networklayer_tcp.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609
  1. /*
  2. * This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  3. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  4. */
  5. #include <stdlib.h> // malloc, free
  6. #ifdef _WIN32
  7. #include <malloc.h>
  8. #include <winsock2.h>
  9. #include <sys/types.h>
  10. #include <windows.h>
  11. #include <ws2tcpip.h>
  12. #define CLOSESOCKET(S) closesocket(S)
  13. #else
  14. #include <sys/select.h>
  15. #include <netinet/in.h>
  16. #include <netinet/tcp.h>
  17. #include <sys/socketvar.h>
  18. #include <sys/ioctl.h>
  19. #include <netdb.h> //gethostbyname for the client
  20. #define __USE_BSD
  21. #include <unistd.h> // read, write, close
  22. #include <arpa/inet.h>
  23. #define CLOSESOCKET(S) close(S)
  24. #endif
  25. #include <stdio.h>
  26. #include <errno.h> // errno, EINTR
  27. #include <fcntl.h> // fcntl
  28. #include <string.h> // memset
  29. #include "networklayer_tcp.h" // UA_MULTITHREADING is defined in here
  30. #ifdef UA_MULTITHREADING
  31. #include <urcu/uatomic.h>
  32. #endif
  33. struct ServerNetworklayer_TCP;
  34. /* Forwarded to the server as a (UA_Connection) and used for callbacks back into
  35. the networklayer */
  36. typedef struct {
  37. UA_Connection connection;
  38. UA_Int32 sockfd;
  39. void *layer;
  40. } TCPConnection;
  41. /***************************/
  42. /* Server NetworkLayer TCP */
  43. /***************************/
  44. #define MAXBACKLOG 100
  45. /* Internal mapping of sockets to connections */
  46. typedef struct {
  47. TCPConnection *connection;
  48. #ifdef _WIN32
  49. UA_UInt32 sockfd;
  50. #else
  51. UA_Int32 sockfd;
  52. #endif
  53. } ConnectionLink;
  54. typedef struct ServerNetworkLayerTCP {
  55. UA_ConnectionConfig conf;
  56. fd_set fdset;
  57. #ifdef _WIN32
  58. UA_UInt32 serversockfd;
  59. UA_UInt32 highestfd;
  60. #else
  61. UA_Int32 serversockfd;
  62. UA_Int32 highestfd;
  63. #endif
  64. UA_UInt16 conLinksSize;
  65. ConnectionLink *conLinks;
  66. UA_UInt32 port;
  67. UA_String discoveryUrl;
  68. /* We remove the connection links only in the main thread. Attach
  69. to-be-deleted links with atomic operations */
  70. struct deleteLink {
  71. #ifdef _WIN32
  72. UA_UInt32 sockfd;
  73. #else
  74. UA_Int32 sockfd;
  75. #endif
  76. struct deleteLink *next;
  77. } *deleteLinkList;
  78. } ServerNetworkLayerTCP;
  79. typedef struct ClientNetworkLayerTCP {
  80. fd_set read_fds;
  81. #ifdef _WIN32
  82. UA_UInt32 sockfd;
  83. #else
  84. UA_Int32 sockfd;
  85. #endif
  86. } ClientNetworkLayerTCP;
  87. static UA_StatusCode setNonBlocking(int sockid) {
  88. #ifdef _WIN32
  89. u_long iMode = 1;
  90. if(ioctlsocket(sockid, FIONBIO, &iMode) != NO_ERROR)
  91. return UA_STATUSCODE_BADINTERNALERROR;
  92. #else
  93. int opts = fcntl(sockid,F_GETFL);
  94. if(opts < 0 || fcntl(sockid,F_SETFL,opts|O_NONBLOCK) < 0)
  95. return UA_STATUSCODE_BADINTERNALERROR;
  96. #endif
  97. return UA_STATUSCODE_GOOD;
  98. }
  99. static void freeConnectionCallback(UA_Server *server, TCPConnection *connection) {
  100. free(connection);
  101. }
  102. // after every select, reset the set of sockets we want to listen on
  103. static void setFDSet(ServerNetworkLayerTCP *layer) {
  104. FD_ZERO(&layer->fdset);
  105. FD_SET(layer->serversockfd, &layer->fdset);
  106. layer->highestfd = layer->serversockfd;
  107. for(UA_Int32 i=0;i<layer->conLinksSize;i++) {
  108. FD_SET(layer->conLinks[i].sockfd, &layer->fdset);
  109. if(layer->conLinks[i].sockfd > layer->highestfd)
  110. layer->highestfd = layer->conLinks[i].sockfd;
  111. }
  112. }
  113. // the callbacks are thread-safe if UA_MULTITHREADING is defined
  114. void closeConnection(TCPConnection *handle);
  115. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf);
  116. static UA_StatusCode ServerNetworkLayerTCP_add(ServerNetworkLayerTCP *layer, UA_Int32 newsockfd) {
  117. setNonBlocking(newsockfd);
  118. TCPConnection *c = malloc(sizeof(TCPConnection));
  119. if(!c)
  120. return UA_STATUSCODE_BADINTERNALERROR;
  121. c->sockfd = newsockfd;
  122. c->layer = layer;
  123. c->connection.state = UA_CONNECTION_OPENING;
  124. c->connection.localConf = layer->conf;
  125. c->connection.channel = (void*)0;
  126. c->connection.close = (void (*)(void*))closeConnection;
  127. c->connection.write = (void (*)(void*, UA_ByteStringArray))writeCallback;
  128. layer->conLinks = realloc(layer->conLinks, sizeof(ConnectionLink)*(layer->conLinksSize+1));
  129. if(!layer->conLinks) {
  130. free(c);
  131. return UA_STATUSCODE_BADINTERNALERROR;
  132. }
  133. layer->conLinks[layer->conLinksSize].connection = c;
  134. layer->conLinks[layer->conLinksSize].sockfd = newsockfd;
  135. layer->conLinksSize++;
  136. return UA_STATUSCODE_GOOD;
  137. }
  138. /* Removes all connections from the network layer. Returns the work items to close them properly. */
  139. static UA_UInt32 removeAllConnections(ServerNetworkLayerTCP *layer, UA_WorkItem **returnWork) {
  140. UA_WorkItem *work;
  141. if (layer->conLinksSize <= 0 || !(work = malloc(sizeof(UA_WorkItem)*layer->conLinksSize))) {
  142. *returnWork = NULL;
  143. return 0;
  144. }
  145. #ifdef UA_MULTITHREADING
  146. struct deleteLink *d = uatomic_xchg(&layer->deleteLinkList, (void*)0);
  147. #else
  148. struct deleteLink *d = layer->deleteLinkList;
  149. layer->deleteLinkList = (void*)0;
  150. #endif
  151. UA_UInt32 count = 0;
  152. while(d) {
  153. UA_Int32 i;
  154. for(i = 0;i<layer->conLinksSize;i++) {
  155. if(layer->conLinks[i].sockfd == d->sockfd)
  156. break;
  157. }
  158. if(i < layer->conLinksSize) {
  159. TCPConnection *c = layer->conLinks[i].connection;
  160. layer->conLinksSize--;
  161. layer->conLinks[i] = layer->conLinks[layer->conLinksSize];
  162. work[count] = (UA_WorkItem)
  163. {.type = UA_WORKITEMTYPE_DELAYEDMETHODCALL,
  164. .work.methodCall = {.data = c,
  165. .method = (void (*)(UA_Server*,void*))freeConnectionCallback} };
  166. }
  167. struct deleteLink *oldd = d;
  168. d = d->next;
  169. free(oldd);
  170. count++;
  171. }
  172. *returnWork = work;
  173. return count;
  174. }
  175. #ifdef UA_MULTITHREADING
  176. void closeConnection(TCPConnection *handle) {
  177. if(uatomic_xchg(&handle->connection.state, UA_CONNECTION_CLOSING) == UA_CONNECTION_CLOSING)
  178. return;
  179. UA_Connection_detachSecureChannel(&handle->connection);
  180. shutdown(handle->sockfd,2);
  181. CLOSESOCKET(handle->sockfd);
  182. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  183. // Remove the link later in the main thread
  184. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  185. d->sockfd = handle->sockfd;
  186. while(1) {
  187. d->next = layer->deleteLinkList;
  188. if(uatomic_cmpxchg(&layer->deleteLinkList, d->next, d) == d->next)
  189. break;
  190. }
  191. }
  192. #else
  193. void closeConnection(TCPConnection *handle) {
  194. if(handle->connection.state == UA_CONNECTION_CLOSING)
  195. return;
  196. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  197. if(!d)
  198. return;
  199. handle->connection.state = UA_CONNECTION_CLOSING;
  200. UA_Connection_detachSecureChannel(&handle->connection);
  201. shutdown(handle->sockfd,2);
  202. CLOSESOCKET(handle->sockfd);
  203. // Remove the link later in the main thread
  204. d->sockfd = handle->sockfd;
  205. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  206. d->next = layer->deleteLinkList;
  207. layer->deleteLinkList = d;
  208. }
  209. #endif
  210. /** Accesses only the sockfd in the handle. Can be run from parallel threads. */
  211. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf) {
  212. UA_UInt32 total_len = 0, nWritten = 0;
  213. #ifdef _WIN32
  214. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  215. memset(buf, 0, sizeof(gather_buf.stringsSize * sizeof(WSABUF)));
  216. int result = 0;
  217. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  218. buf[i].buf = (char*)gather_buf.strings[i].data;
  219. buf[i].len = gather_buf.strings[i].length;
  220. total_len += gather_buf.strings[i].length;
  221. }
  222. while(nWritten < total_len) {
  223. UA_UInt32 n = 0;
  224. do {
  225. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize ,
  226. (LPDWORD)&n, 0, NULL, NULL);
  227. if(result != 0)
  228. printf("Error WSASend, code: %d \n", WSAGetLastError());
  229. } while(errno == EINTR);
  230. nWritten += n;
  231. }
  232. #else
  233. struct iovec iov[gather_buf.stringsSize];
  234. memset(iov, 0, sizeof(struct iovec)*gather_buf.stringsSize);
  235. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  236. iov[i].iov_base = gather_buf.strings[i].data;
  237. iov[i].iov_len = gather_buf.strings[i].length;
  238. total_len += gather_buf.strings[i].length;
  239. }
  240. struct msghdr message;
  241. memset(&message, 0, sizeof(message));
  242. message.msg_iov = iov;
  243. message.msg_iovlen = gather_buf.stringsSize;
  244. while (nWritten < total_len) {
  245. UA_Int32 n = 0;
  246. do {
  247. n = sendmsg(handle->sockfd, &message, 0);
  248. } while (n == -1L && errno == EINTR);
  249. nWritten += n;
  250. }
  251. #endif
  252. }
  253. static UA_StatusCode ServerNetworkLayerTCP_start(ServerNetworkLayerTCP *layer, UA_Logger *logger) {
  254. #ifdef _WIN32
  255. WORD wVersionRequested;
  256. WSADATA wsaData;
  257. wVersionRequested = MAKEWORD(2, 2);
  258. WSAStartup(wVersionRequested, &wsaData);
  259. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  260. printf("ERROR opening socket, code: %d\n", WSAGetLastError());
  261. return UA_STATUSCODE_BADINTERNALERROR;
  262. }
  263. #else
  264. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM, 0)) < 0) {
  265. perror("ERROR opening socket");
  266. return UA_STATUSCODE_BADINTERNALERROR;
  267. }
  268. #endif
  269. const struct sockaddr_in serv_addr = {
  270. .sin_family = AF_INET, .sin_addr.s_addr = INADDR_ANY,
  271. .sin_port = htons(layer->port), .sin_zero = {0}};
  272. int optval = 1;
  273. if(setsockopt(layer->serversockfd, SOL_SOCKET,
  274. SO_REUSEADDR, (const char *)&optval,
  275. sizeof(optval)) == -1) {
  276. perror("setsockopt");
  277. CLOSESOCKET(layer->serversockfd);
  278. return UA_STATUSCODE_BADINTERNALERROR;
  279. }
  280. if(bind(layer->serversockfd, (const struct sockaddr *)&serv_addr,
  281. sizeof(serv_addr)) < 0) {
  282. perror("binding");
  283. CLOSESOCKET(layer->serversockfd);
  284. return UA_STATUSCODE_BADINTERNALERROR;
  285. }
  286. setNonBlocking(layer->serversockfd);
  287. listen(layer->serversockfd, MAXBACKLOG);
  288. char msg[256];
  289. sprintf(msg, "Listening on %.*s\n", layer->discoveryUrl.length, layer->discoveryUrl.data);
  290. UA_LOG_INFO((*logger), UA_LOGGERCATEGORY_SERVER, msg);
  291. return UA_STATUSCODE_GOOD;
  292. }
  293. static UA_Int32 ServerNetworkLayerTCP_getWork(ServerNetworkLayerTCP *layer, UA_WorkItem **workItems,
  294. UA_UInt16 timeout) {
  295. UA_WorkItem *items = (void*)0;
  296. UA_Int32 itemsCount = removeAllConnections(layer, &items);
  297. setFDSet(layer);
  298. struct timeval tmptv = {0, timeout};
  299. UA_Int32 resultsize = select(layer->highestfd+1, &layer->fdset, NULL, NULL, &tmptv);
  300. if(resultsize < 0) {
  301. *workItems = items;
  302. return itemsCount;
  303. }
  304. // accept new connections (can only be a single one)
  305. if(FD_ISSET(layer->serversockfd,&layer->fdset)) {
  306. resultsize--;
  307. struct sockaddr_in cli_addr;
  308. socklen_t cli_len = sizeof(cli_addr);
  309. int newsockfd = accept(layer->serversockfd, (struct sockaddr *) &cli_addr, &cli_len);
  310. int i = 1;
  311. setsockopt(newsockfd, IPPROTO_TCP, TCP_NODELAY, (void *)&i, sizeof(i));
  312. if (newsockfd >= 0)
  313. ServerNetworkLayerTCP_add(layer, newsockfd);
  314. }
  315. items = realloc(items, sizeof(UA_WorkItem)*(itemsCount+resultsize));
  316. // read from established sockets
  317. UA_Int32 j = itemsCount;
  318. UA_ByteString buf = { -1, NULL};
  319. for(UA_Int32 i=0;i<layer->conLinksSize && j<itemsCount+resultsize;i++) {
  320. if(!(FD_ISSET(layer->conLinks[i].sockfd, &layer->fdset)))
  321. continue;
  322. if(!buf.data) {
  323. buf.data = malloc(sizeof(UA_Byte) * layer->conf.recvBufferSize);
  324. if(!buf.data)
  325. break;
  326. }
  327. #ifdef _WIN32
  328. buf.length = recv(layer->conLinks[i].sockfd, (char *)buf.data,
  329. layer->conf.recvBufferSize, 0);
  330. #else
  331. buf.length = read(layer->conLinks[i].sockfd, buf.data, layer->conf.recvBufferSize);
  332. #endif
  333. if (buf.length <= 0) {
  334. closeConnection(layer->conLinks[i].connection); // work is returned in the next iteration
  335. } else {
  336. items[j].type = UA_WORKITEMTYPE_BINARYNETWORKMESSAGE;
  337. items[j].work.binaryNetworkMessage.message = buf;
  338. items[j].work.binaryNetworkMessage.connection = &layer->conLinks[i].connection->connection;
  339. buf.data = NULL;
  340. j++;
  341. }
  342. }
  343. if(buf.data)
  344. free(buf.data);
  345. if(j == 0) {
  346. free(items);
  347. *workItems = NULL;
  348. } else
  349. *workItems = items;
  350. return j;
  351. }
  352. static UA_Int32 ServerNetworkLayerTCP_stop(ServerNetworkLayerTCP * layer, UA_WorkItem **workItems) {
  353. for(UA_Int32 index = 0;index < layer->conLinksSize;index++)
  354. closeConnection(layer->conLinks[index].connection);
  355. #ifdef _WIN32
  356. WSACleanup();
  357. #endif
  358. return removeAllConnections(layer, workItems);
  359. }
  360. static void ServerNetworkLayerTCP_delete(ServerNetworkLayerTCP *layer) {
  361. UA_String_deleteMembers(&layer->discoveryUrl);
  362. for(UA_Int32 i=0;i<layer->conLinksSize;++i){
  363. free(layer->conLinks[i].connection);
  364. }
  365. free(layer->conLinks);
  366. free(layer);
  367. }
  368. UA_ServerNetworkLayer ServerNetworkLayerTCP_new(UA_ConnectionConfig conf, UA_UInt32 port) {
  369. ServerNetworkLayerTCP *tcplayer = malloc(sizeof(ServerNetworkLayerTCP));
  370. tcplayer->conf = conf;
  371. tcplayer->conLinksSize = 0;
  372. tcplayer->conLinks = NULL;
  373. tcplayer->port = port;
  374. tcplayer->deleteLinkList = (void*)0;
  375. char hostname[256];
  376. gethostname(hostname, 255);
  377. UA_String_copyprintf("opc.tcp://%s:%d", &tcplayer->discoveryUrl, hostname, port);
  378. UA_ServerNetworkLayer nl;
  379. nl.nlHandle = tcplayer;
  380. nl.start = (UA_StatusCode (*)(void*, UA_Logger *logger))ServerNetworkLayerTCP_start;
  381. nl.getWork = (UA_Int32 (*)(void*, UA_WorkItem**, UA_UInt16))ServerNetworkLayerTCP_getWork;
  382. nl.stop = (UA_Int32 (*)(void*, UA_WorkItem**))ServerNetworkLayerTCP_stop;
  383. nl.free = (void (*)(void*))ServerNetworkLayerTCP_delete;
  384. nl.discoveryUrl = &tcplayer->discoveryUrl;
  385. return nl;
  386. }
  387. /***************************/
  388. /* Client NetworkLayer TCP */
  389. /***************************/
  390. static UA_StatusCode ClientNetworkLayerTCP_connect(const UA_String endpointUrl, ClientNetworkLayerTCP *resultHandle) {
  391. if(endpointUrl.length < 11 || endpointUrl.length >= 512) {
  392. printf("server url size invalid\n");
  393. return UA_STATUSCODE_BADINTERNALERROR;
  394. }
  395. if(strncmp((char*)endpointUrl.data, "opc.tcp://", 10) != 0) {
  396. printf("server url does not begin with opc.tcp://\n");
  397. return UA_STATUSCODE_BADINTERNALERROR;
  398. }
  399. //this is somewhat ugly, but atoi needs a c string
  400. char cstringEndpointUrl[endpointUrl.length+1];
  401. memcpy(cstringEndpointUrl, endpointUrl.data, endpointUrl.length);
  402. cstringEndpointUrl[endpointUrl.length+1] = '0';
  403. UA_UInt16 portpos = 9;
  404. UA_UInt16 port = 0;
  405. for(;portpos < endpointUrl.length; portpos++) {
  406. if(endpointUrl.data[portpos] == ':') {
  407. port = atoi(&cstringEndpointUrl[portpos+1]);
  408. break;
  409. }
  410. }
  411. if(port == 0) {
  412. printf("port invalid");
  413. return UA_STATUSCODE_BADINTERNALERROR;
  414. }
  415. char hostname[512];
  416. for(int i=10; i < portpos; i++)
  417. hostname[i-10] = endpointUrl.data[i];
  418. hostname[portpos-10] = 0;
  419. #ifdef _WIN32
  420. UA_UInt32 sock = 0;
  421. #else
  422. UA_Int32 sock = 0;
  423. #endif
  424. #ifdef _WIN32
  425. WORD wVersionRequested;
  426. WSADATA wsaData;
  427. wVersionRequested = MAKEWORD(2, 2);
  428. WSAStartup(wVersionRequested, &wsaData);
  429. if((sock = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  430. #else
  431. if((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
  432. #endif
  433. printf("Could not create socket\n");
  434. return UA_STATUSCODE_BADINTERNALERROR;
  435. }
  436. struct hostent *server;
  437. server = gethostbyname(hostname);
  438. if (server == NULL) {
  439. printf("DNS lookup of %s failed\n", hostname);
  440. return UA_STATUSCODE_BADINTERNALERROR;
  441. }
  442. struct sockaddr_in server_addr;
  443. memset(&server_addr, 0, sizeof(server_addr));
  444. memcpy((char *)&server_addr.sin_addr.s_addr,
  445. (char *)server->h_addr_list[0],
  446. server->h_length);
  447. server_addr.sin_family = AF_INET;
  448. server_addr.sin_port = htons(port);
  449. if(connect(sock, (struct sockaddr *) &server_addr, sizeof(server_addr)) < 0) {
  450. printf("Connect failed.\n");
  451. return UA_STATUSCODE_BADINTERNALERROR;
  452. }
  453. //if(setNonBlocking(*sock) != UA_STATUSCODE_GOOD) {
  454. // printf("Could not switch to nonblocking.\n");
  455. // FINALLY
  456. // return UA_STATUSCODE_BADINTERNALERROR;
  457. //}
  458. resultHandle->sockfd = sock;
  459. return UA_STATUSCODE_GOOD;
  460. }
  461. static void ClientNetworkLayerTCP_disconnect(ClientNetworkLayerTCP* handle) {
  462. CLOSESOCKET(handle->sockfd);
  463. }
  464. static UA_StatusCode ClientNetworkLayerTCP_send(ClientNetworkLayerTCP *handle, UA_ByteStringArray gather_buf) {
  465. UA_UInt32 total_len = 0, nWritten = 0;
  466. #ifdef _WIN32
  467. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  468. int result = 0;
  469. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  470. buf[i].buf = (char*)gather_buf.strings[i].data;
  471. buf[i].len = gather_buf.strings[i].length;
  472. total_len += gather_buf.strings[i].length;
  473. }
  474. while(nWritten < total_len) {
  475. UA_UInt32 n = 0;
  476. do {
  477. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize ,
  478. (LPDWORD)&n, 0, NULL, NULL);
  479. if(result != 0)
  480. printf("Error WSASend, code: %d \n", WSAGetLastError());
  481. } while(errno == EINTR);
  482. nWritten += n;
  483. }
  484. #else
  485. struct iovec iov[gather_buf.stringsSize];
  486. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  487. iov[i] = (struct iovec) {.iov_base = gather_buf.strings[i].data,
  488. .iov_len = gather_buf.strings[i].length};
  489. total_len += gather_buf.strings[i].length;
  490. }
  491. struct msghdr message = {.msg_name = NULL, .msg_namelen = 0, .msg_iov = iov,
  492. .msg_iovlen = gather_buf.stringsSize, .msg_control = NULL,
  493. .msg_controllen = 0, .msg_flags = 0};
  494. while (nWritten < total_len) {
  495. int n = sendmsg(handle->sockfd, &message, 0);
  496. if(n <= -1)
  497. return UA_STATUSCODE_BADINTERNALERROR;
  498. nWritten += n;
  499. }
  500. #endif
  501. return UA_STATUSCODE_GOOD;
  502. }
  503. static UA_StatusCode ClientNetworkLayerTCP_awaitResponse(ClientNetworkLayerTCP *handle, UA_ByteString *response,
  504. UA_UInt32 timeout) {
  505. FD_ZERO(&handle->read_fds);
  506. FD_SET(handle->sockfd, &handle->read_fds);//tcp socket
  507. struct timeval tmptv = {0, timeout};
  508. tmptv.tv_sec = 10;
  509. int ret = select(handle->sockfd+1, &handle->read_fds, NULL, NULL, &tmptv);
  510. if(ret <= -1)
  511. return UA_STATUSCODE_BADINTERNALERROR;
  512. if(ret == 0)
  513. return UA_STATUSCODE_BADTIMEOUT;
  514. ret = recv(handle->sockfd, (char*)response->data, response->length, 0);
  515. if(ret <= -1)
  516. return UA_STATUSCODE_BADINTERNALERROR;
  517. if(ret == 0)
  518. return UA_STATUSCODE_BADSERVERNOTCONNECTED;
  519. response->length = ret;
  520. return UA_STATUSCODE_GOOD;
  521. }
  522. static void ClientNetworkLayerTCP_delete(ClientNetworkLayerTCP *layer) {
  523. if(layer)
  524. free(layer);
  525. }
  526. UA_ClientNetworkLayer ClientNetworkLayerTCP_new(UA_ConnectionConfig conf) {
  527. ClientNetworkLayerTCP *tcplayer = malloc(sizeof(ClientNetworkLayerTCP));
  528. tcplayer->sockfd = 0;
  529. UA_ClientNetworkLayer layer;
  530. layer.nlHandle = tcplayer;
  531. layer.connect = (UA_StatusCode (*)(const UA_String, void**)) ClientNetworkLayerTCP_connect;
  532. layer.disconnect = (void (*)(void*)) ClientNetworkLayerTCP_disconnect;
  533. layer.delete = (void (*)(void*)) ClientNetworkLayerTCP_delete;
  534. layer.send = (UA_StatusCode (*)(void*, UA_ByteStringArray)) ClientNetworkLayerTCP_send;
  535. layer.awaitResponse = (UA_StatusCode (*)(void*, UA_ByteString *, UA_UInt32))ClientNetworkLayerTCP_awaitResponse;
  536. return layer;
  537. }