File:  [ELWIX - Embedded LightWeight unIX -] / libaitrpc / src / aitrpc.c
Revision 1.17: download - view: text, annotated - select for diffs - revision graph
Wed Jan 21 21:17:05 2015 UTC (9 years, 5 months ago) by misho
Branches: MAIN
CVS tags: rpc8_1, RPC8_0, HEAD
8.0

    1: /*************************************************************************
    2: * (C) 2010 AITNET ltd - Sofia/Bulgaria - <misho@aitbg.com>
    3: *  by Michael Pounov <misho@openbsd-bg.org>
    4: *
    5: * $Author: misho $
    6: * $Id: aitrpc.c,v 1.17 2015/01/21 21:17:05 misho Exp $
    7: *
    8: **************************************************************************
    9: The ELWIX and AITNET software is distributed under the following
   10: terms:
   11: 
   12: All of the documentation and software included in the ELWIX and AITNET
   13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
   14: 
   15: Copyright 2004 - 2015
   16: 	by Michael Pounov <misho@elwix.org>.  All rights reserved.
   17: 
   18: Redistribution and use in source and binary forms, with or without
   19: modification, are permitted provided that the following conditions
   20: are met:
   21: 1. Redistributions of source code must retain the above copyright
   22:    notice, this list of conditions and the following disclaimer.
   23: 2. Redistributions in binary form must reproduce the above copyright
   24:    notice, this list of conditions and the following disclaimer in the
   25:    documentation and/or other materials provided with the distribution.
   26: 3. All advertising materials mentioning features or use of this software
   27:    must display the following acknowledgement:
   28: This product includes software developed by Michael Pounov <misho@elwix.org>
   29: ELWIX - Embedded LightWeight unIX and its contributors.
   30: 4. Neither the name of AITNET nor the names of its contributors
   31:    may be used to endorse or promote products derived from this software
   32:    without specific prior written permission.
   33: 
   34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
   35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   37: ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
   38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   44: SUCH DAMAGE.
   45: */
   46: #include "global.h"
   47: 
   48: 
   49: #pragma GCC visibility push(hidden)
   50: 
   51: int rpc_Errno;
   52: char rpc_Error[STRSIZ];
   53: 
   54: inline int
   55: rpc_funcs_cmp(struct tagRPCFunc *a, struct tagRPCFunc *b)
   56: {
   57: 	int ret;
   58: 
   59: 	assert(a && b);
   60: 
   61: 	ret = AIT_KEY(&a->func_name) - AIT_KEY(&b->func_name);
   62: 
   63: 	if (ret < 0)
   64: 		return -1;
   65: 	else if (ret > 0)
   66: 		return 1;
   67: 
   68: 	return ret;
   69: }
   70: 
   71: AVL_GENERATE(tagRPCFuncs, tagRPCFunc, func_node, rpc_funcs_cmp);
   72: 
   73: #pragma GCC visibility pop
   74: 
   75: // rpc_GetErrno() Get error code of last operation
   76: int
   77: rpc_GetErrno()
   78: {
   79: 	return rpc_Errno;
   80: }
   81: 
   82: // rpc_GetError() Get error text of last operation
   83: const char *
   84: rpc_GetError()
   85: {
   86: 	return rpc_Error;
   87: }
   88: 
   89: // rpc_SetErr() Set error to variables for internal use!!!
   90: void
   91: rpc_SetErr(int eno, char *estr, ...)
   92: {
   93: 	va_list lst;
   94: 
   95: 	rpc_Errno = eno;
   96: 	memset(rpc_Error, 0, sizeof rpc_Error);
   97: 	va_start(lst, estr);
   98: 	vsnprintf(rpc_Error, sizeof rpc_Error, estr, lst);
   99: 	va_end(lst);
  100: }
  101: 
  102: 
  103: /*
  104:  * rpc_chkPktSession() - Check RPC session
  105:  *
  106:  * @p = packet session
  107:  * @s = active session
  108:  * return: -1, 1, 2, 3 are errors or 0 ok
  109:  */
  110: int
  111: rpc_chkPktSession(rpc_sess_t *p, rpc_sess_t *s)
  112: {
  113: 	if (!p || !s)
  114: 		return -1;
  115: 
  116: 	if (p->sess_version != s->sess_version)
  117: 		return 1;
  118: 	if (p->sess_instance != s->sess_instance)
  119: 		return 2;
  120: 
  121: 	return 0;
  122: }
  123: 
  124: /*
  125:  * rpc_addPktSession() - Prepare session into network format
  126:  *
  127:  * @p = packet session
  128:  * @s = host session
  129:  * return: -1 error or 0 ok
  130:  */
  131: int
  132: rpc_addPktSession(rpc_sess_t *p, rpc_sess_t *s)
  133: {
  134: 	if (!p || !s)
  135: 		return -1;
  136: 
  137: 	p->sess_version = s->sess_version;
  138: 	p->sess_instance = s->sess_instance;
  139: 
  140: 	return 0;
  141: }
  142: 
  143: /*
  144:  * rpc_Read() - RPC read operation
  145:  *
  146:  * @sock = socket
  147:  * @type = type of socket
  148:  * @flags = receive flags
  149:  * @sa = check client address, if you use udp protocol
  150:  * @buf = buffer
  151:  * @blen = buffer length
  152:  * return: -1 error, 0 EOF or or >0 readed bytes into buffer
  153:  */
  154: ssize_t
  155: rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, 
  156: 		u_char * __restrict buf, size_t blen)
  157: {
  158: 	struct pollfd pfd;
  159: 	sockaddr_t sa2;
  160: 	socklen_t salen;
  161: 	int ret = 0, len, cx = 0;
  162: 	ait_val_t v = AIT_VAL_INIT;
  163: 	struct ether_header *eh;
  164: 	struct bpf_hdr *h;
  165: 	ether_addr_t bcst = {{ [0 ... sizeof bcst - 1] = 0xff }};
  166: 
  167: 	if (type == SOCK_BPF && sa) {
  168: 		AIT_SET_BUF(&v, NULL, blen);
  169: 		h = (struct bpf_hdr*) AIT_GET_BUF(&v);
  170: 	}
  171: 
  172: 	pfd.fd = sock;
  173: 	pfd.events = POLLIN | POLLPRI;
  174: 	memset(buf, 0, blen);
  175: 	memset(&sa2, 0, sizeof sa2);
  176: 	salen = sa2.ss.ss_len = sizeof(sockaddr_t);
  177: 
  178: 	for (len = blen; len > 0; len -= ret, buf += ret) {
  179: 		if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 || 
  180: 				pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
  181: 			if (ret)
  182: 				LOGERR;
  183: 			else
  184: 				rpc_SetErr(ETIMEDOUT, "Timeout reached! Server not respond");
  185: 			if (type == SOCK_BPF)
  186: 				AIT_FREE_VAL(&v);
  187: 			return -1;
  188: 		}
  189: 		if (type == SOCK_STREAM)
  190: 			ret = recv(sock, buf, len, flags);
  191: 		else if (type == SOCK_EXT)
  192: 			ret = read(sock, buf, len);
  193: 		else if (type == SOCK_BPF && sa) {
  194: 			ret = read(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
  195: 			if (ret > 0) {
  196: 				ret -= h->bh_hdrlen;
  197: 				if (ret < h->bh_caplen || h->bh_caplen != h->bh_datalen || 
  198: 						ret < ETHER_HDR_LEN + sizeof(struct tagRPCCall)) {
  199: 					if (cx < 3) {
  200: 						cx++;
  201: 						ret ^= ret;
  202: 						continue;	/* wait for known address */
  203: 					} else {
  204: 						AIT_FREE_VAL(&v);
  205: 						return -1;
  206: 					}
  207: 				}
  208: 				ret = h->bh_caplen;
  209: 				eh = (struct ether_header*) (AIT_GET_BUF(&v) + h->bh_hdrlen);
  210: 				ret -= ETHER_HDR_LEN;
  211: 				if (eh->ether_type != ntohs(RPC_DEFPORT)) {
  212: 					if (cx < 3) {
  213: 						cx++;
  214: 						ret ^= ret;
  215: 						continue;	/* wait for known address */
  216: 					} else {
  217: 						AIT_FREE_VAL(&v);
  218: 						return -1;
  219: 					}
  220: 				}
  221: #if 0
  222: 				else
  223: 					e_getlinkbymac((const ether_addr_t*) eh->ether_shost, &sa2);
  224: 				if (sa && e_addrcmp(sa, &sa2, 0)) {
  225: #else
  226: 				if (!memcmp(bcst.octet, eh->ether_dhost, sizeof bcst) || 
  227: 						!memcmp(bcst.octet, eh->ether_shost, sizeof bcst)) {
  228: #endif
  229: 					if (cx < 3) {
  230: 						cx++;
  231: 						ret ^= ret;
  232: 						continue;	/* wait for known address */
  233: 					} else {
  234: 						AIT_FREE_VAL(&v);
  235: 						return -1;
  236: 					}
  237: 				}
  238: 				memcpy(buf, (u_char*) (eh + 1), MIN(ret, len));
  239: 				AIT_FREE_VAL(&v);
  240: 				return ret;
  241: 			}
  242: 		} else {
  243: 			ret = recvfrom(sock, buf, len, flags, &sa2.sa, &salen);
  244: 			if (ret > -1 && sa && e_addrcmp(sa, &sa2, 42)) {
  245: 				ret ^= ret;
  246: 				continue;	/* wait for known address */
  247: 			}
  248: 		}
  249: 		if (ret == -1) {
  250: 			LOGERR;
  251: 			if (type == SOCK_BPF)
  252: 				AIT_FREE_VAL(&v);
  253: 			return -1;
  254: 		}
  255: 		if (!ret) {	/* EOF */
  256: 			if (type == SOCK_BPF)
  257: 				AIT_FREE_VAL(&v);
  258: 			return 0;
  259: 		}
  260: 	}
  261: 	ret = blen - len;
  262: 
  263: 	if (type == SOCK_BPF)
  264: 		AIT_FREE_VAL(&v);
  265: 	return ret;
  266: }
  267: 
  268: /*
  269:  * rpc_Write() - RPC write operation
  270:  *
  271:  * @sock = socket
  272:  * @type = type of socket
  273:  * @flags = send flags
  274:  * @sa = send to client address, if you use udp protocol
  275:  * @buf = buffer
  276:  * @blen = buffer length
  277:  * return: -1 error, 0 EOF or >0 written bytes into buffer
  278:  */
  279: ssize_t
  280: rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa, 
  281: 		u_char * __restrict buf, size_t blen)
  282: {
  283: 	struct pollfd pfd;
  284: 	int ret = 0, len = 0;
  285: 	ait_val_t v = AIT_VAL_INIT;
  286: 	struct ether_header *eh;
  287: 
  288: 	if (type == SOCK_BPF && sa) {
  289: 		AIT_SET_BUF(&v, NULL, blen + sizeof(struct ether_header));
  290: 		eh = (struct ether_header*) AIT_GET_BUF(&v);
  291: 		memcpy(eh->ether_dhost, LLADDR(&sa->sdl), ETHER_ADDR_LEN);
  292: 		eh->ether_type = htons(RPC_DEFPORT);
  293: 		memcpy(eh + 1, buf, blen);
  294: 		blen += sizeof(struct ether_header);
  295: 	}
  296: 
  297: 	pfd.fd = sock;
  298: 	pfd.events = POLLOUT;
  299: 	for (len = blen; len > 0; len -= ret, buf += ret) {
  300: 		if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 || 
  301: 				pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
  302: #if 0
  303: 			if (!ret)
  304: 				continue;
  305: #endif
  306: 			if (ret > 0)
  307: 				rpc_SetErr(EPIPE, "Disconnected RPC session\n");
  308: 			else
  309: 				LOGERR;
  310: 			if (type == SOCK_BPF)
  311: 				AIT_FREE_VAL(&v);
  312: 			return -1;
  313: 		}
  314: 		if (type == SOCK_STREAM)
  315: 			ret = send(sock, buf, len, flags);
  316: 		else if (type == SOCK_EXT)
  317: 			ret = write(sock, buf, len);
  318: 		else if (type == SOCK_BPF && sa) {
  319: 			ret = write(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
  320: 		} else if (sa)
  321: 			ret = sendto(sock, buf, len, flags, &sa->sa, sa->sa.sa_len);
  322: 		else {
  323: 			rpc_SetErr(EINVAL, "Invalid argument(s)!");
  324: 			if (type == SOCK_BPF)
  325: 				AIT_FREE_VAL(&v);
  326: 			return -1;
  327: 		}
  328: 		if (ret == -1) {
  329: 			LOGERR;
  330: 			if (type == SOCK_BPF)
  331: 				AIT_FREE_VAL(&v);
  332: 			return -1;
  333: 		}
  334: 		if (!ret) {	/* EOF */
  335: 			if (type == SOCK_BPF)
  336: 				AIT_FREE_VAL(&v);
  337: 			return 0;
  338: 		}
  339: 	}
  340: 	ret = blen - len;
  341: 	if (ret != blen) {
  342: 		rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, "
  343: 				"really sended %d bytes", blen, ret);
  344: 		if (type == SOCK_BPF)
  345: 			AIT_FREE_VAL(&v);
  346: 		return -1;
  347: 	}
  348: 
  349: 	if (type == SOCK_BPF)
  350: 		AIT_FREE_VAL(&v);
  351: 	return ret;
  352: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>