1: /*************************************************************************
2: * (C) 2010 AITNET ltd - Sofia/Bulgaria - <misho@aitbg.com>
3: * by Michael Pounov <misho@openbsd-bg.org>
4: *
5: * $Author: misho $
6: * $Id: aitrpc.c,v 1.17 2015/01/21 21:17:05 misho Exp $
7: *
8: **************************************************************************
9: The ELWIX and AITNET software is distributed under the following
10: terms:
11:
12: All of the documentation and software included in the ELWIX and AITNET
13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
14:
15: Copyright 2004 - 2015
16: by Michael Pounov <misho@elwix.org>. All rights reserved.
17:
18: Redistribution and use in source and binary forms, with or without
19: modification, are permitted provided that the following conditions
20: are met:
21: 1. Redistributions of source code must retain the above copyright
22: notice, this list of conditions and the following disclaimer.
23: 2. Redistributions in binary form must reproduce the above copyright
24: notice, this list of conditions and the following disclaimer in the
25: documentation and/or other materials provided with the distribution.
26: 3. All advertising materials mentioning features or use of this software
27: must display the following acknowledgement:
28: This product includes software developed by Michael Pounov <misho@elwix.org>
29: ELWIX - Embedded LightWeight unIX and its contributors.
30: 4. Neither the name of AITNET nor the names of its contributors
31: may be used to endorse or promote products derived from this software
32: without specific prior written permission.
33:
34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
37: ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
44: SUCH DAMAGE.
45: */
46: #include "global.h"
47:
48:
49: #pragma GCC visibility push(hidden)
50:
51: int rpc_Errno;
52: char rpc_Error[STRSIZ];
53:
54: inline int
55: rpc_funcs_cmp(struct tagRPCFunc *a, struct tagRPCFunc *b)
56: {
57: int ret;
58:
59: assert(a && b);
60:
61: ret = AIT_KEY(&a->func_name) - AIT_KEY(&b->func_name);
62:
63: if (ret < 0)
64: return -1;
65: else if (ret > 0)
66: return 1;
67:
68: return ret;
69: }
70:
71: AVL_GENERATE(tagRPCFuncs, tagRPCFunc, func_node, rpc_funcs_cmp);
72:
73: #pragma GCC visibility pop
74:
75: // rpc_GetErrno() Get error code of last operation
76: int
77: rpc_GetErrno()
78: {
79: return rpc_Errno;
80: }
81:
82: // rpc_GetError() Get error text of last operation
83: const char *
84: rpc_GetError()
85: {
86: return rpc_Error;
87: }
88:
89: // rpc_SetErr() Set error to variables for internal use!!!
90: void
91: rpc_SetErr(int eno, char *estr, ...)
92: {
93: va_list lst;
94:
95: rpc_Errno = eno;
96: memset(rpc_Error, 0, sizeof rpc_Error);
97: va_start(lst, estr);
98: vsnprintf(rpc_Error, sizeof rpc_Error, estr, lst);
99: va_end(lst);
100: }
101:
102:
103: /*
104: * rpc_chkPktSession() - Check RPC session
105: *
106: * @p = packet session
107: * @s = active session
108: * return: -1, 1, 2, 3 are errors or 0 ok
109: */
110: int
111: rpc_chkPktSession(rpc_sess_t *p, rpc_sess_t *s)
112: {
113: if (!p || !s)
114: return -1;
115:
116: if (p->sess_version != s->sess_version)
117: return 1;
118: if (p->sess_instance != s->sess_instance)
119: return 2;
120:
121: return 0;
122: }
123:
124: /*
125: * rpc_addPktSession() - Prepare session into network format
126: *
127: * @p = packet session
128: * @s = host session
129: * return: -1 error or 0 ok
130: */
131: int
132: rpc_addPktSession(rpc_sess_t *p, rpc_sess_t *s)
133: {
134: if (!p || !s)
135: return -1;
136:
137: p->sess_version = s->sess_version;
138: p->sess_instance = s->sess_instance;
139:
140: return 0;
141: }
142:
143: /*
144: * rpc_Read() - RPC read operation
145: *
146: * @sock = socket
147: * @type = type of socket
148: * @flags = receive flags
149: * @sa = check client address, if you use udp protocol
150: * @buf = buffer
151: * @blen = buffer length
152: * return: -1 error, 0 EOF or or >0 readed bytes into buffer
153: */
154: ssize_t
155: rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa,
156: u_char * __restrict buf, size_t blen)
157: {
158: struct pollfd pfd;
159: sockaddr_t sa2;
160: socklen_t salen;
161: int ret = 0, len, cx = 0;
162: ait_val_t v = AIT_VAL_INIT;
163: struct ether_header *eh;
164: struct bpf_hdr *h;
165: ether_addr_t bcst = {{ [0 ... sizeof bcst - 1] = 0xff }};
166:
167: if (type == SOCK_BPF && sa) {
168: AIT_SET_BUF(&v, NULL, blen);
169: h = (struct bpf_hdr*) AIT_GET_BUF(&v);
170: }
171:
172: pfd.fd = sock;
173: pfd.events = POLLIN | POLLPRI;
174: memset(buf, 0, blen);
175: memset(&sa2, 0, sizeof sa2);
176: salen = sa2.ss.ss_len = sizeof(sockaddr_t);
177:
178: for (len = blen; len > 0; len -= ret, buf += ret) {
179: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
180: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
181: if (ret)
182: LOGERR;
183: else
184: rpc_SetErr(ETIMEDOUT, "Timeout reached! Server not respond");
185: if (type == SOCK_BPF)
186: AIT_FREE_VAL(&v);
187: return -1;
188: }
189: if (type == SOCK_STREAM)
190: ret = recv(sock, buf, len, flags);
191: else if (type == SOCK_EXT)
192: ret = read(sock, buf, len);
193: else if (type == SOCK_BPF && sa) {
194: ret = read(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
195: if (ret > 0) {
196: ret -= h->bh_hdrlen;
197: if (ret < h->bh_caplen || h->bh_caplen != h->bh_datalen ||
198: ret < ETHER_HDR_LEN + sizeof(struct tagRPCCall)) {
199: if (cx < 3) {
200: cx++;
201: ret ^= ret;
202: continue; /* wait for known address */
203: } else {
204: AIT_FREE_VAL(&v);
205: return -1;
206: }
207: }
208: ret = h->bh_caplen;
209: eh = (struct ether_header*) (AIT_GET_BUF(&v) + h->bh_hdrlen);
210: ret -= ETHER_HDR_LEN;
211: if (eh->ether_type != ntohs(RPC_DEFPORT)) {
212: if (cx < 3) {
213: cx++;
214: ret ^= ret;
215: continue; /* wait for known address */
216: } else {
217: AIT_FREE_VAL(&v);
218: return -1;
219: }
220: }
221: #if 0
222: else
223: e_getlinkbymac((const ether_addr_t*) eh->ether_shost, &sa2);
224: if (sa && e_addrcmp(sa, &sa2, 0)) {
225: #else
226: if (!memcmp(bcst.octet, eh->ether_dhost, sizeof bcst) ||
227: !memcmp(bcst.octet, eh->ether_shost, sizeof bcst)) {
228: #endif
229: if (cx < 3) {
230: cx++;
231: ret ^= ret;
232: continue; /* wait for known address */
233: } else {
234: AIT_FREE_VAL(&v);
235: return -1;
236: }
237: }
238: memcpy(buf, (u_char*) (eh + 1), MIN(ret, len));
239: AIT_FREE_VAL(&v);
240: return ret;
241: }
242: } else {
243: ret = recvfrom(sock, buf, len, flags, &sa2.sa, &salen);
244: if (ret > -1 && sa && e_addrcmp(sa, &sa2, 42)) {
245: ret ^= ret;
246: continue; /* wait for known address */
247: }
248: }
249: if (ret == -1) {
250: LOGERR;
251: if (type == SOCK_BPF)
252: AIT_FREE_VAL(&v);
253: return -1;
254: }
255: if (!ret) { /* EOF */
256: if (type == SOCK_BPF)
257: AIT_FREE_VAL(&v);
258: return 0;
259: }
260: }
261: ret = blen - len;
262:
263: if (type == SOCK_BPF)
264: AIT_FREE_VAL(&v);
265: return ret;
266: }
267:
268: /*
269: * rpc_Write() - RPC write operation
270: *
271: * @sock = socket
272: * @type = type of socket
273: * @flags = send flags
274: * @sa = send to client address, if you use udp protocol
275: * @buf = buffer
276: * @blen = buffer length
277: * return: -1 error, 0 EOF or >0 written bytes into buffer
278: */
279: ssize_t
280: rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa,
281: u_char * __restrict buf, size_t blen)
282: {
283: struct pollfd pfd;
284: int ret = 0, len = 0;
285: ait_val_t v = AIT_VAL_INIT;
286: struct ether_header *eh;
287:
288: if (type == SOCK_BPF && sa) {
289: AIT_SET_BUF(&v, NULL, blen + sizeof(struct ether_header));
290: eh = (struct ether_header*) AIT_GET_BUF(&v);
291: memcpy(eh->ether_dhost, LLADDR(&sa->sdl), ETHER_ADDR_LEN);
292: eh->ether_type = htons(RPC_DEFPORT);
293: memcpy(eh + 1, buf, blen);
294: blen += sizeof(struct ether_header);
295: }
296:
297: pfd.fd = sock;
298: pfd.events = POLLOUT;
299: for (len = blen; len > 0; len -= ret, buf += ret) {
300: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
301: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
302: #if 0
303: if (!ret)
304: continue;
305: #endif
306: if (ret > 0)
307: rpc_SetErr(EPIPE, "Disconnected RPC session\n");
308: else
309: LOGERR;
310: if (type == SOCK_BPF)
311: AIT_FREE_VAL(&v);
312: return -1;
313: }
314: if (type == SOCK_STREAM)
315: ret = send(sock, buf, len, flags);
316: else if (type == SOCK_EXT)
317: ret = write(sock, buf, len);
318: else if (type == SOCK_BPF && sa) {
319: ret = write(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
320: } else if (sa)
321: ret = sendto(sock, buf, len, flags, &sa->sa, sa->sa.sa_len);
322: else {
323: rpc_SetErr(EINVAL, "Invalid argument(s)!");
324: if (type == SOCK_BPF)
325: AIT_FREE_VAL(&v);
326: return -1;
327: }
328: if (ret == -1) {
329: LOGERR;
330: if (type == SOCK_BPF)
331: AIT_FREE_VAL(&v);
332: return -1;
333: }
334: if (!ret) { /* EOF */
335: if (type == SOCK_BPF)
336: AIT_FREE_VAL(&v);
337: return 0;
338: }
339: }
340: ret = blen - len;
341: if (ret != blen) {
342: rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, "
343: "really sended %d bytes", blen, ret);
344: if (type == SOCK_BPF)
345: AIT_FREE_VAL(&v);
346: return -1;
347: }
348:
349: if (type == SOCK_BPF)
350: AIT_FREE_VAL(&v);
351: return ret;
352: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>