source: asp3_tinet_ecnl_arm/trunk/ntshell/src/socket_stub.c@ 364

Last change on this file since 364 was 364, checked in by coas-nagasima, 5 years ago

TINETとSocket APIなどを更新

  • Property svn:eol-style set to native
  • Property svn:mime-type set to text/x-csrc;charset=UTF-8
File size: 24.3 KB
Line 
1/*
2 * TOPPERS ECHONET Lite Communication Middleware
3 *
4 * Copyright (C) 2017 Cores Co., Ltd. Japan
5 *
6 * 上記著作権者は,以下の(1)~(4)の条件を満たす場合に限り,本ソフトウェ
7 * ア(本ソフトウェアを改変したものを含む.以下同じ)を使用・複製・改
8 * 変・再配布(以下,利用と呼ぶ)することを無償で許諾する.
9 * (1) 本ソフトウェアをソースコードの形で利用する場合には,上記の著作
10 * 権表示,この利用条件および下記の無保証規定が,そのままの形でソー
11 * スコード中に含まれていること.
12 * (2) 本ソフトウェアを,ライブラリ形式など,他のソフトウェア開発に使
13 * 用できる形で再配布する場合には,再配布に伴うドキュメント(利用
14 * 者マニュアルなど)に,上記の著作権表示,この利用条件および下記
15 * の無保証規定を掲載すること.
16 * (3) 本ソフトウェアを,機器に組み込むなど,他のソフトウェア開発に使
17 * 用できない形で再配布する場合には,次のいずれかの条件を満たすこ
18 * と.
19 * (a) 再配布に伴うドキュメント(利用者マニュアルなど)に,上記の著
20 * 作権表示,この利用条件および下記の無保証規定を掲載すること.
21 * (b) 再配布の形態を,別に定める方法によって,TOPPERSプロジェクトに
22 * 報告すること.
23 * (4) 本ソフトウェアの利用により直接的または間接的に生じるいかなる損
24 * 害からも,上記著作権者およびTOPPERSプロジェクトを免責すること.
25 * また,本ソフトウェアのユーザまたはエンドユーザからのいかなる理
26 * 由に基づく請求からも,上記著作権者およびTOPPERSプロジェクトを
27 * 免責すること.
28 *
29 * 本ソフトウェアは,無保証で提供されているものである.上記著作権者お
30 * よびTOPPERSプロジェクトは,本ソフトウェアに関して,特定の使用目的
31 * に対する適合性も含めて,いかなる保証も行わない.また,本ソフトウェ
32 * アの利用により直接的または間接的に生じたいかなる損害に関しても,そ
33 * の責任を負わない.
34 *
35 * @(#) $Id$
36 */
37#include "shellif.h"
38#include <kernel.h>
39#include <t_syslog.h>
40#include <t_stdlib.h>
41#include <string.h>
42#include <sil.h>
43#include "syssvc/syslog.h"
44#include <tinet_defs.h>
45#include <tinet_config.h>
46#include <net/net.h>
47#include <net/net_endian.h>
48#include <netinet/in.h>
49#include <netinet/in_itron.h>
50#include <tinet_nic_defs.h>
51#include <tinet_cfg.h>
52#include <netinet/in_var.h>
53#include <net/ethernet.h>
54#include <net/if6_var.h>
55#include <net/net.h>
56#include <net/if_var.h>
57#include <netinet/udp_var.h>
58#include <net/net_buf.h>
59//#include <netinet/tcp_var.h>
60#include <netapp/resolver.h>
61extern const ID tmax_tcp_cepid;
62#include "ff.h"
63#include "socket_stub.h"
64#include "kernel_cfg.h"
65
66#define SOCKET_TIMEOUT 2000000
67
68typedef struct id_table_t {
69 int used;
70 ID id;
71} id_table_t;
72
73id_table_t tcp_repid_table[] = {
74 {0, USR_TCP_REP1}, {0, USR_TCP_REP2}, {0, USR_TCP_REP3}, {0, USR_TCP_REP4}
75};
76#define tcp_repid_table_count (sizeof(tcp_repid_table) / sizeof(tcp_repid_table[0]))
77
78id_table_t tcp_cepid_table[] = {
79 {0, USR_TCP_CEP1}, {0, USR_TCP_CEP2}, {0, USR_TCP_CEP3}, {0, USR_TCP_CEP4},
80#ifndef TOPPERS_GRSAKURA
81 {0, USR_TCP_CEP5}, {0, USR_TCP_CEP6}, {0, USR_TCP_CEP7}, {0, USR_TCP_CEP8}
82#endif
83};
84#define tcp_cepid_table_count (sizeof(tcp_cepid_table) / sizeof(tcp_cepid_table[0]))
85
86id_table_t udp_cepid_table[] = {
87 {0, USR_UDP_CEP1}, {0, USR_UDP_CEP2}, {0, USR_UDP_CEP3}, {0, USR_UDP_CEP4}
88};
89#define udp_cepid_table_count (sizeof(udp_cepid_table) / sizeof(udp_cepid_table[0]))
90
91ID new_id(id_table_t *table, int count)
92{
93 for (int i = 0; i < count; i++) {
94 id_table_t *item = &table[i];
95 if (item->used != 0)
96 continue;
97
98 item->used = 1;
99 return item->id;
100}
101
102 return -ENOMEM;
103}
104
105int delete_id(id_table_t *table, int count, ID id)
106{
107 for (int i = 0; i < count; i++) {
108 id_table_t *item = &table[i];
109 if ((item->used == 0) || (item->id != id))
110 continue;
111
112 item->used = 0;
113 return 0;
114 }
115 return -EINVAL;
116}
117
118int delete_tcp_rep(int repid)
119{
120 return delete_tcp_fd(tmax_tcp_cepid + repid);
121}
122
123typedef struct _IO_FILE SOCKET;
124
125int shell_socket(int family, int type, int protocol)
126{
127 SOCKET *fp;
128 unsigned int flags;
129
130 switch (family) {
131 case AF_INET:
132 case AF_INET6:
133 break;
134 default:
135 return -EAFNOSUPPORT;
136 }
137
138 flags = type & (SOCK_CLOEXEC|SOCK_NONBLOCK);
139 type &= ~flags;
140
141 switch (type) {
142 case SOCK_STREAM:
143 fp = new_tcp_fd(0);
144 break;
145 case SOCK_DGRAM:
146 fp = new_udp_fd(0);
147 break;
148 default:
149 return -ENOPROTOOPT;
150 }
151
152 if (fp == NULL) {
153 return -ENOMEM;
154 }
155
156 fp->psock->family = family;
157 fp->psock->type = type;
158 fp->psock->protocol = protocol;
159 fp->psock->flags = flags;
160
161 return fp->fd;
162}
163
164int shell_bind(int fd, const struct sockaddr *addr, socklen_t len)
165{
166 SOCKET *fp = fd_to_fp(fd);
167 if (fp == NULL)
168 return -EBADF;
169 if (fp->psock->family != addr->sa_family)
170 return -EINVAL;
171
172 ER ret;
173 switch (addr->sa_family) {
174 case AF_INET: {
175 if (len < 8) {
176 return -EINVAL;
177 }
178 struct sockaddr_in *addr_in = (struct sockaddr_in *)addr;
179 memcpy(&fp->psock->laddr4, addr, len);
180 switch (fp->psock->type) {
181 case SOCK_STREAM: {
182 ID cepid = new_id(tcp_cepid_table, tcp_cepid_table_count);
183 if (cepid < 0)
184 return -ENOMEM;
185
186 fp->psock->buf_size = 512 + 512;
187 fp->psock->buf = malloc(fp->psock->buf_size);
188#ifdef _DEBUG
189 memset(fp->psock->buf, 0, fp->psock->buf_size);
190#endif
191 T_TCP_CCEP ccep = { 0, fp->psock->buf, 512, &fp->psock->buf[512], 512, (FP)socket_tcp_callback };
192 ret = tcp_cre_cep(cepid, &ccep);
193 if (ret != E_OK) {
194 delete_id(tcp_cepid_table, tcp_cepid_table_count, cepid);
195 return -ENOMEM;
196 }
197 fp->handle = cepid;
198 fp->psock->cepid = cepid;
199 break;
200 }
201 case SOCK_DGRAM: {
202 ID cepid = new_id(udp_cepid_table, udp_cepid_table_count);
203 if (cepid < 0)
204 return -ENOMEM;
205
206 T_UDP_CCEP ccep = { 0, {ntohl(addr_in->sin_addr.s_addr), ntohs(addr_in->sin_port)}, (FP)socket_udp_callback };
207 ret = udp_cre_cep(cepid, &ccep);
208 if (ret != E_OK) {
209 delete_id(udp_cepid_table, udp_cepid_table_count, cepid);
210 return -ENOMEM;
211 }
212 fp->handle = cepid;
213 fp->psock->cepid = cepid;
214 break;
215 }
216 default:
217 return -ENOPROTOOPT;
218 }
219 break;
220 }
221 case AF_INET6: {
222 if (len < 20) {
223 return -EINVAL;
224 }
225 memcpy(&fp->psock->laddr4, addr, len);
226 break;
227 }
228 }
229
230 return 0;
231}
232
233int shell_listen(int fd, int backlog)
234{
235 SOCKET *fp = fd_to_fp(fd);
236 if (fp == NULL)
237 return -EBADF;
238 if (fp->psock->type != SOCK_STREAM)
239 return -EINVAL;
240
241 fp->psock->backlog = backlog;
242
243 ER ret;
244 switch (fp->psock->family) {
245 case AF_INET: {
246 ID repid = new_id(tcp_repid_table, tcp_repid_table_count);
247 if (repid < 0)
248 return -ENOMEM;
249
250 struct sockaddr_in *laddr = &fp->psock->laddr4;
251 T_TCP_CREP crep = { 0, {ntohl(laddr->sin_addr.s_addr), ntohs(laddr->sin_port)} };
252 ret = tcp_cre_rep(repid, &crep);
253 if (ret != E_OK) {
254 delete_id(tcp_repid_table, tcp_repid_table_count, repid);
255 return -ENOMEM;
256 }
257 fp->psock->repid = repid;
258 break;
259 }
260 case AF_INET6: {
261 break;
262 }
263 }
264
265 return 0;
266}
267
268int shell_connect(int fd, const struct sockaddr *addr, socklen_t len)
269{
270 SOCKET *fp = fd_to_fp(fd);
271 if (fp == NULL)
272 return -EBADF;
273 if (fp->psock->type != SOCK_STREAM)
274 return -EINVAL;
275
276 ER ret;
277 switch (fp->psock->family) {
278 case AF_INET: {
279 if (len < 8) {
280 return -EINVAL;
281 }
282 if (fp->psock->cepid == 0) {
283 ID cepid = new_id(tcp_cepid_table, tcp_cepid_table_count);
284 if (cepid < 0)
285 return -ENOMEM;
286
287 fp->psock->buf_size = 512 + 512;
288 fp->psock->buf = malloc(fp->psock->buf_size);
289#ifdef _DEBUG
290 memset(fp->psock->buf, 0, fp->psock->buf_size);
291#endif
292 T_TCP_CCEP ccep = { 0, fp->psock->buf, 512, &fp->psock->buf[512], 512, (FP)socket_tcp_callback };
293 ret = tcp_cre_cep(cepid, &ccep);
294 if (ret != E_OK) {
295 delete_id(tcp_cepid_table, tcp_cepid_table_count, cepid);
296 return -ENOMEM;
297 }
298 fp->handle = cepid;
299 fp->psock->cepid = cepid;
300 }
301 struct sockaddr_in *laddr = &fp->psock->laddr4;
302 struct sockaddr_in *raddr = &fp->psock->raddr4;
303 memset(raddr, 0, sizeof(*raddr));
304 memcpy(raddr, addr, len);
305 T_IPV4EP lep = { ntohl(laddr->sin_addr.s_addr), ntohs(laddr->sin_port) };
306 T_IPV4EP rep = { ntohl(raddr->sin_addr.s_addr), ntohs(raddr->sin_port) };
307 ret = tcp_con_cep(fp->psock->cepid, &lep, &rep, SOCKET_TIMEOUT);
308 if (ret < 0) {
309 return -EHOSTUNREACH;
310 }
311 break;
312 }
313 case AF_INET6: {
314 break;
315 }
316 }
317
318 return 0;
319}
320
321int shell_accept(int fd, struct sockaddr *__restrict addr, socklen_t *__restrict len)
322{
323 SOCKET *lfp = fd_to_fp(fd);
324 if (lfp == NULL)
325 return -EBADF;
326 if (lfp->psock->type != SOCK_STREAM)
327 return -EINVAL;
328
329 SOCKET *fp = new_tcp_fd(0);
330 if (fp == NULL) {
331 return -ENOMEM;
332 }
333
334 memcpy(fp->psock, lfp->psock, offsetof(socket_t, buf_size));
335
336 ER ret;
337 switch (fp->psock->family) {
338 case AF_INET: {
339 ID cepid;
340 if (fp->psock->cepid == 0) {
341 cepid = new_id(tcp_cepid_table, tcp_cepid_table_count);
342 if (cepid < 0)
343 return -ENOMEM;
344
345 fp->psock->buf_size = 512 + 512;
346 fp->psock->buf = malloc(fp->psock->buf_size);
347#ifdef _DEBUG
348 memset(fp->psock->buf, 0, fp->psock->buf_size);
349#endif
350 T_TCP_CCEP ccep = { 0, fp->psock->buf, 512, &fp->psock->buf[512], 512, (FP)socket_tcp_callback };
351 ret = tcp_cre_cep(cepid, &ccep);
352 if (ret != E_OK) {
353 delete_id(tcp_cepid_table, tcp_cepid_table_count, cepid);
354 return -ENOMEM;
355 }
356 fp->handle = cepid;
357 fp->psock->cepid = cepid;
358 }
359 else {
360 cepid = lfp->psock->cepid;
361 fp->handle = cepid;
362 lfp->handle = tmax_tcp_cepid + lfp->psock->repid;
363 lfp->psock->cepid = 0;
364 lfp->psock->buf_size = 0;
365 lfp->psock->buf = 0;
366 }
367 T_IPV4EP rep = { 0, 0 };
368 ret = tcp_acp_cep(fp->psock->cepid, fp->psock->repid, &rep, TMO_FEVR);
369 if (ret < 0) {
370 return -ENOMEM;
371 }
372 struct sockaddr_in *raddr = &fp->psock->raddr4;
373 memset(raddr, 0, sizeof(*raddr));
374 raddr->sin_family = AF_INET;
375 raddr->sin_port = htons(rep.portno);
376 raddr->sin_addr.s_addr = htonl(rep.ipaddr);
377 break;
378 }
379 case AF_INET6: {
380 return -EAFNOSUPPORT;
381 }
382 }
383
384 if (addr != NULL && len != NULL) {
385 int sz = *len;
386 if (sz < 8) {
387 return -EINVAL;
388 }
389 struct sockaddr_in *raddr = &fp->psock->raddr4;
390 if (sz > sizeof(*raddr))
391 sz = sizeof(*raddr);
392 memcpy(addr, raddr, sz);
393 *len = sizeof(*raddr);
394 }
395
396 return fp->fd;
397}
398
399ssize_t shell_sendto(int fd, const void *buf, size_t len, int flags, const struct sockaddr *addr, socklen_t alen)
400{
401 SOCKET *fp = fd_to_fp(fd);
402 if (fp == NULL) {
403 return -EBADF;
404 }
405
406 int ret = 0;
407 switch (fp->psock->family) {
408 case AF_INET: {
409 switch (fp->psock->type) {
410 case SOCK_STREAM: {
411 if ((addr != NULL) || (alen != 0)) {
412 return -EISCONN;
413 }
414
415 if (flags & MSG_OOB) {
416 ret = tcp_snd_oob(fp->psock->cepid, (void *)buf, len, SOCKET_TIMEOUT);
417 if (ret < 0) {
418 return -ECOMM;
419 }
420 }
421 else {
422 for (;;) {
423 ret = tcp_snd_dat(fp->psock->cepid, (void *)buf, len, SOCKET_TIMEOUT);
424 if (ret < 0) {
425 if (ret == E_TMOUT)
426 return -ETIME;
427 return -ECOMM;
428 }
429 len -= ret;
430 if (len <= 0)
431 break;
432 buf = (const void *)&((uint8_t *)buf)[ret];
433 }
434 }
435 break;
436 }
437 case SOCK_DGRAM: {
438 int sz = alen;
439 if ((addr == NULL) || (sz < 8)) {
440 return -EINVAL;
441 }
442 struct sockaddr_in *raddr = &fp->psock->raddr4;
443 memset(raddr, 0, sizeof(*raddr));
444 memcpy(raddr, addr, sz);
445 T_IPV4EP rep = { ntohl(raddr->sin_addr.s_addr), ntohs(raddr->sin_port) };
446 ret = udp_snd_dat(fp->psock->cepid, &rep, (void *)buf, len,
447 (fp->psock->flags & O_NONBLOCK) ? TMO_POL : SOCKET_TIMEOUT);
448 if (ret < 0) {
449 return (ret == E_TMOUT) ? -ETIME : -ECOMM;
450 }
451 break;
452 }
453 }
454 break;
455 }
456 case AF_INET6: {
457 return -EAFNOSUPPORT;
458 }
459 }
460
461 return ret;
462}
463
464ssize_t shell_sendmsg(int fd, const struct msghdr *msg, int flags)
465{
466 no_implement("sendmsg\n");
467 return -ENOSYS;
468}
469
470ssize_t shell_recvfrom(int fd, void *__restrict buf, size_t len, int flags, struct sockaddr *__restrict addr, socklen_t *__restrict alen)
471{
472 SOCKET *fp = fd_to_fp(fd);
473 if (fp == NULL) {
474 return -EBADF;
475 }
476
477 int ret = 0;
478 switch (fp->psock->family) {
479 case AF_INET: {
480 switch (fp->psock->type) {
481 case SOCK_STREAM: {
482 if (flags & MSG_OOB) {
483 ret = tcp_rcv_oob(fp->psock->cepid, buf, len);
484 if (ret < 0) {
485 syslog(LOG_ERROR, "tcp_rcv_oob => %d", ret);
486 return -ECOMM;
487 }
488 }
489 else {
490 int rsz, tmp;
491 if (fp->psock->input == NULL) {
492 ret = wai_sem(SEM_FILEDESC);
493 if (ret < 0) {
494 syslog(LOG_ERROR, "wai_sem => %d", ret);
495 }
496 fp->psock->len = 0;
497 ret = sig_sem(SEM_FILEDESC);
498 if (ret < 0) {
499 syslog(LOG_ERROR, "sig_sem => %d", ret);
500 }
501 ret = tcp_rcv_buf(fp->psock->cepid, &fp->psock->input, TMO_FEVR);
502 if (ret < 0) {
503 syslog(LOG_ERROR, "tcp_rcv_buf => %d", ret);
504 return -ECOMM;
505 }
506 rsz = ret;
507 }
508 else
509 rsz = fp->psock->len;
510 tmp = rsz;
511 if (rsz > len)
512 rsz = len;
513 if (rsz >= 0) {
514 memcpy(buf, fp->psock->input, rsz);
515 ret = wai_sem(SEM_FILEDESC);
516 if (ret < 0) {
517 syslog(LOG_ERROR, "wai_sem => %d", ret);
518 }
519 fp->psock->len = tmp - rsz;
520 ret = sig_sem(SEM_FILEDESC);
521 if (ret < 0) {
522 syslog(LOG_ERROR, "sig_sem => %d", ret);
523 }
524 if (tmp - rsz == 0) {
525 fp->psock->input = NULL;
526 }
527 else
528 fp->psock->input = (void *)&((uint8_t *)fp->psock->input)[rsz];
529 ret = tcp_rel_buf(fp->psock->cepid, rsz);
530 if ((ret != E_OBJ) && (ret < 0)) {
531 syslog(LOG_ERROR, "tcp_rel_buf => %d", ret);
532 //return -ECOMM;
533 }
534 }
535 ret = rsz;
536 }
537 break;
538 }
539 case SOCK_DGRAM: {
540 struct sockaddr_in *raddr = &fp->psock->raddr4;
541 int rsz;
542 ret = wai_sem(SEM_FILEDESC);
543 if (ret < 0) {
544 syslog(LOG_ERROR, "wai_sem => %d", ret);
545 }
546 T_NET_BUF *input = fp->psock->input;
547 if (input == NULL) {
548 ret = sig_sem(SEM_FILEDESC);
549 if (ret < 0) {
550 syslog(LOG_ERROR, "sig_sem => %d", ret);
551 }
552
553 T_IPV4EP rep = { 0, 0 };
554 ret = udp_rcv_dat(fp->psock->cepid, &rep, buf, len,
555 (fp->psock->flags & O_NONBLOCK) ? TMO_POL : SOCKET_TIMEOUT);
556 if (ret < 0) {
557 syslog(LOG_ERROR, "udp_rcv_buf => %d", ret);
558 return (ret == E_TMOUT) ? -ETIME : -ECOMM;
559 }
560 rsz = ret;
561 if ((addr != NULL) && (alen != NULL)) {
562 ret = wai_sem(SEM_FILEDESC);
563 if (ret < 0) {
564 syslog(LOG_ERROR, "wai_sem => %d", ret);
565 }
566 int sz = *alen;
567 memset(raddr, 0, sizeof(fp->psock->raddr4));
568 raddr->sin_family = AF_INET;
569 raddr->sin_port = htons(rep.portno);
570 raddr->sin_addr.s_addr = htonl(rep.ipaddr);
571 if (sz > sizeof(fp->psock->raddr4))
572 sz = sizeof(fp->psock->raddr4);
573 memcpy(addr, raddr, sz);
574 *alen = sz;
575 ret = sig_sem(SEM_FILEDESC);
576 if (ret < 0) {
577 syslog(LOG_ERROR, "sig_sem => %d", ret);
578 }
579 }
580 }
581 else {
582 rsz = fp->psock->len;
583 void *pbuf = fp->psock->buf;
584 fp->psock->input = NULL;
585 fp->psock->len = 0;
586 fp->psock->buf = NULL;
587 if ((addr != NULL) && (alen != NULL)) {
588 int sz = *alen;
589 if (sz > sizeof(fp->psock->raddr4))
590 sz = sizeof(fp->psock->raddr4);
591 memcpy(addr, raddr, sz);
592 *alen = sz;
593 }
594 ret = sig_sem(SEM_FILEDESC);
595 if (ret < 0) {
596 syslog(LOG_ERROR, "sig_sem => %d", ret);
597 }
598 if (rsz > len)
599 rsz = len;
600 memcpy(buf, pbuf, rsz);
601 ret = rel_net_buf(input);
602 if (ret < 0) {
603 syslog(LOG_ERROR, "rel_net_buf => %d", ret);
604 //return -ECOMM;
605 }
606 }
607 ret = rsz;
608 }
609 }
610 break;
611 }
612 case AF_INET6: {
613 return -EAFNOSUPPORT;
614 }
615 }
616
617 return ret;
618}
619
620ssize_t shell_recvmsg(int fd, struct msghdr *msg, int flags)
621{
622 no_implement("recvmsg\n");
623 return -ENOSYS;
624}
625
626int shell_shutdown(int fd, int how)
627{
628 SOCKET *fp = fd_to_fp(fd);
629 if (fp == NULL) {
630 return -EBADF;
631 }
632
633 ER ret;
634 switch (fp->psock->family) {
635 case AF_INET: {
636 switch (fp->psock->type) {
637 case SOCK_STREAM: {
638 ret = tcp_sht_cep(fp->psock->cepid);
639 if (ret < 0) {
640 return -ECOMM;
641 }
642 break;
643 }
644 }
645 break;
646 }
647 case AF_INET6: {
648 return -EAFNOSUPPORT;
649 }
650 }
651
652 return 0;
653}
654
655int shell_getsockopt(int fd, int level, int optname, void *optval, socklen_t *__restrict optlen)
656{
657 SOCKET *fp = fd_to_fp(fd);
658 if (fp == NULL) {
659 return -EBADF;
660 }
661
662 ER ret;
663 switch (fp->psock->family) {
664 case AF_INET: {
665 switch (fp->psock->type) {
666 case SOCK_STREAM: {
667 switch (level) {
668 case SOL_SOCKET:
669 switch (optname) {
670 case SO_REUSEADDR:
671 if (fp->psock->flags & SO_REUSEADDR) {
672 *(bool *)optval = true;
673 }
674 else {
675 *(bool *)optval = false;
676 }
677 break;
678 case SO_KEEPALIVE:
679 if (fp->psock->flags & SO_KEEPALIVE) {
680 *(bool *)optval = true;
681 }
682 else {
683 *(bool *)optval = false;
684 }
685 break;
686 case SO_ERROR:
687 *(int *)optval = 0;
688 break;
689 default:
690 return -EINVAL;
691 }
692 break;
693 case IPPROTO_TCP:
694 ret = tcp_get_opt(fp->psock->cepid, optname, (void *)optval, *optlen);
695 if (ret < 0) {
696 return -EINVAL;
697 }
698 *optlen = ret;
699 break;
700 default:
701 return -EINVAL;
702 }
703 break;
704 }
705 case SOCK_DGRAM: {
706 switch (level) {
707 case IPPROTO_UDP:
708 ret = udp_get_opt(fp->psock->cepid, optname, (void *)optval, *optlen);
709 if (ret < 0) {
710 return -EINVAL;
711 }
712 *optlen = ret;
713 break;
714 default:
715 return -EINVAL;
716 }
717 break;
718 }
719 }
720 break;
721 }
722 case AF_INET6: {
723 return -EAFNOSUPPORT;
724 }
725 }
726
727 return 0;
728}
729
730int shell_setsockopt(int fd, int level, int optname, const void *optval, socklen_t optlen)
731{
732 SOCKET *fp = fd_to_fp(fd);
733 if (fp == NULL) {
734 return -EBADF;
735 }
736
737 ER ret;
738 switch (fp->psock->family) {
739 case AF_INET: {
740 switch (fp->psock->type) {
741 case SOCK_STREAM: {
742 switch (level){
743 case SOL_SOCKET:
744 switch (optname) {
745 case SO_REUSEADDR:
746 if (*(bool *)optval) {
747 fp->psock->flags |= SO_REUSEADDR;
748 }
749 else {
750 fp->psock->flags &= ~SO_REUSEADDR;
751 }
752 break;
753 case SO_KEEPALIVE:
754 if (*(bool *)optval) {
755 fp->psock->flags |= SO_KEEPALIVE;
756 }
757 else {
758 fp->psock->flags &= ~SO_KEEPALIVE;
759 }
760 break;
761 default:
762 return -EINVAL;
763 }
764 break;
765 case IPPROTO_TCP:
766 ret = tcp_set_opt(fp->psock->cepid, optname, (void *)optval, optlen);
767 if (ret < 0) {
768 return -EINVAL;
769 }
770 break;
771 default:
772 return -EINVAL;
773 }
774 break;
775 }
776 case SOCK_DGRAM: {
777 switch (level){
778 case IPPROTO_UDP:
779 ret = udp_set_opt(fp->psock->cepid, optname, (void *)optval, optlen);
780 if (ret < 0) {
781 return -EINVAL;
782 }
783 break;
784 default:
785 return -EINVAL;
786 }
787 break;
788 }
789 }
790 break;
791 }
792 case AF_INET6: {
793 return -EAFNOSUPPORT;
794 }
795 }
796
797 return 0;
798}
799
800int shell_getpeername(int fd, struct sockaddr *restrict addr, socklen_t *restrict len)
801{
802 SOCKET *fp = fd_to_fp(fd);
803 if (fp == NULL) {
804 return -EBADF;
805 }
806 if (len == NULL) {
807 return -EINVAL;
808 }
809
810 socklen_t size = *len;
811 switch (fp->psock->family) {
812 case AF_INET: {
813 struct sockaddr_in *raddr = &fp->psock->raddr4;
814 *len = sizeof(struct sockaddr_in);
815 if (size > sizeof(struct sockaddr_in))
816 size = sizeof(struct sockaddr_in);
817 memcpy(addr, raddr, size);
818 break;
819 }
820 case AF_INET6: {
821 return -EAFNOSUPPORT;
822 }
823 }
824
825 return 0;
826}
827
828int shell_getsockname(int fd, struct sockaddr *restrict addr, socklen_t *restrict len)
829{
830 SOCKET *fp = fd_to_fp(fd);
831 if (fp == NULL) {
832 return -EBADF;
833 }
834 if (len == NULL) {
835 return -EINVAL;
836 }
837
838 socklen_t size = *len;
839 switch (fp->psock->family) {
840 case AF_INET: {
841 const T_IN4_ADDR *laddr4 = in4_get_ifaddr(0);
842 struct sockaddr_in laddr;
843 laddr.sin_family = AF_INET;
844 laddr.sin_addr.s_addr = htonl(*laddr4);
845 laddr.sin_port = fp->psock->laddr4.sin_port;
846 memset(&laddr.sin_zero, 0, sizeof(laddr.sin_zero));
847 *len = sizeof(struct sockaddr_in);
848 if (size > sizeof(struct sockaddr_in))
849 size = sizeof(struct sockaddr_in);
850 memcpy(addr, &laddr, size);
851 break;
852 }
853 case AF_INET6: {
854 return -EAFNOSUPPORT;
855 }
856 }
857
858 return 0;
859}
860
861int tcp_fd_close(struct _IO_FILE *fp)
862{
863 ER ret, ret2;
864
865 switch (fp->psock->family) {
866 case AF_INET: {
867 if (fp->psock->cepid != 0) {
868 ID cepid = fp->psock->cepid;
869 ret = tcp_sht_cep(cepid);
870 if (ret < 0) {
871 //return -1;
872 }
873 ret = tcp_cls_cep(cepid, (fp->psock->repid != 0) ? 0 : SOCKET_TIMEOUT);
874 ret2 = tcp_del_cep(cepid);
875 free(fp->psock->buf);
876 fp->psock->buf = NULL;
877 delete_tcp_fd(cepid);
878 delete_id(tcp_cepid_table, tcp_cepid_table_count, cepid);
879 if ((ret < 0) || (ret2 < 0)) {
880 return (ret == E_TMOUT) ? -ETIME : -EINVAL;
881 }
882 }
883 else if (fp->psock->repid != 0) {
884 ID repid = fp->psock->repid;
885 ret = tcp_del_rep(repid);
886 free(fp->psock->buf);
887 fp->psock->buf = NULL;
888 delete_tcp_fd(tmax_tcp_cepid + repid);
889 delete_id(tcp_repid_table, tcp_repid_table_count, repid);
890 if (ret < 0) {
891 return -EINVAL;
892 }
893 }
894 else {
895 free(fp->psock->buf);
896 fp->psock->buf = NULL;
897 return -EINVAL;
898 }
899 break;
900 }
901 case AF_INET6: {
902 return -EAFNOSUPPORT;
903 }
904 }
905
906 return 0;
907}
908
909size_t tcp_fd_read(struct _IO_FILE *fp, unsigned char *dst, size_t dstsz)
910{
911 return shell_recvfrom(fp->fd, dst, dstsz, 0, NULL, NULL);
912}
913
914size_t tcp_fd_write(struct _IO_FILE *fp, const unsigned char *src, size_t srcsz)
915{
916 return shell_sendto(fp->fd, src, srcsz, 0, NULL, 0);
917}
918
919off_t tcp_fd_seek(struct _IO_FILE *fp, off_t ofs, int org)
920{
921 return -EPERM;
922}
923
924int tcp_fd_ioctl(struct _IO_FILE *fp, int req, void *arg)
925{
926 return -EINVAL;
927}
928
929int udp_fd_close(struct _IO_FILE *fp)
930{
931 ER ret;
932 ID cepid;
933
934 switch (fp->psock->family) {
935 case AF_INET: {
936 cepid = fp->psock->cepid;
937 ret = udp_del_cep(cepid);
938 //free(fp->psock->buf);
939 //fp->psock->buf = NULL;
940 delete_udp_fd(cepid);
941 delete_id(udp_cepid_table, udp_cepid_table_count, cepid);
942 if (ret < 0) {
943 return -EINVAL;
944 }
945 break;
946 }
947 case AF_INET6: {
948 return -EAFNOSUPPORT;
949 }
950 }
951
952 return 0;
953}
954
955size_t udp_fd_read(struct _IO_FILE *fp, unsigned char *dst, size_t dstsz)
956{
957 return shell_recvfrom(fp->fd, dst, dstsz, 0, NULL, NULL);
958}
959
960size_t udp_fd_write(struct _IO_FILE *fp, const unsigned char *src, size_t srcsz)
961{
962 return shell_sendto(fp->fd, src, srcsz, 0, NULL, 0);
963}
964
965off_t udp_fd_seek(struct _IO_FILE *fp, off_t ofs, int org)
966{
967 return -EPERM;
968}
969
970int udp_fd_ioctl(struct _IO_FILE *fp, int req, void *arg)
971{
972 return -EINVAL;
973}
974
975#ifndef TCP_CFG_EXTENTIONS
976ER tcp_cre_rep(ID repid, T_TCP_CREP *pk_crep)
977{
978 syslog(LOG_ERROR, "tcp_cre_rep not implement");
979 shell_abort();
980 return E_SYS;
981}
982
983ER tcp_cre_cep(ID cepid, T_TCP_CCEP *pk_ccep)
984{
985 syslog(LOG_ERROR, "tcp_cre_cep not implement");
986 shell_abort();
987 return E_SYS;
988}
989#endif
990
991#ifndef UDP_CFG_EXTENTIONS
992ER udp_cre_cep(ID cepid, T_UDP_CCEP *pk_ccep)
993{
994 syslog(LOG_ERROR, "udp_cre_cep not implement");
995 shell_abort();
996 return E_SYS;
997}
998#endif
999
1000#ifndef TCP_CFG_EXTENTIONS
1001ER_UINT tcp_snd_oob(ID cepid, void *data, int_t len, TMO tmout)
1002{
1003 syslog(LOG_ERROR, "tcp_snd_oob not implement");
1004 shell_abort();
1005 return E_SYS;
1006}
1007
1008ER_UINT tcp_rcv_oob(ID cepid, void *data, int_t len)
1009{
1010 syslog(LOG_ERROR, "tcp_rcv_oob not implement");
1011 shell_abort();
1012 return E_SYS;
1013}
1014
1015ER tcp_set_opt(ID cepid, int_t optname, void *optval, int_t optlen)
1016{
1017 syslog(LOG_ERROR, "tcp_set_opt not implement");
1018 shell_abort();
1019 return E_SYS;
1020}
1021
1022ER tcp_get_opt(ID cepid, int_t optname, void *optval, int_t optlen)
1023{
1024 syslog(LOG_ERROR, "tcp_get_opt not implement");
1025 shell_abort();
1026 return E_SYS;
1027}
1028#endif
1029
1030#ifndef UDP_CFG_EXTENTIONS
1031ER udp_get_opt(ID cepid, int_t optname, void *optval, int_t optlen)
1032{
1033 syslog(LOG_ERROR, "udp_get_opt not implement");
1034 shell_abort();
1035 return E_SYS;
1036}
1037
1038ER udp_set_opt(ID cepid, int_t optname, void *optval, int_t optlen)
1039{
1040 syslog(LOG_ERROR, "udp_set_opt not implement");
1041 shell_abort();
1042 return E_SYS;
1043}
1044#endif
1045
1046// musl-1.1.18/network/lookup.h
1047struct address {
1048 int family;
1049 unsigned scopeid;
1050 uint8_t addr[16];
1051 int sortkey;
1052};
1053
1054#define MAXNS 3
1055
1056struct resolvconf {
1057 struct address ns[MAXNS];
1058 unsigned nns, attempts, ndots;
1059 unsigned timeout;
1060};
1061
1062// musl-1.1.18/network/resolvconf.c
1063int __get_resolv_conf(struct resolvconf *conf, char *search, size_t search_sz)
1064{
1065 int nns = 0;
1066
1067 conf->ndots = 1;
1068 conf->timeout = 5;
1069 conf->attempts = 2;
1070 if (search) *search = 0;
1071
1072#if defined(SUPPORT_INET4)
1073 T_IN4_ADDR in4_addr;
1074 conf->ns[nns].family = AF_INET;
1075 conf->ns[nns].scopeid = 0;
1076 dns_in4_get_addr(&in4_addr);
1077 *(uint32_t *)conf->ns[nns].addr = ntohl(in4_addr);
1078 nns++;
1079#endif
1080
1081#if defined(SUPPORT_INET6)
1082 conf->ns[nns].family = AF_INET6;
1083 conf->ns[nns].scopeid = 0;
1084 dns_in6_get_addr((T_IN6_ADDR *)conf->ns[nns].addr);
1085 nns++;
1086#endif
1087 conf->nns = nns;
1088
1089 return 0;
1090}
Note: See TracBrowser for help on using the repository browser.