sal_socket.c 31 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124
  1. /*
  2. * Copyright (c) 2006-2018, RT-Thread Development Team
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. *
  6. * Change Logs:
  7. * Date Author Notes
  8. * 2018-05-23 ChenYong First version
  9. * 2018-11-12 ChenYong Add TLS support
  10. */
  11. #include <rtthread.h>
  12. #include <rthw.h>
  13. #include <sys/time.h>
  14. #include <sal_socket.h>
  15. #include <sal_netdb.h>
  16. #ifdef SAL_USING_TLS
  17. #include <sal_tls.h>
  18. #endif
  19. #include <sal.h>
  20. #include <netdev.h>
  21. #include <ipc/workqueue.h>
  22. /* check system workqueue stack size */
  23. #if RT_SYSTEM_WORKQUEUE_STACKSIZE < 1536
  24. #error "The system workqueue stack size must more than 1536 bytes"
  25. #endif
  26. #define DBG_TAG "sal.skt"
  27. #define DBG_LVL DBG_INFO
  28. #include <rtdbg.h>
  29. #define SOCKET_TABLE_STEP_LEN 4
  30. /* the socket table used to dynamic allocate sockets */
  31. struct sal_socket_table
  32. {
  33. uint32_t max_socket;
  34. struct sal_socket **sockets;
  35. };
  36. #ifdef SAL_USING_TLS
  37. /* The global TLS protocol options */
  38. static struct sal_proto_tls *proto_tls;
  39. #endif
  40. /* The global socket table */
  41. static struct sal_socket_table socket_table;
  42. static struct rt_mutex sal_core_lock;
  43. static rt_bool_t init_ok = RT_FALSE;
  44. #define IS_SOCKET_PROTO_TLS(sock) (((sock)->protocol == PROTOCOL_TLS) || \
  45. ((sock)->protocol == PROTOCOL_DTLS))
  46. #define SAL_SOCKOPS_PROTO_TLS_VALID(sock, name) (proto_tls && (proto_tls->ops->name) && IS_SOCKET_PROTO_TLS(sock))
  47. #define SAL_SOCKOPT_PROTO_TLS_EXEC(sock, name, optval, optlen) \
  48. do { \
  49. if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, name)){ \
  50. return proto_tls->ops->name((sock)->user_data_tls, (optval), (optlen)); \
  51. } \
  52. }while(0) \
  53. #define SAL_SOCKET_OBJ_GET(sock, socket) \
  54. do { \
  55. (sock) = sal_get_socket(socket); \
  56. if ((sock) == RT_NULL) { \
  57. return -1; \
  58. } \
  59. }while(0) \
  60. #define SAL_NETDEV_IS_UP(netdev) \
  61. do { \
  62. if (!netdev_is_up(netdev)) { \
  63. return -1; \
  64. } \
  65. }while(0) \
  66. #define SAL_NETDEV_SOCKETOPS_VALID(netdev, pf, ops) \
  67. do { \
  68. (pf) = (struct sal_proto_family *) netdev->sal_user_data; \
  69. if ((pf)->skt_ops->ops == RT_NULL){ \
  70. return -1; \
  71. } \
  72. }while(0) \
  73. #define SAL_NETDEV_NETDBOPS_VALID(netdev, pf, ops) \
  74. ((netdev) && netdev_is_up(netdev) && \
  75. ((pf) = (struct sal_proto_family *) (netdev)->sal_user_data) != RT_NULL && \
  76. (pf)->netdb_ops->ops) \
  77. /**
  78. * SAL (Socket Abstraction Layer) initialize.
  79. *
  80. * @return result 0: initialize success
  81. * -1: initialize failed
  82. */
  83. int sal_init(void)
  84. {
  85. int cn;
  86. if (init_ok)
  87. {
  88. LOG_D("Socket Abstraction Layer is already initialized.");
  89. return 0;
  90. }
  91. /* init sal socket table */
  92. cn = SOCKET_TABLE_STEP_LEN < SAL_SOCKETS_NUM ? SOCKET_TABLE_STEP_LEN : SAL_SOCKETS_NUM;
  93. socket_table.max_socket = cn;
  94. socket_table.sockets = rt_calloc(1, cn * sizeof(struct sal_socket *));
  95. if (socket_table.sockets == RT_NULL)
  96. {
  97. LOG_E("No memory for socket table.\n");
  98. return -1;
  99. }
  100. /* create sal socket lock */
  101. rt_mutex_init(&sal_core_lock, "sal_lock", RT_IPC_FLAG_FIFO);
  102. LOG_I("Socket Abstraction Layer initialize success.");
  103. init_ok = RT_TRUE;
  104. return 0;
  105. }
  106. INIT_COMPONENT_EXPORT(sal_init);
  107. /* check SAL network interface device internet status */
  108. static void check_netdev_internet_up_work(struct rt_work *work, void *work_data)
  109. {
  110. #define SAL_INTERNET_VERSION 0x00
  111. #define SAL_INTERNET_BUFF_LEN 12
  112. #define SAL_INTERNET_TIMEOUT (2 * RT_TICK_PER_SECOND)
  113. #define SAL_INTERNET_HOST "link.rt-thread.org"
  114. #define SAL_INTERNET_PORT 8101
  115. #define SAL_INTERNET_MONTH_LEN 4
  116. #define SAL_INTERNET_DATE_LEN 16
  117. int index, sockfd = -1, result = 0;
  118. struct sockaddr_in server_addr;
  119. struct hostent *host;
  120. struct timeval timeout;
  121. struct netdev *netdev = (struct netdev *)work_data;
  122. socklen_t addr_len = sizeof(struct sockaddr_in);
  123. char send_data[SAL_INTERNET_BUFF_LEN], recv_data = 0;
  124. struct rt_delayed_work *delay_work = (struct rt_delayed_work *)work;
  125. const char month[][SAL_INTERNET_MONTH_LEN] = {"Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"};
  126. char date[SAL_INTERNET_DATE_LEN];
  127. int moth_num = 0;
  128. struct sal_proto_family *pf = (struct sal_proto_family *) netdev->sal_user_data;
  129. const struct sal_socket_ops *skt_ops;
  130. if (work)
  131. {
  132. rt_free(delay_work);
  133. }
  134. /* get network interface socket operations */
  135. if (pf == RT_NULL || pf->skt_ops == RT_NULL)
  136. {
  137. result = -RT_ERROR;
  138. goto __exit;
  139. }
  140. host = (struct hostent *) pf->netdb_ops->gethostbyname(SAL_INTERNET_HOST);
  141. if (host == RT_NULL)
  142. {
  143. result = -RT_ERROR;
  144. goto __exit;
  145. }
  146. skt_ops = pf->skt_ops;
  147. if ((sockfd = skt_ops->socket(AF_INET, SOCK_DGRAM, 0)) < 0)
  148. {
  149. result = -RT_ERROR;
  150. goto __exit;
  151. }
  152. server_addr.sin_family = AF_INET;
  153. server_addr.sin_port = htons(SAL_INTERNET_PORT);
  154. server_addr.sin_addr = *((struct in_addr *)host->h_addr);
  155. rt_memset(&(server_addr.sin_zero), 0, sizeof(server_addr.sin_zero));
  156. timeout.tv_sec = SAL_INTERNET_TIMEOUT;
  157. timeout.tv_usec = 0;
  158. /* set receive and send timeout */
  159. skt_ops->setsockopt(sockfd, SOL_SOCKET, SO_RCVTIMEO, (void *) &timeout, sizeof(timeout));
  160. skt_ops->setsockopt(sockfd, SOL_SOCKET, SO_SNDTIMEO, (void *) &timeout, sizeof(timeout));
  161. /* get build moth value*/
  162. rt_memset(date, 0x00, SAL_INTERNET_DATE_LEN);
  163. rt_snprintf(date, SAL_INTERNET_DATE_LEN, "%s", __DATE__);
  164. for (index = 0; index < sizeof(month) / SAL_INTERNET_MONTH_LEN; index++)
  165. {
  166. if (rt_memcmp(date, month[index], SAL_INTERNET_MONTH_LEN - 1) == 0)
  167. {
  168. moth_num = index + 1;
  169. break;
  170. }
  171. }
  172. /* not find build month */
  173. if (moth_num == 0 || moth_num > sizeof(month) / SAL_INTERNET_MONTH_LEN)
  174. {
  175. result = -RT_ERROR;
  176. goto __exit;
  177. }
  178. rt_memset(send_data, 0x00, SAL_INTERNET_BUFF_LEN);
  179. send_data[0] = SAL_INTERNET_VERSION;
  180. for (index = 0; index < netdev->hwaddr_len; index++)
  181. {
  182. send_data[index + 1] = netdev->hwaddr[index] + moth_num;
  183. }
  184. send_data[9] = RT_VERSION;
  185. send_data[10] = RT_SUBVERSION;
  186. send_data[11] = RT_REVISION;
  187. skt_ops->sendto(sockfd, send_data, SAL_INTERNET_BUFF_LEN, 0,
  188. (struct sockaddr *)&server_addr, sizeof(struct sockaddr));
  189. result = skt_ops->recvfrom(sockfd, &recv_data, sizeof(recv_data), 0, (struct sockaddr *)&server_addr, &addr_len);
  190. if (result < 0)
  191. {
  192. goto __exit;
  193. }
  194. if (recv_data == RT_FALSE)
  195. {
  196. result = -RT_ERROR;
  197. goto __exit;
  198. }
  199. __exit:
  200. if (result > 0)
  201. {
  202. LOG_D("Set network interface device(%s) internet status up.", netdev->name);
  203. netdev->flags |= NETDEV_FLAG_INTERNET_UP;
  204. }
  205. else
  206. {
  207. LOG_D("Set network interface device(%s) internet status down.", netdev->name);
  208. netdev->flags &= ~NETDEV_FLAG_INTERNET_UP;
  209. }
  210. if (sockfd >= 0)
  211. {
  212. skt_ops->closesocket(sockfd);
  213. }
  214. }
  215. /**
  216. * This function will check SAL network interface device internet status.
  217. *
  218. * @param netdev the network interface device to check
  219. */
  220. int sal_check_netdev_internet_up(struct netdev *netdev)
  221. {
  222. /* workqueue for network connect */
  223. struct rt_delayed_work *net_work = RT_NULL;
  224. RT_ASSERT(netdev);
  225. net_work = (struct rt_delayed_work *)rt_calloc(1, sizeof(struct rt_delayed_work));
  226. if (net_work == RT_NULL)
  227. {
  228. LOG_W("No memory for network interface device(%s) delay work.", netdev->name);
  229. return -1;
  230. }
  231. rt_delayed_work_init(net_work, check_netdev_internet_up_work, (void *)netdev);
  232. rt_work_submit(&(net_work->work), RT_TICK_PER_SECOND);
  233. return 0;
  234. }
  235. /**
  236. * This function will register TLS protocol to the global TLS protocol.
  237. *
  238. * @param pt TLS protocol object
  239. *
  240. * @return 0: TLS protocol object register success
  241. */
  242. #ifdef SAL_USING_TLS
  243. int sal_proto_tls_register(const struct sal_proto_tls *pt)
  244. {
  245. RT_ASSERT(pt);
  246. proto_tls = (struct sal_proto_tls *) pt;
  247. return 0;
  248. }
  249. #endif
  250. /**
  251. * This function will get sal socket object by sal socket descriptor.
  252. *
  253. * @param socket sal socket index
  254. *
  255. * @return sal socket object of the current sal socket index
  256. */
  257. struct sal_socket *sal_get_socket(int socket)
  258. {
  259. struct sal_socket_table *st = &socket_table;
  260. if (socket < 0 || socket >= (int) st->max_socket)
  261. {
  262. return RT_NULL;
  263. }
  264. socket = socket - SAL_SOCKET_OFFSET;
  265. /* check socket structure valid or not */
  266. RT_ASSERT(st->sockets[socket]->magic == SAL_SOCKET_MAGIC);
  267. return st->sockets[socket];
  268. }
  269. /**
  270. * This function will lock sal socket.
  271. *
  272. * @note please don't invoke it on ISR.
  273. */
  274. static void sal_lock(void)
  275. {
  276. rt_err_t result;
  277. result = rt_mutex_take(&sal_core_lock, RT_WAITING_FOREVER);
  278. if (result != RT_EOK)
  279. {
  280. RT_ASSERT(0);
  281. }
  282. }
  283. /**
  284. * This function will lock sal socket.
  285. *
  286. * @note please don't invoke it on ISR.
  287. */
  288. static void sal_unlock(void)
  289. {
  290. rt_mutex_release(&sal_core_lock);
  291. }
  292. /**
  293. * This function will clean the netdev.
  294. *
  295. * @note please don't invoke it on ISR.
  296. */
  297. int sal_netdev_cleanup(struct netdev *netdev)
  298. {
  299. int idx = 0, find_dev;
  300. do
  301. {
  302. find_dev = 0;
  303. sal_lock();
  304. for (idx = 0; idx < socket_table.max_socket; idx++)
  305. {
  306. if (socket_table.sockets[idx] && socket_table.sockets[idx]->netdev == netdev)
  307. {
  308. find_dev = 1;
  309. break;
  310. }
  311. }
  312. sal_unlock();
  313. if (find_dev)
  314. {
  315. rt_thread_mdelay(rt_tick_from_millisecond(100));
  316. }
  317. }
  318. while (find_dev);
  319. return 0;
  320. }
  321. /**
  322. * This function will initialize sal socket object and set socket options
  323. *
  324. * @param family protocol family
  325. * @param type socket type
  326. * @param protocol transfer Protocol
  327. * @param res sal socket object address
  328. *
  329. * @return 0 : socket initialize success
  330. * -1 : input the wrong family
  331. * -2 : input the wrong socket type
  332. * -3 : get network interface failed
  333. */
  334. static int socket_init(int family, int type, int protocol, struct sal_socket **res)
  335. {
  336. struct sal_socket *sock;
  337. struct sal_proto_family *pf;
  338. struct netdev *netdv_def = netdev_default;
  339. struct netdev *netdev = RT_NULL;
  340. rt_bool_t flag = RT_FALSE;
  341. if (family < 0 || family > AF_MAX)
  342. {
  343. return -1;
  344. }
  345. if (type < 0 || type > SOCK_MAX)
  346. {
  347. return -2;
  348. }
  349. sock = *res;
  350. sock->domain = family;
  351. sock->type = type;
  352. sock->protocol = protocol;
  353. if (netdv_def && netdev_is_up(netdv_def))
  354. {
  355. /* check default network interface device protocol family */
  356. pf = (struct sal_proto_family *) netdv_def->sal_user_data;
  357. if (pf != RT_NULL && pf->skt_ops && (pf->family == family || pf->sec_family == family))
  358. {
  359. sock->netdev = netdv_def;
  360. flag = RT_TRUE;
  361. }
  362. }
  363. if (flag == RT_FALSE)
  364. {
  365. /* get network interface device by protocol family */
  366. netdev = netdev_get_by_family(family);
  367. if (netdev == RT_NULL)
  368. {
  369. LOG_E("not find network interface device by protocol family(%d).", family);
  370. return -3;
  371. }
  372. sock->netdev = netdev;
  373. }
  374. return 0;
  375. }
  376. static int socket_alloc(struct sal_socket_table *st, int f_socket)
  377. {
  378. int idx;
  379. /* find an empty socket entry */
  380. for (idx = f_socket; idx < (int) st->max_socket; idx++)
  381. {
  382. if (st->sockets[idx] == RT_NULL)
  383. {
  384. break;
  385. }
  386. }
  387. /* allocate a larger sockte container */
  388. if (idx == (int) st->max_socket && st->max_socket < SAL_SOCKETS_NUM)
  389. {
  390. int cnt, index;
  391. struct sal_socket **sockets;
  392. /* increase the number of socket with 4 step length */
  393. cnt = st->max_socket + SOCKET_TABLE_STEP_LEN;
  394. cnt = cnt > SAL_SOCKETS_NUM ? SAL_SOCKETS_NUM : cnt;
  395. sockets = rt_realloc(st->sockets, cnt * sizeof(struct sal_socket *));
  396. if (sockets == RT_NULL)
  397. goto __result; /* return st->max_socket */
  398. /* clean the new allocated fds */
  399. for (index = st->max_socket; index < cnt; index++)
  400. {
  401. sockets[index] = RT_NULL;
  402. }
  403. st->sockets = sockets;
  404. st->max_socket = cnt;
  405. }
  406. /* allocate 'struct sal_socket' */
  407. if (idx < (int) st->max_socket && st->sockets[idx] == RT_NULL)
  408. {
  409. st->sockets[idx] = rt_calloc(1, sizeof(struct sal_socket));
  410. if (st->sockets[idx] == RT_NULL)
  411. {
  412. idx = st->max_socket;
  413. }
  414. }
  415. __result:
  416. return idx;
  417. }
  418. static void socket_free(struct sal_socket_table *st, int idx)
  419. {
  420. struct sal_socket *sock;
  421. sock = st->sockets[idx];
  422. st->sockets[idx] = RT_NULL;
  423. rt_free(sock);
  424. }
  425. static int socket_new(void)
  426. {
  427. struct sal_socket *sock;
  428. struct sal_socket_table *st = &socket_table;
  429. int idx;
  430. sal_lock();
  431. /* find an empty sal socket entry */
  432. idx = socket_alloc(st, 0);
  433. /* can't find an empty sal socket entry */
  434. if (idx == (int) st->max_socket)
  435. {
  436. idx = -(1 + SAL_SOCKET_OFFSET);
  437. goto __result;
  438. }
  439. sock = st->sockets[idx];
  440. sock->socket = idx + SAL_SOCKET_OFFSET;
  441. sock->magic = SAL_SOCKET_MAGIC;
  442. sock->netdev = RT_NULL;
  443. sock->user_data = RT_NULL;
  444. #ifdef SAL_USING_TLS
  445. sock->user_data_tls = RT_NULL;
  446. #endif
  447. __result:
  448. sal_unlock();
  449. return idx + SAL_SOCKET_OFFSET;
  450. }
  451. static void socket_delete(int socket)
  452. {
  453. struct sal_socket *sock;
  454. struct sal_socket_table *st = &socket_table;
  455. int idx;
  456. idx = socket - SAL_SOCKET_OFFSET;
  457. if (idx < 0 || idx >= (int) st->max_socket)
  458. {
  459. return;
  460. }
  461. sal_lock();
  462. sock = sal_get_socket(socket);
  463. RT_ASSERT(sock != RT_NULL);
  464. sock->magic = 0;
  465. sock->netdev = RT_NULL;
  466. socket_free(st, idx);
  467. sal_unlock();
  468. }
  469. int sal_accept(int socket, struct sockaddr *addr, socklen_t *addrlen)
  470. {
  471. int new_socket;
  472. struct sal_socket *sock;
  473. struct sal_proto_family *pf;
  474. /* get the socket object by socket descriptor */
  475. SAL_SOCKET_OBJ_GET(sock, socket);
  476. /* check the network interface socket operations */
  477. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, accept);
  478. new_socket = pf->skt_ops->accept((int) sock->user_data, addr, addrlen);
  479. if (new_socket != -1)
  480. {
  481. int retval;
  482. int new_sal_socket;
  483. struct sal_socket *new_sock;
  484. /* allocate a new socket structure and registered socket options */
  485. new_sal_socket = socket_new();
  486. new_sock = sal_get_socket(new_sal_socket);
  487. if (new_sock == RT_NULL)
  488. {
  489. pf->skt_ops->closesocket(new_socket);
  490. return -1;
  491. }
  492. retval = socket_init(sock->domain, sock->type, sock->protocol, &new_sock);
  493. if (retval < 0)
  494. {
  495. pf->skt_ops->closesocket(new_socket);
  496. rt_memset(new_sock, 0x00, sizeof(struct sal_socket));
  497. /* socket init failed, delete socket */
  498. socket_delete(new_sal_socket);
  499. LOG_E("New socket registered failed, return error %d.", retval);
  500. return -1;
  501. }
  502. /* socket structure user_data used to store the acquired new socket */
  503. new_sock->user_data = (void *) new_socket;
  504. return new_sal_socket;
  505. }
  506. return -1;
  507. }
  508. static void sal_sockaddr_to_ipaddr(const struct sockaddr *name, ip_addr_t *local_ipaddr)
  509. {
  510. const struct sockaddr_in *svr_addr = (const struct sockaddr_in *) name;
  511. #if NETDEV_IPV4 && NETDEV_IPV6
  512. local_ipaddr->u_addr.ip4.addr = svr_addr->sin_addr.s_addr;
  513. local_ipaddr->type = IPADDR_TYPE_V4;
  514. #elif NETDEV_IPV4
  515. local_ipaddr->addr = svr_addr->sin_addr.s_addr;
  516. #elif NETDEV_IPV6
  517. #error "not only support IPV6"
  518. #endif /* NETDEV_IPV4 && NETDEV_IPV6*/
  519. }
  520. int sal_bind(int socket, const struct sockaddr *name, socklen_t namelen)
  521. {
  522. struct sal_socket *sock;
  523. struct sal_proto_family *pf;
  524. ip_addr_t input_ipaddr;
  525. RT_ASSERT(name);
  526. /* get the socket object by socket descriptor */
  527. SAL_SOCKET_OBJ_GET(sock, socket);
  528. /* bind network interface by ip address */
  529. sal_sockaddr_to_ipaddr(name, &input_ipaddr);
  530. /* check input ipaddr is default netdev ipaddr */
  531. if (!ip_addr_isany_val(input_ipaddr))
  532. {
  533. struct sal_proto_family *input_pf = RT_NULL, *local_pf = RT_NULL;
  534. struct netdev *new_netdev = RT_NULL;
  535. new_netdev = netdev_get_by_ipaddr(&input_ipaddr);
  536. if (new_netdev == RT_NULL)
  537. {
  538. return -1;
  539. }
  540. /* get input and local ip address proto_family */
  541. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, local_pf, bind);
  542. SAL_NETDEV_SOCKETOPS_VALID(new_netdev, input_pf, bind);
  543. /* check the network interface protocol family type */
  544. if (input_pf->family != local_pf->family)
  545. {
  546. int new_socket = -1;
  547. /* protocol family is different, close old socket and create new socket by input ip address */
  548. local_pf->skt_ops->closesocket(socket);
  549. new_socket = input_pf->skt_ops->socket(input_pf->family, sock->type, sock->protocol);
  550. if (new_socket < 0)
  551. {
  552. return -1;
  553. }
  554. sock->netdev = new_netdev;
  555. sock->user_data = (void *) new_socket;
  556. }
  557. }
  558. /* check and get protocol families by the network interface device */
  559. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, bind);
  560. return pf->skt_ops->bind((int) sock->user_data, name, namelen);
  561. }
  562. int sal_shutdown(int socket, int how)
  563. {
  564. struct sal_socket *sock;
  565. struct sal_proto_family *pf;
  566. int error = 0;
  567. /* get the socket object by socket descriptor */
  568. SAL_SOCKET_OBJ_GET(sock, socket);
  569. /* shutdown operation not nead to check network interface status */
  570. /* check the network interface socket opreation */
  571. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, shutdown);
  572. if (pf->skt_ops->shutdown((int) sock->user_data, how) == 0)
  573. {
  574. #ifdef SAL_USING_TLS
  575. if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, closesocket))
  576. {
  577. if (proto_tls->ops->closesocket(sock->user_data_tls) < 0)
  578. {
  579. return -1;
  580. }
  581. }
  582. #endif
  583. error = 0;
  584. }
  585. else
  586. {
  587. error = -1;
  588. }
  589. /* delete socket */
  590. socket_delete(socket);
  591. return error;
  592. }
  593. int sal_getpeername(int socket, struct sockaddr *name, socklen_t *namelen)
  594. {
  595. struct sal_socket *sock;
  596. struct sal_proto_family *pf;
  597. /* get the socket object by socket descriptor */
  598. SAL_SOCKET_OBJ_GET(sock, socket);
  599. /* check the network interface socket opreation */
  600. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, getpeername);
  601. return pf->skt_ops->getpeername((int) sock->user_data, name, namelen);
  602. }
  603. int sal_getsockname(int socket, struct sockaddr *name, socklen_t *namelen)
  604. {
  605. struct sal_socket *sock;
  606. struct sal_proto_family *pf;
  607. /* get socket object by socket descriptor */
  608. SAL_SOCKET_OBJ_GET(sock, socket);
  609. /* check the network interface socket opreation */
  610. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, getsockname);
  611. return pf->skt_ops->getsockname((int) sock->user_data, name, namelen);
  612. }
  613. int sal_getsockopt(int socket, int level, int optname, void *optval, socklen_t *optlen)
  614. {
  615. struct sal_socket *sock;
  616. struct sal_proto_family *pf;
  617. /* get the socket object by socket descriptor */
  618. SAL_SOCKET_OBJ_GET(sock, socket);
  619. /* check the network interface socket opreation */
  620. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, getsockopt);
  621. return pf->skt_ops->getsockopt((int) sock->user_data, level, optname, optval, optlen);
  622. }
  623. int sal_setsockopt(int socket, int level, int optname, const void *optval, socklen_t optlen)
  624. {
  625. struct sal_socket *sock;
  626. struct sal_proto_family *pf;
  627. /* get the socket object by socket descriptor */
  628. SAL_SOCKET_OBJ_GET(sock, socket);
  629. /* check the network interface socket opreation */
  630. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, setsockopt);
  631. #ifdef SAL_USING_TLS
  632. if (level == SOL_TLS)
  633. {
  634. switch (optname)
  635. {
  636. case TLS_CRET_LIST:
  637. SAL_SOCKOPT_PROTO_TLS_EXEC(sock, set_cret_list, optval, optlen);
  638. break;
  639. case TLS_CIPHERSUITE_LIST:
  640. SAL_SOCKOPT_PROTO_TLS_EXEC(sock, set_ciphersurite, optval, optlen);
  641. break;
  642. case TLS_PEER_VERIFY:
  643. SAL_SOCKOPT_PROTO_TLS_EXEC(sock, set_peer_verify, optval, optlen);
  644. break;
  645. case TLS_DTLS_ROLE:
  646. SAL_SOCKOPT_PROTO_TLS_EXEC(sock, set_dtls_role, optval, optlen);
  647. break;
  648. default:
  649. return -1;
  650. }
  651. return 0;
  652. }
  653. else
  654. {
  655. return pf->skt_ops->setsockopt((int) sock->user_data, level, optname, optval, optlen);
  656. }
  657. #else
  658. return pf->skt_ops->setsockopt((int) sock->user_data, level, optname, optval, optlen);
  659. #endif /* SAL_USING_TLS */
  660. }
  661. int sal_connect(int socket, const struct sockaddr *name, socklen_t namelen)
  662. {
  663. struct sal_socket *sock;
  664. struct sal_proto_family *pf;
  665. int ret;
  666. /* get the socket object by socket descriptor */
  667. SAL_SOCKET_OBJ_GET(sock, socket);
  668. /* check the network interface is up status */
  669. SAL_NETDEV_IS_UP(sock->netdev);
  670. /* check the network interface socket opreation */
  671. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, connect);
  672. ret = pf->skt_ops->connect((int) sock->user_data, name, namelen);
  673. #ifdef SAL_USING_TLS
  674. if (ret >= 0 && SAL_SOCKOPS_PROTO_TLS_VALID(sock, connect))
  675. {
  676. if (proto_tls->ops->connect(sock->user_data_tls) < 0)
  677. {
  678. return -1;
  679. }
  680. return ret;
  681. }
  682. #endif
  683. return ret;
  684. }
  685. int sal_listen(int socket, int backlog)
  686. {
  687. struct sal_socket *sock;
  688. struct sal_proto_family *pf;
  689. /* get the socket object by socket descriptor */
  690. SAL_SOCKET_OBJ_GET(sock, socket);
  691. /* check the network interface socket opreation */
  692. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, listen);
  693. return pf->skt_ops->listen((int) sock->user_data, backlog);
  694. }
  695. int sal_recvfrom(int socket, void *mem, size_t len, int flags,
  696. struct sockaddr *from, socklen_t *fromlen)
  697. {
  698. struct sal_socket *sock;
  699. struct sal_proto_family *pf;
  700. /* get the socket object by socket descriptor */
  701. SAL_SOCKET_OBJ_GET(sock, socket);
  702. /* check the network interface is up status */
  703. SAL_NETDEV_IS_UP(sock->netdev);
  704. /* check the network interface socket opreation */
  705. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, recvfrom);
  706. #ifdef SAL_USING_TLS
  707. if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, recv))
  708. {
  709. int ret;
  710. if ((ret = proto_tls->ops->recv(sock->user_data_tls, mem, len)) < 0)
  711. {
  712. return -1;
  713. }
  714. return ret;
  715. }
  716. else
  717. {
  718. return pf->skt_ops->recvfrom((int) sock->user_data, mem, len, flags, from, fromlen);
  719. }
  720. #else
  721. return pf->skt_ops->recvfrom((int) sock->user_data, mem, len, flags, from, fromlen);
  722. #endif
  723. }
  724. int sal_sendto(int socket, const void *dataptr, size_t size, int flags,
  725. const struct sockaddr *to, socklen_t tolen)
  726. {
  727. struct sal_socket *sock;
  728. struct sal_proto_family *pf;
  729. /* get the socket object by socket descriptor */
  730. SAL_SOCKET_OBJ_GET(sock, socket);
  731. /* check the network interface is up status */
  732. SAL_NETDEV_IS_UP(sock->netdev);
  733. /* check the network interface socket opreation */
  734. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, sendto);
  735. #ifdef SAL_USING_TLS
  736. if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, send))
  737. {
  738. int ret;
  739. if ((ret = proto_tls->ops->send(sock->user_data_tls, dataptr, size)) < 0)
  740. {
  741. return -1;
  742. }
  743. return ret;
  744. }
  745. else
  746. {
  747. return pf->skt_ops->sendto((int) sock->user_data, dataptr, size, flags, to, tolen);
  748. }
  749. #else
  750. return pf->skt_ops->sendto((int) sock->user_data, dataptr, size, flags, to, tolen);
  751. #endif
  752. }
  753. int sal_socket(int domain, int type, int protocol)
  754. {
  755. int retval;
  756. int socket, proto_socket;
  757. struct sal_socket *sock;
  758. struct sal_proto_family *pf;
  759. /* allocate a new socket and registered socket options */
  760. socket = socket_new();
  761. if (socket < 0)
  762. {
  763. return -1;
  764. }
  765. /* get sal socket object by socket descriptor */
  766. sock = sal_get_socket(socket);
  767. if (sock == RT_NULL)
  768. {
  769. return -1;
  770. }
  771. /* Initialize sal socket object */
  772. retval = socket_init(domain, type, protocol, &sock);
  773. if (retval < 0)
  774. {
  775. LOG_E("SAL socket protocol family input failed, return error %d.", retval);
  776. socket_delete(socket);
  777. return -1;
  778. }
  779. /* valid the network interface socket opreation */
  780. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, socket);
  781. proto_socket = pf->skt_ops->socket(domain, type, protocol);
  782. if (proto_socket >= 0)
  783. {
  784. #ifdef SAL_USING_TLS
  785. if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, socket))
  786. {
  787. sock->user_data_tls = proto_tls->ops->socket(socket);
  788. if (sock->user_data_tls == RT_NULL)
  789. {
  790. socket_delete(socket);
  791. return -1;
  792. }
  793. }
  794. #endif
  795. sock->user_data = (void *) proto_socket;
  796. return sock->socket;
  797. }
  798. return -1;
  799. }
  800. int sal_closesocket(int socket)
  801. {
  802. struct sal_socket *sock;
  803. struct sal_proto_family *pf;
  804. int error = 0;
  805. /* get the socket object by socket descriptor */
  806. SAL_SOCKET_OBJ_GET(sock, socket);
  807. /* clsoesocket operation not nead to vaild network interface status */
  808. /* valid the network interface socket opreation */
  809. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, socket);
  810. if (pf->skt_ops->closesocket((int) sock->user_data) == 0)
  811. {
  812. #ifdef SAL_USING_TLS
  813. if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, closesocket))
  814. {
  815. if (proto_tls->ops->closesocket(sock->user_data_tls) < 0)
  816. {
  817. return -1;
  818. }
  819. }
  820. #endif
  821. error = 0;
  822. }
  823. else
  824. {
  825. error = -1;
  826. }
  827. /* delete socket */
  828. socket_delete(socket);
  829. return error;
  830. }
  831. int sal_ioctlsocket(int socket, long cmd, void *arg)
  832. {
  833. struct sal_socket *sock;
  834. struct sal_proto_family *pf;
  835. /* get the socket object by socket descriptor */
  836. SAL_SOCKET_OBJ_GET(sock, socket);
  837. /* check the network interface socket opreation */
  838. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, ioctlsocket);
  839. return pf->skt_ops->ioctlsocket((int) sock->user_data, cmd, arg);
  840. }
  841. #ifdef SAL_USING_POSIX
  842. int sal_poll(struct dfs_fd *file, struct rt_pollreq *req)
  843. {
  844. struct sal_socket *sock;
  845. struct sal_proto_family *pf;
  846. int socket = (int) file->data;
  847. /* get the socket object by socket descriptor */
  848. SAL_SOCKET_OBJ_GET(sock, socket);
  849. /* check the network interface is up status */
  850. SAL_NETDEV_IS_UP(sock->netdev);
  851. /* check the network interface socket opreation */
  852. SAL_NETDEV_SOCKETOPS_VALID(sock->netdev, pf, poll);
  853. return pf->skt_ops->poll(file, req);
  854. }
  855. #endif
  856. struct hostent *sal_gethostbyname(const char *name)
  857. {
  858. struct netdev *netdev = netdev_default;
  859. struct sal_proto_family *pf;
  860. if (SAL_NETDEV_NETDBOPS_VALID(netdev, pf, gethostbyname))
  861. {
  862. return pf->netdb_ops->gethostbyname(name);
  863. }
  864. else
  865. {
  866. /* get the first network interface device with up status */
  867. netdev = netdev_get_first_by_flags(NETDEV_FLAG_UP);
  868. if (SAL_NETDEV_NETDBOPS_VALID(netdev, pf, gethostbyname))
  869. {
  870. return pf->netdb_ops->gethostbyname(name);
  871. }
  872. }
  873. return RT_NULL;
  874. }
  875. int sal_gethostbyname_r(const char *name, struct hostent *ret, char *buf,
  876. size_t buflen, struct hostent **result, int *h_errnop)
  877. {
  878. struct netdev *netdev = netdev_default;
  879. struct sal_proto_family *pf;
  880. if (SAL_NETDEV_NETDBOPS_VALID(netdev, pf, gethostbyname_r))
  881. {
  882. return pf->netdb_ops->gethostbyname_r(name, ret, buf, buflen, result, h_errnop);
  883. }
  884. else
  885. {
  886. /* get the first network interface device with up status */
  887. netdev = netdev_get_first_by_flags(NETDEV_FLAG_UP);
  888. if (SAL_NETDEV_NETDBOPS_VALID(netdev, pf, gethostbyname_r))
  889. {
  890. return pf->netdb_ops->gethostbyname_r(name, ret, buf, buflen, result, h_errnop);
  891. }
  892. }
  893. return -1;
  894. }
  895. int sal_getaddrinfo(const char *nodename,
  896. const char *servname,
  897. const struct addrinfo *hints,
  898. struct addrinfo **res)
  899. {
  900. struct netdev *netdev = netdev_default;
  901. struct sal_proto_family *pf;
  902. if (SAL_NETDEV_NETDBOPS_VALID(netdev, pf, getaddrinfo))
  903. {
  904. return pf->netdb_ops->getaddrinfo(nodename, servname, hints, res);
  905. }
  906. else
  907. {
  908. /* get the first network interface device with up status */
  909. netdev = netdev_get_first_by_flags(NETDEV_FLAG_UP);
  910. if (SAL_NETDEV_NETDBOPS_VALID(netdev, pf, getaddrinfo))
  911. {
  912. return pf->netdb_ops->getaddrinfo(nodename, servname, hints, res);
  913. }
  914. }
  915. return -1;
  916. }
  917. void sal_freeaddrinfo(struct addrinfo *ai)
  918. {
  919. struct netdev *netdev = netdev_default;
  920. struct sal_proto_family *pf;
  921. if (SAL_NETDEV_NETDBOPS_VALID(netdev, pf, freeaddrinfo))
  922. {
  923. pf->netdb_ops->freeaddrinfo(ai);
  924. }
  925. else
  926. {
  927. /* get the first network interface device with up status */
  928. netdev = netdev_get_first_by_flags(NETDEV_FLAG_UP);
  929. if (SAL_NETDEV_NETDBOPS_VALID(netdev, pf, freeaddrinfo))
  930. {
  931. pf->netdb_ops->freeaddrinfo(ai);
  932. }
  933. }
  934. }