version 1.12.4.5, 2013/11/15 09:07:42
|
version 1.15.6.1, 2014/12/11 01:15:34
|
Line 12 terms:
|
Line 12 terms:
|
All of the documentation and software included in the ELWIX and AITNET |
All of the documentation and software included in the ELWIX and AITNET |
Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org> |
Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org> |
|
|
Copyright 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 | Copyright 2004 - 2014 |
by Michael Pounov <misho@elwix.org>. All rights reserved. |
by Michael Pounov <misho@elwix.org>. All rights reserved. |
|
|
Redistribution and use in source and binary forms, with or without |
Redistribution and use in source and binary forms, with or without |
Line 149 rpc_addPktSession(rpc_sess_t *p, rpc_sess_t *s)
|
Line 149 rpc_addPktSession(rpc_sess_t *p, rpc_sess_t *s)
|
* @sa = check client address, if you use udp protocol |
* @sa = check client address, if you use udp protocol |
* @buf = buffer |
* @buf = buffer |
* @blen = buffer length |
* @blen = buffer length |
* return: -1 error or >-1 readed bytes into buffer | * return: -1 error, 0 EOF or or >0 readed bytes into buffer |
*/ |
*/ |
ssize_t |
ssize_t |
rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, |
rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, |
Line 189 rpc_Read(int sock, int type, int flags, sockaddr_t * _
|
Line 189 rpc_Read(int sock, int type, int flags, sockaddr_t * _
|
LOGERR; |
LOGERR; |
return -1; |
return -1; |
} |
} |
|
if (!ret) /* EOF */ |
|
return 0; |
} |
} |
ret = blen - len; |
ret = blen - len; |
|
|
Line 204 rpc_Read(int sock, int type, int flags, sockaddr_t * _
|
Line 206 rpc_Read(int sock, int type, int flags, sockaddr_t * _
|
* @sa = send to client address, if you use udp protocol |
* @sa = send to client address, if you use udp protocol |
* @buf = buffer |
* @buf = buffer |
* @blen = buffer length |
* @blen = buffer length |
* return: -1 error or >-1 written bytes into buffer | * return: -1 error, 0 EOF or >0 written bytes into buffer |
*/ |
*/ |
ssize_t |
ssize_t |
rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa, |
rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa, |
Line 212 rpc_Write(int sock, int type, int flags, sockaddr_t *
|
Line 214 rpc_Write(int sock, int type, int flags, sockaddr_t *
|
{ |
{ |
struct pollfd pfd; |
struct pollfd pfd; |
int ret = 0, len = 0; |
int ret = 0, len = 0; |
|
ait_val_t v = AIT_VAL_INIT; |
|
struct ether_header *eh; |
|
|
|
if (type == SOCK_BPF && sa) { |
|
AIT_SET_BUF(&v, NULL, blen + sizeof(struct ether_header)); |
|
eh = (struct ether_header*) AIT_GET_BUF(&v); |
|
memcpy(eh->ether_dhost, LLADDR(&sa->sdl), ETHER_ADDR_LEN); |
|
eh->ether_type = htons(RPC_DEFPORT); |
|
memcpy(eh + 1, buf, blen); |
|
blen += sizeof(struct ether_header); |
|
} |
|
|
pfd.fd = sock; |
pfd.fd = sock; |
pfd.events = POLLOUT; |
pfd.events = POLLOUT; |
for (len = blen; len > 0; len -= ret, buf += ret) { |
for (len = blen; len > 0; len -= ret, buf += ret) { |
if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 || |
if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 || |
pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) { |
pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) { |
|
#if 0 |
if (!ret) |
if (!ret) |
continue; |
continue; |
|
#endif |
if (ret > 0) |
if (ret > 0) |
rpc_SetErr(EPIPE, "Disconnected RPC session\n"); |
rpc_SetErr(EPIPE, "Disconnected RPC session\n"); |
else |
else |
LOGERR; |
LOGERR; |
|
if (type == SOCK_BPF) |
|
AIT_FREE_VAL(&v); |
return -1; |
return -1; |
} |
} |
if (type == SOCK_STREAM) |
if (type == SOCK_STREAM) |
ret = send(sock, buf, len, flags); |
ret = send(sock, buf, len, flags); |
else if (sa) | else if (type == SOCK_BPF && sa) { |
| ret = write(sock, AIT_GET_BUF(&v), AIT_LEN(&v)); |
| } else if (sa) |
ret = sendto(sock, buf, len, flags, &sa->sa, sa->sa.sa_len); |
ret = sendto(sock, buf, len, flags, &sa->sa, sa->sa.sa_len); |
else { |
else { |
rpc_SetErr(EINVAL, "Invalid argument(s)!"); |
rpc_SetErr(EINVAL, "Invalid argument(s)!"); |
|
if (type == SOCK_BPF) |
|
AIT_FREE_VAL(&v); |
return -1; |
return -1; |
} |
} |
if (ret == -1) { |
if (ret == -1) { |
LOGERR; |
LOGERR; |
|
if (type == SOCK_BPF) |
|
AIT_FREE_VAL(&v); |
return -1; |
return -1; |
} |
} |
|
if (!ret) { /* EOF */ |
|
if (type == SOCK_BPF) |
|
AIT_FREE_VAL(&v); |
|
return 0; |
|
} |
} |
} |
ret = blen - len; |
ret = blen - len; |
if (ret != blen) { |
if (ret != blen) { |
rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, " |
rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, " |
"really sended %d bytes", len, ret); | "really sended %d bytes", blen, ret); |
| if (type == SOCK_BPF) |
| AIT_FREE_VAL(&v); |
return -1; |
return -1; |
} |
} |
|
|
|
if (type == SOCK_BPF) |
|
AIT_FREE_VAL(&v); |
return ret; |
return ret; |
} |
} |