Annotation of libaitrpc/src/aitrpc.c, revision 1.20
1.1 misho 1: /*************************************************************************
2: * (C) 2010 AITNET ltd - Sofia/Bulgaria - <misho@aitbg.com>
3: * by Michael Pounov <misho@openbsd-bg.org>
4: *
5: * $Author: misho $
1.20 ! misho 6: * $Id: aitrpc.c,v 1.19.2.2 2015/07/22 15:07:10 misho Exp $
1.1 misho 7: *
1.2 misho 8: **************************************************************************
9: The ELWIX and AITNET software is distributed under the following
10: terms:
11:
12: All of the documentation and software included in the ELWIX and AITNET
13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
14:
1.17 misho 15: Copyright 2004 - 2015
1.2 misho 16: by Michael Pounov <misho@elwix.org>. All rights reserved.
17:
18: Redistribution and use in source and binary forms, with or without
19: modification, are permitted provided that the following conditions
20: are met:
21: 1. Redistributions of source code must retain the above copyright
22: notice, this list of conditions and the following disclaimer.
23: 2. Redistributions in binary form must reproduce the above copyright
24: notice, this list of conditions and the following disclaimer in the
25: documentation and/or other materials provided with the distribution.
26: 3. All advertising materials mentioning features or use of this software
27: must display the following acknowledgement:
28: This product includes software developed by Michael Pounov <misho@elwix.org>
29: ELWIX - Embedded LightWeight unIX and its contributors.
30: 4. Neither the name of AITNET nor the names of its contributors
31: may be used to endorse or promote products derived from this software
32: without specific prior written permission.
33:
34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
37: ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
44: SUCH DAMAGE.
45: */
1.1 misho 46: #include "global.h"
47:
48:
49: #pragma GCC visibility push(hidden)
50:
51: int rpc_Errno;
52: char rpc_Error[STRSIZ];
53:
54: #pragma GCC visibility pop
55:
56: // rpc_GetErrno() Get error code of last operation
1.10 misho 57: int
1.1 misho 58: rpc_GetErrno()
59: {
60: return rpc_Errno;
61: }
62:
63: // rpc_GetError() Get error text of last operation
1.10 misho 64: const char *
1.1 misho 65: rpc_GetError()
66: {
67: return rpc_Error;
68: }
69:
70: // rpc_SetErr() Set error to variables for internal use!!!
1.10 misho 71: void
1.1 misho 72: rpc_SetErr(int eno, char *estr, ...)
73: {
74: va_list lst;
75:
76: rpc_Errno = eno;
1.8 misho 77: memset(rpc_Error, 0, sizeof rpc_Error);
1.1 misho 78: va_start(lst, estr);
1.8 misho 79: vsnprintf(rpc_Error, sizeof rpc_Error, estr, lst);
1.1 misho 80: va_end(lst);
81: }
82:
83:
1.4 misho 84: /*
1.6 misho 85: * rpc_chkPktSession() - Check RPC session
1.5 misho 86: *
1.4 misho 87: * @p = packet session
88: * @s = active session
1.6 misho 89: * return: -1, 1, 2, 3 are errors or 0 ok
1.4 misho 90: */
1.10 misho 91: int
1.4 misho 92: rpc_chkPktSession(rpc_sess_t *p, rpc_sess_t *s)
93: {
94: if (!p || !s)
95: return -1;
96:
97: if (p->sess_version != s->sess_version)
98: return 1;
1.9 misho 99: if (p->sess_instance != s->sess_instance)
1.4 misho 100: return 2;
101:
102: return 0;
103: }
104:
105: /*
1.6 misho 106: * rpc_addPktSession() - Prepare session into network format
1.5 misho 107: *
1.4 misho 108: * @p = packet session
1.6 misho 109: * @s = host session
1.4 misho 110: * return: -1 error or 0 ok
111: */
1.10 misho 112: int
1.4 misho 113: rpc_addPktSession(rpc_sess_t *p, rpc_sess_t *s)
114: {
115: if (!p || !s)
116: return -1;
117:
118: p->sess_version = s->sess_version;
1.9 misho 119: p->sess_instance = s->sess_instance;
1.4 misho 120:
121: return 0;
122: }
1.11 misho 123:
124: /*
125: * rpc_Read() - RPC read operation
126: *
127: * @sock = socket
128: * @type = type of socket
129: * @flags = receive flags
130: * @sa = check client address, if you use udp protocol
1.18 misho 131: * @pkt = RPC packet
1.14 misho 132: * return: -1 error, 0 EOF or or >0 readed bytes into buffer
1.11 misho 133: */
134: ssize_t
1.18 misho 135: rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, ait_val_t * __restrict pkt)
1.11 misho 136: {
137: struct pollfd pfd;
138: sockaddr_t sa2;
139: socklen_t salen;
1.19 misho 140: int ret = 0, hlen, cx = 0;
1.16 misho 141: struct ether_header *eh;
142: struct bpf_hdr *h;
143: ether_addr_t bcst = {{ [0 ... sizeof bcst - 1] = 0xff }};
1.18 misho 144: u_char *buf = AIT_GET_BUF(pkt);
145: size_t blen = AIT_LEN(pkt);
146: struct tagRPCCall *rpc = (struct tagRPCCall *) buf;
1.19 misho 147: ait_val_t v = AIT_VAL_INIT;
1.16 misho 148:
1.19 misho 149: try2read:
1.11 misho 150: pfd.fd = sock;
151: pfd.events = POLLIN | POLLPRI;
152: memset(buf, 0, blen);
153: memset(&sa2, 0, sizeof sa2);
1.20 ! misho 154: salen = sa2.ss.ss_len = (u_char) MIN(sizeof(sockaddr_t), 0xff);
1.19 misho 155: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
156: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
157: if (ret)
158: LOGERR;
159: else
160: rpc_SetErr(ETIMEDOUT, "Timeout reached! Server not respond");
161: return -1;
162: }
163:
164: switch (type) {
165: case SOCK_STREAM:
166: ret = recv(sock, buf, blen, flags);
167: break;
168: case SOCK_EXT:
169: ret = read(sock, buf, blen);
170: break;
171: case SOCK_BPF:
172: if (!sa) {
173: rpc_SetErr(EINVAL, "Invalid argument(s)!");
174: return -1;
175: }
176:
177: AIT_SET_BUF(&v, NULL, blen);
178: h = (struct bpf_hdr*) AIT_GET_BUF(&v);
1.11 misho 179:
1.16 misho 180: ret = read(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
181: if (ret > 0) {
182: ret -= h->bh_hdrlen;
183: if (ret < h->bh_caplen || h->bh_caplen != h->bh_datalen ||
184: ret < ETHER_HDR_LEN + sizeof(struct tagRPCCall)) {
1.19 misho 185: AIT_FREE_VAL(&v);
1.16 misho 186: if (cx < 3) {
187: cx++;
188: ret ^= ret;
1.19 misho 189: goto try2read; /* wait for known address */
190: } else
1.16 misho 191: return -1;
192: }
193: ret = h->bh_caplen;
194: eh = (struct ether_header*) (AIT_GET_BUF(&v) + h->bh_hdrlen);
195: ret -= ETHER_HDR_LEN;
196: if (eh->ether_type != ntohs(RPC_DEFPORT)) {
1.19 misho 197: AIT_FREE_VAL(&v);
1.16 misho 198: if (cx < 3) {
199: cx++;
200: ret ^= ret;
1.19 misho 201: goto try2read; /* wait for known address */
202: } else
1.16 misho 203: return -1;
204: }
1.18 misho 205:
1.16 misho 206: if (!memcmp(bcst.octet, eh->ether_dhost, sizeof bcst) ||
207: !memcmp(bcst.octet, eh->ether_shost, sizeof bcst)) {
1.19 misho 208: AIT_FREE_VAL(&v);
1.16 misho 209: if (cx < 3) {
210: cx++;
211: ret ^= ret;
1.19 misho 212: goto try2read; /* wait for known address */
213: } else
1.16 misho 214: return -1;
215: }
1.19 misho 216: memcpy(buf, (u_char*) (eh + 1), MIN(ret, blen));
1.16 misho 217: AIT_FREE_VAL(&v);
218: }
1.19 misho 219: break;
220: case SOCK_RAW:
221: case SOCK_DGRAM:
222: if (!sa) {
223: rpc_SetErr(EINVAL, "Invalid argument(s)!");
224: return -1;
225: }
226:
227: ret = recvfrom(sock, buf, blen, flags, &sa2.sa, &salen);
228: if (ret > -1 && e_addrcmp(sa, &sa2, 42)) {
1.18 misho 229: if (cx < 3) {
230: cx++;
231: ret ^= ret;
1.19 misho 232: goto try2read; /* wait for known address */
1.18 misho 233: } else
234: return -1;
1.11 misho 235: }
1.19 misho 236: break;
237: default:
238: rpc_SetErr(EINVAL, "Invalid argument(s)!");
1.13 misho 239: return -1;
1.19 misho 240: }
241: if (ret < 0) {
242: LOGERR;
243: return -1;
244: }
245: if (!ret) /* EOF */
246: return 0;
1.18 misho 247:
1.19 misho 248: /* check RPC packet header */
249: if (type == SOCK_RAW) {
250: hlen = sa->sa.sa_family == AF_INET ?
251: sizeof(struct ip) : sizeof(struct ip6_hdr);
252: ret -= hlen;
253: if (ret > 0)
254: memmove(buf, buf + hlen, blen - hlen);
255: }
1.18 misho 256:
1.19 misho 257: /* 1st read for RPC header */
258: if (ret < sizeof(struct tagRPCCall) || ret < ntohl(rpc->call_len)) {
259: rpc_SetErr(ERPCMISMATCH, "Short RPC packet %d bytes", ret);
260: return -1;
261: }
262: /* check for loop request */
263: if (!(rpc->call_io & RPC_ACK)) {
264: if (cx < 3) {
265: cx++;
266: ret ^= ret;
267: goto try2read; /* wait for known address */
268: } else {
269: rpc_SetErr(ERPCMISMATCH, "Loop in RPC communication");
270: return -1;
1.18 misho 271: }
1.11 misho 272: }
273:
274: return ret;
275: }
276:
277: /*
278: * rpc_Write() - RPC write operation
279: *
280: * @sock = socket
281: * @type = type of socket
282: * @flags = send flags
283: * @sa = send to client address, if you use udp protocol
1.18 misho 284: * @pkt = RPC packet
1.11 misho 285: * @blen = buffer length
1.14 misho 286: * return: -1 error, 0 EOF or >0 written bytes into buffer
1.11 misho 287: */
288: ssize_t
289: rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa,
1.18 misho 290: ait_val_t * __restrict pkt, size_t blen)
1.11 misho 291: {
292: struct pollfd pfd;
1.19 misho 293: int ret = 0;
294: u_char *buf = AIT_GET_BUF(pkt);
1.16 misho 295: ait_val_t v = AIT_VAL_INIT;
296: struct ether_header *eh;
297:
1.11 misho 298:
299: pfd.fd = sock;
300: pfd.events = POLLOUT;
1.19 misho 301: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
302: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
303: if (ret > 0)
304: rpc_SetErr(EPIPE, "Disconnected RPC session\n");
305: else
306: LOGERR;
307: return -1;
308: }
309:
310: switch (type) {
311: case SOCK_STREAM:
312: ret = send(sock, buf, blen, flags);
313: break;
314: case SOCK_EXT:
315: ret = write(sock, buf, blen);
316: break;
317: case SOCK_BPF:
318: if (!sa) {
319: rpc_SetErr(EINVAL, "Invalid argument(s)!");
320: return -1;
321: }
322:
323: AIT_SET_BUF(&v, NULL, blen + sizeof(struct ether_header));
324: eh = (struct ether_header*) AIT_GET_BUF(&v);
325: memcpy(eh->ether_dhost, LLADDR(&sa->sdl), ETHER_ADDR_LEN);
326: eh->ether_type = htons(RPC_DEFPORT);
327: memcpy(eh + 1, buf, blen);
328: blen += sizeof(struct ether_header);
329:
1.16 misho 330: ret = write(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
1.19 misho 331:
332: AIT_FREE_VAL(&v);
333: break;
334: case SOCK_RAW:
335: case SOCK_DGRAM:
336: if (!sa) {
337: rpc_SetErr(EINVAL, "Invalid argument(s)!");
338: return -1;
339: }
340:
341: ret = sendto(sock, buf, blen, flags, &sa->sa, sa->sa.sa_len);
342: break;
343: default:
1.13 misho 344: rpc_SetErr(EINVAL, "Invalid argument(s)!");
345: return -1;
1.11 misho 346: }
1.19 misho 347: if (ret < 0) {
348: LOGERR;
349: return -1;
350: }
351: if (!ret) /* EOF */
352: return 0;
353:
1.13 misho 354: if (ret != blen) {
1.11 misho 355: rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, "
1.16 misho 356: "really sended %d bytes", blen, ret);
1.11 misho 357: return -1;
358: }
359:
360: return ret;
361: }
1.19 misho 362:
363: /*
364: * rpc_pktFreeSpace() - Get free space for payload into RPC packet
365: *
366: * @c = RPC client
367: * return: remains free bytes from packet
368: */
369: size_t
370: rpc_pktFreeSpace(rpc_cli_t * __restrict c)
371: {
372: return (sizeof(struct tagRPCCall) + ait_resideVars(RPC_RETVARS(c)));
373: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>