Annotation of libaitrpc/src/aitrpc.c, revision 1.19
1.1 misho 1: /*************************************************************************
2: * (C) 2010 AITNET ltd - Sofia/Bulgaria - <misho@aitbg.com>
3: * by Michael Pounov <misho@openbsd-bg.org>
4: *
5: * $Author: misho $
1.19 ! misho 6: * $Id: aitrpc.c,v 1.18.2.3 2015/07/02 21:52:29 misho Exp $
1.1 misho 7: *
1.2 misho 8: **************************************************************************
9: The ELWIX and AITNET software is distributed under the following
10: terms:
11:
12: All of the documentation and software included in the ELWIX and AITNET
13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
14:
1.17 misho 15: Copyright 2004 - 2015
1.2 misho 16: by Michael Pounov <misho@elwix.org>. All rights reserved.
17:
18: Redistribution and use in source and binary forms, with or without
19: modification, are permitted provided that the following conditions
20: are met:
21: 1. Redistributions of source code must retain the above copyright
22: notice, this list of conditions and the following disclaimer.
23: 2. Redistributions in binary form must reproduce the above copyright
24: notice, this list of conditions and the following disclaimer in the
25: documentation and/or other materials provided with the distribution.
26: 3. All advertising materials mentioning features or use of this software
27: must display the following acknowledgement:
28: This product includes software developed by Michael Pounov <misho@elwix.org>
29: ELWIX - Embedded LightWeight unIX and its contributors.
30: 4. Neither the name of AITNET nor the names of its contributors
31: may be used to endorse or promote products derived from this software
32: without specific prior written permission.
33:
34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
37: ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
44: SUCH DAMAGE.
45: */
1.1 misho 46: #include "global.h"
47:
48:
49: #pragma GCC visibility push(hidden)
50:
51: int rpc_Errno;
52: char rpc_Error[STRSIZ];
53:
54: #pragma GCC visibility pop
55:
56: // rpc_GetErrno() Get error code of last operation
1.10 misho 57: int
1.1 misho 58: rpc_GetErrno()
59: {
60: return rpc_Errno;
61: }
62:
63: // rpc_GetError() Get error text of last operation
1.10 misho 64: const char *
1.1 misho 65: rpc_GetError()
66: {
67: return rpc_Error;
68: }
69:
70: // rpc_SetErr() Set error to variables for internal use!!!
1.10 misho 71: void
1.1 misho 72: rpc_SetErr(int eno, char *estr, ...)
73: {
74: va_list lst;
75:
76: rpc_Errno = eno;
1.8 misho 77: memset(rpc_Error, 0, sizeof rpc_Error);
1.1 misho 78: va_start(lst, estr);
1.8 misho 79: vsnprintf(rpc_Error, sizeof rpc_Error, estr, lst);
1.1 misho 80: va_end(lst);
81: }
82:
83:
1.4 misho 84: /*
1.6 misho 85: * rpc_chkPktSession() - Check RPC session
1.5 misho 86: *
1.4 misho 87: * @p = packet session
88: * @s = active session
1.6 misho 89: * return: -1, 1, 2, 3 are errors or 0 ok
1.4 misho 90: */
1.10 misho 91: int
1.4 misho 92: rpc_chkPktSession(rpc_sess_t *p, rpc_sess_t *s)
93: {
94: if (!p || !s)
95: return -1;
96:
97: if (p->sess_version != s->sess_version)
98: return 1;
1.9 misho 99: if (p->sess_instance != s->sess_instance)
1.4 misho 100: return 2;
101:
102: return 0;
103: }
104:
105: /*
1.6 misho 106: * rpc_addPktSession() - Prepare session into network format
1.5 misho 107: *
1.4 misho 108: * @p = packet session
1.6 misho 109: * @s = host session
1.4 misho 110: * return: -1 error or 0 ok
111: */
1.10 misho 112: int
1.4 misho 113: rpc_addPktSession(rpc_sess_t *p, rpc_sess_t *s)
114: {
115: if (!p || !s)
116: return -1;
117:
118: p->sess_version = s->sess_version;
1.9 misho 119: p->sess_instance = s->sess_instance;
1.4 misho 120:
121: return 0;
122: }
1.11 misho 123:
124: /*
125: * rpc_Read() - RPC read operation
126: *
127: * @sock = socket
128: * @type = type of socket
129: * @flags = receive flags
130: * @sa = check client address, if you use udp protocol
1.18 misho 131: * @pkt = RPC packet
1.14 misho 132: * return: -1 error, 0 EOF or or >0 readed bytes into buffer
1.11 misho 133: */
134: ssize_t
1.18 misho 135: rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, ait_val_t * __restrict pkt)
1.11 misho 136: {
137: struct pollfd pfd;
138: sockaddr_t sa2;
139: socklen_t salen;
1.19 ! misho 140: int ret = 0, hlen, cx = 0;
1.16 misho 141: struct ether_header *eh;
142: struct bpf_hdr *h;
143: ether_addr_t bcst = {{ [0 ... sizeof bcst - 1] = 0xff }};
1.18 misho 144: u_char *buf = AIT_GET_BUF(pkt);
145: size_t blen = AIT_LEN(pkt);
146: struct tagRPCCall *rpc = (struct tagRPCCall *) buf;
1.19 ! misho 147: ait_val_t v = AIT_VAL_INIT;
1.16 misho 148:
1.19 ! misho 149: try2read:
1.11 misho 150: pfd.fd = sock;
151: pfd.events = POLLIN | POLLPRI;
152: memset(buf, 0, blen);
153: memset(&sa2, 0, sizeof sa2);
154: salen = sa2.ss.ss_len = sizeof(sockaddr_t);
1.19 ! misho 155: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
! 156: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
! 157: if (ret)
! 158: LOGERR;
! 159: else
! 160: rpc_SetErr(ETIMEDOUT, "Timeout reached! Server not respond");
! 161: return -1;
! 162: }
! 163:
! 164: switch (type) {
! 165: case SOCK_STREAM:
! 166: ret = recv(sock, buf, blen, flags);
! 167: break;
! 168: case SOCK_EXT:
! 169: ret = read(sock, buf, blen);
! 170: break;
! 171: case SOCK_BPF:
! 172: if (!sa) {
! 173: rpc_SetErr(EINVAL, "Invalid argument(s)!");
! 174: return -1;
! 175: }
! 176:
! 177: AIT_SET_BUF(&v, NULL, blen);
! 178: h = (struct bpf_hdr*) AIT_GET_BUF(&v);
1.11 misho 179:
1.16 misho 180: ret = read(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
181: if (ret > 0) {
182: ret -= h->bh_hdrlen;
183: if (ret < h->bh_caplen || h->bh_caplen != h->bh_datalen ||
184: ret < ETHER_HDR_LEN + sizeof(struct tagRPCCall)) {
1.19 ! misho 185: AIT_FREE_VAL(&v);
1.16 misho 186: if (cx < 3) {
187: cx++;
188: ret ^= ret;
1.19 ! misho 189: goto try2read; /* wait for known address */
! 190: } else
1.16 misho 191: return -1;
192: }
193: ret = h->bh_caplen;
194: eh = (struct ether_header*) (AIT_GET_BUF(&v) + h->bh_hdrlen);
195: ret -= ETHER_HDR_LEN;
196: if (eh->ether_type != ntohs(RPC_DEFPORT)) {
1.19 ! misho 197: AIT_FREE_VAL(&v);
1.16 misho 198: if (cx < 3) {
199: cx++;
200: ret ^= ret;
1.19 ! misho 201: goto try2read; /* wait for known address */
! 202: } else
1.16 misho 203: return -1;
204: }
1.18 misho 205:
1.16 misho 206: if (!memcmp(bcst.octet, eh->ether_dhost, sizeof bcst) ||
207: !memcmp(bcst.octet, eh->ether_shost, sizeof bcst)) {
1.19 ! misho 208: AIT_FREE_VAL(&v);
1.16 misho 209: if (cx < 3) {
210: cx++;
211: ret ^= ret;
1.19 ! misho 212: goto try2read; /* wait for known address */
! 213: } else
1.16 misho 214: return -1;
215: }
1.19 ! misho 216: memcpy(buf, (u_char*) (eh + 1), MIN(ret, blen));
1.16 misho 217: AIT_FREE_VAL(&v);
218: }
1.19 ! misho 219: break;
! 220: case SOCK_RAW:
! 221: case SOCK_DGRAM:
! 222: if (!sa) {
! 223: rpc_SetErr(EINVAL, "Invalid argument(s)!");
! 224: return -1;
! 225: }
! 226:
! 227: ret = recvfrom(sock, buf, blen, flags, &sa2.sa, &salen);
! 228: if (ret > -1 && e_addrcmp(sa, &sa2, 42)) {
1.18 misho 229: if (cx < 3) {
230: cx++;
231: ret ^= ret;
1.19 ! misho 232: goto try2read; /* wait for known address */
1.18 misho 233: } else
234: return -1;
1.11 misho 235: }
1.19 ! misho 236: break;
! 237: default:
! 238: rpc_SetErr(EINVAL, "Invalid argument(s)!");
1.13 misho 239: return -1;
1.19 ! misho 240: }
! 241: if (ret < 0) {
! 242: LOGERR;
! 243: return -1;
! 244: }
! 245: if (!ret) /* EOF */
! 246: return 0;
1.18 misho 247:
1.19 ! misho 248: /* check RPC packet header */
! 249: if (type == SOCK_RAW) {
! 250: hlen = sa->sa.sa_family == AF_INET ?
! 251: sizeof(struct ip) : sizeof(struct ip6_hdr);
! 252: ret -= hlen;
! 253: if (ret > 0)
! 254: memmove(buf, buf + hlen, blen - hlen);
! 255: }
1.18 misho 256:
1.19 ! misho 257: /* 1st read for RPC header */
! 258: if (ret < sizeof(struct tagRPCCall) || ret < ntohl(rpc->call_len)) {
! 259: rpc_SetErr(ERPCMISMATCH, "Short RPC packet %d bytes", ret);
! 260: return -1;
! 261: }
! 262: /* check for loop request */
! 263: if (!(rpc->call_io & RPC_ACK)) {
! 264: if (cx < 3) {
! 265: cx++;
! 266: ret ^= ret;
! 267: goto try2read; /* wait for known address */
! 268: } else {
! 269: rpc_SetErr(ERPCMISMATCH, "Loop in RPC communication");
! 270: return -1;
1.18 misho 271: }
1.11 misho 272: }
273:
274: return ret;
275: }
276:
277: /*
278: * rpc_Write() - RPC write operation
279: *
280: * @sock = socket
281: * @type = type of socket
282: * @flags = send flags
283: * @sa = send to client address, if you use udp protocol
1.18 misho 284: * @pkt = RPC packet
1.11 misho 285: * @blen = buffer length
1.14 misho 286: * return: -1 error, 0 EOF or >0 written bytes into buffer
1.11 misho 287: */
288: ssize_t
289: rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa,
1.18 misho 290: ait_val_t * __restrict pkt, size_t blen)
1.11 misho 291: {
292: struct pollfd pfd;
1.19 ! misho 293: int ret = 0;
! 294: u_char *buf = AIT_GET_BUF(pkt);
1.16 misho 295: ait_val_t v = AIT_VAL_INIT;
296: struct ether_header *eh;
297:
1.11 misho 298:
299: pfd.fd = sock;
300: pfd.events = POLLOUT;
1.19 ! misho 301: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
! 302: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
! 303: if (ret > 0)
! 304: rpc_SetErr(EPIPE, "Disconnected RPC session\n");
! 305: else
! 306: LOGERR;
! 307: return -1;
! 308: }
! 309:
! 310: switch (type) {
! 311: case SOCK_STREAM:
! 312: ret = send(sock, buf, blen, flags);
! 313: break;
! 314: case SOCK_EXT:
! 315: ret = write(sock, buf, blen);
! 316: break;
! 317: case SOCK_BPF:
! 318: if (!sa) {
! 319: rpc_SetErr(EINVAL, "Invalid argument(s)!");
! 320: return -1;
! 321: }
! 322:
! 323: AIT_SET_BUF(&v, NULL, blen + sizeof(struct ether_header));
! 324: eh = (struct ether_header*) AIT_GET_BUF(&v);
! 325: memcpy(eh->ether_dhost, LLADDR(&sa->sdl), ETHER_ADDR_LEN);
! 326: eh->ether_type = htons(RPC_DEFPORT);
! 327: memcpy(eh + 1, buf, blen);
! 328: blen += sizeof(struct ether_header);
! 329:
1.16 misho 330: ret = write(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
1.19 ! misho 331:
! 332: AIT_FREE_VAL(&v);
! 333: break;
! 334: case SOCK_RAW:
! 335: case SOCK_DGRAM:
! 336: if (!sa) {
! 337: rpc_SetErr(EINVAL, "Invalid argument(s)!");
! 338: return -1;
! 339: }
! 340:
! 341: ret = sendto(sock, buf, blen, flags, &sa->sa, sa->sa.sa_len);
! 342: break;
! 343: default:
1.13 misho 344: rpc_SetErr(EINVAL, "Invalid argument(s)!");
345: return -1;
1.11 misho 346: }
1.19 ! misho 347: if (ret < 0) {
! 348: LOGERR;
! 349: return -1;
! 350: }
! 351: if (!ret) /* EOF */
! 352: return 0;
! 353:
1.13 misho 354: if (ret != blen) {
1.11 misho 355: rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, "
1.16 misho 356: "really sended %d bytes", blen, ret);
1.11 misho 357: return -1;
358: }
359:
360: return ret;
361: }
1.19 ! misho 362:
! 363: /*
! 364: * rpc_pktFreeSpace() - Get free space for payload into RPC packet
! 365: *
! 366: * @c = RPC client
! 367: * return: remains free bytes from packet
! 368: */
! 369: size_t
! 370: rpc_pktFreeSpace(rpc_cli_t * __restrict c)
! 371: {
! 372: return (sizeof(struct tagRPCCall) + ait_resideVars(RPC_RETVARS(c)));
! 373: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>