win_socket.c 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219
  1. /*
  2. * Copyright (C) 2021 Intel Corporation. All rights reserved.
  3. * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  4. */
  5. #include "platform_api_vmcore.h"
  6. #include "platform_api_extension.h"
  7. /* link with Ws2_32.lib */
  8. #pragma comment(lib, "ws2_32.lib")
  9. static bool is_winsock_inited = false;
  10. int
  11. init_winsock()
  12. {
  13. WSADATA wsaData;
  14. if (!is_winsock_inited) {
  15. if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) {
  16. os_printf("winsock init failed");
  17. return BHT_ERROR;
  18. }
  19. is_winsock_inited = true;
  20. }
  21. return BHT_OK;
  22. }
  23. void
  24. deinit_winsock()
  25. {
  26. if (is_winsock_inited) {
  27. WSACleanup();
  28. }
  29. }
  30. int
  31. os_socket_create(bh_socket_t *sock, bool is_ipv4, bool is_tcp)
  32. {
  33. int af;
  34. if (!sock) {
  35. return BHT_ERROR;
  36. }
  37. if (is_ipv4) {
  38. af = AF_INET;
  39. }
  40. else {
  41. errno = ENOSYS;
  42. return BHT_ERROR;
  43. }
  44. if (is_tcp) {
  45. *sock = socket(af, SOCK_STREAM, IPPROTO_TCP);
  46. }
  47. else {
  48. *sock = socket(af, SOCK_DGRAM, 0);
  49. }
  50. return (*sock == -1) ? BHT_ERROR : BHT_OK;
  51. }
  52. int
  53. os_socket_bind(bh_socket_t socket, const char *host, int *port)
  54. {
  55. struct sockaddr_in addr;
  56. int socklen, ret;
  57. assert(host);
  58. assert(port);
  59. addr.sin_addr.s_addr = inet_addr(host);
  60. addr.sin_port = htons(*port);
  61. addr.sin_family = AF_INET;
  62. ret = bind(socket, (struct sockaddr *)&addr, sizeof(addr));
  63. if (ret < 0) {
  64. goto fail;
  65. }
  66. socklen = sizeof(addr);
  67. if (getsockname(socket, (void *)&addr, &socklen) == -1) {
  68. os_printf("getsockname failed with error %d\n", WSAGetLastError());
  69. goto fail;
  70. }
  71. *port = ntohs(addr.sin_port);
  72. return BHT_OK;
  73. fail:
  74. return BHT_ERROR;
  75. }
  76. int
  77. os_socket_settimeout(bh_socket_t socket, uint64 timeout_us)
  78. {
  79. DWORD tv = (DWORD)(timeout_us / 1000UL);
  80. if (setsockopt(socket, SOL_SOCKET, SO_RCVTIMEO, (const char *)&tv,
  81. sizeof(tv))
  82. != 0) {
  83. return BHT_ERROR;
  84. }
  85. return BHT_OK;
  86. }
  87. int
  88. os_socket_listen(bh_socket_t socket, int max_client)
  89. {
  90. if (listen(socket, max_client) != 0) {
  91. os_printf("socket listen failed with error %d\n", WSAGetLastError());
  92. return BHT_ERROR;
  93. }
  94. return BHT_OK;
  95. }
  96. int
  97. os_socket_accept(bh_socket_t server_sock, bh_socket_t *sock, void *addr,
  98. unsigned int *addrlen)
  99. {
  100. struct sockaddr addr_tmp;
  101. unsigned int len = sizeof(struct sockaddr);
  102. *sock = accept(server_sock, (struct sockaddr *)&addr_tmp, &len);
  103. if (*sock < 0) {
  104. os_printf("socket accept failed with error %d\n", WSAGetLastError());
  105. return BHT_ERROR;
  106. }
  107. return BHT_OK;
  108. }
  109. int
  110. os_socket_recv(bh_socket_t socket, void *buf, unsigned int len)
  111. {
  112. return recv(socket, buf, len, 0);
  113. }
  114. int
  115. os_socket_send(bh_socket_t socket, const void *buf, unsigned int len)
  116. {
  117. return send(socket, buf, len, 0);
  118. }
  119. int
  120. os_socket_close(bh_socket_t socket)
  121. {
  122. closesocket(socket);
  123. return BHT_OK;
  124. }
  125. int
  126. os_socket_shutdown(bh_socket_t socket)
  127. {
  128. shutdown(socket, SD_BOTH);
  129. return BHT_OK;
  130. }
  131. int
  132. os_socket_inet_network(bool is_ipv4, const char *cp,
  133. bh_inet_network_output_t *out)
  134. {
  135. if (!cp)
  136. return BHT_ERROR;
  137. if (is_ipv4) {
  138. if (inet_pton(AF_INET, cp, &out->ipv4) != 1) {
  139. return BHT_ERROR;
  140. }
  141. /* Note: ntohl(INADDR_NONE) == INADDR_NONE */
  142. out->ipv4 = ntohl(out->ipv4);
  143. }
  144. else {
  145. if (inet_pton(AF_INET6, cp, out->ipv6) != 1) {
  146. return BHT_ERROR;
  147. }
  148. for (int i = 0; i < 8; i++) {
  149. out->ipv6[i] = ntohs(out->ipv6[i]);
  150. }
  151. }
  152. return BHT_OK;
  153. }
  154. int
  155. os_socket_addr_resolve(const char *host, const char *service,
  156. uint8_t *hint_is_tcp, uint8_t *hint_is_ipv4,
  157. bh_addr_info_t *addr_info, size_t addr_info_size,
  158. size_t *max_info_size)
  159. {
  160. errno = ENOSYS;
  161. return BHT_ERROR;
  162. }
  163. int
  164. os_socket_addr_local(bh_socket_t socket, uint8_t *buf, size_t buflen,
  165. uint16_t *port, uint8_t *is_ipv4)
  166. {
  167. errno = ENOSYS;
  168. return BHT_ERROR;
  169. }
  170. int
  171. os_socket_addr_remote(bh_socket_t socket, uint8_t *buf, size_t buflen,
  172. uint16_t *port, uint8_t *is_ipv4)
  173. {
  174. errno = ENOSYS;
  175. return BHT_ERROR;
  176. }