networklayer_tcp.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342
  1. /*
  2. * This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  3. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  4. */
  5. #ifdef WIN32
  6. #include <winsock2.h>
  7. #include <sys/types.h>
  8. #include <Windows.h>
  9. #include <ws2tcpip.h>
  10. #define CLOSESOCKET(S) closesocket(S)
  11. #define IOCTLSOCKET ioctlsocket
  12. #else
  13. #include <sys/select.h>
  14. #include <sys/socket.h>
  15. #include <netinet/in.h>
  16. #include <sys/socketvar.h>
  17. #include <unistd.h> // read, write, close
  18. #define CLOSESOCKET(S) close(S)
  19. #define IOCTLSOCKET ioctl
  20. #endif /* WIN32 */
  21. #include <stdlib.h> // exit
  22. #include <stdio.h>
  23. #include <errno.h> // errno, EINTR
  24. #include <memory.h> // memset
  25. #include <fcntl.h> // fcntl
  26. #include "ua_securechannel.h"
  27. #include "networklayer_tcp.h"
  28. typedef struct TCPConnection {
  29. UA_Int32 sockfd;
  30. UA_Connection connection;
  31. } TCPConnection;
  32. struct NetworklayerTCP {
  33. UA_ConnectionConfig localConf;
  34. UA_UInt32 port;
  35. fd_set fdset;
  36. UA_Int32 serversockfd;
  37. UA_Int32 highestfd;
  38. UA_UInt32 connectionsSize;
  39. TCPConnection *connections;
  40. };
  41. /** This structure is stored in the UA_Connection for callbacks into the
  42. network layer. */
  43. typedef struct TCPConnectionHandle {
  44. UA_Int32 sockfd;
  45. NetworklayerTCP *layer;
  46. } TCPConnectionHandle;
  47. UA_StatusCode NetworklayerTCP_new(NetworklayerTCP **newlayer, UA_ConnectionConfig localConf,
  48. UA_UInt32 port) {
  49. *newlayer = malloc(sizeof(NetworklayerTCP));
  50. if(*newlayer == UA_NULL)
  51. return UA_STATUSCODE_BADOUTOFMEMORY;
  52. (*newlayer)->localConf = localConf;
  53. (*newlayer)->port = port;
  54. (*newlayer)->connectionsSize = 0;
  55. (*newlayer)->connections = UA_NULL;
  56. return UA_STATUSCODE_GOOD;
  57. }
  58. // copy the array of connections, but _loose_ one. This does not close the
  59. // actual socket.
  60. static UA_StatusCode NetworklayerTCP_remove(NetworklayerTCP *layer, UA_Int32 sockfd) {
  61. UA_UInt32 index;
  62. for(index = 0;index < layer->connectionsSize;index++) {
  63. if(layer->connections[index].sockfd == sockfd)
  64. break;
  65. }
  66. if(index == layer->connectionsSize)
  67. return UA_STATUSCODE_BADINTERNALERROR;
  68. if(layer->connections[index].connection.channel)
  69. layer->connections[index].connection.channel->connection = UA_NULL;
  70. UA_Connection_deleteMembers(&layer->connections[index].connection);
  71. layer->connectionsSize--;
  72. TCPConnection *newconnections;
  73. newconnections = malloc(sizeof(TCPConnection) * layer->connectionsSize);
  74. memcpy(newconnections, layer->connections, sizeof(TCPConnection) * index);
  75. memcpy(&newconnections[index], &layer->connections[index+1],
  76. sizeof(TCPConnection) * (layer->connectionsSize - index));
  77. free(layer->connections);
  78. layer->connections = newconnections;
  79. return UA_STATUSCODE_GOOD;
  80. }
  81. void NetworklayerTCP_delete(NetworklayerTCP *layer) {
  82. for(UA_UInt32 index = 0;index < layer->connectionsSize;index++) {
  83. shutdown(layer->connections[index].sockfd, 2);
  84. if(layer->connections[index].connection.channel)
  85. layer->connections[index].connection.channel->connection = UA_NULL;
  86. UA_Connection_deleteMembers(&layer->connections[index].connection);
  87. CLOSESOCKET(layer->connections[index].sockfd);
  88. }
  89. free(layer->connections);
  90. free(layer);
  91. }
  92. /** Callback function */
  93. void closeCallback(TCPConnectionHandle *handle) {
  94. shutdown(handle->sockfd,2);
  95. CLOSESOCKET(handle->sockfd);
  96. NetworklayerTCP_remove(handle->layer, handle->sockfd);
  97. }
  98. /** Callback function */
  99. void writeCallback(TCPConnectionHandle *handle, UA_ByteStringArray gather_buf) {
  100. UA_UInt32 total_len = 0;
  101. UA_UInt32 nWritten = 0;
  102. #ifdef WIN32
  103. LPWSABUF buf = malloc(gather_buf.stringsSize * sizeof(WSABUF));
  104. int result = 0;
  105. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  106. buf[i].buf = gather_buf.strings[i].data;
  107. buf[i].len = gather_buf.strings[i].length;
  108. total_len += gather_buf.strings[i].length;
  109. }
  110. while (nWritten < total_len) {
  111. UA_UInt32 n=0;
  112. do {
  113. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize , (LPDWORD)&n, 0, NULL, NULL);
  114. if(result != 0)
  115. printf("NL_TCP_Writer - Error WSASend, code: %d \n", WSAGetLastError());
  116. } while (errno == EINTR);
  117. nWritten += n;
  118. }
  119. free(buf);
  120. #else
  121. struct iovec iov[gather_buf.stringsSize];
  122. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  123. iov[i].iov_base = gather_buf.strings[i].data;
  124. iov[i].iov_len = gather_buf.strings[i].length;
  125. total_len += gather_buf.strings[i].length;
  126. }
  127. struct msghdr message = {.msg_name = UA_NULL, .msg_namelen = 0, .msg_iov = iov,
  128. .msg_iovlen = gather_buf.stringsSize, .msg_control = UA_NULL,
  129. .msg_controllen = 0, .msg_flags = 0};
  130. while (nWritten < total_len) {
  131. UA_Int32 n = 0;
  132. do {
  133. n = sendmsg(handle->sockfd, &message, 0);
  134. } while (n == -1L && errno == EINTR);
  135. if (n >= 0) {
  136. // TODO: handle incompletely send messages
  137. /* nWritten += n; */
  138. break;
  139. } else {
  140. // TODO: error handling
  141. break;
  142. }
  143. }
  144. #endif
  145. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++)
  146. free(gather_buf.strings[i].data);
  147. }
  148. static UA_StatusCode NetworklayerTCP_add(NetworklayerTCP *layer, UA_Int32 newsockfd) {
  149. layer->connectionsSize++;
  150. layer->connections = realloc(layer->connections, sizeof(TCPConnection) * layer->connectionsSize);
  151. TCPConnection *newconnection = &layer->connections[layer->connectionsSize-1];
  152. newconnection->sockfd = newsockfd;
  153. struct TCPConnectionHandle *callbackhandle;
  154. callbackhandle = malloc(sizeof(struct TCPConnectionHandle));
  155. if(!callbackhandle)
  156. return UA_STATUSCODE_BADOUTOFMEMORY;
  157. callbackhandle->layer = layer;
  158. callbackhandle->sockfd = newsockfd;
  159. UA_Connection_init(&newconnection->connection, layer->localConf, callbackhandle,
  160. (UA_Connection_closeCallback)closeCallback, (UA_Connection_writeCallback)writeCallback);
  161. return UA_STATUSCODE_GOOD;
  162. }
  163. static UA_StatusCode setNonBlocking(int sockid) {
  164. #ifdef WIN32
  165. u_long iMode = 1;
  166. int opts = IOCTLSOCKET(sockid, FIONBIO, &iMode);
  167. if (opts != NO_ERROR){
  168. printf("ioctlsocket failed with error: %ld\n", opts);
  169. return UA_STATUSCODE_BADINTERNALERROR;
  170. }
  171. return UA_STATUSCODE_GOOD;
  172. #else
  173. int opts = fcntl(sockid,F_GETFL);
  174. if (opts < 0) {
  175. perror("fcntl(F_GETFL)");
  176. return UA_STATUSCODE_BADINTERNALERROR;
  177. }
  178. opts = (opts | O_NONBLOCK);
  179. if (fcntl(sockid,F_SETFL,opts) < 0) {
  180. perror("fcntl(F_SETFL)");
  181. return UA_STATUSCODE_BADINTERNALERROR;
  182. }
  183. return UA_STATUSCODE_GOOD;
  184. #endif
  185. }
  186. void readConnection(NetworklayerTCP *layer, UA_Server *server, TCPConnection *entry) {
  187. UA_ByteString readBuffer;
  188. readBuffer.data = malloc(layer->localConf.recvBufferSize);
  189. #ifdef WIN32
  190. readBuffer.length = recv(entry->sockfd, (char *)readBuffer.data,
  191. layer->localConf.recvBufferSize, 0);
  192. #else
  193. readBuffer.length = read(entry->sockfd, readBuffer.data, layer->localConf.recvBufferSize);
  194. #endif
  195. if (errno != 0) {
  196. shutdown(entry->sockfd,2);
  197. CLOSESOCKET(entry->sockfd);
  198. NetworklayerTCP_remove(layer, entry->sockfd);
  199. } else {
  200. if(readBuffer.length>0){ //data received to process?
  201. UA_Server_processBinaryMessage(server, &entry->connection, &readBuffer);
  202. }
  203. }
  204. readBuffer.length = layer->localConf.recvBufferSize; // because this was malloc'd. Length=0 would lead to errors.
  205. UA_ByteString_deleteMembers(&readBuffer);
  206. }
  207. void worksocks(NetworklayerTCP *layer, UA_Server *server, UA_UInt32 workamount) {
  208. // accept new connections
  209. if(FD_ISSET(layer->serversockfd,&layer->fdset)) {
  210. struct sockaddr_in cli_addr;
  211. socklen_t cli_len = sizeof(cli_addr);
  212. int newsockfd = accept(layer->serversockfd, (struct sockaddr *) &cli_addr, &cli_len);
  213. if (newsockfd >= 0) {
  214. setNonBlocking(newsockfd);
  215. NetworklayerTCP_add(layer, newsockfd);
  216. }
  217. workamount--;
  218. }
  219. // read from established sockets
  220. for(UA_UInt32 i=0;i<layer->connectionsSize && workamount > 0;i++) {
  221. if(FD_ISSET(layer->connections[i].sockfd, &layer->fdset)) {
  222. readConnection(layer, server, &layer->connections[i]);
  223. workamount--;
  224. }
  225. }
  226. }
  227. // after every select, reset the set of sockets we want to listen on
  228. void setFDSet(NetworklayerTCP *layer) {
  229. FD_ZERO(&layer->fdset);
  230. FD_SET(layer->serversockfd, &layer->fdset);
  231. layer->highestfd = layer->serversockfd;
  232. for(UA_UInt32 i=0;i<layer->connectionsSize;i++) {
  233. FD_SET(layer->connections[i].sockfd, &layer->fdset);
  234. if(layer->connections[i].sockfd > layer->highestfd)
  235. layer->highestfd = layer->connections[i].sockfd;
  236. }
  237. layer->highestfd++;
  238. }
  239. UA_StatusCode NetworkLayerTCP_run(NetworklayerTCP *layer, UA_Server *server, struct timeval tv,
  240. void(*worker)(UA_Server*), UA_Boolean *running) {
  241. #ifdef WIN32
  242. WORD wVersionRequested;
  243. WSADATA wsaData;
  244. wVersionRequested = MAKEWORD(2, 2);
  245. WSAStartup(wVersionRequested, &wsaData);
  246. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  247. printf("ERROR opening socket, code: %d\n", WSAGetLastError());
  248. return UA_STATUSCODE_BADINTERNALERROR;
  249. }
  250. #else
  251. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM, 0)) < 0) {
  252. perror("ERROR opening socket");
  253. return UA_STATUSCODE_BADINTERNALERROR;
  254. }
  255. #endif
  256. struct sockaddr_in serv_addr;
  257. memset((void *)&serv_addr, sizeof(serv_addr), 1);
  258. serv_addr.sin_family = AF_INET;
  259. serv_addr.sin_addr.s_addr = INADDR_ANY;
  260. serv_addr.sin_port = htons(layer->port);
  261. int optval = 1;
  262. if(setsockopt(layer->serversockfd, SOL_SOCKET, SO_REUSEADDR, (const char *)&optval, sizeof(optval)) == -1) {
  263. perror("setsockopt");
  264. CLOSESOCKET(layer->serversockfd);
  265. return UA_STATUSCODE_BADINTERNALERROR;
  266. }
  267. if(bind(layer->serversockfd, (struct sockaddr *) &serv_addr, sizeof(serv_addr)) < 0) {
  268. perror("binding");
  269. CLOSESOCKET(layer->serversockfd);
  270. return UA_STATUSCODE_BADINTERNALERROR;
  271. }
  272. #define MAXBACKLOG 10
  273. setNonBlocking(layer->serversockfd);
  274. listen(layer->serversockfd, MAXBACKLOG);
  275. while (*running) {
  276. setFDSet(layer);
  277. struct timeval tmptv = tv;
  278. UA_Int32 resultsize = select(layer->highestfd, &layer->fdset, UA_NULL, UA_NULL, &tmptv);
  279. if (resultsize <= 0) {
  280. #ifdef WIN32
  281. UA_Int32 err = (resultsize == SOCKET_ERROR) ? WSAGetLastError() : 0;
  282. switch (err) {
  283. case WSANOTINITIALISED:
  284. case WSAEFAULT:
  285. case WSAENETDOWN:
  286. case WSAEINVAL:
  287. case WSAEINTR:
  288. case WSAEINPROGRESS:
  289. case WSAENOTSOCK:
  290. #else
  291. UA_Int32 err = errno;
  292. switch (err) {
  293. case EBADF:
  294. case EINTR:
  295. case EINVAL:
  296. #endif
  297. // todo: handle errors
  298. printf("UA_Stack_msgLoop - result=%d, errno={%d,%s}\n", resultsize, errno, strerror(errno));
  299. break;
  300. default:
  301. // timeout
  302. worker(server);
  303. }
  304. } else { // activity on listener or client socket
  305. worksocks(layer, server, resultsize);
  306. worker(server);
  307. }
  308. }
  309. #ifdef WIN32
  310. WSACleanup();
  311. #endif
  312. return UA_STATUSCODE_GOOD;
  313. }