espidf_socket.c 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. /*
  2. * Copyright (C) 2021 Intel Corporation. All rights reserved.
  3. * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  4. */
  5. #include "platform_api_vmcore.h"
  6. #include "platform_api_extension.h"
  7. #include "libc_errno.h"
  8. #include <arpa/inet.h>
  9. static void
  10. textual_addr_to_sockaddr(const char *textual, int port, struct sockaddr_in *out)
  11. {
  12. assert(textual);
  13. out->sin_family = AF_INET;
  14. out->sin_port = htons(port);
  15. out->sin_addr.s_addr = inet_addr(textual);
  16. }
  17. static int
  18. sockaddr_to_bh_sockaddr(const struct sockaddr *sockaddr, socklen_t socklen,
  19. bh_sockaddr_t *bh_sockaddr)
  20. {
  21. switch (sockaddr->sa_family) {
  22. case AF_INET:
  23. {
  24. struct sockaddr_in *addr = (struct sockaddr_in *)sockaddr;
  25. assert(socklen >= sizeof(struct sockaddr_in));
  26. bh_sockaddr->port = ntohs(addr->sin_port);
  27. bh_sockaddr->addr_buffer.ipv4 = ntohl(addr->sin_addr.s_addr);
  28. bh_sockaddr->is_ipv4 = true;
  29. return BHT_OK;
  30. }
  31. default:
  32. errno = EAFNOSUPPORT;
  33. return BHT_ERROR;
  34. }
  35. }
  36. int
  37. os_socket_create(bh_socket_t *sock, bool is_ipv4, bool is_tcp)
  38. {
  39. if (!sock) {
  40. return BHT_ERROR;
  41. }
  42. if (is_tcp) {
  43. *sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  44. }
  45. else {
  46. *sock = socket(AF_INET, SOCK_DGRAM, 0);
  47. }
  48. return (*sock == -1) ? BHT_ERROR : BHT_OK;
  49. }
  50. int
  51. os_socket_bind(bh_socket_t socket, const char *host, int *port)
  52. {
  53. struct sockaddr_in addr;
  54. socklen_t socklen;
  55. int ret;
  56. assert(host);
  57. assert(port);
  58. addr.sin_addr.s_addr = inet_addr(host);
  59. addr.sin_port = htons(*port);
  60. addr.sin_family = AF_INET;
  61. ret = bind(socket, (struct sockaddr *)&addr, sizeof(addr));
  62. if (ret < 0) {
  63. goto fail;
  64. }
  65. socklen = sizeof(addr);
  66. if (getsockname(socket, (struct sockaddr *)&addr, &socklen) == -1) {
  67. goto fail;
  68. }
  69. *port = ntohs(addr.sin_port);
  70. return BHT_OK;
  71. fail:
  72. return BHT_ERROR;
  73. }
  74. int
  75. os_socket_settimeout(bh_socket_t socket, uint64 timeout_us)
  76. {
  77. struct timeval tv;
  78. tv.tv_sec = timeout_us / 1000000UL;
  79. tv.tv_usec = timeout_us % 1000000UL;
  80. if (setsockopt(socket, SOL_SOCKET, SO_RCVTIMEO, (const char *)&tv,
  81. sizeof(tv))
  82. != 0) {
  83. return BHT_ERROR;
  84. }
  85. return BHT_OK;
  86. }
  87. int
  88. os_socket_listen(bh_socket_t socket, int max_client)
  89. {
  90. if (listen(socket, max_client) != 0) {
  91. return BHT_ERROR;
  92. }
  93. return BHT_OK;
  94. }
  95. int
  96. os_socket_accept(bh_socket_t server_sock, bh_socket_t *sock, void *addr,
  97. unsigned int *addrlen)
  98. {
  99. struct sockaddr addr_tmp;
  100. socklen_t len = sizeof(struct sockaddr);
  101. *sock = accept(server_sock, (struct sockaddr *)&addr_tmp, &len);
  102. if (*sock < 0) {
  103. return BHT_ERROR;
  104. }
  105. return BHT_OK;
  106. }
  107. int
  108. os_socket_connect(bh_socket_t socket, const char *addr, int port)
  109. {
  110. struct sockaddr_in addr_in = { 0 };
  111. socklen_t addr_len = sizeof(struct sockaddr_in);
  112. int ret = 0;
  113. textual_addr_to_sockaddr(addr, port, &addr_in);
  114. ret = connect(socket, (struct sockaddr *)&addr_in, addr_len);
  115. if (ret == -1) {
  116. return BHT_ERROR;
  117. }
  118. return BHT_OK;
  119. }
  120. int
  121. os_socket_recv(bh_socket_t socket, void *buf, unsigned int len)
  122. {
  123. return recv(socket, buf, len, 0);
  124. }
  125. int
  126. os_socket_send(bh_socket_t socket, const void *buf, unsigned int len)
  127. {
  128. return send(socket, buf, len, 0);
  129. }
  130. int
  131. os_socket_close(bh_socket_t socket)
  132. {
  133. close(socket);
  134. return BHT_OK;
  135. }
  136. __wasi_errno_t
  137. os_socket_shutdown(bh_socket_t socket)
  138. {
  139. if (shutdown(socket, O_RDWR) != 0) {
  140. return convert_errno(errno);
  141. }
  142. return __WASI_ESUCCESS;
  143. }
  144. int
  145. os_socket_inet_network(bool is_ipv4, const char *cp, bh_ip_addr_buffer_t *out)
  146. {
  147. if (!cp)
  148. return BHT_ERROR;
  149. if (is_ipv4) {
  150. if (inet_pton(AF_INET, cp, &out->ipv4) != 1) {
  151. return BHT_ERROR;
  152. }
  153. /* Note: ntohl(INADDR_NONE) == INADDR_NONE */
  154. out->ipv4 = ntohl(out->ipv4);
  155. }
  156. else {
  157. if (inet_pton(AF_INET6, cp, out->ipv6) != 1) {
  158. return BHT_ERROR;
  159. }
  160. for (int i = 0; i < 8; i++) {
  161. out->ipv6[i] = ntohs(out->ipv6[i]);
  162. }
  163. }
  164. return BHT_OK;
  165. }
  166. int
  167. os_socket_addr_remote(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  168. {
  169. struct sockaddr_in addr;
  170. socklen_t addr_len = sizeof(addr);
  171. if (getpeername(socket, (struct sockaddr *)&addr, &addr_len) == -1) {
  172. return BHT_ERROR;
  173. }
  174. return sockaddr_to_bh_sockaddr((struct sockaddr *)&addr, addr_len,
  175. sockaddr);
  176. }
  177. int
  178. os_socket_addr_local(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  179. {
  180. struct sockaddr_in addr;
  181. socklen_t addr_len = sizeof(addr);
  182. if (getsockname(socket, (struct sockaddr *)&addr, &addr_len) == -1) {
  183. return BHT_ERROR;
  184. }
  185. return sockaddr_to_bh_sockaddr((struct sockaddr *)&addr, addr_len,
  186. sockaddr);
  187. }