version 1.6, 2011/11/03 15:32:21
|
version 1.6.2.3, 2012/03/15 00:44:24
|
Line 12 terms:
|
Line 12 terms:
|
All of the documentation and software included in the ELWIX and AITNET |
All of the documentation and software included in the ELWIX and AITNET |
Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org> |
Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org> |
|
|
Copyright 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011 | Copyright 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012 |
by Michael Pounov <misho@elwix.org>. All rights reserved. |
by Michael Pounov <misho@elwix.org>. All rights reserved. |
|
|
Redistribution and use in source and binary forms, with or without |
Redistribution and use in source and binary forms, with or without |
Line 47 SUCH DAMAGE.
|
Line 47 SUCH DAMAGE.
|
|
|
|
|
/* |
/* |
* rpc_cli_openBLOBClient() Connect to BLOB Server | * rpc_cli_openBLOBClient() - Connect to BLOB Server |
| * |
* @rpccli = RPC Client session |
* @rpccli = RPC Client session |
* @Port = Port for bind server, if Port == 0 default port is selected |
* @Port = Port for bind server, if Port == 0 default port is selected |
* return: NULL == error or !=NULL connection to BLOB server established |
* return: NULL == error or !=NULL connection to BLOB server established |
Line 62 rpc_cli_openBLOBClient(rpc_cli_t * __restrict rpccli,
|
Line 63 rpc_cli_openBLOBClient(rpc_cli_t * __restrict rpccli,
|
if (!rpccli || |
if (!rpccli || |
(rpccli->cli_sa.sa.sa_family != AF_INET && rpccli->cli_sa.sa.sa_family != AF_INET6 && |
(rpccli->cli_sa.sa.sa_family != AF_INET && rpccli->cli_sa.sa.sa_family != AF_INET6 && |
rpccli->cli_sa.sa.sa_family != AF_LOCAL)) { |
rpccli->cli_sa.sa.sa_family != AF_LOCAL)) { |
rpc_SetErr(EINVAL, "Error:: Invalid parameters can`t connect to BLOB server ...\n"); | rpc_SetErr(EINVAL, "Invalid parameters can`t connect to BLOB server"); |
return NULL; |
return NULL; |
} |
} |
|
|
Line 118 rpc_cli_openBLOBClient(rpc_cli_t * __restrict rpccli,
|
Line 119 rpc_cli_openBLOBClient(rpc_cli_t * __restrict rpccli,
|
} |
} |
|
|
/* |
/* |
* rpc_cli_closeBLOBClient() Close connection to BLOB server and free resources | * rpc_cli_closeBLOBClient() - Close connection to BLOB server and free resources |
| * |
* @cli = BLOB Client session |
* @cli = BLOB Client session |
* return: none |
* return: none |
*/ |
*/ |
Line 126 void
|
Line 128 void
|
rpc_cli_closeBLOBClient(rpc_cli_t * __restrict cli) |
rpc_cli_closeBLOBClient(rpc_cli_t * __restrict cli) |
{ |
{ |
if (!cli) { |
if (!cli) { |
rpc_SetErr(EINVAL, "Error:: Can`t close connection because parameter is null!\n"); | rpc_SetErr(EINVAL, "Can`t close connection because parameter is null!"); |
return; |
return; |
} |
} |
|
|
Line 140 rpc_cli_closeBLOBClient(rpc_cli_t * __restrict cli)
|
Line 142 rpc_cli_closeBLOBClient(rpc_cli_t * __restrict cli)
|
// -------------------------------------------------------------- |
// -------------------------------------------------------------- |
|
|
/* |
/* |
* rpc_cli_openClient() Connect to RPC Server | * rpc_cli_openClient() - Connect to RPC Server |
| * |
* @ProgID = ProgramID for RPC session request |
* @ProgID = ProgramID for RPC session request |
* @ProcID = ProcessID for RPC session request |
* @ProcID = ProcessID for RPC session request |
* @netBuf = Network buffer length, if =0 == BUFSIZ (also meaning max RPC packet) |
* @netBuf = Network buffer length, if =0 == BUFSIZ (also meaning max RPC packet) |
|
* @Timeout = RPC timeout in seconds, if =0 set default RPC timeout |
* @family = Family socket type, AF_INET or AF_INET6 |
* @family = Family socket type, AF_INET or AF_INET6 |
* @csHost = Host name or IP address for bind server |
* @csHost = Host name or IP address for bind server |
* @Port = Port for bind server, if Port == 0 default port is selected |
* @Port = Port for bind server, if Port == 0 default port is selected |
* return: NULL == error or !=NULL connection to RPC server established |
* return: NULL == error or !=NULL connection to RPC server established |
*/ |
*/ |
rpc_cli_t * |
rpc_cli_t * |
rpc_cli_openClient(u_int ProgID, u_int ProcID, int netBuf, u_short family, const char *csHost, u_short Port) | rpc_cli_openClient(u_int ProgID, u_int ProcID, int netBuf, u_char Timeout, |
| u_short family, const char *csHost, u_short Port) |
{ |
{ |
rpc_cli_t *cli = NULL; |
rpc_cli_t *cli = NULL; |
struct hostent *host = NULL; |
struct hostent *host = NULL; |
Line 165 rpc_cli_openClient(u_int ProgID, u_int ProcID, int net
|
Line 170 rpc_cli_openClient(u_int ProgID, u_int ProcID, int net
|
Port = RPC_DEFPORT; |
Port = RPC_DEFPORT; |
if (!netBuf) |
if (!netBuf) |
netBuf = BUFSIZ; |
netBuf = BUFSIZ; |
|
if (!Timeout) |
|
Timeout = DEF_RPC_TIMEOUT; |
if (csHost && family != AF_LOCAL) { |
if (csHost && family != AF_LOCAL) { |
host = gethostbyname2(csHost, family); |
host = gethostbyname2(csHost, family); |
if (!host) { |
if (!host) { |
Line 212 rpc_cli_openClient(u_int ProgID, u_int ProcID, int net
|
Line 219 rpc_cli_openClient(u_int ProgID, u_int ProcID, int net
|
return NULL; |
return NULL; |
} else { |
} else { |
((rpc_sess_t*) cli->cli_parent)->sess_version = RPC_VERSION; |
((rpc_sess_t*) cli->cli_parent)->sess_version = RPC_VERSION; |
|
((rpc_sess_t*) cli->cli_parent)->sess_timeout = Timeout; |
((rpc_sess_t*) cli->cli_parent)->sess_program = ProgID; |
((rpc_sess_t*) cli->cli_parent)->sess_program = ProgID; |
((rpc_sess_t*) cli->cli_parent)->sess_process = ProcID; |
((rpc_sess_t*) cli->cli_parent)->sess_process = ProcID; |
} |
} |
Line 253 rpc_cli_openClient(u_int ProgID, u_int ProcID, int net
|
Line 261 rpc_cli_openClient(u_int ProgID, u_int ProcID, int net
|
} |
} |
|
|
/* |
/* |
* rpc_cli_closeClient() Close connection to RPC server and free resources | * rpc_cli_closeClient() - Close connection to RPC server and free resources |
| * |
* @cli = RPC Client session |
* @cli = RPC Client session |
* return: none |
* return: none |
*/ |
*/ |
Line 261 void
|
Line 270 void
|
rpc_cli_closeClient(rpc_cli_t * __restrict cli) |
rpc_cli_closeClient(rpc_cli_t * __restrict cli) |
{ |
{ |
if (!cli) { |
if (!cli) { |
rpc_SetErr(EINVAL, "Error:: Can`t close connection because parameter is null!\n"); | rpc_SetErr(EINVAL, "Can`t close connection because parameter is null!"); |
return; |
return; |
} |
} |
|
|
Line 276 rpc_cli_closeClient(rpc_cli_t * __restrict cli)
|
Line 285 rpc_cli_closeClient(rpc_cli_t * __restrict cli)
|
|
|
|
|
/* |
/* |
* rpc_cli_execCall() Execute RPC call | * rpc_cli_execCall() - Execute RPC call |
| * |
* @cli = RPC Client session |
* @cli = RPC Client session |
* @csModule = Module name, if NULL self binary |
* @csModule = Module name, if NULL self binary |
* @csFunc = Function name for execute |
* @csFunc = Function name for execute |
Line 289 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
Line 299 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
array_t * __restrict in_vars, array_t ** __restrict out_vars) |
array_t * __restrict in_vars, array_t ** __restrict out_vars) |
{ |
{ |
fd_set fds; |
fd_set fds; |
u_char *buf, str[MAXPATHLEN + UCHAR_MAX + 1]; | u_char *buf; |
| rpc_func_t func; |
struct tagRPCCall *rpc; |
struct tagRPCCall *rpc; |
struct tagRPCRet *rrpc = NULL; | int ret = 0, wlen = sizeof(struct tagRPCCall); |
int ret = 0, Limit = 0; | |
struct timeval tv = { DEF_RPC_TIMEOUT, 0 }; |
struct timeval tv = { DEF_RPC_TIMEOUT, 0 }; |
uint16_t tag; |
uint16_t tag; |
uint32_t hash; |
uint32_t hash; |
|
|
if (!cli || !csFunc) { |
if (!cli || !csFunc) { |
rpc_SetErr(EINVAL, "Error:: Can`t execute call because parameter is null or invalid!\n"); | rpc_SetErr(EINVAL, "Can`t execute call because parameter is null or invalid!"); |
return -1; |
return -1; |
} |
} |
if (out_vars) |
if (out_vars) |
Line 311 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
Line 321 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
} else |
} else |
memset(buf, 0, cli->cli_netbuf); |
memset(buf, 0, cli->cli_netbuf); |
|
|
/* build RPC call string for hash */ | /* calculate hashes */ |
memset(str, 0, sizeof str); | if (rpc_calcHashes(&func, csModule, csFunc) == -1) |
if (csModule) | return -1; |
strlcpy((char*) str, csModule, sizeof str); | else { |
strlcat((char*) str, "__", sizeof str); | tag = htons(func.func_tag); |
strlcat((char*) str, csFunc, sizeof str); | hash = htonl(func.func_hash); |
| AIT_FREE_VAL(&func.func_name); |
| AIT_FREE_VAL(&func.func_file); |
| } |
|
|
/* prepare RPC call */ |
/* prepare RPC call */ |
rpc = (struct tagRPCCall*) buf; |
rpc = (struct tagRPCCall*) buf; |
rpc_addPktSession(&rpc->call_session, cli->cli_parent); |
rpc_addPktSession(&rpc->call_session, cli->cli_parent); |
rpc->call_argc = htons(io_arraySize(in_vars)); |
rpc->call_argc = htons(io_arraySize(in_vars)); |
rpc->call_tag = tag = htons(crcFletcher16((u_short*) str, sizeof str / 2)); | rpc->call_tag = tag; |
rpc->call_hash = hash = htonl(hash_fnv((char*) str, sizeof str)); | rpc->call_hash = hash; |
Limit = sizeof(struct tagRPCCall); | |
|
|
if (io_arraySize(in_vars)) { |
if (io_arraySize(in_vars)) { |
/* marshaling variables */ |
/* marshaling variables */ |
ret = io_vars2buffer(buf + Limit, cli->cli_netbuf - Limit, in_vars); | ret = io_vars2buffer(buf + wlen, cli->cli_netbuf - wlen, in_vars); |
if (ret == -1) { |
if (ret == -1) { |
rpc_SetErr(EBADRPC, "Error:: in prepare RPC packet values (-7) ...\n"); | rpc_SetErr(EBADRPC, "Failed to prepare RPC packet values"); |
free(buf); |
free(buf); |
return -7; | return -1; |
} else |
} else |
Limit += ret; | wlen += ret; |
} |
} |
|
|
if ((ret = send(cli->cli_sock, buf, Limit, 0)) == -1) { | /* calculate CRC */ |
| rpc->call_crc ^= rpc->call_crc; |
| rpc->call_crc = htons(crcFletcher16((u_short*) buf, io_align(wlen, 1) / 2)); |
| |
| if ((ret = send(cli->cli_sock, buf, wlen, 0)) == -1) { |
LOGERR; |
LOGERR; |
free(buf); |
free(buf); |
return -1; |
return -1; |
} | } else if (ret != wlen) { |
if (ret != Limit) { | rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, " |
rpc_SetErr(EPROCUNAVAIL, "Error:: in send RPC request, should be send %d bytes, really is %d\n", | "really sended %d bytes", wlen, ret); |
Limit, ret); | |
free(buf); |
free(buf); |
return -9; | return -1; |
} |
} |
|
|
/* reply from RPC server */ |
/* reply from RPC server */ |
Line 371 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
Line 386 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
free(buf); |
free(buf); |
return 0; |
return 0; |
} |
} |
if (ret < sizeof(struct tagRPCRet)) { | if (ret < sizeof(struct tagRPCCall)) { |
rpc_SetErr(ERPCMISMATCH, "Error:: too short RPC packet ...\n"); |
rpc_SetErr(ERPCMISMATCH, "Error:: too short RPC packet ...\n"); |
free(buf); |
free(buf); |
return -4; |
return -4; |
} else | } |
rrpc = (struct tagRPCRet*) buf; | |
/* check RPC packet session info */ |
/* check RPC packet session info */ |
if (rpc_chkPktSession(&rrpc->ret_session, cli->cli_parent)) { | if (rpc_chkPktSession(&rpc->call_session, cli->cli_parent)) { |
rpc_SetErr(ERPCMISMATCH, "Error:: get invalid RPC session ...\n"); |
rpc_SetErr(ERPCMISMATCH, "Error:: get invalid RPC session ...\n"); |
free(buf); |
free(buf); |
return -5; |
return -5; |
} else |
} else |
Limit = sizeof(struct tagRPCRet); | wlen = sizeof(struct tagRPCCall); |
if (rrpc->ret_tag != tag || rrpc->ret_hash != hash) { | if (rpc->call_tag != tag || rpc->call_hash != hash) { |
rpc_SetErr(ERPCMISMATCH, "Error:: get wrong RPC reply ...\n"); |
rpc_SetErr(ERPCMISMATCH, "Error:: get wrong RPC reply ...\n"); |
free(buf); |
free(buf); |
return -5; |
return -5; |
} |
} |
if (ntohl(rrpc->ret_retcode) < 0 && ntohl(rrpc->ret_errno)) { | if (ntohl(rpc->call_rep.ret) < 0 && ntohl(rpc->call_rep.eno)) { |
rpc_SetErr(ntohl(rrpc->ret_errno), "Error::Server side: retcode=%d #%d %s\n", | rpc_SetErr(ntohl(rpc->call_rep.eno), "Error::Server side: retcode=%d #%d %s\n", |
ntohl(rrpc->ret_retcode), ntohl(rrpc->ret_errno), | ntohl(rpc->call_rep.ret), ntohl(rpc->call_rep.eno), |
strerror(ntohl(rrpc->ret_errno))); | strerror(ntohl(rpc->call_rep.eno))); |
free(buf); |
free(buf); |
return -6; |
return -6; |
} |
} |
if (ntohs(rrpc->ret_argc) * sizeof(ait_val_t) > cli->cli_netbuf - Limit) { | if (ntohs(rpc->call_argc) * sizeof(ait_val_t) > cli->cli_netbuf - wlen) { |
rpc_SetErr(EMSGSIZE, "Error:: reply RPC packet is too long ...\n"); |
rpc_SetErr(EMSGSIZE, "Error:: reply RPC packet is too long ...\n"); |
free(buf); |
free(buf); |
return -7; |
return -7; |
} |
} |
|
|
/* RPC is OK! Go de-marshaling variables ... */ |
/* RPC is OK! Go de-marshaling variables ... */ |
if (ntohs(rrpc->ret_argc)) { | if (ntohs(rpc->call_argc)) { |
*out_vars = io_buffer2vars(buf + Limit, cli->cli_netbuf - Limit, | *out_vars = io_buffer2vars(buf + wlen, cli->cli_netbuf - wlen, |
ntohs(rrpc->ret_argc), 0); | ntohs(rpc->call_argc), 0); |
if (!*out_vars) { |
if (!*out_vars) { |
free(buf); |
free(buf); |
return -1; |
return -1; |
} |
} |
} |
} |
|
|
ret = ntohl(rrpc->ret_retcode); | ret = ntohl(rpc->call_rep.ret); |
free(buf); |
free(buf); |
return ret; |
return ret; |
} |
} |