win_socket.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701
  1. /*
  2. * Copyright (C) 2021 Intel Corporation. All rights reserved.
  3. * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  4. */
  5. #include "platform_api_vmcore.h"
  6. #include "platform_api_extension.h"
  7. #include "platform_wasi_types.h"
  8. #include "win_util.h"
  9. /* link with Ws2_32.lib */
  10. #pragma comment(lib, "ws2_32.lib")
  11. static bool is_winsock_inited = false;
  12. #define CHECK_VALID_SOCKET_HANDLE(win_handle) \
  13. do { \
  14. if ((win_handle) == NULL) { \
  15. errno = EBADF; \
  16. return BHT_ERROR; \
  17. } \
  18. if ((win_handle)->type != windows_handle_type_socket) { \
  19. errno = ENOTSOCK; \
  20. return BHT_ERROR; \
  21. } \
  22. if ((win_handle)->raw.socket == INVALID_SOCKET) { \
  23. errno = EBADF; \
  24. return BHT_ERROR; \
  25. } \
  26. } while (0)
  27. int
  28. init_winsock()
  29. {
  30. WSADATA wsaData;
  31. if (!is_winsock_inited) {
  32. if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) {
  33. os_printf("winsock init failed");
  34. return BHT_ERROR;
  35. }
  36. is_winsock_inited = true;
  37. }
  38. return BHT_OK;
  39. }
  40. void
  41. deinit_winsock()
  42. {
  43. if (is_winsock_inited) {
  44. WSACleanup();
  45. }
  46. }
  47. int
  48. os_socket_create(bh_socket_t *sock, bool is_ipv4, bool is_tcp)
  49. {
  50. int af;
  51. if (!sock) {
  52. return BHT_ERROR;
  53. }
  54. *(sock) = BH_MALLOC(sizeof(windows_handle));
  55. if ((*sock) == NULL) {
  56. errno = ENOMEM;
  57. return BHT_ERROR;
  58. }
  59. (*sock)->type = windows_handle_type_socket;
  60. (*sock)->access_mode = windows_access_mode_read | windows_access_mode_write;
  61. (*sock)->fdflags = 0;
  62. if (is_ipv4) {
  63. af = AF_INET;
  64. }
  65. else {
  66. errno = ENOSYS;
  67. return BHT_ERROR;
  68. }
  69. if (is_tcp) {
  70. (*sock)->raw.socket = socket(af, SOCK_STREAM, IPPROTO_TCP);
  71. }
  72. else {
  73. (*sock)->raw.socket = socket(af, SOCK_DGRAM, 0);
  74. }
  75. if ((*sock)->raw.socket == INVALID_SOCKET) {
  76. BH_FREE(*sock);
  77. return BHT_ERROR;
  78. }
  79. return BHT_OK;
  80. }
  81. int
  82. os_socket_bind(bh_socket_t socket, const char *host, int *port)
  83. {
  84. CHECK_VALID_SOCKET_HANDLE(socket);
  85. struct sockaddr_in addr;
  86. int socklen, ret;
  87. assert(host);
  88. assert(port);
  89. addr.sin_addr.s_addr = inet_addr(host);
  90. addr.sin_port = htons(*port);
  91. addr.sin_family = AF_INET;
  92. ret = bind(socket->raw.socket, (struct sockaddr *)&addr, sizeof(addr));
  93. if (ret < 0) {
  94. goto fail;
  95. }
  96. socklen = sizeof(addr);
  97. if (getsockname(socket->raw.socket, (void *)&addr, &socklen) == -1) {
  98. os_printf("getsockname failed with error %d\n", WSAGetLastError());
  99. goto fail;
  100. }
  101. *port = ntohs(addr.sin_port);
  102. return BHT_OK;
  103. fail:
  104. return BHT_ERROR;
  105. }
  106. int
  107. os_socket_settimeout(bh_socket_t socket, uint64 timeout_us)
  108. {
  109. CHECK_VALID_SOCKET_HANDLE(socket);
  110. DWORD tv = (DWORD)(timeout_us / 1000UL);
  111. if (setsockopt(socket->raw.socket, SOL_SOCKET, SO_RCVTIMEO,
  112. (const char *)&tv, sizeof(tv))
  113. != 0) {
  114. return BHT_ERROR;
  115. }
  116. return BHT_OK;
  117. }
  118. int
  119. os_socket_listen(bh_socket_t socket, int max_client)
  120. {
  121. CHECK_VALID_SOCKET_HANDLE(socket);
  122. if (listen(socket->raw.socket, max_client) != 0) {
  123. os_printf("socket listen failed with error %d\n", WSAGetLastError());
  124. return BHT_ERROR;
  125. }
  126. return BHT_OK;
  127. }
  128. int
  129. os_socket_accept(bh_socket_t server_sock, bh_socket_t *sock, void *addr,
  130. unsigned int *addrlen)
  131. {
  132. CHECK_VALID_SOCKET_HANDLE(server_sock);
  133. struct sockaddr addr_tmp;
  134. unsigned int len = sizeof(struct sockaddr);
  135. *sock = BH_MALLOC(sizeof(windows_handle));
  136. if (*sock == NULL) {
  137. errno = ENOMEM;
  138. return BHT_ERROR;
  139. }
  140. (*sock)->type = windows_handle_type_socket;
  141. (*sock)->access_mode = windows_access_mode_read | windows_access_mode_write;
  142. (*sock)->fdflags = 0;
  143. (*sock)->raw.socket =
  144. accept(server_sock->raw.socket, (struct sockaddr *)&addr_tmp, &len);
  145. if ((*sock)->raw.socket == INVALID_SOCKET) {
  146. BH_FREE(*sock);
  147. os_printf("socket accept failed with error %d\n", WSAGetLastError());
  148. return BHT_ERROR;
  149. }
  150. return BHT_OK;
  151. }
  152. int
  153. os_socket_recv(bh_socket_t socket, void *buf, unsigned int len)
  154. {
  155. CHECK_VALID_SOCKET_HANDLE(socket);
  156. return recv(socket->raw.socket, buf, len, 0);
  157. }
  158. int
  159. os_socket_recv_from(bh_socket_t socket, void *buf, unsigned int len, int flags,
  160. bh_sockaddr_t *src_addr)
  161. {
  162. CHECK_VALID_SOCKET_HANDLE(socket);
  163. errno = ENOSYS;
  164. return BHT_ERROR;
  165. }
  166. int
  167. os_socket_send(bh_socket_t socket, const void *buf, unsigned int len)
  168. {
  169. CHECK_VALID_SOCKET_HANDLE(socket);
  170. return send(socket->raw.socket, buf, len, 0);
  171. }
  172. int
  173. os_socket_send_to(bh_socket_t socket, const void *buf, unsigned int len,
  174. int flags, const bh_sockaddr_t *dest_addr)
  175. {
  176. CHECK_VALID_SOCKET_HANDLE(socket);
  177. errno = ENOSYS;
  178. return BHT_ERROR;
  179. }
  180. int
  181. os_socket_close(bh_socket_t socket)
  182. {
  183. CHECK_VALID_SOCKET_HANDLE(socket);
  184. closesocket(socket->raw.socket);
  185. BH_FREE(socket);
  186. return BHT_OK;
  187. }
  188. __wasi_errno_t
  189. os_socket_shutdown(bh_socket_t socket)
  190. {
  191. CHECK_VALID_SOCKET_HANDLE(socket);
  192. if (shutdown(socket->raw.socket, SD_BOTH) != 0) {
  193. return convert_winsock_error_code(WSAGetLastError());
  194. }
  195. return __WASI_ESUCCESS;
  196. }
  197. int
  198. os_socket_inet_network(bool is_ipv4, const char *cp, bh_ip_addr_buffer_t *out)
  199. {
  200. if (!cp)
  201. return BHT_ERROR;
  202. if (is_ipv4) {
  203. if (inet_pton(AF_INET, cp, &out->ipv4) != 1) {
  204. return BHT_ERROR;
  205. }
  206. /* Note: ntohl(INADDR_NONE) == INADDR_NONE */
  207. out->ipv4 = ntohl(out->ipv4);
  208. }
  209. else {
  210. if (inet_pton(AF_INET6, cp, out->ipv6) != 1) {
  211. return BHT_ERROR;
  212. }
  213. for (int i = 0; i < 8; i++) {
  214. out->ipv6[i] = ntohs(out->ipv6[i]);
  215. }
  216. }
  217. return BHT_OK;
  218. }
  219. int
  220. os_socket_connect(bh_socket_t socket, const char *addr, int port)
  221. {
  222. CHECK_VALID_SOCKET_HANDLE(socket);
  223. errno = ENOSYS;
  224. return BHT_ERROR;
  225. }
  226. int
  227. os_socket_addr_resolve(const char *host, const char *service,
  228. uint8_t *hint_is_tcp, uint8_t *hint_is_ipv4,
  229. bh_addr_info_t *addr_info, size_t addr_info_size,
  230. size_t *max_info_size)
  231. {
  232. errno = ENOSYS;
  233. return BHT_ERROR;
  234. }
  235. int
  236. os_socket_addr_local(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  237. {
  238. CHECK_VALID_SOCKET_HANDLE(socket);
  239. errno = ENOSYS;
  240. return BHT_ERROR;
  241. }
  242. int
  243. os_socket_set_send_timeout(bh_socket_t socket, uint64 timeout_us)
  244. {
  245. CHECK_VALID_SOCKET_HANDLE(socket);
  246. errno = ENOSYS;
  247. return BHT_ERROR;
  248. }
  249. int
  250. os_socket_get_send_timeout(bh_socket_t socket, uint64 *timeout_us)
  251. {
  252. CHECK_VALID_SOCKET_HANDLE(socket);
  253. errno = ENOSYS;
  254. return BHT_ERROR;
  255. }
  256. int
  257. os_socket_set_recv_timeout(bh_socket_t socket, uint64 timeout_us)
  258. {
  259. CHECK_VALID_SOCKET_HANDLE(socket);
  260. errno = ENOSYS;
  261. return BHT_ERROR;
  262. }
  263. int
  264. os_socket_get_recv_timeout(bh_socket_t socket, uint64 *timeout_us)
  265. {
  266. CHECK_VALID_SOCKET_HANDLE(socket);
  267. errno = ENOSYS;
  268. return BHT_ERROR;
  269. }
  270. int
  271. os_socket_addr_remote(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  272. {
  273. CHECK_VALID_SOCKET_HANDLE(socket);
  274. errno = ENOSYS;
  275. return BHT_ERROR;
  276. }
  277. int
  278. os_socket_set_send_buf_size(bh_socket_t socket, size_t bufsiz)
  279. {
  280. CHECK_VALID_SOCKET_HANDLE(socket);
  281. errno = ENOSYS;
  282. return BHT_ERROR;
  283. }
  284. int
  285. os_socket_get_send_buf_size(bh_socket_t socket, size_t *bufsiz)
  286. {
  287. CHECK_VALID_SOCKET_HANDLE(socket);
  288. errno = ENOSYS;
  289. return BHT_ERROR;
  290. }
  291. int
  292. os_socket_set_recv_buf_size(bh_socket_t socket, size_t bufsiz)
  293. {
  294. CHECK_VALID_SOCKET_HANDLE(socket);
  295. errno = ENOSYS;
  296. return BHT_ERROR;
  297. }
  298. int
  299. os_socket_get_recv_buf_size(bh_socket_t socket, size_t *bufsiz)
  300. {
  301. CHECK_VALID_SOCKET_HANDLE(socket);
  302. errno = ENOSYS;
  303. return BHT_ERROR;
  304. }
  305. int
  306. os_socket_set_keep_alive(bh_socket_t socket, bool is_enabled)
  307. {
  308. CHECK_VALID_SOCKET_HANDLE(socket);
  309. errno = ENOSYS;
  310. return BHT_ERROR;
  311. }
  312. int
  313. os_socket_get_keep_alive(bh_socket_t socket, bool *is_enabled)
  314. {
  315. CHECK_VALID_SOCKET_HANDLE(socket);
  316. errno = ENOSYS;
  317. return BHT_ERROR;
  318. }
  319. int
  320. os_socket_set_reuse_addr(bh_socket_t socket, bool is_enabled)
  321. {
  322. CHECK_VALID_SOCKET_HANDLE(socket);
  323. errno = ENOSYS;
  324. return BHT_ERROR;
  325. }
  326. int
  327. os_socket_get_reuse_addr(bh_socket_t socket, bool *is_enabled)
  328. {
  329. CHECK_VALID_SOCKET_HANDLE(socket);
  330. errno = ENOSYS;
  331. return BHT_ERROR;
  332. }
  333. int
  334. os_socket_set_reuse_port(bh_socket_t socket, bool is_enabled)
  335. {
  336. CHECK_VALID_SOCKET_HANDLE(socket);
  337. errno = ENOSYS;
  338. return BHT_ERROR;
  339. }
  340. int
  341. os_socket_get_reuse_port(bh_socket_t socket, bool *is_enabled)
  342. {
  343. CHECK_VALID_SOCKET_HANDLE(socket);
  344. errno = ENOSYS;
  345. return BHT_ERROR;
  346. }
  347. int
  348. os_socket_set_linger(bh_socket_t socket, bool is_enabled, int linger_s)
  349. {
  350. CHECK_VALID_SOCKET_HANDLE(socket);
  351. errno = ENOSYS;
  352. return BHT_ERROR;
  353. }
  354. int
  355. os_socket_get_linger(bh_socket_t socket, bool *is_enabled, int *linger_s)
  356. {
  357. CHECK_VALID_SOCKET_HANDLE(socket);
  358. errno = ENOSYS;
  359. return BHT_ERROR;
  360. }
  361. int
  362. os_socket_set_tcp_no_delay(bh_socket_t socket, bool is_enabled)
  363. {
  364. CHECK_VALID_SOCKET_HANDLE(socket);
  365. errno = ENOSYS;
  366. return BHT_ERROR;
  367. }
  368. int
  369. os_socket_get_tcp_no_delay(bh_socket_t socket, bool *is_enabled)
  370. {
  371. CHECK_VALID_SOCKET_HANDLE(socket);
  372. errno = ENOSYS;
  373. return BHT_ERROR;
  374. }
  375. int
  376. os_socket_set_tcp_quick_ack(bh_socket_t socket, bool is_enabled)
  377. {
  378. CHECK_VALID_SOCKET_HANDLE(socket);
  379. errno = ENOSYS;
  380. return BHT_ERROR;
  381. }
  382. int
  383. os_socket_get_tcp_quick_ack(bh_socket_t socket, bool *is_enabled)
  384. {
  385. CHECK_VALID_SOCKET_HANDLE(socket);
  386. errno = ENOSYS;
  387. return BHT_ERROR;
  388. }
  389. int
  390. os_socket_set_tcp_keep_idle(bh_socket_t socket, uint32 time_s)
  391. {
  392. CHECK_VALID_SOCKET_HANDLE(socket);
  393. errno = ENOSYS;
  394. return BHT_ERROR;
  395. }
  396. int
  397. os_socket_get_tcp_keep_idle(bh_socket_t socket, uint32 *time_s)
  398. {
  399. CHECK_VALID_SOCKET_HANDLE(socket);
  400. errno = ENOSYS;
  401. return BHT_ERROR;
  402. }
  403. int
  404. os_socket_set_tcp_keep_intvl(bh_socket_t socket, uint32 time_s)
  405. {
  406. CHECK_VALID_SOCKET_HANDLE(socket);
  407. errno = ENOSYS;
  408. return BHT_ERROR;
  409. }
  410. int
  411. os_socket_get_tcp_keep_intvl(bh_socket_t socket, uint32 *time_s)
  412. {
  413. CHECK_VALID_SOCKET_HANDLE(socket);
  414. errno = ENOSYS;
  415. return BHT_ERROR;
  416. }
  417. int
  418. os_socket_set_tcp_fastopen_connect(bh_socket_t socket, bool is_enabled)
  419. {
  420. CHECK_VALID_SOCKET_HANDLE(socket);
  421. errno = ENOSYS;
  422. return BHT_ERROR;
  423. }
  424. int
  425. os_socket_get_tcp_fastopen_connect(bh_socket_t socket, bool *is_enabled)
  426. {
  427. CHECK_VALID_SOCKET_HANDLE(socket);
  428. errno = ENOSYS;
  429. return BHT_ERROR;
  430. }
  431. int
  432. os_socket_set_ip_multicast_loop(bh_socket_t socket, bool ipv6, bool is_enabled)
  433. {
  434. CHECK_VALID_SOCKET_HANDLE(socket);
  435. errno = ENOSYS;
  436. return BHT_ERROR;
  437. }
  438. int
  439. os_socket_get_ip_multicast_loop(bh_socket_t socket, bool ipv6, bool *is_enabled)
  440. {
  441. CHECK_VALID_SOCKET_HANDLE(socket);
  442. errno = ENOSYS;
  443. return BHT_ERROR;
  444. }
  445. int
  446. os_socket_set_ip_add_membership(bh_socket_t socket,
  447. bh_ip_addr_buffer_t *imr_multiaddr,
  448. uint32_t imr_interface, bool is_ipv6)
  449. {
  450. CHECK_VALID_SOCKET_HANDLE(socket);
  451. errno = ENOSYS;
  452. return BHT_ERROR;
  453. }
  454. int
  455. os_socket_set_ip_drop_membership(bh_socket_t socket,
  456. bh_ip_addr_buffer_t *imr_multiaddr,
  457. uint32_t imr_interface, bool is_ipv6)
  458. {
  459. CHECK_VALID_SOCKET_HANDLE(socket);
  460. errno = ENOSYS;
  461. return BHT_ERROR;
  462. }
  463. int
  464. os_socket_set_ip_ttl(bh_socket_t socket, uint8_t ttl_s)
  465. {
  466. CHECK_VALID_SOCKET_HANDLE(socket);
  467. errno = ENOSYS;
  468. return BHT_ERROR;
  469. }
  470. int
  471. os_socket_get_ip_ttl(bh_socket_t socket, uint8_t *ttl_s)
  472. {
  473. CHECK_VALID_SOCKET_HANDLE(socket);
  474. errno = ENOSYS;
  475. return BHT_ERROR;
  476. }
  477. int
  478. os_socket_set_ip_multicast_ttl(bh_socket_t socket, uint8_t ttl_s)
  479. {
  480. CHECK_VALID_SOCKET_HANDLE(socket);
  481. errno = ENOSYS;
  482. return BHT_ERROR;
  483. }
  484. int
  485. os_socket_get_ip_multicast_ttl(bh_socket_t socket, uint8_t *ttl_s)
  486. {
  487. CHECK_VALID_SOCKET_HANDLE(socket);
  488. errno = ENOSYS;
  489. return BHT_ERROR;
  490. }
  491. int
  492. os_socket_set_ipv6_only(bh_socket_t socket, bool option)
  493. {
  494. CHECK_VALID_SOCKET_HANDLE(socket);
  495. errno = ENOSYS;
  496. return BHT_ERROR;
  497. }
  498. int
  499. os_socket_get_ipv6_only(bh_socket_t socket, bool *option)
  500. {
  501. CHECK_VALID_SOCKET_HANDLE(socket);
  502. errno = ENOSYS;
  503. return BHT_ERROR;
  504. }
  505. int
  506. os_socket_set_broadcast(bh_socket_t socket, bool is_enabled)
  507. {
  508. CHECK_VALID_SOCKET_HANDLE(socket);
  509. errno = ENOSYS;
  510. return BHT_ERROR;
  511. }
  512. int
  513. os_socket_get_broadcast(bh_socket_t socket, bool *is_enabled)
  514. {
  515. CHECK_VALID_SOCKET_HANDLE(socket);
  516. errno = ENOSYS;
  517. return BHT_ERROR;
  518. }