win_socket.c 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541
  1. /*
  2. * Copyright (C) 2021 Intel Corporation. All rights reserved.
  3. * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  4. */
  5. #include "platform_api_vmcore.h"
  6. #include "platform_api_extension.h"
  7. /* link with Ws2_32.lib */
  8. #pragma comment(lib, "ws2_32.lib")
  9. static bool is_winsock_inited = false;
  10. int
  11. init_winsock()
  12. {
  13. WSADATA wsaData;
  14. if (!is_winsock_inited) {
  15. if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) {
  16. os_printf("winsock init failed");
  17. return BHT_ERROR;
  18. }
  19. is_winsock_inited = true;
  20. }
  21. return BHT_OK;
  22. }
  23. void
  24. deinit_winsock()
  25. {
  26. if (is_winsock_inited) {
  27. WSACleanup();
  28. }
  29. }
  30. int
  31. os_socket_create(bh_socket_t *sock, bool is_ipv4, bool is_tcp)
  32. {
  33. int af;
  34. if (!sock) {
  35. return BHT_ERROR;
  36. }
  37. if (is_ipv4) {
  38. af = AF_INET;
  39. }
  40. else {
  41. errno = ENOSYS;
  42. return BHT_ERROR;
  43. }
  44. if (is_tcp) {
  45. *sock = socket(af, SOCK_STREAM, IPPROTO_TCP);
  46. }
  47. else {
  48. *sock = socket(af, SOCK_DGRAM, 0);
  49. }
  50. return (*sock == -1) ? BHT_ERROR : BHT_OK;
  51. }
  52. int
  53. os_socket_bind(bh_socket_t socket, const char *host, int *port)
  54. {
  55. struct sockaddr_in addr;
  56. int socklen, ret;
  57. assert(host);
  58. assert(port);
  59. addr.sin_addr.s_addr = inet_addr(host);
  60. addr.sin_port = htons(*port);
  61. addr.sin_family = AF_INET;
  62. ret = bind(socket, (struct sockaddr *)&addr, sizeof(addr));
  63. if (ret < 0) {
  64. goto fail;
  65. }
  66. socklen = sizeof(addr);
  67. if (getsockname(socket, (void *)&addr, &socklen) == -1) {
  68. os_printf("getsockname failed with error %d\n", WSAGetLastError());
  69. goto fail;
  70. }
  71. *port = ntohs(addr.sin_port);
  72. return BHT_OK;
  73. fail:
  74. return BHT_ERROR;
  75. }
  76. int
  77. os_socket_settimeout(bh_socket_t socket, uint64 timeout_us)
  78. {
  79. DWORD tv = (DWORD)(timeout_us / 1000UL);
  80. if (setsockopt(socket, SOL_SOCKET, SO_RCVTIMEO, (const char *)&tv,
  81. sizeof(tv))
  82. != 0) {
  83. return BHT_ERROR;
  84. }
  85. return BHT_OK;
  86. }
  87. int
  88. os_socket_listen(bh_socket_t socket, int max_client)
  89. {
  90. if (listen(socket, max_client) != 0) {
  91. os_printf("socket listen failed with error %d\n", WSAGetLastError());
  92. return BHT_ERROR;
  93. }
  94. return BHT_OK;
  95. }
  96. int
  97. os_socket_accept(bh_socket_t server_sock, bh_socket_t *sock, void *addr,
  98. unsigned int *addrlen)
  99. {
  100. struct sockaddr addr_tmp;
  101. unsigned int len = sizeof(struct sockaddr);
  102. *sock = accept(server_sock, (struct sockaddr *)&addr_tmp, &len);
  103. if (*sock < 0) {
  104. os_printf("socket accept failed with error %d\n", WSAGetLastError());
  105. return BHT_ERROR;
  106. }
  107. return BHT_OK;
  108. }
  109. int
  110. os_socket_recv(bh_socket_t socket, void *buf, unsigned int len)
  111. {
  112. return recv(socket, buf, len, 0);
  113. }
  114. int
  115. os_socket_recv_from(bh_socket_t socket, void *buf, unsigned int len, int flags,
  116. bh_sockaddr_t *src_addr)
  117. {
  118. errno = ENOSYS;
  119. return BHT_ERROR;
  120. }
  121. int
  122. os_socket_send(bh_socket_t socket, const void *buf, unsigned int len)
  123. {
  124. return send(socket, buf, len, 0);
  125. }
  126. int
  127. os_socket_send_to(bh_socket_t socket, const void *buf, unsigned int len,
  128. int flags, const bh_sockaddr_t *dest_addr)
  129. {
  130. errno = ENOSYS;
  131. return BHT_ERROR;
  132. }
  133. int
  134. os_socket_close(bh_socket_t socket)
  135. {
  136. closesocket(socket);
  137. return BHT_OK;
  138. }
  139. int
  140. os_socket_shutdown(bh_socket_t socket)
  141. {
  142. shutdown(socket, SD_BOTH);
  143. return BHT_OK;
  144. }
  145. int
  146. os_socket_inet_network(bool is_ipv4, const char *cp, bh_ip_addr_buffer_t *out)
  147. {
  148. if (!cp)
  149. return BHT_ERROR;
  150. if (is_ipv4) {
  151. if (inet_pton(AF_INET, cp, &out->ipv4) != 1) {
  152. return BHT_ERROR;
  153. }
  154. /* Note: ntohl(INADDR_NONE) == INADDR_NONE */
  155. out->ipv4 = ntohl(out->ipv4);
  156. }
  157. else {
  158. if (inet_pton(AF_INET6, cp, out->ipv6) != 1) {
  159. return BHT_ERROR;
  160. }
  161. for (int i = 0; i < 8; i++) {
  162. out->ipv6[i] = ntohs(out->ipv6[i]);
  163. }
  164. }
  165. return BHT_OK;
  166. }
  167. int
  168. os_socket_addr_resolve(const char *host, const char *service,
  169. uint8_t *hint_is_tcp, uint8_t *hint_is_ipv4,
  170. bh_addr_info_t *addr_info, size_t addr_info_size,
  171. size_t *max_info_size)
  172. {
  173. errno = ENOSYS;
  174. return BHT_ERROR;
  175. }
  176. int
  177. os_socket_addr_local(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  178. {
  179. errno = ENOSYS;
  180. return BHT_ERROR;
  181. }
  182. int
  183. os_socket_set_send_timeout(bh_socket_t socket, uint64 timeout_us)
  184. {
  185. errno = ENOSYS;
  186. return BHT_ERROR;
  187. }
  188. int
  189. os_socket_get_send_timeout(bh_socket_t socket, uint64 *timeout_us)
  190. {
  191. errno = ENOSYS;
  192. return BHT_ERROR;
  193. }
  194. int
  195. os_socket_set_recv_timeout(bh_socket_t socket, uint64 timeout_us)
  196. {
  197. errno = ENOSYS;
  198. return BHT_ERROR;
  199. }
  200. int
  201. os_socket_get_recv_timeout(bh_socket_t socket, uint64 *timeout_us)
  202. {
  203. errno = ENOSYS;
  204. return BHT_ERROR;
  205. }
  206. int
  207. os_socket_addr_remote(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  208. {
  209. errno = ENOSYS;
  210. return BHT_ERROR;
  211. }
  212. int
  213. os_socket_set_send_buf_size(bh_socket_t socket, size_t bufsiz)
  214. {
  215. errno = ENOSYS;
  216. return BHT_ERROR;
  217. }
  218. int
  219. os_socket_get_send_buf_size(bh_socket_t socket, size_t *bufsiz)
  220. {
  221. errno = ENOSYS;
  222. return BHT_ERROR;
  223. }
  224. int
  225. os_socket_set_recv_buf_size(bh_socket_t socket, size_t bufsiz)
  226. {
  227. errno = ENOSYS;
  228. return BHT_ERROR;
  229. }
  230. int
  231. os_socket_get_recv_buf_size(bh_socket_t socket, size_t *bufsiz)
  232. {
  233. errno = ENOSYS;
  234. return BHT_ERROR;
  235. }
  236. int
  237. os_socket_set_keep_alive(bh_socket_t socket, bool is_enabled)
  238. {
  239. errno = ENOSYS;
  240. return BHT_ERROR;
  241. }
  242. int
  243. os_socket_get_keep_alive(bh_socket_t socket, bool *is_enabled)
  244. {
  245. errno = ENOSYS;
  246. return BHT_ERROR;
  247. }
  248. int
  249. os_socket_set_reuse_addr(bh_socket_t socket, bool is_enabled)
  250. {
  251. errno = ENOSYS;
  252. return BHT_ERROR;
  253. }
  254. int
  255. os_socket_get_reuse_addr(bh_socket_t socket, bool *is_enabled)
  256. {
  257. errno = ENOSYS;
  258. return BHT_ERROR;
  259. }
  260. int
  261. os_socket_set_reuse_port(bh_socket_t socket, bool is_enabled)
  262. {
  263. errno = ENOSYS;
  264. return BHT_ERROR;
  265. }
  266. int
  267. os_socket_get_reuse_port(bh_socket_t socket, bool *is_enabled)
  268. {
  269. errno = ENOSYS;
  270. return BHT_ERROR;
  271. }
  272. int
  273. os_socket_set_linger(bh_socket_t socket, bool is_enabled, int linger_s)
  274. {
  275. errno = ENOSYS;
  276. return BHT_ERROR;
  277. }
  278. int
  279. os_socket_get_linger(bh_socket_t socket, bool *is_enabled, int *linger_s)
  280. {
  281. errno = ENOSYS;
  282. return BHT_ERROR;
  283. }
  284. int
  285. os_socket_set_tcp_no_delay(bh_socket_t socket, bool is_enabled)
  286. {
  287. errno = ENOSYS;
  288. return BHT_ERROR;
  289. }
  290. int
  291. os_socket_get_tcp_no_delay(bh_socket_t socket, bool *is_enabled)
  292. {
  293. errno = ENOSYS;
  294. return BHT_ERROR;
  295. }
  296. int
  297. os_socket_set_tcp_quick_ack(bh_socket_t socket, bool is_enabled)
  298. {
  299. errno = ENOSYS;
  300. return BHT_ERROR;
  301. }
  302. int
  303. os_socket_get_tcp_quick_ack(bh_socket_t socket, bool *is_enabled)
  304. {
  305. errno = ENOSYS;
  306. return BHT_ERROR;
  307. }
  308. int
  309. os_socket_set_tcp_keep_idle(bh_socket_t socket, uint32 time_s)
  310. {
  311. errno = ENOSYS;
  312. return BHT_ERROR;
  313. }
  314. int
  315. os_socket_get_tcp_keep_idle(bh_socket_t socket, uint32 *time_s)
  316. {
  317. errno = ENOSYS;
  318. return BHT_ERROR;
  319. }
  320. int
  321. os_socket_set_tcp_keep_intvl(bh_socket_t socket, uint32 time_s)
  322. {
  323. errno = ENOSYS;
  324. return BHT_ERROR;
  325. }
  326. int
  327. os_socket_get_tcp_keep_intvl(bh_socket_t socket, uint32 *time_s)
  328. {
  329. errno = ENOSYS;
  330. return BHT_ERROR;
  331. }
  332. int
  333. os_socket_set_tcp_fastopen_connect(bh_socket_t socket, bool is_enabled)
  334. {
  335. errno = ENOSYS;
  336. return BHT_ERROR;
  337. }
  338. int
  339. os_socket_get_tcp_fastopen_connect(bh_socket_t socket, bool *is_enabled)
  340. {
  341. errno = ENOSYS;
  342. return BHT_ERROR;
  343. }
  344. int
  345. os_socket_set_ip_multicast_loop(bh_socket_t socket, bool ipv6, bool is_enabled)
  346. {
  347. errno = ENOSYS;
  348. return BHT_ERROR;
  349. }
  350. int
  351. os_socket_get_ip_multicast_loop(bh_socket_t socket, bool ipv6, bool *is_enabled)
  352. {
  353. errno = ENOSYS;
  354. return BHT_ERROR;
  355. }
  356. int
  357. os_socket_set_ip_add_membership(bh_socket_t socket,
  358. bh_ip_addr_buffer_t *imr_multiaddr,
  359. uint32_t imr_interface, bool is_ipv6)
  360. {
  361. errno = ENOSYS;
  362. return BHT_ERROR;
  363. }
  364. int
  365. os_socket_set_ip_drop_membership(bh_socket_t socket,
  366. bh_ip_addr_buffer_t *imr_multiaddr,
  367. uint32_t imr_interface, bool is_ipv6)
  368. {
  369. errno = ENOSYS;
  370. return BHT_ERROR;
  371. }
  372. int
  373. os_socket_set_ip_ttl(bh_socket_t socket, uint8_t ttl_s)
  374. {
  375. errno = ENOSYS;
  376. return BHT_ERROR;
  377. }
  378. int
  379. os_socket_get_ip_ttl(bh_socket_t socket, uint8_t *ttl_s)
  380. {
  381. errno = ENOSYS;
  382. return BHT_ERROR;
  383. }
  384. int
  385. os_socket_set_ip_multicast_ttl(bh_socket_t socket, uint8_t ttl_s)
  386. {
  387. errno = ENOSYS;
  388. return BHT_ERROR;
  389. }
  390. int
  391. os_socket_get_ip_multicast_ttl(bh_socket_t socket, uint8_t *ttl_s)
  392. {
  393. errno = ENOSYS;
  394. return BHT_ERROR;
  395. }
  396. int
  397. os_socket_set_ipv6_only(bh_socket_t socket, bool option)
  398. {
  399. errno = ENOSYS;
  400. return BHT_ERROR;
  401. }
  402. int
  403. os_socket_get_ipv6_only(bh_socket_t socket, bool *option)
  404. {
  405. errno = ENOSYS;
  406. return BHT_ERROR;
  407. }
  408. int
  409. os_socket_set_broadcast(bh_socket_t socket, bool is_enabled)
  410. {
  411. errno = ENOSYS;
  412. return BHT_ERROR;
  413. }
  414. int
  415. os_socket_get_broadcast(bh_socket_t socket, bool *is_enabled)
  416. {
  417. errno = ENOSYS;
  418. return BHT_ERROR;
  419. }