networklayer_tcp.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614
  1. /*
  2. * This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  3. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  4. */
  5. #ifdef NOT_AMALGATED
  6. # define _XOPEN_SOURCE 500 //some users need this for some reason
  7. # define __USE_BSD
  8. # include <stdlib.h> // malloc, free
  9. # include <stdio.h>
  10. # include <string.h> // memset
  11. #endif
  12. #ifdef _WIN32
  13. # include <malloc.h>
  14. # include <winsock2.h>
  15. # include <sys/types.h>
  16. # include <windows.h>
  17. # include <ws2tcpip.h>
  18. # define CLOSESOCKET(S) closesocket(S)
  19. #else
  20. # include <sys/select.h>
  21. # include <netinet/in.h>
  22. # include <netinet/tcp.h>
  23. # include <sys/socketvar.h>
  24. # include <sys/ioctl.h>
  25. # include <netdb.h> //gethostbyname for the client
  26. # include <unistd.h> // read, write, close
  27. # include <arpa/inet.h>
  28. # define CLOSESOCKET(S) close(S)
  29. #endif
  30. #include "networklayer_tcp.h" // UA_MULTITHREADING is defined in here
  31. #ifdef UA_MULTITHREADING
  32. # include <urcu/uatomic.h>
  33. #endif
  34. /* with a space so amalgamation does not remove the includes */
  35. # include <errno.h> // errno, EINTR
  36. # include <fcntl.h> // fcntl
  37. struct ServerNetworklayer_TCP;
  38. /* Forwarded to the server as a (UA_Connection) and used for callbacks back into
  39. the networklayer */
  40. typedef struct {
  41. UA_Connection connection;
  42. UA_Int32 sockfd;
  43. void *layer;
  44. } TCPConnection;
  45. /***************************/
  46. /* Server NetworkLayer TCP */
  47. /***************************/
  48. #define MAXBACKLOG 100
  49. /* Internal mapping of sockets to connections */
  50. typedef struct {
  51. TCPConnection *connection;
  52. #ifdef _WIN32
  53. UA_UInt32 sockfd;
  54. #else
  55. UA_Int32 sockfd;
  56. #endif
  57. } ConnectionLink;
  58. typedef struct ServerNetworkLayerTCP {
  59. UA_ConnectionConfig conf;
  60. fd_set fdset;
  61. #ifdef _WIN32
  62. UA_UInt32 serversockfd;
  63. UA_UInt32 highestfd;
  64. #else
  65. UA_Int32 serversockfd;
  66. UA_Int32 highestfd;
  67. #endif
  68. UA_UInt16 conLinksSize;
  69. ConnectionLink *conLinks;
  70. UA_UInt32 port;
  71. UA_String discoveryUrl;
  72. /* We remove the connection links only in the main thread. Attach
  73. to-be-deleted links with atomic operations */
  74. struct deleteLink {
  75. #ifdef _WIN32
  76. UA_UInt32 sockfd;
  77. #else
  78. UA_Int32 sockfd;
  79. #endif
  80. struct deleteLink *next;
  81. } *deleteLinkList;
  82. } ServerNetworkLayerTCP;
  83. typedef struct ClientNetworkLayerTCP {
  84. fd_set read_fds;
  85. #ifdef _WIN32
  86. UA_UInt32 sockfd;
  87. #else
  88. UA_Int32 sockfd;
  89. #endif
  90. } ClientNetworkLayerTCP;
  91. static UA_StatusCode setNonBlocking(int sockid) {
  92. #ifdef _WIN32
  93. u_long iMode = 1;
  94. if(ioctlsocket(sockid, FIONBIO, &iMode) != NO_ERROR)
  95. return UA_STATUSCODE_BADINTERNALERROR;
  96. #else
  97. int opts = fcntl(sockid,F_GETFL);
  98. if(opts < 0 || fcntl(sockid,F_SETFL,opts|O_NONBLOCK) < 0)
  99. return UA_STATUSCODE_BADINTERNALERROR;
  100. #endif
  101. return UA_STATUSCODE_GOOD;
  102. }
  103. static void freeConnectionCallback(UA_Server *server, TCPConnection *connection) {
  104. free(connection);
  105. }
  106. // after every select, reset the set of sockets we want to listen on
  107. static void setFDSet(ServerNetworkLayerTCP *layer) {
  108. FD_ZERO(&layer->fdset);
  109. FD_SET(layer->serversockfd, &layer->fdset);
  110. layer->highestfd = layer->serversockfd;
  111. for(UA_Int32 i=0;i<layer->conLinksSize;i++) {
  112. FD_SET(layer->conLinks[i].sockfd, &layer->fdset);
  113. if(layer->conLinks[i].sockfd > layer->highestfd)
  114. layer->highestfd = layer->conLinks[i].sockfd;
  115. }
  116. }
  117. // the callbacks are thread-safe if UA_MULTITHREADING is defined
  118. void closeConnection(TCPConnection *handle);
  119. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf);
  120. static UA_StatusCode ServerNetworkLayerTCP_add(ServerNetworkLayerTCP *layer, UA_Int32 newsockfd) {
  121. setNonBlocking(newsockfd);
  122. TCPConnection *c = malloc(sizeof(TCPConnection));
  123. if(!c)
  124. return UA_STATUSCODE_BADINTERNALERROR;
  125. c->sockfd = newsockfd;
  126. c->layer = layer;
  127. c->connection.state = UA_CONNECTION_OPENING;
  128. c->connection.localConf = layer->conf;
  129. c->connection.channel = (void*)0;
  130. c->connection.close = (void (*)(void*))closeConnection;
  131. c->connection.write = (void (*)(void*, UA_ByteStringArray))writeCallback;
  132. layer->conLinks = realloc(layer->conLinks, sizeof(ConnectionLink)*(layer->conLinksSize+1));
  133. if(!layer->conLinks) {
  134. free(c);
  135. return UA_STATUSCODE_BADINTERNALERROR;
  136. }
  137. layer->conLinks[layer->conLinksSize].connection = c;
  138. layer->conLinks[layer->conLinksSize].sockfd = newsockfd;
  139. layer->conLinksSize++;
  140. return UA_STATUSCODE_GOOD;
  141. }
  142. /* Removes all connections from the network layer. Returns the work items to close them properly. */
  143. static UA_UInt32 removeAllConnections(ServerNetworkLayerTCP *layer, UA_WorkItem **returnWork) {
  144. UA_WorkItem *work;
  145. if (layer->conLinksSize <= 0 || !(work = malloc(sizeof(UA_WorkItem)*layer->conLinksSize))) {
  146. *returnWork = NULL;
  147. return 0;
  148. }
  149. #ifdef UA_MULTITHREADING
  150. struct deleteLink *d = uatomic_xchg(&layer->deleteLinkList, (void*)0);
  151. #else
  152. struct deleteLink *d = layer->deleteLinkList;
  153. layer->deleteLinkList = (void*)0;
  154. #endif
  155. UA_UInt32 count = 0;
  156. while(d) {
  157. UA_Int32 i;
  158. for(i = 0;i<layer->conLinksSize;i++) {
  159. if(layer->conLinks[i].sockfd == d->sockfd)
  160. break;
  161. }
  162. if(i < layer->conLinksSize) {
  163. TCPConnection *c = layer->conLinks[i].connection;
  164. layer->conLinksSize--;
  165. layer->conLinks[i] = layer->conLinks[layer->conLinksSize];
  166. work[count] = (UA_WorkItem)
  167. {.type = UA_WORKITEMTYPE_DELAYEDMETHODCALL,
  168. .work.methodCall = {.data = c,
  169. .method = (void (*)(UA_Server*,void*))freeConnectionCallback} };
  170. }
  171. struct deleteLink *oldd = d;
  172. d = d->next;
  173. free(oldd);
  174. count++;
  175. }
  176. *returnWork = work;
  177. return count;
  178. }
  179. #ifdef UA_MULTITHREADING
  180. void closeConnection(TCPConnection *handle) {
  181. if(uatomic_xchg(&handle->connection.state, UA_CONNECTION_CLOSING) == UA_CONNECTION_CLOSING)
  182. return;
  183. UA_Connection_detachSecureChannel(&handle->connection);
  184. shutdown(handle->sockfd,2);
  185. CLOSESOCKET(handle->sockfd);
  186. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  187. // Remove the link later in the main thread
  188. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  189. d->sockfd = handle->sockfd;
  190. while(1) {
  191. d->next = layer->deleteLinkList;
  192. if(uatomic_cmpxchg(&layer->deleteLinkList, d->next, d) == d->next)
  193. break;
  194. }
  195. }
  196. #else
  197. void closeConnection(TCPConnection *handle) {
  198. if(handle->connection.state == UA_CONNECTION_CLOSING)
  199. return;
  200. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  201. if(!d)
  202. return;
  203. handle->connection.state = UA_CONNECTION_CLOSING;
  204. UA_Connection_detachSecureChannel(&handle->connection);
  205. shutdown(handle->sockfd,2);
  206. CLOSESOCKET(handle->sockfd);
  207. // Remove the link later in the main thread
  208. d->sockfd = handle->sockfd;
  209. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  210. d->next = layer->deleteLinkList;
  211. layer->deleteLinkList = d;
  212. }
  213. #endif
  214. /** Accesses only the sockfd in the handle. Can be run from parallel threads. */
  215. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf) {
  216. UA_UInt32 total_len = 0, nWritten = 0;
  217. #ifdef _WIN32
  218. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  219. memset(buf, 0, sizeof(gather_buf.stringsSize * sizeof(WSABUF)));
  220. int result = 0;
  221. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  222. buf[i].buf = (char*)gather_buf.strings[i].data;
  223. buf[i].len = gather_buf.strings[i].length;
  224. total_len += gather_buf.strings[i].length;
  225. }
  226. while(nWritten < total_len) {
  227. UA_UInt32 n = 0;
  228. do {
  229. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize ,
  230. (LPDWORD)&n, 0, NULL, NULL);
  231. if(result != 0)
  232. printf("Error WSASend, code: %d \n", WSAGetLastError());
  233. } while(errno == EINTR);
  234. nWritten += n;
  235. }
  236. #else
  237. struct iovec iov[gather_buf.stringsSize];
  238. memset(iov, 0, sizeof(struct iovec)*gather_buf.stringsSize);
  239. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  240. iov[i].iov_base = gather_buf.strings[i].data;
  241. iov[i].iov_len = gather_buf.strings[i].length;
  242. total_len += gather_buf.strings[i].length;
  243. }
  244. struct msghdr message;
  245. memset(&message, 0, sizeof(message));
  246. message.msg_iov = iov;
  247. message.msg_iovlen = gather_buf.stringsSize;
  248. while (nWritten < total_len) {
  249. UA_Int32 n = 0;
  250. do {
  251. n = sendmsg(handle->sockfd, &message, 0);
  252. } while (n == -1L && errno == EINTR);
  253. nWritten += n;
  254. }
  255. #endif
  256. }
  257. static UA_StatusCode ServerNetworkLayerTCP_start(ServerNetworkLayerTCP *layer, UA_Logger *logger) {
  258. #ifdef _WIN32
  259. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  260. printf("ERROR opening socket, code: %d\n", WSAGetLastError());
  261. return UA_STATUSCODE_BADINTERNALERROR;
  262. }
  263. #else
  264. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM, 0)) < 0) {
  265. perror("ERROR opening socket");
  266. return UA_STATUSCODE_BADINTERNALERROR;
  267. }
  268. #endif
  269. const struct sockaddr_in serv_addr = {
  270. .sin_family = AF_INET, .sin_addr.s_addr = INADDR_ANY,
  271. .sin_port = htons(layer->port), .sin_zero = {0}};
  272. int optval = 1;
  273. if(setsockopt(layer->serversockfd, SOL_SOCKET,
  274. SO_REUSEADDR, (const char *)&optval,
  275. sizeof(optval)) == -1) {
  276. perror("setsockopt");
  277. CLOSESOCKET(layer->serversockfd);
  278. return UA_STATUSCODE_BADINTERNALERROR;
  279. }
  280. if(bind(layer->serversockfd, (const struct sockaddr *)&serv_addr,
  281. sizeof(serv_addr)) < 0) {
  282. perror("binding");
  283. CLOSESOCKET(layer->serversockfd);
  284. return UA_STATUSCODE_BADINTERNALERROR;
  285. }
  286. setNonBlocking(layer->serversockfd);
  287. listen(layer->serversockfd, MAXBACKLOG);
  288. char msg[256];
  289. sprintf(msg, "Listening on %.*s\n", layer->discoveryUrl.length, layer->discoveryUrl.data);
  290. UA_LOG_INFO((*logger), UA_LOGGERCATEGORY_SERVER, msg);
  291. return UA_STATUSCODE_GOOD;
  292. }
  293. static UA_Int32 ServerNetworkLayerTCP_getWork(ServerNetworkLayerTCP *layer, UA_WorkItem **workItems,
  294. UA_UInt16 timeout) {
  295. UA_WorkItem *items = (void*)0;
  296. UA_Int32 itemsCount = removeAllConnections(layer, &items);
  297. setFDSet(layer);
  298. struct timeval tmptv = {0, timeout};
  299. UA_Int32 resultsize = select(layer->highestfd+1, &layer->fdset, NULL, NULL, &tmptv);
  300. if(resultsize < 0) {
  301. *workItems = items;
  302. return itemsCount;
  303. }
  304. // accept new connections (can only be a single one)
  305. if(FD_ISSET(layer->serversockfd,&layer->fdset)) {
  306. resultsize--;
  307. struct sockaddr_in cli_addr;
  308. socklen_t cli_len = sizeof(cli_addr);
  309. int newsockfd = accept(layer->serversockfd, (struct sockaddr *) &cli_addr, &cli_len);
  310. int i = 1;
  311. setsockopt(newsockfd, IPPROTO_TCP, TCP_NODELAY, (void *)&i, sizeof(i));
  312. if (newsockfd >= 0)
  313. ServerNetworkLayerTCP_add(layer, newsockfd);
  314. }
  315. items = realloc(items, sizeof(UA_WorkItem)*(itemsCount+resultsize));
  316. // read from established sockets
  317. UA_Int32 j = itemsCount;
  318. UA_ByteString buf = { -1, NULL};
  319. for(UA_Int32 i=0;i<layer->conLinksSize && j<itemsCount+resultsize;i++) {
  320. if(!(FD_ISSET(layer->conLinks[i].sockfd, &layer->fdset)))
  321. continue;
  322. if(!buf.data) {
  323. buf.data = malloc(sizeof(UA_Byte) * layer->conf.recvBufferSize);
  324. if(!buf.data)
  325. break;
  326. }
  327. #ifdef _WIN32
  328. buf.length = recv(layer->conLinks[i].sockfd, (char *)buf.data,
  329. layer->conf.recvBufferSize, 0);
  330. #else
  331. buf.length = read(layer->conLinks[i].sockfd, buf.data, layer->conf.recvBufferSize);
  332. #endif
  333. if (buf.length <= 0) {
  334. closeConnection(layer->conLinks[i].connection); // work is returned in the next iteration
  335. } else {
  336. items[j].type = UA_WORKITEMTYPE_BINARYNETWORKMESSAGE;
  337. items[j].work.binaryNetworkMessage.message = buf;
  338. items[j].work.binaryNetworkMessage.connection = &layer->conLinks[i].connection->connection;
  339. buf.data = NULL;
  340. j++;
  341. }
  342. }
  343. if(buf.data)
  344. free(buf.data);
  345. if(j == 0) {
  346. free(items);
  347. *workItems = NULL;
  348. } else
  349. *workItems = items;
  350. return j;
  351. }
  352. static UA_Int32 ServerNetworkLayerTCP_stop(ServerNetworkLayerTCP * layer, UA_WorkItem **workItems) {
  353. for(UA_Int32 index = 0;index < layer->conLinksSize;index++)
  354. closeConnection(layer->conLinks[index].connection);
  355. #ifdef _WIN32
  356. WSACleanup();
  357. #endif
  358. return removeAllConnections(layer, workItems);
  359. }
  360. static void ServerNetworkLayerTCP_delete(ServerNetworkLayerTCP *layer) {
  361. UA_String_deleteMembers(&layer->discoveryUrl);
  362. for(UA_Int32 i=0;i<layer->conLinksSize;++i){
  363. free(layer->conLinks[i].connection);
  364. }
  365. free(layer->conLinks);
  366. free(layer);
  367. }
  368. UA_ServerNetworkLayer ServerNetworkLayerTCP_new(UA_ConnectionConfig conf, UA_UInt32 port) {
  369. #ifdef _WIN32
  370. WORD wVersionRequested;
  371. WSADATA wsaData;
  372. wVersionRequested = MAKEWORD(2, 2);
  373. WSAStartup(wVersionRequested, &wsaData);
  374. #endif
  375. ServerNetworkLayerTCP *tcplayer = malloc(sizeof(ServerNetworkLayerTCP));
  376. tcplayer->conf = conf;
  377. tcplayer->conLinksSize = 0;
  378. tcplayer->conLinks = NULL;
  379. tcplayer->port = port;
  380. tcplayer->deleteLinkList = (void*)0;
  381. char hostname[256];
  382. gethostname(hostname, 255);
  383. UA_String_copyprintf("opc.tcp://%s:%d", &tcplayer->discoveryUrl, hostname, port);
  384. UA_ServerNetworkLayer nl;
  385. nl.nlHandle = tcplayer;
  386. nl.start = (UA_StatusCode (*)(void*, UA_Logger *logger))ServerNetworkLayerTCP_start;
  387. nl.getWork = (UA_Int32 (*)(void*, UA_WorkItem**, UA_UInt16))ServerNetworkLayerTCP_getWork;
  388. nl.stop = (UA_Int32 (*)(void*, UA_WorkItem**))ServerNetworkLayerTCP_stop;
  389. nl.free = (void (*)(void*))ServerNetworkLayerTCP_delete;
  390. nl.discoveryUrl = &tcplayer->discoveryUrl;
  391. return nl;
  392. }
  393. /***************************/
  394. /* Client NetworkLayer TCP */
  395. /***************************/
  396. static UA_StatusCode ClientNetworkLayerTCP_connect(const UA_String endpointUrl, ClientNetworkLayerTCP *resultHandle) {
  397. if(endpointUrl.length < 11 || endpointUrl.length >= 512) {
  398. printf("server url size invalid\n");
  399. return UA_STATUSCODE_BADINTERNALERROR;
  400. }
  401. if(strncmp((char*)endpointUrl.data, "opc.tcp://", 10) != 0) {
  402. printf("server url does not begin with opc.tcp://\n");
  403. return UA_STATUSCODE_BADINTERNALERROR;
  404. }
  405. //this is somewhat ugly, but atoi needs a c string
  406. char cstringEndpointUrl[endpointUrl.length+1];
  407. memcpy(cstringEndpointUrl, endpointUrl.data, endpointUrl.length);
  408. cstringEndpointUrl[endpointUrl.length+1] = '0';
  409. UA_UInt16 portpos = 9;
  410. UA_UInt16 port = 0;
  411. for(;portpos < endpointUrl.length; portpos++) {
  412. if(endpointUrl.data[portpos] == ':') {
  413. port = atoi(&cstringEndpointUrl[portpos+1]);
  414. break;
  415. }
  416. }
  417. if(port == 0) {
  418. printf("port invalid");
  419. return UA_STATUSCODE_BADINTERNALERROR;
  420. }
  421. char hostname[512];
  422. for(int i=10; i < portpos; i++)
  423. hostname[i-10] = endpointUrl.data[i];
  424. hostname[portpos-10] = 0;
  425. #ifdef _WIN32
  426. UA_UInt32 sock = 0;
  427. #else
  428. UA_Int32 sock = 0;
  429. #endif
  430. #ifdef _WIN32
  431. WORD wVersionRequested;
  432. WSADATA wsaData;
  433. wVersionRequested = MAKEWORD(2, 2);
  434. WSAStartup(wVersionRequested, &wsaData);
  435. if((sock = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  436. #else
  437. if((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
  438. #endif
  439. printf("Could not create socket\n");
  440. return UA_STATUSCODE_BADINTERNALERROR;
  441. }
  442. struct hostent *server;
  443. server = gethostbyname(hostname);
  444. if (server == NULL) {
  445. printf("DNS lookup of %s failed\n", hostname);
  446. return UA_STATUSCODE_BADINTERNALERROR;
  447. }
  448. struct sockaddr_in server_addr;
  449. memset(&server_addr, 0, sizeof(server_addr));
  450. memcpy((char *)&server_addr.sin_addr.s_addr,
  451. (char *)server->h_addr_list[0],
  452. server->h_length);
  453. server_addr.sin_family = AF_INET;
  454. server_addr.sin_port = htons(port);
  455. if(connect(sock, (struct sockaddr *) &server_addr, sizeof(server_addr)) < 0) {
  456. printf("Connect failed.\n");
  457. return UA_STATUSCODE_BADINTERNALERROR;
  458. }
  459. //if(setNonBlocking(*sock) != UA_STATUSCODE_GOOD) {
  460. // printf("Could not switch to nonblocking.\n");
  461. // FINALLY
  462. // return UA_STATUSCODE_BADINTERNALERROR;
  463. //}
  464. resultHandle->sockfd = sock;
  465. return UA_STATUSCODE_GOOD;
  466. }
  467. static void ClientNetworkLayerTCP_disconnect(ClientNetworkLayerTCP* handle) {
  468. CLOSESOCKET(handle->sockfd);
  469. #ifdef _WIN32
  470. WSACleanup();
  471. #endif
  472. }
  473. static UA_StatusCode ClientNetworkLayerTCP_send(ClientNetworkLayerTCP *handle, UA_ByteStringArray gather_buf) {
  474. UA_UInt32 total_len = 0, nWritten = 0;
  475. #ifdef _WIN32
  476. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  477. int result = 0;
  478. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  479. buf[i].buf = (char*)gather_buf.strings[i].data;
  480. buf[i].len = gather_buf.strings[i].length;
  481. total_len += gather_buf.strings[i].length;
  482. }
  483. while(nWritten < total_len) {
  484. UA_UInt32 n = 0;
  485. do {
  486. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize ,
  487. (LPDWORD)&n, 0, NULL, NULL);
  488. if(result != 0)
  489. printf("Error WSASend, code: %d \n", WSAGetLastError());
  490. } while(errno == EINTR);
  491. nWritten += n;
  492. }
  493. #else
  494. struct iovec iov[gather_buf.stringsSize];
  495. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  496. iov[i] = (struct iovec) {.iov_base = gather_buf.strings[i].data,
  497. .iov_len = gather_buf.strings[i].length};
  498. total_len += gather_buf.strings[i].length;
  499. }
  500. struct msghdr message = {.msg_name = NULL, .msg_namelen = 0, .msg_iov = iov,
  501. .msg_iovlen = gather_buf.stringsSize, .msg_control = NULL,
  502. .msg_controllen = 0, .msg_flags = 0};
  503. while (nWritten < total_len) {
  504. int n = sendmsg(handle->sockfd, &message, 0);
  505. if(n <= -1)
  506. return UA_STATUSCODE_BADINTERNALERROR;
  507. nWritten += n;
  508. }
  509. #endif
  510. return UA_STATUSCODE_GOOD;
  511. }
  512. static UA_StatusCode ClientNetworkLayerTCP_awaitResponse(ClientNetworkLayerTCP *handle, UA_ByteString *response,
  513. UA_UInt32 timeout) {
  514. //FD_ZERO(&handle->read_fds);
  515. //FD_SET(handle->sockfd, &handle->read_fds);//tcp socket
  516. struct timeval tmptv = {0, timeout};
  517. /*int ret = select(handle->sockfd+1, &handle->read_fds, NULL, NULL, &tmptv);
  518. if(ret <= -1)
  519. return UA_STATUSCODE_BADINTERNALERROR;
  520. if(ret == 0)
  521. return UA_STATUSCODE_BADTIMEOUT;*/
  522. setsockopt(handle->sockfd, SOL_SOCKET, SO_RCVTIMEO, (char *)&tmptv,sizeof(struct timeval));
  523. int ret = recv(handle->sockfd, (char*)response->data, response->length, 0);
  524. if(ret <= -1)
  525. return UA_STATUSCODE_BADINTERNALERROR;
  526. if(ret == 0)
  527. return UA_STATUSCODE_BADSERVERNOTCONNECTED;
  528. response->length = ret;
  529. return UA_STATUSCODE_GOOD;
  530. }
  531. static void ClientNetworkLayerTCP_delete(ClientNetworkLayerTCP *layer) {
  532. if(layer)
  533. free(layer);
  534. }
  535. UA_ClientNetworkLayer ClientNetworkLayerTCP_new(UA_ConnectionConfig conf) {
  536. ClientNetworkLayerTCP *tcplayer = malloc(sizeof(ClientNetworkLayerTCP));
  537. tcplayer->sockfd = 0;
  538. UA_ClientNetworkLayer layer;
  539. layer.nlHandle = tcplayer;
  540. layer.connect = (UA_StatusCode (*)(const UA_String, void**)) ClientNetworkLayerTCP_connect;
  541. layer.disconnect = (void (*)(void*)) ClientNetworkLayerTCP_disconnect;
  542. layer.delete = (void (*)(void*)) ClientNetworkLayerTCP_delete;
  543. layer.send = (UA_StatusCode (*)(void*, UA_ByteStringArray)) ClientNetworkLayerTCP_send;
  544. layer.awaitResponse = (UA_StatusCode (*)(void*, UA_ByteString *, UA_UInt32))ClientNetworkLayerTCP_awaitResponse;
  545. return layer;
  546. }