at_socket.c 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185
  1. /*
  2. * Copyright (c) 2006-2018, RT-Thread Development Team
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. *
  6. * Change Logs:
  7. * Date Author Notes
  8. * 2018-06-06 chenyong first version
  9. */
  10. #include <at.h>
  11. #include <stdlib.h>
  12. #include <string.h>
  13. #include <ctype.h>
  14. #include <sys/time.h>
  15. #include <at_socket.h>
  16. #ifdef SAL_USING_POSIX
  17. #include <dfs_poll.h>
  18. #endif
  19. #define LOG_TAG "at.skt"
  20. #include <at_log.h>
  21. #ifdef AT_USING_SOCKET
  22. #define HTONS_PORT(x) ((((x) & 0x00ffUL) << 8) | (((x) & 0xff00UL) >> 8))
  23. #define NIPQUAD(addr) \
  24. ((unsigned char *)&addr)[0], \
  25. ((unsigned char *)&addr)[1], \
  26. ((unsigned char *)&addr)[2], \
  27. ((unsigned char *)&addr)[3]
  28. #if !defined(AT_DEVICE_SOCKETS_NUM) || defined(AT_DEVICE_NOT_SELECTED)
  29. #error The AT socket device is not selected, please select it through the env menuconfig.
  30. #endif
  31. /* The maximum number of sockets structure */
  32. #ifndef AT_SOCKETS_NUM
  33. #define AT_SOCKETS_NUM AT_DEVICE_SOCKETS_NUM
  34. #endif
  35. typedef enum {
  36. AT_EVENT_SEND,
  37. AT_EVENT_RECV,
  38. AT_EVENT_ERROR,
  39. } at_event_t;
  40. /* the global array of available sockets */
  41. static struct at_socket sockets[AT_SOCKETS_NUM] = { 0 };
  42. /* AT device socket options */
  43. static struct at_device_ops *at_dev_ops = RT_NULL;
  44. struct at_socket *at_get_socket(int socket)
  45. {
  46. if (socket < 0 || socket >= AT_SOCKETS_NUM)
  47. {
  48. return RT_NULL;
  49. }
  50. /* check socket structure valid or not */
  51. if (sockets[socket].magic != AT_SOCKET_MAGIC)
  52. {
  53. return RT_NULL;
  54. }
  55. return &sockets[socket];
  56. }
  57. /* get a block to the AT socket receive list*/
  58. static size_t at_recvpkt_put(rt_slist_t *rlist, const char *ptr, size_t length)
  59. {
  60. at_recv_pkt_t pkt;
  61. pkt = (at_recv_pkt_t) rt_calloc(1, sizeof(struct at_recv_pkt));
  62. if (pkt == RT_NULL)
  63. {
  64. LOG_E("No memory for receive packet table!");
  65. return 0;
  66. }
  67. pkt->bfsz_totle = length;
  68. pkt->bfsz_index = 0;
  69. pkt->buff = (char *) ptr;
  70. rt_slist_append(rlist, &pkt->list);
  71. return length;
  72. }
  73. /* delete and free all receive buffer list */
  74. static int at_recvpkt_all_delete(rt_slist_t *rlist)
  75. {
  76. at_recv_pkt_t pkt;
  77. rt_slist_t *node;
  78. if(rt_slist_isempty(rlist))
  79. return 0;
  80. for(node = rt_slist_first(rlist); node; node = rt_slist_next(node))
  81. {
  82. pkt = rt_slist_entry(node, struct at_recv_pkt, list);
  83. if (pkt->buff)
  84. {
  85. rt_free(pkt->buff);
  86. }
  87. if(pkt)
  88. {
  89. rt_free(pkt);
  90. pkt = RT_NULL;
  91. }
  92. }
  93. return 0;
  94. }
  95. /* delete and free specified list block */
  96. static int at_recvpkt_node_delete(rt_slist_t *rlist, rt_slist_t *node)
  97. {
  98. at_recv_pkt_t pkt;
  99. if(rt_slist_isempty(rlist))
  100. return 0;
  101. rt_slist_remove(rlist, node);
  102. pkt= rt_slist_entry(node, struct at_recv_pkt, list);
  103. if (pkt->buff)
  104. {
  105. rt_free(pkt->buff);
  106. }
  107. if (pkt)
  108. {
  109. rt_free(pkt);
  110. pkt = RT_NULL;
  111. }
  112. return 0;
  113. }
  114. /* get a block from AT socket receive list */
  115. static size_t at_recvpkt_get(rt_slist_t *rlist, char *mem, size_t len)
  116. {
  117. rt_slist_t *node;
  118. at_recv_pkt_t pkt;
  119. size_t content_pos = 0, page_pos = 0;
  120. if(rt_slist_isempty(rlist))
  121. return 0;
  122. for (node = rt_slist_first(rlist); node; node = rt_slist_next(node))
  123. {
  124. pkt = rt_slist_entry(node, struct at_recv_pkt, list);
  125. page_pos = pkt->bfsz_totle - pkt->bfsz_index;
  126. if (page_pos >= len - content_pos)
  127. {
  128. memcpy((char *) mem + content_pos, pkt->buff + pkt->bfsz_index, len - content_pos);
  129. pkt->bfsz_index += len - content_pos;
  130. if (pkt->bfsz_index == pkt->bfsz_totle)
  131. {
  132. at_recvpkt_node_delete(rlist, node);
  133. }
  134. content_pos = len;
  135. break;
  136. }
  137. else
  138. {
  139. memcpy((char *) mem + content_pos, pkt->buff + pkt->bfsz_index, page_pos);
  140. content_pos += page_pos;
  141. pkt->bfsz_index += page_pos;
  142. at_recvpkt_node_delete(rlist, node);
  143. }
  144. }
  145. return content_pos;
  146. }
  147. static void at_do_event_changes(struct at_socket *sock, at_event_t event, rt_bool_t is_plus)
  148. {
  149. switch (event)
  150. {
  151. case AT_EVENT_SEND:
  152. {
  153. if (is_plus)
  154. {
  155. sock->sendevent = 1;
  156. #ifdef SAL_USING_POSIX
  157. rt_wqueue_wakeup(&sock->wait_head, (void*) POLLOUT);
  158. #endif
  159. }
  160. else if (sock->sendevent)
  161. {
  162. sock->sendevent = 0;
  163. }
  164. break;
  165. }
  166. case AT_EVENT_RECV:
  167. {
  168. if (is_plus)
  169. {
  170. sock->rcvevent++;
  171. #ifdef SAL_USING_POSIX
  172. rt_wqueue_wakeup(&sock->wait_head, (void*) POLLIN);
  173. #endif
  174. }
  175. else if (sock->rcvevent)
  176. {
  177. sock->rcvevent --;
  178. }
  179. break;
  180. }
  181. case AT_EVENT_ERROR:
  182. {
  183. if (is_plus)
  184. {
  185. sock->errevent++;
  186. #ifdef SAL_USING_POSIX
  187. rt_wqueue_wakeup(&sock->wait_head, (void*) POLLERR);
  188. #endif
  189. }
  190. else if (sock->errevent)
  191. {
  192. sock->errevent --;
  193. }
  194. break;
  195. }
  196. default:
  197. LOG_E("Not supported event (%d)", event);
  198. }
  199. }
  200. static void at_do_event_clean(struct at_socket *sock, at_event_t event)
  201. {
  202. switch (event)
  203. {
  204. case AT_EVENT_SEND:
  205. {
  206. sock->sendevent = 0;
  207. break;
  208. }
  209. case AT_EVENT_RECV:
  210. {
  211. sock->rcvevent = 0;
  212. break;
  213. }
  214. case AT_EVENT_ERROR:
  215. {
  216. sock->errevent = 0;
  217. break;
  218. }
  219. default:
  220. LOG_E("Not supported event (%d)", event);
  221. }
  222. }
  223. static struct at_socket *alloc_socket(void)
  224. {
  225. static rt_mutex_t at_slock = RT_NULL;
  226. char name[RT_NAME_MAX];
  227. struct at_socket *sock;
  228. int idx;
  229. if(at_slock == RT_NULL)
  230. {
  231. /* create AT socket lock */
  232. at_slock = rt_mutex_create("at_s", RT_IPC_FLAG_FIFO);
  233. if (at_slock == RT_NULL)
  234. {
  235. LOG_E("No memory for AT socket lock!");
  236. return RT_NULL;
  237. }
  238. }
  239. rt_mutex_take(at_slock, RT_WAITING_FOREVER);
  240. /* find an empty at socket entry */
  241. for (idx = 0; idx < AT_SOCKETS_NUM && sockets[idx].magic; idx++);
  242. /* can't find an empty protocol family entry */
  243. if (idx == AT_SOCKETS_NUM)
  244. {
  245. goto __err;
  246. }
  247. sock = &(sockets[idx]);
  248. sock->magic = AT_SOCKET_MAGIC;
  249. sock->socket = idx;
  250. sock->state = AT_SOCKET_NONE;
  251. sock->rcvevent = RT_NULL;
  252. sock->sendevent = RT_NULL;
  253. sock->errevent = RT_NULL;
  254. rt_slist_init(&sock->recvpkt_list);
  255. rt_snprintf(name, RT_NAME_MAX, "%s%d", "at_sr", idx);
  256. /* create AT socket receive mailbox */
  257. if ((sock->recv_notice = rt_sem_create(name, 0, RT_IPC_FLAG_FIFO)) == RT_NULL)
  258. {
  259. goto __err;
  260. }
  261. rt_snprintf(name, RT_NAME_MAX, "%s%d", "at_sr", idx);
  262. /* create AT socket receive ring buffer lock */
  263. if((sock->recv_lock = rt_mutex_create(name, RT_IPC_FLAG_FIFO)) == RT_NULL)
  264. {
  265. goto __err;
  266. }
  267. rt_mutex_release(at_slock);
  268. return sock;
  269. __err:
  270. rt_mutex_release(at_slock);
  271. return RT_NULL;
  272. }
  273. int at_socket(int domain, int type, int protocol)
  274. {
  275. struct at_socket *sock;
  276. enum at_socket_type socket_type;
  277. /* check socket family protocol */
  278. RT_ASSERT(domain == AF_AT||domain == AF_INET);
  279. //TODO check protocol
  280. switch(type)
  281. {
  282. case SOCK_STREAM:
  283. socket_type = AT_SOCKET_TCP;
  284. break;
  285. case SOCK_DGRAM:
  286. socket_type = AT_SOCKET_UDP;
  287. break;
  288. default :
  289. LOG_E("Don't support socket type (%d)!", type);
  290. return -1;
  291. }
  292. /* allocate and initialize a new AT socket */
  293. sock = alloc_socket();
  294. if(sock == RT_NULL)
  295. {
  296. LOG_E("Allocate a new AT socket failed!");
  297. return RT_NULL;
  298. }
  299. sock->type = socket_type;
  300. #ifdef SAL_USING_POSIX
  301. rt_wqueue_init(&sock->wait_head);
  302. #endif
  303. return sock->socket;
  304. }
  305. static int free_socket(struct at_socket *sock)
  306. {
  307. if (sock->recv_notice)
  308. {
  309. rt_sem_delete(sock->recv_notice);
  310. }
  311. if (sock->recv_lock)
  312. {
  313. rt_mutex_delete(sock->recv_lock);
  314. }
  315. if (!rt_slist_isempty(&sock->recvpkt_list))
  316. {
  317. at_recvpkt_all_delete(&sock->recvpkt_list);
  318. }
  319. memset(sock, 0x00, sizeof(struct at_socket));
  320. return 0;
  321. }
  322. int at_closesocket(int socket)
  323. {
  324. struct at_socket *sock;
  325. enum at_socket_state last_state;
  326. if (at_dev_ops == RT_NULL)
  327. {
  328. return -1;
  329. }
  330. /* deal with TCP server actively disconnect */
  331. rt_thread_delay(rt_tick_from_millisecond(100));
  332. sock = at_get_socket(socket);
  333. if (sock == RT_NULL)
  334. {
  335. return -1;
  336. }
  337. last_state = sock->state;
  338. /* the rt_at_socket_close is need some time, so change state in advance */
  339. sock->state = AT_SOCKET_CLOSED;
  340. if (last_state == AT_SOCKET_CONNECT)
  341. {
  342. if (at_dev_ops->at_closesocket(socket) != 0)
  343. {
  344. LOG_E("AT socket (%d) closesocket failed!", socket);
  345. free_socket(sock);
  346. return -1;
  347. }
  348. }
  349. free_socket(sock);
  350. return 0;
  351. }
  352. int at_shutdown(int socket, int how)
  353. {
  354. struct at_socket *sock;
  355. if (at_dev_ops == RT_NULL)
  356. {
  357. return -1;
  358. }
  359. sock = at_get_socket(socket);
  360. if (sock == RT_NULL)
  361. {
  362. return -1;
  363. }
  364. if (sock->state == AT_SOCKET_CONNECT)
  365. {
  366. if (at_dev_ops->at_closesocket(socket) != 0)
  367. {
  368. LOG_E("AT socket (%d) shutdown failed!", socket);
  369. free_socket(sock);
  370. return -1;
  371. }
  372. }
  373. free_socket(sock);
  374. return 0;
  375. }
  376. int at_bind(int socket, const struct sockaddr *name, socklen_t namelen)
  377. {
  378. if (at_get_socket(socket) == RT_NULL)
  379. {
  380. return -1;
  381. }
  382. return 0;
  383. }
  384. /* get IP address and port by socketaddr structure information */
  385. static int socketaddr_to_ipaddr_port(const struct sockaddr *sockaddr, ip_addr_t *addr, uint16_t *port)
  386. {
  387. const struct sockaddr_in* sin = (const struct sockaddr_in*) (const void *) sockaddr;
  388. (*addr).u_addr.ip4.addr = sin->sin_addr.s_addr;
  389. *port = (uint16_t) HTONS_PORT(sin->sin_port);
  390. return 0;
  391. }
  392. /* ipaddr structure change to IP address */
  393. static int ipaddr_to_ipstr(const struct sockaddr *sockaddr, char *ipstr)
  394. {
  395. struct sockaddr_in *sin = (struct sockaddr_in *) sockaddr;
  396. /* change network ip_addr to ip string */
  397. rt_snprintf(ipstr, 16, "%u.%u.%u.%u", NIPQUAD(sin->sin_addr.s_addr));
  398. return 0;
  399. }
  400. static void at_recv_notice_cb(int socket, at_socket_evt_t event, const char *buff, size_t bfsz)
  401. {
  402. struct at_socket *sock;
  403. RT_ASSERT(buff);
  404. RT_ASSERT(bfsz);
  405. RT_ASSERT(event == AT_SOCKET_EVT_RECV);
  406. sock = at_get_socket(socket);
  407. if (sock == RT_NULL)
  408. return ;
  409. /* put receive buffer to receiver packet list */
  410. rt_mutex_take(sock->recv_lock, RT_WAITING_FOREVER);
  411. at_recvpkt_put(&(sock->recvpkt_list), buff, bfsz);
  412. rt_mutex_release(sock->recv_lock);
  413. rt_sem_release(sock->recv_notice);
  414. at_do_event_changes(sock, AT_EVENT_RECV, RT_TRUE);
  415. }
  416. static void at_closed_notice_cb(int socket, at_socket_evt_t event, const char *buff, size_t bfsz)
  417. {
  418. struct at_socket *sock;
  419. RT_ASSERT(event == AT_SOCKET_EVT_CLOSED);
  420. if ((sock = at_get_socket(socket)) == RT_NULL)
  421. return ;
  422. at_do_event_changes(sock, AT_EVENT_RECV, RT_TRUE);
  423. at_do_event_changes(sock, AT_EVENT_ERROR, RT_TRUE);
  424. sock->state = AT_SOCKET_CLOSED;
  425. rt_sem_release(sock->recv_notice);
  426. }
  427. int at_connect(int socket, const struct sockaddr *name, socklen_t namelen)
  428. {
  429. struct at_socket *sock;
  430. ip_addr_t remote_addr;
  431. uint16_t remote_port;
  432. char ipstr[16] = { 0 };
  433. int result = 0;
  434. if (at_dev_ops == RT_NULL)
  435. {
  436. return -1;
  437. }
  438. sock = at_get_socket(socket);
  439. if (sock == RT_NULL)
  440. {
  441. result = -1;
  442. goto __exit;
  443. }
  444. if (sock->state != AT_SOCKET_NONE)
  445. {
  446. LOG_E("Socket %d connect state is %d.", sock->socket, sock->state);
  447. result = -1;
  448. goto __exit;
  449. }
  450. /* get IP address and port by socketaddr structure */
  451. socketaddr_to_ipaddr_port(name, &remote_addr, &remote_port);
  452. ipaddr_to_ipstr(name, ipstr);
  453. if (at_dev_ops->at_connect(socket, ipstr, remote_port, sock->type, RT_TRUE) < 0)
  454. {
  455. LOG_E("AT socket(%d) connect failed!", socket);
  456. result = -1;
  457. goto __exit;
  458. }
  459. sock->state = AT_SOCKET_CONNECT;
  460. /* set AT socket receive data callback function */
  461. at_dev_ops->at_set_event_cb(AT_SOCKET_EVT_RECV, at_recv_notice_cb);
  462. at_dev_ops->at_set_event_cb(AT_SOCKET_EVT_CLOSED, at_closed_notice_cb);
  463. __exit:
  464. if (result < 0)
  465. {
  466. at_do_event_changes(sock, AT_EVENT_ERROR, RT_TRUE);
  467. }
  468. at_do_event_changes(sock, AT_EVENT_SEND, RT_TRUE);
  469. return result;
  470. }
  471. int at_recvfrom(int socket, void *mem, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
  472. {
  473. struct at_socket *sock;
  474. int timeout;
  475. int result = 0;
  476. size_t recv_len = 0;
  477. if (mem == RT_NULL || len == 0)
  478. {
  479. LOG_E("AT recvfrom input data or length error!");
  480. return -1;
  481. }
  482. if (at_dev_ops == RT_NULL)
  483. {
  484. return -1;
  485. }
  486. sock = at_get_socket(socket);
  487. if (sock == RT_NULL)
  488. {
  489. result = -1;
  490. goto __exit;
  491. }
  492. /* if the socket type is UDP, nead to connect socket first */
  493. if (from && sock->type == AT_SOCKET_UDP && sock->state == AT_SOCKET_NONE)
  494. {
  495. ip_addr_t remote_addr;
  496. uint16_t remote_port;
  497. char ipstr[16] = { 0 };
  498. socketaddr_to_ipaddr_port(from, &remote_addr, &remote_port);
  499. ipaddr_to_ipstr(from, ipstr);
  500. if (at_dev_ops->at_connect(socket, ipstr, remote_port, sock->type, RT_TRUE) < 0)
  501. {
  502. LOG_E("AT socket UDP connect failed!");
  503. result = -1;
  504. goto __exit;
  505. }
  506. sock->state = AT_SOCKET_CONNECT;
  507. /* set AT socket receive data callback function */
  508. at_dev_ops->at_set_event_cb(AT_SOCKET_EVT_RECV, at_recv_notice_cb);
  509. at_dev_ops->at_set_event_cb(AT_SOCKET_EVT_CLOSED, at_closed_notice_cb);
  510. }
  511. /* receive packet list last transmission of remaining data */
  512. rt_mutex_take(sock->recv_lock, RT_WAITING_FOREVER);
  513. if((recv_len = at_recvpkt_get(&(sock->recvpkt_list), (char *)mem, len)) > 0)
  514. {
  515. rt_mutex_release(sock->recv_lock);
  516. goto __exit;
  517. }
  518. rt_mutex_release(sock->recv_lock);
  519. /* socket passively closed, receive function return 0 */
  520. if (sock->state == AT_SOCKET_CLOSED)
  521. {
  522. result = 0;
  523. goto __exit;
  524. }
  525. else if (sock->state != AT_SOCKET_CONNECT)
  526. {
  527. LOG_E("received data error, current socket (%d) state (%d) is error.", socket, sock->state);
  528. result = -1;
  529. goto __exit;
  530. }
  531. /* non-blocking sockets receive data */
  532. if (flags & MSG_DONTWAIT)
  533. {
  534. goto __exit;
  535. }
  536. /* set AT socket receive timeout */
  537. if((timeout = sock->recv_timeout) == 0)
  538. {
  539. timeout = RT_WAITING_FOREVER;
  540. }
  541. else
  542. {
  543. timeout = rt_tick_from_millisecond(timeout);
  544. }
  545. while (1)
  546. {
  547. /* wait the receive semaphore */
  548. if (rt_sem_take(sock->recv_notice, timeout) < 0)
  549. {
  550. LOG_E("AT socket (%d) receive timeout (%d)!", socket, timeout);
  551. errno = EAGAIN;
  552. result = -1;
  553. goto __exit;
  554. }
  555. else
  556. {
  557. if (sock->state == AT_SOCKET_CONNECT)
  558. {
  559. /* get receive buffer to receiver ring buffer */
  560. rt_mutex_take(sock->recv_lock, RT_WAITING_FOREVER);
  561. recv_len = at_recvpkt_get(&(sock->recvpkt_list), (char *) mem, len);
  562. rt_mutex_release(sock->recv_lock);
  563. if (recv_len > 0)
  564. {
  565. break;
  566. }
  567. }
  568. else
  569. {
  570. LOG_D("received data exit, current socket (%d) is closed by remote.", socket);
  571. result = 0;
  572. goto __exit;
  573. }
  574. }
  575. }
  576. __exit:
  577. if (recv_len > 0)
  578. {
  579. result = recv_len;
  580. at_do_event_changes(sock, AT_EVENT_RECV, RT_FALSE);
  581. errno = 0;
  582. if (!rt_slist_isempty(&sock->recvpkt_list))
  583. {
  584. at_do_event_changes(sock, AT_EVENT_RECV, RT_TRUE);
  585. }
  586. else
  587. {
  588. at_do_event_clean(sock, AT_EVENT_RECV);
  589. }
  590. }
  591. else
  592. {
  593. at_do_event_changes(sock, AT_EVENT_ERROR, RT_TRUE);
  594. }
  595. return result;
  596. }
  597. int at_recv(int s, void *mem, size_t len, int flags)
  598. {
  599. return at_recvfrom(s, mem, len, flags, RT_NULL, RT_NULL);
  600. }
  601. int at_sendto(int socket, const void *data, size_t size, int flags, const struct sockaddr *to, socklen_t tolen)
  602. {
  603. struct at_socket *sock;
  604. int len, result = 0;
  605. if (at_dev_ops == RT_NULL)
  606. {
  607. result = -1;
  608. goto __exit;
  609. }
  610. if (data == RT_NULL || size == 0)
  611. {
  612. LOG_E("AT sendto input data or size error!");
  613. result = -1;
  614. goto __exit;
  615. }
  616. sock = at_get_socket(socket);
  617. if (sock == RT_NULL)
  618. {
  619. result = -1;
  620. goto __exit;
  621. }
  622. switch (sock->type)
  623. {
  624. case AT_SOCKET_TCP:
  625. if (sock->state != AT_SOCKET_CONNECT)
  626. {
  627. LOG_E("send data error, current socket (%d) state (%d) is error.", socket, sock->state);
  628. result = -1;
  629. goto __exit;
  630. }
  631. if ((len = at_dev_ops->at_send(sock->socket, (const char *) data, size, sock->type)) < 0)
  632. {
  633. result = -1;
  634. goto __exit;
  635. }
  636. break;
  637. case AT_SOCKET_UDP:
  638. if (to && sock->state == AT_SOCKET_NONE)
  639. {
  640. ip_addr_t remote_addr;
  641. uint16_t remote_port;
  642. char ipstr[16] = { 0 };
  643. socketaddr_to_ipaddr_port(to, &remote_addr, &remote_port);
  644. ipaddr_to_ipstr(to, ipstr);
  645. if (at_dev_ops->at_connect(socket, ipstr, remote_port, sock->type, RT_TRUE) < 0)
  646. {
  647. LOG_E("AT socket (%d) UDP connect failed!", socket);
  648. result = -1;
  649. goto __exit;
  650. }
  651. sock->state = AT_SOCKET_CONNECT;
  652. /* set AT socket receive data callback function */
  653. at_dev_ops->at_set_event_cb(AT_SOCKET_EVT_RECV, at_recv_notice_cb);
  654. at_dev_ops->at_set_event_cb(AT_SOCKET_EVT_CLOSED, at_closed_notice_cb);
  655. }
  656. if ((len = at_dev_ops->at_send(sock->socket, (char *) data, size, sock->type)) < 0)
  657. {
  658. result = -1;
  659. goto __exit;
  660. }
  661. break;
  662. default:
  663. LOG_E("Socket (%d) type %d is not support.", socket, sock->type);
  664. result = -1;
  665. goto __exit;
  666. }
  667. __exit:
  668. if (result < 0)
  669. {
  670. at_do_event_changes(sock, AT_EVENT_ERROR, RT_TRUE);
  671. }
  672. else
  673. {
  674. result = len;
  675. }
  676. return result;
  677. }
  678. int at_send(int socket, const void *data, size_t size, int flags)
  679. {
  680. return at_sendto(socket, data, size, flags, RT_NULL, 0);
  681. }
  682. int at_getsockopt(int socket, int level, int optname, void *optval, socklen_t *optlen)
  683. {
  684. struct at_socket *sock;
  685. int32_t timeout;
  686. if (optval == RT_NULL || optlen == RT_NULL)
  687. {
  688. LOG_E("AT getsocketopt input option value or option length error!");
  689. return -1;
  690. }
  691. sock = at_get_socket(socket);
  692. if (sock == RT_NULL)
  693. {
  694. return -1;
  695. }
  696. switch (level)
  697. {
  698. case SOL_SOCKET:
  699. switch (optname)
  700. {
  701. case SO_RCVTIMEO:
  702. timeout = sock->recv_timeout;
  703. ((struct timeval *)(optval))->tv_sec = (timeout) / 1000U;
  704. ((struct timeval *)(optval))->tv_usec = (timeout % 1000U) * 1000U;
  705. break;
  706. case SO_SNDTIMEO:
  707. timeout = sock->send_timeout;
  708. ((struct timeval *) optval)->tv_sec = timeout / 1000U;
  709. ((struct timeval *) optval)->tv_usec = (timeout % 1000U) * 1000U;
  710. break;
  711. default:
  712. LOG_E("AT socket (%d) not support option name : %d.", socket, optname);
  713. return -1;
  714. }
  715. break;
  716. default:
  717. LOG_E("AT socket (%d) not support option level : %d.", socket, level);
  718. return -1;
  719. }
  720. return 0;
  721. }
  722. int at_setsockopt(int socket, int level, int optname, const void *optval, socklen_t optlen)
  723. {
  724. struct at_socket *sock;
  725. if (optval == RT_NULL)
  726. {
  727. LOG_E("AT setsockopt input option value error!");
  728. return -1;
  729. }
  730. sock = at_get_socket(socket);
  731. if (sock == RT_NULL)
  732. {
  733. return -1;
  734. }
  735. switch (level)
  736. {
  737. case SOL_SOCKET:
  738. switch (optname)
  739. {
  740. case SO_RCVTIMEO:
  741. sock->recv_timeout = ((const struct timeval *) optval)->tv_sec * 1000
  742. + ((const struct timeval *) optval)->tv_usec / 1000;
  743. break;
  744. case SO_SNDTIMEO:
  745. sock->send_timeout = ((const struct timeval *) optval)->tv_sec * 1000
  746. + ((const struct timeval *) optval)->tv_usec / 1000;
  747. break;
  748. default:
  749. LOG_E("AT socket (%d) not support option name : %d.", socket, optname);
  750. return -1;
  751. }
  752. break;
  753. case IPPROTO_TCP:
  754. switch (optname)
  755. {
  756. case TCP_NODELAY:
  757. break;
  758. }
  759. break;
  760. default:
  761. LOG_E("AT socket (%d) not support option level : %d.", socket, level);
  762. return -1;
  763. }
  764. return 0;
  765. }
  766. static uint32_t ipstr_atol(const char* nptr)
  767. {
  768. uint32_t total = 0;
  769. char sign = '+';
  770. /* jump space */
  771. while (isspace(*nptr))
  772. {
  773. ++nptr;
  774. }
  775. if (*nptr == '-' || *nptr == '+')
  776. {
  777. sign = *nptr++;
  778. }
  779. while (isdigit(*nptr))
  780. {
  781. total = 10 * total + ((*nptr++) - '0');
  782. }
  783. return (sign == '-') ? -total : total;
  784. }
  785. /* IP address to unsigned int type */
  786. static uint32_t ipstr_to_u32(char *ipstr)
  787. {
  788. char ipBytes[4] = { 0 };
  789. uint32_t i;
  790. for (i = 0; i < 4; i++, ipstr++)
  791. {
  792. ipBytes[i] = (char) ipstr_atol(ipstr);
  793. if ((ipstr = strchr(ipstr, '.')) == RT_NULL)
  794. {
  795. break;
  796. }
  797. }
  798. return *(uint32_t *) ipBytes;
  799. }
  800. struct hostent *at_gethostbyname(const char *name)
  801. {
  802. ip_addr_t addr;
  803. char ipstr[16] = { 0 };
  804. /* buffer variables for at_gethostbyname() */
  805. static struct hostent s_hostent;
  806. static char *s_aliases;
  807. static ip_addr_t s_hostent_addr;
  808. static ip_addr_t *s_phostent_addr[2];
  809. static char s_hostname[DNS_MAX_NAME_LENGTH + 1];
  810. size_t idx = 0;
  811. if (name == RT_NULL)
  812. {
  813. LOG_E("AT gethostbyname input name error!");
  814. return RT_NULL;
  815. }
  816. if (at_dev_ops == RT_NULL)
  817. {
  818. return RT_NULL;
  819. }
  820. for (idx = 0; idx < strlen(name) && !isalpha(name[idx]); idx++);
  821. if (idx < strlen(name))
  822. {
  823. if (at_dev_ops->at_domain_resolve(name, ipstr) < 0)
  824. {
  825. LOG_E("AT domain (%s) resolve error!", name);
  826. return RT_NULL;
  827. }
  828. }
  829. else
  830. {
  831. strncpy(ipstr, name, strlen(name));
  832. }
  833. addr.u_addr.ip4.addr = ipstr_to_u32(ipstr);
  834. /* fill hostent structure */
  835. s_hostent_addr = addr;
  836. s_phostent_addr[0] = &s_hostent_addr;
  837. s_phostent_addr[1] = RT_NULL;
  838. strncpy(s_hostname, name, DNS_MAX_NAME_LENGTH);
  839. s_hostname[DNS_MAX_NAME_LENGTH] = 0;
  840. s_hostent.h_name = s_hostname;
  841. s_aliases = RT_NULL;
  842. s_hostent.h_aliases = &s_aliases;
  843. s_hostent.h_addrtype = AF_AT;
  844. s_hostent.h_length = sizeof(ip_addr_t);
  845. s_hostent.h_addr_list = (char**) &s_phostent_addr;
  846. return &s_hostent;
  847. }
  848. int at_getaddrinfo(const char *nodename, const char *servname,
  849. const struct addrinfo *hints, struct addrinfo **res)
  850. {
  851. int port_nr = 0;
  852. ip_addr_t addr;
  853. struct addrinfo *ai;
  854. struct sockaddr_storage *sa;
  855. size_t total_size = 0;
  856. size_t namelen = 0;
  857. int ai_family = 0;
  858. if (res == RT_NULL)
  859. {
  860. return EAI_FAIL;
  861. }
  862. *res = RT_NULL;
  863. if (at_dev_ops == RT_NULL)
  864. {
  865. return EAI_FAIL;
  866. }
  867. if ((nodename == RT_NULL) && (servname == RT_NULL))
  868. {
  869. return EAI_NONAME;
  870. }
  871. if (hints != RT_NULL)
  872. {
  873. ai_family = hints->ai_family;
  874. if (hints->ai_family != AF_AT && hints->ai_family != AF_INET && hints->ai_family != AF_UNSPEC)
  875. {
  876. return EAI_FAMILY;
  877. }
  878. }
  879. if (servname != RT_NULL)
  880. {
  881. /* service name specified: convert to port number */
  882. port_nr = atoi(servname);
  883. if ((port_nr <= 0) || (port_nr > 0xffff))
  884. {
  885. return EAI_SERVICE;
  886. }
  887. }
  888. if (nodename != RT_NULL)
  889. {
  890. /* service location specified, try to resolve */
  891. if ((hints != RT_NULL) && (hints->ai_flags & AI_NUMERICHOST))
  892. {
  893. /* no DNS lookup, just parse for an address string */
  894. if (!inet_aton(nodename, (ip4_addr_t * )&addr))
  895. {
  896. return EAI_NONAME;
  897. }
  898. if (ai_family == AF_AT || ai_family == AF_INET)
  899. {
  900. return EAI_NONAME;
  901. }
  902. }
  903. else
  904. {
  905. char ip_str[16] = { 0 };
  906. size_t idx = 0;
  907. for (idx = 0; idx < strlen(nodename) && !isalpha(nodename[idx]); idx++);
  908. if(idx < strlen(nodename))
  909. {
  910. if (at_dev_ops->at_domain_resolve((char *) nodename, ip_str) != 0)
  911. {
  912. return EAI_FAIL;
  913. }
  914. }
  915. else
  916. {
  917. strncpy(ip_str, nodename, strlen(nodename));
  918. }
  919. addr.type = IPADDR_TYPE_V4;
  920. if ((addr.u_addr.ip4.addr = ipstr_to_u32(ip_str)) == 0)
  921. {
  922. return EAI_FAIL;
  923. }
  924. }
  925. }
  926. else
  927. {
  928. /* to do service location specified, use loopback address */
  929. }
  930. total_size = sizeof(struct addrinfo) + sizeof(struct sockaddr_storage);
  931. if (nodename != RT_NULL)
  932. {
  933. namelen = strlen(nodename);
  934. if (namelen > DNS_MAX_NAME_LENGTH)
  935. {
  936. /* invalid name length */
  937. return EAI_FAIL;
  938. }
  939. RT_ASSERT(total_size + namelen + 1 > total_size);
  940. total_size += namelen + 1;
  941. }
  942. /* If this fails, please report to lwip-devel! :-) */
  943. RT_ASSERT(total_size <= sizeof(struct addrinfo) + sizeof(struct sockaddr_storage) + DNS_MAX_NAME_LENGTH + 1);
  944. ai = (struct addrinfo *) rt_malloc(total_size);
  945. if (ai == RT_NULL)
  946. {
  947. return EAI_MEMORY;
  948. }
  949. memset(ai, 0, total_size);
  950. /* cast through void* to get rid of alignment warnings */
  951. sa = (struct sockaddr_storage *) (void *) ((uint8_t *) ai + sizeof(struct addrinfo));
  952. struct sockaddr_in *sa4 = (struct sockaddr_in *) sa;
  953. /* set up sockaddr */
  954. sa4->sin_addr.s_addr = addr.u_addr.ip4.addr;
  955. sa4->sin_family = AF_INET;
  956. sa4->sin_len = sizeof(struct sockaddr_in);
  957. sa4->sin_port = htons((u16_t )port_nr);
  958. ai->ai_family = AF_INET;
  959. /* set up addrinfo */
  960. if (hints != RT_NULL)
  961. {
  962. /* copy socktype & protocol from hints if specified */
  963. ai->ai_socktype = hints->ai_socktype;
  964. ai->ai_protocol = hints->ai_protocol;
  965. }
  966. if (nodename != RT_NULL)
  967. {
  968. /* copy nodename to canonname if specified */
  969. ai->ai_canonname = ((char *) ai + sizeof(struct addrinfo) + sizeof(struct sockaddr_storage));
  970. memcpy(ai->ai_canonname, nodename, namelen);
  971. ai->ai_canonname[namelen] = 0;
  972. }
  973. ai->ai_addrlen = sizeof(struct sockaddr_storage);
  974. ai->ai_addr = (struct sockaddr *) sa;
  975. *res = ai;
  976. return 0;
  977. }
  978. void at_freeaddrinfo(struct addrinfo *ai)
  979. {
  980. struct addrinfo *next;
  981. while (ai != NULL)
  982. {
  983. next = ai->ai_next;
  984. rt_free(ai);
  985. ai = next;
  986. }
  987. }
  988. void at_socket_device_register(const struct at_device_ops *ops)
  989. {
  990. RT_ASSERT(ops);
  991. RT_ASSERT(ops->at_connect);
  992. RT_ASSERT(ops->at_closesocket);
  993. RT_ASSERT(ops->at_send);
  994. RT_ASSERT(ops->at_domain_resolve);
  995. RT_ASSERT(ops->at_set_event_cb);
  996. at_dev_ops = (struct at_device_ops *) ops;
  997. }
  998. #endif /* AT_USING_SOCKET */