2017-07-13 17:27:56 +02:00
|
|
|
/****************************************************************************
|
2017-08-29 17:25:22 +02:00
|
|
|
* net/tcp/tcp_connect.c
|
2017-07-13 17:27:56 +02:00
|
|
|
*
|
2020-05-17 16:47:40 +02:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2017-07-13 17:27:56 +02:00
|
|
|
*
|
2020-05-17 16:47:40 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2017-07-13 17:27:56 +02:00
|
|
|
*
|
2020-05-17 16:47:40 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2017-07-13 17:27:56 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <arch/irq.h>
|
|
|
|
|
|
|
|
#include <nuttx/semaphore.h>
|
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
#include <nuttx/net/netdev.h>
|
|
|
|
#include <nuttx/net/udp.h>
|
|
|
|
#include <nuttx/net/tcp.h>
|
|
|
|
|
|
|
|
#include "devif/devif.h"
|
2020-12-15 13:30:29 +01:00
|
|
|
#include "netdev/netdev.h"
|
2017-07-13 17:27:56 +02:00
|
|
|
#include "socket/socket.h"
|
2022-10-11 05:57:38 +02:00
|
|
|
#include "inet/inet.h"
|
2017-08-29 17:25:22 +02:00
|
|
|
#include "tcp/tcp.h"
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2017-08-29 17:25:22 +02:00
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
2017-07-13 17:27:56 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
struct tcp_connect_s
|
|
|
|
{
|
|
|
|
FAR struct tcp_conn_s *tc_conn; /* Reference to TCP connection structure */
|
|
|
|
FAR struct devif_callback_s *tc_cb; /* Reference to callback instance */
|
|
|
|
sem_t tc_sem; /* Semaphore signals recv completion */
|
|
|
|
int tc_result; /* OK on success, otherwise a negated errno. */
|
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Function Prototypes
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static inline int psock_setup_callbacks(FAR struct socket *psock,
|
|
|
|
FAR struct tcp_connect_s *pstate);
|
|
|
|
static void psock_teardown_callbacks(FAR struct tcp_connect_s *pstate,
|
|
|
|
int status);
|
2017-08-29 22:08:04 +02:00
|
|
|
static uint16_t psock_connect_eventhandler(FAR struct net_driver_s *dev,
|
|
|
|
FAR void *pvpriv, uint16_t flags);
|
2017-07-13 17:27:56 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
2017-08-29 17:25:22 +02:00
|
|
|
|
2018-10-30 01:00:30 +01:00
|
|
|
/****************************************************************************
|
2017-07-13 17:27:56 +02:00
|
|
|
* Name: psock_setup_callbacks
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static inline int psock_setup_callbacks(FAR struct socket *psock,
|
|
|
|
FAR struct tcp_connect_s *pstate)
|
|
|
|
{
|
|
|
|
FAR struct tcp_conn_s *conn = psock->s_conn;
|
|
|
|
int ret = -EBUSY;
|
|
|
|
|
|
|
|
/* Initialize the TCP state structure */
|
|
|
|
|
2020-01-02 17:49:34 +01:00
|
|
|
nxsem_init(&pstate->tc_sem, 0, 0); /* Doesn't really fail */
|
2017-07-13 17:27:56 +02:00
|
|
|
|
|
|
|
pstate->tc_conn = conn;
|
|
|
|
pstate->tc_result = -EAGAIN;
|
|
|
|
|
|
|
|
/* Set up the callbacks in the connection */
|
|
|
|
|
|
|
|
pstate->tc_cb = tcp_callback_alloc(conn);
|
|
|
|
if (pstate->tc_cb)
|
|
|
|
{
|
2017-08-29 22:08:04 +02:00
|
|
|
/* Set up the connection event handler */
|
2017-07-13 17:27:56 +02:00
|
|
|
|
|
|
|
pstate->tc_cb->flags = (TCP_NEWDATA | TCP_CLOSE | TCP_ABORT |
|
|
|
|
TCP_TIMEDOUT | TCP_CONNECTED | NETDEV_DOWN);
|
|
|
|
pstate->tc_cb->priv = (FAR void *)pstate;
|
2017-08-29 22:08:04 +02:00
|
|
|
pstate->tc_cb->event = psock_connect_eventhandler;
|
2017-07-13 17:27:56 +02:00
|
|
|
ret = OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: psock_teardown_callbacks
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static void psock_teardown_callbacks(FAR struct tcp_connect_s *pstate,
|
|
|
|
int status)
|
|
|
|
{
|
|
|
|
FAR struct tcp_conn_s *conn = pstate->tc_conn;
|
|
|
|
|
2017-08-29 22:08:04 +02:00
|
|
|
/* Make sure that no further events are processed */
|
2017-07-13 17:27:56 +02:00
|
|
|
|
|
|
|
tcp_callback_free(conn, pstate->tc_cb);
|
|
|
|
pstate->tc_cb = NULL;
|
|
|
|
|
|
|
|
/* If we successfully connected, we will continue to monitor the connection
|
|
|
|
* state via callbacks.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (status < 0)
|
|
|
|
{
|
|
|
|
/* Failed to connect. Stop the connection event monitor */
|
|
|
|
|
2017-08-29 20:27:58 +02:00
|
|
|
tcp_stop_monitor(conn, TCP_CLOSE);
|
2017-07-13 17:27:56 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-08-29 22:08:04 +02:00
|
|
|
* Name: psock_connect_eventhandler
|
2017-07-13 17:27:56 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2017-08-29 22:08:04 +02:00
|
|
|
* This function is called to perform the actual connection operation via
|
|
|
|
* by the lower, device interfacing layer.
|
2017-07-13 17:27:56 +02:00
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-08-29 22:08:04 +02:00
|
|
|
* dev The structure of the network driver that reported the event
|
2022-08-25 15:17:57 +02:00
|
|
|
* pvpriv An instance of struct tcp_connect_s cast to void*
|
2017-07-13 17:27:56 +02:00
|
|
|
* flags Set of events describing why the callback was invoked
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* The new flags setting
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 22:08:04 +02:00
|
|
|
* The network is locked.
|
2017-07-13 17:27:56 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2017-08-29 22:08:04 +02:00
|
|
|
static uint16_t psock_connect_eventhandler(FAR struct net_driver_s *dev,
|
|
|
|
FAR void *pvpriv, uint16_t flags)
|
2017-07-13 17:27:56 +02:00
|
|
|
{
|
2022-08-25 15:17:57 +02:00
|
|
|
struct tcp_connect_s *pstate = pvpriv;
|
2022-02-08 17:08:15 +01:00
|
|
|
FAR struct tcp_conn_s *conn = pstate->tc_conn;
|
2017-07-13 17:27:56 +02:00
|
|
|
|
|
|
|
ninfo("flags: %04x\n", flags);
|
|
|
|
|
|
|
|
/* 'priv' might be null in some race conditions (?) */
|
|
|
|
|
|
|
|
if (pstate)
|
|
|
|
{
|
|
|
|
/* The following errors should be detected here (someday)
|
|
|
|
*
|
|
|
|
* ECONNREFUSED
|
|
|
|
* No one listening on the remote address.
|
|
|
|
* ENETUNREACH
|
|
|
|
* Network is unreachable.
|
|
|
|
* ETIMEDOUT
|
2020-05-17 16:47:40 +02:00
|
|
|
* Timeout while attempting connection. The server may be too
|
|
|
|
* busy to accept new connections.
|
2017-07-13 17:27:56 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
/* TCP_CLOSE: The remote host has closed the connection
|
|
|
|
* TCP_ABORT: The remote host has aborted the connection
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ((flags & (TCP_CLOSE | TCP_ABORT)) != 0)
|
|
|
|
{
|
|
|
|
/* Indicate that remote host refused the connection */
|
|
|
|
|
|
|
|
pstate->tc_result = -ECONNREFUSED;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* TCP_TIMEDOUT: Connection aborted due to too many retransmissions. */
|
|
|
|
|
|
|
|
else if ((flags & TCP_TIMEDOUT) != 0)
|
|
|
|
{
|
|
|
|
/* Indicate that the connection timedout?) */
|
|
|
|
|
|
|
|
pstate->tc_result = -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
else if ((flags & NETDEV_DOWN) != 0)
|
|
|
|
{
|
|
|
|
/* The network device went down. Indicate that the remote host
|
|
|
|
* is unreachable.
|
|
|
|
*/
|
|
|
|
|
|
|
|
pstate->tc_result = -ENETUNREACH;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* TCP_CONNECTED: The socket is successfully connected */
|
|
|
|
|
|
|
|
else if ((flags & TCP_CONNECTED) != 0)
|
|
|
|
{
|
|
|
|
/* Mark the connection bound and connected. NOTE this is
|
|
|
|
* is done here (vs. later) in order to avoid any race condition
|
|
|
|
* in the socket state. It is known to connected here and now,
|
|
|
|
* but not necessarily at any time later.
|
|
|
|
*/
|
|
|
|
|
2022-02-08 17:08:15 +01:00
|
|
|
conn->sconn.s_flags |= (_SF_BOUND | _SF_CONNECTED);
|
2017-07-13 17:27:56 +02:00
|
|
|
|
|
|
|
/* Indicate that the socket is no longer connected */
|
|
|
|
|
|
|
|
pstate->tc_result = OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Otherwise, it is not an event of importance to us at the moment */
|
|
|
|
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Drop data received in this state */
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
|
|
|
return flags & ~TCP_NEWDATA;
|
|
|
|
}
|
|
|
|
|
|
|
|
ninfo("Resuming: %d\n", pstate->tc_result);
|
|
|
|
|
|
|
|
/* Stop further callbacks */
|
|
|
|
|
|
|
|
psock_teardown_callbacks(pstate, pstate->tc_result);
|
|
|
|
|
|
|
|
/* We now have to filter all outgoing transfers so that they use only
|
|
|
|
* the MSS of this device.
|
|
|
|
*/
|
|
|
|
|
2018-07-05 18:54:45 +02:00
|
|
|
DEBUGASSERT(pstate->tc_conn != NULL);
|
2017-07-13 17:27:56 +02:00
|
|
|
DEBUGASSERT(pstate->tc_conn->dev == NULL ||
|
|
|
|
pstate->tc_conn->dev == dev);
|
|
|
|
pstate->tc_conn->dev = dev;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&pstate->tc_sem);
|
2017-07-13 17:27:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
2017-08-29 17:25:22 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
2017-07-13 17:27:56 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: psock_tcp_connect
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform a TCP connection
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2020-05-17 16:47:40 +02:00
|
|
|
* psock - A reference to the socket structure of the socket to be
|
|
|
|
* connected
|
2017-07-13 17:27:56 +02:00
|
|
|
* addr - The address of the remote server to connect to
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 22:08:04 +02:00
|
|
|
* The network is locked
|
2017-07-13 17:27:56 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2017-08-29 17:25:22 +02:00
|
|
|
int psock_tcp_connect(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr)
|
2017-07-13 17:27:56 +02:00
|
|
|
{
|
2022-02-08 06:18:01 +01:00
|
|
|
FAR struct tcp_conn_s *conn;
|
|
|
|
struct tcp_connect_s state;
|
|
|
|
int ret = OK;
|
2017-07-13 17:27:56 +02:00
|
|
|
|
|
|
|
/* Interrupts must be disabled through all of the following because
|
|
|
|
* we cannot allow the network callback to occur until we are completely
|
|
|
|
* setup.
|
|
|
|
*/
|
|
|
|
|
|
|
|
net_lock();
|
|
|
|
|
2022-02-08 06:18:01 +01:00
|
|
|
conn = psock->s_conn;
|
|
|
|
|
2017-07-13 17:27:56 +02:00
|
|
|
/* Get the connection reference from the socket */
|
|
|
|
|
2022-02-08 06:18:01 +01:00
|
|
|
if (conn == NULL) /* Should always be non-NULL */
|
2017-07-13 17:27:56 +02:00
|
|
|
{
|
|
|
|
ret = -EINVAL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Perform the TCP connection operation */
|
|
|
|
|
2022-02-08 06:18:01 +01:00
|
|
|
ret = tcp_connect(conn, addr);
|
2017-07-13 17:27:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (ret >= 0)
|
|
|
|
{
|
2022-10-11 05:57:38 +02:00
|
|
|
/* Update laddr to device addr */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (conn->domain == PF_INET6)
|
|
|
|
{
|
|
|
|
#endif
|
|
|
|
if (net_ipv6addr_cmp(conn->u.ipv6.laddr, g_ipv6_unspecaddr))
|
|
|
|
{
|
|
|
|
net_ipv6addr_copy(conn->u.ipv6.laddr, conn->dev->d_ipv6addr);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
if (net_ipv4addr_cmp(conn->u.ipv4.laddr, INADDR_ANY))
|
|
|
|
{
|
|
|
|
net_ipv4addr_copy(conn->u.ipv4.laddr, conn->dev->d_ipaddr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
/* Notify the device driver that new connection is available. */
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2022-02-08 06:18:01 +01:00
|
|
|
netdev_txnotify_dev(conn->dev);
|
2020-12-15 13:30:29 +01:00
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
/* Non-blocking connection ? set the socket error
|
|
|
|
* and start the monitor
|
|
|
|
*/
|
2020-12-15 13:30:29 +01:00
|
|
|
|
2022-02-08 06:18:01 +01:00
|
|
|
if (_SS_ISNONBLOCK(conn->sconn.s_flags))
|
2021-08-10 14:42:35 +02:00
|
|
|
{
|
|
|
|
ret = -EINPROGRESS;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Set up the callbacks in the connection */
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
ret = psock_setup_callbacks(psock, &state);
|
|
|
|
if (ret >= 0)
|
|
|
|
{
|
|
|
|
/* Wait for either the connect to complete or for an
|
|
|
|
* error/timeout to occur.
|
|
|
|
* NOTES: net_lockedwait will also terminate if a
|
|
|
|
* signal is received.
|
|
|
|
*/
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
ret = net_lockedwait(&state.tc_sem);
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
/* Uninitialize the state structure */
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
nxsem_destroy(&state.tc_sem);
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
/* If net_lockedwait failed, negated errno was returned. */
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
if (ret >= 0)
|
|
|
|
{
|
|
|
|
/* If the wait succeeded, then get the new error
|
|
|
|
* value from the state structure
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = state.tc_result;
|
|
|
|
}
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
/* Make sure that no further events are processed */
|
2017-07-13 17:27:56 +02:00
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
psock_teardown_callbacks(&state, ret);
|
|
|
|
}
|
2017-07-13 17:27:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if the socket was successfully connected. */
|
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
if (ret >= 0 || ret == -EINPROGRESS)
|
2017-07-13 17:27:56 +02:00
|
|
|
{
|
2021-08-10 14:42:35 +02:00
|
|
|
int ret2;
|
|
|
|
|
2017-07-13 17:27:56 +02:00
|
|
|
/* Yes... Now that we are connected, we need to set up to monitor
|
|
|
|
* the state of the connection up the connection event monitor.
|
|
|
|
*/
|
|
|
|
|
2021-08-10 14:42:35 +02:00
|
|
|
ret2 = tcp_start_monitor(psock);
|
|
|
|
if (ret2 < 0)
|
2017-07-13 17:27:56 +02:00
|
|
|
{
|
2017-08-29 16:40:13 +02:00
|
|
|
/* tcp_start_monitor() can only fail on certain race
|
2017-07-13 17:27:56 +02:00
|
|
|
* conditions where the connection was lost just before
|
|
|
|
* this function was called. That is not expected to
|
|
|
|
* happen in this context, but just in case...
|
|
|
|
*/
|
|
|
|
|
2022-02-08 06:18:01 +01:00
|
|
|
tcp_stop_monitor(conn, TCP_ABORT);
|
2021-08-10 14:42:35 +02:00
|
|
|
ret = ret2;
|
2017-07-13 17:27:56 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
net_unlock();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-08-29 17:25:22 +02:00
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|