char *conversion = inet_ntop(AF_INET, &nativeAddr4.sin_addr, ip, sizeof(ip));												if ((conversion != NULL) && (strcmp(ip, iface) == 0))						{							// IP match														nativeAddr4.sin_port = htons(port);														addr4 = [NSMutableData dataWithBytes:&nativeAddr4 length:sizeof(nativeAddr4)];						}					}				}				else if ((addr6 == nil) && (cursor->ifa_addr->sa_family == AF_INET6))				{					// IPv6										struct sockaddr_in6 nativeAddr6;					memcpy(&nativeAddr6, cursor->ifa_addr, sizeof(nativeAddr6));										if (strcmp(cursor->ifa_name, iface) == 0)					{						// Name match												nativeAddr6.sin6_port = htons(port);												addr6 = [NSMutableData dataWithBytes:&nativeAddr6 length:sizeof(nativeAddr6)];					}					else					{						char ip[INET6_ADDRSTRLEN];												const char *conversion = inet_ntop(AF_INET6, &nativeAddr6.sin6_addr, ip, sizeof(ip));												if ((conversion != NULL) && (strcmp(ip, iface) == 0))						{							// IP match														nativeAddr6.sin6_port = htons(port);														addr6 = [NSMutableData dataWithBytes:&nativeAddr6 length:sizeof(nativeAddr6)];						}					}				}								cursor = cursor->ifa_next;			}						freeifaddrs(addrs);		}	}		if (interfaceAddr4Ptr) *interfaceAddr4Ptr = addr4;	if (interfaceAddr6Ptr) *interfaceAddr6Ptr = addr6;}- (NSData *)getInterfaceAddressFromUrl:(NSURL *)url{	NSString *path = url.path;	if (path.length == 0) {		return nil;	}	    struct sockaddr_un nativeAddr;    nativeAddr.sun_family = AF_UNIX;    strlcpy(nativeAddr.sun_path, path.fileSystemRepresentation, sizeof(nativeAddr.sun_path));    nativeAddr.sun_len = (unsigned char)SUN_LEN(&nativeAddr);    NSData *interface = [NSData dataWithBytes:&nativeAddr length:sizeof(struct sockaddr_un)];		return interface;}- (void)setupReadAndWriteSourcesForNewlyConnectedSocket:(int)socketFD{	readSource = dispatch_source_create(DISPATCH_SOURCE_TYPE_READ, socketFD, 0, socketQueue);	writeSource = dispatch_source_create(DISPATCH_SOURCE_TYPE_WRITE, socketFD, 0, socketQueue);		// Setup event handlers		__weak GCDAsyncSocket *weakSelf = self;		dispatch_source_set_event_handler(readSource, ^{ @autoreleasepool {	#pragma clang diagnostic push	#pragma clang diagnostic warning "-Wimplicit-retain-self"				__strong GCDAsyncSocket *strongSelf = weakSelf;		if (strongSelf == nil) return_from_block;				LogVerbose(@"readEventBlock");				strongSelf->socketFDBytesAvailable = dispatch_source_get_data(strongSelf->readSource);		LogVerbose(@"socketFDBytesAvailable: %lu", strongSelf->socketFDBytesAvailable);				if (strongSelf->socketFDBytesAvailable > 0)			[strongSelf doReadData];		else			[strongSelf doReadEOF];			#pragma clang diagnostic pop	}});		dispatch_source_set_event_handler(writeSource, ^{ @autoreleasepool {	#pragma clang diagnostic push	#pragma clang diagnostic warning "-Wimplicit-retain-self"				__strong GCDAsyncSocket *strongSelf = weakSelf;		if (strongSelf == nil) return_from_block;				LogVerbose(@"writeEventBlock");				strongSelf->flags |= kSocketCanAcceptBytes;		[strongSelf doWriteData];			#pragma clang diagnostic pop	}});		// Setup cancel handlers		__block int socketFDRefCount = 2;		#if !OS_OBJECT_USE_OBJC	dispatch_source_t theReadSource = readSource;	dispatch_source_t theWriteSource = writeSource;	#endif		dispatch_source_set_cancel_handler(readSource, ^{	#pragma clang diagnostic push	#pragma clang diagnostic warning "-Wimplicit-retain-self"				LogVerbose(@"readCancelBlock");				#if !OS_OBJECT_USE_OBJC		LogVerbose(@"dispatch_release(readSource)");		dispatch_release(theReadSource);		#endif				if (--socketFDRefCount == 0)		{			LogVerbose(@"close(socketFD)");			close(socketFD);		}			#pragma clang diagnostic pop	});		dispatch_source_set_cancel_handler(writeSource, ^{	#pragma clang diagnostic push	#pragma clang diagnostic warning "-Wimplicit-retain-self"				LogVerbose(@"writeCancelBlock");				#if !OS_OBJECT_USE_OBJC		LogVerbose(@"dispatch_release(writeSource)");		dispatch_release(theWriteSource);		#endif				if (--socketFDRefCount == 0)		{			LogVerbose(@"close(socketFD)");			close(socketFD);		}			#pragma clang diagnostic pop	});		// We will not be able to read until data arrives.	// But we should be able to write immediately.		socketFDBytesAvailable = 0;	flags &= ~kReadSourceSuspended;		LogVerbose(@"dispatch_resume(readSource)");	dispatch_resume(readSource);		flags |= kSocketCanAcceptBytes;	flags |= kWriteSourceSuspended;}- (BOOL)usingCFStreamForTLS{	#if TARGET_OS_IPHONE		if ((flags & kSocketSecure) && (flags & kUsingCFStreamForTLS))	{		// The startTLS method was given the GCDAsyncSocketUseCFStreamForTLS flag.				return YES;	}		#endif		return NO;}- (BOOL)usingSecureTransportForTLS{	// Invoking this method is equivalent to ![self usingCFStreamForTLS] (just more readable)		#if TARGET_OS_IPHONE		if ((flags & kSocketSecure) && (flags & kUsingCFStreamForTLS))	{		// The startTLS method was given the GCDAsyncSocketUseCFStreamForTLS flag.				return NO;	}		#endif		return YES;}- (void)suspendReadSource{	if (!(flags & kReadSourceSuspended))	{		LogVerbose(@"dispatch_suspend(readSource)");				dispatch_suspend(readSource);		flags |= kReadSourceSuspended;	}}- (void)resumeReadSource{	if (flags & kReadSourceSuspended)	{		LogVerbose(@"dispatch_resume(readSource)");				dispatch_resume(readSource);		flags &= ~kReadSourceSuspended;	}}- (void)suspendWriteSource{	if (!(flags & kWriteSourceSuspended))	{		LogVerbose(@"dispatch_suspend(writeSource)");				dispatch_suspend(writeSource);		flags |= kWriteSourceSuspended;	}}- (void)resumeWriteSource{	if (flags & kWriteSourceSuspended)	{		LogVerbose(@"dispatch_resume(writeSource)");				dispatch_resume(writeSource);		flags &= ~kWriteSourceSuspended;	}}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Reading////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////- (void)readDataWithTimeout:(NSTimeInterval)timeout tag:(long)tag{	[self readDataWithTimeout:timeout buffer:nil bufferOffset:0 maxLength:0 tag:tag];}- (void)readDataWithTimeout:(NSTimeInterval)timeout                     buffer:(NSMutableData *)buffer               bufferOffset:(NSUInteger)offset                        tag:(long)tag{	[self readDataWithTimeout:timeout buffer:buffer bufferOffset:offset maxLength:0 tag:tag];}- (void)readDataWithTimeout:(NSTimeInterval)timeout                     buffer:(NSMutableData *)buffer               bufferOffset:(NSUInteger)offset                  maxLength:(NSUInteger)length                        tag:(long)tag{	if (offset > [buffer length]) {		LogWarn(@"Cannot read: offset > [buffer length]");		return;	}		GCDAsyncReadPacket *packet = [[GCDAsyncReadPacket alloc] initWithData:buffer	                                                          startOffset:offset	                                                            maxLength:length	                                                              timeout:timeout	                                                           readLength:0	                                                           terminator:nil	                                                                  tag:tag];		dispatch_async(socketQueue, ^{ @autoreleasepool {				LogTrace();		        if ((self->flags & kSocketStarted) && !(self->flags & kForbidReadsWrites))		{            [self->readQueue addObject:packet];			[self maybeDequeueRead];		}	}});		// Do not rely on the block being run in order to release the packet,	// as the queue might get released without the block completing.}- (void)readDataToLength:(NSUInteger)length withTimeout:(NSTimeInterval)timeout tag:(long)tag{	[self readDataToLength:length withTimeout:timeout buffer:nil bufferOffset:0 tag:tag];}- (void)readDataToLength:(NSUInteger)length             withTimeout:(NSTimeInterval)timeout                  buffer:(NSMutableData *)buffer            bufferOffset:(NSUInteger)offset                     tag:(long)tag{	if (length == 0) {		LogWarn(@"Cannot read: length == 0");		return;	}	if (offset > [buffer length]) {		LogWarn(@"Cannot read: offset > [buffer length]");		return;	}		GCDAsyncReadPacket *packet = [[GCDAsyncReadPacket alloc] initWithData:buffer	                                                          startOffset:offset	                                                            maxLength:0	                                                              timeout:timeout	                                                           readLength:length	                                                           terminator:nil	                                                                  tag:tag];		dispatch_async(socketQueue, ^{ @autoreleasepool {				LogTrace();		        if ((self->flags & kSocketStarted) && !(self->flags & kForbidReadsWrites))		{            [self->readQueue addObject:packet];			[self maybeDequeueRead];		}	}});		// Do not rely on the block being run in order to release the packet,	// as the queue might get released without the block completing.}- (void)readDataToData:(NSData *)data withTimeout:(NSTimeInterval)timeout tag:(long)tag{	[self readDataToData:data withTimeout:timeout buffer:nil bufferOffset:0 maxLength:0 tag:tag];}- (void)readDataToData:(NSData *)data           withTimeout:(NSTimeInterval)timeout                buffer:(NSMutableData *)buffer          bufferOffset:(NSUInteger)offset                   tag:(long)tag{	[self readDataToData:data withTimeout:timeout buffer:buffer bufferOffset:offset maxLength:0 tag:tag];}- (void)readDataToData:(NSData *)data withTimeout:(NSTimeInterval)timeout maxLength:(NSUInteger)length tag:(long)tag{	[self readDataToData:data withTimeout:timeout buffer:nil bufferOffset:0 maxLength:length tag:tag];}- (void)readDataToData:(NSData *)data           withTimeout:(NSTimeInterval)timeout                buffer:(NSMutableData *)buffer          bufferOffset:(NSUInteger)offset             maxLength:(NSUInteger)maxLength                   tag:(long)tag{	if ([data length] == 0) {		LogWarn(@"Cannot read: [data length] == 0");		return;	}	if (offset > [buffer length]) {		LogWarn(@"Cannot read: offset > [buffer length]");		return;	}	if (maxLength > 0 && maxLength < [data length]) {		LogWarn(@"Cannot read: maxLength > 0 && maxLength < [data length]");		return;	}		GCDAsyncReadPacket *packet = [[GCDAsyncReadPacket alloc] initWithData:buffer	                                                          startOffset:offset	                                                            maxLength:maxLength	                                                              timeout:timeout	                                                           readLength:0	                                                           terminator:data	                                                                  tag:tag];		dispatch_async(socketQueue, ^{ @autoreleasepool {				LogTrace();		        if ((self->flags & kSocketStarted) && !(self->flags & kForbidReadsWrites))		{            [self->readQueue addObject:packet];			[self maybeDequeueRead];		}	}});		// Do not rely on the block being run in order to release the packet,	// as the queue might get released without the block completing.}- (float)progressOfReadReturningTag:(long *)tagPtr bytesDone:(NSUInteger *)donePtr total:(NSUInteger *)totalPtr{	__block float result = 0.0F;		dispatch_block_t block = ^{		        if (!self->currentRead || ![self->currentRead isKindOfClass:[GCDAsyncReadPacket class]])		{			// We're not reading anything right now.						if (tagPtr != NULL)   *tagPtr = 0;			if (donePtr != NULL)  *donePtr = 0;			if (totalPtr != NULL) *totalPtr = 0;						result = NAN;		}		else		{			// It's only possible to know the progress of our read if we're reading to a certain length.			// If we're reading to data, we of course have no idea when the data will arrive.			// If we're reading to timeout, then we have no idea when the next chunk of data will arrive.			            NSUInteger done = self->currentRead->bytesDone;            NSUInteger total = self->currentRead->readLength;			            if (tagPtr != NULL)   *tagPtr = self->currentRead->tag;			if (donePtr != NULL)  *donePtr = done;			if (totalPtr != NULL) *totalPtr = total;						if (total > 0)				result = (float)done / (float)total;			else				result = 1.0F;		}	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		return result;}/** * This method starts a new read, if needed. *  * It is called when: * - a user requests a read * - after a read request has finished (to handle the next request) * - immediately after the socket opens to handle any pending requests *  * This method also handles auto-disconnect post read/write completion.**/- (void)maybeDequeueRead{	LogTrace();	NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");		// If we're not currently processing a read AND we have an available read stream	if ((currentRead == nil) && (flags & kConnected))	{		if ([readQueue count] > 0)		{			// Dequeue the next object in the write queue			currentRead = [readQueue objectAtIndex:0];			[readQueue removeObjectAtIndex:0];									if ([currentRead isKindOfClass:[GCDAsyncSpecialPacket class]])			{				LogVerbose(@"Dequeued GCDAsyncSpecialPacket");								// Attempt to start TLS				flags |= kStartingReadTLS;								// This method won't do anything unless both kStartingReadTLS and kStartingWriteTLS are set				[self maybeStartTLS];			}			else			{				LogVerbose(@"Dequeued GCDAsyncReadPacket");								// Setup read timer (if needed)				[self setupReadTimerWithTimeout:currentRead->timeout];								// Immediately read, if possible				[self doReadData];			}		}		else if (flags & kDisconnectAfterReads)		{			if (flags & kDisconnectAfterWrites)			{				if (([writeQueue count] == 0) && (currentWrite == nil))				{					[self closeWithError:nil];				}			}			else			{				[self closeWithError:nil];			}		}		else if (flags & kSocketSecure)		{			[self flushSSLBuffers];						// Edge case:			// 			// We just drained all data from the ssl buffers,			// and all known data from the socket (socketFDBytesAvailable).			// 			// If we didn't get any data from this process,			// then we may have reached the end of the TCP stream.			// 			// Be sure callbacks are enabled so we're notified about a disconnection.						if ([preBuffer availableBytes] == 0)			{				if ([self usingCFStreamForTLS]) {					// Callbacks never disabled				}				else {					[self resumeReadSource];				}			}		}	}}- (void)flushSSLBuffers{	LogTrace();		NSAssert((flags & kSocketSecure), @"Cannot flush ssl buffers on non-secure socket");		if ([preBuffer availableBytes] > 0)	{		// Only flush the ssl buffers if the prebuffer is empty.		// This is to avoid growing the prebuffer inifinitely large.				return;	}		#if TARGET_OS_IPHONE		if ([self usingCFStreamForTLS])	{		if ((flags & kSecureSocketHasBytesAvailable) && CFReadStreamHasBytesAvailable(readStream))		{			LogVerbose(@"%@ - Flushing ssl buffers into prebuffer...", THIS_METHOD);						CFIndex defaultBytesToRead = (1024 * 4);						[preBuffer ensureCapacityForWrite:defaultBytesToRead];						uint8_t *buffer = [preBuffer writeBuffer];						CFIndex result = CFReadStreamRead(readStream, buffer, defaultBytesToRead);			LogVerbose(@"%@ - CFReadStreamRead(): result = %i", THIS_METHOD, (int)result);						if (result > 0)			{				[preBuffer didWrite:result];			}						flags &= ~kSecureSocketHasBytesAvailable;		}				return;	}		#endif		__block NSUInteger estimatedBytesAvailable = 0;		dispatch_block_t updateEstimatedBytesAvailable = ^{				// Figure out if there is any data available to be read		// 		// socketFDBytesAvailable        <- Number of encrypted bytes we haven't read from the bsd socket		// [sslPreBuffer availableBytes] <- Number of encrypted bytes we've buffered from bsd socket		// sslInternalBufSize            <- Number of decrypted bytes SecureTransport has buffered		// 		// We call the variable "estimated" because we don't know how many decrypted bytes we'll get		// from the encrypted bytes in the sslPreBuffer.		// However, we do know this is an upper bound on the estimation.		        estimatedBytesAvailable = self->socketFDBytesAvailable + [self->sslPreBuffer availableBytes];				size_t sslInternalBufSize = 0;        SSLGetBufferedReadSize(self->sslContext, &sslInternalBufSize);				estimatedBytesAvailable += sslInternalBufSize;	};		updateEstimatedBytesAvailable();		if (estimatedBytesAvailable > 0)	{		LogVerbose(@"%@ - Flushing ssl buffers into prebuffer...", THIS_METHOD);				BOOL done = NO;		do		{			LogVerbose(@"%@ - estimatedBytesAvailable = %lu", THIS_METHOD, (unsigned long)estimatedBytesAvailable);						// Make sure there's enough room in the prebuffer						[preBuffer ensureCapacityForWrite:estimatedBytesAvailable];						// Read data into prebuffer						uint8_t *buffer = [preBuffer writeBuffer];			size_t bytesRead = 0;						OSStatus result = SSLRead(sslContext, buffer, (size_t)estimatedBytesAvailable, &bytesRead);			LogVerbose(@"%@ - read from secure socket = %u", THIS_METHOD, (unsigned)bytesRead);						if (bytesRead > 0)			{				[preBuffer didWrite:bytesRead];			}						LogVerbose(@"%@ - prebuffer.length = %zu", THIS_METHOD, [preBuffer availableBytes]);						if (result != noErr)			{				done = YES;			}			else			{				updateEstimatedBytesAvailable();			}					} while (!done && estimatedBytesAvailable > 0);	}}- (void)doReadData{	LogTrace();		// This method is called on the socketQueue.	// It might be called directly, or via the readSource when data is available to be read.		if ((currentRead == nil) || (flags & kReadsPaused))	{		LogVerbose(@"No currentRead or kReadsPaused");				// Unable to read at this time				if (flags & kSocketSecure)		{			// Here's the situation:			// 			// We have an established secure connection.			// There may not be a currentRead, but there might be encrypted data sitting around for us.			// When the user does get around to issuing a read, that encrypted data will need to be decrypted.			// 			// So why make the user wait?			// We might as well get a head start on decrypting some data now.			// 			// The other reason we do this has to do with detecting a socket disconnection.			// The SSL/TLS protocol has it's own disconnection handshake.			// So when a secure socket is closed, a "goodbye" packet comes across the wire.			// We want to make sure we read the "goodbye" packet so we can properly detect the TCP disconnection.						[self flushSSLBuffers];		}				if ([self usingCFStreamForTLS])		{			// CFReadStream only fires once when there is available data.			// It won't fire again until we've invoked CFReadStreamRead.		}		else		{			// If the readSource is firing, we need to pause it			// or else it will continue to fire over and over again.			// 			// If the readSource is not firing,			// we want it to continue monitoring the socket.						if (socketFDBytesAvailable > 0)			{				[self suspendReadSource];			}		}		return;	}		BOOL hasBytesAvailable = NO;	unsigned long estimatedBytesAvailable = 0;		if ([self usingCFStreamForTLS])	{		#if TARGET_OS_IPHONE				// Requested CFStream, rather than SecureTransport, for TLS (via GCDAsyncSocketUseCFStreamForTLS)				estimatedBytesAvailable = 0;		if ((flags & kSecureSocketHasBytesAvailable) && CFReadStreamHasBytesAvailable(readStream))			hasBytesAvailable = YES;		else			hasBytesAvailable = NO;				#endif	}	else	{		estimatedBytesAvailable = socketFDBytesAvailable;				if (flags & kSocketSecure)		{			// There are 2 buffers to be aware of here.			// 			// We are using SecureTransport, a TLS/SSL security layer which sits atop TCP.			// We issue a read to the SecureTranport API, which in turn issues a read to our SSLReadFunction.			// Our SSLReadFunction then reads from the BSD socket and returns the encrypted data to SecureTransport.			// SecureTransport then decrypts the data, and finally returns the decrypted data back to us.			// 			// The first buffer is one we create.			// SecureTransport often requests small amounts of data.			// This has to do with the encypted packets that are coming across the TCP stream.			// But it's non-optimal to do a bunch of small reads from the BSD socket.			// So our SSLReadFunction reads all available data from the socket (optimizing the sys call)			// and may store excess in the sslPreBuffer.						estimatedBytesAvailable += [sslPreBuffer availableBytes];						// The second buffer is within SecureTransport.			// As mentioned earlier, there are encrypted packets coming across the TCP stream.			// SecureTransport needs the entire packet to decrypt it.			// But if the entire packet produces X bytes of decrypted data,			// and we only asked SecureTransport for X/2 bytes of data,			// it must store the extra X/2 bytes of decrypted data for the next read.			// 			// The SSLGetBufferedReadSize function will tell us the size of this internal buffer.			// From the documentation:			// 			// "This function does not block or cause any low-level read operations to occur."						size_t sslInternalBufSize = 0;			SSLGetBufferedReadSize(sslContext, &sslInternalBufSize);						estimatedBytesAvailable += sslInternalBufSize;		}				hasBytesAvailable = (estimatedBytesAvailable > 0);	}		if ((hasBytesAvailable == NO) && ([preBuffer availableBytes] == 0))	{		LogVerbose(@"No data available to read...");				// No data available to read.				if (![self usingCFStreamForTLS])		{			// Need to wait for readSource to fire and notify us of			// available data in the socket's internal read buffer.						[self resumeReadSource];		}		return;	}		if (flags & kStartingReadTLS)	{		LogVerbose(@"Waiting for SSL/TLS handshake to complete");				// The readQueue is waiting for SSL/TLS handshake to complete.				if (flags & kStartingWriteTLS)		{			if ([self usingSecureTransportForTLS] && lastSSLHandshakeError == errSSLWouldBlock)			{				// We are in the process of a SSL Handshake.				// We were waiting for incoming data which has just arrived.								[self ssl_continueSSLHandshake];			}		}		else		{			// We are still waiting for the writeQueue to drain and start the SSL/TLS process.			// We now know data is available to read.						if (![self usingCFStreamForTLS])			{				// Suspend the read source or else it will continue to fire nonstop.								[self suspendReadSource];			}		}				return;	}		BOOL done        = NO;  // Completed read operation	NSError *error   = nil; // Error occurred		NSUInteger totalBytesReadForCurrentRead = 0;		// 	// STEP 1 - READ FROM PREBUFFER	// 		if ([preBuffer availableBytes] > 0)	{		// There are 3 types of read packets:		// 		// 1) Read all available data.		// 2) Read a specific length of data.		// 3) Read up to a particular terminator.				NSUInteger bytesToCopy;				if (currentRead->term != nil)		{			// Read type #3 - read up to a terminator						bytesToCopy = [currentRead readLengthForTermWithPreBuffer:preBuffer found:&done];		}		else		{			// Read type #1 or #2						bytesToCopy = [currentRead readLengthForNonTermWithHint:[preBuffer availableBytes]];		}				// Make sure we have enough room in the buffer for our read.				[currentRead ensureCapacityForAdditionalDataOfLength:bytesToCopy];				// Copy bytes from prebuffer into packet buffer				uint8_t *buffer = (uint8_t *)[currentRead->buffer mutableBytes] + currentRead->startOffset +		                                                                  currentRead->bytesDone;				memcpy(buffer, [preBuffer readBuffer], bytesToCopy);				// Remove the copied bytes from the preBuffer		[preBuffer didRead:bytesToCopy];				LogVerbose(@"copied(%lu) preBufferLength(%zu)", (unsigned long)bytesToCopy, [preBuffer availableBytes]);				// Update totals				currentRead->bytesDone += bytesToCopy;		totalBytesReadForCurrentRead += bytesToCopy;				// Check to see if the read operation is done				if (currentRead->readLength > 0)		{			// Read type #2 - read a specific length of data						done = (currentRead->bytesDone == currentRead->readLength);		}		else if (currentRead->term != nil)		{			// Read type #3 - read up to a terminator						// Our 'done' variable was updated via the readLengthForTermWithPreBuffer:found: method						if (!done && currentRead->maxLength > 0)			{				// We're not done and there's a set maxLength.				// Have we reached that maxLength yet?								if (currentRead->bytesDone >= currentRead->maxLength)				{					error = [self readMaxedOutError];				}			}		}		else		{			// Read type #1 - read all available data			// 			// We're done as soon as			// - we've read all available data (in prebuffer and socket)			// - we've read the maxLength of read packet.						done = ((currentRead->maxLength > 0) && (currentRead->bytesDone == currentRead->maxLength));		}			}		// 	// STEP 2 - READ FROM SOCKET	// 		BOOL socketEOF = (flags & kSocketHasReadEOF) ? YES : NO;  // Nothing more to read via socket (end of file)	BOOL waiting   = !done && !error && !socketEOF && !hasBytesAvailable; // Ran out of data, waiting for more		if (!done && !error && !socketEOF && hasBytesAvailable)	{		NSAssert(([preBuffer availableBytes] == 0), @"Invalid logic");				BOOL readIntoPreBuffer = NO;		uint8_t *buffer = NULL;		size_t bytesRead = 0;				if (flags & kSocketSecure)		{			if ([self usingCFStreamForTLS])			{				#if TARGET_OS_IPHONE								// Using CFStream, rather than SecureTransport, for TLS								NSUInteger defaultReadLength = (1024 * 32);								NSUInteger bytesToRead = [currentRead optimalReadLengthWithDefault:defaultReadLength				                                                   shouldPreBuffer:&readIntoPreBuffer];								// Make sure we have enough room in the buffer for our read.				//				// We are either reading directly into the currentRead->buffer,				// or we're reading into the temporary preBuffer.								if (readIntoPreBuffer)				{					[preBuffer ensureCapacityForWrite:bytesToRead];										buffer = [preBuffer writeBuffer];				}				else				{					[currentRead ensureCapacityForAdditionalDataOfLength:bytesToRead];										buffer = (uint8_t *)[currentRead->buffer mutableBytes]					       + currentRead->startOffset					       + currentRead->bytesDone;				}								// Read data into buffer								CFIndex result = CFReadStreamRead(readStream, buffer, (CFIndex)bytesToRead);				LogVerbose(@"CFReadStreamRead(): result = %i", (int)result);								if (result < 0)				{					error = (__bridge_transfer NSError *)CFReadStreamCopyError(readStream);				}				else if (result == 0)				{					socketEOF = YES;				}				else				{					waiting = YES;					bytesRead = (size_t)result;				}								// We only know how many decrypted bytes were read.				// The actual number of bytes read was likely more due to the overhead of the encryption.				// So we reset our flag, and rely on the next callback to alert us of more data.				flags &= ~kSecureSocketHasBytesAvailable;								#endif			}			else			{				// Using SecureTransport for TLS				//				// We know:				// - how many bytes are available on the socket				// - how many encrypted bytes are sitting in the sslPreBuffer				// - how many decypted bytes are sitting in the sslContext				//				// But we do NOT know:				// - how many encypted bytes are sitting in the sslContext				//				// So we play the regular game of using an upper bound instead.								NSUInteger defaultReadLength = (1024 * 32);								if (defaultReadLength < estimatedBytesAvailable) {					defaultReadLength = estimatedBytesAvailable + (1024 * 16);				}								NSUInteger bytesToRead = [currentRead optimalReadLengthWithDefault:defaultReadLength				                                                   shouldPreBuffer:&readIntoPreBuffer];								if (bytesToRead > SIZE_MAX) { // NSUInteger may be bigger than size_t					bytesToRead = SIZE_MAX;				}								// Make sure we have enough room in the buffer for our read.				//				// We are either reading directly into the currentRead->buffer,				// or we're reading into the temporary preBuffer.								if (readIntoPreBuffer)				{					[preBuffer ensureCapacityForWrite:bytesToRead];										buffer = [preBuffer writeBuffer];				}				else				{					[currentRead ensureCapacityForAdditionalDataOfLength:bytesToRead];										buffer = (uint8_t *)[currentRead->buffer mutableBytes]					       + currentRead->startOffset					       + currentRead->bytesDone;				}								// The documentation from Apple states:				// 				//     "a read operation might return errSSLWouldBlock,				//      indicating that less data than requested was actually transferred"				// 				// However, starting around 10.7, the function will sometimes return noErr,				// even if it didn't read as much data as requested. So we need to watch out for that.								OSStatus result;				do				{					void *loop_buffer = buffer + bytesRead;					size_t loop_bytesToRead = (size_t)bytesToRead - bytesRead;					size_t loop_bytesRead = 0;										result = SSLRead(sslContext, loop_buffer, loop_bytesToRead, &loop_bytesRead);					LogVerbose(@"read from secure socket = %u", (unsigned)loop_bytesRead);										bytesRead += loop_bytesRead;									} while ((result == noErr) && (bytesRead < bytesToRead));												if (result != noErr)				{					if (result == errSSLWouldBlock)						waiting = YES;					else					{						if (result == errSSLClosedGraceful || result == errSSLClosedAbort)						{							// We've reached the end of the stream.							// Handle this the same way we would an EOF from the socket.							socketEOF = YES;							sslErrCode = result;						}						else						{							error = [self sslError:result];						}					}					// It's possible that bytesRead > 0, even if the result was errSSLWouldBlock.					// This happens when the SSLRead function is able to read some data,					// but not the entire amount we requested.										if (bytesRead <= 0)					{						bytesRead = 0;					}				}								// Do not modify socketFDBytesAvailable.				// It will be updated via the SSLReadFunction().			}		}		else		{			// Normal socket operation						NSUInteger bytesToRead;						// There are 3 types of read packets:			//			// 1) Read all available data.			// 2) Read a specific length of data.			// 3) Read up to a particular terminator.						if (currentRead->term != nil)			{				// Read type #3 - read up to a terminator								bytesToRead = [currentRead readLengthForTermWithHint:estimatedBytesAvailable				                                     shouldPreBuffer:&readIntoPreBuffer];			}			else			{				// Read type #1 or #2								bytesToRead = [currentRead readLengthForNonTermWithHint:estimatedBytesAvailable];			}						if (bytesToRead > SIZE_MAX) { // NSUInteger may be bigger than size_t (read param 3)				bytesToRead = SIZE_MAX;			}						// Make sure we have enough room in the buffer for our read.			//			// We are either reading directly into the currentRead->buffer,			// or we're reading into the temporary preBuffer.						if (readIntoPreBuffer)			{				[preBuffer ensureCapacityForWrite:bytesToRead];								buffer = [preBuffer writeBuffer];			}			else			{				[currentRead ensureCapacityForAdditionalDataOfLength:bytesToRead];								buffer = (uint8_t *)[currentRead->buffer mutableBytes]				       + currentRead->startOffset				       + currentRead->bytesDone;			}						// Read data into buffer						int socketFD = (socket4FD != SOCKET_NULL) ? socket4FD : (socket6FD != SOCKET_NULL) ? socket6FD : socketUN;						ssize_t result = read(socketFD, buffer, (size_t)bytesToRead);			LogVerbose(@"read from socket = %i", (int)result);						if (result < 0)			{				if (errno == EWOULDBLOCK)					waiting = YES;				else					error = [self errorWithErrno:errno reason:@"Error in read() function"];								socketFDBytesAvailable = 0;			}			else if (result == 0)			{				socketEOF = YES;				socketFDBytesAvailable = 0;			}			else			{				bytesRead = result;								if (bytesRead < bytesToRead)				{					// The read returned less data than requested.					// This means socketFDBytesAvailable was a bit off due to timing,					// because we read from the socket right when the readSource event was firing.					socketFDBytesAvailable = 0;				}				else				{					if (socketFDBytesAvailable <= bytesRead)						socketFDBytesAvailable = 0;					else						socketFDBytesAvailable -= bytesRead;				}								if (socketFDBytesAvailable == 0)				{					waiting = YES;				}			}		}				if (bytesRead > 0)		{			// Check to see if the read operation is done						if (currentRead->readLength > 0)			{				// Read type #2 - read a specific length of data				// 				// Note: We should never be using a prebuffer when we're reading a specific length of data.								NSAssert(readIntoPreBuffer == NO, @"Invalid logic");								currentRead->bytesDone += bytesRead;				totalBytesReadForCurrentRead += bytesRead;								done = (currentRead->bytesDone == currentRead->readLength);			}			else if (currentRead->term != nil)			{				// Read type #3 - read up to a terminator								if (readIntoPreBuffer)				{					// We just read a big chunk of data into the preBuffer										[preBuffer didWrite:bytesRead];					LogVerbose(@"read data into preBuffer - preBuffer.length = %zu", [preBuffer availableBytes]);										// Search for the terminating sequence										NSUInteger bytesToCopy = [currentRead readLengthForTermWithPreBuffer:preBuffer found:&done];					LogVerbose(@"copying %lu bytes from preBuffer", (unsigned long)bytesToCopy);										// Ensure there's room on the read packet's buffer										[currentRead ensureCapacityForAdditionalDataOfLength:bytesToCopy];										// Copy bytes from prebuffer into read buffer										uint8_t *readBuf = (uint8_t *)[currentRead->buffer mutableBytes] + currentRead->startOffset					                                                                 + currentRead->bytesDone;										memcpy(readBuf, [preBuffer readBuffer], bytesToCopy);										// Remove the copied bytes from the prebuffer					[preBuffer didRead:bytesToCopy];					LogVerbose(@"preBuffer.length = %zu", [preBuffer availableBytes]);										// Update totals					currentRead->bytesDone += bytesToCopy;					totalBytesReadForCurrentRead += bytesToCopy;										// Our 'done' variable was updated via the readLengthForTermWithPreBuffer:found: method above				}				else				{					// We just read a big chunk of data directly into the packet's buffer.					// We need to move any overflow into the prebuffer.										NSInteger overflow = [currentRead searchForTermAfterPreBuffering:bytesRead];										if (overflow == 0)					{						// Perfect match!						// Every byte we read stays in the read buffer,						// and the last byte we read was the last byte of the term.												currentRead->bytesDone += bytesRead;						totalBytesReadForCurrentRead += bytesRead;						done = YES;					}					else if (overflow > 0)					{						// The term was found within the data that we read,						// and there are extra bytes that extend past the end of the term.						// We need to move these excess bytes out of the read packet and into the prebuffer.												NSInteger underflow = bytesRead - overflow;												// Copy excess data into preBuffer												LogVerbose(@"copying %ld overflow bytes into preBuffer", (long)overflow);						[preBuffer ensureCapacityForWrite:overflow];												uint8_t *overflowBuffer = buffer + underflow;						memcpy([preBuffer writeBuffer], overflowBuffer, overflow);												[preBuffer didWrite:overflow];						LogVerbose(@"preBuffer.length = %zu", [preBuffer availableBytes]);												// Note: The completeCurrentRead method will trim the buffer for us.												currentRead->bytesDone += underflow;						totalBytesReadForCurrentRead += underflow;						done = YES;					}					else					{						// The term was not found within the data that we read.												currentRead->bytesDone += bytesRead;						totalBytesReadForCurrentRead += bytesRead;						done = NO;					}				}								if (!done && currentRead->maxLength > 0)				{					// We're not done and there's a set maxLength.					// Have we reached that maxLength yet?										if (currentRead->bytesDone >= currentRead->maxLength)					{						error = [self readMaxedOutError];					}				}			}			else			{				// Read type #1 - read all available data								if (readIntoPreBuffer)				{					// We just read a chunk of data into the preBuffer										[preBuffer didWrite:bytesRead];										// Now copy the data into the read packet.					// 					// Recall that we didn't read directly into the packet's buffer to avoid					// over-allocating memory since we had no clue how much data was available to be read.					// 					// Ensure there's room on the read packet's buffer										[currentRead ensureCapacityForAdditionalDataOfLength:bytesRead];										// Copy bytes from prebuffer into read buffer										uint8_t *readBuf = (uint8_t *)[currentRead->buffer mutableBytes] + currentRead->startOffset					                                                                 + currentRead->bytesDone;										memcpy(readBuf, [preBuffer readBuffer], bytesRead);										// Remove the copied bytes from the prebuffer					[preBuffer didRead:bytesRead];										// Update totals					currentRead->bytesDone += bytesRead;					totalBytesReadForCurrentRead += bytesRead;				}				else				{					currentRead->bytesDone += bytesRead;					totalBytesReadForCurrentRead += bytesRead;				}								done = YES;			}					} // if (bytesRead > 0)			} // if (!done && !error && !socketEOF && hasBytesAvailable)			if (!done && currentRead->readLength == 0 && currentRead->term == nil)	{		// Read type #1 - read all available data		// 		// We might arrive here if we read data from the prebuffer but not from the socket.				done = (totalBytesReadForCurrentRead > 0);	}		// Check to see if we're done, or if we've made progress		if (done)	{		[self completeCurrentRead];				if (!error && (!socketEOF || [preBuffer availableBytes] > 0))		{			[self maybeDequeueRead];		}	}	else if (totalBytesReadForCurrentRead > 0)	{		// We're not done read type #2 or #3 yet, but we have read in some bytes		//		// We ensure that `waiting` is set in order to resume the readSource (if it is suspended). It is		// possible to reach this point and `waiting` not be set, if the current read's length is		// sufficiently large. In that case, we may have read to some upperbound successfully, but		// that upperbound could be smaller than the desired length.		waiting = YES;		__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;				if (delegateQueue && [theDelegate respondsToSelector:@selector(socket:didReadPartialDataOfLength:tag:)])		{			long theReadTag = currentRead->tag;						dispatch_async(delegateQueue, ^{ @autoreleasepool {								[theDelegate socket:self didReadPartialDataOfLength:totalBytesReadForCurrentRead tag:theReadTag];			}});		}	}		// Check for errors		if (error)	{		[self closeWithError:error];	}	else if (socketEOF)	{		[self doReadEOF];	}	else if (waiting)	{		if (![self usingCFStreamForTLS])		{			// Monitor the socket for readability (if we're not already doing so)			[self resumeReadSource];		}	}		// Do not add any code here without first adding return statements in the error cases above.}- (void)doReadEOF{	LogTrace();		// This method may be called more than once.	// If the EOF is read while there is still data in the preBuffer,	// then this method may be called continually after invocations of doReadData to see if it's time to disconnect.		flags |= kSocketHasReadEOF;		if (flags & kSocketSecure)	{		// If the SSL layer has any buffered data, flush it into the preBuffer now.				[self flushSSLBuffers];	}		BOOL shouldDisconnect = NO;	NSError *error = nil;		if ((flags & kStartingReadTLS) || (flags & kStartingWriteTLS))	{		// We received an EOF during or prior to startTLS.		// The SSL/TLS handshake is now impossible, so this is an unrecoverable situation.				shouldDisconnect = YES;				if ([self usingSecureTransportForTLS])		{			error = [self sslError:errSSLClosedAbort];		}	}	else if (flags & kReadStreamClosed)	{		// The preBuffer has already been drained.		// The config allows half-duplex connections.		// We've previously checked the socket, and it appeared writeable.		// So we marked the read stream as closed and notified the delegate.		// 		// As per the half-duplex contract, the socket will be closed when a write fails,		// or when the socket is manually closed.				shouldDisconnect = NO;	}	else if ([preBuffer availableBytes] > 0)	{		LogVerbose(@"Socket reached EOF, but there is still data available in prebuffer");				// Although we won't be able to read any more data from the socket,		// there is existing data that has been prebuffered that we can read.				shouldDisconnect = NO;	}	else if (config & kAllowHalfDuplexConnection)	{		// We just received an EOF (end of file) from the socket's read stream.		// This means the remote end of the socket (the peer we're connected to)		// has explicitly stated that it will not be sending us any more data.		// 		// Query the socket to see if it is still writeable. (Perhaps the peer will continue reading data from us)				int socketFD = (socket4FD != SOCKET_NULL) ? socket4FD : (socket6FD != SOCKET_NULL) ? socket6FD : socketUN;				struct pollfd pfd[1];		pfd[0].fd = socketFD;		pfd[0].events = POLLOUT;		pfd[0].revents = 0;				poll(pfd, 1, 0);				if (pfd[0].revents & POLLOUT)		{			// Socket appears to still be writeable						shouldDisconnect = NO;			flags |= kReadStreamClosed;						// Notify the delegate that we're going half-duplex						__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;			if (delegateQueue && [theDelegate respondsToSelector:@selector(socketDidCloseReadStream:)])			{				dispatch_async(delegateQueue, ^{ @autoreleasepool {										[theDelegate socketDidCloseReadStream:self];				}});			}		}		else		{			shouldDisconnect = YES;		}	}	else	{		shouldDisconnect = YES;	}			if (shouldDisconnect)	{		if (error == nil)		{			if ([self usingSecureTransportForTLS])			{				if (sslErrCode != noErr && sslErrCode != errSSLClosedGraceful)				{					error = [self sslError:sslErrCode];				}				else				{					error = [self connectionClosedError];				}			}			else			{				error = [self connectionClosedError];			}		}		[self closeWithError:error];	}	else	{		if (![self usingCFStreamForTLS])		{			// Suspend the read source (if needed)						[self suspendReadSource];		}	}}- (void)completeCurrentRead{	LogTrace();		NSAssert(currentRead, @"Trying to complete current read when there is no current read.");			NSData *result = nil;		if (currentRead->bufferOwner)	{		// We created the buffer on behalf of the user.		// Trim our buffer to be the proper size.		[currentRead->buffer setLength:currentRead->bytesDone];				result = currentRead->buffer;	}	else	{		// We did NOT create the buffer.		// The buffer is owned by the caller.		// Only trim the buffer if we had to increase its size.				if ([currentRead->buffer length] > currentRead->originalBufferLength)		{			NSUInteger readSize = currentRead->startOffset + currentRead->bytesDone;			NSUInteger origSize = currentRead->originalBufferLength;						NSUInteger buffSize = MAX(readSize, origSize);						[currentRead->buffer setLength:buffSize];		}				uint8_t *buffer = (uint8_t *)[currentRead->buffer mutableBytes] + currentRead->startOffset;				result = [NSData dataWithBytesNoCopy:buffer length:currentRead->bytesDone freeWhenDone:NO];	}		__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;	if (delegateQueue && [theDelegate respondsToSelector:@selector(socket:didReadData:withTag:)])	{		GCDAsyncReadPacket *theRead = currentRead; // Ensure currentRead retained since result may not own buffer				dispatch_async(delegateQueue, ^{ @autoreleasepool {						[theDelegate socket:self didReadData:result withTag:theRead->tag];		}});	}		[self endCurrentRead];}- (void)endCurrentRead{	if (readTimer)	{		dispatch_source_cancel(readTimer);		readTimer = NULL;	}		currentRead = nil;}- (void)setupReadTimerWithTimeout:(NSTimeInterval)timeout{	if (timeout >= 0.0)	{		readTimer = dispatch_source_create(DISPATCH_SOURCE_TYPE_TIMER, 0, 0, socketQueue);				__weak GCDAsyncSocket *weakSelf = self;				dispatch_source_set_event_handler(readTimer, ^{ @autoreleasepool {		#pragma clang diagnostic push		#pragma clang diagnostic warning "-Wimplicit-retain-self"						__strong GCDAsyncSocket *strongSelf = weakSelf;			if (strongSelf == nil) return_from_block;						[strongSelf doReadTimeout];					#pragma clang diagnostic pop		}});				#if !OS_OBJECT_USE_OBJC		dispatch_source_t theReadTimer = readTimer;		dispatch_source_set_cancel_handler(readTimer, ^{		#pragma clang diagnostic push		#pragma clang diagnostic warning "-Wimplicit-retain-self"						LogVerbose(@"dispatch_release(readTimer)");			dispatch_release(theReadTimer);					#pragma clang diagnostic pop		});		#endif				dispatch_time_t tt = dispatch_time(DISPATCH_TIME_NOW, (int64_t)(timeout * NSEC_PER_SEC));				dispatch_source_set_timer(readTimer, tt, DISPATCH_TIME_FOREVER, 0);		dispatch_resume(readTimer);	}}- (void)doReadTimeout{	// This is a little bit tricky.	// Ideally we'd like to synchronously query the delegate about a timeout extension.	// But if we do so synchronously we risk a possible deadlock.	// So instead we have to do so asynchronously, and callback to ourselves from within the delegate block.		flags |= kReadsPaused;		__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;	if (delegateQueue && [theDelegate respondsToSelector:@selector(socket:shouldTimeoutReadWithTag:elapsed:bytesDone:)])	{		GCDAsyncReadPacket *theRead = currentRead;				dispatch_async(delegateQueue, ^{ @autoreleasepool {						NSTimeInterval timeoutExtension = 0.0;						timeoutExtension = [theDelegate socket:self shouldTimeoutReadWithTag:theRead->tag			                                                             elapsed:theRead->timeout			                                                           bytesDone:theRead->bytesDone];			            dispatch_async(self->socketQueue, ^{ @autoreleasepool {								[self doReadTimeoutWithExtension:timeoutExtension];			}});		}});	}	else	{		[self doReadTimeoutWithExtension:0.0];	}}- (void)doReadTimeoutWithExtension:(NSTimeInterval)timeoutExtension{	if (currentRead)	{		if (timeoutExtension > 0.0)		{			currentRead->timeout += timeoutExtension;						// Reschedule the timer			dispatch_time_t tt = dispatch_time(DISPATCH_TIME_NOW, (int64_t)(timeoutExtension * NSEC_PER_SEC));			dispatch_source_set_timer(readTimer, tt, DISPATCH_TIME_FOREVER, 0);						// Unpause reads, and continue			flags &= ~kReadsPaused;			[self doReadData];		}		else		{			LogVerbose(@"ReadTimeout");						[self closeWithError:[self readTimeoutError]];		}	}}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Writing////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////- (void)writeData:(NSData *)data withTimeout:(NSTimeInterval)timeout tag:(long)tag{	if ([data length] == 0) return;		GCDAsyncWritePacket *packet = [[GCDAsyncWritePacket alloc] initWithData:data timeout:timeout tag:tag];		dispatch_async(socketQueue, ^{ @autoreleasepool {				LogTrace();		        if ((self->flags & kSocketStarted) && !(self->flags & kForbidReadsWrites))		{            [self->writeQueue addObject:packet];			[self maybeDequeueWrite];		}	}});		// Do not rely on the block being run in order to release the packet,	// as the queue might get released without the block completing.}- (float)progressOfWriteReturningTag:(long *)tagPtr bytesDone:(NSUInteger *)donePtr total:(NSUInteger *)totalPtr{	__block float result = 0.0F;		dispatch_block_t block = ^{		        if (!self->currentWrite || ![self->currentWrite isKindOfClass:[GCDAsyncWritePacket class]])		{			// We're not writing anything right now.						if (tagPtr != NULL)   *tagPtr = 0;			if (donePtr != NULL)  *donePtr = 0;			if (totalPtr != NULL) *totalPtr = 0;						result = NAN;		}		else		{            NSUInteger done = self->currentWrite->bytesDone;            NSUInteger total = [self->currentWrite->buffer length];			            if (tagPtr != NULL)   *tagPtr = self->currentWrite->tag;			if (donePtr != NULL)  *donePtr = done;			if (totalPtr != NULL) *totalPtr = total;						result = (float)done / (float)total;		}	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);		return result;}/** * Conditionally starts a new write. *  * It is called when: * - a user requests a write * - after a write request has finished (to handle the next request) * - immediately after the socket opens to handle any pending requests *  * This method also handles auto-disconnect post read/write completion.**/- (void)maybeDequeueWrite{	LogTrace();	NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");			// If we're not currently processing a write AND we have an available write stream	if ((currentWrite == nil) && (flags & kConnected))	{		if ([writeQueue count] > 0)		{			// Dequeue the next object in the write queue			currentWrite = [writeQueue objectAtIndex:0];			[writeQueue removeObjectAtIndex:0];									if ([currentWrite isKindOfClass:[GCDAsyncSpecialPacket class]])			{				LogVerbose(@"Dequeued GCDAsyncSpecialPacket");								// Attempt to start TLS				flags |= kStartingWriteTLS;								// This method won't do anything unless both kStartingReadTLS and kStartingWriteTLS are set				[self maybeStartTLS];			}			else			{				LogVerbose(@"Dequeued GCDAsyncWritePacket");								// Setup write timer (if needed)				[self setupWriteTimerWithTimeout:currentWrite->timeout];								// Immediately write, if possible				[self doWriteData];			}		}		else if (flags & kDisconnectAfterWrites)		{			if (flags & kDisconnectAfterReads)			{				if (([readQueue count] == 0) && (currentRead == nil))				{					[self closeWithError:nil];				}			}			else			{				[self closeWithError:nil];			}		}	}}- (void)doWriteData{	LogTrace();		// This method is called by the writeSource via the socketQueue		if ((currentWrite == nil) || (flags & kWritesPaused))	{		LogVerbose(@"No currentWrite or kWritesPaused");				// Unable to write at this time				if ([self usingCFStreamForTLS])		{			// CFWriteStream only fires once when there is available data.			// It won't fire again until we've invoked CFWriteStreamWrite.		}		else		{			// If the writeSource is firing, we need to pause it			// or else it will continue to fire over and over again.						if (flags & kSocketCanAcceptBytes)			{				[self suspendWriteSource];			}		}		return;	}		if (!(flags & kSocketCanAcceptBytes))	{		LogVerbose(@"No space available to write...");				// No space available to write.				if (![self usingCFStreamForTLS])		{			// Need to wait for writeSource to fire and notify us of			// available space in the socket's internal write buffer.						[self resumeWriteSource];		}		return;	}		if (flags & kStartingWriteTLS)	{		LogVerbose(@"Waiting for SSL/TLS handshake to complete");				// The writeQueue is waiting for SSL/TLS handshake to complete.				if (flags & kStartingReadTLS)		{			if ([self usingSecureTransportForTLS] && lastSSLHandshakeError == errSSLWouldBlock)			{				// We are in the process of a SSL Handshake.				// We were waiting for available space in the socket's internal OS buffer to continue writing.							[self ssl_continueSSLHandshake];			}		}		else		{			// We are still waiting for the readQueue to drain and start the SSL/TLS process.			// We now know we can write to the socket.						if (![self usingCFStreamForTLS])			{				// Suspend the write source or else it will continue to fire nonstop.								[self suspendWriteSource];			}		}				return;	}		// Note: This method is not called if currentWrite is a GCDAsyncSpecialPacket (startTLS packet)		BOOL waiting = NO;	NSError *error = nil;	size_t bytesWritten = 0;		if (flags & kSocketSecure)	{		if ([self usingCFStreamForTLS])		{			#if TARGET_OS_IPHONE						// 			// Writing data using CFStream (over internal TLS)			// 						const uint8_t *buffer = (const uint8_t *)[currentWrite->buffer bytes] + currentWrite->bytesDone;						NSUInteger bytesToWrite = [currentWrite->buffer length] - currentWrite->bytesDone;						if (bytesToWrite > SIZE_MAX) // NSUInteger may be bigger than size_t (write param 3)			{				bytesToWrite = SIZE_MAX;			}					CFIndex result = CFWriteStreamWrite(writeStream, buffer, (CFIndex)bytesToWrite);			LogVerbose(@"CFWriteStreamWrite(%lu) = %li", (unsigned long)bytesToWrite, result);					if (result < 0)			{				error = (__bridge_transfer NSError *)CFWriteStreamCopyError(writeStream);			}			else			{				bytesWritten = (size_t)result;								// We always set waiting to true in this scenario.				// CFStream may have altered our underlying socket to non-blocking.				// Thus if we attempt to write without a callback, we may end up blocking our queue.				waiting = YES;			}						#endif		}		else		{			// We're going to use the SSLWrite function.			// 			// OSStatus SSLWrite(SSLContextRef context, const void *data, size_t dataLength, size_t *processed)			// 			// Parameters:			// context     - An SSL session context reference.			// data        - A pointer to the buffer of data to write.			// dataLength  - The amount, in bytes, of data to write.			// processed   - On return, the length, in bytes, of the data actually written.			// 			// It sounds pretty straight-forward,			// but there are a few caveats you should be aware of.			// 			// The SSLWrite method operates in a non-obvious (and rather annoying) manner.			// According to the documentation:			// 			//   Because you may configure the underlying connection to operate in a non-blocking manner,			//   a write operation might return errSSLWouldBlock, indicating that less data than requested			//   was actually transferred. In this case, you should repeat the call to SSLWrite until some			//   other result is returned.			// 			// This sounds perfect, but when our SSLWriteFunction returns errSSLWouldBlock,			// then the SSLWrite method returns (with the proper errSSLWouldBlock return value),			// but it sets processed to dataLength !!			// 			// In other words, if the SSLWrite function doesn't completely write all the data we tell it to,			// then it doesn't tell us how many bytes were actually written. So, for example, if we tell it to			// write 256 bytes then it might actually write 128 bytes, but then report 0 bytes written.			// 			// You might be wondering:			// If the SSLWrite function doesn't tell us how many bytes were written,			// then how in the world are we supposed to update our parameters (buffer & bytesToWrite)			// for the next time we invoke SSLWrite?			// 			// The answer is that SSLWrite cached all the data we told it to write,			// and it will push out that data next time we call SSLWrite.			// If we call SSLWrite with new data, it will push out the cached data first, and then the new data.			// If we call SSLWrite with empty data, then it will simply push out the cached data.			// 			// For this purpose we're going to break large writes into a series of smaller writes.			// This allows us to report progress back to the delegate.						OSStatus result;						BOOL hasCachedDataToWrite = (sslWriteCachedLength > 0);			BOOL hasNewDataToWrite = YES;						if (hasCachedDataToWrite)			{				size_t processed = 0;								result = SSLWrite(sslContext, NULL, 0, &processed);								if (result == noErr)				{					bytesWritten = sslWriteCachedLength;					sslWriteCachedLength = 0;										if ([currentWrite->buffer length] == (currentWrite->bytesDone + bytesWritten))					{						// We've written all data for the current write.						hasNewDataToWrite = NO;					}				}				else				{					if (result == errSSLWouldBlock)					{						waiting = YES;					}					else					{						error = [self sslError:result];					}										// Can't write any new data since we were unable to write the cached data.					hasNewDataToWrite = NO;				}			}						if (hasNewDataToWrite)			{				const uint8_t *buffer = (const uint8_t *)[currentWrite->buffer bytes]				                                        + currentWrite->bytesDone				                                        + bytesWritten;								NSUInteger bytesToWrite = [currentWrite->buffer length] - currentWrite->bytesDone - bytesWritten;								if (bytesToWrite > SIZE_MAX) // NSUInteger may be bigger than size_t (write param 3)				{					bytesToWrite = SIZE_MAX;				}								size_t bytesRemaining = bytesToWrite;								BOOL keepLooping = YES;				while (keepLooping)				{					const size_t sslMaxBytesToWrite = 32768;					size_t sslBytesToWrite = MIN(bytesRemaining, sslMaxBytesToWrite);					size_t sslBytesWritten = 0;										result = SSLWrite(sslContext, buffer, sslBytesToWrite, &sslBytesWritten);										if (result == noErr)					{						buffer += sslBytesWritten;						bytesWritten += sslBytesWritten;						bytesRemaining -= sslBytesWritten;												keepLooping = (bytesRemaining > 0);					}					else					{						if (result == errSSLWouldBlock)						{							waiting = YES;							sslWriteCachedLength = sslBytesToWrite;						}						else						{							error = [self sslError:result];						}												keepLooping = NO;					}									} // while (keepLooping)							} // if (hasNewDataToWrite)		}	}	else	{		// 		// Writing data directly over raw socket		// 				int socketFD = (socket4FD != SOCKET_NULL) ? socket4FD : (socket6FD != SOCKET_NULL) ? socket6FD : socketUN;				const uint8_t *buffer = (const uint8_t *)[currentWrite->buffer bytes] + currentWrite->bytesDone;				NSUInteger bytesToWrite = [currentWrite->buffer length] - currentWrite->bytesDone;				if (bytesToWrite > SIZE_MAX) // NSUInteger may be bigger than size_t (write param 3)		{			bytesToWrite = SIZE_MAX;		}				ssize_t result = write(socketFD, buffer, (size_t)bytesToWrite);		LogVerbose(@"wrote to socket = %zd", result);				// Check results		if (result < 0)		{			if (errno == EWOULDBLOCK)			{				waiting = YES;			}			else			{				error = [self errorWithErrno:errno reason:@"Error in write() function"];			}		}		else		{			bytesWritten = result;		}	}		// We're done with our writing.	// If we explictly ran into a situation where the socket told us there was no room in the buffer,	// then we immediately resume listening for notifications.	// 	// We must do this before we dequeue another write,	// as that may in turn invoke this method again.	// 	// Note that if CFStream is involved, it may have maliciously put our socket in blocking mode.		if (waiting)	{		flags &= ~kSocketCanAcceptBytes;				if (![self usingCFStreamForTLS])		{			[self resumeWriteSource];		}	}		// Check our results		BOOL done = NO;		if (bytesWritten > 0)	{		// Update total amount read for the current write		currentWrite->bytesDone += bytesWritten;		LogVerbose(@"currentWrite->bytesDone = %lu", (unsigned long)currentWrite->bytesDone);				// Is packet done?		done = (currentWrite->bytesDone == [currentWrite->buffer length]);	}		if (done)	{		[self completeCurrentWrite];				if (!error)		{			dispatch_async(socketQueue, ^{ @autoreleasepool{								[self maybeDequeueWrite];			}});		}	}	else	{		// We were unable to finish writing the data,		// so we're waiting for another callback to notify us of available space in the lower-level output buffer.				if (!waiting && !error)		{			// This would be the case if our write was able to accept some data, but not all of it.						flags &= ~kSocketCanAcceptBytes;						if (![self usingCFStreamForTLS])			{				[self resumeWriteSource];			}		}				if (bytesWritten > 0)		{			// We're not done with the entire write, but we have written some bytes						__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;			if (delegateQueue && [theDelegate respondsToSelector:@selector(socket:didWritePartialDataOfLength:tag:)])			{				long theWriteTag = currentWrite->tag;								dispatch_async(delegateQueue, ^{ @autoreleasepool {										[theDelegate socket:self didWritePartialDataOfLength:bytesWritten tag:theWriteTag];				}});			}		}	}		// Check for errors		if (error)	{		[self closeWithError:[self errorWithErrno:errno reason:@"Error in write() function"]];	}		// Do not add any code here without first adding a return statement in the error case above.}- (void)completeCurrentWrite{	LogTrace();		NSAssert(currentWrite, @"Trying to complete current write when there is no current write.");		__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;		if (delegateQueue && [theDelegate respondsToSelector:@selector(socket:didWriteDataWithTag:)])	{		long theWriteTag = currentWrite->tag;				dispatch_async(delegateQueue, ^{ @autoreleasepool {						[theDelegate socket:self didWriteDataWithTag:theWriteTag];		}});	}		[self endCurrentWrite];}- (void)endCurrentWrite{	if (writeTimer)	{		dispatch_source_cancel(writeTimer);		writeTimer = NULL;	}		currentWrite = nil;}- (void)setupWriteTimerWithTimeout:(NSTimeInterval)timeout{	if (timeout >= 0.0)	{		writeTimer = dispatch_source_create(DISPATCH_SOURCE_TYPE_TIMER, 0, 0, socketQueue);				__weak GCDAsyncSocket *weakSelf = self;				dispatch_source_set_event_handler(writeTimer, ^{ @autoreleasepool {		#pragma clang diagnostic push		#pragma clang diagnostic warning "-Wimplicit-retain-self"						__strong GCDAsyncSocket *strongSelf = weakSelf;			if (strongSelf == nil) return_from_block;						[strongSelf doWriteTimeout];					#pragma clang diagnostic pop		}});				#if !OS_OBJECT_USE_OBJC		dispatch_source_t theWriteTimer = writeTimer;		dispatch_source_set_cancel_handler(writeTimer, ^{		#pragma clang diagnostic push		#pragma clang diagnostic warning "-Wimplicit-retain-self"						LogVerbose(@"dispatch_release(writeTimer)");			dispatch_release(theWriteTimer);					#pragma clang diagnostic pop		});		#endif				dispatch_time_t tt = dispatch_time(DISPATCH_TIME_NOW, (int64_t)(timeout * NSEC_PER_SEC));				dispatch_source_set_timer(writeTimer, tt, DISPATCH_TIME_FOREVER, 0);		dispatch_resume(writeTimer);	}}- (void)doWriteTimeout{	// This is a little bit tricky.	// Ideally we'd like to synchronously query the delegate about a timeout extension.	// But if we do so synchronously we risk a possible deadlock.	// So instead we have to do so asynchronously, and callback to ourselves from within the delegate block.		flags |= kWritesPaused;		__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;	if (delegateQueue && [theDelegate respondsToSelector:@selector(socket:shouldTimeoutWriteWithTag:elapsed:bytesDone:)])	{		GCDAsyncWritePacket *theWrite = currentWrite;				dispatch_async(delegateQueue, ^{ @autoreleasepool {						NSTimeInterval timeoutExtension = 0.0;						timeoutExtension = [theDelegate socket:self shouldTimeoutWriteWithTag:theWrite->tag			                                                              elapsed:theWrite->timeout			                                                            bytesDone:theWrite->bytesDone];			            dispatch_async(self->socketQueue, ^{ @autoreleasepool {								[self doWriteTimeoutWithExtension:timeoutExtension];			}});		}});	}	else	{		[self doWriteTimeoutWithExtension:0.0];	}}- (void)doWriteTimeoutWithExtension:(NSTimeInterval)timeoutExtension{	if (currentWrite)	{		if (timeoutExtension > 0.0)		{			currentWrite->timeout += timeoutExtension;						// Reschedule the timer			dispatch_time_t tt = dispatch_time(DISPATCH_TIME_NOW, (int64_t)(timeoutExtension * NSEC_PER_SEC));			dispatch_source_set_timer(writeTimer, tt, DISPATCH_TIME_FOREVER, 0);						// Unpause writes, and continue			flags &= ~kWritesPaused;			[self doWriteData];		}		else		{			LogVerbose(@"WriteTimeout");						[self closeWithError:[self writeTimeoutError]];		}	}}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Security////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////- (void)startTLS:(NSDictionary *)tlsSettings{	LogTrace();		if (tlsSettings == nil)    {        // Passing nil/NULL to CFReadStreamSetProperty will appear to work the same as passing an empty dictionary,        // but causes problems if we later try to fetch the remote host's certificate.        //         // To be exact, it causes the following to return NULL instead of the normal result:        // CFReadStreamCopyProperty(readStream, kCFStreamPropertySSLPeerCertificates)        //         // So we use an empty dictionary instead, which works perfectly.                tlsSettings = [NSDictionary dictionary];    }		GCDAsyncSpecialPacket *packet = [[GCDAsyncSpecialPacket alloc] initWithTLSSettings:tlsSettings];		dispatch_async(socketQueue, ^{ @autoreleasepool {		        if ((self->flags & kSocketStarted) && !(self->flags & kQueuedTLS) && !(self->flags & kForbidReadsWrites))		{            [self->readQueue addObject:packet];            [self->writeQueue addObject:packet];			            self->flags |= kQueuedTLS;						[self maybeDequeueRead];			[self maybeDequeueWrite];		}	}});	}- (void)maybeStartTLS{	// We can't start TLS until:	// - All queued reads prior to the user calling startTLS are complete	// - All queued writes prior to the user calling startTLS are complete	// 	// We'll know these conditions are met when both kStartingReadTLS and kStartingWriteTLS are set		if ((flags & kStartingReadTLS) && (flags & kStartingWriteTLS))	{		BOOL useSecureTransport = YES;				#if TARGET_OS_IPHONE		{			GCDAsyncSpecialPacket *tlsPacket = (GCDAsyncSpecialPacket *)currentRead;            NSDictionary *tlsSettings = @{};            if (tlsPacket) {                tlsSettings = tlsPacket->tlsSettings;            }			NSNumber *value = [tlsSettings objectForKey:GCDAsyncSocketUseCFStreamForTLS];			if (value && [value boolValue])				useSecureTransport = NO;		}		#endif				if (useSecureTransport)		{			[self ssl_startTLS];		}		else		{		#if TARGET_OS_IPHONE			[self cf_startTLS];		#endif		}	}}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Security via SecureTransport////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////- (OSStatus)sslReadWithBuffer:(void *)buffer length:(size_t *)bufferLength{	LogVerbose(@"sslReadWithBuffer:%p length:%lu", buffer, (unsigned long)*bufferLength);		if ((socketFDBytesAvailable == 0) && ([sslPreBuffer availableBytes] == 0))	{		LogVerbose(@"%@ - No data available to read...", THIS_METHOD);				// No data available to read.		// 		// Need to wait for readSource to fire and notify us of		// available data in the socket's internal read buffer.				[self resumeReadSource];				*bufferLength = 0;		return errSSLWouldBlock;	}		size_t totalBytesRead = 0;	size_t totalBytesLeftToBeRead = *bufferLength;		BOOL done = NO;	BOOL socketError = NO;		// 	// STEP 1 : READ FROM SSL PRE BUFFER	// 		size_t sslPreBufferLength = [sslPreBuffer availableBytes];		if (sslPreBufferLength > 0)	{		LogVerbose(@"%@: Reading from SSL pre buffer...", THIS_METHOD);				size_t bytesToCopy;		if (sslPreBufferLength > totalBytesLeftToBeRead)			bytesToCopy = totalBytesLeftToBeRead;		else			bytesToCopy = sslPreBufferLength;				LogVerbose(@"%@: Copying %zu bytes from sslPreBuffer", THIS_METHOD, bytesToCopy);				memcpy(buffer, [sslPreBuffer readBuffer], bytesToCopy);		[sslPreBuffer didRead:bytesToCopy];				LogVerbose(@"%@: sslPreBuffer.length = %zu", THIS_METHOD, [sslPreBuffer availableBytes]);				totalBytesRead += bytesToCopy;		totalBytesLeftToBeRead -= bytesToCopy;				done = (totalBytesLeftToBeRead == 0);				if (done) LogVerbose(@"%@: Complete", THIS_METHOD);	}		// 	// STEP 2 : READ FROM SOCKET	// 		if (!done && (socketFDBytesAvailable > 0))	{		LogVerbose(@"%@: Reading from socket...", THIS_METHOD);				int socketFD = (socket4FD != SOCKET_NULL) ? socket4FD : (socket6FD != SOCKET_NULL) ? socket6FD : socketUN;				BOOL readIntoPreBuffer;		size_t bytesToRead;		uint8_t *buf;				if (socketFDBytesAvailable > totalBytesLeftToBeRead)		{			// Read all available data from socket into sslPreBuffer.			// Then copy requested amount into dataBuffer.						LogVerbose(@"%@: Reading into sslPreBuffer...", THIS_METHOD);						[sslPreBuffer ensureCapacityForWrite:socketFDBytesAvailable];						readIntoPreBuffer = YES;			bytesToRead = (size_t)socketFDBytesAvailable;			buf = [sslPreBuffer writeBuffer];		}		else		{			// Read available data from socket directly into dataBuffer.						LogVerbose(@"%@: Reading directly into dataBuffer...", THIS_METHOD);						readIntoPreBuffer = NO;			bytesToRead = totalBytesLeftToBeRead;			buf = (uint8_t *)buffer + totalBytesRead;		}				ssize_t result = read(socketFD, buf, bytesToRead);		LogVerbose(@"%@: read from socket = %zd", THIS_METHOD, result);				if (result < 0)		{			LogVerbose(@"%@: read errno = %i", THIS_METHOD, errno);						if (errno != EWOULDBLOCK)			{				socketError = YES;			}						socketFDBytesAvailable = 0;		}		else if (result == 0)		{			LogVerbose(@"%@: read EOF", THIS_METHOD);						socketError = YES;			socketFDBytesAvailable = 0;		}		else		{			size_t bytesReadFromSocket = result;						if (socketFDBytesAvailable > bytesReadFromSocket)				socketFDBytesAvailable -= bytesReadFromSocket;			else				socketFDBytesAvailable = 0;						if (readIntoPreBuffer)			{				[sslPreBuffer didWrite:bytesReadFromSocket];								size_t bytesToCopy = MIN(totalBytesLeftToBeRead, bytesReadFromSocket);								LogVerbose(@"%@: Copying %zu bytes out of sslPreBuffer", THIS_METHOD, bytesToCopy);								memcpy((uint8_t *)buffer + totalBytesRead, [sslPreBuffer readBuffer], bytesToCopy);				[sslPreBuffer didRead:bytesToCopy];								totalBytesRead += bytesToCopy;				totalBytesLeftToBeRead -= bytesToCopy;								LogVerbose(@"%@: sslPreBuffer.length = %zu", THIS_METHOD, [sslPreBuffer availableBytes]);			}			else			{				totalBytesRead += bytesReadFromSocket;				totalBytesLeftToBeRead -= bytesReadFromSocket;			}						done = (totalBytesLeftToBeRead == 0);						if (done) LogVerbose(@"%@: Complete", THIS_METHOD);		}	}		*bufferLength = totalBytesRead;		if (done)		return noErr;		if (socketError)		return errSSLClosedAbort;		return errSSLWouldBlock;}- (OSStatus)sslWriteWithBuffer:(const void *)buffer length:(size_t *)bufferLength{	if (!(flags & kSocketCanAcceptBytes))	{		// Unable to write.		// 		// Need to wait for writeSource to fire and notify us of		// available space in the socket's internal write buffer.				[self resumeWriteSource];				*bufferLength = 0;		return errSSLWouldBlock;	}		size_t bytesToWrite = *bufferLength;	size_t bytesWritten = 0;		BOOL done = NO;	BOOL socketError = NO;		int socketFD = (socket4FD != SOCKET_NULL) ? socket4FD : (socket6FD != SOCKET_NULL) ? socket6FD : socketUN;		ssize_t result = write(socketFD, buffer, bytesToWrite);		if (result < 0)	{		if (errno != EWOULDBLOCK)		{			socketError = YES;		}				flags &= ~kSocketCanAcceptBytes;	}	else if (result == 0)	{		flags &= ~kSocketCanAcceptBytes;	}	else	{		bytesWritten = result;				done = (bytesWritten == bytesToWrite);	}		*bufferLength = bytesWritten;		if (done)		return noErr;		if (socketError)		return errSSLClosedAbort;		return errSSLWouldBlock;}static OSStatus SSLReadFunction(SSLConnectionRef connection, void *data, size_t *dataLength){	GCDAsyncSocket *asyncSocket = (__bridge GCDAsyncSocket *)connection;		NSCAssert(dispatch_get_specific(asyncSocket->IsOnSocketQueueOrTargetQueueKey), @"What the deuce?");		return [asyncSocket sslReadWithBuffer:data length:dataLength];}static OSStatus SSLWriteFunction(SSLConnectionRef connection, const void *data, size_t *dataLength){	GCDAsyncSocket *asyncSocket = (__bridge GCDAsyncSocket *)connection;		NSCAssert(dispatch_get_specific(asyncSocket->IsOnSocketQueueOrTargetQueueKey), @"What the deuce?");		return [asyncSocket sslWriteWithBuffer:data length:dataLength];}- (void)ssl_startTLS{	LogTrace();		LogVerbose(@"Starting TLS (via SecureTransport)...");		OSStatus status;		GCDAsyncSpecialPacket *tlsPacket = (GCDAsyncSpecialPacket *)currentRead;	if (tlsPacket == nil) // Code to quiet the analyzer	{		NSAssert(NO, @"Logic error");				[self closeWithError:[self otherError:@"Logic error"]];		return;	}	NSDictionary *tlsSettings = tlsPacket->tlsSettings;		// Create SSLContext, and setup IO callbacks and connection ref		NSNumber *isServerNumber = [tlsSettings objectForKey:(__bridge NSString *)kCFStreamSSLIsServer];	BOOL isServer = [isServerNumber boolValue];		#if TARGET_OS_IPHONE || (__MAC_OS_X_VERSION_MIN_REQUIRED >= 1080)	{		if (isServer)			sslContext = SSLCreateContext(kCFAllocatorDefault, kSSLServerSide, kSSLStreamType);		else			sslContext = SSLCreateContext(kCFAllocatorDefault, kSSLClientSide, kSSLStreamType);				if (sslContext == NULL)		{			[self closeWithError:[self otherError:@"Error in SSLCreateContext"]];			return;		}	}	#else // (__MAC_OS_X_VERSION_MIN_REQUIRED < 1080)	{		status = SSLNewContext(isServer, &sslContext);		if (status != noErr)		{			[self closeWithError:[self otherError:@"Error in SSLNewContext"]];			return;		}	}	#endif		status = SSLSetIOFuncs(sslContext, &SSLReadFunction, &SSLWriteFunction);	if (status != noErr)	{		[self closeWithError:[self otherError:@"Error in SSLSetIOFuncs"]];		return;	}		status = SSLSetConnection(sslContext, (__bridge SSLConnectionRef)self);	if (status != noErr)	{		[self closeWithError:[self otherError:@"Error in SSLSetConnection"]];		return;	}	NSNumber *shouldManuallyEvaluateTrust = [tlsSettings objectForKey:GCDAsyncSocketManuallyEvaluateTrust];	if ([shouldManuallyEvaluateTrust boolValue])	{		if (isServer)		{			[self closeWithError:[self otherError:@"Manual trust validation is not supported for server sockets"]];			return;		}				status = SSLSetSessionOption(sslContext, kSSLSessionOptionBreakOnServerAuth, true);		if (status != noErr)		{			[self closeWithError:[self otherError:@"Error in SSLSetSessionOption"]];			return;		}				#if !TARGET_OS_IPHONE && (__MAC_OS_X_VERSION_MIN_REQUIRED < 1080)				// Note from Apple's documentation:		//		// It is only necessary to call SSLSetEnableCertVerify on the Mac prior to OS X 10.8.		// On OS X 10.8 and later setting kSSLSessionOptionBreakOnServerAuth always disables the		// built-in trust evaluation. All versions of iOS behave like OS X 10.8 and thus		// SSLSetEnableCertVerify is not available on that platform at all.				status = SSLSetEnableCertVerify(sslContext, NO);		if (status != noErr)		{			[self closeWithError:[self otherError:@"Error in SSLSetEnableCertVerify"]];			return;		}				#endif	}	// Configure SSLContext from given settings	// 	// Checklist:	//  1. kCFStreamSSLPeerName	//  2. kCFStreamSSLCertificates	//  3. GCDAsyncSocketSSLPeerID	//  4. GCDAsyncSocketSSLProtocolVersionMin	//  5. GCDAsyncSocketSSLProtocolVersionMax	//  6. GCDAsyncSocketSSLSessionOptionFalseStart	//  7. GCDAsyncSocketSSLSessionOptionSendOneByteRecord	//  8. GCDAsyncSocketSSLCipherSuites	//  9. GCDAsyncSocketSSLDiffieHellmanParameters (Mac)    // 10. GCDAsyncSocketSSLALPN	//	// Deprecated (throw error):	// 10. kCFStreamSSLAllowsAnyRoot	// 11. kCFStreamSSLAllowsExpiredRoots	// 12. kCFStreamSSLAllowsExpiredCertificates	// 13. kCFStreamSSLValidatesCertificateChain	// 14. kCFStreamSSLLevel		NSObject *value;		// 1. kCFStreamSSLPeerName		value = [tlsSettings objectForKey:(__bridge NSString *)kCFStreamSSLPeerName];	if ([value isKindOfClass:[NSString class]])	{		NSString *peerName = (NSString *)value;				const char *peer = [peerName UTF8String];		size_t peerLen = strlen(peer);				status = SSLSetPeerDomainName(sslContext, peer, peerLen);		if (status != noErr)		{			[self closeWithError:[self otherError:@"Error in SSLSetPeerDomainName"]];			return;		}	}	else if (value)	{		NSAssert(NO, @"Invalid value for kCFStreamSSLPeerName. Value must be of type NSString.");				[self closeWithError:[self otherError:@"Invalid value for kCFStreamSSLPeerName."]];		return;	}		// 2. kCFStreamSSLCertificates		value = [tlsSettings objectForKey:(__bridge NSString *)kCFStreamSSLCertificates];	if ([value isKindOfClass:[NSArray class]])	{		NSArray *certs = (NSArray *)value;				status = SSLSetCertificate(sslContext, (__bridge CFArrayRef)certs);		if (status != noErr)		{			[self closeWithError:[self otherError:@"Error in SSLSetCertificate"]];			return;		}	}	else if (value)	{		NSAssert(NO, @"Invalid value for kCFStreamSSLCertificates. Value must be of type NSArray.");				[self closeWithError:[self otherError:@"Invalid value for kCFStreamSSLCertificates."]];		return;	}		// 3. GCDAsyncSocketSSLPeerID		value = [tlsSettings objectForKey:GCDAsyncSocketSSLPeerID];	if ([value isKindOfClass:[NSData class]])	{		NSData *peerIdData = (NSData *)value;				status = SSLSetPeerID(sslContext, [peerIdData bytes], [peerIdData length]);		if (status != noErr)		{			[self closeWithError:[self otherError:@"Error in SSLSetPeerID"]];			return;		}	}	else if (value)	{		NSAssert(NO, @"Invalid value for GCDAsyncSocketSSLPeerID. Value must be of type NSData."		             @" (You can convert strings to data using a method like"		             @" [string dataUsingEncoding:NSUTF8StringEncoding])");				[self closeWithError:[self otherError:@"Invalid value for GCDAsyncSocketSSLPeerID."]];		return;	}		// 4. GCDAsyncSocketSSLProtocolVersionMin		value = [tlsSettings objectForKey:GCDAsyncSocketSSLProtocolVersionMin];	if ([value isKindOfClass:[NSNumber class]])	{		SSLProtocol minProtocol = (SSLProtocol)[(NSNumber *)value intValue];		if (minProtocol != kSSLProtocolUnknown)		{			status = SSLSetProtocolVersionMin(sslContext, minProtocol);			if (status != noErr)			{				[self closeWithError:[self otherError:@"Error in SSLSetProtocolVersionMin"]];				return;			}		}	}	else if (value)	{		NSAssert(NO, @"Invalid value for GCDAsyncSocketSSLProtocolVersionMin. Value must be of type NSNumber.");				[self closeWithError:[self otherError:@"Invalid value for GCDAsyncSocketSSLProtocolVersionMin."]];		return;	}		// 5. GCDAsyncSocketSSLProtocolVersionMax		value = [tlsSettings objectForKey:GCDAsyncSocketSSLProtocolVersionMax];	if ([value isKindOfClass:[NSNumber class]])	{		SSLProtocol maxProtocol = (SSLProtocol)[(NSNumber *)value intValue];		if (maxProtocol != kSSLProtocolUnknown)		{			status = SSLSetProtocolVersionMax(sslContext, maxProtocol);			if (status != noErr)			{				[self closeWithError:[self otherError:@"Error in SSLSetProtocolVersionMax"]];				return;			}		}	}	else if (value)	{		NSAssert(NO, @"Invalid value for GCDAsyncSocketSSLProtocolVersionMax. Value must be of type NSNumber.");				[self closeWithError:[self otherError:@"Invalid value for GCDAsyncSocketSSLProtocolVersionMax."]];		return;	}		// 6. GCDAsyncSocketSSLSessionOptionFalseStart		value = [tlsSettings objectForKey:GCDAsyncSocketSSLSessionOptionFalseStart];	if ([value isKindOfClass:[NSNumber class]])	{		NSNumber *falseStart = (NSNumber *)value;		status = SSLSetSessionOption(sslContext, kSSLSessionOptionFalseStart, [falseStart boolValue]);		if (status != noErr)		{			[self closeWithError:[self otherError:@"Error in SSLSetSessionOption (kSSLSessionOptionFalseStart)"]];			return;		}	}	else if (value)	{		NSAssert(NO, @"Invalid value for GCDAsyncSocketSSLSessionOptionFalseStart. Value must be of type NSNumber.");				[self closeWithError:[self otherError:@"Invalid value for GCDAsyncSocketSSLSessionOptionFalseStart."]];		return;	}		// 7. GCDAsyncSocketSSLSessionOptionSendOneByteRecord		value = [tlsSettings objectForKey:GCDAsyncSocketSSLSessionOptionSendOneByteRecord];	if ([value isKindOfClass:[NSNumber class]])	{		NSNumber *oneByteRecord = (NSNumber *)value;		status = SSLSetSessionOption(sslContext, kSSLSessionOptionSendOneByteRecord, [oneByteRecord boolValue]);		if (status != noErr)		{			[self closeWithError:			  [self otherError:@"Error in SSLSetSessionOption (kSSLSessionOptionSendOneByteRecord)"]];			return;		}	}	else if (value)	{		NSAssert(NO, @"Invalid value for GCDAsyncSocketSSLSessionOptionSendOneByteRecord."		             @" Value must be of type NSNumber.");				[self closeWithError:[self otherError:@"Invalid value for GCDAsyncSocketSSLSessionOptionSendOneByteRecord."]];		return;	}		// 8. GCDAsyncSocketSSLCipherSuites		value = [tlsSettings objectForKey:GCDAsyncSocketSSLCipherSuites];	if ([value isKindOfClass:[NSArray class]])	{		NSArray *cipherSuites = (NSArray *)value;		NSUInteger numberCiphers = [cipherSuites count];		SSLCipherSuite ciphers[numberCiphers];				NSUInteger cipherIndex;		for (cipherIndex = 0; cipherIndex < numberCiphers; cipherIndex++)		{			NSNumber *cipherObject = [cipherSuites objectAtIndex:cipherIndex];			ciphers[cipherIndex] = (SSLCipherSuite)[cipherObject unsignedIntValue];		}				status = SSLSetEnabledCiphers(sslContext, ciphers, numberCiphers);		if (status != noErr)		{			[self closeWithError:[self otherError:@"Error in SSLSetEnabledCiphers"]];			return;		}	}	else if (value)	{		NSAssert(NO, @"Invalid value for GCDAsyncSocketSSLCipherSuites. Value must be of type NSArray.");				[self closeWithError:[self otherError:@"Invalid value for GCDAsyncSocketSSLCipherSuites."]];		return;	}		// 9. GCDAsyncSocketSSLDiffieHellmanParameters		#if !TARGET_OS_IPHONE	value = [tlsSettings objectForKey:GCDAsyncSocketSSLDiffieHellmanParameters];	if ([value isKindOfClass:[NSData class]])	{		NSData *diffieHellmanData = (NSData *)value;				status = SSLSetDiffieHellmanParams(sslContext, [diffieHellmanData bytes], [diffieHellmanData length]);		if (status != noErr)		{			[self closeWithError:[self otherError:@"Error in SSLSetDiffieHellmanParams"]];			return;		}	}	else if (value)	{		NSAssert(NO, @"Invalid value for GCDAsyncSocketSSLDiffieHellmanParameters. Value must be of type NSData.");				[self closeWithError:[self otherError:@"Invalid value for GCDAsyncSocketSSLDiffieHellmanParameters."]];		return;	}	#endif    // 10. kCFStreamSSLCertificates    value = [tlsSettings objectForKey:GCDAsyncSocketSSLALPN];    if ([value isKindOfClass:[NSArray class]])    {        if (@available(iOS 11.0, macOS 10.13, tvOS 11.0, *))        {            CFArrayRef protocols = (__bridge CFArrayRef)((NSArray *) value);            status = SSLSetALPNProtocols(sslContext, protocols);            if (status != noErr)            {                [self closeWithError:[self otherError:@"Error in SSLSetALPNProtocols"]];                return;            }        }        else        {            NSAssert(NO, @"Security option unavailable - GCDAsyncSocketSSLALPN"                     @" - iOS 11.0, macOS 10.13 required");            [self closeWithError:[self otherError:@"Security option unavailable - GCDAsyncSocketSSLALPN"]];        }    }    else if (value)    {        NSAssert(NO, @"Invalid value for GCDAsyncSocketSSLALPN. Value must be of type NSArray.");                [self closeWithError:[self otherError:@"Invalid value for GCDAsyncSocketSSLALPN."]];        return;    }    	// DEPRECATED checks		// 10. kCFStreamSSLAllowsAnyRoot		#pragma clang diagnostic push	#pragma clang diagnostic ignored "-Wdeprecated-declarations"	value = [tlsSettings objectForKey:(__bridge NSString *)kCFStreamSSLAllowsAnyRoot];	#pragma clang diagnostic pop	if (value)	{		NSAssert(NO, @"Security option unavailable - kCFStreamSSLAllowsAnyRoot"		             @" - You must use manual trust evaluation");				[self closeWithError:[self otherError:@"Security option unavailable - kCFStreamSSLAllowsAnyRoot"]];		return;	}		// 11. kCFStreamSSLAllowsExpiredRoots		#pragma clang diagnostic push	#pragma clang diagnostic ignored "-Wdeprecated-declarations"	value = [tlsSettings objectForKey:(__bridge NSString *)kCFStreamSSLAllowsExpiredRoots];	#pragma clang diagnostic pop	if (value)	{		NSAssert(NO, @"Security option unavailable - kCFStreamSSLAllowsExpiredRoots"		             @" - You must use manual trust evaluation");				[self closeWithError:[self otherError:@"Security option unavailable - kCFStreamSSLAllowsExpiredRoots"]];		return;	}		// 12. kCFStreamSSLValidatesCertificateChain		#pragma clang diagnostic push	#pragma clang diagnostic ignored "-Wdeprecated-declarations"	value = [tlsSettings objectForKey:(__bridge NSString *)kCFStreamSSLValidatesCertificateChain];	#pragma clang diagnostic pop	if (value)	{		NSAssert(NO, @"Security option unavailable - kCFStreamSSLValidatesCertificateChain"		             @" - You must use manual trust evaluation");				[self closeWithError:[self otherError:@"Security option unavailable - kCFStreamSSLValidatesCertificateChain"]];		return;	}		// 13. kCFStreamSSLAllowsExpiredCertificates		#pragma clang diagnostic push	#pragma clang diagnostic ignored "-Wdeprecated-declarations"	value = [tlsSettings objectForKey:(__bridge NSString *)kCFStreamSSLAllowsExpiredCertificates];	#pragma clang diagnostic pop	if (value)	{		NSAssert(NO, @"Security option unavailable - kCFStreamSSLAllowsExpiredCertificates"		             @" - You must use manual trust evaluation");				[self closeWithError:[self otherError:@"Security option unavailable - kCFStreamSSLAllowsExpiredCertificates"]];		return;	}		// 14. kCFStreamSSLLevel		#pragma clang diagnostic push	#pragma clang diagnostic ignored "-Wdeprecated-declarations"	value = [tlsSettings objectForKey:(__bridge NSString *)kCFStreamSSLLevel];	#pragma clang diagnostic pop	if (value)	{		NSAssert(NO, @"Security option unavailable - kCFStreamSSLLevel"		             @" - You must use GCDAsyncSocketSSLProtocolVersionMin & GCDAsyncSocketSSLProtocolVersionMax");				[self closeWithError:[self otherError:@"Security option unavailable - kCFStreamSSLLevel"]];		return;	}		// Setup the sslPreBuffer	// 	// Any data in the preBuffer needs to be moved into the sslPreBuffer,	// as this data is now part of the secure read stream.		sslPreBuffer = [[GCDAsyncSocketPreBuffer alloc] initWithCapacity:(1024 * 4)];		size_t preBufferLength  = [preBuffer availableBytes];		if (preBufferLength > 0)	{		[sslPreBuffer ensureCapacityForWrite:preBufferLength];				memcpy([sslPreBuffer writeBuffer], [preBuffer readBuffer], preBufferLength);		[preBuffer didRead:preBufferLength];		[sslPreBuffer didWrite:preBufferLength];	}		sslErrCode = lastSSLHandshakeError = noErr;		// Start the SSL Handshake process		[self ssl_continueSSLHandshake];}- (void)ssl_continueSSLHandshake{	LogTrace();		// If the return value is noErr, the session is ready for normal secure communication.	// If the return value is errSSLWouldBlock, the SSLHandshake function must be called again.	// If the return value is errSSLServerAuthCompleted, we ask delegate if we should trust the	// server and then call SSLHandshake again to resume the handshake or close the connection	// errSSLPeerBadCert SSL error.	// Otherwise, the return value indicates an error code.		OSStatus status = SSLHandshake(sslContext);	lastSSLHandshakeError = status;		if (status == noErr)	{		LogVerbose(@"SSLHandshake complete");				flags &= ~kStartingReadTLS;		flags &= ~kStartingWriteTLS;				flags |=  kSocketSecure;				__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;		if (delegateQueue && [theDelegate respondsToSelector:@selector(socketDidSecure:)])		{			dispatch_async(delegateQueue, ^{ @autoreleasepool {								[theDelegate socketDidSecure:self];			}});		}				[self endCurrentRead];		[self endCurrentWrite];				[self maybeDequeueRead];		[self maybeDequeueWrite];	}	else if (status == errSSLPeerAuthCompleted)	{		LogVerbose(@"SSLHandshake peerAuthCompleted - awaiting delegate approval");				__block SecTrustRef trust = NULL;		status = SSLCopyPeerTrust(sslContext, &trust);		if (status != noErr)		{			[self closeWithError:[self sslError:status]];			return;		}				int aStateIndex = stateIndex;		dispatch_queue_t theSocketQueue = socketQueue;				__weak GCDAsyncSocket *weakSelf = self;				void (^comletionHandler)(BOOL) = ^(BOOL shouldTrust){ @autoreleasepool {		#pragma clang diagnostic push		#pragma clang diagnostic warning "-Wimplicit-retain-self"						dispatch_async(theSocketQueue, ^{ @autoreleasepool {								if (trust) {					CFRelease(trust);					trust = NULL;				}								__strong GCDAsyncSocket *strongSelf = weakSelf;				if (strongSelf)				{					[strongSelf ssl_shouldTrustPeer:shouldTrust stateIndex:aStateIndex];				}			}});					#pragma clang diagnostic pop		}};				__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;				if (delegateQueue && [theDelegate respondsToSelector:@selector(socket:didReceiveTrust:completionHandler:)])		{			dispatch_async(delegateQueue, ^{ @autoreleasepool {							[theDelegate socket:self didReceiveTrust:trust completionHandler:comletionHandler];			}});		}		else		{			if (trust) {				CFRelease(trust);				trust = NULL;			}						NSString *msg = @"GCDAsyncSocketManuallyEvaluateTrust specified in tlsSettings,"			                @" but delegate doesn't implement socket:shouldTrustPeer:";						[self closeWithError:[self otherError:msg]];			return;		}	}	else if (status == errSSLWouldBlock)	{		LogVerbose(@"SSLHandshake continues...");				// Handshake continues...		// 		// This method will be called again from doReadData or doWriteData.	}	else	{		[self closeWithError:[self sslError:status]];	}}- (void)ssl_shouldTrustPeer:(BOOL)shouldTrust stateIndex:(int)aStateIndex{	LogTrace();		if (aStateIndex != stateIndex)	{		LogInfo(@"Ignoring ssl_shouldTrustPeer - invalid state (maybe disconnected)");				// One of the following is true		// - the socket was disconnected		// - the startTLS operation timed out		// - the completionHandler was already invoked once				return;	}		// Increment stateIndex to ensure completionHandler can only be called once.	stateIndex++;		if (shouldTrust)	{        NSAssert(lastSSLHandshakeError == errSSLPeerAuthCompleted, @"ssl_shouldTrustPeer called when last error is %d and not errSSLPeerAuthCompleted", (int)lastSSLHandshakeError);		[self ssl_continueSSLHandshake];	}	else	{		[self closeWithError:[self sslError:errSSLPeerBadCert]];	}}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Security via CFStream////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#if TARGET_OS_IPHONE- (void)cf_finishSSLHandshake{	LogTrace();		if ((flags & kStartingReadTLS) && (flags & kStartingWriteTLS))	{		flags &= ~kStartingReadTLS;		flags &= ~kStartingWriteTLS;				flags |= kSocketSecure;				__strong id<GCDAsyncSocketDelegate> theDelegate = delegate;		if (delegateQueue && [theDelegate respondsToSelector:@selector(socketDidSecure:)])		{			dispatch_async(delegateQueue, ^{ @autoreleasepool {								[theDelegate socketDidSecure:self];			}});		}				[self endCurrentRead];		[self endCurrentWrite];				[self maybeDequeueRead];		[self maybeDequeueWrite];	}}- (void)cf_abortSSLHandshake:(NSError *)error{	LogTrace();		if ((flags & kStartingReadTLS) && (flags & kStartingWriteTLS))	{		flags &= ~kStartingReadTLS;		flags &= ~kStartingWriteTLS;				[self closeWithError:error];	}}- (void)cf_startTLS{	LogTrace();		LogVerbose(@"Starting TLS (via CFStream)...");		if ([preBuffer availableBytes] > 0)	{		NSString *msg = @"Invalid TLS transition. Handshake has already been read from socket.";				[self closeWithError:[self otherError:msg]];		return;	}		[self suspendReadSource];	[self suspendWriteSource];		socketFDBytesAvailable = 0;	flags &= ~kSocketCanAcceptBytes;	flags &= ~kSecureSocketHasBytesAvailable;		flags |=  kUsingCFStreamForTLS;		if (![self createReadAndWriteStream])	{		[self closeWithError:[self otherError:@"Error in CFStreamCreatePairWithSocket"]];		return;	}		if (![self registerForStreamCallbacksIncludingReadWrite:YES])	{		[self closeWithError:[self otherError:@"Error in CFStreamSetClient"]];		return;	}		if (![self addStreamsToRunLoop])	{		[self closeWithError:[self otherError:@"Error in CFStreamScheduleWithRunLoop"]];		return;	}		NSAssert([currentRead isKindOfClass:[GCDAsyncSpecialPacket class]], @"Invalid read packet for startTLS");	NSAssert([currentWrite isKindOfClass:[GCDAsyncSpecialPacket class]], @"Invalid write packet for startTLS");		GCDAsyncSpecialPacket *tlsPacket = (GCDAsyncSpecialPacket *)currentRead;	CFDictionaryRef tlsSettings = (__bridge CFDictionaryRef)tlsPacket->tlsSettings;		// Getting an error concerning kCFStreamPropertySSLSettings ?	// You need to add the CFNetwork framework to your iOS application.		BOOL r1 = CFReadStreamSetProperty(readStream, kCFStreamPropertySSLSettings, tlsSettings);	BOOL r2 = CFWriteStreamSetProperty(writeStream, kCFStreamPropertySSLSettings, tlsSettings);		// For some reason, starting around the time of iOS 4.3,	// the first call to set the kCFStreamPropertySSLSettings will return true,	// but the second will return false.	// 	// Order doesn't seem to matter.	// So you could call CFReadStreamSetProperty and then CFWriteStreamSetProperty, or you could reverse the order.	// Either way, the first call will return true, and the second returns false.	// 	// Interestingly, this doesn't seem to affect anything.	// Which is not altogether unusual, as the documentation seems to suggest that (for many settings)	// setting it on one side of the stream automatically sets it for the other side of the stream.	// 	// Although there isn't anything in the documentation to suggest that the second attempt would fail.	// 	// Furthermore, this only seems to affect streams that are negotiating a security upgrade.	// In other words, the socket gets connected, there is some back-and-forth communication over the unsecure	// connection, and then a startTLS is issued.	// So this mostly affects newer protocols (XMPP, IMAP) as opposed to older protocols (HTTPS).		if (!r1 && !r2) // Yes, the && is correct - workaround for apple bug.	{		[self closeWithError:[self otherError:@"Error in CFStreamSetProperty"]];		return;	}		if (![self openStreams])	{		[self closeWithError:[self otherError:@"Error in CFStreamOpen"]];		return;	}		LogVerbose(@"Waiting for SSL Handshake to complete...");}#endif////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark CFStream////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#if TARGET_OS_IPHONE+ (void)ignore:(id)_{}+ (void)startCFStreamThreadIfNeeded{	LogTrace();		static dispatch_once_t predicate;	dispatch_once(&predicate, ^{				cfstreamThreadRetainCount = 0;		cfstreamThreadSetupQueue = dispatch_queue_create("GCDAsyncSocket-CFStreamThreadSetup", DISPATCH_QUEUE_SERIAL);	});		dispatch_sync(cfstreamThreadSetupQueue, ^{ @autoreleasepool {				if (++cfstreamThreadRetainCount == 1)		{			cfstreamThread = [[NSThread alloc] initWithTarget:self			                                         selector:@selector(cfstreamThread:)			                                           object:nil];			[cfstreamThread start];		}	}});}+ (void)stopCFStreamThreadIfNeeded{	LogTrace();		// The creation of the cfstreamThread is relatively expensive.	// So we'd like to keep it available for recycling.	// However, there's a tradeoff here, because it shouldn't remain alive forever.	// So what we're going to do is use a little delay before taking it down.	// This way it can be reused properly in situations where multiple sockets are continually in flux.		int delayInSeconds = 30;	dispatch_time_t when = dispatch_time(DISPATCH_TIME_NOW, (int64_t)(delayInSeconds * NSEC_PER_SEC));	dispatch_after(when, cfstreamThreadSetupQueue, ^{ @autoreleasepool {	#pragma clang diagnostic push	#pragma clang diagnostic warning "-Wimplicit-retain-self"				if (cfstreamThreadRetainCount == 0)		{			LogWarn(@"Logic error concerning cfstreamThread start / stop");			return_from_block;		}				if (--cfstreamThreadRetainCount == 0)		{			[cfstreamThread cancel]; // set isCancelled flag						// wake up the thread            [[self class] performSelector:@selector(ignore:)                                 onThread:cfstreamThread                               withObject:[NSNull null]                            waitUntilDone:NO];            			cfstreamThread = nil;		}			#pragma clang diagnostic pop	}});}+ (void)cfstreamThread:(id)unused { @autoreleasepool{	[[NSThread currentThread] setName:GCDAsyncSocketThreadName];		LogInfo(@"CFStreamThread: Started");		// We can't run the run loop unless it has an associated input source or a timer.	// So we'll just create a timer that will never fire - unless the server runs for decades.	[NSTimer scheduledTimerWithTimeInterval:[[NSDate distantFuture] timeIntervalSinceNow]	                                 target:self	                               selector:@selector(ignore:)	                               userInfo:nil	                                repeats:YES];		NSThread *currentThread = [NSThread currentThread];	NSRunLoop *currentRunLoop = [NSRunLoop currentRunLoop];		BOOL isCancelled = [currentThread isCancelled];		while (!isCancelled && [currentRunLoop runMode:NSDefaultRunLoopMode beforeDate:[NSDate distantFuture]])	{		isCancelled = [currentThread isCancelled];	}		LogInfo(@"CFStreamThread: Stopped");}}+ (void)scheduleCFStreams:(GCDAsyncSocket *)asyncSocket{	LogTrace();	NSAssert([NSThread currentThread] == cfstreamThread, @"Invoked on wrong thread");		CFRunLoopRef runLoop = CFRunLoopGetCurrent();		if (asyncSocket->readStream)		CFReadStreamScheduleWithRunLoop(asyncSocket->readStream, runLoop, kCFRunLoopDefaultMode);		if (asyncSocket->writeStream)		CFWriteStreamScheduleWithRunLoop(asyncSocket->writeStream, runLoop, kCFRunLoopDefaultMode);}+ (void)unscheduleCFStreams:(GCDAsyncSocket *)asyncSocket{	LogTrace();	NSAssert([NSThread currentThread] == cfstreamThread, @"Invoked on wrong thread");		CFRunLoopRef runLoop = CFRunLoopGetCurrent();		if (asyncSocket->readStream)		CFReadStreamUnscheduleFromRunLoop(asyncSocket->readStream, runLoop, kCFRunLoopDefaultMode);		if (asyncSocket->writeStream)		CFWriteStreamUnscheduleFromRunLoop(asyncSocket->writeStream, runLoop, kCFRunLoopDefaultMode);}static void CFReadStreamCallback (CFReadStreamRef stream, CFStreamEventType type, void *pInfo){	GCDAsyncSocket *asyncSocket = (__bridge GCDAsyncSocket *)pInfo;		switch(type)	{		case kCFStreamEventHasBytesAvailable:		{			dispatch_async(asyncSocket->socketQueue, ^{ @autoreleasepool {								LogCVerbose(@"CFReadStreamCallback - HasBytesAvailable");								if (asyncSocket->readStream != stream)					return_from_block;								if ((asyncSocket->flags & kStartingReadTLS) && (asyncSocket->flags & kStartingWriteTLS))				{					// If we set kCFStreamPropertySSLSettings before we opened the streams, this might be a lie.					// (A callback related to the tcp stream, but not to the SSL layer).										if (CFReadStreamHasBytesAvailable(asyncSocket->readStream))					{						asyncSocket->flags |= kSecureSocketHasBytesAvailable;						[asyncSocket cf_finishSSLHandshake];					}				}				else				{					asyncSocket->flags |= kSecureSocketHasBytesAvailable;					[asyncSocket doReadData];				}			}});						break;		}		default:		{			NSError *error = (__bridge_transfer  NSError *)CFReadStreamCopyError(stream);						if (error == nil && type == kCFStreamEventEndEncountered)			{				error = [asyncSocket connectionClosedError];			}						dispatch_async(asyncSocket->socketQueue, ^{ @autoreleasepool {								LogCVerbose(@"CFReadStreamCallback - Other");								if (asyncSocket->readStream != stream)					return_from_block;								if ((asyncSocket->flags & kStartingReadTLS) && (asyncSocket->flags & kStartingWriteTLS))				{					[asyncSocket cf_abortSSLHandshake:error];				}				else				{					[asyncSocket closeWithError:error];				}			}});						break;		}	}	}static void CFWriteStreamCallback (CFWriteStreamRef stream, CFStreamEventType type, void *pInfo){	GCDAsyncSocket *asyncSocket = (__bridge GCDAsyncSocket *)pInfo;		switch(type)	{		case kCFStreamEventCanAcceptBytes:		{			dispatch_async(asyncSocket->socketQueue, ^{ @autoreleasepool {								LogCVerbose(@"CFWriteStreamCallback - CanAcceptBytes");								if (asyncSocket->writeStream != stream)					return_from_block;								if ((asyncSocket->flags & kStartingReadTLS) && (asyncSocket->flags & kStartingWriteTLS))				{					// If we set kCFStreamPropertySSLSettings before we opened the streams, this might be a lie.					// (A callback related to the tcp stream, but not to the SSL layer).										if (CFWriteStreamCanAcceptBytes(asyncSocket->writeStream))					{						asyncSocket->flags |= kSocketCanAcceptBytes;						[asyncSocket cf_finishSSLHandshake];					}				}				else				{					asyncSocket->flags |= kSocketCanAcceptBytes;					[asyncSocket doWriteData];				}			}});						break;		}		default:		{			NSError *error = (__bridge_transfer NSError *)CFWriteStreamCopyError(stream);						if (error == nil && type == kCFStreamEventEndEncountered)			{				error = [asyncSocket connectionClosedError];			}						dispatch_async(asyncSocket->socketQueue, ^{ @autoreleasepool {								LogCVerbose(@"CFWriteStreamCallback - Other");								if (asyncSocket->writeStream != stream)					return_from_block;								if ((asyncSocket->flags & kStartingReadTLS) && (asyncSocket->flags & kStartingWriteTLS))				{					[asyncSocket cf_abortSSLHandshake:error];				}				else				{					[asyncSocket closeWithError:error];				}			}});						break;		}	}	}- (BOOL)createReadAndWriteStream{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");			if (readStream || writeStream)	{		// Streams already created		return YES;	}		int socketFD = (socket4FD != SOCKET_NULL) ? socket4FD : (socket6FD != SOCKET_NULL) ? socket6FD : socketUN;		if (socketFD == SOCKET_NULL)	{		// Cannot create streams without a file descriptor		return NO;	}		if (![self isConnected])	{		// Cannot create streams until file descriptor is connected		return NO;	}		LogVerbose(@"Creating read and write stream...");		CFStreamCreatePairWithSocket(NULL, (CFSocketNativeHandle)socketFD, &readStream, &writeStream);		// The kCFStreamPropertyShouldCloseNativeSocket property should be false by default (for our case).	// But let's not take any chances.		if (readStream)		CFReadStreamSetProperty(readStream, kCFStreamPropertyShouldCloseNativeSocket, kCFBooleanFalse);	if (writeStream)		CFWriteStreamSetProperty(writeStream, kCFStreamPropertyShouldCloseNativeSocket, kCFBooleanFalse);		if ((readStream == NULL) || (writeStream == NULL))	{		LogWarn(@"Unable to create read and write stream...");				if (readStream)		{			CFReadStreamClose(readStream);			CFRelease(readStream);			readStream = NULL;		}		if (writeStream)		{			CFWriteStreamClose(writeStream);			CFRelease(writeStream);			writeStream = NULL;		}				return NO;	}		return YES;}- (BOOL)registerForStreamCallbacksIncludingReadWrite:(BOOL)includeReadWrite{	LogVerbose(@"%@ %@", THIS_METHOD, (includeReadWrite ? @"YES" : @"NO"));		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");	NSAssert((readStream != NULL && writeStream != NULL), @"Read/Write stream is null");		streamContext.version = 0;	streamContext.info = (__bridge void *)(self);	streamContext.retain = nil;	streamContext.release = nil;	streamContext.copyDescription = nil;		CFOptionFlags readStreamEvents = kCFStreamEventErrorOccurred | kCFStreamEventEndEncountered;	if (includeReadWrite)		readStreamEvents |= kCFStreamEventHasBytesAvailable;		if (!CFReadStreamSetClient(readStream, readStreamEvents, &CFReadStreamCallback, &streamContext))	{		return NO;	}		CFOptionFlags writeStreamEvents = kCFStreamEventErrorOccurred | kCFStreamEventEndEncountered;	if (includeReadWrite)		writeStreamEvents |= kCFStreamEventCanAcceptBytes;		if (!CFWriteStreamSetClient(writeStream, writeStreamEvents, &CFWriteStreamCallback, &streamContext))	{		return NO;	}		return YES;}- (BOOL)addStreamsToRunLoop{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");	NSAssert((readStream != NULL && writeStream != NULL), @"Read/Write stream is null");		if (!(flags & kAddedStreamsToRunLoop))	{		LogVerbose(@"Adding streams to runloop...");				[[self class] startCFStreamThreadIfNeeded];        dispatch_sync(cfstreamThreadSetupQueue, ^{            [[self class] performSelector:@selector(scheduleCFStreams:)                                 onThread:cfstreamThread                               withObject:self                            waitUntilDone:YES];        });		flags |= kAddedStreamsToRunLoop;	}		return YES;}- (void)removeStreamsFromRunLoop{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");	NSAssert((readStream != NULL && writeStream != NULL), @"Read/Write stream is null");		if (flags & kAddedStreamsToRunLoop)	{		LogVerbose(@"Removing streams from runloop...");                dispatch_sync(cfstreamThreadSetupQueue, ^{            [[self class] performSelector:@selector(unscheduleCFStreams:)                                 onThread:cfstreamThread                               withObject:self                            waitUntilDone:YES];        });		[[self class] stopCFStreamThreadIfNeeded];				flags &= ~kAddedStreamsToRunLoop;	}}- (BOOL)openStreams{	LogTrace();		NSAssert(dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey), @"Must be dispatched on socketQueue");	NSAssert((readStream != NULL && writeStream != NULL), @"Read/Write stream is null");		CFStreamStatus readStatus = CFReadStreamGetStatus(readStream);	CFStreamStatus writeStatus = CFWriteStreamGetStatus(writeStream);		if ((readStatus == kCFStreamStatusNotOpen) || (writeStatus == kCFStreamStatusNotOpen))	{		LogVerbose(@"Opening read and write stream...");				BOOL r1 = CFReadStreamOpen(readStream);		BOOL r2 = CFWriteStreamOpen(writeStream);				if (!r1 || !r2)		{			LogError(@"Error in CFStreamOpen");			return NO;		}	}		return YES;}#endif////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Advanced/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////** * See header file for big discussion of this method.**/- (BOOL)autoDisconnectOnClosedReadStream{	// Note: YES means kAllowHalfDuplexConnection is OFF		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		return ((config & kAllowHalfDuplexConnection) == 0);	}	else	{		__block BOOL result;				dispatch_sync(socketQueue, ^{            result = ((self->config & kAllowHalfDuplexConnection) == 0);		});				return result;	}}/** * See header file for big discussion of this method.**/- (void)setAutoDisconnectOnClosedReadStream:(BOOL)flag{	// Note: YES means kAllowHalfDuplexConnection is OFF		dispatch_block_t block = ^{				if (flag)            self->config &= ~kAllowHalfDuplexConnection;		else            self->config |= kAllowHalfDuplexConnection;	};		if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_async(socketQueue, block);}/** * See header file for big discussion of this method.**/- (void)markSocketQueueTargetQueue:(dispatch_queue_t)socketNewTargetQueue{	void *nonNullUnusedPointer = (__bridge void *)self;	dispatch_queue_set_specific(socketNewTargetQueue, IsOnSocketQueueOrTargetQueueKey, nonNullUnusedPointer, NULL);}/** * See header file for big discussion of this method.**/- (void)unmarkSocketQueueTargetQueue:(dispatch_queue_t)socketOldTargetQueue{	dispatch_queue_set_specific(socketOldTargetQueue, IsOnSocketQueueOrTargetQueueKey, NULL, NULL);}/** * See header file for big discussion of this method.**/- (void)performBlock:(dispatch_block_t)block{	if (dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))		block();	else		dispatch_sync(socketQueue, block);}/** * Questions? Have you read the header file?**/- (int)socketFD{	if (!dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		LogWarn(@"%@ - Method only available from within the context of a performBlock: invocation", THIS_METHOD);		return SOCKET_NULL;	}		if (socket4FD != SOCKET_NULL)		return socket4FD;	else		return socket6FD;}/** * Questions? Have you read the header file?**/- (int)socket4FD{	if (!dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		LogWarn(@"%@ - Method only available from within the context of a performBlock: invocation", THIS_METHOD);		return SOCKET_NULL;	}		return socket4FD;}/** * Questions? Have you read the header file?**/- (int)socket6FD{	if (!dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		LogWarn(@"%@ - Method only available from within the context of a performBlock: invocation", THIS_METHOD);		return SOCKET_NULL;	}		return socket6FD;}#if TARGET_OS_IPHONE/** * Questions? Have you read the header file?**/- (CFReadStreamRef)readStream{	if (!dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		LogWarn(@"%@ - Method only available from within the context of a performBlock: invocation", THIS_METHOD);		return NULL;	}		if (readStream == NULL)		[self createReadAndWriteStream];		return readStream;}/** * Questions? Have you read the header file?**/- (CFWriteStreamRef)writeStream{	if (!dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		LogWarn(@"%@ - Method only available from within the context of a performBlock: invocation", THIS_METHOD);		return NULL;	}		if (writeStream == NULL)		[self createReadAndWriteStream];		return writeStream;}- (BOOL)enableBackgroundingOnSocketWithCaveat:(BOOL)caveat{	if (![self createReadAndWriteStream])	{		// Error occurred creating streams (perhaps socket isn't open)		return NO;	}		BOOL r1, r2;		LogVerbose(@"Enabling backgrouding on socket");	#pragma clang diagnostic push#pragma clang diagnostic ignored "-Wdeprecated-declarations"	r1 = CFReadStreamSetProperty(readStream, kCFStreamNetworkServiceType, kCFStreamNetworkServiceTypeVoIP);	r2 = CFWriteStreamSetProperty(writeStream, kCFStreamNetworkServiceType, kCFStreamNetworkServiceTypeVoIP);#pragma clang diagnostic pop	if (!r1 || !r2)	{		return NO;	}		if (!caveat)	{		if (![self openStreams])		{			return NO;		}	}		return YES;}/** * Questions? Have you read the header file?**/- (BOOL)enableBackgroundingOnSocket{	LogTrace();		if (!dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		LogWarn(@"%@ - Method only available from within the context of a performBlock: invocation", THIS_METHOD);		return NO;	}		return [self enableBackgroundingOnSocketWithCaveat:NO];}- (BOOL)enableBackgroundingOnSocketWithCaveat // Deprecated in iOS 4.???{	// This method was created as a workaround for a bug in iOS.	// Apple has since fixed this bug.	// I'm not entirely sure which version of iOS they fixed it in...		LogTrace();		if (!dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		LogWarn(@"%@ - Method only available from within the context of a performBlock: invocation", THIS_METHOD);		return NO;	}		return [self enableBackgroundingOnSocketWithCaveat:YES];}#endif- (SSLContextRef)sslContext{	if (!dispatch_get_specific(IsOnSocketQueueOrTargetQueueKey))	{		LogWarn(@"%@ - Method only available from within the context of a performBlock: invocation", THIS_METHOD);		return NULL;	}		return sslContext;}////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////#pragma mark Class Utilities////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////+ (NSMutableArray *)lookupHost:(NSString *)host port:(uint16_t)port error:(NSError **)errPtr{	LogTrace();		NSMutableArray *addresses = nil;	NSError *error = nil;		if ([host isEqualToString:@"localhost"] || [host isEqualToString:@"loopback"])	{		// Use LOOPBACK address		struct sockaddr_in nativeAddr4;		nativeAddr4.sin_len         = sizeof(struct sockaddr_in);		nativeAddr4.sin_family      = AF_INET;		nativeAddr4.sin_port        = htons(port);		nativeAddr4.sin_addr.s_addr = htonl(INADDR_LOOPBACK);		memset(&(nativeAddr4.sin_zero), 0, sizeof(nativeAddr4.sin_zero));				struct sockaddr_in6 nativeAddr6;		nativeAddr6.sin6_len        = sizeof(struct sockaddr_in6);		nativeAddr6.sin6_family     = AF_INET6;		nativeAddr6.sin6_port       = htons(port);		nativeAddr6.sin6_flowinfo   = 0;		nativeAddr6.sin6_addr       = in6addr_loopback;		nativeAddr6.sin6_scope_id   = 0;				// Wrap the native address structures				NSData *address4 = [NSData dataWithBytes:&nativeAddr4 length:sizeof(nativeAddr4)];		NSData *address6 = [NSData dataWithBytes:&nativeAddr6 length:sizeof(nativeAddr6)];				addresses = [NSMutableArray arrayWithCapacity:2];		[addresses addObject:address4];		[addresses addObject:address6];	}	else	{		NSString *portStr = [NSString stringWithFormat:@"%hu", port];				struct addrinfo hints, *res, *res0;				memset(&hints, 0, sizeof(hints));		hints.ai_family   = PF_UNSPEC;		hints.ai_socktype = SOCK_STREAM;		hints.ai_protocol = IPPROTO_TCP;				int gai_error = getaddrinfo([host UTF8String], [portStr UTF8String], &hints, &res0);				if (gai_error)		{			error = [self gaiError:gai_error];		}		else		{			NSUInteger capacity = 0;			for (res = res0; res; res = res->ai_next)			{				if (res->ai_family == AF_INET || res->ai_family == AF_INET6) {					capacity++;				}			}						addresses = [NSMutableArray arrayWithCapacity:capacity];						for (res = res0; res; res = res->ai_next)			{				if (res->ai_family == AF_INET)				{					// Found IPv4 address.					// Wrap the native address structure, and add to results.										NSData *address4 = [NSData dataWithBytes:res->ai_addr length:res->ai_addrlen];					[addresses addObject:address4];				}				else if (res->ai_family == AF_INET6)				{					// Fixes connection issues with IPv6					// https://github.com/robbiehanson/CocoaAsyncSocket/issues/429#issuecomment-222477158										// Found IPv6 address.					// Wrap the native address structure, and add to results.										struct sockaddr_in6 *sockaddr = (struct sockaddr_in6 *)(void *)res->ai_addr;					in_port_t *portPtr = &sockaddr->sin6_port;					if ((portPtr != NULL) && (*portPtr == 0)) {					        *portPtr = htons(port);					}					NSData *address6 = [NSData dataWithBytes:res->ai_addr length:res->ai_addrlen];					[addresses addObject:address6];				}			}			freeaddrinfo(res0);						if ([addresses count] == 0)			{				error = [self gaiError:EAI_FAIL];			}		}	}		if (errPtr) *errPtr = error;	return addresses;}+ (NSString *)hostFromSockaddr4:(const struct sockaddr_in *)pSockaddr4{	char addrBuf[INET_ADDRSTRLEN];		if (inet_ntop(AF_INET, &pSockaddr4->sin_addr, addrBuf, (socklen_t)sizeof(addrBuf)) == NULL)	{		addrBuf[0] = '\0';	}		return [NSString stringWithCString:addrBuf encoding:NSASCIIStringEncoding];}+ (NSString *)hostFromSockaddr6:(const struct sockaddr_in6 *)pSockaddr6{	char addrBuf[INET6_ADDRSTRLEN];		if (inet_ntop(AF_INET6, &pSockaddr6->sin6_addr, addrBuf, (socklen_t)sizeof(addrBuf)) == NULL)	{		addrBuf[0] = '\0';	}		return [NSString stringWithCString:addrBuf encoding:NSASCIIStringEncoding];}+ (uint16_t)portFromSockaddr4:(const struct sockaddr_in *)pSockaddr4{	return ntohs(pSockaddr4->sin_port);}+ (uint16_t)portFromSockaddr6:(const struct sockaddr_in6 *)pSockaddr6{	return ntohs(pSockaddr6->sin6_port);}+ (NSURL *)urlFromSockaddrUN:(const struct sockaddr_un *)pSockaddr{	NSString *path = [NSString stringWithUTF8String:pSockaddr->sun_path];	return [NSURL fileURLWithPath:path];}+ (NSString *)hostFromAddress:(NSData *)address{	NSString *host;		if ([self getHost:&host port:NULL fromAddress:address])		return host;	else		return nil;}+ (uint16_t)portFromAddress:(NSData *)address{	uint16_t port;		if ([self getHost:NULL port:&port fromAddress:address])		return port;	else		return 0;}+ (BOOL)isIPv4Address:(NSData *)address{	if ([address length] >= sizeof(struct sockaddr))	{		const struct sockaddr *sockaddrX = [address bytes];				if (sockaddrX->sa_family == AF_INET) {			return YES;		}	}		return NO;}+ (BOOL)isIPv6Address:(NSData *)address{	if ([address length] >= sizeof(struct sockaddr))	{		const struct sockaddr *sockaddrX = [address bytes];				if (sockaddrX->sa_family == AF_INET6) {			return YES;		}	}		return NO;}+ (BOOL)getHost:(NSString **)hostPtr port:(uint16_t *)portPtr fromAddress:(NSData *)address{	return [self getHost:hostPtr port:portPtr family:NULL fromAddress:address];}+ (BOOL)getHost:(NSString **)hostPtr port:(uint16_t *)portPtr family:(sa_family_t *)afPtr fromAddress:(NSData *)address{	if ([address length] >= sizeof(struct sockaddr))	{		const struct sockaddr *sockaddrX = [address bytes];				if (sockaddrX->sa_family == AF_INET)		{			if ([address length] >= sizeof(struct sockaddr_in))			{				struct sockaddr_in sockaddr4;				memcpy(&sockaddr4, sockaddrX, sizeof(sockaddr4));								if (hostPtr) *hostPtr = [self hostFromSockaddr4:&sockaddr4];				if (portPtr) *portPtr = [self portFromSockaddr4:&sockaddr4];				if (afPtr)   *afPtr   = AF_INET;								return YES;			}		}		else if (sockaddrX->sa_family == AF_INET6)		{			if ([address length] >= sizeof(struct sockaddr_in6))			{				struct sockaddr_in6 sockaddr6;				memcpy(&sockaddr6, sockaddrX, sizeof(sockaddr6));								if (hostPtr) *hostPtr = [self hostFromSockaddr6:&sockaddr6];				if (portPtr) *portPtr = [self portFromSockaddr6:&sockaddr6];				if (afPtr)   *afPtr   = AF_INET6;								return YES;			}		}	}		return NO;}+ (NSData *)CRLFData{	return [NSData dataWithBytes:"\x0D\x0A" length:2];}+ (NSData *)CRData{	return [NSData dataWithBytes:"\x0D" length:1];}+ (NSData *)LFData{	return [NSData dataWithBytes:"\x0A" length:1];}+ (NSData *)ZeroData{	return [NSData dataWithBytes:"" length:1];}@end	
 |