win_socket.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695
  1. /*
  2. * Copyright (C) 2021 Intel Corporation. All rights reserved.
  3. * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  4. */
  5. #include "platform_api_vmcore.h"
  6. #include "platform_api_extension.h"
  7. /* link with Ws2_32.lib */
  8. #pragma comment(lib, "ws2_32.lib")
  9. static bool is_winsock_inited = false;
  10. #define CHECK_VALID_SOCKET_HANDLE(win_handle) \
  11. do { \
  12. if ((win_handle) == NULL) { \
  13. errno = EBADF; \
  14. return BHT_ERROR; \
  15. } \
  16. if ((win_handle)->type != windows_handle_type_socket) { \
  17. errno = ENOTSOCK; \
  18. return BHT_ERROR; \
  19. } \
  20. if ((win_handle)->raw.socket == INVALID_SOCKET) { \
  21. errno = EBADF; \
  22. return BHT_ERROR; \
  23. } \
  24. } while (0)
  25. int
  26. init_winsock()
  27. {
  28. WSADATA wsaData;
  29. if (!is_winsock_inited) {
  30. if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) {
  31. os_printf("winsock init failed");
  32. return BHT_ERROR;
  33. }
  34. is_winsock_inited = true;
  35. }
  36. return BHT_OK;
  37. }
  38. void
  39. deinit_winsock()
  40. {
  41. if (is_winsock_inited) {
  42. WSACleanup();
  43. }
  44. }
  45. int
  46. os_socket_create(bh_socket_t *sock, bool is_ipv4, bool is_tcp)
  47. {
  48. int af;
  49. if (!sock) {
  50. return BHT_ERROR;
  51. }
  52. *(sock) = BH_MALLOC(sizeof(windows_handle));
  53. if ((*sock) == NULL) {
  54. errno = ENOMEM;
  55. return BHT_ERROR;
  56. }
  57. (*sock)->type = windows_handle_type_socket;
  58. (*sock)->access_mode = windows_access_mode_read | windows_access_mode_write;
  59. if (is_ipv4) {
  60. af = AF_INET;
  61. }
  62. else {
  63. errno = ENOSYS;
  64. return BHT_ERROR;
  65. }
  66. if (is_tcp) {
  67. (*sock)->raw.socket = socket(af, SOCK_STREAM, IPPROTO_TCP);
  68. }
  69. else {
  70. (*sock)->raw.socket = socket(af, SOCK_DGRAM, 0);
  71. }
  72. if ((*sock)->raw.socket == INVALID_SOCKET) {
  73. BH_FREE(*sock);
  74. return BHT_ERROR;
  75. }
  76. return BHT_OK;
  77. }
  78. int
  79. os_socket_bind(bh_socket_t socket, const char *host, int *port)
  80. {
  81. CHECK_VALID_SOCKET_HANDLE(socket);
  82. struct sockaddr_in addr;
  83. int socklen, ret;
  84. assert(host);
  85. assert(port);
  86. addr.sin_addr.s_addr = inet_addr(host);
  87. addr.sin_port = htons(*port);
  88. addr.sin_family = AF_INET;
  89. ret = bind(socket->raw.socket, (struct sockaddr *)&addr, sizeof(addr));
  90. if (ret < 0) {
  91. goto fail;
  92. }
  93. socklen = sizeof(addr);
  94. if (getsockname(socket->raw.socket, (void *)&addr, &socklen) == -1) {
  95. os_printf("getsockname failed with error %d\n", WSAGetLastError());
  96. goto fail;
  97. }
  98. *port = ntohs(addr.sin_port);
  99. return BHT_OK;
  100. fail:
  101. return BHT_ERROR;
  102. }
  103. int
  104. os_socket_settimeout(bh_socket_t socket, uint64 timeout_us)
  105. {
  106. CHECK_VALID_SOCKET_HANDLE(socket);
  107. DWORD tv = (DWORD)(timeout_us / 1000UL);
  108. if (setsockopt(socket->raw.socket, SOL_SOCKET, SO_RCVTIMEO,
  109. (const char *)&tv, sizeof(tv))
  110. != 0) {
  111. return BHT_ERROR;
  112. }
  113. return BHT_OK;
  114. }
  115. int
  116. os_socket_listen(bh_socket_t socket, int max_client)
  117. {
  118. CHECK_VALID_SOCKET_HANDLE(socket);
  119. if (listen(socket->raw.socket, max_client) != 0) {
  120. os_printf("socket listen failed with error %d\n", WSAGetLastError());
  121. return BHT_ERROR;
  122. }
  123. return BHT_OK;
  124. }
  125. int
  126. os_socket_accept(bh_socket_t server_sock, bh_socket_t *sock, void *addr,
  127. unsigned int *addrlen)
  128. {
  129. CHECK_VALID_SOCKET_HANDLE(server_sock);
  130. struct sockaddr addr_tmp;
  131. unsigned int len = sizeof(struct sockaddr);
  132. *sock = BH_MALLOC(sizeof(windows_handle));
  133. if (*sock == NULL) {
  134. errno = ENOMEM;
  135. return BHT_ERROR;
  136. }
  137. (*sock)->type = windows_handle_type_socket;
  138. (*sock)->access_mode = windows_access_mode_read | windows_access_mode_write;
  139. (*sock)->raw.socket =
  140. accept(server_sock->raw.socket, (struct sockaddr *)&addr_tmp, &len);
  141. if ((*sock)->raw.socket == INVALID_SOCKET) {
  142. BH_FREE(*sock);
  143. os_printf("socket accept failed with error %d\n", WSAGetLastError());
  144. return BHT_ERROR;
  145. }
  146. return BHT_OK;
  147. }
  148. int
  149. os_socket_recv(bh_socket_t socket, void *buf, unsigned int len)
  150. {
  151. CHECK_VALID_SOCKET_HANDLE(socket);
  152. return recv(socket->raw.socket, buf, len, 0);
  153. }
  154. int
  155. os_socket_recv_from(bh_socket_t socket, void *buf, unsigned int len, int flags,
  156. bh_sockaddr_t *src_addr)
  157. {
  158. CHECK_VALID_SOCKET_HANDLE(socket);
  159. errno = ENOSYS;
  160. return BHT_ERROR;
  161. }
  162. int
  163. os_socket_send(bh_socket_t socket, const void *buf, unsigned int len)
  164. {
  165. CHECK_VALID_SOCKET_HANDLE(socket);
  166. return send(socket->raw.socket, buf, len, 0);
  167. }
  168. int
  169. os_socket_send_to(bh_socket_t socket, const void *buf, unsigned int len,
  170. int flags, const bh_sockaddr_t *dest_addr)
  171. {
  172. CHECK_VALID_SOCKET_HANDLE(socket);
  173. errno = ENOSYS;
  174. return BHT_ERROR;
  175. }
  176. int
  177. os_socket_close(bh_socket_t socket)
  178. {
  179. CHECK_VALID_SOCKET_HANDLE(socket);
  180. closesocket(socket->raw.socket);
  181. BH_FREE(socket);
  182. return BHT_OK;
  183. }
  184. int
  185. os_socket_shutdown(bh_socket_t socket)
  186. {
  187. CHECK_VALID_SOCKET_HANDLE(socket);
  188. shutdown(socket->raw.socket, SD_BOTH);
  189. return BHT_OK;
  190. }
  191. int
  192. os_socket_inet_network(bool is_ipv4, const char *cp, bh_ip_addr_buffer_t *out)
  193. {
  194. if (!cp)
  195. return BHT_ERROR;
  196. if (is_ipv4) {
  197. if (inet_pton(AF_INET, cp, &out->ipv4) != 1) {
  198. return BHT_ERROR;
  199. }
  200. /* Note: ntohl(INADDR_NONE) == INADDR_NONE */
  201. out->ipv4 = ntohl(out->ipv4);
  202. }
  203. else {
  204. if (inet_pton(AF_INET6, cp, out->ipv6) != 1) {
  205. return BHT_ERROR;
  206. }
  207. for (int i = 0; i < 8; i++) {
  208. out->ipv6[i] = ntohs(out->ipv6[i]);
  209. }
  210. }
  211. return BHT_OK;
  212. }
  213. int
  214. os_socket_connect(bh_socket_t socket, const char *addr, int port)
  215. {
  216. CHECK_VALID_SOCKET_HANDLE(socket);
  217. errno = ENOSYS;
  218. return BHT_ERROR;
  219. }
  220. int
  221. os_socket_addr_resolve(const char *host, const char *service,
  222. uint8_t *hint_is_tcp, uint8_t *hint_is_ipv4,
  223. bh_addr_info_t *addr_info, size_t addr_info_size,
  224. size_t *max_info_size)
  225. {
  226. errno = ENOSYS;
  227. return BHT_ERROR;
  228. }
  229. int
  230. os_socket_addr_local(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  231. {
  232. CHECK_VALID_SOCKET_HANDLE(socket);
  233. errno = ENOSYS;
  234. return BHT_ERROR;
  235. }
  236. int
  237. os_socket_set_send_timeout(bh_socket_t socket, uint64 timeout_us)
  238. {
  239. CHECK_VALID_SOCKET_HANDLE(socket);
  240. errno = ENOSYS;
  241. return BHT_ERROR;
  242. }
  243. int
  244. os_socket_get_send_timeout(bh_socket_t socket, uint64 *timeout_us)
  245. {
  246. CHECK_VALID_SOCKET_HANDLE(socket);
  247. errno = ENOSYS;
  248. return BHT_ERROR;
  249. }
  250. int
  251. os_socket_set_recv_timeout(bh_socket_t socket, uint64 timeout_us)
  252. {
  253. CHECK_VALID_SOCKET_HANDLE(socket);
  254. errno = ENOSYS;
  255. return BHT_ERROR;
  256. }
  257. int
  258. os_socket_get_recv_timeout(bh_socket_t socket, uint64 *timeout_us)
  259. {
  260. CHECK_VALID_SOCKET_HANDLE(socket);
  261. errno = ENOSYS;
  262. return BHT_ERROR;
  263. }
  264. int
  265. os_socket_addr_remote(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  266. {
  267. CHECK_VALID_SOCKET_HANDLE(socket);
  268. errno = ENOSYS;
  269. return BHT_ERROR;
  270. }
  271. int
  272. os_socket_set_send_buf_size(bh_socket_t socket, size_t bufsiz)
  273. {
  274. CHECK_VALID_SOCKET_HANDLE(socket);
  275. errno = ENOSYS;
  276. return BHT_ERROR;
  277. }
  278. int
  279. os_socket_get_send_buf_size(bh_socket_t socket, size_t *bufsiz)
  280. {
  281. CHECK_VALID_SOCKET_HANDLE(socket);
  282. errno = ENOSYS;
  283. return BHT_ERROR;
  284. }
  285. int
  286. os_socket_set_recv_buf_size(bh_socket_t socket, size_t bufsiz)
  287. {
  288. CHECK_VALID_SOCKET_HANDLE(socket);
  289. errno = ENOSYS;
  290. return BHT_ERROR;
  291. }
  292. int
  293. os_socket_get_recv_buf_size(bh_socket_t socket, size_t *bufsiz)
  294. {
  295. CHECK_VALID_SOCKET_HANDLE(socket);
  296. errno = ENOSYS;
  297. return BHT_ERROR;
  298. }
  299. int
  300. os_socket_set_keep_alive(bh_socket_t socket, bool is_enabled)
  301. {
  302. CHECK_VALID_SOCKET_HANDLE(socket);
  303. errno = ENOSYS;
  304. return BHT_ERROR;
  305. }
  306. int
  307. os_socket_get_keep_alive(bh_socket_t socket, bool *is_enabled)
  308. {
  309. CHECK_VALID_SOCKET_HANDLE(socket);
  310. errno = ENOSYS;
  311. return BHT_ERROR;
  312. }
  313. int
  314. os_socket_set_reuse_addr(bh_socket_t socket, bool is_enabled)
  315. {
  316. CHECK_VALID_SOCKET_HANDLE(socket);
  317. errno = ENOSYS;
  318. return BHT_ERROR;
  319. }
  320. int
  321. os_socket_get_reuse_addr(bh_socket_t socket, bool *is_enabled)
  322. {
  323. CHECK_VALID_SOCKET_HANDLE(socket);
  324. errno = ENOSYS;
  325. return BHT_ERROR;
  326. }
  327. int
  328. os_socket_set_reuse_port(bh_socket_t socket, bool is_enabled)
  329. {
  330. CHECK_VALID_SOCKET_HANDLE(socket);
  331. errno = ENOSYS;
  332. return BHT_ERROR;
  333. }
  334. int
  335. os_socket_get_reuse_port(bh_socket_t socket, bool *is_enabled)
  336. {
  337. CHECK_VALID_SOCKET_HANDLE(socket);
  338. errno = ENOSYS;
  339. return BHT_ERROR;
  340. }
  341. int
  342. os_socket_set_linger(bh_socket_t socket, bool is_enabled, int linger_s)
  343. {
  344. CHECK_VALID_SOCKET_HANDLE(socket);
  345. errno = ENOSYS;
  346. return BHT_ERROR;
  347. }
  348. int
  349. os_socket_get_linger(bh_socket_t socket, bool *is_enabled, int *linger_s)
  350. {
  351. CHECK_VALID_SOCKET_HANDLE(socket);
  352. errno = ENOSYS;
  353. return BHT_ERROR;
  354. }
  355. int
  356. os_socket_set_tcp_no_delay(bh_socket_t socket, bool is_enabled)
  357. {
  358. CHECK_VALID_SOCKET_HANDLE(socket);
  359. errno = ENOSYS;
  360. return BHT_ERROR;
  361. }
  362. int
  363. os_socket_get_tcp_no_delay(bh_socket_t socket, bool *is_enabled)
  364. {
  365. CHECK_VALID_SOCKET_HANDLE(socket);
  366. errno = ENOSYS;
  367. return BHT_ERROR;
  368. }
  369. int
  370. os_socket_set_tcp_quick_ack(bh_socket_t socket, bool is_enabled)
  371. {
  372. CHECK_VALID_SOCKET_HANDLE(socket);
  373. errno = ENOSYS;
  374. return BHT_ERROR;
  375. }
  376. int
  377. os_socket_get_tcp_quick_ack(bh_socket_t socket, bool *is_enabled)
  378. {
  379. CHECK_VALID_SOCKET_HANDLE(socket);
  380. errno = ENOSYS;
  381. return BHT_ERROR;
  382. }
  383. int
  384. os_socket_set_tcp_keep_idle(bh_socket_t socket, uint32 time_s)
  385. {
  386. CHECK_VALID_SOCKET_HANDLE(socket);
  387. errno = ENOSYS;
  388. return BHT_ERROR;
  389. }
  390. int
  391. os_socket_get_tcp_keep_idle(bh_socket_t socket, uint32 *time_s)
  392. {
  393. CHECK_VALID_SOCKET_HANDLE(socket);
  394. errno = ENOSYS;
  395. return BHT_ERROR;
  396. }
  397. int
  398. os_socket_set_tcp_keep_intvl(bh_socket_t socket, uint32 time_s)
  399. {
  400. CHECK_VALID_SOCKET_HANDLE(socket);
  401. errno = ENOSYS;
  402. return BHT_ERROR;
  403. }
  404. int
  405. os_socket_get_tcp_keep_intvl(bh_socket_t socket, uint32 *time_s)
  406. {
  407. CHECK_VALID_SOCKET_HANDLE(socket);
  408. errno = ENOSYS;
  409. return BHT_ERROR;
  410. }
  411. int
  412. os_socket_set_tcp_fastopen_connect(bh_socket_t socket, bool is_enabled)
  413. {
  414. CHECK_VALID_SOCKET_HANDLE(socket);
  415. errno = ENOSYS;
  416. return BHT_ERROR;
  417. }
  418. int
  419. os_socket_get_tcp_fastopen_connect(bh_socket_t socket, bool *is_enabled)
  420. {
  421. CHECK_VALID_SOCKET_HANDLE(socket);
  422. errno = ENOSYS;
  423. return BHT_ERROR;
  424. }
  425. int
  426. os_socket_set_ip_multicast_loop(bh_socket_t socket, bool ipv6, bool is_enabled)
  427. {
  428. CHECK_VALID_SOCKET_HANDLE(socket);
  429. errno = ENOSYS;
  430. return BHT_ERROR;
  431. }
  432. int
  433. os_socket_get_ip_multicast_loop(bh_socket_t socket, bool ipv6, bool *is_enabled)
  434. {
  435. CHECK_VALID_SOCKET_HANDLE(socket);
  436. errno = ENOSYS;
  437. return BHT_ERROR;
  438. }
  439. int
  440. os_socket_set_ip_add_membership(bh_socket_t socket,
  441. bh_ip_addr_buffer_t *imr_multiaddr,
  442. uint32_t imr_interface, bool is_ipv6)
  443. {
  444. CHECK_VALID_SOCKET_HANDLE(socket);
  445. errno = ENOSYS;
  446. return BHT_ERROR;
  447. }
  448. int
  449. os_socket_set_ip_drop_membership(bh_socket_t socket,
  450. bh_ip_addr_buffer_t *imr_multiaddr,
  451. uint32_t imr_interface, bool is_ipv6)
  452. {
  453. CHECK_VALID_SOCKET_HANDLE(socket);
  454. errno = ENOSYS;
  455. return BHT_ERROR;
  456. }
  457. int
  458. os_socket_set_ip_ttl(bh_socket_t socket, uint8_t ttl_s)
  459. {
  460. CHECK_VALID_SOCKET_HANDLE(socket);
  461. errno = ENOSYS;
  462. return BHT_ERROR;
  463. }
  464. int
  465. os_socket_get_ip_ttl(bh_socket_t socket, uint8_t *ttl_s)
  466. {
  467. CHECK_VALID_SOCKET_HANDLE(socket);
  468. errno = ENOSYS;
  469. return BHT_ERROR;
  470. }
  471. int
  472. os_socket_set_ip_multicast_ttl(bh_socket_t socket, uint8_t ttl_s)
  473. {
  474. CHECK_VALID_SOCKET_HANDLE(socket);
  475. errno = ENOSYS;
  476. return BHT_ERROR;
  477. }
  478. int
  479. os_socket_get_ip_multicast_ttl(bh_socket_t socket, uint8_t *ttl_s)
  480. {
  481. CHECK_VALID_SOCKET_HANDLE(socket);
  482. errno = ENOSYS;
  483. return BHT_ERROR;
  484. }
  485. int
  486. os_socket_set_ipv6_only(bh_socket_t socket, bool option)
  487. {
  488. CHECK_VALID_SOCKET_HANDLE(socket);
  489. errno = ENOSYS;
  490. return BHT_ERROR;
  491. }
  492. int
  493. os_socket_get_ipv6_only(bh_socket_t socket, bool *option)
  494. {
  495. CHECK_VALID_SOCKET_HANDLE(socket);
  496. errno = ENOSYS;
  497. return BHT_ERROR;
  498. }
  499. int
  500. os_socket_set_broadcast(bh_socket_t socket, bool is_enabled)
  501. {
  502. CHECK_VALID_SOCKET_HANDLE(socket);
  503. errno = ENOSYS;
  504. return BHT_ERROR;
  505. }
  506. int
  507. os_socket_get_broadcast(bh_socket_t socket, bool *is_enabled)
  508. {
  509. CHECK_VALID_SOCKET_HANDLE(socket);
  510. errno = ENOSYS;
  511. return BHT_ERROR;
  512. }