sal_socket.c 22.2 KB
Newer Older
1
/*
2
 * Copyright (c) 2006-2018, RT-Thread Development Team
3
 *
4
 * SPDX-License-Identifier: Apache-2.0
5 6 7 8
 *
 * Change Logs:
 * Date           Author       Notes
 * 2018-05-23     ChenYong     First version
9
 * 2018-11-12     ChenYong     Add TLS support
10 11 12 13 14 15 16
 */

#include <rtthread.h>
#include <rthw.h>

#include <sal_socket.h>
#include <sal_netdb.h>
17 18 19
#ifdef SAL_USING_TLS
#include <sal_tls.h>
#endif
20 21
#include <sal.h>

22
#define DBG_SECTION_NAME               "SAL_SKT"
23
#define DBG_LEVEL                      DBG_INFO
24 25
#include <rtdbg.h>

26 27
#define SOCKET_TABLE_STEP_LEN          4

28 29 30 31 32 33 34
/* the socket table used to dynamic allocate sockets */
struct sal_socket_table
{
    uint32_t max_socket;
    struct sal_socket **sockets;
};

35 36 37 38 39
#ifdef SAL_USING_TLS
/* The global TLS protocol options */
static struct sal_proto_tls *proto_tls;
#endif

40
/* The global array of available protocol families */
41
static struct sal_proto_family proto_families[SAL_PROTO_FAMILIES_NUM];
42 43 44 45 46
/* The global socket table */
static struct sal_socket_table socket_table;
static struct rt_mutex sal_core_lock;
static rt_bool_t init_ok = RT_FALSE;

47 48 49 50 51 52 53 54 55 56 57 58 59 60
#define IS_SOCKET_PROTO_TLS(sock)                (((sock)->protocol == PROTOCOL_TLS) || \
                                                 ((sock)->protocol == PROTOCOL_DTLS))
#define SAL_SOCKOPS_PROTO_TLS_VALID(sock, name)  (proto_tls && (proto_tls->ops->name) && IS_SOCKET_PROTO_TLS(sock))

#define SAL_SOCKOPT_PROTO_TLS_EXEC(sock, name, optval, optlen)                    \
do                                                                                \
{                                                                                 \
    if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, name))                                  \
    {                                                                             \
        return proto_tls->ops->name((sock)->user_data_tls, (optval), (optlen));   \
    }                                                                             \
}while(0)                                                                         \


61
/**
62
 * SAL (Socket Abstraction Layer) initialize.
63
 *
64 65
 * @return result  0: initialize success
 *                -1: initialize failed        
66 67 68
 */
int sal_init(void)
{
69 70
    int cn;
    
71
    if (init_ok)
72 73 74 75 76
    {
        LOG_D("Socket Abstraction Layer is already initialized.");
        return 0;
    }

77 78 79 80 81 82 83 84 85 86
    /* init sal socket table */
    cn = SOCKET_TABLE_STEP_LEN < SAL_SOCKETS_NUM ? SOCKET_TABLE_STEP_LEN : SAL_SOCKETS_NUM;
    socket_table.max_socket = cn;
    socket_table.sockets = rt_calloc(1, cn * sizeof(struct sal_socket *));
    if (socket_table.sockets == RT_NULL)
    {
        LOG_E("No memory for socket table.\n");
        return -1;
    }
    
87 88 89 90 91 92 93 94 95 96
    /* create sal socket lock */
    rt_mutex_init(&sal_core_lock, "sal_lock", RT_IPC_FLAG_FIFO);

    LOG_I("Socket Abstraction Layer initialize success.");
    init_ok = RT_TRUE;

    return 0;
}
INIT_COMPONENT_EXPORT(sal_init);

97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113
/**
 * This function will register TLS protocol to the global TLS protocol.
 *
 * @param pt TLS protocol object
 *
 * @return 0: TLS protocol object register success
 */
#ifdef SAL_USING_TLS
int sal_proto_tls_register(const struct sal_proto_tls *pt)
{
    RT_ASSERT(pt);
    proto_tls = (struct sal_proto_tls *) pt;

    return 0;
}
#endif

114
/**
115
 * This function will register protocol family to the global array of protocol families.
116
 *
117
 * @param pf protocol family object
118
 *
119 120
 * @return  0: protocol family object register success
 *         -1: the global array of available protocol families is full
121
 */
122
int sal_proto_family_register(const struct sal_proto_family *pf)
123 124 125 126 127 128 129
{
    rt_base_t level;
    int idx;

    /* disable interrupt */
    level = rt_hw_interrupt_disable();

130 131 132
    /* check protocol family is already registered */
    for(idx = 0; idx < SAL_PROTO_FAMILIES_NUM; idx++)
    {
133
        if (proto_families[idx].family == pf->family && proto_families[idx].create)
134 135 136
        {
            /* enable interrupt */
            rt_hw_interrupt_enable(level);
137
            LOG_E("%s protocol family is already registered!", pf->family);
138 139 140 141
            return -1;
        }
    }

142 143 144 145
    /* find an empty protocol family entry */
    for(idx = 0; idx < SAL_PROTO_FAMILIES_NUM && proto_families[idx].create; idx++);

    /* can't find an empty protocol family entry */
146
    if (idx == SAL_PROTO_FAMILIES_NUM)
147 148 149 150 151 152 153 154 155 156
    {
        /* enable interrupt */
        rt_hw_interrupt_enable(level);
        return -1;
    }

    proto_families[idx].family = pf->family;
    proto_families[idx].sec_family = pf->sec_family;
    proto_families[idx].create = pf->create;

157 158 159 160 161
    proto_families[idx].ops = pf->ops;
    proto_families[idx].ops->gethostbyname = pf->ops->gethostbyname;
    proto_families[idx].ops->gethostbyname_r = pf->ops->gethostbyname_r;
    proto_families[idx].ops->freeaddrinfo = pf->ops->freeaddrinfo;
    proto_families[idx].ops->getaddrinfo = pf->ops->getaddrinfo;
162 163 164 165 166 167 168 169

    /* enable interrupt */
    rt_hw_interrupt_enable(level);

    return 0;
}

/**
170 171 172 173 174 175 176
 * This function removes a previously registered protocol family object.
 *
 * @param pf protocol family object
 *
 * @return >=0 : unregister protocol family index
 *          -1 : unregister failed
 */
177
int sal_proto_family_unregister(int family)
178 179 180
{
    int idx = 0;

181
    RT_ASSERT(family > 0 && family < AF_MAX);
182 183 184

    for(idx = 0; idx < SAL_PROTO_FAMILIES_NUM; idx++)
    {
185
        if (proto_families[idx].family == family && proto_families[idx].create)
186
        {
187
            rt_memset(&proto_families[idx], 0x00, sizeof(struct sal_proto_family));
188 189 190 191 192 193 194 195 196

            return idx;
        }
    }

    return -1;
}

/**
197
 * This function will judge whether protocol family is registered
198
 *
199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224
 * @param family protocol family number
 *
 * @return 1: protocol family is registered
 *         0: protocol family is not registered
 */
rt_bool_t sal_proto_family_is_registered(int family)
{
    int idx = 0;

    RT_ASSERT(family > 0 && family < AF_MAX);

    for (idx = 0; idx < SAL_PROTO_FAMILIES_NUM; idx++)
    {
        if (proto_families[idx].family == family && proto_families[idx].create)
        {
            return RT_TRUE;
        }
    }

    return RT_FALSE;
}

/**
 * This function will get protocol family object by family number.
 *
 * @param family protocol family number
225 226 227
 *
 * @return protocol family object
 */
228
struct sal_proto_family *sal_proto_family_find(int family)
229 230 231
{
    int idx = 0;

232
    RT_ASSERT(family > 0 && family < AF_MAX);
233 234 235

    for (idx = 0; idx < SAL_PROTO_FAMILIES_NUM; idx++)
    {
236
        if (proto_families[idx].family == family && proto_families[idx].create)
237 238 239 240 241 242 243 244 245 246
        {
            return &proto_families[idx];
        }
    }

    return RT_NULL;
}

/**
 * This function will get sal socket object by sal socket descriptor.
247 248 249
 *
 * @param socket sal socket index
 *
250
 * @return sal socket object of the current sal socket index
251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271
 */
struct sal_socket *sal_get_socket(int socket)
{
    struct sal_socket_table *st = &socket_table;

    if (socket < 0 || socket >= (int) st->max_socket)
    {
        return RT_NULL;
    }

    socket = socket - SAL_SOCKET_OFFSET;
    /* check socket structure valid or not */
    if (st->sockets[socket]->magic != SAL_SOCKET_MAGIC)
    {
        return RT_NULL;
    }

    return st->sockets[socket];
}

/**
272
 * This function will lock sal socket.
273 274 275 276 277 278 279 280 281 282 283 284 285 286 287
 *
 * @note please don't invoke it on ISR.
 */
static void sal_lock(void)
{
    rt_err_t result;

    result = rt_mutex_take(&sal_core_lock, RT_WAITING_FOREVER);
    if (result != RT_EOK)
    {
        RT_ASSERT(0);
    }
}

/**
288
 * This function will lock sal socket.
289 290 291 292 293 294 295 296 297
 *
 * @note please don't invoke it on ISR.
 */
static void sal_unlock(void)
{
    rt_mutex_release(&sal_core_lock);
}

/**
298
 * This function will get protocol family structure by family type
299 300 301 302 303
 *
 * @param family  protocol family
 *
 * @return protocol family structure address
 */
304
static struct sal_proto_family *get_proto_family(int family)
305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327
{
    int idx;

    for (idx = 0; idx < SAL_PROTO_FAMILIES_NUM; idx++)
    {
        if (proto_families[idx].family == family && proto_families[idx].create)
        {
            return &proto_families[idx];
        }
    }
    /* compare the secondary protocol families when primary protocol families find failed */
    for (idx = 0; idx < SAL_PROTO_FAMILIES_NUM; idx++)
    {
        if (proto_families[idx].sec_family == family && proto_families[idx].create)
        {
            return &proto_families[idx];
        }
    }

    return RT_NULL;
}

/**
328
 * This function will initialize sal socket object and set socket options
329 330 331 332
 *
 * @param family    protocol family
 * @param type      socket type
 * @param protocol  transfer Protocol
333
 * @param res       sal socket object address
334 335 336 337
 *
 * @return  0 : socket initialize success
 *         -1 : input the wrong family
 *         -2 : input the wrong socket type
338
 *         -3 : get protocol family object failed
339 340 341 342 343
 *         -4 : set socket options failed
 */
static int socket_init(int family, int type, int protocol, struct sal_socket **res)
{
    struct sal_socket *sock;
344
    struct sal_proto_family *pf;
345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360

    if (family < 0 || family > AF_MAX)
    {
        return -1;
    }

    if (type < 0 || type > SOCK_MAX)
    {
        return -2;
    }

    sock = *res;
    sock->domain = family;
    sock->type = type;
    sock->protocol = protocol;

361
    /* get socket protocol family object */
362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394
    if ((pf = get_proto_family(family)) == RT_NULL)
    {
        return -3;
    }

    /* registered the current socket options */
    if (pf->create(sock, type, protocol) != 0)
    {
        return -4;
    }

    return 0;
}

static int socket_alloc(struct sal_socket_table *st, int f_socket)
{
    int idx;

    /* find an empty socket entry */
    for (idx = f_socket; idx < (int) st->max_socket; idx++)
    {
        if (st->sockets[idx] == RT_NULL)
            break;
        if (st->sockets[idx]->ops == RT_NULL)
            break;
    }

    /* allocate a larger sockte container */
    if (idx == (int) st->max_socket &&  st->max_socket < SAL_SOCKETS_NUM)
    {
        int cnt, index;
        struct sal_socket **sockets;

395 396
        /* increase the number of socket with 4 step length */
        cnt = st->max_socket + SOCKET_TABLE_STEP_LEN;
397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415
        cnt = cnt > SAL_SOCKETS_NUM ? SAL_SOCKETS_NUM : cnt;

        sockets = rt_realloc(st->sockets, cnt * sizeof(struct sal_socket *));
        if (sockets == RT_NULL)
            goto __result; /* return st->max_socket */

        /* clean the new allocated fds */
        for (index = st->max_socket; index < cnt; index++)
        {
            sockets[index] = RT_NULL;
        }

        st->sockets = sockets;
        st->max_socket = cnt;
    }

    /* allocate  'struct sal_socket' */
    if (idx < (int) st->max_socket && st->sockets[idx] == RT_NULL)
    {
416
        st->sockets[idx] = rt_calloc(1, sizeof(struct sal_socket));
417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448
        if (st->sockets[idx] == RT_NULL)
        {
            idx = st->max_socket;
        }
    }

__result:
    return idx;

}

static int socket_new(void)
{
    struct sal_socket *sock;
    struct sal_socket_table *st = &socket_table;
    int idx;

    sal_lock();

    /* find an empty sal socket entry */
    idx = socket_alloc(st, 0);

    /* can't find an empty sal socket entry */
    if (idx == (int) st->max_socket)
    {
        idx = -(1 + SAL_SOCKET_OFFSET);
        goto __result;
    }

    sock = st->sockets[idx];
    sock->socket = idx + SAL_SOCKET_OFFSET;
    sock->magic = SAL_SOCKET_MAGIC;
449 450 451 452 453
    sock->ops = RT_NULL;
    sock->user_data = RT_NULL;
#ifdef SAL_USING_TLS
    sock->user_data_tls = RT_NULL;
#endif
454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479

__result:
    sal_unlock();
    return idx + SAL_SOCKET_OFFSET;
}

int sal_accept(int socket, struct sockaddr *addr, socklen_t *addrlen)
{
    int new_socket;
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->accept == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    new_socket = sock->ops->accept((int) sock->user_data, addr, addrlen);
    if (new_socket != -1)
    {
        int retval;
480
        int new_sal_socket;
481 482 483
        struct sal_socket *new_sock;

        /* allocate a new socket structure and registered socket options */
484 485
        new_sal_socket = socket_new();
        if (new_sal_socket < 0)
486
        {
487
            sock->ops->closesocket(new_socket);
488 489
            return -1;
        }
490
        new_sock = sal_get_socket(new_sal_socket);
491 492 493 494

        retval = socket_init(sock->domain, sock->type, sock->protocol, &new_sock);
        if (retval < 0)
        {
495 496
            sock->ops->closesocket(new_socket);
            rt_memset(new_sock, 0x00, sizeof(struct sal_socket));
497 498 499 500 501 502 503
            LOG_E("New socket registered failed, return error %d.", retval);
            return -1;
        }

        /* socket struct user_data used to store the acquired new socket */
        new_sock->user_data = (void *) new_socket;

504
        return new_sal_socket;
505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544
    }

    return -1;
}

int sal_bind(int socket, const struct sockaddr *name, socklen_t namelen)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->bind == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    return sock->ops->bind((int) sock->user_data, name, namelen);
}

int sal_shutdown(int socket, int how)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->shutdown == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    if (sock->ops->shutdown((int) sock->user_data, how) == 0)
    {
545 546 547 548 549 550 551 552 553
#ifdef SAL_USING_TLS
        if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, closesocket))
        {
            if (proto_tls->ops->closesocket(sock->user_data_tls) < 0)
            {
                return -1;
            }
        }
#endif
554
        rt_free(sock);
H
HubretXie 已提交
555
        socket_table.sockets[socket] = RT_NULL;
556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630
        return 0;
    }

    return -1;
}

int sal_getpeername(int socket, struct sockaddr *name, socklen_t *namelen)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->getpeername == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    return sock->ops->getpeername((int) sock->user_data, name, namelen);
}

int sal_getsockname(int socket, struct sockaddr *name, socklen_t *namelen)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->getsockname == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    return sock->ops->getsockname((int) sock->user_data, name, namelen);
}

int sal_getsockopt(int socket, int level, int optname, void *optval, socklen_t *optlen)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->getsockopt == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    return sock->ops->getsockopt((int) sock->user_data, level, optname, optval, optlen);
}

int sal_setsockopt(int socket, int level, int optname, const void *optval, socklen_t optlen)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->setsockopt == RT_NULL)
    {
        return -RT_ENOSYS;
    }

631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662
#ifdef SAL_USING_TLS
    if (level == SOL_TLS)
    {
        switch (optname)
        {
        case TLS_CRET_LIST:
            SAL_SOCKOPT_PROTO_TLS_EXEC(sock, set_cret_list, optval, optlen);
            break;

        case TLS_CIPHERSUITE_LIST:
            SAL_SOCKOPT_PROTO_TLS_EXEC(sock, set_ciphersurite, optval, optlen);
            break;

        case TLS_PEER_VERIFY:
            SAL_SOCKOPT_PROTO_TLS_EXEC(sock, set_peer_verify, optval, optlen);
            break;

        case TLS_DTLS_ROLE:
            SAL_SOCKOPT_PROTO_TLS_EXEC(sock, set_dtls_role, optval, optlen);
            break;

        default:
            return -1;
        }

        return 0;
    }
    else
    {
        return sock->ops->setsockopt((int) sock->user_data, level, optname, optval, optlen);
    }
#else
663
    return sock->ops->setsockopt((int) sock->user_data, level, optname, optval, optlen);
664
#endif /* SAL_USING_TLS */
665 666 667 668 669
}

int sal_connect(int socket, const struct sockaddr *name, socklen_t namelen)
{
    struct sal_socket *sock;
670
    int ret;
671 672 673 674 675 676 677 678 679 680 681 682

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->connect == RT_NULL)
    {
        return -RT_ENOSYS;
    }

683 684 685 686 687 688 689 690 691 692 693 694 695 696
    ret = sock->ops->connect((int) sock->user_data, name, namelen);
#ifdef SAL_USING_TLS
    if (ret >= 0 && SAL_SOCKOPS_PROTO_TLS_VALID(sock, connect))
    {
        if (proto_tls->ops->connect(sock->user_data_tls) < 0)
        {
            return -1;
        }
        
        return ret;
    }
#endif

    return ret;
697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732
}

int sal_listen(int socket, int backlog)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->listen == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    return sock->ops->listen((int) sock->user_data, backlog);
}

int sal_recvfrom(int socket, void *mem, size_t len, int flags,
             struct sockaddr *from, socklen_t *fromlen)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->recvfrom == RT_NULL)
    {
        return -RT_ENOSYS;
    }

733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748
#ifdef SAL_USING_TLS
    if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, recv))
    {
        int ret;
        
        if ((ret = proto_tls->ops->recv(sock->user_data_tls, mem, len)) < 0)
        {
            return -1;
        }   
        return ret;
    }
    else
    {
        return sock->ops->recvfrom((int) sock->user_data, mem, len, flags, from, fromlen);
    }
#else
749
    return sock->ops->recvfrom((int) sock->user_data, mem, len, flags, from, fromlen);
750
#endif
751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768
}

int sal_sendto(int socket, const void *dataptr, size_t size, int flags,
           const struct sockaddr *to, socklen_t tolen)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->sendto == RT_NULL)
    {
        return -RT_ENOSYS;
    }

769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784
#ifdef SAL_USING_TLS
    if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, send))
    {
        int ret;
        
        if ((ret = proto_tls->ops->send(sock->user_data_tls, dataptr, size)) < 0)
        {
            return -1;
        }      
        return ret;
    }
    else
    {
        return sock->ops->sendto((int) sock->user_data, dataptr, size, flags, to, tolen);
    }
#else
785
    return sock->ops->sendto((int) sock->user_data, dataptr, size, flags, to, tolen);
786
#endif
787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817
}

int sal_socket(int domain, int type, int protocol)
{
    int retval;
    int socket, proto_socket;
    struct sal_socket *sock;

    /* allocate a new socket and registered socket options */
    socket = socket_new();
    if (socket < 0)
    {
        return -1;
    }
    sock = sal_get_socket(socket);

    retval = socket_init(domain, type, protocol, &sock);
    if (retval < 0)
    {
        LOG_E("SAL socket protocol family input failed, return error %d.", retval);
        return -1;
    }

    if (sock->ops->socket == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    proto_socket = sock->ops->socket(domain, type, protocol);
    if (proto_socket >= 0)
    {
818 819 820 821 822 823 824 825 826 827
#ifdef SAL_USING_TLS
        if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, socket))
        {
            sock->user_data_tls = proto_tls->ops->socket(proto_socket);
            if (sock->user_data_tls == RT_NULL)
            {
                return -1;
            }
        }
#endif
828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851
        sock->user_data = (void *) proto_socket;
        return sock->socket;
    }

    return -1;
}

int sal_closesocket(int socket)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->closesocket == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    if (sock->ops->closesocket((int) sock->user_data) == 0)
    {
852 853 854 855 856 857 858 859 860
#ifdef SAL_USING_TLS
        if (SAL_SOCKOPS_PROTO_TLS_VALID(sock, closesocket))
        {
            if (proto_tls->ops->closesocket(sock->user_data_tls) < 0)
            {
                return -1;
            }
        }
#endif
H
HubretXie 已提交
861 862
        rt_free(sock);        
        socket_table.sockets[socket] = RT_NULL;
863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886
        return 0;
    }

    return -1;
}

int sal_ioctlsocket(int socket, long cmd, void *arg)
{
    struct sal_socket *sock;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->ioctlsocket == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    return sock->ops->ioctlsocket((int) sock->user_data, cmd, arg);
}

887
#ifdef SAL_USING_POSIX
888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905
int sal_poll(struct dfs_fd *file, struct rt_pollreq *req)
{
    struct sal_socket *sock;
    int socket = (int) file->data;

    sock = sal_get_socket(socket);
    if (!sock)
    {
        return -1;
    }

    if (sock->ops->poll == RT_NULL)
    {
        return -RT_ENOSYS;
    }

    return sock->ops->poll(file, req);
}
906
#endif
907 908 909 910

struct hostent *sal_gethostbyname(const char *name)
{
    int i;
911
    struct hostent *hst;
912 913 914

    for (i = 0; i < SAL_PROTO_FAMILIES_NUM; ++i)
    {
915
        if (proto_families[i].ops && proto_families[i].ops->gethostbyname)
916
        {
917
            hst = proto_families[i].ops->gethostbyname(name);
918 919 920 921
            if (hst != RT_NULL)
            {
                return hst;
            }
922 923 924 925 926 927 928 929 930
        }
    }

    return RT_NULL;
}

int sal_gethostbyname_r(const char *name, struct hostent *ret, char *buf,
                size_t buflen, struct hostent **result, int *h_errnop)
{
931
    int i, res;
932 933 934

    for (i = 0; i < SAL_PROTO_FAMILIES_NUM; ++i)
    {
935
        if (proto_families[i].ops && proto_families[i].ops->gethostbyname_r)
936
        {
937
            res = proto_families[i].ops->gethostbyname_r(name, ret, buf, buflen, result, h_errnop);
938 939 940 941
            if (res == 0)
            {
                return res;
            }
942 943 944 945 946 947 948 949 950 951 952
        }
    }

    return -1;
}

int sal_getaddrinfo(const char *nodename,
       const char *servname,
       const struct addrinfo *hints,
       struct addrinfo **res)
{
953
    int i, ret;
954 955 956

    for (i = 0; i < SAL_PROTO_FAMILIES_NUM; ++i)
    {
957
        if (proto_families[i].ops && proto_families[i].ops->getaddrinfo)
958
        {
959
            ret = proto_families[i].ops->getaddrinfo(nodename, servname, hints, res);
960 961 962 963
            if (ret == 0)
            {
                return ret;
            }
964 965 966 967 968
        }
    }

    return -1;
}
969 970 971 972 973 974 975 976 977 978 979 980 981 982

void sal_freeaddrinfo(struct addrinfo *ai)
{
    int i;

    for (i = 0; i < SAL_PROTO_FAMILIES_NUM; ++i)
    {
        if (proto_families[i].ops && proto_families[i].ops->freeaddrinfo)
        {
            proto_families[i].ops->freeaddrinfo(ai);
            return;
        }
    }
}