networklayer_tcp.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612
  1. /*
  2. * This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  3. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  4. */
  5. #include <stdlib.h> // malloc, free
  6. #ifdef _WIN32
  7. #include <malloc.h>
  8. #include <winsock2.h>
  9. #include <sys/types.h>
  10. #include <windows.h>
  11. #include <ws2tcpip.h>
  12. #define CLOSESOCKET(S) closesocket(S)
  13. #else
  14. #include <sys/select.h>
  15. #include <netinet/in.h>
  16. #include <netinet/tcp.h>
  17. #include <sys/socketvar.h>
  18. #include <sys/ioctl.h>
  19. #include <netdb.h> //gethostbyname for the client
  20. #define __USE_BSD
  21. #include <unistd.h> // read, write, close
  22. #include <arpa/inet.h>
  23. #define CLOSESOCKET(S) close(S)
  24. #endif
  25. #include <stdio.h>
  26. #include <errno.h> // errno, EINTR
  27. #include <fcntl.h> // fcntl
  28. #include <string.h> // memset
  29. #include "networklayer_tcp.h" // UA_MULTITHREADING is defined in here
  30. #ifdef UA_MULTITHREADING
  31. #include <urcu/uatomic.h>
  32. #endif
  33. struct ServerNetworklayer_TCP;
  34. /* Forwarded to the server as a (UA_Connection) and used for callbacks back into
  35. the networklayer */
  36. typedef struct {
  37. UA_Connection connection;
  38. UA_Int32 sockfd;
  39. void *layer;
  40. } TCPConnection;
  41. /***************************/
  42. /* Server NetworkLayer TCP */
  43. /***************************/
  44. #define MAXBACKLOG 100
  45. /* Internal mapping of sockets to connections */
  46. typedef struct {
  47. TCPConnection *connection;
  48. #ifdef _WIN32
  49. UA_UInt32 sockfd;
  50. #else
  51. UA_Int32 sockfd;
  52. #endif
  53. } ConnectionLink;
  54. typedef struct ServerNetworkLayerTCP {
  55. UA_ConnectionConfig conf;
  56. fd_set fdset;
  57. #ifdef _WIN32
  58. UA_UInt32 serversockfd;
  59. UA_UInt32 highestfd;
  60. #else
  61. UA_Int32 serversockfd;
  62. UA_Int32 highestfd;
  63. #endif
  64. UA_UInt16 conLinksSize;
  65. ConnectionLink *conLinks;
  66. UA_UInt32 port;
  67. UA_String discoveryUrl;
  68. /* We remove the connection links only in the main thread. Attach
  69. to-be-deleted links with atomic operations */
  70. struct deleteLink {
  71. #ifdef _WIN32
  72. UA_UInt32 sockfd;
  73. #else
  74. UA_Int32 sockfd;
  75. #endif
  76. struct deleteLink *next;
  77. } *deleteLinkList;
  78. } ServerNetworkLayerTCP;
  79. typedef struct ClientNetworkLayerTCP {
  80. fd_set read_fds;
  81. #ifdef _WIN32
  82. UA_UInt32 sockfd;
  83. #else
  84. UA_Int32 sockfd;
  85. #endif
  86. } ClientNetworkLayerTCP;
  87. static UA_StatusCode setNonBlocking(int sockid) {
  88. #ifdef _WIN32
  89. u_long iMode = 1;
  90. if(ioctlsocket(sockid, FIONBIO, &iMode) != NO_ERROR)
  91. return UA_STATUSCODE_BADINTERNALERROR;
  92. #else
  93. int opts = fcntl(sockid,F_GETFL);
  94. if(opts < 0 || fcntl(sockid,F_SETFL,opts|O_NONBLOCK) < 0)
  95. return UA_STATUSCODE_BADINTERNALERROR;
  96. #endif
  97. return UA_STATUSCODE_GOOD;
  98. }
  99. static void freeConnectionCallback(UA_Server *server, TCPConnection *connection) {
  100. free(connection);
  101. }
  102. // after every select, reset the set of sockets we want to listen on
  103. static void setFDSet(ServerNetworkLayerTCP *layer) {
  104. FD_ZERO(&layer->fdset);
  105. FD_SET(layer->serversockfd, &layer->fdset);
  106. layer->highestfd = layer->serversockfd;
  107. for(UA_Int32 i=0;i<layer->conLinksSize;i++) {
  108. FD_SET(layer->conLinks[i].sockfd, &layer->fdset);
  109. if(layer->conLinks[i].sockfd > layer->highestfd)
  110. layer->highestfd = layer->conLinks[i].sockfd;
  111. }
  112. }
  113. // the callbacks are thread-safe if UA_MULTITHREADING is defined
  114. void closeConnection(TCPConnection *handle);
  115. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf);
  116. static UA_StatusCode ServerNetworkLayerTCP_add(ServerNetworkLayerTCP *layer, UA_Int32 newsockfd) {
  117. setNonBlocking(newsockfd);
  118. TCPConnection *c = malloc(sizeof(TCPConnection));
  119. if(!c)
  120. return UA_STATUSCODE_BADINTERNALERROR;
  121. c->sockfd = newsockfd;
  122. c->layer = layer;
  123. c->connection.state = UA_CONNECTION_OPENING;
  124. c->connection.localConf = layer->conf;
  125. c->connection.channel = (void*)0;
  126. c->connection.close = (void (*)(void*))closeConnection;
  127. c->connection.write = (void (*)(void*, UA_ByteStringArray))writeCallback;
  128. layer->conLinks = realloc(layer->conLinks, sizeof(ConnectionLink)*(layer->conLinksSize+1));
  129. if(!layer->conLinks) {
  130. free(c);
  131. return UA_STATUSCODE_BADINTERNALERROR;
  132. }
  133. layer->conLinks[layer->conLinksSize].connection = c;
  134. layer->conLinks[layer->conLinksSize].sockfd = newsockfd;
  135. layer->conLinksSize++;
  136. return UA_STATUSCODE_GOOD;
  137. }
  138. /* Removes all connections from the network layer. Returns the work items to close them properly. */
  139. static UA_UInt32 removeAllConnections(ServerNetworkLayerTCP *layer, UA_WorkItem **returnWork) {
  140. UA_WorkItem *work;
  141. if (layer->conLinksSize <= 0 || !(work = malloc(sizeof(UA_WorkItem)*layer->conLinksSize))) {
  142. *returnWork = NULL;
  143. return 0;
  144. }
  145. #ifdef UA_MULTITHREADING
  146. struct deleteLink *d = uatomic_xchg(&layer->deleteLinkList, (void*)0);
  147. #else
  148. struct deleteLink *d = layer->deleteLinkList;
  149. layer->deleteLinkList = (void*)0;
  150. #endif
  151. UA_UInt32 count = 0;
  152. while(d) {
  153. UA_Int32 i;
  154. for(i = 0;i<layer->conLinksSize;i++) {
  155. if(layer->conLinks[i].sockfd == d->sockfd)
  156. break;
  157. }
  158. if(i < layer->conLinksSize) {
  159. TCPConnection *c = layer->conLinks[i].connection;
  160. layer->conLinksSize--;
  161. layer->conLinks[i] = layer->conLinks[layer->conLinksSize];
  162. work[count] = (UA_WorkItem)
  163. {.type = UA_WORKITEMTYPE_DELAYEDMETHODCALL,
  164. .work.methodCall = {.data = c,
  165. .method = (void (*)(UA_Server*,void*))freeConnectionCallback} };
  166. }
  167. struct deleteLink *oldd = d;
  168. d = d->next;
  169. free(oldd);
  170. count++;
  171. }
  172. *returnWork = work;
  173. return count;
  174. }
  175. #ifdef UA_MULTITHREADING
  176. void closeConnection(TCPConnection *handle) {
  177. if(uatomic_xchg(&handle->connection.state, UA_CONNECTION_CLOSING) == UA_CONNECTION_CLOSING)
  178. return;
  179. UA_Connection_detachSecureChannel(&handle->connection);
  180. shutdown(handle->sockfd,2);
  181. CLOSESOCKET(handle->sockfd);
  182. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  183. // Remove the link later in the main thread
  184. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  185. d->sockfd = handle->sockfd;
  186. while(1) {
  187. d->next = layer->deleteLinkList;
  188. if(uatomic_cmpxchg(&layer->deleteLinkList, d->next, d) == d->next)
  189. break;
  190. }
  191. }
  192. #else
  193. void closeConnection(TCPConnection *handle) {
  194. if(handle->connection.state == UA_CONNECTION_CLOSING)
  195. return;
  196. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  197. if(!d)
  198. return;
  199. handle->connection.state = UA_CONNECTION_CLOSING;
  200. UA_Connection_detachSecureChannel(&handle->connection);
  201. shutdown(handle->sockfd,2);
  202. CLOSESOCKET(handle->sockfd);
  203. // Remove the link later in the main thread
  204. d->sockfd = handle->sockfd;
  205. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  206. d->next = layer->deleteLinkList;
  207. layer->deleteLinkList = d;
  208. }
  209. #endif
  210. /** Accesses only the sockfd in the handle. Can be run from parallel threads. */
  211. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf) {
  212. UA_UInt32 total_len = 0, nWritten = 0;
  213. #ifdef _WIN32
  214. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  215. memset(buf, 0, sizeof(gather_buf.stringsSize * sizeof(WSABUF)));
  216. int result = 0;
  217. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  218. buf[i].buf = (char*)gather_buf.strings[i].data;
  219. buf[i].len = gather_buf.strings[i].length;
  220. total_len += gather_buf.strings[i].length;
  221. }
  222. while(nWritten < total_len) {
  223. UA_UInt32 n = 0;
  224. do {
  225. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize ,
  226. (LPDWORD)&n, 0, NULL, NULL);
  227. if(result != 0)
  228. printf("Error WSASend, code: %d \n", WSAGetLastError());
  229. } while(errno == EINTR);
  230. nWritten += n;
  231. }
  232. #else
  233. struct iovec iov[gather_buf.stringsSize];
  234. memset(iov, 0, sizeof(struct iovec)*gather_buf.stringsSize);
  235. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  236. iov[i].iov_base = gather_buf.strings[i].data;
  237. iov[i].iov_len = gather_buf.strings[i].length;
  238. total_len += gather_buf.strings[i].length;
  239. }
  240. struct msghdr message;
  241. memset(&message, 0, sizeof(message));
  242. message.msg_iov = iov;
  243. message.msg_iovlen = gather_buf.stringsSize;
  244. while (nWritten < total_len) {
  245. UA_Int32 n = 0;
  246. do {
  247. n = sendmsg(handle->sockfd, &message, 0);
  248. } while (n == -1L && errno == EINTR);
  249. nWritten += n;
  250. }
  251. #endif
  252. }
  253. static UA_StatusCode ServerNetworkLayerTCP_start(ServerNetworkLayerTCP *layer, UA_Logger *logger) {
  254. #ifdef _WIN32
  255. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  256. printf("ERROR opening socket, code: %d\n", WSAGetLastError());
  257. return UA_STATUSCODE_BADINTERNALERROR;
  258. }
  259. #else
  260. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM, 0)) < 0) {
  261. perror("ERROR opening socket");
  262. return UA_STATUSCODE_BADINTERNALERROR;
  263. }
  264. #endif
  265. const struct sockaddr_in serv_addr = {
  266. .sin_family = AF_INET, .sin_addr.s_addr = INADDR_ANY,
  267. .sin_port = htons(layer->port), .sin_zero = {0}};
  268. int optval = 1;
  269. if(setsockopt(layer->serversockfd, SOL_SOCKET,
  270. SO_REUSEADDR, (const char *)&optval,
  271. sizeof(optval)) == -1) {
  272. perror("setsockopt");
  273. CLOSESOCKET(layer->serversockfd);
  274. return UA_STATUSCODE_BADINTERNALERROR;
  275. }
  276. if(bind(layer->serversockfd, (const struct sockaddr *)&serv_addr,
  277. sizeof(serv_addr)) < 0) {
  278. perror("binding");
  279. CLOSESOCKET(layer->serversockfd);
  280. return UA_STATUSCODE_BADINTERNALERROR;
  281. }
  282. setNonBlocking(layer->serversockfd);
  283. listen(layer->serversockfd, MAXBACKLOG);
  284. char msg[256];
  285. sprintf(msg, "Listening on %.*s\n", layer->discoveryUrl.length, layer->discoveryUrl.data);
  286. UA_LOG_INFO((*logger), UA_LOGGERCATEGORY_SERVER, msg);
  287. return UA_STATUSCODE_GOOD;
  288. }
  289. static UA_Int32 ServerNetworkLayerTCP_getWork(ServerNetworkLayerTCP *layer, UA_WorkItem **workItems,
  290. UA_UInt16 timeout) {
  291. UA_WorkItem *items = (void*)0;
  292. UA_Int32 itemsCount = removeAllConnections(layer, &items);
  293. setFDSet(layer);
  294. struct timeval tmptv = {0, timeout};
  295. UA_Int32 resultsize = select(layer->highestfd+1, &layer->fdset, NULL, NULL, &tmptv);
  296. if(resultsize < 0) {
  297. *workItems = items;
  298. return itemsCount;
  299. }
  300. // accept new connections (can only be a single one)
  301. if(FD_ISSET(layer->serversockfd,&layer->fdset)) {
  302. resultsize--;
  303. struct sockaddr_in cli_addr;
  304. socklen_t cli_len = sizeof(cli_addr);
  305. int newsockfd = accept(layer->serversockfd, (struct sockaddr *) &cli_addr, &cli_len);
  306. int i = 1;
  307. setsockopt(newsockfd, IPPROTO_TCP, TCP_NODELAY, (void *)&i, sizeof(i));
  308. if (newsockfd >= 0)
  309. ServerNetworkLayerTCP_add(layer, newsockfd);
  310. }
  311. items = realloc(items, sizeof(UA_WorkItem)*(itemsCount+resultsize));
  312. // read from established sockets
  313. UA_Int32 j = itemsCount;
  314. UA_ByteString buf = { -1, NULL};
  315. for(UA_Int32 i=0;i<layer->conLinksSize && j<itemsCount+resultsize;i++) {
  316. if(!(FD_ISSET(layer->conLinks[i].sockfd, &layer->fdset)))
  317. continue;
  318. if(!buf.data) {
  319. buf.data = malloc(sizeof(UA_Byte) * layer->conf.recvBufferSize);
  320. if(!buf.data)
  321. break;
  322. }
  323. #ifdef _WIN32
  324. buf.length = recv(layer->conLinks[i].sockfd, (char *)buf.data,
  325. layer->conf.recvBufferSize, 0);
  326. #else
  327. buf.length = read(layer->conLinks[i].sockfd, buf.data, layer->conf.recvBufferSize);
  328. #endif
  329. if (buf.length <= 0) {
  330. closeConnection(layer->conLinks[i].connection); // work is returned in the next iteration
  331. } else {
  332. items[j].type = UA_WORKITEMTYPE_BINARYNETWORKMESSAGE;
  333. items[j].work.binaryNetworkMessage.message = buf;
  334. items[j].work.binaryNetworkMessage.connection = &layer->conLinks[i].connection->connection;
  335. buf.data = NULL;
  336. j++;
  337. }
  338. }
  339. if(buf.data)
  340. free(buf.data);
  341. if(j == 0) {
  342. free(items);
  343. *workItems = NULL;
  344. } else
  345. *workItems = items;
  346. return j;
  347. }
  348. static UA_Int32 ServerNetworkLayerTCP_stop(ServerNetworkLayerTCP * layer, UA_WorkItem **workItems) {
  349. for(UA_Int32 index = 0;index < layer->conLinksSize;index++)
  350. closeConnection(layer->conLinks[index].connection);
  351. #ifdef _WIN32
  352. WSACleanup();
  353. #endif
  354. return removeAllConnections(layer, workItems);
  355. }
  356. static void ServerNetworkLayerTCP_delete(ServerNetworkLayerTCP *layer) {
  357. UA_String_deleteMembers(&layer->discoveryUrl);
  358. for(UA_Int32 i=0;i<layer->conLinksSize;++i){
  359. free(layer->conLinks[i].connection);
  360. }
  361. free(layer->conLinks);
  362. free(layer);
  363. }
  364. UA_ServerNetworkLayer ServerNetworkLayerTCP_new(UA_ConnectionConfig conf, UA_UInt32 port) {
  365. #ifdef _WIN32
  366. WORD wVersionRequested;
  367. WSADATA wsaData;
  368. wVersionRequested = MAKEWORD(2, 2);
  369. WSAStartup(wVersionRequested, &wsaData);
  370. #endif
  371. ServerNetworkLayerTCP *tcplayer = malloc(sizeof(ServerNetworkLayerTCP));
  372. tcplayer->conf = conf;
  373. tcplayer->conLinksSize = 0;
  374. tcplayer->conLinks = NULL;
  375. tcplayer->port = port;
  376. tcplayer->deleteLinkList = (void*)0;
  377. char hostname[256];
  378. gethostname(hostname, 255);
  379. UA_String_copyprintf("opc.tcp://%s:%d", &tcplayer->discoveryUrl, hostname, port);
  380. UA_ServerNetworkLayer nl;
  381. nl.nlHandle = tcplayer;
  382. nl.start = (UA_StatusCode (*)(void*, UA_Logger *logger))ServerNetworkLayerTCP_start;
  383. nl.getWork = (UA_Int32 (*)(void*, UA_WorkItem**, UA_UInt16))ServerNetworkLayerTCP_getWork;
  384. nl.stop = (UA_Int32 (*)(void*, UA_WorkItem**))ServerNetworkLayerTCP_stop;
  385. nl.free = (void (*)(void*))ServerNetworkLayerTCP_delete;
  386. nl.discoveryUrl = &tcplayer->discoveryUrl;
  387. return nl;
  388. }
  389. /***************************/
  390. /* Client NetworkLayer TCP */
  391. /***************************/
  392. static UA_StatusCode ClientNetworkLayerTCP_connect(const UA_String endpointUrl, ClientNetworkLayerTCP *resultHandle) {
  393. if(endpointUrl.length < 11 || endpointUrl.length >= 512) {
  394. printf("server url size invalid\n");
  395. return UA_STATUSCODE_BADINTERNALERROR;
  396. }
  397. if(strncmp((char*)endpointUrl.data, "opc.tcp://", 10) != 0) {
  398. printf("server url does not begin with opc.tcp://\n");
  399. return UA_STATUSCODE_BADINTERNALERROR;
  400. }
  401. //this is somewhat ugly, but atoi needs a c string
  402. char cstringEndpointUrl[endpointUrl.length+1];
  403. memcpy(cstringEndpointUrl, endpointUrl.data, endpointUrl.length);
  404. cstringEndpointUrl[endpointUrl.length+1] = '0';
  405. UA_UInt16 portpos = 9;
  406. UA_UInt16 port = 0;
  407. for(;portpos < endpointUrl.length; portpos++) {
  408. if(endpointUrl.data[portpos] == ':') {
  409. port = atoi(&cstringEndpointUrl[portpos+1]);
  410. break;
  411. }
  412. }
  413. if(port == 0) {
  414. printf("port invalid");
  415. return UA_STATUSCODE_BADINTERNALERROR;
  416. }
  417. char hostname[512];
  418. for(int i=10; i < portpos; i++)
  419. hostname[i-10] = endpointUrl.data[i];
  420. hostname[portpos-10] = 0;
  421. #ifdef _WIN32
  422. UA_UInt32 sock = 0;
  423. #else
  424. UA_Int32 sock = 0;
  425. #endif
  426. #ifdef _WIN32
  427. WORD wVersionRequested;
  428. WSADATA wsaData;
  429. wVersionRequested = MAKEWORD(2, 2);
  430. WSAStartup(wVersionRequested, &wsaData);
  431. if((sock = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  432. #else
  433. if((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
  434. #endif
  435. printf("Could not create socket\n");
  436. return UA_STATUSCODE_BADINTERNALERROR;
  437. }
  438. struct hostent *server;
  439. server = gethostbyname(hostname);
  440. if (server == NULL) {
  441. printf("DNS lookup of %s failed\n", hostname);
  442. return UA_STATUSCODE_BADINTERNALERROR;
  443. }
  444. struct sockaddr_in server_addr;
  445. memset(&server_addr, 0, sizeof(server_addr));
  446. memcpy((char *)&server_addr.sin_addr.s_addr,
  447. (char *)server->h_addr_list[0],
  448. server->h_length);
  449. server_addr.sin_family = AF_INET;
  450. server_addr.sin_port = htons(port);
  451. if(connect(sock, (struct sockaddr *) &server_addr, sizeof(server_addr)) < 0) {
  452. printf("Connect failed.\n");
  453. return UA_STATUSCODE_BADINTERNALERROR;
  454. }
  455. //if(setNonBlocking(*sock) != UA_STATUSCODE_GOOD) {
  456. // printf("Could not switch to nonblocking.\n");
  457. // FINALLY
  458. // return UA_STATUSCODE_BADINTERNALERROR;
  459. //}
  460. resultHandle->sockfd = sock;
  461. return UA_STATUSCODE_GOOD;
  462. }
  463. static void ClientNetworkLayerTCP_disconnect(ClientNetworkLayerTCP* handle) {
  464. CLOSESOCKET(handle->sockfd);
  465. #ifdef _WIN32
  466. WSACleanup();
  467. #endif
  468. }
  469. static UA_StatusCode ClientNetworkLayerTCP_send(ClientNetworkLayerTCP *handle, UA_ByteStringArray gather_buf) {
  470. UA_UInt32 total_len = 0, nWritten = 0;
  471. #ifdef _WIN32
  472. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  473. int result = 0;
  474. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  475. buf[i].buf = (char*)gather_buf.strings[i].data;
  476. buf[i].len = gather_buf.strings[i].length;
  477. total_len += gather_buf.strings[i].length;
  478. }
  479. while(nWritten < total_len) {
  480. UA_UInt32 n = 0;
  481. do {
  482. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize ,
  483. (LPDWORD)&n, 0, NULL, NULL);
  484. if(result != 0)
  485. printf("Error WSASend, code: %d \n", WSAGetLastError());
  486. } while(errno == EINTR);
  487. nWritten += n;
  488. }
  489. #else
  490. struct iovec iov[gather_buf.stringsSize];
  491. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  492. iov[i] = (struct iovec) {.iov_base = gather_buf.strings[i].data,
  493. .iov_len = gather_buf.strings[i].length};
  494. total_len += gather_buf.strings[i].length;
  495. }
  496. struct msghdr message = {.msg_name = NULL, .msg_namelen = 0, .msg_iov = iov,
  497. .msg_iovlen = gather_buf.stringsSize, .msg_control = NULL,
  498. .msg_controllen = 0, .msg_flags = 0};
  499. while (nWritten < total_len) {
  500. int n = sendmsg(handle->sockfd, &message, 0);
  501. if(n <= -1)
  502. return UA_STATUSCODE_BADINTERNALERROR;
  503. nWritten += n;
  504. }
  505. #endif
  506. return UA_STATUSCODE_GOOD;
  507. }
  508. static UA_StatusCode ClientNetworkLayerTCP_awaitResponse(ClientNetworkLayerTCP *handle, UA_ByteString *response,
  509. UA_UInt32 timeout) {
  510. //FD_ZERO(&handle->read_fds);
  511. //FD_SET(handle->sockfd, &handle->read_fds);//tcp socket
  512. struct timeval tmptv = {0, timeout};
  513. /*int ret = select(handle->sockfd+1, &handle->read_fds, NULL, NULL, &tmptv);
  514. if(ret <= -1)
  515. return UA_STATUSCODE_BADINTERNALERROR;
  516. if(ret == 0)
  517. return UA_STATUSCODE_BADTIMEOUT;*/
  518. setsockopt(handle->sockfd, SOL_SOCKET, SO_RCVTIMEO, (char *)&tmptv,sizeof(struct timeval));
  519. int ret = recv(handle->sockfd, (char*)response->data, response->length, 0);
  520. if(ret <= -1)
  521. return UA_STATUSCODE_BADINTERNALERROR;
  522. if(ret == 0)
  523. return UA_STATUSCODE_BADSERVERNOTCONNECTED;
  524. response->length = ret;
  525. return UA_STATUSCODE_GOOD;
  526. }
  527. static void ClientNetworkLayerTCP_delete(ClientNetworkLayerTCP *layer) {
  528. if(layer)
  529. free(layer);
  530. }
  531. UA_ClientNetworkLayer ClientNetworkLayerTCP_new(UA_ConnectionConfig conf) {
  532. ClientNetworkLayerTCP *tcplayer = malloc(sizeof(ClientNetworkLayerTCP));
  533. tcplayer->sockfd = 0;
  534. UA_ClientNetworkLayer layer;
  535. layer.nlHandle = tcplayer;
  536. layer.connect = (UA_StatusCode (*)(const UA_String, void**)) ClientNetworkLayerTCP_connect;
  537. layer.disconnect = (void (*)(void*)) ClientNetworkLayerTCP_disconnect;
  538. layer.delete = (void (*)(void*)) ClientNetworkLayerTCP_delete;
  539. layer.send = (UA_StatusCode (*)(void*, UA_ByteStringArray)) ClientNetworkLayerTCP_send;
  540. layer.awaitResponse = (UA_StatusCode (*)(void*, UA_ByteString *, UA_UInt32))ClientNetworkLayerTCP_awaitResponse;
  541. return layer;
  542. }