hio/stio/lib/stio-sck.c

931 lines
24 KiB
C
Raw Normal View History

2016-01-26 16:07:52 +00:00
/*
* $Id$
*
Copyright (c) 2015-2016 Chung, Hyung-Hwan. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WAfRRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "stio-sck.h"
2016-01-26 16:02:20 +00:00
#include "stio-prv.h"
2016-01-26 16:02:20 +00:00
#include <sys/socket.h>
#include <fcntl.h>
#include <unistd.h>
2016-01-26 16:02:20 +00:00
#include <errno.h>
2016-03-30 16:31:56 +00:00
#include <netinet/in.h>
#include <arpa/inet.h>
2016-03-30 16:31:56 +00:00
#include <netpacket/packet.h>
2016-01-26 16:02:20 +00:00
#if defined(HAVE_OPENSSL_SSL_H) && defined(HAVE_SSL)
# include <openssl/ssl.h>
# if defined(HAVE_OPENSSL_ERR_H)
# include <openssl/err.h>
# endif
# if defined(HAVE_OPENSSL_ENGINE_H)
# include <openssl/engine.h>
# endif
# define USE_SSL
#endif
#if defined(USE_SSL)
# define HANDLE_TO_SSL(x) ((SSL*)(x))
# define SSL_TO_HANDLE(x) ((qse_httpd_hnd_t)(x))
#endif
2016-03-29 15:02:01 +00:00
/* ========================================================================= */
void stio_closeasyncsck (stio_t* stio, stio_sckhnd_t sck)
2016-01-26 16:02:20 +00:00
{
#if defined(_WIN32)
closesocket (sck);
#else
close (sck);
#endif
}
#if 0
int stio_shutasyncsck (stio_t* stio, stio_sckhnd_t sck, int how)
{
shutdown (sck, how);
}
#endif
int stio_makesckasync (stio_t* stio, stio_sckhnd_t sck)
2016-01-26 16:02:20 +00:00
{
return stio_makesyshndasync (stio, (stio_syshnd_t)sck);
2016-01-26 16:02:20 +00:00
}
2016-03-23 13:54:15 +00:00
stio_sckhnd_t stio_openasyncsck (stio_t* stio, int domain, int type, int proto)
2016-01-26 16:02:20 +00:00
{
stio_sckhnd_t sck;
#if defined(_WIN32)
2016-04-06 13:49:47 +00:00
sck = WSASocket (domain, type, proto, NULL, 0, WSA_FLAG_OVERLAPPED | WSA_FLAG_NO_HANDLE_INHERIT);
2016-01-26 16:02:20 +00:00
if (sck == STIO_SCKHND_INVALID)
{
/* stio_seterrnum (dev->stio, STIO_ESYSERR); or translate errno to stio errnum */
return STIO_SCKHND_INVALID;
}
#else
2016-03-23 13:54:15 +00:00
sck = socket (domain, type, proto);
2016-01-26 16:02:20 +00:00
if (sck == STIO_SCKHND_INVALID)
{
2016-03-23 13:54:15 +00:00
stio->errnum = stio_syserrtoerrnum(errno);
2016-01-26 16:02:20 +00:00
return STIO_SCKHND_INVALID;
}
2016-04-06 13:49:47 +00:00
#if defined(FD_CLOEXEC)
{
int flags = fcntl (sck, F_GETFD, 0);
if (fcntl (sck, F_SETFD, flags | FD_CLOEXEC) == -1)
{
stio->errnum = stio_syserrtoerrnum(errno);
return STIO_SCKHND_INVALID;
}
}
#endif
if (stio_makesckasync (stio, sck) <= -1)
2016-01-26 16:02:20 +00:00
{
close (sck);
return STIO_SCKHND_INVALID;
}
2016-03-23 13:54:15 +00:00
2016-04-06 13:49:47 +00:00
2016-01-26 16:02:20 +00:00
#endif
return sck;
}
int stio_getsckadrinfo (stio_t* stio, const stio_sckadr_t* addr, stio_scklen_t* len, stio_sckfam_t* family)
{
struct sockaddr* saddr = (struct sockaddr*)addr;
2016-03-30 16:31:56 +00:00
switch (saddr->sa_family)
{
2016-03-30 16:31:56 +00:00
case AF_INET:
if (len) *len = STIO_SIZEOF(struct sockaddr_in);
if (family) *family = AF_INET;
return 0;
case AF_INET6:
if (len) *len = STIO_SIZEOF(struct sockaddr_in6);
if (family) *family = AF_INET6;
return 0;
case AF_PACKET:
if (len) *len = STIO_SIZEOF(struct sockaddr_ll);
if (family) *family = AF_INET6;
return 0;
}
stio->errnum = STIO_EINVAL;
return -1;
}
2016-03-29 15:02:01 +00:00
2016-04-02 15:25:35 +00:00
/* ========================================================================= */
void stio_sckadr_initforip4 (stio_sckadr_t* sckadr, stio_uint16_t port, stio_ip4adr_t* ip4adr)
2016-03-30 16:31:56 +00:00
{
struct sockaddr_in* sin = (struct sockaddr_in*)sckadr;
2016-03-29 15:02:01 +00:00
2016-03-30 16:31:56 +00:00
STIO_MEMSET (sin, 0, STIO_SIZEOF(*sin));
sin->sin_family = AF_INET;
sin->sin_port = htons(port);
2016-04-02 15:25:35 +00:00
if (ip4adr) STIO_MEMCPY (&sin->sin_addr, ip4adr, STIO_IP4ADR_LEN);
2016-03-30 16:31:56 +00:00
}
2016-04-02 15:25:35 +00:00
void stio_sckadr_initforip6 (stio_sckadr_t* sckadr, stio_uint16_t port, stio_ip6adr_t* ip6adr)
2016-03-30 16:31:56 +00:00
{
struct sockaddr_in6* sin = (struct sockaddr_in6*)sckadr;
/* TODO: include sin6_scope_id */
STIO_MEMSET (sin, 0, STIO_SIZEOF(*sin));
sin->sin6_family = AF_INET;
sin->sin6_port = htons(port);
2016-04-02 15:25:35 +00:00
if (ip6adr) STIO_MEMCPY (&sin->sin6_addr, ip6adr, STIO_IP6ADR_LEN);
2016-03-30 16:31:56 +00:00
}
2016-04-02 15:25:35 +00:00
void stio_sckadr_initforeth (stio_sckadr_t* sckadr, int ifindex, stio_ethadr_t* ethadr)
2016-03-30 16:31:56 +00:00
{
2016-04-02 15:25:35 +00:00
struct sockaddr_ll* sll = (struct sockaddr_ll*)sckadr;
2016-03-30 16:31:56 +00:00
STIO_MEMSET (sll, 0, STIO_SIZEOF(*sll));
sll->sll_family = AF_PACKET;
sll->sll_ifindex = ifindex;
2016-04-02 15:25:35 +00:00
if (ethadr)
{
sll->sll_halen = STIO_ETHADR_LEN;
STIO_MEMCPY (sll->sll_addr, ethadr, STIO_ETHADR_LEN);
}
2016-03-30 16:31:56 +00:00
}
2016-04-02 15:25:35 +00:00
/* ========================================================================= */
2016-03-30 16:31:56 +00:00
static stio_devadr_t* sckadr_to_devadr (stio_dev_sck_t* dev, const stio_sckadr_t* sckadr, stio_devadr_t* devadr)
{
if (sckadr)
{
stio_scklen_t len;
stio_getsckadrinfo (dev->stio, sckadr, &len, STIO_NULL);
devadr->ptr = (void*)sckadr;
devadr->len = len;
return devadr;
}
return STIO_NULL;
}
static STIO_INLINE stio_sckadr_t* devadr_to_sckadr (stio_dev_sck_t* dev, const stio_devadr_t* devadr, stio_sckadr_t* sckadr)
{
return (stio_sckadr_t*)devadr->ptr;
}
2016-04-02 15:25:35 +00:00
2016-03-29 15:02:01 +00:00
/* ========================================================================= */
#define IS_STATEFUL(sck) ((sck)->dev_capa & STIO_DEV_CAPA_STREAM)
2016-03-29 15:02:01 +00:00
struct sck_type_map_t
{
int domain;
int type;
int proto;
int extra_dev_capa;
};
static struct sck_type_map_t sck_type_map[] =
2016-03-29 15:02:01 +00:00
{
{ AF_INET, SOCK_STREAM, 0, STIO_DEV_CAPA_STREAM | STIO_DEV_CAPA_OUT_QUEUED },
{ AF_INET6, SOCK_STREAM, 0, STIO_DEV_CAPA_STREAM | STIO_DEV_CAPA_OUT_QUEUED },
{ AF_INET, SOCK_DGRAM, 0, 0 },
{ AF_INET6, SOCK_DGRAM, 0, 0 },
2016-03-29 15:02:01 +00:00
{ AF_PACKET, SOCK_RAW, STIO_CONST_HTON16(0x0806), 0 },
2016-03-30 16:31:56 +00:00
{ AF_PACKET, SOCK_DGRAM, STIO_CONST_HTON16(0x0806), 0 },
{ AF_INET, SOCK_RAW, IPPROTO_ICMP, 0, }
2016-03-29 15:02:01 +00:00
};
/* ======================================================================== */
static void tmr_connect_handle (stio_t* stio, const stio_ntime_t* now, stio_tmrjob_t* job)
2016-03-29 15:02:01 +00:00
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)job->ctx;
2016-03-29 15:02:01 +00:00
STIO_ASSERT (IS_STATEFUL(rdev));
2016-03-29 15:02:01 +00:00
if (rdev->state & STIO_DEV_SCK_CONNECTING)
2016-03-29 15:02:01 +00:00
{
/* the state check for STIO_DEV_TCP_CONNECTING is actually redundant
* as it must not be fired after it gets connected. the timer job
* doesn't need to be deleted when it gets connected for this check
* here. this libarary, however, deletes the job when it gets
* connected. */
stio_dev_sck_halt (rdev);
2016-03-29 15:02:01 +00:00
}
}
/* ======================================================================== */
static int dev_sck_make (stio_dev_t* dev, void* ctx)
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
stio_dev_sck_make_t* arg = (stio_dev_sck_make_t*)ctx;
STIO_ASSERT (arg->type >= 0 && arg->type < STIO_COUNTOF(sck_type_map));
2016-03-29 15:02:01 +00:00
rdev->sck = stio_openasyncsck (dev->stio, sck_type_map[arg->type].domain, sck_type_map[arg->type].type, sck_type_map[arg->type].proto);
if (rdev->sck == STIO_SCKHND_INVALID) goto oops;
rdev->dev_capa = STIO_DEV_CAPA_IN | STIO_DEV_CAPA_OUT | sck_type_map[arg->type].extra_dev_capa;
2016-03-29 15:02:01 +00:00
rdev->on_write = arg->on_write;
rdev->on_read = arg->on_read;
rdev->type = arg->type;
rdev->tmridx_connect = STIO_TMRIDX_INVALID;
2016-04-02 15:25:35 +00:00
2016-03-29 15:02:01 +00:00
return 0;
oops:
if (rdev->sck != STIO_SCKHND_INVALID)
{
stio_closeasyncsck (rdev->stio, rdev->sck);
rdev->sck = STIO_SCKHND_INVALID;
}
return -1;
}
static int dev_sck_make_client (stio_dev_t* dev, void* ctx)
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
stio_syshnd_t* sck = (stio_syshnd_t*)ctx;
rdev->sck = *sck;
if (stio_makesckasync (rdev->stio, rdev->sck) <= -1) return -1;
return 0;
}
static int dev_sck_kill (stio_dev_t* dev, int force)
2016-03-29 15:02:01 +00:00
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
if (IS_STATEFUL(rdev))
{
if (rdev->state & (STIO_DEV_SCK_ACCEPTED | STIO_DEV_SCK_CONNECTED | STIO_DEV_SCK_CONNECTING | STIO_DEV_SCK_LISTENING))
{
if (rdev->on_disconnect) rdev->on_disconnect (rdev);
}
if (rdev->tmridx_connect != STIO_TMRIDX_INVALID)
{
stio_deltmrjob (dev->stio, rdev->tmridx_connect);
STIO_ASSERT (rdev->tmridx_connect == STIO_TMRIDX_INVALID);
}
}
else
{
STIO_ASSERT (rdev->state == 0);
STIO_ASSERT (rdev->tmridx_connect == STIO_TMRIDX_INVALID);
}
2016-03-29 15:02:01 +00:00
if (rdev->sck != STIO_SCKHND_INVALID)
{
stio_closeasyncsck (rdev->stio, rdev->sck);
rdev->sck = STIO_SCKHND_INVALID;
}
#if defined(USE_SSL)
if (rdev->secure_ctx)
{
SSL_CTX_free ((SSL_CTX*)rdev->secure_ctx);
rdev->secure_ctx = STIO_NULL;
}
#endif
return 0;
2016-03-29 15:02:01 +00:00
}
static stio_syshnd_t dev_sck_getsyshnd (stio_dev_t* dev)
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
return (stio_syshnd_t)rdev->sck;
}
2016-04-02 15:25:35 +00:00
static int dev_sck_read_stateful (stio_dev_t* dev, void* buf, stio_iolen_t* len, stio_devadr_t* srcadr)
{
stio_dev_sck_t* tcp = (stio_dev_sck_t*)dev;
ssize_t x;
x = recv (tcp->sck, buf, *len, 0);
if (x == -1)
{
if (errno == EINPROGRESS || errno == EWOULDBLOCK) return 0; /* no data available */
if (errno == EINTR) return 0;
tcp->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
*len = x;
return 1;
}
2016-04-02 15:25:35 +00:00
static int dev_sck_read_stateless (stio_dev_t* dev, void* buf, stio_iolen_t* len, stio_devadr_t* srcadr)
2016-03-29 15:02:01 +00:00
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
stio_scklen_t srcadrlen;
ssize_t x;
2016-03-29 15:02:01 +00:00
2016-03-30 16:31:56 +00:00
srcadrlen = STIO_SIZEOF(rdev->peeradr);
x = recvfrom (rdev->sck, buf, *len, 0, (struct sockaddr*)&rdev->peeradr, &srcadrlen);
2016-03-29 15:02:01 +00:00
if (x <= -1)
{
if (errno == EINPROGRESS || errno == EWOULDBLOCK) return 0; /* no data available */
if (errno == EINTR) return 0;
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
2016-03-30 16:31:56 +00:00
srcadr->ptr = &rdev->peeradr;
2016-03-29 15:02:01 +00:00
srcadr->len = srcadrlen;
2016-03-30 16:31:56 +00:00
2016-03-29 15:02:01 +00:00
*len = x;
return 1;
}
2016-04-02 15:25:35 +00:00
static int dev_sck_write_stateful (stio_dev_t* dev, const void* data, stio_iolen_t* len, const stio_devadr_t* dstadr)
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
ssize_t x;
int flags = 0;
if (*len <= 0)
{
/* it's a writing finish indicator. close the writing end of
* the socket, probably leaving it in the half-closed state */
if (shutdown (rdev->sck, SHUT_WR) == -1)
{
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
return 1;
}
/* TODO: flags MSG_DONTROUTE, MSG_DONTWAIT, MSG_MORE, MSG_OOB, MSG_NOSIGNAL */
#if defined(MSG_NOSIGNAL)
flags |= MSG_NOSIGNAL;
#endif
x = send (rdev->sck, data, *len, flags);
if (x == -1)
{
if (errno == EINPROGRESS || errno == EWOULDBLOCK) return 0; /* no data can be written */
if (errno == EINTR) return 0;
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
*len = x;
return 1;
}
2016-04-02 15:25:35 +00:00
static int dev_sck_write_stateless (stio_dev_t* dev, const void* data, stio_iolen_t* len, const stio_devadr_t* dstadr)
2016-03-29 15:02:01 +00:00
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
ssize_t x;
x = sendto (rdev->sck, data, *len, 0, dstadr->ptr, dstadr->len);
if (x <= -1)
{
if (errno == EINPROGRESS || errno == EWOULDBLOCK) return 0; /* no data can be written */
if (errno == EINTR) return 0;
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
*len = x;
return 1;
}
static int dev_sck_ioctl (stio_dev_t* dev, int cmd, void* arg)
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
switch (cmd)
{
case STIO_DEV_SCK_BIND:
{
stio_dev_sck_bind_t* bnd = (stio_dev_sck_bind_t*)arg;
struct sockaddr* sa = (struct sockaddr*)&bnd->addr;
stio_scklen_t sl;
stio_sckfam_t fam;
int x;
#if defined(USE_SSL)
SSL_CTX* ssl = STIO_NULL;
#endif
2016-04-02 15:52:12 +00:00
if (bnd->options & STIO_DEV_SCK_BIND_BROADCAST)
{
int v = 1;
if (setsockopt (rdev->sck, SOL_SOCKET, SO_BROADCAST, &v, STIO_SIZEOF(v)) == -1)
{
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
}
if (bnd->options & STIO_DEV_SCK_BIND_REUSEADDR)
{
int v = 1;
if (setsockopt (rdev->sck, SOL_SOCKET, SO_REUSEADDR, &v, STIO_SIZEOF(v)) == -1)
{
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
}
if (bnd->options & STIO_DEV_SCK_BIND_SECURE)
{
#if defined(USE_SSL)
SSL_CTX* ssl;
ssl = SSL_CTX_new (SSLv23_server_method());
if (!ssl)
{
rdev->stio->errnum = STIO_ESYSERR;
return -1;
}
if (SSL_CTX_use_certificate_file (ssl, bnd->certfile, SSL_FILETYPE_PEM) == 0 ||
SSL_CTX_use_PrivateKey_file (ssl, bnd->keyfile, SSL_FILETYPE_PEM) == 0 ||
SSL_CTX_check_private_key (ssl) == 0)
{
rdev->stio->errnum = STIO_ESYSERR;
SSL_CTX_free (ssl);
return -1;
}
SSL_CTX_set_read_ahead (ssl, 0);
#else
rdev->stio->errnum = STIO_ENOIMPL;
return -1;
#endif
}
if (stio_getsckadrinfo (dev->stio, &bnd->addr, &sl, &fam) <= -1) return -1;
x = bind (rdev->sck, sa, sl);
if (x == -1)
{
rdev->stio->errnum = stio_syserrtoerrnum(errno);
#if defined(USE_SSL)
if (ssl) SSL_CTX_free (ssl);
#endif
return -1;
}
#if defined(USE_SSL)
rdev->secure_ctx = ssl;
#endif
return 0;
}
case STIO_DEV_SCK_CONNECT:
{
stio_dev_sck_connect_t* conn = (stio_dev_sck_connect_t*)arg;
struct sockaddr* sa = (struct sockaddr*)&conn->addr;
stio_scklen_t sl;
int x;
if (!IS_STATEFUL(rdev))
{
dev->stio->errnum = STIO_ENOCAPA;
return -1;
}
if (sa->sa_family == AF_INET) sl = STIO_SIZEOF(struct sockaddr_in);
else if (sa->sa_family == AF_INET6) sl = STIO_SIZEOF(struct sockaddr_in6);
else
{
dev->stio->errnum = STIO_EINVAL;
return -1;
}
/* the socket is already non-blocking */
x = connect (rdev->sck, sa, sl);
if (x == -1)
{
if (errno == EINPROGRESS || errno == EWOULDBLOCK)
{
if (stio_dev_watch ((stio_dev_t*)rdev, STIO_DEV_WATCH_UPDATE, STIO_DEV_EVENT_IN | STIO_DEV_EVENT_OUT) >= 0)
{
stio_tmrjob_t tmrjob;
if (!stio_isnegtime(&conn->tmout))
{
STIO_MEMSET (&tmrjob, 0, STIO_SIZEOF(tmrjob));
tmrjob.ctx = rdev;
stio_gettime (&tmrjob.when);
stio_addtime (&tmrjob.when, &conn->tmout, &tmrjob.when);
tmrjob.handler = tmr_connect_handle;
tmrjob.idxptr = &rdev->tmridx_connect;
STIO_ASSERT (rdev->tmridx_connect == STIO_TMRIDX_INVALID);
rdev->tmridx_connect = stio_instmrjob (rdev->stio, &tmrjob);
if (rdev->tmridx_connect == STIO_TMRIDX_INVALID)
{
stio_dev_watch ((stio_dev_t*)rdev, STIO_DEV_WATCH_UPDATE, STIO_DEV_EVENT_IN);
/* event manipulation failure can't be handled properly. so ignore it.
* anyway, it's already in a failure condition */
return -1;
}
}
rdev->state |= STIO_DEV_SCK_CONNECTING;
2016-03-30 16:31:56 +00:00
rdev->peeradr = conn->addr;
rdev->on_connect = conn->on_connect;
rdev->on_disconnect = conn->on_disconnect;
return 0;
}
}
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
/* connected immediately */
rdev->state |= STIO_DEV_SCK_CONNECTED;
2016-03-30 16:31:56 +00:00
rdev->peeradr = conn->addr;
rdev->on_connect = conn->on_connect;
rdev->on_disconnect = conn->on_disconnect;
return 0;
}
case STIO_DEV_SCK_LISTEN:
{
stio_dev_sck_listen_t* lstn = (stio_dev_sck_listen_t*)arg;
int x;
if (!IS_STATEFUL(rdev))
{
dev->stio->errnum = STIO_ENOCAPA;
return -1;
}
x = listen (rdev->sck, lstn->backlogs);
if (x == -1)
{
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
rdev->state |= STIO_DEV_SCK_LISTENING;
rdev->on_connect = lstn->on_connect;
rdev->on_disconnect = lstn->on_disconnect;
return 0;
}
}
2016-03-29 15:02:01 +00:00
return 0;
}
2016-04-06 13:49:47 +00:00
static stio_dev_mth_t dev_sck_methods_stateless =
2016-03-29 15:02:01 +00:00
{
dev_sck_make,
dev_sck_kill,
dev_sck_getsyshnd,
dev_sck_read_stateless,
dev_sck_write_stateless,
2016-03-29 15:02:01 +00:00
dev_sck_ioctl, /* ioctl */
};
2016-04-06 13:49:47 +00:00
static stio_dev_mth_t dev_sck_methods_stateful =
{
dev_sck_make,
dev_sck_kill,
dev_sck_getsyshnd,
dev_sck_read_stateful,
dev_sck_write_stateful,
dev_sck_ioctl, /* ioctl */
};
static stio_dev_mth_t dev_mth_clisck =
{
dev_sck_make_client,
dev_sck_kill,
dev_sck_getsyshnd,
dev_sck_read_stateful,
dev_sck_write_stateful,
dev_sck_ioctl
};
2016-03-29 15:02:01 +00:00
/* ========================================================================= */
static int dev_evcb_sck_ready_stateful (stio_dev_t* dev, int events)
2016-03-29 15:02:01 +00:00
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
if (events & STIO_DEV_EVENT_ERR)
{
int errcode;
stio_scklen_t len;
len = STIO_SIZEOF(errcode);
if (getsockopt (rdev->sck, SOL_SOCKET, SO_ERROR, (char*)&errcode, &len) == -1)
{
/* the error number is set to the socket error code.
* errno resulting from getsockopt() doesn't reflect the actual
* socket error. so errno is not used to set the error number.
* instead, the generic device error STIO_EDEVERRR is used */
rdev->stio->errnum = STIO_EDEVERR;
}
else
{
rdev->stio->errnum = stio_syserrtoerrnum (errcode);
}
return -1;
}
2016-03-29 15:02:01 +00:00
/* this socket can connect */
if (rdev->state & STIO_DEV_SCK_CONNECTING)
{
if (events & STIO_DEV_EVENT_HUP)
{
/* device hang-up */
rdev->stio->errnum = STIO_EDEVHUP;
return -1;
}
else if (events & (STIO_DEV_EVENT_PRI | STIO_DEV_EVENT_IN))
{
/* invalid event masks. generic device error */
rdev->stio->errnum = STIO_EDEVERR;
return -1;
}
else if (events & STIO_DEV_EVENT_OUT)
{
int errcode;
stio_scklen_t len;
STIO_ASSERT (!(rdev->state & STIO_DEV_SCK_CONNECTED));
len = STIO_SIZEOF(errcode);
if (getsockopt (rdev->sck, SOL_SOCKET, SO_ERROR, (char*)&errcode, &len) == -1)
{
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
else if (errcode == 0)
{
rdev->state &= ~STIO_DEV_SCK_CONNECTING;
rdev->state |= STIO_DEV_SCK_CONNECTED;
if (stio_dev_watch ((stio_dev_t*)rdev, STIO_DEV_WATCH_RENEW, 0) <= -1) return -1;
if (rdev->tmridx_connect != STIO_TMRIDX_INVALID)
{
stio_deltmrjob (rdev->stio, rdev->tmridx_connect);
STIO_ASSERT (rdev->tmridx_connect == STIO_TMRIDX_INVALID);
}
if (rdev->on_connect (rdev) <= -1) return -1;
}
else if (errcode == EINPROGRESS || errcode == EWOULDBLOCK)
{
/* still in progress */
}
else
{
rdev->stio->errnum = stio_syserrtoerrnum(errcode);
return -1;
}
}
return 0; /* success but don't invoke on_read() */
}
else if (rdev->state & STIO_DEV_SCK_LISTENING)
{
if (events & STIO_DEV_EVENT_HUP)
{
/* device hang-up */
rdev->stio->errnum = STIO_EDEVHUP;
return -1;
}
else if (events & (STIO_DEV_EVENT_PRI | STIO_DEV_EVENT_OUT))
{
rdev->stio->errnum = STIO_EDEVERR;
return -1;
}
else if (events & STIO_DEV_EVENT_IN)
{
stio_sckhnd_t clisck;
stio_sckadr_t peer;
stio_scklen_t addrlen;
stio_dev_sck_t* clidev;
/* this is a server(lisening) socket */
addrlen = STIO_SIZEOF(peer);
clisck = accept (rdev->sck, (struct sockaddr*)&peer, &addrlen);
if (clisck == STIO_SCKHND_INVALID)
{
if (errno == EINPROGRESS || errno == EWOULDBLOCK) return 0;
if (errno == EINTR) return 0; /* if interrupted by a signal, treat it as if it's EINPROGRESS */
rdev->stio->errnum = stio_syserrtoerrnum(errno);
return -1;
}
/* use rdev->dev_size when instantiating a client sck device
* instead of STIO_SIZEOF(stio_dev_sck_t). therefore, the
* extension area as big as that of the master sck device
* is created in the client sck device */
clidev = (stio_dev_sck_t*)stio_makedev (rdev->stio, rdev->dev_size, &dev_mth_clisck, rdev->dev_evcb, &clisck);
if (!clidev)
{
close (clisck);
return -1;
}
clidev->dev_capa |= STIO_DEV_CAPA_IN | STIO_DEV_CAPA_OUT | STIO_DEV_CAPA_STREAM;
clidev->state |= STIO_DEV_SCK_ACCEPTED;
2016-03-30 16:31:56 +00:00
clidev->peeradr = peer;
/*clidev->parent = sck;*/
/* inherit some event handlers from the parent.
* you can still change them inside the on_connect handler */
clidev->on_connect = rdev->on_connect;
clidev->on_disconnect = rdev->on_disconnect;
clidev->on_write = rdev->on_write;
clidev->on_read = rdev->on_read;
clidev->tmridx_connect = STIO_TMRIDX_INVALID;
if (clidev->on_connect(clidev) <= -1) stio_dev_sck_halt (clidev);
return 0; /* success but don't invoke on_read() */
}
}
else if (events & STIO_DEV_EVENT_HUP)
{
if (events & (STIO_DEV_EVENT_PRI | STIO_DEV_EVENT_IN | STIO_DEV_EVENT_OUT))
{
/* probably half-open? */
return 1;
}
rdev->stio->errnum = STIO_EDEVHUP;
return -1;
}
2016-03-29 15:02:01 +00:00
return 1; /* the device is ok. carry on reading or writing */
}
static int dev_evcb_sck_ready_stateless (stio_dev_t* dev, int events)
2016-03-29 15:02:01 +00:00
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
if (events & STIO_DEV_EVENT_ERR)
{
int errcode;
stio_scklen_t len;
len = STIO_SIZEOF(errcode);
if (getsockopt (rdev->sck, SOL_SOCKET, SO_ERROR, (char*)&errcode, &len) == -1)
{
/* the error number is set to the socket error code.
* errno resulting from getsockopt() doesn't reflect the actual
* socket error. so errno is not used to set the error number.
* instead, the generic device error STIO_EDEVERRR is used */
rdev->stio->errnum = STIO_EDEVERR;
}
else
{
rdev->stio->errnum = stio_syserrtoerrnum (errcode);
}
return -1;
}
else if (events & STIO_DEV_EVENT_HUP)
{
rdev->stio->errnum = STIO_EDEVHUP;
return -1;
}
2016-03-29 15:02:01 +00:00
return 1; /* the device is ok. carry on reading or writing */
2016-03-29 15:02:01 +00:00
}
2016-04-02 15:25:35 +00:00
static int dev_evcb_sck_on_read_stateful (stio_dev_t* dev, const void* data, stio_iolen_t dlen, const stio_devadr_t* srcadr)
2016-03-30 16:31:56 +00:00
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
return rdev->on_read (rdev, data, dlen, STIO_NULL);
}
2016-04-02 15:25:35 +00:00
static int dev_evcb_sck_on_write_stateful (stio_dev_t* dev, stio_iolen_t wrlen, void* wrctx, const stio_devadr_t* dstadr)
2016-03-29 15:02:01 +00:00
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
2016-03-30 16:31:56 +00:00
return rdev->on_write (rdev, wrlen, wrctx, STIO_NULL);
}
2016-03-29 15:02:01 +00:00
2016-04-02 15:25:35 +00:00
static int dev_evcb_sck_on_read_stateless (stio_dev_t* dev, const void* data, stio_iolen_t dlen, const stio_devadr_t* srcadr)
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
2016-03-30 16:31:56 +00:00
return rdev->on_read (rdev, data, dlen, srcadr->ptr);
}
2016-04-02 15:25:35 +00:00
static int dev_evcb_sck_on_write_stateless (stio_dev_t* dev, stio_iolen_t wrlen, void* wrctx, const stio_devadr_t* dstadr)
2016-03-30 16:31:56 +00:00
{
stio_dev_sck_t* rdev = (stio_dev_sck_t*)dev;
return rdev->on_write (rdev, wrlen, wrctx, dstadr->ptr);
2016-03-29 15:02:01 +00:00
}
2016-04-06 13:49:47 +00:00
static stio_dev_evcb_t dev_sck_event_callbacks_stateful =
2016-03-29 15:02:01 +00:00
{
dev_evcb_sck_ready_stateful,
2016-03-30 16:31:56 +00:00
dev_evcb_sck_on_read_stateful,
dev_evcb_sck_on_write_stateful
2016-03-29 15:02:01 +00:00
};
2016-04-06 13:49:47 +00:00
static stio_dev_evcb_t dev_sck_event_callbacks_stateless =
{
dev_evcb_sck_ready_stateless,
2016-03-30 16:31:56 +00:00
dev_evcb_sck_on_read_stateless,
dev_evcb_sck_on_write_stateless
};
/* ========================================================================= */
2016-03-30 16:31:56 +00:00
stio_dev_sck_t* stio_dev_sck_make (stio_t* stio, stio_size_t xtnsize, const stio_dev_sck_make_t* info)
{
stio_dev_sck_t* rdev;
2016-03-30 16:31:56 +00:00
if (info->type < 0 && info->type >= STIO_COUNTOF(sck_type_map))
{
stio->errnum = STIO_EINVAL;
return STIO_NULL;
}
2016-03-30 16:31:56 +00:00
if (sck_type_map[info->type].extra_dev_capa & STIO_DEV_CAPA_STREAM) /* can't use the IS_STATEFUL() macro yet */
{
2016-04-06 13:49:47 +00:00
rdev = (stio_dev_sck_t*)stio_makedev (
stio, STIO_SIZEOF(stio_dev_sck_t) + xtnsize,
&dev_sck_methods_stateful, &dev_sck_event_callbacks_stateful, (void*)info);
}
else
{
2016-04-06 13:49:47 +00:00
rdev = (stio_dev_sck_t*)stio_makedev (
stio, STIO_SIZEOF(stio_dev_sck_t) + xtnsize,
&dev_sck_methods_stateless, &dev_sck_event_callbacks_stateless, (void*)info);
}
return rdev;
}
int stio_dev_sck_bind (stio_dev_sck_t* dev, stio_dev_sck_bind_t* info)
{
return stio_dev_ioctl ((stio_dev_t*)dev, STIO_DEV_SCK_BIND, info);
}
int stio_dev_sck_connect (stio_dev_sck_t* dev, stio_dev_sck_connect_t* info)
{
return stio_dev_ioctl ((stio_dev_t*)dev, STIO_DEV_SCK_CONNECT, info);
}
2016-03-29 15:02:01 +00:00
int stio_dev_sck_listen (stio_dev_sck_t* dev, stio_dev_sck_listen_t* info)
2016-03-29 15:02:01 +00:00
{
return stio_dev_ioctl ((stio_dev_t*)dev, STIO_DEV_SCK_LISTEN, info);
2016-03-29 15:02:01 +00:00
}
2016-04-02 15:25:35 +00:00
int stio_dev_sck_write (stio_dev_sck_t* dev, const void* data, stio_iolen_t dlen, void* wrctx, const stio_sckadr_t* dstadr)
2016-03-29 15:02:01 +00:00
{
2016-03-30 16:31:56 +00:00
stio_devadr_t devadr;
return stio_dev_write ((stio_dev_t*)dev, data, dlen, wrctx, sckadr_to_devadr(dev, dstadr, &devadr));
2016-03-29 15:02:01 +00:00
}
2016-04-02 15:25:35 +00:00
int stio_dev_sck_timedwrite (stio_dev_sck_t* dev, const void* data, stio_iolen_t dlen, const stio_ntime_t* tmout, void* wrctx, const stio_sckadr_t* dstadr)
2016-03-29 15:02:01 +00:00
{
2016-03-30 16:31:56 +00:00
stio_devadr_t devadr;
return stio_dev_timedwrite ((stio_dev_t*)dev, data, dlen, tmout, wrctx, sckadr_to_devadr(dev, dstadr, &devadr));
2016-03-29 15:02:01 +00:00
}