win_socket.c 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164
  1. /*
  2. * Copyright (C) 2021 Intel Corporation. All rights reserved.
  3. * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  4. */
  5. #include "platform_api_vmcore.h"
  6. #include "platform_api_extension.h"
  7. /* link with Ws2_32.lib */
  8. #pragma comment(lib, "ws2_32.lib")
  9. static bool is_winsock_inited = false;
  10. int
  11. init_winsock()
  12. {
  13. WSADATA wsaData;
  14. if (!is_winsock_inited) {
  15. if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) {
  16. os_printf("winsock init failed");
  17. return BHT_ERROR;
  18. }
  19. is_winsock_inited = true;
  20. }
  21. return BHT_OK;
  22. }
  23. void
  24. deinit_winsock()
  25. {
  26. if (is_winsock_inited) {
  27. WSACleanup();
  28. }
  29. }
  30. int
  31. os_socket_create(bh_socket_t *sock, int tcp_or_udp)
  32. {
  33. if (!sock) {
  34. return BHT_ERROR;
  35. }
  36. if (1 == tcp_or_udp) {
  37. *sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  38. }
  39. else if (0 == tcp_or_udp) {
  40. *sock = socket(AF_INET, SOCK_DGRAM, 0);
  41. }
  42. return (*sock == -1) ? BHT_ERROR : BHT_OK;
  43. }
  44. int
  45. os_socket_bind(bh_socket_t socket, const char *host, int *port)
  46. {
  47. struct sockaddr_in addr;
  48. int socklen, ret;
  49. assert(host);
  50. assert(port);
  51. addr.sin_addr.s_addr = inet_addr(host);
  52. addr.sin_port = htons(*port);
  53. addr.sin_family = AF_INET;
  54. ret = bind(socket, (struct sockaddr *)&addr, sizeof(addr));
  55. if (ret < 0) {
  56. goto fail;
  57. }
  58. socklen = sizeof(addr);
  59. if (getsockname(socket, (void *)&addr, &socklen) == -1) {
  60. os_printf("getsockname failed with error %d\n", WSAGetLastError());
  61. goto fail;
  62. }
  63. *port = ntohs(addr.sin_port);
  64. return BHT_OK;
  65. fail:
  66. return BHT_ERROR;
  67. }
  68. int
  69. os_socket_settimeout(bh_socket_t socket, uint64 timeout_us)
  70. {
  71. DWORD tv = (DWORD)(timeout_us / 1000UL);
  72. if (setsockopt(socket, SOL_SOCKET, SO_RCVTIMEO, (const char *)&tv,
  73. sizeof(tv))
  74. != 0) {
  75. return BHT_ERROR;
  76. }
  77. return BHT_OK;
  78. }
  79. int
  80. os_socket_listen(bh_socket_t socket, int max_client)
  81. {
  82. if (listen(socket, max_client) != 0) {
  83. os_printf("socket listen failed with error %d\n", WSAGetLastError());
  84. return BHT_ERROR;
  85. }
  86. return BHT_OK;
  87. }
  88. int
  89. os_socket_accept(bh_socket_t server_sock, bh_socket_t *sock, void *addr,
  90. unsigned int *addrlen)
  91. {
  92. struct sockaddr addr_tmp;
  93. unsigned int len = sizeof(struct sockaddr);
  94. *sock = accept(server_sock, (struct sockaddr *)&addr_tmp, &len);
  95. if (*sock < 0) {
  96. os_printf("socket accept failed with error %d\n", WSAGetLastError());
  97. return BHT_ERROR;
  98. }
  99. return BHT_OK;
  100. }
  101. int
  102. os_socket_recv(bh_socket_t socket, void *buf, unsigned int len)
  103. {
  104. return recv(socket, buf, len, 0);
  105. }
  106. int
  107. os_socket_send(bh_socket_t socket, const void *buf, unsigned int len)
  108. {
  109. return send(socket, buf, len, 0);
  110. }
  111. int
  112. os_socket_close(bh_socket_t socket)
  113. {
  114. closesocket(socket);
  115. return BHT_OK;
  116. }
  117. int
  118. os_socket_shutdown(bh_socket_t socket)
  119. {
  120. shutdown(socket, SD_BOTH);
  121. return BHT_OK;
  122. }
  123. int
  124. os_socket_inet_network(const char *cp, uint32 *out)
  125. {
  126. if (!cp)
  127. return BHT_ERROR;
  128. *out = inet_addr(cp);
  129. return BHT_OK;
  130. }