espidf_socket.c 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. /*
  2. * Copyright (C) 2021 Intel Corporation. All rights reserved.
  3. * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  4. */
  5. #include "platform_api_vmcore.h"
  6. #include "platform_api_extension.h"
  7. #include <arpa/inet.h>
  8. static void
  9. textual_addr_to_sockaddr(const char *textual, int port, struct sockaddr_in *out)
  10. {
  11. assert(textual);
  12. out->sin_family = AF_INET;
  13. out->sin_port = htons(port);
  14. out->sin_addr.s_addr = inet_addr(textual);
  15. }
  16. static int
  17. sockaddr_to_bh_sockaddr(const struct sockaddr *sockaddr, socklen_t socklen,
  18. bh_sockaddr_t *bh_sockaddr)
  19. {
  20. switch (sockaddr->sa_family) {
  21. case AF_INET:
  22. {
  23. struct sockaddr_in *addr = (struct sockaddr_in *)sockaddr;
  24. assert(socklen >= sizeof(struct sockaddr_in));
  25. bh_sockaddr->port = ntohs(addr->sin_port);
  26. bh_sockaddr->addr_bufer.ipv4 = ntohl(addr->sin_addr.s_addr);
  27. bh_sockaddr->is_ipv4 = true;
  28. return BHT_OK;
  29. }
  30. default:
  31. errno = EAFNOSUPPORT;
  32. return BHT_ERROR;
  33. }
  34. }
  35. int
  36. os_socket_create(bh_socket_t *sock, bool is_ipv4, bool is_tcp)
  37. {
  38. if (!sock) {
  39. return BHT_ERROR;
  40. }
  41. if (is_tcp) {
  42. *sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  43. }
  44. else {
  45. *sock = socket(AF_INET, SOCK_DGRAM, 0);
  46. }
  47. return (*sock == -1) ? BHT_ERROR : BHT_OK;
  48. }
  49. int
  50. os_socket_bind(bh_socket_t socket, const char *host, int *port)
  51. {
  52. struct sockaddr_in addr;
  53. socklen_t socklen;
  54. int ret;
  55. assert(host);
  56. assert(port);
  57. addr.sin_addr.s_addr = inet_addr(host);
  58. addr.sin_port = htons(*port);
  59. addr.sin_family = AF_INET;
  60. ret = bind(socket, (struct sockaddr *)&addr, sizeof(addr));
  61. if (ret < 0) {
  62. goto fail;
  63. }
  64. socklen = sizeof(addr);
  65. if (getsockname(socket, (struct sockaddr *)&addr, &socklen) == -1) {
  66. goto fail;
  67. }
  68. *port = ntohs(addr.sin_port);
  69. return BHT_OK;
  70. fail:
  71. return BHT_ERROR;
  72. }
  73. int
  74. os_socket_settimeout(bh_socket_t socket, uint64 timeout_us)
  75. {
  76. struct timeval tv;
  77. tv.tv_sec = timeout_us / 1000000UL;
  78. tv.tv_usec = timeout_us % 1000000UL;
  79. if (setsockopt(socket, SOL_SOCKET, SO_RCVTIMEO, (const char *)&tv,
  80. sizeof(tv))
  81. != 0) {
  82. return BHT_ERROR;
  83. }
  84. return BHT_OK;
  85. }
  86. int
  87. os_socket_listen(bh_socket_t socket, int max_client)
  88. {
  89. if (listen(socket, max_client) != 0) {
  90. return BHT_ERROR;
  91. }
  92. return BHT_OK;
  93. }
  94. int
  95. os_socket_accept(bh_socket_t server_sock, bh_socket_t *sock, void *addr,
  96. unsigned int *addrlen)
  97. {
  98. struct sockaddr addr_tmp;
  99. socklen_t len = sizeof(struct sockaddr);
  100. *sock = accept(server_sock, (struct sockaddr *)&addr_tmp, &len);
  101. if (*sock < 0) {
  102. return BHT_ERROR;
  103. }
  104. return BHT_OK;
  105. }
  106. int
  107. os_socket_connect(bh_socket_t socket, const char *addr, int port)
  108. {
  109. struct sockaddr_in addr_in = { 0 };
  110. socklen_t addr_len = sizeof(struct sockaddr_in);
  111. int ret = 0;
  112. textual_addr_to_sockaddr(addr, port, &addr_in);
  113. ret = connect(socket, (struct sockaddr *)&addr_in, addr_len);
  114. if (ret == -1) {
  115. return BHT_ERROR;
  116. }
  117. return BHT_OK;
  118. }
  119. int
  120. os_socket_recv(bh_socket_t socket, void *buf, unsigned int len)
  121. {
  122. return recv(socket, buf, len, 0);
  123. }
  124. int
  125. os_socket_send(bh_socket_t socket, const void *buf, unsigned int len)
  126. {
  127. return send(socket, buf, len, 0);
  128. }
  129. int
  130. os_socket_close(bh_socket_t socket)
  131. {
  132. close(socket);
  133. return BHT_OK;
  134. }
  135. int
  136. os_socket_shutdown(bh_socket_t socket)
  137. {
  138. shutdown(socket, O_RDWR);
  139. return BHT_OK;
  140. }
  141. int
  142. os_socket_inet_network(bool is_ipv4, const char *cp, bh_ip_addr_buffer_t *out)
  143. {
  144. if (!cp)
  145. return BHT_ERROR;
  146. if (is_ipv4) {
  147. if (inet_pton(AF_INET, cp, &out->ipv4) != 1) {
  148. return BHT_ERROR;
  149. }
  150. /* Note: ntohl(INADDR_NONE) == INADDR_NONE */
  151. out->ipv4 = ntohl(out->ipv4);
  152. }
  153. else {
  154. if (inet_pton(AF_INET6, cp, out->ipv6) != 1) {
  155. return BHT_ERROR;
  156. }
  157. for (int i = 0; i < 8; i++) {
  158. out->ipv6[i] = ntohs(out->ipv6[i]);
  159. }
  160. }
  161. return BHT_OK;
  162. }
  163. int
  164. os_socket_addr_remote(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  165. {
  166. struct sockaddr_in addr;
  167. socklen_t addr_len = sizeof(addr);
  168. if (getpeername(socket, (struct sockaddr *)&addr, &addr_len) == -1) {
  169. return BHT_ERROR;
  170. }
  171. return sockaddr_to_bh_sockaddr((struct sockaddr *)&addr, addr_len,
  172. sockaddr);
  173. }
  174. int
  175. os_socket_addr_local(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  176. {
  177. struct sockaddr_in addr;
  178. socklen_t addr_len = sizeof(addr);
  179. if (getsockname(socket, (struct sockaddr *)&addr, &addr_len) == -1) {
  180. return BHT_ERROR;
  181. }
  182. return sockaddr_to_bh_sockaddr((struct sockaddr *)&addr, addr_len,
  183. sockaddr);
  184. }