networklayer_tcp.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598
  1. /*
  2. * This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  3. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  4. */
  5. #include <stdlib.h> // malloc, free
  6. #ifdef _WIN32
  7. #include <malloc.h>
  8. #include <winsock2.h>
  9. #include <sys/types.h>
  10. #include <windows.h>
  11. #include <ws2tcpip.h>
  12. #define CLOSESOCKET(S) closesocket(S)
  13. #else
  14. #include <sys/select.h>
  15. #include <netinet/in.h>
  16. #include <netinet/tcp.h>
  17. #include <sys/socketvar.h>
  18. #include <sys/ioctl.h>
  19. #include <netdb.h> //gethostbyname for the client
  20. #define __USE_BSD
  21. #include <unistd.h> // read, write, close, usleep
  22. #define Sleep(x) usleep((x)*1000)
  23. #include <arpa/inet.h>
  24. #define CLOSESOCKET(S) close(S)
  25. #endif
  26. #include <stdio.h>
  27. #include <errno.h> // errno, EINTR
  28. #include <fcntl.h> // fcntl
  29. #include <string.h> // memset
  30. #include "networklayer_tcp.h" // UA_MULTITHREADING is defined in here
  31. #ifdef UA_MULTITHREADING
  32. #include <urcu/uatomic.h>
  33. #endif
  34. struct ServerNetworklayer_TCP;
  35. /* Forwarded to the server as a (UA_Connection) and used for callbacks back into
  36. the networklayer */
  37. typedef struct {
  38. UA_Connection connection;
  39. UA_Int32 sockfd;
  40. void *layer;
  41. } TCPConnection;
  42. /***************************/
  43. /* Server NetworkLayer TCP */
  44. /***************************/
  45. #define MAXBACKLOG 100
  46. /* Internal mapping of sockets to connections */
  47. typedef struct {
  48. TCPConnection *connection;
  49. #ifdef _WIN32
  50. UA_UInt32 sockfd;
  51. #else
  52. UA_Int32 sockfd;
  53. #endif
  54. } ConnectionLink;
  55. typedef struct ServerNetworkLayerTCP {
  56. UA_ConnectionConfig conf;
  57. fd_set fdset;
  58. #ifdef _WIN32
  59. UA_UInt32 serversockfd;
  60. UA_UInt32 highestfd;
  61. #else
  62. UA_Int32 serversockfd;
  63. UA_Int32 highestfd;
  64. #endif
  65. UA_UInt16 conLinksSize;
  66. ConnectionLink *conLinks;
  67. UA_UInt32 port;
  68. UA_String discoveryUrl;
  69. /* We remove the connection links only in the main thread. Attach
  70. to-be-deleted links with atomic operations */
  71. struct deleteLink {
  72. #ifdef _WIN32
  73. UA_UInt32 sockfd;
  74. #else
  75. UA_Int32 sockfd;
  76. #endif
  77. struct deleteLink *next;
  78. } *deleteLinkList;
  79. } ServerNetworkLayerTCP;
  80. typedef struct ClientNetworkLayerTCP {
  81. fd_set read_fds;
  82. #ifdef _WIN32
  83. UA_UInt32 sockfd;
  84. #else
  85. UA_Int32 sockfd;
  86. #endif
  87. } ClientNetworkLayerTCP;
  88. static UA_StatusCode setNonBlocking(int sockid) {
  89. #ifdef _WIN32
  90. u_long iMode = 1;
  91. if(ioctlsocket(sockid, FIONBIO, &iMode) != NO_ERROR)
  92. return UA_STATUSCODE_BADINTERNALERROR;
  93. #else
  94. int opts = fcntl(sockid,F_GETFL);
  95. if(opts < 0 || fcntl(sockid,F_SETFL,opts|O_NONBLOCK) < 0)
  96. return UA_STATUSCODE_BADINTERNALERROR;
  97. #endif
  98. return UA_STATUSCODE_GOOD;
  99. }
  100. static void freeConnectionCallback(UA_Server *server, TCPConnection *connection) {
  101. free(connection);
  102. }
  103. // after every select, reset the set of sockets we want to listen on
  104. static void setFDSet(ServerNetworkLayerTCP *layer) {
  105. FD_ZERO(&layer->fdset);
  106. FD_SET(layer->serversockfd, &layer->fdset);
  107. layer->highestfd = layer->serversockfd;
  108. for(UA_Int32 i=0;i<layer->conLinksSize;i++) {
  109. FD_SET(layer->conLinks[i].sockfd, &layer->fdset);
  110. if(layer->conLinks[i].sockfd > layer->highestfd)
  111. layer->highestfd = layer->conLinks[i].sockfd;
  112. }
  113. }
  114. // the callbacks are thread-safe if UA_MULTITHREADING is defined
  115. void closeConnection(TCPConnection *handle);
  116. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf);
  117. static UA_StatusCode ServerNetworkLayerTCP_add(ServerNetworkLayerTCP *layer, UA_Int32 newsockfd) {
  118. setNonBlocking(newsockfd);
  119. TCPConnection *c = malloc(sizeof(TCPConnection));
  120. if(!c)
  121. return UA_STATUSCODE_BADINTERNALERROR;
  122. c->sockfd = newsockfd;
  123. c->layer = layer;
  124. c->connection.state = UA_CONNECTION_OPENING;
  125. c->connection.localConf = layer->conf;
  126. c->connection.channel = (void*)0;
  127. c->connection.close = (void (*)(void*))closeConnection;
  128. c->connection.write = (void (*)(void*, UA_ByteStringArray))writeCallback;
  129. layer->conLinks = realloc(layer->conLinks, sizeof(ConnectionLink)*(layer->conLinksSize+1));
  130. if(!layer->conLinks) {
  131. free(c);
  132. return UA_STATUSCODE_BADINTERNALERROR;
  133. }
  134. layer->conLinks[layer->conLinksSize].connection = c;
  135. layer->conLinks[layer->conLinksSize].sockfd = newsockfd;
  136. layer->conLinksSize++;
  137. return UA_STATUSCODE_GOOD;
  138. }
  139. /* Removes all connections from the network layer. Returns the work items to close them properly. */
  140. static UA_UInt32 removeAllConnections(ServerNetworkLayerTCP *layer, UA_WorkItem **returnWork) {
  141. UA_WorkItem *work;
  142. if (layer->conLinksSize <= 0 || !(work = malloc(sizeof(UA_WorkItem)*layer->conLinksSize))) {
  143. *returnWork = NULL;
  144. return 0;
  145. }
  146. #ifdef UA_MULTITHREADING
  147. struct deleteLink *d = uatomic_xchg(&layer->deleteLinkList, (void*)0);
  148. #else
  149. struct deleteLink *d = layer->deleteLinkList;
  150. layer->deleteLinkList = (void*)0;
  151. #endif
  152. UA_UInt32 count = 0;
  153. while(d) {
  154. UA_Int32 i;
  155. for(i = 0;i<layer->conLinksSize;i++) {
  156. if(layer->conLinks[i].sockfd == d->sockfd)
  157. break;
  158. }
  159. if(i < layer->conLinksSize) {
  160. TCPConnection *c = layer->conLinks[i].connection;
  161. layer->conLinksSize--;
  162. layer->conLinks[i] = layer->conLinks[layer->conLinksSize];
  163. work[count] = (UA_WorkItem)
  164. {.type = UA_WORKITEMTYPE_DELAYEDMETHODCALL,
  165. .work.methodCall = {.data = c,
  166. .method = (void (*)(UA_Server*,void*))freeConnectionCallback} };
  167. }
  168. struct deleteLink *oldd = d;
  169. d = d->next;
  170. free(oldd);
  171. count++;
  172. }
  173. *returnWork = work;
  174. return count;
  175. }
  176. #ifdef UA_MULTITHREADING
  177. void closeConnection(TCPConnection *handle) {
  178. if(uatomic_xchg(&handle->connection.state, UA_CONNECTION_CLOSING) == UA_CONNECTION_CLOSING)
  179. return;
  180. UA_Connection_detachSecureChannel(&handle->connection);
  181. shutdown(handle->sockfd,2);
  182. CLOSESOCKET(handle->sockfd);
  183. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  184. // Remove the link later in the main thread
  185. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  186. d->sockfd = handle->sockfd;
  187. while(1) {
  188. d->next = layer->deleteLinkList;
  189. if(uatomic_cmpxchg(&layer->deleteLinkList, d->next, d) == d->next)
  190. break;
  191. }
  192. }
  193. #else
  194. void closeConnection(TCPConnection *handle) {
  195. if(handle->connection.state == UA_CONNECTION_CLOSING)
  196. return;
  197. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  198. if(!d)
  199. return;
  200. handle->connection.state = UA_CONNECTION_CLOSING;
  201. UA_Connection_detachSecureChannel(&handle->connection);
  202. shutdown(handle->sockfd,2);
  203. CLOSESOCKET(handle->sockfd);
  204. // Remove the link later in the main thread
  205. d->sockfd = handle->sockfd;
  206. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  207. d->next = layer->deleteLinkList;
  208. layer->deleteLinkList = d;
  209. }
  210. #endif
  211. /** Accesses only the sockfd in the handle. Can be run from parallel threads. */
  212. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf) {
  213. UA_UInt32 total_len = 0, nWritten = 0;
  214. #ifdef _WIN32
  215. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  216. memset(buf, 0, sizeof(gather_buf.stringsSize * sizeof(WSABUF)));
  217. int result = 0;
  218. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  219. buf[i].buf = (char*)gather_buf.strings[i].data;
  220. buf[i].len = gather_buf.strings[i].length;
  221. total_len += gather_buf.strings[i].length;
  222. }
  223. while(nWritten < total_len) {
  224. UA_UInt32 n = 0;
  225. do {
  226. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize ,
  227. (LPDWORD)&n, 0, NULL, NULL);
  228. if(result != 0)
  229. printf("Error WSASend, code: %d \n", WSAGetLastError());
  230. } while(errno == EINTR);
  231. nWritten += n;
  232. }
  233. #else
  234. struct iovec iov[gather_buf.stringsSize];
  235. memset(iov, 0, sizeof(struct iovec)*gather_buf.stringsSize);
  236. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  237. iov[i].iov_base = gather_buf.strings[i].data;
  238. iov[i].iov_len = gather_buf.strings[i].length;
  239. total_len += gather_buf.strings[i].length;
  240. }
  241. struct msghdr message;
  242. memset(&message, 0, sizeof(message));
  243. message.msg_iov = iov;
  244. message.msg_iovlen = gather_buf.stringsSize;
  245. while (nWritten < total_len) {
  246. UA_Int32 n = 0;
  247. do {
  248. n = sendmsg(handle->sockfd, &message, 0);
  249. } while (n == -1L && errno == EINTR);
  250. nWritten += n;
  251. }
  252. #endif
  253. }
  254. static UA_StatusCode ServerNetworkLayerTCP_start(ServerNetworkLayerTCP *layer, UA_Logger *logger) {
  255. #ifdef _WIN32
  256. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  257. printf("ERROR opening socket, code: %d\n", WSAGetLastError());
  258. return UA_STATUSCODE_BADINTERNALERROR;
  259. }
  260. #else
  261. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM, 0)) < 0) {
  262. perror("ERROR opening socket");
  263. return UA_STATUSCODE_BADINTERNALERROR;
  264. }
  265. #endif
  266. const struct sockaddr_in serv_addr = {
  267. .sin_family = AF_INET, .sin_addr.s_addr = INADDR_ANY,
  268. .sin_port = htons(layer->port), .sin_zero = {0}};
  269. int optval = 1;
  270. if(setsockopt(layer->serversockfd, SOL_SOCKET,
  271. SO_REUSEADDR, (const char *)&optval,
  272. sizeof(optval)) == -1) {
  273. perror("setsockopt");
  274. CLOSESOCKET(layer->serversockfd);
  275. return UA_STATUSCODE_BADINTERNALERROR;
  276. }
  277. if(bind(layer->serversockfd, (const struct sockaddr *)&serv_addr,
  278. sizeof(serv_addr)) < 0) {
  279. perror("binding");
  280. CLOSESOCKET(layer->serversockfd);
  281. return UA_STATUSCODE_BADINTERNALERROR;
  282. }
  283. setNonBlocking(layer->serversockfd);
  284. listen(layer->serversockfd, MAXBACKLOG);
  285. char msg[256];
  286. sprintf(msg, "Listening on %.*s\n", layer->discoveryUrl.length, layer->discoveryUrl.data);
  287. UA_LOG_INFO((*logger), UA_LOGGERCATEGORY_SERVER, msg);
  288. return UA_STATUSCODE_GOOD;
  289. }
  290. static UA_Int32 ServerNetworkLayerTCP_getWork(ServerNetworkLayerTCP *layer, UA_WorkItem **workItems,
  291. UA_UInt16 timeout) {
  292. UA_WorkItem *items = (void*)0;
  293. UA_Int32 itemsCount = removeAllConnections(layer, &items);
  294. setFDSet(layer);
  295. struct timeval tmptv = {0, timeout};
  296. UA_Int32 resultsize = select(layer->highestfd+1, &layer->fdset, NULL, NULL, &tmptv);
  297. if(resultsize < 0) {
  298. *workItems = items;
  299. return itemsCount;
  300. }
  301. // accept new connections (can only be a single one)
  302. if(FD_ISSET(layer->serversockfd,&layer->fdset)) {
  303. resultsize--;
  304. struct sockaddr_in cli_addr;
  305. socklen_t cli_len = sizeof(cli_addr);
  306. int newsockfd = accept(layer->serversockfd, (struct sockaddr *) &cli_addr, &cli_len);
  307. int i = 1;
  308. setsockopt(newsockfd, IPPROTO_TCP, TCP_NODELAY, (void *)&i, sizeof(i));
  309. if (newsockfd >= 0)
  310. ServerNetworkLayerTCP_add(layer, newsockfd);
  311. }
  312. items = realloc(items, sizeof(UA_WorkItem)*(itemsCount+resultsize));
  313. // read from established sockets
  314. UA_Int32 j = itemsCount;
  315. UA_ByteString buf = { -1, NULL};
  316. for(UA_Int32 i=0;i<layer->conLinksSize && j<itemsCount+resultsize;i++) {
  317. if(!(FD_ISSET(layer->conLinks[i].sockfd, &layer->fdset)))
  318. continue;
  319. if(!buf.data) {
  320. buf.data = malloc(sizeof(UA_Byte) * layer->conf.recvBufferSize);
  321. if(!buf.data)
  322. break;
  323. }
  324. #ifdef _WIN32
  325. buf.length = recv(layer->conLinks[i].sockfd, (char *)buf.data,
  326. layer->conf.recvBufferSize, 0);
  327. #else
  328. buf.length = read(layer->conLinks[i].sockfd, buf.data, layer->conf.recvBufferSize);
  329. #endif
  330. if (buf.length <= 0) {
  331. closeConnection(layer->conLinks[i].connection); // work is returned in the next iteration
  332. } else {
  333. items[j].type = UA_WORKITEMTYPE_BINARYNETWORKMESSAGE;
  334. items[j].work.binaryNetworkMessage.message = buf;
  335. items[j].work.binaryNetworkMessage.connection = &layer->conLinks[i].connection->connection;
  336. buf.data = NULL;
  337. j++;
  338. }
  339. }
  340. if(buf.data)
  341. free(buf.data);
  342. if(j == 0) {
  343. free(items);
  344. *workItems = NULL;
  345. } else
  346. *workItems = items;
  347. return j;
  348. }
  349. static UA_Int32 ServerNetworkLayerTCP_stop(ServerNetworkLayerTCP * layer, UA_WorkItem **workItems) {
  350. for(UA_Int32 index = 0;index < layer->conLinksSize;index++)
  351. closeConnection(layer->conLinks[index].connection);
  352. #ifdef _WIN32
  353. WSACleanup();
  354. #endif
  355. return removeAllConnections(layer, workItems);
  356. }
  357. static void ServerNetworkLayerTCP_delete(ServerNetworkLayerTCP *layer) {
  358. UA_String_deleteMembers(&layer->discoveryUrl);
  359. for(UA_Int32 i=0;i<layer->conLinksSize;++i){
  360. free(layer->conLinks[i].connection);
  361. }
  362. free(layer->conLinks);
  363. free(layer);
  364. }
  365. UA_ServerNetworkLayer ServerNetworkLayerTCP_new(UA_ConnectionConfig conf, UA_UInt32 port) {
  366. #ifdef _WIN32
  367. WORD wVersionRequested;
  368. WSADATA wsaData;
  369. wVersionRequested = MAKEWORD(2, 2);
  370. WSAStartup(wVersionRequested, &wsaData);
  371. #endif
  372. ServerNetworkLayerTCP *tcplayer = malloc(sizeof(ServerNetworkLayerTCP));
  373. tcplayer->conf = conf;
  374. tcplayer->conLinksSize = 0;
  375. tcplayer->conLinks = NULL;
  376. tcplayer->port = port;
  377. tcplayer->deleteLinkList = (void*)0;
  378. char hostname[256];
  379. gethostname(hostname, 255);
  380. UA_String_copyprintf("opc.tcp://%s:%d", &tcplayer->discoveryUrl, hostname, port);
  381. UA_ServerNetworkLayer nl;
  382. nl.nlHandle = tcplayer;
  383. nl.start = (UA_StatusCode (*)(void*, UA_Logger *logger))ServerNetworkLayerTCP_start;
  384. nl.getWork = (UA_Int32 (*)(void*, UA_WorkItem**, UA_UInt16))ServerNetworkLayerTCP_getWork;
  385. nl.stop = (UA_Int32 (*)(void*, UA_WorkItem**))ServerNetworkLayerTCP_stop;
  386. nl.free = (void (*)(void*))ServerNetworkLayerTCP_delete;
  387. nl.discoveryUrl = &tcplayer->discoveryUrl;
  388. return nl;
  389. }
  390. /***************************/
  391. /* Client NetworkLayer TCP */
  392. /***************************/
  393. static UA_StatusCode ClientNetworkLayerTCP_connect(const UA_String endpointUrl, ClientNetworkLayerTCP *resultHandle) {
  394. if(endpointUrl.length < 11 || endpointUrl.length >= 512) {
  395. printf("server url size invalid\n");
  396. return UA_STATUSCODE_BADINTERNALERROR;
  397. }
  398. if(strncmp((char*)endpointUrl.data, "opc.tcp://", 10) != 0) {
  399. printf("server url does not begin with opc.tcp://\n");
  400. return UA_STATUSCODE_BADINTERNALERROR;
  401. }
  402. //this is somewhat ugly, but atoi needs a c string
  403. char cstringEndpointUrl[endpointUrl.length+1];
  404. memcpy(cstringEndpointUrl, endpointUrl.data, endpointUrl.length);
  405. cstringEndpointUrl[endpointUrl.length+1] = '0';
  406. UA_UInt16 portpos = 9;
  407. UA_UInt16 port = 0;
  408. for(;portpos < endpointUrl.length; portpos++) {
  409. if(endpointUrl.data[portpos] == ':') {
  410. port = atoi(&cstringEndpointUrl[portpos+1]);
  411. break;
  412. }
  413. }
  414. if(port == 0) {
  415. printf("port invalid");
  416. return UA_STATUSCODE_BADINTERNALERROR;
  417. }
  418. char hostname[512];
  419. for(int i=10; i < portpos; i++)
  420. hostname[i-10] = endpointUrl.data[i];
  421. hostname[portpos-10] = 0;
  422. #ifdef _WIN32
  423. UA_UInt32 sock = 0;
  424. #else
  425. UA_Int32 sock = 0;
  426. #endif
  427. #ifdef _WIN32
  428. WORD wVersionRequested;
  429. WSADATA wsaData;
  430. wVersionRequested = MAKEWORD(2, 2);
  431. WSAStartup(wVersionRequested, &wsaData);
  432. if((sock = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  433. #else
  434. if((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
  435. #endif
  436. printf("Could not create socket\n");
  437. return UA_STATUSCODE_BADINTERNALERROR;
  438. }
  439. struct hostent *server;
  440. server = gethostbyname(hostname);
  441. if (server == NULL) {
  442. printf("DNS lookup of %s failed\n", hostname);
  443. return UA_STATUSCODE_BADINTERNALERROR;
  444. }
  445. struct sockaddr_in server_addr;
  446. memset(&server_addr, 0, sizeof(server_addr));
  447. memcpy((char *)&server_addr.sin_addr.s_addr,
  448. (char *)server->h_addr_list[0],
  449. server->h_length);
  450. server_addr.sin_family = AF_INET;
  451. server_addr.sin_port = htons(port);
  452. if(connect(sock, (struct sockaddr *) &server_addr, sizeof(server_addr)) < 0) {
  453. printf("Connect failed.\n");
  454. return UA_STATUSCODE_BADINTERNALERROR;
  455. }
  456. //if(setNonBlocking(*sock) != UA_STATUSCODE_GOOD) {
  457. // printf("Could not switch to nonblocking.\n");
  458. // FINALLY
  459. // return UA_STATUSCODE_BADINTERNALERROR;
  460. //}
  461. resultHandle->sockfd = sock;
  462. return UA_STATUSCODE_GOOD;
  463. }
  464. static void ClientNetworkLayerTCP_disconnect(ClientNetworkLayerTCP* handle) {
  465. CLOSESOCKET(handle->sockfd);
  466. #ifdef _WIN32
  467. WSACleanup();
  468. #endif
  469. }
  470. static UA_StatusCode ClientNetworkLayerTCP_send(ClientNetworkLayerTCP *handle, UA_ByteStringArray gather_buf) {
  471. UA_UInt32 total_len = 0, nWritten = 0;
  472. #ifdef _WIN32
  473. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  474. int result = 0;
  475. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  476. buf[i].buf = (char*)gather_buf.strings[i].data;
  477. buf[i].len = gather_buf.strings[i].length;
  478. total_len += gather_buf.strings[i].length;
  479. }
  480. while(nWritten < total_len) {
  481. UA_UInt32 n = 0;
  482. do {
  483. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize ,
  484. (LPDWORD)&n, 0, NULL, NULL);
  485. if(result != 0)
  486. printf("Error WSASend, code: %d \n", WSAGetLastError());
  487. } while(errno == EINTR);
  488. nWritten += n;
  489. }
  490. #else
  491. struct iovec iov[gather_buf.stringsSize];
  492. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  493. iov[i] = (struct iovec) {.iov_base = gather_buf.strings[i].data,
  494. .iov_len = gather_buf.strings[i].length};
  495. total_len += gather_buf.strings[i].length;
  496. }
  497. struct msghdr message = {.msg_name = NULL, .msg_namelen = 0, .msg_iov = iov,
  498. .msg_iovlen = gather_buf.stringsSize, .msg_control = NULL,
  499. .msg_controllen = 0, .msg_flags = 0};
  500. while (nWritten < total_len) {
  501. int n = sendmsg(handle->sockfd, &message, 0);
  502. if(n <= -1)
  503. return UA_STATUSCODE_BADINTERNALERROR;
  504. nWritten += n;
  505. }
  506. #endif
  507. return UA_STATUSCODE_GOOD;
  508. }
  509. static UA_StatusCode ClientNetworkLayerTCP_awaitResponse(ClientNetworkLayerTCP *handle,
  510. UA_ByteString *response, UA_UInt32 timeout) {
  511. struct timeval tmptv = {0, timeout};
  512. setsockopt(handle->sockfd, SOL_SOCKET, SO_RCVTIMEO, (char *)&tmptv,sizeof(struct timeval));
  513. int ret = recv(handle->sockfd, (char*)response->data, response->length, 0);
  514. if(ret == 0)
  515. return UA_STATUSCODE_BADSERVERNOTCONNECTED;
  516. response->length = ret;
  517. return UA_STATUSCODE_GOOD;
  518. }
  519. static void ClientNetworkLayerTCP_delete(ClientNetworkLayerTCP *layer) {
  520. if(layer)
  521. free(layer);
  522. }
  523. UA_ClientNetworkLayer ClientNetworkLayerTCP_new(UA_ConnectionConfig conf) {
  524. ClientNetworkLayerTCP *tcplayer = malloc(sizeof(ClientNetworkLayerTCP));
  525. tcplayer->sockfd = 0;
  526. UA_ClientNetworkLayer layer;
  527. layer.nlHandle = tcplayer;
  528. layer.connect = (UA_StatusCode (*)(const UA_String, void**)) ClientNetworkLayerTCP_connect;
  529. layer.disconnect = (void (*)(void*)) ClientNetworkLayerTCP_disconnect;
  530. layer.delete = (void (*)(void*)) ClientNetworkLayerTCP_delete;
  531. layer.send = (UA_StatusCode (*)(void*, UA_ByteStringArray)) ClientNetworkLayerTCP_send;
  532. layer.awaitResponse = (UA_StatusCode (*)(void*, UA_ByteString *, UA_UInt32))ClientNetworkLayerTCP_awaitResponse;
  533. return layer;
  534. }